Bug#343454: typo in manpage (-d/-t)
Package: xstow Version: 0.5.1-2 Severity: normal hi, The manpage says: -d -dir DIR Set stow dir to DIR. The default is the current directory. -d -target DIR Set target to DIR. The default is the parent of the stow directory. But that should be: -d -dir DIR Set stow dir to DIR. The default is the current directory. -t -target DIR Set target to DIR. The default is the parent of the stow directory. Thanks for packaging xstow, Cheers, -- System Information: Debian Release: unstable/experimental APT prefers experimental APT policy: (500, 'experimental'), (500, 'unstable'), (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.14.3-p4-uvt Locale: LANG=nl_NL.UTF-8, LC_CTYPE=nl_NL.UTF-8 (charmap=UTF-8) Versions of packages xstow depends on: ii libc62.3.5-8.1 GNU C Library: Shared libraries an ii libgcc1 1:4.1-0exp0 GCC support library ii libncurses5 5.5-1 Shared libraries for terminal hand ii libstdc++5 1:3.3.6-10 The GNU Standard C++ Library v3 xstow recommends no packages. -- debconf-show failed -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#345333: fails unconditionally when http_proxy environment variable is set
Package: gnuvd Version: 1.0-1 Severity: important % echo $http_proxy http://10.1.2.1:8080 % gnuvd kansloos gnuvd: gnuvd.c:429: vd_parse_http_proxy: Assertion `*host' failed. [1]1653 abort gnuvd kansloos At line 429 and 430 I find: assert (*host); assert (*port); which should probably read: assert(host); assert(port); cheers, -- System Information: Debian Release: unstable/experimental APT prefers experimental APT policy: (500, 'experimental'), (500, 'unstable'), (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.14.3-athlon-uvt Locale: LANG=nl_NL.UTF-8, LC_CTYPE=nl_NL.UTF-8 (charmap=UTF-8) Versions of packages gnuvd depends on: ii libc6 2.3.5-9GNU C Library: Shared libraries an gnuvd recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#387625: please split up the configuration files
Package: apache2-common Version: 2.2.3-1~exp.r170 Severity: wishlist Tags: patch Hi, I noticed that a limited effort has been made to split up the apache2 config, resulting in a limping modular/monolithic configuration system. As a systems administrator I find myself changing a few common things in the config whenever I set up an apache2 server. When the number of apache2 installations is sufficiently large, it becomes *extremely* useful to have the common changes in one file, and per-host changes in a different file. A modular configuration system would help a lot with such an approach. It makes it easier for an administrator to decide which parts to leave at defaults and which parts to customize. A modular configuration system also helps when upgrading: unchanged configuration files can be simply replaced. A single large config file is unlikely to remain unmodified. I made a straightforward split of the configuration files of both version 2.0 and version 2.2 (from experimental), which you may find at: http://www.fruit.je/download/apache2-modular-configs.tar.gz The splits are fairly basic, no statements were added or removed and almost all stanzas are left intact (the charsets stuff was mixed with some random filetype statements in the configuration file, had to untangle that). Obviously I'll be more than happy to adjust this thing if you have any comments. The included README replicated here for convenience: Notes: - ports.conf was moved to conf.d/ - conf.d/charset was renamed to conf.d/charset.conf - All config files must be named *.conf; this to prevent problems when dpkg creates a foo.conf.dpkg-old file. The postinst script might want to offer to rename existing files. -- System Information: Debian Release: unstable/experimental APT prefers experimental APT policy: (500, 'experimental'), (500, 'unstable'), (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.17.8-p4-uvt Locale: LANG=nl_NL.UTF-8, LC_CTYPE=nl_NL.UTF-8 (charmap=UTF-8) Versions of packages apache2-common depends on: ii apache2-utils 2.2.3-1~exp.r170 utility programs for webservers ii libmagic1 4.17-3 File type determination library us ii lsb-base3.1-15 Linux Standard Base 3.1 init scrip ii mime-support3.37-1 MIME files 'mime.types' 'mailcap ii net-tools 1.60-17 The NET-3 networking toolkit apache2-common recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#311343: poor sound quality when using a fixed sample rate
Package: mpd Version: 0.11.5-3 Severity: wishlist Hi, It would be useful if mpd would use libsamplerate for sample rate conversions (the sound quality is horrible with the current resampling code). This is obviously an upstream's issue. :) Thanks, -- System Information: Debian Release: unstable/experimental APT prefers experimental APT policy: (500, 'experimental'), (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.11.10-p4 Locale: LANG=nl_NL.UTF-8, LC_CTYPE=nl_NL.UTF-8 (charmap=UTF-8) Versions of packages mpd depends on: ii adduser 3.63Add and remove users and groups ii debconf [debconf-2.0]1.4.48 Debian configuration management sy ii libao2 0.8.6-1 Cross Platform Audio Output Librar ii libasound2 1.0.8-3 ALSA library ii libaudiofile00.2.6-6 Open-source version of SGI's audio ii libc62.3.5-1 GNU C Library: Shared libraries an ii libflac6 1.1.1-5 Free Lossless Audio Codec - runtim ii libid3tag0 0.15.1b-5 ID3 tag reading library from the M ii libmad0 0.15.1b-1.1 MPEG audio decoder library ii libmikmod2 3.1.11-a-6 A portable sound library ii libogg0 1.1.2-1 Ogg Bitstream Library ii libvorbis0a 1.1.0-1 The Vorbis General Audio Compressi ii libvorbisfile3 1.1.0-1 The Vorbis General Audio Compressi ii zlib1g 1:1.2.2-4 compression library - runtime -- debconf information excluded -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#81296: Already exists, but...
Hoi Paul, On 20050410 15:29:16+0200, Paul Slootman wrote: On Thu 18 Nov 2004, Rob Mahurin wrote: On Thu, Nov 18, 2004 at 12:48:58PM +0100, Paul Slootman wrote: As the bug report was primarily about wanting the --partial functionality, I'd like to close this bug report... If the problem I described after learning about --partial (where an interrupted largish update to a file turns into an enormous re-download) is gone, I'm satisfied. I think that my kludge was to concatenate the partially-updated file with the original, and try to update that; it worked, but required enormous amounts of disk space. With --partial the rsync will not re-download the already (partially) downloaded data, so that should satisfy your demands :) Now closing this bug report. Not only that, but yesterday I also discovered an --inplace option, which addresses my other request. Happily rsyncing now :) cheers, -- Wessel Dankers [EMAIL PROTECTED] It's union rules. There's nothing we can do about it. Sorry. signature.asc Description: Digital signature
Bug#295189: [PATCH] revised malloc() calls
Package: cpqarrayd Version: 2.0 Followup-For: Bug #295189 Tag: patch Hi, I went over the various malloc() calls in the source to see if anything could be improved. Apparently it doesn't free() anything, ever (except for one piece of memory which it allocates but never uses - wtf). Most of the recurring malloc calls could be removed in favour of using a bit of stack. Some others happen only at system startup. A number of those were really written out versions of strdup() - I changed those to real strdup() calls to improve readability. I did some cursory testing and this version seems to work but more thorough testing would be welcome, especially for the SNMP bits (which we don't use - yet). Time will tell if all memory leaks have been plugged. Regards, -- Wessel Dankers [EMAIL PROTECTED] UNIX system administration Universiteit van Tilburg IT Services Postbus 90153, 5000 LE Bezoekadres Warandelaan 2 Telefoon 013 466 3520 www.uvt.nl diff -urN cpqarrayd-2.0,old/cciss_functions.c cpqarrayd-2.0/cciss_functions.c --- cpqarrayd-2.0,old/cciss_functions.c 2003-09-24 18:05:25.0 +0200 +++ cpqarrayd-2.0/cciss_functions.c 2005-04-11 11:18:30.373715000 +0200 @@ -67,7 +67,7 @@ { int result, outfile; IOCTL_Command_struct iocommand; - unsigned char *buffer; + unsigned char buffer[128]; iocommand.LUN_info.LunAddrBytes[0] = 0; iocommand.LUN_info.LunAddrBytes[1] = 0; @@ -98,7 +98,6 @@ iocommand.Request.CDB[10] = 0x0; /* reserved, leave 0 */ iocommand.Request.CDB[11] = 0x0; /* control ? */ - buffer = (unsigned char *) malloc (128); memset (buffer, 0x0, 128); iocommand.buf_size = 128; iocommand.buf = buffer; @@ -125,7 +124,7 @@ { int result, outfile; IOCTL_Command_struct iocommand; - unsigned char *buffer; + unsigned char buffer[512]; iocommand.LUN_info.LunAddrBytes[0] = 0; iocommand.LUN_info.LunAddrBytes[1] = 0; @@ -157,7 +156,6 @@ iocommand.Request.CDB[11] = 0x0; iocommand.Request.CDB[12] = 0x0; - buffer = (unsigned char *) malloc (512); memset (buffer, 0x0, 512); iocommand.buf_size = 512; iocommand.buf = buffer; diff -urN cpqarrayd-2.0,old/cpqarrayd.c cpqarrayd-2.0/cpqarrayd.c --- cpqarrayd-2.0,old/cpqarrayd.c 2005-04-11 13:12:32.536925362 +0200 +++ cpqarrayd-2.0/cpqarrayd.c 2005-04-11 12:52:27.168263000 +0200 @@ -45,6 +45,10 @@ #include errno.h +#ifndef HOST_NAME_MAX +#define HOST_NAME_MAX 255 +#endif + #include cpqarrayd.h #include discover.h #include status.h @@ -141,8 +145,7 @@ case 't': if (opts.nr_traphosts 10) { /* strlen doesn't count terminating \0. Add one to fix that. */ - opts.traphosts[opts.nr_traphosts] = (char *)malloc(strlen(optarg)+1); - strncpy(opts.traphosts[opts.nr_traphosts], optarg, strlen(optarg)+1); + opts.traphosts[opts.nr_traphosts] = strdup(optarg); opts.nr_traphosts++; } else { @@ -177,8 +180,11 @@ } /* get ip of current machine for traps */ - buffer = (char *)malloc(50); - if (gethostname(buffer, 50) == 0) { + buffer = (char *)malloc(HOST_NAME_MAX + 1); + buffer[0] = '\0'; + if (gethostname(buffer, HOST_NAME_MAX + 1) == 0) { +/* It is unspecified whether a truncated hostname will be NUL-terminated. */ +buffer[HOST_NAME_MAX] = '\0'; myhost = gethostbyname(buffer); myip = ((unsigned char) myhost-h_addr_list[0][3] 24) + ((unsigned char) myhost-h_addr_list[0][2] 16) + @@ -187,6 +193,8 @@ } else { perror(gethostname); +strncpy(buffer, (none), HOST_NAME_MAX); +buffer[HOST_NAME_MAX] = '\0'; } /* test for trap destinations */ @@ -238,11 +246,11 @@ /* END OF ADDITIONAL CODE */ } - buffer = (char *)malloc(1024); + /* buffer = (char *)malloc(1024); */ /* sprintf (buffer, cpqarrayd[%d]\0, getpid); */ openlog (cpqarrayd, LOG_CONS, LOG_USER); syslog(LOG_INFO, Logging Enabled...); - free(buffer); + /* free(buffer); */ while (keeprunning) { status_check(opts); diff -urN cpqarrayd-2.0,old/discover.c cpqarrayd-2.0/discover.c --- cpqarrayd-2.0,old/discover.c2005-04-11 13:12:32.537925217 +0200 +++ cpqarrayd-2.0/discover.c2005-04-11 11:38:35.87716 +0200 @@ -141,9 +141,7 @@ boardid2str (io.c.id_ctlr.board_id, buffer); - ctrls_found[ctrls_found_num].ctrl_devicename = (char *)malloc(strlen(buffer)+1); - strncpy (ctrls_found[ctrls_found_num].ctrl_devicename, - buffer, strlen(buffer)); + ctrls_found[ctrls_found_num].ctrl_devicename = strdup(buffer); ctrls_found[ctrls_found_num].ctrl_type = CTRLTYPE_IDA; @@ -160,8 +158,7 @@ if (opts.verbose) printf( Found a %s (%d Logical drives)\n, buffer, ctrls_found[ctrls_found_num].num_logd_found); - ctrls_found[ctrls_found_num].devicefile = (char *)malloc(strlen(devicefile
Bug#271692: ca-certificates: please ship surfnet-root.pem
hi, (About me: I'm an employee at Tilburg University, an institution that uses these SURFnet root certificates. I also use and have contributed to Debian.) I second the request to include the SURFnet certificate in the Debian ca-certificates package. SURFnet-root certificate fingerprints: SHA1: 3C:DA:BA:08:11:3D:93:42:07:B9:1D:1C:52:56:83:CC:09:BB:C8:29 MD5: CA:8D:97:FC:7E:DA:12:81:24:6B:F6:0D:73:4A:D1:93 Yoroshiku onegaishimasu. -- Wessel Dankers [EMAIL PROTECTED] – UNIX system administration Universiteit van Tilburg – IT Services • Postbus 90153, 5000 LE Bezoekadres Warandelaan 2 • Telefoon 013 466 3520 • www.uvt.nl signature.asc Description: Digital signature
Bug#292290: more details
oi, I myself have been a victim of this too, so I thought I'd join in. The problem seems somehow related to the 2.6.8 kernel, XFS and software raid1. I've seen the corruption on three machines now (including Joost's) and in all cases: - the kernel was Debian's 2.6.8; - the filesystem in question was XFS; - software raid1 (mirroring) was used. Even though lvm2 was used for /usr, /var, etc, corruption occurred on the root filesystem too, which was on a plain md device. Typical disk layout: /dev/md0 (raid1: /dev/hda1 /dev/hdc1) root filesystem, XFS (agcount=2,unwritten=1) /dev/md1 (raid1: /dev/hda3 /dev/hdc3) lvm2 pv, contains: /usr, XFS (agcount=2,unwritten=1,logsize=128m) /var, XFS (agcount=2,unwritten=1,logsize=128m) /tmp, XFS (agcount=2,unwritten=1,logsize=128m) /home, XFS (agsize=4g,unwritten=1,logsize=128m) In some cases only the root filesystem was corrupted, in some cases other filesystems too. The corruption came to light under moderately heavy I/O pressure (such as during an apt-get dist-upgrade). XFS complained about corrupted in-memory structures in some of the cases. However, it is very unlikely that all three machines have bad RAM, and memtest86+ reports no problems. My personal hunch is that it is some bad xfs raid1 interaction but debugging is really hard to do (given that it's impossible to even run dmesg). thanks, -- Wessel Dankers [EMAIL PROTECTED] because Bill Gates is a Jehovah's witness and so nothing can work on St. Swithin's day. signature.asc Description: Digital signature
Bug#366518: please keep debfoster, it is not completely replaced by aptitude
Hi Marc, Andreas, Florian, On 2006‒05‒09 14:58:30+0200, Florian Weimer wrote: * Guus Sliepen: There are two options: either take over upstream development, or reassign this wishlist bug to aptitude. Guus, Wessel, We (Marc Haber, Andreas Barth, and I) would like to take over debfoster development. Is this okay with you? Yes, consider it yours! Kind regards, -- Wessel Dankers [EMAIL PROTECTED] signature.asc Description: Digital signature
Bug#338494: works as advertised
From the man-page: -8 Request 8-bit operation. This causes an attempt to negotiate the TELNET BINARY option for both input and output. By default telnet is not 8-bit clean. If I use the -8 option to telnet, everything works perfectly, including the 東京 and ル examples (“ is another interesting test). This is a non-bug, as far as I can see. cheers, -- Wessel Dankers signature.asc Description: Digital signature
Bug#610360: Virtio network stops working after dynamic virtio disk attachment
Package: linux-2.6 Version: 2.6.32-30 Severity: normal Tags: squeeze upstream patch Hi, As reported in: https://bugs.launchpad.net/ubuntu/+source/eucalyptus/+bug/602060 and (in a roundabout way) in: http://www.mail-archive.com/qemu-devel@nongnu.org/msg26223.html the network inside a 2.6.32 kvm/qemu guest stops working if you hotplug a virtio disk. There is a simple patch that fixes this problem, which was: - tested by Alexander Graf in the qemu-devel posting mentioned above, - accepted in the mainline kernel some time ago, - just tested by myself too. The patch can be found at http://lkml.org/lkml/2009/11/29/73 as well as below. Please include this patch, it makes life for KVM users a lot easier! As all virtio devices perform DMA, we must enable bus mastering for them to be spec compliant. Signed-off-by: Michael S. Tsirkin m...