From unknown Tue Sep 09 02:55:08 2025 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Mailer: MIME-tools 5.509 (Entity 5.509) Content-Type: text/plain; charset=utf-8 From: bug#3021 <3021@debbugs.gnu.org> To: bug#3021 <3021@debbugs.gnu.org> Subject: Status: 23.0.92; MEM FULL on Windows after some VC operations Reply-To: bug#3021 <3021@debbugs.gnu.org> Date: Tue, 09 Sep 2025 09:55:08 +0000 retitle 3021 23.0.92; MEM FULL on Windows after some VC operations reassign 3021 emacs,w32 submitter 3021 Reiner Steib severity 3021 important thanks From reinersteib+gmane@imap.cc Thu Apr 16 12:30:05 2009 Received: (at submit) by emacsbugs.donarmstrong.com; 16 Apr 2009 19:30:06 +0000 X-Spam-Checker-Version: SpamAssassin 3.2.5-bugs.debian.org_2005_01_02 (2008-06-10) on rzlab.ucr.edu X-Spam-Level: *** X-Spam-Bayes: score:0.5 Bayes not run. spammytokens:Tokens not available. hammytokens:Tokens not available. X-Spam-Status: No, score=3.8 required=4.0 tests=FOURLA,FVGT_m_MULTI_ODD, IMPRONONCABLE_1,IMPRONONCABLE_2,MURPHY_WRONG_WORD2,PHONENUMBER autolearn=no version=3.2.5-bugs.debian.org_2005_01_02 Received: from fencepost.gnu.org (fencepost.gnu.org [140.186.70.10]) by rzlab.ucr.edu (8.13.8/8.13.8/Debian-3) with ESMTP id n3GJTsCc016489 for ; Thu, 16 Apr 2009 12:29:55 -0700 Received: from mail.gnu.org ([199.232.76.166]:50870 helo=mx10.gnu.org) by fencepost.gnu.org with esmtp (Exim 4.67) (envelope-from ) id 1LuXHS-0006xx-T2 for emacs-pretest-bug@gnu.org; Thu, 16 Apr 2009 15:29:53 -0400 Received: from Debian-exim by monty-python.gnu.org with spam-scanned (Exim 4.60) (envelope-from ) id 1LuXHG-0005Yv-CA for emacs-pretest-bug@gnu.org; Thu, 16 Apr 2009 15:29:50 -0400 Received: from mail.uni-ulm.de ([134.60.1.11]:65115) by monty-python.gnu.org with esmtps (TLS-1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.60) (envelope-from ) id 1LuXHE-0005XL-Bn for emacs-pretest-bug@gnu.org; Thu, 16 Apr 2009 15:29:38 -0400 Received: from bridgekeeper.physik.uni-ulm.de (bridgekeeper.physik.uni-ulm.de [134.60.10.175]) by mail.uni-ulm.de (8.14.2/8.14.2) with ESMTP id n3GJTVh9014083 for ; Thu, 16 Apr 2009 21:29:31 +0200 (MEST) Received: from localhost (localhost [127.0.0.1]) by bridgekeeper.physik.uni-ulm.de (Postfix) with ESMTP id 78C0210032 for ; Thu, 16 Apr 2009 21:29:31 +0200 (CEST) From: Reiner Steib To: emacs-pretest-bug@gnu.org Subject: 23.0.92; MEM FULL on Windows after some VC operations X-Face: #vK]N[`vqjuod*|)'[iD7/"3AB-ApT%fmN"LWAg@oS7OesGv~)n[OBTLM#I="J'Y^-7I I/ps7o_'IK@#-Rs{::DZ@O8yS|fexe,XslY[:dNWOb~>?mC-&i_c)say:"\IpA.5U.b]'NY;Pks{lb h.+#6%DpZuaK3dcHB`Av3zc:r!C%~s0&m,tWj]&},qg.+0ww2gK%f!:GK|wMl.I!(voY*1"^li8"~B BNG)9LvPi?^DMR-GVDnZqhu*3Hi,+g=wFhI)BL6&u{EOVEHjVEVq~d?_}lMntWAc3(6?kftjc>_f>! g0wM(qPM$d5]^TT_Qyi&L?LGVG)SHN;Gk/,pkY9,~ Reply-To: Reiner Steib Mail-Copies-To: nobody Date: Thu, 16 Apr 2009 21:29:27 +0200 Message-ID: <87d4bcqtwo.fsf@marauder.physik.uni-ulm.de> User-Agent: Gnus/5.110011 (No Gnus v0.11) Emacs/22.1 (gnu/linux) MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="=-=-=" X-DCC-SIHOPE-DCC-3-Metrics: poseidon 1085; Body=1 Fuz1=1 Fuz2=1 X-Virus-Scanned: by amavisd-new X-detected-operating-system: by monty-python.gnu.org: Genre and OS details not recognized. --=-=-= Hi, with the latest precompiled pretest version for Windows (http://alpha.gnu.org/gnu/emacs/pretest/windows/emacs-23.0.92-bin-i386.zip), I got "!MEM FULL!" after doing some VC / PCL-CVS commands (viewing the revision log, diffs, ...) on rather big files. The repository is on a network share, i.e. no pserver, ssh, ... involved. As requested by Eli, I attach the information reported by Sysinternals' VMMap, both for the Emacs 23 process with "MEM FULL" and an Emacs 22.3 process on the same box. The laptop has 3 GB of memory. In GNU Emacs 23.0.92.1 (i386-mingw-nt6.0.6001) of 2009-03-31 on SOFT-MJASON Windowing system distributor `Microsoft Corp.', version 6.0.6001 configured using `configure --with-gcc (3.4)' Important settings: value of $LC_ALL: nil value of $LC_COLLATE: nil value of $LC_CTYPE: nil value of $LC_MESSAGES: nil value of $LC_MONETARY: nil value of $LC_NUMERIC: nil value of $LC_TIME: nil value of $LANG: DEU value of $XMODIFIERS: nil locale-coding-system: cp1252 default-enable-multibyte-characters: t Bye, Reiner. -- ,,, (o o) ---ooO-(_)-Ooo--- | PGP key available | http://rsteib.home.pages.de/ --=-=-= Content-Disposition: attachment; filename=emacs-23-0-92-mem-full.txt Content-Description: Emacs 23 with MEM FULL Process: emacs.exe PID: 7068 Type Size Committed Total WS Private WS Shareable WS Shared WS Blocks Total 400.344 363.360 291.112 270.448 20.664 17.636 Image 58.468 58.468 12.568 5.820 6.748 3.728 297 Private 266.936 261.936 261.876 261.872 4 4 31 Shareable 43.964 31.900 13.432 13.432 13.424 30 Mapped File 7.188 7.188 468 468 468 4 Heap 6.976 2.568 1.476 1.464 12 12 28 Stack 16.384 872 864 864 6 System 428 428 428 428 Free 1.697.172 77 Address Type Size Committed Total WS Private WS Shareable WS Shared WS Blocks Protection Details 00010000 Heap (Mapped) 64 64 12 12 12 1 Read/Write Heap ID: 1 00020000 Private 4 4 4 4 1 Read/Write 00030000 Thread Stack 8.192 852 848 848 3 Read/Write Thread ID: 304 00030000 Reserved 7.340 Thread ID: 0 0075B000 Private 4 4 Read/Write/Guard Thread ID: 0 0075C000 Private 848 848 848 848 Read/Write Thread ID: 0 00830000 Shareable 16 16 16 16 16 1 Read 00840000 Shareable 8 8 8 8 1 Read 00850000 Private 4 4 4 4 1 Read/Write 00860000 Shareable 4 4 4 4 4 1 Read 00870000 Heap (Private) 64 16 16 16 2 Read/Write Heap ID: 3 00870000 Private 16 16 16 16 Read/Write Heap ID: 0 (Default) 00874000 Reserved 48 Heap ID: 0 (Default) 00880000 Image 72 72 68 56 12 12 5 Execute/Copy on Write C:\Windows\System32\btpload32.dll 00880000 Image 4 4 4 4 4 Read Header 00881000 Image 32 32 32 32 Execute/Read .text 00889000 Image 12 12 12 12 Read .rdata 0088C000 Image 12 12 12 12 Read/Write .data 0088F000 Image 4 4 4 4 4 Read .rsrc 00890000 Image 8 8 4 4 4 Read .reloc 008A0000 Shareable 4 4 4 4 4 1 Read 008B0000 Heap (Private) 1.024 692 660 660 2 Read/Write Heap ID: 0 (Default) 008B0000 Private 692 692 660 660 Read/Write Heap ID: 0 (Default) 0095D000 Reserved 332 Heap ID: 0 (Default) 009B0000 Mapped File 3.580 3.580 340 340 340 1 Read C:\Windows\System32\locale.nls 00D30000 Shareable 8 8 8 8 8 1 Read 00D40000 Shareable 8 8 8 8 8 1 Read 00D50000 Shareable 8 8 8 8 8 1 Read 00D60000 Shareable 8 8 8 8 8 1 Read 00D70000 Mapped File 4 4 4 4 4 1 Read C:\Windows\System32\oleaccrc.dll 00D80000 Shareable 4 4 4 4 4 1 Read 00D90000 Heap (Private) 64 64 64 64 1 Read/Write Heap ID: 2 00DA0000 Shareable 800 116 112 112 112 4 Read 00DA0000 Mapped 104 104 100 100 100 Read 00DBA000 Reserved 664 00E60000 Mapped 12 12 12 12 12 Read 00E63000 Reserved 20 00E70000 Shareable 1.036 1.036 184 184 184 1 Read 00F80000 Image 244 244 240 208 32 32 6 Execute/Copy on Write C:\Windows\System32\btprof32.dll 00F80000 Image 4 4 4 4 4 Read Header 00F81000 Image 160 160 156 156 Execute/Read .text 00FA9000 Image 36 36 36 28 8 8 Read .rdata 00FB2000 Image 24 24 24 24 Read/Write .data 00FB8000 Image 4 4 4 4 4 Copy on write .tls 00FB9000 Image 4 4 4 4 4 Read .rsrc 00FBA000 Image 12 12 12 12 12 Read .reloc 00FC0000 Shareable 4 4 4 4 4 1 Read/Write 00FD0000 Shareable 4 4 4 4 4 1 Read 00FE0000 Heap (Private) 64 64 64 64 1 Read/Write Heap ID: 5 00FF0000 Mapped File 24 24 24 24 24 1 Read C:\Windows\Registration\R000000000007.clb 01000000 Image 32.060 32.060 7.856 5.012 2.844 43 Execute/Copy on Write C:\Users\Public\Software\GNU\emacs-23.0.92\bin\emacs.exe 01000000 Image 4 4 4 4 Read Header 01001000 Image 1.512 1.512 1.420 1.420 Execute/Read .text 0117B000 Image 12 12 12 12 Read/Write .data 0117E000 Image 672 672 656 656 Copy on write .data 01226000 Image 4 4 4 4 Read/Write .data 01227000 Image 608 608 556 556 Copy on write .data 012BF000 Image 4 4 4 4 Read/Write .data 012C0000 Image 8 8 8 8 Copy on write .data 012C2000 Image 4 4 4 4 Read/Write .data 012C3000 Image 8 8 8 8 Copy on write .data 012C5000 Image 4 4 4 4 Read/Write .data 012C6000 Image 96 96 96 96 Read .rdata 012DE000 Image 36 36 36 36 Read/Write .bss 012E7000 Image 144 144 Copy on write .bss 0130B000 Image 12 12 12 12 Read/Write .bss 0130E000 Image 4 4 Copy on write .bss 0130F000 Image 12 12 12 12 Read/Write .bss 01312000 Image 4 4 4 4 Copy on write .bss 01313000 Image 64 64 64 64 Read/Write .bss 01323000 Image 8 8 8 8 Copy on write .idata 01325000 Image 56 56 16 16 Copy on write .rsrc 01333000 Image 4 4 No access /4 01334000 Image 112 112 No access /19 01350000 Image 1.816 1.816 No access /35 01516000 Image 72 72 No access /47 01528000 Image 280 280 No access /61 0156E000 Image 100 100 No access /73 01587000 Image 48 48 No access /86 01593000 Image 21.052 21.052 No access /97 02A22000 Image 116 116 No access /112 02A3F000 Image 136 136 136 136 Read/Write EMHEAP 02A61000 Image 44 44 Copy on write EMHEAP 02A6C000 Image 588 588 588 588 Read/Write EMHEAP 02AFF000 Image 4 4 4 4 Copy on write EMHEAP 02B00000 Image 40 40 40 40 Read/Write EMHEAP 02B0A000 Image 104 104 Copy on write EMHEAP 02B24000 Image 12 12 12 12 Read/Write EMHEAP 02B27000 Image 60 60 44 44 Copy on write EMHEAP 02B36000 Image 576 576 576 576 Read/Write EMHEAP 02BC6000 Image 24 24 Copy on write EMHEAP 02BCC000 Image 3.004 3.004 3.004 3.004 Read/Write EMHEAP 02EBB000 Image 8 8 8 8 Copy on write EMHEAP 02EBD000 Image 4 4 4 4 Read/Write EMHEAP 02EBE000 Image 4 4 4 4 Copy on write EMHEAP 02EBF000 Image 4 4 4 4 Read/Write EMHEAP 02EC0000 Image 4 4 4 4 Copy on write EMHEAP 02EC1000 Image 4 4 4 4 Read/Write EMHEAP 02EC2000 Image 4 4 4 4 Copy on write EMHEAP 02EC3000 Image 452 452 452 452 Read/Write EMHEAP 02F34000 Image 56 56 Copy on write EMHEAP 02F42000 Image 40 40 40 40 Read/Write EMHEAP 02F4C000 Image 12 12 Copy on write EMHEAP 02F50000 Shareable 12.288 1.908 896 896 896 2 Read 02F50000 Mapped 1.908 1.908 896 896 896 Read 0312D000 Reserved 10.380 03B50000 Mapped File 3.580 3.580 100 100 100 1 Read C:\Windows\System32\locale.nls 03ED0000 Heap (Private) 1.024 96 96 96 2 Read/Write Heap ID: 2 03ED0000 Private 96 96 96 96 Read/Write Heap ID: 0 (Default) 03EE8000 Reserved 928 Heap ID: 0 (Default) 03FD0000 Private 64 4 2 No access 03FD0000 Private 4 4 Read/Write 03FD1000 Reserved 60 03FE0000 Private 4 4 4 4 1 Read/Write 03FF0000 Heap (Private) 64 4 4 4 2 Read/Write Heap ID: 6 03FF0000 Private 4 4 4 4 Read/Write Heap ID: 0 (Default) 03FF1000 Reserved 60 Heap ID: 0 (Default) 04000000 Private 128 16 12 12 2 No access 04000000 Private 16 16 12 12 Read/Write 04004000 Reserved 112 04020000 Private 128 4 4 4 2 Read/Write 04020000 Private 4 4 4 4 Read/Write 04021000 Reserved 124 04040000 Heap (Private) 256 104 104 104 2 Read/Write Heap ID: 9 04040000 Private 104 104 104 104 Read/Write Heap ID: 0 (Default) 0405A000 Reserved 152 Heap ID: 0 (Default) 04080000 Heap (Private) 64 24 24 24 2 Read/Write Heap ID: 4 04080000 Private 24 24 24 24 Read/Write Heap ID: 0 (Default) 04086000 Reserved 40 Heap ID: 0 (Default) 04090000 Shareable 704 704 268 268 268 1 Read 04140000 Image 72 72 68 52 16 16 7 Execute/Copy on Write C:\Program Files\Lenovo\HOTKEY\HKVOLKEY.dll 04140000 Image 4 4 4 4 4 Read Header 04141000 Image 36 36 36 36 Execute/Read .text 0414A000 Image 8 8 8 4 4 4 Read .rdata 0414C000 Image 4 4 4 4 Read/Write .data 0414D000 Image 4 4 Copy on write .data 0414E000 Image 8 8 8 8 Read/Write .data 04150000 Image 4 4 4 4 4 Read .rsrc 04151000 Image 4 4 4 4 4 Read .reloc 04160000 Private 4 4 4 4 1 Read/Write 04170000 Heap (Private) 1.024 1.024 16 16 1 Read/Write Heap ID: 7 04270000 Heap (Private) 1.024 196 196 196 2 Read/Write Heap ID: 5 04270000 Private 196 196 196 196 Read/Write Heap ID: 0 (Default) 042A1000 Reserved 828 Heap ID: 0 (Default) 04370000 Private 512 4 4 4 2 Read/Write 04370000 Private 4 4 4 4 Read/Write 04371000 Reserved 508 043F0000 Private 4 4 4 4 1 Read/Write 04400000 Private 4 4 4 4 1 Read/Write 04410000 Private 4 4 4 4 1 Read/Write 04420000 Private 4 4 4 4 1 Read/Write 04430000 Heap (Private) 64 8 8 8 2 Read/Write Heap ID: 10 04430000 Private 8 8 8 8 Read/Write Heap ID: 0 (Default) 04432000 Reserved 56 Heap ID: 0 (Default) 04440000 Private 4 4 4 4 1 Read/Write 04450000 Heap (Private) 64 40 40 40 2 Read/Write Heap ID: 8 04450000 Private 40 40 40 40 Read/Write Heap ID: 0 (Default) 0445A000 Reserved 24 Heap ID: 0 (Default) 04460000 Heap (Private) 1.024 72 72 72 2 Read/Write Heap ID: 8 04460000 Private 72 72 72 72 Read/Write Heap ID: 0 (Default) 04472000 Reserved 952 Heap ID: 0 (Default) 04560000 Shareable 4.096 4.096 64 64 64 1 Read 04960000 Heap (Private) 1.024 72 72 72 2 Read/Write Heap ID: 11 04960000 Private 72 72 72 72 Read/Write Heap ID: 0 (Default) 04972000 Reserved 952 Heap ID: 0 (Default) 04A60000 Private 4 4 4 4 1 Read/Write 04B50000 Heap (Private) 64 28 28 28 2 Read/Write Heap ID: 11 04B50000 Private 28 28 28 28 Read/Write Heap ID: 0 (Default) 04B57000 Reserved 36 Heap ID: 0 (Default) 04C00000 Shareable 4.096 4.096 1 Read 05000000 Shareable 4.096 4.096 156 156 156 1 Read 05400000 Private 4.096 12 12 12 4 Read/Write 05400000 Private 4 4 4 4 Read/Write 05401000 Reserved 16 05405000 Private 8 8 8 8 Read/Write 05407000 Reserved 4.068 05800000 Thread Stack 8.192 20 16 16 3 Read/Write Thread ID: 3284 05800000 Reserved 8.172 Thread ID: 0 05FFB000 Private 4 4 Read/Write/Guard Thread ID: 0 05FFC000 Private 16 16 16 16 Read/Write Thread ID: 0 06000000 Shareable 4.096 4.096 96 96 96 1 Read 06400000 Shareable 2.712 2.712 2.700 2.700 2.700 1 Read/Write 066B0000 Shareable 2.540 2.540 2.528 2.528 2.528 1 Read/Write 06930000 Shareable 2.280 2.280 2.272 2.272 2.272 1 Read/Write 07760000 Shareable 3.980 3.980 3.980 3.980 3.980 1 Read/Write 10000000 Image 68 68 60 12 48 48 5 Execute/Copy on Write C:\PROGRA~1\KL\WS\r3hook.dll 10000000 Image 4 4 4 4 4 Read Header 10001000 Image 36 36 36 36 36 Execute/Read .text 1000A000 Image 12 12 8 4 4 4 Read .rdata 1000D000 Image 8 8 8 8 Read/Write .data 1000F000 Image 4 4 4 4 4 Read .rsrc 10010000 Image 4 4 Read .reloc 10050000 Private 261.824 261.772 261.720 261.720 2 No access 10050000 Private 261.772 261.772 261.720 261.720 Read/Write 1FFF3000 Reserved 52 6D570000 Image 156 156 112 16 96 6 Execute/Copy on Write C:\Windows\System32\crtdll.dll 6D570000 Image 4 4 4 4 Read Header 6D571000 Image 116 116 88 4 84 Execute/Read .text 6D58E000 Image 8 8 8 8 Read/Write .data 6D590000 Image 12 12 4 4 Copy on write .data 6D593000 Image 4 4 4 4 Read/Write .data 6D594000 Image 4 4 4 4 Read .rsrc 6D595000 Image 8 8 Read .reloc 6FFF0000 Private 64 64 64 64 1 Execute/Read/Write 70A80000 Image 56 56 52 8 44 8 Execute/Copy on Write C:\Users\Public\Software\GNU\emacs-23.0.92\bin\libXpm.dll 70A80000 Image 4 4 4 4 Read Header 70A81000 Image 28 28 28 28 Execute/Read .text 70A88000 Image 4 4 4 4 Copy on write .data 70A89000 Image 4 4 4 4 Read .rdata 70A8A000 Image 4 4 4 4 Read/Write .bss 70A8B000 Image 4 4 4 4 Read .edata 70A8C000 Image 4 4 4 4 Read/Write .idata 70A8D000 Image 4 4 Read .reloc 712F0000 Image 880 880 100 20 80 80 8 Execute/Copy on Write C:\Windows\System32\dbghelp.dll 712F0000 Image 4 4 4 4 4 Read Header 712F1000 Image 732 732 76 4 72 72 Execute/Read .text 713A8000 Image 4 4 4 4 Read/Write .data 713A9000 Image 4 4 Copy on write .data 713AA000 Image 8 8 8 8 Read/Write .data 713AC000 Image 88 88 Copy on write .data 713C2000 Image 4 4 4 4 Read/Write .data 713C3000 Image 4 4 4 4 4 Read .rsrc 713C4000 Image 32 32 Read .reloc 72230000 Image 76 76 52 8 44 44 4 Execute/Copy on Write C:\Windows\System32\ntlanman.dll 72230000 Image 4 4 4 4 4 Read Header 72231000 Image 60 60 40 4 36 36 Execute/Read .text 72240000 Image 4 4 4 4 Read/Write .data 72241000 Image 4 4 4 4 4 Read .rsrc 72242000 Image 4 4 Read .reloc 72250000 Image 60 60 44 8 36 20 4 Execute/Copy on Write C:\Windows\System32\davclnt.dll 72250000 Image 4 4 4 4 4 Read Header 72251000 Image 44 44 32 4 28 12 Execute/Read .text 7225C000 Image 4 4 4 4 Read/Write .data 7225D000 Image 4 4 4 4 4 Read .rsrc 7225E000 Image 4 4 Read .reloc 72260000 Image 32 32 28 8 20 20 4 Execute/Copy on Write C:\Windows\System32\drprov.dll 72260000 Image 4 4 4 4 4 Read Header 72261000 Image 16 16 16 4 12 12 Execute/Read .text 72265000 Image 4 4 4 4 Read/Write .data 72266000 Image 4 4 4 4 4 Read .rsrc 72267000 Image 4 4 Read .reloc 722D0000 Image 44 44 40 8 32 32 4 Execute/Copy on Write C:\Windows\System32\cscapi.dll 722D0000 Image 4 4 4 4 4 Read Header 722D1000 Image 28 28 28 4 24 24 Execute/Read .text 722D8000 Image 4 4 4 4 Read/Write .data 722D9000 Image 4 4 4 4 4 Read .rsrc 722DA000 Image 4 4 Read .reloc 72D30000 Image 264 264 80 12 68 68 5 Execute/Copy on Write C:\Windows\System32\winspool.drv 72D30000 Image 4 4 4 4 4 Read Header 72D31000 Image 192 192 64 4 60 60 Execute/Read .text 72D61000 Image 4 4 Copy on write .data 72D62000 Image 8 8 8 8 Read/Write .data 72D64000 Image 44 44 4 4 4 Read .rsrc 72D6F000 Image 12 12 Read .reloc 742F0000 Image 228 228 36 8 28 28 5 Execute/Copy on Write C:\Windows\System32\oleacc.dll 742F0000 Image 4 4 4 4 4 Read Header 742F1000 Image 176 176 24 4 20 20 Execute/Read .text 7431D000 Image 4 4 Execute/Read .orpc 7431E000 Image 4 4 4 4 Read/Write .data 7431F000 Image 4 4 Copy on write .data 74320000 Image 24 24 4 4 4 Read .rsrc 74326000 Image 12 12 Read .reloc 74800000 Image 200 200 40 12 28 28 5 Execute/Copy on Write C:\Windows\System32\winmm.dll 74800000 Image 4 4 4 4 4 Read Header 74801000 Image 152 152 24 4 20 20 Execute/Read .text 74827000 Image 8 8 8 8 Read/Write .data 74829000 Image 4 4 Copy on write .data 7482A000 Image 4 4 Read .guids 7482B000 Image 16 16 4 4 4 Read .rsrc 7482F000 Image 12 12 Read .reloc 749A0000 Image 252 252 136 8 128 128 5 Execute/Copy on Write C:\Windows\System32\uxtheme.dll 749A0000 Image 4 4 4 4 4 Read Header 749A1000 Image 220 220 120 4 116 116 Execute/Read .text 749D8000 Image 4 4 4 4 Read/Write .data 749D9000 Image 12 12 4 4 4 Copy on write .data 749DC000 Image 4 4 4 4 4 Read .rsrc 749DD000 Image 8 8 Read .reloc 75620000 Image 80 80 60 8 52 52 4 Execute/Copy on Write C:\Windows\System32\mpr.dll 75620000 Image 4 4 4 4 4 Read Header 75621000 Image 64 64 48 4 44 44 Execute/Read .text 75631000 Image 4 4 4 4 Read/Write .data 75632000 Image 4 4 4 4 4 Read .rsrc 75633000 Image 4 4 Read .reloc 756C0000 Image 468 468 72 32 40 40 7 Execute/Copy on Write C:\Windows\System32\netapi32.dll 756C0000 Image 4 4 4 4 4 Read Header 756C1000 Image 400 400 36 4 32 32 Execute/Read .text 75725000 Image 8 8 8 8 Read/Write .data 75727000 Image 12 12 Copy on write .data 7572A000 Image 20 20 20 20 Read/Write .data 7572F000 Image 8 8 Copy on write .data 75731000 Image 4 4 4 4 4 Read .rsrc 75732000 Image 12 12 Read .reloc 757F0000 Image 1.656 1.656 200 16 184 184 7 Execute/Copy on Write C:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.6001.18000_none_5cdbaa5a083979cc\comctl32.dll 757F0000 Image 4 4 4 4 4 Read Header 757F1000 Image 1.280 1.280 176 4 172 172 Execute/Read .text 75931000 Image 4 4 4 4 Read/Write .data 75932000 Image 4 4 Copy on write .data 75933000 Image 8 8 8 8 Read/Write .data 75935000 Image 40 40 4 4 4 Copy on write .data 7593F000 Image 260 260 4 4 4 Read .rsrc 75980000 Image 56 56 Read .reloc 75B90000 Image 176 176 56 8 48 48 4 Execute/Copy on Write C:\Windows\System32\apphelp.dll 75B90000 Image 4 4 4 4 4 Read Header 75B91000 Image 156 156 44 4 40 40 Execute/Read .text 75BB8000 Image 4 4 4 4 Read/Write .data 75BB9000 Image 4 4 4 4 4 Read .rsrc 75BBA000 Image 8 8 Read .reloc 75BF0000 Image 80 80 28 8 20 20 4 Execute/Copy on Write C:\Windows\System32\secur32.dll 75BF0000 Image 4 4 4 4 4 Read Header 75BF1000 Image 64 64 16 4 12 12 Execute/Read .text 75C01000 Image 4 4 4 4 Read/Write .data 75C02000 Image 4 4 4 4 4 Read .rsrc 75C03000 Image 4 4 Read .reloc 75D50000 Image 28 28 20 8 12 12 4 Execute/Copy on Write C:\Windows\System32\psapi.dll 75D50000 Image 4 4 4 4 4 Read Header 75D51000 Image 12 12 8 4 4 4 Execute/Read .text 75D54000 Image 4 4 4 4 Read/Write .data 75D55000 Image 4 4 4 4 4 Read .rsrc 75D56000 Image 4 4 Read .reloc 75D80000 Image 11.328 11.328 232 48 184 180 7 Execute/Copy on Write C:\Windows\System32\shell32.dll 75D80000 Image 4 4 4 4 4 Read Header 75D81000 Image 3.528 3.528 156 8 148 144 Execute/Read .text 760F3000 Image 32 32 32 32 Read/Write .data 760FB000 Image 36 36 Copy on write .data 76104000 Image 8 8 8 8 Read/Write .data 76106000 Image 16 16 8 8 8 Copy on write .data 7610A000 Image 7.516 7.516 24 24 24 Read .rsrc 76861000 Image 188 188 Read .reloc 76990000 Image 1.296 1.296 192 24 168 168 5 Execute/Copy on Write C:\Windows\System32\ole32.dll 76990000 Image 4 4 4 4 4 Read Header 76991000 Image 1.176 1.176 156 4 152 152 Execute/Read .text 76AB7000 Image 28 28 8 8 8 Execute/Read .orpc 76ABE000 Image 20 20 20 20 Read/Write .data 76AC3000 Image 8 8 Copy on write .data 76AC5000 Image 8 8 4 4 4 Read .rsrc 76AC7000 Image 52 52 Read .reloc 76AE0000 Image 300 300 100 8 92 92 5 Execute/Copy on Write C:\Windows\System32\gdi32.dll 76AE0000 Image 4 4 4 4 4 Read Header 76AE1000 Image 276 276 84 4 80 80 Execute/Read .text 76B26000 Image 4 4 4 4 Read/Write .data 76B27000 Image 4 4 4 4 4 Copy on write .data 76B28000 Image 4 4 4 4 4 Read .rsrc 76B29000 Image 8 8 Read .reloc 76B30000 Image 528 528 228 16 212 212 5 Execute/Copy on Write C:\Windows\System32\clbcatq.dll 76B30000 Image 4 4 4 4 4 Read Header 76B31000 Image 480 480 208 4 204 204 Execute/Read .text 76BA9000 Image 12 12 12 12 Read/Write .data 76BAC000 Image 4 4 Copy on write .data 76BAD000 Image 8 8 4 4 4 Read .rsrc 76BAF000 Image 20 20 Read .reloc 76CF0000 Image 776 776 208 8 200 200 4 Execute/Copy on Write C:\Windows\System32\rpcrt4.dll 76CF0000 Image 4 4 4 4 4 Read Header 76CF1000 Image 688 688 184 4 180 180 Execute/Read .text 76D9D000 Image 44 44 12 12 12 Execute/Read .orpc 76DA8000 Image 4 4 4 4 Read/Write .data 76DA9000 Image 12 12 4 4 4 Read .rsrc 76DAC000 Image 24 24 Read .reloc 76DC0000 Image 460 460 44 8 36 36 5 Execute/Copy on Write C:\Windows\System32\comdlg32.dll 76DC0000 Image 4 4 4 4 4 Read Header 76DC1000 Image 316 316 28 4 24 24 Execute/Read .text 76E10000 Image 4 4 4 4 Read/Write .data 76E11000 Image 12 12 Copy on write .data 76E14000 Image 108 108 8 8 8 Read .rsrc 76E2F000 Image 16 16 Read .reloc 76E90000 Image 36 36 20 8 12 12 4 Execute/Copy on Write C:\Windows\System32\lpk.dll 76E90000 Image 4 4 4 4 4 Read Header 76E91000 Image 20 20 8 4 4 4 Execute/Read .text 76E96000 Image 4 4 4 4 Read/Write .data 76E97000 Image 4 4 4 4 4 Read .rsrc 76E98000 Image 4 4 Read .reloc 76EA0000 Image 564 564 64 16 48 48 4 Execute/Copy on Write C:\Windows\System32\oleaut32.dll 76EA0000 Image 4 4 4 4 4 Read Header 76EA1000 Image 516 516 44 4 40 40 Execute/Read .text 76F22000 Image 4 4 Execute/Read .orpc 76F23000 Image 12 12 12 12 Read/Write .data 76F26000 Image 4 4 4 4 4 Read .rsrc 76F27000 Image 24 24 Read .reloc 76F30000 Image 800 800 280 12 268 268 4 Execute/Copy on Write C:\Windows\System32\msctf.dll 76F30000 Image 4 4 4 4 4 Read Header 76F31000 Image 516 516 248 4 244 244 Execute/Read .text 76FB2000 Image 8 8 8 8 Read/Write .data 76FB4000 Image 252 252 20 20 20 Read .rsrc 76FF3000 Image 20 20 Read .reloc 77000000 Image 680 680 280 20 260 248 9 Execute/Copy on Write C:\Windows\System32\msvcrt.dll 77000000 Image 4 4 4 4 4 Read Header 77001000 Image 628 628 252 4 248 240 Execute/Read .text 7709E000 Image 4 4 4 4 Read/Write .data 7709F000 Image 4 4 Copy on write .data 770A0000 Image 8 8 8 8 Read/Write .data 770A2000 Image 4 4 4 4 Copy on write .data 770A3000 Image 4 4 4 4 Read/Write .data 770A4000 Image 4 4 Copy on write .data 770A5000 Image 4 4 4 4 4 Read .rsrc 770A6000 Image 16 16 Read .reloc 770E0000 Image 792 792 180 20 160 160 7 Execute/Copy on Write C:\Windows\System32\advapi32.dll 770E0000 Image 4 4 4 4 4 Read Header 770E1000 Image 612 612 148 4 144 144 Execute/Read .text 7717A000 Image 4 4 4 4 Read/Write .data 7717B000 Image 4 4 Copy on write .data 7717C000 Image 12 12 12 12 Read/Write .data 7717F000 Image 40 40 8 8 8 Copy on write .data 77189000 Image 92 92 4 4 4 Read .rsrc 771A0000 Image 24 24 Read .reloc 77340000 Image 120 120 40 8 32 32 4 Execute/Copy on Write C:\Windows\System32\imm32.dll 77340000 Image 4 4 4 4 4 Read Header 77341000 Image 88 88 28 4 24 24 Execute/Read .text 77357000 Image 4 4 4 4 Read/Write .data 77358000 Image 20 20 4 4 4 Read .rsrc 7735D000 Image 4 4 Read .reloc 77360000 Image 500 500 120 16 104 104 7 Execute/Copy on Write C:\Windows\System32\usp10.dll 77360000 Image 4 4 4 4 4 Read Header 77361000 Image 344 344 96 4 92 92 Execute/Read .text 773B7000 Image 4 4 4 4 Read/Write .data 773B8000 Image 12 12 Copy on write .data 773BB000 Image 8 8 8 8 Read/Write .data 773BD000 Image 40 40 Copy on write .data 773C7000 Image 8 8 4 4 4 Read Shared 773C9000 Image 72 72 4 4 4 Read .rsrc 773DB000 Image 8 8 Read .reloc 773E0000 Image 352 352 120 12 108 108 4 Execute/Copy on Write C:\Windows\System32\shlwapi.dll 773E0000 Image 4 4 4 4 4 Read Header 773E1000 Image 324 324 104 4 100 100 Execute/Read .text 77432000 Image 8 8 8 8 Read/Write .data 77434000 Image 4 4 4 4 4 Read .rsrc 77435000 Image 12 12 Read .reloc 77440000 Image 628 628 240 8 232 228 5 Execute/Copy on Write C:\Windows\System32\user32.dll 77440000 Image 4 4 4 4 4 Read Header 77441000 Image 416 416 216 4 212 208 Execute/Read .text 774A9000 Image 4 4 4 4 Read/Write .data 774AA000 Image 4 4 4 4 4 Copy on write .data 774AB000 Image 184 184 12 12 12 Read .rsrc 774D9000 Image 16 16 Read .reloc 774E0000 Image 1.180 1.180 440 36 404 404 7 Execute/Copy on Write C:\Windows\System32\ntdll.dll 774E0000 Image 4 4 4 4 Execute/Read/Write Header 774E1000 Image 776 776 412 12 400 400 Execute/Read .text 775A3000 Image 4 4 Execute/Read RT 775A4000 Image 12 12 12 12 Read/Write .data 775A7000 Image 4 4 Copy on write .data 775A8000 Image 8 8 8 8 Read/Write .data 775AA000 Image 20 20 4 4 4 Copy on write .data 775AF000 Image 332 332 Read .rsrc 77602000 Image 20 20 Read .reloc 77610000 Image 876 876 332 16 316 316 4 Execute/Copy on Write C:\Windows\System32\kernel32.dll 77610000 Image 4 4 4 4 4 Read Header 77611000 Image 816 816 312 4 308 308 Execute/Read .text 776DD000 Image 12 12 12 12 Read/Write .data 776E0000 Image 4 4 4 4 4 Read .rsrc 776E1000 Image 40 40 Read .reloc 776F0000 Private 4 4 4 4 1 Execute/Read/Write 7F6F0000 Shareable 1.024 24 24 24 24 2 Read 7F6F0000 Mapped 24 24 24 24 24 Read 7F6F6000 Reserved 1.000 7FFB0000 Shareable 140 140 76 76 76 1 Read 7FFDD000 Private 4 4 4 4 1 Read/Write 7FFDE000 Private 4 4 4 4 1 Read/Write 7FFDF000 Private 4 4 4 4 1 Read/Write 7FFE0000 Private 64 4 4 4 4 2 Read 7FFE0000 Private 4 4 4 4 4 Read 7FFE1000 Reserved 60 --=-=-= Content-Disposition: attachment; filename=emacs-22-3-okay.txt Content-Description: Emacs 22.3 - normal Process: emacs.exe PID: 6604 Type Size Committed Total WS Private WS Shareable WS Shared WS Blocks Total 375.320 85.248 32.456 14.464 17.992 15.256 Image 36.556 36.556 10.204 3.896 6.308 3.580 252 Private 266.424 8.828 8.780 8.776 4 4 31 Shareable 41.620 29.692 11.164 11.164 11.156 30 Mapped File 7.188 7.188 504 504 504 4 Heap 6.976 2.524 1.352 1.340 12 12 29 Stack 16.384 288 280 280 6 System 172 172 172 172 Free 1.721.940 74 Address Type Size Committed Total WS Private WS Shareable WS Shared WS Blocks Protection Details 00010000 Heap (Mapped) 64 64 12 12 12 1 Read/Write Heap ID: 1 00020000 Private 4 4 4 4 1 Read/Write 00030000 Thread Stack 8.192 268 264 264 3 Read/Write Thread ID: 6768 00030000 Reserved 7.924 Thread ID: 0 007ED000 Private 4 4 Read/Write/Guard Thread ID: 0 007EE000 Private 264 264 264 264 Read/Write Thread ID: 0 00830000 Shareable 16 16 16 16 16 1 Read 00840000 Shareable 8 8 8 8 1 Read 00850000 Private 4 4 4 4 1 Read/Write 00860000 Heap (Private) 1.024 844 732 732 2 Read/Write Heap ID: 0 (Default) 00860000 Private 844 844 732 732 Read/Write Heap ID: 0 (Default) 00933000 Reserved 180 Heap ID: 0 (Default) 00960000 Mapped File 3.580 3.580 376 376 376 1 Read C:\Windows\System32\locale.nls 00CE0000 Shareable 4 4 4 4 4 1 Read 00CF0000 Image 72 72 68 56 12 12 5 Execute/Copy on Write C:\Windows\System32\btpload32.dll 00CF0000 Image 4 4 4 4 4 Read Header 00CF1000 Image 32 32 32 32 Execute/Read .text 00CF9000 Image 12 12 12 12 Read .rdata 00CFC000 Image 12 12 12 12 Read/Write .data 00CFF000 Image 4 4 4 4 4 Read .rsrc 00D00000 Image 8 8 4 4 4 Read .reloc 00D10000 Shareable 4 4 4 4 4 1 Read 00D20000 Shareable 8 8 8 8 8 1 Read 00D30000 Shareable 8 8 8 8 8 1 Read 00D40000 Shareable 8 8 8 8 8 1 Read 00D50000 Shareable 8 8 8 8 8 1 Read 00D60000 Heap (Private) 64 24 24 24 2 Read/Write Heap ID: 5 00D60000 Private 24 24 24 24 Read/Write Heap ID: 0 (Default) 00D66000 Reserved 40 Heap ID: 0 (Default) 00D70000 Mapped File 4 4 4 4 4 1 Read C:\Windows\System32\oleaccrc.dll 00D80000 Heap (Private) 64 64 64 64 1 Read/Write Heap ID: 2 00D90000 Shareable 800 116 116 116 116 4 Read 00D90000 Mapped 104 104 104 104 104 Read 00DAA000 Reserved 664 00E50000 Mapped 12 12 12 12 12 Read 00E53000 Reserved 20 00E60000 Shareable 1.036 1.036 196 196 196 1 Read 00F70000 Shareable 4 4 4 4 4 1 Read 00F80000 Shareable 4 4 4 4 4 1 Read/Write 00F90000 Shareable 4 4 4 4 4 1 Read 00FA0000 Heap (Private) 64 4 4 4 2 Read/Write Heap ID: 6 00FA0000 Private 4 4 4 4 Read/Write Heap ID: 0 (Default) 00FA1000 Reserved 60 Heap ID: 0 (Default) 00FB0000 Image 244 244 240 208 32 32 6 Execute/Copy on Write C:\Windows\System32\btprof32.dll 00FB0000 Image 4 4 4 4 4 Read Header 00FB1000 Image 160 160 156 156 Execute/Read .text 00FD9000 Image 36 36 36 28 8 8 Read .rdata 00FE2000 Image 24 24 24 24 Read/Write .data 00FE8000 Image 4 4 4 4 4 Copy on write .tls 00FE9000 Image 4 4 4 4 4 Read .rsrc 00FEA000 Image 12 12 12 12 12 Read .reloc 00FF0000 Mapped File 24 24 24 24 24 1 Read C:\Windows\Registration\R000000000007.clb 01000000 Image 9.996 9.996 5.688 3.128 2.560 28 Execute/Copy on Write C:\Users\Public\Software\GNU\emacs-22.3\bin\emacs.exe 01000000 Image 4 4 4 4 Read Header 01001000 Image 1.372 1.372 1.316 1.316 Execute/Read .text 01158000 Image 8 8 8 8 Read/Write .data 0115A000 Image 1.144 1.144 1.100 1.100 Copy on write .data 01278000 Image 4 4 4 4 Read/Write .data 01279000 Image 8 8 8 8 Copy on write .data 0127B000 Image 4 4 4 4 Read/Write .data 0127C000 Image 12 12 12 12 Copy on write .data 0127F000 Image 92 92 92 92 Read .rdata 01296000 Image 52 52 52 52 Read/Write .bss 012A3000 Image 128 128 Copy on write .bss 012C3000 Image 12 12 12 12 Read/Write .bss 012C6000 Image 4 4 Copy on write .bss 012C7000 Image 60 60 60 60 Read/Write .bss 012D6000 Image 100 100 Copy on write .bss 012EF000 Image 8 8 8 8 Read/Write .bss 012F1000 Image 12 12 12 12 Copy on write .idata 012F4000 Image 28 28 16 16 Copy on write .rsrc 012FB000 Image 2.344 2.344 No access .stab 01545000 Image 1.512 1.512 No access .stabstr 016BF000 Image 12 12 12 12 Read/Write EMHEAP 016C2000 Image 16 16 Copy on write EMHEAP 016C6000 Image 12 12 12 12 Read/Write EMHEAP 016C9000 Image 4 4 Copy on write EMHEAP 016CA000 Image 1.092 1.092 1.092 1.092 Read/Write EMHEAP 017DB000 Image 16 16 Copy on write EMHEAP 017DF000 Image 1.828 1.828 1.828 1.828 Read/Write EMHEAP 019A8000 Image 56 56 Copy on write EMHEAP 019B6000 Image 36 36 36 36 Read/Write EMHEAP 019BF000 Image 16 16 Copy on write EMHEAP 019D0000 Shareable 12.288 2.044 972 972 972 2 Read 019D0000 Mapped 2.044 2.044 972 972 972 Read 01BCF000 Reserved 10.244 025D0000 Heap (Private) 1.024 80 80 80 2 Read/Write Heap ID: 2 025D0000 Private 80 80 80 80 Read/Write Heap ID: 0 (Default) 025E4000 Reserved 944 Heap ID: 0 (Default) 026D0000 Heap (Private) 64 32 32 32 2 Read/Write Heap ID: 3 026D0000 Private 32 32 32 32 Read/Write Heap ID: 0 (Default) 026D8000 Reserved 32 Heap ID: 0 (Default) 026E0000 Mapped File 3.580 3.580 100 100 100 1 Read C:\Windows\System32\locale.nls 02A60000 Heap (Private) 256 104 104 104 2 Read/Write Heap ID: 9 02A60000 Private 104 104 104 104 Read/Write Heap ID: 0 (Default) 02A7A000 Reserved 152 Heap ID: 0 (Default) 02AA0000 Private 64 4 2 No access 02AA0000 Private 4 4 Read/Write 02AA1000 Reserved 60 02AB0000 Private 4 4 4 4 1 Read/Write 02AC0000 Private 128 16 12 12 2 No access 02AC0000 Private 16 16 12 12 Read/Write 02AC4000 Reserved 112 02AE0000 Private 128 4 4 4 2 Read/Write 02AE0000 Private 4 4 4 4 Read/Write 02AE1000 Reserved 124 02B00000 Private 4 4 4 4 1 Read/Write 02B10000 Heap (Private) 64 40 40 40 2 Read/Write Heap ID: 8 02B10000 Private 40 40 40 40 Read/Write Heap ID: 0 (Default) 02B1A000 Reserved 24 Heap ID: 0 (Default) 02B20000 Shareable 704 704 268 268 268 1 Read 02BD0000 Private 4 4 4 4 1 Read/Write 02BE0000 Heap (Private) 64 16 16 16 2 Read/Write Heap ID: 4 02BE0000 Private 16 16 16 16 Read/Write Heap ID: 0 (Default) 02BE4000 Reserved 48 Heap ID: 0 (Default) 02BF0000 Private 512 4 4 4 2 Read/Write 02BF0000 Private 4 4 4 4 Read/Write 02BF1000 Reserved 508 02C70000 Image 72 72 68 52 16 16 7 Execute/Copy on Write C:\Program Files\Lenovo\HOTKEY\HKVOLKEY.dll 02C70000 Image 4 4 4 4 4 Read Header 02C71000 Image 36 36 36 36 Execute/Read .text 02C7A000 Image 8 8 8 4 4 4 Read .rdata 02C7C000 Image 4 4 4 4 Read/Write .data 02C7D000 Image 4 4 Copy on write .data 02C7E000 Image 8 8 8 8 Read/Write .data 02C80000 Image 4 4 4 4 4 Read .rsrc 02C81000 Image 4 4 4 4 4 Read .reloc 02C90000 Heap (Private) 1.024 1.024 16 16 1 Read/Write Heap ID: 7 02D90000 Heap (Private) 1.024 48 48 48 2 Read/Write Heap ID: 3 02D90000 Private 48 48 48 48 Read/Write Heap ID: 0 (Default) 02D9C000 Reserved 976 Heap ID: 0 (Default) 02E90000 Private 4 4 4 4 1 Read/Write 02EA0000 Private 4 4 4 4 1 Read/Write 02EB0000 Private 4 4 4 4 1 Read/Write 02EC0000 Private 4 4 4 4 1 Read/Write 02ED0000 Private 4 4 4 4 1 Read/Write 02F00000 Heap (Private) 1.024 72 72 72 2 Read/Write Heap ID: 8 02F00000 Private 72 72 72 72 Read/Write Heap ID: 0 (Default) 02F12000 Reserved 952 Heap ID: 0 (Default) 03000000 Heap (Private) 1.024 72 72 72 2 Read/Write Heap ID: 11 03000000 Private 72 72 72 72 Read/Write Heap ID: 0 (Default) 03012000 Reserved 952 Heap ID: 0 (Default) 031E0000 Heap (Private) 64 28 28 28 2 Read/Write Heap ID: 11 031E0000 Private 28 28 28 28 Read/Write Heap ID: 0 (Default) 031E7000 Reserved 36 Heap ID: 0 (Default) 032E0000 Heap (Private) 64 8 8 8 2 Read/Write Heap ID: 10 032E0000 Private 8 8 8 8 Read/Write Heap ID: 0 (Default) 032E2000 Reserved 56 Heap ID: 0 (Default) 03400000 Shareable 4.096 4.096 1 Read 03800000 Shareable 4.096 4.096 156 156 156 1 Read 03C00000 Private 4.096 12 12 12 4 Read/Write 03C00000 Private 4 4 4 4 Read/Write 03C01000 Reserved 16 03C05000 Private 8 8 8 8 Read/Write 03C07000 Reserved 4.068 04000000 Shareable 4.096 4.096 64 64 64 1 Read 04400000 Thread Stack 8.192 20 16 16 3 Read/Write Thread ID: 2732 04400000 Reserved 8.172 Thread ID: 0 04BFB000 Private 4 4 Read/Write/Guard Thread ID: 0 04BFC000 Private 16 16 16 16 Read/Write Thread ID: 0 04C00000 Shareable 4.096 4.096 64 64 64 1 Read 05000000 Shareable 2.712 2.712 2.700 2.700 2.700 1 Read/Write 052B0000 Shareable 1.980 1.980 1.980 1.980 1.980 1 Read/Write 054A0000 Shareable 1.980 1.980 1.980 1.980 1.980 1 Read/Write 05780000 Shareable 2.496 2.496 2.484 2.484 2.484 1 Read/Write 10000000 Image 68 68 60 12 48 48 5 Execute/Copy on Write C:\PROGRA~1\KL\WS\r3hook.dll 10000000 Image 4 4 4 4 4 Read Header 10001000 Image 36 36 36 36 36 Execute/Read .text 1000A000 Image 12 12 8 4 4 4 Read .rdata 1000D000 Image 8 8 8 8 Read/Write .data 1000F000 Image 4 4 4 4 4 Read .rsrc 10010000 Image 4 4 Read .reloc 100D0000 Private 261.312 8.664 8.624 8.624 2 No access 100D0000 Private 8.664 8.664 8.624 8.624 Read/Write 10946000 Reserved 252.648 6D570000 Image 156 156 112 16 96 6 Execute/Copy on Write C:\Windows\System32\crtdll.dll 6D570000 Image 4 4 4 4 Read Header 6D571000 Image 116 116 88 4 84 Execute/Read .text 6D58E000 Image 8 8 8 8 Read/Write .data 6D590000 Image 12 12 4 4 Copy on write .data 6D593000 Image 4 4 4 4 Read/Write .data 6D594000 Image 4 4 4 4 Read .rsrc 6D595000 Image 8 8 Read .reloc 6FFF0000 Private 64 64 64 64 1 Execute/Read/Write 70A80000 Image 500 500 52 8 44 9 Execute/Copy on Write C:\Users\Public\Software\GNU\emacs-22.3\bin\libXpm.dll 70A80000 Image 4 4 4 4 Read Header 70A81000 Image 28 28 28 28 Execute/Read .text 70A88000 Image 4 4 4 4 Copy on write .data 70A89000 Image 4 4 4 4 Read .rdata 70A8A000 Image 4 4 4 4 Read/Write .bss 70A8B000 Image 4 4 4 4 Read .edata 70A8C000 Image 4 4 4 4 Read/Write .idata 70A8D000 Image 4 4 Read .reloc 70A8E000 Image 108 108 No access .stab 70AA9000 Image 336 336 No access .stabstr 712F0000 Image 880 880 100 20 80 80 8 Execute/Copy on Write C:\Windows\System32\dbghelp.dll 712F0000 Image 4 4 4 4 4 Read Header 712F1000 Image 732 732 76 4 72 72 Execute/Read .text 713A8000 Image 4 4 4 4 Read/Write .data 713A9000 Image 4 4 Copy on write .data 713AA000 Image 8 8 8 8 Read/Write .data 713AC000 Image 88 88 Copy on write .data 713C2000 Image 4 4 4 4 Read/Write .data 713C3000 Image 4 4 4 4 4 Read .rsrc 713C4000 Image 32 32 Read .reloc 72D30000 Image 264 264 80 12 68 68 5 Execute/Copy on Write C:\Windows\System32\winspool.drv 72D30000 Image 4 4 4 4 4 Read Header 72D31000 Image 192 192 64 4 60 60 Execute/Read .text 72D61000 Image 4 4 Copy on write .data 72D62000 Image 8 8 8 8 Read/Write .data 72D64000 Image 44 44 4 4 4 Read .rsrc 72D6F000 Image 12 12 Read .reloc 742F0000 Image 228 228 36 8 28 28 5 Execute/Copy on Write C:\Windows\System32\oleacc.dll 742F0000 Image 4 4 4 4 4 Read Header 742F1000 Image 176 176 24 4 20 20 Execute/Read .text 7431D000 Image 4 4 Execute/Read .orpc 7431E000 Image 4 