[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#473573: marked as done (openssh-server: oom_adj tweak in init.d prevents upgrade inside vserver)



Your message dated Mon, 31 Mar 2008 15:32:07 +0000
with message-id <E1JgLzT-0006yw-OA@ries.debian.org>
and subject line Bug#473573: fixed in openssh 1:4.7p1-7
has caused the Debian Bug report #473573,
regarding openssh-server: oom_adj tweak in init.d prevents upgrade inside vserver
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
473573: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473573
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: openssh-server
Version: 1:4.7p1-6
Severity: normal

Hi.

The recently introduced OOM tweak with /proc/processnumber/oom_adj does not seem to be valid for SSH servers running inside a vserver if I get it right.

This results in upgrade being impossible :

Setting up openssh-server (1:4.7p1-6) ...
Restarting OpenBSD Secure Shell server: sshd.
/etc/init.d/ssh: line 78: /proc/22772/oom_adj: Operation not permitted
invoke-rc.d: initscript ssh, action "restart" failed.
dpkg: error processing openssh-server (--configure):
 subprocess post-installation script returned error exit status 1

Maybe this code should execute without any failure to block the whole init.d script to fail, thus allowing to still upgrade (and run) sshd in vservers ?

Hope this helps,

Best regards,

PS.: reporting from a testing host, but found the problem on a unstable vserver guest
-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-3-vserver-686 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages openssh-server depends on:
ii  adduser               3.106              add and remove users and groups
ii  debconf [debconf-2.0] 1.5.20             Debian configuration management sy
ii  dpkg                  1.14.16.6          package maintenance system for Deb
ii  libc6                 2.7-6              GNU C Library: Shared libraries
ii  libcomerr2            1.40.8-2           common error description library
ii  libkrb53              1.6.dfsg.3~beta1-4 MIT Kerberos runtime libraries
ii  libpam-modules        0.99.7.1-6         Pluggable Authentication Modules f
ii  libpam-runtime        0.99.7.1-6         Runtime support for the PAM librar
ii  libpam0g              0.99.7.1-6         Pluggable Authentication Modules l
ii  libselinux1           2.0.59-1           SELinux shared libraries
ii  libssl0.9.8           0.9.8g-8           SSL shared libraries
ii  libwrap0              7.6.dbs-14         Wietse Venema's TCP wrappers libra
ii  lsb-base              3.1-24             Linux Standard Base 3.1 init scrip
ii  openssh-client        1:4.7p1-5          secure shell client, an rlogin/rsh
ii  zlib1g                1:1.2.3.3.dfsg-11  compression library - runtime

Versions of packages openssh-server recommends:
ii  xauth                         1:1.0.3-1  X authentication utility

-- debconf information excluded



--- End Message ---
--- Begin Message ---
Source: openssh
Source-Version: 1:4.7p1-7

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive:

openssh-client-udeb_4.7p1-7_i386.udeb
  to pool/main/o/openssh/openssh-client-udeb_4.7p1-7_i386.udeb
openssh-client_4.7p1-7_i386.deb
  to pool/main/o/openssh/openssh-client_4.7p1-7_i386.deb
openssh-server-udeb_4.7p1-7_i386.udeb
  to pool/main/o/openssh/openssh-server-udeb_4.7p1-7_i386.udeb
openssh-server_4.7p1-7_i386.deb
  to pool/main/o/openssh/openssh-server_4.7p1-7_i386.deb
openssh_4.7p1-7.diff.gz
  to pool/main/o/openssh/openssh_4.7p1-7.diff.gz
openssh_4.7p1-7.dsc
  to pool/main/o/openssh/openssh_4.7p1-7.dsc
ssh-askpass-gnome_4.7p1-7_i386.deb
  to pool/main/o/openssh/ssh-askpass-gnome_4.7p1-7_i386.deb
ssh-krb5_4.7p1-7_all.deb
  to pool/main/o/openssh/ssh-krb5_4.7p1-7_all.deb
ssh_4.7p1-7_all.deb
  to pool/main/o/openssh/ssh_4.7p1-7_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 473573@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 31 Mar 2008 16:24:44 +0100
Source: openssh
Binary: openssh-client openssh-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb
Architecture: source all i386
Version: 1:4.7p1-7
Distribution: unstable
Urgency: low
Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description: 
 openssh-client - secure shell client, an rlogin/rsh/rcp replacement
 openssh-client-udeb - secure shell client for the Debian installer (udeb)
 openssh-server - secure shell server, an rshd replacement
 openssh-server-udeb - secure shell server for the Debian installer (udeb)
 ssh        - secure shell client and server (metapackage)
 ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad
 ssh-krb5   - secure shell client and server (transitional package)
Closes: 473573
Changes: 
 openssh (1:4.7p1-7) unstable; urgency=low
 .
   * Ignore errors writing to oom_adj (closes: #473573).
Files: 
 233a6bb8a9c137f116bae0be17f8f150 1104 net standard openssh_4.7p1-7.dsc
 92157ac379cb4b5212e05130a9e0a473 187829 net standard openssh_4.7p1-7.diff.gz
 9396993df83c63c47410e8daff99cf44 1042 net extra ssh_4.7p1-7_all.deb
 0cde03ba1bc08fc06226f70e5a4bf0e6 87958 net extra ssh-krb5_4.7p1-7_all.deb
 a5faf9cbc21aca53f6576438b5999162 662344 net standard openssh-client_4.7p1-7_i386.deb
 32eb8c333199dbc324eda487b368a0ac 245518 net optional openssh-server_4.7p1-7_i386.deb
 cffe125fe2488bfcf7deadbef826eba4 95448 gnome optional ssh-askpass-gnome_4.7p1-7_i386.deb
 4242bd0d353d6112c716bd1c37e2b524 158534 debian-installer optional openssh-client-udeb_4.7p1-7_i386.udeb
 4d7744c1f6221730594362423c14c46c 169112 debian-installer optional openssh-server-udeb_4.7p1-7_i386.udeb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Colin Watson <cjwatson@debian.org> -- Debian developer

iD8DBQFH8QMQ9t0zAhD6TNERAhMJAJ9fczyP8UeIL80umSMNLmQFjxcheQCaAw0X
e/R7sUfPvXsa1xzcgiJOkN4=
=NStF
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: