Your message dated Fri, 15 Apr 2005 18:19:51 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#280233: fixed in mm 1.1.3-6.3
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 12 Nov 2004 09:23:01 +0000
>From [EMAIL PROTECTED] Fri Nov 12 01:23:00 2004
Return-path: <[EMAIL PROTECTED]>
Received: from master.debian.org [146.82.138.7]
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CSXe0-0001ps-00; Fri, 12 Nov 2004 01:23:00 -0800
Received: from h02.hostsharing.net (pomo.hostsharing.net) [212.21.77.2]
by master.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CSXdz-0007ml-00; Fri, 12 Nov 2004 03:22:59 -0600
Received: from z108.wh21.tu-dresden.de (unknown [141.76.119.12])
(using TLSv1 with cipher RC4-MD5 (128/128 bits))
(No client certificate requested)
by pomo.hostsharing.net (Postfix) with ESMTP id 80E25D007ADF
for <[EMAIL PROTECTED]>; Fri, 12 Nov 2004 10:22:58 +0100 (CET)
From: Josef Spillner <[EMAIL PROTECTED]>
Organization: Cool Projects
To: [EMAIL PROTECTED]
Subject: apache-ssl: Segfault on reload, disk full
Date: Fri, 12 Nov 2004 10:21:48 +0100
User-Agent: KMail/1.7
MIME-Version: 1.0
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE
autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level:
Package: apache-ssl
Version: 1.3.26.1+1.48-0woody3
Severity: important
On a woody+security-updates system with apache-ssl+gcache and php4 installed,
the latest security update (1.3.26.1+1.48-0woody3) seems to cause some
trouble.
Apache creates the files session_mm_apache0.mem and
session_mm_apache0.sem in the /tmp directory upon startup. The *.mem
file is 64 MB in size but only created as a sparse file, needing 12 kB
on disk.
Each morning, logrotate does a reload of apache. What happens is that it
doesn't handle the reload properly and crashes.
Additionally, the mem file is fully used then, filling up /tmp and thus
blocking other services such as a cvs-server from working.
(I'm not sure whether the crash provokes the fillup or the other way
around.)
It should be noted that the system uses a UML kernel but this shouldn't make
any
difference. This behaviour did not happen a week ago, which I think
correlates to the security update.
A (user-level) login can be granted for further inspection, should that
be necessary.
Josef
-- System Information
Debian Release: 3.0
Architecture: i386
Kernel: Linux vs011 2.4.26-1um #4 Tue Apr 20 17:09:55 PDT 2004 i686
Locale: LANG=C, LC_CTYPE=C
Versions of packages apache-ssl depends on:
ii apache-common 1.3.26-0woody5 Support files for all Apache
webse
ii dpkg 1.9.21 Package maintenance system for
Deb
ii libc6 2.2.5-11.5 GNU C Library: Shared libraries
an
ii libdb2 2:2.7.7.0-7 The Berkeley database routines
(ru
ii libexpat1 1.95.2-6 XML parsing C library - runtime
li
ii libssl0.9.6 0.9.6c-2.woody.6 SSL shared libraries
ii logrotate 3.5.9-8 Log rotation utility
ii mime-support 3.18-1.3 MIME files 'mime.types' &
'mailcap
ii openssl 0.9.6c-2.woody.6 Secure Socket Layer (SSL) binary
a
ii perl 5.6.1-8.7 Larry Wall's Practical Extraction
ii perl [perl5] 5.6.1-8.7 Larry Wall's Practical Extraction
---------------------------------------
Received: (at 280233-close) by bugs.debian.org; 15 Apr 2005 22:24:58 +0000
>From [EMAIL PROTECTED] Fri Apr 15 15:24:58 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DMZFC-0008BX-00; Fri, 15 Apr 2005 15:24:58 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1DMZAF-0001ZB-00; Fri, 15 Apr 2005 18:19:51 -0400
From: Mark Brown <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.15 $
Subject: Bug#280233: fixed in mm 1.1.3-6.3
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Fri, 15 Apr 2005 18:19:51 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level:
Source: mm
Source-Version: 1.1.3-6.3
We believe that the bug you reported is fixed in the latest version of
mm, which is due to be installed in the Debian FTP archive:
libmm11-dev_1.1.3-6.3_i386.deb
to pool/main/m/mm/libmm11-dev_1.1.3-6.3_i386.deb
libmm11_1.1.3-6.3_i386.deb
to pool/main/m/mm/libmm11_1.1.3-6.3_i386.deb
mm_1.1.3-6.3.diff.gz
to pool/main/m/mm/mm_1.1.3-6.3.diff.gz
mm_1.1.3-6.3.dsc
to pool/main/m/mm/mm_1.1.3-6.3.dsc
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Mark Brown <[EMAIL PROTECTED]> (supplier of updated mm package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Tue, 7 Dec 2004 13:56:42 +0000
Source: mm
Binary: libmm11 libmm11-dev
Architecture: source i386
Version: 1.1.3-6.3
Distribution: stable
Urgency: low
Maintainer: Mark Brown <[EMAIL PROTECTED]>
Changed-By: Mark Brown <[EMAIL PROTECTED]>
Description:
libmm11 - Shared memory library
libmm11-dev - Shared memory library - development
Closes: 280233 280871 282787
Changes:
mm (1.1.3-6.3) stable; urgency=low
.
* Force the use of System V shared memory instead: it was the more usual
choice before and many Apache configurations can't cope if the backing
store for MMFILE gets allocated (closes: #280233, #280871, #282787).
.
This reverts the previous change.
Files:
020c3fd731fc2de6d7e5fa69a60dfa95 565 devel - mm_1.1.3-6.3.dsc
ccc5cc3ffcf5a290081761bb1286648a 4554 devel - mm_1.1.3-6.3.diff.gz
ed691f43c25b18c08ac3c96165ca1ae9 33006 devel extra
libmm11-dev_1.1.3-6.3_i386.deb
fc5c148fe5698ee0a17b4089a8b2d1a9 14354 libs optional libmm11_1.1.3-6.3_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
iD8DBQFB1sC0J2Vo11xhU60RAoV3AJ9bGVf4uKY4uA/osK8NxPr+fJV8awCg9HiE
M5GPncaO20uj/VgtV9731ag=
=XZhM
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]