Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 301615 Details for
Bug 441467
pup backtraced while getting package info
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
backtrace from crashed pup
pup.backtrace (text/plain), 18.11 KB, created by
Michal Nowak
on 2008-04-08 09:38:14 UTC
(
hide
)
Description:
backtrace from crashed pup
Filename:
MIME Type:
Creator:
Michal Nowak
Created:
2008-04-08 09:38:14 UTC
Size:
18.11 KB
patch
obsolete
>Component: pirut >Summary: TB9536d0ca <string>:64:__iter__:SyntaxError: not well-formed (invalid token): line 33869, column 63 > >Traceback (most recent call last): > File "/usr/sbin/pup", line 617, in ? > main() > File "/usr/sbin/pup", line 613, in main > pup.run() > File "/usr/sbin/pup", line 451, in run > self.doRefresh() > File "/usr/sbin/pup", line 291, in doRefresh > self.populateUpdates() > File "/usr/sbin/pup", line 347, in populateUpdates > self.updateMetadata.add(repo) > File "/usr/lib/python2.4/site-packages/yum/update_md.py", line 272, in add > for event, elem in iterparse(infile): > File "<string>", line 64, in __iter__ >SyntaxError: not well-formed (invalid token): line 33869, column 63 > >Local variables in innermost frame: >b: <TreeBuilder object at 0xc115758> >self: <iterparse object at 0xc0b34ac> >event: ('end', <Element 'filename' at 0xc9d0bf0>) >p: <XMLParser object at 0xbd34b30> >data: <sum type="md5">a9050fef4cafa039da7036f77685e7ad</sum> > </package> > <package name="python-setuptools" version="0.6c5" release="2.el5" epoch="0" arch="noarch" src="python-setuptools-0.6c5-2.el5.src.rpm"> > <filename>python-setuptools-0.6c5-2.el5.noarch.rpm</filename> > <sum type="md5">f8ce022407d83a89155dc726ee28e0cd</sum> > </package> > </collection> > </pkglist> > </update> <update from="security@redhat.com" status="final" type="bugfix" version="2"> > <id>RHBA-2008:8032-2</id> > <title>RHBA-2008:8032</title> > <issued date="2008-03-03 06:00:00"/> > <updated date="2008-03-10 05:00:00"/> > <description>spamassassin major bug fix update > >SpamAssassin provides a way to reduce unsolicited commercial email (spam) >from incoming email. > >This updated package upgrades spam assassin to the 3.2.x branch, which adds >several enhancements, including: > >* the active SpamAssassin ruleset is now compiled into a fast >parallel-matching deterministic finite automaton (DFA) that runs as native >object code. > >* the 127.* network range is now always considered trusted and internal, >regardless of configuration. > >* when using the same ruleset, the 3.2.x core code uses less RAM than the >3.1.x release. > >The 3.2.4 release of the 3.2 branch is a major bug fix release, correcting >numerous bugs, including: > >* the 'ALL' header was including spurious extra spaces between header names >and values. It no longer does this. > >* 'score set for a non-existent rule' is now a debug message instead of a >lint warning. > >* sa-compile failed to correctly deal with escaped backslashes. > >All SpamAssassin users should upgrade to this updated package, which adds >these enhancements and fixes these bugs.