Bug#583917: My analysis of the bug

2010-09-05 Thread Daniel Pittman
Matteo Frigo ath...@fftw.org writes:
 martin f krafft madd...@debian.org writes:
 also sprach Matteo Frigo ath...@fftw.org [2010.09.01.0139 +0200]:
 I have been hit by this bug.  My analysis of the situation is
 the following.

 Nice analysis. I think that 3.1.4 now fixes this, as we reverted the
 mapfile change.

 Yes, I have installed 3.1.4 from sid and it fixes the bug.  Thank you
 for taking care of this.

I can confirm this also resolves my problem with mdadm spinning forever.

Thank you all,
  Daniel
-- 
✣ Daniel Pittman✉ dan...@rimspace.net☎ +61 401 155 707
   ♽ made with 100 percent post-consumer electrons



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#593356: apt-cacher-ng: memory leak in Lenny backport of 0.5.1 with MaxStandbyConThreads: 2 enabled

2010-08-24 Thread Daniel Pittman
Eduard Bloch e...@gmx.de writes:
 * Daniel Pittman [Thu, Aug 19 2010, 06:28:01PM]:
 Eduard Bloch e...@gmx.de writes:

G'day Eduard.  Sorry for the long delay in responding to this bug report, and
your changes.  I regret holding up so long on that.

[...]

  I found a couple of issues which might cause the leak. I will send you a
  current development snapshot tonight.

 Thanks.

 As promised, have a look at the snapshot from
 http://www.unix-ag.uni-kl.de/~bloch/acng/download/unreleased/. The i386
 version is built against stable, amd64 against unstable.

 The regular tasks should work stable there ATM, only the new features
 still need some polishing.

OK.  This appears to have resolved our problems, and not introduced any
others, which is wonderful.  I will continue to keep an eye on it, but for now
it hopefully can close the issue.

Daniel

-- 
✣ Daniel Pittman✉ dan...@rimspace.net☎ +61 401 155 707
   ♽ made with 100 percent post-consumer electrons



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#593356: apt-cacher-ng: memory leak in Lenny backport of 0.5.1 with MaxStandbyConThreads: 2 enabled

2010-08-19 Thread Daniel Pittman
---  131352
  Unknown0

I attached the code for proc-maps, but it basically just sums memory
allocations.  On the same hunch /proc/.../maps and /proc/.../smaps are both
attached, although I don't think they tell much more than the summary above.

Daniel
-- 
✣ Daniel Pittman✉ dan...@rimspace.net☎ +61 401 155 707
   ♽ made with 100 percent post-consumer electrons



proc-maps
Description: Binary data


maps
Description: Binary data


smaps
Description: Binary data


Bug#549275: udev: no longer creates /dev/disk/by-id/md-uuid-* symlinks, breaking boot!

2009-10-01 Thread Daniel Pittman
  1:3.1.4-1  Linux PCI Utilities
ii  usbutils  0.86-2 Linux USB utilities

udev suggests no packages.

-- debconf information:
  udev/new_kernel_needed: false
  udev/reboot_needed:

-- 
✣ Daniel Pittman✉ dan...@rimspace.net☎ +61 401 155 707
   ♽ made with 100 percent post-consumer electrons
   Looking for work?  Love Perl?  In Melbourne, Australia?  We are hiring.



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#546695: dovecot-imapd: dovecot epoll fails with -EPERM for dovecot --exec-mail imap at the shell

2009-09-16 Thread Daniel Pittman
Timo Sirainen t...@iki.fi writes:
 On Sep 15, 2009, at 9:10 AM, Daniel Pittman wrote:

 Sep 15 16:03:31 krosp IMAP(daniel): : Fatal: io_loop_handle_add:
 epoll_ctl(1, 0): Operation not permitted

Sorry to take so long to follow up on this.

 Do you have rawlog enabled? IIRC that was the main cause of this.
 Or anything else in mail_executable except the default imap binary?

No, rawlog is disabled, and the only occurrences of mail_executable are
commented out.  Heck, the configuration is almost exclusively barren; the only
non-command and non-whitespace lines are:

,[ /etc/dovecot/dovecot.conf - clean ]
| protocols = imap
| log_timestamp = %Y-%m-%d %H:%M:%S 
| mail_location = dbox:~/.dovecot-mail
| mail_privileged_group = mail
| protocol imap {
| }
| protocol pop3 {
|   pop3_uidl_format = %08Xu%08Xv
| }
| protocol managesieve {
| }
| auth default {
|   mechanisms = plain
|   passdb pam {
|   }
|   userdb passwd {
|   }
|   user = root
| }
| dict {
| }
| plugin {
| }
`

Regards,
Daniel
-- 
✣ Daniel Pittman✉ dan...@rimspace.net☎ +61 401 155 707
   ♽ made with 100 percent post-consumer electrons
   Looking for work?  Love Perl?  In Melbourne, Australia?  We are hiring.



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#546695: dovecot-imapd: dovecot epoll fails with -EPERM for dovecot --exec-mail imap at the shell

2009-09-15 Thread Daniel Pittman
Package: dovecot-imapd
Version: 1:1.2.5-1
Severity: grave

I run dovecot directly, without passing through a TCP socket, on my laptop to
provide direct access to a mail spool in my home directory, with preauth:

/usr/sbin/dovecot --exec-mail imap

This previously worked just fine, but now fails as both a privileged and
unprivileged user due to epoll returning -EPERM:

epoll_ctl(6, EPOLL_CTL_ADD, 0, {EPOLLIN|EPOLLPRI|EPOLLERR|EPOLLHUP, 
{u32=9753488, u64=9753488}}) = -1 EPERM (Operation not permitted)

Note that it tries the operation of FD 0, STDIN, which is attached to the
shell in the interactive test, or to a pipe otherwise.

mail.log contains:

Sep 15 16:03:31 krosp IMAP(daniel): : Fatal: io_loop_handle_add: epoll_ctl(1, 
0): Operation not permitted


The only references to this I can find are historic, and suggest this was an
issue elsewhere but is now fixed.

I am running the stock Debian/unstable kernel, nothing special.

Please find attached a full strace of the Dovecot run that fails.


This is pretty serious for me, because it prevents this *documented* mode of
operation from working under, as far as I can tell, any circumstances.

Downgrading to the version from stable, 1.2.24-2, resolves the problem.

Regards,
Daniel

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (101, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.30-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages dovecot-imapd depends on:
ii  dovecot-common1:1.2.5-1  secure mail server that supports m
ii  libc6 2.9-26 GNU C Library: Shared libraries
ii  libssl0.9.8   0.9.8k-5   SSL shared libraries

dovecot-imapd recommends no packages.

dovecot-imapd suggests no packages.

-- no debconf information

-- 
✣ Daniel Pittman✉ dan...@rimspace.net☎ +61 401 155 707
   ♽ made with 100 percent post-consumer electrons
   Looking for work?  Love Perl?  In Melbourne, Australia?  We are hiring.



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#546694: dovecot-imapd: dovecot epoll fails with -EPERM for dovecot --exec-mail imap at the shell

2009-09-15 Thread Daniel Pittman
Package: dovecot-imapd
Version: 1:1.2.5-1
Severity: grave

I run dovecot directly, without passing through a TCP socket, on my laptop to
provide direct access to a mail spool in my home directory, with preauth:

/usr/sbin/dovecot --exec-mail imap

This previously worked just fine, but now fails as both a privileged and
unprivileged user due to epoll returning -EPERM:

epoll_ctl(6, EPOLL_CTL_ADD, 0, {EPOLLIN|EPOLLPRI|EPOLLERR|EPOLLHUP, 
{u32=9753488, u64=9753488}}) = -1 EPERM (Operation not permitted)

Note that it tries the operation of FD 0, STDIN, which is attached to the
shell in the interactive test, or to a pipe otherwise.

mail.log contains:

Sep 15 16:03:31 krosp IMAP(daniel): : Fatal: io_loop_handle_add: epoll_ctl(1, 
0): Operation not permitted


The only references to this I can find are historic, and suggest this was an
issue elsewhere but is now fixed.

I am running the stock Debian/unstable kernel, nothing special.

Please find attached a full strace of the Dovecot run that fails.


This is pretty serious for me, because it prevents this *documented* mode of
operation from working under, as far as I can tell, any circumstances.

Downgrading to the version from stable, 1.2.24-2, resolves the problem.

Regards,
Daniel

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (101, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.30-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages dovecot-imapd depends on:
ii  dovecot-common1:1.2.5-1  secure mail server that supports m
ii  libc6 2.9-26 GNU C Library: Shared libraries
ii  libssl0.9.8   0.9.8k-5   SSL shared libraries

dovecot-imapd recommends no packages.

dovecot-imapd suggests no packages.

-- no debconf information

-- 
✣ Daniel Pittman✉ dan...@rimspace.net☎ +61 401 155 707
   ♽ made with 100 percent post-consumer electrons
   Looking for work?  Love Perl?  In Melbourne, Australia?  We are hiring.



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#542889: nvidia-kernel-source: kernel panic on amd64 with 185.18.31 drivers, Quadro card

2009-08-22 Thread Daniel Pittman
Sven Joachim svenj...@gmx.de writes:
 On 2009-08-22 03:06 +0200, Daniel Pittman wrote:

 Package: nvidia-kernel-source
 Version: 185.18.31-1
 Severity: grave

 After upgrading to the 185.18.31 packages from 185.18.14, X caused a kernel
 panic with a NULL pointer dereference.  This seems to be the same problem
 discussed here:

 http://www.nvnews.net/vbulletin/showthread.php?t=136959

 Downgrading to the earlier version is suggested as fixing the issue, and does
 for me, but I figure that others might want to know about this beforehand.

 Thanks for this warning.

I figure that other people can probably live without a couple of hours of
annoyance downgrading. ;)  Thank you for your swift response.

 Probably the Debian package should be upgraded to 185.18.36,
 http://www.nvnews.net/vbulletin/showthread.php?p=2071410 mentions Fixed a
 bug that caused kernel panics when starting X on some mobile GPUs.

I am quite happy to test an upgraded package, if that helps, and verify it
resolves the issue at least for my

01:00.0 VGA compatible controller: nVidia Corporation Quadro FX 570M (rev a1)

Regards,
Daniel
-- 
✣ Daniel Pittman✉ dan...@rimspace.net☎ +61 401 155 707
   ♽ made with 100 percent post-consumer electrons
   Looking for work?  Love Perl?  In Melbourne, Australia?  We are hiring.



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#542889: nvidia-kernel-source: kernel panic on amd64 with 185.18.31 drivers, Quadro card

2009-08-21 Thread Daniel Pittman
Package: nvidia-kernel-source
Version: 185.18.31-1
Severity: grave

After upgrading to the 185.18.31 packages from 185.18.14, X caused a kernel
panic with a NULL pointer dereference.  This seems to be the same problem
discussed here:

http://www.nvnews.net/vbulletin/showthread.php?t=136959

Downgrading to the earlier version is suggested as fixing the issue, and does
for me, but I figure that others might want to know about this beforehand.

Regards,
Daniel

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (101, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.30-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages nvidia-kernel-source depends on:
ii  debhelper 7.3.14 helper programs for debian/rules
ii  dpatch2.0.31 patch maintenance system for Debia
ii  make  3.81-6 An utility for Directing compilati
ii  sed   4.2.1-3The GNU sed stream editor

Versions of packages nvidia-kernel-source recommends:
ii  devscripts   2.10.53 scripts to make the life of a Debi
ii  kernel-package   12.019  A utility for building Linux kerne
ii  module-assistant 0.11.1  tool to make module package creati
ii  nvidia-glx   185.18.14-2 NVIDIA binary Xorg driver

nvidia-kernel-source suggests no packages.

-- no debconf information

-- 
✣ Daniel Pittman✉ dan...@rimspace.net☎ +61 401 155 707
   ♽ made with 100 percent post-consumer electrons
   Looking for work?  Love Perl?  In Melbourne, Australia?  We are hiring.



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#531269: libplist-utils: ships a symbolic link to a versioned utility, but not the actual utility...

2009-05-31 Thread Daniel Pittman
Package: libplist-utils
Version: 0.12-1
Severity: grave
Justification: renders package unusable

libplist-utils ships /usr/bin/plist as a symbolic link, but not the actual 
binary:

] ls -l /usr/bin/plutil*
lrwxrwxrwx 1 root root 11 2009-05-31 16:22 /usr/bin/plutil - plutil-0.12

It should probably install the binary, without version, under the unversioned 
name.

Regards,
Daniel

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (101, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.29-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#517340: /usr/bin/pp: Resolution to #451600 incomplete: pp still expects /usr/bin/par.pl

2009-02-26 Thread Daniel Pittman
Package: libpar-packer-perl
Version: 0.982-2
Severity: grave
File: /usr/bin/pp
Justification: renders package unusable

G'day.

