Hi Julian, On 2024-01-08 10:28, Julian Andres Klode wrote: > (in Ubuntu we have partially recovered by disabling stack clash > protection but it crashes on invalid writes there, I suppose we need > to rebuild some more apt dependencies without the flag...).
The 'invalid writes' issue seems unrelated to armhf and stack-clash-protection, I can reproduce it on my x86 workstation. It would be interesting to see if once these problems are fixed valgrind on armhf still segfaults. (sid-amd64)root@ariel:~# valgrind apt-get update ==194196== Memcheck, a memory error detector ==194196== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al. ==194196== Using Valgrind-3.20.0 and LibVEX; rerun with -h for copyright info ==194196== Command: apt-get update ==194196== Hit:1 http://127.0.0.1:3142/debian sid InRelease ==194196== Conditional jump or move depends on uninitialised value(s) ==194196== at 0x4A89B3B: pkgCache::ReMap(bool const&) (in /usr/lib/x86_64-linux-gnu/libapt-pkg.so.6.0.0) [... more errors follow]