Bug#1053596: ecryptfs-utils: Please add the walkaround from archlinux wiki to avoid repetitive mount

2023-10-07 Thread Mad Horse
Package: ecryptfs-utils
Version: 111-6
Severity: wishlist

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

* What led up to the situation?
* What exactly did you do (or not do) that was effective (or
ineffective)?
* What was the outcome of this action?
* What outcome did you expect instead?

*** End of the template - remove these template lines ***

To resolve issue like https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=967056
, a walkaround documented on https://wiki.archlinux.org/title/ECryptfs#Auto-
mounting could be used, and it could even be applied via a modification to
/usr/share/pam-configs/ecryptfs-utils as done in the attached patch.

Could this be included?


-- System Information:
Debian Release: trixie/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.5.0-1-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=zh_CN.utf8, LC_CTYPE=zh_CN.utf8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages ecryptfs-utils depends on:
ii gettext-base 0.21-13+b1
ii keyutils 1.6.3-2
ii libc6 2.37-12
ii libecryptfs1 111-6
ii libgpgme11 1.18.0-3+b1
ii libkeyutils1 1.6.3-2
ii libpam-runtime 1.5.2-7
ii libpam0g 1.5.2-7
ii libtspi1 0.3.15-0.3

ecryptfs-utils recommends no packages.

Versions of packages ecryptfs-utils suggests:
ii cryptsetup 2:2.6.1-5
ii rsync 3.2.7-1

-- debconf-show failed

-- debsums errors found:
debsums: changed file /usr/share/pam-configs/ecryptfs-utils (from 
ecryptfs-utils package)

--- /usr/share/pam-configs/ecryptfs-utils.orig  2023-10-07 15:15:52.830703449 
+0800
+++ /usr/share/pam-configs/ecryptfs-utils   2023-10-07 15:16:43.147178744 
+0800
@@ -3,9 +3,11 @@ Default: yes
 Priority: 0
 Auth-Type: Additional
 Auth-Final:
+   [success=1 default=ignore] pam_succeed_if.so service = systemd-user 
quiet
requiredpam_ecryptfs.so unwrap
 Session-Type: Additional
 Session-Final:
+   [success=1 default=ignore] pam_succeed_if.so service = systemd-user 
quiet
optionalpam_ecryptfs.so unwrap
 Password-Type: Additional
 Password-Final:



Bug#1019426: openssh-client: ssh-agent can leave zombie ssh-pkcs11-help

2023-09-26 Thread Mad Horse
Confirmed on openssh-client 1:9.4p1-1, ssh-agent seems not going to pick its 
dead children processes with wait(), no matter how they die. For example, 
running `ssh-add -s /usr/lib/x86_64-linux-gnu/opensc-pkcs11.so` with a smart 
card present will make ssh-agent spawn a ssh-pkcs11-helper to handle it, but 
the child will always become a zombie without being wait(2)ed after it dies, 
either terminating gracefully after running `ssh-add -e 
/usr/lib/x86_64-linux-gnu/opensc-pkcs11.so`, or being kill(2)ed.



Bug#1051671: gdm3 no longer respects /etc/gdm3/greeter.dconf-defaults or its dconf settings, especially those for power

2023-09-11 Thread Mad Horse
Package: gdm3
Version: 45~beta-1
Severity: normal

Dear Maintainer,

As suggested in https://gitlab.gnome.org/GNOME/gnome-control-center/-/issues/22
I have been setting /org/gnome/settings-daemon/plugins/power/sleep-inactive-
ac-timeout to 0 for gdm3 to prevent it from suspending the computer when no one
is logging in, either from /etc/gdm3/greeter.dconf-defaults, or via `dbus-
launch dconf write /org/gnome/settings-daemon/plugins/power/sleep-inactive-ac-
timeout 0` running as Debian-gdm, but after gdm3 is upgraded to 45~beta-1, this
setting is no longer effective, and I have no idea how to prevent my computer
from suspending 20 minutes after the last user logs out.

Downgrading gdm3 to 44.1-2 can temporary fix this issue: On gdm3 44.1-2,
setting /org/gnome/settings-daemon/plugins/power/sleep-inactive-ac-timeout to
60 from either way can make the computer suspended 1 minute later, but on gdm3
45~beta-1, it will always be suspended 20 minute later, regardless of the
setting.


-- System Information:
Debian Release: trixie/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.4.0-4-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=zh_CN.utf8, LC_CTYPE=zh_CN.utf8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages gdm3 depends on:
ii accountsservice 23.13.9-4
ii adduser 3.137
ii cdebconf [debconf-2.0] 0.270
ii dbus [default-dbus-system-bus] 1.14.10-1
ii dbus-bin 1.14.10-1
ii dbus-daemon 1.14.10-1
ii dconf-cli 0.40.0-4
ii dconf-gsettings-backend 0.40.0-4
ii debconf [debconf-2.0] 1.5.82
ii gir1.2-gdm-1.0 45~beta-1
ii gnome-session [x-session-manager] 44.0-3
ii gnome-session-bin 44.0-3
ii gnome-session-common 44.0-3
ii gnome-session-flashback [x-session-manager] 3.49.1-1
ii gnome-settings-daemon 45~beta-1
ii gnome-shell 44.4-1
ii gnome-terminal [x-terminal-emulator] 3.49.99-1
ii gsettings-desktop-schemas 44.0-2
ii libaccountsservice0 23.13.9-4
ii libaudit1 1:3.1.1-1
ii libc6 2.37-7
ii libcanberra-gtk3-0 0.30-10
ii libcanberra0 0.30-10
ii libgdk-pixbuf-2.0-0 2.42.10+dfsg-1+b1
ii libgdm1 45~beta-1
ii libglib2.0-0 2.77.3-1
ii libglib2.0-bin 2.77.3-1
ii libgtk-3-0 3.24.38-4
ii libgudev-1.0-0 237-2
ii libkeyutils1 1.6.3-2
ii libpam-modules 1.5.2-7
ii libpam-runtime 1.5.2-7
ii libpam-systemd [logind] 254.1-2
ii libpam0g 1.5.2-7
ii librsvg2-common 2.54.7+dfsg-2
ii libselinux1 3.5-1
ii libsystemd0 254.1-2
ii libx11-6 2:1.8.6-1
ii libxau6 1:1.0.9-1
ii libxcb1 1.15-1
ii libxdmcp6 1:1.1.2-3
ii lxterminal [x-terminal-emulator] 0.4.0-2
ii metacity [x-window-manager] 1:3.49.1-1
ii mlterm [x-terminal-emulator] 3.9.3-1
ii mutter [x-window-manager] 44.4-2
ii polkitd 123-1
ii procps 2:4.0.3-1
ii systemd-sysv 254.1-2
ii tilix [x-terminal-emulator] 1.9.5-2
ii ucf 3.0043+nmu1
ii x11-common 1:7.7+23
ii x11-xserver-utils 7.7+9+b1
ii xterm [x-terminal-emulator] 384-1

Versions of packages gdm3 recommends:
ii at-spi2-core 2.49.91-2
ii desktop-base 12.0.6+nmu1
ii gnome-session [x-session-manager] 44.0-3
ii gnome-session-flashback [x-session-manager] 3.49.1-1
ii x11-xkb-utils 7.7+7
ii xserver-xephyr 2:21.1.8-1
ii xserver-xorg 1:7.7+23
ii zenity 3.44.2-1

Versions of packages gdm3 suggests:
ii libpam-fprintd 1.94.2-2
ii libpam-gnome-keyring 42.1-1+b2
ii libpam-pkcs11 0.6.12-1
pn libpam-sss 
ii orca 44.1-2

-- debconf information:
gdm3/daemon_name: /usr/sbin/gdm3
* shared/default-x-display-manager: gdm3



Bug#1042517: Fixed in 6.4.13-1

2023-09-03 Thread Mad Horse
The fix 
https://patchwork.freedesktop.org/patch/msgid/20230804084600.1005818-1-jani.nik...@intel.com
 has been merged to upstream and backported to 6.4.13, so it is available in 
linux-image-6.4.0-4-amd64_6.4.13-1, and I have confirmed that this bug is fixed 
 on this version.



Bug#1042517:

2023-08-13 Thread Mad Horse
> Control: tags -1 + moreinfo
>
> Hi
>
> On Wed, Aug 09, 2023 at 11:26:01AM +0800, Mad Horse wrote:
>> The bug has been reported to upstream (
>> https://gitlab.freedesktop.org/drm/intel/-/issues/8991 ), and a fix
>> is available there, though it may need backport.
> Were you able to confirm that the upstream mentioned patch fixes the
> issue?
>
> Regards,
> Salvatore
>
Yes. After building and installing a linux 6.5~rc4-1~exp1a~test with this patch 
applied to, the i915 does never shout oops on an IVB D GT2 server any more.



Bug#1042517:

2023-08-08 Thread Mad Horse
The bug has been reported to upstream ( 
https://gitlab.freedesktop.org/drm/intel/-/issues/8991 ), and a fix is 
available there, though it may need backport.



Bug#1042517: Info received (Bug#1042517: Acknowledgement (i915: oops for NULL pointer dereference on Intel HD Graphics P4000))

2023-07-30 Thread Mad Horse
Further inspection shows that this oops is caused by 
intel_display_device_probe() returning NULL in 
intel_device_info_driver_create() when Intel HD Graphics P4000 
(PCI:8086:016a) is probed, which is further caused by 
INTEL_IVB_Q_IDS(NULL) (struct { u32 devid; const struct 
intel_display_device_info *info;}{ 0x16a, NULL}) in 
drivers/gpu/drm/i915/display/intel_display_device.c being erroneously 
matched against Intel HD Graphics P4000.




Bug#1042517: Acknowledgement (i915: oops for NULL pointer dereference on Intel HD Graphics P4000)

2023-07-29 Thread Mad Horse
The kernel log in the first report seems to be truncated. Here is a full log:


[    0.00] Linux version 6.4.0-1-amd64 (debian-ker...@lists.debian.org) 
(gcc-13 (Debian 13.1.0-9) 13.1.0, GNU ld (GNU Binutils for Debian) 
2.40.90.20230720) #1 SMP PREEMPT_DYNAMIC Debian 6.4.4-1 (2023-07-23)
[    0.00] Command line: root=/dev/mapper/vgs-root ro intel_iommu=on  
intel_iommu=on
[    0.00] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point 
registers'
[    0.00] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
[    0.00] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
[    0.00] x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
[    0.00] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, 
using 'standard' format.
[    0.00] signal: max sigframe size: 1776
[    0.00] BIOS-provided physical RAM map:
[    0.00] BIOS-e820: [mem 0x1000-0x0009] usable
[    0.00] BIOS-e820: [mem 0x000a-0x000f] reserved
[    0.00] BIOS-e820: [mem 0x0010-0x7ff0efff] usable
[    0.00] BIOS-e820: [mem 0x8000-0x829f] reserved
[    0.00] BIOS-e820: [mem 0xf000-0xf3ff] reserved
[    0.00] BIOS-e820: [mem 0xfed4-0xfed44fff] reserved
[    0.00] BIOS-e820: [mem 0xfed9-0xfed91fff] reserved
[    0.00] BIOS-e820: [mem 0x0001-0x00047d5f] usable
[    0.00] NX (Execute Disable) protection: active
[    0.00] SMBIOS 3.0 present.
[    0.00] DMI: HP HP Z220 SFF Workstation/HP Z220 SFF Workstation, BIOS 
4.19-218-gb184e6e0a1 02/02/2023
[    0.00] tsc: Fast TSC calibration using PIT
[    0.00] tsc: Detected 3192.575 MHz processor
[    0.10] e820: update [mem 0x-0x0fff] usable ==> reserved
[    0.16] e820: remove [mem 0x000a-0x000f] usable
[    0.24] last_pfn = 0x47d600 max_arch_pfn = 0x4
[    0.32] x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
[    0.000402] last_pfn = 0x7ff0f max_arch_pfn = 0x4
[    0.019298] RAMDISK: [mem 0x4760dc000-0x4797f]
[    0.019302] ACPI: Early table checksum verification disabled
[    0.019307] ACPI: RSDP 0x000F 24 (v02 COREv4)
[    0.019314] ACPI: XSDT 0x7FF270E0 5C (v01 COREv4 COREBOOT 
 CORE 20200925)
[    0.019324] ACPI: FACP 0x7FF296E0 000114 (v06 COREv4 COREBOOT 
 CORE 20200925)
[    0.019333] ACPI: DSDT 0x7FF27280 002455 (v02 COREv4 COREBOOT 
20141018 INTL 20200925)
[    0.019339] ACPI: FACS 0x7FF27240 40
[    0.019344] ACPI: FACS 0x7FF27240 40
[    0.019349] ACPI: SSDT 0x7FF29800 00284A (v02 COREv4 COREBOOT 
002A CORE 20200925)
[    0.019355] ACPI: MCFG 0x7FF2C050 3C (v01 COREv4 COREBOOT 
 CORE 20200925)
[    0.019361] ACPI: TCPA 0x7FF2C090 32 (v02 COREv4 COREBOOT 
 CORE 20200925)
[    0.019366] ACPI: APIC 0x7FF2C0D0 7E (v03 COREv4 COREBOOT 
 CORE 20200925)
[    0.019372] ACPI: DMAR 0x7FF2C150 C0 (v01 COREv4 COREBOOT 
 CORE 20200925)
[    0.019377] ACPI: HPET 0x7FF2C210 38 (v01 COREv4 COREBOOT 
 CORE 20200925)
[    0.019382] ACPI: Reserving FACP table memory at [mem 0x7ff296e0-0x7ff297f3]
[    0.019385] ACPI: Reserving DSDT table memory at [mem 0x7ff27280-0x7ff296d4]
[    0.019387] ACPI: Reserving FACS table memory at [mem 0x7ff27240-0x7ff2727f]
[    0.019388] ACPI: Reserving FACS table memory at [mem 0x7ff27240-0x7ff2727f]
[    0.019390] ACPI: Reserving SSDT table memory at [mem 0x7ff29800-0x7ff2c049]
[    0.019392] ACPI: Reserving MCFG table memory at [mem 0x7ff2c050-0x7ff2c08b]
[    0.019393] ACPI: Reserving TCPA table memory at [mem 0x7ff2c090-0x7ff2c0c1]
[    0.019395] ACPI: Reserving APIC table memory at [mem 0x7ff2c0d0-0x7ff2c14d]
[    0.019396] ACPI: Reserving DMAR table memory at [mem 0x7ff2c150-0x7ff2c20f]
[    0.019398] ACPI: Reserving HPET table memory at [mem 0x7ff2c210-0x7ff2c247]
[    0.019484] No NUMA configuration found
[    0.019486] Faking a node at [mem 0x-0x00047d5f]
[    0.019502] NODE_DATA(0) allocated [mem 0x47d5c8000-0x47d5f2fff]
[    0.019979] Zone ranges:
[    0.019981]   DMA  [mem 0x1000-0x00ff]
[    0.019984]   DMA32    [mem 0x0100-0x]
[    0.019987]   Normal   [mem 0x0001-0x00047d5f]
[    0.019990]   Device   empty
[    0.019992] Movable zone start for each node
[    0.019997] Early memory node ranges
[    0.019998]   node   0: [mem 0x1000-0x0009]
[    0.020001]   node   0: [mem 0x0010-0x7ff0efff]
[    0.020003]   node   0: [mem 0x0001-0x00047d5f]
[    0.020008] Initmem setup node 0 [mem 0x1000-0x00047d5f]
[    0.020016] On node 0, zone DMA: 

Bug#1042517: i915: oops for NULL pointer dereference on Intel HD Graphics P4000

2023-07-29 Thread Mad Horse
Package: src:linux
Version: 6.4.4-1
Severity: important

Dear Maintainer,

i915 used to work well on my Intel HD Graphics P4000 in an Intel(R) Xeon(R) CPU
E3-1225 V2 when running Linux kernel 6.3.0-1 (6.3.7-1) and older, but on
6.4.4-1, it will oops for NULL pointer dereference as the attached kernel log
shows. This also hangs the sound card and holds the system from reboot.

i915 of linux 6.4.4-1 will neither oops on Intel GMA 4500MHD in GM45, nor on an
ordinary Intel HD Graphics 4000 in an Intel(R) Core(TM) i5-3427U CPU.


-- Package-specific info:
** Version:
Linux version 6.4.0-1-amd64 (debian-ker...@lists.debian.org) (gcc-13 (Debian 
13.1.0-9) 13.1.0, GNU ld (GNU Binutils for Debian) 2.40.90.20230720) #1 SMP 
PREEMPT_DYNAMIC Debian 6.4.4-1 (2023-07-23)

** Command line:
root=/dev/mapper/vgs-root ro intel_iommu=on intel_iommu=on
** Tainted: D (128)
* kernel died recently, i.e. there was an OOPS or BUG

** Kernel log:
[ 8.763418] systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control 
File System...
[ 8.764411] systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration 
File System...
[ 8.764596] systemd[1]: systemd-firstboot.service - First Boot Wizard was 
skipped because of an unmet condition check (ConditionFirstBoot=yes).
[ 8.764707] systemd[1]: systemd-repart.service - Repartition Root Disk was 
skipped because no trigger condition checks were met.
[ 8.765773] systemd[1]: Starting systemd-sysusers.service - Create System 
Users...
[ 8.765933] ppdev: user-space parallel port driver
[ 8.768736] systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control 
File System.
[ 8.768892] parport_pc 00:04: reported by Plug and Play ACPI
[ 8.769418] parport0: PC-style at 0x378, irq 7 [PCSPP]
[ 8.770159] systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration 
File System.
[ 8.790829] systemd[1]: Finished lvm2-monitor.service - Monitoring of LVM2 
mirrors, snapshots etc. using dmeventd or progress polling.
[ 8.796058] systemd[1]: Finished systemd-sysusers.service - Create System Users.
[ 8.821265] systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create 
Static Device Nodes in /dev...
[ 8.821479] systemd[1]: Started systemd-journald.service - Journal Service.
[ 8.865221] lp0: using parport0 (interrupt-driven).
[ 9.004135] sd 0:0:0:0: Attached scsi generic sg0 type 0
[ 9.009846] sr 2:0:0:0: Attached scsi generic sg1 type 5
[ 9.048838] EDAC MC0: Giving out device to module ie31200_edac controller 
IE31200: DEV :00:00.0 (POLLED)
[ 9.129202] iTCO_vendor_support: vendor-support=0
[ 9.134408] input: PC Speaker as /devices/platform/pcspkr/input/input12
[ 9.137872] iTCO_wdt iTCO_wdt.1.auto: Found a Panther Point TCO device 
(Version=2, TCOBASE=0x0560)
[ 9.141787] at24 0-0050: supply vcc not found, using dummy regulator
[ 9.154175] iTCO_wdt iTCO_wdt.1.auto: initialized. heartbeat=30 sec (nowayout=0)
[ 9.154624] at24 0-0050: 256 byte spd EEPROM, read-only
[ 9.161769] usbcore: registered new device driver apple-mfi-fastcharge
[ 9.234467] RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 163840 ms 
ovfl timer
[ 9.234475] RAPL PMU: hw unit of domain pp0-core 2^-16 Joules
[ 9.234477] RAPL PMU: hw unit of domain package 2^-16 Joules
[ 9.234479] RAPL PMU: hw unit of domain pp1-gpu 2^-16 Joules
[ 9.235718] cfg80211: Loading compiled-in X.509 certificates for regulatory 
database
[ 9.235903] Loaded X.509 cert 'b...@debian.org: 
577e021cb980e0e820821ba7b54b4961b8b4fadf'
[ 9.236083] Loaded X.509 cert 'romain.per...@gmail.com: 
3abbc6ec146e09d1b6016ab9d6cf71dd233f0328'
[ 9.236251] Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
[ 9.238123] platform regulatory.0: firmware: direct-loading firmware 
regulatory.db
[ 9.238323] platform regulatory.0: firmware: direct-loading firmware 
regulatory.db.p7s
[ 9.273677] alg: No test for fips(ansi_cprng) (fips_ansi_cprng)
[ 9.286133] gsmi: no gsmi handler in firmware
[ 9.513229] intel_rapl_common: Found RAPL domain package
[ 9.513238] intel_rapl_common: Found RAPL domain core
[ 9.513240] intel_rapl_common: Found RAPL domain uncore
[ 9.566492] Bluetooth: Core ver 2.22
[ 9.566539] NET: Registered PF_BLUETOOTH protocol family
[ 9.566542] Bluetooth: HCI device and connection manager initialized
[ 9.566548] Bluetooth: HCI socket layer initialized
[ 9.566551] Bluetooth: L2CAP socket layer initialized
[ 9.566556] Bluetooth: SCO socket layer initialized
[ 9.580540] usbcore: registered new interface driver btusb
[ 9.690063] Bluetooth: hci0: BCM: chip id 102 build 0695
[ 9.691041] Bluetooth: hci0: BCM: product 05ac:8290
[ 9.693120] Bluetooth: hci0: BCM: features 0x2f
[ 9.709018] Bluetooth: hci0: BCM20703A1 Generic USB UHE Apple 20Mhz fcbga_X87
[ 9.785188] EXT4-fs (dm-2): mounting with "discard" option, but the device does 
not support discard
[ 9.785201] EXT4-fs (dm-2): mounted filesystem 
1438d07e-fadf-4596-9087-4938ff89d449 r/w with ordered data mode. Quota mode: 
none.
[ 9.790465] EXT4-fs (nvme0n1p3): mounted filesystem 

Bug#1032655: psi-plus segfaults

2023-04-29 Thread Mad Horse
This issue seems to only occur when running psi-plus under wayland. It will not 
occur when only X (either Xorg, Xwayland by running `WAYLAND_DISPLAY="" 
psi-plus` or ssh-forwarded X) is available.



