Bug#1070339: libata bug after resume from suspend

2024-05-10 Thread Phillip Susi
After updating to the -21 kerenl, I could not reproduce this anymore.  I
went back and forth between -21 and -20 a few times, and found the exact
steps to reproduce it, but it only works under -20:

1) enable runtime PM on the disks
2) wait for runtime PM to suspend the disks
3) suspend the system


So it seems that this has been fixed.



Bug#1051903: gparted: Warning symbol when formatting in FAT32 in all removable disks

2023-09-14 Thread Phillip Susi


jpedro  writes:

>* What led up to the situation?
> Creating or formating fat32 partitions in any removable disk (usb 
> disks
> and SD  cards) shows a warning symbol. At the information menu appears
> to be a possible bad disk. Also the disk is not properly formatted or
> the partition not properly created.

Are you sure that you *formatted* the partition?  Just creating the
partition without formatting it results in the warning symbol.  Can you
post the output of parted print on such a drive?



Bug#1025568: gparted: diff for NMU version 1.3.1-1.1

2023-08-23 Thread Phillip Susi


Hugh McMaster  writes:

> I didn't see a need to build-depend on libpolkit-gobject-1-dev, but
> I'm not overly familiar with gparted's requirements.

I think something changed in 1.5 that made it require a file that moved
to this package in trixie, so I had to add it to get it to build.

> Please let me know if I should submit a PR for the NMU on salsa
> (noting you'd have to update the changelog to account for your recent
> changes), or whether I should cancel the upload.

Sorry for the late reply.  I would have said cancel it but it looks like
it already went through.  It sounds like it shouldn't hurt for me to
just upload my build though, so I'll do that now that I sorted out my
new signing subkey.



Bug#1025568: gparted: diff for NMU version 1.3.1-1.1

2023-08-21 Thread Phillip Susi


Hugh McMaster  writes:

> Control: tags 1025568 + patch
> Control: tags 1025568 + pending
>
> Dear maintainer,
>
> I've prepared an NMU for gparted (versioned as 1.3.1-1.1) and
> uploaded it to DELAYED/2. Please feel free to tell me if I
> should delay it longer.

I have an upload of 1.5 pending my sorting my gpg key out again.  Could
you submit any changes as a PR on salsa?  I think I saw someone had done
that for some minor issues ( was that you? ) but the CI failed.



Bug#1043290: ITS policy lost in transition?

2023-08-08 Thread Phillip Susi
Package: src:policykit-1
Version: 123-1

I'm trying to package a new upstream of the gparted package and respond
to bug #1025568 involving a policykit transition.  It appears that
gparted uses gettext which is failing to build because it requires
/usr/share/gettex/its/policy.its and policy.loc.  These files used to be
provided by policykit-1, but no longer appear to be packaged at all in
Trixie.  Were these files supposed to be migrated to another package and
forgotten?  I would imagine this should be causing ftbs in a number of
packages that use gettext.  Then again, I wonder if gettext needs these
files, why were they part of policykit before?  Why aren't they shipped
with gettext or a package that it depends on?



Bug#983357: Bug#988776: Bug#983357: Netinst crashes xen domU when loading kernel

2021-08-25 Thread Phillip Susi


Chuck Zmudzinski  writes:
> If it doesn't work, I am also willing to try approach a by patching
> the Linux kernel xen-kbdfront driver by removing the for loops that
> advertise those 654 keys. I tend to agree with Philip that this is
> totally unnecessary, but I suppose I could be wrong about that.
> I read the discussion Philip had with the Xen developers and they
> seemed to want to keep the Xen keyboard driver as it is.

That was the first thing I tried and the libinput maintainer pointed out
that if you don't advertise the keys, you can't use the keys.  In other
words, somebody presses that key on their keyboard and the domU won't
recognize it.



Bug#983357: Bug#988776: Bug#983357: Netinst crashes xen domU when loading kernel

2021-08-24 Thread Phillip Susi


Ben Hutchings  writes:

> I think a proper fix would be one of:
>
> a. If the Xen virtual keyboard driver is advertising capabilities it
>doesn't have, stop it doing that.
> b. Change the implementation of modalias attributes to allow longer
>values.
>
> It's not clear to me whether the Xen driver is advertising correctly or
> not.  If it is, then the solution should be b, but that may be too
> disruptive a change to the kernel.  So a reasonable workaround might
> be:
>
> c. Change the input subsystem to limit the length of the
>capabilities part of the modalias.

The problem with a) is that the Xen keyboard is not a physical keyboard
and so it has no way of knowing what keys it actually has.  It is a fake
input device designed to pass through whatever input the Xen hypervisor
sends down.  As such, any key could come in.  If it doesn't advertise
that it has all of these keys, then they would not be accepted by
libinput when the hypervisor sends them down.

This seems to be the heart of the problem: libinput was designed
assuming that all keyboards can and must report what keys are actually
present, and then libinput tries to cram that information into the
modalias rather than some other sysfs attribute as it should ( or not at
all... I still don't see how this information is actually supposed to be
useful to userspace ).

As for b), the problem isn't with the modalias attribute itself, but
when the kernel tries to copy it into the environment block for the udev
callout.  The environment block is only a single page, and so limited to
4 KB.  And that's for everything else that goes into the environment,
not just the modalias.



Bug#989656: Xen misusing syslog

2021-06-09 Thread Phillip Susi
Package: xen-utils-common
Version: 4.14.1+11-gb0b734a8b3-1

My syslog has entries that look like this:

Jun 09 10:54:26 hyper1 root[621]: /etc/xen/scripts/block: add
XENBUS_PATH=backend/vbd/1/768

The third field is supposed to be the program name, which I would expect
to either be xen or xl or something, but instead it appears to be
passing $USER.



Bug#983357: Netinst crashes xen domU when loading kernel

2021-05-25 Thread Phillip Susi


Michael Biebl writes:

> So this is a change in behaviour in the kernel?

Yes, this commit fixed the kernel to report the error instead of
silently failing:

commit df44b479654f62b478c18ee4d8bc4e9f897a9844
Author: Peter Rajnoha 
Date:   Wed Dec 5 12:27:44 2018 +0100

kobject: return error code if writing /sys/.../uevent fails

Propagate error code back to userspace if writing the /sys/.../uevent
file fails. Before, the write operation always returned with success,
even if we failed to recognize the input string or if we failed to
generate the uevent itself.

With the error codes properly propagated back to userspace, we are
able to react in userspace accordingly by not assuming and awaiting
a uevent that is not delivered.

Signed-off-by: Peter Rajnoha 
Signed-off-by: Greg Kroah-Hartman 

> What happens if you boot the installed system? Does udevadm trigger fail 
> there as well?

Yes, it does; that is how I was able to track down the problem.

> I feel a bit uneasy changing the udev start script this late in the 
> release cycle (especially when it appears like covering up an issue 
> someplace else).
>
> I'll let Marco make the judgement on this though, as he has the most 
> experience with those udev udeb start scripts as the original author.

So far I have been removing the -e from the shbang line in the
start-udev script and remastering the iso so I can get it to boot.  It
would probably be a better idea to just add a || true to the udevadm
trigger call.  I feel fairly certain that no matter what the cause of
the coldplug failure, the user is going to be better off ignoring it and
trying to proceed than a kernel panic.



Bug#983357: Netinst crashes xen domU when loading kernel

2021-05-19 Thread Phillip Susi
The discussion upstream does not seem to be converging on a proper fix
in the kernel, so I'm going to clone this bug and suggest that
debian-installer patch the start-udev script to ignore the failure of
the udevadm trigger command.

To summarize: init ends up calling start-udev which calls udevadm
trigger to cold plug all devices.  Both scripts are set -e.  The Xen
Virtual Keyboard driver and at least one other driver have always failed
to trigger due to having absurdly long modalias, but the error used to
be ignored.  The kernel now returns the error to udevadm, so it exits
with an error, so start-udev exits with an error, so init exits with an
error, causing the kernel to panic.



Bug#962214: (no subject)

2021-04-29 Thread Phillip Susi


julien forest writes:

> Package: policykit-1 
> Version: 0.105-30
> State: not installed
> Multi-Arch: foreign
> Priority: optional
> Section: admin
> Maintainer: Utopia Maintenance Team
>  Architecture: amd64
> Uncompressed Size: 335 k
> Depends: ... default-logind | logind ...
>
> which itself depends on libpam-systemd or libpam-elogind 
>
> There is no need IMHO to add such a dependency (maybe a recommend).

gparted depends on policykit-1 to get run as root.  Unless there's some
other way that still works these days to do that, removing this
depenency will break the desktop icon.

That depends on either systemd or elogind, which AFAIK, are already
requirements for any of the supported desktops.

Then again, if policykit-1 is already installed in all of the desktops,
the depenency may be redundant?  On the other hand, if it is redundant,
then how will removing it help you?  If it isn't redundant, then what
configurations will break because they don't have policykit-1 and so
launching gparted from the desktop icon will fail?



Bug#983357: Netinst crashes xen domU when loading kernel

2021-04-29 Thread Phillip Susi
I dug down to the the -ENOMEM coming from the fact that the modalias is
over 2KB of crap so it won't fit in the environment block when the input
core tries to add it for the uevent.  I don't see how it gets this way
though because the MODULE_ALIAS() statement in the code just says it
should be "xen: vkbd".

When I read the modalias in sysfs, it says:

input:b0001v5853pe-e0,1,k71,72,73,74,75,76,77,78,79,7A,7B,7C,7D,\
7E,7F,80,81,82,83,84,85,86,87,88,89,8A,8B,8C,8D,8E,8F,90,91,92,93,94,95,\
96,97,98,99,9A,9B,9C,9D,9E,9F,A0,A1,A2,A3,A4,A5,A6,A7,A8,A9,AA,AB,AC,AD,\
AE,AF,B0,B1,B2,B3,B4,B5,B6,B7,B8,B9,BA,BB,BC,BD,BE,BF,C0,C1,C2,C3,C4,C5,\
C6,C7,C8,C9,CA,CB,CC,CD,CE,CF,D0,D1,D2,D3,D4,D5,D6,D7,D8,D9,DA,DB,DC,DD,\
DE,DF,E0,E1,E2,E3,E4,E5,E6,E7,E8,E9,EA,EB,EC,ED,EE,EF,160,161,162,163,16\
4,165,166,167,168,169,16A,16B,16C,16D,16E,16F,170,171,172,173,174,175,17\
6,177,178,179,17A,17B,17C,17D,17E,17F,180,181,182,183,184,185,186,187,18\
8,189,18A,18B,18C,18D,18E,18F,190,191,192,193,194,195,196,197,198,199,19\
A,19B,19C,19D,19E,19F,1A0,1A1,1A2,1A3,1A4,1A5,1A6,1A7,1A8,1A9,1AA,1AB,1A\
C,1AD,1AE,1AF,1B0,1B1,1B2,1B3,1B4,1B5,1B6,1B7,1B8,1B9,1BA,1BB,1BC,1BD,1B\
E,1BF,1C0,1C1,1C2,1C3,1C4,1C5,1C6,1C7,1C8,1C9,1CA,1CB,1CC,1CD,1CE,1CF,1D\
0,1D1,1D2,1D3,1D4,1D5,1D6,1D7,1D8,1D9,1DA,1DB,1DC,1DD,1DE,1DF,1E0,1E1,1E\
2,1E3,1E4,1E5,1E6,1E7,1E8,1E9,1EA,1EB,1EC,1ED,1EE,1EF,1F0,1F1,1F2,1F3,1F\
4,1F5,1F6,1F7,1F8,1F9,1FA,1FB,1FC,1FD,1FE,1FF,200,201,202,203,204,205,20\
6,207,208,209,20A,20B,20C,20D,20E,20F,210,211,212,213,214,215,216,217,21\
8,219,21A,21B,21C,21D,21E,21F,220,221,222,223,224,225,226,227,228,229,22\
A,22B,22C,22D,22E,22F,230,231,232,233,234,235,236,237,238,239,23A,23B,23\
C,23D,23E,23F,240,241,242,243,244,245,246,247,248,249,24A,24B,24C,24D,24\
E,24F,250,251,252,253,254,255,256,257,258,259,25A,25B,25C,25D,25E,25F,26\
0,261,262,263,264,265,266,267,268,269,26A,26B,26C,26D,26E,26F,270,271,27\
2,273,274,275,276,277,278,279,27A,27B,27C,27D,27E,27F,280,281,282,283,28\
4,285,286,287,288,289,28A,28B,28C,28D,28E,28F,290,291,292,293,294,295,29\
6,297,298,299,29A,29B,29C,29D,29E,29F,2A0,2A1,2A2,2A3,2A4,2A5,2A6,2A7,2A\
8,2A9,2AA,2AB,2AC,2AD,2AE,2AF,2B0,2B1,2B2,2B3,2B4,2B5,2B6,2B7,2B8,2B9,2B\
A,2BB,2BC,2BD,2BE,2BF,2C0,2C1,2C2,2C3,2C4,2C5,2C6,2C7,2C8,2C9,2CA,2CB,2C\
C,2CD,2CE,2CF,2D0,2D1,2D2,2D3,2D4,2D5,2D6,2D7,2D8,2D9,2DA,2DB,2DC,2DD,2D\
E,2DF,2E0,2E1,2E2,2E3,2E4,2E5,2E6,2E7,2E8,2E9,2EA,2EB,2EC,2ED,2EE,2EF,2F\
0,2F1,2F2,2F3,2F4,2F5,2F6,2F7,2F8,2F9,2FA,2FB,2FC,2FD,2FE,ramlsfw



Bug#983357: (no subject)

2021-04-29 Thread Phillip Susi
I bisected the problem to this commit:

commit df44b479654f62b478c18ee4d8bc4e9f897a9844
Author: Peter Rajnoha 
Date:   Wed Dec 5 12:27:44 2018 +0100

kobject: return error code if writing /sys/.../uevent fails

Propagate error code back to userspace if writing the /sys/.../uevent
file fails. Before, the write operation always returned with success,
even if we failed to recognize the input string or if we failed to
generate the uevent itself.

With the error codes properly propagated back to userspace, we are
able to react in userspace accordingly by not assuming and awaiting
a uevent that is not delivered.

Signed-off-by: Peter Rajnoha 
Signed-off-by: Greg Kroah-Hartman 

So it appears that the Xen Virtual Keyboard driver was always broken but
the error in triggering the uevent was not previously reported.  The
upstream bug report notes another driver failing.  There are probably
other drivers too. 

I will continue to try to find and fix the Xen keyboard error so it no
longer fails anyway, but it is probably a good idea to patch the
start-udev script in d-i to ignore errors.  It is better to continue
with some device not triggering a cold plug event than to instantly panic
the kernel in early boot.



Bug#987688: Please add more filesystem drivers to hd-media

2021-04-27 Thread Phillip Susi
Package: debian-installer
Version: 20210415

I just tried using the hd-media build to boot from an existing hard disk
and install without using removable media and was not able to do so
because I used btrfs on the hard disk, and most filesystems are packaged
as separate udebs rather than being built into the initrd.  I think it
was only iso9660, fat, and ext4 that were in there.  Please consider
moving btrfs and probably a few other filesystem modules into the
hd-media initrd so that it can be used outside of ext4 and fat.



Bug#983357: #983357: Netinst crashes xen domU when loading kernel

2021-04-27 Thread Phillip Susi
affects 983357 + debian-installer
severify 983357 serious
thanks

It appears that the root cause of this bug has been reported upstream
here:

https://bugzilla.kernel.org/show_bug.cgi?id=207695

It seems that there is an error trying to udev trigger the Xen virtual
keyboard, and this causes start-udev to bail out, which causes init to
bail out and the kernel to panic.  Removing the set -e from start-udev
appears to be a viable workaround that d-i might want to consider.



Bug#983357: #983357: Netinst crashes xen domU when loading kernel

2021-04-27 Thread Phillip Susi
reopen 983357
thanks

I don't know what happened, but it is back to not working, even with the
install.amd/xen/ kernel.