@redhat.com --- drivers/virtio/virtio_pci.c |1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/drivers/virtio/virtio_pci.c b/drivers/virtio/virtio_pci.c index 28d9cf7..717bae1 100644 --- a/drivers/virtio/virtio_pci.c +++ b/drivers/virtio/virtio_pci.c @@ -648,6 +648,7 @@ static int __devinit virtio_pci_probe(struct pci_dev *pci_dev, goto out_req_regions; pci_set_drvdata(pci_dev, vp_dev); + pci_set_master(pci_dev); /* we use the subsystem vendor/device id as the virtio vendor/device * id. this allows us to use the same PCI vendor/device id for all Thanks, -- Wessel Dankers -- System Information: Debian Release: 6.0 APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/3 CPU cores) Locale: LANG=nl_NL.UTF-8, LC_CTYPE=nl_NL.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages linux-image-2.6.32-5-amd64 depends on: ii debconf [debconf-2.0] 1.5.36 Debian configuration management sy ii initramfs-tools [linux-initra 0.98.7 tools for generating an initramfs ii linux-base2.6.32-30 Linux image base package ii module-init-tools 3.12-1 tools for managing Linux kernel mo Versions of packages linux-image-2.6.32-5-amd64 recommends: pn firmware-linux-free none (no description available) Versions of packages linux-image-2.6.32-5-amd64 suggests: pn grub | lilo none (no description available) ii linux-doc-2.6.32 2.6.32-30 Linux kernel specific documentatio Versions of packages linux-image-2.6.32-5-amd64 is related to: pn firmware-bnx2 none (no description available) pn firmware-bnx2xnone (no description available) pn firmware-ipw2x00 none (no description available) pn firmware-ivtv none (no description available) pn firmware-iwlwifi none (no description available) pn firmware-linuxnone (no description available) pn firmware-linux-nonfreenone (no description available) pn firmware-qlogic none (no description available) pn firmware-ralink none (no description available) pn xen-hypervisornone (no description available) -- debconf information excluded -- Package-specific info: ** Version: Linux version 2.6.32-5-amd64 (Debian 2.6.32-30) (b...@decadent.org.uk) (gcc version 4.3.5 (Debian 4.3.5-4) ) #1 SMP Wed Jan 12 03:40:32 UTC 2011 ** Command line: BOOT_IMAGE=/boot/vmlinuz-2.6.32-5-amd64 root=/dev/mapper/sys-root ro console=ttyS0,115200 elevator=noop rootflags=logbufs=8,logbsize=256k,noatime quiet ** Not tainted ** Kernel log: [0.387896] alloc irq_desc for 24 on node -1 [0.387899] alloc kstat_irqs on node -1 [0.387922] virtio-pci :00:04.0: irq 24 for MSI/MSI-X [0.387924] alloc irq_desc for 25 on node -1 [0.387926] alloc kstat_irqs on node -1 [0.387940] virtio-pci :00:04.0: irq 25 for MSI/MSI-X [0.388631] vda: [0.390785] ata_piix :00:01.1: version 2.13 [0.390852] ata_piix :00:01.1: setting latency timer to 64 [0.391039] scsi0 : ata_piix [0.391212] scsi1 : ata_piix [0.391269] ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc000 irq 14 [0.391271] ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc008 irq 15 [0.401910] FDC 0 is a S82078B [0.410013] vda1 vda2 [0.410456] alloc irq_desc for 26 on node -1 [0.410458] alloc kstat_irqs on node -1 [0.410479] virtio-pci :00:03.0: irq 26 for MSI/MSI-X [0.410481] alloc irq_desc for 27 on node -1 [0.410482] alloc kstat_irqs on node -1 [0.410496] virtio-pci :00:03.0: irq 27 for MSI/MSI-X [0.410498] alloc irq_desc for 28 on node -1 [0.410499] alloc kstat_irqs on node -1 [0.410514] virtio-pci :00:03.0: irq 28 for MSI/MSI-X [0.413362] alloc irq_desc for 29 on node -1 [0.413369] alloc
Bug#546854: MaxSessions in sshd_config
hi, Have you tried increasing the MaxSessions configuration parameter in /etc/ssh/sshd_config to something higher than the default 10? cheers, -- Wessel Dankers signature.asc Description: Digital signature
Bug#620732: excessive logging fills up /var/log
Package: cachefilesd Version: 0.9-3 Severity: important Tags: upstream patch Hi, During fairly basic usage of cachefilesd it managed to get into a situation where it filled up my /var/log with 1.2G worth of repetitive messages. Small snippet: Mar 31 22:21:34 slick cachefilesd[12652]: Scan complete Mar 31 22:22:04 slick cachefilesd[12652]: Refilling cull table Mar 31 22:22:04 slick cachefilesd[12652]: Scan complete Mar 31 22:22:34 slick cachefilesd[12652]: Refilling cull table Mar 31 22:22:34 slick cachefilesd[12652]: Scan complete Mar 31 22:23:04 slick cachefilesd[12652]: Refilling cull table Mar 31 22:23:04 slick cachefilesd[12652]: Scan complete Mar 31 22:23:34 slick cachefilesd[12652]: Refilling cull table Mar 31 22:23:34 slick cachefilesd[12652]: Scan complete Mar 31 22:24:04 slick cachefilesd[12652]: Refilling cull table Mar 31 22:24:04 slick cachefilesd[12652]: Scan complete Mar 31 22:24:04 slick cachefilesd[12652]: Decant (all 274) Mar 31 23:27:45 slick cachefilesd[12652]: Refilling cull table Mar 31 23:27:45 slick cachefilesd[12652]: Scan complete Mar 31 23:27:45 slick cachefilesd[12652]: Refilling cull table Mar 31 23:27:45 slick cachefilesd[12652]: Scan complete Mar 31 23:27:45 slick cachefilesd[12652]: Refilling cull table Mar 31 23:27:45 slick cachefilesd[12652]: Scan complete Mar 31 23:27:45 slick cachefilesd[12652]: Refilling cull table Mar 31 23:27:45 slick cachefilesd[12652]: Scan complete Mar 31 23:27:45 slick cachefilesd[12652]: Refilling cull table Mar 31 23:27:45 slick cachefilesd[12652]: Scan complete Please find attached a patch that prevents this problem by demoting these status updates to the ‘debug’ level. cheers, -- Wessel Dankers -- System Information: Debian Release: 6.0.1 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores) Locale: LANG=nl_NL.UTF-8, LC_CTYPE=nl_NL.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages cachefilesd depends on: ii libc6 2.11.2-10 Embedded GNU C Library: Shared lib cachefilesd recommends no packages. cachefilesd suggests no packages. -- no debconf information diff -ur cachefilesd-0.9,org/cachefilesd.c cachefilesd-0.9,new/cachefilesd.c --- cachefilesd-0.9,org/cachefilesd.c 2007-08-09 17:31:39.0 +0200 +++ cachefilesd-0.9,new/cachefilesd.c 2011-04-01 08:11:12.058804251 +0200 @@ -603,7 +603,7 @@ if (jumpstart_scan) { jumpstart_scan = 0; if (!stop !scan) { -notice(Refilling cull table); +debug(1, Refilling cull table); root.usage++; scan = root; } @@ -1307,7 +1307,7 @@ scan = curr-parent; if (!scan) { - info(Scan complete); + debug(1, Scan complete); decant_cull_table(); } @@ -1485,7 +1485,7 @@ if (!scan oldest_build = culltable_size / 2 + 2) { decant_cull_table(); - notice(Refilling cull table); + debug(1, Refilling cull table); root.usage++; scan = root; } signature.asc Description: Digital signature
Bug#687712: to_bin method returns garbage when value is zero
Package: libcrypt-openssl-bignum-perl Version: 0.04-2 Severity: normal Tags: upstream Hi, A command like: perl -MMIME::Base64 -MCrypt::OpenSSL::Bignum -we 'print encode_base64(Crypt::OpenSSL::Bignum-zero-to_bin)' returns different garbage every time it's run. Expected result would be the empty string. Example outputs: 8BPYAQ== 8DPj 8CPJ 8IOn 8KMSAg== cheers, -- System Information: Debian Release: 6.0.5 APT prefers stable APT policy: (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-amd64 (SMP w/4 CPU cores) Locale: LANG=nl_NL.UTF-8, LC_CTYPE=nl_NL.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages libcrypt-openssl-bignum-perl depends on: ii libc6 2.11.3-3 Embedded GNU C Library: Shared lib ii libssl0.9.80.9.8o-4squeeze13 SSL shared libraries ii perl 5.10.1-17squeeze3 Larry Wall's Practical Extraction ii perl-base [perlapi-5.1 5.10.1-17squeeze3 minimal Perl system libcrypt-openssl-bignum-perl recommends no packages. libcrypt-openssl-bignum-perl suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#679746: default --system home directory
Hi, Since some packages do not seem to care about their home directory, and putting system directories under /home is “obviously” never the answer: Perhaps adduser --system invocations should default to --home /nonexistent --no-create-home if no --home option was supplied by the invoking script/user. Kind regards, -- Wessel Dankers wsl-deb-bug-679...@fruit.je signature.asc Description: Digital signature
Bug#693218: adduser --system should default to --group
Package: adduser Version: 3.112+nmu2 Severity: wishlist Tags: security Hi, Currently, system users get nogroup (65534) as their default primary group. However, multiple (system) accounts sharing a common group is not good from a security standpoint. It gives unrelated processes access to each other's files and other resources. While this could be considered a bug in the invoker's script, it's something that is easy to overlook and it could be argued that defaults should be sane and secure (‘graceful degradation’). Please make --group the default for --system. Kind regards, -- Wessel Dankers wsl-deb-bug-sub...@fruit.je signature.asc Description: Digital signature
Bug#664088: mdadm fails to initialize components for bitmap