</description> > <references> > </references> > <pkglist> > <collection short="rhel-i386-server-5"> > <name>Red Hat Enterprise Linux (v. 5 for 32-bit x86)</name> > <package name="spamassassin" version="3.2.4" release="1.el5" epoch="0" arch="x86_64" src="spamassassin-3.2.4-1.el5.src.rpm"> > <filename>spamassassin-3.2.4-1.el5.x86_64.rpm</filename> > <sum type="md5">c06021684a2d05a6febf839377bcf8d1</sum> > </package> > <package name="spamassassin" version="3.2.4" release="1.el5" epoch="0" arch="i386" src="spamassassin-3.2.4-1.el5.src.rpm"> > <filename>spamassassin-3.2.4-1.el5.i386.rpm</filename> > <sum type="md5">0a4268aa5a44d176980cb5733e1dbd20</sum> > </package> > </collection> > </pkglist> > </update> <update from="security@redhat.com" status="final" type="enhancement" version="1"> > <id>RHEA-2008:8046-1</id> > <title>RHEA-2008:8046</title> > <issued date="2008-03-11 05:00:00"/> > <updated date="2008-03-11 05:00:00"/> > <description>libhugetlbfs enhancement update > >The libhugetlbfs library interacts with the Linux hugetlbfs to make large >pages available to applications in a transparent manner. > >The new version contains several enhancements and bug fixes. > >Users should upgrade to this updated package.</description> > <references> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=432799" id="432799" type="bugzilla"> > ['Error: libhugetlbfs conflicts with libhugetlbfs-lib < 1.2'] > </reference> > </references> > <pkglist> > <collection short="rhel-i386-server-5"> > <name>Red Hat Enterprise Linux (v. 5 for 32-bit x86)</name> > <package name="libhugetlbfs" version="1.2" release="5.el5" epoch="0" arch="i386" src="libhugetlbfs-1.2-5.el5.src.rpm"> > <filename>libhugetlbfs-1.2-5.el5.i386.rpm</filename> > <sum type="md5">b383b45cb5f062be3d4659bb5b63e605</sum> > </package> > <package name="libhugetlbfs-devel" version="1.2" release="5.el5" epoch="0" arch="i386" src="libhugetlbfs-1.2-5.el5.src.rpm"> > <filename>libhugetlbfs-devel-1.2-5.el5.i386.rpm</filename> > <sum type="md5">e95f6e748e58a92b573a3013dcac0165</sum> > </package> > <package name="libhugetlbfs" version="1.2" release="5.el5" epoch="0" arch="x86_64" src="libhugetlbfs-1.2-5.el5.src.rpm"> > <filename>libhugetlbfs-1.2-5.el5.x86_64.rpm</filename> > <sum type="md5">62bfb14a72de9c3dd003aac860c4f10e</sum> > </package> > <package name="libhugetlbfs-devel" version="1.2" release="5.el5" epoch="0" arch="x86_64" src="libhugetlbfs-1.2-5.el5.src.rpm"> > <filename>libhugetlbfs-devel-1.2-5.el5.x86_64.rpm</filename> > <sum type="md5">3dc35021aa895857e4794db718c5e7ab</sum> > </package> > </collection> > </pkglist> > </update> <update from="security@redhat.com" status="final" type="bugfix" version="2"> > <id>RHBA-2008:8045-2</id> > <title>RHBA-2008:8045</title> > <issued date="2008-01-11 06:00:00"/> > <updated date="2008-03-13 05:00:00"/> > <description>OpenIPMI bug fix update > >The OpenIPMI (Intelligent Platform Management Interface) provides command >line tools and utilities to access platform information for system >administrators to monitor system health and manage systems. > >When using ipmitool, a user can authenticate with a key and/or a password. >If the user does not want to have his/her password shown in a ps listing, >they can use the option '-a' to be prompted for it and not appear in the >PID/cmdline. But if they want to use a key, this one will be always shown >as there is no possibility to be prompted for the key. A new commandline >option '-K' has been added with this update that allows the key to be >hidden now, too. > >The ipmicmd in OpenIPMI-tools apparently has no way of obscuring / hiding >user passwords on the command line. If a password is supplied on the >command line, it can easily be picked up by running 'ps'. An new option >'-p' which is similar to the "-a" option in ipmitool has now been added to >ipmicmd, so that a user can supply a password without the worry of it being >easily exposed. > >If a user sets up a SOL session in one window ('sol activate'), and >deactivates that SOL session in a different window ('sol deactivate'), the >SOL session in the original window appears to hang temporarily, but then >throws a segmentation fault. The cause was that there are cases where the >SOL packets could be missed, making ipmi_lan_poll_recv() return a NULL >pointer. This is fine as long as there is a safety check which there >wasn't. The fix now adds that check to catch these cases properly. > >The manpage for ipmitool was missing descriptions for two new commands, >namely priv and looptest. The fix now adds both commands to the manpage >with a proper description. > >The OpenIPMI-python subpackage had a typo in its RPM description. This has >been corrected. > >All users of the OpenIPMI package are encouraged to upgrade to the >updated package.</description> > <references> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=238970" id="238970" type="bugzilla"> > ["ipmitool doesn't propose to hide the key as '-a' does for password."] > </reference> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=242403" id="242403" type="bugzilla"> > ['manpage for ipmitool needs to document loopback feature of sol'] > </reference> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=306941" id="306941" type="bugzilla"> > ['ipmitool SOL session segfaults'] > </reference> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=314031" id="314031" type="bugzilla"> > ['Typo in OpenIPMI-python package description'] > </reference> > </references> > <pkglist> > <collection short="rhel-i386-server-5"> > <name>Red Hat Enterprise Linux (v. 5 for 32-bit x86)</name> > <package name="OpenIPMI-libs" version="2.0.6" release="6.el5" epoch="0" arch="i386" src="OpenIPMI-2.0.6-6.el5.src.rpm"> > <filename>OpenIPMI-libs-2.0.6-6.el5.i386.rpm</filename> > <sum type="md5">eb5e45d037fc301bf04205da8a1c5eb0</sum> > </package> > <package name="OpenIPMI-devel" version="2.0.6" release="6.el5" epoch="0" arch="i386" src="OpenIPMI-2.0.6-6.el5.src.rpm"> > <filename>OpenIPMI-devel-2.0.6-6.el5.i386.rpm</filename> > <sum type="md5">b2e62602865a2521bdc572513bd6a25b</sum> > </package> > <package name="OpenIPMI" version="2.0.6" release="6.el5" epoch="0" arch="x86_64" src="OpenIPMI-2.0.6-6.el5.src.rpm"> > <filename>OpenIPMI-2.0.6-6.el5.x86_64.rpm</filename> > <sum type="md5">52deebc30ee81a566926a1c0d2708ddd</sum> > </package> > <package name="OpenIPMI-libs" version="2.0.6" release="6.el5" epoch="0" arch="x86_64" src="OpenIPMI-2.0.6-6.el5.src.rpm"> > <filename>OpenIPMI-libs-2.0.6-6.el5.x86_64.rpm</filename> > <sum type="md5">bc5dd1d53816b3170be52cacbf74b7e2</sum> > </package> > <package name="OpenIPMI-perl" version="2.0.6" release="6.el5" epoch="0" arch="x86_64" src="OpenIPMI-2.0.6-6.el5.src.rpm"> > <filename>OpenIPMI-perl-2.0.6-6.el5.x86_64.rpm</filename> > <sum type="md5">1c10bbe9e8118ecbc3c88a4d010cbf71</sum> > </package> > <package name="OpenIPMI-python" version="2.0.6" release="6.el5" epoch="0" arch="x86_64" src="OpenIPMI-2.0.6-6.el5.src.rpm"> > <filename>OpenIPMI-python-2.0.6-6.el5.x86_64.rpm</filename> > <sum type="md5">de984282e7fce34b09a8db60b0bf0048</sum> > </package> > <package name="OpenIPMI-tools" version="2.0.6" release="6.el5" epoch="0" arch="x86_64" src="OpenIPMI-2.0.6-6.el5.src.rpm"> > <filename>OpenIPMI-tools-2.0.6-6.el5.x86_64.rpm</filename> > <sum type="md5">5ae4d0eee6744f31123a6ddd5ab6a2b5</sum> > </package> > <package name="OpenIPMI-devel" version="2.0.6" release="6.el5" epoch="0" arch="x86_64" src="OpenIPMI-2.0.6-6.el5.src.rpm"> > <filename>OpenIPMI-devel-2.0.6-6.el5.x86_64.rpm</filename> > <sum type="md5">4d9acacb0420d149f1a651d33be5f200</sum> > </package> > <package name="OpenIPMI" version="2.0.6" release="6.el5" epoch="0" arch="i386" src="OpenIPMI-2.0.6-6.el5.src.rpm"> > <filename>OpenIPMI-2.0.6-6.el5.i386.rpm</filename> > <sum type="md5">bd106b7194f6e3da0ef0558588a4e12f</sum> > </package> > <package name="OpenIPMI-perl" version="2.0.6" release="6.el5" epoch="0" arch="i386" src="OpenIPMI-2.0.6-6.el5.src.rpm"> > <filename>OpenIPMI-perl-2.0.6-6.el5.i386.rpm</filename> > <sum type="md5">37b3c75fea11ac3611da6c01e585fa44</sum> > </package> > <package name="OpenIPMI-python" version="2.0.6" release="6.el5" epoch="0" arch="i386" src="OpenIPMI-2.0.6-6.el5.src.rpm"> > <filename>OpenIPMI-python-2.0.6-6.el5.i386.rpm</filename> > <sum type="md5">0e46275fe3b3ea3ea87a19009eff5ff5</sum> > </package> > <package name="OpenIPMI-tools" version="2.0.6" release="6.el5" epoch="0" arch="i386" src="OpenIPMI-2.0.6-6.el5.src.rpm"> > <filename>OpenIPMI-tools-2.0.6-6.el5.i386.rpm</filename> > <sum type="md5">3c3155bf1509125454789a5eb1e18bb4</sum> > </package> > </collection> > </pkglist> > </update> <update from="security@redhat.com" status="final" type="bugfix" version="2"> > <id>RHBA-2008:8121-2</id> > <title>RHBA-2008:8121</title> > <issued date="2008-01-18 06:00:00"/> > <updated date="2008-03-13 05:00:00"/> > <description>python httplib module bug fix update > >Python is an interpreted, interactive, object-oriented programming >language. httplib is a module in python for use with the HTTP protocol. > >These updated python packages fix a bug in which httplib would fail on >chunked responses with trailers. > >Users are advised to upgrade to these updated python packages, which >resolve this issue. ></description> > <references> > </references> > <pkglist> > <collection short="rhel-i386-server-5"> > <name>Red Hat Enterprise Linux (v. 5 for 32-bit x86)</name> > <package name="python-devel" version="2.4.3" release="21.el5" epoch="0" arch="i386" src="python-2.4.3-21.el5.src.rpm"> > <filename>python-devel-2.4.3-21.el5.i386.rpm</filename> > <sum type="md5">b5b17a32568cc9127e4a5ba910e64400</sum> > </package> > <package name="python-devel" version="2.4.3" release="21.el5" epoch="0" arch="x86_64" src="python-2.4.3-21.el5.src.rpm"> > <filename>python-devel-2.4.3-21.el5.x86_64.rpm</filename> > <sum type="md5">81e1086ee6b7e09ae78e56019783f432</sum> > </package> > <package name="python-tools" version="2.4.3" release="21.el5" epoch="0" arch="x86_64" src="python-2.4.3-21.el5.src.rpm"> > <filename>python-tools-2.4.3-21.el5.x86_64.rpm</filename> > <sum type="md5">cd1401f49605c538fb3cb4d687556a28</sum> > </package> > <package name="python" version="2.4.3" release="21.el5" epoch="0" arch="x86_64" src="python-2.4.3-21.el5.src.rpm"> > <filename>python-2.4.3-21.el5.x86_64.rpm</filename> > <sum type="md5">fb9d7380c87f05154eab9ecf1e6bba17</sum> > </package> > <package name="tkinter" version="2.4.3" release="21.el5" epoch="0" arch="x86_64" src="python-2.4.3-21.el5.src.rpm"> > <filename>tkinter-2.4.3-21.el5.x86_64.rpm</filename> > <sum type="md5">8853483564812e877ebc4081df5eb0cb</sum> > </package> > <package name="python-tools" version="2.4.3" release="21.el5" epoch="0" arch="i386" src="python-2.4.3-21.el5.src.rpm"> > <filename>python-tools-2.4.3-21.el5.i386.rpm</filename> > <sum type="md5">ddddd3188446f467106c07785045eb9d</sum> > </package> > <package name="tkinter" version="2.4.3" release="21.el5" epoch="0" arch="i386" src="python-2.4.3-21.el5.src.rpm"> > <filename>tkinter-2.4.3-21.el5.i386.rpm</filename> > <sum type="md5">f103a4bc0c5414c15c08dbaf63dc760a</sum> > </package> > <package name="python" version="2.4.3" release="21.el5" epoch="0" arch="i386" src="python-2.4.3-21.el5.src.rpm"> > <filename>python-2.4.3-21.el5.i386.rpm</filename> > <sum type="md5">9a022681c5e17c7692fbc87a938b106f</sum> > </package> > </collection> > </pkglist> > </update> <update from="security@redhat.com" status="final" type="bugfix" version="4"> > <id>RHBA-2008:8212-4</id> > <title>RHBA-2008:8212</title> > <issued date="2008-03-03 06:00:00"/> > <updated date="2008-03-14 05:00:00"/> > <description>util-linux bug fix update > >The util-linux package contains a collection of basic system utilities, >such as fdisk and login. > >In the previous util-linux package, when a system with iSCSI devices >experienced network problems, causing I/O errors, and the system was >restarted, "/etc/rc.d/rc.sysinit" did not force a fsck check on the iSCSI >devices, as it would for other locally attached disks. > >In this updated package, a new mount option, "_rnetdev", has been added. >The "_rnetdev" option is similar to "_netdev", except that a "fsck -a" >check is run on iSCSI devices during rc.sysinit. This fsck check is >required for iSCSI root devices. > >Users of util-linux are advised to upgrade to this updated package, which >resolves this issue.</description> > <references> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=435722" id="435722" type="bugzilla"> > ["iscsi root device never gets fscked when there's an i/o error"] > </reference> > </references> > <pkglist> > <collection short="rhel-i386-server-5"> > <name>Red Hat Enterprise Linux (v. 5 for 32-bit x86)</name> > <package name="util-linux" version="2.13" release="0.47.el5" epoch="0" arch="x86_64" src="util-linux-2.13-0.47.el5.src.rpm"> > <filename>util-linux-2.13-0.47.el5.x86_64.rpm</filename> > <sum type="md5">bd781dea06825fb41e10528a00dca992</sum> > </package> > <package name="util-linux" version="2.13" release="0.47.el5" epoch="0" arch="i386" src="util-linux-2.13-0.47.el5.src.rpm"> > <filename>util-linux-2.13-0.47.el5.i386.rpm</filename> > <sum type="md5">e4a4568f175155653c05fa8c1f47f18e</sum> > </package> > </collection> > </pkglist> > </update> <update from="security@redhat.com" s >events: [('end', <Element 'sum' at 0xc9d0c08>), ('end', <Element 'package' at 0xc9d0bd8>), ('end', <Element 'filename' at 0xc9d0c38>), ('end', <Element 'sum' at 0xc9d0c50>), ('end', <Element 'package' at 0xc9d0c20>), ('end', <Element 'collection' at 0xc9d0ba8>), ('end', <Element 'pkglist' at 0xc9d0b90>), ('end', <Element 'update' at 0xc9d0ae8>), ('end', <Element 'id' at 0xc9d0c80>), ('end', <Element 'title' at 0xc9d0c98>), ('end', <Element 'issued' at 0xc9d0cb0>), ('end', <Element 'updated' at 0xc9d0cc8>), ('end', <Element 'description' at 0xc9d0ce0>), ('end', <Element 'references' at 0xc9d0cf8>), ('end', <Element 'name' at 0xc9d0d40>), ('end', <Element 'filename' at 0xc9d0d70>), ('end', <Element 'sum' at 0xc9d0d88>), ('end', <Element 'package' at 0xc9d0d58>), ('end', <Element 'filename' at 0xc9d0db8>), ('end', <Element 'sum' at 0xc9d0dd0>), ('end', <Element 'package' at 0xc9d0da0>), ('end', <Element 'collection' at 0xc9d0d28>), ('end', <Element 'pkglist' at 0xc9d0d10>), ('end', <Element 'update' at 0xc9d0c68>), ('end', <Element 'id' at 0xc9d0e00>), ('end', <Element 'title' at 0xc9d0e18>), ('end', <Element 'issued' at 0xc9d0e30>), ('end', <Element 'updated' at 0xc9d0e48>), ('end', <Element 'description' at 0xc9d0e60>)]
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 441467
: 301615 |
302578