Your message dated Wed, 12 Mar 2025 06:49:54 +0000
with message-id <e1tsfuc-008qoi...@fasolo.debian.org>
and subject line Bug#1099263: fixed in pixz 1.0.7-4
has caused the Debian Bug report #1099263,
regarding pixz: FTBFS: ../src/pixz.c:206:14: error: If memory allocation fail:
pointer addition with NULL pointer.
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1099263: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1099263
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:pixz
Version: 1.0.7-3
Severity: serious
Tags: ftbfs trixie sid
Dear maintainer:
During a rebuild of all packages in unstable, your package failed to build:
--------------------------------------------------------------------------------
[...]
debian/rules clean
dh clean
dh_clean
debian/rules binary
dh binary
dh_update_autotools_config
dh_autoreconf
configure.ac:14: warning: The macro 'AC_PROG_CC_STDC' is obsolete.
configure.ac:14: You should run autoupdate.
./lib/autoconf/c.m4:1669: AC_PROG_CC_STDC is expanded from...
configure.ac:14: the top level
configure.ac:14: installing './compile'
configure.ac:47: installing './config.guess'
configure.ac:47: installing './config.sub'
configure.ac:11: installing './install-sh'
configure.ac:11: installing './missing'
src/Makefile.am: installing './depcomp'
parallel-tests: installing './test-driver'
dh_auto_configure
./configure --build=x86_64-linux-gnu --prefix=/usr
--includedir=\${prefix}/include --mandir=\${prefix}/share/man
--infodir=\${prefix}/share/info --sysconfdir=/etc --localstatedir=/var
--disable-option-checking --disable-silent-rules
--libdir=\${prefix}/lib/x86_64-linux-gnu --runstatedir=/run
--disable-maintainer-mode --disable-dependency-tracking
checking for a BSD-compatible install... /usr/bin/install -c
checking whether sleep supports fractional seconds... yes
checking filesystem timestamp resolution... 0.01
checking whether build environment is sane... yes
checking for a race-free mkdir -p... /usr/bin/mkdir -p
checking for gawk... no
checking for mawk... mawk
checking whether make sets $(MAKE)... yes
checking whether make supports nested variables... yes
checking xargs -n works... yes
checking whether make supports the include directive... yes (GNU style)
checking for gcc... gcc
checking whether the C compiler works... yes
checking for C compiler default output file name... a.out
checking for suffix of executables...
checking whether we are cross compiling... no
checking for suffix of object files... o
checking whether the compiler supports GNU C... yes
checking whether gcc accepts -g... yes
checking for gcc option to enable C11 features... none needed
checking whether gcc understands -c and -o together... yes
checking dependency style of gcc... none
checking for src/pixz.1... no
checking for a2x... a2x
checking for ceil in -lm... yes
checking build system type... x86_64-pc-linux-gnu
checking host system type... x86_64-pc-linux-gnu
checking if compiler needs -Werror to reject unknown flags... no
checking for the pthreads library -lpthreads... no
checking whether pthreads work without any flags... yes
checking for joinable pthread attribute... PTHREAD_CREATE_JOINABLE
checking if more special flags are required for pthreads... no
checking for PTHREAD_PRIO_INHERIT... yes
checking for pkg-config... /usr/bin/pkg-config
checking pkg-config is at least version 0.9.0... yes
checking for libarchive... yes
checking for liblzma... yes
checking for stdio.h... yes
checking for stdlib.h... yes
checking for string.h... yes
checking for inttypes.h... yes
checking for stdint.h... yes
checking for strings.h... yes
checking for sys/stat.h... yes
checking for sys/types.h... yes
checking for unistd.h... yes
checking for fcntl.h... yes
checking for stdint.h... (cached) yes
checking for stdlib.h... (cached) yes
checking for string.h... (cached) yes
checking for unistd.h... (cached) yes
checking for off_t... yes
checking for size_t... yes
checking for ssize_t... yes
checking for uint16_t... yes
checking for uint32_t... yes
checking for uint64_t... yes
checking for uint8_t... yes
checking for gcc option to enable large file support... none needed
checking for GNU libc compatible malloc... yes
checking for GNU libc compatible realloc... yes
checking for working strtod... yes
checking for memchr... yes
checking for memmove... yes
checking for memset... yes
checking for strerror... yes
checking for strtol... yes
checking for gcc options needed to detect all undeclared functions... none
needed
checking for sys/endian.h... no
checking for endian.h... yes
checking whether htole64 is declared... yes
checking whether le64toh is declared... yes
checking that generated files are newer than configure... done
configure: creating ./config.status
config.status: creating Makefile
config.status: creating src/Makefile
config.status: creating test/Makefile
config.status: creating config.h
config.status: executing depfiles commands
dh_auto_build
make -j2
make[1]: Entering directory '/<<PKGBUILDDIR>>'
make all-recursive
make[2]: Entering directory '/<<PKGBUILDDIR>>'
Making all in src
make[3]: Entering directory '/<<PKGBUILDDIR>>/src'
gcc -DHAVE_CONFIG_H -I. -I.. -Wdate-time -D_FORTIFY_SOURCE=2 -Wall
-Wno-unknown-pragmas -g -O2 -Werror=implicit-function-declaration
-ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong
-fstack-clash-protection -Wformat -Werror=format-security -fcf-protection -c -o
pixz-common.o `test -f 'common.c' || echo './'`common.c
gcc -DHAVE_CONFIG_H -I. -I.. -Wdate-time -D_FORTIFY_SOURCE=2 -Wall
-Wno-unknown-pragmas -g -O2 -Werror=implicit-function-declaration
-ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong
-fstack-clash-protection -Wformat -Werror=format-security -fcf-protection -c -o
pixz-cpu.o `test -f 'cpu.c' || echo './'`cpu.c
gcc -DHAVE_CONFIG_H -I. -I.. -Wdate-time -D_FORTIFY_SOURCE=2 -Wall
-Wno-unknown-pragmas -g -O2 -Werror=implicit-function-declaration
-ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong
-fstack-clash-protection -Wformat -Werror=format-security -fcf-protection -c -o
pixz-endian.o `test -f 'endian.c' || echo './'`endian.c
gcc -DHAVE_CONFIG_H -I. -I.. -Wdate-time -D_FORTIFY_SOURCE=2 -Wall
-Wno-unknown-pragmas -g -O2 -Werror=implicit-function-declaration
-ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong
-fstack-clash-protection -Wformat -Werror=format-security -fcf-protection -c -o
pixz-list.o `test -f 'list.c' || echo './'`list.c
gcc -DHAVE_CONFIG_H -I. -I.. -Wdate-time -D_FORTIFY_SOURCE=2 -Wall
-Wno-unknown-pragmas -g -O2 -Werror=implicit-function-declaration
-ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong
-fstack-clash-protection -Wformat -Werror=format-security -fcf-protection -c -o
pixz-pixz.o `test -f 'pixz.c' || echo './'`pixz.c
gcc -DHAVE_CONFIG_H -I. -I.. -Wdate-time -D_FORTIFY_SOURCE=2 -Wall
-Wno-unknown-pragmas -g -O2 -Werror=implicit-function-declaration
-ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong
-fstack-clash-protection -Wformat -Werror=format-security -fcf-protection -c -o
pixz-read.o `test -f 'read.c' || echo './'`read.c
gcc -DHAVE_CONFIG_H -I. -I.. -Wdate-time -D_FORTIFY_SOURCE=2 -Wall
-Wno-unknown-pragmas -g -O2 -Werror=implicit-function-declaration
-ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong
-fstack-clash-protection -Wformat -Werror=format-security -fcf-protection -c -o
pixz-write.o `test -f 'write.c' || echo './'`write.c
a2x -a manversion=1.0.7 -f manpage ../src/pixz.1.asciidoc
gcc -Wall -Wno-unknown-pragmas -g -O2 -Werror=implicit-function-declaration
-ffile-prefix-map=/<<PKGBUILDDIR>>=. -fstack-protector-strong
-fstack-clash-protection -Wformat -Werror=format-security -fcf-protection
-Wl,-z,relro -Wl,-z,now -o pixz pixz-common.o pixz-cpu.o pixz-endian.o
pixz-list.o pixz-pixz.o pixz-read.o pixz-write.o -lm -larchive -llzma -lm
if ! test -f pixz.1 ; then mv -f ../src/pixz.1 . ; fi
make[3]: Leaving directory '/<<PKGBUILDDIR>>/src'
Making all in test
make[3]: Entering directory '/<<PKGBUILDDIR>>/test'
make[3]: Nothing to be done for 'all'.