4 4 4 Read/Write .data 7431F000 Image 4 4 Copy on write .data 74320000 Image 24 24 4 4 4 Read .rsrc 74326000 Image 12 12 Read .reloc 74800000 Image 200 200 40 12 28 28 5 Execute/Copy on Write C:\Windows\System32\winmm.dll 74800000 Image 4 4 4 4 4 Read Header 74801000 Image 152 152 24 4 20 20 Execute/Read .text 74827000 Image 8 8 8 8 Read/Write .data 74829000 Image 4 4 Copy on write .data 7482A000 Image 4 4 Read .guids 7482B000 Image 16 16 4 4 4 Read .rsrc 7482F000 Image 12 12 Read .reloc 749A0000 Image 252 252 148 8 140 140 5 Execute/Copy on Write C:\Windows\System32\uxtheme.dll 749A0000 Image 4 4 4 4 4 Read Header 749A1000 Image 220 220 132 4 128 128 Execute/Read .text 749D8000 Image 4 4 4 4 Read/Write .data 749D9000 Image 12 12 4 4 4 Copy on write .data 749DC000 Image 4 4 4 4 4 Read .rsrc 749DD000 Image 8 8 Read .reloc 75620000 Image 80 80 28 8 20 20 4 Execute/Copy on Write C:\Windows\System32\mpr.dll 75620000 Image 4 4 4 4 4 Read Header 75621000 Image 64 64 16 4 12 12 Execute/Read .text 75631000 Image 4 4 4 4 Read/Write .data 75632000 Image 4 4 4 4 4 Read .rsrc 75633000 Image 4 4 Read .reloc 756C0000 Image 468 468 72 32 40 40 7 Execute/Copy on Write C:\Windows\System32\netapi32.dll 756C0000 Image 4 4 4 4 4 Read Header 756C1000 Image 400 400 36 4 32 32 Execute/Read .text 75725000 Image 8 8 8 8 Read/Write .data 75727000 Image 12 12 Copy on write .data 7572A000 Image 20 20 20 20 Read/Write .data 7572F000 Image 8 8 Copy on write .data 75731000 Image 4 4 4 4 4 Read .rsrc 75732000 Image 12 12 Read .reloc 757F0000 Image 1.656 1.656 200 16 184 184 7 Execute/Copy on Write C:\Windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.6001.18000_none_5cdbaa5a083979cc\comctl32.dll 757F0000 Image 4 4 4 4 4 Read Header 757F1000 Image 1.280 1.280 176 4 172 172 Execute/Read .text 75931000 Image 4 4 4 4 Read/Write .data 75932000 Image 4 4 Copy on write .data 75933000 Image 8 8 8 8 Read/Write .data 75935000 Image 40 40 4 4 4 Copy on write .data 7593F000 Image 260 260 4 4 4 Read .rsrc 75980000 Image 56 56 Read .reloc 75B90000 Image 176 176 56 8 48 48 4 Execute/Copy on Write C:\Windows\System32\apphelp.dll 75B90000 Image 4 4 4 4 4 Read Header 75B91000 Image 156 156 44 4 40 40 Execute/Read .text 75BB8000 Image 4 4 4 4 Read/Write .data 75BB9000 Image 4 4 4 4 4 Read .rsrc 75BBA000 Image 8 8 Read .reloc 75D50000 Image 28 28 20 8 12 12 4 Execute/Copy on Write C:\Windows\System32\psapi.dll 75D50000 Image 4 4 4 4 4 Read Header 75D51000 Image 12 12 8 4 4 4 Execute/Read .text 75D54000 Image 4 4 4 4 Read/Write .data 75D55000 Image 4 4 4 4 4 Read .rsrc 75D56000 Image 4 4 Read .reloc 75D80000 Image 11.328 11.328 220 48 172 172 7 Execute/Copy on Write C:\Windows\System32\shell32.dll 75D80000 Image 4 4 4 4 4 Read Header 75D81000 Image 3.528 3.528 144 8 136 136 Execute/Read .text 760F3000 Image 32 32 32 32 Read/Write .data 760FB000 Image 36 36 Copy on write .data 76104000 Image 8 8 8 8 Read/Write .data 76106000 Image 16 16 8 8 8 Copy on write .data 7610A000 Image 7.516 7.516 24 24 24 Read .rsrc 76861000 Image 188 188 Read .reloc 76990000 Image 1.296 1.296 200 24 176 176 5 Execute/Copy on Write C:\Windows\System32\ole32.dll 76990000 Image 4 4 4 4 4 Read Header 76991000 Image 1.176 1.176 164 4 160 160 Execute/Read .text 76AB7000 Image 28 28 8 8 8 Execute/Read .orpc 76ABE000 Image 20 20 20 20 Read/Write .data 76AC3000 Image 8 8 Copy on write .data 76AC5000 Image 8 8 4 4 4 Read .rsrc 76AC7000 Image 52 52 Read .reloc 76AE0000 Image 300 300 100 8 92 92 5 Execute/Copy on Write C:\Windows\System32\gdi32.dll 76AE0000 Image 4 4 4 4 4 Read Header 76AE1000 Image 276 276 84 4 80 80 Execute/Read .text 76B26000 Image 4 4 4 4 Read/Write .data 76B27000 Image 4 4 4 4 4 Copy on write .data 76B28000 Image 4 4 4 4 4 Read .rsrc 76B29000 Image 8 8 Read .reloc 76B30000 Image 528 528 228 16 212 212 5 Execute/Copy on Write C:\Windows\System32\clbcatq.dll 76B30000 Image 4 4 4 4 4 Read Header 76B31000 Image 480 480 208 4 204 204 Execute/Read .text 76BA9000 Image 12 12 12 12 Read/Write .data 76BAC000 Image 4 4 Copy on write .data 76BAD000 Image 8 8 4 4 4 Read .rsrc 76BAF000 Image 20 20 Read .reloc 76CF0000 Image 776 776 204 8 196 196 4 Execute/Copy on Write C:\Windows\System32\rpcrt4.dll 76CF0000 Image 4 4 4 4 4 Read Header 76CF1000 Image 688 688 180 4 176 176 Execute/Read .text 76D9D000 Image 44 44 12 12 12 Execute/Read .orpc 76DA8000 Image 4 4 4 4 Read/Write .data 76DA9000 Image 12 12 4 4 4 Read .rsrc 76DAC000 Image 24 24 Read .reloc 76DC0000 Image 460 460 44 8 36 36 5 Execute/Copy on Write C:\Windows\System32\comdlg32.dll 76DC0000 Image 4 4 4 4 4 Read Header 76DC1000 Image 316 316 28 4 24 24 Execute/Read .text 76E10000 Image 4 4 4 4 Read/Write .data 76E11000 Image 12 12 Copy on write .data 76E14000 Image 108 108 8 8 8 Read .rsrc 76E2F000 Image 16 16 Read .reloc 76E90000 Image 36 36 20 8 12 12 4 Execute/Copy on Write C:\Windows\System32\lpk.dll 76E90000 Image 4 4 4 4 4 Read Header 76E91000 Image 20 20 8 4 4 4 Execute/Read .text 76E96000 Image 4 4 4 4 Read/Write .data 76E97000 Image 4 4 4 4 4 Read .rsrc 76E98000 Image 4 4 Read .reloc 76EA0000 Image 564 564 64 16 48 48 4 Execute/Copy on Write C:\Windows\System32\oleaut32.dll 76EA0000 Image 4 4 4 4 4 Read Header 76EA1000 Image 516 516 44 4 40 40 Execute/Read .text 76F22000 Image 4 4 Execute/Read .orpc 76F23000 Image 12 12 12 12 Read/Write .data 76F26000 Image 4 4 4 4 4 Read .rsrc 76F27000 Image 24 24 Read .reloc 76F30000 Image 800 800 280 12 268 268 4 Execute/Copy on Write C:\Windows\System32\msctf.dll 76F30000 Image 4 4 4 4 4 Read Header 76F31000 Image 516 516 248 4 244 244 Execute/Read .text 76FB2000 Image 8 8 8 8 Read/Write .data 76FB4000 Image 252 252 20 20 20 Read .rsrc 76FF3000 Image 20 20 Read .reloc 77000000 Image 680 680 292 20 272 252 9 Execute/Copy on Write C:\Windows\System32\msvcrt.dll 77000000 Image 4 4 4 4 4 Read Header 77001000 Image 628 628 264 4 260 244 Execute/Read .text 7709E000 Image 4 4 4 4 Read/Write .data 7709F000 Image 4 4 Copy on write .data 770A0000 Image 8 8 8 8 Read/Write .data 770A2000 Image 4 4 4 4 Copy on write .data 770A3000 Image 4 4 4 4 Read/Write .data 770A4000 Image 4 4 Copy on write .data 770A5000 Image 4 4 4 4 4 Read .rsrc 770A6000 Image 16 16 Read .reloc 770E0000 Image 792 792 172 20 152 152 7 Execute/Copy on Write C:\Windows\System32\advapi32.dll 770E0000 Image 4 4 4 4 4 Read Header 770E1000 Image 612 612 140 4 136 136 Execute/Read .text 7717A000 Image 4 4 4 4 Read/Write .data 7717B000 Image 4 4 Copy on write .data 7717C000 Image 12 12 12 12 Read/Write .data 7717F000 Image 40 40 8 8 8 Copy on write .data 77189000 Image 92 92 4 4 4 Read .rsrc 771A0000 Image 24 24 Read .reloc 77340000 Image 120 120 40 8 32 32 4 Execute/Copy on Write C:\Windows\System32\imm32.dll 77340000 Image 4 4 4 4 4 Read Header 77341000 Image 88 88 28 4 24 24 Execute/Read .text 77357000 Image 4 4 4 4 Read/Write .data 77358000 Image 20 20 4 4 4 Read .rsrc 7735D000 Image 4 4 Read .reloc 77360000 Image 500 500 104 16 88 88 7 Execute/Copy on Write C:\Windows\System32\usp10.dll 77360000 Image 4 4 4 4 4 Read Header 77361000 Image 344 344 80 4 76 76 Execute/Read .text 773B7000 Image 4 4 4 4 Read/Write .data 773B8000 Image 12 12 Copy on write .data 773BB000 Image 8 8 8 8 Read/Write .data 773BD000 Image 40 40 Copy on write .data 773C7000 Image 8 8 4 4 4 Read Shared 773C9000 Image 72 72 4 4 4 Read .rsrc 773DB000 Image 8 8 Read .reloc 773E0000 Image 352 352 120 12 108 108 4 Execute/Copy on Write C:\Windows\System32\shlwapi.dll 773E0000 Image 4 4 4 4 4 Read Header 773E1000 Image 324 324 104 4 100 100 Execute/Read .text 77432000 Image 8 8 8 8 Read/Write .data 77434000 Image 4 4 4 4 4 Read .rsrc 77435000 Image 12 12 Read .reloc 77440000 Image 628 628 244 8 236 236 5 Execute/Copy on Write C:\Windows\System32\user32.dll 77440000 Image 4 4 4 4 4 Read Header 77441000 Image 416 416 220 4 216 216 Execute/Read .text 774A9000 Image 4 4 4 4 Read/Write .data 774AA000 Image 4 4 4 4 4 Copy on write .data 774AB000 Image 184 184 12 12 12 Read .rsrc 774D9000 Image 16 16 Read .reloc 774E0000 Image 1.180 1.180 448 36 412 412 7 Execute/Copy on Write C:\Windows\System32\ntdll.dll 774E0000 Image 4 4 4 4 Execute/Read/Write Header 774E1000 Image 776 776 420 12 408 408 Execute/Read .text 775A3000 Image 4 4 Execute/Read RT 775A4000 Image 12 12 12 12 Read/Write .data 775A7000 Image 4 4 Copy on write .data 775A8000 Image 8 8 8 8 Read/Write .data 775AA000 Image 20 20 4 4 4 Copy on write .data 775AF000 Image 332 332 Read .rsrc 77602000 Image 20 20 Read .reloc 77610000 Image 876 876 356 16 340 332 4 Execute/Copy on Write C:\Windows\System32\kernel32.dll 77610000 Image 4 4 4 4 4 Read Header 77611000 Image 816 816 336 4 332 324 Execute/Read .text 776DD000 Image 12 12 12 12 Read/Write .data 776E0000 Image 4 4 4 4 4 Read .rsrc 776E1000 Image 40 40 Read .reloc 776F0000 Private 4 4 4 4 1 Execute/Read/Write 7F6F0000 Shareable 1.024 24 24 24 24 2 Read 7F6F0000 Mapped 24 24 24 24 24 Read 7F6F6000 Reserved 1.000 7FFB0000 Shareable 140 140 84 84 84 1 Read 7FFDD000 Private 4 4 4 4 1 Read/Write 7FFDE000 Private 4 4 4 4 1 Read/Write 7FFDF000 Private 4 4 4 4 1 Read/Write 7FFE0000 Private 64 4 4 4 4 2 Read 7FFE0000 Private 4 4 4 4 4 Read 7FFE1000 Reserved 60 --=-=-=-- From eliz@gnu.org Thu Apr 16 14:35:26 2009 Received: (at 3021) by emacsbugs.donarmstrong.com; 16 Apr 2009 21:35:27 +0000 X-Spam-Checker-Version: SpamAssassin 3.2.5-bugs.debian.org_2005_01_02 (2008-06-10) on rzlab.ucr.edu X-Spam-Level: X-Spam-Bayes: score:0.5 Bayes not run. spammytokens:Tokens not available. hammytokens:Tokens not available. X-Spam-Status: No, score=-2.9 required=4.0 tests=FOURLA,HAS_BUG_NUMBER autolearn=ham version=3.2.5-bugs.debian.org_2005_01_02 Received: from mtaout2.012.net.il (mtaout2.012.net.il [84.95.2.4]) by rzlab.ucr.edu (8.13.8/8.13.8/Debian-3) with ESMTP id n3GLZN4v016091 for <3021@emacsbugs.donarmstrong.com>; Thu, 16 Apr 2009 14:35:24 -0700 Received: from conversion-daemon.i_mtaout2.012.net.il by i_mtaout2.012.net.il (HyperSendmail v2004.12) id <0KI700100Q552800@i_mtaout2.012.net.il> for 3021@emacsbugs.donarmstrong.com; Fri, 17 Apr 2009 00:35:17 +0300 (IDT) Received: from HOME-C4E4A596F7 ([84.229.34.97]) by i_mtaout2.012.net.il (HyperSendmail v2004.12) with ESMTPA id <0KI7002DSQMSQO70@i_mtaout2.012.net.il>; Fri, 17 Apr 2009 00:35:17 +0300 (IDT) Date: Fri, 17 Apr 2009 00:35:16 +0300 From: Eli Zaretskii Subject: Re: bug#3021: 23.0.92; MEM FULL on Windows after some VC operations In-reply-to: <87d4bcqtwo.fsf@marauder.physik.uni-ulm.de> X-012-Sender: halo1@inter.net.il To: Reiner Steib , 3021@debbugs.gnu.org Reply-to: Eli Zaretskii Message-id: <83ws9kjn8r.fsf@gnu.org> References: <87d4bcqtwo.fsf@marauder.physik.uni-ulm.de> > From: Reiner Steib > Date: Thu, 16 Apr 2009 21:29:27 +0200 > Cc: > > with the latest precompiled pretest version for Windows > (http://alpha.gnu.org/gnu/emacs/pretest/windows/emacs-23.0.92-bin-i386.zip), > I got "!MEM FULL!" after doing some VC / PCL-CVS commands (viewing the > revision log, diffs, ...) on rather big files. The repository is on a > network share, i.e. no pserver, ssh, ... involved. > > As requested by Eli, I attach the information reported by > Sysinternals' VMMap, both for the Emacs 23 process with "MEM FULL" and > an Emacs 22.3 process on the same box. Thanks. > The laptop has 3 GB of memory. > [...] > Process: emacs.exe > PID: 7068 > > Type Size Committed Total WS Private WS Shareable WS Shared WS Blocks > Total 400.344 363.360 291.112 270.448 20.664 17.636 Unless I'm missing something, looks like something might be wrong with how we discover available memory on Windows: how come a process with a 400MB memory footprint says MEM FULL on a 3GB machine? FWIW, I had a couple of days ago a similar incident: a 380MB Emacs process running on a 1.5GB machine claimed to have passed 75% of available memory. From rgm@gnu.org Fri Apr 17 17:01:41 2009 Received: (at control) by emacsbugs.donarmstrong.com; 18 Apr 2009 00:01:41 +0000 X-Spam-Checker-Version: SpamAssassin 3.2.5-bugs.debian.org_2005_01_02 (2008-06-10) on rzlab.ucr.edu X-Spam-Level: X-Spam-Bayes: score:0.5 Bayes not run. spammytokens:Tokens not available. hammytokens:Tokens not available. X-Spam-Status: No, score=-2.0 required=4.0 tests=VALID_BTS_CONTROL autolearn=ham version=3.2.5-bugs.debian.org_2005_01_02 Received: from fencepost.gnu.org (fencepost.gnu.org [140.186.70.10]) by rzlab.ucr.edu (8.13.8/8.13.8/Debian-3) with ESMTP id n3I01cpO029398 for ; Fri, 17 Apr 2009 17:01:39 -0700 Received: from rgm by fencepost.gnu.org with local (Exim 4.67) (envelope-from ) id 1Luy00-0005G5-EJ; Fri, 17 Apr 2009 20:01:37 -0400 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <18921.6240.334314.149658@fencepost.gnu.org> Date: Fri, 17 Apr 2009 20:01:36 -0400 From: Glenn Morris To: control Subject: control message severity 2988 minor reassign 3005 emacs,w32 tags 3012 moreinfo unreproducible severity 3016 wishlist reassign 3021 emacs,w32 reassign 3019 spam reassign 3023 spam reassign 3024 spam reassign 3025 spam reassign 3026 spam reassign 3028 spam reassign 3029 spam reassign 3030 spam reassign 3031 spam reassign 3032 emacs,cc-mode reassign 3034 spam reassign 3039 emacs,ns reassign 3040 emacs,ns reassign 3041 spam From reinersteib+gmane@imap.cc Mon Apr 20 13:07:57 2009 Received: (at 3021) by emacsbugs.donarmstrong.com; 20 Apr 2009 20:07:57 +0000 X-Spam-Checker-Version: SpamAssassin 3.2.5-bugs.debian.org_2005_01_02 (2008-06-10) on rzlab.ucr.edu X-Spam-Level: X-Spam-Bayes: score:0.5 Bayes not run. spammytokens:Tokens not available. hammytokens:Tokens not available. X-Spam-Status: No, score=-2.9 required=4.0 tests=FOURLA,HAS_BUG_NUMBER autolearn=ham version=3.2.5-bugs.debian.org_2005_01_02 Received: from mail.uni-ulm.de (mail.uni-ulm.de [134.60.1.11]) by rzlab.ucr.edu (8.13.8/8.13.8/Debian-3) with ESMTP id n3KK7qQa017790 for <3021@emacsbugs.donarmstrong.com>; Mon, 20 Apr 2009 13:07:54 -0700 Received: from bridgekeeper.physik.uni-ulm.de (bridgekeeper.physik.uni-ulm.de [134.60.10.175]) by mail.uni-ulm.de (8.14.2/8.14.2) with ESMTP id n3KK7ouu023537; Mon, 20 Apr 2009 22:07:50 +0200 (MEST) Received: from localhost (localhost [127.0.0.1]) by bridgekeeper.physik.uni-ulm.de (Postfix) with ESMTP id 70CAF13763; Mon, 20 Apr 2009 22:07:50 +0200 (CEST) From: Reiner Steib To: Eli Zaretskii Cc: 3021@debbugs.gnu.org Subject: Re: bug#3021: 23.0.92; MEM FULL on Windows after some VC operations References: <87d4bcqtwo.fsf@marauder.physik.uni-ulm.de> <83ws9kjn8r.fsf@gnu.org> X-Face: 3Phac&+dw=IZHjhua]bp}LH<*p{qzj8u+ User-Agent: Gnus/5.110011 (No Gnus v0.11) Emacs/22.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-DCC-x.dcc-servers-Metrics: poseidon 104; Body=2 Fuz1=2 Fuz2=2 X-Virus-Scanned: by amavisd-new On Thu, Apr 16 2009, Eli Zaretskii wrote: > Unless I'm missing something, looks like something might be wrong with > how we discover available memory on Windows: how come a process with a > 400MB memory footprint says MEM FULL on a 3GB machine? Ideas anyone? Can I help with more information? > FWIW, I had a couple of days ago a similar incident: a 380MB Emacs > process running on a 1.5GB machine claimed to have passed 75% of > available memory. Bye, Reiner. -- ,,, (o o) ---ooO-(_)-Ooo--- | PGP key available | http://rsteib.home.pages.de/ From jasonrumney@gmail.com Mon Apr 20 21:23:51 2009 Received: (at 3021) by emacsbugs.donarmstrong.com; 21 Apr 2009 04:23:52 +0000 X-Spam-Checker-Version: SpamAssassin 3.2.5-bugs.debian.org_2005_01_02 (2008-06-10) on rzlab.ucr.edu X-Spam-Level: X-Spam-Bayes: score:0.5 Bayes not run. spammytokens:Tokens not available. hammytokens:Tokens not available. X-Spam-Status: No, score=-2.9 required=4.0 tests=FOURLA,HAS_BUG_NUMBER autolearn=ham version=3.2.5-bugs.debian.org_2005_01_02 Received: from rv-out-0506.google.com (rv-out-0506.google.com [209.85.198.228]) by rzlab.ucr.edu (8.13.8/8.13.8/Debian-3) with ESMTP id n3L4Nl9S021462 for <3021@emacsbugs.donarmstrong.com>; Mon, 20 Apr 2009 21:23:48 -0700 Received: by rv-out-0506.google.com with SMTP id f9so2231553rvb.1 for <3021@emacsbugs.donarmstrong.com>; Mon, 20 Apr 2009 21:23:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:sender:message-id:date:from :user-agent:mime-version:to:cc:subject:references:in-reply-to :content-type:content-transfer-encoding; bh=efkX4EmrOBi2Ah8NtBraRgvmSAk5YsLyQxAm/NXyrQA=; b=aNtm9b6maiyk9ew0OPq1rrloJBjOOFTjYnsUloP1tRWA7KyKg3165AvXIpdLslKCjo isaRa/BpfAEigTpX1hp2ye6+uCHwhpfvdtU0O7hnWGcgcdFx2YZScWHmhOHT/Tn9vbcT aA50tG97pGWxVZYP/aMmc3Yw2yTPAI2ZmpWXM= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=sender:message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; b=xXGoA/WsOWSM7fr4XM5YEHG2Lp9vHlUL4RzUxPguMGwlN7bCRqhM7RSYoYcFO80nfC u4cUvOc5CKSdebRbMbgqh+mC0h8ixYZpislveXXlvE9B6Akr91ZsLuEoqtk5Y+5UK7bi 1QgFRbx9mfYCtyXSWaajlNb7M5p3ldFbG758Y= Received: by 10.142.144.16 with SMTP id r16mr4659415wfd.214.1240287827435; Mon, 20 Apr 2009 21:23:47 -0700 (PDT) Received: from ?192.168.1.105? (d75-157-174-233.bchsia.telus.net [75.157.174.233]) by mx.google.com with ESMTPS id 24sm18882467wff.2.2009.04.20.21.23.45 (version=TLSv1/SSLv3 cipher=RC4-MD5); Mon, 20 Apr 2009 21:23:46 -0700 (PDT) Sender: Jason Rumney Message-ID: <49ED4A34.5030003@gnu.org> Date: Tue, 21 Apr 2009 12:23:16 +0800 From: Jason Rumney User-Agent: Thunderbird 2.0.0.21 (Windows/20090302) MIME-Version: 1.0 To: Reiner.Steib@gmx.de CC: 3021@debbugs.gnu.org Subject: Re: bug#3021: 23.0.92; MEM FULL on Windows after some VC operations References: <87d4bcqtwo.fsf@marauder.physik.uni-ulm.de> <83ws9kjn8r.fsf@gnu.org> <877i1f1431.fsf@marauder.physik.uni-ulm.de> In-Reply-To: <877i1f1431.fsf@marauder.physik.uni-ulm.de> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Reiner Steib wrote: > On Thu, Apr 16 2009, Eli Zaretskii wrote: > > >> Unless I'm missing something, looks like something might be wrong with >> how we discover available memory on Windows: how come a process with a >> 400MB memory footprint says MEM FULL on a 3GB machine? >> > > Ideas anyone? > > Can I help with more information? > Can you find the location where that message is emitted, and put a breakpoint there. When the bug next happens, have a look at the tests leading up to the decision to display the message and see if you can see anything amiss. From jasonrumney@gmail.com Sat May 2 00:36:50 2009 Received: (at control) by emacsbugs.donarmstrong.com; 2 May 2009 07:36:50 +0000 X-Spam-Checker-Version: SpamAssassin 3.2.5-bugs.debian.org_2005_01_02 (2008-06-10) on rzlab.ucr.edu X-Spam-Level: X-Spam-Bayes: score:0.5 Bayes not run. spammytokens:Tokens not available. hammytokens:Tokens not available. X-Spam-Status: No, score=-2.0 required=4.0 tests=VALID_BTS_CONTROL autolearn=ham version=3.2.5-bugs.debian.org_2005_01_02 Received: from wf-out-1314.google.com (wf-out-1314.google.com [209.85.200.175]) by rzlab.ucr.edu (8.13.8/8.13.8/Debian-3) with ESMTP id n427alGc024440 for ; Sat, 2 May 2009 00:36:49 -0700 Received: by wf-out-1314.google.com with SMTP id 28so2155384wfa.13 for ; Sat, 02 May 2009 00:36:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:sender:message-id:date:from :user-agent:mime-version:to:subject:content-type :content-transfer-encoding; bh=rbLjhzbS3kVQ4H/v3iyhpD1D69x5tuI/alajNiOLQLE=; b=AZGtQL94D0k2YACLgq4R3BMocMb93pAa55KeRY1KW7Rd7SEBRxwknDDHS83DnB+8fa ajFr6Yt07OIXvSoumNPaVpnJvi/1OjVlFwO2X1kSkp/WtnW2+/9R4Ap+HEVAKUAwmcFa HVlexVtJnMfibR9CIZAVoV8RJr0Onm1RTQRL4= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=sender:message-id:date:from:user-agent:mime-version:to:subject :content-type:content-transfer-encoding; b=BwtKom1/2ELmw6imH8rOjKFVOGhC+uKwufE5E2WrVPq+odq/N9ZRpWXRRvIrf9Q4OX KJGPWCmxVAObfmLnKubdsBEXeZcFd0vgLPlO0I3elTrEHQtUSf6Fja6pN5Hd401xGvBF l8DlgTOEr7U+Y7N8jxHoZ/DGC7vDu1cJJj9aE= Received: by 10.142.254.2 with SMTP id b2mr1251598wfi.287.1241249807663; Sat, 02 May 2009 00:36:47 -0700 (PDT) Received: from ?192.168.249.26? ([118.101.236.118]) by mx.google.com with ESMTPS id 9sm11630294wfc.36.2009.05.02.00.36.45 (version=TLSv1/SSLv3 cipher=RC4-MD5); Sat, 02 May 2009 00:36:46 -0700 (PDT) Sender: Jason Rumney Message-ID: <49FBF7F0.8000803@gnu.org> Date: Sat, 02 May 2009 15:36:16 +0800 From: Jason Rumney User-Agent: Thunderbird 2.0.0.21 (Windows/20090302) MIME-Version: 1.0 To: Emacs bug Tracking System Subject: Severe bug Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit severity 3021 important From reinersteib+gmane@imap.cc Sun Jul 5 03:31:55 2009 Received: (at 3021) by emacsbugs.donarmstrong.com; 5 Jul 2009 10:31:56 +0000 X-Spam-Checker-Version: SpamAssassin 3.2.5-bugs.debian.org_2005_01_02 (2008-06-10) on rzlab.ucr.edu X-Spam-Level: X-Spam-Bayes: score:0.5 Bayes not run. spammytokens:Tokens not available. hammytokens:Tokens not available. X-Spam-Status: No, score=-3.5 required=4.0 tests=AWL,FOURLA,HAS_BUG_NUMBER autolearn=ham version=3.2.5-bugs.debian.org_2005_01_02 Received: from mail.uni-ulm.de (mail.uni-ulm.de [134.60.1.11]) by rzlab.ucr.edu (8.14.3/8.14.3/Debian-5) with ESMTP id n65AVopN022508 for <3021@emacsbugs.donarmstrong.com>; Sun, 5 Jul 2009 03:31:52 -0700 Received: from bridgekeeper.physik.uni-ulm.de (bridgekeeper.physik.uni-ulm.de [134.60.10.175]) by mail.uni-ulm.de (8.14.2/8.14.2) with ESMTP id n65AVmnP019806; Sun, 5 Jul 2009 12:31:49 +0200 (MEST) Received: from localhost (localhost [127.0.0.1]) by bridgekeeper.physik.uni-ulm.de (Postfix) with ESMTP id 65589138B3; Sun, 5 Jul 2009 12:31:48 +0200 (CEST) From: Reiner Steib To: 3021@debbugs.gnu.org Cc: Jason Rumney , Eli Zaretskii Subject: Re: bug#3021: 23.0.92; MEM FULL on Windows after some VC operations References: <87d4bcqtwo.fsf@marauder.physik.uni-ulm.de> <83ws9kjn8r.fsf@gnu.org> <877i1f1431.fsf@marauder.physik.uni-ulm.de> <49ED4A34.5030003@gnu.org> X-Face: /U7=m^"/-Dn61mAl{g9e3>\G5Tp,oEX|V)g2I1hBk\ML;)7A?6cmB-y7y?'NA^J<=oz7syB =(McAwIHgLX!.B?R3X}98d@?>CrT094KLWh]WU4gDpnL/")MS(XoQTv`Oq225uL>+;CpPXo$N5e>N> $tPd-gbB^F{gQS#1ase]XO~D4p4M"3+F-7~u]dy3I?Pb8RO*H-EFeWDUf?Rf,d]pv\Jvh2Cht!A=im yKAS2Z%Ao^;}W/qzMvMm Mail-Followup-To: 3021@debbugs.gnu.org Reply-To: Reiner Steib Date: Sun, 05 Jul 2009 12:31:45 +0200 In-Reply-To: <49ED4A34.5030003@gnu.org> (Jason Rumney's message of "Tue, 21 Apr 2009 12:23:16 +0800") Message-ID: <87skhbe7zi.fsf@marauder.physik.uni-ulm.de> User-Agent: Gnus/5.110011 (No Gnus v0.11) Emacs/22.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-DCC-debian-Metrics: poseidon 1169; Body=3 Fuz1=3 Fuz2=3 X-Virus-Scanned: by amavisd-new On Tue, Apr 21 2009, Jason Rumney wrote: > Reiner Steib wrote: >> On Thu, Apr 16 2009, Eli Zaretskii wrote: >>> Unless I'm missing something, looks like something might be wrong with >>> how we discover available memory on Windows: how come a process with a >>> 400MB memory footprint says MEM FULL on a 3GB machine? >> >> Ideas anyone? >> >> Can I help with more information? > > Can you find the location where that message is emitted, and put a breakpoint > there. When the bug next happens, have a look at the tests leading up to the > decision to display the message and see if you can see anything amiss. Sorry for the late reply, I have been on vacation for a few weeks and busy at work otherwise. On Thu, May 21 2009, Chong Yidong wrote: > If you can reproduce this bug, could you try to investigate? A > backtrace would be useful. I can (or better say could with 23.0.92 - haven't tried newer pretests) reproduce the problem. I'll try the most recent pretest next week. But at work (where the windows box lives) I don't have a debugger installed and I don't now what I need to install/download to get a working debugging environment for Emacs on Windows Vista. So it will take me quite a lot of time to figure out what is required and to set it up. In etc/DEBUG I can only see instructions for Microsoft Visual C++, or am I missing something? - What do I need to install to debug a MinGW/MSYS build (Jason's build) on MS Vista? - To put a breakpoint, of course I need to install the Emacs sources. How do I have to combine the source (emacs-*.tar.gz) and the binary (windows/emacs-*-bin-i386.zip) correctly? - Jason suggested: "find the location where that message is emitted, and put a breakpoint there"... Can someone assist me with this? I'm not familiar with Emacs' C code. From rgrep on 'MEM.FULL\|memory_full' it's not obvious for me which would be the right function. Bye, Reiner. -- ,,, (o o) ---ooO-(_)-Ooo--- | PGP key available | http://rsteib.home.pages.de/ From jasonrumney@gmail.com Sun Jul 5 09:02:50 2009 Received: (at 3021) by emacsbugs.donarmstrong.com; 5 Jul 2009 16:02:51 +0000 X-Spam-Checker-Version: SpamAssassin 3.2.5-bugs.debian.org_2005_01_02 (2008-06-10) on rzlab.ucr.edu X-Spam-Level: X-Spam-Bayes: score:0.5 Bayes not run. spammytokens:Tokens not available. hammytokens:Tokens not available. X-Spam-Status: No, score=-2.6 required=4.0 tests=AWL,FOURLA,HAS_BUG_NUMBER autolearn=ham version=3.2.5-bugs.debian.org_2005_01_02 Received: from mail-px0-f199.google.com (mail-px0-f199.google.com [209.85.216.199]) by rzlab.ucr.edu (8.14.3/8.14.3/Debian-5) with ESMTP id n65G2k70020811 for <3021@emacsbugs.donarmstrong.com>; Sun, 5 Jul 2009 09:02:47 -0700 Received: by pxi37 with SMTP id 37so2322608pxi.19 for <3021@emacsbugs.donarmstrong.com>; Sun, 05 Jul 2009 09:02:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:sender:message-id:date:from :user-agent:mime-version:to:subject:references:in-reply-to :content-type:content-transfer-encoding; bh=M2oh2XkB1oPcdFr5DoVozyd8t5949D7W7OcRfg++fs4=; b=VvAbukePCGMsm/N8Ip5Ftj4EdfKWOT+nBJuT3NbnMFD099TF3NGEmA5V0ur7zOyYyr kDtRppVFoz5l/SSbjynf1UMgWUChWQleqSqi0UimXcahNmR9wkm1bil9Tg/HwwqsfrfZ x/fFgx7L2JXO9+1Lw8JHP1cwRZH1l9nylceB8= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=sender:message-id:date:from:user-agent:mime-version:to:subject :references:in-reply-to:content-type:content-transfer-encoding; b=pDqhROrssoCtIyvqJZhL1VR1V0srHSAOm8puayUqqUBoSzN9d04R/LXLbXGrTxNuxJ tgGVhNO5qAUqWWQBpC3oBpUXS0i7hPGCbSfV4flbG6mWxZ3tvhWR1soDgESzAZWgmHM+ erdHuH0U+Q/SvWEv1+e5dMbT6T8oXjownXRII= Received: by 10.114.77.19 with SMTP id z19mr5838206waa.29.1246809760920; Sun, 05 Jul 2009 09:02:40 -0700 (PDT) Received: from ?192.168.249.26? ([118.101.237.115]) by mx.google.com with ESMTPS id d20sm9607025waa.12.2009.07.05.09.02.38 (version=TLSv1/SSLv3 cipher=RC4-MD5); Sun, 05 Jul 2009 09:02:39 -0700 (PDT) Sender: Jason Rumney Message-ID: <4A50CE7F.8030905@gnu.org> Date: Mon, 06 Jul 2009 00:02:07 +0800 From: Jason Rumney User-Agent: Thunderbird 2.0.0.22 (Windows/20090605) MIME-Version: 1.0 To: 3021@debbugs.gnu.org Subject: Re: bug#3021: 23.0.92; MEM FULL on Windows after some VC operations References: <87d4bcqtwo.fsf@marauder.physik.uni-ulm.de> <83ws9kjn8r.fsf@gnu.org> <877i1f1431.fsf@marauder.physik.uni-ulm.de> <49ED4A34.5030003@gnu.org> <87skhbe7zi.fsf@marauder.physik.uni-ulm.de> In-Reply-To: <87skhbe7zi.fsf@marauder.physik.uni-ulm.de> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Reiner Steib wrote: > - What do I need to install to debug a MinGW/MSYS build (Jason's > build) on MS Vista? > gdb (from www.mingw.org) > - To put a breakpoint, of course I need to install the Emacs sources. > How do I have to combine the source (emacs-*.tar.gz) and the binary > (windows/emacs-*-bin-i386.zip) correctly? > Unzipping into the same directory should work - any files contained in both are identical, so no harm will come from replacing, or conversely from keeping the old ones. > - Jason suggested: "find the location where that message is emitted, > and put a breakpoint there"... > > Can someone assist me with this? I'm not familiar with Emacs' C > code. From rgrep on 'MEM.FULL\|memory_full' it's not obvious for me > which would be the right function. > So put a breakpoint on all locations that rgrep shows that message occuring. To run gdb, follow the directions in etc/DEBUG and nt/INSTALL, notably: Start Emacs from the src directory as: gdb ../bin/emacs.exe This helps gdb find the source files, and also it will automatically include the extra functions in src/.gdbinit for inspecting lisp structures and other Emacs specific things. To set a break point in gdb, type one of the following: break functionname break filename:linenum to run emacs until a breakpoint is hit, type run this is the point to pass arguments to Emacs (not when starting gdb, or they will be interpreted as gdb arguments). So to run without init files run -Q You can also run gdb from inside Emacs, in which case setting breakpoints is easier - go to the line where you want the breakpoint in the source file's buffer, and press C-x SPC. But I have found gdb to be unstable within Emacs under Windows, YMMV. From reinersteib+gmane@imap.cc Sat Jul 11 04:52:22 2009 Received: (at 3021) by emacsbugs.donarmstrong.com; 11 Jul 2009 11:52:22 +0000 X-Spam-Checker-Version: SpamAssassin 3.2.5-bugs.debian.org_2005_01_02 (2008-06-10) on rzlab.ucr.edu X-Spam-Level: X-Spam-Bayes: score:0.5 Bayes not run. spammytokens:Tokens not available. hammytokens:Tokens not available. X-Spam-Status: No, score=-3.4 required=4.0 tests=AWL,FOURLA,HAS_BUG_NUMBER autolearn=ham version=3.2.5-bugs.debian.org_2005_01_02 Received: from mail.uni-ulm.de (mail.uni-ulm.de [134.60.1.11]) by rzlab.ucr.edu (8.14.3/8.14.3/Debian-5) with ESMTP id n6BBqFTw010313 for <3021@emacsbugs.donarmstrong.com>; Sat, 11 Jul 2009 04:52:17 -0700 Received: from bridgekeeper.physik.uni-ulm.de (bridgekeeper.physik.uni-ulm.de [134.60.10.175]) by mail.uni-ulm.de (8.14.2/8.14.2) with ESMTP id n6BBqD3o021748 for <3021@emacsbugs.donarmstrong.com>; Sat, 11 Jul 2009 13:52:14 +0200 (MEST) Received: from localhost (localhost [127.0.0.1]) by bridgekeeper.physik.uni-ulm.de (Postfix) with ESMTP id 83BC213933 for <3021@emacsbugs.donarmstrong.com>; Sat, 11 Jul 2009 13:52:13 +0200 (CEST) From: Reiner Steib To: 3021@debbugs.gnu.org Subject: Re: bug#3021: 23.0.92; MEM FULL on Windows after some VC operations References: <87d4bcqtwo.fsf@marauder.physik.uni-ulm.de> <83ws9kjn8r.fsf@gnu.org> <877i1f1431.fsf@marauder.physik.uni-ulm.de> <49ED4A34.5030003@gnu.org> <87skhbe7zi.fsf@marauder.physik.uni-ulm.de> X-Face: mtjf/D:es1T0wHO:&CJ'ZXe"l;3C--rw\z!{`eFwL){|]RpI+4{u25L=5C /0>KuGeTsk<~<&NE-AKV1560e!+RJeyWmSskkrJm?[vUV#66{T_m|Ae<||Ku#Mk5`y&O`n~z2;n8eP J5#2h@2eQgV@E70IY_0WlEx!"&giy{+\%h1LJox$zv@/l%ZmU4^tZA>xQpnkUBVC5.jpg#0'(+2?Rs )NAr:>3<=WxHE$ktbLysDIM5TbmHu*3 Date: Sat, 11 Jul 2009 13:52:11 +0200 In-Reply-To: <87skhbe7zi.fsf@marauder.physik.uni-ulm.de> (Reiner Steib's message of "Sun, 05 Jul 2009 12:31:45 +0200") Message-ID: <87eisnxwr8.fsf@marauder.physik.uni-ulm.de> User-Agent: Gnus/5.110011 (No Gnus v0.11) Emacs/22.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-DCC-SIHOPE-DCC-3-Metrics: poseidon 1085; Body=1 Fuz1=1 Fuz2=1 X-Virus-Scanned: by amavisd-new On Sun, Jul 05 2009, Reiner Steib wrote: > I'll try the most recent pretest next week. During some quick tests with 23.0.95, I couldn't reproduce the problem yet. I'll try again with 23.0.96. Bye, Reiner. -- ,,, (o o) ---ooO-(_)-Ooo--- | PGP key available | http://rsteib.home.pages.de/ From reinersteib+gmane@imap.cc Sat Jul 11 04:57:47 2009 Received: (at 3021) by emacsbugs.donarmstrong.com; 11 Jul 2009 11:57:48 +0000 X-Spam-Checker-Version: SpamAssassin 3.2.5-bugs.debian.org_2005_01_02 (2008-06-10) on rzlab.ucr.edu X-Spam-Level: X-Spam-Bayes: score:0.5 Bayes not run. spammytokens:Tokens not available. hammytokens:Tokens not available. X-Spam-Status: No, score=-3.4 required=4.0 tests=AWL,FOURLA,HAS_BUG_NUMBER autolearn=ham version=3.2.5-bugs.debian.org_2005_01_02 Received: from mail.uni-ulm.de (mail.uni-ulm.de [134.60.1.11]) by rzlab.ucr.edu (8.14.3/8.14.3/Debian-5) with ESMTP id n6BBvhDe011182 for <3021@emacsbugs.donarmstrong.com>; Sat, 11 Jul 2009 04:57:44 -0700 Received: from bridgekeeper.physik.uni-ulm.de (bridgekeeper.physik.uni-ulm.de [134.60.10.175]) by mail.uni-ulm.de (8.14.2/8.14.2) with ESMTP id n6BBvg3x003530; Sat, 11 Jul 2009 13:57:42 +0200 (MEST) Received: from localhost (localhost [127.0.0.1]) by bridgekeeper.physik.uni-ulm.de (Postfix) with ESMTP id 0860C13933; Sat, 11 Jul 2009 13:57:42 +0200 (CEST) From: Reiner Steib To: Jason Rumney Cc: 3021@debbugs.gnu.org Subject: Re: bug#3021: 23.0.92; MEM FULL on Windows after some VC operations References: <87d4bcqtwo.fsf@marauder.physik.uni-ulm.de> <83ws9kjn8r.fsf@gnu.org> <877i1f1431.fsf@marauder.physik.uni-ulm.de> <49ED4A34.5030003@gnu.org> <87skhbe7zi.fsf@marauder.physik.uni-ulm.de> <4A50CE7F.8030905@gnu.org> X-Face: /U7=m^"/-Dn61mAl{g9e3>\G5Tp,oEX|V)g2I1hBk\ML;)7A?6cmB-y7y?'NA^J<=oz7syB =(McAwIHgLX!.B?R3X}98d@?>CrT094KLWh]WU4gDpnL/")MS(XoQTv`Oq225uL>+;CpPXo$N5e>N> $tPd-gbB^F{gQS#1ase]XO~D4p4M"3+F-7~u]dy3I?Pb8RO*H-EFeWDUf?Rf,d]pv\Jvh2Cht!A=im yKAS2Z%Ao^;}W/qzMvMm Mail-Followup-To: Jason Rumney , 3021@debbugs.gnu.org Reply-To: Reiner Steib Date: Sat, 11 Jul 2009 13:57:39 +0200 In-Reply-To: <4A50CE7F.8030905@gnu.org> (Jason Rumney's message of "Mon, 06 Jul 2009 00:02:07 +0800") Message-ID: <873a93xwi4.fsf@marauder.physik.uni-ulm.de> User-Agent: Gnus/5.110011 (No Gnus v0.11) Emacs/22.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-DCC-SIHOPE-DCC-3-Metrics: poseidon 1085; Body=2 Fuz1=2 Fuz2=2 X-Virus-Scanned: by amavisd-new On Sun, Jul 05 2009, Jason Rumney wrote: > Reiner Steib wrote: >> - What do I need to install to debug a MinGW/MSYS build (Jason's >> build) on MS Vista? >> > gdb (from www.mingw.org) > >> - To put a breakpoint, of course I need to install the Emacs sources. >> How do I have to combine the source (emacs-*.tar.gz) and the binary >> (windows/emacs-*-bin-i386.zip) correctly? > > Unzipping into the same directory should work - any files contained in both > are identical, so no harm will come from replacing, or conversely from keeping > the old ones. Thanks, that worked. There was some warning/error from gdb (sorry, I didn't write it down) when starting it (with a "continue y/n" prompt), but I could run emacs.exe from gdb. These instructions should be documented in some readme/debug files, I think. Bye, Reiner. -- ,,, (o o) ---ooO-(_)-Ooo--- | PGP key available | http://rsteib.home.pages.de/ From reinersteib+gmane@imap.cc Wed Jul 15 11:51:15 2009 Received: (at 3021) by emacsbugs.donarmstrong.com; 15 Jul 2009 18:51:16 +0000 X-Spam-Checker-Version: SpamAssassin 3.2.5-bugs.debian.org_2005_01_02 (2008-06-10) on rzlab.ucr.edu X-Spam-Level: X-Spam-Bayes: score:0.5 Bayes not run. spammytokens:Tokens not available. hammytokens:Tokens not available. X-Spam-Status: No, score=-3.4 required=4.0 tests=AWL,FOURLA,HAS_BUG_NUMBER autolearn=unavailable version=3.2.5-bugs.debian.org_2005_01_02 Received: from mail.uni-ulm.de (mail.uni-ulm.de [134.60.1.11]) by rzlab.ucr.edu (8.14.3/8.14.3/Debian-5) with ESMTP id n6FIo4kj011564; Wed, 15 Jul 2009 11:50:06 -0700 Received: from bridgekeeper.physik.uni-ulm.de (bridgekeeper.physik.uni-ulm.de [134.60.10.175]) by mail.uni-ulm.de (8.14.2/8.14.2) with ESMTP id n6FIo29o023737; Wed, 15 Jul 2009 20:50:03 +0200 (MEST) Received: from localhost (localhost [127.0.0.1]) by bridgekeeper.physik.uni-ulm.de (Postfix) with ESMTP id AE2B7138FC; Wed, 15 Jul 2009 20:50:02 +0200 (CEST) From: Reiner Steib Newsgroups: gmane.emacs.bugs To: 3021@debbugs.gnu.org Subject: Re: bug#3021: 23.0.92; MEM FULL on Windows after some VC operations References: <87d4bcqtwo.fsf@marauder.physik.uni-ulm.de> <83ws9kjn8r.fsf@gnu.org> <877i1f1431.fsf@marauder.physik.uni-ulm.de> <49ED4A34.5030003@gnu.org> <87skhbe7zi.fsf@marauder.physik.uni-ulm.de> <87eisnxwr8.fsf@marauder.physik.uni-ulm.de> X-Face: /U7=m^"/-Dn61mAl{g9e3>\G5Tp,oEX|V)g2I1hBk\ML;)7A?6cmB-y7y?'NA^J<=oz7syB =(McAwIHgLX!.B?R3X}98d@?>CrT094KLWh]WU4gDpnL/")MS(XoQTv`Oq225uL>+;CpPXo$N5e>N> $tPd-gbB^F{gQS#1ase]XO~D4p4M"3+F-7~u]dy3I?Pb8RO*H-EFeWDUf?Rf,d]pv\Jvh2Cht!A=im yKAS2Z%Ao^;}W/qzMvMm Reply-To: Reiner Steib Mail-Copies-To: nobody Date: Wed, 15 Jul 2009 20:49:58 +0200 Message-ID: <87bpnlu6g9.fsf@marauder.physik.uni-ulm.de> User-Agent: Gnus/5.110011 (No Gnus v0.11) Emacs/22.1 (gnu/linux) Cancel-Lock: sha1:vp8axgqSfGuY6hBKoJbitUPraJc= In-Reply-To: <87eisnxwr8.fsf@marauder.physik.uni-ulm.de> (Reiner Steib's message of "Sat, 11 Jul 2009 13:52:11 +0200") MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Posted-To: gmane.emacs.bugs X-DCC-CTc-dcc2-Metrics: poseidon 1031; Body=2 Fuz1=2 Fuz2=2 X-Virus-Scanned: by amavisd-new [ The following message is a courtesy copy of an article that has been posted to news:gmane.emacs.bugs as well. ] close 3021 quit On Sat, Jul 11 2009, Reiner Steib wrote: > On Sun, Jul 05 2009, Reiner Steib wrote: >> I'll try the most recent pretest next week. > During some quick tests with 23.0.95, I couldn't reproduce the > problem yet. I'll try again with 23.0.96. I did a lot of VC operations with Emacs 23.0.95 today and there was no MEM FULL message. So I think we can close this bug. -> Done. Bye, Reiner. -- ,,, (o o) ---ooO-(_)-Ooo--- | PGP key available | http://rsteib.home.pages.de/ From unknown Tue Sep 09 02:55:08 2025 Received: (at fakecontrol) by fakecontrolmessage; To: internal_control@debbugs.gnu.org From: $requester Subject: Internal Control Message-Id: bug archived. Date: Thu, 13 Aug 2009 14:24:19 +0000 User-Agent: Fakemail v42.6.9 # A New Hope # A log time ago, in a galaxy far, far away # something happened. # # Magically this resulted in the following # action being taken, but this fake control # message doesn't tell you why it happened # # The action: # bug archived. thanks # This fakemail brought to you by your local debbugs # administrator