Having tried to figure out what MNG and JNG are, I visited
http://pmt.sourceforge.net/opossum and noticed that NetSurf (25 Jul
2004 23:00) crashes with a stacktrace when trying to load picture
opossum.jng at the above location:
User-Agent: NetSurf
Host:
pmt.sourceforge.net
Accept-Encoding: gzip
Referer:
http://pmt.sourceforge.net/opossum/
Accept-Language: en, *;q=0.1
< HTTP/1.1 200 OK
< Date: Mon, 26 Jul 2004 05:58:23 GMT
< Server: Apache/1.3.26 (Unix) PHP/4.1.2
< Last-Modified: Mon, 30 Jun 2003 22:06:53 GMT
< ETag: "2c3ab4-f03-3f00b47d"
< Accept-Ranges: bytes
< Content-Length: 3843
< Content-Type: image/x-jng
< Connection: close
content/fetch.c fetch_curl_data 631: fetch 0x674235e8, size 1448
content/fetch.c fetch_process_headers 728: HTTP status code 200
content/fetch.c fetch_process_headers 771: FETCH_TYPE, 'image/x-jng'
content/fetchcache.c fetchcache_callback 216: FETCH_TYPE, type 6
content/content.c content_set_type 349: content
http://pmt.sourceforge.net/opossum/opossum.jng, type 6
content/fetch.c fetch_curl_data 639: FETCH_DATA
content/fetchcache.c fetchcache_callback 241: FETCH_DATA
content/content.c content_process_data 418: content
http://pmt.sourceforge.net/opossum/opossum.jng, size 1448
content/fetch.c fetch_curl_data 631: fetch 0x674235e8, size 2395
content/fetch.c fetch_curl_data 639: FETCH_DATA
content/fetchcache.c fetchcache_callback 241: FETCH_DATA
content/content.c content_process_data 418: content
http://pmt.sourceforge.net/opossum/opossum.jng, size 2395
Fatal signal received: Segmentation fault
A stack backtrace will now follow ...)
stack backtrace:
pc: 18a088 sp: 237f64 ^write_backtrace()
pc: 19c798 sp: 237f8c ^post_signal()
pc: 19ca98 sp: 237fa4 __unixlib_raise_signal()
pc: 1eab34 sp: 236494 __h_cback()
Register dump:
a1: 0 a2: 100f9 a3: 4b a4: 0
v1: 77746968 v2: 10101 v3: 200978 v4: 674991c8
v5: 6744cfb0 v6: 4 sl: 67450690 fp: 236210
ip: 2364ac sp: 77746968 lr: 236494 pc: 77756a61
pc: 6d2f0 sp: 2364b0 free()
pc: 64560 sp: 2364c0 jpeg_free_large()
pc: 102794 sp: 2364e4 ^free_pool()
pc: 102934 sp: 2364fc ^self_destruct()
pc: 630f4 sp: 236510 jpeg_destroy()
pc: 62424 sp: 236520 jpeg_destroy_decompress()
pc: 540d8 sp: 23657c ?()
pc: 5818c sp: 2365b4 ?()
pc: 5cc78 sp: 2365c8 ?()
pc: fd898 sp: 236cb4 ?()
pc: fda34 sp: 236ce0 ?()
pc: fdef0 sp: 236d00 ?()
pc: ec6f4 sp: 236d1c ?()
pc: 290dc sp: 236d34 nsmng_process_data()
pc: 16c614 sp: 236d9c content_process_data()
pc: b984 sp: 236e08 ^fetchcache_callback()
pc: 938c4 sp: 236e28 ^fetch_curl_data()
pc: 1304f0 sp: 236e48 Curl_client_write()
pc: 173290 sp: 236ee8 Curl_readwrite()
pc: 3521c sp: 236f1c curl_multi_perform()
pc: 934d8 sp: 236f38 fetch_poll()
pc: 96b80 sp: 236f48 ^netsurf_poll()
pc: 9690c sp: 236f60 main()
pc: 189aec sp: 236f78 _main()
--
Stefan Bellon