Debian Bug report logs - #554349
apt: Method rred has died unexpectedly!

version graph

Package: apt; Maintainer for apt is APT Development Team <deity@lists.debian.org>; Source for apt is src:apt (PTS, buildd, popcon).

Reported by: Faheem Mitha <faheem@email.unc.edu>

Date: Wed, 4 Nov 2009 04:48:02 UTC

Severity: important

Tags: confirmed

Merged with 554357, 554358, 554368, 554491

Found in versions apt/0.7.20.2+lenny1, apt/0.7.23.1, apt/0.7.24

Fixed in version apt/0.7.25.1

Done: Michael Vogt <mvo@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 04:48:05 GMT) (full text, mbox, link).


Acknowledgement sent to Faheem Mitha <faheem@email.unc.edu>:
New Bug report received and forwarded. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 04:48:05 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Faheem Mitha <faheem@email.unc.edu>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: apt: Method rred has died unexpectedly!
Date: Tue, 03 Nov 2009 23:21:48 -0500
Package: apt
Version: 0.7.20.2+lenny1
Severity: normal


I am currently getting the following. My guess is a malformed pdiff
file. A couple of other people of #debian (oftc) have been seeing
similar errors. Possibly related to
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545694 but this is
supposedly fixed on 0.7.24 and one of my co-bug-reporters can
reproduce this on sid.

Note the same pdiff, 2009-11-04-0016.39.pdiff, occurs before each
error.

This is the first joint bug report I've filed, and I've been using
Debian and filing bug reports since 2001. :-)

                                                   Regards, Faheem.

My error

Get:8 http://debian.csail.mit.edu unstable/main
2009-11-04-0016.39.pdiff [9307kB]
Ign http://people.debian.org stable/enslyon Packages/DiffIndex
Ign http://people.debian.org stable/main Sources/DiffIndex
Ign http://people.debian.org stable/enslyon Sources/DiffIndex
Hit http://jonas.genannt.name lenny/restricted Packages
Hit http://security.debian.org squeeze/updates/non-free Sources
Hit http://www.backports.org lenny-backports/main Packages
Ign http://people.debian.org stable/main Packages
Hit http://www.backports.org lenny-backports/contrib Packages
Ign http://people.debian.org stable/enslyon Packages
Ign http://people.debian.org stable/main Sources
Hit http://www.backports.org lenny-backports/non-free Packages
Ign http://people.debian.org stable/enslyon Sources
Hit http://people.debian.org stable/main Packages
Hit http://people.debian.org stable/enslyon Packages
Hit http://people.debian.org stable/main Sources
Hit http://people.debian.org stable/enslyon Sources
Get:9 http://debian.csail.mit.edu squeeze/main
2009-11-04-0016.39.pdiff [10.2MB]
Get:10 http://debian.csail.mit.edu squeeze/non-free
2009-11-04-0016.39.pdiff [139kB]
Get:11 http://debian.csail.mit.edu squeeze/contrib
2009-11-04-0016.39.pdiff [66.8kB]
Get:12 http://debian.csail.mit.edu squeeze/main
2009-11-04-0016.39.pdiff [4844kB]
E: Method rred has died unexpectedly!

from cockroach (stefan at ott dot net) on #debian on oftc (running sid - 0.7.24)

$ sudo apt-get update
Hit ftp://ftp.ch.debian.org sid Release.gpg
Get:1 ftp://ftp.ch.debian.org sid/main Translation-en_US
Ign ftp://ftp.ch.debian.org sid/main Translation-en_US
Get:2 ftp://ftp.ch.debian.org sid/contrib Translation-en_US
Ign ftp://ftp.ch.debian.org sid/contrib Translation-en_US
Get:3 ftp://ftp.ch.debian.org sid/non-free Translation-en_US
Ign ftp://ftp.ch.debian.org sid/non-free Translation-en_US
Hit ftp://ftp.ch.debian.org sid Release
Hit ftp://ftp.ch.debian.org sid/main Packages/DiffIndex
Hit ftp://ftp.ch.debian.org sid/contrib Packages/DiffIndex
Hit ftp://ftp.ch.debian.org sid/non-free Packages/DiffIndex
Get:4 ftp://ftp.ch.debian.org sid/main 2009-11-02-2358.21.pdiff [37.2kB]
Get:5 ftp://ftp.ch.debian.org sid/main 2009-11-02-2358.21.pdiff [37.2kB]
Get:6 ftp://ftp.ch.debian.org sid/contrib 2009-11-04-0016.39.pdiff
[70.1kB]
Get:7 ftp://ftp.ch.debian.org sid/contrib 2009-11-04-0016.39.pdiff
[70.1kB]
Get:8 ftp://ftp.ch.debian.org sid/main 2009-11-04-0016.39.pdiff
[9,274kB]
Get:9 ftp://ftp.ch.debian.org sid/main 2009-11-04-0016.39.pdiff
[9,274kB]
Get:10 ftp://ftp.ch.debian.org sid/main 2009-11-04-0016.39.pdiff
[9,274kB]
E: Method rred has died unexpectedly!
E: Sub-process rred received a segmentation fault.

from Hideo on #debian on oftc

Hit http://www.debian-multimedia.org unstable/main Packages/DiffIndex
Hit http://ftp.us.debian.org stable/contrib Sources
Hit http://ftp.us.debian.org stable/non-free Sources
Hit http://www.debian-multimedia.org unstable/main Sources/DiffIndex
Get:1 http://ftp.us.debian.org testing/main 2009-11-04-0016.39.pdiff
[4,844kB]
Get:2 http://ftp.us.debian.org testing/main 2009-11-04-0016.39.pdiff
[4,844kB]
Get:3 http://ftp.us.debian.org unstable/main 2009-11-04-0016.39.pdiff
[9,307kB]
Get:4 http://ftp.us.debian.org unstable/non-free
2009-11-04-0016.39.pdiff [86.4kB]
Get:5 http://ftp.us.debian.org experimental/main
2009-11-04-0016.39.pdiff [307kB]
Get:6 http://ftp.us.debian.org testing/main 2009-11-04-0016.39.pdiff
[4,844kB]
Get:7 http://ftp.us.debian.org unstable/main 2009-11-04-0016.39.pdiff
[9,307kB]
E: Method rred has died unexpectedly!
E: Sub-process rred received a segmentation fault.

-- Package-specific info:

-- apt-config dump --

APT "";
APT::Architecture "i386";
APT::Build-Essential "";
APT::Build-Essential:: "build-essential";
APT::Install-Recommends "1";
APT::Install-Suggests "0";
APT::Acquire "";
APT::Acquire::Translation "environment";
APT::Authentication "";
APT::Authentication::TrustCDROM "true";
APT::NeverAutoRemove "";
APT::NeverAutoRemove:: "^linux-image.*";
APT::NeverAutoRemove:: "^linux-restricted-modules.*";
APT::Cache-Limit "56777216";
Dir "/";
Dir::State "var/lib/apt/";
Dir::State::lists "lists/";
Dir::State::cdroms "cdroms.list";
Dir::State::userstatus "status.user";
Dir::State::status "/var/lib/dpkg/status";
Dir::Cache "var/cache/apt/";
Dir::Cache::archives "archives/";
Dir::Cache::srcpkgcache "srcpkgcache.bin";
Dir::Cache::pkgcache "pkgcache.bin";
Dir::Etc "etc/apt/";
Dir::Etc::sourcelist "sources.list";
Dir::Etc::sourceparts "sources.list.d";
Dir::Etc::vendorlist "vendors.list";
Dir::Etc::vendorparts "vendors.list.d";
Dir::Etc::main "apt.conf";
Dir::Etc::parts "apt.conf.d";
Dir::Etc::preferences "preferences";
Dir::Bin "";
Dir::Bin::methods "/usr/lib/apt/methods";
Dir::Bin::dpkg "/usr/bin/dpkg";
Dir::Log "var/log/apt";
Dir::Log::Terminal "term.log";
DPkg "";
DPkg::Pre-Invoke "";
DPkg::Pre-Invoke:: "if [ -x /usr/sbin/etckeeper ]; then etckeeper pre-install; fi";
DPkg::Post-Invoke "";
DPkg::Post-Invoke:: "if [ -x /usr/sbin/etckeeper ]; then etckeeper post-install; fi";
DPkg::Pre-Install-Pkgs "";
DPkg::Pre-Install-Pkgs:: "/usr/bin/apt-listchanges --apt || test $? -ne 10";
DPkg::Pre-Install-Pkgs:: "/usr/sbin/dpkg-preconfigure --apt || true";
DPkg::Tools "";
DPkg::Tools::Options "";
DPkg::Tools::Options::/usr/bin/apt-listchanges "";
DPkg::Tools::Options::/usr/bin/apt-listchanges::Version "2";
RPM "";
RPM::Pre-Invoke "";
RPM::Pre-Invoke:: "if [ -x /usr/sbin/etckeeper ]; then etckeeper pre-install; fi";
RPM::Post-Invoke "";
RPM::Post-Invoke:: "if [ -x /usr/sbin/etckeeper ]; then etckeeper post-install; fi";

-- /etc/apt/preferences --

Package: *
Pin: release a=testing
Pin-Priority: 50

Package: *
Pin: release a=squeeze
Pin-Priority: 50

Package: *
Pin: release a=unstable
Pin-Priority: 50

Package: *
Pin: release a=experimental
Pin-Priority: 1

Package: *
Pin: release a=snapshot.debian.net
Pin-Priority: 1

-- /etc/apt/sources.list --

#deb http://debian.csail.mit.edu/debian/ sarge main non-free contrib
#deb-src http://debian.csail.mit.edu/debian/ sarge main non-free contrib

#deb http://debian.csail.mit.edu/debian/ etch main non-free contrib
#deb-src http://debian.csail.mit.edu/debian/ etch main non-free contrib

#deb http://security.debian.org/ etch/updates main contrib non-free
#deb-src http://security.debian.org/ etch/updates main contrib non-free

deb http://debian.csail.mit.edu/debian/ lenny main non-free contrib
deb-src http://debian.csail.mit.edu/debian/ lenny main non-free contrib

deb http://security.debian.org/ lenny/updates main contrib non-free
deb-src http://security.debian.org/ lenny/updates main contrib non-free

deb http://debian.csail.mit.edu/debian/ squeeze main non-free contrib
deb-src http://debian.csail.mit.edu/debian/ squeeze main non-free contrib

deb http://security.debian.org/ squeeze/updates main contrib non-free
deb-src http://security.debian.org/ squeeze/updates main contrib non-free

deb http://debian.csail.mit.edu/debian/ unstable main non-free contrib
deb-src http://debian.csail.mit.edu/debian/ unstable main non-free contrib

deb http://debian.csail.mit.edu/debian/ experimental main non-free contrib
deb-src http://debian.csail.mit.edu/debian/ experimental main non-free contrib

#deb http://snapshot.debian.net/archive pool linux-2.6
#deb http://snapshot.debian.net/archive pool gcc-4.0
#deb http://snapshot.debian.net/archive pool xen-3.0

deb http://www.debian-multimedia.org lenny main

deb http://www.backports.org/debian/ lenny-backports main contrib non-free

#deb http://www.prato.linux.it/~mnencia/debian nvidia/
#deb-src http://www.prato.linux.it/~mnencia/debian nvidia/

#deb http://cran.r-project.org/bin/linux/debian etch/

#deb http://galen.dulci.org/debian etch main
#deb-src http://galen.dulci.org/debian etch main
	
deb http://people.debian.org/~vdanjean/debian stable main enslyon
deb-src http://people.debian.org/~vdanjean/debian stable main enslyon

deb http://download.skype.com/linux/repos/debian/ stable non-free

deb http://jonas.genannt.name/debian lenny restricted

#deb http://people.debian.org/~preining/TeX/ tl2007/
#deb http://people.debian.org/~preining/TeX/ context/
#deb http://people.debian.org/~preining/TeX/ lmodern/

-- System Information:
Debian Release: 5.0.3
  APT prefers stable
  APT policy: (500, 'stable'), (50, 'unstable'), (50, 'testing'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-2-vserver-686-bigmem (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages apt depends on:
ii  debian-archive-keyring       2009.01.31  GnuPG archive keys of the Debian a
ii  libc6                        2.7-18      GNU C Library: Shared libraries
ii  libgcc1                      1:4.3.2-1.1 GCC support library
ii  libstdc++6                   4.3.2-1.1   The GNU Standard C++ Library v3

apt recommends no packages.

Versions of packages apt suggests:
pn  apt-doc               <none>             (no description available)
ii  aptitude              0.4.11.11-1~lenny1 terminal-based package manager
ii  bzip2                 1.0.5-1            high-quality block-sorting file co
ii  dpkg-dev              1.14.25            Debian package development tools
ii  lzma                  4.43-14            Compression method of 7z format in
ii  python-apt            0.7.7.1+nmu1       Python interface to libapt-pkg
ii  synaptic              0.62.1+nmu1        Graphical package manager

-- no debconf information




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 05:15:31 GMT) (full text, mbox, link).


Acknowledgement sent to Faheem Mitha <faheem@email.unc.edu>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 05:15:34 GMT) (full text, mbox, link).


Message #10 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Faheem Mitha <faheem@email.unc.edu>
To: 554349@bugs.debian.org
Subject: the offending diff
Date: Tue, 3 Nov 2009 23:59:06 -0500 (EST)
[Message part 1 (text/plain, inline)]
From

http://debian.csail.mit.edu/debian/dists/squeeze/main/binary-i386/Packages.diff/

I'm attaching

http://debian.csail.mit.edu/debian/dists/squeeze/main/binary-i386/Packages.diff/2009-11-04-0016.39.gz

which appears to be the diff that was causing the problem

If it gets through the spam filters, that is.

                             Regards, Faheem.

[2009-11-04-0016.39.gz (application/octet-stream, attachment)]

Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 07:40:24 GMT) (full text, mbox, link).


Acknowledgement sent to Guillaume Tamboise <gtamboise@reefs.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 07:40:24 GMT) (full text, mbox, link).


Message #15 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Guillaume Tamboise <gtamboise@reefs.org>
To: Debian Bug Tracking System <554349@bugs.debian.org>
Subject: Reproduced with an apt source of ftp.debian.org
Date: Wed, 04 Nov 2009 05:51:17 +0000
Package: apt
Version: 0.7.20.2+lenny1
Followup-For: Bug #554349


Experiencing the same issue with a pdiff from testing:

Get:6 http://ftp.debian.org testing/non-free 2009-11-04-0016.39.pdiff [81.1kB]
E: Method rred has died unexpectedly!



-- Package-specific info:

-- apt-config dump --

APT "";
APT::Architecture "amd64";
APT::Build-Essential "";
APT::Build-Essential:: "build-essential";
APT::Install-Recommends "1";
APT::Install-Suggests "0";
APT::Acquire "";
APT::Acquire::Translation "environment";
APT::Authentication "";
APT::Authentication::TrustCDROM "true";
APT::NeverAutoRemove "";
APT::NeverAutoRemove:: "^linux-image.*";
APT::NeverAutoRemove:: "^linux-restricted-modules.*";
Dir "/";
Dir::State "var/lib/apt/";
Dir::State::lists "lists/";
Dir::State::cdroms "cdroms.list";
Dir::State::userstatus "status.user";
Dir::State::status "/var/lib/dpkg/status";
Dir::Cache "var/cache/apt/";
Dir::Cache::archives "archives/";
Dir::Cache::srcpkgcache "srcpkgcache.bin";
Dir::Cache::pkgcache "pkgcache.bin";
Dir::Etc "etc/apt/";
Dir::Etc::sourcelist "sources.list";
Dir::Etc::sourceparts "sources.list.d";
Dir::Etc::vendorlist "vendors.list";
Dir::Etc::vendorparts "vendors.list.d";
Dir::Etc::main "apt.conf";
Dir::Etc::parts "apt.conf.d";
Dir::Etc::preferences "preferences";
Dir::Bin "";
Dir::Bin::methods "/usr/lib/apt/methods";
Dir::Bin::dpkg "/usr/bin/dpkg";
Dir::Log "var/log/apt";
Dir::Log::Terminal "term.log";
DPkg "";
DPkg::Pre-Install-Pkgs "";
DPkg::Pre-Install-Pkgs:: "/usr/bin/apt-listchanges --apt || test $? -ne 10";
DPkg::Pre-Install-Pkgs:: "/usr/sbin/dpkg-preconfigure --apt || true";
DPkg::Tools "";
DPkg::Tools::Options "";
DPkg::Tools::Options::/usr/bin/apt-listchanges "";
DPkg::Tools::Options::/usr/bin/apt-listchanges::Version "2";
DPkg::Post-Invoke "";
DPkg::Post-Invoke:: "which dzhandle >/dev/null && dzhandle restart-pending-instances || true";

-- (no /etc/apt/preferences present) --


-- /etc/apt/sources.list --


# Main
deb http://http.us.debian.org/debian/ lenny main non-free contrib
# Source
deb-src http://ftp.debian.org/debian/ testing main non-free contrib
# Security
deb http://security.debian.org/ lenny/updates main contrib non-free

deb file:/usr/src ./

# Volatile
deb http://volatile.debian.org/debian-volatile lenny/volatile main contrib non-free

# Backports
deb http://www.backports.org/debian lenny-backports main contrib non-free

-- System Information:
Debian Release: 5.0.3
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages apt depends on:
ii  debian-archive-keyring       2009.01.31  GnuPG archive keys of the Debian a
ii  libc6                        2.7-18      GNU C Library: Shared libraries
ii  libgcc1                      1:4.3.2-1.1 GCC support library
ii  libstdc++6                   4.3.2-1.1   The GNU Standard C++ Library v3

apt recommends no packages.

Versions of packages apt suggests:
pn  apt-doc               <none>             (no description available)
ii  aptitude              0.4.11.11-1~lenny1 terminal-based package manager
ii  bzip2                 1.0.5-1            high-quality block-sorting file co
ii  dpkg-dev              1.14.25            Debian package development tools
ii  lzma                  4.43-14            Compression method of 7z format in
ii  python-apt            0.7.7.1+nmu1       Python interface to libapt-pkg

-- no debconf information




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 07:43:48 GMT) (full text, mbox, link).


Acknowledgement sent to Faheem Mitha <faheem@email.unc.edu>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 07:43:48 GMT) (full text, mbox, link).


Message #20 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Faheem Mitha <faheem@email.unc.edu>
To: 554349@bugs.debian.org
Subject: Re: the offending diff
Date: Wed, 4 Nov 2009 01:13:23 -0500 (EST)
Courtesy of sney on #debian on oftc, you can find the offending diff at

http://drubo.net/temp/2009-11-04-0016.39.gz

Regards, Faheem.




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 10:15:44 GMT) (full text, mbox, link).


Acknowledgement sent to Giorgos Pallas <gpall@ccf.auth.gr>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 10:15:44 GMT) (full text, mbox, link).


Message #25 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Giorgos Pallas <gpall@ccf.auth.gr>
To: Debian Bug Tracking System <554349@bugs.debian.org>
Subject: Re: Method rred has died unexpectedly!
Date: Wed, 04 Nov 2009 09:20:58 +0200
Package: apt
Version: 0.7.23.1
Severity: normal


I am getting the same message during aptitude update ->

aris:/home/encmp/gpall# aptitude update
Hit http://postmortem.csd.auth.gr testing Release.gpg
Ign http://postmortem.csd.auth.gr testing/main Translation-en_US
Ign http://postmortem.csd.auth.gr testing/contrib Translation-en_US
Ign http://postmortem.csd.auth.gr testing/non-free Translation-en_US
Hit http://postmortem.csd.auth.gr testing Release
Hit http://postmortem.csd.auth.gr testing/main Packages/DiffIndex
Hit http://security.debian.org testing/updates Release.gpg
Ign http://security.debian.org testing/updates/main Translation-en_US
Ign http://security.debian.org testing/updates/contrib Translation-en_US
Ign http://security.debian.org testing/updates/non-free Translation-en_US
Hit http://www.debian-multimedia.org testing Release.gpg
Hit http://www.debian-multimedia.org testing/main Translation-en_US
Hit http://download.virtualbox.org lenny Release.gpg
Ign http://download.virtualbox.org lenny/non-free Translation-en_US
Hit http://postmortem.csd.auth.gr testing/contrib Packages/DiffIndex
Hit http://postmortem.csd.auth.gr testing/non-free Packages/DiffIndex
Hit http://postmortem.csd.auth.gr testing/main Sources/DiffIndex
Hit http://postmortem.csd.auth.gr testing/contrib Sources/DiffIndex
Hit http://postmortem.csd.auth.gr testing/non-free Sources/DiffIndex
Hit http://security.debian.org testing/updates Release
Hit http://www.debian-multimedia.org testing Release
Hit http://download.virtualbox.org lenny Release
Ign http://security.debian.org testing/updates/main Packages/DiffIndex
Hit http://www.debian-multimedia.org testing/main Packages/DiffIndex
Ign http://security.debian.org testing/updates/contrib Packages/DiffIndex
Ign http://security.debian.org testing/updates/non-free Packages/DiffIndex
Ign http://security.debian.org testing/updates/main Sources/DiffIndex
Ign http://security.debian.org testing/updates/contrib Sources/DiffIndex
Ign http://security.debian.org testing/updates/non-free Sources/DiffIndex
Hit http://security.debian.org testing/updates/main Packages
Hit http://security.debian.org testing/updates/contrib Packages
Hit http://security.debian.org testing/updates/non-free Packages
Hit http://security.debian.org testing/updates/main Sources
Ign http://download.virtualbox.org lenny/non-free Packages/DiffIndex
Hit http://security.debian.org testing/updates/contrib Sources
Hit http://security.debian.org testing/updates/non-free Sources
Hit http://download.virtualbox.org lenny/non-free Packages
Get:1 http://postmortem.csd.auth.gr testing/main 2009-11-04-0016.39.pdiff
[10.2MB]
Get:2 http://postmortem.csd.auth.gr testing/contrib 2009-11-04-0016.39.pdiff
[66.8kB]
Get:3 http://postmortem.csd.auth.gr testing/non-free
2009-11-04-0016.39.pdiff [139kB]
Get:4 http://postmortem.csd.auth.gr testing/main 2009-11-04-0016.39.pdiff
[10.2MB]
Get:5 http://postmortem.csd.auth.gr testing/main 2009-11-04-0016.39.pdiff
[4,844kB]
Get:6 http://postmortem.csd.auth.gr testing/contrib 2009-11-04-0016.39.pdiff
[40.2kB]
Get:7 http://postmortem.csd.auth.gr testing/non-free
2009-11-04-0016.39.pdiff [81.1kB]
Get:8 http://postmortem.csd.auth.gr testing/contrib 2009-11-04-0016.39.pdiff
[66.8kB]
Get:9 http://postmortem.csd.auth.gr testing/main 2009-11-04-0016.39.pdiff
[10.2MB]
Get:10 http://postmortem.csd.auth.gr testing/non-free
2009-11-04-0016.39.pdiff [139kB]
Get:11 http://postmortem.csd.auth.gr testing/main 2009-11-04-0016.39.pdiff
[4,844kB]
E: Method rred has died unexpectedly!
E: Sub-process rred received a segmentation fault.

aris:/home/encmp/gpall#


-- Package-specific info:

-- apt-config dump --

APT "";
APT::Architecture "i386";
APT::Build-Essential "";
APT::Build-Essential:: "build-essential";
APT::Install-Recommends "false";
APT::Install-Suggests "0";
APT::Acquire "";
APT::Acquire::Translation "environment";
APT::Authentication "";
APT::Authentication::TrustCDROM "true";
APT::NeverAutoRemove "";
APT::NeverAutoRemove:: "^linux-image.*";
APT::NeverAutoRemove:: "^linux-restricted-modules.*";
Dir "/";
Dir::State "var/lib/apt/";
Dir::State::lists "lists/";
Dir::State::cdroms "cdroms.list";
Dir::State::userstatus "status.user";
Dir::State::status "/var/lib/dpkg/status";
Dir::Cache "var/cache/apt/";
Dir::Cache::archives "archives/";
Dir::Cache::srcpkgcache "srcpkgcache.bin";
Dir::Cache::pkgcache "pkgcache.bin";
Dir::Etc "etc/apt/";
Dir::Etc::sourcelist "sources.list";
Dir::Etc::sourceparts "sources.list.d";
Dir::Etc::vendorlist "vendors.list";
Dir::Etc::vendorparts "vendors.list.d";
Dir::Etc::main "apt.conf";
Dir::Etc::parts "apt.conf.d";
Dir::Etc::preferences "preferences";
Dir::Etc::preferencesparts "preferences.d";
Dir::Bin "";
Dir::Bin::methods "/usr/lib/apt/methods";
Dir::Bin::dpkg "/usr/bin/dpkg";
Dir::Log "var/log/apt";
Dir::Log::Terminal "term.log";
DPkg "";
DPkg::Pre-Install-Pkgs "";
DPkg::Pre-Install-Pkgs:: "/usr/sbin/dpkg-preconfigure --apt || true";
DPkg::Post-Invoke "";
DPkg::Post-Invoke:: "if [ -x /usr/bin/debsums ]; then /usr/bin/debsums --generate=nocheck -sp /var/cache/apt/archives; fi";
Aptitude "";
Aptitude::Recommends-Important "false";

-- (no /etc/apt/preferences present) --


-- /etc/apt/sources.list --


deb http://postmortem.csd.auth.gr/debian/ testing main contrib non-free
deb-src http://postmortem.csd.auth.gr/debian/ testing main contrib non-free

deb http://security.debian.org/ testing/updates main contrib non-free
deb-src http://security.debian.org/ testing/updates main contrib non-free

deb http://www.debian-multimedia.org testing main

deb http://download.virtualbox.org/virtualbox/debian lenny non-free

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.30-2-686 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages apt depends on:
ii  debian-archive-keyring        2009.01.31 GnuPG archive keys of the Debian a
ii  libc6                         2.9-25     GNU C Library: Shared libraries
ii  libgcc1                       1:4.4.1-4  GCC support library
ii  libstdc++6                    4.4.1-4    The GNU Standard C++ Library v3

apt recommends no packages.

Versions of packages apt suggests:
pn  apt-doc                   <none>         (no description available)
ii  aptitude                  0.4.11.11-1+b2 terminal-based package manager
ii  bzip2                     1.0.5-3        high-quality block-sorting file co
ii  dpkg-dev                  1.15.4.1       Debian package development tools
ii  lzma                      4.43-14        Compression method of 7z format in
pn  python-apt                <none>         (no description available)

-- no debconf information




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 13:00:12 GMT) (full text, mbox, link).


Acknowledgement sent to Evgeni Golov <sargentd@die-welt.net>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 13:00:13 GMT) (full text, mbox, link).


Message #30 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Evgeni Golov <sargentd@die-welt.net>
To: control@bugs.debian.org, 554349@bugs.debian.org
Subject: found in sid too
Date: Wed, 4 Nov 2009 09:53:40 +0100
found 554349 0.7.24
thanks

I'm facing this on my Sid box too :(

Regards
Evgeni

-- 
Bruce Schneier can read and understand Perl programs.




Bug Marked as found in versions apt/0.7.24. Request was from Evgeni Golov <sargentd@die-welt.net> to control@bugs.debian.org. (Wed, 04 Nov 2009 13:00:22 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 13:27:03 GMT) (full text, mbox, link).


Acknowledgement sent to Greg Norris <haphazard@kc.rr.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 13:27:03 GMT) (full text, mbox, link).


Message #37 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Greg Norris <haphazard@kc.rr.com>
To: 554349@bugs.debian.org
Subject: Re: Bug#554349: apt: Method rred has died unexpectedly!
Date: Wed, 4 Nov 2009 06:18:39 -0600
If it helps at all, I see the following entry in /var/log/kern.log each 
time the problem occurs.

   rred[28536]: segfault at bf56cf84 ip b74958af sp bf56cf88 error 6 in libc-2.10.1.so[b742e000+141000]

I have apt 0.7.24 and libc6 2.10.1-5 installed.




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 13:39:06 GMT) (full text, mbox, link).


Acknowledgement sent to David Kalnischkies <kalnischkies+debian@gmail.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 13:39:06 GMT) (full text, mbox, link).


Message #42 received at 554349@bugs.debian.org (full text, mbox, reply):

From: David Kalnischkies <kalnischkies+debian@gmail.com>
To: Faheem Mitha <faheem@email.unc.edu>, 554349@bugs.debian.org, control@bugs.debian.org
Subject: Re: Bug#554349: apt: Method rred has died unexpectedly!
Date: Wed, 4 Nov 2009 11:12:25 +0100
tags 554349 + confirmed
thanks

Hello Faheem Mitha & all other co-bug-reporters :)

First of all: Thanks for the report!

I have currently no time to dig into it a bit deeper,
(hopefully i can do it tonight or tomorrow)
but my first guess is an overflow of an internal variable:
apt-get update -o Debug::pkgAcquire::RRed=1 -qq
results in 65,442 lines of output which is near the value
of a signed integer (65,535).

A patch of this size (~9 MB) is a bit uncommon as it
is bigger than the complete download of the new file.
It would be good if APT could detect it... we will see. :)

As a workaround you can disable pdiffs temporary with
apt-get update -o Acquire::Pdiffs=false



Best regards / Mit freundlichen Grüßen,

David "DonKult" Kalnischkies




Added tag(s) confirmed. Request was from David Kalnischkies <kalnischkies+debian@gmail.com> to control@bugs.debian.org. (Wed, 04 Nov 2009 13:39:08 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 13:57:09 GMT) (full text, mbox, link).


Acknowledgement sent to eric.valette@free.fr:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 13:57:09 GMT) (full text, mbox, link).


Message #49 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Eric Valette <eric.valette@free.fr>
To: 554349@bugs.debian.org
Subject: confirmed on all machines here
Date: Wed, 04 Nov 2009 09:59:36 +0100
NB: changing the root server enables to download the complete file
instead of diff.

-- eric






Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 14:06:12 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Vogt <mvo@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 14:06:12 GMT) (full text, mbox, link).


Message #54 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Michael Vogt <mvo@debian.org>
To: Faheem Mitha <faheem@email.unc.edu>, 554349@bugs.debian.org
Subject: Re: Bug#554349: apt: Method rred has died unexpectedly!
Date: Wed, 4 Nov 2009 11:54:22 +0100
On Tue, Nov 03, 2009 at 11:21:48PM -0500, Faheem Mitha wrote:
> Package: apt
> Version: 0.7.20.2+lenny1
> Severity: normal
> 
> 
> I am currently getting the following. My guess is a malformed pdiff
> file. A couple of other people of #debian (oftc) have been seeing
> similar errors. Possibly related to
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545694 but this is
> supposedly fixed on 0.7.24 and one of my co-bug-reporters can
> reproduce this on sid.
> 
> Note the same pdiff, 2009-11-04-0016.39.pdiff, occurs before each
> error.
> 
> This is the first joint bug report I've filed, and I've been using
> Debian and filing bug reports since 2001. :-)

Thanks for your bugreport. 

I can reproduce the failure here and I'm looking into the problem
now. As a workaround you can run:

# apt-get update -o Acquire::PDiffs=false

thanks,
 Michael




Severity set to 'serious' from 'normal' Request was from Piotr Lewandowski (CERT Polska) <piotr.lewandowski@cert.pl> to control@bugs.debian.org. (Wed, 04 Nov 2009 14:06:14 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 15:48:09 GMT) (full text, mbox, link).


Acknowledgement sent to Mattias Nilsson <emptyhead75@gmail.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 15:48:10 GMT) (full text, mbox, link).


Message #61 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Mattias Nilsson <emptyhead75@gmail.com>
To: 554349@bugs.debian.org
Subject: workaround
Date: Wed, 4 Nov 2009 11:01:53 +0100
As found elsewhere, a possible workaround it to try updating your
repositories with this:
apt-get update -o Acquire::PDiffs=false

Or by setting
Acquire::Pdiffs false;
in /etc/apt/apt.conf

-- 
Mattias Nilsson
Data Ductus




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 16:09:05 GMT) (full text, mbox, link).


Acknowledgement sent to Benjamin Eikel <debian@eikel.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 16:09:05 GMT) (full text, mbox, link).


Message #66 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Benjamin Eikel <debian@eikel.org>
To: 554349@bugs.debian.org
Subject: [apt] Backtrace
Date: Wed, 4 Nov 2009 12:35:40 +0100
Package: apt
Version: 0.7.24

--- Please enter the report below this line. ---
Hello,

I have the same problem. I tried to create a stack trace with GDB. What I have 
is:

Core was generated by `/usr/lib/apt/methods/rred'.
Program terminated with signal 11, Segmentation fault.

#0  0x00007ff59fb8060f in _IO_getline_info (fp=0x1fa4a30, buf=0x7fffc2711330 ".
\n", n=1023, delim=10, extract_delim=1, eof=0x0) at iogetline.c:63
#1  0x00007ff59fb7f589 in _IO_fgets (buf=0x7fffc2711330 ".\n", n=<value 
optimized out>, fp=0x1fa4a30) at iofgets.c:58
#2  0x0000000000401d8c in ?? ()
#3  0x0000000000401e55 in ?? ()

The last line repeats thousands of times. Maybe this helps, but I doubt it. I 
do not know which debugging symbols are missing for #2 and following.

Kind regards,
Benjamin

--- System information. ---
Architecture: amd64
Kernel:       Linux 2.6.31-1-amd64

Debian Release: squeeze/sid
  900 unstable        www.debian-multimedia.org 
  900 unstable        ftp.de.debian.org 
  570 experimental    ftp.de.debian.org 
  560 testing         www.debian-multimedia.org 
  560 testing         security.debian.org 
  560 testing         ftp.de.debian.org 
  550 stable          www.debian-multimedia.org 
  550 stable          security.debian.org 
  550 stable          ftp.de.debian.org 
  500 etch-wx         apt.wxwidgets.org 
  500 any             apt.jenslody.de 

--- Package information. ---
Depends                       (Version) | Installed
=======================================-+-=============
libc6                        (>= 2.3.4) | 2.10.1-5
libgcc1                    (>= 1:4.1.1) | 1:4.4.2-2
libstdc++6                   (>= 4.2.1) | 4.4.2-2
debian-archive-keyring                  | 2009.01.31


Package's Recommends field is empty.

Suggests        (Version) | Installed
=========================-+-===========
aptitude                  | 0.6.0.1-1
 OR synaptic              | 
 OR wajig                 | 
dpkg-dev                  | 1.15.4.1
apt-doc                   | 
bzip2                     | 1.0.5-3
lzma                      | 4.43-14
python-apt                | 0.7.13.3



--- Output from package bug script ---





Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 16:36:03 GMT) (full text, mbox, link).


Acknowledgement sent to Björn Wiberg <Bjorn.Wiberg@its.uu.se>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 16:36:04 GMT) (full text, mbox, link).


Message #71 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Björn Wiberg <Bjorn.Wiberg@its.uu.se>
To: 554349@bugs.debian.org
Subject: Possible libc fault?
Date: Wed, 04 Nov 2009 10:09:24 +0100
[Message part 1 (text/plain, inline)]
Noticed the following in /var/log/messages when this error occurred:

---8<---
Nov  4 04:00:21 bjornw kernel: [1130177.769451] rred[15549]: segfault at 
bf0cffa4 ip b7cd410f sp bf0cffa8 error 6 in libc-2.7.so[b7c6a000+155000]
Nov  4 04:00:21 bjornw cron-apt: CRON-APT RUN [/etc/cron-apt/config]: 
Wed Nov  4 04:00:01 CET 2009
Nov  4 04:00:21 bjornw cron-apt: CRON-APT SLEEP: 13, Wed Nov  4 04:00:14 
CET 2009
Nov  4 04:00:21 bjornw cron-apt: CRON-APT ACTION: 0-update
Nov  4 04:00:21 bjornw cron-apt: CRON-APT LINE: /usr/bin/apt-get update 
-o quiet=2
Nov  4 04:00:21 bjornw cron-apt: E: Method rred has died unexpectedly!
--->8---

...suggesting that perhaps libc is involved.

---8<---
root@bjornw:~# LC_ALL=C apt-cache policy libc6 libc6-i686
libc6:
  Installed: 2.7-18
  Candidate: 2.7-18
  Version table:
     2.10.1-5 0
         -2 http://ftp.se.debian.org unstable/main Packages
     2.9-25 0
         -1 http://ftp.se.debian.org testing/main Packages
 *** 2.7-18 0
        500 http://ftp.se.debian.org lenny/main Packages
        100 /var/lib/dpkg/status
libc6-i686:
  Installed: 2.7-18
  Candidate: 2.7-18
  Version table:
     2.10.1-5 0
         -2 http://ftp.se.debian.org unstable/main Packages
     2.9-25 0
         -1 http://ftp.se.debian.org testing/main Packages
 *** 2.7-18 0
        500 http://ftp.se.debian.org lenny/main Packages
        100 /var/lib/dpkg/status
root@bjornw:~#
---8<---

Also worth noticing: work-around (although it doesn't cure the cause):

apt-get update -o Acquire::Pdiffs=false

...then after that 'apt-get update' works as it should again.

[smime.p7s (application/x-pkcs7-signature, attachment)]

Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 17:13:55 GMT) (full text, mbox, link).


Acknowledgement sent to Phillip Pi <ant@zimage.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 17:13:55 GMT) (full text, mbox, link).


Message #76 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Phillip Pi <ant@zimage.com>
To: 554349@bugs.debian.org
Subject: Same here.
Date: Wed, 4 Nov 2009 05:42:43 -0800
I am getting the same error today with apt-get update. "apt-get update 
-o Acquire::Pdiffs=false" worked. :)




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 17:21:18 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Vogt <mvo@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 17:21:18 GMT) (full text, mbox, link).


Message #81 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Michael Vogt <mvo@debian.org>
To: Faheem Mitha <faheem@email.unc.edu>, 554349@bugs.debian.org
Subject: Re: Bug#554349: apt: Method rred has died unexpectedly!
Date: Wed, 4 Nov 2009 14:30:43 +0100
It turns out that the unusual size of the diff causes a the stack to
overflow, a different workaround is "ulimit -s 12288" (or something
like that). Clearly its still a bug in rred.cc.




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 17:27:28 GMT) (full text, mbox, link).


Acknowledgement sent to Mark Florian <markrian@gmail.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 17:27:28 GMT) (full text, mbox, link).


Message #86 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Mark Florian <markrian@gmail.com>
To: 554349@bugs.debian.org
Subject: Temporary fix
Date: Wed, 04 Nov 2009 13:20:17 +0000
I just encountered this bug on lenny. For anyone who doesn't know, the
temporary work around for this is to update like this as root (or using
sudo):

aptitude update -o Acquire::PDiffs=false

or

apt-get update -o Acquire::PDiffs=false





Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 17:39:22 GMT) (full text, mbox, link).


Acknowledgement sent to Julian Gilbey <jdg@polya.uklinux.net>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 17:39:22 GMT) (full text, mbox, link).


Message #91 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Julian Gilbey <jdg@polya.uklinux.net>
To: Michael Vogt <mvo@debian.org>, 554349@bugs.debian.org
Subject: Re: Bug#554349: apt: Method rred has died unexpectedly!
Date: Wed, 4 Nov 2009 16:41:27 +0000
On Wed, Nov 04, 2009 at 11:54:22AM +0100, Michael Vogt wrote:
> Thanks for your bugreport. 
> 
> I can reproduce the failure here and I'm looking into the problem
> now. As a workaround you can run:
> 
> # apt-get update -o Acquire::PDiffs=false

Looks like the diff file is corrupt; applying it manually to the
Packages file using ed leaves an invalid Packages file.

   Julian




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 18:00:33 GMT) (full text, mbox, link).


Acknowledgement sent to Michael Vogt <mvo@ubuntu.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 18:00:33 GMT) (full text, mbox, link).


Message #96 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Michael Vogt <mvo@ubuntu.com>
To: David Kalnischkies <kalnischkies+debian@gmail.com>, 554349@bugs.debian.org
Cc: Faheem Mitha <faheem@email.unc.edu>
Subject: Re: Bug#554349: apt: Method rred has died unexpectedly!
Date: Wed, 4 Nov 2009 18:27:05 +0100
[Message part 1 (text/plain, inline)]
On Wed, Nov 04, 2009 at 11:12:25AM +0100, David Kalnischkies wrote:
> tags 554349 + confirmed
> thanks
> 
> Hello Faheem Mitha & all other co-bug-reporters :)
> 
> First of all: Thanks for the report!
> 
> I have currently no time to dig into it a bit deeper,
> (hopefully i can do it tonight or tomorrow)
> but my first guess is an overflow of an internal variable:
> apt-get update -o Debug::pkgAcquire::RRed=1 -qq
> results in 65,442 lines of output which is near the value
> of a signed integer (65,535).
> 
> A patch of this size (~9 MB) is a bit uncommon as it
> is bigger than the complete download of the new file.
> It would be good if APT could detect it... we will see. :)
[..]

Attached is a patch that should add detection for patches that are
bigger than the actual file to patch. Unfortuantely I can no longer
reproduce the failure. Testing/feedback is welcome. 

Cheers,
 Michael
[apt.diff (text/x-diff, attachment)]

Forcibly Merged 554349 554357. Request was from Christian Perrier <bubulle@debian.org> to control@bugs.debian.org. (Wed, 04 Nov 2009 18:39:06 GMT) (full text, mbox, link).


Severity set to 'important' from 'serious' Request was from Luk Claes <luk@debian.org> to control@bugs.debian.org. (Wed, 04 Nov 2009 18:49:18 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 04 Nov 2009 20:15:07 GMT) (full text, mbox, link).


Acknowledgement sent to Faheem Mitha <faheem@email.unc.edu>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 04 Nov 2009 20:15:07 GMT) (full text, mbox, link).


Message #105 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Faheem Mitha <faheem@email.unc.edu>
To: Michael Vogt <mvo@ubuntu.com>
Cc: David Kalnischkies <kalnischkies+debian@gmail.com>, 554349@bugs.debian.org
Subject: Re: Bug#554349: apt: Method rred has died unexpectedly!
Date: Wed, 4 Nov 2009 14:59:39 -0500 (EST)
Hi Michael, David,

Thanks for the prompt response and the patch. See below.

On Wed, 4 Nov 2009, Michael Vogt wrote:

> Attached is a patch that should add detection for patches that are 
> bigger than the actual file to patch. Unfortuantely I can no longer 
> reproduce the failure. Testing/feedback is welcome.

I can't reproduce this any longer, but would it not be possible to create 
an 'artificial' apt repos to reproduce this behavior (before and after 
the patch) since it seems you know what causes it?

                                                          Regards, Faheem.




Merged 554349 554357 554358 554368. Request was from Edward J. Shornock <ed.shornock@gmail.com> to control@bugs.debian.org. (Thu, 05 Nov 2009 15:06:03 GMT) (full text, mbox, link).


Forcibly Merged 554349 554357 554358 554368 554491. Request was from Kristjan Onu <K@Omnel.PRI.EE> to control@bugs.debian.org. (Fri, 06 Nov 2009 14:03:06 GMT) (full text, mbox, link).


Forcibly Merged 554349 554357 554358 554368 554491. Request was from Daniel Burrows <dburrows@debian.org> to control@bugs.debian.org. (Wed, 18 Nov 2009 00:51:07 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 25 Nov 2009 16:06:03 GMT) (full text, mbox, link).


Acknowledgement sent to Robert Lemmen <robertle@semistable.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 25 Nov 2009 16:06:03 GMT) (full text, mbox, link).


Message #116 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Robert Lemmen <robertle@semistable.com>
To: 554349@bugs.debian.org
Subject: rred and stack overflows
Date: Wed, 25 Nov 2009 15:58:51 +0000
[Message part 1 (text/plain, inline)]
this is most certainly related to the way rred currently works, it uses
a tail recursion on the stack to reverse the diff elements. it would be
easy to change that to use an iteration instead, if you want that just
holler and i'll change rred.cc, but i think the real problem is that we
should never produce such a large diff anyway, downloading the original
file is probably faster! perhaps we just need a filter on the diff
generation side?

cu  robert

-- 
Robert Lemmen                               http://www.semistable.com 
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 25 Nov 2009 19:12:10 GMT) (full text, mbox, link).


Acknowledgement sent to David Kalnischkies <kalnischkies+debian@gmail.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 25 Nov 2009 19:12:10 GMT) (full text, mbox, link).


Message #121 received at 554349@bugs.debian.org (full text, mbox, reply):

From: David Kalnischkies <kalnischkies+debian@gmail.com>
To: Robert Lemmen <robertle@semistable.com>, 554349 <554349@bugs.debian.org>
Subject: Re: Bug#554349: rred and stack overflows
Date: Wed, 25 Nov 2009 20:08:36 +0100
2009/11/25 Robert Lemmen <robertle@semistable.com>:
> this is most certainly related to the way rred currently works, it uses
> a tail recursion on the stack to reverse the diff elements.
Really, i don't think it is a stackoverflow as it fails at a to prominent
cmd count... I have rewritten a few parts of rred to use long and more
sane return values and it patches the file now just fine. :)

While on it i have also integrated #463354 which will speed up the
patch-process a bit (but don't expect a miracle, the biggest timesucker
still is the decompression of the patches and applying them patch by
patch instead of concatenate the patches - but this has again a few
problems as this is far from a simple cat operation as you have to
recalculate line numbers)

> but i think the real problem is that we should never produce such
> a large diff anyway, downloading the original file is probably faster!
I will tell you a secret: For most users with fast connections pdiffs
are (always) slower. Pdiffs fight against download size and
decompression time of the Packages file, but if download time is
nearly zero for every download pdiff only competes with the compression
type: bz2 is slow, but pdiffs (if you need to apply more than one) are
most of the time slower (as you have a gzip decompression for
the patch and load and save of a uncompressed Packages file
for each patch). It is just that pdiffs are nicer for the mirrors,
everyone between the mirrors and your computer (e.g. ISP)
and the time of an "apt-get update" isn't a problem compared
to the rest of the upgrade progress for the casual user anyway -
and it is a great plus if you don't have a fast connection
(currently) or if you pay per traffic...

> perhaps we just need a filter on the diff generation side?
Michael has already a patch for apt to don't download the patch
if the patch is bigger than the actual file, so no need to implement
some logic in the generator as the file was itself correct, just to
big to be useful.


Best regards / Mit freundlichen Grüßen,

David "DonKult" Kalnischkies




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Wed, 25 Nov 2009 19:33:06 GMT) (full text, mbox, link).


Acknowledgement sent to Robert Lemmen <robertle@semistable.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Wed, 25 Nov 2009 19:33:06 GMT) (full text, mbox, link).


Message #126 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Robert Lemmen <robertle@semistable.com>
To: 554349 <554349@bugs.debian.org>
Cc: David Kalnischkies <kalnischkies+debian@gmail.com>
Subject: Re: Bug#554349: rred and stack overflows
Date: Wed, 25 Nov 2009 19:25:33 +0000
[Message part 1 (text/plain, inline)]
On Wed, Nov 25, 2009 at 08:08:36PM +0100, David Kalnischkies wrote:
> Really, i don't think it is a stackoverflow as it fails at a to prominent
> cmd count... I have rewritten a few parts of rred to use long and more
> sane return values and it patches the file now just fine. :)

ok, excellent. but didn't someone say ulimit -s fixes it? 

> While on it i have also integrated #463354 which will speed up the
> patch-process a bit (but don't expect a miracle, the biggest timesucker
> still is the decompression of the patches and applying them patch by
> patch instead of concatenate the patches - but this has again a few
> problems as this is far from a simple cat operation as you have to
> recalculate line numbers)

#463354 looks like it is also getting rid of the recursion, that is very 
good!

> I will tell you a secret: For most users with fast connections pdiffs
> are (always) slower. Pdiffs fight against download size and
> ...

heh, i know! 

> Michael has already a patch for apt to don't download the patch
> if the patch is bigger than the actual file, so no need to implement
> some logic in the generator as the file was itself correct, just to
> big to be useful.

cool, but i thought there is already logic to do that in the generator,
plus changing the generator not to produce uselessly large files would
also autmagically fix the whole problems for systems with an older apt
that still contains the broken rred...

cu  robert

-- 
Robert Lemmen                               http://www.semistable.com 
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Mon, 30 Nov 2009 10:42:08 GMT) (full text, mbox, link).


Acknowledgement sent to Goswin von Brederlow <goswin-v-b@web.de>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Mon, 30 Nov 2009 10:42:08 GMT) (full text, mbox, link).


Message #131 received at 554349@bugs.debian.org (full text, mbox, reply):

From: Goswin von Brederlow <goswin-v-b@web.de>
To: Robert Lemmen <robertle@semistable.com>
Cc: 554349@bugs.debian.org, David Kalnischkies <kalnischkies+debian@gmail.com>
Subject: Re: Bug#554349: rred and stack overflows
Date: Mon, 30 Nov 2009 11:40:18 +0100
Robert Lemmen <robertle@semistable.com> writes:

> On Wed, Nov 25, 2009 at 08:08:36PM +0100, David Kalnischkies wrote:
>> Really, i don't think it is a stackoverflow as it fails at a to prominent
>> cmd count... I have rewritten a few parts of rred to use long and more
>> sane return values and it patches the file now just fine. :)
>
> ok, excellent. but didn't someone say ulimit -s fixes it? 
>
>> While on it i have also integrated #463354 which will speed up the
>> patch-process a bit (but don't expect a miracle, the biggest timesucker
>> still is the decompression of the patches and applying them patch by
>> patch instead of concatenate the patches - but this has again a few
>> problems as this is far from a simple cat operation as you have to
>> recalculate line numbers)
>
> #463354 looks like it is also getting rid of the recursion, that is very 
> good!
>
>> I will tell you a secret: For most users with fast connections pdiffs
>> are (always) slower. Pdiffs fight against download size and
>> ...
>
> heh, i know! 
>
>> Michael has already a patch for apt to don't download the patch
>> if the patch is bigger than the actual file, so no need to implement
>> some logic in the generator as the file was itself correct, just to
>> big to be useful.
>
> cool, but i thought there is already logic to do that in the generator,
> plus changing the generator not to produce uselessly large files would
> also autmagically fix the whole problems for systems with an older apt
> that still contains the broken rred...
>
> cu  robert
>
> -- 
> Robert Lemmen                               http://www.semistable.com 

I would like to see a config option to limit the number of patch files
to download. As you said the loading/saving of the index files and
decompressing pdiff files uses up time. Even with a moderate download
speed anything over 4 to 8 pdiff files is slower than getting the full
file. But it depends on the download speed.

So maybe an option to limit the amount of pdiff files eigther strictly
to X pdiffs or to |pdiff size| * Y < |index size|.

MfG
        Goswin




Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Thu, 31 Dec 2009 16:09:56 GMT) (full text, mbox, link).


Acknowledgement sent to "Daniel 'DaB.' Baur" <debian@daniel.baur4.info>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Thu, 31 Dec 2009 16:09:56 GMT) (full text, mbox, link).


Message #136 received at 554349@bugs.debian.org (full text, mbox, reply):

From: "Daniel 'DaB.' Baur" <debian@daniel.baur4.info>
To: 554349@bugs.debian.org
Subject: Problem still occures in testing
Date: Thu, 31 Dec 2009 17:02:04 +0100
[Message part 1 (text/plain, inline)]
Hello all,

yesterday and today the bug hits me. I'm running debian testing (with a few 
sid-packages and a few stables).  "apt-get update -o Acquire::Pdiffs=false" 
work-arrounded the problem.


Sincerly,
DaB.
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt. (Thu, 31 Dec 2009 16:48:03 GMT) (full text, mbox, link).


Acknowledgement sent to David Kalnischkies <kalnischkies+debian@gmail.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>. (Thu, 31 Dec 2009 16:48:03 GMT) (full text, mbox, link).


Message #141 received at 554349@bugs.debian.org (full text, mbox, reply):

From: David Kalnischkies <kalnischkies+debian@gmail.com>
To: "Daniel 'DaB.' Baur" <debian@daniel.baur4.info>, 554349 <554349@bugs.debian.org>
Subject: Re: Bug#554349: Problem still occures in testing
Date: Thu, 31 Dec 2009 17:46:24 +0100
Hi Daniel Baur,

> yesterday and today the bug hits me. I'm running debian testing (with a few
> sid-packages and a few stables).  "apt-get update -o Acquire::Pdiffs=false"
> work-arrounded the problem.
Could you please be more specific which diffs failed so we can reproduce
it as for example on my systems i haven't any problems so far.
(Simple post the complete output of the "apt-get update" run if unsure)

The reported issue here with the too big pdiff file is fixed (by the ftpadmins)
long time ago. The current 0.7.25 includes the rred rewrite which should
even apply this big pdiff file correctly.

The bugreport(s) are currently still open just for two reasons:
a) Michaels patch for not downloading to big files was not applied (somehow).
b) Goswin von Brederlow feature request sounds reasonable.

Your problem could be reason c) but we would need more information.


Happy new year!

David Kalnischkies




Added tag(s) pending. Request was from David Kalnischkies <kalnischkies+debian@gmail.com> to control@bugs.debian.org. (Sun, 10 Jan 2010 13:57:03 GMT) (full text, mbox, link).


Reply sent to Michael Vogt <mvo@debian.org>:
You have taken responsibility. (Mon, 11 Jan 2010 18:48:12 GMT) (full text, mbox, link).


Notification sent to Faheem Mitha <faheem@email.unc.edu>:
Bug acknowledged by developer. (Mon, 11 Jan 2010 18:48:12 GMT) (full text, mbox, link).


Message #148 received at 554349-close@bugs.debian.org (full text, mbox, reply):

From: Michael Vogt <mvo@debian.org>
To: 554349-close@bugs.debian.org
Subject: Bug#554349: fixed in apt 0.7.25.1
Date: Mon, 11 Jan 2010 18:47:25 +0000
Source: apt
Source-Version: 0.7.25.1

We believe that the bug you reported is fixed in the latest version of
apt, which is due to be installed in the Debian FTP archive:

apt-doc_0.7.25.1_all.deb
  to main/a/apt/apt-doc_0.7.25.1_all.deb
apt-transport-https_0.7.25.1_i386.deb
  to main/a/apt/apt-transport-https_0.7.25.1_i386.deb
apt-utils_0.7.25.1_i386.deb
  to main/a/apt/apt-utils_0.7.25.1_i386.deb
apt_0.7.25.1.dsc
  to main/a/apt/apt_0.7.25.1.dsc
apt_0.7.25.1.tar.gz
  to main/a/apt/apt_0.7.25.1.tar.gz
apt_0.7.25.1_i386.deb
  to main/a/apt/apt_0.7.25.1_i386.deb
libapt-pkg-dev_0.7.25.1_i386.deb
  to main/a/apt/libapt-pkg-dev_0.7.25.1_i386.deb
libapt-pkg-doc_0.7.25.1_all.deb
  to main/a/apt/libapt-pkg-doc_0.7.25.1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 554349@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Vogt <mvo@debian.org> (supplier of updated apt package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sat, 09 Jan 2010 21:52:36 +0100
Source: apt
Binary: apt apt-doc libapt-pkg-dev libapt-pkg-doc apt-utils apt-transport-https
Architecture: source all i386
Version: 0.7.25.1
Distribution: unstable
Urgency: low
Maintainer: APT Development Team <deity@lists.debian.org>
Changed-By: Michael Vogt <mvo@debian.org>
Description: 
 apt        - Advanced front-end for dpkg
 apt-doc    - Documentation for APT
 apt-transport-https - APT https transport
 apt-utils  - APT utility programs
 libapt-pkg-dev - Development files for APT's libapt-pkg and libapt-inst
 libapt-pkg-doc - Documentation for APT development
Closes: 304846 485963 545754 554349 561971 564171
Changes: 
 apt (0.7.25.1) unstable; urgency=low
 .
   [ Christian Perrier ]
   * French manpage translation update
   * Russian translation update by Yuri Kozlov
     Closes: #564171
 .
   [Chris Leick]
   * spot & fix various typos in all manpages
   * German manpage translation update
 .
   [ David Kalnischkies ]
   * cmdline/apt-cache.cc:
     - remove translatable marker from the "%4i %s\n" string
   * buildlib/po4a_manpage.mak:
     - instruct debiandoc to build files with utf-8 encoding
   * buildlib/tools.m4:
     - fix some warning from the buildtools
   * apt-pkg/acquire-item.cc:
     - add configuration PDiffs::Limit-options to not download
       too many or too big patches (Closes: #554349)
   * debian/control:
     - let all packages depend on ${misc:Depends}
   * share/*-archive.gpg:
     - remove the horrible outdated files. We already depend on
       the keyring so we don't need to ship our own version
   * cmdline/apt-key:
     - errors out if wget is not installed (Closes: #545754)
     - add --keyring option as we have now possibly many
   * methods/gpgv.cc:
     - pass all keyrings (TrustedParts) to gpgv instead of
       using only one trusted.gpg keyring (Closes: #304846)
   * methods/https.cc:
     - finally merge the rest of the patchset from Arnaud Ebalard
       with the CRL and Issuers options, thanks! (Closes: #485963)
   * apt-pkg/deb/debindexfile.cc, apt-pkg/pkgcachegen.cc:
     - add debug option Debug::pkgCacheGen
 .
   [ Michael Vogt ]
   * cmdline/apt-get.cc:
     - merge fix for apt-get source pkg=version regression
       (closes: #561971)
   * po/ru.po:
     - merged updated ru.po, thanks to Yuri Kozlov (closes: #564171)
Checksums-Sha1: 
 37dc14463afdbf16bc26e41290f6f2a585406b32 1212 apt_0.7.25.1.dsc
 9425bfcf583139d8adeed8fc4e7a89182f9cbc5a 2628291 apt_0.7.25.1.tar.gz
 fdacf5f91a2b21d8bcdf6e94e5552c1b6b7c6c7c 132336 apt-doc_0.7.25.1_all.deb
 a2a019bddcbd2308ef3bb4d4930a72693579aa4d 132486 libapt-pkg-doc_0.7.25.1_all.deb
 f7de503e8668aa069b9bc31bb523b3587469e7e0 1738504 apt_0.7.25.1_i386.deb
 e075b7406a7199821c452a8e48fa6c02bb3aa59c 120670 libapt-pkg-dev_0.7.25.1_i386.deb
 9db2939d9a58b5d5de8780265ee14c3d483b6949 222532 apt-utils_0.7.25.1_i386.deb
 2e1f6fd444dcbdb688ab6d6830422c43915f82b2 68830 apt-transport-https_0.7.25.1_i386.deb
Checksums-Sha256: 
 13fe8274944abb907232e621418d2c9a429c8cbc4daf46be08f5e8f4406b6cb8 1212 apt_0.7.25.1.dsc
 8e3fac8d0567ce0a297e8292115355e8b119bb3e228e20e99ffe114920b10d67 2628291 apt_0.7.25.1.tar.gz
 50861ca31fdc429f3de1657bc31da696f0e2c1aebb2c30bb833e251cc8663359 132336 apt-doc_0.7.25.1_all.deb
 05c24429d6290a24075575911ef31ec38fcdb8dd3a893807c7720c19395d3ffd 132486 libapt-pkg-doc_0.7.25.1_all.deb
 5f1ce12e343b77dd4eccecf2212a73aec49d1a1328772412e2050c37b58acaa3 1738504 apt_0.7.25.1_i386.deb
 03996018bf4f28197639644f4c683d673963fe26a0220b67cd5a7e45c563c4d9 120670 libapt-pkg-dev_0.7.25.1_i386.deb
 3ee4705964a9ac9b4c6742e7eb0fbbd0999948b6417a5101353191ab9c4a5291 222532 apt-utils_0.7.25.1_i386.deb
 17d6406138cb8d65f661fbafd84c1931b5fda5982286374bb7c018caf3542515 68830 apt-transport-https_0.7.25.1_i386.deb
Files: 
 8aaf1652b1bfcc14c8cb0d28f1f538d9 1212 admin important apt_0.7.25.1.dsc
 451118002b7e4f5fc3476a2f5e23d865 2628291 admin important apt_0.7.25.1.tar.gz
 772f9fec27c0dc54ed917e5d4a29d6ae 132336 doc optional apt-doc_0.7.25.1_all.deb
 1d7874b5d00813a0e72ae2992d9b0e70 132486 doc optional libapt-pkg-doc_0.7.25.1_all.deb
 40fb9bc525331f8310804644e10555b6 1738504 admin important apt_0.7.25.1_i386.deb
 46f34f643d3c3f1eb2234b2315a5894d 120670 libdevel optional libapt-pkg-dev_0.7.25.1_i386.deb
 8bf1a60c54a265d9f7e053d82964f7e8 222532 admin important apt-utils_0.7.25.1_i386.deb
 64fabf49b8593c6b7b28820708f1e80c 68830 admin optional apt-transport-https_0.7.25.1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAktLcYcACgkQliSD4VZixzRi4QCgjfNGoXq7mIi9w3Wy4+dyL3p9
wIMAn2iOKuBU3KYs9fUlt76Q4wuHesGc
=30u4
-----END PGP SIGNATURE-----





Reply sent to Michael Vogt <mvo@debian.org>:
You have taken responsibility. (Mon, 11 Jan 2010 18:48:13 GMT) (full text, mbox, link).


Notification sent to "Hideki Yamane \(Debian-JP\)" <henrich@debian.or.jp>:
Bug acknowledged by developer. (Mon, 11 Jan 2010 18:48:13 GMT) (full text, mbox, link).


Reply sent to Michael Vogt <mvo@debian.org>:
You have taken responsibility. (Mon, 11 Jan 2010 18:48:14 GMT) (full text, mbox, link).


Notification sent to debian-bugreport3@xaq.nl:
Bug acknowledged by developer. (Mon, 11 Jan 2010 18:48:14 GMT) (full text, mbox, link).


Reply sent to Michael Vogt <mvo@debian.org>:
You have taken responsibility. (Mon, 11 Jan 2010 18:48:15 GMT) (full text, mbox, link).


Notification sent to alex bodnaru <alexbodn@012.net.il>:
Bug acknowledged by developer. (Mon, 11 Jan 2010 18:48:15 GMT) (full text, mbox, link).


Reply sent to Michael Vogt <mvo@debian.org>:
You have taken responsibility. (Mon, 11 Jan 2010 18:48:16 GMT) (full text, mbox, link).


Notification sent to Vicens Juan Tomas Monserrat <vtomasr5@gmail.com>:
Bug acknowledged by developer. (Mon, 11 Jan 2010 18:48:16 GMT) (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Fri, 12 Feb 2010 07:34:45 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sat Jan 14 20:22:47 2023; Machine Name: bembo

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.