Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 749523 Details for
Bug 807832
dev-java/openjdk-jre-bin-8.292_p10 : java -version hangs sometimes within an bubblewrapped image
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
gdb log
gdb.log (text/x-log), 6.40 KB, created by
Toralf Förster
on 2021-11-08 14:21:18 UTC
(
hide
)
Description:
gdb log
Filename:
MIME Type:
Creator:
Toralf Förster
Created:
2021-11-08 14:21:18 UTC
Size:
6.40 KB
patch
obsolete
>GNU gdb (Gentoo 11.1 vanilla) 11.1 >Copyright (C) 2021 Free Software Foundation, Inc. >License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> >This is free software: you are free to change and redistribute it. >There is NO WARRANTY, to the extent permitted by law. >Type "show copying" and "show warranty" for details. >This GDB was configured as "x86_64-pc-linux-gnu". >Type "show configuration" for configuration details. >For bug reporting instructions, please see: ><https://bugs.gentoo.org/>. >Find the GDB manual and other documentation resources online at: > <http://www.gnu.org/software/gdb/documentation/>. > >For help, type "help". >Type "apropos word" to search for commands related to "word"... >/home/tinderbox/img/17-1-no-multilib-j4-debug-20211106-110004/usr/bin/sandbox: No such file or directory. >Attaching to process 12763 >Reading symbols from target:/usr/bin/sandbox... >Reading symbols from target:/usr/lib/debug//usr/bin/sandbox.debug... >Reading symbols from target:/lib64/libc.so.6... >Reading symbols from target:/usr/lib/debug//lib64/libc.so.6.debug... >Reading symbols from target:/lib64/ld-linux-x86-64.so.2... >Reading symbols from target:/usr/lib/debug//lib64/ld-linux-x86-64.so.2.debug... > >warning: Target and debugger are in different PID namespaces; thread lists and other data are likely unreliable. Connect to gdbserver inside the container. > >warning: Expected absolute pathname for libpthread in the inferior, but got target:/usr/lib/debug//lib64/libc.so.6.debug. > >warning: Expected absolute pathname for libpthread in the inferior, but got target:/lib64/libc.so.6. > >warning: Unable to find libthread_db matching inferior's thread library, thread debugging will not be available. >0x00007f58fbad8dbe in __GI___wait4 (pid=5, stat_loc=stat_loc@entry=0x7ffe1e4f4154, options=options@entry=0, usage=usage@entry=0x0) at ../sysdeps/unix/sysv/linux/wait4.c:30 >30 ../sysdeps/unix/sysv/linux/wait4.c: No such file or directory. >(gdb) thread apply all bt > >Thread 1 (process 12763 "sandbox"): >#0 0x00007f58fbad8dbe in __GI___wait4 (pid=5, stat_loc=stat_loc@entry=0x7ffe1e4f4154, options=options@entry=0, usage=usage@entry=0x0) at ../sysdeps/unix/sysv/linux/wait4.c:30 >#1 0x00007f58fbad8d77 in __GI___waitpid (pid=<optimized out>, stat_loc=stat_loc@entry=0x7ffe1e4f4154, options=options@entry=0) at waitpid.c:38 >#2 0x0000561e6f7b3b2d in spawn_shell (argv_bash=<optimized out>, argv_bash@entry=0x561e703e8ee0, env=<optimized out>, env@entry=0x561e703e8ae0, debug=0) at /var/tmp/portage/sys-apps/sandbox-2.29/work/sandbox-2.29/src/sandbox.c:194 >#3 0x0000561e6f7b4366 in main (argc=2, argv=0x7ffe1e5026e8) at /var/tmp/portage/sys-apps/sandbox-2.29/work/sandbox-2.29/src/sandbox.c:354 >(gdb) bt full >#0 0x00007f58fbad8dbe in __GI___wait4 (pid=5, stat_loc=stat_loc@entry=0x7ffe1e4f4154, options=options@entry=0, usage=usage@entry=0x0) at ../sysdeps/unix/sysv/linux/wait4.c:30 > sc_ret = -512 > sc_ret = <optimized out> >#1 0x00007f58fbad8d77 