Package: mdadm Version: 3.2.3-2 Severity: normal Hi, When trying to add a bitmap to a freshly created device, I get an error: # dd if=/dev/zero bs=1M count=100 of=/dev/vdb # dd if=/dev/zero bs=1M count=100 of=/dev/vdc # mdadm -C -l 1 -n 2 -e 1 --assume-clean /dev/md0 /dev/vdb /dev/vdc mdadm: array /dev/md0 started. # mdadm -G -b internal /dev/md0 mdadm: failed to set internal bitmap. In dmesg I saw: [10371.632948] md0: invalid bitmap file superblock: bad magic [10371.632952] md0: bitmap file superblock: [10371.632953] magic: [10371.632955]version: 0 [10371.632957] uuid: ... [10371.632959] events: 0 [10371.632960] events cleared: 0 [10371.632961] state: [10371.632963] chunksize: 0 B [10371.632964] daemon sleep: 0s [10371.632966] sync size: 0 KB [10371.632967] max write behind: 0 A strace of the mdadm -G command contained the following snippet: open(/dev/vdb, O_RDWR|O_DIRECT) = 4 fstat(4, {st_mode=S_IFBLK|S_ISVTX|0660, st_rdev=makedev(254, 16), ...}) = 0 ioctl(4, BLKGETSIZE64, 0x7fffc64838d0) = 0 ioctl(4, BLKFLSBUF, 0) = 0 lseek(4, 4096, SEEK_SET)= 4096 ioctl(4, BLKSSZGET, 0x7fffc64838cc) = 0 read(4, \374N+\251\1\0\0\0\0\0\0\0\0\0\0\0\371\323O\276]W~\353-2\27034U\246\216..., 1024) = 1024 lseek(4, 8192, SEEK_SET)= 8192 ioctl(4, BLKSSZGET, 0x7fffc648296c) = 0 write(4, bitm\4\0\0\0\371\323O\276]W~\353-2\27034U\246\216\0\0\0\0\0\0\0\0..., 512) = -1 EINVAL (Invalid argument) fsync(4)= 0 close(4)= 0 (Followed by a similar one for vdc.) There are at least two bugs here: 1) mdadm opens the device with O_DIRECT but fails to do page aligned writes (a requirement for O_DIRECT). 2) mdadm does not check the return code of its write() calls. Kind regards, *** End of the template - remove these lines *** -- Package-specific info: --- mdadm.conf CREATE owner=root group=disk mode=0660 auto=yes HOMEHOST system MAILADDR root ARRAY /dev/md/0 metadata=1.2 UUID=c58e4d89:bf1aa69e:653e67e6:ee3e1114 name=marzipan:0 --- /etc/default/mdadm INITRDSTART='none' AUTOSTART=true AUTOCHECK=false START_DAEMON=false DAEMON_OPTIONS=--syslog VERBOSE=false --- /proc/mdstat: Personalities : [raid1] md0 : active raid1 vdc[1] vdb[0] 83884984 blocks super 1.2 [2/2] [UU] unused devices: none --- /proc/partitions: major minor #blocks name 2540 16777216 vda 2541 2028 vda1 2542 16775149 vda2 110 221184 sr0 254 16 83886080 vdb 254 32 83886080 vdc 25301048576 dm-0 25312088960 dm-1 25321048576 dm-2 25331048576 dm-3 25341048576 dm-4 25351048576 dm-5 25361048576 dm-6 90 83884984 md0 --- LVM physical volumes: PV VG Fmt Attr PSize PFree /dev/vda2 raid lvm2 a-- 15.99g 8.00g --- mount output udev on /dev type devtmpfs (rw,relatime,size=506600k,nr_inodes=126650,mode=755) devpts on /dev/pts type devpts (rw,nosuid,noexec,relatime,gid=5,mode=620,ptmxmode=000) tmpfs on /run type tmpfs (rw,nosuid,noexec,relatime,size=102712k,mode=755) /dev/mapper/raid-root on / type xfs (rw,noatime,attr2,delaylog,logbufs=8,usrquota,grpquota) proc on /proc type proc (rw,nosuid,nodev,noexec,relatime) sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime) tmpfs on /run/shm type tmpfs (rw,nosuid,nodev,relatime,size=205420k) /dev/mapper/raid-var on /var type xfs (rw,noatime,attr2,delaylog,logbufs=8,logbsize=256k,usrquota,grpquota) /dev/mapper/raid-log on /var/log type xfs (rw,noatime,attr2,delaylog,logbufs=8,logbsize=256k,usrquota,grpquota) /dev/mapper/raid-tmp on /tmp type xfs (rw,noatime,attr2,delaylog,logbufs=8,logbsize=256k,usrquota,grpquota) /dev/mapper/raid-opt on /opt type xfs (rw,noatime,attr2,delaylog,logbufs=8,logbsize=256k,usrquota,grpquota) /dev/mapper/raid-home on /home type xfs (rw,noatime,attr2,delaylog,logbufs=8,logbsize=256k,usrquota,grpquota) --- initrd.img-3.2.0-2-amd64: 68778 blocks 8f2b1943789b8afb2a4fe9bac4c8635c ./etc/mdadm/mdadm.conf 3b031fcad288668064811bd21f68d325 ./lib/modules/3.2.0-2-amd64/kernel/drivers/md/dm-mod.ko 9d5559edb35f648e9b2b035c15aa23ab ./lib/modules/3.2.0-2-amd64/kernel/drivers/md/dm-snapshot.ko be97804ec2556707a3341dba78fb1d7d ./lib/modules/3.2.0-2-amd64/kernel/drivers/md/dm-log.ko 506110ecbebbbcf71609a34ce4ff4ee1 ./lib/modules/3.2.0-2-amd64/kernel/drivers/md/dm-region-hash.ko 592f84ebb28037a38bf53df931ad156c ./lib/modules/3.2.0-2-amd64/kernel/drivers/md/dm-mirror.ko 3bbfdddaf535aa4cfe7bde3ad1797d75 ./lib/modules/3.2.0-2-amd64/kernel/drivers/md/md-mod.ko f36d177658acfd40dea77a9a02ad4c8c ./lib/modules/3.2.0-2-amd64/kernel/drivers/md/linear.ko 3f359aa2181df33dfe81ff8e5c611604 ./lib/modules/3.2.0-2-amd64/kernel/drivers/md/multipath.ko
Bug#688880: linux: Please enable CONFIG_TCM_QLA2XXX=m
Source: linux Severity: wishlist Tags: patch Dear Maintainer, Please enable the CONFIG_TCM_QLA2XXX=m option for 3.5-trunk. This option enables the new target mode for qla2xxx HBAs (see http://www.linux-iscsi.org/wiki/Fibre_Channel). --- linux-3.5.2/debian/config/config2012-08-01 14:30:22.0 +0200 +++ linux-3.5.2/debian/config/config2012-09-24 17:11:32.066868951 +0200 @@ -2919,6 +2919,11 @@ CONFIG_TCM_PSCSI=m ## +## file: drivers/scsi/qla2xxx/Kconfig +## +CONFIG_TCM_QLA2XXX=m + +## ## file: drivers/target/iscsi/Kconfig ## CONFIG_ISCSI_TARGET=m Thanks! -- System Information: Debian Release: wheezy/sid APT prefers experimental APT policy: (400, 'experimental'), (400, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.5-trunk-amd64 (SMP w/8 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#703322: drupal7: Test module fails due to curl version 5.4.4
Package: drupal7 Version: 7.14-2 Severity: normal Tags: patch wheezy Dear Maintainer, Using the simpletest module fails for many if not all tests. Steps to reproduce: 1) enable the Testing module 2) in the Configuration menu, select Testing 3) check the checkbox next to Actions 4) click Run tests A large angry red wall of text appears after a few seconds. The expected result is a green message stating that the tests have succeeded. I've managed to find the fix in the drupal git repository: http://drupal.org/commitlog/commit/2/ec12b314fac08e638ff4ed152cb7412739941166 http://drupalcode.org/project/drupal.git/commit/ec12b31 This bug report describes the issue: http://drupal.org/node/1671200 Apparently drupal versions up to and including 7.16 are incompatible with curl 5.4.4 which happens to exactly the version in wheezy. Please add the above commit (attached) to the patches directory! Is there a possibility to still get this fix into wheezy? Thanks, -- System Information: Debian Release: 7.0 APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Versions of packages drupal7 depends on: ii apache2 2.2.22-13 ii apache2-mpm-prefork [httpd] 2.2.22-13 ii curl 7.26.0-1+wheezy1 ii dbconfig-common 1.8.47+nmu1 ii debconf [debconf-2.0]1.5.49 ii mysql-client 5.5.28+dfsg-1 ii mysql-client-5.5 [virtual-mysql-client] 5.5.28+dfsg-1 ii php5 5.4.4-14 ii php5-gd 5.4.4-14 ii php5-mysql 5.4.4-14 ii postfix [mail-transport-agent] 2.9.6-2 ii wwwconfig-common 0.2.2 Versions of packages drupal7 recommends: ii mysql-server 5.5.28+dfsg-1 drupal7 suggests no packages. -- debconf information excluded commit ec12b314fac08e638ff4ed152cb7412739941166 Author: webchick webch...@24967.no-reply.drupal.org Date: Sat Aug 18 13:15:22 2012 +0200 Issue #1671200 by chx, sun, jaimealsilva: Fixed Simpletest broken on 5.4: CURLOPT_COOKIEJAR cannot be NULL on php5-curl version 5.4.4. diff --git a/modules/simpletest/drupal_web_test_case.php b/modules/simpletest/drupal_web_test_case.php index d83dbeb..19a6c94 100644 --- a/modules/simpletest/drupal_web_test_case.php +++ b/modules/simpletest/drupal_web_test_case.php @@ -1685,6 +1685,13 @@ class DrupalWebTestCase extends DrupalTestCase { if (!isset($this-curlHandle)) { $this-curlHandle = curl_init(); + + // Some versions/configurations of cURL break on a NULL cookie jar, so + // supply a real file. + if (empty($this-cookieFile)) { +$this-cookieFile = $this-public_files_directory . '/cookie.jar'; + } + $curl_options = array( CURLOPT_COOKIEJAR = $this-cookieFile, CURLOPT_URL = $base_url, @@ -1699,7 +1706,12 @@ class DrupalWebTestCase extends DrupalTestCase { $curl_options[CURLOPT_HTTPAUTH] = $this-httpauth_method; $curl_options[CURLOPT_USERPWD] = $this-httpauth_credentials; } - curl_setopt_array($this-curlHandle, $this-additionalCurlOptions + $curl_options); + // curl_setopt_array() returns FALSE if any of the specified options + // cannot be set, and stops processing any further options. + $result = curl_setopt_array($this-curlHandle, $this-additionalCurlOptions + $curl_options); + if (!$result) { +throw new Exception('One or more cURL options could not be set.'); + } // By default, the child session name should be the same as the parent. $this-session_name = session_name();
Bug#703322: closed by Luigi Gangitano lu...@debian.org (Bug#703322: fixed in drupal7 7.22-1)
Hi, This bug was closed in unstable, but the original report was filed against the wheezy version specifically. I would therefore like to reopen this bug. Met vriendelijke groet, -- Wessel Dankers w...@uvt.nl – LIS UNIX® あ! Universiteit van Tilburg – Library and IT Services • Postbus 90153, 5000 LE Bezoekadres Warandelaan 2 • Telefoon 013 466 3520 • G 236 • http://uvt.nl signature.asc Description: Digital signature
Bug#720864: Fails to bind IPv6 socket during DAD
Hi, I developed two workarounds for this issue. The first package hooks into interfaces(5) and delays it for as long as the DAD needs to complete: https://non-gnu.uvt.nl/debian/wheezy/send-na/ If that is not enough – for instance, if you want to bind to floating addresses that may not (yet) be available at all – you can install: https://non-gnu.uvt.nl/debian/wheezy/freebind/ and put the following line in /etc/default/unbound: LD_PRELOAD=/usr/lib/freebind/freebind.so Unbound will then happily bind to any address. cheers, -- Wessel Dankers w...@fruit.je Sent from my general purpose computing device. signature.asc Description: Digital signature
Bug#804194: squashfs-tools: unsquashfs not preserving file capabilities
Hi László, On 2017‒07‒23 14:10:45+0200, László Böszörményi (GCS) wrote: On Tue, Jul 18, 2017 at 6:01 PM, Daniel Baumann <daniel.baum...@progress-linux.org> wrote: On 07/18/17 11:25, László Böszörményi (GCS) wrote: If I have the fixed package, can you help with testing it? sure, thanks. Please check the proposed update[1]. [1] dget -x http://www.barcikacomp.hu/gcs/squashfs-tools_4.3-5.dsc Sorry for the delay. Just finished testing it, it looks like this proposed update does indeed fix #804194. Many thanks! cheers, -- Wessel Dankers Sent from my general purpose computing device. signature.asc Description: Digital signature
