Bug#878935: libbpfcc needs a way to ensure the current kernel's headers are installed

2017-10-18 Thread Alexander Kurtz
On Wed, 2017-10-18 at 13:02 +0100, Ben Hutchings wrote:
> > Please comment on bug #877925 [4] and/or #878922 [3] regarding on how
> > to solve the "this package needs the current kernel's headers
> > installed" problem!
> 
> You cannot use package dependencies to do this.  It has to be a run-
> time check.

Ok, that's what I figured. Is there at least a solution to the "if the
user has the standard, most recent, Debian kernel running, make sure
the corresponding headers are installed" problem? I.e. something like
Ubuntu's "linux-{image,headers}-generic" packages?

Best regards

Alexander Kurtz

signature.asc
Description: This is a digitally signed message part


Bug#878935: libbpfcc needs a way to ensure the current kernel's headers are installed

2017-10-17 Thread Alexander Kurtz
Hi!

(Applications linked against) libbpfcc will dynamically compile and
load C source code into eBPF byte code at runtime and load the result
into the kernel for various purposes (e.g. socket filtering, tracing,
etc.).

For this to work, it needs the kernel headers of the *currently running
kernel* [0,1]. Therefore, the maintainer of libbpfcc in Debian added a
corresponding dependency [2] which unfortunately breaks everything but
amd64 [3] and does also not quite fix the original bug [4].

Please comment on bug #877925 [4] and/or #878922 [3] regarding on how
to solve the "this package needs the current kernel's headers
installed" problem!

Best regards

Alexander Kurtz

[0] https://github.com/iovisor/bcc/issues/397
[1] https://github.com/iovisor/bcc/issues/743
[2] 
https://anonscm.debian.org/git/collab-maint/bpfcc.git/commit/?id=f73049e48fd98dd01d4475f88f6b490e6a1b34bb
[3] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878935
[4] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877925

signature.asc
Description: This is a digitally signed message part


Bug#878935: Unsatisfiable dependencies on !amd64

2017-10-17 Thread Alexander Kurtz
Package: libbpfcc
Version: 0.3.0-3
Severity: serious
Justification: Makes the package uninstallable on most architectures

Hi!

As [0] shows, libbpfcc has unsatisfiable dependencies on everything but
amd64. This is because [1] is inherently wrong, "linux-headers-amd64"
is of course only available on amd64, the other architectures have
their own meta-packages [2]. Unfortunately there is (AFAIK) no good way
to properly solve the "this package needs the current kernel headers
installed" problem in Debian because

   1. There are no (real or virtual) "linux-{image,headers}-
  generic" packages (like in Ubuntu [3,4]) which have the same name on
  all architectures.
   2. Even if there were such packages, there's no guarantee that "linux-
  headers-generic" would point to the headers matching the *currently
  running* kernel (which is what libbcc needs). In fact, with partial
  upgrades, migrations from unstable to testing, upgraded-but-not-yet-
  rebooted machines, etc., it is quite likely that libbpfcc will be
  broken even if all its dependencies are fulfilled.

I therefore ask you to

   1. Revert [1].
   2. Reopen [5] and put a note regarding the requirements of the kernel
  headers in README.Debian and/or the package description.
   3. Talk to the Debian Linux maintainers to find a proper solution to
  this problem. It's probably not going to be easy, but these kinds of
  problems really deserve to be fixed properly.

Yes, this sucks. I have run into #877925 myself and also thought that
this should be simply solvable with a dependency. Oh, well, at least
you may take comfort in the fact that others [6] have also run into
this problem... ;-)

Best regards

Alexander Kurtz

[0] https://tracker.debian.org/pkg/bpfcc
[1] 
https://anonscm.debian.org/git/collab-maint/bpfcc.git/commit/?id=f73049e48fd98dd01d4475f88f6b490e6a1b34bb
[2] https://packages.debian.org/source/sid/linux
[3] https://packages.ubuntu.com/artful/linux-image-generic
[4] https://packages.ubuntu.com/artful/linux-headers-generic
[5] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877925
[6] https://anonscm.debian.org/git/pkg-dkms/dkms.git/tree/debian/control#n24

signature.asc
Description: This is a digitally signed message part


Bug#878922: libbpfcc-dev does not depend on libbpfcc

2017-10-17 Thread Alexander Kurtz
On Tue, 2017-10-17 at 23:43 +0545, Ritesh Raj Sarraf wrote:
> After installing the libbpfcc package manually, does it build proper ?

Yes.

Best regards

Alexander Kurtz

signature.asc
Description: This is a digitally signed message part


Bug#878922: libbpfcc-dev does not depend on libbpfcc

2017-10-17 Thread Alexander Kurtz
Package: libbpfcc-dev
Version: 0.3.0-3
Severity: serious
Justification: Policy violation

Hi!

Debian Policy, section 8.4 ("Development files") [0] says:

Installing the development package must result in installation 
of all the development files necessary for compiling programs
against that shared library.

However, libbpfcc-dev does not depend on libbpfcc. This makes
compilation fail, for example like this:

root@riga:~/alfwrapper# make
cc -std=gnu11 -Iinclude -O2 -Wall -Wextra -Werror --output='alfwrapper' 
src/alfwrapper.c lib/bcc.c lib/die.c lib/env.c lib/pid.c lib/string.c 
lib/cleanup.c lib/path.c lib/fd.c lib/parse.c lib/argv.c lib/socket.c -lbcc
/usr/bin/ld: cannot find -lbcc
collect2: error: ld returned 1 exit status
Makefile:9: recipe for target 'alfwrapper' failed
make: *** [alfwrapper] Error 1
root@riga:~/alfwrapper# 

Please fix this by making libbpfcc-dev depend on libbpfcc.

Best regards

Alexander Kurtz

[0] https://www.debian.org/doc/debian-policy/#development-files

signature.asc
Description: This is a digitally signed message part


Bug#875826: epiphany-browser: typing in URL bar lags a lot, preventing correct typing

2017-09-25 Thread Alexander Kurtz
Hi!

On Thu, 2017-09-14 at 22:44 +0200, Matteo F. Vescovi wrote:
> I've noticed that, since 3.25.9x version uploaded to experimental suite
> for testing purposes in Debian archives, epiphany-browser has an
> annoying issue related to bad lags while typing web addresses in the URL
> bar.

I have experienced this bug too after upgrading to epiphany-browser
3.25.92-1 from experimental; the address bar was basically unusable
since you had to type blindly or wait for several seconds for your
input to show up. However, for a few days now, I haven't had this
problem anymore. Do you still experience this bug? If not, would you
mind closing the bug since it currently blocks migration to testing.

Best regards

Alexander Kurtz

signature.asc
Description: This is a digitally signed message part


Bug#854911: dbus fails to start on package installation on very minimal systems

2017-02-11 Thread Alexander Kurtz
Control: severity -1 normal

Hi!

Thanks for your quick reply! I tried to make this bug reproducible and
eventually succeeded: The crucial point was, that the package
installation must happen *before* systemd considers the system fully
booted, i.e. by installing the package inside "/etc/rc.local". This
means:

   1. This is certainly a corner case, so I have downgraded the severity
  to "normal".
   2. Depending on what our expectations on systemd are, this might be no
  bug at all.
   3. If it is a bug, it is probably not in the dbus package, but rather
  in the init-system-helpers or systemd package.

If you (or the systemd maintainers) are interested, you can reproduce
this bug with the attached script: Just run it as root and you should
eventually get a login prompt. Login as root (no password required) and
run "systemctl status dbus". The output should look like this:

root@shepard:~# systemctl status dbus
● dbus.service - D-Bus System Message Bus
   Loaded: loaded (/lib/systemd/system/dbus.service; static; vendor 
preset: enabled)
   Active: failed (Result: exit-code) since Sun 2017-02-12 00:17:56 
CET; 3min 29s ago
 Docs: man:dbus-daemon(1)
 Main PID: 192 (code=exited, status=1/FAILURE)

Feb 12 00:17:56 shepard systemd[1]: Started D-Bus System Message Bus.
Feb 12 00:17:56 shepard dbus-daemon[192]: Failed to start message bus: 
No socket received.
Feb 12 00:17:56 shepard systemd[1]: dbus.service: Main process exited, 
code=exited, status=1/FAILURE
Feb 12 00:17:56 shepard systemd[1]: dbus.service: Unit entered failed 
state.
Feb 12 00:17:56 shepard systemd[1]: dbus.service: Failed with result 
'exit-code'.
root@shepard:~# 

However, please also feel free to simply close this as NOTABUG. Thanks
again for your quick reply!

Best regards

Alexander Kurtz

reproduce-854911.sh
Description: application/shellscript


signature.asc
Description: This is a digitally signed message part


Bug#854911: dbus fails to start on package installation on very minimal systems

2017-02-11 Thread Alexander Kurtz
-activation

Feb 11 20:22:28 localhost systemd[1]: Started D-Bus System Message Bus.

● dbus.socket - D-Bus System Message Bus Socket
   Loaded: loaded (/lib/systemd/system/dbus.socket; static; vendor 
preset: enabled)
   Active: active (running) since Sat 2017-02-11 20:22:28 UTC; 9s ago
   Listen: /var/run/dbus/system_bus_socket (Stream)

Feb 11 20:22:28 localhost systemd[1]: Listening on D-Bus System Message 
Bus Socket.

I *think* this might be a race condition between systemd learning about
dbus.socket and dbus.service being started by the postinst. Any
thoughts?

Best regards

Alexander Kurtz

signature.asc
Description: This is a digitally signed message part


Bug#854487: Binary-only package puppet was silently converted into a package shipping and running a service

2017-02-07 Thread Alexander Kurtz
Package: puppet
Severity: critical
Tags: security
Justification: Potentially opens up a new security hole

Hi!

In the old days, users wanting the puppet binaries but not the puppet
daemon would install the puppet-common but not the puppet package [0].
This changed when puppet 4.5 was uploaded to Debian, now the puppet
package contained the binaries and the puppet-agent package contained
the service [1]. This transition was done properly, as the new service
packages would not be installed by default.

However, now somebody decided, that it's a good idea to drop the
puppet-agent package and move the service file back to the puppet
package [1]. This is bad, very, very bad. Here's why:

   1. As of today, there is no apparently no package shipping only the
  binaries but not the service files.
   2. I have quite a few systems where I occasionally run puppet manually,
  but which should never run puppet automatically.
   3. Those systems began to look for a puppet master at the default
  server address "puppet" recently as the new package version got
  installed.
   4. As a result, anybody with control over DNS could have responded and
  potentially taken over those systems.

