-
Notifications
You must be signed in to change notification settings - Fork 501
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix some segfaults #165
base: master
Are you sure you want to change the base?
fix some segfaults #165
Conversation
This commit has been contributed by someone who despises github's force-https behaviour and who didn't find upstream email contact to send a patch; feel free to adapt it as you like, copyright is assigned to upstream. Here's a reference to quite tangential posting in Russian regarding a completely different discussion that resulted in me proposing to proxy the patches considered worthwile (I know that person online for some time and he seems knowledgeable albeit rough): http://www.opennet.ru/openforum/vsluhforumID3/93380.html#172 HTH
Thanks for the patch! But before merging it, I would prefer to know the exact steps to reproduce the segfault. We have not received similar reports so far.
There isn't an official one as far as I know. Patches could be sent to our email addresses, which could be found in git history. I don't quite understand why GitHub's force HTTP behavior is bad, though -- imagine what would happen if an contributor of the most popular repo (I suppose, Linus Torvalds) gets his cookies leaked because he accidentally accessed GitHub with plain HTTP in an insecure environment. |
On Mon, Jan 06, 2014 at 12:10:16AM -0800, Richard Grenville wrote:
Thank you, I've forwarded this notification back to the patch author.
Well various people have various showstoppers... ---- WBR, Michael Shigorin / http://altlinux.org |
Proxying back the answer... Richard, thanks for reply, I've bounced you the original email with much smaller patch attached (looks like the author's email address is intentionally public anyways); here's its copy for inspection (or should I prepare a separate branch with a separate pull request?): http://fly.osdn.org.ua/~mike/tmp/sf8.patch -- and here's a copy of that message's body:
one of the things that makes compton crash faster was to quickly open but the easiest way (as i said) is to run compton with valgrind. you'll btw, the previous patch reverts some recent git commits, so a attached
there is another reason with github too: wording of their letter after |
I wrote a script that quickly spawns In case it would be useful, I use xorg-server-1.14.5, nvidia-drivers-331.20, fvwm-2.6.5 on a Gentoo ~amd64 with kernel 3.12.3-pf. I build compton with
You could merge pull requests with the web interface, and perform administrative tasks, like adding contributor, adding SSH keys, and deleting repos.
We all make mistakes, sometimes. |
@gvy: So apparently I failed to get the mail containing valgrind log. Could you please attach it here? |
Only image attachments are accepted (doubt you would like PNG), here are the links: Hello.
that's what i got from my valgrind around the time i made the patch: ==7597== Invalid read of size 4 and many similar hits in win_build_shadow(), win_paint_shadow() and AH! i managed to reproduce this. i attached valgrind log against rev still can't say how one can reliable reproduce this though. %-( it's i'll try to write a simple X11 program to trigger the bug. |
Thanks for the log. I'm able to reproduce the issue, but it's very hard to reproduce as seemingly it's highly timing-related. I need to repeat it for hundreds of times to reproduce once... Still hunting it, hold on. |
- Fix a bug that w->prev_trans sometimes points to freed memory. Probably related to #165. - Add some more debugging printf()-s under DEBUG_EVENTS.
Heh, now this is a bit annoying... What I reproduced looks like a different bug, which I fixed in aeda148 ( I would be grateful if you could pull from By the way, your valgrind indicates |
This commit has been contributed by someone who despises github's
force-https behaviour and who didn't find upstream email contact
to send a patch; feel free to adapt it as you like, copyright is
assigned to upstream.
Here's a reference to quite tangential posting in Russian regarding
a completely different discussion that resulted in me proposing
to proxy the patches considered worthwile (I know that person online
for some time and he seems knowledgeable albeit rough):
http://www.opennet.ru/openforum/vsluhforumID3/93380.html#172
HTH