Bug#987951: klaus/httpauth.py
Hi, Thanks for patching the lines I mentioned. Unfortunately that patch was only meant to highlight the problem area, not as a comprehensive solution. In particular, the new version now references a nonexistent variable 'PY2'. This is partially my fault for tagging the bug report 'patch'. Updating the vendored copy of httpauth to the upstream version should fix this issue. You can find it at https://raw.githubusercontent.com/jonashaag/httpauth/master/httpauth.py Met vriendelijke groet, -- Wessel Dankers Sent from my general purpose computing device. signature.asc Description: PGP signature
Bug#987951: Error 500 during HTTP authentication
Package: python3-klaus Version: 1.5.2-1 Severity: normal Tags: upstream, fixed-upstream, patch Dear maintainer, If basic/digest authentication is configured and authentication is required, klaus fails with HTTP error 500. The server log shows: TypeError: sequence of byte string values expected, value of type str found This problem is already fixed upstream, in particular in the following lines: --- httpauth/httpauth.py +++ klaus/httpauth.py @@ -132,7 +132,8 @@ '401 Authentication Required', [('WWW-Authenticate', make_www_authenticate_header(self.realm))], ) -return ['401 - Authentication Required'] +html = '401 - Authentication Required' +return [html if PY2 else html.encode()] Updating the vendored copy of httpauth should fix this issue. Met vriendelijke groet, Wessel Dankers -- System Information: Debian Release: bullseye/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.10.0-6-amd64 (SMP w/4 CPU threads) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=nl_NL.UTF-8, LC_CTYPE=nl_NL.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) Versions of packages python3-klaus depends on: ii python3 3.9.2-3 ii python3-dulwich 0.20.15-1 ii python3-flask 1.1.2-2 ii python3-humanize 3.2.0-1 ii python3-pygments 2.7.1+dfsg-2 ii python3-six 1.15.0-2 ii python3-werkzeug 1.0.1+dfsg1-2 Versions of packages python3-klaus recommends: ii python3-chardet4.0.0-1 ii python3-distutils 3.9.2-1 ii python3-docutils 0.16+dfsg-4 pn python3-markdown Versions of packages python3-klaus suggests: pn exuberant-ctags pn uwsgi-plugin-python3 | gunicorn3 -- no debconf information
Bug#986839: mpv: New upstream version 0.33.1 fixes CVE-2021-30145
Package: mpv Version: 0.32.0-2+b1 Severity: grave Tags: security Justification: user security hole X-Debbugs-Cc: Debian Security Team Dear Maintainer, Version 0.33.1 was released on Mon, 5 Apr 2021. Apparently this fixes a security problem (CVE-2021-30145) that affects every version since 2002. A description of the problem can be found at: https://github.com/mpv-player/mpv/commit/cb3fa04bcb2ba9e0d25788480359157208c13e0b The release can be found at: https://github.com/mpv-player/mpv/releases Thanks, Wessel Dankers -- System Information: Debian Release: bullseye/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 5.10.0-5-amd64 (SMP w/4 CPU threads) Locale: LANG=nl_NL.UTF-8, LC_CTYPE=nl_NL.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) Versions of packages mpv depends on: ii libarchive13 3.4.3-2+b1 ii libasound21.2.4-1.1 ii libass9 1:0.15.0-1 ii libavcodec58 7:4.3.2-0+deb11u1 ii libavdevice58 7:4.3.2-0+deb11u1 ii libavfilter7 7:4.3.2-0+deb11u1 ii libavformat58 7:4.3.2-0+deb11u1 ii libavutil56 7:4.3.2-0+deb11u1 ii libbluray21:1.2.1-4 ii libc6 2.31-11 ii libcaca0 0.99.beta19-2.2 ii libcdio-cdda2 10.2+2.0.0-1+b2 ii libcdio-paranoia2 10.2+2.0.0-1+b2 ii libcdio19 2.1.0-2 ii libdrm2 2.4.104-1 ii libdvdnav46.1.0-1+b1 ii libegl1 1.3.2-1 ii libgbm1 20.3.4-1 ii libgl11.3.2-1 ii libjack-jackd2-0 [libjack-0.125] 1.9.17~dfsg-1 ii libjpeg62-turbo 1:2.0.6-4 ii liblcms2-22.12~rc1-2 ii liblua5.2-0 5.2.4-1.1+b3 ii libpulse0 14.2-2 ii librubberband21.9.0-1 ii libsdl2-2.0-0 2.0.14+dfsg2-3 ii libsmbclient 2:4.13.5+dfsg-1 ii libsndio7.0 1.5.0-3 ii libswresample37:4.3.2-0+deb11u1 ii libswscale5 7:4.3.2-0+deb11u1 ii libuchardet0 0.0.7-1 ii libva-drm22.10.0-1 ii libva-wayland22.10.0-1 ii libva-x11-2 2.10.0-1 ii libva22.10.0-1 ii libvdpau1 1.4-3 ii libwayland-client01.18.0-2~exp1.1 ii libwayland-cursor01.18.0-2~exp1.1 ii libwayland-egl1 1.18.0-2~exp1.1 ii libx11-6 2:1.7.0-2 ii libxext6 2:1.3.3-1.1 ii libxinerama1 2:1.1.4-2 ii libxkbcommon0 1.0.3-2 ii libxrandr22:1.5.1-1 ii libxss1 1:1.2.3-1 ii libxv12:1.0.11-1 ii zlib1g1:1.2.11.dfsg-2 Versions of packages mpv recommends: pn xdg-utils pn youtube-dl mpv suggests no packages. -- no debconf information signature.asc Description: PGP signature