Get:1 http://ftp.freenet.de sarge/main bugzilla 2.16.7-7sarge1 [368kB]
~~~~~~~~~~~~~~!
# aptitude install bugzilla
Reading Package Lists... Done
Building Dependency Tree
Reading extended state information
Initializing package states... Done
The following packages have been kept back:
trac
The following NEW packages will be installed:
bugzilla
0 packages upgraded, 1 newly installed, 0 to remove and 1 not upgraded.
Need to get 0B/368kB of archives. After unpacking 1743kB will be used.
Writing extended state information... Done
Reading package fields... Done
Reading package status... Done
Retrieving bug reports... Done
Preconfiguring packages ...
CNTL-Z
:~# ps auxwwww |grep bugzilla
root 11730 4.4 7.1 21104 18168 pts/0 T 12:01 0:03 aptitude
install bugzilla
root 11761 4.8 0.4 2276 1156 pts/0 T 12:01 0:03 /bin/bash -e
/tmp/bugzilla.config.117591 configure
bugzilla.config.113051 bugzilla.config.117591 bugzilla.config.128731
bugzilla.config.199701
:~# ll /tmp/bugzilla.config.1*
-rwxr-xr-x 1 root root 6616 /tmp/bugzilla.config.199701
#!/bin/bash -e
# Source debconf library.
. /usr/share/debconf/confmodule
# Establish the preliminaries.
db_version 2.0
db_capb backup
# Use a state machine to allow jumping back to previous questions.
STATE=10
while [ "$STATE" != 0 -a "$STATE" != 90 ]; do
case "$STATE" in
10)
..
if dpkg --compare-versions "$2" lt-nl "2.16rc1-2"; then
if echo 'b195bf3871949f2e123741320e8d06e7
/var/lib/bugzilla/web/index.html' | md5sum -c 2>&- \
|| echo 'dd5dfdb92fe5013a80e3c645d0610e00
/var/lib/bugzilla/web/index.html' | md5sum -c 2>&-;then
STATE=90
else
db_input high bugzilla/index_upgrade2 ||
true
if db_go; then
STATE=90
else
STATE=70
fi
fi
else
STATE=90
fi
:~# ll /var/lib/bugzilla/
ls: /var/lib/bugzilla/: No such file or directory
:~# strace -f -p 11761
Process 11761 attached - interrupt to quit
--- SIGSTOP (Stopped (signal)) @ 0 (0) ---
rt_sigprocmask(SIG_SETMASK, [RTMIN], NULL, 8) = 0
rt_sigprocmask(SIG_BLOCK, NULL, [RTMIN], 8) = 0
rt_sigprocmask(SIG_SETMASK, [RTMIN], NULL, 8) = 0
rt_sigprocmask(SIG_BLOCK, NULL, [RTMIN], 8) = 0
rt_sigprocmask(SIG_BLOCK, NULL, [RTMIN], 8) = 0
fcntl64(1, F_GETFD) = 0
fcntl64(1, F_DUPFD, 10) = 10
fcntl64(1, F_GETFD) = 0
fcntl64(10, F_SETFD, FD_CLOEXEC) = 0
dup2(3, 1) = 1
fcntl64(3, F_GETFD) = 0
write(1, "RESET bugzilla/bugzilla_admin_na"..., 35) = 35
dup2(10, 1) = 1
fcntl64(10, F_GETFD) = 0x1 (flags FD_CLOEXEC)
close(10) = 0
ioctl(0, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfffee38) = -1 EINVAL (Invalid
argument)
_llseek(0, 0, 0xbfffeea4, SEEK_CUR) = -1 ESPIPE (Illegal seek)
:~# strace -f -p 12875
Process 12875 attached - interrupt to quit
read(0, "0", 1) = 1
read(0, " ", 1) = 1
read(0, "v", 1) = 1
read(0, "a", 1) = 1
read(0, "l", 1) = 1
read(0, "u", 1) = 1
read(0, "e", 1) = 1
read(0, " ", 1) = 1
read(0, "s", 1) = 1
read(0, "e", 1) = 1
read(0, "t", 1) = 1
read(0, "\n", 1) = 1
rt_sigprocmask(SIG_SETMASK, [RTMIN], NULL, 8) = 0
rt_sigprocmask(SIG_BLOCK, NULL, [RTMIN], 8) = 0
rt_sigprocmask(SIG_BLOCK, NULL, [RTMIN], 8) = 0
fcntl64(1, F_GETFD) = 0
fcntl64(1, F_DUPFD, 10) = 10
fcntl64(1, F_GETFD) = 0
fcntl64(10, F_SETFD, FD_CLOEXEC) = 0
dup2(3, 1) = 1
fcntl64(3, F_GETFD) = 0
write(1, "BEGINBLOCK \n", 12) = 12
dup2(10, 1) = 1
fcntl64(10, F_GETFD) = 0x1 (flags FD_CLOEXEC)
close(10) = 0
ioctl(0, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbffff0c8) = -1 EINVAL (Invalid
argument)
_llseek(0, 0, 0xbffff134, SEEK_CUR) = -1 ESPIPE (Illegal seek)
read(0, "0", 1) = 1
read(0, "\n", 1) = 1
rt_sigprocmask(SIG_SETMASK, [RTMIN], NULL, 8) = 0
rt_sigprocmask(SIG_BLOCK, NULL, [RTMIN], 8) = 0
rt_sigprocmask(SIG_BLOCK, NULL, [RTMIN], 8) = 0
fcntl64(1, F_GETFD) = 0
fcntl64(1, F_DUPFD, 10) = 10
fcntl64(1, F_GETFD) = 0
fcntl64(10, F_SETFD, FD_CLOEXEC) = 0
dup2(3, 1) = 1
fcntl64(3, F_GETFD) = 0
write(1, "INPUT high bugzilla/bugzilla_adm"..., 40) = 40
dup2(10, 1) = 1
fcntl64(10, F_GETFD) = 0x1 (flags FD_CLOEXEC)
close(10) = 0
ioctl(0, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbffff0c8) = -1 EINVAL (Invalid
argument)
_llseek(0, 0, 0xbffff134, SEEK_CUR) = -1 ESPIPE (Illegal seek)
read(0, "3", 1) = 1
read(0, "0", 1) = 1
read(0, " ", 1) = 1
read(0, "q", 1) = 1
read(0, "u", 1) = 1
read(0, "e", 1) = 1
read(0, "s", 1) = 1
read(0, "t", 1) = 1
read(0, "i", 1) = 1
read(0, "o", 1) = 1
read(0, "n", 1) = 1
read(0, " ", 1) = 1
read(0, "s", 1) = 1
read(0, "k", 1) = 1
read(0, "i", 1) = 1
read(0, "p", 1) = 1
read(0, "p", 1) = 1
read(0, "e", 1) = 1
read(0, "d", 1) = 1
read(0, "\n", 1) = 1
rt_sigprocmask(SIG_SETMASK, [RTMIN], NULL, 8) = 0
rt_sigprocmask(SIG_BLOCK, NULL, [RTMIN], 8) = 0
rt_sigprocmask(SIG_BLOCK, NULL, [RTMIN], 8) = 0
fcntl64(1, F_GETFD) = 0
fcntl64(1, F_DUPFD, 10) = 10
fcntl64(1, F_GETFD) = 0
fcntl64(10, F_SETFD, FD_CLOEXEC) = 0
dup2(3, 1) = 1
fcntl64(3, F_GETFD) = 0
write(1, "INPUT high bugzilla/bugzilla_adm"..., 45) = 45
dup2(10, 1) = 1
fcntl64(10, F_GETFD) = 0x1 (flags FD_CLOEXEC)
close(10) = 0
ioctl(0, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbffff168) = -1 EINVAL (Invalid
argument)
_llseek(0, 0, 0xbffff1d4, SEEK_CUR) = -1 ESPIPE (Illegal seek)
read(0, "3", 1) = 1
read(0, "0", 1) = 1
read(0, " ", 1) = 1
read(0, "q", 1) = 1
read(0, "u", 1) = 1
read(0, "e", 1) = 1
read(0, "s", 1) = 1
read(0, "t", 1) = 1
read(0, "i", 1) = 1
read(0, "o", 1) = 1
read(0, "n", 1) = 1
read(0, " ", 1) = 1
read(0, "s", 1) = 1
read(0, "k", 1) = 1
read(0, "i", 1) = 1
read(0, "p", 1) = 1
read(0, "p", 1) = 1
read(0, "e", 1) = 1
read(0, "d", 1) = 1
read(0, "\n", 1) = 1
rt_sigprocmask(SIG_SETMASK, [RTMIN], NULL, 8) = 0
rt_sigprocmask(SIG_BLOCK, NULL, [RTMIN], 8) = 0
rt_sigprocmask(SIG_BLOCK, NULL, [RTMIN], 8) = 0
fcntl64(1, F_GETFD) = 0
fcntl64(1, F_DUPFD, 10) = 10
fcntl64(1, F_GETFD) = 0
fcntl64(10, F_SETFD, FD_CLOEXEC) = 0
dup2(3, 1) = 1
fcntl64(3, F_GETFD) = 0
write(1, "INPUT high bugzilla/bugzilla_adm"..., 39) = 39
dup2(10, 1) = 1
fcntl64(10, F_GETFD) = 0x1 (flags FD_CLOEXEC)
close(10) = 0
ioctl(0, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbffff188) = -1 EINVAL (Invalid
etc...
Rainer---<=====> Vertraulich
//
//
<=====>--------------ocholl, Kiel, Germany ------------
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]