Please understand that your change made my and potentially other
people's system vulnerable without even telling them about it. I urge
you strongly to revert this change!

Best regards

Alexander Kurtz

[0] https://packages.debian.org/source/jessie/puppet
[1] https://tracker.debian.org/news/771535
[2] https://tracker.debian.org/news/833773

signature.asc
Description: This is a digitally signed message part


Bug#851893: The availability of update-grub does not imply that GRUB is used

2017-01-20 Thread Alexander Kurtz
Hi!

On Thu, 2017-01-19 at 22:05 +0100, Aurélien COUDERC wrote:
> Thank you for your detailed bug report and analysis.
> This looks a lot like #843727 [0] to me, although not for the same use case.
> 
> Would you care to test 9.0.1, already in sid that should fix this problem ?
> The following change was done :
> 208:    update-grub || echo "Updating grub failed, report success anyway!"

I am sorry, I had not noticed bug #843727. However, I believe this
change is not a correct solution, because:

 a) "On Error Resume Next" is (in general) not a good idea.
 b) It is still a GRUB-specific solution. People use a whole bunch
of different bootloaders to start Debian, GRUB is just one of them.
 c) It will cause really subtle bugs under some circumstances.

Let me explain c): Assume that a user has the grub-pc package installed
and GRUB is installed to /boot normally. At one point, the user decides
to remove the grub-pc package (and only that) and use a different
bootloader. Everything works, but the files under /boot/grub are of
course still there. Now your package comes along and runs update-grub
which happily modifies /boot/grub even though the user explicitly
removed the GRUB automation package.

> I'll merge the 2 bugs after confirmation that it works for you.

I agree that your changes fixes the immediate problem. But I really
think there are two fundamental issues with desktop-base calling the
update script of one specific bootloader:

(1) It's surprising to the user (and the maintainers of other packages)
(2) It will only work with GRUB

> If you know of a better and robust way to detect if grub is being
> used, advice is welcome.

There is a better way, dpkg triggers [0-3]. There's even a
corresponding bug in GRUB about it [4]. However, nobody really seems to
care, so not much progress has been made.

Maybe you could talk to the GRUB maintainers and convince them to add a
"interest update-grub" trigger in the grub-pc and grub-efi packages.
Then GRUB's postinst would run the update-grub script and all your
postinst would do, is issue a "dpkg-trigger update-grub" call. Of
course, it would be even better to find a generic solution for all
bootloaders (e.g. a generic "update-bootloader" trigger), but I believe
that it's too late in the release cycle for this.

What do you think?

Best regards

Alexander Kurtz

[0] https://manpages.debian.org/jessie/dpkg-dev/deb-triggers.5.en.html
[1] https://manpages.debian.org/jessie/dpkg/dpkg-trigger.1.en.html
[2] http://eric.van-der-vlist.com/blog/owark/473/
[3] https://wiki.debian.org/DpkgTriggers
[4] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=481542

signature.asc
Description: This is a digitally signed message part


Bug#851893: The availability of update-grub does not imply that GRUB is used

2017-01-19 Thread Alexander Kurtz
Package: desktop-base
Version: 9.0.0
Severity: serious
Justification: Package fails to install because of this

Hi!

People who want to have the GRUB binaries installed (for example to
create VM images with GRUB), but don't want to use GRUB as their
bootloader will (in the case of classic PCs) have the grub-pc-bin [0]
and grub2-common [1] packages installed, but not the grub-pc [2]
package as this contains the scripts for the automatic installation.

This works fine, but unfortunately, desktop-base's postinst contains
the following code:

   202  # Apply GRUB background update into /boot
   203  if which update-grub > /dev/null ; then
   204  # Ensure the background image file has actually been written to 
disc
   205  # before updating.
   206  sync
   207  update-grub
   208  fi

Since update-grub is shipped by the grub2-common package (see [3]),
this test is wrong. The fact that update-grub is available does not
imply that the system uses GRUB to boot. Since update-grub will
obviously fail to run if GRUB is not installed to /boot, this bug
causes desktop-base's postinst to fail, making the package
uninstallable on such systems.

Best regards

Alexander Kurtz

[0] https://packages.debian.org/sid/grub-pc-bin
[1] https://packages.debian.org/sid/grub2-common
[2] https://packages.debian.org/sid/grub-pc
[3] https://packages.debian.org/sid/amd64/grub2-common/filelist

signature.asc
Description: This is a digitally signed message part


Bug#846944: Installing libnss-resolve before libnss-mdns breaks mDNS name resolution

2016-12-04 Thread Alexander Kurtz
Package: libnss-resolve
Version: 232-6
Severity: serious
Justification: Breaks another package

Hi!

A freshly installed Debian Stretch system will have a
/etc/nsswitch.conf like this (see libc-bin's postinst and/or
/usr/share/libc-bin/nsswitch.conf):

# /etc/nsswitch.conf
#
# Example configuration of GNU Name Service Switch functionality.
# If you have the `glibc-doc-reference' and `info' packages installed, 
try:
# `info libc "Name Service Switch"' for information about this file.

passwd: compat
group:  compat
shadow: compat
gshadow:files

hosts:  files dns
networks:   files

protocols:  db files
services:   db files
ethers: db files
rpc:db files

netgroup:   nis

Installing libnss-resolve makes these changes:

--- nsswitch.conf   2016-12-04 15:16:42.701978711 +0100
+++ /etc/nsswitch.conf  2016-12-04 15:16:51.965961200
+0100
@@ -9,7 +9,7 @@
 shadow: compat
 gshadow:files
 
-hosts:  files dns
+hosts:  files resolve [!UNAVAIL=return] dns
 networks:   files
 
 protocols:  db files

If the user then installs for example the "gnome" meta package, 
libnss-mdns and libnss-myhostname will be installed as well because of
these dependencies/recommendations: 

gnome -> avahi-daemon -> libnss-mdns
gnome -> gnome-core -> gnome-control-center -> libnss-myhostname

This results in the following hosts line:

hosts:  files resolve [!UNAVAIL=return] mdns4_minimal 
[NOTFOUND=return] dns myhostname

However, because of the "[!UNAVAIL=return]" introduced with [0],
nothing after "resolve" will actually be tried. This is mostly
harmless, since "resolve" provides a superset of "dns" and
"myhostname", but it breaks mDNS as resolved currently does not resolve
mDNS names like "foo.local".

Please note, that

 a) This bug depends on the order of package installations. Installing 
libnss-resolve *AFTER* everything else will avoid the problem.
 b) I think the rationale for the change made in [0] is sound, so
simply reverting the change is not a solution.

IMHO the best solution would be to

 a) Activate the mDNS support in resolved [1] if possible.
 b) Talk to the GNOME/Avahi maintainers and make them recommend libnss-
resolve instead of the others
 c) Eventually remove libnss-mdns and libnss-myhostname from Debian
as both aren't really maintained anymore and have been superseded
by libnss-resolve.

Best regard

Alexander Kurtz

[0] 
https://anonscm.debian.org/cgit/pkg-systemd/systemd.git/commit/?id=5e0095416366eb86590d6e31242097ded5201b3a
[1] https://github.com/systemd/systemd/blob/master/src/resolve/resolved-mdns.c

signature.asc
Description: This is a digitally signed message part


Bug#835094: APT fails to install packages which conflict with an installed package when APT::Get::Purge=true is used

2016-08-22 Thread Alexander Kurtz
Package: src:apt
Version: 1.3~rc1,1.3~rc2
Severity: serious

Hi!

APT fails to install packages if:

   1. The package to be installed conflicts with an already installed
  package, and
   2. the installed package is a dependency of another installed package,
  and
   3. non-interactive mode is requested via
  DEBIAN_FRONTEND=noninteractive, and
   4. the configuration item "APT::Get::Purge" is set to "true".

I noticed this when installing dracut and systemd-cron via puppet
(which uses DEBIAN_FRONTEND=noninteractive [0]), replacing the default
initramfs-tools and cron packages. I prefer APT::Get::Purge=true and
have configured it in /etc/apt/apt.conf as documented [1].

Fortunately I was able to reproduce the failure in a clean sid chroot
(see the attached the log files). Here is an excerpt from dracut.log:

root@shepard:~# debootstrap sid /tmp/chroot1
[...]
root@shepard:~# DEBIAN_FRONTEND=noninteractive chroot /tmp/chroot1 
apt-get install --yes --option APT::Get::Purge=true linux-image-amd64
Reading package lists... Done
[...]
root@shepard:~# DEBIAN_FRONTEND=noninteractive chroot /tmp/chroot1 
apt-get install --yes --option APT::Get::Purge=true dracut
Reading package lists... Done
[...]
dpkg: dependency problems prevent removal of initramfs-tools:
 linux-image-4.6.0-1-amd64 depends on initramfs-tools (>= 0.110~) | 
linux-initramfs-tool; however:
  Package initramfs-tools is to be removed.
  Package linux-initramfs-tool is not installed.
  Package dracut which provides linux-initramfs-tool is not configured 
yet.
  Package initramfs-tools which provides linux-initramfs-tool is to be 
removed.
 linux-image-4.6.0-1-amd64 depends on initramfs-tools (>= 0.110~) | 
linux-initramfs-tool; however:
  Package initramfs-tools is to be removed.
  Package linux-initramfs-tool is not installed.
  Package dracut which provides linux-initramfs-tool is not configured 
yet.
  Package initramfs-tools which provides linux-initramfs-tool is to be 
removed.

dpkg: error processing package initramfs-tools (--purge):
 dependency problems - not removing
Errors were encountered while processing:
 initramfs-tools
E: Sub-process /usr/bin/dpkg returned an error code (1)
root@shepard:~# 

I've chosen Severity: serious because this used to work previously and
is now breaking the installation of multiple packages. However, please
feel free to change the severity if appropriate!

Best regards

Alexander Kurtz

[0] 
https://github.com/puppetlabs/puppet/blob/4.5.2/lib/puppet/provider/package/apt.rb#L19
[1] apt-get(8), apt.conf(5)root@shepard:~# debootstrap sid /tmp/chroot1
I: Retrieving Release 
I: Retrieving Release.gpg 
I: Checking Release signature
I: Valid Release signature (key id 126C0D24BD8A2942CC7DF8AC7638D0442B90D010)
I: Retrieving Packages 
I: Validating Packages 
I: Resolving dependencies of required packages...
I: Resolving dependencies of base packages...
I: Found additional required dependencies: libaudit-common libaudit1 libbz2-1.0 libcap-ng0 libdb5.3 libdebconfclient0 libgcrypt20 libgpg-error0 libncursesw5 libsemanage-common libsemanage1 libsystemd0 libudev1 libustr-1.0-1 
I: Found additional base dependencies: dmsetup gnupg-agent libapparmor1 libassuan0 libbsd0 libcap2 libcap2-bin libcryptsetup4 libdevmapper1.02.1 libdns-export162 libelf1 libfastjson4 libffi6 libgmp10 libgnutls30 libhogweed4 libicu57 libidn11 libip4tc0 libip6tc0 libiptc0 libisc-export160 libjson-c3 libksba8 liblocale-gettext-perl liblognorm5 liblz4-1 libmnl0 libnetfilter-conntrack3 libnettle6 libnfnetlink0 libnpth0 libp11-kit0 libpsl5 libseccomp2 libsqlite3-0 libtasn1-6 libtext-charwidth-perl libtext-iconv-perl libtext-wrapi18n-perl pinentry-curses 
I: Checking component main on http://httpredir.debian.org/debian...
I: Retrieving libacl1 2.2.52-3
I: Validating libacl1 2.2.52-3
I: Retrieving adduser 3.115
I: Validating adduser 3.115
I: Retrieving libapparmor1 2.10.95-4
I: Validating libapparmor1 2.10.95-4
I: Retrieving apt 1.3~rc2
I: Validating apt 1.3~rc2
I: Retrieving apt-utils 1.3~rc2
I: Validating apt-utils 1.3~rc2
I: Retrieving libapt-inst2.0 1.3~rc2
I: Validating libapt-inst2.0 1.3~rc2
I: Retrieving libapt-pkg5.0 1.3~rc2
I: Validating libapt-pkg5.0 1.3~rc2
I: Retrieving libattr1 1:2.4.47-2
I: Validating libattr1 1:2.4.47-2
I: Retrieving libaudit-common 1:2.6.6-1
I: Validating libaudit-common 1:2.6.6-1
I: Retrieving libaudit1 1:2.6.6-1
I: Validating libaudit1 1:2.6.6-1
I: Retrieving base-files 9.6
I: Validating base-files 9.6
I: Retrieving base-passwd 3.5.40
I: Validating base-passwd 3.5.40
I: Retrieving bash 4.3-15
I: Validating bash 4.3-15
I: Retrieving libdns-export162 1:9.10.3.dfsg.P4-10.1
I: Validating libdns-export162 1:9.10.3.dfsg.P4-10.1
I: Retrieving libisc-export160 1:9.10.3.dfsg.P4-10.1
I: Validating

Bug#834757: Breaks between gnupg1 and gnupg currently break bootstrapping of stretch

2016-08-18 Thread Alexander Kurtz
Package: gnupg1
Version: 1.4.20-7
Severity: serious

Hi!

Testing currently has this: [0] [1]

gnupg  => 1.4.20-6
gnupg1 => 1.4.20-7

Those versions are incompatible. [2]

However, gnupg1 still has Priority: important [3] which means
debootstrap will install it per default. Since the gnupg package is
also installed because of some dependencies, this currently breaks
bootstrapping stretch.

I have attached a full log of a failed debootstrap, but you should be
able to easily reproduce this by trying to debootstrap stretch.

