Debian Bug report logs -
#554349
apt: Method rred has died unexpectedly!
Reported by: Faheem Mitha <faheem@email.unc.edu>
Date: Wed, 4 Nov 2009 04:48:02 UTC
Severity: important
Tags: confirmed
Merged with 554357,
554358,
554368,
554491
Found in versions apt/0.7.20.2+lenny1, apt/0.7.23.1, apt/0.7.24
Fixed in version apt/0.7.25.1
Done: Michael Vogt <mvo@debian.org>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 04:48:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Faheem Mitha <faheem@email.unc.edu>:
New Bug report received and forwarded. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 04:48:05 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: apt
Version: 0.7.20.2+lenny1
Severity: normal
I am currently getting the following. My guess is a malformed pdiff
file. A couple of other people of #debian (oftc) have been seeing
similar errors. Possibly related to
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545694 but this is
supposedly fixed on 0.7.24 and one of my co-bug-reporters can
reproduce this on sid.
Note the same pdiff, 2009-11-04-0016.39.pdiff, occurs before each
error.
This is the first joint bug report I've filed, and I've been using
Debian and filing bug reports since 2001. :-)
Regards, Faheem.
My error
Get:8 http://debian.csail.mit.edu unstable/main
2009-11-04-0016.39.pdiff [9307kB]
Ign http://people.debian.org stable/enslyon Packages/DiffIndex
Ign http://people.debian.org stable/main Sources/DiffIndex
Ign http://people.debian.org stable/enslyon Sources/DiffIndex
Hit http://jonas.genannt.name lenny/restricted Packages
Hit http://security.debian.org squeeze/updates/non-free Sources
Hit http://www.backports.org lenny-backports/main Packages
Ign http://people.debian.org stable/main Packages
Hit http://www.backports.org lenny-backports/contrib Packages
Ign http://people.debian.org stable/enslyon Packages
Ign http://people.debian.org stable/main Sources
Hit http://www.backports.org lenny-backports/non-free Packages
Ign http://people.debian.org stable/enslyon Sources
Hit http://people.debian.org stable/main Packages
Hit http://people.debian.org stable/enslyon Packages
Hit http://people.debian.org stable/main Sources
Hit http://people.debian.org stable/enslyon Sources
Get:9 http://debian.csail.mit.edu squeeze/main
2009-11-04-0016.39.pdiff [10.2MB]
Get:10 http://debian.csail.mit.edu squeeze/non-free
2009-11-04-0016.39.pdiff [139kB]
Get:11 http://debian.csail.mit.edu squeeze/contrib
2009-11-04-0016.39.pdiff [66.8kB]
Get:12 http://debian.csail.mit.edu squeeze/main
2009-11-04-0016.39.pdiff [4844kB]
E: Method rred has died unexpectedly!
from cockroach (stefan at ott dot net) on #debian on oftc (running sid - 0.7.24)
$ sudo apt-get update
Hit ftp://ftp.ch.debian.org sid Release.gpg
Get:1 ftp://ftp.ch.debian.org sid/main Translation-en_US
Ign ftp://ftp.ch.debian.org sid/main Translation-en_US
Get:2 ftp://ftp.ch.debian.org sid/contrib Translation-en_US
Ign ftp://ftp.ch.debian.org sid/contrib Translation-en_US
Get:3 ftp://ftp.ch.debian.org sid/non-free Translation-en_US
Ign ftp://ftp.ch.debian.org sid/non-free Translation-en_US
Hit ftp://ftp.ch.debian.org sid Release
Hit ftp://ftp.ch.debian.org sid/main Packages/DiffIndex
Hit ftp://ftp.ch.debian.org sid/contrib Packages/DiffIndex
Hit ftp://ftp.ch.debian.org sid/non-free Packages/DiffIndex
Get:4 ftp://ftp.ch.debian.org sid/main 2009-11-02-2358.21.pdiff [37.2kB]
Get:5 ftp://ftp.ch.debian.org sid/main 2009-11-02-2358.21.pdiff [37.2kB]
Get:6 ftp://ftp.ch.debian.org sid/contrib 2009-11-04-0016.39.pdiff
[70.1kB]
Get:7 ftp://ftp.ch.debian.org sid/contrib 2009-11-04-0016.39.pdiff
[70.1kB]
Get:8 ftp://ftp.ch.debian.org sid/main 2009-11-04-0016.39.pdiff
[9,274kB]
Get:9 ftp://ftp.ch.debian.org sid/main 2009-11-04-0016.39.pdiff
[9,274kB]
Get:10 ftp://ftp.ch.debian.org sid/main 2009-11-04-0016.39.pdiff
[9,274kB]
E: Method rred has died unexpectedly!
E: Sub-process rred received a segmentation fault.
from Hideo on #debian on oftc
Hit http://www.debian-multimedia.org unstable/main Packages/DiffIndex
Hit http://ftp.us.debian.org stable/contrib Sources
Hit http://ftp.us.debian.org stable/non-free Sources
Hit http://www.debian-multimedia.org unstable/main Sources/DiffIndex
Get:1 http://ftp.us.debian.org testing/main 2009-11-04-0016.39.pdiff
[4,844kB]
Get:2 http://ftp.us.debian.org testing/main 2009-11-04-0016.39.pdiff
[4,844kB]
Get:3 http://ftp.us.debian.org unstable/main 2009-11-04-0016.39.pdiff
[9,307kB]
Get:4 http://ftp.us.debian.org unstable/non-free
2009-11-04-0016.39.pdiff [86.4kB]
Get:5 http://ftp.us.debian.org experimental/main
2009-11-04-0016.39.pdiff [307kB]
Get:6 http://ftp.us.debian.org testing/main 2009-11-04-0016.39.pdiff
[4,844kB]
Get:7 http://ftp.us.debian.org unstable/main 2009-11-04-0016.39.pdiff
[9,307kB]
E: Method rred has died unexpectedly!
E: Sub-process rred received a segmentation fault.
-- Package-specific info:
-- apt-config dump --
APT "";
APT::Architecture "i386";
APT::Build-Essential "";
APT::Build-Essential:: "build-essential";
APT::Install-Recommends "1";
APT::Install-Suggests "0";
APT::Acquire "";
APT::Acquire::Translation "environment";
APT::Authentication "";
APT::Authentication::TrustCDROM "true";
APT::NeverAutoRemove "";
APT::NeverAutoRemove:: "^linux-image.*";
APT::NeverAutoRemove:: "^linux-restricted-modules.*";
APT::Cache-Limit "56777216";
Dir "/";
Dir::State "var/lib/apt/";
Dir::State::lists "lists/";
Dir::State::cdroms "cdroms.list";
Dir::State::userstatus "status.user";
Dir::State::status "/var/lib/dpkg/status";
Dir::Cache "var/cache/apt/";
Dir::Cache::archives "archives/";
Dir::Cache::srcpkgcache "srcpkgcache.bin";
Dir::Cache::pkgcache "pkgcache.bin";
Dir::Etc "etc/apt/";
Dir::Etc::sourcelist "sources.list";
Dir::Etc::sourceparts "sources.list.d";
Dir::Etc::vendorlist "vendors.list";
Dir::Etc::vendorparts "vendors.list.d";
Dir::Etc::main "apt.conf";
Dir::Etc::parts "apt.conf.d";
Dir::Etc::preferences "preferences";
Dir::Bin "";
Dir::Bin::methods "/usr/lib/apt/methods";
Dir::Bin::dpkg "/usr/bin/dpkg";
Dir::Log "var/log/apt";
Dir::Log::Terminal "term.log";
DPkg "";
DPkg::Pre-Invoke "";
DPkg::Pre-Invoke:: "if [ -x /usr/sbin/etckeeper ]; then etckeeper pre-install; fi";
DPkg::Post-Invoke "";
DPkg::Post-Invoke:: "if [ -x /usr/sbin/etckeeper ]; then etckeeper post-install; fi";
DPkg::Pre-Install-Pkgs "";
DPkg::Pre-Install-Pkgs:: "/usr/bin/apt-listchanges --apt || test $? -ne 10";
DPkg::Pre-Install-Pkgs:: "/usr/sbin/dpkg-preconfigure --apt || true";
DPkg::Tools "";
DPkg::Tools::Options "";
DPkg::Tools::Options::/usr/bin/apt-listchanges "";
DPkg::Tools::Options::/usr/bin/apt-listchanges::Version "2";
RPM "";
RPM::Pre-Invoke "";
RPM::Pre-Invoke:: "if [ -x /usr/sbin/etckeeper ]; then etckeeper pre-install; fi";
RPM::Post-Invoke "";
RPM::Post-Invoke:: "if [ -x /usr/sbin/etckeeper ]; then etckeeper post-install; fi";
-- /etc/apt/preferences --
Package: *
Pin: release a=testing
Pin-Priority: 50
Package: *
Pin: release a=squeeze
Pin-Priority: 50
Package: *
Pin: release a=unstable
Pin-Priority: 50
Package: *
Pin: release a=experimental
Pin-Priority: 1
Package: *
Pin: release a=snapshot.debian.net
Pin-Priority: 1
-- /etc/apt/sources.list --
#deb http://debian.csail.mit.edu/debian/ sarge main non-free contrib
#deb-src http://debian.csail.mit.edu/debian/ sarge main non-free contrib
#deb http://debian.csail.mit.edu/debian/ etch main non-free contrib
#deb-src http://debian.csail.mit.edu/debian/ etch main non-free contrib
#deb http://security.debian.org/ etch/updates main contrib non-free
#deb-src http://security.debian.org/ etch/updates main contrib non-free
deb http://debian.csail.mit.edu/debian/ lenny main non-free contrib
deb-src http://debian.csail.mit.edu/debian/ lenny main non-free contrib
deb http://security.debian.org/ lenny/updates main contrib non-free
deb-src http://security.debian.org/ lenny/updates main contrib non-free
deb http://debian.csail.mit.edu/debian/ squeeze main non-free contrib
deb-src http://debian.csail.mit.edu/debian/ squeeze main non-free contrib
deb http://security.debian.org/ squeeze/updates main contrib non-free
deb-src http://security.debian.org/ squeeze/updates main contrib non-free
deb http://debian.csail.mit.edu/debian/ unstable main non-free contrib
deb-src http://debian.csail.mit.edu/debian/ unstable main non-free contrib
deb http://debian.csail.mit.edu/debian/ experimental main non-free contrib
deb-src http://debian.csail.mit.edu/debian/ experimental main non-free contrib
#deb http://snapshot.debian.net/archive pool linux-2.6
#deb http://snapshot.debian.net/archive pool gcc-4.0
#deb http://snapshot.debian.net/archive pool xen-3.0
deb http://www.debian-multimedia.org lenny main
deb http://www.backports.org/debian/ lenny-backports main contrib non-free
#deb http://www.prato.linux.it/~mnencia/debian nvidia/
#deb-src http://www.prato.linux.it/~mnencia/debian nvidia/
#deb http://cran.r-project.org/bin/linux/debian etch/
#deb http://galen.dulci.org/debian etch main
#deb-src http://galen.dulci.org/debian etch main
deb http://people.debian.org/~vdanjean/debian stable main enslyon
deb-src http://people.debian.org/~vdanjean/debian stable main enslyon
deb http://download.skype.com/linux/repos/debian/ stable non-free
deb http://jonas.genannt.name/debian lenny restricted
#deb http://people.debian.org/~preining/TeX/ tl2007/
#deb http://people.debian.org/~preining/TeX/ context/
#deb http://people.debian.org/~preining/TeX/ lmodern/
-- System Information:
Debian Release: 5.0.3
APT prefers stable
APT policy: (500, 'stable'), (50, 'unstable'), (50, 'testing'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.26-2-vserver-686-bigmem (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages apt depends on:
ii debian-archive-keyring 2009.01.31 GnuPG archive keys of the Debian a
ii libc6 2.7-18 GNU C Library: Shared libraries
ii libgcc1 1:4.3.2-1.1 GCC support library
ii libstdc++6 4.3.2-1.1 The GNU Standard C++ Library v3
apt recommends no packages.
Versions of packages apt suggests:
pn apt-doc <none> (no description available)
ii aptitude 0.4.11.11-1~lenny1 terminal-based package manager
ii bzip2 1.0.5-1 high-quality block-sorting file co
ii dpkg-dev 1.14.25 Debian package development tools
ii lzma 4.43-14 Compression method of 7z format in
ii python-apt 0.7.7.1+nmu1 Python interface to libapt-pkg
ii synaptic 0.62.1+nmu1 Graphical package manager
-- no debconf information
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 05:15:31 GMT) (full text, mbox, link).
Acknowledgement sent
to Faheem Mitha <faheem@email.unc.edu>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 05:15:34 GMT) (full text, mbox, link).
Message #10 received at 554349@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
From
http://debian.csail.mit.edu/debian/dists/squeeze/main/binary-i386/Packages.diff/
I'm attaching
http://debian.csail.mit.edu/debian/dists/squeeze/main/binary-i386/Packages.diff/2009-11-04-0016.39.gz
which appears to be the diff that was causing the problem
If it gets through the spam filters, that is.
Regards, Faheem.
[2009-11-04-0016.39.gz (application/octet-stream, attachment)]
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 07:40:24 GMT) (full text, mbox, link).
Acknowledgement sent
to Guillaume Tamboise <gtamboise@reefs.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 07:40:24 GMT) (full text, mbox, link).
Message #15 received at 554349@bugs.debian.org (full text, mbox, reply):
Package: apt
Version: 0.7.20.2+lenny1
Followup-For: Bug #554349
Experiencing the same issue with a pdiff from testing:
Get:6 http://ftp.debian.org testing/non-free 2009-11-04-0016.39.pdiff [81.1kB]
E: Method rred has died unexpectedly!
-- Package-specific info:
-- apt-config dump --
APT "";
APT::Architecture "amd64";
APT::Build-Essential "";
APT::Build-Essential:: "build-essential";
APT::Install-Recommends "1";
APT::Install-Suggests "0";
APT::Acquire "";
APT::Acquire::Translation "environment";
APT::Authentication "";
APT::Authentication::TrustCDROM "true";
APT::NeverAutoRemove "";
APT::NeverAutoRemove:: "^linux-image.*";
APT::NeverAutoRemove:: "^linux-restricted-modules.*";
Dir "/";
Dir::State "var/lib/apt/";
Dir::State::lists "lists/";
Dir::State::cdroms "cdroms.list";
Dir::State::userstatus "status.user";
Dir::State::status "/var/lib/dpkg/status";
Dir::Cache "var/cache/apt/";
Dir::Cache::archives "archives/";
Dir::Cache::srcpkgcache "srcpkgcache.bin";
Dir::Cache::pkgcache "pkgcache.bin";
Dir::Etc "etc/apt/";
Dir::Etc::sourcelist "sources.list";
Dir::Etc::sourceparts "sources.list.d";
Dir::Etc::vendorlist "vendors.list";
Dir::Etc::vendorparts "vendors.list.d";
Dir::Etc::main "apt.conf";
Dir::Etc::parts "apt.conf.d";
Dir::Etc::preferences "preferences";
Dir::Bin "";
Dir::Bin::methods "/usr/lib/apt/methods";
Dir::Bin::dpkg "/usr/bin/dpkg";
Dir::Log "var/log/apt";
Dir::Log::Terminal "term.log";
DPkg "";
DPkg::Pre-Install-Pkgs "";
DPkg::Pre-Install-Pkgs:: "/usr/bin/apt-listchanges --apt || test $? -ne 10";
DPkg::Pre-Install-Pkgs:: "/usr/sbin/dpkg-preconfigure --apt || true";
DPkg::Tools "";
DPkg::Tools::Options "";
DPkg::Tools::Options::/usr/bin/apt-listchanges "";
DPkg::Tools::Options::/usr/bin/apt-listchanges::Version "2";
DPkg::Post-Invoke "";
DPkg::Post-Invoke:: "which dzhandle >/dev/null && dzhandle restart-pending-instances || true";
-- (no /etc/apt/preferences present) --
-- /etc/apt/sources.list --
# Main
deb http://http.us.debian.org/debian/ lenny main non-free contrib
# Source
deb-src http://ftp.debian.org/debian/ testing main non-free contrib
# Security
deb http://security.debian.org/ lenny/updates main contrib non-free
deb file:/usr/src ./
# Volatile
deb http://volatile.debian.org/debian-volatile lenny/volatile main contrib non-free
# Backports
deb http://www.backports.org/debian lenny-backports main contrib non-free
-- System Information:
Debian Release: 5.0.3
APT prefers stable
APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.26-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages apt depends on:
ii debian-archive-keyring 2009.01.31 GnuPG archive keys of the Debian a
ii libc6 2.7-18 GNU C Library: Shared libraries
ii libgcc1 1:4.3.2-1.1 GCC support library
ii libstdc++6 4.3.2-1.1 The GNU Standard C++ Library v3
apt recommends no packages.
Versions of packages apt suggests:
pn apt-doc <none> (no description available)
ii aptitude 0.4.11.11-1~lenny1 terminal-based package manager
ii bzip2 1.0.5-1 high-quality block-sorting file co
ii dpkg-dev 1.14.25 Debian package development tools
ii lzma 4.43-14 Compression method of 7z format in
ii python-apt 0.7.7.1+nmu1 Python interface to libapt-pkg
-- no debconf information
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 07:43:48 GMT) (full text, mbox, link).
Acknowledgement sent
to Faheem Mitha <faheem@email.unc.edu>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 07:43:48 GMT) (full text, mbox, link).
Message #20 received at 554349@bugs.debian.org (full text, mbox, reply):
Courtesy of sney on #debian on oftc, you can find the offending diff at
http://drubo.net/temp/2009-11-04-0016.39.gz
Regards, Faheem.
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 10:15:44 GMT) (full text, mbox, link).
Acknowledgement sent
to Giorgos Pallas <gpall@ccf.auth.gr>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 10:15:44 GMT) (full text, mbox, link).
Message #25 received at 554349@bugs.debian.org (full text, mbox, reply):
Package: apt
Version: 0.7.23.1
Severity: normal
I am getting the same message during aptitude update ->
aris:/home/encmp/gpall# aptitude update
Hit http://postmortem.csd.auth.gr testing Release.gpg
Ign http://postmortem.csd.auth.gr testing/main Translation-en_US
Ign http://postmortem.csd.auth.gr testing/contrib Translation-en_US
Ign http://postmortem.csd.auth.gr testing/non-free Translation-en_US
Hit http://postmortem.csd.auth.gr testing Release
Hit http://postmortem.csd.auth.gr testing/main Packages/DiffIndex
Hit http://security.debian.org testing/updates Release.gpg
Ign http://security.debian.org testing/updates/main Translation-en_US
Ign http://security.debian.org testing/updates/contrib Translation-en_US
Ign http://security.debian.org testing/updates/non-free Translation-en_US
Hit http://www.debian-multimedia.org testing Release.gpg
Hit http://www.debian-multimedia.org testing/main Translation-en_US
Hit http://download.virtualbox.org lenny Release.gpg
Ign http://download.virtualbox.org lenny/non-free Translation-en_US
Hit http://postmortem.csd.auth.gr testing/contrib Packages/DiffIndex
Hit http://postmortem.csd.auth.gr testing/non-free Packages/DiffIndex
Hit http://postmortem.csd.auth.gr testing/main Sources/DiffIndex
Hit http://postmortem.csd.auth.gr testing/contrib Sources/DiffIndex
Hit http://postmortem.csd.auth.gr testing/non-free Sources/DiffIndex
Hit http://security.debian.org testing/updates Release
Hit http://www.debian-multimedia.org testing Release
Hit http://download.virtualbox.org lenny Release
Ign http://security.debian.org testing/updates/main Packages/DiffIndex
Hit http://www.debian-multimedia.org testing/main Packages/DiffIndex
Ign http://security.debian.org testing/updates/contrib Packages/DiffIndex
Ign http://security.debian.org testing/updates/non-free Packages/DiffIndex
Ign http://security.debian.org testing/updates/main Sources/DiffIndex
Ign http://security.debian.org testing/updates/contrib Sources/DiffIndex
Ign http://security.debian.org testing/updates/non-free Sources/DiffIndex
Hit http://security.debian.org testing/updates/main Packages
Hit http://security.debian.org testing/updates/contrib Packages
Hit http://security.debian.org testing/updates/non-free Packages
Hit http://security.debian.org testing/updates/main Sources
Ign http://download.virtualbox.org lenny/non-free Packages/DiffIndex
Hit http://security.debian.org testing/updates/contrib Sources
Hit http://security.debian.org testing/updates/non-free Sources
Hit http://download.virtualbox.org lenny/non-free Packages
Get:1 http://postmortem.csd.auth.gr testing/main 2009-11-04-0016.39.pdiff
[10.2MB]
Get:2 http://postmortem.csd.auth.gr testing/contrib 2009-11-04-0016.39.pdiff
[66.8kB]
Get:3 http://postmortem.csd.auth.gr testing/non-free
2009-11-04-0016.39.pdiff [139kB]
Get:4 http://postmortem.csd.auth.gr testing/main 2009-11-04-0016.39.pdiff
[10.2MB]
Get:5 http://postmortem.csd.auth.gr testing/main 2009-11-04-0016.39.pdiff
[4,844kB]
Get:6 http://postmortem.csd.auth.gr testing/contrib 2009-11-04-0016.39.pdiff
[40.2kB]
Get:7 http://postmortem.csd.auth.gr testing/non-free
2009-11-04-0016.39.pdiff [81.1kB]
Get:8 http://postmortem.csd.auth.gr testing/contrib 2009-11-04-0016.39.pdiff
[66.8kB]
Get:9 http://postmortem.csd.auth.gr testing/main 2009-11-04-0016.39.pdiff
[10.2MB]
Get:10 http://postmortem.csd.auth.gr testing/non-free
2009-11-04-0016.39.pdiff [139kB]
Get:11 http://postmortem.csd.auth.gr testing/main 2009-11-04-0016.39.pdiff
[4,844kB]
E: Method rred has died unexpectedly!
E: Sub-process rred received a segmentation fault.
aris:/home/encmp/gpall#
-- Package-specific info:
-- apt-config dump --
APT "";
APT::Architecture "i386";
APT::Build-Essential "";
APT::Build-Essential:: "build-essential";
APT::Install-Recommends "false";
APT::Install-Suggests "0";
APT::Acquire "";
APT::Acquire::Translation "environment";
APT::Authentication "";
APT::Authentication::TrustCDROM "true";
APT::NeverAutoRemove "";
APT::NeverAutoRemove:: "^linux-image.*";
APT::NeverAutoRemove:: "^linux-restricted-modules.*";
Dir "/";
Dir::State "var/lib/apt/";
Dir::State::lists "lists/";
Dir::State::cdroms "cdroms.list";
Dir::State::userstatus "status.user";
Dir::State::status "/var/lib/dpkg/status";
Dir::Cache "var/cache/apt/";
Dir::Cache::archives "archives/";
Dir::Cache::srcpkgcache "srcpkgcache.bin";
Dir::Cache::pkgcache "pkgcache.bin";
Dir::Etc "etc/apt/";
Dir::Etc::sourcelist "sources.list";
Dir::Etc::sourceparts "sources.list.d";
Dir::Etc::vendorlist "vendors.list";
Dir::Etc::vendorparts "vendors.list.d";
Dir::Etc::main "apt.conf";
Dir::Etc::parts "apt.conf.d";
Dir::Etc::preferences "preferences";
Dir::Etc::preferencesparts "preferences.d";
Dir::Bin "";
Dir::Bin::methods "/usr/lib/apt/methods";
Dir::Bin::dpkg "/usr/bin/dpkg";
Dir::Log "var/log/apt";
Dir::Log::Terminal "term.log";
DPkg "";
DPkg::Pre-Install-Pkgs "";
DPkg::Pre-Install-Pkgs:: "/usr/sbin/dpkg-preconfigure --apt || true";
DPkg::Post-Invoke "";
DPkg::Post-Invoke:: "if [ -x /usr/bin/debsums ]; then /usr/bin/debsums --generate=nocheck -sp /var/cache/apt/archives; fi";
Aptitude "";
Aptitude::Recommends-Important "false";
-- (no /etc/apt/preferences present) --
-- /etc/apt/sources.list --
deb http://postmortem.csd.auth.gr/debian/ testing main contrib non-free
deb-src http://postmortem.csd.auth.gr/debian/ testing main contrib non-free
deb http://security.debian.org/ testing/updates main contrib non-free
deb-src http://security.debian.org/ testing/updates main contrib non-free
deb http://www.debian-multimedia.org testing main
deb http://download.virtualbox.org/virtualbox/debian lenny non-free
-- System Information:
Debian Release: squeeze/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.30-2-686 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages apt depends on:
ii debian-archive-keyring 2009.01.31 GnuPG archive keys of the Debian a
ii libc6 2.9-25 GNU C Library: Shared libraries
ii libgcc1 1:4.4.1-4 GCC support library
ii libstdc++6 4.4.1-4 The GNU Standard C++ Library v3
apt recommends no packages.
Versions of packages apt suggests:
pn apt-doc <none> (no description available)
ii aptitude 0.4.11.11-1+b2 terminal-based package manager
ii bzip2 1.0.5-3 high-quality block-sorting file co
ii dpkg-dev 1.15.4.1 Debian package development tools
ii lzma 4.43-14 Compression method of 7z format in
pn python-apt <none> (no description available)
-- no debconf information
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 13:00:12 GMT) (full text, mbox, link).
Acknowledgement sent
to Evgeni Golov <sargentd@die-welt.net>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 13:00:13 GMT) (full text, mbox, link).
Message #30 received at 554349@bugs.debian.org (full text, mbox, reply):
found 554349 0.7.24
thanks
I'm facing this on my Sid box too :(
Regards
Evgeni
--
Bruce Schneier can read and understand Perl programs.
Bug Marked as found in versions apt/0.7.24.
Request was from Evgeni Golov <sargentd@die-welt.net>
to control@bugs.debian.org.
(Wed, 04 Nov 2009 13:00:22 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 13:27:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Greg Norris <haphazard@kc.rr.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 13:27:03 GMT) (full text, mbox, link).
Message #37 received at 554349@bugs.debian.org (full text, mbox, reply):
If it helps at all, I see the following entry in /var/log/kern.log each
time the problem occurs.
rred[28536]: segfault at bf56cf84 ip b74958af sp bf56cf88 error 6 in libc-2.10.1.so[b742e000+141000]
I have apt 0.7.24 and libc6 2.10.1-5 installed.
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 13:39:06 GMT) (full text, mbox, link).
Acknowledgement sent
to David Kalnischkies <kalnischkies+debian@gmail.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 13:39:06 GMT) (full text, mbox, link).
Message #42 received at 554349@bugs.debian.org (full text, mbox, reply):
tags 554349 + confirmed
thanks
Hello Faheem Mitha & all other co-bug-reporters :)
First of all: Thanks for the report!
I have currently no time to dig into it a bit deeper,
(hopefully i can do it tonight or tomorrow)
but my first guess is an overflow of an internal variable:
apt-get update -o Debug::pkgAcquire::RRed=1 -qq
results in 65,442 lines of output which is near the value
of a signed integer (65,535).
A patch of this size (~9 MB) is a bit uncommon as it
is bigger than the complete download of the new file.
It would be good if APT could detect it... we will see. :)
As a workaround you can disable pdiffs temporary with
apt-get update -o Acquire::Pdiffs=false
Best regards / Mit freundlichen Grüßen,
David "DonKult" Kalnischkies
Added tag(s) confirmed.
Request was from David Kalnischkies <kalnischkies+debian@gmail.com>
to control@bugs.debian.org.
(Wed, 04 Nov 2009 13:39:08 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 13:57:09 GMT) (full text, mbox, link).
Acknowledgement sent
to eric.valette@free.fr:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 13:57:09 GMT) (full text, mbox, link).
Message #49 received at 554349@bugs.debian.org (full text, mbox, reply):
NB: changing the root server enables to download the complete file
instead of diff.
-- eric
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 14:06:12 GMT) (full text, mbox, link).
Acknowledgement sent
to Michael Vogt <mvo@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 14:06:12 GMT) (full text, mbox, link).
Message #54 received at 554349@bugs.debian.org (full text, mbox, reply):
On Tue, Nov 03, 2009 at 11:21:48PM -0500, Faheem Mitha wrote:
> Package: apt
> Version: 0.7.20.2+lenny1
> Severity: normal
>
>
> I am currently getting the following. My guess is a malformed pdiff
> file. A couple of other people of #debian (oftc) have been seeing
> similar errors. Possibly related to
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545694 but this is
> supposedly fixed on 0.7.24 and one of my co-bug-reporters can
> reproduce this on sid.
>
> Note the same pdiff, 2009-11-04-0016.39.pdiff, occurs before each
> error.
>
> This is the first joint bug report I've filed, and I've been using
> Debian and filing bug reports since 2001. :-)
Thanks for your bugreport.
I can reproduce the failure here and I'm looking into the problem
now. As a workaround you can run:
# apt-get update -o Acquire::PDiffs=false
thanks,
Michael
Severity set to 'serious' from 'normal'
Request was from Piotr Lewandowski (CERT Polska) <piotr.lewandowski@cert.pl>
to control@bugs.debian.org.
(Wed, 04 Nov 2009 14:06:14 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 15:48:09 GMT) (full text, mbox, link).
Acknowledgement sent
to Mattias Nilsson <emptyhead75@gmail.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 15:48:10 GMT) (full text, mbox, link).
Message #61 received at 554349@bugs.debian.org (full text, mbox, reply):
As found elsewhere, a possible workaround it to try updating your
repositories with this:
apt-get update -o Acquire::PDiffs=false
Or by setting
Acquire::Pdiffs false;
in /etc/apt/apt.conf
--
Mattias Nilsson
Data Ductus
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 16:09:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Benjamin Eikel <debian@eikel.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 16:09:05 GMT) (full text, mbox, link).
Message #66 received at 554349@bugs.debian.org (full text, mbox, reply):
Package: apt
Version: 0.7.24
--- Please enter the report below this line. ---
Hello,
I have the same problem. I tried to create a stack trace with GDB. What I have
is:
Core was generated by `/usr/lib/apt/methods/rred'.
Program terminated with signal 11, Segmentation fault.
#0 0x00007ff59fb8060f in _IO_getline_info (fp=0x1fa4a30, buf=0x7fffc2711330 ".
\n", n=1023, delim=10, extract_delim=1, eof=0x0) at iogetline.c:63
#1 0x00007ff59fb7f589 in _IO_fgets (buf=0x7fffc2711330 ".\n", n=<value
optimized out>, fp=0x1fa4a30) at iofgets.c:58
#2 0x0000000000401d8c in ?? ()
#3 0x0000000000401e55 in ?? ()
The last line repeats thousands of times. Maybe this helps, but I doubt it. I
do not know which debugging symbols are missing for #2 and following.
Kind regards,
Benjamin
--- System information. ---
Architecture: amd64
Kernel: Linux 2.6.31-1-amd64
Debian Release: squeeze/sid
900 unstable www.debian-multimedia.org
900 unstable ftp.de.debian.org
570 experimental ftp.de.debian.org
560 testing www.debian-multimedia.org
560 testing security.debian.org
560 testing ftp.de.debian.org
550 stable www.debian-multimedia.org
550 stable security.debian.org
550 stable ftp.de.debian.org
500 etch-wx apt.wxwidgets.org
500 any apt.jenslody.de
--- Package information. ---
Depends (Version) | Installed
=======================================-+-=============
libc6 (>= 2.3.4) | 2.10.1-5
libgcc1 (>= 1:4.1.1) | 1:4.4.2-2
libstdc++6 (>= 4.2.1) | 4.4.2-2
debian-archive-keyring | 2009.01.31
Package's Recommends field is empty.
Suggests (Version) | Installed
=========================-+-===========
aptitude | 0.6.0.1-1
OR synaptic |
OR wajig |
dpkg-dev | 1.15.4.1
apt-doc |
bzip2 | 1.0.5-3
lzma | 4.43-14
python-apt | 0.7.13.3
--- Output from package bug script ---
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 16:36:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Björn Wiberg <Bjorn.Wiberg@its.uu.se>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 16:36:04 GMT) (full text, mbox, link).
Message #71 received at 554349@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Noticed the following in /var/log/messages when this error occurred:
---8<---
Nov 4 04:00:21 bjornw kernel: [1130177.769451] rred[15549]: segfault at
bf0cffa4 ip b7cd410f sp bf0cffa8 error 6 in libc-2.7.so[b7c6a000+155000]
Nov 4 04:00:21 bjornw cron-apt: CRON-APT RUN [/etc/cron-apt/config]:
Wed Nov 4 04:00:01 CET 2009
Nov 4 04:00:21 bjornw cron-apt: CRON-APT SLEEP: 13, Wed Nov 4 04:00:14
CET 2009
Nov 4 04:00:21 bjornw cron-apt: CRON-APT ACTION: 0-update
Nov 4 04:00:21 bjornw cron-apt: CRON-APT LINE: /usr/bin/apt-get update
-o quiet=2
Nov 4 04:00:21 bjornw cron-apt: E: Method rred has died unexpectedly!
--->8---
...suggesting that perhaps libc is involved.
---8<---
root@bjornw:~# LC_ALL=C apt-cache policy libc6 libc6-i686
libc6:
Installed: 2.7-18
Candidate: 2.7-18
Version table:
2.10.1-5 0
-2 http://ftp.se.debian.org unstable/main Packages
2.9-25 0
-1 http://ftp.se.debian.org testing/main Packages
*** 2.7-18 0
500 http://ftp.se.debian.org lenny/main Packages
100 /var/lib/dpkg/status
libc6-i686:
Installed: 2.7-18
Candidate: 2.7-18
Version table:
2.10.1-5 0
-2 http://ftp.se.debian.org unstable/main Packages
2.9-25 0
-1 http://ftp.se.debian.org testing/main Packages
*** 2.7-18 0
500 http://ftp.se.debian.org lenny/main Packages
100 /var/lib/dpkg/status
root@bjornw:~#
---8<---
Also worth noticing: work-around (although it doesn't cure the cause):
apt-get update -o Acquire::Pdiffs=false
...then after that 'apt-get update' works as it should again.
[smime.p7s (application/x-pkcs7-signature, attachment)]
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 17:13:55 GMT) (full text, mbox, link).
Acknowledgement sent
to Phillip Pi <ant@zimage.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 17:13:55 GMT) (full text, mbox, link).
Message #76 received at 554349@bugs.debian.org (full text, mbox, reply):
I am getting the same error today with apt-get update. "apt-get update
-o Acquire::Pdiffs=false" worked. :)
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 17:21:18 GMT) (full text, mbox, link).
Acknowledgement sent
to Michael Vogt <mvo@debian.org>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 17:21:18 GMT) (full text, mbox, link).
Message #81 received at 554349@bugs.debian.org (full text, mbox, reply):
It turns out that the unusual size of the diff causes a the stack to
overflow, a different workaround is "ulimit -s 12288" (or something
like that). Clearly its still a bug in rred.cc.
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 17:27:28 GMT) (full text, mbox, link).
Acknowledgement sent
to Mark Florian <markrian@gmail.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 17:27:28 GMT) (full text, mbox, link).
Message #86 received at 554349@bugs.debian.org (full text, mbox, reply):
I just encountered this bug on lenny. For anyone who doesn't know, the
temporary work around for this is to update like this as root (or using
sudo):
aptitude update -o Acquire::PDiffs=false
or
apt-get update -o Acquire::PDiffs=false
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 17:39:22 GMT) (full text, mbox, link).
Acknowledgement sent
to Julian Gilbey <jdg@polya.uklinux.net>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 17:39:22 GMT) (full text, mbox, link).
Message #91 received at 554349@bugs.debian.org (full text, mbox, reply):
On Wed, Nov 04, 2009 at 11:54:22AM +0100, Michael Vogt wrote:
> Thanks for your bugreport.
>
> I can reproduce the failure here and I'm looking into the problem
> now. As a workaround you can run:
>
> # apt-get update -o Acquire::PDiffs=false
Looks like the diff file is corrupt; applying it manually to the
Packages file using ed leaves an invalid Packages file.
Julian
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 18:00:33 GMT) (full text, mbox, link).
Acknowledgement sent
to Michael Vogt <mvo@ubuntu.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 18:00:33 GMT) (full text, mbox, link).
Message #96 received at 554349@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Wed, Nov 04, 2009 at 11:12:25AM +0100, David Kalnischkies wrote:
> tags 554349 + confirmed
> thanks
>
> Hello Faheem Mitha & all other co-bug-reporters :)
>
> First of all: Thanks for the report!
>
> I have currently no time to dig into it a bit deeper,
> (hopefully i can do it tonight or tomorrow)
> but my first guess is an overflow of an internal variable:
> apt-get update -o Debug::pkgAcquire::RRed=1 -qq
> results in 65,442 lines of output which is near the value
> of a signed integer (65,535).
>
> A patch of this size (~9 MB) is a bit uncommon as it
> is bigger than the complete download of the new file.
> It would be good if APT could detect it... we will see. :)
[..]
Attached is a patch that should add detection for patches that are
bigger than the actual file to patch. Unfortuantely I can no longer
reproduce the failure. Testing/feedback is welcome.
Cheers,
Michael
[apt.diff (text/x-diff, attachment)]
Forcibly Merged 554349 554357.
Request was from Christian Perrier <bubulle@debian.org>
to control@bugs.debian.org.
(Wed, 04 Nov 2009 18:39:06 GMT) (full text, mbox, link).
Severity set to 'important' from 'serious'
Request was from Luk Claes <luk@debian.org>
to control@bugs.debian.org.
(Wed, 04 Nov 2009 18:49:18 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 04 Nov 2009 20:15:07 GMT) (full text, mbox, link).
Acknowledgement sent
to Faheem Mitha <faheem@email.unc.edu>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 04 Nov 2009 20:15:07 GMT) (full text, mbox, link).
Message #105 received at 554349@bugs.debian.org (full text, mbox, reply):
Hi Michael, David,
Thanks for the prompt response and the patch. See below.
On Wed, 4 Nov 2009, Michael Vogt wrote:
> Attached is a patch that should add detection for patches that are
> bigger than the actual file to patch. Unfortuantely I can no longer
> reproduce the failure. Testing/feedback is welcome.
I can't reproduce this any longer, but would it not be possible to create
an 'artificial' apt repos to reproduce this behavior (before and after
the patch) since it seems you know what causes it?
Regards, Faheem.
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 25 Nov 2009 16:06:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Robert Lemmen <robertle@semistable.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 25 Nov 2009 16:06:03 GMT) (full text, mbox, link).
Message #116 received at 554349@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
this is most certainly related to the way rred currently works, it uses
a tail recursion on the stack to reverse the diff elements. it would be
easy to change that to use an iteration instead, if you want that just
holler and i'll change rred.cc, but i think the real problem is that we
should never produce such a large diff anyway, downloading the original
file is probably faster! perhaps we just need a filter on the diff
generation side?
cu robert
--
Robert Lemmen http://www.semistable.com
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 25 Nov 2009 19:12:10 GMT) (full text, mbox, link).
Acknowledgement sent
to David Kalnischkies <kalnischkies+debian@gmail.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 25 Nov 2009 19:12:10 GMT) (full text, mbox, link).
Message #121 received at 554349@bugs.debian.org (full text, mbox, reply):
2009/11/25 Robert Lemmen <robertle@semistable.com>:
> this is most certainly related to the way rred currently works, it uses
> a tail recursion on the stack to reverse the diff elements.
Really, i don't think it is a stackoverflow as it fails at a to prominent
cmd count... I have rewritten a few parts of rred to use long and more
sane return values and it patches the file now just fine. :)
While on it i have also integrated #463354 which will speed up the
patch-process a bit (but don't expect a miracle, the biggest timesucker
still is the decompression of the patches and applying them patch by
patch instead of concatenate the patches - but this has again a few
problems as this is far from a simple cat operation as you have to
recalculate line numbers)
> but i think the real problem is that we should never produce such
> a large diff anyway, downloading the original file is probably faster!
I will tell you a secret: For most users with fast connections pdiffs
are (always) slower. Pdiffs fight against download size and
decompression time of the Packages file, but if download time is
nearly zero for every download pdiff only competes with the compression
type: bz2 is slow, but pdiffs (if you need to apply more than one) are
most of the time slower (as you have a gzip decompression for
the patch and load and save of a uncompressed Packages file
for each patch). It is just that pdiffs are nicer for the mirrors,
everyone between the mirrors and your computer (e.g. ISP)
and the time of an "apt-get update" isn't a problem compared
to the rest of the upgrade progress for the casual user anyway -
and it is a great plus if you don't have a fast connection
(currently) or if you pay per traffic...
> perhaps we just need a filter on the diff generation side?
Michael has already a patch for apt to don't download the patch
if the patch is bigger than the actual file, so no need to implement
some logic in the generator as the file was itself correct, just to
big to be useful.
Best regards / Mit freundlichen Grüßen,
David "DonKult" Kalnischkies
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Wed, 25 Nov 2009 19:33:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Robert Lemmen <robertle@semistable.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Wed, 25 Nov 2009 19:33:06 GMT) (full text, mbox, link).
Message #126 received at 554349@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Wed, Nov 25, 2009 at 08:08:36PM +0100, David Kalnischkies wrote:
> Really, i don't think it is a stackoverflow as it fails at a to prominent
> cmd count... I have rewritten a few parts of rred to use long and more
> sane return values and it patches the file now just fine. :)
ok, excellent. but didn't someone say ulimit -s fixes it?
> While on it i have also integrated #463354 which will speed up the
> patch-process a bit (but don't expect a miracle, the biggest timesucker
> still is the decompression of the patches and applying them patch by
> patch instead of concatenate the patches - but this has again a few
> problems as this is far from a simple cat operation as you have to
> recalculate line numbers)
#463354 looks like it is also getting rid of the recursion, that is very
good!
> I will tell you a secret: For most users with fast connections pdiffs
> are (always) slower. Pdiffs fight against download size and
> ...
heh, i know!
> Michael has already a patch for apt to don't download the patch
> if the patch is bigger than the actual file, so no need to implement
> some logic in the generator as the file was itself correct, just to
> big to be useful.
cool, but i thought there is already logic to do that in the generator,
plus changing the generator not to produce uselessly large files would
also autmagically fix the whole problems for systems with an older apt
that still contains the broken rred...
cu robert
--
Robert Lemmen http://www.semistable.com
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Mon, 30 Nov 2009 10:42:08 GMT) (full text, mbox, link).
Acknowledgement sent
to Goswin von Brederlow <goswin-v-b@web.de>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Mon, 30 Nov 2009 10:42:08 GMT) (full text, mbox, link).
Message #131 received at 554349@bugs.debian.org (full text, mbox, reply):
Robert Lemmen <robertle@semistable.com> writes:
> On Wed, Nov 25, 2009 at 08:08:36PM +0100, David Kalnischkies wrote:
>> Really, i don't think it is a stackoverflow as it fails at a to prominent
>> cmd count... I have rewritten a few parts of rred to use long and more
>> sane return values and it patches the file now just fine. :)
>
> ok, excellent. but didn't someone say ulimit -s fixes it?
>
>> While on it i have also integrated #463354 which will speed up the
>> patch-process a bit (but don't expect a miracle, the biggest timesucker
>> still is the decompression of the patches and applying them patch by
>> patch instead of concatenate the patches - but this has again a few
>> problems as this is far from a simple cat operation as you have to
>> recalculate line numbers)
>
> #463354 looks like it is also getting rid of the recursion, that is very
> good!
>
>> I will tell you a secret: For most users with fast connections pdiffs
>> are (always) slower. Pdiffs fight against download size and
>> ...
>
> heh, i know!
>
>> Michael has already a patch for apt to don't download the patch
>> if the patch is bigger than the actual file, so no need to implement
>> some logic in the generator as the file was itself correct, just to
>> big to be useful.
>
> cool, but i thought there is already logic to do that in the generator,
> plus changing the generator not to produce uselessly large files would
> also autmagically fix the whole problems for systems with an older apt
> that still contains the broken rred...
>
> cu robert
>
> --
> Robert Lemmen http://www.semistable.com
I would like to see a config option to limit the number of patch files
to download. As you said the loading/saving of the index files and
decompressing pdiff files uses up time. Even with a moderate download
speed anything over 4 to 8 pdiff files is slower than getting the full
file. But it depends on the download speed.
So maybe an option to limit the amount of pdiff files eigther strictly
to X pdiffs or to |pdiff size| * Y < |index size|.
MfG
Goswin
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Thu, 31 Dec 2009 16:09:56 GMT) (full text, mbox, link).
Acknowledgement sent
to "Daniel 'DaB.' Baur" <debian@daniel.baur4.info>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Thu, 31 Dec 2009 16:09:56 GMT) (full text, mbox, link).
Message #136 received at 554349@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Hello all,
yesterday and today the bug hits me. I'm running debian testing (with a few
sid-packages and a few stables). "apt-get update -o Acquire::Pdiffs=false"
work-arrounded the problem.
Sincerly,
DaB.
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, APT Development Team <deity@lists.debian.org>:
Bug#554349; Package apt.
(Thu, 31 Dec 2009 16:48:03 GMT) (full text, mbox, link).
Acknowledgement sent
to David Kalnischkies <kalnischkies+debian@gmail.com>:
Extra info received and forwarded to list. Copy sent to APT Development Team <deity@lists.debian.org>.
(Thu, 31 Dec 2009 16:48:03 GMT) (full text, mbox, link).
Message #141 received at 554349@bugs.debian.org (full text, mbox, reply):
Hi Daniel Baur,
> yesterday and today the bug hits me. I'm running debian testing (with a few
> sid-packages and a few stables). "apt-get update -o Acquire::Pdiffs=false"
> work-arrounded the problem.
Could you please be more specific which diffs failed so we can reproduce
it as for example on my systems i haven't any problems so far.
(Simple post the complete output of the "apt-get update" run if unsure)
The reported issue here with the too big pdiff file is fixed (by the ftpadmins)
long time ago. The current 0.7.25 includes the rred rewrite which should
even apply this big pdiff file correctly.
The bugreport(s) are currently still open just for two reasons:
a) Michaels patch for not downloading to big files was not applied (somehow).
b) Goswin von Brederlow feature request sounds reasonable.
Your problem could be reason c) but we would need more information.
Happy new year!
David Kalnischkies
Added tag(s) pending.
Request was from David Kalnischkies <kalnischkies+debian@gmail.com>
to control@bugs.debian.org.
(Sun, 10 Jan 2010 13:57:03 GMT) (full text, mbox, link).
Reply sent
to Michael Vogt <mvo@debian.org>:
You have taken responsibility.
(Mon, 11 Jan 2010 18:48:12 GMT) (full text, mbox, link).
Notification sent
to Faheem Mitha <faheem@email.unc.edu>:
Bug acknowledged by developer.
(Mon, 11 Jan 2010 18:48:12 GMT) (full text, mbox, link).
Message #148 received at 554349-close@bugs.debian.org (full text, mbox, reply):
Source: apt
Source-Version: 0.7.25.1
We believe that the bug you reported is fixed in the latest version of
apt, which is due to be installed in the Debian FTP archive:
apt-doc_0.7.25.1_all.deb
to main/a/apt/apt-doc_0.7.25.1_all.deb
apt-transport-https_0.7.25.1_i386.deb
to main/a/apt/apt-transport-https_0.7.25.1_i386.deb
apt-utils_0.7.25.1_i386.deb
to main/a/apt/apt-utils_0.7.25.1_i386.deb
apt_0.7.25.1.dsc
to main/a/apt/apt_0.7.25.1.dsc
apt_0.7.25.1.tar.gz
to main/a/apt/apt_0.7.25.1.tar.gz
apt_0.7.25.1_i386.deb
to main/a/apt/apt_0.7.25.1_i386.deb
libapt-pkg-dev_0.7.25.1_i386.deb
to main/a/apt/libapt-pkg-dev_0.7.25.1_i386.deb
libapt-pkg-doc_0.7.25.1_all.deb
to main/a/apt/libapt-pkg-doc_0.7.25.1_all.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 554349@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Michael Vogt <mvo@debian.org> (supplier of updated apt package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Sat, 09 Jan 2010 21:52:36 +0100
Source: apt
Binary: apt apt-doc libapt-pkg-dev libapt-pkg-doc apt-utils apt-transport-https
Architecture: source all i386
Version: 0.7.25.1
Distribution: unstable
Urgency: low
Maintainer: APT Development Team <deity@lists.debian.org>
Changed-By: Michael Vogt <mvo@debian.org>
Description:
apt - Advanced front-end for dpkg
apt-doc - Documentation for APT
apt-transport-https - APT https transport
apt-utils - APT utility programs
libapt-pkg-dev - Development files for APT's libapt-pkg and libapt-inst
libapt-pkg-doc - Documentation for APT development
Closes: 304846 485963 545754 554349 561971 564171
Changes:
apt (0.7.25.1) unstable; urgency=low
.
[ Christian Perrier ]
* French manpage translation update
* Russian translation update by Yuri Kozlov
Closes: #564171
.
[Chris Leick]
* spot & fix various typos in all manpages
* German manpage translation update
.
[ David Kalnischkies ]
* cmdline/apt-cache.cc:
- remove translatable marker from the "%4i %s\n" string
* buildlib/po4a_manpage.mak:
- instruct debiandoc to build files with utf-8 encoding
* buildlib/tools.m4:
- fix some warning from the buildtools
* apt-pkg/acquire-item.cc:
- add configuration PDiffs::Limit-options to not download
too many or too big patches (Closes: #554349)
* debian/control:
- let all packages depend on ${misc:Depends}
* share/*-archive.gpg:
- remove the horrible outdated files. We already depend on
the keyring so we don't need to ship our own version
* cmdline/apt-key:
- errors out if wget is not installed (Closes: #545754)
- add --keyring option as we have now possibly many
* methods/gpgv.cc:
- pass all keyrings (TrustedParts) to gpgv instead of
using only one trusted.gpg keyring (Closes: #304846)
* methods/https.cc:
- finally merge the rest of the patchset from Arnaud Ebalard
with the CRL and Issuers options, thanks! (Closes: #485963)
* apt-pkg/deb/debindexfile.cc, apt-pkg/pkgcachegen.cc:
- add debug option Debug::pkgCacheGen
.
[ Michael Vogt ]
* cmdline/apt-get.cc:
- merge fix for apt-get source pkg=version regression
(closes: #561971)
* po/ru.po:
- merged updated ru.po, thanks to Yuri Kozlov (closes: #564171)
Checksums-Sha1:
37dc14463afdbf16bc26e41290f6f2a585406b32 1212 apt_0.7.25.1.dsc
9425bfcf583139d8adeed8fc4e7a89182f9cbc5a 2628291 apt_0.7.25.1.tar.gz
fdacf5f91a2b21d8bcdf6e94e5552c1b6b7c6c7c 132336 apt-doc_0.7.25.1_all.deb
a2a019bddcbd2308ef3bb4d4930a72693579aa4d 132486 libapt-pkg-doc_0.7.25.1_all.deb
f7de503e8668aa069b9bc31bb523b3587469e7e0 1738504 apt_0.7.25.1_i386.deb
e075b7406a7199821c452a8e48fa6c02bb3aa59c 120670 libapt-pkg-dev_0.7.25.1_i386.deb
9db2939d9a58b5d5de8780265ee14c3d483b6949 222532 apt-utils_0.7.25.1_i386.deb
2e1f6fd444dcbdb688ab6d6830422c43915f82b2 68830 apt-transport-https_0.7.25.1_i386.deb
Checksums-Sha256:
13fe8274944abb907232e621418d2c9a429c8cbc4daf46be08f5e8f4406b6cb8 1212 apt_0.7.25.1.dsc
8e3fac8d0567ce0a297e8292115355e8b119bb3e228e20e99ffe114920b10d67 2628291 apt_0.7.25.1.tar.gz
50861ca31fdc429f3de1657bc31da696f0e2c1aebb2c30bb833e251cc8663359 132336 apt-doc_0.7.25.1_all.deb
05c24429d6290a24075575911ef31ec38fcdb8dd3a893807c7720c19395d3ffd 132486 libapt-pkg-doc_0.7.25.1_all.deb
5f1ce12e343b77dd4eccecf2212a73aec49d1a1328772412e2050c37b58acaa3 1738504 apt_0.7.25.1_i386.deb
03996018bf4f28197639644f4c683d673963fe26a0220b67cd5a7e45c563c4d9 120670 libapt-pkg-dev_0.7.25.1_i386.deb
3ee4705964a9ac9b4c6742e7eb0fbbd0999948b6417a5101353191ab9c4a5291 222532 apt-utils_0.7.25.1_i386.deb
17d6406138cb8d65f661fbafd84c1931b5fda5982286374bb7c018caf3542515 68830 apt-transport-https_0.7.25.1_i386.deb
Files:
8aaf1652b1bfcc14c8cb0d28f1f538d9 1212 admin important apt_0.7.25.1.dsc
451118002b7e4f5fc3476a2f5e23d865 2628291 admin important apt_0.7.25.1.tar.gz
772f9fec27c0dc54ed917e5d4a29d6ae 132336 doc optional apt-doc_0.7.25.1_all.deb
1d7874b5d00813a0e72ae2992d9b0e70 132486 doc optional libapt-pkg-doc_0.7.25.1_all.deb
40fb9bc525331f8310804644e10555b6 1738504 admin important apt_0.7.25.1_i386.deb
46f34f643d3c3f1eb2234b2315a5894d 120670 libdevel optional libapt-pkg-dev_0.7.25.1_i386.deb
8bf1a60c54a265d9f7e053d82964f7e8 222532 admin important apt-utils_0.7.25.1_i386.deb
64fabf49b8593c6b7b28820708f1e80c 68830 admin optional apt-transport-https_0.7.25.1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAktLcYcACgkQliSD4VZixzRi4QCgjfNGoXq7mIi9w3Wy4+dyL3p9
wIMAn2iOKuBU3KYs9fUlt76Q4wuHesGc
=30u4
-----END PGP SIGNATURE-----
Reply sent
to Michael Vogt <mvo@debian.org>:
You have taken responsibility.
(Mon, 11 Jan 2010 18:48:13 GMT) (full text, mbox, link).
Notification sent
to "Hideki Yamane \(Debian-JP\)" <henrich@debian.or.jp>:
Bug acknowledged by developer.
(Mon, 11 Jan 2010 18:48:13 GMT) (full text, mbox, link).
Reply sent
to Michael Vogt <mvo@debian.org>:
You have taken responsibility.
(Mon, 11 Jan 2010 18:48:14 GMT) (full text, mbox, link).
Notification sent
to debian-bugreport3@xaq.nl:
Bug acknowledged by developer.
(Mon, 11 Jan 2010 18:48:14 GMT) (full text, mbox, link).
Reply sent
to Michael Vogt <mvo@debian.org>:
You have taken responsibility.
(Mon, 11 Jan 2010 18:48:15 GMT) (full text, mbox, link).
Notification sent
to alex bodnaru <alexbodn@012.net.il>:
Bug acknowledged by developer.
(Mon, 11 Jan 2010 18:48:15 GMT) (full text, mbox, link).
Reply sent
to Michael Vogt <mvo@debian.org>:
You have taken responsibility.
(Mon, 11 Jan 2010 18:48:16 GMT) (full text, mbox, link).
Notification sent
to Vicens Juan Tomas Monserrat <vtomasr5@gmail.com>:
Bug acknowledged by developer.
(Mon, 11 Jan 2010 18:48:16 GMT) (full text, mbox, link).
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Fri, 12 Feb 2010 07:34:45 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Sun Jan 14 01:13:11 2024;
Machine Name:
bembo
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.