Phillip Susi writes:

> The netinst image I had contained the -3 kernel.  I rebuit the image
> with the current -6 kernel and it worked.  I downloaded the latest
> weekly netinst iso and it already contains the -6 kernel, so it appears
> that this has been fixed in -4, -5, or -6.



Bug#962214: Needles dependencies to policykit

2021-04-26 Thread Phillip Susi


julien forest writes:

> Is there any hope to remove this dependency to policykit-1 which
> prevents users who do not want to use systemd to install the current
> version of gparted ? 

What does policykit have to do with systemd?  AFAIK, that is the
mechanism that all desktops can use to run a program as root.



Bug#983357: #983357: Netinst crashes xen domU when loading kernel

2021-04-22 Thread Phillip Susi
reassign 983357 linux
severity grave
thanks

I rebuilt the iso using the version of isolinux from stable and it still
crashed the domU.  When I rebuilt it using the vmlinux and initrd.gz
from the stable iso, it successfully boots, so it appears to be caused
by the kernel.

Interestingly, there appears to be a different kernel build just for use
under xen in install.amd/xen and using that one also works.  Maybe we
need a menu option in isolinux to load that kernel instead?



Bug#983357: Netinst crashes xen domU when loading kernel

2021-02-22 Thread Phillip Susi
Package: debian-installer
Version: 20201202

Every bullseye netinst image I have tried to boot in a xen domU has
crashed and rebooted the domU after choosing any entry from the boot
menu.  I thought there might have been something wrong with my xen
server, which was running Ubuntu 18.04, but I rebuilt it the other day
using bullseye as the dom0, and I still can't install bullseye in a
domU.



Bug#981692: Try to use the gain value and set it to 512 (one sector) instead of default 1MiB. Its a bug in sfdisk BTW.

2021-02-03 Thread Phillip Susi


Eric Valette writes:

> Its and very old SSD that has been partitionned at time where thedefault 
> 1MiB space limit between partition was was no there. Apart that I did 
> partition probably usinf cfisk at that time.
>
> What is strange is that in my case sfdisk -V reports no error and the 
> partitions are correctly detected so the EBR are obviously stored...

It is theretically possible to say, store multipe EBRs in the start of
the extended partition before the first logical partition, then have no
space between each logical partition, but parted does not support this.
It requires the EBR to be between the previous partition and the next,
so there must be at least one unused sector between them.  I have seen
reports over the years of people running into disks built this way but
never been able to figure out how they got that way.

> I guess that it happens that the default size for sfdisk "grain" value 
> (see man sfdisk) has chnaged from one sector to one MiB. I created the 
> following output. see the gain value below.

I still get an error:

img6: /dev/sdb6 : start=   158203904, size= 9762816, type=83
Start sector 158203904 out of range.
Failed to add #6 partition: Numerical result out of range



Bug#981692: parted: crash when printing device partitions

2021-02-03 Thread Phillip Susi
When I tried to recreate this, sfdisk gave me an error that the
numerical result was out of range.  When I looked closely at the
numbers, it appears that you have no space between partitions 5 and 6,
so there is no room to place the EBR.  Do you know how you managed to
generate a partition table that is broken in this way?



Bug#948739: gparted should not mask .mount units

2021-02-01 Thread Phillip Susi
Control: reopen -1

Ivo De Decker writes:

> This new upstream version doesn't remove the code masking the systemd units.
> It just changes it a little. So it doesn't fix this bug.

Woops... you're right.



Bug#948739: Bug #948739: gparted should not mask .mount units

2021-01-29 Thread Phillip Susi


John Paul Adrian Glaubitz writes:

> Hello!
>
> It looks like this particular issue has been fixed in gparted 1.2.0 which
> was just released a few days ago [1]:
>
>> - Don't try to mask non-existent Systemd \xe2\x97\x8f.service (#129, !64)
>
> Might be an idea to update gparted to version 1.2.0 before the Bullseye freeze
> which is coming in Mid-February [2].

Thanks... on it.



Bug#979596: Missing fonts from package

2021-01-08 Thread Phillip Susi
Package: kbd
Version: 2.3.0-3

The t and drdos fonts provided by the upstream kbd package are missing
in the debian binary package.



Bug#979532: Wrong man page installed for gdm(8)

2021-01-07 Thread Phillip Susi
Package: gdm3
Version: 3.38.2.1-1

/usr/share/man/man8/gdm3.8.gz actually contains a copy of of the man
page for gdm-screenshot(1) rather than gdm3.



Bug#977411: gdm does not recognize keyboard input

2021-01-05 Thread Phillip Susi


I disabled wayland in /etc/gdm3/daemon.conf and and keyboard input works
fine in X11.



Bug#977411: gdm does not recognize keyboard input

2021-01-05 Thread Phillip Susi
I just made a clean install in a new vm from 10.7 netinst, then did a
dist-upgrade, and once again, keyboard input is not being recognized.

This may be a release-critical issue?

My host system is Ubuntu 18.04 running Xen 4.9.2, and I'm using vnc to
access the virtual console.



Bug#977411: gdm3: gdm does not recognize keyboard input

2020-12-14 Thread Phillip Susi
Package: gdm3
Version: 3.38.2-1
Severity: important
X-Debbugs-Cc: ph...@thesusis.net

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?

After not using it for some time, I fired up my testing VM ( in a Xen DomU )
and ran a dist-upgrade.  Since then ( last week ), I can't log into the gui
because it does not recognize any keyboard input.  libinput-debug from the
xen console recognizes the input, but not gdm3.

   * What exactly did you do (or not do) that was effective (or
 ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these template lines ***


-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 5.9.0-4-amd64 (SMP w/8 CPU threads)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages gdm3 depends on:
ii  accountsservice   0.6.55-3
ii  adduser   3.118
ii  dbus  1.12.20-1
ii  dconf-cli 0.38.0-1
ii  dconf-gsettings-backend   0.38.0-1
ii  debconf [debconf-2.0] 1.5.74
ii  gir1.2-gdm-1.03.38.2-1
ii  gnome-session [x-session-manager] 3.38.0-3
ii  gnome-session-bin 3.38.0-3
ii  gnome-session-common  3.38.0-3
ii  gnome-settings-daemon 3.38.1-2
ii  gnome-shell   3.38.2-1
ii  gnome-terminal [x-terminal-emulator]  3.38.1-2
ii  gsettings-desktop-schemas 3.38.0-2
ii  konsole [x-terminal-emulator] 4:20.08.3-1
ii  kwin-x11 [x-window-manager]   4:5.19.5-3
ii  libaccountsservice0   0.6.55-3
ii  libaudit1 1:2.8.5-3.1+b1
ii  libc6 2.31-5
ii  libcanberra-gtk3-00.30-7
ii  libcanberra0  0.30-7
ii  libgdk-pixbuf2.0-02.40.2-2
ii  libgdm1   3.38.2-1
ii  libglib2.0-0  2.66.3-2
ii  libglib2.0-bin2.66.3-2
ii  libgtk-3-03.24.24-1
ii  libkeyutils1  1.6.1-2
ii  libpam-modules1.3.1-5
ii  libpam-runtime1.3.1-5
ii  libpam-systemd247.1-3
ii  libpam0g  1.3.1-5
ii  librsvg2-common   2.50.2+dfsg-1
ii  libselinux1   3.1-2+b2
ii  libsystemd0   247.1-3
ii  libx11-6  2:1.6.12-1
ii  libxau6   1:1.0.8-1+b2
ii  libxcb1   1.14-2
ii  libxdmcp6 1:1.1.2-3
ii  lsb-base  11.1.0
ii  mutter [x-window-manager] 3.38.2-1
ii  plasma-workspace [x-session-manager]  4:5.19.5-5+b1
ii  policykit-1   0.105-29
ii  procps2:3.3.16-5
ii  ucf   3.0043
ii  x11-common1:7.7+21
ii  x11-xserver-utils 7.7+8
ii  xterm [x-terminal-emulator]   362-1

Versions of packages gdm3 recommends:
ii  at-spi2-core2.38.0-2
ii  desktop-base10.0.3
ii  x11-xkb-utils   7.7+5
ii  xserver-xephyr  2:1.20.10-1
ii  xserver-xorg1:7.7+21
ii  zenity  3.32.0-6

Versions of packages gdm3 suggests:
pn  gnome-orca
pn  libpam-fprintd
ii  libpam-gnome-keyring  3.36.0-1

-- debconf information:
* shared/default-x-display-manager: gdm3
  gdm3/daemon_name: /usr/sbin/gdm3



Bug#948739: Bug #948739: gparted should not mask .mount units

2020-09-17 Thread Phillip Susi
Just wanted to note in this copy of the bug that the recommendation from
upstream systemd was that gparted should not be masking mounts but
instead should take a bsd lock on the device to prevent auto mounts.



Bug#955858: gparted: does not start, 'unable to init server', tmp.mount does not exist

2020-04-08 Thread Phillip Susi


Kyle B writes:

> (gpartedbin:11049): Gtk-WARNING **: 09:04:39.901: cannot open display:

What display server / desktop environment are you using?



Bug#916260: gparted mounts partition without protection

2020-02-18 Thread Phillip Susi


Marc Lehmann writes:

> No, it just means gparted has a security bug, because the permissions
> did work as the user intended before gparted changed them without the
> users knowledge, and they would have worked if gparted wasn't insecurely
> exposing the files.

Claiming that the side effect of keeping the fs either unmounted or
mounted somewhere users can't see is part of the permissions is like
claiming that keeping power from reaching the computer is part of the
security system.  I mean, without the ability to power on the computer,
people can't access the files, so by your logic, if I plug the computer
in then  I'm the problem.

Any setup that relies on directory traversal to prevent people from
reaching files that they otherwise are given access to is very fragile
and badly set up.  If an admin later builds a chroot environment for
isntance, and sets up some bind mounts, they can inadvertently give
access to the wrong users because they now can see the files that have
poorly configured permissions.  It's just not smart to do things that way.

> The reason why your logic doesn't work is that you claim *every* debian
> root fs has the wrong permissions, because some directories might be
> world-writable (such as /tmp) which might not be what the user
> intended

It isn't /tmp that is wrong, but whatever files you are storing in the
btrfs volume and have left set to 777.  Don't do that.

> by not having the fs mounted in an insecure location (and thus allowing a
> DoS attack). It would also mean filesystems such as fat, without intrinsic
> permissions, would somehow have "wrong" permissions.

That's why fat has mount options to set the permissions on the fs
globally.

>> When gparted mounts it somewhere that isn't traverse proof, yes, that
>> does allow access where it was not previously, but that's really only
>> exposing the underlying bug that was always there: that the permissions
>> on the files are too loose.
>
> Well, I have asked you for the source of this claim, but you haven't given
> one - and I claim you just made it up, because I can't believe you have a
> source.

Source?  The source is the givens of the scenario we are discussing -- a
file or files in a filesystem with mode 777 so that everyone can access
it, but mounted in a directory that is traverse restricted.  That is de
facto too loose.  If you are just going to make an appeal to authority
fallacy in continued attempts to semantically redefine loose to tight
and wrong right, then this is just a waste of time.



Bug#916260: gparted mounts partition without protection

2020-02-14 Thread Phillip Susi


Marc Lehmann writes:

> Maybe it helps when you realise thta chown can also modify a file...

Only root can do that.  In any case, I was ceeding the point that it is
essentially the same thing.

> You yourself mentioned some - in any case, does this lead somewhere?

I was just curious if there were some that I didn't know about.

>> In both cases the permissions on the file itself are wrong,
>
> You keep making this false claim, but that doesn't lend it more
> credence.  POSIX permissions work the way they work, and if you think some
> combination of permissions are wrong, what are the rules to determine
> right and wrong and what is your source for this repeated statement?

Simple... right doesn't allow access to the people you don't want to
have it.  Wrong permissions do allow access to those you don't intend to
have it.  Working around that by other means ( to deny access to the
entire filesystem ) does not change the fact that the permissions on the
file are not configured correctly to carry out your intent.

>> 
>> The permissions allow access that you do not wish it to.  Ipso facto,
>> the permissions are incorrect.
>
> Ah, maybe I see where you are copming from - gparted changes effective
> permissions, so they are wrong.

No, I didn't say anything about gparted.

When gparted mounts it somewhere that isn't traverse proof, yes, that
does allow access where it was not previously, but that's really only
exposing the underlying bug that was always there: that the permissions
on the files are too loose.

If you are running an unpatched kernel that is vulnerable to a remote
exploit and aren't connected to the network, then you don't have to
worry about it, but if I plug in an Ethernet cable, it doesn't mean that
the breach of security is my fault.



Bug#916260: gparted mounts partition without protection

2020-02-14 Thread Phillip Susi


Marc Lehmann writes:

> When you recreate a file with different contents you have modified it.
> Anything else is weird word twisting, and not useful in this context - it
> doesn't matter how exactly I change a file, as long as I can change it
> when I shouldn't be, it is a security bug.

True, you can delete the file and replace it, but then it is now owned
by you instead of the original owner.  It's a fair argument that it
amounts mostly to the same thing.

> No, there are other possibilities, but that is one way, yes.

Other possibilities like what?

>> looser permissions, and that amounts to the same thing as just not
>> keeping it mounted most of the time.
>
> No, these are very different things.

How so?  In both cases the permissions on the file itself are wrong,
and you are relying other mechanisms to stop access before it gets to
checking the wrong permissions.

> Your question is loaded, because it presumes that the correct permissions
> are somehow incorrect (a contradiction that any answer would have to
> accept, which makes it impossible to answer your question). That is
> not

The permissions allow access that you do not wish it to.  Ipso facto,
the permissions are incorrect.



Bug#916260: gparted mounts partition without protection

2020-02-11 Thread Phillip Susi


Marc Lehmann writes:

> It happens also for filesystems with correct permissions - maybe this is
> the point you have problems with?
>
> The effective permissions for a path depend on more than just the
> permissions of the file it refers to. For example, a root-only readable
> file can still be changed by normal users if the directory is writable for
> them.

No, it can't.  If the directory is writable, then the user can modify
the directory, i.e. to rm the file, but they can't modify the file
itself.

> That means the whole access path needs to be taken into account, and
> this is why the security issue is in gparted, because gparted changes
> effective permissions in ways not expected by the user, by mounting it in
> an insecure location.

The only way it can change the effective permissions are if you normally
have it mounted in a directory that uses the traverse/execute permission
to restrict who can traverse it with the files inside otherwise having
looser permissions, and that amounts to the same thing as just not
keeping it mounted most of the time.  Or I suppose you could use a
filesystem namespace so that it is only mounted to the one user and not
visable to the rest of the system.  Either way, it begs the question:
why not just set the permissions correctly instead?

Come to think of it, maybe using filesystem namespaces would be a better
idea than chmod()ing the /tmp mount point ( and then creating another
subdirectory in which to actually mount the fs ).



Bug#916260: gparted mounts partition without protection

2020-02-03 Thread Phillip Susi


Nicolas Braud-Santoni writes:
> The scenario at play is the following:
>
> 1. I am a user with some level of administrative privileges, and run gparted.
> 2. I resize a partition (btrfs, in Marc's initial report),
>causing it to be mounted under /tmp, with a mountpoint that's chmod 0777.
> 3. Now *another user* on the same machine can access that file system,
>which I unwittingly mounted and exposed.

I get it, I just don't understand why you would have a filesystem around
whose internal permissions were not already set up correctly but instead
you relied on not mounting it to protect it.

> I agree with Marc that the simplest way to negate the issue would be
> for gparted to make a private, temporary directory (chmod 0700) and put
> all its temporary files and mountpoints there, so they cannot be accidentally
> exposed to other users.

Yea, I suppose it's a simple enough change.



Bug#948710: openssh-server: Fail to upgrade "ssh.service: Unit -.mount is masked"

2020-01-15 Thread Phillip Susi


I brought this up on systemd-devel the other day and Lennart agreed that
it is a bug in systemd that it refuses to start services that depend on
masked mount units when the mount is active.  He advised me to file a
bug report on github, but github insisted on emailing me before allowing
me to log in even though I know my login and password, and they seem to
still have my no longer existing ubuntu email address, and so I am
locked out.  Their contact us page also does not seem to work nor have
they replied to my attempts to email support@, so I am unable to file
the upstream bug.

