Message243753
| Author |
eric.snow |
| Recipients |
Arfrever, alex, asvetlov, benjamin.peterson, eric.araujo, eric.smith, eric.snow, ezio.melotti, flox, gregory.p.smith, introom, josh.r, ned.deily, pitrou, refi64, rhettinger, scoder, serhiy.storchaka, tonn81, westurner, yselivanov |
| Date |
2015年05月21日.14:09:56 |
| SpamBayes Score |
-1.0 |
| Marked as misclassified |
Yes |
| Message-id |
<1432217396.66.0.730527505157.issue16991@psf.upfronthosting.co.za> |
| In-reply-to |
| Content |
Cool. The following gives consistent failures at certain seed values:
for i in `seq 1 100`; do echo $i; PYTHONHASHSEED=$i ./python -m test.regrtest -m test_basic test_configparser ; done
Through 100 I get segfaults with 7, 15, 35, 37, 39, 40, 42, 47, 50, 66, 67, 85, 87, 88, and 92. The distribution is probably essentially uniform across the full set of seeds, even if the exact pattern of failures isn't precisely uniform. I'll try to see why those hashes are significant here. If I can't figured it out quickly then I'll post about it on python-dev.
My hunch is that the hash randomization impacts either dict/odict resizing or dict/odict lookup (or both). TBH, I've been pretty sure for a while that the segfault is coming out of one of those two. |
|
History
|
|---|
| Date |
User |
Action |
Args |
| 2015年05月21日 14:09:56 | eric.snow | set | recipients:
+ eric.snow, rhettinger, gregory.p.smith, pitrou, scoder, eric.smith, benjamin.peterson, ned.deily, ezio.melotti, eric.araujo, Arfrever, alex, asvetlov, flox, serhiy.storchaka, yselivanov, westurner, refi64, josh.r, tonn81, introom |
| 2015年05月21日 14:09:56 | eric.snow | set | messageid: <1432217396.66.0.730527505157.issue16991@psf.upfronthosting.co.za> |
| 2015年05月21日 14:09:56 | eric.snow | link | issue16991 messages |
| 2015年05月21日 14:09:56 | eric.snow | create |
|