git.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* git-fast-import crashes
@ 2007-10-12  9:42 Shun Kei Leung
  2007-10-13  3:29 ` Shawn O. Pearce
  0 siblings, 1 reply; 13+ messages in thread
From: Shun Kei Leung @ 2007-10-12  9:42 UTC (permalink / raw)
  To: git

Hi all,

I am using git 1.5.3.4.206.g58ba4-dirty on Mac OS X 10.4. When I tried
to run `git-p4 rebase', it failed with a broken pipe to
`git-fast-import'. I gather the following from GDB. I am kind of
stuck. Does anyone have any idea what's going on?


Program received signal EXC_BAD_ACCESS, Could not access memory.
Reason: KERN_INVALID_ADDRESS at address: 0x64617469
in_window (win=0x5004d0, offset=3501) at sha1_file.c:701
701             off_t win_off = win->offset;
(gdb) bt
#0  in_window (win=0x5004d0, offset=3501) at sha1_file.c:701
#1  0x0000a7b0 in use_pack (p=0x500740, w_cursor=0xbfffd328,
offset=3501, left=0xbfffd2c8) at sha1_file.c:728
#2  0x0000aaa0 in unpack_object_header (p=0x64617461, w_curs=0x0,
curpos=0xbfffd330, sizep=0xbffff4ec) at sha1_file.c:1329
#3  0x0000e17c in unpack_entry (p=0x500740, obj_offset=3501,
type=0xbffff4e8, sizep=0xbffff4ec) at sha1_file.c:1591
#4  0x0000dc8c in read_packed_sha1 (sha1=0x64617461 <Address
0x64617461 out of bounds>, type=0xbffff4e8, size=0xbffff4ec) at
sha1_file.c:1811
#5  0x0000dd90 in read_sha1_file (sha1=0xbffff4f0
")S??=?P\r?6[?w?S[\021\004??", type=0xbffff4e8, size=0xbffff4ec) at
sha1_file.c:1877
#6  0x0000e020 in read_object_with_reference (sha1=0x100950b
")S??=?P\r?6[?w?S[\021\004??", required_type_name=0x0,
size=0xbffff578, actual_sha1_return=0x100950b
")S??=?P\r?6[?w?S[\021\004??") at sha1_file.c:1906
#7  0x0000450c in cmd_from_existing (b=0x10094c0) at fast-import.c:1922
#8  0x00004b3c in cmd_from (b=0x10094c0) at fast-import.c:1965
#9  0x000078a0 in cmd_new_commit () at fast-import.c:2044
#10 0x000088f0 in main (argc=213252, argv=0xbffff838) at fast-import.c:2329
(gdb) print win
$1 = (struct pack_window *) 0x5004d0
(gdb) print *win
$2 = {
  next = 0x64617461,
  base = 0x20333936 <Address 0x20333936 out of bounds>,
  offset = 22523564414626158,
  len = 1685026675,
  last_used = 795894075,
  inuse_cnt = 0
}


Regards,
Kevin Leung

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: git-fast-import crashes
  2007-10-12  9:42 git-fast-import crashes Shun Kei Leung
@ 2007-10-13  3:29 ` Shawn O. Pearce
  2007-10-13  3:34   ` Shawn O. Pearce
  2007-10-13 12:58   ` Johannes Schindelin
  0 siblings, 2 replies; 13+ messages in thread
From: Shawn O. Pearce @ 2007-10-13  3:29 UTC (permalink / raw)
  To: Shun Kei Leung; +Cc: git

Shun Kei Leung <kevinlsk@gmail.com> wrote:
> Program received signal EXC_BAD_ACCESS, Could not access memory.
> Reason: KERN_INVALID_ADDRESS at address: 0x64617469
> in_window (win=0x5004d0, offset=3501) at sha1_file.c:701
> 701             off_t win_off = win->offset;
...
> (gdb) print win
> $1 = (struct pack_window *) 0x5004d0
> (gdb) print *win
> $2 = {
>   next = 0x64617461,
>   base = 0x20333936 <Address 0x20333936 out of bounds>,
>   offset = 22523564414626158,
>   len = 1685026675,
>   last_used = 795894075,
>   inuse_cnt = 0
> }

Wow.  There's no way that struct pack_window is valid anymore.
The base isn't a valid address.  The offset cannot possibly be
correct (you don't have that big of a packfile, do you?!

What does `git count-objects -v` give you?  I'm specifically
interested in how many packfiles you have.  The other thing that
may be interesting to see is the value of pack_open_windows and
peak_pack_open_windows (file scope in sha1_file.c).

Then again, maybe that isn't interesting.  This looks like it is
memory corruption (e.g. someone overwriting a free'd segment),
but that sort of memory corruption is very hard to track down.

-- 
Shawn.

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: git-fast-import crashes
  2007-10-13  3:29 ` Shawn O. Pearce
@ 2007-10-13  3:34   ` Shawn O. Pearce
  2007-10-13  7:36     ` Pierre Habouzit
  2007-10-13 12:58   ` Johannes Schindelin
  1 sibling, 1 reply; 13+ messages in thread
From: Shawn O. Pearce @ 2007-10-13  3:34 UTC (permalink / raw)
  To: Shun Kei Leung; +Cc: git

"Shawn O. Pearce" <spearce@spearce.org> wrote:
> Shun Kei Leung <kevinlsk@gmail.com> wrote:
> > I am using git 1.5.3.4.206.g58ba4-dirty on Mac OS X 10.4.
...
> > Program received signal EXC_BAD_ACCESS, Could not access memory.
> > Reason: KERN_INVALID_ADDRESS at address: 0x64617469
...
> This looks like it is
> memory corruption (e.g. someone overwriting a free'd segment),
> but that sort of memory corruption is very hard to track down.

