It's like a binary search!!! actually, it IS a binary search!!!

El 10 de septiembre de 2011 02:37, Carsten Haitzler
<[email protected]>escribió:

> On Fri, 09 Sep 2011 19:29:07 -0500 Jeff Hoogland <[email protected]>
> said:
>
> :-P i guess. :) but bisecting revisions. ok example:
>
> last known "good" rev is 63000. current "bad" rev is 64000. so check out
> rev
> 63500 and recompile everything and test - is bug there? if so, then bug
> must be
> between 63000 and 63500. if not bug must be between 63500 and 64000. so..
> cut
> the space in half again. let's say the bug is not there in 63500, so check
> out
> 63750 (bisection of 63500 and 64000) and repeat until you find the bug.
> technically you should only need to do this about 10 times to actually find
> the
> bug inside a 1000 revision interval. there's tools to help:
>
> http://search.cpan.org/dist/App-SVN-Bisect/bin/svn-bisect
>
> so with such a tool - you start a bisect by giving a revision range you
> know
> the bug was introduced in: "svn-bisect --min 63000 --max 64000 start" for
> example, (use your entire svn tree, so cd to trunk when you start), then
> recompile & install, test to see if bug is there, if bug is, then do
> "svn-bisect
> bad", if not, "svn bisect good". just repeat until it narrrows down to 1
> revision (and then that rev is either bad or good and thus that specific
> commit
> put the bug in). now you're done - email that rev # back and svn-bisect
> reset
> and recompile +install to be back to where u started (with the bug).
>
> > Like bisecting an angle? :p
> > --
> > ~Jeff Hoogland
> > http://JeffHoogland.com
> >
> > On Fri Sep   9 2011 05:40:42 PM CDT, Carsten Haitzler <
> [email protected]>
> > wrote:
> >
> > > On Fri, 9 Sep 2011 13:06:04 -0500 Jeff Hoogland <[email protected]
> >
> > > said:
> > >
> > > bisect time. :) (you do know what bisecting is right?)
> > >
> > > > I believe it happened after the first. Will have to check my logs to
> > > > see which day I built things prior to the 6th that was OK.
> > > >
> > > > On Fri, Sep 9, 2011 at 9:25 AM, Carsten Haitzler
> > > > <[email protected]>wrote:
> > > >
> > > > > On Fri, 9 Sep 2011 09:42:37 +0200 Cedric BAIL <[email protected]
> >
> > > > > said:
> > > > >
> > > > > > On Fri, Sep 9, 2011 at 5:27 AM, Jeff Hoogland
> > > > > > <[email protected]>
> > > > > wrote:
> > > > > > > Anyone else notice a memory issue in recent E builds (of course
> > > > > > > I find
> > > > > this
> > > > > > > issue right after a Bodhi release). I came home after leaving
> my
> > > > > > > laptop
> > > > > on
> > > > > > > all night and Enlightenment was eating up 1.3GB of RAM!
> > > > > > > Restarting E promptly caused it to drop back to it's normal
> > > > > > > 30-40meg range.
> > > > > >
> > > > > > Please tell us the svn revision. Mine is 62822 and is staying at
> > > > > > 22meg since 3 days. It could also be an issue with a module.
> > > > >
> > > > > actually i see it - it's there. open apps menu for example and
> > > > > settings dialogs
> > > > > a few times. mem goes up and never comes back down no matter what.
> > > > >
> > > > > problem - i can't dig it out right now. i'm travelling and memprof
> > > > > just doesnt
> > > > > want to work on 64bit.
> > > > >
> > > > > jeff - could you do some svn revision bisecting and see what svn
> > > > > revision change caused the leak to appear?
> > > > >
> > > > >
> > > > > --
> > > > > ------------- Codito, ergo sum - "I code, therefore I am"
> > > > > -------------- The Rasterman (Carsten Haitzler)
> > > > > [email protected]
> > > > >
> > > > >
> > > > >
> > > > >
> ------------------------------------------------------------------------------
> > > > > Why Cloud-Based Security and Archiving Make Sense
> > > > > Osterman Research conducted this study that outlines how and why
> > > > > cloud computing security and archiving is rapidly being adopted
> > > > > across the IT space for its ease of implementation, lower cost, and
> > > > > increased reliability. Learn more.
> > > > > http://www.accelacomm.com/jaw/sfnl/114/51425301/
> > > > > _______________________________________________ enlightenment-users
> > > > > mailing list [email protected]
> > > > > https://lists.sourceforge.net/lists/listinfo/enlightenment-users
> > > > >
> > > >
> > > >
> > > >
> > > > --
> > > > ~Jeff Hoogland <http://jeffhoogland.com/>
> > > > Thoughts on Technology <http://jeffhoogland.blogspot.com/>, Tech
> Blog
> > > > Bodhi Linux <http://bodhilinux.com/>, Enlightenment for your Desktop
> > > >
> ------------------------------------------------------------------------------
> > > > Why Cloud-Based Security and Archiving Make Sense
> > > > Osterman Research conducted this study that outlines how and why
> cloud
> > > > computing security and archiving is rapidly being adopted across the
> > > > IT   space for its ease of implementation, lower cost, and increased
> > > > reliability. Learn more.
> > > > http://www.accelacomm.com/jaw/sfnl/114/51425301/
> > > > _______________________________________________ enlightenment-users
> > > > mailing list [email protected]
> > > > https://lists.sourceforge.net/lists/listinfo/enlightenment-users
> > > >
> > >
> > >
> > > --
> > > ------------- Codito, ergo sum - "I code, therefore I am"
> --------------
> > > The Rasterman (Carsten Haitzler)       [email protected]
> > >
> >
> >
> ------------------------------------------------------------------------------
> > Malware Security Report: Protecting Your Business, Customers, and the
> > Bottom Line. Protect your business and customers by understanding the
> > threat from malware and how it can impact your online business.
> > http://www.accelacomm.com/jaw/sfnl/114/51427462/
> > _______________________________________________
> > enlightenment-users mailing list
> > [email protected]
> > https://lists.sourceforge.net/lists/listinfo/enlightenment-users
>
>
> --
> ------------- Codito, ergo sum - "I code, therefore I am" --------------
> The Rasterman (Carsten Haitzler)    [email protected]
>
>
>
> ------------------------------------------------------------------------------
> Malware Security Report: Protecting Your Business, Customers, and the
> Bottom Line. Protect your business and customers by understanding the
> threat from malware and how it can impact your online business.
> http://www.accelacomm.com/jaw/sfnl/114/51427462/
> _______________________________________________
> enlightenment-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/enlightenment-users
>



-- 
Wido
------------------------------------------------------------------------------
Malware Security Report: Protecting Your Business, Customers, and the 
Bottom Line. Protect your business and customers by understanding the 
threat from malware and how it can impact your online business. 
http://www.accelacomm.com/jaw/sfnl/114/51427462/
_______________________________________________
enlightenment-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/enlightenment-users

Reply via email to