Bug#949719: ntopng missing startup depenency on redis-server in systemd

2020-01-23 Thread Dave Johnson


Package: ntopng
Version: 3.8+dfsg1-2.1

There is a system boot race between ntopng and redis-server because
ntopng doesn't have the dependency in the systemd config (it is
present in init.d but not systemd)


root@ganges:~# systemctl status ntopng
...
Jan 23 19:25:02 ganges ntopng[7891]: 23/Jan/2020 19:25:02 [Redis.cpp:111] 
ERROR: ntopng requires redis server to be up and running
Jan 23 19:25:02 ganges ntopng[7891]: 23/Jan/2020 19:25:02 [Redis.cpp:112] 
ERROR: Please start it and try again or use -r
Jan 23 19:25:02 ganges ntopng[7891]: 23/Jan/2020 19:25:02 [Redis.cpp:113] 
ERROR: to specify a redis server other than the default

root@ganges:~# systemctl status redis-server
...
Jan 23 19:25:03 ganges systemd[1]: Started Advanced key-value store.


Note ntopng was started prior to redis-server on server boot.


root@ganges:~# grep redis /etc/init.d/ntopng 
# Required-Start:$remote_fs $syslog redis-server
# Required-Stop: $remote_fs $syslog redis-server
root@ganges:~# grep redis 
/etc/systemd/system/multi-user.target.wants/ntopng.service
root@ganges:~# 

An 'After=redis-server.service' would seem approprate in ntopng.service



-- 
Dave



Bug#842573: xserver-xorg-video-intel: Latest backport to jessie results in display corruption

2017-11-16 Thread Dave Johnson

Also seeing this.  Every few days/weeks I start getting corruption of
objects (messed up bitmaps, icons that are blank, background that
doesn't clear/update), etc...

running 2:2.99.917+git20161206-1~bpo8+1 on Broadwell-U (8086:1616)
specifically on a Lenovo X1 Carbon 3rd gen.

Problem doesn't happen on 2:2.21.15-2+b2, however that version doesn't
support acceleration on Broadwell so everything is slow.




[12.068] Current Operating System: Linux hermes 3.16.0-4-amd64 #1 SMP 
Debian 3.16.43-2+deb8u5 (2017-09-19) x86_64
[12.068] xorg-server 2:1.16.4-1+deb8u1 (http://www.debian.org/support) 



-- 
Dave



Bug#816872: wmbattery: memory leak in wmbattery

2016-03-05 Thread Dave Johnson
Package: wmbattery
Version: 2.45-2
Severity: important

Dear Maintainer,

wmbattery appears to have a memory leak.  When invoked with "wmbattery -w 2" it 
is leaking approx 350KB/minute on my system.  Eventually it runs out of memory 
and is killed by kernel.


$ while sleep 300; do ps u $(pidof wmbattery); done
USER   PID %CPU %MEMVSZ   RSS TTY  STAT START   TIME COMMAND
davijoh3 29894  0.2  0.0  18524  6792 ?Sl   21:24   0:00 wmbattery -w 2
USER   PID %CPU %MEMVSZ   RSS TTY  STAT START   TIME COMMAND
davijoh3 29894  0.2  0.1  20068  7976 ?Sl   21:24   0:01 wmbattery -w 2
USER   PID %CPU %MEMVSZ   RSS TTY  STAT START   TIME COMMAND
davijoh3 29894  0.2  0.1  21604  9404 ?Sl   21:24   0:01 wmbattery -w 2
USER   PID %CPU %MEMVSZ   RSS TTY  STAT START   TIME COMMAND
davijoh3 29894  0.2  0.1  23160 10588 ?Sl   21:24   0:02 wmbattery -w 2
USER   PID %CPU %MEMVSZ   RSS TTY  STAT START   TIME COMMAND
davijoh3 29894  0.2  0.1  24696 12208 ?Sl   21:24   0:03 wmbattery -w 2
USER   PID %CPU %MEMVSZ   RSS TTY  STAT START   TIME COMMAND
davijoh3 29894  0.2  0.1  26164 14032 ?Sl   21:24   0:03 wmbattery -w 2
USER   PID %CPU %MEMVSZ   RSS TTY  STAT START   TIME COMMAND
davijoh3 29894  0.2  0.1  27700 15464 ?Sl   21:24   0:04 wmbattery -w 2
USER   PID %CPU %MEMVSZ   RSS TTY  STAT START   TIME COMMAND
davijoh3 29894  0.2  0.2  29644 17240 ?Sl   21:24   0:05 wmbattery -w 2
USER   PID %CPU %MEMVSZ   RSS TTY  STAT START   TIME COMMAND
davijoh3 29894  0.2  0.2  31180 18964 ?Sl   21:24   0:05 wmbattery -w 2



-- System Information:
Debian Release: 8.3
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (x86_64)

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages wmbattery depends on:
ii  libapm1  3.2.2-15
ii  libc62.19-18+deb8u3
ii  libglib2.0-0 2.42.1-1
ii  libupower-glib3  0.99.1-3.2
ii  libx11-6 2:1.6.2-3
ii  libxext6 2:1.3.3-1
ii  libxpm4  1:3.5.11-1+b1
ii  upower   0.99.1-3.2

wmbattery recommends no packages.

Versions of packages wmbattery suggests:
ii  wmaker  0.95.5-2+b2

-- no debconf information



Bug#510495: memory profiler results

2009-01-18 Thread Dave Johnson
John Morrissey writes:
> The next step would probably involve running snmpd in debug mode and
> comparing the output to what's being done in the source. Poking at the
> functions in these backtraces with gdb(1) might be more productive.

something in ipAddressTable_cache_load() or more specifically
_check_entry_for_updates() looks like a problem.

with 100 vlans, and 103 total interfaces:

here's the progression in ipAddressTable_cache_load() 


before _check_entry_for_updates iteration:

(gdb) call container->get_size(container)
$89 = 104
(gdb) call ipaddress_container->get_size(ipaddress_container)
$90 = 204

after _check_entry_for_updates iteration:

(gdb) call container->get_size(container)
$93 = 104
(gdb) call ipaddress_container->get_size(ipaddress_container)
$94 = 100

after _add_new_entry iteration:

(gdb) call container->get_size(container)
$96 = 104
(gdb) call ipaddress_container->get_size(ipaddress_container)
$97 = 100

the next call after the _add_new_entry is to free
ipaddress_container.  the comment seems incorrect as there are still
100 entries in ipaddress_container.

/*
 * free the container. we've either claimed each entry, or released it,
 * so the access function doesn't need to clear the container.
 */
netsnmp_access_ipaddress_container_free(ipaddress_container,

NETSNMP_ACCESS_IPADDRESS_FREE_DONT_CLEAR);


Back at the beginning we see the 204 entries:


(gdb) p *(binary_array_table*)ipaddress_container->container_data
$107 = {max_size = 320, count = 204, flags = 0, dirty = 1, data_size = 4, data 
= 0x8310638}

(gdb) p /x 
*(netsnmp_ipaddress_entry*)((binary_array_table*)ipaddress_container->container_data)->data[0]
$111 = {oid_index = {len = 0x1, oids = 0x812fc30}, ns_ia_index = 0x1, flags = 
0x0, ia_address = {0x7f, 0x0, 0x0, 0x1, 0x0 }, if_index = 
0x1, ia_prefix_oid = 0x0, ia_address_len = 0x4, ia_prefix_oid_len = 0x0, 
ia_type = 0x1, ia_status = 0x1, ia_origin = 0x2, ia_storagetype = 0x2, 
arch_data = 0x8149b00}
(gdb) p /x 
*(netsnmp_ipaddress_entry*)((binary_array_table*)ipaddress_container->container_data)->data[1]
$112 = {oid_index = {len = 0x1, oids = 0x811d948}, ns_ia_index = 0x2, flags = 
0x0, ia_address = {0xa, 0xc8, 0xca, 0xec, 0x0 }, if_index = 
0x2, ia_prefix_oid = 0x0, ia_address_len = 0x4, ia_prefix_oid_len = 0x0, 
ia_type = 0x1, ia_status = 0x1, ia_origin = 0x2, ia_storagetype = 0x2, 
arch_data = 0x8264438}

(gdb) p /x 
*(netsnmp_ipaddress_entry*)((binary_array_table*)ipaddress_container->container_data)->data[2]
$113 = {oid_index = {len = 0x1, oids = 0x8130950}, ns_ia_index = 0x3, flags = 
0x0, ia_address = {0xa, 0x2, 0x64, 0x1, 0x0 }, if_index = 
0x3, ia_prefix_oid = 0x0, ia_address_len = 0x4, ia_prefix_oid_len = 0x0, 
ia_type = 0x1, ia_status = 0x1, ia_origin = 0x2, ia_storagetype = 0x2, 
arch_data = 0x812a660}
(gdb) p /x 
*(netsnmp_ipaddress_entry*)((binary_array_table*)ipaddress_container->container_data)->data[3]
$114 = {oid_index = {len = 0x1, oids = 0x8136148}, ns_ia_index = 0x4, flags = 
0x0, ia_address = {0xa, 0x2, 0x65, 0x1, 0x0 }, if_index = 
0x4, ia_prefix_oid = 0x0, ia_address_len = 0x4, ia_prefix_oid_len = 0x0, 
ia_type = 0x1, ia_status = 0x1, ia_origin = 0x2, ia_storagetype = 0x2, 
arch_data = 0x812a418}
(gdb) p /x 
*(netsnmp_ipaddress_entry*)((binary_array_table*)ipaddress_container->container_data)->data[4]
$115 = {oid_index = {len = 0x1, oids = 0x812fa20}, ns_ia_index = 0x5, flags = 
0x0, ia_address = {0xa, 0x2, 0x66, 0x1, 0x0 }, if_index = 
0x5, ia_prefix_oid = 0x0, ia_address_len = 0x4, ia_prefix_oid_len = 0x0, 
ia_type = 0x1, ia_status = 0x1, ia_origin = 0x2, ia_storagetype = 0x2, 
arch_data = 0x8131da0}

(gdb) p /x 
*(netsnmp_ipaddress_entry*)((binary_array_table*)ipaddress_container->container_data)->data[102]
$122 = {oid_index = {len = 0x1, oids = 0x8166610}, ns_ia_index = 0x67, flags = 
0x0, ia_address = {0x0 , 0x1}, if_index = 0x1, ia_prefix_oid 
= 0x0, ia_address_len = 0x10, ia_prefix_oid_len = 0x0, ia_type = 0x1, ia_status 
= 0x1, ia_origin = 0x2, ia_storagetype = 0x2, arch_data = 0x8166658}
(gdb) p /x 
*(netsnmp_ipaddress_entry*)((binary_array_table*)ipaddress_container->container_data)->data[103]
$123 = {oid_index = {len = 0x1, oids = 0x8166690}, ns_ia_index = 0x68, flags = 
0x0, ia_address = {0xfe, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x54, 0x0, 
0xff, 0xfe, 0x66, 0x0, 0x97}, if_index = 0x66, ia_prefix_oid = 0x0, 
ia_address_len = 0x10, ia_prefix_oid_len = 0x0, ia_type = 0x1, ia_status = 0x1, 
ia_origin = 0x5, ia_storagetype = 0x2, arch_data = 0x81666d8}
(gdb) p /x 
*(netsnmp_ipaddress_entry*)((binary_array_table*)ipaddress_container->container_data)->data[104]
$124 = {oid_index = {len = 0x1, oids = 0x82fd680}, ns_ia_index = 0x69, flags = 
0x0, ia_address = {0xfe, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x54, 0x0, 
0xff, 0xfe, 0x66, 0x0, 0x97}, if_index = 0x65, ia_prefix_oid = 0x0, 
ia_address_len = 0x10, ia_prefix_oid_len = 0x0, ia_type = 0x1, ia_status = 0x1, 
ia_o

Bug#510495: default install of snmpd leaks memory when VLAN interfaces present

2009-01-02 Thread Dave Johnson
Package: snmpd
Version: 5.2.3-7etch4
Severity: important


The default etch install of snmpd with default config will leak memory if there 
is 1 or more VLAN ethernet interfaces on the system.

This appears to be a regression between sarge and etch.

After some investigation I've found:

* leak occurs every 60 seconds
* leak occurs at a rate of 1094KB/day _per_ VLAN interface
* rate of leak is directly proportional to the number of VLAN interfaces
* leak occurs even if no snmp activity is happening (get, set, get next, trap, 
etc..)
* the VLAN interface must have an IPv4 address assigned
* the VLAN interface can be either UP or DOWN
* the name of the VLAN interface doesn't matter

How to recreate:

apt-get install vlan
add to /etc/network/interfaces:

> iface eth0.100 inet static
> address 10.2.100.1
> netmask 255.255.255.0
> broadcast 10.2.100.255

ifup eth0.100
watch snmpd grow...


start of test:
  USER   PID %CPU %MEMVSZ   RSS TTY  STAT START   TIME COMMAND
  snmp  1886  0.0  0.7   6784  3860 ?S22:06   0:00 
/usr/sbin/snmpd
after 10 hours:
  USER   PID %CPU %MEMVSZ   RSS TTY  STAT START   TIME COMMAND
  snmp  1886  0.0  0.8   7300  4316 ?SJan01   0:00 
/usr/sbin/snmpd


To amplify the effect, configure 100 VLANs instead of just 1

100 vlans configured:
start of test:
  USER   PID %CPU %MEMVSZ   RSS TTY  STAT START   TIME COMMAND
  snmp  4694  0.0  0.8   7184  4188 ?S09:16   0:00 
/usr/sbin/snmpd
after 20 minutes:
  USER   PID %CPU %MEMVSZ   RSS TTY  STAT START   TIME COMMAND
  snmp  4694  0.0  1.1   8732  5720 ?S09:16   0:00 
/usr/sbin/snmpd


-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-6-686
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages snmpd depends on:
ii  adduser3.102 Add and remove users and groups
ii  debconf1.5.11etch2   Debian configuration management sy
ii  libc6  2.3.6.ds1-13etch8 GNU C Library: Shared libraries
ii  libsensors31:2.10.1-3library to read temperature/voltag
ii  libsnmp9   5.2.3-7etch4  NET SNMP (Simple Network Managemen
ii  libwrap0   7.6.dbs-13Wietse Venema's TCP wrappers libra

snmpd recommends no packages.

-- debconf information:
  snmpd/upgradefrom521:
  snmpd/upgradefrom36:



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#433543: ifconfig is missing IPv6 address for interfaces with ifindex > 255

2007-07-17 Thread Dave Johnson
Package: net-tools
Version: 1.60-17
Tags: patch

When running 'ifconfig' it will not show any IPv6 addresses for
interfaces that have an ifindex > 255.

Because the kernel will increment the ifindex every time an interface
is added or removed, it is not necessary to have 256 interfaces at
once, just creating 256 interfaces since system boot and they will no
longer show IPv6 addresses.

This is due to an improper fscanf() maximum range argument.  Patch to
fix the problem is below.

Example:

st34:~# ip addr list dev eth1.110
268: [EMAIL PROTECTED]:  mtu 1500 qdisc noqueue 
link/ether 00:e0:81:2a:0d:2d brd ff:ff:ff:ff:ff:ff
inet6 fd4d:5643:2886:6e::ea:0/64 scope global 
   valid_lft forever preferred_lft forever
inet6 fe80::2e0:81ff:fe2a:d2d/64 scope link 
   valid_lft forever preferred_lft forever
st34:~# ifconfig eth1.110
eth1.110  Link encap:Ethernet  HWaddr 00:E0:81:2A:0D:2D  
  UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
  RX packets:0 errors:0 dropped:0 overruns:0 frame:0
  TX packets:8 errors:0 dropped:0 overruns:0 carrier:0
  collisions:0 txqueuelen:0 
  RX bytes:0 (0.0 b)  TX bytes:676 (676.0 b)

st34:~# grep eth1.110 /proc/net/if_inet6 
fd4d56432886006e00ea 10c 40 00 80 eth1.110
fe8002e081fffe2a0d2d 10c 40 20 80 eth1.110
st34:~# 


--- lib/interface.c.orig2007-06-18 13:51:41.0 -0400
+++ lib/interface.c 2007-06-18 13:52:04.0 -0400
@@ -718,7 +718,7 @@
 /* FIXME: should be integrated into interface.c.   */
 
 if ((f = fopen(_PATH_PROCNET_IFINET6, "r")) != NULL) {
-   while (fscanf(f, "%4s%4s%4s%4s%4s%4s%4s%4s %02x %02x %02x %02x %20s\n",
+   while (fscanf(f, "%4s%4s%4s%4s%4s%4s%4s%4s %08x %02x %02x %02x %20s\n",
  addr6p[0], addr6p[1], addr6p[2], addr6p[3],
  addr6p[4], addr6p[5], addr6p[6], addr6p[7],
  &if_idx, &plen, &scope, &dad_status, devname) != EOF) {



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]