Created
March 9, 2018 04:33
-
-
Save mweastwood/b2a6486ef2df911b61db3225677bd78a to your computer and use it in GitHub Desktop.
BinaryBuilder logs
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ julia | |
_ | |
_ _ _(_)_ | A fresh approach to technical computing | |
(_) | (_) (_) | Documentation: https://docs.julialang.org | |
_ _ _| |_ __ _ | Type "?help" for help. | |
| | | | | | |/ _` | | | |
| | |_| | | | (_| | | Version 0.6.2 (2017-12-13 18:08 UTC) | |
_/ |\__'_|_|_|\__'_| | | |
|__/ | x86_64-linux-gnu | |
julia> using BinaryBuilder | |
julia> BinaryBuilder.run_wizard() | |
o `. | |
o*o \'-_ 00000000: 01111111 . | |
\\ \;"". ,;.--* 00000001: 01000101 E | |
\\ ,\''--.--'/ 00000003: 01001100 L | |
:=\--<' `"" _ | 00000003: 01000110 F | |
||\\ `" / ''-- 00000004: 00000010 . | |
`/_\\,-| | 00000005: 00000001 . | |
\\/ L | |
\\ ,' \ | |
_/ L' ` \ | |
/ / / / Julia Binzard | |
/ / | \ JuliaPackaging/BinaryBuilder.jl | |
"_''--_-''---__=; | |
Welcome to the BinaryBuilder wizard. | |
We'll get you set up in no time. | |
# Step 1: Select your platforms | |
Make a platform selection | |
> All supported architectures | |
Specific operating system | |
Specific architecture | |
Custom | |
# Step 2a: Obtain the source code | |
Please enter a URL (git repository or gzipped tarball) containing the source code to build: | |
> https://downloads.sourceforge.net/project/healpix/Healpix_3.31/Healpix_3.31_2016Aug26.tar.gz | |
[20:06:59] ######################################################################## 100.0% | |
Would you like to download additional sources? [y/N]: y | |
Please enter a URL (git repository or gzipped tarball) containing the source code to build: | |
> http://heasarc.gsfc.nasa.gov/FTP/software/fitsio/c/cfitsio3430.tar.gz | |
[20:07:34] ######################################################################## 100.0% | |
Would you like to download additional sources? [y/N]: | |
# Step 2b: Obtain binary dependencies (if any) | |
Do you require any (binary) dependencies? [y/N]: | |
# Step 3: Build for BinaryProvider.Linux(:x86_64, :glibc) | |
You will now be dropped into the cross-compilation environment. | |
Please compile the library. Your initial compilation target is BinaryProvider.Linux(:x86_64, :glibc). | |
The $prefix environment variable contains the target directory. | |
Once you are done, exit by typing `exit` or `^D` | |
Warning: Unable to run unprivileged containers on this system! This may be because your kernel does not support mounting overlay filesystems within user namespaces. To work around this, we will switch to using privileged containers. This requires the use of sudo. To choose this automatically, set the BINARYBUILDER_RUNNER environment variable to "privileged" before starting Julia. | |
Info: Downloading https://julialangmirror.s3.amazonaws.com/binarybuilder-rootfs-x86_64-linux-gnu-2018-03-08.tar.gz to /home/michael/.julia/v0.6/BinaryBuilder/deps/downloads/rootfs-x86_64-linux-gnu.tar.gz... | |
[20:07:53] ######################################################################## 100.0% | |