Bug#1012734: firejail-profiles: Debian-patched transmission programs cannot run inside firejail with shipped profiles

2022-06-12 Thread Mad Horse

Package: firejail-profiles
Version: 0.9.70-1
Severity: normal

Dear Maintainer,

Debian have patched the current transmission to fit OpenSSL 3.0, but in 
order
to use the legacy RC4 algorithm, ossl-modules/legacy.so should be able 
to load
at runtime, otherwise Debian-patched transmission programs will be 
terminated

with SIGSEGV when trying to set up an EVP_CIPHER_CTX for RC4, as in the
attached backtrace. (against a /usr/local/bin/transmission-daemon built from
Debian-patched source with the same config, but with debug symbols retained)

This dependency has rendered the current Debian-patched transmission 
programs

cannot run inside firejail with shipped profiles. To walk this issue around,
"private-lib /ossl-modules,legacy.so" should be added 
into

the (included) profile snippet of the transmission program.


-- System Information:
Debian Release: bookworm/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.17.0-1-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=zh_CN.utf8, LC_CTYPE=zh_CN.utf8 (charmap=UTF-8), LANGUAGE 
not set

Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages firejail-profiles depends on:
ii firejail 0.9.70-1

firejail-profiles recommends no packages.

firejail-profiles suggests no packages.

-- no debconf information
#0  0x563113cb4c0f in tr_rc4_set_key (h=0x0, key=key@entry=0x7f5ee6068170 "D\333O\357m\020F\260\213\r\216\320u\310\330Vs\273>\272", key_length=key_length@entry=20) at crypto-utils-openssl.c:255
255	if (!check_result(EVP_CIPHER_CTX_set_key_length(handle->cipher_ctx, key_length)))
[Current thread is 1 (Thread 0x7f5ee606a640 (LWP 55))]
#1  0x563113cdad31 in initRC4 (crypto=crypto@entry=0x7f5ee38f69b0, setme=setme@entry=0x7f5ee38f69b8, key=) at crypto.c:106
#2  0x563113cdb040 in tr_cryptoEncryptInit (crypto=0x7f5ee38f69b0) at crypto.c:140
#3  0x563113cdbaba in readYb (inbuf=0x7f5ee376dba0, handshake=0x7f5ee3699190) at handshake.c:460
#4  canRead (io=, arg=0x7f5ee3699190, piece=) at handshake.c:1060
#5  0x563113cc5c5b in canReadWrapper (io=0x7f5ee38f65f0) at peer-io.c:211
#6  0x563113ced542 in UTP_ProcessIncoming (conn=conn@entry=0x7f5ee376d050, packet=packet@entry=0x7f5ee6068a50 "\001", len=len@entry=363, syn=syn@entry=false) at utp.cpp:2158
#7  0x563113cee380 in UTP_IsIncomingUTP (incoming_proc=incoming_proc@entry=0x563113ca78e0 , send_to_proc=send_to_proc@entry=0x563113ca7a30 , send_to_userdata=send_to_userdata@entry=0x563114b0ac00, buffer=buffer@entry=0x7f5ee6068a50 "\001", 
len=len@entry=363, to=, tolen=16) at utp.cpp:2587
#8  0x563113ca7aba in tr_utpPacket (buf=buf@entry=0x7f5ee6068a50 "\001", buflen=buflen@entry=363, from=from@entry=0x7f5ee60689d0, fromlen=16, ss=ss@entry=0x563114b0ac00) at tr-utp.c:181
#9  0x563113ca71f5 in event_callback (s=, type=, sv=0x563114b0ac00) at tr-udp.c:285
#10 0x7f5ee7d25428 in ?? () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
#11 0x7f5ee7d25b77 in event_base_loop () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
#12 0x563113ca84d8 in libeventThreadFunc (veh=0x563114b0b170) at trevent.c:263
#13 0x563113c96d38 in ThreadFunc (_t=0x563114af5570) at platform.c:104
#14 0x7f5ee762ad80 in start_thread (arg=0x7f5ee606a640) at pthread_create.c:481
#15 0x7f5ee754476f in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:95


Bug#1011449: Info received (Bug#1011449: Acknowledgement (pidgin cannot resume interrupted XMPP connection if no srv_rec available.))

2022-06-10 Thread Mad Horse
This bug should have been fixed in pidgin 2.14.10-1 since it should 
contain https://keep.imfreedom.org/pidgin/pidgin/rev/ea52fcc50e50 , as 
shown in https://keep.imfreedom.org/pidgin/pidgin/graph/594d72369304 .




Bug#1012430: Acknowledgement (firefox-esr: Permanent certificate exceptions do not work in private windows.)

2022-06-06 Thread Mad Horse
This bug has been forwarded to mozilla as 
https://bugzilla.mozilla.org/show_bug.cgi?id=1772976 , which needs 
approval to be publicly accessible.




Bug#1012430: firefox-esr: Permanent certificate exceptions do not work in private windows.

2022-06-06 Thread Mad Horse

Package: firefox-esr
Version: 91.10.0esr-1
Severity: normal

Dear Maintainer,

Although permanent certificate exceptions cannot be added from private 
windows,
existing permanent certificate exceptions once added from normal mode 
used to
be effective in private windows under the same profile in previous 
version, but

that is not the case in the current version.

Now, even if a permanent certificate exceptions had been added for an HTTPS
site from normal mode, if one opens a private window and tries to access the
very same site with the private window, the warning for untrusted 
certificate

will be generated. To suppress the warning, they should add the same
certificate in the private window as a temporary certificate exception 
(because
only temporary certificate exceptions can be added in private windows) 
over and
over, when they access the site from a private window for the first time 
after

they launch firefox-esr.

At least, there should be an option (even in about:config) to control 
whether

existing permanent certificate exceptions are effective in private windows,
rather than rejecting them unconditionally.


-- Package-specific info:


-- Addons package information

-- System Information:
Debian Release: bookworm/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.17.0-1-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=zh_CN.utf8, LC_CTYPE=zh_CN.utf8 (charmap=UTF-8), LANGUAGE 
not set

Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages firefox-esr depends on:
ii debianutils 5.7-0.2
ii fontconfig 2.13.1-4.4
ii libatk1.0-0 2.38.0-1
ii libc6 2.33-7
ii libcairo-gobject2 1.16.0-5
ii libcairo2 1.16.0-5
ii libdbus-1-3 1.14.0-1
ii libdbus-glib-1-2 0.112-2
ii libevent-2.1-7 2.1.12-stable-5
ii libffi8 3.4.2-4
ii libfontconfig1 2.13.1-4.4
ii libfreetype6 2.12.1+dfsg-2
ii libgcc-s1 12.1.0-2
ii libgdk-pixbuf-2.0-0 2.42.8+dfsg-1
ii libglib2.0-0 2.72.1-1
ii libgtk-3-0 3.24.34-1
ii libnspr4 2:4.34-1
ii libnss3 2:3.79-1
ii libpango-1.0-0 1.50.7+ds-1
ii libstdc++6 12.1.0-2
ii libvpx7 1.11.0-2
ii libx11-6 2:1.7.5-1
ii libx11-xcb1 2:1.7.5-1
ii libxcb-shm0 1.14-3
ii libxcb1 1.14-3
ii libxcomposite1 1:0.4.5-1
ii libxdamage1 1:1.1.5-2
ii libxext6 2:1.3.4-1
ii libxfixes3 1:6.0.0-1
ii libxrender1 1:0.9.10-1
ii procps 2:3.3.17-7+b1
ii zlib1g 1:1.2.11.dfsg-4

Versions of packages firefox-esr recommends:
ii libavcodec57 7:3.4.3-1
ii libavcodec58 7:4.4.2-1+b1

Versions of packages firefox-esr suggests:
ii fonts-lmodern 2.005-1
ii fonts-stix [otf-stix] 1.1.1-4.1
ii libcanberra0 0.30-10
ii libgssapi-krb5-2 1.19.2-2+b1
ii pulseaudio 15.0+dfsg1-4

-- no debconf information



Bug#1011449: Acknowledgement (pidgin cannot resume interrupted XMPP connection if no srv_rec available.)

2022-05-23 Thread Mad Horse
There is already a fix ( 
https://keep.imfreedom.org/pidgin/pidgin/rev/ea52fcc50e50 ) on pidgin's 
repository, although the approach is different.




Bug#1011449: Acknowledgement (pidgin cannot resume interrupted XMPP connection if no srv_rec available.)

2022-05-23 Thread Mad Horse

The temporary walkaround could be using "old-ssl" or bosh on XMPP accounts,

because their early error-handlings avoid (js->srv_rec).



Bug#1011449: Acknowledgement (pidgin cannot resume interrupted XMPP connection if no srv_rec available.)

2022-05-23 Thread Mad Horse
This issue should occur when jabber_login_connect() fails and calls 
jabber_login_callback() with an error.


在 2022/5/23 16:00, Mad Horse 写道:
This is because in jabber_login_callback(), when an error occurs 
(source < 0),
if (js->srv_rec != NULL), it will report the error and call 
try_srv_connect()
to try another SRV record, and return, but if (js->srv_rec == NULL), 
it will
return directly without reporting the error, nor any further process. 


It makes things worse that because now the state of affected connection 
is not


PURPLE_DISCONNECTED, further calls of _purple_connection_new() will return

early, making the connection unable to resume. The only way to connect the

corresponding account is to disable it first, (set its state to

PURPLE_DISCONNECTED) and enable it again, manually.



Bug#1011449: pidgin cannot resume interrupted XMPP connection if no srv_rec available.

2022-05-23 Thread Mad Horse

Package: pidgin
Version: 2.14.9-2
Severity: normal

Dear Maintainer,

The current pidgin cannot resume interrupted XMPP connection if no srv_rec
available (e.g. when using tor as proxy so no srv_rec will be obtained 
from DNS

in the first place).

This is because in jabber_login_callback(), when an error occurs (source 
< 0),
if (js->srv_rec != NULL), it will report the error and call 
try_srv_connect()

to try another SRV record, and return, but if (js->srv_rec == NULL), it will
return directly without reporting the error, nor any further process.

Since try_srv_connect() can handle the scenario that (js->srv_rec == 
NULL) and

resume the interrupted XMPP connection, I suggest to call try_srv_connect()
when an error occurs, regardless whether (js->srv_rec == NULL), like the
attached patch.


-- System Information:
Debian Release: bookworm/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.17.0-1-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=zh_CN.utf8, LC_CTYPE=zh_CN.utf8 (charmap=UTF-8), LANGUAGE 
not set

Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages pidgin depends on:
ii libatk1.0-0 2.38.0-1
ii libc6 2.33-7
ii libcairo2 1.16.0-5
ii libdbus-1-3 1.14.0-1
ii libgdk-pixbuf-2.0-0 2.42.8+dfsg-1
ii libglib2.0-0 2.72.1-1
ii libgstreamer-plugins-base1.0-0 1.20.2-2
ii libgstreamer1.0-0 1.20.2-1
ii libgtk2.0-0 2.24.33-2
ii libgtkspell0 2.0.16-1.3
ii libice6 2:1.0.10-1
ii libpango-1.0-0 1.50.7+ds-1
ii libpurple0 2.14.9-2
ii libsm6 2:1.2.3-1
ii libx11-6 2:1.7.5-1
ii libxss1 1:1.2.3-1
ii perl-base [perlapi-5.34.0] 5.34.0-4
ii pidgin-data 2.14.9-2

Versions of packages pidgin recommends:
ii gstreamer1.0-libav 1.20.2-1
ii gstreamer1.0-plugins-base 1.20.2-2
ii gstreamer1.0-plugins-good 1.20.2-1
ii gstreamer1.0-pulseaudio 1.20.2-1
ii sensible-utils 0.0.17

Versions of packages pidgin suggests:
ii libsqlite3-0 3.38.5-1

-- no debconf information

--- a/libpurple/protocols/jabber/jabber.c   2022-05-23 15:50:49.475173171 
+0800
+++ b/libpurple/protocols/jabber/jabber.c   2022-05-23 15:51:17.491467914 
+0800
@@ -804,10 +804,8 @@ jabber_login_callback(gpointer data, gin
JabberStream *js = purple_connection_get_protocol_data(gc);
 
if (source < 0) {
-   if (js->srv_rec != NULL) {
-   purple_debug_error("jabber", "Unable to connect to 
server: %s.  Trying next SRV record or connecting directly.\n", error);
-   try_srv_connect(js);
-   }
+   purple_debug_error("jabber", "Unable to connect to server: %s.  
Trying next SRV record or connecting directly.\n", error);
+   try_srv_connect(js);
return;
}
 



Bug#1008137: Acknowledgement (firejail-profiles: Profiles for most web browser blocks mDNS resolution)

2022-03-22 Thread Mad Horse
Currently I walk around this issue by adding "whitelist 
/run/avahi-daemon/" to my ~/.config/firejail/whitelist-run-common.local, 
but I doubt whether it is appropriate to fix this issue by adding a 
similar rule to /etc/firejail/whitelist-run-common.inc




Bug#1008137: firejail-profiles: Profiles for most web browser blocks mDNS resolution

2022-03-22 Thread Mad Horse

Package: firejail-profiles
Version: 0.9.68-3
Severity: normal

Dear Maintainer,

I find that I cannot access a web server running in my local lan with its
mDNS domain name with firefox-esr running inside firejail while I can with
firefox-esr running without firejail. This problem also applies to falkon,
chromium, when running inside firejail, but epiphany (gnome web) is not
affected.

I manage to run bash in firejail with profiles of these affected browsers,
and find that /run/avahi-daemon/ does not present in their jailed file
system, so it seems that some rules blacklist, or fail to whitelist this
path in these profiles or included rulesets.


-- System Information:
Debian Release: bookworm/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.16.0-4-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=zh_CN.utf8, LC_CTYPE=zh_CN.utf8 (charmap=UTF-8), LANGUAGE 
not set

Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages firejail-profiles depends on:
ii firejail 0.9.68-3

firejail-profiles recommends no packages.

firejail-profiles suggests no packages.

-- no debconf information



Bug#1006271: Info received (Bug#1006271: Acknowledgement (network-manager: crashes if DHCPv6 server sends multiple IPv6 addresses))

2022-03-08 Thread Mad Horse
Upstream issue 
https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/issues/907 
is related to this bug, and it is fixed with 
https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/commit/5402a7217964205aa6041324fa0fd393bfbb4838




Bug#1006271: Acknowledgement (network-manager: crashes if DHCPv6 server sends multiple IPv6 addresses)

2022-03-03 Thread Mad Horse

A patch like the attached one should be able to fix this problem.diff -Nrup src/core/dhcp/nm-dhcp-utils.c.orig src/core/dhcp/nm-dhcp-utils.c
--- "src/core/dhcp/nm-dhcp-utils.c.orig"	2022-03-03 13:44:26
+++ "src/core/dhcp/nm-dhcp-utils.c"	2022-03-03 13:44:56
@@ -876,7 +876,7 @@ nm_dhcp_utils_merge_new_dhcp6_lease(cons
  * addresses from the same transaction into a single configuration.
  **/
 
-l3cd_merged = nm_l3_config_data_new_clone(l3cd_old, -1);
+l3cd_merged = nm_l3_config_data_new_clone(l3cd_old, 0);
 
 nm_l3_config_data_iter_ip6_address_for_each (, l3cd_new, )
 nm_l3_config_data_add_address_6(l3cd_merged, addr);



Bug#1006271: network-manager: crashes if DHCPv6 server sends multiple IPv6 addresses

2022-02-22 Thread Mad Horse

Package: network-manager
Version: 1.35.91-1
Severity: important

Dear Maintainer,

network-manager 1.35.91-1 and 1.35.92-1 will abort if DHCPv6 server sends
multiple IPv6 addresses,( as under a default-configured openwrt router ) 
because

in this case, nm_dhcp_utils_merge_new_dhcp6_lease() would call
nm_l3_config_data_new_clone() with ifindex=-1, which may originally result
ifindex = src->ifindex; but now in order to make such effect, ifindex 
should be

set to 0 instead a negative value, otherwise such call will abort
network-manager for violating the assertion nm_assert(ifindex >= 0) in
nm_l3_config_data_new_clone().


-- System Information:
Debian Release: bookworm/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.16.0-1-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=zh_CN.utf8, LC_CTYPE=zh_CN.utf8 (charmap=UTF-8), LANGUAGE 
not set

Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages network-manager depends on:
ii adduser 3.118
ii dbus 1.12.20-3
ii libaudit1 1:3.0.7-1
ii libbluetooth3 5.62-2
ii libc6 2.33-6
ii libcurl3-gnutls 7.81.0-1
ii libglib2.0-0 2.70.4-1
ii libgnutls30 3.7.3-4+b1
ii libjansson4 2.13.1-1.1
ii libmm-glib0 1.18.6-1
ii libndp0 1.6-1+b1
ii libnewt0.52 0.52.21-5+b1
ii libnm0 1.35.91-1
ii libpsl5 0.21.0-1.2
ii libreadline8 8.1.2-1
ii libselinux1 3.3-1+b1
ii libsystemd0 250.3-2
ii libteamdctl0 1.31-1
ii libudev1 250.3-2
ii policykit-1 0.105-32
ii udev 250.3-2

Versions of packages network-manager recommends:
ii dnsmasq-base [dnsmasq-base] 2.86-1.1
ii iptables 1.8.7-1
ii libpam-systemd 250.3-2
ii modemmanager 1.18.6-1
ii ppp 2.4.9-1+1
ii wireless-regdb 2021.08.28-1
ii wpasupplicant 2:2.9.0-23

Versions of packages network-manager suggests:
ii libteam-utils 1.31-1

Versions of packages network-manager is related to:
ii isc-dhcp-client 4.4.1-2.3

-- no debconf information



Bug#1006270: network-manager: crashes if DHCPv6 server sends multiple IPv6 addresses

2022-02-22 Thread Mad Horse

Package: .
Version: 1.35.91-1
Severity: important

Dear Maintainer,

network-manager 1.35.91-1 and 1.35.92-1 will abort if DHCPv6 server sends
multiple IPv6 addresses,( as under a default-configured openwrt router ) 
because

in this case, nm_dhcp_utils_merge_new_dhcp6_lease() would call
nm_l3_config_data_new_clone() with ifindex=-1, which may originally result
ifindex = src->ifindex; but now in order to make such effect, ifindex 
should be

set to 0 instead a negative value, otherwise such call will abort
network-manager for violating the assertion nm_assert(ifindex >= 0) in
nm_l3_config_data_new_clone().


-- System Information:
Debian Release: bookworm/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.16.0-1-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=zh_CN.utf8, LC_CTYPE=zh_CN.utf8 (charmap=UTF-8), LANGUAGE 
not set

Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages network-manager depends on:
ii adduser 3.118
ii dbus 1.12.20-3
ii libaudit1 1:3.0.7-1
ii libbluetooth3 5.62-2
ii libc6 2.33-6
ii libcurl3-gnutls 7.81.0-1
ii libglib2.0-0 2.70.4-1
ii libgnutls30 3.7.3-4+b1
ii libjansson4 2.13.1-1.1
ii libmm-glib0 1.18.6-1
ii libndp0 1.6-1+b1
ii libnewt0.52 0.52.21-5+b1
ii libnm0 1.35.91-1
ii libpsl5 0.21.0-1.2
ii libreadline8 8.1.2-1
ii libselinux1 3.3-1+b1
ii libsystemd0 250.3-2
ii libteamdctl0 1.31-1
ii libudev1 250.3-2
ii policykit-1 0.105-32
ii udev 250.3-2

Versions of packages network-manager recommends:
ii dnsmasq-base [dnsmasq-base] 2.86-1.1
ii iptables 1.8.7-1
ii libpam-systemd 250.3-2
ii modemmanager 1.18.6-1
ii ppp 2.4.9-1+1
ii wireless-regdb 2021.08.28-1
ii wpasupplicant 2:2.9.0-23

Versions of packages network-manager suggests:
ii libteam-utils 1.31-1

Versions of packages network-manager is related to:
ii isc-dhcp-client 4.4.1-2.3

-- no debconf information



Bug#1003650: firejail-profiles: Chromium running under the current profile cannot play sound

2022-01-14 Thread Mad Horse

Hi Reine,

I do not have any custom setup on my pipewire, nor custom firejail 
profile for chromium.


Started within firejail, chromium reported:

[10:46:0115/104317.720203:ERROR:bus.cc(397)] Failed to connect to the 
bus: Failed to connect to socket /run/firejail/mnt/dbus/system: 
Permission denied

libva error: /usr/lib/x86_64-linux-gnu/dri/iHD_drv_video.so init failed
[56:56:0115/104317.772250:ERROR:sandbox_linux.cc(378)] 
InitializeSandbox() called with multiple threads in process gpu-process.
[10:85:0115/104317.887055:ERROR:bus.cc(397)] Failed to connect to the 
bus: Failed to connect to socket /run/firejail/mnt/dbus/system: 
Permission denied
[10:85:0115/104317.887112:ERROR:bus.cc(397)] Failed to connect to the 
bus: Failed to connect to socket /run/firejail/mnt/dbus/system: 
Permission denied
[10:85:0115/104317.887169:ERROR:bus.cc(397)] Failed to connect to the 
bus: Failed to connect to socket /run/firejail/mnt/dbus/system: 
Permission denied
[10:85:0115/104317.887206:ERROR:bus.cc(397)] Failed to connect to the 
bus: Failed to connect to socket /run/firejail/mnt/dbus/system: 
Permission denied
[10:85:0115/104317.887235:ERROR:bus.cc(397)] Failed to connect to the 
bus: Failed to connect to socket /run/firejail/mnt/dbus/system: 
Permission denied

/run/firejail/mnt/dbus/system do have permission 600, owned by root.

