From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mimir.eigenstate.org ([206.124.132.107]) by ewsd; Mon Feb 17 00:59:36 EST 2020 Received: from abbatoir.fios-router.home (pool-162-83-132-245.nycmny.fios.verizon.net [162.83.132.245]) by mimir.eigenstate.org (OpenSMTPD) with ESMTPSA id 0f0f2b25 (TLSv1.2:ECDHE-RSA-AES256-SHA:256:NO); Sun, 16 Feb 2020 21:59:21 -0800 (PST) Message-ID: To: plan9fullfrontal@qs.co.nz, 9front@9front.org Subject: Re: [9front] Help wanted tracking down a bug in divergefs code Date: Sun, 16 Feb 2020 21:59:20 -0800 From: ori@eigenstate.org In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: social cloud SSL dependency deep-learning descriptor-aware hosting > Any way, any ideas on where I can put more fprints to track down which > bit of code is in the wrong? The first step: find as small a repro for this bug as you can. And then post it (ideally as a script) so that someeone else can test it.