Info: Downloading https://julialangmirror.s3.amazonaws.com/binarybuilder-rootfs-x86_64-linux-gnu-2018-03-08.tar.gz to /home/michael/.julia/v0.6/BinaryBuilder/deps/downloads/rootfs-x86_64-linux-gnu.tar.gz... | |
[20:09:31] ######################################################################## 100.0% | |
Info: Running privileged container via `sudo`, may ask for your password: | |
[sudo] password for michael: | |
^C | |
Wizard stopped, use run_wizard(ans) to resume. | |
WizardState [step3] | |
julia> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ strace -f root/sandbox --rootfs root -- /bin/bash -c 'echo hello julia' | |
execve("root/sandbox", ["root/sandbox", "--rootfs", "root", "--", "/bin/bash", "-c", "echo hello | |
julia"], [/* 68 vars */]) = 0 | |
brk(NULL) = 0xb29000 | |
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory) | |
access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory) | |
open("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0644, st_size=179288, ...}) = 0 | |
mmap(NULL, 179288, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7fea85abf000 | |
close(3) = 0 | |
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory) | |
open("/lib/x86_64-linux-gnu/libc.so.6", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0P\t\2\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0755, st_size=1868984, ...}) = 0 | |
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fea85abe000 | |
mmap(NULL, 3971488, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7fea854fc000 | |
mprotect(0x7fea856bc000, 2097152, PROT_NONE) = 0 | |
mmap(0x7fea858bc000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1c0000) | |
= 0x7fea858bc000 | |
mmap(0x7fea858c2000, 14752, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = | |
0x7fea858c2000 | |
close(3) = 0 | |
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fea85abd000 | |
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7fea85abc000 | |
arch_prctl(ARCH_SET_FS, 0x7fea85abd700) = 0 | |
mprotect(0x7fea858bc000, 16384, PROT_READ) = 0 | |
mprotect(0x604000, 4096, PROT_READ) = 0 | |
mprotect(0x7fea85aeb000, 4096, PROT_READ) = 0 | |
munmap(0x7fea85abf000, 179288) = 0 | |
getpgid(0) = 3271 | |
getpid() = 3273 | |
geteuid() = 1000 | |
getuid() = 1000 | |
getgid() = 1000 | |
brk(NULL) = 0xb29000 | |
brk(0xb4a000) = 0xb4a000 | |
pipe([3, 4]) = 0 | |
pipe([5, 6]) = 0 | |
clone(strace: Process 3274 attached | |
child_stack=0, flags=CLONE_NEWNS|CLONE_NEWUSER|CLONE_NEWPID|SIGCHLD) = 3274 | |
[pid 3273] close(3) = 0 | |
[pid 3273] close(6) = 0 | |
[pid 3274] close(4 <unfinished ...> | |
[pid 3273] read(5, <unfinished ...> | |
[pid 3274] <... close resumed> ) = 0 | |
[pid 3274] close(5) = 0 | |
[pid 3274] prctl(PR_SET_DUMPABLE, 1) = 0 | |
[pid 3274] rt_sigaction(SIGINT, {0x402bbb, [INT], SA_RESTORER|SA_RESTART, 0x7fea855314b0}, | |
{SIG_DFL, [], 0}, 8) = 0 | |
[pid 3274] close(6 <unfinished ...> | |
[pid 3273] <... read resumed> NULL, 1) = 0 | |
[pid 3274] <... close resumed> ) = 0 | |
[pid 3273] open("/proc/3274/uid_map", O_WRONLY <unfinished ...> | |
[pid 3274] read(3, <unfinished ...> | |
[pid 3273] <... open resumed> ) = 3 | |
[pid 3273] write(3, "0\t1000\t1", 8) = 8 | |
