I am also getting 808190e72ae2059076c2afb8bb3f85cced5b2deb7ce80011d9b88b732d5c3d85 as the SHA-256 hash for cov-analysis-linux64-2019.03.tar.gz.
Search Criteria
Package Details: cov-analysis 2019.03-3
Git Clone URL: | https://aur.archlinux.org/cov-analysis.git (read-only, click to copy) |
---|---|
Package Base: | cov-analysis |
Description: | Coverity Scan Build Tool for C/C++ - REQUIRES MANUAL DOWNLOAD |
Upstream URL: | https://scan.coverity.com/download |
Licenses: | |
Submitter: | 1ace |
Maintainer: | 1ace |
Last Packager: | 1ace |
Votes: | 2 |
Popularity: | 0.000000 |
First Submitted: | 2016-05-01 23:39 |
Last Updated: | 2020-01-22 11:21 |
Dependencies (2)
- java-environment (jdk5, tuxjdk, jdk7-openjdk-infinality, java-8-openjdk-shenandoah, jdk8-openjdk-infinality, java-gcj-compat, jdk9, zulu-10-bin, jdk-devel, jdk8-arm64, jdk6, jdk12-openj9-bin, zulu-12-bin, jdk12, jdk8-openjdk-dcevm, jdk11-graalvm-ee-bin, jdk8-arm, jdk13-openj9-bin, jdk9-openj9-bin, jdk10, jdk11-openjdk-dcevm, jdk8-openjdk-jetbrains, jdk8-openjdk-shenandoah, jdk10-openj9-bin, jdk14-openj9-bin, sapmachine-jdk-bin, jdk7, jdk8-j9-bin, java-openjdk-bin, jdk, jdk-openj9-bin, jdk-arm, jdk-adoptopenjdk, jdk11-adoptopenjdk, liberica-jdk-full-bin, jdk8-jetbrains, zulu-embedded-jdk8, amazon-corretto-11, liberica-jdk-8-full-bin, liberica-jdk-11-bin, liberica-jdk-11-full-bin, liberica-jdk-11-lite-bin, liberica-jre-11-bin, liberica-jre-11-full-bin, liberica-jre-8-full-bin, amazon-corretto-8, jdk8, jdk11, jdk8-graalvm-bin, jdk11-graalvm-bin, zulu-embedded-jdk, jdk7r1-j9-bin, jdk7-j9-bin, zulu-15-bin, zulu-14-bin, zulu-13-bin, jdk8-adoptopenjdk, zulu-embedded-jdk11, jdk-bcl, jdk8-openj9-bin, jdk11-openj9-bin, zulu-11-bin, zulu-8-bin, amazon-corretto-15, jdk-openj9, jdk11-jetbrains-imfix, jdk-jetbrains, java-openjdk-loom-ea-bin, jre-jetbrains, java-openjdk-ea-bin, jdk-openjdk, jdk11-openjdk, jdk7-openjdk, jdk8-openjdk)
- libarchive (libarchive-git) (make)
Required by (1)
- coverity-submit (optional)
Sources (3)
alex.henrie commented on 2020-08-24 05:45
pcmoore commented on 2020-07-15 16:18
@1ace, sorry I missed your reply. Yes, I just verified this with a fresh clone/rebuild and I still need that tar/tar.gz patch; I also needed to update the checksum as I mentioned previously as well.
1ace commented on 2020-01-22 15:26
@pcmoore: for that .tar.gz patch, are you sure? on my machine makepkg extracts the gz and we're left with a .tar.
Please make sure you didn't have an old build directory around with random old files :)
pcmoore commented on 2020-01-22 15:22
A patch somewhat like the following is also needed:
diff --git a/PKGBUILD b/PKGBUILD
index 24fc6e0..1f6bf4f 100644
--- a/PKGBUILD
+++ b/PKGBUILD
@@ -19,7 +19,7 @@ sha256sums_i686=('a0e6c35db1effbbc33194f5aa8db63619911306314c>
sha256sums_x86_64=('808190e72ae2059076c2afb8bb3f85cced5b2deb7ce80011d9b88b732d>
package() {
- tar=$(echo *.tar)
+ tar=$(echo *.tar.gz)
msg2 "Extracting $tar with bsdtar"
install -dm755 "$pkgdir/opt/$pkgname"
cd "$pkgdir/opt/$pkgname"
1ace commented on 2020-01-22 15:22
@pcmoore: I just downloaded it a few hours ago, and noticing that the hash had updated without them bumping the version number I updated the hash (see 0cc1589ca525
)
If you're seeing yet another hash, that means it's become impossible to have a stable has to check against, which means I'll need to give up on that and allow anything (ie. 'SKIP'
as the hash to check against) :/
pcmoore commented on 2020-01-22 15:18
It looks like the x86_64 checksum needs to be updated:
808190e72ae2059076c2afb8bb3f85cced5b2deb7ce80011d9b88b732d5c3d85 cov-analysis-linux64-2019.03.tar.gz
pcmoore commented on 2019-11-14 20:40
FYI: I had similar problems to @Rucikir and found that the bsdtar/$PATH fixes suggested by @csslayer solved the problem.
@1ace, can we get an update to the package?
csslayer commented on 2019-11-04 08:03
For the latest version for the tar, bsdtar --strip-components=1 -xf "${srcdir}/${_tarball}" (1 instead of 2) should be used. And also the PATH need to be updated to /opt/cov-analysis/bin accordingly.
Rucikir commented on 2019-08-06 18:05
I have this error when I try cov-build
:
[ERROR] Failed to initialize ICU, try using the --prevent-root option.
How do I fix it?
pcmoore commented on 2019-06-30 19:19
FYI: it appears the checksums need to be updated. The currently available Linux x86_64 package does not match the checksum in the PKGBUILD:
md5sum cov-analysis-linux64-2019.03.tar.gz
d0d7d7df9d6609e578f85096a755fb8f ...
sha256sum cov-analysis-linux64-2019.03.tar.gz
808190e72ae2059076c2afb8bb3f85cced5b2deb7ce80011d9b88b732d5c3d85 ...
Pinned Comments
1ace commented on 2019-02-02 23:53
To those getting a segfault: coverity has built their tool using an ancient version of glibc which they statically linked. That glibc was using a deprecated kernel API, which has been disabled (for security reasons) since kernel 4.8. They need to recompile their tool with a more recent version of glibc so that it can be used on modern Linux. They are aware of the issue (they talk about it on the front page of https://scan.coverity.com, although they got confused between sysctl and linux cmdline), but they still haven't done it 2 years later.
In the mean time, the kernel feature can be re-enabled by adding
vsyscall=emulate
to your Linux command line, although it requires the kernel to be compiled with CONFIG_X86_VSYSCALL_EMULATION=y (which is still the case of the officiallinux
package as of today). You can check that by runningzgrep CONFIG_X86_VSYSCALL_EMULATION /proc/config.gz
.