Received: from mx1.tetrasec.net (mx1.tetrasec.net [66.245.176.36]) by nld3-dev1.alpinelinux.org (Postfix) with ESMTPS id B065C782C03 for ; Sat, 9 May 2020 11:03:34 +0000 (UTC) Received: from mx1.tetrasec.net (mail.local [127.0.0.1]) by mx1.tetrasec.net (Postfix) with ESMTP id 4FDFC8F888; Sat, 9 May 2020 11:03:33 +0000 (UTC) Received: from ncopa-desktop.copa.dup.pw (67.63.200.37.customer.cdi.no [37.200.63.67]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: alpine@tanael.org) by mx1.tetrasec.net (Postfix) with ESMTPSA id A29DC8F887; Sat, 9 May 2020 11:03:32 +0000 (UTC) Date: Sat, 9 May 2020 13:03:27 +0200 From: Natanael Copa To: Vittorio Mori Cc: alpine-user@lists.alpinelinux.org Subject: Re: Mbuffer segfaults Message-ID: <20200509130013.09fa5f1e@ncopa-desktop.copa.dup.pw> In-Reply-To: References: X-Mailer: Claws Mail 3.17.5 (GTK+ 2.24.32; x86_64-alpine-linux-musl) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Sat, 9 May 2020 00:10:41 +0200 Vittorio Mori wrote: > I'm trying to use mbuffer to speed up ZFS send on my servers. > > The package present in edge/testing segfaults. > > I tried to compile it from source, same result: segfault. > > There's a way to make it work ? Any pointers ? Seems like there is a new version (20200505). Have you tried that? Otherwise I'd recommend to build it with debugging symbols, run it in gdb (or generate core dump) and use gdb to generate a backtrace. This should be reported upstream to mbuffer developer(s). Common cases for segfaults are threading applications assumes that thread stack size is huge, so thats where I'd start. Alternatively, you could file an issue with all the details (architecture, exact version, and how to reproduce) on our bugtracker and someone with the know how and time can help you. https://gitlab.alpinelinux.org/alpine/aports/-/issues -nc