in __GI___waitpid (pid=<optimized out>, stat_loc=stat_loc@entry=0x7ffe1e4f4154, options=options@entry=0) at waitpid.c:38 >No locals. >#2 0x0000561e6f7b3b2d in spawn_shell (argv_bash=<optimized out>, argv_bash@entry=0x561e703e8ee0, env=<optimized out>, env@entry=0x561e703e8ae0, debug=0) > at /var/tmp/portage/sys-apps/sandbox-2.29/work/sandbox-2.29/src/sandbox.c:194 > status = 0 > ret = 0 > __func__ = "spawn_shell" >#3 0x0000561e6f7b4366 in main (argc=2, argv=0x7ffe1e5026e8) at /var/tmp/portage/sys-apps/sandbox-2.29/work/sandbox-2.29/src/sandbox.c:354 > sandbox_log_presence = 0 > sandbox_info = {sandbox_log = "/var/tmp/portage/dev-java/ant-core-1.10.9/temp/sandbox.log", '\000' <repeats 8133 times>, > sandbox_debug_log = "/var/log/sandbox/sandbox-debug-4.log", '\000' <repeats 8155 times>, sandbox_message_path = "/proc/4/fd/2", '\000' <repeats 8179 times>, > sandbox_lib = "libsandbox.so", '\000' <repeats 8178 times>, sandbox_rc = "/usr/share/sandbox/sandbox.bashrc", '\000' <repeats 8158 times>, > work_dir = '\000' <repeats 8191 times>, tmp_dir = "/tmp", '\000' <repeats 2980 times>..., home_dir = 0x7ffe1e504d6a "/var/tmp/portage/dev-java/ant-core-1.10.9/homedir"} > sandbox_environ = 0x561e703e8ae0 > argv_bash = 0x561e703e8ee0 > run_str = 0x561e6f7b9948 "-c" > __func__ = "main" > sigs = {1, 2, 3, 15, 10} > act_new = {__sigaction_handler = {sa_handler = 0x561e6f7b34b1 <usr1_handler>, sa_sigaction = 0x561e6f7b34b1 <usr1_handler>}, sa_mask = {__val = {0 <repeats 16 times>}}, > sa_flags = 268435460, sa_restorer = 0x0} > act_old = {{__sigaction_handler = {sa_handler = 0x0, sa_sigaction = 0x0}, sa_mask = {__val = {0, 94688719379088, 140020156046722, 3751, 4096, 140729406992959, 140729406992959, 8, > 140729406931344, 140729406931280, 14046328021661462528, 94688719379549, 1, 0, 0, 94688732155616}}, sa_flags = 0, sa_restorer = 0x0}, {__sigaction_handler = { > sa_handler = 0x0, sa_sigaction = 0x0}, sa_mask = {__val = {0, 94688719379088, 140020156046722, 3751, 4096, 140729406992959, 140729406992959, 8, 140729406931344, > 140729406931280, 14046328021661462528, 94688719379549, 1, 0, 0, 94688732155616}}, sa_flags = 0, sa_restorer = 0x0}, {__sigaction_handler = {sa_handler = 0x0, > sa_sigaction = 0x0}, sa_mask = {__val = {0, 94688719379088, 140020156046722, 3751, 4096, 140729406992959, 140729406992959, 8, 140729406931344, 140729406931280, > 14046328021661462528, 94688719379549, 1, 0, 0, 94688732155616}}, sa_flags = 0, sa_restorer = 0x0}, {__sigaction_handler = {sa_handler = 0x0, sa_sigaction = 0x0}, > sa_mask = {__val = {0, 94688719379088, 140020156046722, 3751, 4096, 140729406992959, 140729406992959, 8, 140729406931344, 140729406931280, 14046328021661462528, > 94688719379549, 1, 0, 0, 94688732155616}}, sa_flags = 0, sa_restorer = 0x0}, {__sigaction_handler = {sa_handler = 0x0, sa_sigaction = 0x0}, sa_mask = {__val = {0, > 94688719379088, 140020156046722, 3751, 4096, 140729406992959, 140729406992959, 8, 140729406931344, 140729406931280, 14046328021661462528, 94688719379549, 1, 0, 0, > 94688732155616}}, sa_flags = 0, sa_restorer = 0x0}} > si = 5 > shell_exit = <optimized out> >(gdb) quit >A debugging session is active. > > Inferior 1 [process 12763] will be detached. > >Quit anyway? (y or n) y >Detaching from program: target:/usr/bin/sandbox, process 12763 >[Inferior 1 (process 12763) detached]
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 807832
:
733613
| 749523 |
749592
|
749595
|
749598
|
750216