Bug#617211: olvwm: fails to install

2011-03-07 Thread Holger Levsen
Package: olvwm
Version: 4.4.3.2p1.4-25.1
Severity: serious
User: debian...@lists.debian.org
Usertags: piuparts piuparts.d.o

Hi, 

during a test with piuparts I noticed your package failed to install. As per 
definition of the release team this makes the package too buggy for a 
release, thus the severity.

From the attached log (scroll to the bottom...):

  Selecting previously deselected package olvwm.
  (Reading database ... 6445 files and directories currently installed.)
  Unpacking olvwm (from .../olvwm_4.4.3.2p1.4-25.1_amd64.deb) ...
  Setting up olvwm (4.4.3.2p1.4-25.1) ...
  update-alternatives: error: alternative 
path /usr/bin/X11/olvwm-x-window-manager doesn't exist.
  dpkg: error processing olvwm (--configure):
   subprocess installed post-installation script returned error exit status 2
  configured to not write apport reports
  Errors were encountered while processing:
   olvwm
  E: Sub-process /usr/bin/dpkg returned an error code (1)


cheers,
Holger
Start: 2011-03-06 21:33:02 UTC

Package: olvwm
Priority: optional
Section: x11
Installed-Size: 548
Maintainer: Debian QA Group 
Architecture: amd64
Source: xview (3.2p1.4-25.1)
Version: 4.4.3.2p1.4-25.1
Provides: x-window-manager
Depends: libc6 (>= 2.3), libx11-6, libxext6, libxpm4
Suggests: menu (>= 2.1.9), xview-clients, olwm
Conflicts: menu (<< 2.1.9)
Filename: pool/main/x/xview/olvwm_4.4.3.2p1.4-25.1_amd64.deb
Size: 229956
MD5sum: f50307e5a9b00ff4ff3a1b7c19d13573
SHA1: ae77f38d9ee0f174b63ca4f78876f37103f6fc96
SHA256: 9875121c2004ff7437fe3077dde6321675dd48abd630a99a0d56dd0800f894b0
Description: OpenLook virtual window manager
 This package contains an extended version of olwm, the original
 OpenLook window manager, enhanced for handling of virtual desktops.
Tag: interface::x11, role::program, x11::window-manager

Executing: sudo /org/piuparts.debian.org/sbin/piuparts --warn-symlinks --warn-on-others --skip-logrotatefiles-test --scriptsdir /etc/piuparts/scripts/ --tmpdir /org/piuparts.debian.org/tmp -ad sid -b sid.tar.gz --mirror http://piatti.debian.org/debian/  olvwm
Guessed: debian
0m0.0s INFO: --
0m0.0s INFO: To quickly glance what went wrong, scroll down to the bottom of this logfile.
0m0.0s INFO: FAQ available at http://wiki.debian.org/piuparts/FAQ
0m0.0s INFO: --
0m0.0s INFO: piuparts version 0.40~201102250909 starting up.
0m0.0s INFO: Command line arguments: /org/piuparts.debian.org/sbin/piuparts --warn-symlinks --warn-on-others --skip-logrotatefiles-test --scriptsdir /etc/piuparts/scripts/ --tmpdir /org/piuparts.debian.org/tmp -ad sid -b sid.tar.gz --mirror http://piatti.debian.org/debian/ olvwm
0m0.0s INFO: Running on: Linux piatti 2.6.32-5-amd64 #1 SMP Wed Jan 12 03:40:32 UTC 2011 x86_64
0m0.0s DEBUG: Created temporary directory /org/piuparts.debian.org/tmp/tmpkWiReQ
0m0.0s DEBUG: Unpacking sid.tar.gz into /org/piuparts.debian.org/tmp/tmpkWiReQ
0m0.0s DEBUG: Starting command: ['tar', '-C', '/org/piuparts.debian.org/tmp/tmpkWiReQ', '-zxf', 'sid.tar.gz']
0m3.0s DEBUG: Command ok: ['tar', '-C', '/org/piuparts.debian.org/tmp/tmpkWiReQ', '-zxf', 'sid.tar.gz']
0m3.0s DEBUG: Created policy-rc.d and chmodded it.
0m3.0s DEBUG: Starting command: ['chroot', '/org/piuparts.debian.org/tmp/tmpkWiReQ', 'apt-get', 'update']
0m12.9s DUMP: 
  Get:1 http://piatti.debian.org sid InRelease [147 kB]
  Ign http://piatti.debian.org sid/main amd64 Packages/DiffIndex
  Ign http://piatti.debian.org sid/contrib amd64 Packages/DiffIndex
  Ign http://piatti.debian.org sid/non-free amd64 Packages/DiffIndex
  Ign http://piatti.debian.org sid/contrib TranslationIndex
  Ign http://piatti.debian.org sid/main TranslationIndex
  Ign http://piatti.debian.org sid/non-free TranslationIndex
  Get:2 http://piatti.debian.org sid/main amd64 Packages [9136 kB]
  Get:3 http://piatti.debian.org sid/contrib amd64 Packages [71.9 kB]
  Get:4 http://piatti.debian.org sid/non-free amd64 Packages [142 kB]
  Ign http://piatti.debian.org sid/contrib Translation-en
  Ign http://piatti.debian.org sid/main Translation-en
  Ign http://piatti.debian.org sid/non-free Translation-en
  Fetched 9497 kB in 1s (7430 kB/s)
  Reading package lists...
0m12.9s DEBUG: Command ok: ['chroot', '/org/piuparts.debian.org/tmp/tmpkWiReQ', 'apt-get', 'update']
0m12.9s DEBUG: Starting command: ['chroot', '/org/piuparts.debian.org/tmp/tmpkWiReQ', 'mount', '-t', 'proc', 'proc', '/proc']
0m12.9s DEBUG: Command ok: ['chroot', '/org/piuparts.debian.org/tmp/tmpkWiReQ', 'mount', '-t', 'proc', 'proc', '/proc']
0m12.9s DEBUG: Starting command: ['chroot', '/org/piuparts.debian.org/tmp/tmpkWiReQ', 'apt-get', '-yf', 'upgrade']
0m14.2s DUMP: 
  Reading package lists...
  Building dependency tree...
  The following packages will be upgraded:
gcc-4.5-base libgcc1 libncurses5 libstdc++6 ncurses-base ncurses-bin
  6 upgraded, 0 newly installed, 0 to remove and 0 not

Bug#617236: olwm&olvwm: DISPLAY environment variable corrupted

2011-03-07 Thread Alan BRASLAU
Package: olwm
Version: 3.2p1.4-25.1
Severity: grave
Tags: patch
Justification: renders package unusable


Prelude:

OK, I know that xview, olwm, olvwm are DEAD... but

I was very happy to see that they now compile on amd64.
(I had earlier lamely tried compiling them myself on this architecture
without much success, nor putting much effort, either.)

However, I loved olvwm and xview, and ALL current GUI developers
should read the Open Look Style Guide, as it clearly explains how a window
manager and GUI system should behave. Lessons that have NOT been learnt.

Even though I loved olvwm, I will probably not use it again much,
or for long, as we have all become dependent on more modern windowing
systems. But perhaps in a spate of some sort of mid-life crisis
I will nostalgically go back to it, and find efficiency and happiness.


Bug:

olwm and olvwm corrupt the environment variable DISPLAY.
If it is set to ":0" as by default on my system,
the window manager resets it to ".0", breaking everything.
If it is set to ":0.0", then everything goes fine.

The problem is in olwm/environ.c and olvwm-4.1/environ.c
My rusty programming experience (that dates from the period when xview
was developed, and before) sees nothing wrong, except:

134c134
<   (void)sprintf(value,"%.*s.%d",len,display,screen);
---
>   (void)sprintf(value,"%*s.%d",len,display,screen);

I do not understand what "%.*s" means, and I believe that this is a typo.
Removing the "." produces working olwm and olvwm.

Thanks again for getting this to compile under amd64
(the problem was probably in a dependency that was fixed).
Please fix the package before anyone else notices.

Thank you.

Alan

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.37 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages olwm depends on:
ii  libc6   2.11.2-13Embedded GNU C Library: Shared lib
ii  libx11-62:1.4.1-5X11 client-side library
ii  libxext62:1.2.0-2X11 miscellaneous extension librar
ii  xviewg  3.2p1.4-25.1 XView shared libraries

olwm recommends no packages.

Versions of packages olwm suggests:
ii  menu2.1.44   generates programs menu for all me
ii  xview-clients   3.2p1.4-25.1 XView client programs

-- no debconf information
#ident	"@(#)environ.c	1.9	93/06/28 SMI"

/*
 *  (c) Copyright 1989 Sun Microsystems, Inc.
 */

/*
 *  Sun design patents pending in the U.S. and foreign countries. See
 *  LEGAL_NOTICE file for terms of the license.
 */

#include 
#ifdef SYSV
#include 
#else
#include 
extern char *strrchr();
extern char *strchr();
#endif
#include 
#include 
#include 
#include "mem.h"

extern	char **environ;

/* ---
 *	Local Data Structures
 * ---*/

/*
 * 	Env - environment object
 */
typedef struct _env {
	char	**environ;	/* array of environment strings */
	int	length;		/* length of environ array */
	int	used;		/* number of entries actually used */
} Env;

/* ---
 *	Local Functions
 * ---*/

/*
 *	createEnv - Creates a new environment array that is the length of
 *		of the current environment plus the number of additions.
 */
static void
createEnv(env,nadditions)
	Env	*env;
	int	nadditions;
{
	int	i = 0;

	/* find the number of items in the current environ */
	while (environ[i] != (char *)NULL) {
		i++;
	}

	/* create space for the environ strings */
	env->used = i;
	env->length = env->used + nadditions + 1;
	env->environ = MemAlloc(env->length*sizeof(char *));

	/* copy the current environ into the new one */
	for (i=0; iused; i++) {
		env->environ[i] = MemNewString(environ[i]);
	}
	env->environ[i] = (char *)NULL;
}

/*
 *	putEnv - Puts the name,value pair into the specified environment
 *	 replacing any existing values.
 *		 Assumes there is space for the new setting.
 */
static void
putEnv(env,name,value)
	Env	*env;
	char	*name;
	char	*value;
{
	int	nameLen = strlen(name);
	char	*envVar;
	int	count;

	/* create new env string with space for '=' and null */
	envVar = (char *)MemAlloc(nameLen + strlen(value) +2);

	(void)sprintf(envVar,"%s=%s",name,value);

	/* search through, checking for variable in question */
	for (count=0 ; countused; count++) {
		if (!strncmp(env->environ[count],name,nameLen))
			break;
	}
	

	if (count == env->used)		/* finished loop without match */
		env->used++;		/* added 1 more var to the env */
	else
		MemFree(env->environ[count]);	/* don't need */

	env->environ[count] = envVar;

	/* make sure th

Bug#616687: marked as done (The webserver is listening on blacklisted ipv6)

2011-03-07 Thread Debian Bug Tracking System
Your message dated Mon, 7 Mar 2011 17:36:44 +0100
with message-id <20110307163643.ga25...@pcpool00.mathematik.uni-freiburg.de>
and subject line Re: Bug#616687: The webserver is listening on blacklisted ipv6
has caused the Debian Bug report #616687,
regarding The webserver is listening on blacklisted ipv6
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
616687: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616687
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: thttpd
Severity: normal

The thttpd web server appears to be listening for ipv6 traffic even though
the ipv6 kernel module is blacklisted and not loaded.

netstat -a|grep www
tcp6   0  0 [::]:www[::]:*  LISTEN

^
This protocol is not supported on this LAN segment

The /etc/modprobe.d/blacklist.conf file contains the following entries:
blacklist ipv6

We should not be listening on ipv6 or displaying addresses in ipv6 format
when ipv6 is blacklisted within the kernel.

Mark.

-- System Information:
Debian Release: 6.0
  APT prefers stable
  APT policy: (990, 'stable'), (50, 'unstable'), (1, 'experimental')
Architecture: i386 (i386)

Kernel: Linux 2.6.38-rc6-486
Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/pdksh

Versions of packages thttpd depends on:
ii  libc6 2.11.2-10  Embedded GNU C Library: Shared lib
ii  logrotate 3.7.8-6Log rotation utility

thttpd recommends no packages.

Versions of packages thttpd suggests:
pn  thttpd-util(no description available)


--- End Message ---
--- Begin Message ---
* Mark Hobley  [110306 17:48]:
> The thttpd web server appears to be listening for ipv6 traffic even though
> the ipv6 kernel module is blacklisted and not loaded.
>
> netstat -a|grep www
> tcp6   0  0 [::]:www[::]:*  LISTEN

If netstat shows this, ipv6 is enabled in the kernel. So this is not
thttp's fault.

> The /etc/modprobe.d/blacklist.conf file contains the following entries:
> blacklist ipv6

That only works if ipv6 is a module. With newer kernels it longer is a
module.

> Kernel: Linux 2.6.38-rc6-486

That seems more than new enough to no longer allow disabling of ipv6
this way. To verify try

grep CONFIG_IPV6= /boot/config-*

If that is a 'm' you can blacklist. If it is a 'y' you cannot blacklist.

The modern way to disable ipv6 is:

echo 'net.ipv6.conf.all.disable_ipv6 = 1' > /etc/sysctl.d/noipv6.conf

Bernhard R. Link

--- End Message ---