[pid 3273] close(3) = 0 | |
[pid 3273] open("/proc/3274/setgroups", O_WRONLY) = 3 | |
[pid 3273] write(3, "deny\0", 5) = 5 | |
[pid 3273] close(3) = 0 | |
[pid 3273] open("/proc/3274/gid_map", O_WRONLY) = 3 | |
[pid 3273] write(3, "0\t1000\t1", 8) = 8 | |
[pid 3273] close(4) = 0 | |
[pid 3274] <... read resumed> NULL, 1) = 0 | |
[pid 3273] wait4(3274, <unfinished ...> | |
[pid 3274] mount("tmpfs", "/proc", "tmpfs", 0, "size=1G") = 0 | |
[pid 3274] mkdir("/proc/upper", 0777) = 0 | |
[pid 3274] mkdir("/proc/work", 0777) = 0 | |
[pid 3274] mkdir("/proc/upper/rootfs", 0777) = 0 | |
[pid 3274] mkdir("/proc/work/rootfs", 0777) = 0 | |
[pid 3274] mount("overlay", "root", "overlay", 0, "lowerdir=root,upperdir=/proc/upp"...) = 0 | |
[pid 3274] chown("root", 0, 0) = 0 | |
[pid 3274] mount("proc", "root/proc", "proc", 0, "") = 0 | |
[pid 3274] mount("/dev/null", "root/dev/null", 0x4037b6, MS_BIND, NULL) = 0 | |
[pid 3274] mount("proc", "/proc", "proc", 0, "") = 0 | |
[pid 3274] chdir("root") = 0 | |
[pid 3274] chroot(".") = 0 | |
[pid 3274] clone(child_stack=0, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, | |
child_tidptr=0x7fea85abd9d0) = 2 | |
strace: Process 3277 attached | |
[pid 3274] rt_sigprocmask(SIG_BLOCK, [CHLD], NULL, 8) = 0 | |
[pid 3274] rt_sigtimedwait([CHLD], NULL, NULL, 8 <unfinished ...> | |
[pid 3277] execve("/bin/bash", ["/bin/bash", "-c", "echo hello julia"], [/* 68 vars */] <unfinished | |
...> | |
[pid 3277] +++ killed by SIGKILL +++ | |
[pid 3274] <... rt_sigtimedwait resumed> ) = 17 | |
[pid 3274] wait4(-1, [{WIFSIGNALED(s) && WTERMSIG(s) == SIGKILL}], WNOHANG, NULL) = 2 | |
[pid 3274] exit_group(1) = ? | |
[pid 3274] +++ exited with 1 +++ | |
<... wait4 resumed> [{WIFEXITED(s) && WEXITSTATUS(s) == 1}], 0, NULL) = 3274 | |
--- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=3274, si_uid=1000, si_status=1, | |
si_utime=0, si_stime=0} --- | |
rt_sigaction(SIGTTOU, {SIG_IGN, [TTOU], SA_RESTORER|SA_RESTART, 0x7fea855314b0}, {SIG_DFL, [], 0}, | |
8) = 0 | |
ioctl(0, TIOCSPGRP, [3271]) = 0 | |
exit_group(1) = ? | |
+++ exited with 1 +++ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ strace -f root/sandbox --rootfs root -- /bin/bash -c 'echo hello julia' | |
execve("root/sandbox", ["root/sandbox", "--rootfs", "root", "--", "/bin/bash", "-c", "echo hello | |
julia"], [/* 68 vars */]) = 0 | |
brk(NULL) = 0x1c69000 | |
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory) | |
access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory) | |
open("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3 | |
fstat(3, {st_mode=S_IFREG|0644, st_size=179288, ...}) = 0 | |
mmap(NULL, 179288, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7effd24d9000 | |
close(3) = 0 | |
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory) | |
open("/lib/x86_64-linux-gnu/libc.so.6", O_RDONLY|O_CLOEXEC) = 3 | |
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0P\t\2\0\0\0\0\0"..., 832) = 832 | |
fstat(3, {st_mode=S_IFREG|0755, st_size=1868984, ...}) = 0 | |
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7effd24d8000 | |