After y'all resolved #451600 by renaming /usr/bin/par.pl to /usr/bin/par-archive
the pp process for generating stand-alone Perl scripts is broken:

] pp -P -e '1;'
Can't open perl script /usr/bin/par.pl: No such file or directory

The pp tool, and in fact a non-trivial amount of the libpar-packer-perl code,
has not been fixed to handle this renaming, breaking the package in one scenario
I tested and, at a guess, potentially in a non-trivial number of others.

It certainly makes it impossible to generate a stand-alone Perl script, rather
than a script with an embedded Perl binary, at this stage.

For reference, the following files refer to par.pl:
] dpkg -L libpar-packer-perl | xargs grep -l 'par\.pl'
/usr/share/perl5/pp.pm
/usr/share/perl5/PAR/Packer.pm
/usr/share/doc/libpar-packer-perl/copyright
/usr/bin/parldyn
/usr/bin/par-archive
/usr/bin/parl


Regards,
Daniel

-- System Information:
Debian Release: 5.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (101, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libpar-packer-perl depends on:
ii  libarchive-zip-perl   1.18-1 Module for manipulation of ZIP arc
ii  libc6 2.9-3  GNU C Library: Shared libraries
ii  libcompress-zlib-perl 2.015-1Perl module for creation and manip
ii  libgetopt-argvfile-perl   1.11-1 Perl module for reading script opt
ii  libmodule-scandeps-perl   0.89-1 Perl module to recursively scan Pe
ii  libpar-dist-perl  0.44-1 perl module to create and manipula
ii  libpar-perl   0.984-1Perl Archive Toolkit
ii  libperl5.10   5.10.0-19  Shared Perl library
ii  perl  5.10.0-19  Larry Wall's Practical Extraction 
ii  perl-modules  5.10.0-19  Core Perl modules

Versions of packages libpar-packer-perl recommends:
ii  perl-tk [libtk-perl] 1:804.028-3 Perl module providing the Tk graph

libpar-packer-perl suggests no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#513310: [Debian] Re: Bug#513310: vzctl fails to set capabilities, and subsequently fails to start any VE

2009-01-29 Thread Daniel Pittman
Kir Kolyshkin k...@openvz.org writes:

 This is caused by newer kernel headers (in this case on a build system
 that was used to build this vzctl package), and is fixed in
 vzctl-3.0.23. See the following git commit:

vzctl 3.0.23-2 is available in experimental, so I have installed it and
tested it on my machine; it addresses the problem and the VE will again
start.

 So the solution is either to upgrade to vzctl-3.0.23 or to backport
 this simple fix.

I can confirm that the newer package version resolves the problem.

 Ola Lundqvist wrote:
 Hi Daniel

 This is interesting as it works very well on my systems. On other
 hand that system is a 686 based one.

 You write that you have not significantly changed your system, but at
 the same time you write that you are not sure that it has ever worked
 with the 2.6.26 kernel.

Sorry, I see I was unclear: I have upgraded to sid, which significantly
changed the system, but the OpenVZ configuration remained stable.

I thought that the VE had started successfully under 2.6.26 before, but
could only confirm from my logs that I had used it under 2.6.24.

Sorry for being so unclear, and thankfully Kir has saved me by
identifying the problem despite my poor communication.

Regards,
Daniel



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#513310: [Debian] Re: Bug#513310: vzctl fails to set capabilities, and subsequently fails to start any VE

2009-01-29 Thread Daniel Pittman
Ola Lundqvist o...@inguza.com writes:

 If you could try this fix out it would be really great.
 A built package for amd64 is available at:
 http://apt.inguza.org/vzctl/

Ah.  I am on amd64, and that is an i386 package without source.

Anyway, I grabbed the source, manually applied the patch and downgraded
the vzctl package to 3.0.22-14 from sid.

I then went to reproduce the problem and couldn't: 3.0.22-14 worked fine
for me after downgrading, without any additional patches at all.

Um, all of which leaves me a bit mystified, but the upgrade to 3.0.23,
then back down to 3.0.22 did replace all the distribution configuration
files, etc...


In any case I can no longer reproduce the fault with 3.0.22-14 from sid,
so I can only presume that there was something very strange went wrong
on my local system, but that the issue is now resolved.


Thank you both for your help, and I am sorry for the trouble.

