A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from http://mail.python.org/pipermail/python-dev/attachments/20150128/afe9400d/attachment-0001.obj below:

22795 execve("./python", ["./python", "--help"], [/* 56 vars */]) = 0 22795 mprotect(0x400db000, 4096, PROT_READ) = 0 22795 getrlimit(RLIMIT_STACK, {rlim_cur=8192*1024, rlim_max=RLIM_INFINITY}) = 0 22795 gettid() = 22795 22795 syscall_983045(0x400dcf24, 0xffffffb8, 0, 0x400dcf24, 0x400dd154, 0, 0xbefc1240, 0xf0005, 0x400dd15c, 0xbe7c2000, 0, 0, 0, 0xbefc11e0, 0x400d4254, 0x400d4aa4, 0x60000010, 0x400dcf24, 0, 0, 0xc764, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0) = 0 22795 mmap2(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, 0, 0) = 0x400df000 22795 madvise(0x400df000, 8192, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 sigaltstack({ss_sp=0x400df000, ss_flags=0, ss_size=8192}, NULL) = 0 22795 sigaction(SIGABRT, {0x400cca71, [], SA_STACK|SA_RESTART|SA_SIGINFO}, NULL, 0xcda018) = 0 22795 sigaction(SIGBUS, {0x400cca71, [], SA_STACK|SA_RESTART|SA_SIGINFO}, NULL, 0xcda018) = 0 22795 sigaction(SIGFPE, {0x400cca71, [], SA_STACK|SA_RESTART|SA_SIGINFO}, NULL, 0xcda018) = 0 22795 sigaction(SIGILL, {0x400cca71, [], SA_STACK|SA_RESTART|SA_SIGINFO}, NULL, 0xcda018) = 0 22795 sigaction(SIGPIPE, {0x400cca71, [], SA_STACK|SA_RESTART|SA_SIGINFO}, NULL, 0xcda018) = 0 22795 sigaction(SIGSEGV, {0x400cca71, [], SA_STACK|SA_RESTART|SA_SIGINFO}, NULL, 0xcda018) = 0 22795 sigaction(SIGSTKFLT, {0x400cca71, [], SA_STACK|SA_RESTART|SA_SIGINFO}, NULL, 0xcda018) = 0 22795 sigaction(SIGTRAP, {0x400cca71, [], SA_STACK|SA_RESTART|SA_SIGINFO}, NULL, 0xcda018) = 0 22795 mmap2(NULL, 4092, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, 0, 0) = 0x400e1000 22795 madvise(0x400e1000, 4092, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 open("/data/data/jackpal.androidterm/kbox2/lib/libfakechroot.so", O_RDONLY|O_LARGEFILE|0x80000) = 3 22795 read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0(\0\1\0\0\0\0\0\0\0004\0\0\0P\235\0\0\0\0\0\0054\0 \0\6\0(\0\25\0\24\0", 52) = 52 22795 mmap2(NULL, 4096, PROT_READ, MAP_PRIVATE, 3, 0) = 0x400e2000 22795 madvise(0x400e2000, 4096, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 mmap2(NULL, 45056, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x400e3000 22795 madvise(0x400e3000, 45056, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 mmap2(0x400e3000, 35099, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED, 3, 0) = 0x400e3000 22795 madvise(0x400e3000, 35099, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 mmap2(0x400ec000, 4784, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 0x8) = 0x400ec000 22795 madvise(0x400ec000, 4784, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 close(3) = 0 22795 munmap(0x400e2000, 4096) = 0 22795 open("/data/data/jackpal.androidterm/kbox2/lib/libc.so", O_RDONLY|O_LARGEFILE|0x80000) = -1 ENOENT (No such file or directory) 22795 open("/vendor/lib/libc.so", O_RDONLY|O_LARGEFILE|0x80000) = -1 ENOENT (No such file or directory) 22795 open("/system/lib/libc.so", O_RDONLY|O_LARGEFILE|0x80000) = 3 22795 read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0(\0\1\0\0\0\0\0\0\0004\0\0\0`\310\4\0\0\0\0\0054\0 \0\t\0(\0\37\0\36\0", 52) = 52 22795 mmap2(NULL, 4096, PROT_READ, MAP_PRIVATE, 3, 0) = 0x400e2000 22795 madvise(0x400e2000, 4096, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 mmap2(NULL, 376832, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x400ee000 22795 madvise(0x400ee000, 376832, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 mmap2(0x400ee000, 294036, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED, 3, 0) = 0x400ee000 22795 madvise(0x400ee000, 294036, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 mmap2(0x40137000, 17128, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 0x48) = 0x40137000 22795 madvise(0x40137000, 17128, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 mmap2(0x4013c000, 57344, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x4013c000 22795 madvise(0x4013c000, 57344, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 close(3) = 0 22795 munmap(0x400e2000, 4096) = 0 22795 mprotect(0x40137000, 8192, PROT_READ) = 0 22795 mprotect(0x400ec000, 4096, PROT_READ) = 0 22795 open("/data/data/jackpal.androidterm/kbox2/lib/libpython3.4m.so.1.0", O_RDONLY|O_LARGEFILE|0x80000) = 3 22795 read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0(\0\1\0\0\0\3347\2\0004\0\0\0\0\vx\0\2\2\0\0054\0 \0\5\0(\0\36\0\33\0", 52) = 52 22795 mmap2(NULL, 4096, PROT_READ, MAP_PRIVATE, 3, 0) = 0x400e2000 22795 madvise(0x400e2000, 4096, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 mmap2(NULL, 2400256, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x4014a000 22795 madvise(0x4014a000, 2400256, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 mmap2(0x4014a000, 2041732, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED, 3, 0) = 0x4014a000 22795 madvise(0x4014a000, 2041732, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 mmap2(0x40342000, 246196, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 0x1f8) = 0x40342000 22795 madvise(0x40342000, 246196, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 mmap2(0x4037f000, 86016, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x4037f000 22795 madvise(0x4037f000, 86016, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 close(3) = 0 22795 munmap(0x400e2000, 4096) = 0 22795 open("/data/data/jackpal.androidterm/kbox2/lib/libm.so", O_RDONLY|O_LARGEFILE|0x80000) = -1 ENOENT (No such file or directory) 22795 open("/vendor/lib/libm.so", O_RDONLY|O_LARGEFILE|0x80000) = -1 ENOENT (No such file or directory) 22795 open("/system/lib/libm.so", O_RDONLY|O_LARGEFILE|0x80000) = 3 22795 read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0(\0\1\0\0\0\0\0\0\0004\0\0\0\204\221\1\0\0\0\0\0054\0 \0\10\0(\0\25\0\24\0", 52) = 52 22795 mmap2(NULL, 4096, PROT_READ, MAP_PRIVATE, 3, 0) = 0x400e2000 22795 madvise(0x400e2000, 4096, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 mmap2(NULL, 110592, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x40394000 22795 madvise(0x40394000, 110592, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 mmap2(0x40394000, 98228, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_FIXED, 3, 0) = 0x40394000 22795 madvise(0x40394000, 98228, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 mmap2(0x403ad000, 4204, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED, 3, 0x18) = 0x403ad000 22795 madvise(0x403ad000, 4204, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 close(3) = 0 22795 munmap(0x400e2000, 4096) = 0 22795 mprotect(0x403ad000, 4096, PROT_READ) = 0 22795 open("/dev/__properties__", O_RDONLY|O_LARGEFILE|O_NOFOLLOW|0x80000) = 3 22795 fcntl64(3, F_SETFD, FD_CLOEXEC) = 0 22795 fstat64(3, {st_mode=S_IFREG|0444, st_size=131072, ...}) = 0 22795 mmap2(NULL, 131072, PROT_READ, MAP_SHARED, 3, 0) = 0x403af000 22795 close(3) = 0 22795 futex(0x4013b548, 0x81 /* FUTEX_??? */, 2147483647) = 0 22795 mprotect(0x400e1000, 4092, PROT_READ|PROT_WRITE) = 0 22795 mprotect(0x400e1000, 4092, PROT_READ|PROT_WRITE) = 0 22795 mprotect(0x400e1000, 4092, PROT_READ|PROT_WRITE) = 0 22795 mprotect(0x400e1000, 4092, PROT_READ|PROT_WRITE) = 0 22795 mprotect(0x400e1000, 4092, PROT_READ|PROT_WRITE) = 0 22795 clock_gettime(CLOCK_MONOTONIC, {1008246, 828903250}) = 0 22795 mprotect(0x400e1000, 4092, PROT_READ|PROT_WRITE) = 0 22795 gettimeofday({1422456745, 908482}, NULL) = 0 22795 brk(0) = 0xf75000 22795 brk(0xf75000) = 0xf75000 22795 brk(0xf76000) = 0xf76000 22795 getuid32() = 10186 22795 futex(0x4013d3c4, 0x81 /* FUTEX_??? */, 2147483647) = 0 22795 mprotect(0x400e1000, 4092, PROT_READ|PROT_WRITE) = 0 22795 mprotect(0x400e1000, 4092, PROT_READ) = 0 22795 mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x400e2000 22795 madvise(0x400e2000, 4096, 0xc /* MADV_??? */) = -1 EINVAL (Invalid argument) 22795 mprotect(0x400e2000, 4096, PROT_READ) = 0 22795 --- SIGSEGV (Segmentation fault) @ 0 (0) --- 22795 sigaction(SIGSEGV, {SIG_DFL}, {0x400cca71, [], SA_STACK|SA_RESTART|SA_SIGINFO}, 0) = 0 22795 sigaction(SIGSEGV, {0x400cca71, [], SA_STACK|SA_RESTART|SA_SIGINFO}, NULL, 0xcda018) = 0 22795 prctl(0x10, 0x400e0c00, 0, 0, 0) = 0 22795 gettid() = 22795 22795 open("/dev/log/main", O_WRONLY|O_LARGEFILE|0x80000) = 3 22795 writev(3, [{"\7", 1}, {"libc\0", 5}, {"Fatal signal 11 (SIGSEGV) at 0x00000000 (code=1), thread 22795 (python)\0", 72}], 3) = 78 22795 close(3) = 0 22795 gettid() = 22795 22795 socket(PF_FILE, SOCK_STREAM, 0) = 3 22795 connect(3, {sa_family=AF_FILE, path=@android:debuggerd}, 20) = 0 22795 write(3, "\0\0\0\0\vY\0\0\0\0\0\0", 12) = 12 22795 read(3, "", 1) = 0 22795 close(3) = 0 22795 sigaction(SIGSEGV, {SIG_DFL}, {0x400cca71, [], SA_STACK|SA_RESTART|SA_SIGINFO}, 0) = 0 22795 rt_sigreturn(0x1) = 0 22795 --- SIGSEGV (Segmentation fault) @ 0 (0) --- 22795 +++ killed by SIGSEGV +++

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4