When trying to play sound, chromium in firejail reported:

Failed to create secure directory (/run/user/1000/pulse): Operation 
not permitted
ALSA lib dlmisc.c:337:(snd_dlobj_cache_get0) Cannot open shared 
library libasound_module_pcm_pulse.so 
(/usr/lib/x86_64-linux-gnu/alsa-lib/libasound_module_pcm_pulse.so: 
cannot open shared object file: Permission denied)
[307:307:0115/104404.402900:ERROR:alsa_util.cc(204)] PcmOpen: 
default,No such device or address
ALSA lib dlmisc.c:337:(snd_dlobj_cache_get0) Cannot open shared 
library libasound_module_pcm_pulse.so 
(/usr/lib/x86_64-linux-gnu/alsa-lib/libasound_module_pcm_pulse.so: 
cannot open shared object file: Permission denied)
[307:307:0115/104404.404678:ERROR:alsa_util.cc(204)] PcmOpen: 
plug:default,No such device or address


but there is a unix domain socket /run/user/1000/pulse/native, owned by 
UID 1000, with permission 666,
and the permission of 
/usr/lib/x86_64-linux-gnu/alsa-lib/libasound_module_pcm_pulse.so is 
root,644.

Both were inspected inside firejail for chromium.

Do you have any idea about these?

Kind regards,

Mad Horse

On 2022/1/15 04:47, Reiner Herrmann wrote:

Hi Mad Horse,

On Thu, Jan 13, 2022 at 05:07:38PM +0800, Mad Horse wrote:

After upgraded to 97.0.4692.71-0.1, Chromium running inside firejail can no
longer play sound (e.g. when playing an online video), while bare Chromium
can. It is shown with PulseAudio Manager that the Chromium running inside
firejail cannot connect to the sound server while the bare Chromium can.

I had a similar issue initially as well. But it turned out to be related
to my custom sound setup (using pipewire with run directory in ~/pipewire).
There are also no sound-related Chromium issue known in the upstream
firejail bug tracker.

So I think it also has to be related to your setup.
It might be related to some whitelist in the chromium{-common}.profile,
as this causes the parent directory to get blocked.
Can you please try to figure out which path needs to be whitelisted
on your system to get it working again?

Kind regards,
   Reiner




Bug#1003650: firejail-profiles: Chromium running under the current profile cannot play sound

2022-01-13 Thread Mad Horse

Package: firejail-profiles
Version: 0.9.66-2
Severity: normal

Dear Maintainer,

After upgraded to 97.0.4692.71-0.1, Chromium running inside firejail can no
longer play sound (e.g. when playing an online video), while bare Chromium
can. It is shown with PulseAudio Manager that the Chromium running inside
firejail cannot connect to the sound server while the bare Chromium can.


-- System Information:
Debian Release: bookworm/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.15.0-2-amd64 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_WARN, TAINT_FIRMWARE_WORKAROUND
Locale: LANG=zh_CN.utf8, LC_CTYPE=zh_CN.utf8 (charmap=UTF-8), LANGUAGE 
not set

Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages firejail-profiles depends on:
ii firejail 0.9.66-2

firejail-profiles recommends no packages.

firejail-profiles suggests no packages.

-- no debconf information



Bug#1001695: dpkg.postinst fails to handle /var/lib/dpkg/lost+found

2021-12-14 Thread Mad Horse

On 2021/12/14 21:28, Guillem Jover wrote:

Hi!

On Tue, 2021-12-14 at 21:00:40 +0800, Mad Horse wrote:

Package: dpkg
Version: 1.21.1
Severity: important
On my system, /var/lib/dpkg is an dedicated file system mounted there, so
there
is an directory /var/lib/dpkg/lost+found, and fixup_misplaced_alternatives()
within dpkg.postinst will try to "fix" it up, causing upgrade from dpkg
1.16.1
failed.

Currently I walk this problem around by adding "lost+found" to the "known
file
list" in fixup_misplaced_alternatives(), but this function should only work
on
files, not directories, so we had better add some check to see whether this
assumed target is a file, in the first place.

Ouch, indeed. Thanks, I've fixed this locally now, and will be
included in the next upcoming release.

Thanks,
Guillem


Since this bug breaks upgradability, could you release a "hotfix" for this?



Bug#1001695: dpkg.postinst fails to handle /var/lib/dpkg/lost+found

2021-12-14 Thread Mad Horse

Package: dpkg
Version: 1.21.1
Severity: important

Dear Maintainer,

On my system, /var/lib/dpkg is an dedicated file system mounted there, 
so there

is an directory /var/lib/dpkg/lost+found, and fixup_misplaced_alternatives()
within dpkg.postinst will try to "fix" it up, causing upgrade from dpkg 
1.16.1

failed.

Currently I walk this problem around by adding "lost+found" to the 
"known file
list" in fixup_misplaced_alternatives(), but this function should only 
work on

files, not directories, so we had better add some check to see whether this
assumed target is a file, in the first place.



-- Package-specific info:

-- System Information:
Debian Release: bookworm/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'testing-proposed-updates'), (500, 
'unstable'), (500, 'stable')

Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.15.0-2-amd64 (SMP w/4 CPU threads)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND
Locale: LANG=zh_CN.utf8, LC_CTYPE=zh_CN.utf8 (charmap=UTF-8), LANGUAGE 
not set

Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages dpkg depends on:
ii libbz2-1.0 1.0.8-5
ii libc6 2.32-5
ii liblzma5 5.2.5-2
ii libselinux1 3.3-1+b1
ii tar 1.34+dfsg-1
ii zlib1g 1:1.2.11.dfsg-2

dpkg recommends no packages.

Versions of packages dpkg suggests:
ii apt 2.3.13
ii debsig-verify 0.25

-- debconf-show failed



Bug#995370: pidgin: segmentation fault on malloc/free

2021-10-02 Thread Mad Horse
Package: pidgin
Followup-For: Bug #995370

Dear Maintainer,

This bug may be due to another related issue which need to be fixed in
the same
time but not. The way to fix it is attached.

With the old logic prior to
https://keep.imfreedom.org/pidgin/pidgin/rev/f25ce9376564 ,
the bug may not break out, because jbr->thread_id tends to keep NULL,
but after
the
commit above, if jbr->thread_id is not NULL, it would be released along with
jm, causing
a double free when releasing the jbr, so jm->thread_id should be duplicated
from
jbr->thread_id instead of pointed to it.

-- System Information:
Debian Release: bookworm/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.14.0-1-amd64 (SMP w/2 CPU threads)
Locale: LANG=zh_CN.UTF-8, LC_CTYPE=zh_CN.UTF-8 (charmap=UTF-8), LANGUAGE not
set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages pidgin depends on:
ii libatk1.0-0 2.36.0-2
ii libc6 2.32-4
ii libcairo2 1.16.0-5
ii libdbus-1-3 1.12.20-2
ii libgdk-pixbuf-2.0-0 2.42.6+dfsg-2
ii libglib2.0-0 2.70.0-1+b1
ii libgstreamer-plugins-base1.0-0 1.18.5-1
ii libgstreamer1.0-0 1.18.5-1
ii libgtk2.0-0 2.24.33-2
ii libgtkspell0 2.0.16-1.3
ii libice6 2:1.0.10-1
ii libpango-1.0-0 1.48.10+ds1-1
ii libpurple0 2.14.1-1
ii libsm6 2:1.2.3-1
ii libx11-6 2:1.7.2-2+b1
ii libxss1 1:1.2.3-1
ii perl-base [perlapi-5.32.1] 5.32.1-6
ii pidgin-data 2.14.1-1

Versions of packages pidgin recommends:
ii gstreamer1.0-libav 1.18.5-1
ii gstreamer1.0-plugins-base 1.18.5-1
ii gstreamer1.0-plugins-good 1.18.5-1
ii gstreamer1.0-pulseaudio 1.18.5-1
ii sensible-utils 0.0.17

Versions of packages pidgin suggests:
ii libsqlite3-0 3.36.0-2

--- a/libpurple/protocols/jabber/message.c	2021-06-01 22:34:44.0 +
+++ b/libpurple/protocols/jabber/message.c	2021-10-02 09:30:02.0 +
@@ -1180,7 +1180,7 @@ int jabber_message_send_im(PurpleConnect
 
 	if(jbr) {
 		if(jbr->thread_id)
-			jm->thread_id = jbr->thread_id;
+			jm->thread_id = g_strdup(jbr->thread_id);
 
 		if (jbr->chat_states == JABBER_CHAT_STATES_UNSUPPORTED)
 			jm->chat_state = JM_STATE_NONE;


Bug#973756: Acknowledgement (firejail: fcopy fails to load libpcre2-8.so.0 when running transmission-daemon)

2020-11-04 Thread Mad Horse
Currently transmission-gtk could be run with firejail, and I can use 
transmission-gtk's profile to run transmission-daemon, customized with 
such transmission-gtk.local:



private-bin transmission-daemon
noblacklist ${HOME}/.config/transmission-daemon
whitelist ${HOME}/.config/transmission-daemon




Bug#973756: firejail: fcopy fails to load libpcre2-8.so.0 when running transmission-daemon

2020-11-04 Thread Mad Horse

Package: firejail
Version: 0.9.64-1
Severity: normal

Dear Maintainer,

Executing transmission-cli or transmission-daemon with firejail results
following error:

/run/firejail/lib/fcopy: error while loading shared libraries: 
libpcre2-8.so.0:

cannot open shared object file: No such file or directory
Error: failed to run /run/firejail/lib/fcopy




-- System Information:
Debian Release: bullseye/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.9.0-1-amd64 (SMP w/4 CPU threads)
Locale: LANG=zh_CN.utf8, LC_CTYPE=zh_CN.utf8 (charmap=UTF-8), LANGUAGE 
not set

Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages firejail depends on:
ii libapparmor1 2.13.5-1
ii libc6 2.31-4
ii libselinux1 3.1-2+b1

Versions of packages firejail recommends:
ii firejail-profiles 0.9.64-1
ii iproute2 5.9.0-1
ii iptables 1.8.5-3
ii xauth 1:1.0.10-1
ii xdg-dbus-proxy 0.1.2-1
ii xpra 3.0.9+dfsg1-1+b3
ii xserver-xephyr 2:1.20.8-2

firejail suggests no packages.

-- no debconf information



Bug#966198: Acknowledgement (gdm3: Defunct gdm-session-worker processes occationally remains unhandled.)

2020-10-09 Thread Mad Horse
These defunct gdm-session-worker processes are in fact for 
[pam/gdm-launch-environment].



Bug#969314: ncat discards reply from target server attached to socks CONNECT response

2020-08-31 Thread Mad Horse
Package: ncat
Version: 7.80+dfsg1-5
Severity: normal

Dear Maintainer,

When using ncat to connect a target server via an intermediate SOCKS server
(either 4 or 5), If the initial replies from the target server (e.g. the
banner
line sent by an ssh server) is occasionally attached after the response
packet
of SOCKS CONNECT (it should be legal and may be done by many SOCKS server
implementations, since TCP on which SOCKS is based is stream oriented),
ncat is
unable to return these replies. Only the initial replies from the target
server
sent as a separate packet after the response of SOCKS CONNECT by the SOCKS
proxy can be correctly returned.