He also advised that gparted should be using a bsd file lock instead of
masking mount units.  Curtis Gedack wasn't sure about making the change
at least for the upcoming release of gparted.  Perhaps after that.



Bug#883812: Gparted under Wayland

2020-01-09 Thread Phillip Susi
I tested the exp version under wayland and not only does it work
natively now with gtk3, but even when forced to use Xwayland, it still
works because it seems they finally fixed the bug with gdm and it is now
properly configuring XAUTHORITY.  As a result, the --enable-xhost-root
workaround is no longer needed.



Bug#932138: minissdpd fails to upgrade from Stretch to Buster

2020-01-07 Thread Phillip Susi
The NEWS mentioned that the service is disabled by default and that if
you want to enable it you can, but things will still work ( but slowly )
without it.  That's fine, but the configure script then should not be
trying to start it, and be surprised when it won't start ( since it's
disabled ), and fail to configure as a result.

Please change the configure script to either not try to start the
service when it knows that it is disabled, or to ignore the failure.



Bug#928546: /etc/fstab.d

2019-05-07 Thread Phillip Susi
Don't forget that these days most distros are using systemd, in which
case it is in charge of boot time mounts instead of util-linux's mount
-a.  Thus any attempt to add /etc/fstab.d would require modifying
systemd, and probably udisks and probably plenty of other utilities,
which is probably why it was abandoned.

On the other hand, maybe something similar to what happend with
/etc/resolv.conf may be a solution: replace /etc/fstab with a symlink to
/run/fstab, and let systemd dynamically genereate that file based on its
view of mounts.  Then you'd control mount options with systemd units and
/etc/fstab would just be a compatability file for other utilities like
mount and udisks.

john.pseudonym1 writes:

> Package: util-linux
> Version: 2.29.2-1
> Severity: normal
>
> Hi,
>
> As part of the hardening of an anonymity focused operating system called 
> Whonix, we need to add different mount options for different filesystems e.g. 
> hidepid=2 on /proc or noexec on /home. To make sure that a user's own fstab 
> configurations are not messed up, we cannot use /etc/fstab for this. 
> /etc/fstab.d would be the perfect thing for this but it seems that support 
> for it has been 
> [abandoned](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=663623). Will 
> support for this ever be brought back? If not, are there any good 
> alternatives?
>
> Best regards.



Bug#923561: parted: Incorrect optimal alignment for USB device

2019-03-06 Thread Phillip Susi
On 3/5/2019 5:49 PM, Kevin Locke wrote:
>> md does it using the stripe size.  Not sure if anything other the md or
>> dm would make sense to populate the value.  Well, I guess hardware raid
>> drivers.
> 
> Sounds reasonable to me.  Feel free to propose it to the kernel
> maintainers.

I'd have to check to be sure, but I think hardware raid drivers already
do this.

> Documentation/ABI/testing/sysfs-block does not say "normal disks
> generally leave it 0", it says "If no optimal I/O size is reported
> this file contains 0."  SCSI disks report an optimal I/O size via VPD.

My copy says "This is rarely reported for disk drives." then mentions
raid.  The full description I have is:

Storage devices may report an optimal I/O size, which is
the device's preferred unit for sustained I/O.  This is
rarely reported for disk drives.  For RAID arrays it is
usually the stripe width or the internal track size.  A
properly aligned multiple of optimal_io_size is the
preferred request size for workloads where sustained
throughput is desired.  If no optimal I/O size is
reported this file contains 0.

> I still think the documentation here is correct.  If you disagree,
> feel free to report it to the kernel maintainers.

What defines "correct"?  I don't think it is a question of whether it is
correct, but whether it is clear and unambiguous, and whether various
components have understood it the same way.  I think the text is
ambiguous since it specifically mentions that raid uses it to represent
the stripe size, which is a hint that the intended use is for optimal
alignment, despite the fact that the prescriptive text makes it sound
like it does not have anything to do with alignment.  After all, as a
general rule, the larger IO you use, the better the performance, so if
it had nothing to do with alignment, everyone should just set it to a
silly large value like your USB stick does, and then it would kind of be
useless, wouldn't it?

> Are there cases where the optimal partition alignment is not a
> multiple of the physical sector size?  If so, lets consider whether
> they can be worked into the sanity checking logic.  If not, are there
> other risks that you foresee which are not shared by util-linux and
> cryptsetup, which have been using such a sanity check for years?

No, there aren't, and I agree that this sanity check isn't likely to
hurt anything and will fix your USB stick issue.  What concerns me is
that drives which are not 512e like yours will report an absurdly large
optimal_io_size that *is* sector aligned, and this sanity check won't
help with those.

> Also, if "your USB stick" was intended to suggest that this is not a
> common problem, I would disagree.  I suspect it occurs on most/all
> Seagate UAS drives (which share some other known problems[1]).

I simply meant that yours seems to be 512e and that is the only reason
it is even possible to have an optimal_io_size that is not a multiple of
the physical block size.

I think it may be worth starting another discussion upstream about this
to clarify and perhaps have the documentation improved, but I suspect
that in the end, this value is just going to remain a clusterfudge and
maybe parted should only rely on it if the disk in question is an md
device.  Then again, that might leave out hardware raids if they use the
stripe size too.  Maybe a size sanity check?  Anything above say, 8M or
16M maybe should be ignored?  It's a shame that this value is unreliable
and we have to resort to second guessing it.



Bug#923561: parted: Incorrect optimal alignment for USB device

2019-03-05 Thread Phillip Susi
On 3/5/2019 10:58 AM, Kevin Locke wrote:
> Sounds great.  How do you propose that the kernel determine the
> optimal alignment?

md does it using the stripe size.  Not sure if anything other the md or
dm would make sense to populate the value.  Well, I guess hardware raid
drivers.

> I disagree that what you quoted says that that the md driver uses
> optimal_io_size for anything, much less unconditionally.  Also, since

Now that I read it again, it just says raid arrays, not md specifically,
so I guess that means md plus hardware raid drivers.  I know from
experience that md does use it that way.

> the disk on which I am running parted is not a RAID array, I don't
> think the documentation above says that it is anything more than
> "preferred unit for sustained I/O".

Yes, the first part says that, but then it goes on to say that normal
disks generally leave it zero, and raid disks set it to the stripe width.

>> Wait, how can optimal_io_size NOT be a multiple of the block size?
> 
> For my disk, the logical block size is 512 bytes, the physical block
> size is 4,096, opt_xfer_blocks is 65,535, so optimal_io_size is
> 65,535*512=33,553,920 which is not a multiple of 4,096.  I considered
> advocating that the kernel check this, but decided against it.

Oh, that is weird.  I guess such a sanity check would fix the issue for
your USB stick, but what about others?

> SCSI devices can report any value (measured in logical blocks) for VPD
> Optimal Transfer Length.  It is not restricted to multiples of the
> physical block size.  For my disk, it is not, which is the cause of
> the current issue.

So for 512e disks basically, the optimal transfer length can be not a
multiple of physical block size and foolish drives try to specify the
maximum possible value in logical 512 byte sectors, and that ends up
being 1 logical sector too small to align to 4k.  For 512n 4kn disks,
the optimal size can never not be a multiple of the sector size, so the
sanity check would pass and still give you a massive alignment you don't
want.



Bug#923561: parted: Incorrect optimal alignment for USB device

2019-03-05 Thread Phillip Susi
On 3/4/2019 5:29 PM, Kevin Locke wrote:
> After a bit more research, I found that this issue has been mentioned
> on linux-usb[1] and that Martin K. Petersen weighed in on the issue in
> a util-linux-ng thread[2]:
> 
> On 17 June 2015 at 01:08, Martin K. Petersen  
> wrote:
>> There's only so much we can do about devices that report garbage.
>>
>> Also, the kernel only reports things. It is up to Karel to decide
>> whether to sanity check the values before he uses them.
> 
> If we are going to bring it up again, I'd like to have a specific
> recommendation or request.  More discussion below:

It sounds like it wasn't intended to have anything to do with alignment,
but since MD used it that way, parted interpreted it that way.  If
optimal_io_size is just that, then maybe a new variable needs to be
created to expose optimal alignment?

> Could you point me to the kernel documentation that mentions how the
> md driver uses optimal_io_size?

Documentation/ABI/testing/sysfs-block:

Storage devices may report an optimal I/O size, which is
the device's preferred unit for sustained I/O.  This is
rarely reported for disk drives.  For RAID arrays it is
usually the stripe width or the internal track size.

> My current reading is that optimal_io_size has the same definition as
> SCSI VPD Optimal Transfer Length.  It has a loosely defined meaning,
> but its value for any particular use is contingent on sanity checking.

I'm not sure how you can sanity check it.  Either it has meaning
relevant to alignment or it doesn't.  It sounds like it wasn't supposed
to even though md used it that way.

> Do you have a particular proposal for how to improve the kernel
> documentation or how optimal_io_size behaves?  I worked up a patch
> which only uses logical_to_bytes(sdp, sdkp->opt_xfer_blocks) for
> io_opt if it is a multiple of sdkp->physical_block_size, but I am not
> convinced enough that it is universally applicable to advocate for it.
> Any alternative suggestions?

Wait, how can optimal_io_size NOT be a multiple of the block size?



Bug#923561: parted: Incorrect optimal alignment for USB device

2019-03-04 Thread Phillip Susi
On 3/4/2019 11:50 AM, Kevin Locke wrote:
> optimal_io_size is defined in the kernel ABI[1] as "the preferred
> request size for workloads where sustained throughput is desired".  In
> this case, I think it comes from scsi_disk.opt_xfer_blocks[2] which
> comes from the VPD block limits page[3] which my disk reports as 65535
> blocks (according to sg_vpd).

Yes, I was looking over the definition earlier in the kernel
documentation, and it seems to me that part of the definition indicates
it is simply an optimal size to transfer in, and has nothing to do with
alignment.  But parted treats it as having to do with alignment, because
the same kernel documentation mentions that is what the md driver uses
the field for.

> The definition seems reasonable, but it would not surprise me if 65535
> were bogus.  I am not familiar enough with USB+UAS to know if this
> might be an optimal size for the protocols involved.  I can raise the
> issue on linux-scsi/linux-usb.

I think the issue needs raised in a few places; I just couldn't decide
where.

> However, whether or not this is changed in the kernel, I would argue
> it should be handled in parted.  Both to support previous+current
> kernels and because I think the optimal_io_size ABI definition allows
> optimal_io_size which is not a multiple of minimum_io_size for
> transports where that truly is the case.

Unfortunately, that means parted needs to simply ignore the value of
optimal io size as totally meaningless garbage, and I don't much like
the thought of that.  If parted has always been wrong and the intended
meaning of the kernel parameter has never had anything to do with
alignment, then yes, parted needs to ignore it because it read meaning
into it that was never intended.  But if it is supposed to have
something to do with optimal alignment, then md is right and usb is
wrong, and usb needs to be fixed.



Bug#923561: parted: Incorrect optimal alignment for USB device

2019-03-04 Thread Phillip Susi
On 3/1/2019 6:04 PM, Kevin Locke wrote:
> Presumably the error occurs because parted is using the optimal_io_size
> for alignment.  Since optimal_io_size is based on USB constraints rather
> than disk constraints, it does not seem suitable for partition layout.
> 
> I would suggest ignoring optimal_io_size if it is not a multiple of
> minimum_io_size, as done by cryptsetup[1].  Alternatively, 33553920
> could be ignored specifically, since it seems common for USB disks.
> 
> This issue has been discussed elsewhere:
> https://www.saout.de/pipermail/dm-crypt/2016-January/004934.html
> https://bugzilla.redhat.com/show_bug.cgi?id=1513820
> https://unix.stackexchange.com/q/340484
> https://linux-blog.anracom.com/2018/12/03/linux-ssd-partition-alignment-problems-with-external-usb-to-sata-controllers-i/

Interesting.  It sounds like USB and MD are using optimal_io_size in
fundamentally incompatible ways.  The question then is: is USB doing the
wrong thing ( and should be fixed ), or is the very definition of
optimal_io_size fundamentally broken?



Bug#916260: gparted mounts partition without protection

2018-12-13 Thread Phillip Susi
On 12/12/2018 11:59 PM, Marc Lehmann wrote:
> As you say, there are several ways, some where the user can choose to
> make the files accessible and some where she can choose to not make them
> available.

I'm not sure what you mean by this.

> The point is that the user should be in control of whether files are
> accessible to other users or not.

They are; if you don't want files to be accessible to someone then set
up the permissions so they don't have access and/or don't give them
access to mount the volume and/or run programs like gparted as root.

> gparted doesn't allow that choice, and what's worse, it's not even obvious
> that it potentially makes files available that normally wouldn't. Resizing a
> filesystem should not expose files to other users that normally wouldn't.

If you can run gparted, then you can mount the filesystem at will.
While it isn't immediately obvious that resizing a btrfs filesystem will
cause it to be mounted temporarily, it isn't getting you any more access
than you already had.  Also your typical desktop environment these days
lets users click on unmounted volumes and they will auto mount them,
which brings us back to setting the permissions correctly inside the volume.

> Your argument could be applied to users homedirectories as well - if
> gparted temporarily did "chmod 777 ~" it wouldn't be a bug according to
> your logic as well.

No, it wouldn't.  Your argument is more like saying my home directory is
777 but I normally don't keep it mounted so nobody can access it, so now
it is a problem that anyone can click on the volume to mount it and then
have full access to my files.  The problem is the permissions, not the
mounting.

> Or maybe I misunderstood you, but it seems you are saying "since the user
> could choose to make files available to other users, it's not a bug that
> gparted silently does it without asking or notifying the user that it would
> do so".

No; I'm saying that if you don't want the files available then set the
permissions correctly, and if you don't want users to be able to mount
the filesystem, then don't let them run gparted or mount filesystems
using other tools.



signature.asc
Description: OpenPGP digital signature


Bug#916260: gparted mounts partition without protection

2018-12-12 Thread Phillip Susi
On 12/12/2018 3:50 AM, Marc Lehmann wrote:
> Package: gparted
> Version: 0.25.0-1+b1
> Severity: normal
> 
> Dear Maintainer,
> 
> for some operations, gparted mounts partitions under /tmp/gparted-XX 
> without any protection
> against access. This makes these partitions potentially accessible to other 
> users on the system while
> the operation runs.
> 
>* What led up to the situation?
> 
> Resizing a btrfs partition.
> 
>* What was the outcome of this action?
> 
> While resizing, the partion was mounted under /tmp/gparted-BSeLY6,
> accessible to all users, potentially allowing other users to read or write
> the data:

I'm not sure this can be considered a bug.  There are several ways the
user could have the filesystem mounted in a non temporary manner and if
the permissions of the filesystem allow them access, then they can
access it.





signature.asc
Description: OpenPGP digital signature


Bug#906136: closed by Bastien ROUCARIES (sensible-browser doesn't seem to have a user local way of changing it)

2018-11-29 Thread Phillip Susi
reopen 906136
thanks

> hi,
> 
> You could set BROWSER variable...
> 
> could you retest

That's not a reason to close.

After testing, it appears this does work, however it is not documented
in the man page.  It should be.




signature.asc
Description: OpenPGP digital signature


Bug#905528: Bug #905528,mount: nofail

2018-09-26 Thread Phillip Susi
On 9/16/2018 4:40 PM, Andreas Henriksson wrote:
> I don't think it's util-linux place to document how systemd (or any
> other similar system) works. Certainly not as a downstream debian patch.
> 
> In my opinion this is basically a misdirected bug report that I'd
> suggest tag wontfix and close. Ofcourse if someone comes up with
> a suggested wording and submits it to the upstream mailing list
> chances are probably high that something fruitful will come out of
> that.

The util-linux man page for mount has always mentioned peculiarities of
the various other mount helpers, even though they aren't part of
util-linux.  I'm not sure whether that has been a debian deviation, but
if you think it better to get upstream to adopt such a change first,
then the bug should be marked as upstream,forwarded ( and forward the
issue to upstream ), not wontfix and closed.



Bug#907194: su: yields breakage without "-", not properly documented

2018-09-26 Thread Phillip Susi
On 9/16/2018 4:30 PM, Andreas Henriksson wrote:
> If you really want to help, I think the first best step would be
> to lobby the debian installer team to make the 'root password' prompt
> only show up in 'expert level' installs and thus giving everyone
> sudo installed and setup by default (as far too few users are aware
> of that they'll get today by leaving the root password prompt blank).

I've been wondering for a decade now why debian hasn't done this.  Wow,
I didn't realize you could leave the prompt blank and it would just
install sudo.



Bug#887225: gparted should also suggest e2fsprogs

2018-08-29 Thread Phillip Susi
Control: reopen -1
thanks

On 8/29/2018 3:15 AM, Daniel Vacek wrote:
> Package: gparted
> Version: 0.32.0-1
> Followup-For: Bug #887225
> 
> I only see udftools added to suggests but e2fsprogs is still missing.

What the hell?  I swear I added it.  No idea how that got lost.





signature.asc
Description: OpenPGP digital signature


Bug#905528: Bug #905528,mount: nofail

2018-08-23 Thread Phillip Susi
reopen 905528
reassign 905528 util-linux
retitle 905528 nofail flag description misleading
thanks

I misunderstood the description before.  I interpreted it as using
nofail still causes boot failure.  After offline discussion with the
reporter, he was saying that the man page for mount and fstab both say
that the nofail flag means "do not report errors for this device if it
does not exist".  This is true for mount as it simply reports an error (
or not ) and moves on.  However, since systemd is doing the mounting
these days, its behavior without nofail is not to simply report an error
and move on, but to hold up the boot process waiting for the device to
appear.  It would be nice if at least the fstab man page would note the
systemd behavior so it does not make it sound like the only thing that
will happen if you don't use nofail is to get an error message.




signature.asc
Description: OpenPGP digital signature


Bug#906136: sensible-browser doesn't seem to have a user local way of changing it

2018-08-14 Thread Phillip Susi
Package: sensible-utils
Version: 0.0.12

Unlike for editor and pager, sensible-browser does not appear to have an
environment variable for a user to choose their sensible browser ( as
opposed to the admin making system wide symlink changes ).




signature.asc
Description: OpenPGP digital signature


Bug#905528: mount: nofail

2018-08-06 Thread Phillip Susi
sysvinit called mount -a to handle mounting devices at boot.  Unless you
are still refusing to move to systemd, mount is on longer responsible
for this so the problem must be in systemd.

On 8/5/2018 11:44 AM, Seamus de Mora wrote:
> Package: mount
> Version: 2.29.2-1+deb9u1
> Severity: normal
> 
> Dear Maintainer,
> 
> I have modified the file at `/etc/fstab` to add instructions to `mount` for
> mounting a "USB thumb drive" (LABEL=SANDISK16GB); please see the file
> contents below. Note the use of the `nofail` option. When I omit this
> option, and that USB thumb drive is not plugged in, my system will no
> longer complete the boot process. This behavior is contrary to the



signature.asc
Description: OpenPGP digital signature


Bug#902224: parted: bogus rounding of exact sizes

2018-06-25 Thread Phillip Susi
On 6/23/2018 11:12 AM, Adam Borowski wrote:
> Start? 100mib 
> End? 100% 
> Warning: You requested a partition from 100MiB to 14772MiB (sectors
> 204800..30253055).
> The closest location we can manage is 100MiB to 14772MiB (sectors
> 204801..30253055).

This is because the first partition includes sector 204800 so the
closest that can be allocated to the new partition is the next sector.
This behavior has been changed upstream already by the following commit,
which was released in parted 3.1, and so should be in debian, so I'm not
sure why you are seeing it:

commit 961abca12d1766264651dbe08284aeec3c0396c6
Author: Petr Uzel 
Date:   Sat Oct 22 15:22:09 2011 +0200

parted: mkpart: DWIM for IEC ending sector numbers like 2MiB and 9GiB

Before, if the user specified start and end in mkpart command using
IEC units, parted created a partition that starts and ends exactly on
these positions. With such behavior, it is impossible to create
partitions as follows: 1MiB-2MiB, 2MiB-3MiB - parted would complain
that it cannot create the second partition, because the first one
occupied sectors 2048-4096 and the second one sectors 4096-3072,
so they would overlap at sector 4096.

With this patch, if the user uses IEC units to specify end of the
partition, parted creates the partition which ends one sector before
the specified position.

See also
https://lists.gnu.org/archive/html/bug-parted/2011-10/msg9.html

* parted/ui.c (command_line_get_sector): Add parameter to retrieve
raw input from user.
* parted/ui.h (command_line_get_sector): Adjust prototype of function.
* parted/parted.c (_adjust_end_if_iec): New function.
(_strip_trailing_spaces): New function.
(_string_ends_with_iec_unit): New function.
(do_mkpart): Call _adjust_end_if_iec(). Use new parameter of
command_line_get_sector function.
(do_rescue): Adjust call to command_line_get_sector.
* bootstrap.conf (gnulib_modules): Add these: c-ctype, c-strcase.
* tests/t0207-IEC-binary-notation.sh: Adjust to new semantics.
* NEWS: Mention the changed behavior.

Notable adjustments:
- s/isspace/c_isblank/ so that parsing is locale-independent
- avoid an array-bounds error:
  * parted/parted.c (_strip_trailing_spaces): Don't deref str[-1]
  for an empty string.



signature.asc
Description: OpenPGP digital signature


Bug#901887: build-depend should not list xtem

2018-06-19 Thread Phillip Susi
On 06/19/2018 05:08 PM, Jeremy Bicha wrote:
> The xterm dependency is only used for the build tests and it's marked
> correctly for that.

So the test suite does not work on servers without a gui?  And why
doesn't it seem to run the test suite or fail without xterm?



Bug#901887: build-depend should not list xtem

2018-06-19 Thread Phillip Susi
Package: glib2.0
Version: 2.56.1-2

I noticed while trying to build glib that it claims to build-depend on
xterm, which is insane; no package should require xterm to build.  I
forced it to build anyway without xterm installed, and it built fine, so
this dependency should be removed.




signature.asc
Description: OpenPGP digital signature


Bug#822367: partman should check and warn if missing bios_grub partition

2016-04-23 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Package: partman-partitioning
Version: 111

When installing to a GPT partitioned disk in bios mode, a bios_grub
partition is required to install grub.  Partman should warn the user
of this if they do not have one.
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJXG+AXAAoJEBB5UWFcu6UW2v8H/i/cK7EDTjQzijzf20V+wvLJ
Z2bnCejkzvLfd/58lZ6ECHj/Vlp4Ab3ooyzrIsOr+fmLXeaPdD/hiE8/7NrHnoF8
K0jiXvfNC5GE6CLbhGb5LteArXPLIabAZboMklkPwlTobI55Xp/A3b4wzIQvu8JW
Ar4LMUOhPC6AF9W9YuBYB8AcfI02O0cQf5zd75qNtNJg9NZ3PuZ4wVwqGhYHH3zl
PZJOxCWWId/0gjhSf++3xOoJVLjYJVUUAc9Iry/pm0Usj57sofKx8ZhWM5TdCaGP
eD+9oWshHn+MfIWMRRNHstWEriQAvJoBgeXr92DlYcc1856F9TqiqMmaYNIulF4=
=wrti
-END PGP SIGNATURE-



Bug#819488: gparted crash with a libparted backtrace

2016-04-11 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 04/11/2016 02:13 PM, Mattia Rizzolo wrote:
> On Mon, Apr 11, 2016 at 11:52:32AM -0600, Curtis Gedak wrote:
>> If I recall correctly, libparted was not able to handle when
>> there was only one unallocated sector between logical partitions
>> (it expects at least two).

I believe that is exactly it Curtis.

> well, that's really not a reason to crash like that! ;)

For the last 3 decades, it has not been a problem since every disk
partitioner has worked this way.  I have sen a few bug reports about
this recently though, and the others have reported using something
called Easeus disk partitioning software.  Have you used this?  It
would be good to confirm this is the source of the problem and I'll
see if I can't fix parted to handle it.


-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCgAGBQJXDEi5AAoJEBB5UWFcu6UW1cgH/2ReOLJAbvtm6ZCVLd+S8VFG
/T42BG64dbtp5PEEeLt+fE7hYRQkTb+Kmnv5YEApJ39Sucihi3yx2EWUqwxmEZ9Y
QElVEbIBB82GUJtGEIhgOiCZKfSvqyDocOZ6Gm4n8ZQScOEzKMeNCb48F1mTBc5i
CVlCS1ynlfa0IoYqSx4EwH2K5Q6CNQhQiOrJtvGkiXryp7GkVwt37lrOpuR0z+D0
jThfBq7ULE7YPUXEgIwquBpxUWaHvU2eQdSKAhS9mQ4DvoAyHkn+YCWy8z5yjkE8
iY6uCMw70mtnG0nTF+m52TBbRb4KTrRno4MuF+2OMFttTyLVyblOFCm8bp08/7Y=
=wouG
-END PGP SIGNATURE-



Bug#807323: [Pkg-utopia-maintainers] Bug#807323: Bug#807323: gparted needs policykit-1 but its neither in depends or recommends

2015-12-23 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 12/22/2015 09:19 PM, Michael Biebl wrote:
>> Why?  The BTS forwards the message automatically doesn't it?
>> 
> No it doesn't.

Sigh... that's another absurd failling in debian bts that requires
constant workarounds... added to my list.

> And I would appreciate if you would stop reopening bug reports for 
> packages you don't maintain.

The entire community would appreciate it if you would stop closing
valid, or likely valid bug reports without a good explanation.

The only thing you have suggested thus far ( after closing the bug
several times ) that is even a possible candidate for a legitimate
reason to do so is the use of policykit-1 from experimental with an
otherwise sid based system.  Until this has been confirmed, or unless
it is a known error that you can be reasonably confident is the case,
and you clearly describe that is what the user has done wrong, it is
inappropriate to dismissively close the bug report out of hand.

That said, I have managed to test your hypothesis and confirmed that
indeed, this does result from doing what you suggest, and that is why
I will no longer reopen this bug report.  It is now up to Shirish to
deny that he did install policykit-1 from experimental on an otherwise
unstable/testing system and if not, reopen the bug.  Coming to this
conclusion should not have taken several rounds of closing and
reopening the bug, but rather is something you should have clearly
spelled out when closing the bug in the first place so that Shrish
could have simply said "oh yea, my bad" and let the matter rest,
rather than contacting me privately wondering why his report had been
summarily dismissed.  Please bear this in mind when closing bug
reports in the future so that such confusion can be avoided.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJWe28EAAoJEBB5UWFcu6UWeqoH+wYdRutwix8qyiGEpLf25iSF
CllrkhLQ6q2LoUoomIQ4b04CQmHKC/g2D8qnRPnDnh4dzLZYcDdyqTSTTisxMJxW
UfEY0reTO22GhbqQwGABgzpSL6LJ8p17kNldJIs9j0As4CVajs155LxCAnOW/ddw
B2DzPGJ0INThIVAGESxlqJzc+5r1XyGdZT0CM++DDGG1rVGlxWs4O2RDNb38NQyQ
aniSJ/PTSvUUXJu8ejHUo+hwm42PeqjvVIVzsGaXGrIovU+t590g3+49IAf+788f
WKf0wG6IkbBrtxGI4fOMLZwitX1NqmgPRCPHVaHLIS3ESQzGxraUgXivQD+3UTc=
=CGXU
-END PGP SIGNATURE-



Bug#807323: [Pkg-utopia-maintainers] Bug#807323: gparted needs policykit-1 but its neither in depends or recommends

2015-12-22 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Control: reopen -1

On 12/22/2015 08:11 PM, Michael Biebl wrote:
> First, please CC the package when you re-assign a bug report.

Why?  The BTS forwards the message automatically doesn't it?

> Second, please don't use inflated severities. Third, this bug
> report was titled "Missing depends or recommends on policykit-1"
> which is highly misleading and not an issue for udisks2.
> 
> 
> All in all, a badly done bug report. Enough reason to close it and
> let the bug reporter file a new one.

That is entirely incorrect; you can not just close a bug and expect
the user to try again and do better without knowing what is wrong.  If
there is something wrong, you fix it.  If the title is wrong, you
retitle it.  If you disagree with the severity, then change it.  If it
is assigned to the wrong package, you reassign it.

> My guess is, and I can only guess since I don't have any version 
> information for neither udisks2 nor policykit-1, is that the bug 
> reporter has policykit-1 from experimental installed.

That is a good thing to ask the user to check rather than assume and
close.


-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJWegGOAAoJEBB5UWFcu6UWt0gH/jTdXjaQ3R8HgGZywneufMZC
/cpUwvv38myQOQG1ozHqO2mxIo60eJicAj/g7mlsLaiCaVO2/IBoudqSD0yQn7hf
rZhRI4v1QnsEfy3C7brysr7jT4v9Z3pSqum/zh1HUCY+ZqU274wFYipPAHchzeQC
rAHLgmltBCPYLjlEPK22fEVPoPz3ySX0ORM6jgGmY+RuywAFh1OeqCIwMSBZdoAS
G4mCpU+cUVSOHabHVoHemJnyAuAijAVyFXEuM3++A/ccdh4NcNeCv4PWPTPQVpTB
g5WJH7MkmooL2WhCXmQznuPz408DPb+voA4OCMF5GwKL5ufajhgrjh67EhgBKuU=
=NT+V
-END PGP SIGNATURE-



Bug#808793: test, please ignore

2015-12-22 Thread Phillip Susi
Package: general

This is a test of the BTS, please ignore.



Bug#807323: gparted needs policykit-1 but its neither in depends or recommends

2015-12-22 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Control: reopen -1
Control: affects -1 gparted

On Tue, 22 Dec 2015 19:29:39 +0530 =?UTF-> > And that's why udisks2
has a Recommends policykit-1.
>> 
>> Closing the bug report.
>> 
>> Not installing recommends means you need to know what you are 
>> doing.

Closing is not appropriate.  If udisks2 functions except for
udisks2-inhibit, then gparted needs the hard depends on policykit-1.
Are you saying that the only thing udisks2 needs policykit-1 for is
inhibit?  I would think it needs it for everything.

>> 
> 
> Miichael,
> 
> Did you read the whole bug-report. I have installed it. It is 
> there.
> 
> $] aptitude search policykit-1 i A policykit-1 - framework for
> managing administrative policies and privileges
> 
> The error is even after it is installed.

Then the reason for closing is certainly incorrect.  Maybe the real
problem is not policykit-1 then but something unknown?

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJWefGKAAoJEBB5UWFcu6UWC1YH+gPMU3InktrfuM6RzrW5tRqq
+tXOE+DUnjzqLeob8HVbrXJt01TDXzf3876oYC6c1Sx1M1+MzEcfk7CQCNCHimYV
QLHKpAQgI/9Y+RJfGb8yki1t3yXkafC75Q62gjx9sVTGXKbZ8y/J5EPhTaB/8ypZ
bWn6dsGNUDiskJl464DeTAhoqKpBeGKrU95/LmPd8WLXYIT5tMgy/qEi9U1SOklb
ilAzp42byKNUIWfuYEaxCwlpfHu2GU1qruzD31sbmd7eWIygFxUhPmBBadAEuFmK
XB1Q7eYlY8kyINKA2bZlg2MNNMWCeLZOxBMl9zoxyqLIwg2oHRILzqbDQq3wkO4=
=0ccK
-END PGP SIGNATURE-



Bug#808380: mount: unknown filesystem type 'vfat'

2015-12-22 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 12/22/2015 02:47 PM, Sven Joachim wrote:
> Both the original report ("Kernel: Linux 3.16.0-4-amd64 (SMP w/4
> CPU cores)") and the followup in 
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808380#25 show
> that Jacob had already running 3.16.0-4.  If he had been using
> 3.16.0-3, the problem would not have shown up since modprobe does
> not try to load 3.16.0-4 modules into a 3.16.0-3 kernel.

That's what I've been saying.

> Debian does not do this, to avoid uncontrolled proliferation of 
> kernels.  In fact, the 3.16 kernel has been at the 3.16.0-4 ABI for
> over a year (the last ABI bump was in November 2014, version
> 3.16.7-1).

If that is the case, then they screwed up and broke the ABI without
bumping its revision and the bug should be reopened and reassigned to
linux so they know they broke the ABI and need to bump the revision.


-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJWefMMAAoJEBB5UWFcu6UWhvMH/iVmGGTEOnfmbgpFQRt58qr/
R03ZuXt7eqQgtkwnBrKG7JmzhByv5u4rmn1oxPHf6E+6PPU1UeRMkEpVVfkEKbPd
68PtdHeU7gpf9DdmrMjR0qYu5xmZ9yvpBdJrV7pdu1zyXiOyxBlBhrLV4liiCggh
+mnr0wxTt9GAI7rsp2D/DJtnQnX9b7/SjJJHr9HG/5qxCRg0P1/yNHmZ37tOnsX1
nZaXtQOWtJZOobEzD7Fz5dvaHn/DY021aIRNsgikKfXsOuAt5H8TFJDO49mSw2/a
YEfEgtfpEVLw7TwSWy7QUn8dr8KTOc/iAB1YxLQ3MGioR5FliGvSlAPyxFkZDLs=
=zdp3
-END PGP SIGNATURE-



Bug#807323: gparted needs policykit-1 but its neither in depends or recommends

2015-12-21 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Control: reassign -1 udisks2

On 12/21/2015 03:54 PM, shirish शिरीष wrote:
> Yup,
> 
> get it here -
> 
> [$] sudo /usr/lib/udisks2/udisks2-inhibit true [sudo] password for
> shirish: /var/lib/polkit-1/localauthority/90-mandatory.d does not
> exist. Please install policykit-1

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJWeJOJAAoJEBB5UWFcu6UWNPQH/i2COnhWV8Wj/lGJO4f5AKE+
2U9daaLlqKN+krA/ABUqtoMx3O1d2YIloh33OxgKnLjFGoQMCXyNua/qF670EiXk
fyqDnDAaoDHRgP98od3MK0A+CwxDkyu2mepYbFBzgGv9h4HG6RbBPuG9Z9gtFebK
tFLeFSGsoezAF59qT7+j3j2srVmYu0e3TdMV9cvTS5t0T1gqyIHfmf0b/6bk6Oq5
SwTdt5ZIbK/LwK3jYdKsDNM8tOFacMkSWoIhRoxmEHT6xKA5/QDHVJMkZ7ckZCHj
s/wtau8kDtRYYuhSZmH8mfzTxyKExIaiq7xakLsJJ5K0PqDf5lQs53F7tbeMb14=
=/j5W
-END PGP SIGNATURE-



Bug#808380: mount: unknown filesystem type 'vfat'

2015-12-21 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 12/21/2015 05:29 PM, Sven Joachim wrote:
> Wrong, both the old and the new kernel provide their modules in 
> /lib/modules/3.16.0-4-amd64.  Jacob upgraded the 
> linux-image-3.16.0-4-amd64 package, he did no install a new
> package.

No... if the new kernel is 3.16.0-4, then the old one was 3.16.0-3.
This is the reason why debian adds the extra digit to the version
number and bumps it each time the kernel is updated.

This goes out the window of course, if you build your own patched
kernel and don't bump the version number.

It it weren't for this, then you would not be able to choose to boot
into the previous kernel version after an upgrade, as it would try to
use the modules from the new version and fail.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJWeJURAAoJEBB5UWFcu6UWnbEH/RIk0ftRxlbI55/wLf3XGS+i
hYSAjRnxcRYOG0FiOcgbJ+b5KcRPmtMhz1CDVYKQkmt3iIYwYuaJGBEpEk0h34dL
MUFYRitWUM1FM9No4EHzeAHlx83C0YtxiBqofJMp4r5ugAzoXwRNgjSslx9AM+i4
i5ZORZkoB8UAyfbCfWhggeK4Wn2YUm310SQDLMiFdjcN/PlxGqXKKdhdabfisdjs
nqsIthELcJDphGW6pRhtBoUWpzx7nryXR37dj5l87BZcjJCUAwgRiEfCb3TVU3pf
7aByZpy/6a85aCbWX/QBT/9N1i2GN3GPiDDiQsVhHcu9wVCGtXes62jZuyM/vgE=
=NN+Z
-END PGP SIGNATURE-



Bug#808380: mount: unknown filesystem type 'vfat'

2015-12-19 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 12/19/2015 06:11 AM, Jacob Sparre Andersen wrote:
> Package: mount Version: 2.25.2-6 Severity: important
> 
> Dear Maintainer,
> 
> My system does not allow me to mount 'vfat' formatted devices any
> more:
> 
> # LANG=C mount -t vfat /dev/sdc1 /media/rgncm ; echo $? mount:
> unknown filesystem type 'vfat' 32 #

Please post the output of `modinfo vfat` and the last few lines of
`dmesg` after getting this error.



-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJWdfVUAAoJEBB5UWFcu6UW8gkH/2aHfKyhdsBLeHlbjq4vA0cn
/FmjRbH83RMgISc9fvH/2p0OZRuMQOKTpYG7aRVIAp5nUcknNVVlOlhSaki+rLth
Fw00BeTXAyov3fht7PYl4uREWBdRrpClWFu3Q+r6O/ZgGTD9Nt6BAutM+gDmNh2s
LZjc/e2b0nPW/LYk4c0Fh1RfKOl/u7INNpaNgXmzlKfUKCLn4FRiAEPX4Xkz8ODu
RTRb4DY529mbpKD6vUiZI+aT9J6+Pseg50RG30bN2QEIIibzRGO7wzzZNjLs08hv
LSUJdrGAnEdwXvVrVS+XWqidxZhKn8uFI2KjddqvkKni+EamihyOiyJ1QEgUw6A=
=JD71
-END PGP SIGNATURE-



Bug#808085: util-linux: cfdisk creates gpt partition tables which are not recognized in Windows

2015-12-15 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 12/15/2015 04:11 PM, Hannes Diethelm wrote:
> You may notice the difference in "First usable sector is" which is
> 2048 or 34.

I think you need to report this bug to Microsoft as it is perfectly
valid for a GPT to designate sector 2048 ( or any other sector that
does not conflict with reserved areas ) as the first usable sector.


-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJWcMi3AAoJEBB5UWFcu6UWJZUIAJ7tX17Kmp1iDVaCbBEdRtOa
6F+wZF+BP+plBgzx+F9Z8XhCgv5nhzV2fSCLLPQqmJNJBLGnWYZ9MwvaZ3Mrekts
NWOAfNWTe9zUXLRxcK6fvxYQ2/suBvyPNXba60FabPai5cmOuWRK8afoDGki3eW/
jqWRv2jBJ+1M7im0twvLSyc+6ZnQNA4xIt38d1RQ+2g3Qw47v9cQEyu/lDmFy+o3
QjZ/HGWTX7NFsYDw1sIqoqdjo3otmdlkCKzcWyz300PCzMPksJqNz0CigsXQg4XX
Rp6UBFvkkRCL1sXe7/vdo9F11C3rWH4gGz45/ZTSHnkvGkkFlWN8jHfS0oHRPUY=
=mlg0
-END PGP SIGNATURE-



Bug#807323: gparted needs policykit-1 but its neither in depends or recommends

2015-12-12 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 12/08/2015 04:49 AM, shirish शिरीष wrote:
> You would have to share the whole command, because I'm not so
> familiar with udisks2-inhibit. I tried to see if there was a
> manpage or something but came up nada :(

/usr/lib/udisks2/udisks2-inhibit true

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJWbLXMAAoJEBB5UWFcu6UWbsAH/ikeM8MRBYcdyW1uo9/mDVbH
lOzpAibZpxJt3TvsXhcVWVeH2X3Q2yzr6ksJkMAxqJLz/NMPAiKk97Y6/TpioZxc
HzfGTfZMsP3ScLmHNELNwzV0/7OCBd4zt9ZGWHDC+oI6li140tp7riCteoRe2DGl
iZ+q1S0f4oTmHX656oh2lTSJLbR8qnvxnndwp44vbWlxwJvlTKYhWmhQTomnpYO7
ZPcTDuZU3xwg+7hTvytkBY3uABJ/sx+RDraDORkULtkYj97tfPFzX/ffMpHLWDlN
w/HfZQeW8YHxEtu7g1ikzmhB3dv6NQKDvVgcaDG3nh+SEJ4O4xGO9cUp/gGD5mo=
=BWih
-END PGP SIGNATURE-



Bug#807323: gparted needs policykit-1 but its neither in depends or recommends

2015-12-07 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 12/07/2015 11:57 AM, shirish शिरीष wrote:
> Yup, have udisks2 installed.

Just to confirm, can you run /usr/lib/udisks2/udisks2-inhibit and
verify that you get that error?


-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJWZiC8AAoJEBB5UWFcu6UWdjoH/R9bl1ScxaDvNw0dAw5hYTjQ
xVOJ/zbk9DiC11H4xrPC2sLCKlomQnP9Vd7OFbVgX7tOZs0ANly270/VuB1nzqlv
AtfkOy1NEyoAuUXvLPh8CR/kV4a81qFej2wuh+PuyJuUyvBy4/pcSLkcWBvYCkQD
cQZzzXFtxE44u7M3tWr3odYWcg0S7vduUVg12GmnB6yqZYTIVFmjv5FUo/S8IXFW
Sw8WLE3Vzl/m8lLKjeh9Xk3whdcAoLWVpTUC5zbC5pCUw2/qGBUrEwR6hbYWDbim
9FSAnBHydoE8L+cDEh8mOl1IHLoqnWp7JdF0JWWFSZ58qFfAe6iGxGFU12x0xUQ=
=t2mk
-END PGP SIGNATURE-



Bug#789950: fixed upstream

2015-12-01 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Sounds like this needs to be reassigned to systemd; it should just
pass the flag.

On 12/01/2015 05:35 PM, Kevin Locke wrote:
> Hello util-linux Maintainers,
> 
> Although this bug has been closed for a few months, I just
> encountered the issue on one of my systems and would like to
> discuss the solution a bit.  Although sulogin supports the --force
> option to allow passwordless root login (so the util-linux part of
> this issue may be fixed) the issue still appears to be present for
> users.
> 
> If a user chooses to disable the root account when prompted during 
> installation, it appears that they are still unable to use sulogin
> for emergency/rescue boot (from the kernel command-line) or when
> fsck fails, since --force is not passed to sulogin by 
> /lib/systemd/system/{console-shell,emergency,rescue}.service (from 
> systemd) and /etc/init.d/checkroot.sh (from initscripts) and 
> presumably others.  This can be particularly problematic since it
> may be difficult for users to add a root password when they are
> first presented with this problem by whatever issue necessitated a
> recovery shell.
> 
> Is there a way that we can avoid booby-trapping systems in this
> way? This could be done by prompting users about enabling
> passwordless root login once they have opted to disable the root
> account (although this would require coordination across packages
> calling sulogin). Alternatively, although less conveniently for
> users, by documenting the files which need to be edited to add
> "--force" and/or adding a warning to the installer prompt for
> disabling the root account so users know that their systems will be
> broken in this way.
> 
> Thanks for considering!
> 

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJWXkoXAAoJEBB5UWFcu6UW8ZcIAKQxWTeDrYx2ZHe4cpg8ji3a
uBpXKcgghWFtte+6tS2J/waNZheQ72mUuoO3fvdGYBksdI2qJZJxCH8bJ96iyNP6
SOCqEfslMc5lHgJ0W9a3d2QCJe9kKM69iR4nwZAiR9d5OtZRi33jp3GsuYOqS/p9
hcQN975zuZdz9aB9vGxWMyrYwOiWQ7wyc8gu/gt8y3qEfwYU7Fm5s7kyYrQEn1ek
8HcU7WADz0KkCzrUFVgnwbF5lxpyKvUBLkrNvsjTCgC4o9qEhVw370xsEWoxkFj4
xQuzFe55Z1JXfS0ubVupp+qS5fss6P0VhpbLsAVTw6Yl+UU6G44Wtd90IlDXpO8=
=VBp9
-END PGP SIGNATURE-



Bug#806496: ramsize/rdev/rootflags/vidmode prematurely removed from util-linux

2015-11-28 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 11/27/2015 05:01 PM, Elliott Mitchell wrote:
> Package: util-linux Version: 2.20.1-5.3
> 
> Sorry, I hate to have to report it, but as of 4.2 the x86 (both
> ia32 and amd64) Linux kernel still supports the features
> manipulated by these commands.  Until the Linux kernel removes
> these features, removal of the commands is quite premature.  I'm
> cringing at having to report it, but under the right circumstances
> they're still handy to have.

Seriously?  These tools were only useful for booting linux directly
from floppy disk with no boot loader, which went out of style what?
15 years ago?  The last time I used this must have been 1998 or so.  I
don't think I have *seen* a floppy drive in 10 years.


-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJWWh8WAAoJEBB5UWFcu6UWTJMIAJ/7fhy9DwLvlDg5bCmc8i25
vKF4P+KS3/1T1mM8bMRrSIsyih3iU4iQ0YdwrTMwB0Pjc8jiv5WXhHGUsYLOeVIK
mtpkk5ditD6riBGkh7jAVtSbtAZiO7gzJaKJK155WjW2czvVxjWU9UiNCrSUwEP9
Tl9XqQ550iIVaot5by89W//3sVm+MX16s3NAmnPcMigCAhMPwnqF//d7liYcoKPa
Kk52thn0JDh1/n0xTfjoZ2WIKNHmdynt+weuwENqP9W4tyV9j/3yl/CrxfEsbNP6
v0MtHm6YxYvphlnmmKiqgZl0RTxjHofEnJY9sIWzVrOOuS+BUTAcar9Xo7kVtnc=
=YImB
-END PGP SIGNATURE-



Bug#806180: Mouse does not work in qemu

2015-11-27 Thread Phillip Susi
On 11/26/2015 02:44 AM, Julien Cristau wrote:
> Please provide logs when filing X bugs.

Here you go.



[12.836] 
X.Org X Server 1.16.4
Release Date: 2014-12-20
[12.836] X Protocol Version 11, Revision 0
[12.836] Build Operating System: Linux 3.16.0-4-amd64 x86_64 Debian
[12.836] Current Operating System: Linux debian 3.10-2-amd64 #1 SMP Debian 3.10.5-1 (2013-08-07) x86_64
[12.836] Kernel command line: BOOT_IMAGE=/boot/vmlinuz-3.10-2-amd64 root=UUID=253233d1-05c3-44d8-aa3f-806959b574d0 ro quiet
[12.836] Build Date: 11 February 2015  12:32:02AM
[12.836] xorg-server 2:1.16.4-1 (http://www.debian.org/support) 
[12.836] Current version of pixman: 0.32.6
[12.836] 	Before reporting problems, check http://wiki.x.org
	to make sure that you have the latest version.
[12.836] Markers: (--) probed, (**) from config file, (==) default setting,
	(++) from command line, (!!) notice, (II) informational,
	(WW) warning, (EE) error, (NI) not implemented, (??) unknown.
[12.836] (==) Log file: "/var/log/Xorg.0.log", Time: Mon Nov 23 19:08:54 2015
[12.836] (==) Using system config directory "/usr/share/X11/xorg.conf.d"
[12.862] (==) No Layout section.  Using the first Screen section.
[12.862] (==) No screen section available. Using defaults.
[12.862] (**) |-->Screen "Default Screen Section" (0)
[12.862] (**) |   |-->Monitor ""
[12.871] (==) No monitor specified for screen "Default Screen Section".
	Using a default monitor configuration.
[12.871] (==) Automatically adding devices
[12.871] (==) Automatically enabling devices
[12.871] (==) Automatically adding GPU devices
[12.871] (WW) The directory "/usr/share/fonts/X11/cyrillic" does not exist.
[12.871] 	Entry deleted from font path.
[12.871] (==) FontPath set to:
	/usr/share/fonts/X11/misc,
	/usr/share/fonts/X11/100dpi/:unscaled,
	/usr/share/fonts/X11/75dpi/:unscaled,
	/usr/share/fonts/X11/Type1,
	/usr/share/fonts/X11/100dpi,
	/usr/share/fonts/X11/75dpi,
	built-ins
[12.871] (==) ModulePath set to "/usr/lib/xorg/modules"
[12.871] (II) The server relies on udev to provide the list of input devices.
	If no devices become available, reconfigure udev or disable AutoAddDevices.
[12.872] (II) Loader magic: 0x7f943e25ad80
[12.872] (II) Module ABI versions:
[12.872] 	X.Org ANSI C Emulation: 0.4
[12.872] 	X.Org Video Driver: 18.0
[12.872] 	X.Org XInput driver : 21.0
[12.872] 	X.Org Server Extension : 8.0
[12.874] (--) PCI:*(0:0:2:0) 1b36:0100:1af4:1100 rev 4, Mem @ 0xf400/67108864, 0xf800/67108864, 0xfc054000/8192, I/O @ 0xc100/32, BIOS @ 0x/65536
[12.875] (II) LoadModule: "glx"
[12.875] (II) Loading /usr/lib/xorg/modules/extensions/libglx.so
[13.021] (II) Module glx: vendor="X.Org Foundation"
[13.021] 	compiled for 1.16.4, module version = 1.0.0
[13.021] 	ABI class: X.Org Server Extension, version 8.0
[13.021] (==) AIGLX enabled
[13.021] (==) Matched qxl as autoconfigured driver 0
[13.021] (==) Matched modesetting as autoconfigured driver 1
[13.021] (==) Matched fbdev as autoconfigured driver 2
[13.021] (==) Matched vesa as autoconfigured driver 3
[13.021] (==) Assigned the driver to the xf86ConfigLayout
[13.021] (II) LoadModule: "qxl"
[13.021] (II) Loading /usr/lib/xorg/modules/drivers/qxl_drv.so
[13.039] (II) Module qxl: vendor="X.Org Foundation"
[13.039] 	compiled for 1.15.99.904, module version = 0.1.1
[13.039] 	Module class: X.Org Video Driver
[13.039] 	ABI class: X.Org Video Driver, version 18.0
[13.039] (II) LoadModule: "modesetting"
[13.039] (II) Loading /usr/lib/xorg/modules/drivers/modesetting_drv.so
[13.043] (II) Module modesetting: vendor="X.Org Foundation"
[13.043] 	compiled for 1.16.4, module version = 0.9.0
[13.043] 	Module class: X.Org Video Driver
[13.043] 	ABI class: X.Org Video Driver, version 18.0
[13.043] (II) LoadModule: "fbdev"
[13.043] (II) Loading /usr/lib/xorg/modules/drivers/fbdev_drv.so
[13.048] (II) Module fbdev: vendor="X.Org Foundation"
[13.048] 	compiled for 1.15.99.904, module version = 0.4.4
[13.048] 	Module class: X.Org Video Driver
[13.048] 	ABI class: X.Org Video Driver, version 18.0
[13.048] (II) LoadModule: "vesa"
[13.049] (II) Loading /usr/lib/xorg/modules/drivers/vesa_drv.so
[13.058] (II) Module vesa: vendor="X.Org Foundation"
[13.058] 	compiled for 1.15.99.904, module version = 2.3.3
[13.058] 	Module class: X.Org Video Driver
[13.058] 	ABI class: X.Org Video Driver, version 18.0
[13.058] (II) qxl: Driver for QXL virtual graphics: QXL 1
[13.058] (II) modesetting: Driver for Modesetting Kernel Drivers: kms
[13.058] (II) FBDEV: driver for framebuffer: fbdev
[13.058] (II) VESA: driver for VESA chipsets: vesa
[13.058] (++) using VT number 7

[13.071] (II) [KMS] drm report modesetting isn't supported.
[13.071] (WW) Falling back to old 

Bug#785138: gparted: Upstream has a new version, v0.24

2015-11-27 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 11/26/2015 01:39 PM, famrlz wrote:
> Hi. Is there any way I could help speeding up the process of
> uploading a newer version of gparted?

I actually built it the other night but have run into some problems
testing it due to bugs in sid.  Working through them now and will try
to upload tonight.


-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJWWOcCAAoJEBB5UWFcu6UW7CsH/1fnyjmElyEG907hwr29swh1
BnBmGyjijuKWUPbSanhmjPr/Qu1qe0uXoLvOjL3Otz3jmu1qbvlligorspqIMCxD
Gzjd8AedcbXTrqUNGG0G8V8Qw2G2lSKL7qUzDPaOMlEp9WO4rb/MUkXYLyENF8tS
qfestVEFCWrU9JyL03w+ZsVpD3Ssrtxe5vE9aYeubylsgcw8uM2hxG4/NDaqisCg
X/qW8sVT3a/pUBao3ZH/KwqDfnBXzSwM24NnBbt/76hNloyKQRUYPaI/p6JvgR+7
2o/2tSyZKSu6PpKZS2GR61xLDthixCPrNNcenaaWSvHQlDDJ8DInnzjV6MPI5u8=
=NTwV
-END PGP SIGNATURE-



Bug#805845: mount --move broken

2015-11-27 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Control: reassign -1 linux

So it seems the problem is that systemd makes the root shared by
default, and mounts can only be moved if the parent mount is private.
 Running mount --make-private fixes the issue.

I'm still not sure why the kernel can't move mounts in a shared namespac
e.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJWWOeqAAoJEBB5UWFcu6UWFkQH/iSdiLHoHEc5tv0z/OdeXo+w
1Oa3mgh7EJb9qlxTD2B/aE+atFW4jBW8smeMyunytvvUTH67EeVgE2aS89QdaenK
zd732/5m1zP92GpqUNkScdpwc5V/oZ7nFbttYoy2H3Ccq9rO59SRSuzSPfi+F8gk
j1ZGN0M73+MQ2luo/9EJhfpX0n7jNm+NEzR5Ief5BRSAWP0Lw0junYmvttMZsSpQ
RIuRIo1TzJQ4XYP5v2fp8t9moHozEw/wFKyGL0/ZVTtMVb3dNrRLle2XlzI3FWQK
8m3JoJ4Q7dHwIDi4HBfgn63VkOZZq9pWttM9yI9M9qPkXw79KVkBtNi2P4Tb1Jg=
=JJg/
-END PGP SIGNATURE-



Bug#806180: Mouse does not work in qemu

2015-11-24 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Package: xserver-xorg-input-mouse
Version: 1:1.9.1-1

After upgrading from jessie to testing in a qemu virtual machine, the
mouse no longer works.  gpm works fine on tty1.  Running with:

qemu-system-x86_64 -m 1024 --enable-kvm -drive
file=/dev/faldara/sid,format=raw

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJWVRxgAAoJEBB5UWFcu6UWGKgIAIBCnoet/DZUQipzo2h1b4+d
3wvpFVmLKWCr53xZsSAta4iWe4h6Y6so1Yg7mmfJ3W09Ic6wYqC7+XcmNexEoNFL
8mzxB1eQNmgc+hwgYMayOSWTKHLJvChCASzQ27JfcmETcAgjijK7pyucKXHoy+fS
M5i7D09O647amzW6HXlFx1joKG001rBKVRqQ0ED8hEKMTQBruDUS3AQrw2V2aO0n
NQh8jdhkEhAGHc2Z5ox1WWBziMeworuMrzqdxfEg8K/4ihdIIbFkGj8rSO5paKDh
UM+pgMJ1cQKrgV08dxMQthGpsc79vYquE2e4JH7VnG16agid5sCcOCrmJX1adIg=
=FDBM
-END PGP SIGNATURE-



Bug#805845: mount --move broken

2015-11-22 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Package: util-linux
Version: 2.25.2-6
Control: affects -1 +udisks2 +gparted

gparted runs udisks2-inhibit, which runs mount --move /a /b, and this
fails with "mount: bad option...".

Manually running mount --move /a /b ( where /a is a tmpfs mount and /b
is a directory ) likewise fails.  Running mount --bind /a /b, then
umount /a works however.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJWUmptAAoJEBB5UWFcu6UWhmEH/1dCLGXsWFElNLOvRLDF3q4L
M9DL6TzZDX5PPN2GdKswuGLEhgbAaMufz2wLxo8/UpBKGpA9WrbfsciCVWTyGOFl
Y2ze/TPUa3ZfyWC3y1QCDSAqT1EIPKGHPsTjBfUaMXoM0qo0J5j95EuCT/b/K9hi
bCNGsNTjQej65F7ctwmkUGD8ZI/F3qO7r8tcwTIISmJ1M3uMLVaLl6Oz4+jRC/vN
1uU8IWoUoAUkgPWeFzawZQ1otZixhsccZrdRElpR9XCrRntR68/ufHoemOE0fQ8A
3Uv092g2zMXfKjxW3X9OEjLvyWQBKWG5HbKJpyIvF2iHdUmg5nx9hUUANhtMqNc=
=gSG/
-END PGP SIGNATURE-



Bug#791754: initramfs-tools: / on LVM gets mounted by initrd with kernel device name /dev/dm-X instead of /dev/mapper/XXX name

2015-11-04 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Found this on Ubuntu 15.10 as well:

http://launchpad.net/bugs/1513272


-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJWOq2ZAAoJEBB5UWFcu6UWpoUH/19pkbrkOTIjvpGN8Bs9IlR2
28hc3Q/XC8RmwWcMBloSf6j0AkEYrLCJhsAU0eddl5vymwIxApKo35252Xszlv55
+NO09OkHXpqn0Ep6sKVU8FRnlE20rlNwe7Hbi4UXvdaW9HI/RVimAiDTj45q+YkG
V3qhx30iUyEBsXOY/BBLPD0/FVWDKmaxtqMSiHOHQxTvm2DNzsYFW08eEnoP7fi2
C4mALYGUDmYpoxSvJrJ+n8Y36pP3UP/v8/zeQKjkdLOppkK1QyiQ2ZUqs5WZS4Qw
EgtZ7cjQFBeqaXwMxZ4mts4xdq4Awge8dZruzU+jhaHfIY+4dAZhnpgdpwilteI=
=OgTS
-END PGP SIGNATURE-



Bug#792752: mention that one must use -f or the count must be exceeded, else just one big no-op

2015-07-18 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

reassign 792752 e2fsprogs
thanks

This is really specific to e2fsck, not fsck.

On 07/17/2015 09:33 PM, 積丹尼 Dan Jacobson wrote:
 Package: util-linux Version: 2.26.2-8 Severity: wishlist File:
 /usr/share/man/man8/fsck.8.gz
 
 Maybe on the fsck man page, there should be a notice at top:
 
 ** Dear user: fsck doesn't REALLY check a filesystem unless
 
 1. you use the -f flag
 
 or
 
 2. the number of mounts has reached the limit (20).
 
 Unless one of the above conditions are met, nothing at all will be
 done, despite any other options given, it is just one big no-op
 that prints some statistics, but doesn't actually check your
 disks at all.



-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJVqw4xAAoJENRVrw2cjl5RJE0H/RB7zK958TL/fpSHAsDy6nC9
RRgwWFl73z6st6VDp2xvjZdqtH5+6qbOT15JT078mFSLt5yp2f8DDPBGMDxRWy/g
U6l/iODv1L6diNa8A6aMSUAsTiS94mipzOkA+F33PsZFoVQdiwdGTw5u9E/UJhIg
fDSd9bPffEqPzm5DQIjjmaFhdJ1wsMYxQ3b27M5ySr7I8z6xOpnG5l5ey9fy5b5G
AdqWmRH1UNCca3P/HlMYYseTjYe0qnFAsDQqYJVxcO/NYLyQObb66TH+NH1/4WXe
IQsToDSDm9/I3K1HNb1NutFaICUwLnNOtMM6VM2ZKdK4HHIMg2IKbmQKBR1WLIY=
=F/rf
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#787763: util-linux: 'unshare -m' broken

2015-06-06 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 06/06/2015 02:56 PM, James Long wrote:
 Phil, it does work if /mnt is already a mount point, and I
 subsequently make a second mount underneath /mnt.
 
 I expect that the patched version of unshare(1) with restore the 
 previous behavior, allowing things mounted directly on /mnt to be
 private.

There is no patch for unshare(1).  The mount you want to make private
is /, since that is the mount point you are attaching a new mount to.


-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJVc5ssAAoJENRVrw2cjl5RgkIH/jxZY0aJSQk2l52puPm8Nmwq
pZ3la7HC/G4Ma5ZkGk8xjYGrL/97X0rvlK+JxEVyle1YWY76pLStg5fZsAH1pl8S
RgJnatTJ3/+B+zH7qm/BENR0givQnJq2mcYZ7Oxe2dFUALGgt31cvikUqC/Lvs2g
nsdVCU3l8C9Gyflimz7MYs2Rpc9XiQQduxzzE6MhG30CToqs4XgNvwlaq3x12Xum
MrudD41ju2upUCnjiu52/i+Vi98vLoluovJg2Hc9FQZYfmv1vqr3T+WMMmC5nX0v
wW/zvQSI5DtHkKRdwDQLAWVUnDLTNvZU3HV6ZH7pMX2LDIBQz6HoBn3am9pipRE=
=KC0i
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#779017: gparted: btrfs partition can not be cloned

2015-02-23 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

reassign 779017 btrfs-tools
thanks

On 2/23/2015 5:18 AM, Joachim Schmidt wrote:
 I created a btrfs partition with btrfs-convert from ext4. This
 partition can not be cloned with gparted to other disk because
 btrfschk is unsuccessful. A btrfs check --repair /dev/sdXX does not
 help.

Then the problem has to do with btrfs rather than gparted.  It would
probably help to show exactly what errors btrfsfsck is throwing.


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBAgAGBQJU60JxAAoJENRVrw2cjl5RbKgH/jj6ree3EQeZVuGTYVN3gOSy
abO5dhQbWQC2U+2w0KbC4rw4AlswtncLQj7GHdFOEuE07m3hze+vnrpouXojzY5O
pN3vv1PHub4rgGW4H68L9aXr4ETsUmhH9quDIQOazlsEMohi7eHlZWY+cn6rsxxI
R6Xn/60jog00yk476TW65EJzKX/zaNDX0Oj25h9g5Gu2SfYcx2Okl63jhJcaDB1+
Q3HNmXcxzvqNBbVih46roKpruvPrVNV8RdvEndi3yr5LNE8TleFfHJ8CYM9TIhEO
LDj9sf0ax96Gf8zLscKkY9WUeJHKhoAHbVYCwwUfQpc6rKUx7kfpOD9SW+MHpwA=
=NGJz
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#778712: libparted2: Breakage of RAID GPT header

2015-02-20 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 2/19/2015 2:24 PM, jnqnfe wrote:
 Firstly, I am not running fdisk or parted on the raw member disks,
 I am simply running generic 'fdisk -l' and 'parted -l' commands,
 which return information about all disks. To simplify matters I
 removed information about other disks in my system from the output
 I supplied, leaving only that pertaining to the array and array
 member disks.

You did not; the output you supplied listed both sda and sdb.

 I disagree that the problems reported against the member disks
 should just be ignored.
 
 Why does parted think and report that one of the member disks has 
 corrupt GPT tables? 1) The array was setup with 16KB block
 striping, which is surely plenty to contain the entire MBR block
 and primary GPT table within the one member disk; so it's not like
 this results from part of the GPT header being on one disk and the
 rest on another, which otherwise would understandably result in
 such an error. Unless I am wrong and this is happening, why does
 parted think there is a corruption?

The GPT is 16 KiB but starts on sector 2, hence the last 2 sectors
fall onto the second disk.

 2) Why is parted examining GPT headers of member disks at all? It
 should recognise that these disks are members of a RAID array and
 thus skip looking for and reading partition headers on it,
 otherwise it just results in confusion for the user (and
 potentially other issues if it changes anything). Parted's
 behaviour should be changed here accordingly to skip seeking this
 information on array members.

Because parted does not know anything about raid.  I suppose it might
be nice if it could detect it and ignore those drives, but doing so
would require adding a dependency on udev or blkid.  I'll mull the
idea over.

 Furthermore, if you look at the fdisk output I supplied, you
 should notice that when I created the partition table with fdisk,
 everything was initially fine; no 'dev/sdb1' device exists (see
 fdisk4). However after running 'parted -l' to see what parted makes
 of the result of using fdisk, and then re-running 'fdisk -l' (I
 just happened to do so to be certain everything was fine, and found
 to my surprise it was not), you can see that now all of a sudden a
 /dev/sdb1' device exists.

sdb1 shows up in fdisk2.

 The 'GPT PMBR size mismatch' error reported by fdisk is related to
 this device, which per its name is apparently a sub-component of
 one of the array member disks, but I did not create any partition,
 and this device does not appear in lsblk output. So where does this
 'sdb1' device come from? As just stated, it does not exist after
 purely creating the partition table with fdisk, but it does
 suddenly exist after running

The moment you created the GPT table on the raid array, it included
the protective MBR partition, and that is what fdisk is reporting
since the GPT is corrupt ( when viewed through the lens of the single
disk ).  lsblk uses the blkid database which does recognize that the
disks are array components and filters them out.


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBAgAGBQJU50+6AAoJENRVrw2cjl5RgMAIAIKdSLrH8xyAOGgILnFkaMC3
Y0nWrjnH6ZZvxF4WgFCgRkmPAt0Er2BTYTd0PTMd81mMRndoWJNfiQ+J5L8GTxCb
jekarQWgpnGuUfhuUGJxg23IoTUhCXsbIiOu8kcbYTfI3WmXD5ZWEK2ZA+Y9XAaU
rWIajfIfcngeQKaZXL6TdKGslKfaOfdIyAn4AyAGuRP7SwyaHNu9RQyXo4xayjm1
006WmHNAIk0CtOMkPIPjH018+jmj3rnAqBIXc2R6wBZ6QjBdTmch2iRqYln99OR9
wJ6Jso9SWARM+pa3Yh2smFdWJPTFTHe9pY3xmFKtAOP7KGF5vQVJ9wC1w+ss7Ao=
=dSiK
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#778712: libparted2: Breakage of RAID GPT header

2015-02-20 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 2/20/2015 3:44 PM, jnqnfe wrote:
 I agree now that this might just be an fdisk caching issue, but I
 don't think this bit is quiet as you describe. The actions taken
 and results were as follows: 1) RAID array recreated. 2) fdisk used
 to create GPT table on md126. 3) fdisk -l, showing no issues and no
 info from MBR.

It also shows no GPT either, because it is still seeing the stale
cached data where there is nothing on the drive but zeros.

 4) parted -l, pointing out corrupt GPT table. 5) fdisk -l, now
 showing info from the MBR and the error.
 
 So on the basis that fdisk is writing the same protected MBR that
 parted does, it seems fdisk is failing to flush it's cache and see
 the problem when asked to display info immediately following
 creation of the partition tables. Then, either parted triggered a
 cache flush (shared cache I presume?), or else fdisk managed to
 flush the cache the second time around.
 
 So in conclusion, this whole confusing mess resulted from a
 combination of: 1) parted being incapable of understanding RAID
 array membership. 2) fdisk also being incapable of understanding
 RAID array membership. 3) fdisk failing to flush a cache of
 partition info.

Right... fdisk flushes the cache on /dev/md127, but not /dev/sdb,
since it isn't operating on /dev/sdb.  When you run parted -l, it
walks every disk in the system and as part of reading from each one,
flushes the cache, thus, /dev/sdb has its cache flushed, and reads the
new partition table from the disk.


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBAgAGBQJU56AZAAoJENRVrw2cjl5RrtEIAJ+RgE2yKuIY+a3YeuF9ctyT
xfZi6Uzdcz2UfaM1iWvJzdd6IUDgnDztajO4RYgl/XlMjS6efXtO3YixKsUI1Ajt
1Iv4rhPt2Asd+yFCX8fNkA6aGhvTGuHBvf21uWfUZRv05NC8ck7ro8d21RObQDsk
KX5/c/PW3GTJDq1OrQsYygFCoFOocc5w60bu3vcHbGU7WPp561FTrQ4R4Sk1oZaH
ln7W+QtfV+wYg7DnjvdMh2YRrIGfk3IoV4GibIFkn+6X5numGBs/O9/f8Q+4DyJC
naMHOTQAGdzF5VxlNukeCkC7JlWPzEV1sFzxlB/DRhzb/F1Y8MGKCsLZexHEmSE=
=kD25
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#778712: libparted2: Breakage of RAID GPT header

2015-02-20 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 2/20/2015 12:17 PM, jnqnfe wrote:
 What? I very carefully went through every one of them before
 sending to ensure that only information about the array (md126) and
 the array members (sdb and sdc) were included. I have just checked
 back over every one of those files attached to the original bug
 report and none of them contain any info about sda.

I'm sorry; I misread what you said.  I thought you said you had
removed the information about the individual disks that were members
of the array.

 sdb1 shows up in fdisk2.
 
 Yes, but please review the initial bug report for when I created
 each of the output files. I ran three tests using different tools
 to create the GPT headers, first with gparted, then with parted,
 then with fdisk. Before each test I deleted and recreated the RAID
 array to try and achieve a fresh start (which checking fdisk and
 parted info after doing so confirmed was a successful means of
 resetting things). Files fdisk1 and parted1 demonstrate the state
 of things directly after recreating the RAID array, without yet
 attempting to write the partition table.

Yes, at this point the disk is blank.

 So, fdisk2 and parted2 show the state of things after using gparted
 to write a GPT table to the array, and thus this phantom sdb1
 device exists, which fdisk doesn't like.

At this point the array contains a protective MBR that lists one
partition of type ee that occupies the whole array.  Fdisk looks at
sdb and sees the same thing.  Following the MBR is the GPT, part of
which is missing from sdb, so fdisk treats it as corrupt, and falls
back to printing only the MBR.

 So the phantom sdb1 device was not there when only fdisk was used 
 (fdisk4), but does appear after using parted, whether using parted
 to create the partition table (fdisk 2, fdisk3), or as in the last
 test, only to view information (parted -l) after using fdisk
 (fdisk5).

I see now.  I think you are running into a cache aliasing issue here.
 That is to say, that the MBR of sdb was read into the cache while the
drive was still blank, and when parted creates the gpt on the array,
it does in fact create that protective mbr partition, but fdisk does
not see it on sdb yet, since it is still holding the cached data from
earlier.  Note that at this point fdisk reports that there is no
partition table of any kind, not just no sdb1.  If you run blockdev
- --flushbufs and then repeat the fdisk -l, sdb1 should show up.

 Okay, I am aware that a protective MBR may be written alongside the
 GPT tables and that the protective MBR may contain a partition
 entry covering the entire disk. So you're suggesting that this may
 be what this phantom sdb1 device is? Interesting.

Yes, that is exactly what sdb1 is.  You can see from the ID field
being ee.

 But, what is the explanation for it not appearing in fdisk ouput
 after using fdisk to create the GPT tables in test #3? And
 furthermore what is the explanation for it then suddenly appearing
 after then running 'parted -l'? And if that is the case then that
 would imply that fdisk also may not be properly paying attention to
 the fact that these are array members.

parted flushes the disk cache when opening it to make sure that it is
reading the correct data.  After that, fdisk also now sees it.

 If fdisk is setting the protective MBR partition to the size of a
 member disk, rather than the size of the array, that would explain
 the fdisk error not showing up after using fdisk to create the
 partition tables. And if parted is doing the opposite, setting the
 array size here, that would explain the presence of the error in
 fdisk output after using parted to do it. Which if so, begs the
 question, which is right? Should fdisk be changed to use the array
 size (alongside paying proper attention to array membership of
 course), or should parted be using the disk size?

Both of them are using the size of the array, which they should since
that is the disk as far as they are concerned.


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBAgAGBQJU55UUAAoJENRVrw2cjl5RM8UH/0tBf2Kz1MfNkZeOuMG4nfRV
fx5iYdI0I5Zm5SEB1fYXJcKLwxfNb5h0sBs+BskmVcnJZioMm3foo9uHetFip4kA
2zBZfXmgI5akFbkYYq2H7q0wxwU4tDecCGOn9cOUeTA0GNCci4W/f6TfKugk504E
aUzoQMh+qN8Fxycj1p+efa7voRgYiUjC8aaEUmswYRLdfgxKKLkhOKYZY31Kk3Qf
i5zbLjeUrLPARlmUGOc2ON0ljzLm/QJ3p40iCTFVaJ9dQrUumLiH4bUc53rXY72S
XAYeaCTim2gKTcGJD6VKMTa/EVlwjWgBPb12FsnFtha/Gv/oilahGVqz5cZlRro=
=3W21
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#778683: Error creating partition table on RAID device

2015-02-18 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

tags 778683 + moreinfo
thanks

I can't really follow your very well, but it sounds like you did
simply select the wrong device in gparted.  If you can reproduce this
using just parted showing how would make things clear.  If you can
only reproduce it in gparted, then more detailed steps of how, as well
as a copy of the gparted log file should help track down the problem
there.
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBAgAGBQJU5NaVAAoJENRVrw2cjl5RJT0H/3/mVrSSxGrWUyBrNKWY5ko6
o6YpqfSdLF/xHBRGAvKsCaw7g8Uv/GDrJXaIg3IUU4Ba8b3S+lKsmQ/UbZFARSQH
FWWUBsrJmJARjs7T7azxjUDbipVFJZQxxoNKKPqzeNwGhXIGHM8WVmffP1YUOYzK
00Of92sZffPyw2DdTIJaHtJNFMJiVkdf7K7RRkURzHvSoA8uEw2ezQVjaHJmQ1OA
8Bdc759gi+OrjDGRALJrA86ztLNvqFOa9nb5PQ491jfkBSHyrYVziGZ8HIgkEmZ0
drDyEA9pMH8obz+EEDTOw6HbMFS9xghAtcbKKALaQRkbc+wDEJK3ovQh476mabQ=
=uEDM
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#778712: libparted2: Breakage of RAID GPT header

2015-02-18 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 2/18/2015 4:05 PM, jnqnfe wrote:
 Background = I have a 'fake-raid' RAID0 array,
 created from two HDDs using my motherboard firmware. This is not
 used for root, just data.

FYI, unless you have to dual boot with windows, you should avoid using
fakeraid and stick with conventional linux software raid, which is
much better supported.

 sdb and sdc are the RAID members here and the RAID device is
 md126.

Then you need to only manipulate md126 and ignore sdb and sdc.  Most
of what you seem to be reporting involves looking directly at the
individual disks, which you must not do as that will present a
partial/corrupt view of the raid array.  In other words, if the first
few sectors of the raid array map to sdb, then sdb will appear to have
a partition table in its sector 0 that describes a disk that is twice
the size, since this partition table is actually describing the raid
array and not the individual disk.

The one thing you mention that I can't write off as user error is but
parted is not and seems to be forcibly applying what it believes to be
correct (ignoring the fact that it was only asked to display info, not
modify anything).  Can you provide more details here?  Exactly what
command did you run and what changed before vs. after?  Parted should
not be modifying anything on the disk unless you tell it to.  Normally
it will throw a warning telling you something is wrong with the disk
and ask if you want it to fix it and you have to answer fix for it
to modify the disk.


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBAgAGBQJU5QWEAAoJENRVrw2cjl5RwnkH/0jvimRzKxUZjFait+KVZQgW
gq2m6MVJYiDZLX3ajGZj2mxQNVu2RFqDn+YwqAWeDtrQEj/B0TXJC3RbBJpoN3Ao
5kH+lU2Z+YihRDpQMst8VGt1MVA6izcapN1uVeJOcLB2wICSGd0WcjAn8ROSnZNS
o/7hXLh7dhxQZT+2HsTpmWa6pLEVvyBeQ8u2giNB0w8he75qv4/AxCFYAdVqhr4Y
nNfC9zzCtcOGExu12GyigEpWUPlxUcyGsYzaQRR2hG1Vv7LKBsDBsok3qAag033E
DyhyCWDj8NJk1WQIW2ZyVjhcskSyl59Oatd7X3TGSqr2L7yaHV+QAA5Cng+A9fw=
=WuvR
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#778712: libparted2: Breakage of RAID GPT header

2015-02-18 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 02/18/2015 05:15 PM, jnqnfe wrote:
 Then you need to only manipulate md126 and ignore sdb and sdc.
 Most of what you seem to be reporting involves looking directly
 at the individual disks, which you must not do as that will
 present a partial/corrupt view of the raid array.  In other
 words, if the first few sectors of the raid array map to sdb,
 then sdb will appear to have a partition table in its sector 0
 that describes a disk that is twice the size, since this
 partition table is actually describing the raid array and not the
 individual disk.
 
 I am not doing anything at all to the member disks, I am only 
 manipulating the array (mb126) and providing the ouput of fsdisk -l
 / parted -l (with unnecessary info about other disks removed).

All of the error messages shown in the logs you sent so far involve
the raw disks ( sdb, etc ) rather than the raid array.  You certainly
should not be running fdisk or parted on the raw disk, and responding
to the error messages by saying it should fix the problem ( since the
problem is only a result of looking at an individual disk instead of
the whole array ).

 The one thing you mention that I can't write off as user error is
 but parted is not and seems to be forcibly applying what it
 believes to be correct (ignoring the fact that it was only asked
 to display info, not modify anything).  Can you provide more
 details here?  Exactly what command did you run and what changed
 before vs. after?  Parted should not be modifying anything on the
 disk unless you tell it to.  Normally it will throw a warning
 telling you something is wrong with the disk and ask if you want
 it to fix it and you have to answer fix for it to modify the
 disk.
 
 I did only exactly as described in my previous message, nothing
 more, nothing less.

You stated that parted modified the disk when you didn't tell it to,
but did not show exactly what command you gave that lead to this, and
more importantly, what if any, error messages parted threw and how you
responded to them.


-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJU5WZLAAoJENRVrw2cjl5RIEwIAKgjCMaHtYDruSejfB5I60F9
opO+FGClLTJPML6ggREF8hDM+K7eFpWCa4buWTvKUBix1oNjeLvWJVfu5XoSIQbt
A+XX+YyBGjYuXXApXUV5W1A9P/beKhAGzs0anAZu6pZEirCcxQINjexjPua8PlZM
PSuEppd/Bpmnw26CK/h2lrFNHJs1c9vzcnLOwMlT0ZzVXVAFFK90z8cxVo/kSvVb
z5Sp5NtD/WWcdc5nTs6m1yEgs/3E/G3OB9VUF3+2c9dwXj5FXnEzAMAKN+g2ZKAO
zI2TGFQpITPRkP7ij+0XpqH/YaWYLAHGbb0peIbsQHpDuBX+yT16Q3E93Sg56oU=
=2m/O
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#778617: grub-install often breaks in UEFI mode

2015-02-18 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 2/17/2015 5:51 PM, Steve McIntyre wrote:
 On Tue, Feb 17, 2015 at 09:32:56AM -0500, Phillip Susi wrote:
 Package: grub-installer Version: 1.110
 
 I'm forwarding this patch from Ubuntu:
 
 https://launchpad.net/bugs/1303790
 
 On EFI, the boot disk argument given to grub-install is a dummy
 and is often the wrong disk or a non existent disk.  Grub is
 still installed to the correct place since it goes through the
 filesystem to /boot/EFI, but the function make_active_partition
 tries to look at the partition table on the dummy disk and throws
 an error.  Hence, I wrote the attached patch to disable the
 function on EFI.
 
 Hi Phillip,
 
 The logic looks ok, I guess, but I'd check more explicitly for 
 grub-efi-* instead of !grub-pc. There's several other
 architectures that may use grub, and I'm not sure if/how they may
 need special handling for active partitions...

Sounds good to me if you want to switch it when you apply the patch.


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBAgAGBQJU5KcwAAoJENRVrw2cjl5R48YH/isp8MR/2Ps4F0v7fzpxpgkb
Oe2e/s+ziB14mhKQ1dNHb8KcIeFfg60cCTSNw8kmb05Zk+v+GsaAHpKX0Dk62i5T
gy+9HXPlyUqZTzCe24mQnSAgSbrgm8B9OD0VRgr6fEzAbW2/+co9wI4l1NQHKifK
fPls70SKQBZyqZDpr4F0uBEBDfB16kOTJr8P+a9MEhdzkwxA0CyuQObwaIC5V0xd
DpQqmiE+g5v9zpJgBZDVV/c1t+mBAzSTnORg+/1J8qXf48yHOtA2Or0nJb/VxvBM
U6B32fsy7g+4hnZVq1U3Q+JlrNIB4BdyyEoatg68i2TnjS5b/aDXCVPBR0TpsoY=
=igUq
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#778617: grub-install often breaks in UEFI mode

2015-02-17 Thread Phillip Susi
Package: grub-installer
Version: 1.110

I'm forwarding this patch from Ubuntu:

https://launchpad.net/bugs/1303790

On EFI, the boot disk argument given to grub-install is a dummy and is
often the wrong disk or a non existent disk.  Grub is still installed to
the correct place since it goes through the filesystem to /boot/EFI, but
the function make_active_partition tries to look at the partition table
on the dummy disk and throws an error.  Hence, I wrote the attached
patch to disable the function on EFI.


revno: 121
committer: Phillip Susi ps...@ubuntu.com
branch nick: grub-installer
timestamp: Tue 2015-02-17 09:15:44 -0500
message:
  Don't try to mark a partition as active, except on grub-pc.
  This was causing failures for grub-efi (LP: #1303790).
diff:
=== modified file 'debian/changelog'
--- debian/changelog2014-10-06 18:29:15 +
+++ debian/changelog2015-02-17 14:15:44 +
@@ -1,3 +1,10 @@
+grub-installer (1.78ubuntu24) vivid; urgency=medium
+
+  * Don't try to mark a partition as active, except on grub-pc.
+This was causing failures for grub-efi (LP: #1303790).
+
+ -- Phillip Susi ps...@ubuntu.com  Tue, 27 Jan 2015 15:51:09 -0500
+
 grub-installer (1.78ubuntu23) utopic; urgency=medium
 
   * On ppc64el, wipe the PReP partition before installing grub-ieee1275,

=== modified file 'grub-installer'
--- grub-installer  2014-10-06 18:29:15 +
+++ grub-installer  2015-02-17 14:15:44 +
@@ -1006,6 +1006,12 @@
 }
 
 make_active_partition () {
+   if [ $grub_package != grub-pc ]; then
+   # only do this for grub-pc since on EFI $bootdev is a dummy argument
+   # and looking for a partition table on the wrong or non existing disk
+   # crashes the installer LP:#1303790
+   return
+   fi
bootdisk=
bootpart=
case $bootdev in


signature.asc
Description: OpenPGP digital signature


Bug#777647: partman-efi always complains when installing from usb

2015-02-17 Thread Phillip Susi
On 2/17/2015 1:37 AM, Steve McIntyre wrote:
 Any futher clues on this at all? I have next to no knowledge about how
 the Ubuntu installer code uses the d-i packages, which makes it
 difficult for me to comment much more.

I emailed a log with my attempt at analyzing it to Colin Watson the
other day and am still waiting to hear back from him.  I think you can
close this bug now as I'm fairly certain it is an Ubiquity issue.  I
looked at some logs from older releases and indeed they all seem to run
all of the init.d scripts first, and only later process the visual.d and
other scripts, so somehow ubiquity must be running things wrongly and
getting the visual.d scripts to run before the init.d ones and that is
the cause of the problem.

I do still wonder though, why the script doesn't trip up when installing
from a USB stick.  Is there some logic somewhere I don't see that causes
all of partman to ignore/forget about the disk you are installing from,
so that the efi script doesn't see that and count it as a non ESP?


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#777647: partman-efi always complains when installing from usb

2015-02-11 Thread Phillip Susi
On 2/11/2015 4:38 AM, Steve McIntyre wrote:
 Hmmm, and just testing with the latest Debian amd64 daily netinst all
 works flawlessly here still, using the same empty disk in a KVM setup
 as your bug reporter.

Strange.. I'll have to poke around with that.

 This suggests the problem is Ubuntu-specific, or there's an issue with
 other software. You allude to potential changes in libparted; how do
 the versions in Debian and Ubuntu compare here?

They are in sync.  The change in particular that I think may be related
is that in parted3, it now keeps the partition table cached between
commands rather than re-reading it every time.  This has the affect that
when you create a partition and tell parted it will hold an ext2
filesystem, and then print the table, it now reports that it contains an
ext2 filesystem since it is no longer re-reading the disk and finding
the partition to be empty.

Now that I think about it though, this change was in parted proper and
so should not affect other libparted clients like parted_server, so that
seems to have been a red herring.

The thing I saw that struck me as similar to that parted change was that
when I put a set +x in the partman-efi script, it appeared to have
identified an ext2 filesystem on the disk that partman was formatting
with the usual default ext4 root and swap partitions so I kind of
assumed it simply had not gotten around to running mke2fs yet but had
asked libparted to make an ext2 partition and then partman-efi
identified it as a non efi system partition.

This script really should be running before the disk has been modified
in any way though right?  So it should still just see a blank disk or a
disk with no partitions and not count it as a non ESP.  Hrm... I'll do
some more debugging tonight.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#777647: partman-efi always complains when installing from usb

2015-02-11 Thread Phillip Susi
On 02/11/2015 11:47 AM, Steve McIntyre wrote:
 Quite, that's exactly how it's meant to work and it's what I've seen
 in my development and testing. Silly question - is ubiquity trying to
 run some of the d-i bits in parallel, or something?

That's what I was wondering.  I'm looking at /var/log/partman now and it
appears that visual.d/35name runs and then I see /bin/perform_recipie
issue a NEW_PARTITION command to make the ext2 partition ( which will
later be formatted as fat32 for the esp ), and then the ext4 partition
for the root and then swap.  Later init.d/50efi runs and sees the
partition that the earlier script created even though it has not
actually been committed to disk yet ( i.e. blkid still sees a blank disk ).

Did we change the ordering in ubuntu or something so that the problem is
that visual.d has priority 35 but init.d/efi has priority 50 when they
should run the other order?  I would think that all of the init.d
scripts would be run before any visual.d scripts though, and the
priorities just order them within their group.  If that's not the case
then I guess they simply have the wrong priority.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#777647: partman-efi always complains when installing from usb

2015-02-10 Thread Phillip Susi
Package: partman-efi
Version: 59

partman-efi uses flawed logic that trips up when installing from usb.
init.d/efi scans the system and counts the number of efi system
partitions, and the number of non efi system partitions.  If it does not
find an EFI system partition, but does find at least one non ESP, then
it throws the non_efi_system warning/question.  The problem is that when
installing to a disk that does not already have an efi system partition,
the script *always* detects a non EFI system partition, and throws the
warning.  This may be connected to a recent change in libparted.
Looking at the partman logs and the output after adding a set -x to the
init.d/efi script, it appears to me that what is happening is that the
system asks libparted to create a new partition on the hard disk that
will become an EFI system partition.  Either init.d/efi runs before the
partition has been formatted with a fat filesystem, or parted_server is
still running and is keeping the ext2 fs type cached from before it
was formatted.  Either way, the script decides it sees an ext2
filesystem on the drive, and that counts as a non EFI system partition,
and so it throws the message.

Forwarding this from launchpad bug #1418706 in Ubuntu.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#777647: partman-efi always complains when installing from usb

2015-02-10 Thread Phillip Susi
title 777647 partman-efi complains about boot problem whenever the
target disk does not have an efi system partition
thanks

Sorry, I mentioned that it involved installing from a usb stick, but it
also happens when installing from cdrom; using a usb stick has nothing
to do with it.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#777166: Please consider not hard coding the name Debian into error messages

2015-02-05 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Package: partman-efi
Version: 59

Recently a new message was added to d-i:

 This machine's firmware has started the installer in UEFI mode but
 it looks like there may be existing operating systems already
 installed using BIOS compatibility mode. If you
 continue to install Debian in UEFI mode, it might be difficult to
 reboot the machine into any BIOS-mode operating systems later.

Please consider replacing Debian with `lsb_release -si` or similar
so that people installing other distros based on debian don't get a
message about a different operating system than the one they are
installing.

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBAgAGBQJU09MKAAoJENRVrw2cjl5RvvMH/1WYchn0xt77ZRySIodqz9sx
VgDNmuXNbafhE6NATzOSnQxYwwprMHcS5HD8rfNoF6G9Zg//a6pGQa6BJ73C0Zn/
1oeb5fiOFTlcaJbpelDsx7cxH9aWWrSRN4HEiJIeR9u3FssJcJEU9r5Iuw7Kj+f/
uT8qNdibKnyKZziYeCgw06DGdtA6l64PgH4apjlCUcKr1q9x+zlP0HE1lASJxKas
gSfRjeDLtus4SFsAq3EhEZd/W9QfttFTG7aknsJgqmAoVZn2pq+ceogD9CfTA121
8E3iACB7icTGOE7z+j13VRCkIh3Zmi2Xp+b92pj9BkXGnrXpFEOBfx1RZXr5tXI=
=zk48
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#776034: fsck runs in parallel on same physical disk

2015-01-26 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 1/26/2015 7:34 AM, Daniel Pocock wrote:
 The performance impact is not trivial.   I have 28 LVs on my main 
 /dev/md and 47 on an external disk that is used to replicate other 
 filesystems.  Both of these disks make a horrible thrashing sound
 while fsck runs.

Why on earth are you fscking all of those volumes at once?  Use a
journaling filesystem ( ext4?  xfs? ) and you shouldn't really ever
need to fsck at all.


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBAgAGBQJUxkZJAAoJENRVrw2cjl5RPywH/RvUti6Xn8EUi8CBVBe8G1xU
ViahLvk3Q+vMZxNHASg7pbjXMBzosBks28+kd5lqZ/LGm9vNBXTmmEctUwwG/RHZ
yT9kiOg8A/czkW9N4enEZ7Qtb/bq8fH9Cc4uqEDvKxJFZN8hr0I9W9KE/hfYGv28
B3o9qEbyrzv6VsC9UjeA2b+/1taQFUp3KKcM0s/maXJef9JufzTilVkT8lb1cUMd
/4/oWB4HUywG/ArMP8eCogy/0jsJSLWIPs0bAvmUVBo2YnfOFuBn67cuF7Z3a6ZG
OtaKbIExqlyDrT4/Jo+nfsXYpt9h48AKtjESUuqX4C7xB2hMob8q5yOPx65/IKY=
=+qtc
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#765283: gparted crashes due to bug in glibmm

2015-01-25 Thread Phillip Susi
reassign 765283 src:glibmm
affects 765283 gparted
tags 765283 + fixed-upstream
thanks

Upstream traced this to a change in glibmm that they have patched.
Please apply the patch in this upstream bug report:

https://bugzilla.gnome.org/show_bug.cgi?id=743466


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#765283: Bug 765283

2015-01-23 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 1/23/2015 3:34 AM, Andreas  wrote:
 Hi Phillip!
 
 I can reproduce this here on Lubuntu Vivid...
 
 Lots of stuff coming up...

Strange... it looks like a newly created thread is crashing very early
on before it even gets to run any gparted code.  Could you describe
how you reproduce the crash, and could you take a look at what the
other threads are doing when the crash happens?



-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBAgAGBQJUwlVYAAoJENRVrw2cjl5RXagIAKln/hycuKzE6sbSF/Nr9kto
+Jmarl4PMRvx8sVisYHGkM/O2xkMpEC2VdZYWXd52gj7MLwlQMzrQ6rP8Fyl7tcp
k1bNbwI/Hey913pIb8qOLiPmCFuvLC89X+PrkHP32Sm81Udlz1N7gtkKmyuR3JdK
AJbmasN/QGo2dm6XRQEvNGT/yMIzOu+Y+YHotJoIjfHnhRq/f+nzDnaQqJ3K6z+i
pb31JKT/lBNQW4HTJMokJNyUYmeVhF65Dc6iuDOqvdh9IWLx7msGwhnhD8byk1Jb
ULMLtKRVKcCran6gDjtqR2xT1QACd4oIwtIW2v1WkRCaaSQQRNR/DX27tapOZdY=
=sfs1
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#773354: please add breaks: live-tools ( 4.0.1-1)

2014-12-18 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/17/2014 6:27 PM, Daniel Baumann wrote:
 On 12/17/14 23:50, Andreas Henriksson wrote:
 I'd guess (without having looked) because live-tools diverts 
 update-initramfs?
 
 no, it's about uptime.

What?


-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBAgAGBQJUkuCUAAoJENRVrw2cjl5R3BYIAIYUEHWyeJb3ar/2D4V9//zO
1LQ7G6jZURBSnn/FqUfzHEW6S7Q1m4Hk5aUvXdlEv1M0e98xPVGQ6irjEd0aGXsz
aHv6C1VW1r00yRa6WnkShhreEuuzjDUmWsS8To8Rbv0fUPxOhRsJRXjlcn89Gjqs
X9eFDojeUv8P3Z5S+byThsnFwVoWuPnF0WETHmmsxhX4uxkpQumIBHzqB0KgK3Fe
hFX2PCu0qqp4QtKc9TW7dPTb/Mueg9PX1UVm8wQwwtKFClqhLoNvCSlAFJe7e3Br
WRCQPj760ZP5NBsCwNDNZNyf/wdfb06k/2lOYvDNJ1kSBB2EBPvSl5jhiQx5ou0=
=HvMz
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#772977: mount: root partition cannot be remounted readwrite from shell

2014-12-18 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

tags 772977 - moreinfo + fixed-upstream
thanks

They fixed it upstream

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBAgAGBQJUkuX7AAoJENRVrw2cjl5RBTUH/044JAIRAaC366HvdF+O9gVK
YXmdfx/E9RDp35LrUJSfObLHToqeSavFkDT7BGiTau10iDsnXEP4beIadv7Euqzw
tZwiKJOP0BwWin4059vx++n5M3e0keuLxbdV/vCeZlnDPllEKjfwO4RCcZMscGHU
V5/hVHW8WE8avyVGitrFg862wJVgli/QJ0QFtotg0LFrIKCxV9JPSHK/zObxezHL
oMgiJ+IB2S3nvGueIko6aP2/5ZuCu9rvdie0l23hh0rsQ+A9Z9fY8H13GD5Qas2q
rG4XkdI79W6M8tPX3lb6qTzHtEnk01PmhaNVEbpPuCQHgaIfx33/SdODqTtlG3Y=
=OQMF
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#773354: please add breaks: live-tools ( 4.0.1-1)

2014-12-17 Thread Phillip Susi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I don't quite understand what's happening in this bug.  How do we get
from calling update-initramfs to an error trying to execute
update-initramfs.orig.initramfs-tools instead?

For that matter, instead of directly executing update-initramfs,
shouldn't we be using a dpkg trigger?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.17 (MingW32)

iQEcBAEBAgAGBQJUkZSVAAoJENRVrw2cjl5RojMH/1lGFkCM+FdvBL+9Y77V9O+T
o+RVZitkYpBWpPGoQ4RjjY8B6YoaOl4QppvMN+1jpfV2+u3cA7Rq6+INB+RGvtD2
UN6ZmHAdpuPyTAiXERkHqfMJ0+FNHmE0RJGGkcMpuhQ4emFWfe97KNApe3MzJ+XN
evIkPi5rlM5P7fxSZunR7F9bOnZD09g34FW9Kwdhud/aIA8qdcyComW8qtGJZlse
NzO6jlH11aLcFv5d2JGJShrBKePilngeXe8RcCptueAf6ny7t0bvroLreLKPe37g
rtgF+1nyGKG3pYHwLV9dyKXp8I26iUJ1gwGQ5Qo4upBGv4+hLeg+SK9dv8IBte4=
=BMUY
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



  1   2   3   4   >