OK, so the version you have (58ba4) is the latest fast-import after
the strbuf.c series went in.  The one immediately before that series
was 4bf538 and is probably actually stable.

So I wonder, can you test 4bf538 and then if it is good bisect
between those two commits?  There must be a memory corruption
introduced by one of the strbuf changes...

-- 
Shawn.

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: git-fast-import crashes
  2007-10-13  3:34   ` Shawn O. Pearce
@ 2007-10-13  7:36     ` Pierre Habouzit
  2007-10-13  7:50       ` Pierre Habouzit
  0 siblings, 1 reply; 13+ messages in thread
From: Pierre Habouzit @ 2007-10-13  7:36 UTC (permalink / raw)
  To: Shawn O. Pearce; +Cc: Shun Kei Leung, git

[-- Attachment #1: Type: text/plain, Size: 1166 bytes --]

On Sat, Oct 13, 2007 at 03:34:07AM +0000, Shawn O. Pearce wrote:
> "Shawn O. Pearce" <spearce@spearce.org> wrote:
> > Shun Kei Leung <kevinlsk@gmail.com> wrote:
> > > I am using git 1.5.3.4.206.g58ba4-dirty on Mac OS X 10.4.
> ....
> > > Program received signal EXC_BAD_ACCESS, Could not access memory.
> > > Reason: KERN_INVALID_ADDRESS at address: 0x64617469
> ....
> > This looks like it is
> > memory corruption (e.g. someone overwriting a free'd segment),
> > but that sort of memory corruption is very hard to track down.
> 
> OK, so the version you have (58ba4) is the latest fast-import after
> the strbuf.c series went in.  The one immediately before that series
> was 4bf538 and is probably actually stable.
> 
> So I wonder, can you test 4bf538 and then if it is good bisect
> between those two commits?  There must be a memory corruption
> introduced by one of the strbuf changes...

  Gasp, if you get the offending sha1 commit, don't forget to Cc: me.

-- 
·O·  Pierre Habouzit
··O                                                madcoder@debian.org
OOO                                                http://www.madism.org

[-- Attachment #2: Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: git-fast-import crashes
  2007-10-13  7:36     ` Pierre Habouzit
@ 2007-10-13  7:50       ` Pierre Habouzit
  2007-10-15  4:53         ` Shun Kei Leung
  0 siblings, 1 reply; 13+ messages in thread
From: Pierre Habouzit @ 2007-10-13  7:50 UTC (permalink / raw)
  To: Shawn O. Pearce, Shun Kei Leung, git

[-- Attachment #1: Type: text/plain, Size: 1732 bytes --]

On sam, oct 13, 2007 at 07:36:40 +0000, Pierre Habouzit wrote:
> On Sat, Oct 13, 2007 at 03:34:07AM +0000, Shawn O. Pearce wrote:
> > "Shawn O. Pearce" <spearce@spearce.org> wrote:
> > > Shun Kei Leung <kevinlsk@gmail.com> wrote:
> > > > I am using git 1.5.3.4.206.g58ba4-dirty on Mac OS X 10.4.
> > ....
> > > > Program received signal EXC_BAD_ACCESS, Could not access memory.
> > > > Reason: KERN_INVALID_ADDRESS at address: 0x64617469
> > ....
> > > This looks like it is
> > > memory corruption (e.g. someone overwriting a free'd segment),
> > > but that sort of memory corruption is very hard to track down.
> > 
> > OK, so the version you have (58ba4) is the latest fast-import after
> > the strbuf.c series went in.  The one immediately before that series
> > was 4bf538 and is probably actually stable.
> > 
> > So I wonder, can you test 4bf538 and then if it is good bisect
> > between those two commits?  There must be a memory corruption
> > introduced by one of the strbuf changes...
> 
>   Gasp, if you get the offending sha1 commit, don't forget to Cc: me.

  Okay, given that fast-import uses quote_c_style, I believe this is the
same but that the one that was reported already. I've read the full
`git diff 4bf53833dbca666f61b5177977e96d453527db20.. -- fast-import.c`
and nothing alarming shows up.

  Please try to apply:
http://git.madism.org/?p=git.git;a=commit;h=7406e83342cd445ac38c1753c5fce75377737e2f

  And see if that fixes the issue for you. Else a bisection would be
much appreciated. Thanks.

-- 
·O·  Pierre Habouzit
··O                                                madcoder@debian.org
OOO                                                http://www.madism.org

[-- Attachment #2: Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: git-fast-import crashes
  2007-10-13  3:29 ` Shawn O. Pearce
  2007-10-13  3:34   ` Shawn O. Pearce
@ 2007-10-13 12:58   ` Johannes Schindelin
  1 sibling, 0 replies; 13+ messages in thread
From: Johannes Schindelin @ 2007-10-13 12:58 UTC (permalink / raw)
  To: Shawn O. Pearce; +Cc: Shun Kei Leung, git

Hi,

On Fri, 12 Oct 2007, Shawn O. Pearce wrote:

> Shun Kei Leung <kevinlsk@gmail.com> wrote:
> > Program received signal EXC_BAD_ACCESS, Could not access memory.
> > Reason: KERN_INVALID_ADDRESS at address: 0x64617469
> > in_window (win=0x5004d0, offset=3501) at sha1_file.c:701
> > 701             off_t win_off = win->offset;
> ...
> > (gdb) print win
> > $1 = (struct pack_window *) 0x5004d0
> > (gdb) print *win
> > $2 = {
> >   next = 0x64617461,
> >   base = 0x20333936 <Address 0x20333936 out of bounds>,
> >   offset = 22523564414626158,
> >   len = 1685026675,
> >   last_used = 795894075,
> >   inuse_cnt = 0
> > }
> 
> Wow.  There's no way that struct pack_window is valid anymore.
>
> [...] 
>
> This looks like it is memory corruption (e.g. someone overwriting a 
> free'd segment), but that sort of memory corruption is very hard to 
> track down.

I found valgrind invaluable to find such errors.

Ciao,
Dscho

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: git-fast-import crashes
  2007-10-13  7:50       ` Pierre Habouzit
@ 2007-10-15  4:53         ` Shun Kei Leung
  2007-10-15  7:33           ` Pierre Habouzit
  0 siblings, 1 reply; 13+ messages in thread
From: Shun Kei Leung @ 2007-10-15  4:53 UTC (permalink / raw)
  To: git; +Cc: Pierre Habouzit, Shawn O. Pearce

Hi,

Sorry for the late reply. I was away from my computer in the weekend.


Hi Pierre,

I didn't try:
http://git.madism.org/?p=git.git;a=commit;h=7406e83342cd445ac38c1753c5fce75377737e2f

because the bad commit turns out to be b449f4c according to `git bisect'.


Hi Shawn,

I include the output of `git count-objects -v' for your information:

count: 104
size: 552
in-pack: 10652
packs: 12
prune-packable: 0
garbage: 0


Regards,
Kevin Leung

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: git-fast-import crashes
  2007-10-15  4:53         ` Shun Kei Leung
@ 2007-10-15  7:33           ` Pierre Habouzit
  2007-10-15  8:19             ` Shun Kei Leung
  0 siblings, 1 reply; 13+ messages in thread
From: Pierre Habouzit @ 2007-10-15  7:33 UTC (permalink / raw)
  To: Shun Kei Leung; +Cc: git, Shawn O. Pearce

[-- Attachment #1: Type: text/plain, Size: 916 bytes --]

On Mon, Oct 15, 2007 at 04:53:38AM +0000, Shun Kei Leung wrote:
> Hi,
> 
> Sorry for the late reply. I was away from my computer in the weekend.
> 
> 
> Hi Pierre,
> 
> I didn't try:
> http://git.madism.org/?p=git.git;a=commit;h=7406e83342cd445ac38c1753c5fce75377737e2f
> 
> because the bad commit turns out to be b449f4c according to `git bisect'.

  I don't get the reason for your "because" but so be it. The commit you
show is not obviously broken to me, especially not in fast-import.c, so
I'll need more input.  Could you please run your test in valgrind and
report the output please? Or if the data to reproduce the bug are online
or shareable, it'd be great to share, so that I can reproduce the issue
here.


-- 
·O·  Pierre Habouzit
··O                                                madcoder@debian.org
OOO                                                http://www.madism.org

[-- Attachment #2: Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: git-fast-import crashes
  2007-10-15  7:33           ` Pierre Habouzit
@ 2007-10-15  8:19             ` Shun Kei Leung
  2007-10-16  7:13               ` Shun Kei Leung
  0 siblings, 1 reply; 13+ messages in thread
From: Shun Kei Leung @ 2007-10-15  8:19 UTC (permalink / raw)
  To: Pierre Habouzit; +Cc: git, Shawn O. Pearce

>   I don't get the reason for your "because" but so be it.

Well, my reasoning was that the commit didn't touch the convert.c. But
after re-reading the patch, I think I should apply and test with the
patch again.

...
> Or if the data to reproduce the bug are online
> or shareable, it'd be great to share, so that I can reproduce the issue
> here.

The repository is private, and it is in maintenance mode for the rest
of today. I will get back to you tomorrow with updates.


Thanks & regards,
Kevin Leung

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: git-fast-import crashes
  2007-10-15  8:19             ` Shun Kei Leung
@ 2007-10-16  7:13               ` Shun Kei Leung
  2007-10-16  7:46                 ` Pierre Habouzit
  0 siblings, 1 reply; 13+ messages in thread
From: Shun Kei Leung @ 2007-10-16  7:13 UTC (permalink / raw)
  To: Pierre Habouzit; +Cc: git, Shawn O. Pearce

Hi Pierre,

I have tested with your patch applied, and it still crashed badly.

I compiled the b449f4c version and I got a different backtrace from
GDB. I am still not sure about how the error occurs. I attached the
memory usage from various command line tools.

Regards,
Kevin Leung



GDB output
===========

Program received signal EXC_BAD_ACCESS, Could not access memory.
Reason: KERN_INVALID_ADDRESS at address: 0x756c7463
0x90018d0c in szone_realloc ()
(gdb) bt
#0  0x90018d0c in szone_realloc ()
#1  0x90018898 in realloc ()
#2  0x0001f8c8 in strbuf_grow (sb=0x75ef8, extra=0) at git-compat-util.h:223
#3  0x0001fc14 in read_line (sb=0x75ef8, fp=0xa0001b9c, term=10) at strbuf.c:107
#4  0x00002da8 in read_next_command () at fast-import.c:1599
#5  0x0000742c in cmd_new_commit () at fast-import.c:2118
#6  0x00007e80 in main (argc=1, argv=0xbffff828) at fast-import.c:2390
(gdb) frame 3
#3  0x0001fc14 in read_line (sb=0x75ef8, fp=0xa0001b9c, term=10) at strbuf.c:107
107                     strbuf_grow(sb, 1);
(gdb) print *sb
$1 = {
  alloc = 60,
  len = 23,
  eof = 0,
  buf = 0x5020b0 "D windows/packages/cdc/ces/adm"
}
(gdb) frame 2
#2  0x0001f8c8 in strbuf_grow (sb=0x75ef8, extra=0) at git-compat-util.h:223
223             void *ret = realloc(ptr, size);
(gdb) print (char *) ptr
$2 = 0x5020b0 "D windows/packages/cdc/ces/adm"
(gdb) print (char *)ret
$3 = 0xd <Address 0xd out of bounds>
(gdb)


The output of `leaks'
=================

Process 27075: 88 nodes malloced for 2335 KB
Process 27075: 6 leaks for 624 total leaked bytes.
Leak: 0x005012b0  size=208      string 'EOT'
Leak: 0x00501e60  size=128      string 'EOT'
Leak: 0x00501c80  size=128      string 'EOT'
Leak: 0x00500f10  size=64       string 'EOT'
Leak: 0x00501fa0  size=64       string 'EOT'
Leak: 0x00501f60  size=32
        0x00000000 0x02008000 0x00000000 0x01000000     ................
        0x02000000 0x0000001a 0x00000000 0x00000000     ................



Below is the output of `malloc_history'
==============================

Deallocation of 5020b0 - no corresponding allocation
67 calls for 2874 bytes: thread_a000ed88 |0x0 | start | _start | main
| cmd_new_commit | read_next_command | read_line | strbuf_grow

12 calls for 2016 bytes: thread_a000ed88 |0x0 | start | _start | main
| prepare_packed_git | prepare_packed_git_one | add_packed_git

8 calls for 831 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | cmd_data | read_line | strbuf_grow

4 calls for 160 bytes: thread_a000ed88 |0x0 | start | _start |
__keymgr_dwarf2_register_sections | _dyld_register_func_for_add_image
| dyld::registerAddCallback(void (*)(mach_header const*, long)) |
ImageLoader::runNotification(ImageLoader::LinkContext const&,
unsigned) | ImageLoader::recursiveImageNotification(ImageLoader::LinkContext
const&, unsigned) | dyld::imageNotification(ImageLoader*, unsigned) |
dwarf2_unwind_dyld_add_image_hook

3 calls for 1976 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | tree_content_set | load_tree |
read_sha1_file | read_packed_sha1 | unpack_entry | unpack_entry |
patch_delta

3 calls for 84 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | tree_content_set | load_tree |
read_sha1_file | read_packed_sha1 | unpack_entry |
unpack_object_header | use_pack

2 calls for 1200 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | load_tree | read_sha1_file |
read_packed_sha1 | unpack_entry | unpack_entry | unpack_entry |
unpack_entry | patch_delta

2 calls for 1200 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | load_tree | read_sha1_file |
read_packed_sha1 | unpack_entry | unpack_entry | unpack_entry |
patch_delta

2 calls for 1200 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | load_tree | read_sha1_file |
read_packed_sha1 | unpack_entry | unpack_entry | patch_delta

2 calls for 80 bytes: thread_a000ed88 |0x0 | start | _start |
__keymgr_dwarf2_register_sections | _dyld_register_func_for_add_image
| dyld::registerAddCallback(void (*)(mach_header const*, long)) |
ImageLoader::runNotification(ImageLoader::LinkContext const&,
unsigned) | ImageLoader::recursiveImageNotification(ImageLoader::LinkContext
const&, unsigned) | dyld::imageNotification(ImageLoader*, unsigned) |
dwarf2_unwind_dyld_add_image_hook

2 calls for 56 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | load_tree | read_sha1_file |
read_packed_sha1 | unpack_entry | unpack_object_header | use_pack

1 calls for 2097152 bytes: thread_a000ed88 |0x0 | start | _start |
main | pool_calloc | pool_alloc

1 calls for 160012 bytes: thread_a000ed88 |0x0 | start | _start | main
| alloc_objects

1 calls for 52000 bytes: thread_a000ed88 |0x0 | start | _start | main
| cmd_new_commit | load_tree | new_tree_entry

1 calls for 17804 bytes: thread_a000ed88 |0x0 | start | _start | main

1 calls for 8192 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | cmd_data

1 calls for 4156 bytes: thread_a000ed88 |0x0 | start | _start | main

1 calls for 4096 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | store_tree | store_tree | store_tree | mktree |
size_dbuf

1 calls for 4096 bytes: thread_a000ed88 |0x0 | start | _start | main |
read_next_command | read_line | fgetc | __srget | __srefill |
__smakebuf

1 calls for 3072 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | store_tree | store_tree | store_tree | mktree |
size_dbuf

1 calls for 2048 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | size_dbuf

1 calls for 1149 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | tree_content_set | load_tree |
read_sha1_file | read_packed_sha1 | unpack_entry | unpack_entry |
unpack_entry | patch_delta

1 calls for 1149 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | tree_content_set | load_tree |
read_sha1_file | read_packed_sha1 | unpack_entry | unpack_entry |
unpack_entry | unpack_entry | unpack_compressed_entry

1 calls for 1032 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | load_tree | read_sha1_file |
read_packed_sha1 | unpack_entry | unpack_entry | unpack_entry |
unpack_entry | unpack_entry | unpack_entry | unpack_compressed_entry

1 calls for 822 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | tree_content_set |
tree_content_set | load_tree | read_sha1_file | read_packed_sha1 |
unpack_entry | unpack_entry | unpack_compressed_entry

1 calls for 522 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | load_tree | read_sha1_file |
read_packed_sha1 | unpack_entry | unpack_entry |
unpack_compressed_entry

1 calls for 436 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | tree_content_set |
tree_content_set | tree_content_set | tree_content_set |
tree_content_set | load_tree | read_sha1_file | read_packed_sha1 |
unpack_entry | unpack_entry | unpack_compressed_entry

1 calls for 400 bytes: thread_a000ed88 |0x0 | start | _start | main

1 calls for 285 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | tree_content_set |
tree_content_set | tree_content_set | load_tree | read_sha1_file |
read_packed_sha1 | unpack_entry | unpack_entry |
unpack_compressed_entry

1 calls for 258 bytes: thread_a000ed88 |0x0 | start | _start | main |
start_packfile | mkstemp | arc4random

1 calls for 212 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | tree_content_set |
tree_content_set | tree_content_set | tree_content_set | load_tree |
read_sha1_file | read_packed_sha1 | unpack_entry | unpack_entry |
unpack_compressed_entry

1 calls for 168 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | load_tree | read_sha1_file |
read_packed_sha1 | unpack_entry | unpack_entry | unpack_entry |
unpack_entry | unpack_entry | unpack_entry | patch_delta

1 calls for 168 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | load_tree | read_sha1_file |
read_packed_sha1 | unpack_entry | unpack_entry | unpack_entry |
unpack_entry | unpack_entry | unpack_entry | unpack_entry |
unpack_entry | patch_delta

1 calls for 168 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | load_tree | read_sha1_file |
read_packed_sha1 | unpack_entry | unpack_entry | unpack_entry |
unpack_entry | unpack_entry | unpack_entry | unpack_entry |
unpack_entry | unpack_entry | patch_delta

1 calls for 168 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | load_tree | read_sha1_file |
read_packed_sha1 | unpack_entry | unpack_entry | unpack_entry |
unpack_entry | unpack_entry | unpack_entry | unpack_entry |
unpack_entry | unpack_entry | unpack_entry | unpack_compressed_entry

1 calls for 168 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | load_tree | read_sha1_file |
read_packed_sha1 | unpack_entry | unpack_entry | unpack_entry |
unpack_entry | unpack_entry | unpack_entry | unpack_entry |
patch_delta

1 calls for 129 bytes: thread_a000ed88 |0x0 | start | _start | main |
start_packfile

1 calls for 122 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | tree_content_set | load_tree |
read_sha1_file | read_packed_sha1 | unpack_entry | unpack_entry |
unpack_compressed_entry

1 calls for 64 bytes: thread_a000ed88 |0x0 | start | _start | main |
git_config | git_path | get_git_dir | setup_git_env | sprintf$LDBL128
| __vfprintf$LDBL128 | localeconv_l

1 calls for 61 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | parse_ident

1 calls for 60 bytes: thread_a000ed88 |0x0 | start | _start |
__keymgr_dwarf2_register_sections | _dyld_register_func_for_add_image
| dyld::registerAddCallback(void (*)(mach_header const*, long)) |
ImageLoader::runNotification(ImageLoader::LinkContext const&,
unsigned) | dyld::imageNotification(ImageLoader*, unsigned) |
dwarf2_unwind_dyld_add_image_hook |
_keymgr_get_and_lock_processwide_ptr_2 | get_or_create_key_element

1 calls for 52 bytes: thread_a000ed88 |0x0 | start | _start | main |
git_config | git_path | get_git_dir | setup_git_env | strdup

1 calls for 48 bytes: thread_a000ed88 |0x0 | start | _start | main |
git_config | git_path | get_git_dir | setup_git_env

1 calls for 46 bytes: thread_a000ed88 |0x0 | start | _start | main |
git_config | git_path | get_git_dir | setup_git_env

1 calls for 45 bytes: thread_a000ed88 |0x0 | start | _start | main |
git_config | git_path | get_git_dir | setup_git_env

1 calls for 40 bytes: thread_a000ed88 |0x0 | start | _start |
__keymgr_dwarf2_register_sections | _dyld_register_func_for_add_image
| dyld::registerAddCallback(void (*)(mach_header const*, long)) |
ImageLoader::runNotification(ImageLoader::LinkContext const&,
unsigned) | dyld::imageNotification(ImageLoader*, unsigned) |
dwarf2_unwind_dyld_add_image_hook

1 calls for 40 bytes: thread_a000ed88 |0x0 | start | _start |
__keymgr_dwarf2_register_sections | _dyld_register_func_for_add_image
| dyld::registerAddCallback(void (*)(mach_header const*, long)) |
ImageLoader::runNotification(ImageLoader::LinkContext const&,
unsigned) | ImageLoader::recursiveImageNotification(ImageLoader::LinkContext
const&, unsigned) | dyld::imageNotification(ImageLoader*, unsigned) |
dwarf2_unwind_dyld_add_image_hook

1 calls for 28 bytes: thread_a000ed88 |0x0 | start | _start | main |
cmd_new_commit | tree_content_set | tree_content_set |
tree_content_set | tree_content_set | tree_content_set |
tree_content_set | load_tree | read_sha1_file | read_packed_sha1 |
unpack_entry | unpack_object_header | use_pack

1 calls for 18 bytes: thread_a000ed88 |0x0 | start | _start |
__keymgr_dwarf2_register_sections | _dyld_register_func_for_add_image
| dyld::registerAddCallback(void (*)(mach_header const*, long)) |
ImageLoader::runNotification(ImageLoader::LinkContext const&,
unsigned) | dyld::imageNotification(ImageLoader*, unsigned) |
dwarf2_unwind_dyld_add_image_hook | calloc

1 calls for 4 bytes: thread_a000ed88 |0x0 | start | _start | main |
start_packfile


