pkgsrc-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: pkg/49490: "hg clone" does not work on big endian machines



The following reply was made to PR pkg/49490; it has been noted by GNATS.

From: David Holland <dholland-pbugs%netbsd.org@localhost>
To: gnats-bugs%netbsd.org@localhost
Cc: 
Subject: Re: pkg/49490: "hg clone" does not work on big endian machines
Date: Thu, 15 Jan 2015 19:29:30 +0000

 (not sent to gnats)
 
    ------
 
 From: Christos Zoulas <christos%astron.com@localhost
 To: pkgsrc-bugs%NetBSD.org@localhost
 Subject: Re: pkg/49490: "hg clone" does not work on big endian machines
 Date: Sat, 10 Jan 2015 23:47:01 +0000 (UTC)
 
 In article <20150110201501.26744A65BA%mollari.NetBSD.org@localhost>,
 Martin Husemann  <gnats-bugs%NetBSD.org@localhost> wrote:
 >The following reply was made to PR pkg/49490; it has been noted by GNATS.
 >
 >From: Martin Husemann <martin%duskware.de@localhost>
 >To: gnats-bugs%NetBSD.org@localhost
 >Cc: 
 >Subject: Re: pkg/49490: "hg clone" does not work on big endian machines
 >Date: Sat, 10 Jan 2015 21:14:40 +0100
 >
 > I traced the network traffic while taking a ktrace at the same time,
 > all running with a slightly modified py-mercurial, that would invoke
 > the python debugger once the problem happens - and also doing
 > hg --debug clone ...
 > 
 > If needed I can make the (significantly larger) full traces available, the
 > relevant tail of both is here:
 > 
 > http://www.netbsd.org/~martin/hg-clone-pcap.tar.bz2 (2.3 MB)
 > 
 > It seems the actual 0 byte return comes from a recvfrom(), the socket
 > connected to the http port seems to be fd 4:
 > 
 >  12647      1 python2.7 CALL  recvfrom(4,0xfffffffff60ae024,0x6a12,0,0,0)
 >  12647      1 python2.7 MISC  msghdr: [name=0x0, namelen=0,
 >iov=0x1b2915cc0, iovlen=1, control=0x0, controllen=0, flags=0]
 >  12647      1 python2.7 GIO   fd 4 read 0 bytes
 >        ""
 >  12647      1 python2.7 RET   recvfrom 0
 >  12647      1 python2.7 CALL  recvfrom(4,0xfffffffff60ae024,0x6a12,0,0,0)
 >  12647      1 python2.7 MISC  msghdr: [name=0x0, namelen=0,
 >iov=0x1b2915cc0, iovlen=1, control=0x0, controllen=0, flags=0]
 >  12647      1 python2.7 GIO   fd 4 read 0 bytes
 >        ""
 >  12647      1 python2.7 RET   recvfrom 0
 > 
 > [..]
 > and this imediately leeds to:
 > 
 >  12647      1 python2.7 CALL  write(2,0xfffffffff64f16e4,0x13)
 >  12647      1 python2.7 GIO   fd 2 wrote 19 bytes
 >        "transaction abort!\n"
 
 What happens on the sender side?
 
 christos
 


Home | Main Index | Thread Index | Old Index