Bug#933779: apache2+mod_wsgi (python3) stop answer at random time
Package: libapache2-mod-wsgi-py3 Version: 4.6.5-1 Hi! I'm using: apache 2.4.38-3 libapache2-mpm-itk 2.4.7-04-1 libapache2-mod-wsgi-py3 4.6.5-1 inside KVM box. Some random time (several times a month) apache stops responding to requests. Help only full restart apache2 service. At this time (before restart) apache wrote to error log more messages like: Fatal Python error: Could not allocate TSS entry Fatal Python error: Could not allocate TSS entry Fatal Python error: Could not allocate TSS entry Fatal Python error: Could not allocate TSS entry Fatal Python error: Could not allocate TSS entry Fatal Python error: Could not allocate TSS entry Fatal Python error: Could not allocate TSS entry Fatal Python error: Could not allocate TSS entry Fatal Python error: Could not allocate TSS entry [Sat Aug 03 00:00:05.444213 2019] [core:notice] [pid 30599] AH00052: child pid 7428 exit signal Aborted (6) [Sat Aug 03 00:00:05.444292 2019] [core:notice] [pid 30599] AH00052: child pid 7429 exit signal Aborted (6) [Sat Aug 03 00:00:05.444333 2019] [core:notice] [pid 30599] AH00052: child pid 7430 exit signal Aborted (6) [Sat Aug 03 00:00:05.444354 2019] [core:notice] [pid 30599] AH00052: child pid 7431 exit signal Aborted (6) [Sat Aug 03 00:00:05.444374 2019] [core:notice] [pid 30599] AH00052: child pid 7432 exit signal Aborted (6) [Sat Aug 03 00:00:05.444395 2019] [core:notice] [pid 30599] AH00052: child pid 7433 exit signal Aborted (6 I also attach strace output of some apache processes at this time set_robust_list(0x7efeeaa52760, 24) = 0 rt_sigaction(SIGHUP, {sa_handler=0x7efeea783d80, sa_mask=[], sa_flags=SA_RESTORER|SA_INTERRUPT, sa_restorer=0x7efeeacb7730}, {sa_handler=0x55dd851fbd90, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7efeeacb7730}, 8) = 0 rt_sigaction(SIGTERM, {sa_handler=0x7efeea783d80, sa_mask=[], sa_flags=SA_RESTORER|SA_INTERRUPT, sa_restorer=0x7efeeacb7730}, {sa_handler=0x55dd851fbd40, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7efeeacb7730}, 8) = 0 rt_sigaction(SIGINT, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=SA_RESTORER|SA_INTERRUPT, sa_restorer=0x7efeeacb7730}, {sa_handler=0x55dd851fbd40, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7efeeacb7730}, 8) = 0 rt_sigaction(SIGUSR1, {sa_handler=0x7efeea783cd0, sa_mask=[], sa_flags=SA_RESTORER|SA_INTERRUPT, sa_restorer=0x7efeeacb7730}, {sa_handler=0x55dd851fbd90, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7efeeacb7730}, 8) = 0 getpid()= 7226 getpid()= 7226 mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7efeea1ed000 mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7efee9bcd000 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=4, filter=0x7ffd639776d0}) = 0 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=10, filter=0x7efeea9a70e0}) = 0 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=9, filter=0x7efeea9a70e0}) = 0 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=16, filter=0x7efeea9a70e0}) = 0 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=22, filter=0x7efeea9a70e0}) = 0 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=10, filter=0x7efeea9a70e0}) = 0 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=9, filter=0x7efeea9a70e0}) = 0 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=16, filter=0x7efeea9a70e0}) = 0 prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, {len=22, filter=0x7efeea9a70e0}) = 0 prctl(PR_SET_KEEPCAPS, 1) = 0 geteuid() = 0 setgid(33) = 0 openat(AT_FDCWD, "/proc/sys/kernel/ngroups_max", O_RDONLY) = 35 read(35, "65536\n", 31) = 6 close(35) = 0 openat(AT_FDCWD, "/etc/group", O_RDONLY|O_CLOEXEC) = 35 lseek(35, 0, SEEK_CUR) = 0 fstat(35, {st_mode=S_IFREG|0644, st_size=984, ...}) = 0 read(35, "root:x:0:\ndaemon:x:1:\nbin:x:2:\ns"..., 4096) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984 lseek(35, 0, SEEK_CUR) = 984
Bug#917223: Acknowledgement (wrong rights when running a sequence of multiple commands in SHELL and EUID/EGID)
Sorry. Example 2 is puts IO.popen("mkdir test", err: [:child, :out]).readlines.join("") puts IO.popen("cd .; mkdir test2", err: [:child, :out]).readlines.join("")
Bug#917223: wrong rights when running a sequence of multiple commands in SHELL and EUID/EGID
Package: ruby Version: 2.5.3-3 Sample test script: #!/usr/bin/ruby Process::Sys.setegid 1000 Process::Sys.seteuid 1000 out = `mkdir -p bar` out = `cd . ; mkdir -p foo` bar is owned by uid/gid 1000 foo is owned by root Or another example: puts IO.popen("cd .; mkdir test", err: [:child, :out]).readlines.join("") puts IO.popen("cd .; mkdir test2", err: [:child, :out]).readlines.join("") test is owned by uid/gid 1000 test2 is owned by root
Bug#891940: pv not end after copy data
Package: pv Version: 1.6.0-1+b1 After copy data with pv+netcat pv not stop and infinitely expects data before pressing ctrl + c Step to reproduce: 1) Run nc -l 127.0.0.1 19000 | cat >/dev/null 2) Run pv /dev/mapper/cuprumsrv-SWAP | nc 127.0.0.1 19000 3) Wait more and more time... root@srv:~# pv /dev/mapper/MAIN-test | nc 127.0.0.1 19000 5,59GiB 0:00:04 [1,14GiB/s] [=>] 100% ... pv not end.
Bug#887106: Acknowledgement (denying ptrace access check without PTRACE_MODE_*CREDS)
CPU model name : Intel(R) Xeon(R) CPU E5430 @ 2.66GHz
Bug#887106: denying ptrace access check without PTRACE_MODE_*CREDS
Package: linux-image-3.2.0-5-amd64 Version: 3.2.96-3 When i boot server . based on Manufacturer: Supermicro Product Name: X7DB8 I get many messages in dmesg like _wait_scan] [Sat Jan 13 23:52:23 2018] Pid: 2840, comm: snmpd Tainted: GW 3.2.0-5-amd64 #1 Debian 3.2.96-3 [Sat Jan 13 23:52:23 2018] Call Trace: [Sat Jan 13 23:52:23 2018] [] ? warn_slowpath_common+0x78/0x8c [Sat Jan 13 23:52:23 2018] [] ? warn_slowpath_fmt+0x45/0x4a [Sat Jan 13 23:52:23 2018] [] ? find_ge_pid+0x13/0x34 [Sat Jan 13 23:52:23 2018] [] ? __ptrace_may_access+0x47/0xf9 [Sat Jan 13 23:52:23 2018] [] ? ptrace_may_access+0x24/0x36 [Sat Jan 13 23:52:23 2018] [] ? proc_pid_readdir+0xfc/0x1dc [Sat Jan 13 23:52:23 2018] [] ? fillonedir+0xaa/0xaa [Sat Jan 13 23:52:23 2018] [] ? fillonedir+0xaa/0xaa [Sat Jan 13 23:52:23 2018] [] ? fillonedir+0xaa/0xaa [Sat Jan 13 23:52:23 2018] [] ? vfs_readdir+0x6f/0xa7 [Sat Jan 13 23:52:23 2018] [] ? kmem_cache_free+0x2d/0x81 [Sat Jan 13 23:52:23 2018] [] ? sys_getdents+0x7d/0xcd [Sat Jan 13 23:52:23 2018] [] ? system_call_fastpath+0x16/0x1b [Sat Jan 13 23:52:23 2018] ---[ end trace 6d1185e92fa57d12 ]--- [Sat Jan 13 23:52:23 2018] [ cut here ] [Sat Jan 13 23:52:23 2018] WARNING: at /build/linux-HPGG73/linux-3.2.96/kernel/ptrace.c:228 __ptrace_may_access+0x47/0xf9() [Sat Jan 13 23:52:23 2018] Hardware name: X7DB8 [Sat Jan 13 23:52:23 2018] denying ptrace access check without PTRACE_MODE_*CREDS [Sat Jan 13 23:52:23 2018] Modules linked in: xt_recent ts_bm ts_kmp ipt_LOG xt_tcpudp nf_conntrack_ipv4 nf_defrag_ipv4 xt_st ate nf_conntrack ipt_REJECT xt_string xt_owner xt_multiport iptable_filter ip_tables x_tables ext2 loop radeon ttm drm_kms_he lper snd_pcm drm snd_page_alloc snd_timer power_supply i2c_algo_bit iTCO_wdt iTCO_vendor_support ioatdma i5000_edac snd psmou se edac_core i2c_i801 i5k_amb rng_core parport_pc dca i2c_core parport shpchp soundcore coretemp evdev serio_raw processor bu tton container pcspkr thermal_sys ext4 crc16 jbd2 mbcache dm_mod microcode usbhid hid ses enclosure sd_mod crc_t10dif sg sr_m od cdrom ata_generic uhci_hcd floppy ata_piix libata ehci_hcd usbcore aacraid usb_common scsi_mod e1000e [last unloaded: scsi _wait_scan] and some messages for Pid: 3830, comm: sudo Tainted: GW3.2.0-5-amd64 #1 Debian 3.2.96-3 after login from ssh i get in console. but proc is mounted Error, do this: mount -t proc proc /proc Error, do this: mount -t proc proc /proc Error, do this: mount -t proc proc /proc -bash: __rvm_add_to_path: команда не найдена
Bug#868139: [Pkg-php-pecl] Bug#868138: error
Locale is ru_RU.UTF-8. I cannot change locale to C.
Bug#868138: error
Package: php-apcu Version: 5.1.8+4.0.11-1 |Severity: critical After install dpkg -l | grep php | grep apc ii php-apcu 5.1.8+4.0.11-1 amd64 APC User Cache for PHP ii php-apcu-bc 1.0.3-2 amd64 APCu Backwards Compatibility Module I get error in apache log: PHP Warning: PHP Startup: Unable to load dynamic library '/usr/lib/php/20151012/apc.so' - /usr/lib/php/20151012/apc.so: undefined symbol: zif_apcu_store in Unknown on line 0 rename 20-apcu_bc.ini to 21-apcu_bc.ini fix this error |
Bug#852941: kernel oops in module igb
Vanilla kernel 4.9.6 work fine too (build with debian kernel config except module sign)
Bug#852941: kernel oops in module igb
Control: tag -1 moreinfo I cannot keep full kernel core dump. after install kdebug* and enable it, after kernel error /var/crash is empty.
Bug#852941: kernel oops in module igb
Package: linux-image-4.9.0-1-amd64 Version: 4.9.2-2 When i boot server . based on Manufacturer: Supermicro Product Name: X8DTU I get kernel oops on module igb after port on cisco get forward state interface GigabitEthernet1/0/15 description 2Manganum_SRV switchport trunk encapsulation dot1q switchport trunk allowed vlan 12,15,20 switchport mode trunk spanning-tree portfast end network settings on server is cat /etc/network/interfaces # This file describes the network interfaces available on your system # and how to activate them. For more information, see interfaces(5). source /etc/network/interfaces.d/* # The loopback network interface auto lo iface lo inet loopback auto eth0 iface eth0 inet manual pre-up /sbin/ethtool --pause $IFACE autoneg off rx off tx off auto eth1 iface eth1 inet manual pre-up /sbin/ethtool --pause $IFACE autoneg off rx off tx off auto eth1.20 iface eth1.20 inet manual auto br0 iface br0 inet manual bridge_ports eth0 bridge_stp off # disable Spanning Tree Protocol bridge_waitport 0# no delay before a port becomes available bridge_fd 0 # no forwarding delay auto br1 iface br1 inet static address 192.168.0.25 netmask 255.255.255.0 gateway 192.168.0.11 bridge_ports eth1.20 bridge_stp off # disable Spanning Tree Protocol bridge_waitport 0# no delay before a port becomes available bridge_fd 0 # forwarding delay if I set bridge_fd 10 for br1 or booting with kdump, or use module igb from intel.com (igb-5.3.5.4.tar.gz) oops is not reproduced. Debian 9 test install
Bug#620066: BFA[error] HAL_ASSERT: Assertion failure
on kernel 2.6.38-2-amd64 it works fine, on 2.6.32-5-amd64 it works only with drivers from http://www.brocade.com/services-support/drivers-downloads/CNA/Linux.page (brocade_driver_linux_2.3.0.3.tar.gz) on other version not working with BFA[error] HAL_ASSERT: Assertion failure -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#579622: unbound chroot problem
Package: unbound Version: 1.4.0-1 cat /etc/debian_version squeeze/sid if enable chroot in config - service not working and configs not copint in to chrrot dir -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org