Output of `vmmap'
===============

Virtual Memory Map of process 27270 (git-fast-import)
Output report format:  2.0

==== Non-writable regions for process 27270
__PAGEZERO             00000000-00001000 [    4K] ---/--- SM=NUL
/Users/developer/bin/git-fast-import
__TEXT                 00001000-00034000 [  204K] r-x/rwx SM=COW
/Users/developer/bin/git-fast-import
__LINKEDIT             00080000-000f3000 [  460K] r--/rwx SM=COW
/Users/developer/bin/git-fast-import
mapped file            000f7000-000f8000 [    4K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-b7cda23e237f38b466d2f7b54f665a7d0c8a32ed.idx
mapped file            000f8000-000f9000 [    4K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-5f301a4b08a7f7d44b288f2a96d33f3c3efbf7fb.idx
mapped file            000f9000-000fa000 [    4K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-ee6298d97a1154422169e66d6655071a49cb8686.idx
__TEXT                 00205000-00216000 [   68K] r-x/rwx SM=COW
/opt/local/lib/libz.1.dylib
__LINKEDIT             00217000-00219000 [    8K] r--/rwx SM=COW
/opt/local/lib/libz.1.dylib
__TEXT                 00219000-00313000 [ 1000K] r-x/rwx SM=COW
/opt/local/lib/libiconv.2.dylib
__LINKEDIT             00314000-0031e000 [   40K] r--/rwx SM=COW
/opt/local/lib/libiconv.2.dylib
__TEXT                 0031e000-00421000 [ 1036K] r-x/rwx SM=COW
/opt/local/lib/libcrypto.0.9.8.dylib
__LINKEDIT             00438000-0048d000 [  340K] r--/rwx SM=COW
/opt/local/lib/libcrypto.0.9.8.dylib
__TEXT                 0048d000-004c8000 [  236K] r-x/rwx SM=COW
/opt/local/lib/libssl.0.9.8.dylib
__LINKEDIT             004cc000-004dd000 [   68K] r--/rwx SM=COW
/opt/local/lib/libssl.0.9.8.dylib
mapped file            004dd000-004df000 [    8K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-5f301a4b08a7f7d44b288f2a96d33f3c3efbf7fb.pack
mapped file            004ec000-004ed000 [    4K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-ea2fe30b68a19c9cd6a4bf1dd345377b4dd77df0.idx
mapped file            004ed000-004ee000 [    4K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-97e365a44e20cb37576362c81afdaa879a871a10.idx
mapped file            004ee000-004ef000 [    4K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-f1bcc0635a35caff73d8ccac60ec6656f0527a10.idx
mapped file            004ef000-004f0000 [    4K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-f1bcc0635a35caff73d8ccac60ec6656f0527a10.pack
mapped file            004f0000-004f1000 [    4K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-60dd3fcceddf3eacbe2279ef191f87668b97fb57.idx
mapped file            004f1000-004f2000 [    4K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-8a733b7ccad3eb85b4286a011eccdff20441d9e4.idx
mapped file            004f2000-004f7000 [   20K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-8acbc2151777eb8a2093e5229897d5711dab175b.idx
mapped file            004f7000-004fa000 [   12K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-3d264397b577400c2277f1b89f2065e0cc9846e3.idx
mapped file            004fa000-004fc000 [    8K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-010e1c06a07ef38c31f8e01782eeda433b007709.idx
mapped file            004fc000-00500000 [   16K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-ea2fe30b68a19c9cd6a4bf1dd345377b4dd77df0.pack
mapped file            006ad000-006e4000 [  220K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-3294c669f264ef7a21e2280bfd934e7459140022.idx
mapped file            01208000-01363000 [ 1388K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-8acbc2151777eb8a2093e5229897d5711dab175b.pack
mapped file            01363000-0146c000 [ 1060K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-010e1c06a07ef38c31f8e01782eeda433b007709.pack
mapped file            02008000-052fe000 [52184K] r--/rwx SM=COW
/Volumes/data/kevin/test_gitp4/cdc/.git/objects/pack/pack-3294c669f264ef7a21e2280bfd934e7459140022.pack
__TEXT                 8fe00000-8fe01000 [    4K] r-x/rwx SM=COW  /usr/lib/dyld
__TEXT                 8fe01000-8fe02000 [    4K] r-x/rwx SM=COW  /usr/lib/dyld
__TEXT                 8fe02000-8fe53000 [  324K] r-x/rwx SM=COW  /usr/lib/dyld
__LINKEDIT             8fe5d000-8fe71000 [   80K] r--/rwx SM=COW  /usr/lib/dyld
__TEXT                 90000000-901bd000 [ 1780K] r-x/r-x SM=COW
/usr/lib/libSystem.B.dylib
__LINKEDIT             901bd000-90214000 [  348K] r--/r-- SM=COW
/usr/lib/libSystem.B.dylib
__TEXT                 90214000-9021a000 [   24K] r-x/r-x SM=COW
/usr/lib/system/libmathCommon.A.dylib
__LINKEDIT             9021a000-9021b000 [    4K] r--/r-- SM=COW
/usr/lib/system/libmathCommon.A.dylib
__TEXT                 91433000-9143f000 [   48K] r-x/r-x SM=COW
/usr/lib/libgcc_s.1.dylib
__LINKEDIT             9143f000-91443000 [   16K] r--/r-- SM=COW
/usr/lib/libgcc_s.1.dylib
__DATA                 a0214000-a0215000 [    4K] r--/r-- SM=COW
/usr/lib/system/libmathCommon.A.dylib
STACK GUARD            fffec000-ffff0000 [   16K] ---/rwx SM=NUL
system                 ffff8000-ffffa000 [    8K] r--/r-- SM=SHM
commpage [libSystem.B.dylib]

==== Writable regions for process 27270
__DATA                 00034000-00035000 [    4K] rw-/rwx SM=COW
/Users/developer/bin/git-fast-import
__DATA                 00035000-00080000 [  300K] rw-/rwx SM=PRV
/Users/developer/bin/git-fast-import
VM_ALLOCATE ?          000fa000-000fb000 [    4K] rw-/rwx SM=NUL
MALLOC_LARGE           000fb000-00100000 [   20K] rw-/rwx SM=PRV
DefaultMallocZone_0x500000
MALLOC_TINY (freed?)   00100000-00102000 [    8K] rw-/rwx SM=COW
MALLOC_TINY (freed?)   00102000-00205000 [ 1036K] rw-/rwx SM=ZER
__DATA                 00216000-00217000 [    4K] rw-/rwx SM=COW
/opt/local/lib/libz.1.dylib
__DATA                 00313000-00314000 [    4K] rw-/rwx SM=COW
/opt/local/lib/libiconv.2.dylib
__DATA                 00421000-00435000 [   80K] rw-/rwx SM=COW
/opt/local/lib/libcrypto.0.9.8.dylib
__DATA                 00435000-00438000 [   12K] rw-/rwx SM=NUL
/opt/local/lib/libcrypto.0.9.8.dylib
__DATA                 004c8000-004cc000 [   16K] rw-/rwx SM=COW
/opt/local/lib/libssl.0.9.8.dylib
MALLOC_LARGE           004df000-004ec000 [   52K] rw-/rwx SM=PRV
DefaultMallocZone_0x500000
MALLOC_TINY            00500000-00605000 [ 1044K] rw-/rwx SM=COW
DefaultMallocZone_0x500000
Performance tool data  00605000-00685000 [  512K] rw-/rwx SM=COW
MALLOC_LARGE           00685000-006ad000 [  160K] rw-/rwx SM=PRV
DefaultMallocZone_0x500000
Performance tool data  006e4000-006ed000 [   36K] rw-/rwx SM=COW
MALLOC (freed?)        00800000-01008000 [ 8224K] rw-/rwx SM=PRV
MALLOC_LARGE           01008000-01208000 [ 2048K] rw-/rwx SM=PRV
DefaultMallocZone_0x500000
MALLOC                 01800000-02008000 [ 8224K] rw-/rwx SM=COW
DefaultMallocZone_0x500000
__DATA                 8fe53000-8fe54000 [    4K] rw-/rwx SM=COW  /usr/lib/dyld
__DATA                 8fe54000-8fe5a000 [   24K] rw-/rwx SM=COW  /usr/lib/dyld
__DATA                 8fe5a000-8fe5d000 [   12K] rw-/rwx SM=PRV  /usr/lib/dyld
__DATA                 a0000000-a0002000 [    8K] rw-/rw- SM=COW
/usr/lib/libSystem.B.dylib
__DATA                 a0002000-a0003000 [    4K] rw-/rw- SM=COW
/usr/lib/libSystem.B.dylib
__DATA                 a0003000-a0004000 [    4K] rw-/rw- SM=COW
/usr/lib/libSystem.B.dylib
__DATA                 a0004000-a0005000 [    4K] rw-/rw- SM=COW
/usr/lib/libSystem.B.dylib
__DATA                 a0005000-a000b000 [   24K] rw-/rw- SM=COW
/usr/lib/libSystem.B.dylib
__DATA                 a000b000-a0010000 [   20K] rw-/rw- SM=ZER
/usr/lib/libSystem.B.dylib
__DATA                 a0010000-a0011000 [    4K] rw-/rw- SM=COW
/usr/lib/libSystem.B.dylib
__DATA                 a0011000-a0012000 [    4K] rw-/rw- SM=ZER
/usr/lib/libSystem.B.dylib
__DATA                 a1433000-a1434000 [    4K] rw-/rw- SM=COW
/usr/lib/libgcc_s.1.dylib
Stack                  bf800000-bffff000 [ 8188K] rw-/rwx SM=PRV
Stack                  bffff000-c0000000 [    4K] rw-/rwx SM=COW  thread 0

==== Legend
SM=sharing mode:
        COW=copy_on_write PRV=private NUL=empty ALI=aliased
        SHM=shared ZER=zero_filled S/A=shared_alias

==== Summary for process 27270
ReadOnly portion of Libraries: Total=6092KB resident=2944KB(48%)
swapped_out_or_unallocated=3148KB(52%)
Writable regions: Total=30036KB written=504KB(2%) resident=968KB(3%)
swapped_out=0KB(0%) unallocated=29068KB(97%)

REGION TYPE             [ VIRTUAL]
===========             [ =======]
MALLOC                  [  20816K]
Performance tool data   [    548K]
STACK GUARD             [     16K]
Stack                   [   8192K]
VM_ALLOCATE ?           [      4K]
__DATA                  [    540K]
__LINKEDIT              [   1364K]
__PAGEZERO              [      4K]
__TEXT                  [   4728K]
mapped file             [  54952K]
system                  [      8K]

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: git-fast-import crashes
  2007-10-16  7:13               ` Shun Kei Leung
@ 2007-10-16  7:46                 ` Pierre Habouzit
  2007-10-16  8:01                   ` Shun Kei Leung
  0 siblings, 1 reply; 13+ messages in thread
From: Pierre Habouzit @ 2007-10-16  7:46 UTC (permalink / raw)
  To: Shun Kei Leung; +Cc: git, Shawn O. Pearce

[-- Attachment #1: Type: text/plain, Size: 3133 bytes --]

On Tue, Oct 16, 2007 at 07:13:31AM +0000, Shun Kei Leung wrote:
> Hi Pierre,
> 
> I have tested with your patch applied, and it still crashed badly.

  okay

> I compiled the b449f4c version and I got a different backtrace from
> GDB. I am still not sure about how the error occurs. I attached the
> memory usage from various command line tools.

  I believe you should rather test master as any of the strbuf stages is
broken for you, and that there has been some issues with strbuf fixed
lately (not only the patch I asked you to try, but also an issue with
empty strubufs, and you _need_ that patch).

> GDB output
> ===========
> 
> Program received signal EXC_BAD_ACCESS, Could not access memory.
> Reason: KERN_INVALID_ADDRESS at address: 0x756c7463
> 0x90018d0c in szone_realloc ()
> (gdb) bt
> #0  0x90018d0c in szone_realloc ()
> #1  0x90018898 in realloc ()
> #2  0x0001f8c8 in strbuf_grow (sb=0x75ef8, extra=0) at git-compat-util.h:223
> #3  0x0001fc14 in read_line (sb=0x75ef8, fp=0xa0001b9c, term=10) at strbuf.c:107
> #4  0x00002da8 in read_next_command () at fast-import.c:1599
> #5  0x0000742c in cmd_new_commit () at fast-import.c:2118
> #6  0x00007e80 in main (argc=1, argv=0xbffff828) at fast-import.c:2390
> (gdb) frame 3
> #3  0x0001fc14 in read_line (sb=0x75ef8, fp=0xa0001b9c, term=10) at strbuf.c:107
> 107                     strbuf_grow(sb, 1);
> (gdb) print *sb
> $1 = {
>   alloc = 60,
>   len = 23,
>   eof = 0,
>   buf = 0x5020b0 "D windows/packages/cdc/ces/adm"
> }
> (gdb) frame 2
> #2  0x0001f8c8 in strbuf_grow (sb=0x75ef8, extra=0) at git-compat-util.h:223
> 223             void *ret = realloc(ptr, size);
> (gdb) print (char *) ptr
> $2 = 0x5020b0 "D windows/packages/cdc/ces/adm"
> (gdb) print (char *)ret
> $3 = 0xd <Address 0xd out of bounds>

  This does not make sense, ptr should be either valid or NULL.
> The output of `leaks'
> =================
> 
> Process 27075: 88 nodes malloced for 2335 KB
> Process 27075: 6 leaks for 624 total leaked bytes.
> Leak: 0x005012b0  size=208      string 'EOT'
> Leak: 0x00501e60  size=128      string 'EOT'
> Leak: 0x00501c80  size=128      string 'EOT'
> Leak: 0x00500f10  size=64       string 'EOT'
> Leak: 0x00501fa0  size=64       string 'EOT'
> Leak: 0x00501f60  size=32
>         0x00000000 0x02008000 0x00000000 0x01000000     ................
>         0x02000000 0x0000001a 0x00000000 0x00000000     ................

  What I _really_ need is that you run your test into valgrind (the easy
way is to rename git-fast-import into git-fast-import.bin, and make
git-fast-import be a shell-script doing:

  exec valgrind --log-file /tmp/git-fast-import git-fast-import "$@"

  and please send to me the /tmp/git-fast-import.<pid> from the one that
crashes.

  And please do that on the most recent tip of master so that you have a
(at least believe to be) full and sane strbuf series. Thanks.

-- 
·O·  Pierre Habouzit
··O                                                madcoder@debian.org
OOO                                                http://www.madism.org

[-- Attachment #2: Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: git-fast-import crashes
  2007-10-16  7:46                 ` Pierre Habouzit
@ 2007-10-16  8:01                   ` Shun Kei Leung
  2007-10-16  8:04                     ` Pierre Habouzit
  0 siblings, 1 reply; 13+ messages in thread
From: Shun Kei Leung @ 2007-10-16  8:01 UTC (permalink / raw)
  To: Pierre Habouzit, Shun Kei Leung, git, Shawn O. Pearce

>   What I _really_ need is that you run your test into valgrind (the easy
> way is to rename git-fast-import into git-fast-import.bin, and make
> git-fast-import be a shell-script doing:
...

valgrind is not yet ported to Mac OS X, sadly enough.

Regards,
Kevin Leung

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: git-fast-import crashes
  2007-10-16  8:01                   ` Shun Kei Leung
@ 2007-10-16  8:04                     ` Pierre Habouzit
  0 siblings, 0 replies; 13+ messages in thread
From: Pierre Habouzit @ 2007-10-16  8:04 UTC (permalink / raw)
  To: Shun Kei Leung; +Cc: git, Shawn O. Pearce

[-- Attachment #1: Type: text/plain, Size: 1045 bytes --]

On Tue, Oct 16, 2007 at 08:01:18AM +0000, Shun Kei Leung wrote:
> >   What I _really_ need is that you run your test into valgrind (the easy
> > way is to rename git-fast-import into git-fast-import.bin, and make
> > git-fast-import be a shell-script doing:
> ....
> 
> valgrind is not yet ported to Mac OS X, sadly enough.

  hmmm I see. hmmm isn't there _any_ chance that you can have access to
a linux box to see if that fails in the same conditions ? I mean I
believe qemu (or virtual pc or …) on your macos would be just fine.

  But this realloc() that returns 0xd looks fishy. I would be tempted to
think of a stack corruption, but the frame just before still looks
correct so I'm confused. And valgrind is definitely the tool to use for
stack smashing and other memory related corruptions :/

  Using gcc -Wstack-protector may also help.

-- 
·O·  Pierre Habouzit
··O                                                madcoder@debian.org
OOO                                                http://www.madism.org

[-- Attachment #2: Type: application/pgp-signature, Size: 189 bytes --]

^ permalink raw reply	[flat|nested] 13+ messages in thread

end of thread, other threads:[~2007-10-16  8:04 UTC | newest]

Thread overview: 13+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-10-12  9:42 git-fast-import crashes Shun Kei Leung
2007-10-13  3:29 ` Shawn O. Pearce
2007-10-13  3:34   ` Shawn O. Pearce
2007-10-13  7:36     ` Pierre Habouzit
2007-10-13  7:50       ` Pierre Habouzit
2007-10-15  4:53         ` Shun Kei Leung
2007-10-15  7:33           ` Pierre Habouzit
2007-10-15  8:19             ` Shun Kei Leung
2007-10-16  7:13               ` Shun Kei Leung
2007-10-16  7:46                 ` Pierre Habouzit
2007-10-16  8:01                   ` Shun Kei Leung
2007-10-16  8:04                     ` Pierre Habouzit
2007-10-13 12:58   ` Johannes Schindelin

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).