Festival Mawazine : Rap US et gros tubes sur la scène de l'OLM ! Découvrez le programme ! [Vidéos]
Alerte Info Dernière minute Mawazine : Le Rap US à l'honneur sur la scène de l'OLM ! Demandez le programme ! LIRE LA SUITE Se désinscrire de cette newsletter
Attentat de Londres : L'attaque a été revendiquée par l'EI
Alerte Info Dernière minute Attaque de Londres : Daech revendique l'attentat LIRE LA SUITE Se désinscrire de cette newsletter
Terrorisme : Un attentat déjoué en Belgique
Alerte Info Dernière minute Belgique : Un nouvel attentat déjoué à Anvers LIRE LA SUITE Se désinscrire de cette newsletter
Bug#858405: xmlto: intermittent Segmentation fault when building manpages for libreswan on mips64el
reassign 858405 xsltproc forcemerge 750593 858405 retitle 750593 xsltproc: bus error on some arches with linux < 4.1 thanks Hi, On 22/03/17 21:01, Daniel Kahn Gillmor wrote: > On Wed 2017-03-22 06:22:41 -0400, James Cowgill wrote: >> On 22/03/17 01:29, Daniel Kahn Gillmor wrote: >>> For debian revisions of 3.20, failures happened on: >>> >>> mipsel-manda-02 >>> eberlin >>> >>> Also for revisions of 3.20, successes happened on: >>> >>> mipsel-sil-01 >>> mipsel-manda-03 >>> mipsel-manda-01 >> >> This is a known issue and it only affects Loongson buildds. >> Interestingly mipsel-manda-01 is Loongson and didn't fail there so there >> may be a random element involved here. I don't think anyone's tracked >> down the underlying issue though. > > thanks, is there a public reference for the known issue that we can > point to? I think #750593 looks a lot like the bug here. After some investigation, it seems I was being a bit unfair to Loongson. This is arguably a non mips specific bug in Linux < 4.1. It just so happens that all the Loongson buildds run jessie's 3.16 kernel and all the other buildds run >= 4.7 from backports. In #750593 there was lots of talk about stack overflows causing this but there is actually another element to this. Indeed if I reduced the stack size down with ulimit, the segfaults become more frequent, but increasing the stack size didn't help at all. After looking at the mappings for a failing process, I saw this (taken just after starting xsltproc): [...] > fff7f5-fff7f5c000 ---p 4000 fd:00 1060250 > /usr/lib/mips64el-linux-gnuabi64/libeatmydata.so.1.1.2 > fff7f5c000-fff7f6 rw-p fd:00 1060250 > /usr/lib/mips64el-linux-gnuabi64/libeatmydata.so.1.1.2 > fff7f6-fff7f88000 r-xp fd:00 1060375 > /lib/mips64el-linux-gnuabi64/ld-2.24.so > fff7f94000-fff7f98000 rw-p 00024000 fd:00 1060375 > /lib/mips64el-linux-gnuabi64/ld-2.24.so > fff7f98000-fff7fa r-xp fd:00 947544 > /usr/bin/xsltproc > fff7fa4000-fff7fac000 rw-p 00:00 0 > fff7fac000-fff7fb rw-p 4000 fd:00 947544 > /usr/bin/xsltproc > 1d4000-384000 rwxp 00:00 0 > [heap] > 9e-a04000 rwxp 00:00 0 > [stack] > ffc000-100 r-xp 00:00 0 > [vdso] Notice that there is a very small gap between the heap and the stack here (at least compared to working xsltproc runs). I think that the heap is growing to a point where it limits the maximum size of the stack and so increasing the stack size with ulimit doesn't help. The reason the program and the heap are at these very high addresses is that xsltproc is built with PIE and the kernel is treating the executable like a mmap and grouping it with all the other libraries. In d1fd836dcf00 ("mm: split ET_DYN ASLR from mmap ASLR") the behavior changed and now the program and it's heap will be mapped at a lower address so the bug does not affect newer kernels. Using "setarch -L" or "setarch -R" is another workaround for this bug because that moves the program so that there is a much larger gap between the heap and the stack. This might affect other applications as well. Effectively it means that PIE executables which use lots of stack space might not work properly with jessie's kernel. The chances the bug will be hit seems to vary between arches however (depending on what each arch does in arch_pick_mmap_layout and arch_randomize_brk) - mips64el seems to be hit pretty frequently. In xsltproc's case, PIE was enabled some time ago which is why this bug is quite old. I believe any of the following will fix this (but have not all been tested): - Reduce the stack usage in xsltproc (the upstream bug) - Upgrade the relevant buildds to Linux >= 4.1 - Apply d1fd836dcf00 to jessie's kernel - Disable PIE in xsltproc. - Run xsltproc inside setarch -L / setarch -R >> For the moment, I'll rebuild libreswan again and hope a good buildd is >> picked. > > i see 5 mips64el rebuilds now at > https://buildd.debian.org/status/logs.php?pkg=libreswan&ver=3.20-6&suite=sid, > but none of them have succeded yet :/ > > 3 of the builds are from mipsel-manda-02, 1 is from eberlin, and one > additional new "bad" builder is: > > mipsel-aql-01 There are 3 non-Loongson buildds: mipsel-aql-03, mipsel-manda-03 and mipsel-sil-01. I expect libreswan will only build on one of those buildds at the moment. Thanks, James signature.asc Description: OpenPGP digital signature
Processed (with 2 errors): Re: Bug#858405: xmlto: intermittent Segmentation fault when building manpages for libreswan on mips64el
Processing commands for cont...@bugs.debian.org: > reassign 858405 xsltproc Bug #858405 [xmlto] xmlto: intermittent Segmentation fault when building manpages for libreswan on mips64el Bug reassigned from package 'xmlto' to 'xsltproc'. No longer marked as found in versions xmlto/0.0.28-1. Ignoring request to alter fixed versions of bug #858405 to the same values previously set > forcemerge 750593 858405 Bug #750593 [xsltproc] xsltproc: bus error on some architectures Bug #858405 [xsltproc] xmlto: intermittent Segmentation fault when building manpages for libreswan on mips64el Set Bug forwarded-to-address to 'https://bugzilla.gnome.org/show_bug.cgi?id=736077'. Severity set to 'important' from 'normal' Failed to forcibly merge 750593: Not altering archived bugs; see unarchive. > retitle 750593 xsltproc: bus error on some arches with linux < 4.1 Failed to set the title of 750593: failed to get lock on /org/bugs.debian.org/spool/lock/750593 -- Unable to lock /org/bugs.debian.org/spool/lock/750593 Resource temporarily unavailable. Unable to lock /org/bugs.debian.org/spool/lock/750593 Resource temporarily unavailable at /usr/local/lib/site_perl/Debbugs/Common.pm line 629. Unable to lock /org/bugs.debian.org/spool/lock/750593 Resource temporarily unavailable at /usr/local/lib/site_perl/Debbugs/Common.pm line 629. Unable to lock /org/bugs.debian.org/spool/lock/750593 Resource temporarily unavailable at /usr/local/lib/site_perl/Debbugs/Common.pm line 629. Unable to lock /org/bugs.debian.org/spool/lock/750593 Resource temporarily unavailable at /usr/local/lib/site_perl/Debbugs/Common.pm line 629. Unable to lock /org/bugs.debian.org/spool/lock/750593 Resource temporarily unavailable at /usr/local/lib/site_perl/Debbugs/Common.pm line 629. Unable to lock /org/bugs.debian.org/spool/lock/750593 Resource temporarily unavailable at /usr/local/lib/site_perl/Debbugs/Common.pm line 629. Unable to lock /org/bugs.debian.org/spool/lock/750593 Resource temporarily unavailable at /usr/local/lib/site_perl/Debbugs/Common.pm line 629. Unable to lock /org/bugs.debian.org/spool/lock/750593 Resource temporarily unavailable at /usr/local/lib/site_perl/Debbugs/Common.pm line 629. Unable to lock /org/bugs.debian.org/spool/lock/750593 Resource temporarily unavailable at /usr/local/lib/site_perl/Debbugs/Common.pm line 629. at /usr/local/lib/site_perl/Debbugs/Common.pm line 587. > thanks Stopping processing here. Please contact me if you need assistance. -- 750593: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=750593 858405: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858405 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#851074: marked as done (httperf: Please migrate to openssl1.1 in buster)
Your message dated Thu, 23 Mar 2017 21:03:59 + with message-id and subject line Bug#851074: fixed in httperf 0.9.0-7 has caused the Debian Bug report #851074, regarding httperf: Please migrate to openssl1.1 in buster to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 851074: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851074 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: httperf Version: 0.9.0-5 Severity: important Control: block 827061 by -1 Hi, OpenSSL 1.1.0 is about to released. During a rebuild of all packages using OpenSSL this package fail to build. A log of that build can be found at: https://breakpoint.cc/openssl-1.1-rebuild-2016-05-29/Attempted/httperf_0.9.0-5_amd64-20160529-1428 On https://wiki.openssl.org/index.php/1.1_API_Changes you can see various of the reasons why it might fail. There are also updated man pages at https://www.openssl.org/docs/manmaster/ that should contain useful information. There is a libssl-dev package available in experimental that contains a recent snapshot, I suggest you try building against that to see if everything works. If you have problems making things work, feel free to contact us. Kurt --- End Message --- --- Begin Message --- Source: httperf Source-Version: 0.9.0-7 We believe that the bug you reported is fixed in the latest version of httperf, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 851...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Thorsten Alteholz (supplier of updated httperf package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 23 Mar 2017 18:12:44 +0100 Source: httperf Binary: httperf Architecture: source amd64 Version: 0.9.0-7 Distribution: experimental Urgency: medium Maintainer: Thorsten Alteholz Changed-By: Thorsten Alteholz Description: httperf- HTTP server performance tester Closes: 726548 851074 Changes: httperf (0.9.0-7) experimental; urgency=medium . * new maintainer (Closes: #726548) * debian/control: use dh10 * debian/control: use secure VCS URLs * let it compile with SSL 1.1.0 (Closes: #851074) Checksums-Sha1: 0f566daf11429ff88930c0da12df6b8436e4612a 2048 httperf_0.9.0-7.dsc 2aa885c0c143d809c0e50a6eca5063090bddee35 425297 httperf_0.9.0.orig.tar.gz f18a5703b3725497a73e14cdf69ea01a19c09072 9232 httperf_0.9.0-7.debian.tar.xz aa674f66f9c62dd57c5134e4843068acb5337151 125312 httperf-dbgsym_0.9.0-7_amd64.deb a0757bc5af93b0b5f13274246dcd69990ebd0607 5794 httperf_0.9.0-7_amd64.buildinfo 9f64f44d40d632b56bbe0e5ef427e4d42d7b03f0 70600 httperf_0.9.0-7_amd64.deb Checksums-Sha256: 6d47a244874de1209e9dc08c8849cf056f5a4ace398dd7c1dab71b39d5059923 2048 httperf_0.9.0-7.dsc e1a0bf56bcb746c04674c47b6cfa531fad24e45e9c6de02aea0d1c5f85a2bf1c 425297 httperf_0.9.0.orig.tar.gz fc36c8f84083ee67d0f7808c9b800762dd67c9aff08e6bb3b644e84bf3ae0309 9232 httperf_0.9.0-7.debian.tar.xz 184b80cf41cd2397cc08f072e38f3d3e34b8bfe7fbb5c232b09da6fc8bc95b2a 125312 httperf-dbgsym_0.9.0-7_amd64.deb aeea5229d2b96a9c3e719d635ed24dc6e0b8d4b18c4677337137c772e8107fae 5794 httperf_0.9.0-7_amd64.buildinfo 9e8518053892fa31fdaa101bbaa18a2dc5aec11685ab8151c0400f4250df8aa8 70600 httperf_0.9.0-7_amd64.deb Files: cb9a21280d1dd89dfe08b935b787d791 2048 web optional httperf_0.9.0-7.dsc 2968c36b9ecf3d98fc1f2c1c9c0d9341 425297 web optional httperf_0.9.0.orig.tar.gz 8fa9ddf2403070c168dc9b26adb05e89 9232 web optional httperf_0.9.0-7.debian.tar.xz a565f43f6440109133278d6caace2340 125312 debug extra httperf-dbgsym_0.9.0-7_amd64.deb 1524627ef653660be57d543cc5b0884c 5794 web optional httperf_0.9.0-7_amd64.buildinfo ff20c341d458a675a111d18169ef5e81 70600 web optional httperf_0.9.0-7_amd64.deb -BEGIN PGP SIGNATURE- iQKnBAEBCgCRFiEEYgH7/9u94Hgi6ruWlvysDTh7WEcFAljTMAZfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDYy MDFGQkZGREJCREUwNzgyMkVBQkI5Njk2RkNBQzBEMzg3QjU4NDcTHGRlYmlhbkBh bHRlaG9sei5kZQAKCRCW/KwNOHtYR1HdEAC7hoJr/yVpAjHsKrqC25cYOR3Ukfib 8o9jx6eFGuZXICxK6Ql7BfTJSosrd4iY1d1Ta7XDJIlbLYbzaU2/MiAzpgk0HzNy P2OGJdZDl4RTZlQSRreljlMxbmhtvyY3yXhuU893OP94G07riBctm4Y99cgriuGd p8JtaW
tagainijisho is marked for autoremoval from testing
tagainijisho 1.0.2-1 is marked for autoremoval from testing on 2017-04-08 It is affected by these RC bugs: 857972: tagainijisho: uninstallable after binNMU