Package: src:pixz Version: 1.0.7-3 Severity: serious Tags: ftbfs trixie sid
Dear maintainer: During a rebuild of all packages in unstable, your package failed to build: -------------------------------------------------------------------------------- [...] debian/rules clean dh clean dh_clean debian/rules binary dh binary dh_update_autotools_config dh_autoreconf configure.ac:14: warning: The macro 'AC_PROG_CC_STDC' is obsolete. configure.ac:14: You should run autoupdate. ./lib/autoconf/c.m4:1669: AC_PROG_CC_STDC is expanded from... configure.ac:14: the top level configure.ac:14: installing './compile' configure.ac:47: installing './config.guess' configure.ac:47: installing './config.sub' configure.ac:11: installing './install-sh' configure.ac:11: installing './missing' src/Makefile.am: installing './depcomp' parallel-tests: installing './test-driver' dh_auto_configure ./configure --build=x86_64-linux-gnu --prefix=/usr --includedir=\${prefix}/include --mandir=\${prefix}/share/man --infodir=\${prefix}/share/info --sysconfdir=/etc --localstatedir=/var --disable-option-checking --disable-silent-rules --libdir=\${prefix}/lib/x86_64-linux-gnu --runstatedir=/run --disable-maintainer-mode --disable-dependency-tracking checking for a BSD-compatible install... /usr/bin/install -c checking whether sleep supports fractional seconds... yes checking filesystem timestamp resolution... 0.01 checking whether build environment is sane... yes checking for a race-free mkdir -p... /usr/bin/mkdir -p checking for gawk... no checking for mawk... mawk checking whether make sets $(MAKE)... yes checking whether make supports nested variables... yes checking xargs -n works... yes checking whether make supports the include directive... yes (GNU style) checking for gcc... gcc checking whether the C compiler works... yes checking for C compiler default output file name... a.out checking for suffix of executables... checking whether we are cross compiling... no checking for suffix of object files... o checking whether the compiler supports GNU C... yes checking whether gcc accepts -g... yes checking for gcc option to enable C11 features... none needed checking whether gcc understands -c and -o together... yes checking dependency style of gcc... none checking for src/pixz.1... no checking for a2x... a2x checking for ceil in -lm... yes checking build system type... x86_64-pc-linux-gnu checking host system type... x86_64-pc-linux-gnu checking if compiler needs -Werror to reject unknown flags... no checking for the pthreads library -lpthreads... no checking whether pthreads work without any flags... yes checking for joinable pthread attribute... PTHREAD_CREATE_JOINABLE checking if more special flags are required for pthreads... no checking for PTHREAD_PRIO_INHERIT... yes checking for pkg-config... /usr/bin/pkg-config checking pkg-config is at least version 0.9.0... yes checking for libarchive... yes checking for liblzma... yes checking for stdio.h... yes checking for stdlib.h... yes checking for string.h... yes checking for inttypes.h... yes checking for stdint.h... yes checking for strings.h... yes checking for sys/stat.h... yes checking for sys/types.h... yes checking for unistd.h... yes checking for fcntl.h... yes checking for stdint.h... (cached) yes checking for stdlib.h... (cached) yes checking for string.h... (cached) yes checking for unistd.h... (cached) yes checking for off_t... yes checking for size_t... yes checking for ssize_t... yes checking for uint16_t... yes checking for uint32_t... yes checking for uint64_t... yes checking for uint8_t... yes checking for gcc option to enable large file support... none needed checking for GNU libc compatible malloc... yes checking for GNU libc compatible realloc... yes checking for working strtod... yes checking for memchr... yes checking for memmove... yes checking for memset... yes checking for strerror... yes checking for strtol... yes checking for gcc options needed to detect all undeclared functions... none needed checking for sys/endian.h... no checking for endian.h... yes checking whether htole64 is declared... yes checking whether le64toh is declared... yes checking that generated files are newer than configure... done configure: creating ./config.status config.status: creating Makefile config.status: creating src/Makefile config.status: creating test/Makefile config.status: creating config.h config.status: executing depfiles commands dh_auto_build make -j2 make[1]: Entering directory '/<<PKGBUILDDIR>>' make all-recursive make[2]: Entering directory '/<<PKGBUILDDIR>>' Making all in src make[3]: Entering directory '/<<PKGBUILDDIR>>/src' gcc -DHAVE_CONFIG_H -I. -I.. -Wdate-time -D_FORTIFY_SOURCE=2 -Wall -Wno-unknown-pragmas -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -fcf-protection -c -o pixz-common.o `test -f 'common.c' || echo './'`common.c gcc -DHAVE_CONFIG_H -I. -I.. -Wdate-time -D_FORTIFY_SOURCE=2 -Wall -Wno-unknown-pragmas -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -fcf-protection -c -o pixz-cpu.o `test -f 'cpu.c' || echo './'`cpu.c gcc -DHAVE_CONFIG_H -I. -I.. -Wdate-time -D_FORTIFY_SOURCE=2 -Wall -Wno-unknown-pragmas -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -fcf-protection -c -o pixz-endian.o `test -f 'endian.c' || echo './'`endian.c gcc -DHAVE_CONFIG_H -I. -I.. -Wdate-time -D_FORTIFY_SOURCE=2 -Wall -Wno-unknown-pragmas -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -fcf-protection -c -o pixz-list.o `test -f 'list.c' || echo './'`list.c gcc -DHAVE_CONFIG_H -I. -I.. -Wdate-time -D_FORTIFY_SOURCE=2 -Wall -Wno-unknown-pragmas -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -fcf-protection -c -o pixz-pixz.o `test -f 'pixz.c' || echo './'`pixz.c gcc -DHAVE_CONFIG_H -I. -I.. -Wdate-time -D_FORTIFY_SOURCE=2 -Wall -Wno-unknown-pragmas -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -fcf-protection -c -o pixz-read.o `test -f 'read.c' || echo './'`read.c gcc -DHAVE_CONFIG_H -I. -I.. -Wdate-time -D_FORTIFY_SOURCE=2 -Wall -Wno-unknown-pragmas -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -fcf-protection -c -o pixz-write.o `test -f 'write.c' || echo './'`write.c a2x -a manversion=1.0.7 -f manpage ../src/pixz.1.asciidoc gcc -Wall -Wno-unknown-pragmas -g -O2 -Werror=implicit-function-declaration -ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong -fstack-clash-protection -Wformat -Werror=format-security -fcf-protection -Wl,-z,relro -Wl,-z,now -o pixz pixz-common.o pixz-cpu.o pixz-endian.o pixz-list.o pixz-pixz.o pixz-read.o pixz-write.o -lm -larchive -llzma -lm if ! test -f pixz.1 ; then mv -f ../src/pixz.1 . ; fi make[3]: Leaving directory '/<<PKGBUILDDIR>>/src' Making all in test make[3]: Entering directory '/<<PKGBUILDDIR>>/test' make[3]: Nothing to be done for 'all'. make[3]: Leaving directory '/<<PKGBUILDDIR>>/test' make[3]: Entering directory '/<<PKGBUILDDIR>>' make[3]: Leaving directory '/<<PKGBUILDDIR>>' make[2]: Leaving directory '/<<PKGBUILDDIR>>' make[1]: Leaving directory '/<<PKGBUILDDIR>>' dh_auto_test make -j2 check "TESTSUITEFLAGS=-j2 --verbose" VERBOSE=1 make[1]: Entering directory '/<<PKGBUILDDIR>>' Making check in src make[2]: Entering directory '/<<PKGBUILDDIR>>/src' make[2]: Nothing to be done for 'check'. make[2]: Leaving directory '/<<PKGBUILDDIR>>/src' Making check in test make[2]: Entering directory '/<<PKGBUILDDIR>>/test' make check-TESTS make[3]: Entering directory '/<<PKGBUILDDIR>>/test' make[4]: Entering directory '/<<PKGBUILDDIR>>/test' PASS: compress-file-permissions.sh PASS: single-file-round-trip.sh PASS: xz-compatibility-c-option.sh FAIL: cppcheck-src.sh ===================================== pixz 1.0.7: test/test-suite.log ===================================== # TOTAL: 4 # PASS: 3 # SKIP: 0 # XFAIL: 0 # FAIL: 1 # XPASS: 0 # ERROR: 0 System information (uname -a): Linux 6.1.0-31-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.128-1 (2025-02-07) x86_64 Distribution information (/etc/os-release): PRETTY_NAME="Debian GNU/Linux trixie/sid" NAME="Debian GNU/Linux" VERSION_CODENAME=trixie ID=debian HOME_URL="https://www.debian.org/" SUPPORT_URL="https://www.debian.org/support" BUG_REPORT_URL="https://bugs.debian.org/" .. contents:: :depth: 2 FAIL: cppcheck-src ================== /usr/bin/cppcheck Checking ../src/common.c ... ../src/common.c:95:5: warning: If memory allocation fails, then there is a possible null pointer dereference: bw [nullPointerOutOfMemory] bw->block = (lzma_block){ .check = check, .filters = bw->filters, ^ ../src/common.c:94:33: note: Assuming allocation function fails block_wrapper_t *bw = malloc(sizeof(block_wrapper_t)); ^ ../src/common.c:94:33: note: Assignment 'bw=malloc(sizeof(struct block_wrapper_t))', assigned value is 0 block_wrapper_t *bw = malloc(sizeof(block_wrapper_t)); ^ ../src/common.c:95:5: note: Null pointer dereference bw->block = (lzma_block){ .check = check, .filters = bw->filters, ^ ../src/common.c:101:5: warning: If memory allocation fails, then there is a possible null pointer dereference: bw [nullPointerOutOfMemory] bw->block.header_size = lzma_block_header_size_decode(b); ^ ../src/common.c:94:33: note: Assuming allocation function fails block_wrapper_t *bw = malloc(sizeof(block_wrapper_t)); ^ ../src/common.c:94:33: note: Assignment 'bw=malloc(sizeof(struct block_wrapper_t))', assigned value is 0 block_wrapper_t *bw = malloc(sizeof(block_wrapper_t)); ^ ../src/common.c:99:18: note: Assuming condition is false if (b == EOF || b == 0) ^ ../src/common.c:101:5: note: Null pointer dereference bw->block.header_size = lzma_block_header_size_decode(b); ^ ../src/common.c:102:20: warning: If memory allocation fails, then there is a possible null pointer dereference: bw [nullPointerOutOfMemory] uint8_t hdrbuf[bw->block.header_size]; ^ ../src/common.c:94:33: note: Assuming allocation function fails block_wrapper_t *bw = malloc(sizeof(block_wrapper_t)); ^ ../src/common.c:94:33: note: Assignment 'bw=malloc(sizeof(struct block_wrapper_t))', assigned value is 0 block_wrapper_t *bw = malloc(sizeof(block_wrapper_t)); ^ ../src/common.c:99:18: note: Assuming condition is false if (b == EOF || b == 0) ^ ../src/common.c:102:20: note: Null pointer dereference uint8_t hdrbuf[bw->block.header_size]; ^ ../src/common.c:104:27: warning: If memory allocation fails, then there is a possible null pointer dereference: bw [nullPointerOutOfMemory] if (fread(hdrbuf + 1, bw->block.header_size - 1, 1, gInFile) != 1) ^ ../src/common.c:94:33: note: Assuming allocation function fails block_wrapper_t *bw = malloc(sizeof(block_wrapper_t)); ^ ../src/common.c:94:33: note: Assignment 'bw=malloc(sizeof(struct block_wrapper_t))', assigned value is 0 block_wrapper_t *bw = malloc(sizeof(block_wrapper_t)); ^ ../src/common.c:99:18: note: Assuming condition is false if (b == EOF || b == 0) ^ ../src/common.c:104:27: note: Null pointer dereference if (fread(hdrbuf + 1, bw->block.header_size - 1, 1, gInFile) != 1) ^ ../src/common.c:168:9: warning: If memory allocation fails, then there is a possible null pointer dereference: f [nullPointerOutOfMemory] f->name = strlen(name) ? xstrdup(name) : NULL; ^ ../src/common.c:167:33: note: Assuming allocation function fails file_index_t *f = malloc(sizeof(file_index_t)); ^ ../src/common.c:167:33: note: Assignment 'f=malloc(sizeof(struct file_index_t))', assigned value is 0 file_index_t *f = malloc(sizeof(file_index_t)); ^ ../src/common.c:168:9: note: Null pointer dereference f->name = strlen(name) ? xstrdup(name) : NULL; ^ ../src/common.c:169:9: warning: If memory allocation fails, then there is a possible null pointer dereference: f [nullPointerOutOfMemory] f->offset = xle64dec(gFileIndexBuf + gFIBPos); ^ ../src/common.c:167:33: note: Assuming allocation function fails file_index_t *f = malloc(sizeof(file_index_t)); ^ ../src/common.c:167:33: note: Assignment 'f=malloc(sizeof(struct file_index_t))', assigned value is 0 file_index_t *f = malloc(sizeof(file_index_t)); ^ ../src/common.c:169:9: note: Null pointer dereference f->offset = xle64dec(gFileIndexBuf + gFIBPos); ^ ../src/common.c:370:5: warning: If memory allocation fails, then there is a possible null pointer dereference: q [nullPointerOutOfMemory] q->first = q->last = NULL; ^ ../src/common.c:369:24: note: Assuming allocation function fails queue_t *q = malloc(sizeof(queue_t)); ^ ../src/common.c:369:24: note: Assignment 'q=malloc(sizeof(struct queue_t))', assigned value is 0 queue_t *q = malloc(sizeof(queue_t)); ^ ../src/common.c:370:5: note: Null pointer dereference q->first = q->last = NULL; ^ ../src/common.c:371:5: warning: If memory allocation fails, then there is a possible null pointer dereference: q [nullPointerOutOfMemory] q->freer = freer; ^ ../src/common.c:369:24: note: Assuming allocation function fails queue_t *q = malloc(sizeof(queue_t)); ^ ../src/common.c:369:24: note: Assignment 'q=malloc(sizeof(struct queue_t))', assigned value is 0 queue_t *q = malloc(sizeof(queue_t)); ^ ../src/common.c:371:5: note: Null pointer dereference q->freer = freer; ^ ../src/common.c:394:5: warning: If memory allocation fails, then there is a possible null pointer dereference: i [nullPointerOutOfMemory] i->type = type; ^ ../src/common.c:393:29: note: Assuming allocation function fails queue_item_t *i = malloc(sizeof(queue_item_t)); ^ ../src/common.c:393:29: note: Assignment 'i=malloc(sizeof(struct queue_item_t))', assigned value is 0 queue_item_t *i = malloc(sizeof(queue_item_t)); ^ ../src/common.c:394:5: note: Null pointer dereference i->type = type; ^ ../src/common.c:395:5: warning: If memory allocation fails, then there is a possible null pointer dereference: i [nullPointerOutOfMemory] i->data = data; ^ ../src/common.c:393:29: note: Assuming allocation function fails queue_item_t *i = malloc(sizeof(queue_item_t)); ^ ../src/common.c:393:29: note: Assignment 'i=malloc(sizeof(struct queue_item_t))', assigned value is 0 queue_item_t *i = malloc(sizeof(queue_item_t)); ^ ../src/common.c:395:5: note: Null pointer dereference i->data = data; ^ ../src/common.c:396:5: warning: If memory allocation fails, then there is a possible null pointer dereference: i [nullPointerOutOfMemory] i->next = NULL; ^ ../src/common.c:393:29: note: Assuming allocation function fails queue_item_t *i = malloc(sizeof(queue_item_t)); ^ ../src/common.c:393:29: note: Assignment 'i=malloc(sizeof(struct queue_item_t))', assigned value is 0 queue_item_t *i = malloc(sizeof(queue_item_t)); ^ ../src/common.c:396:5: note: Null pointer dereference i->next = NULL; ^ ../src/common.c:484:9: warning: If memory allocation fails, then there is a possible null pointer dereference: item [nullPointerOutOfMemory] item->data = create(); ^ ../src/common.c:483:39: note: Assuming allocation function fails pipeline_item_t *item = malloc(sizeof(pipeline_item_t)); ^ ../src/common.c:483:39: note: Assignment 'item=malloc(sizeof(struct pipeline_item_t))', assigned value is 0 pipeline_item_t *item = malloc(sizeof(pipeline_item_t)); ^ ../src/common.c:484:9: note: Null pointer dereference item->data = create(); ^ Checking ../src/common.c: HAVE_CONFIG_H... 1/7 files checked 26% done Checking ../src/cpu.c ... 2/7 files checked 26% done Checking ../src/endian.c ... Checking ../src/endian.c: HAVE_DECL_HTOLE64=0;__FreeBSD__;__linux__... Checking ../src/endian.c: HAVE_DECL_LE64TOH=0;__FreeBSD__;__linux__... Checking ../src/endian.c: __APPLE__... Checking ../src/endian.c: __FreeBSD__;__linux__... Checking ../src/endian.c: __FreeBSD__;__linux__;__linux__... 3/7 files checked 28% done Checking ../src/list.c ... Checking ../src/list.c: HAVE_CONFIG_H... 4/7 files checked 29% done Checking ../src/pixz.c ... ../src/pixz.c:205:12: warning: If memory allocation fails, then there is a possible null pointer dereference: r [nullPointerOutOfMemory] memcpy(r, in, li - l1); ^ ../src/pixz.c:204:21: note: Assuming allocation function fails char *r = malloc(li + l2 - l1 + 1); ^ ../src/pixz.c:204:21: note: Assignment 'r=malloc(li+l2-l1+1)', assigned value is 0 char *r = malloc(li + l2 - l1 + 1); ^ ../src/pixz.c:205:12: note: Null pointer dereference memcpy(r, in, li - l1); ^ ../src/pixz.c:206:14: error: If memory allocation fail: pointer addition with NULL pointer. [nullPointerArithmeticOutOfMemory] strcpy(r + li - l1, suf2); ^ ../src/pixz.c:204:21: note: Assuming allocation function fails char *r = malloc(li + l2 - l1 + 1); ^ ../src/pixz.c:204:21: note: Assignment 'r=malloc(li+l2-l1+1)', assigned value is 0 char *r = malloc(li + l2 - l1 + 1); ^ ../src/pixz.c:206:14: note: Null pointer addition strcpy(r + li - l1, suf2); ^ Checking ../src/pixz.c: HAVE_CONFIG_H... 5/7 files checked 40% done Checking ../src/read.c ... ../src/read.c:201:2: warning: If memory allocation fails, then there is a possible null pointer dereference: ib [nullPointerOutOfMemory] ib->incap = ib->outcap = 0; ^ ../src/read.c:200:28: note: Assuming allocation function fails io_block_t *ib = malloc(sizeof(io_block_t)); ^ ../src/read.c:200:28: note: Assignment 'ib=malloc(sizeof(struct io_block_t))', assigned value is 0 io_block_t *ib = malloc(sizeof(io_block_t)); ^ ../src/read.c:201:2: note: Null pointer dereference ib->incap = ib->outcap = 0; ^ ../src/read.c:202:2: warning: If memory allocation fails, then there is a possible null pointer dereference: ib [nullPointerOutOfMemory] ib->input = ib->output = NULL; ^ ../src/read.c:200:28: note: Assuming allocation function fails io_block_t *ib = malloc(sizeof(io_block_t)); ^ ../src/read.c:200:28: note: Assignment 'ib=malloc(sizeof(struct io_block_t))', assigned value is 0 io_block_t *ib = malloc(sizeof(io_block_t)); ^ ../src/read.c:202:2: note: Null pointer dereference ib->input = ib->output = NULL; ^ ../src/read.c:270:14: warning: If memory allocation fails, then there is a possible null pointer dereference: w [nullPointerOutOfMemory] *w = (wanted_t){ .name = f->name, .start = f->offset, ^ ../src/read.c:269:33: note: Assuming allocation function fails wanted_t *w = malloc(sizeof(wanted_t)); ^ ../src/read.c:269:33: note: Assignment 'w=malloc(sizeof(struct wanted_t))', assigned value is 0 wanted_t *w = malloc(sizeof(wanted_t)); ^ ../src/read.c:270:14: note: Null pointer dereference *w = (wanted_t){ .name = f->name, .start = f->offset, ^ ../src/read.c:272:13: warning: If memory allocation fails, then there is a possible null pointer dereference: w [nullPointerOutOfMemory] w->size = w->end - w->start; ^ ../src/read.c:269:33: note: Assuming allocation function fails wanted_t *w = malloc(sizeof(wanted_t)); ^ ../src/read.c:269:33: note: Assignment 'w=malloc(sizeof(struct wanted_t))', assigned value is 0 wanted_t *w = malloc(sizeof(wanted_t)); ^ ../src/read.c:272:13: note: Null pointer dereference w->size = w->end - w->start; ^ Checking ../src/read.c: DEBUG... Checking ../src/read.c: HAVE_CONFIG_H... 6/7 files checked 73% done Checking ../src/write.c ... ../src/write.c:234:5: warning: If memory allocation fails, then there is a possible null pointer dereference: f [nullPointerOutOfMemory] f->offset = gMultiHeader ? gMultiHeaderStart : offset; ^ ../src/write.c:233:29: note: Assuming allocation function fails file_index_t *f = malloc(sizeof(file_index_t)); ^ ../src/write.c:233:29: note: Assignment 'f=malloc(sizeof(struct file_index_t))', assigned value is 0 file_index_t *f = malloc(sizeof(file_index_t)); ^ ../src/write.c:234:5: note: Null pointer dereference f->offset = gMultiHeader ? gMultiHeaderStart : offset; ^ ../src/write.c:236:5: warning: If memory allocation fails, then there is a possible null pointer dereference: f [nullPointerOutOfMemory] f->name = name ? xstrdup(name) : NULL; ^ ../src/write.c:233:29: note: Assuming allocation function fails file_index_t *f = malloc(sizeof(file_index_t)); ^ ../src/write.c:233:29: note: Assignment 'f=malloc(sizeof(struct file_index_t))', assigned value is 0 file_index_t *f = malloc(sizeof(file_index_t)); ^ ../src/write.c:236:5: note: Null pointer dereference f->name = name ? xstrdup(name) : NULL; ^ ../src/write.c:237:5: warning: If memory allocation fails, then there is a possible null pointer dereference: f [nullPointerOutOfMemory] f->next = NULL; ^ ../src/write.c:233:29: note: Assuming allocation function fails file_index_t *f = malloc(sizeof(file_index_t)); ^ ../src/write.c:233:29: note: Assignment 'f=malloc(sizeof(struct file_index_t))', assigned value is 0 file_index_t *f = malloc(sizeof(file_index_t)); ^ ../src/write.c:237:5: note: Null pointer dereference f->next = NULL; ^ ../src/write.c:256:5: warning: If memory allocation fails, then there is a possible null pointer dereference: ib [nullPointerOutOfMemory] ib->input = ib->output = NULL; ^ ../src/write.c:255:28: note: Assuming allocation function fails io_block_t *ib = malloc(sizeof(io_block_t)); ^ ../src/write.c:255:28: note: Assignment 'ib=malloc(sizeof(struct io_block_t))', assigned value is 0 io_block_t *ib = malloc(sizeof(io_block_t)); ^ ../src/write.c:256:5: note: Null pointer dereference ib->input = ib->output = NULL; ^ Checking ../src/write.c: HAVE_CONFIG_H... 7/7 files checked 100% done FAIL cppcheck-src.sh (exit status: 1) ============================================================================ Testsuite summary for pixz 1.0.7 ============================================================================ # TOTAL: 4 # PASS: 3 # SKIP: 0 # XFAIL: 0 # FAIL: 1 # XPASS: 0 # ERROR: 0 ============================================================================ See test/test-suite.log for debugging. Some test(s) failed. Please report this to https://github.com/vasi/pixz/issues, together with the test-suite.log file (gzipped) and your system information. Thanks. ============================================================================ make[4]: *** [Makefile:506: test-suite.log] Error 1 make[4]: Leaving directory '/<<PKGBUILDDIR>>/test' make[3]: *** [Makefile:641: check-TESTS] Error 2 make[3]: Leaving directory '/<<PKGBUILDDIR>>/test' make[2]: *** [Makefile:705: check-am] Error 2 make[2]: Leaving directory '/<<PKGBUILDDIR>>/test' make[1]: *** [Makefile:383: check-recursive] Error 1 make[1]: Leaving directory '/<<PKGBUILDDIR>>' dh_auto_test: error: make -j2 check "TESTSUITEFLAGS=-j2 --verbose" VERBOSE=1 returned exit code 2 make: *** [debian/rules:10: binary] Error 25 dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2 -------------------------------------------------------------------------------- The above is just how the build ends and not necessarily the most relevant part. If required, the full build log is available here: https://people.debian.org/~sanvila/build-logs/202503/ About the archive rebuild: The build was made on virtual machines from AWS, using sbuild and a reduced chroot with only build-essential packages. If you could not reproduce the bug please contact me privately, as I am willing to provide ssh access to a virtual machine where the bug is fully reproducible. If this is really a bug in one of the build-depends, please use reassign and add an affects on src:pixz, so that this is still visible in the BTS web page for this package. Thanks.