mmap(NULL, 3971488, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7effd1f16000 | |
mprotect(0x7effd20d6000, 2097152, PROT_NONE) = 0 | |
mmap(0x7effd22d6000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1c0000) | |
= 0x7effd22d6000 | |
mmap(0x7effd22dc000, 14752, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = | |
0x7effd22dc000 | |
close(3) = 0 | |
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7effd24d7000 | |
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7effd24d6000 | |
arch_prctl(ARCH_SET_FS, 0x7effd24d7700) = 0 | |
mprotect(0x7effd22d6000, 16384, PROT_READ) = 0 | |
mprotect(0x604000, 4096, PROT_READ) = 0 | |
mprotect(0x7effd2505000, 4096, PROT_READ) = 0 | |
munmap(0x7effd24d9000, 179288) = 0 | |
getpgid(0) = 3285 | |
getpid() = 3287 | |
geteuid() = 1000 | |
getuid() = 1000 | |
getgid() = 1000 | |
brk(NULL) = 0x1c69000 | |
brk(0x1c8a000) = 0x1c8a000 | |
pipe([3, 4]) = 0 | |
pipe([5, 6]) = 0 | |
clone(strace: Process 3288 attached | |
child_stack=0, flags=CLONE_NEWNS|CLONE_NEWUSER|CLONE_NEWPID|SIGCHLD) = 3288 | |
[pid 3287] close(3) = 0 | |
[pid 3287] close(6) = 0 | |
[pid 3287] read(5, <unfinished ...> | |
[pid 3288] close(4) = 0 | |
[pid 3288] close(5) = 0 | |
[pid 3288] prctl(PR_SET_DUMPABLE, 1) = 0 | |
[pid 3288] rt_sigaction(SIGINT, {0x402bbb, [INT], SA_RESTORER|SA_RESTART, 0x7effd1f4b4b0}, | |
{SIG_DFL, [], 0}, 8) = 0 | |
[pid 3288] close(6 <unfinished ...> | |
[pid 3287] <... read resumed> NULL, 1) = 0 | |
[pid 3288] <... close resumed> ) = 0 | |
[pid 3287] open("/proc/3288/uid_map", O_WRONLY <unfinished ...> | |
[pid 3288] read(3, <unfinished ...> | |
[pid 3287] <... open resumed> ) = 3 | |
[pid 3287] write(3, "0\t1000\t1", 8) = 8 | |
[pid 3287] close(3) = 0 | |
[pid 3287] open("/proc/3288/setgroups", O_WRONLY) = 3 | |
[pid 3287] write(3, "deny\0", 5) = 5 | |
[pid 3287] close(3) = 0 | |
[pid 3287] open("/proc/3288/gid_map", O_WRONLY) = 3 | |
[pid 3287] write(3, "0\t1000\t1", 8) = 8 | |
[pid 3287] close(4) = 0 | |
[pid 3288] <... read resumed> NULL, 1) = 0 | |
[pid 3287] wait4(3288, <unfinished ...> | |
[pid 3288] mount("tmpfs", "/proc", "tmpfs", 0, "size=1G") = 0 | |
[pid 3288] mkdir("/proc/upper", 0777) = 0 | |
[pid 3288] mkdir("/proc/work", 0777) = 0 | |
[pid 3288] mkdir("/proc/upper/rootfs", 0777) = 0 | |
[pid 3288] mkdir("/proc/work/rootfs", 0777) = 0 | |
[pid 3288] mount("overlay", "root", "overlay", 0, "lowerdir=root,upperdir=/proc/upp"...) = 0 | |
[pid 3288] chown("root", 0, 0) = 0 | |
[pid 3288] mount("proc", "root/proc", "proc", 0, "") = 0 | |
[pid 3288] mount("/dev/null", "root/dev/null", 0x4037b6, MS_BIND, NULL) = 0 | |
[pid 3288] mount("proc", "/proc", "proc", 0, "") = 0 | |
[pid 3288] chdir("root") = 0 | |
[pid 3288] chroot(".") = 0 | |
[pid 3288] clone(strace: Process 3289 attached | |
child_stack=0, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x7effd24d79d0) = 2 | |
[pid 3288] rt_sigprocmask(SIG_BLOCK, [CHLD], NULL, 8) = 0 | |
[pid 3288] rt_sigtimedwait([CHLD], NULL, NULL, 8 <unfinished ...> | |
[pid 3289] execve("/bin/bash", ["/bin/bash", "-c", "echo hello julia"], [/* 68 vars */] |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment