diff options
Diffstat (limited to 'results/scraper/box64/2140')
| -rw-r--r-- | results/scraper/box64/2140 | 55 |
1 files changed, 55 insertions, 0 deletions
diff --git a/results/scraper/box64/2140 b/results/scraper/box64/2140 new file mode 100644 index 000000000..200b5e183 --- /dev/null +++ b/results/scraper/box64/2140 @@ -0,0 +1,55 @@ +[BOX32] Error duplicate member ‘__res_query’ when building +Error building with **-D ADLINK=1 -D ARM_DYNAREC=ON -D CMAKE_BUILD_TYPE=RelWithDebInfo -D BOX32=1**. +To make sure it isn't ADLINK and DYNAREC, I also ran **-D CMAKE_BUILD_TYPE=RelWithDebInfo -D BOX32=1** and got the same error + +``` +[ 95%] Building C object CMakeFiles/box64.dir/src/wrapped32/wrappedlibresolv.c.o +In file included from /home/ubuntu/box64/src/wrapped32/wrappedlibresolv.c:28: +/home/ubuntu/box64/src/wrapped32/generated/wrappedlibresolvtypes32.h:18:5: error: duplicate member ‘__res_query’ + 18 | GO(res_query, iEpiipi_t) + | ^~~~~~~~~ +/home/ubuntu/box64/src/wrapped32/wrappercallback32.h:7:29: note: in definition of macro ‘GO’ + 7 | #define GO(A, B) B A; + | ^ +/home/ubuntu/box64/src/wrapped32/wrappercallback32.h:8:5: note: in expansion of macro ‘SUPER’ + 8 | SUPER() + | ^~~~~ +make[2]: *** [CMakeFiles/box64.dir/build.make:4822: CMakeFiles/box64.dir/src/wrapped32/wrappedlibresolv.c.o] Error 1 +``` + +**Cpu info (if relevant):** +Architecture: aarch64 +CPU op-mode(s): 32-bit, 64-bit +Byte Order: Little Endian +CPU(s): 4 +On-line CPU(s) list: 0-3 +Thread(s) per core: 1 +Core(s) per socket: 4 +Socket(s): 1 +NUMA node(s): 1 +Vendor ID: ARM +Model: 1 +Model name: Neoverse-N1 +Stepping: r3p1 +BogoMIPS: 50.00 +NUMA node0 CPU(s): 0-3 +Vulnerability Gather data sampling: Not affected +Vulnerability Itlb multihit: Not affected +Vulnerability L1tf: Not affected +Vulnerability Mds: Not affected +Vulnerability Meltdown: Not affected +Vulnerability Mmio stale data: Not affected +Vulnerability Reg file data sampling: Not affected +Vulnerability Retbleed: Not affected +Vulnerability Spec rstack overflow: Not affected +Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl +Vulnerability Spectre v1: Mitigation; __user pointer sanitization +Vulnerability Spectre v2: Mitigation; CSV2, BHB +Vulnerability Srbds: Not affected +Vulnerability Tsx async abort: Not affected +Flags: fp asimd evtstrm aes pmull sha1 sha2 crc32 atomics fphp asimdhp cpuid asimdrdm lrcpc dcpop asimddp + +**OS details:** +Description: Ubuntu 20.04.6 LTS +Release: 20.04 +Codename: focal \ No newline at end of file |