This bug breaks the SSH protocol when ncat is used in the ProxyCommand
option
of OpenSSH to use a SOCKS proxy, because server's banner line may get lost.
Other netcat implementations like netcat-openbsd can handle replies
attached to
the response packet of SOCKS CONNECT and work fine with OpenSSH.



-- System Information:
Debian Release: bullseye/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.7.0-2-amd64 (SMP w/4 CPU threads)
Locale: LANG=zh_CN.UTF-8, LC_CTYPE=zh_CN.UTF-8 (charmap=UTF-8), LANGUAGE
not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages ncat depends on:
ii libc6 2.31-3
ii liblua5.3-0 5.3.3-1.1+b1
ii libpcap0.8 1.9.1-4
ii libssl1.1 1.1.1g-1

ncat recommends no packages.

ncat suggests no packages.

-- no debconf information



Bug#967056: ecryptfs-utils: The first login with password after boot will increment the mount count by two.

2020-08-03 Thread Mad Horse
Package: ecryptfs-utils
Version: 111-5
Severity: important

Dear Maintainer,

0) Use ecryptfs-setup-private to setup a Private directory in a user
account.

1) After a fresh boot, the first login authenticated with the password
to that
user account (either via gdm3, via console, or via ssh), increments the
mount
count in /dev/shm/ecryptfs-$USER-private by 2 instead of 1, and logging
out will
only decrement it by 1. Currently I handle it by manually executing
$ ecryptfs-umount-private (to decrement the mount count by 1) before logout,
otherwise it will leave the Private directory accessible after logout.

2) After this, all subsequent logins with password (either via gdm3, via
console, or via ssh) will only increment the mount count by 1. (Besides,
logins
without password, such as via ssh authenticated with a public key, will not
increment mount count. Accessing Private in such situation should be done by
manually executing $ ecryptfs-mount-private and providing password, and
mount
count will be decremented by one when logging out from this session.)

3) No matter how many logins without password, during which manually
mounting
Private may or may not occur, precede it, only "the first login with
password"
increments the mount count by 2.

I suspect this issue appears because "session optional pam_ecryptfs.so
unwrap"
is present both in /etc/pam.d/common-session-noninteractive and in
/etc/pam.d/common-session. The former acts on the first login,
(via "systemd --user") while the latter acts on every interactive login. If
password is available when they act, mount count will all increment by 1
each
time.

Further inspection shows that "systemd --user" is launched by the first
login,
either with or without password, and continue to run after logout, but
in "the
first login with password", the process tree with "systemd --user" as
its root
launched by the first login without password will be replaced with a new
launch
of "systemd --user", which will never be replaced any more during all
subsequent
logins.




-- System Information:
Debian Release: bullseye/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.7.0-2-amd64 (SMP w/4 CPU threads)
Locale: LANG=zh_CN.UTF-8, LC_CTYPE=zh_CN.UTF-8 (charmap=UTF-8), LANGUAGE
not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages ecryptfs-utils depends on:
ii gettext-base 0.19.8.1-10
ii keyutils 1.6.1-2
ii libc6 2.31-2
ii libecryptfs1 111-5
ii libgpgme11 1.13.1-9
ii libkeyutils1 1.6.1-2
ii libpam-runtime 1.3.1-5
ii libpam0g 1.3.1-5
ii libtspi1 0.3.14+fixed1-1+b1

ecryptfs-utils recommends no packages.

Versions of packages ecryptfs-utils suggests:
ii cryptsetup 2:2.3.3-1+b1
ii rsync 3.2.2-2

-- no debconf information



Bug#966198: gdm3: Defunct gdm-session-worker processes occationally remains unhandled.

2020-07-24 Thread Mad Horse
Package: gdm3
Version: 3.36.2-1
Severity: normal

Dear Maintainer,

Sometimes defunct gdm-session-worker processes may appear after logging out
from a gnome session, which usually lasts several hours, but sometimes
logging
out from a gnome session lasting only one minute can trigger this
phenomenon.

These defunct gdm-session-worker processes are owned by the user
"Debian-gdm",
and their cpu time last only several seconds.

These defunct processes do not clearly impact the functionality of gdm3, but
they occupy available process slots, and cannot be manually cleared unless I
restart gdm3 with no gnome session active (via console or ssh).



-- System Information:
Debian Release: bullseye/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.7.0-1-amd64 (SMP w/4 CPU threads)
Locale: LANG=zh_CN.utf8, LC_CTYPE=zh_CN.utf8 (charmap=UTF-8), LANGUAGE
not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages gdm3 depends on:
ii accountsservice 0.6.55-2
ii adduser 3.118
ii cdebconf [debconf-2.0] 0.253
ii dbus 1.12.20-1
ii dconf-cli 0.36.0-1
ii dconf-gsettings-backend 0.36.0-1
ii debconf [debconf-2.0] 1.5.74
ii gir1.2-gdm-1.0 3.36.2-1
ii gnome-session [x-session-manager] 3.36.0-2
ii gnome-session-bin 3.36.0-2+b1
ii gnome-session-flashback [x-session-manager] 3.36.3-1
ii gnome-settings-daemon 3.36.1-1
ii gnome-shell 3.36.3-1
ii gnome-terminal [x-terminal-emulator] 3.36.2-1
ii gsettings-desktop-schemas 3.36.1-1
ii libaccountsservice0 0.6.55-2
ii libaudit1 1:2.8.5-3+b1
ii libc6 2.31-1
ii libcanberra-gtk3-0 0.30-7
ii libcanberra0 0.30-7
ii libgdk-pixbuf2.0-0 2.40.0+dfsg-5
ii libgdm1 3.36.2-1
ii libglib2.0-0 2.64.4-1
ii libglib2.0-bin 2.64.4-1
ii libgtk-3-0 3.24.20-1
ii libkeyutils1 1.6.1-2
ii libpam-modules 1.3.1-5
ii libpam-runtime 1.3.1-5
ii libpam-systemd 245.6-2
ii libpam0g 1.3.1-5
ii librsvg2-common 2.48.7-1
ii libselinux1 3.0-1+b3
ii libsystemd0 245.6-2
ii libwrap0 7.6.q-30
ii libx11-6 2:1.6.9-2+b1
ii libxau6 1:1.0.8-1+b2
ii libxcb1 1.14-2
ii libxdmcp6 1:1.1.2-3
ii lsb-base 11.1.0
ii metacity [x-window-manager] 1:3.36.1-1
ii mutter [x-window-manager] 3.36.3-1
ii policykit-1 0.105-28
ii procps 2:3.3.16-5
ii tilix [x-terminal-emulator] 1.9.3-4+b2
ii ucf 3.0043
ii x11-common 1:7.7+20
ii x11-xserver-utils 7.7+8
ii xterm [x-terminal-emulator] 358-1

Versions of packages gdm3 recommends:
ii at-spi2-core 2.36.0-2
ii desktop-base 10.0.3
ii x11-xkb-utils 7.7+5
ii xserver-xephyr 2:1.20.8-2
ii xserver-xorg 1:7.7+20
ii zenity 3.32.0-5

Versions of packages gdm3 suggests:
pn gnome-orca 
pn libpam-fprintd 
ii libpam-gnome-keyring 3.36.0-1

-- debconf information:
gdm3/daemon_name: /usr/sbin/gdm3
* shared/default-x-display-manager: gdm3



Bug#960474: fcitx-rime: fcitx crashes when switching to fcitx-rime

2020-05-12 Thread Mad Horse
Package: fcitx-rime
Version: 0.3.2-7
Severity: important

Dear Maintainer,

When switching to fcitx-rime, fcitx crashes.

Trace can be retrieved by running with $ fcitx -D:

(ERROR-2559744 ime.c:432) fcitx-keyboard-in-tel-kagapa already exists
(ERROR-2559744 ime.c:432) fcitx-keyboard-cm-mmuock already exists
=
FCITX 4.2.9.7 -- Get Signal No.: 11
Date: try "date -d @1589341159" if you are using GNU date ***
ProcessID: 2559744
fcitx(+0x1927)[0x55c60af5e927]
/lib/x86_64-linux-gnu/libc.so.6(+0x3b7e0)[0x7f677938d7e0]
/usr/lib/x86_64-linux-
gnu/librime.so.1(_ZNK4YAML4Node4TypeEv+0x30)[0x7f676dc8c020]
/usr/lib/x86_64-linux-
gnu/librime.so.1(_ZN4rime10ConfigData15ConvertFromYamlERKN4YAML4NodeEPNS_14ConfigCompilerE+0x35)[0x7f676dc87425]
/usr/lib/x86_64-linux-
gnu/librime.so.1(_ZN4rime10ConfigData12LoadFromFileERKNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEEPNS_14ConfigCompilerE+0x1a2)[0x7f676dc88712]
/usr/lib/x86_64-linux-
gnu/librime.so.1(_ZN4rime18InstallationUpdate3RunEPNS_8DeployerE+0x3cd)[0x7f676dd6c7dd]
/usr/lib/x86_64-linux-
gnu/librime.so.1(_ZN4rime8Deployer7RunTaskERKNSt7__cxx1112basic_stringIcSt11char_traitsIcESaIcEEEN5boost3anyE+0xb3)[0x7f676dc44c83]
/usr/lib/x86_64-linux-
gnu/librime.so.1(RimeStartMaintenance+0xb6)[0x7f676dc25286]
/usr/lib/x86_64-linux-gnu/fcitx/fcitx-rime.so(+0x2e16)[0x7f676f46fe16]
/usr/lib/x86_64-linux-gnu/fcitx/fcitx-rime.so(+0x34ac)[0x7f676f4704ac]
/usr/lib/x86_64-linux-gnu/libfcitx-core.so.0(+0x111ea)[0x7f67795771ea]
/usr/lib/x86_64-linux-gnu/libfcitx-core.so.0(+0x14388)[0x7f677957a388]
/usr/lib/x86_64-linux-gnu/libfcitx-
core.so.0(FcitxInstanceSwitchIMByIndex+0x95)[0x7f677957afb5]
/usr/lib/x86_64-linux-gnu/libfcitx-core.so.0(+0x15083)[0x7f677957b083]
/usr/lib/x86_64-linux-gnu/libfcitx-
core.so.0(FcitxInstanceProcessKey+0x956)[0x7f677957bf36]
/usr/lib/x86_64-linux-gnu/fcitx/fcitx-ipc.so(+0x6a70)[0x7f677409ca70]
/lib/x86_64-linux-gnu/libdbus-1.so.3(+0x26c8d)[0x7f67781e5c8d]
/lib/x86_64-linux-
gnu/libdbus-1.so.3(dbus_connection_dispatch+0x334)[0x7f67781d67e4]
/usr/lib/x86_64-linux-gnu/fcitx/fcitx-dbus.so(+0x28b8)[0x7f67795b18b8]
/usr/lib/x86_64-linux-gnu/fcitx/fcitx-dbus.so(+0x29d1)[0x7f67795b19d1]
/usr/lib/x86_64-linux-gnu/libfcitx-core.so.0(+0xa38a)[0x7f677957038a]
/usr/lib/x86_64-linux-gnu/libfcitx-
core.so.0(FcitxInstanceRun+0x57)[0x7f6779570b27]
fcitx(+0x12bf)[0x55c60af5e2bf]
/lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xeb)[0x7f6779378e0b]
fcitx(+0x133a)[0x55c60af5e33a]




-- System Information:
Debian Release: bullseye/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.6.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=zh_CN.utf8, LC_CTYPE=zh_CN.utf8 (charmap=UTF-8),
LANGUAGE=zh_CN.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages fcitx-rime depends on:
ii fcitx-bin 1:4.2.9.7-3
ii fcitx-data 1:4.2.9.7-3
ii fcitx-modules 1:4.2.9.7-3
ii libc6 2.30-7
ii libfcitx-config4 1:4.2.9.7-3
ii libfcitx-qt5-1 1.2.4-1
ii libgcc-s1 10.1.0-1
ii libqt5core5a 5.12.5+dfsg-10
ii libqt5gui5 5.12.5+dfsg-10
ii libqt5widgets5 5.12.5+dfsg-10
ii librime-data 0.38.20180515-3
ii librime1 1.5.3+dfsg1-5
ii libstdc++6 10.1.0-1

Versions of packages fcitx-rime recommends:
ii fcitx 1:4.2.9.7-3

fcitx-rime suggests no packages.

-- no debconf information



Bug#949469: firejail: files and directories in separate /home encrypted with fscrypt inaccessible inside firejail

2020-01-30 Thread Mad Horse
Furthermore, with --private=/foo/bar, how can I access the encrypted directories
under the real ${HOME}, which is even not introduced into jail anymore with
--private=/foo/bar ? 


在 2020/1/31 下午2:08, Mad Horse 写道:
> With --private=/foo/bar, configurations store under real ${HOME} becomes
> inaccessible,
>
> e.g.
>
>> $ firejail --allusers --private=/tmp/home/
>> --profile=/etc/firejail/firefox.profile /bin/bash
> so it is impractical (Please consider I am running profiled
> applications, rather than shell
>
> with default profile).
>
> Besides, although /home/.fscrypt appears inside jail, a tmpfs is mounted
>
> atop it, and --whitelist cannot be used to mount the real /home/.fscrypt
> there, for /home is
>
> not permitted top directory.
>
>
> 在 2020/1/31 上午7:55, Reiner Herrmann 写道:
>> On Sat, Jan 25, 2020 at 10:45:08PM +0800, Mad Horse wrote:
>>> I have not remembered that because --private is used so widely in
>>> officially shipped profiles, so I have to inspect them with command like
>>>
>>>> $ firejail --profile=/etc/firejail/firefox.profile /bin/bash
>> Hm, I couldn't find "private" in the firefox(-common) profile.
>> Does it work if you start it by giving it a location where it can store
>> the private home directory?
>> Like: firejail --allusers --private=/foo/bar
>> (see also: 
>> https://github.com/netblue30/firejail/issues/3185#issuecomment-578413651 )
>>
>> Regards,
>>   Reiner
>



Bug#949469: firejail: files and directories in separate /home encrypted with fscrypt inaccessible inside firejail

2020-01-30 Thread Mad Horse
Sorry, it is --whitelist which also conflict with --allusers that appears
in most shipped profiles.

在 2020/1/25 下午10:39, Reiner Herrmann 写道:
> On Sat, Jan 25, 2020 at 10:30:50PM +0800, Mad Horse wrote:
>>> Warning: allusers option disabled by private or whitelist option
>> Because of this, inside jails started with private or whitelist options,
>> /home remains masked, so files encrypted with fscrypt remain inaccessible.
> Ok, so I assume that you are using --private (because whitelisting your
> home directory would not be needed)?



Bug#949469: firejail: files and directories in separate /home encrypted with fscrypt inaccessible inside firejail

2020-01-30 Thread Mad Horse
With --private=/foo/bar, configurations store under real ${HOME} becomes
inaccessible,

e.g.

> $ firejail --allusers --private=/tmp/home/
> --profile=/etc/firejail/firefox.profile /bin/bash

so it is impractical (Please consider I am running profiled
applications, rather than shell

with default profile).

Besides, although /home/.fscrypt appears inside jail, a tmpfs is mounted

atop it, and --whitelist cannot be used to mount the real /home/.fscrypt
there, for /home is

not permitted top directory.


在 2020/1/31 上午7:55, Reiner Herrmann 写道:
> On Sat, Jan 25, 2020 at 10:45:08PM +0800, Mad Horse wrote:
>> I have not remembered that because --private is used so widely in
>> officially shipped profiles, so I have to inspect them with command like
>>
>>> $ firejail --profile=/etc/firejail/firefox.profile /bin/bash
> Hm, I couldn't find "private" in the firefox(-common) profile.
> Does it work if you start it by giving it a location where it can store
> the private home directory?
> Like: firejail --allusers --private=/foo/bar
> (see also: 
> https://github.com/netblue30/firejail/issues/3185#issuecomment-578413651 )
>
> Regards,
>   Reiner



Bug#949469: firejail: files and directories in separate /home encrypted with fscrypt inaccessible inside firejail

2020-01-25 Thread Mad Horse
> Ok, so I assume that you are using --private (because whitelisting your
> home directory would not be needed)?
> Please mention such details in the initial report, it saves some
> roundtrips of asking about your specific use-case.
I have not remembered that because --private is used so widely in
officially shipped profiles, so I have to inspect them with command like

> $ firejail --profile=/etc/firejail/firefox.profile /bin/bash

在 2020/1/25 下午10:39, Reiner Herrmann 写道:
> On Sat, Jan 25, 2020 at 10:30:50PM +0800, Mad Horse wrote:
>>> Warning: allusers option disabled by private or whitelist option
>> Because of this, inside jails started with private or whitelist options,
>> /home remains masked, so files encrypted with fscrypt remain inaccessible.
> Ok, so I assume that you are using --private (because whitelisting your
> home directory would not be needed)?
> Please mention such details in the initial report, it saves some
> roundtrips of asking about your specific use-case.
> It sounds like this is currently not supported, but I'll ask upstream
> if they know about a workaround.



Bug#949469: firejail: files and directories in separate /home encrypted with fscrypt inaccessible inside firejail

2020-01-25 Thread Mad Horse
Hi,

> Warning: allusers option disabled by private or whitelist option

Because of this, inside jails started with private or whitelist options,
/home remains masked, so files encrypted with fscrypt remain inaccessible.

在 2020/1/25 下午8:48, Reiner Herrmann 写道:
> On Sat, Jan 25, 2020 at 08:15:11PM +0800, Mad Horse wrote:
>> Sadly they have no effect, because a tmpfs is mounted on /home, masked
>> over /home/.fscrypt .
>> A case like this can usually be resolved by adding
>>> mkdir 
>>> whitelist 
>> in profiles, but unfortunately, "mkdir" only works in ${HOME} and /tmp, so
>> it seems to be still unsolvable under current version of firejail.
> I just asked on the upstream tracker about it [0] and already got a
> suggestion by rusty-snake that could help.
> Can you please try the "--allusers" option?
> (It can also be put into profiles)
>
> At least during my test all files/directories from /home
> were than available inside the jail.
>
> [0] https://github.com/netblue30/firejail/issues/3185



Bug#949469: firejail: files and directories in separate /home encrypted with fscrypt inaccessible inside firejail

2020-01-25 Thread Mad Horse
Hi,

Sadly they have no effect, because a tmpfs is mounted on /home, masked
over /home/.fscrypt .
A case like this can usually be resolved by adding
> mkdir 
> whitelist 
in profiles, but unfortunately, "mkdir" only works in ${HOME} and /tmp, so
it seems to be still unsolvable under current version of firejail.

在 2020/1/25 下午7:48, Reiner Herrmann 写道:
> Hi,
>
> On Tue, Jan 21, 2020 at 04:42:16PM +0800, Mad Horse wrote:
>> In order to access unlocked files and directories encrypted with
>> fscrypt, their
>> protectors. which lies under /.fscrypt of root and each FS with this feature
>> deployed, should also be accessible.
>>
>> Inside firejail, /.fscrypt could be made accessible with "noblacklist"
>> statement in profile, but there seems no way to introduce /home/.fscrypt
>> into firejail, which cause all file and directory in separate /home
>> encrypted
>> with fscrypt inaccessible inside it.
> the fscrypt files are currently blocked via disable-common.inc:
>
> blacklist ${HOME}/.fscrypt
> blacklist /.fscrypt
> blacklist /home/.fscrypt
>
> (and also via the AppArmor firejail profile, if you use it)
>
> Can you add to your local override disable-common.local that
> these should be removed from the blacklist?
>
> noblacklist ${HOME}/.fscrypt
> noblacklist /.fscrypt
> noblacklist /home/.fscrypt
>
> Kind regards,
>   Reiner



Bug#949469: firejail: files and directories in separate /home encrypted with fscrypt inaccessible inside firejail

2020-01-21 Thread Mad Horse
Package: firejail
Version: 0.9.62-2
Severity: normal

Dear Maintainer,

In order to access unlocked files and directories encrypted with
fscrypt, their
protectors. which lies under /.fscrypt of root and each FS with this feature
deployed, should also be accessible.

Inside firejail, /.fscrypt could be made accessible with "noblacklist"
statement in profile, but there seems no way to introduce /home/.fscrypt
into firejail, which cause all file and directory in separate /home
encrypted
with fscrypt inaccessible inside it.




-- System Information:
Debian Release: bullseye/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'testing-proposed-updates'), (500,
'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.4.0-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=zh_CN.UTF-8, LC_CTYPE=zh_CN.UTF-8 (charmap=UTF-8),
LANGUAGE=zh_CN:zh (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages firejail depends on:
ii libapparmor1 2.13.3-7
ii libc6 2.29-7

Versions of packages firejail recommends:
ii firejail-profiles 0.9.62-2
ii iproute2 5.4.0-1
ii iptables 1.8.3-2
ii xauth 1:1.0.10-1
ii xpra 3.0.5+dfsg1-1
ii xserver-xephyr 2:1.20.6-1

firejail suggests no packages.

-- no debconf information



Bug#948993: firejail-profiles: profile for transmission-daemon does not whitelist ~/.config/transmission-daemon

2020-01-15 Thread Mad Horse
Package: firejail-profiles
Version: 0.9.62-2
Severity: normal

Dear Maintainer,

On Debian GNU/Linux, the configuration of transmission-daemon lies in
~/.config/transmission-daemon instead of ~/.config/transmission, which means
~/.config/transmission-daemon should be whitelisted in the profile for
transmission-daemon, while in current profile, only
~/.config/transmission is
whitelisted, causing the configuration of transmission-daemon is not
accessible inside the jail.

Currently I walkaround this via transmission-daemon.local.

-- System Information:
Debian Release: bullseye/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.4.0-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=zh_CN.utf8, LC_CTYPE=zh_CN.utf8 (charmap=UTF-8),
LANGUAGE=zh_CN.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages firejail-profiles depends on:
ii firejail 0.9.62-2

firejail-profiles recommends no packages.

firejail-profiles suggests no packages.

-- no debconf information



Bug#948558: firejail-profiles: firefox running under firejail cannot load system-wide add-ons

2020-01-09 Thread Mad Horse
Package: firejail-profiles
Version: 0.9.62-2
Severity: normal

Dear Maintainer,

In current profiles for firefox (maybe for other browsers, too),
/usr/share/webext/ is not whitelisted,
causing system-wide add-ons installed via apt and dpkg cannot get loaded by
firefox running under firejail.

A 'whitelist /usr/share/webext/' might be added to profiles for browsers
using
webext in order to fix this,
as I walkaround it by putting this in my ~/.config/firejail/firefox.local .



-- System Information:
Debian Release: bullseye/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.3.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=zh_CN.UTF-8, LC_CTYPE=zh_CN.UTF-8 (charmap=UTF-8),
LANGUAGE=zh_CN.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages firejail-profiles depends on:
ii firejail 0.9.62-2

firejail-profiles recommends no packages.

firejail-profiles suggests no packages.

-- no debconf information



Bug#945000: systemd: Umask set in /etc/login.defs is not honored by systemd user units even if pam_umask is enabled.

2019-11-18 Thread Mad Horse
Package: systemd
Version: 243-5
Severity: important

Dear Maintainer,

The traditional way to change the default umask (change /etc/login.defs with
pam_umask enabled in /etc/pam.d/... ) is broken,
for on my does not honor it in user units.

This is a bug known by the upstream (
https://github.com/systemd/systemd/issues/6077 ), and currently the only
possible
walkaround is to override umask for every user unit, as discussed in
https://bugs.launchpad.net/ubuntu/+source/gnome-
terminal/+bug/1685754/comments/21 , which is hard to apply.

I may be unable to fix this issue with my own knowledge and resource,
but I can
report it to you experts at least.



-- Package-specific info:

-- System Information:
Debian Release: bullseye/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.2.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=zh_CN.UTF-8, LC_CTYPE=zh_CN.UTF-8 (charmap=UTF-8),
LANGUAGE=zh_CN.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages systemd depends on:
ii adduser 3.118
ii libacl1 2.2.53-5
ii libapparmor1 2.13.3-6
ii libaudit1 1:2.8.5-2
ii libblkid1 2.34-0.1
ii libc6 2.29-3
ii libcap2 1:2.27-1
ii libcryptsetup12 2:2.2.1-1
ii libgcrypt20 1.8.5-3
ii libgnutls30 3.6.10-4
ii libgpg-error0 1.36-7
ii libidn2-0 2.2.0-2
ii libip4tc2 1.8.3-2
ii libkmod2 26-3
ii liblz4-1 1.9.2-2
ii liblzma5 5.2.4-1+b1
ii libmount1 2.34-0.1
ii libpam0g 1.3.1-5
ii libpcre2-8-0 10.32-5+b1
ii libseccomp2 2.4.1-2
ii libselinux1 2.9-3+b1
ii libsystemd0 243-5
ii mount 2.34-0.1
ii util-linux 2.34-0.1

Versions of packages systemd recommends:
ii dbus 1.12.16-2
ii libpam-systemd 243-5

Versions of packages systemd suggests:
ii policykit-1 0.105-26
pn systemd-container 

Versions of packages systemd is related to:
pn dracut 
ii initramfs-tools 0.135
ii udev 243-5

-- Configuration Files:
/etc/pam.d/systemd-user changed:
@include common-account
session required pam_selinux.so close
session required pam_selinux.so nottys open
session required pam_loginuid.so
session required pam_limits.so
@include common-session-noninteractive
session optional pam_systemd.so
session optional pam_umask.so


-- no debconf information


[OVERRIDDEN] /etc/tmpfiles.d/screen-cleanup.conf -> 
/usr/lib/tmpfiles.d/screen-cleanup.conf

--- /usr/lib/tmpfiles.d/screen-cleanup.conf 2017-06-19 06:31:56.0 
+0800
+++ /etc/tmpfiles.d/screen-cleanup.conf 2017-06-30 08:33:17.091685640 +0800
@@ -1 +1 @@
-d /run/screen 0777 root utmp
+d /run/screen 1777 root utmp

[EXTENDED]   /etc/systemd/system/display-manager.service -> 
/etc/systemd/system/display-manager.service.d/umask.conf
[EQUIVALENT] /etc/systemd/system/nfdump.service -> 
/lib/systemd/system/nfdump.service
[MASKED] /etc/systemd/system/systemd-rfkill.service -> 
/lib/systemd/system/systemd-rfkill.service
[MASKED] /etc/systemd/system/systemd-rfkill.socket -> 
/lib/systemd/system/systemd-rfkill.socket
[MASKED] /etc/systemd/system/transmission-daemon.service -> 
/lib/systemd/system/transmission-daemon.service
[EXTENDED]   /lib/systemd/system/rc-local.service -> 
/lib/systemd/system/rc-local.service.d/debian.conf
[EXTENDED]   /lib/systemd/system/systemd-resolved.service -> 
/lib/systemd/system/systemd-resolved.service.d/resolvconf.conf
[EXTENDED]   /lib/systemd/system/systemd-timesyncd.service -> 
/lib/systemd/system/systemd-timesyncd.service.d/disable-with-time-daemon.conf
[EXTENDED]   /usr/lib/systemd/user/at-spi-dbus-bus.service -> 
/etc/systemd/user/at-spi-dbus-bus.service.d/umask.conf
[EXTENDED]   /usr/lib/systemd/user/blueman-applet.service -> 
/etc/systemd/user/blueman-applet.service.d/umask.conf
[EXTENDED]   /usr/lib/systemd/user/colord-session.service -> 
/etc/systemd/user/colord-session.service.d/umask.conf
[EXTENDED]   /usr/lib/systemd/user/dbus.service -> 
/etc/systemd/user/dbus.service.d/umask.conf
[EXTENDED]   /usr/lib/systemd/user/evolution-addressbook-factory.service -> 
/etc/systemd/user/evolution-addressbook-factory.service.d/umask.conf
[EXTENDED]   /usr/lib/systemd/user/evolution-calendar-factory.service -> 
/etc/systemd/user/evolution-calendar-factory.service.d/umask.conf
[EXTENDED]   /usr/lib/systemd/user/evolution-source-registry.service -> 
/etc/systemd/user/evolution-source-registry.service.d/umask.conf
[EXTENDED]   /usr/lib/systemd/user/evolution-user-prompter.service -> 
/etc/systemd/user/evolution-user-prompter.service.d/umask.conf
[EXTENDED]   /usr/lib/systemd/user/glib-pacrunner.service -> 
/etc/systemd/user/glib-pacrunner.service.d/umask.conf
[EXTENDED]   /usr/lib/systemd/user/gnome-terminal-server.service -> 
/etc/systemd/user/gnome-terminal-server.service.d/umask.conf
[EXTENDED]   /usr/lib/systemd/user/gvfs-afc-volume-monitor.service -> 
/etc/systemd/user/gvfs-afc-volume-monitor.service.d/umask.conf
[EXTENDED]   /usr/lib/systemd/user/gvfs-daemon.service -> 
/etc/systemd/user/gvfs-daemon.service.d/umask.conf
[EXTENDED]   

Bug#943416: linux: Missing modules for newly appeared hardware

2019-10-24 Thread Mad Horse
Source: linux
Version: 5.3.0-1
Severity: wishlist

Dear Maintainer,

A lot of device drivers introduced after Linux 5 is not built even in
5.3.7-1,
including

> # CONFIG_MISC_ALCOR_PCI is not set
> # CONFIG_USB_NET_AQC111 is not set

I wish much newly introduced drivers could be built along with the new
upstream
kernel release, or is there any policy preventing these new drivers being
enabled?



-- System Information:
Debian Release: bullseye/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.2.0-3-amd64 (SMP w/4 CPU cores)
Locale: LANG=zh_CN.utf8, LC_CTYPE=zh_CN.utf8 (charmap=UTF-8),
LANGUAGE=zh_CN.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#942126: gvfs-fuse: /run/user/ID/gvfs/ empty after upgrade

2019-10-13 Thread Mad Horse
Hello Cesare,

If I try to invoke $ /usr/lib/gvfs/gvfsd-fuse /run/user/${myuid}/gvfs , it 
reports:

> fuse: failed to exec fusermount3: No such file or directory

So, the real problem is that gvfs-fuse is hardcoded to call fusermount3 instead 
fusermount.

It may be walked around by creating an alternative with

> # update-alternatives --install /bin/fusermount3 fusermount3 /bin/fusermount 
> 10

which may means it had better use the alternative system to provide 
/bin/fusermount

between fuse"2" and fuse3, and let gvfsd-fuse and other fuse mounters call 
/bin/fusermount directly.

Best regard,

Mad Horse



Bug#935973: Acknowledgement (debian-installer: cryptsetup-initramfs will not be installed even when using full-disk encryption.)

2019-09-15 Thread Mad Horse
This issue is confirmed to exist in the testing weekly build generated
on Sep. 2nd 2019.



Bug#935973: debian-installer: cryptsetup-initramfs will not be installed even when using full-disk encryption.

2019-08-28 Thread Mad Horse
Package: debian-installer
Severity: important

Dear Maintainer,

The package "cryptsetup-initramfs" will not be installed even root file
system
is configured to be on a logical volume on an LVM PV inside a LUKS,
making the
installed system stuck in initramfs, unless we manually install cryptsetup-
initramfs with rescue mode, or possibly before rebooting from
debian-installer
when installation is "finished".



-- System Information:
Debian Release: bullseye/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'testing-proposed-updates'), (500,
'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.2.0-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=zh_CN.utf8, LC_CTYPE=zh_CN.utf8 (charmap=UTF-8),
LANGUAGE=zh_CN.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Bug#935972: debian-installer: Package "fuse" installation failed in debian-installer

2019-08-28 Thread Mad Horse
Package: debian-installer
Severity: important

Dear Maintainer,

The package "fuse" installation failed on postinst when installing with the
weekly build testing installer generated on Aug. 26th, after the "tasksel"
step, and installation can hardly continue, unless we fix it manually, by
chrooting into /target , and running "# apt-get install fuse" on free PTYs.
Interestingly, this will succeed while complaining about some module
lists is
not available.



-- System Information:
Debian Release: bullseye/sid
APT prefers testing
APT policy: (900, 'testing'), (500, 'testing-proposed-updates'), (500,
'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.2.0-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=zh_CN.utf8, LC_CTYPE=zh_CN.utf8 (charmap=UTF-8),
LANGUAGE=zh_CN.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled