home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   linux.debian.bugs.dist      Ohh some weird Debian bug report thing      28,835 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 27,808 of 28,835   
   Vladimir Petko to All   
   Bug#1128168: jmh: FTBFS with default Jav   
   16 Feb 26 07:20:01   
   
   From: vpa1977@gmail.com   
      
   Source: jmh   
   Severity: normal   
   Tags: ftbfs   
   Usertags: default-java25   
      
   Dear Maintainers,   
      
   The package jmh ftbfs with default Java 25.   
   The relevant part of the build log:   
   ---------------   
      
   [ERROR] constrainedX(org.openjdk.jmh.it.params.StaticParamSanityTest)  Time   
   elapsed: 0.001 s  <<< ERROR!   
   java.lang.RuntimeException: ERROR: Unable to find the resource:    
   META-INF/BenchmarkList   
   	at org.openjdk.jmh.runner.AbstractResourceReader.getReaders(Abs   
   ractResourceReader.java:98)   
   	at org.openjdk.jmh.runner.BenchmarkList.find(BenchmarkList.java:124)   
   	at org.openjdk.jmh.runner.Runner.internalRun(Runner.java:252)   
   	at org.openjdk.jmh.runner.Runner.run(Runner.java:185)   
   	at org.openjdk.jmh.it.params.StaticParamSanityTest.constrainedX   
   StaticParamSanityTest.java:78)   
   	at java.base/jdk.internal.reflect.DirectMethodHandleAccessor.in   
   oke(DirectMethodHandleAccessor.java:104)   
   	at java.base/java.lang.reflect.Method.invoke(Method.java:565)   
   	at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(   
   rameworkMethod.java:59)   
   	at org.junit.internal.runners.model.ReflectiveCallable.run(Refl   
   ctiveCallable.java:12)   
   	at org.junit.runners.model.FrameworkMethod.invokeExplosively(Fr   
   meworkMethod.java:61)   
   	at org.junit.internal.runners.statements.InvokeMethod.evaluate(   
   nvokeMethod.java:17)   
   	at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)   
   	at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUn   
   t4ClassRunner.java:100)   
   	at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)   
   	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit   
   ClassRunner.java:103)   
   	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit   
   ClassRunner.java:63)   
   	at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)   
   	at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)   
   	at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)   
   	at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)   
   	at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)   
   	at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)   
   	at org.junit.runners.ParentRunner.run(ParentRunner.java:413)   
   	at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUni   
   4Provider.java:365)   
   	at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithR   
   run(JUnit4Provider.java:273)   
   	at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestS   
   t(JUnit4Provider.java:238)   
   	at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit   
   Provider.java:159)   
   	at org.apache.maven.surefire.booter.ForkedBooter.invokeProvider   
   nSameClassLoader(ForkedBooter.java:384)   
   	at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInPro   
   ess(ForkedBooter.java:345)   
   	at org.apache.maven.surefire.booter.ForkedBooter.execute(Forked   
   ooter.java:126)   
   	at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418)   
      
   ---------------   
      
      
   -- System Information:   
   Debian Release: forky/sid   
     APT prefers questing-updates   
     APT policy: (500, 'questing-updates'), (500, 'questing-security'), (500,   
   'questing'), (100, 'questing-backports')   
   Architecture: amd64 (x86_64)   
   Foreign Architectures: i386   
      
   Kernel: Linux 6.17.0-12-generic (SMP w/32 CPU threads; PREEMPT)   
   Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_WARN, TAINT_OOT_MODULE   
   Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en   
   Shell: /bin/sh linked to /usr/bin/dash   
   Init: systemd (via /run/systemd/system)   
   LSM: AppArmor: enabled   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca