This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

classification
Title: add a pidfd child process watcher
Type: enhancement Stage: resolved
Components: asyncio Versions: Python 3.9
process
Status: closed Resolution: fixed
Dependencies: Superseder:
Assigned To: Nosy List: asvetlov, yselivanov
Priority: normal Keywords: patch

Created on 2019-11-05 05:43 by benjamin.peterson, last changed 2022-04-11 14:59 by admin. This issue is now closed.

Files
File name Uploaded Description Edit
0001-asyncio-Add-a-pidfd-child-process-watcher.patch benjamin.peterson, 2019-11-05 05:43
Pull Requests
URL Status Linked Edit
PR 17063 merged benjamin.peterson, 2019-11-05 15:24
PR 17069 merged benjamin.peterson, 2019-11-06 03:23
PR 17161 merged aeros, 2019-11-15 02:27
PR 17290 merged vstinner, 2019-11-20 14:43
PR 25515 open gousaiyang, 2021-04-22 01:16
Messages (45)
msg356001 - (view) Author: Benjamin Peterson (benjamin.peterson) * (Python committer) Date: 2019-11-05 05:43
Recent versions of Linux has built out support for pidfd, a way to do process management with file descriptors. I wanted to try it out, so implemented a pidfd-based child watcher for asyncio.

My WIP progress patch is attached. It passes all asyncio tests.
msg356016 - (view) Author: Andrew Svetlov (asvetlov) * (Python committer) Date: 2019-11-05 10:35
Awesome!

I think the patch can be splitted in os.pidfd_open() and asyncio part itself.

os modification is clear.

asyncio part looks correct after the brief view. 
My the main question is: how to detect if the new watcher can be used or asyncio should fallback to threaded based solution?
msg356017 - (view) Author: Andrew Svetlov (asvetlov) * (Python committer) Date: 2019-11-05 10:36
Nathaniel, you may be interested in the pidfd_open(), at least in adding the function to os module.
msg356024 - (view) Author: STINNER Victor (vstinner) * (Python committer) Date: 2019-11-05 11:08
I like the idea of exposing pidfd_open() syscall as os.pidfd_open().

Benjamin: Would you mind to create a PR based on your patch, but without your asyncio change?

> +#ifndef __NR_pidfd_open

I would prefer to avoid this part of the patch.

You should accept an optional flags parameter, no?
msg356026 - (view) Author: STINNER Victor (vstinner) * (Python committer) Date: 2019-11-05 11:11
+        self._loop._remove_reader(pidfd)
+        os.close(pidfd)

Note: Maybe do these operations in the reverse order. I expect a higher risk of exception when calling Python self._loop._remove_reader(), than on closing a FD that we opened.
msg356047 - (view) Author: Nathaniel Smith (njs) * (Python committer) Date: 2019-11-05 17:31
Thanks for the CC.

It would be nice to get `pidfd_send_signal` as well, while we're at it. But that could be a separate PR.

AFAICT the other bits of the pidfd API right now are some extra flags to clone, and an extra flag to waitid. The waitid flag is nice-to-have but not really urgent, since it's easy enough to use a flag even if the stdlib doesn't explicitly expose it. The clone flags are super interesting, but before we can use them, we need to have some way to access clone itself, and that's a big complicated project, so we definitely shouldn't worry about it here.
msg356048 - (view) Author: Benjamin Peterson (benjamin.peterson) * (Python committer) Date: 2019-11-05 17:35
Yes, I will be submitting followup changes for pidfd_send_signal and the other goodies.

I would like to use pidfds in subprocess, but as you as you say, that's another kettle of fish.
msg356068 - (view) Author: STINNER Victor (vstinner) * (Python committer) Date: 2019-11-05 22:02
See also bpo-38630 "subprocess.Popen.send_signal() should poll the process".
msg356069 - (view) Author: Kyle Stanley (aeros) * (Python committer) Date: 2019-11-05 22:07
> My the main question is: how to detect if the new watcher can be used or asyncio should fallback to threaded based solution?

Perhaps in the __init__ we could do something like this:

class PidfdChildWatcher(AbstractChildWatcher):

    def __init__(self):
        if not hasattr(os, "pidfd_open"):
             raise RuntimeError("os.pidfd_open() is unavailable.")
        ...

Thoughts?

> My WIP progress patch is attached. It passes all asyncio tests.

I think we could also specifically look for race conditions with `./python -m test test_asyncio.test_subprocess -F -j4`, rather than relying on the tests passing with a single job. The other child watchers have been particularly infamous when it comes race conditions and resource leaks. 

I'd be glad to work on testing and opening a PR to asyncio if needed (while giving Benjamin credit for the patch of course).
msg356071 - (view) Author: Nathaniel Smith (njs) * (Python committer) Date: 2019-11-05 22:39
hasattr is useful for supporting old versions of the os module, but asyncio doesn't have to care about that. You should probably try calling pidfd_open and see whether you get -ESYSCALL, and also maybe try passing it to poll(), since I think there might have been a release where the syscall existed but it wasn't pollable. Not sure what the error for that looks like.
msg356079 - (view) Author: Benjamin Peterson (benjamin.peterson) * (Python committer) Date: 2019-11-06 00:05
pidfd_open was added after pidfd pollling, so it should suffice to make sure pidfd_open doesn't ENOSYS.
msg356087 - (view) Author: Benjamin Peterson (benjamin.peterson) * (Python committer) Date: 2019-11-06 03:21
New changeset 6c4c45efaeb40f4f837570f57d90a0b3429c6ae9 by Benjamin Peterson in branch 'master':
bpo-38692: Add os.pidfd_open. (GH-17063)
https://github.com/python/cpython/commit/6c4c45efaeb40f4f837570f57d90a0b3429c6ae9
msg356148 - (view) Author: STINNER Victor (vstinner) * (Python committer) Date: 2019-11-06 17:57
Would it be useful to use a pidfd in subprocess.Popen to fix bpo-38630 root issue, when pidfd is available?
msg356164 - (view) Author: Benjamin Peterson (benjamin.peterson) * (Python committer) Date: 2019-11-07 02:57
On Wed, Nov 6, 2019, at 09:57, STINNER Victor wrote:
> 
> STINNER Victor <vstinner@python.org> added the comment:
> 
> Would it be useful to use a pidfd in subprocess.Popen to fix bpo-38630 
> root issue, when pidfd is available?

Probably, but as noted above, we need to figure out the best way to integrate pidfds into subprocess. (Probably not in this issue.)
msg356235 - (view) Author: (yan12125) * Date: 2019-11-08 10:12
I got a failure in newly added test_pidfd_open:

======================================================================
FAIL: test_pidfd_open (test.test_posix.PosixTester)
----------------------------------------------------------------------
Traceback (most recent call last):
  File "/build/python-git/src/cpython/Lib/test/test_posix.py", line 1479, in test_pidfd_open
    self.assertEqual(cm.exception.errno, errno.EINVAL)
AssertionError: 1 != 22

----------------------------------------------------------------------

I'm running kernel 5.3.7-x86_64-linode130 with Arch Linux. At first I suspect that it's related to system call filters from systemd as tests are run in a systemd-nspawn container. However, there are still failures after patching systemd with https://github.com/systemd/systemd/commit/9e486265716963439fb0fd7f2a97abf109f24f75.

How about also skipping the test if pidfd_open returns EPERM?
msg356251 - (view) Author: Benjamin Peterson (benjamin.peterson) * (Python committer) Date: 2019-11-08 17:03
I think you must still be experiencing some sort of sandboxing. I don't know how else you would get an EPERM out of pidfd_open.
msg356286 - (view) Author: Kyle Stanley (aeros) * (Python committer) Date: 2019-11-09 06:06
> I got a failure in newly added test_pidfd_open:

> I'm running kernel 5.3.7-x86_64-linode130 with Arch Linux.

> I think you must still be experiencing some sort of sandboxing. I don't know how else you would get an EPERM out of pidfd_open.

I believe Benjamin is correct. On a native install of Arch Linux with kernel 5.3.7 (using latest updates from the official repos), I received no failures in test_posix. 

[aeros:~/repos/benjaminp-cpython]$ ./python -m test test_posix     (asyncio-pidfd) 
0:00:00 load avg: 1.86 Run tests sequentially
0:00:00 load avg: 1.86 [1/1] test_posix

== Tests result: SUCCESS ==

1 test OK.

Total duration: 544 ms
Tests result: SUCCESS

To confirm there weren't intermittent failures, I also ran test_posix indefinitely, sending SIGINT after ~2500 iterations. No failures occurred:

[aeros:~/repos/benjaminp-cpython]$ ./python -m test test_pty -F    (asyncio-pidfd) 
...
0:01:31 load avg: 1.57 [2506] test_pty
0:01:31 load avg: 1.57 [2507] test_pty
^C

== Tests result: INTERRUPTED ==
Test suite interrupted by signal SIGINT.

2506 tests OK.

Total duration: 1 min 31 sec
Tests result: INTERRUPTED

It seems that the issue is likely specific to Chih-Hsuan Yen's environment.
msg356287 - (view) Author: Kyle Stanley (aeros) * (Python committer) Date: 2019-11-09 06:09
> [aeros:~/repos/benjaminp-cpython]$ ./python -m test test_pty -F    (asyncio-pidfd) 
...
0:01:31 load avg: 1.57 [2506] test_pty
0:01:31 load avg: 1.57 [2507] test_pty

Oops, looks like I copied the wrong results of a separate test I was running earlier. I'll post the results of ~1000 iterations of test_posix below, once it is completed again.
msg356288 - (view) Author: Kyle Stanley (aeros) * (Python committer) Date: 2019-11-09 06:17
[aeros:~/repos/benjaminp-cpython]$ ./python -m test test_posix -F  (asyncio-pidfd) 
...
0:08:52 load avg: 1.89 [1008] test_posix
0:08:52 load avg: 2.22 [1009] test_posix
...

1008 tests OK.

Total duration: 8 min 52 sec
Tests result: INTERRUPTED
msg356289 - (view) Author: Benjamin Peterson (benjamin.peterson) * (Python committer) Date: 2019-11-09 06:31
It seems like systemd-nspawn is just breaking everything: https://sourceware.org/ml/libc-alpha/2019-11/msg00277.html
msg356292 - (view) Author: (yan12125) * Date: 2019-11-09 09:57
Benjamin Peterson, Kyle Stanley: Thank you both very much for intensive testing and helpful information! Yes on my Arch Linux box tests are also fine without systemd-nspawn. However, as I have to use systemd-nspawn for some reasons, and investigating how it blocks system calls is beyond my ability, I just add a workaround for now: https://aur.archlinux.org/cgit/aur.git/tree/python-git-issue38692.diff?h=python-git.
msg356488 - (view) Author: STINNER Victor (vstinner) * (Python committer) Date: 2019-11-12 21:23
> It seems like systemd-nspawn is just breaking everything: https://sourceware.org/ml/libc-alpha/2019-11/msg00277.html

Well, we can try to argue to not block syscalls, but I'm not sure that we can win such battle :-) For os.urandom(), I chose to handle EPERM as ENOSYS in bpo-27955. Extract of Python/bootstrap_hash.c:

            /* ENOSYS: the syscall is not supported by the kernel.
               EPERM: the syscall is blocked by a security policy (ex: SECCOMP)
               or something else. */
            if (errno == ENOSYS || errno == EPERM) {
                getrandom_works = 0;
                return 0;
            }

We can just skip the test if the syscall fails with EPERM.
msg356491 - (view) Author: Benjamin Peterson (benjamin.peterson) * (Python committer) Date: 2019-11-12 21:52
We should not claim to support running our tests in weird syscall sandboxes. There's an infinite number of possible sandboxing configurations, and we can't fix them all.
msg356492 - (view) Author: STINNER Victor (vstinner) * (Python committer) Date: 2019-11-12 22:09
> We should not claim to support running our tests in weird syscall sandboxes. There's an infinite number of possible sandboxing configurations, and we can't fix them all.

There is no request to support an "an infinite number of possible sandboxing configurations". Only to skip the test if the syscall fails with EPERM. That sounds reasonable to me.
msg356493 - (view) Author: Benjamin Peterson (benjamin.peterson) * (Python committer) Date: 2019-11-12 22:16
Sure, that change on it's own looks small and harmless. My point is that it's a slippery slope. Why is that sandbox configuration important enough to handle? It won't be tested by our CI and no one will know whether they can ever remove the EPERM skipping case.
msg356494 - (view) Author: STINNER Victor (vstinner) * (Python committer) Date: 2019-11-12 22:18
> Why is that sandbox configuration important enough to handle? It won't be tested by our CI and no one will know whether they can ever remove the EPERM skipping case.

It's just convenient for users who use/test Python in a Linux sandbox.

The fact is that 2 days after you merged the new test, a first user reported a failure. I expect more issues if we don't simply fix the test :-) Sandboxes on Linux are more and more common.
msg356497 - (view) Author: Benjamin Peterson (benjamin.peterson) * (Python committer) Date: 2019-11-12 22:28
It will be fixed, though, as soon as the user upgrades systemd.
msg356556 - (view) Author: Yury Selivanov (yselivanov) * (Python committer) Date: 2019-11-13 21:32
We can merge this PR as is (Benjamin, thanks for working on this!), but I think that as soon as we merge it we should do some refactoring and deprecations.

The child watchers API has to go. It's confusing, painful to use, it's not compatible with third-party event loops. It increases the API surface without providing us with enough benefits.

What I propose:

* merge this watcher and try to use it as the default on modern Linuxes.  We don't document it.

* deprecate add_child_watcher and all child watcher classes in 3.9. Aim for removal in 3.11.  

In 3.9 we will use kqueue / pidfd / threads / winapis -- whatever is available, but we never use SIGCHLD by default.
msg356566 - (view) Author: Kyle Stanley (aeros) * (Python committer) Date: 2019-11-13 22:54
> We can merge this PR as is (Benjamin, thanks for working on this!), but I think that as soon as we merge it we should do some refactoring and deprecations.

> The child watchers API has to go. It's confusing, painful to use, it's not compatible with third-party event loops. It increases the API surface without providing us with enough benefits.

+1

> In 3.9 we will use kqueue / pidfd / threads / winapis -- whatever is available, but we never use SIGCHLD by default.

IIRC, we don't use SIGCHLD by default at the moment, since ThreadedChildWatcher is the default child watcher. Should we change the default to be the new PidfdChildWatcher for Linux kernels 5.3+ in Python 3.9, and fallback to ThreadedChildWatcher for systems without pidfd_open()?
msg356567 - (view) Author: Kyle Stanley (aeros) * (Python committer) Date: 2019-11-13 23:36
> > The child watchers API has to go. It's confusing, painful to use, it's not compatible with third-party event loops. It increases the API surface without providing us with enough benefits.

> +1

Also, adding to this, the child watchers are one of the least used components of asyncio's public API. So, I think the deprecation and removal cost will be fairly minimal. See the GitHub code usage (includes exact copies of Lib/asyncio/unix_events.py, so there's some redundancy):

MultiLoopChildWatcher: https://github.com/search?l=Python&q=MultiLoopChildWatcher&type=Code (20 results, just added in 3.8)
ThreadedChildWatcher: https://github.com/search?l=Python&q=ThreadedChildWatcher&type=Code (77 results, default unix child watcher, rarely used explicitly)
FastChildWatcher: https://github.com/search?l=Python&q=FastChildWatcher&type=Code (4,426 results)
SafeChildWatcher: https://github.com/search?l=Python&q=SafeChildWatcher&type=Code (7,007 results)
All of asyncio usage: https://github.com/search?l=Python&q=asyncio&type=Code (599,131 results)
msg356569 - (view) Author: Benjamin Peterson (benjamin.peterson) * (Python committer) Date: 2019-11-14 03:08
Thanks everyone for the reviews. I will go ahead and merge the PR.

Shall we return to #38591 for planning the future of child watching?
msg356570 - (view) Author: Benjamin Peterson (benjamin.peterson) * (Python committer) Date: 2019-11-14 03:09
New changeset 3ccdd9b180f9a3f29c8ddc8ad1b331fe8df26519 by Benjamin Peterson in branch 'master':
closes bpo-38692: Add a pidfd child process watcher to asyncio. (GH-17069)
https://github.com/python/cpython/commit/3ccdd9b180f9a3f29c8ddc8ad1b331fe8df26519
msg356595 - (view) Author: Andrew Svetlov (asvetlov) * (Python committer) Date: 2019-11-14 11:14
Sorry for the late review.

PidfdChildWatcher should be enumerated in unix_events.py:__all__ to make the class visible by asyncio import rules.

Kyle, would you make a post-fix PR?
msg356642 - (view) Author: Kyle Stanley (aeros) * (Python committer) Date: 2019-11-15 02:06
> PidfdChildWatcher should be enumerated in unix_events.py:__all__ to make the class visible by asyncio import rules.

> Kyle, would you make a post-fix PR?

I actually just noticed that myself and was coming back to the bpo issue to mention that it was missing from __all__. I'll take of that, no problem.
msg356643 - (view) Author: miss-islington (miss-islington) Date: 2019-11-15 02:48
New changeset 3f8cebd32c1e6f20a1a1440e51c308a5f70ca959 by Miss Islington (bot) (Kyle Stanley) in branch 'master':
bpo-38692: Add asyncio.PidfdChildWatcher to __all__ (GH-17161)
https://github.com/python/cpython/commit/3f8cebd32c1e6f20a1a1440e51c308a5f70ca959
msg357054 - (view) Author: Miro Hrončok (hroncok) * Date: 2019-11-20 11:07
I have consistent behavior on Fedora 32 in mock [0] and podman [1]. Wanted to test docker as well, but my docker setup is currently broken.

# python3.9
Python 3.9.0a1 (default, Nov 20 2019, 00:00:00) 
[GCC 9.2.1 20190827 (Red Hat 9.2.1-1)] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> import os
>>> os.pidfd_open(-1)
Traceback (most recent call last):
  File "<stdin>", line 1, in <module>
PermissionError: [Errno 1] Operation not permitted


=> the test fails.


[0] https://github.com/rpm-software-management/rpm
[1] https://podman.io/
msg357056 - (view) Author: Miro Hrončok (hroncok) * Date: 2019-11-20 11:08
BTW my kernel is: 5.3.7-301.fc31.x86_64

Sorry for commenting twice, I forgot to mention that.
msg357057 - (view) Author: STINNER Victor (vstinner) * (Python committer) Date: 2019-11-20 11:12
> BTW my kernel is: 5.3.7-301.fc31.x86_64

I get a different error on Fedora 31 with Linux kernel 5.3.9-300.fc31.x86_64:

$ ./python
Python 3.9.0a1+ (heads/method_freelist:e34fa9b8d7, Nov 20 2019, 12:09:54) 
[GCC 9.2.1 20190827 (Red Hat 9.2.1-1)] on linux
>>> import os
>>> os.pidfd_open(-1)
Traceback (most recent call last):
  File "<stdin>", line 1, in <module>
OSError: [Errno 22] Invalid argument
msg357058 - (view) Author: Nathaniel Smith (njs) * (Python committer) Date: 2019-11-20 11:12
I don't know about podman, but it sounds like mock and docker both use buggy sandboxing: https://bugzilla.redhat.com/show_bug.cgi?id=1770154
msg357076 - (view) Author: STINNER Victor (vstinner) * (Python committer) Date: 2019-11-20 14:38
I reopen the issue since the discussion restarted.
msg357077 - (view) Author: STINNER Victor (vstinner) * (Python committer) Date: 2019-11-20 14:46
As I already proposed previously, I proposed PR 17290 to simply skip test_pidfd_open() if os.pidfd_open() fails with a PermissionError.

I don't propose to change os.pidfd_open(), only the test unit for practical reasons: not bother users who have to use a strict Linux sandbox using a syscalls whitelist.
msg357162 - (view) Author: STINNER Victor (vstinner) * (Python committer) Date: 2019-11-21 11:54
New changeset 3ab479a2d1959923c9ab80c227dd1f39720b4e2d by Victor Stinner in branch 'master':
bpo-38692: Skip test_posix.test_pidfd_open() on EPERM (GH-17290)
https://github.com/python/cpython/commit/3ab479a2d1959923c9ab80c227dd1f39720b4e2d
msg357163 - (view) Author: STINNER Victor (vstinner) * (Python committer) Date: 2019-11-21 11:56
I pushed my "Skip test_posix.test_pidfd_open() on EPERM" change just for practical reasons. We can hope that Linux sandboxes will shortly be updated to allow pidfd_open() syscall. It should be safe for most use cases ;-) I close again the issue.
msg357271 - (view) Author: (yan12125) * Date: 2019-11-22 12:30
Thank you very much for the commit "Skip test_posix.test_pidfd_open() on EPERM"! I can confirm it makes test_posix pass inside a systemd-nspawn container on Arch Linux. On the other hand, I found that tests were broken as both systemd libseccomp on Arch Linux were out-dated. With recently-pushed systemd 243.162-2 and locally-updated libseccomp 2.4.2, os.pidfd_open() works fine. Apparently [1] and [2] are relevant fixes.

By the way, upgrading systemd and libseccomp also fixes test_signal.PidfdSignalTest [3], which is added two days ago [4].

[1] https://github.com/systemd/systemd-stable/commit/51ea58a04b1851b31a14dfa7eec76254f5ddef16
[2] https://github.com/seccomp/libseccomp/commit/be65b26b67099be2b2b4890d736dbd1ad15adf36
[3] https://github.com/python/cpython/pull/17290#issuecomment-556869679
[4] https://bugs.python.org/issue38712
msg357272 - (view) Author: STINNER Victor (vstinner) * (Python committer) Date: 2019-11-22 12:39
> I can confirm it makes test_posix pass inside a systemd-nspawn container on Arch Linux.

Great!
History
Date User Action Args
2022-04-11 14:59:22adminsetgithub: 82873
2021-11-04 14:23:56eryksunsetmessages: - msg405695
2021-11-04 14:23:25eryksunsetnosy: + asvetlov, yselivanov, - ahmedsayeed1982

components: + asyncio, - Build
versions: + Python 3.9, - Python 3.11
2021-11-04 12:09:50ahmedsayeed1982setversions: + Python 3.11, - Python 3.9
nosy: + ahmedsayeed1982, - benjamin.peterson, njs, asvetlov, yselivanov, hroncok, miss-islington, nanjekyejoannah, aeros, gousaiyang

messages: + msg405695

components: + Build, - asyncio
2021-04-22 12:51:51vstinnersetnosy: - vstinner
2021-04-22 01:31:13yan12125setnosy: - yan12125
2021-04-22 01:16:11gousaiyangsetnosy: + gousaiyang

pull_requests: + pull_request24233
2019-11-22 12:39:12vstinnersetmessages: + msg357272
2019-11-22 12:30:23yan12125setmessages: + msg357271
2019-11-21 11:56:41vstinnersetstatus: open -> closed
resolution: fixed
messages: + msg357163

stage: patch review -> resolved
2019-11-21 11:54:57vstinnersetmessages: + msg357162
2019-11-20 14:46:50vstinnersetmessages: + msg357077
2019-11-20 14:43:00vstinnersetstage: resolved -> patch review
pull_requests: + pull_request16783
2019-11-20 14:38:47vstinnersetstatus: closed -> open

messages: + msg357076
2019-11-20 11:12:10njssetmessages: + msg357058
2019-11-20 11:12:04vstinnersetmessages: + msg357057
2019-11-20 11:08:59hroncoksetmessages: + msg357056
2019-11-20 11:07:58hroncoksetnosy: + hroncok
messages: + msg357054
2019-11-15 02:58:01aerossetstatus: open -> closed
stage: patch review -> resolved
2019-11-15 02:48:08miss-islingtonsetnosy: + miss-islington
messages: + msg356643
2019-11-15 02:27:08aerossetstage: resolved -> patch review
pull_requests: + pull_request16671
2019-11-15 02:06:45aerossetmessages: + msg356642
2019-11-14 11:14:24asvetlovsetstatus: closed -> open
resolution: fixed -> (no value)
messages: + msg356595
2019-11-14 03:09:15benjamin.petersonsetstatus: open -> closed
resolution: fixed
messages: + msg356570

stage: patch review -> resolved
2019-11-14 03:08:45benjamin.petersonsetmessages: + msg356569
2019-11-13 23:36:39aerossetmessages: + msg356567
2019-11-13 22:54:53aerossetmessages: + msg356566
2019-11-13 21:32:32yselivanovsetmessages: + msg356556
2019-11-12 22:28:14benjamin.petersonsetmessages: + msg356497
2019-11-12 22:18:37vstinnersetmessages: + msg356494
2019-11-12 22:16:08benjamin.petersonsetmessages: + msg356493
2019-11-12 22:09:28vstinnersetmessages: + msg356492
2019-11-12 21:52:05benjamin.petersonsetmessages: + msg356491
2019-11-12 21:23:37vstinnersetmessages: + msg356488
2019-11-09 09:57:44yan12125setmessages: + msg356292
2019-11-09 06:31:31benjamin.petersonsetmessages: + msg356289
2019-11-09 06:17:38aerossetmessages: + msg356288
2019-11-09 06:09:54aerossetmessages: + msg356287
2019-11-09 06:06:04aerossetmessages: + msg356286
2019-11-08 17:03:52benjamin.petersonsetmessages: + msg356251
2019-11-08 10:12:36yan12125setnosy: + yan12125
messages: + msg356235
2019-11-07 02:57:22benjamin.petersonsetmessages: + msg356164
2019-11-06 17:57:20vstinnersetmessages: + msg356148
2019-11-06 03:23:58benjamin.petersonsetpull_requests: + pull_request16578
2019-11-06 03:21:43benjamin.petersonsetmessages: + msg356087
2019-11-06 00:05:45benjamin.petersonsetmessages: + msg356079
2019-11-05 22:39:52njssetmessages: + msg356071
2019-11-05 22:07:22aerossetnosy: + aeros
messages: + msg356069
2019-11-05 22:02:10vstinnersetmessages: + msg356068
2019-11-05 17:35:00benjamin.petersonsetmessages: + msg356048
2019-11-05 17:31:32njssetmessages: + msg356047
2019-11-05 15:24:28benjamin.petersonsetstage: patch review
pull_requests: + pull_request16571
2019-11-05 11:11:18vstinnersetnosy: + nanjekyejoannah
2019-11-05 11:11:07vstinnersetmessages: + msg356026
2019-11-05 11:08:16vstinnersetnosy: + vstinner
messages: + msg356024
2019-11-05 10:36:51asvetlovsetnosy: + njs
messages: + msg356017
2019-11-05 10:35:29asvetlovsetmessages: + msg356016
2019-11-05 05:43:04benjamin.petersoncreate