make[3]: Leaving directory '/<<PKGBUILDDIR>>/test'
make[3]: Entering directory '/<<PKGBUILDDIR>>'
make[3]: Leaving directory '/<<PKGBUILDDIR>>'
make[2]: Leaving directory '/<<PKGBUILDDIR>>'
make[1]: Leaving directory '/<<PKGBUILDDIR>>'
dh_auto_test
make -j2 check "TESTSUITEFLAGS=-j2 --verbose" VERBOSE=1
make[1]: Entering directory '/<<PKGBUILDDIR>>'
Making check in src
make[2]: Entering directory '/<<PKGBUILDDIR>>/src'
make[2]: Nothing to be done for 'check'.
make[2]: Leaving directory '/<<PKGBUILDDIR>>/src'
Making check in test
make[2]: Entering directory '/<<PKGBUILDDIR>>/test'
make check-TESTS
make[3]: Entering directory '/<<PKGBUILDDIR>>/test'
make[4]: Entering directory '/<<PKGBUILDDIR>>/test'
PASS: compress-file-permissions.sh
PASS: single-file-round-trip.sh
PASS: xz-compatibility-c-option.sh
FAIL: cppcheck-src.sh
=====================================
pixz 1.0.7: test/test-suite.log
=====================================
# TOTAL: 4
# PASS: 3
# SKIP: 0
# XFAIL: 0
# FAIL: 1
# XPASS: 0
# ERROR: 0
System information (uname -a): Linux 6.1.0-31-amd64 #1 SMP PREEMPT_DYNAMIC
Debian 6.1.128-1 (2025-02-07) x86_64
Distribution information (/etc/os-release):
PRETTY_NAME="Debian GNU/Linux trixie/sid"
NAME="Debian GNU/Linux"
VERSION_CODENAME=trixie
ID=debian
HOME_URL="https://www.debian.org/"
SUPPORT_URL="https://www.debian.org/support"
BUG_REPORT_URL="https://bugs.debian.org/"
.. contents:: :depth: 2
FAIL: cppcheck-src
==================
/usr/bin/cppcheck
Checking ../src/common.c ...
../src/common.c:95:5: warning: If memory allocation fails, then there is a
possible null pointer dereference: bw [nullPointerOutOfMemory]
bw->block = (lzma_block){ .check = check, .filters = bw->filters,
^
../src/common.c:94:33: note: Assuming allocation function fails
block_wrapper_t *bw = malloc(sizeof(block_wrapper_t));
^
../src/common.c:94:33: note: Assignment 'bw=malloc(sizeof(struct
block_wrapper_t))', assigned value is 0
block_wrapper_t *bw = malloc(sizeof(block_wrapper_t));
^
../src/common.c:95:5: note: Null pointer dereference
bw->block = (lzma_block){ .check = check, .filters = bw->filters,
^
../src/common.c:101:5: warning: If memory allocation fails, then there is a
possible null pointer dereference: bw [nullPointerOutOfMemory]
bw->block.header_size = lzma_block_header_size_decode(b);
^
../src/common.c:94:33: note: Assuming allocation function fails
block_wrapper_t *bw = malloc(sizeof(block_wrapper_t));
^
../src/common.c:94:33: note: Assignment 'bw=malloc(sizeof(struct
block_wrapper_t))', assigned value is 0
block_wrapper_t *bw = malloc(sizeof(block_wrapper_t));
^
../src/common.c:99:18: note: Assuming condition is false
if (b == EOF || b == 0)
^
../src/common.c:101:5: note: Null pointer dereference
bw->block.header_size = lzma_block_header_size_decode(b);
^
../src/common.c:102:20: warning: If memory allocation fails, then there is a
possible null pointer dereference: bw [nullPointerOutOfMemory]
uint8_t hdrbuf[bw->block.header_size];
^
../src/common.c:94:33: note: Assuming allocation function fails
block_wrapper_t *bw = malloc(sizeof(block_wrapper_t));
^
../src/common.c:94:33: note: Assignment 'bw=malloc(sizeof(struct
block_wrapper_t))', assigned value is 0
block_wrapper_t *bw = malloc(sizeof(block_wrapper_t));
^
../src/common.c:99:18: note: Assuming condition is false
if (b == EOF || b == 0)
^
../src/common.c:102:20: note: Null pointer dereference
uint8_t hdrbuf[bw->block.header_size];
^
../src/common.c:104:27: warning: If memory allocation fails, then there is a
possible null pointer dereference: bw [nullPointerOutOfMemory]
if (fread(hdrbuf + 1, bw->block.header_size - 1, 1, gInFile) != 1)
^
../src/common.c:94:33: note: Assuming allocation function fails
block_wrapper_t *bw = malloc(sizeof(block_wrapper_t));
^
../src/common.c:94:33: note: Assignment 'bw=malloc(sizeof(struct
block_wrapper_t))', assigned value is 0
block_wrapper_t *bw = malloc(sizeof(block_wrapper_t));
^
../src/common.c:99:18: note: Assuming condition is false
if (b == EOF || b == 0)
^
../src/common.c:104:27: note: Null pointer dereference
if (fread(hdrbuf + 1, bw->block.header_size - 1, 1, gInFile) != 1)
^
../src/common.c:168:9: warning: If memory allocation fails, then there is a
possible null pointer dereference: f [nullPointerOutOfMemory]
f->name = strlen(name) ? xstrdup(name) : NULL;
^
../src/common.c:167:33: note: Assuming allocation function fails
file_index_t *f = malloc(sizeof(file_index_t));
^
../src/common.c:167:33: note: Assignment 'f=malloc(sizeof(struct
file_index_t))', assigned value is 0
file_index_t *f = malloc(sizeof(file_index_t));
^
../src/common.c:168:9: note: Null pointer dereference
f->name = strlen(name) ? xstrdup(name) : NULL;
^
../src/common.c:169:9: warning: If memory allocation fails, then there is a
possible null pointer dereference: f [nullPointerOutOfMemory]
f->offset = xle64dec(gFileIndexBuf + gFIBPos);
^
../src/common.c:167:33: note: Assuming allocation function fails
file_index_t *f = malloc(sizeof(file_index_t));
^
../src/common.c:167:33: note: Assignment 'f=malloc(sizeof(struct
file_index_t))', assigned value is 0
file_index_t *f = malloc(sizeof(file_index_t));
^
../src/common.c:169:9: note: Null pointer dereference
f->offset = xle64dec(gFileIndexBuf + gFIBPos);
^
../src/common.c:370:5: warning: If memory allocation fails, then there is a
possible null pointer dereference: q [nullPointerOutOfMemory]
q->first = q->last = NULL;
^
../src/common.c:369:24: note: Assuming allocation function fails
queue_t *q = malloc(sizeof(queue_t));
^
../src/common.c:369:24: note: Assignment 'q=malloc(sizeof(struct queue_t))',
assigned value is 0
queue_t *q = malloc(sizeof(queue_t));
^
../src/common.c:370:5: note: Null pointer dereference
q->first = q->last = NULL;
^
../src/common.c:371:5: warning: If memory allocation fails, then there is a
possible null pointer dereference: q [nullPointerOutOfMemory]
q->freer = freer;
^
../src/common.c:369:24: note: Assuming allocation function fails
queue_t *q = malloc(sizeof(queue_t));
^
../src/common.c:369:24: note: Assignment 'q=malloc(sizeof(struct queue_t))',
assigned value is 0
queue_t *q = malloc(sizeof(queue_t));
^
../src/common.c:371:5: note: Null pointer dereference
q->freer = freer;
^
../src/common.c:394:5: warning: If memory allocation fails, then there is a
possible null pointer dereference: i [nullPointerOutOfMemory]
i->type = type;
^
../src/common.c:393:29: note: Assuming allocation function fails
queue_item_t *i = malloc(sizeof(queue_item_t));
^
../src/common.c:393:29: note: Assignment 'i=malloc(sizeof(struct
queue_item_t))', assigned value is 0
queue_item_t *i = malloc(sizeof(queue_item_t));
^
../src/common.c:394:5: note: Null pointer dereference
i->type = type;
^
../src/common.c:395:5: warning: If memory allocation fails, then there is a
possible null pointer dereference: i [nullPointerOutOfMemory]
i->data = data;
^
../src/common.c:393:29: note: Assuming allocation function fails
queue_item_t *i = malloc(sizeof(queue_item_t));
^
../src/common.c:393:29: note: Assignment 'i=malloc(sizeof(struct
queue_item_t))', assigned value is 0
queue_item_t *i = malloc(sizeof(queue_item_t));
^
../src/common.c:395:5: note: Null pointer dereference
i->data = data;
^
../src/common.c:396:5: warning: If memory allocation fails, then there is a
possible null pointer dereference: i [nullPointerOutOfMemory]
i->next = NULL;
^
../src/common.c:393:29: note: Assuming allocation function fails
queue_item_t *i = malloc(sizeof(queue_item_t));
^
../src/common.c:393:29: note: Assignment 'i=malloc(sizeof(struct
queue_item_t))', assigned value is 0
queue_item_t *i = malloc(sizeof(queue_item_t));
^
../src/common.c:396:5: note: Null pointer dereference
i->next = NULL;
^
../src/common.c:484:9: warning: If memory allocation fails, then there is a
possible null pointer dereference: item [nullPointerOutOfMemory]
item->data = create();
^
../src/common.c:483:39: note: Assuming allocation function fails
pipeline_item_t *item = malloc(sizeof(pipeline_item_t));
^
../src/common.c:483:39: note: Assignment 'item=malloc(sizeof(struct
pipeline_item_t))', assigned value is 0
pipeline_item_t *item = malloc(sizeof(pipeline_item_t));
^
../src/common.c:484:9: note: Null pointer dereference
item->data = create();
^
Checking ../src/common.c: HAVE_CONFIG_H...
1/7 files checked 26% done
Checking ../src/cpu.c ...
2/7 files checked 26% done
Checking ../src/endian.c ...
Checking ../src/endian.c: HAVE_DECL_HTOLE64=0;__FreeBSD__;__linux__...
Checking ../src/endian.c: HAVE_DECL_LE64TOH=0;__FreeBSD__;__linux__...
Checking ../src/endian.c: __APPLE__...
Checking ../src/endian.c: __FreeBSD__;__linux__...
Checking ../src/endian.c: __FreeBSD__;__linux__;__linux__...
3/7 files checked 28% done
Checking ../src/list.c ...
Checking ../src/list.c: HAVE_CONFIG_H...
4/7 files checked 29% done
Checking ../src/pixz.c ...
../src/pixz.c:205:12: warning: If memory allocation fails, then there is a
possible null pointer dereference: r [nullPointerOutOfMemory]
memcpy(r, in, li - l1);
^
../src/pixz.c:204:21: note: Assuming allocation function fails
char *r = malloc(li + l2 - l1 + 1);
^
../src/pixz.c:204:21: note: Assignment 'r=malloc(li+l2-l1+1)', assigned value
is 0
char *r = malloc(li + l2 - l1 + 1);
^
../src/pixz.c:205:12: note: Null pointer dereference
memcpy(r, in, li - l1);
^
../src/pixz.c:206:14: error: If memory allocation fail: pointer addition with
NULL pointer. [nullPointerArithmeticOutOfMemory]
strcpy(r + li - l1, suf2);
^
../src/pixz.c:204:21: note: Assuming allocation function fails
char *r = malloc(li + l2 - l1 + 1);
^
../src/pixz.c:204:21: note: Assignment 'r=malloc(li+l2-l1+1)', assigned value
is 0
char *r = malloc(li + l2 - l1 + 1);
^
../src/pixz.c:206:14: note: Null pointer addition
strcpy(r + li - l1, suf2);
^
Checking ../src/pixz.c: HAVE_CONFIG_H...
5/7 files checked 40% done
Checking ../src/read.c ...
../src/read.c:201:2: warning: If memory allocation fails, then there is a
possible null pointer dereference: ib [nullPointerOutOfMemory]
ib->incap = ib->outcap = 0;
^
../src/read.c:200:28: note: Assuming allocation function fails
io_block_t *ib = malloc(sizeof(io_block_t));
^
../src/read.c:200:28: note: Assignment 'ib=malloc(sizeof(struct io_block_t))',
assigned value is 0
io_block_t *ib = malloc(sizeof(io_block_t));
^
../src/read.c:201:2: note: Null pointer dereference
ib->incap = ib->outcap = 0;
^
../src/read.c:202:2: warning: If memory allocation fails, then there is a
possible null pointer dereference: ib [nullPointerOutOfMemory]
ib->input = ib->output = NULL;
^
../src/read.c:200:28: note: Assuming allocation function fails
io_block_t *ib = malloc(sizeof(io_block_t));
^
../src/read.c:200:28: note: Assignment 'ib=malloc(sizeof(struct io_block_t))',
assigned value is 0
io_block_t *ib = malloc(sizeof(io_block_t));
^
../src/read.c:202:2: note: Null pointer dereference
ib->input = ib->output = NULL;
^
../src/read.c:270:14: warning: If memory allocation fails, then there is a
possible null pointer dereference: w [nullPointerOutOfMemory]
*w = (wanted_t){ .name = f->name, .start = f->offset,
^
../src/read.c:269:33: note: Assuming allocation function fails
wanted_t *w = malloc(sizeof(wanted_t));
^
../src/read.c:269:33: note: Assignment 'w=malloc(sizeof(struct wanted_t))',
assigned value is 0
wanted_t *w = malloc(sizeof(wanted_t));
^
../src/read.c:270:14: note: Null pointer dereference
*w = (wanted_t){ .name = f->name, .start = f->offset,
^
../src/read.c:272:13: warning: If memory allocation fails, then there is a
possible null pointer dereference: w [nullPointerOutOfMemory]
w->size = w->end - w->start;
^
../src/read.c:269:33: note: Assuming allocation function fails
wanted_t *w = malloc(sizeof(wanted_t));
^
../src/read.c:269:33: note: Assignment 'w=malloc(sizeof(struct wanted_t))',
assigned value is 0
wanted_t *w = malloc(sizeof(wanted_t));
^
../src/read.c:272:13: note: Null pointer dereference
w->size = w->end - w->start;
^
Checking ../src/read.c: DEBUG...
Checking ../src/read.c: HAVE_CONFIG_H...
6/7 files checked 73% done
Checking ../src/write.c ...
../src/write.c:234:5: warning: If memory allocation fails, then there is a
possible null pointer dereference: f [nullPointerOutOfMemory]
f->offset = gMultiHeader ? gMultiHeaderStart : offset;
^
../src/write.c:233:29: note: Assuming allocation function fails
file_index_t *f = malloc(sizeof(file_index_t));
^
../src/write.c:233:29: note: Assignment 'f=malloc(sizeof(struct
file_index_t))', assigned value is 0
file_index_t *f = malloc(sizeof(file_index_t));
^
../src/write.c:234:5: note: Null pointer dereference
f->offset = gMultiHeader ? gMultiHeaderStart : offset;
^
../src/write.c:236:5: warning: If memory allocation fails, then there is a
possible null pointer dereference: f [nullPointerOutOfMemory]
f->name = name ? xstrdup(name) : NULL;
^
../src/write.c:233:29: note: Assuming allocation function fails
file_index_t *f = malloc(sizeof(file_index_t));
^
../src/write.c:233:29: note: Assignment 'f=malloc(sizeof(struct
file_index_t))', assigned value is 0
file_index_t *f = malloc(sizeof(file_index_t));
^
../src/write.c:236:5: note: Null pointer dereference
f->name = name ? xstrdup(name) : NULL;
^
../src/write.c:237:5: warning: If memory allocation fails, then there is a
possible null pointer dereference: f [nullPointerOutOfMemory]
f->next = NULL;
^
../src/write.c:233:29: note: Assuming allocation function fails
file_index_t *f = malloc(sizeof(file_index_t));
^
../src/write.c:233:29: note: Assignment 'f=malloc(sizeof(struct
file_index_t))', assigned value is 0
file_index_t *f = malloc(sizeof(file_index_t));
^
../src/write.c:237:5: note: Null pointer dereference
f->next = NULL;
^
../src/write.c:256:5: warning: If memory allocation fails, then there is a
possible null pointer dereference: ib [nullPointerOutOfMemory]
ib->input = ib->output = NULL;
^
../src/write.c:255:28: note: Assuming allocation function fails
io_block_t *ib = malloc(sizeof(io_block_t));
^
../src/write.c:255:28: note: Assignment 'ib=malloc(sizeof(struct io_block_t))',
assigned value is 0
io_block_t *ib = malloc(sizeof(io_block_t));
^
../src/write.c:256:5: note: Null pointer dereference
ib->input = ib->output = NULL;
^
Checking ../src/write.c: HAVE_CONFIG_H...
7/7 files checked 100% done
FAIL cppcheck-src.sh (exit status: 1)
============================================================================
Testsuite summary for pixz 1.0.7
============================================================================
# TOTAL: 4
# PASS: 3
# SKIP: 0
# XFAIL: 0
# FAIL: 1
# XPASS: 0
# ERROR: 0
============================================================================
See test/test-suite.log for debugging.
Some test(s) failed. Please report this to https://github.com/vasi/pixz/issues,
together with the test-suite.log file (gzipped) and your system
information. Thanks.
============================================================================
make[4]: *** [Makefile:506: test-suite.log] Error 1
make[4]: Leaving directory '/<<PKGBUILDDIR>>/test'
make[3]: *** [Makefile:641: check-TESTS] Error 2
make[3]: Leaving directory '/<<PKGBUILDDIR>>/test'
make[2]: *** [Makefile:705: check-am] Error 2
make[2]: Leaving directory '/<<PKGBUILDDIR>>/test'
make[1]: *** [Makefile:383: check-recursive] Error 1
make[1]: Leaving directory '/<<PKGBUILDDIR>>'
dh_auto_test: error: make -j2 check "TESTSUITEFLAGS=-j2 --verbose" VERBOSE=1
returned exit code 2
make: *** [debian/rules:10: binary] Error 25
dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2
--------------------------------------------------------------------------------
The above is just how the build ends and not necessarily the most relevant part.
If required, the full build log is available here:
https://people.debian.org/~sanvila/build-logs/202503/
About the archive rebuild: The build was made on virtual machines from AWS,
using sbuild and a reduced chroot with only build-essential packages.
If you could not reproduce the bug please contact me privately, as I
am willing to provide ssh access to a virtual machine where the bug is
fully reproducible.
If this is really a bug in one of the build-depends, please use
reassign and add an affects on src:pixz, so that this is still
visible in the BTS web page for this package.
Thanks.
--- End Message ---
--- Begin Message ---
Source: pixz
Source-Version: 1.0.7-4
Done: Leon Marz <m...@lmarz.org>
We believe that the bug you reported is fixed in the latest version of
pixz, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1099...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Leon Marz <m...@lmarz.org> (supplier of updated pixz package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 10 Mar 2025 10:57:45 +0100
Source: pixz
Built-For-Profiles: noudeb
Architecture: source
Version: 1.0.7-4
Distribution: unstable
Urgency: medium
Maintainer: Leon Marz <m...@lmarz.org>
Changed-By: Leon Marz <m...@lmarz.org>
Closes: 1099263
Changes:
pixz (1.0.7-4) unstable; urgency=medium
.
* d/patches: Add oom-safety.patch (Closes: #1099263)
* d/copyright: Update copyright year to 2025
* Update Standards-Version to 4.7.2, no changes needed
Checksums-Sha1:
9e17808868b70b63a464e3539391f403b77ddc2a 1846 pixz_1.0.7-4.dsc
1dd0e39dc0443cfba988bb0f64c8f176ebe98823 6196 pixz_1.0.7-4.debian.tar.xz
f8f161d8d5437e5964cf57ca8ce19529cdb4a0e3 14879 pixz_1.0.7-4_source.buildinfo
Checksums-Sha256:
39b2fb108fbc19c0cf0dfd58eb4ff39c4d6077dbb6d508a02b6adb751863feb7 1846
pixz_1.0.7-4.dsc
95f125f8c9f0ecdc058115b39ba257f36c827131cb948d915bb01aab99644a13 6196
pixz_1.0.7-4.debian.tar.xz
ca0af892838ba029c65f25b2226ea8f59e6de470770c8611a05dfa5dca403a67 14879
pixz_1.0.7-4_source.buildinfo
Files:
0f6d6c0c90d6e3fa600eb8bb8dd865f3 1846 utils optional pixz_1.0.7-4.dsc
513a21180a2f3eefb4a552d295e411f4 6196 utils optional pixz_1.0.7-4.debian.tar.xz
04ee242f80ac340bf31a6aedad0a2c4b 14879 utils optional
pixz_1.0.7-4_source.buildinfo
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEd8lhnEnWos3N8v+qQoMEoXSNzHoFAmfRKnEACgkQQoMEoXSN
zHoNZw/9GQvE/eDTsNHeDy597m+pQc7B+Z+FrzMFRmrG3DdmL/fM6fS+F4YlI32J
pigAP85MFY1rMR50F7j5KWBD7EPZIhqEXdG9DJG5/VAo/6DSSWAHgg0eHq7pYcM9
8rp21lkvjCBmCWQqpco8qpi2ksb4hQwJXsiQvqSpdVVq9gbP6rZNVw7rzO8VCVzq
kI8+G9npMA6MYl4pdbjOO8wDJifOmDo7kgszorJbEwwzZnqoy1OBvk2klhi2avF9
osdlbtW5/koe05OEDAIa8/viLvW4e13zESxz7TxpSSJH5rfRi1/LCbncBxVBpSS4
ZQdfQZl/trYD9XNCOqyZOX0A1kbhpnhcPGV59dwHTUpRRU3foYRwUNc+dUPkCY9w
tAaHOa4V+IfQFhhBsiErwhDfYvok1SiFNfgQXYook7Cp+sNWBtbgzjyMPtd1MCUx
/M05GSk54ROgnMWQNg0vKldsG0F23idq0CsLd4IspK3jdtEx/aEgSxL12MnPZ27o
D7L6pHdRC2BcnRhmmvydN6tHwIEMnYX7kf863vZ8CCtmX3gZlnIqnctg05iGKJSI
HUvRg8uasuGIPe1uwLFHjeaiKveoCU4/5blGUt0zcS6nPpisH5YSQyi0VWtXGhaA
uLBWbukblc+inbiko2EyJ5fdQ589mg3gg5dsn37CIfSnjkcH60c=
=VoIV
-----END PGP SIGNATURE-----
pgpPibaGodKHn.pgp
Description: PGP signature
--- End Message ---