Regards,
Daniel



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#513310: vzctl fails to set capabilities, and subsequently fails to start any VE

2009-01-27 Thread Daniel Pittman
Package: vzctl
Version: 3.0.22-14
Severity: grave
Justification: renders package unusable

When trying to start a VE I get the following output:

] sudo vzctl start sd-dev
Starting VE ...
VE is mounted
Unable to set capability: Operation not permitted
Unable to set capability
VE start failed
VE is unmounted

When I strace the system I see the following call to set capabilities:

[pid 14391] capget(0x20071026, 0, NULL) = -1 EFAULT (Bad address)
[pid 14390] exit_group(0)   = ?
Process 14390 detached
[pid 14391] capset(0x20071026, 0, 
{CAP_CHOWN|CAP_DAC_OVERRIDE|CAP_DAC_READ_SEARCH|CAP_FOWNER|CAP_FSETID|CAP_KILL|CAP_SETGID|CAP_SETUID|CAP_LINUX_IMMUTABLE|CAP_NET_BIND_SERVICE|CAP_NET_BROADCAST|CAP_NET_RAW|CAP_IPC_LOCK|CAP_IPC_OWNER|CAP_SYS_CHROOT|CAP_SYS_PTRACE|CAP_SYS_BOOT|CAP_SYS_NICE|CAP_SYS_RESOURCE|CAP_SYS_TTY_CONFIG|0x7800,
 
CAP_CHOWN|CAP_DAC_OVERRIDE|CAP_DAC_READ_SEARCH|CAP_FOWNER|CAP_FSETID|CAP_KILL|CAP_SETGID|CAP_SETUID|CAP_LINUX_IMMUTABLE|CAP_NET_BIND_SERVICE|CAP_NET_BROADCAST|CAP_NET_RAW|CAP_IPC_LOCK|CAP_IPC_OWNER|CAP_SYS_CHROOT|CAP_SYS_PTRACE|CAP_SYS_BOOT|CAP_SYS_NICE|CAP_SYS_RESOURCE|CAP_SYS_TTY_CONFIG|0x7800,
 
CAP_CHOWN|CAP_DAC_OVERRIDE|CAP_DAC_READ_SEARCH|CAP_FOWNER|CAP_FSETID|CAP_KILL|CAP_SETGID|CAP_SETUID|CAP_LINUX_IMMUTABLE|CAP_NET_BIND_SERVICE|CAP_NET_BROADCAST|CAP_NET_RAW|CAP_IPC_LOCK|CAP_IPC_OWNER|CAP_SYS_CHROOT|CAP_SYS_PTRACE|CAP_SYS_BOOT|CAP_SYS_NICE|CAP_SYS_RESOURCE|CAP_SYS_TTY_CONFIG|0x7800})
 = -1 EPERM (Operation not permitted)


This fails to start the VE, reporting that the capset operation failed.
None of my configuration has been modified significantly, and certainly not
to change the capability set of the VE or anything like that.

This same configuration worked on a 2.6.24 VZ kernel, but I am not sure it ever
worked on the 2.6.26 kernel.

-- System Information:
Debian Release: 5.0
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-openvz-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages vzctl depends on:
ii  iproute   20080725-2 networking and traffic control too
ii  libc6 2.7-18 GNU C Library: Shared libraries
ii  vzquota   3.0.11-1   server virtualization solution - q

Versions of packages vzctl recommends:
ii  rsync 3.0.5-1fast remote file copy program (lik

Versions of packages vzctl suggests:
pn  linux-patch-openvznone (no description available)

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#336373: subversion: svn MKCOL ssl error

2006-01-02 Thread Daniel Pittman
Package: subversion
Version: 1.2.3dfsg1-3
Severity: grave

G'day.

I have run into a problem where I can't commit a change to my subversion
repository via HTTP/SSL.

The problem seems identical to the one described in this bug report, but
my issues continue despite running the version that claims to have fixed
the problem.

The server is running an up-to-date version of unstable as well, and I
have verified that the same version of subversion and all appropriate
modules are installed and running on both sides.

The error I see is:

svn: Commit failed (details follow):
svn: MKCOL of 
'/svn/general/!svn/wrk/6796d7ea-5b09-0410-9cde-b6775cbebef8/debian/perl/librose-html-objects-perl-0.32/lib/Rose':
 SSL negotiation failed: SSL error: decryption failed or bad record mac 
(https://digital-infrastructure.com.au)


There are, annoyingly enough, no errors at all in the Apache logs on the
server side, which makes tracking this down much more annoying.

The commit in question is fairly large, as it adds 8.2MB of files,
representing 662 individual files.

Other commits seem to work just fine, but they are much smaller.  

I have run into this once before -- but it was a much smaller commit, a
long time ago, and not at all reproducible.  At the time I couldn't
identify any particular cause...

I wonder if perhaps this is some sort of SSL renegotiation bug that
triggers when submitting a sufficiently large commit or something?

 Daniel

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (990, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14-2-686
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)

Versions of packages subversion depends on:
ii  db4.3-util 4.3.29-3  Berkeley v4.3 Database Utilities
ii  libapr02.0.55-3  the Apache Portable Runtime
ii  libc6  2.3.5-9   GNU C Library: Shared libraries an
ii  libneon24  0.24.7.dfsg-3 An HTTP and WebDAV client library
ii  libsvn01.2.3dfsg1-3  shared libraries used by Subversio
ii  patch  2.5.9-2   Apply a diff file to an original

subversion recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#305617: squid: assertion failure causes squid to abort: assertion failed: store_swapout.c:232: mem-inmem_lo == 0

2005-04-20 Thread Daniel Pittman
Package: squid
Version: 2.5.9-4
Severity: serious

This applies to 2.5.9-5 - I downgraded to be able to check for duplicate
bug reports.

I get this assertion failure, and abort:

assertion failed: store_swapout.c:232: mem-inmem_lo == 0

Regards,
Daniel

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.12-rc1-enki
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)

Versions of packages squid depends on:
ii  adduser 3.63 Add and remove users and groups
ii  coreutils   5.2.1-2  The GNU core utilities
ii  debconf 1.4.48   Debian configuration management sy
ii  libc6   2.3.2.ds1-21 GNU C Library: Shared libraries an
ii  libldap22.1.30-6 OpenLDAP libraries
ii  libpam0g0.76-22  Pluggable Authentication Modules l
ii  logrotate   3.7-2Log rotation utility
ii  netbase 4.21 Basic TCP/IP networking system
ii  squid-common2.5.9-4  Internet Object Cache (WWW proxy c

-- debconf information:
  squid/fix_cachedir_perms: false
* squid/largefiles_warning:
  squid/anonymize_headers:
  squid-cgi/cachemgr:
  squid/old_version: false
  squid/http_anonymizer:
  squid/authenticate_program:
  squid/fix_lines: true

-- 
Artists are people driven by a conflict between the desire to
communicate and the even stronger desire to hide.
-- D. W. Winnicott


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#302634: squid: assertion failure in stmem.c results in unclean restart of squid

2005-04-01 Thread Daniel Pittman
Package: squid
Version: 2.5.9-2
Severity: grave

After upgrading to 2.5.9-3, squid would routinely fail with this
assertion:

2005/04/02 12:01:48| assertion failed: stmem.c:93: current_offset == 
target_offset

The process seemed to restart automatically, and perform an DIRTY cache
rebuild.

I have, as you will note, downgraded to the previous version, which
resolves the problem.

I use diskd as the storage mechanism for my cache directory.

  Daniel

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.12-rc1-enki
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=UTF-8)

Versions of packages squid depends on:
ii  adduser 3.63 Add and remove users and groups
ii  coreutils   5.2.1-2  The GNU core utilities
ii  debconf 1.4.47   Debian configuration management sy
ii  libc6   2.3.2.ds1-20 GNU C Library: Shared libraries an
ii  libldap22.1.30-3 OpenLDAP libraries
ii  libpam0g0.76-22  Pluggable Authentication Modules l
ii  logrotate   3.7-2Log rotation utility
ii  netbase 4.21 Basic TCP/IP networking system
ii  squid-common2.5.9-2  Internet Object Cache (WWW proxy c

-- debconf information:
  squid/fix_cachedir_perms: false
* squid/largefiles_warning:
  squid/anonymize_headers:
  squid-cgi/cachemgr:
  squid/old_version: false
  squid/http_anonymizer:
  squid/authenticate_program:
  squid/fix_lines: true

-- 
 I have no life, and I must scream.
And in response, thus spake the Oracle:
} And there we have it, modern music summed up in one tidy sentence.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]