[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Problem with recent tar on NetBSD/sparc-1.5
From: |
Adrian Bunk |
Subject: |
Re: Problem with recent tar on NetBSD/sparc-1.5 |
Date: |
Sun, 9 Sep 2001 02:57:46 +0200 (CEST) |
On Sat, 8 Sep 2001, Paul Eggert wrote:
> > Date: Sun, 9 Sep 2001 01:13:18 +0200 (CEST)
> > From: Adrian Bunk <address@hidden>
>
> > 1488 tar CALL wait4(0x5d1,0xeffff5f4,0,0)
> > 1488 tar RET wait4 1489/0x5d1
> > 1488 tar CALL getuid
> > 1488 tar RET getuid 30313/0x7669
> > 1488 tar CALL geteuid
> > 1488 tar RET geteuid 30313/0x7669
> > 1488 tar CALL getgid
> > 1488 tar RET getgid 30313/0x7669
> > 1488 tar CALL getegid
> > 1488 tar RET getegid 30313/0x7669
> > 1488 tar CALL write(0x2,0xefffed28,0x5)
> > 1488 tar GIO fd 2 wrote 5 bytes
> > "tar: "
> > 1488 tar RET write 5
> > 1488 tar CALL write(0x2,0xefffed90,0x19)
> > 1488 tar GIO fd 2 wrote 25 bytes
> > "Child died with signal 13"
>
> It sounds like gzip is dying with signal 13, which I assume is
> SIGPIPE. It used to be that tar ignored all failures of the
Yse, signal 13 is SIGPIPE.
> underlying gzip process, but starting with 1.13.18 it started
> reporting them, and that must be what you're running into.
>
> Can you please go back a little further in the kdump output, and find
> the area around the last successful read by tar from the gzip pipe?
<-- snip -->
...
1488 tar GIO fd 3 read 8 bytes
"\0\0\0\0\0\0\0\0"
1488 tar RET read 4096/0x1000
1488 tar CALL read(0x3,0x4b000,0x800)
1488 tar GIO fd 3 read 2048 bytes
"ImageMagick-5.3.8/PerlMagick/t/zlib/write.t\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0000000644\0000000024\0000000024\00000000001045\00007\
343024563\000014076\0 \0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0#!/usr/local/bin/perl
#
# Test writing files using zlib-based compression
#
# Contributed by Bob Friesenhahn <address@hidden>
#
BEGIN { $| = 1; $test=1; print "1..1\134n"; }
END {print "not ok $test\134n" unless $loaded;}
use Image::Magick;
$loaded=1;
require 't/subroutines.pl';
chdir 't/zlib' || die 'Cd failed';
#
# 1) Test writing Zip-compressed MIFF
#
testReadWrite( 'input.miff',
'output.miff',
q/compress=>'Zip'/,
'25b14945dc0131b7010b1fadb5249ad38ad9b8fdc3e0c7a9c56590940fd9734a' )\
;
$test = 0; # Quench PERL compliaint
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\
\0\0\0\0\0\0\0"
1488 tar RET read 2048/0x800
1488 tar CALL write(0x4,0x49000,0x1a8d)
1488 tar GIO fd 4 wrote 4088 bytes
...
<-- snip -->
> Also, can you send the number of bytes returned by the last 10 or so
> successful reads from that pipe?
The last successful reads were:
<-- snip -->
1488 tar GIO fd 3 read 2048 bytes
1488 tar GIO fd 3 read 4088 bytes
1488 tar GIO fd 3 read 8 bytes
1488 tar GIO fd 3 read 4088 bytes
1488 tar GIO fd 3 read 8 bytes
1488 tar GIO fd 3 read 2048 bytes
1488 tar GIO fd 3 read 4088 bytes
1488 tar GIO fd 3 read 8 bytes
1488 tar GIO fd 3 read 4088 bytes
1488 tar GIO fd 3 read 8 bytes
1488 tar GIO fd 3 read 2048 bytes
1488 tar GIO fd 3 read 4088 bytes
1488 tar GIO fd 3 read 8 bytes
1488 tar GIO fd 3 read 4088 bytes
1488 tar GIO fd 3 read 8 bytes
1488 tar GIO fd 3 read 2048 bytes
<-- snip -->
> Also, please also look in the kdump output and see what gzip was doing
> just before it died.
I can't see it. If it helps you you an find the complete kdump output at
[1].
> Thanks.
>
cu
Adrian
[1] http://www.fs.tum.de/~bunk/tar-out.bz2www.fs.tum.de/~bunk/tar-out.bz2
--
Get my GPG key: finger address@hidden | gpg --import
Fingerprint: B29C E71E FE19 6755 5C8A 84D4 99FC EA98 4F12 B400