< achow101> The current master fails to cross compile for windows for me. Anyone else see this?
< GitHub193> [bitcoin] achow101 opened pull request #7953: Create signmessagewithprivkey rpc (master...signmessagewithprivkey) https://github.com/bitcoin/bitcoin/pull/7953
< GitHub115> [bitcoin] theuni opened pull request #7954: build: quiet annoying warnings without adding new ones (master...clean-warnings) https://github.com/bitcoin/bitcoin/pull/7954
< GitHub131> [bitcoin] pstratem opened pull request #7955: [WIP] sync mempool after new block (master...2016-04-26-mempoolsync) https://github.com/bitcoin/bitcoin/pull/7955
< gmaxwell> So -- we have bytessent_per_msg and bytesrecv_per_msg ... would it be insane to ahve a bytes_implied to track bytes of blocks implicitly sent/recieved via comprblock/blocktxn in matt's block relay code?
< da2ce7_mobile> is there a easy way to 'reset' an unconfirmed transaction in Bitcoin-QT?
< da2ce7_mobile> I should be able to right click on a unconfirmed transaction and go 'delete' and then make a replacement one. (if I wish).
< da2ce7_mobile> But I suppose reddit would go crazy if you could do that. "meh-unconfirmed-tx-double-spends"
< sipa> da2ce7_mobile: there is a pull request for adding support for abandoning a transactionz and RPCs for respending with higher fee
< luke-jr> da2ce7_mobile: the right click option needs to do the replacement too, so it can ensure there's a shared input
< da2ce7_mobile> what is the best way to do it *now* if I don't want to compile bitcoin with that pull request merged?
< luke-jr> da2ce7_mobile: the abandon RPC + coin control to ensure you double-spend it
< da2ce7_mobile> I try: abandontransaction "txid" but it fails.
< da2ce7_mobile> "TX is not eligible for abandonment (code -5)"
< da2ce7_mobile> I cannot find the documentation to explain what code -5 is.
< sipa> da2ce7_mobile: the code will not tell you anything more than the text
< sipa> da2ce7_mobile: and the rpc help for abandontransaction will explain more
< GitHub28> [bitcoin] MarcoFalke pushed 3 new commits to master: https://github.com/bitcoin/bitcoin/compare/e26b62093ae2...5c7df7022bcd
< GitHub28> bitcoin/master 5555528 MarcoFalke: [qa] mininode: Unfiddle strings into bytes
< GitHub28> bitcoin/master fada064 MarcoFalke: [qa] test_framework: Properly print exceptions and assert empty dict
< GitHub28> bitcoin/master 5c7df70 MarcoFalke: Merge #7951: [qa] test_framework: Properly print exception...
< GitHub148> [bitcoin] MarcoFalke closed pull request #7951: [qa] test_framework: Properly print exception (master...Mf1604-qaMinorFixes) https://github.com/bitcoin/bitcoin/pull/7951
< GitHub56> [bitcoin] laanwj opened pull request #7956: test: Add more thorough test for dbwrapper iterators (master...2016_04_dbwrapper_iterator_tess) https://github.com/bitcoin/bitcoin/pull/7956
< gmaxwell> https://bugzilla.redhat.com/show_bug.cgi?id=1020292 < any idea why fedora is building core with tests disabled?
< luke-jr> gmaxwell: dependencies perhaps?
< luke-jr> although I think it's just python-zmq, IIRC we need a rather new version of it
< luke-jr> and that's just Python tests
< sipa> libsecp256k1 tests try to link and run with OpenSSL EC
< sipa> maybe that matters as well?
< gmaxwell> they'll work without openssl, but may not handle the goofed up openssl ec in fedora.
< wumpus> bah, so it should detect deliberately broken openssl as well
< wumpus> luke-jr: only the RPC tests need python-zmq though; I doubt they'd run those
< wumpus> this must be related to either test_bitcoin or secp256k1 tests
< GitHub24> [bitcoin] laanwj pushed 2 new commits to master: https://github.com/bitcoin/bitcoin/compare/5c7df7022bcd...08b37c5e06bf
< GitHub24> bitcoin/master 63b3111 Cory Fields: build: quiet annoying warnings without adding new ones...
< GitHub24> bitcoin/master 08b37c5 Wladimir J. van der Laan: Merge #7954: build: quiet annoying warnings without adding new ones...
< GitHub89> [bitcoin] laanwj closed pull request #7954: build: quiet annoying warnings without adding new ones (master...clean-warnings) https://github.com/bitcoin/bitcoin/pull/7954
< GitHub156> [bitcoin] laanwj closed pull request #7899: optionally provide privkey to signmessage RPC (master...signmessage-using-privkey) https://github.com/bitcoin/bitcoin/pull/7899
< GitHub122> [bitcoin] laanwj pushed 3 new commits to 0.12: https://github.com/bitcoin/bitcoin/compare/89ae85484c8b...18b3c3ced812
< GitHub122> bitcoin/0.12 9ca957b Wladimir J. van der Laan: tests: Make proxy_test work on travis servers without IPv6...
< GitHub122> bitcoin/0.12 564aaa2 Cory Fields: travis: switch to Trusty...
< GitHub122> bitcoin/0.12 18b3c3c Wladimir J. van der Laan: Merge #7950: [0.12] travis: switch to Trusty...
< GitHub85> [bitcoin] laanwj closed pull request #7950: [0.12] travis: switch to Trusty (0.12...Mf1604-012travisTrusty) https://github.com/bitcoin/bitcoin/pull/7950
< Chris_Stewart_5> Should this test case fail as a INVALID_STACK_OPERATION instead of BAD_OPCODE?
< Chris_Stewart_5> ["0x4c01","0x01 NOP", "P2SH,STRICTENC","BAD_OPCODE", "PUSHDATA1 with not enough bytes"]
< afk11> Chris_Stewart_5, the test fails because of line 265 I imagine - script.GetOp is responsible for loading the opcode, and pushdata if any. That case has pushdata1 + the length marker, but is missing a byte the interpreter knows should be there
< afk11> hence that function would fail, resulting in SCRIPT_ERR_BAD_OPCODE
< afk11> oops, I'm talking about interpreter.cpp's line 265
< sipa> there is no problem with the stack in that code :)
< sipa> the stack isn't even touched by the failing instruction
< sipa> afk11: indeed
< Chris_Stewart_5> I guess I was thinking in the sense that it is failing to push something onto the stack.. however if we continue that though almost every error would be an invalid stack op
< Chris_Stewart_5> thought*
< afk11> Chris_Stewart_5, it's only thrown once in the codebase - if the opcode is totally invalid
< Chris_Stewart_5> afk11: Not sure what you mean by that. In the case we are talking about the op code is valid, however the arguments for the op are invalid
< Chris_Stewart_5> I guess the semantics for SCRIPT_ERROR_BAD_OPCODE extend to the op code AND its implicit arguments
< GitHub11> [bitcoin] jonasschnelli opened pull request #7957: [RPC][Bitcoin-TX] Add support for sequence number (master...2016/04/rbf_base) https://github.com/bitcoin/bitcoin/pull/7957
< afk11> Chris_Stewart_5, indeed. check here to see why https://github.com/bitcoin/bitcoin/blob/master/src/script/script.h#L503
< Chris_Stewart_5> Thanks afk11
< Chris_Stewart_5> Are there any script_tests that test CHECKSEQUENCEVERIFY? I did a quick search and it appears that term doesn't appear in script_tests.json
< sipa> Chris_Stewart_5: sure, in qa/rpc-tests there are some
< GitHub78> [bitcoin] paveljanik closed pull request #7810: Refactor AlertNotifyOnce out of UpdateTip (master...20160405_AlertNotifyOnce) https://github.com/bitcoin/bitcoin/pull/7810
< GitHub25> [bitcoin] paveljanik opened pull request #7958: Remove useless argument to AlertNotify. (master...20160427_AlertNotify_remove_arg) https://github.com/bitcoin/bitcoin/pull/7958
< GitHub147> [bitcoin] kazcw opened pull request #7959: fix race that could fail to persist a ban (master...banmap_race) https://github.com/bitcoin/bitcoin/pull/7959
< kanzure> still seeing "Request-sent" errors from a python application using python-bitcoinlib's rpc connection object, originally i reported this as #6454 which was fixed by using rpckeepalive=0 (#6454 had an additional issue where rpc would become completely locked up).
< kanzure> my more recent encounters of "Request-sent" are unfortunately not associated with that rpc thread locking behavior
< kanzure> unsure whether this is a python issue or a bitcoind issue. i've found that creating new python-bitcoinlib rpc connection objects (instead of reusing a single object over the course of a few hundred rpc requests and a few minutes) does not cause the "Request-sent" error..
< kanzure> (specifically the exception is "http.client.CannotSendRequest: Request-sent")
< jl2012> Will all disabled op codes (e.g. OP_CAT) fail the script, even in an unexecuted branch?
< cfields> MarcoFalke: ping
< MarcoFalke> pong]
< cfields> MarcoFalke: not sure if you saw yesterday... have you looked into parallelizing the rpc tests?
< MarcoFalke> Not yet, other things are holding me back right now.
< cfields> ok. But there's not any major reason not to?
< MarcoFalke> no
< cfields> great. I experimented with it yesterday, and it seemed to work quite well. Unfortunately my python is terrible though, so it was just hacking and slashing
< MarcoFalke> Oh, nice!
< MarcoFalke> My python-foo is not that high, either :)
< cfields> heh, that's not true at all :)
< cfields> only major change necessary seems to be listening port definition. atm we use the pid..pid+3 range, which causes overlaps in tests (assuming they're launched in separate processes as opposed to threads). My solution was to pass in the port range everywhere instead
< cfields> er, func(pid...pid+3), not the pids themselves
< MarcoFalke> you mean passing in from rpc-tests.py ?
< MarcoFalke> I can have a look at the patch if you push it
< cfields> yea, the framework accepts a new option for port range, which defaults to the old behavior of func(pid). In the pull-tester case, it overrides
< GitHub19> [bitcoin] sdaftuar opened pull request #7960: Only use AddInventoryKnown for transactions (master...block-inv-filter) https://github.com/bitcoin/bitcoin/pull/7960
< sipa> cfields: do you have any idea whether memset_s is something common in recent C compilers?
< sipa> cfields: because if it's there, we should use it instead of OpenSSL_cleanse
< luke-jr> sipa: I don't even have a manpage for memset_s :p
< sipa> luke-jr: eh, neither do i!
< gmaxwell> sipa: its an appendix of the langauge, and seemingly not quick in coming.
< gmaxwell> looks like we should implement our own. :(
< luke-jr> hm
< sipa> (not suggesting we use NetBSD, but that approach may be useful)
< luke-jr> right
< sipa> or we could just include a piece of asm for common platforms *ducks*
< gmaxwell> sipa: it was my expectation that we had to do that.. the argument that you could use a volitile function pointer is new to me...
< sipa> (the extended asm syntax supported by gcc and clang can indicate that it has side-effects, and the compiler is not allowed to remove it or duplicate it)
< sipa> gmaxwell: how about you make two wrappers around memset, each which modifies a TLS pointer to point to the other one
< sipa> not only is it volatile then, it's even actually changing :)
< gmaxwell> the only disagreement I might have with that volitile pointer argument is that for a long time many compilers frequently miscompiled code when volitile was in use (sometimes even worse than just ignoring the volitile)-- though in the last 5 years that has gotten _much_ better.
< luke-jr> inb4 it compiles to: if (memset_volatile != memset) memset_volatile(…);
< cfields> sipa: i've wrestled with that one. We could do an autoconf check for it, but if it's not there we'd fall back to something else. So ultimately we're stuck with a reliance on something else, or we roll our own and don't bother checking for memset_s