Best regards

Alexander Kurtz

[0] https://tracker.debian.org/pkg/gnupg
[1] https://tracker.debian.org/pkg/gnupg1
[2] 
https://anonscm.debian.org/cgit/pkg-gnupg/gnupg1.git/tree/debian/control?h=debian/1.4.20-7#n38
[3] 
https://anonscm.debian.org/cgit/pkg-gnupg/gnupg1.git/tree/debian/control?h=debian/1.4.20-7#n3root@shepard:~# debootstrap stretch /tmp/chroot
I: Retrieving Release 
I: Retrieving Release.gpg 
I: Checking Release signature
I: Valid Release signature (key id 126C0D24BD8A2942CC7DF8AC7638D0442B90D010)
I: Retrieving Packages 
I: Validating Packages 
I: Resolving dependencies of required packages...
I: Resolving dependencies of base packages...
I: Found additional required dependencies: libaudit-common libaudit1 libbz2-1.0 libcap-ng0 libdb5.3 libdebconfclient0 libgcrypt20 libgpg-error0 libncursesw5 libsemanage-common libsemanage1 libsystemd0 libudev1 libustr-1.0-1 
I: Found additional base dependencies: dmsetup libapparmor1 libbsd0 libcap2 libcap2-bin libcryptsetup4 libdevmapper1.02.1 libdns-export162 libffi6 libgmp10 libgnutls30 libhogweed4 libicu57 libidn11 libip4tc0 libip6tc0 libiptc0 libisc-export160 libjson-c3 liblocale-gettext-perl liblz4-1 libmnl0 libnetfilter-conntrack3 libnettle6 libnfnetlink0 libp11-kit0 libpsl5 libseccomp2 libtasn1-6 libtext-charwidth-perl libtext-iconv-perl libtext-wrapi18n-perl 
I: Checking component main on http://httpredir.debian.org/debian...
I: Retrieving libacl1 2.2.52-3
I: Validating libacl1 2.2.52-3
I: Retrieving adduser 3.115
I: Validating adduser 3.115
I: Retrieving libapparmor1 2.10.95-4
I: Validating libapparmor1 2.10.95-4
I: Retrieving apt 1.3~rc1
I: Validating apt 1.3~rc1
I: Retrieving apt-utils 1.3~rc1
I: Validating apt-utils 1.3~rc1
I: Retrieving libapt-inst2.0 1.3~rc1
I: Validating libapt-inst2.0 1.3~rc1
I: Retrieving libapt-pkg5.0 1.3~rc1
I: Validating libapt-pkg5.0 1.3~rc1
I: Retrieving libattr1 1:2.4.47-2
I: Validating libattr1 1:2.4.47-2
I: Retrieving libaudit-common 1:2.6.5-1
I: Validating libaudit-common 1:2.6.5-1
I: Retrieving libaudit1 1:2.6.5-1
I: Validating libaudit1 1:2.6.5-1
I: Retrieving base-files 9.6
I: Validating base-files 9.6
I: Retrieving base-passwd 3.5.39
I: Validating base-passwd 3.5.39
I: Retrieving bash 4.3-15
I: Validating bash 4.3-15
I: Retrieving libdns-export162 1:9.10.3.dfsg.P4-10.1
I: Validating libdns-export162 1:9.10.3.dfsg.P4-10.1
I: Retrieving libisc-export160 1:9.10.3.dfsg.P4-10.1
I: Validating libisc-export160 1:9.10.3.dfsg.P4-10.1
I: Retrieving blends-tasks 0.6.93
I: Validating blends-tasks 0.6.93
I: Retrieving libboost-iostreams1.60.0 1.60.0+dfsg-6+b1
I: Validating libboost-iostreams1.60.0 1.60.0+dfsg-6+b1
I: Retrieving bsdmainutils 9.0.10
I: Validating bsdmainutils 9.0.10
I: Retrieving libbz2-1.0 1.0.6-8
I: Validating libbz2-1.0 1.0.6-8
I: Retrieving libdebconfclient0 0.215
I: Validating libdebconfclient0 0.215
I: Retrieving coreutils 8.25-2
I: Validating coreutils 8.25-2
I: Retrieving cpio 2.11+dfsg-5
I: Validating cpio 2.11+dfsg-5
I: Retrieving cron 3.0pl1-128
I: Validating cron 3.0pl1-128
I: Retrieving libcryptsetup4 2:1.7.0-2
I: Validating libcryptsetup4 2:1.7.0-2
I: Retrieving dash 0.5.8-2.3
I: Validating dash 0.5.8-2.3
I: Retrieving libdb5.3 5.3.28-12
I: Validating libdb5.3 5.3.28-12
I: Retrieving debconf 1.5.59
I: Validating debconf 1.5.59
I: Retrieving debconf-i18n 1.5.59
I: Validating debconf-i18n 1.5.59
I: Retrieving debian-archive-keyring 2014.3
I: Validating debian-archive-keyring 2014.3
I: Retrieving debianutils 4.8
I: Validating debianutils 4.8
I: Retrieving diffutils 1:3.3-3
I: Validating diffutils 1:3.3-3
I: Retrieving dmidecode 3.0-3
I: Validating dmidecode 3.0-3
I: Retrieving dpkg 1.18.10
I: Validating dpkg 1.18.10
I: Retrieving e2fslibs 1.43.1-1
I: Validating e2fslibs 1.43.1-1
I: Retrieving e2fsprogs 1.43.1-1
I: Validating e2fsprogs 1.43.1-1
I: Retrieving libcomerr2 1.43.1-1
I: Validating libcomerr2 1.43.1-1
I: Retrieving libss2 1.43.1-1
I: Validating libss2 1.43.1-1
I: Retrieving findutils 4.6.0+git+20160703-2
I: Validating findutils 4.6.0+git+20160703-2
I: Retrieving gcc-4.9-base 4.9.3-14
I: Validating gcc-4.9-base 4.9.3-14
I: Retrieving gcc-5-base 5.4.1-1
I: Validating gcc-5-base 5.4.1-1
I: Retrieving gcc-6-base 6.1.1-11
I: Validating gcc-6-base 6.1.1-11
I: Retrieving libgcc1 1:6.1.1-11
I: Validating libgcc1 1:6.1.1-11
I: Retrieving libstdc++6 6.1.1-11
I: Validating libstdc++6 6.1.1-11
I: Retrieving libgdbm3 1.8.3-14
I: Validating libgdbm3 1.8.

Bug#797003: libical 1.0.1-0.1 has broken its ABI (again)

2015-09-07 Thread Alexander Kurtz
Hi,

evolution-data-server 3.16.5-1 (which was uploaded *after* libical
1.0.1-0.1 [0] [1] and therefore already built with the newer version)
migrated to testing yesterday [2], followed by evolution itself today.

Upgrading evolution and evolution-data-server therefore makes the
calendar functionality work correctly again, just like last time [3].

I have also taken a closer look at the diff between libical 1.0-1.3 and
1.0.1-0.1 [4] and libicals ABI specification [5] and now *think* that
it does actually ship a stable ABI and the break we have experienced is
simply the result of the transition from the previous, unstable ABI
(which Debian changed again to make the build reproducible [6]) to the
new stable ABI. Please also see [7] in regard to that.

This means, that this bug (#797003) is actually not a bug, but rather a
symptom of a bugfix and the actual bug is the missing transition [8]
for libical. It might be worth checking the other reverse dependencies
of libical, since there's a good chance most of them have already been
rebuilt with the new version because of the GCC 5 transition.

With any luck, both this bug and the transition bug can be closed
without any further action. Adding the ABI check you proposed [9] is
probably still a *very* good idea, as is making the build reproducible
[A], but this can be done in a regular upload.

Best regards

Alexander Kurtz

[0] https://tracker.debian.org/news/705666
[1] https://tracker.debian.org/news/708081
[2] https://tracker.debian.org/news/710550
[3] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766454#31
[4] 
https://bugs.debian.org/cgi-bin/bugreport.cgi?filename=1.0-1.3-to-1.0.1-0.1.diff;att=1;bug=797003;msg=5
[5] https://github.com/libical/libical/tree/master/design-data
[6] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773916
[7] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773916#32
[8] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797074
[9] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797074#17
[A] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796360

signature.asc
Description: This is a digitally signed message part


Bug#797003: libical 1.0.1-0.1 has broken its ABI (again)

2015-09-07 Thread Alexander Kurtz
Hi,

On Mon, 2015-09-07 at 13:00 +0200, Andreas Henriksson wrote:
> I think we won't touch the soname, since we usually try to not
> deviate from what upstream uses but only change the package
> name and add conflicts against old package name...
> (This solves packaged software upgrades, but leaves self-compiled
> binaries out in the cold.)
> Same as was done last time the ABI broke in similar way.

This seems very reasonable. Do you agree with my assessment, that
libical *is* actually ABI-stable now and should not break compatibility
in future versions, even if new entries are added to the various enums?

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#797003: libical 1.0.1-0.1 has broken its ABI (again)

2015-09-07 Thread Alexander Kurtz
Hi,

On Mon, 2015-09-07 at 12:16 +0200, Andreas Henriksson wrote:
> Yes, everything built after/against the new libical will pick up
> the new ABI and work (only) with the new version.
> In debian we try to support partial upgrades though (eg. mixtures
> of stable and testing), so this is still considered a bug even if we
> rebuild all reverse dependencies of libical.

I see.

> Yes upstream seems to think so, that's what fooled me into believing
> the update was safe. It doesn't seem to be true though.
> Every time new header files are generated there's a risk of ABI 
> breakage since something new might have been added to the source 
> database which will get *sorted* during header/enum generation which 
> means the new addition might get added to the middle (rather then the 
> end, which would have been perferctly fine,) of the enum breaking ABI 
> for everything in the enum after the new addition.
> 
> This was actually caught when the sorting patch was first introduced
>  see:
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773916#27

Isn't the explicit assignment of (stable) numeric values to the
symbolic constants done in [0] also supposed to prevent exactly that?
The generated enums might have new entries in the middle, but the
*numeric* values of the old entries should still be the same. IIRC the
ordering in enums only matters if the corresponding numerical values
are not (all) set explicitly, but automatically set by the compiler.

> Since we support partial upgrades, the broken ABI is still a bug
> and needs a transition.

Agreed, but from what I can tell, a SONAME bump (along with the
corresponding transition) is all that's required, there should be no
changes necessary to the actual code.

Best regards

Alexander Kurtz

[0] https://github.com/libical/libical/tree/master/design-data

signature.asc
Description: This is a digitally signed message part


Bug#797003: libical 1.0.1-0.1 has broken its ABI (again)

2015-08-26 Thread Alexander Kurtz
Package: libical-dev
Version: 1.0.1-0.1
Severity: serious

Hi,

it seems that the latest upload of libical (1.0.1-0.1) has broken its
ABI yet again. Please see the attached diff (generated using
snapshots.debian.org [0]) for a comparison of the contents of
/usr/include/ between version 1.0-1.3 and 1.0.1-0.1.

This has happened in the past already: See #773916 [1] and its merged
bug reports for a description of the problem and the resulting effects.

For me, this results (again) in evolution (and gnome-shell) displaying
recurring events without end making the calendar functionality unusable
(even more than last time, since evolution simply crashes now). YMMV.

I don't understand the underlying issue well enough to write a patch,
but having a close look at the two patches which were dropped according
to the changelog [2] as well as #796360 [3] seems like a good start. In
the end, this will probably mean uploading a fixed version with a
different SONAME again and starting the corresponding transition.

Best regards

Alexander Kurtz

[0] http://snapshot.debian.org/archive/debian/20150825T214917Z/pool/mai
n/libi/libical/
[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773916
[2] https://tracker.debian.org/news/705666
[3] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796360diff -Naur libical-dev_1.0-1.3_amd64/usr/include/ical.h libical-dev_1.0.1-0.1_amd64/usr/include/ical.h
--- libical-dev_1.0-1.3_amd64/usr/include/ical.h	2015-01-03 14:58:53.0 +0100
+++ libical-dev_1.0.1-0.1_amd64/usr/include/ical.h	2014-10-09 17:07:05.0 +0200
@@ -4,7 +4,7 @@
  CREATOR:  ajc 2008-sep-01
 
  (C) COPYRIGHT 2008 by Art Cancro
- http://freeassociation.sourceforge.net
+ http://libical.github.io/libical/
 
  This program is free software; you can redistribute it and/or modify
  it under the terms of either:
diff -Naur libical-dev_1.0-1.3_amd64/usr/include/libical/icalcomponent.h libical-dev_1.0.1-0.1_amd64/usr/include/libical/icalcomponent.h
--- libical-dev_1.0-1.3_amd64/usr/include/libical/icalcomponent.h	2015-01-03 14:58:53.0 +0100
+++ libical-dev_1.0.1-0.1_amd64/usr/include/libical/icalcomponent.h	2014-10-09 17:07:05.0 +0200
@@ -281,5 +281,8 @@
 icalcomponent* icalcomponent_new_xdaylight(void);
 icalcomponent* icalcomponent_new_vagenda(void);
 icalcomponent* icalcomponent_new_vquery(void);
+icalcomponent* icalcomponent_new_vavailability(void);
+icalcomponent* icalcomponent_new_xavailable(void);
+icalcomponent* icalcomponent_new_vpoll(void);
 
 #endif /* !ICALCOMPONENT_H */
diff -Naur libical-dev_1.0-1.3_amd64/usr/include/libical/icalderivedparameter.h libical-dev_1.0.1-0.1_amd64/usr/include/libical/icalderivedparameter.h
--- libical-dev_1.0-1.3_amd64/usr/include/libical/icalderivedparameter.h	2015-01-03 14:59:18.0 +0100
+++ libical-dev_1.0.1-0.1_amd64/usr/include/libical/icalderivedparameter.h	2015-08-19 19:28:06.0 +0200
@@ -60,15 +60,18 @@
 ICAL_MEMBER_PARAMETER = 18, 
 ICAL_OPTIONS_PARAMETER = 19, 
 ICAL_PARTSTAT_PARAMETER = 20, 
+ICAL_PUBLICCOMMENT_PARAMETER = 37, 
 ICAL_RANGE_PARAMETER = 21, 
 ICAL_RELATED_PARAMETER = 22, 
 ICAL_RELTYPE_PARAMETER = 23, 
+ICAL_RESPONSE_PARAMETER = 38, 
 ICAL_ROLE_PARAMETER = 24, 
 ICAL_RSVP_PARAMETER = 25, 
 ICAL_SCHEDULEAGENT_PARAMETER = 34, 
 ICAL_SCHEDULEFORCESEND_PARAMETER = 35, 
 ICAL_SCHEDULESTATUS_PARAMETER = 36, 
 ICAL_SENTBY_PARAMETER = 26, 
+ICAL_STAYINFORMED_PARAMETER = 39, 
 ICAL_TZID_PARAMETER = 27, 
 ICAL_VALUE_PARAMETER = 28, 
 ICAL_X_PARAMETER = 29, 
@@ -157,7 +160,8 @@
 ICAL_RELTYPE_PARENT = 20047,
 ICAL_RELTYPE_CHILD = 20048,
 ICAL_RELTYPE_SIBLING = 20049,
-ICAL_RELTYPE_NONE = 20050
+ICAL_RELTYPE_NONE = 20050,
+ICAL_RELTYPE_POLL = 20107
 } icalparameter_reltype;
 
 typedef enum icalparameter_role {
@@ -190,6 +194,13 @@
 ICAL_SCHEDULEFORCESEND_NONE = 20068
 } icalparameter_scheduleforcesend;
 
+typedef enum icalparameter_stayinformed {
+ICAL_STAYINFORMED_X = 20108,
+ICAL_STAYINFORMED_TRUE = 20109,
+ICAL_STAYINFORMED_FALSE = 20110,
+ICAL_STAYINFORMED_NONE = 20111
+} icalparameter_stayinformed;
+
 typedef enum icalparameter_value {
 ICAL_VALUE_X = 20069,
 ICAL_VALUE_BINARY = 20070,
@@ -237,7 +248,7 @@
 ICAL_XLICERRORTYPE_NONE = 20106
 } icalparameter_xlicerrortype;
 
-#define ICALPARAMETER_LAST_ENUM 20107
+#define ICALPARAMETER_LAST_ENUM 20112
 
 /* ACTIONPARAM */
 icalparameter* icalparameter_new_actionparam(icalparameter_action v);
@@ -344,6 +355,11 @@
 icalparameter_partstat icalparameter_get_partstat(const icalparameter* value);
 void icalparameter_set_partstat(icalparameter* value, icalparameter_partstat v);
 
+/* PUBLIC-COMMENT */
+icalparameter* icalparameter_new_publiccomment(const char* v);
+const char* icalparameter_get_publiccomment(const icalparameter* value);
+void icalparameter_set_publiccomment(icalparameter* value, const char* v);
+
 /* RANGE */
 icalparameter

Bug#755807: CUPS listens on *all* interfaces per default when installed on machines using systemd

2014-08-05 Thread Alexander Kurtz
Hi!

On Thu, 2014-07-24 at 22:06 +0200, Didier 'OdyX' Raboud wrote:
 For the record, I disagree with the severity and the security tag, but 
 will focus on fixing this bug. :)

Thanks! I suppose the severity might have been a little overrated, but I
get a bit nervous when one of my desktop machines suddenly shows up on
one of my regular nmap runs. Anyway, cups 1.7.4-4 just migrated to
testing and I can happily report that everything now works as intended
both on new installations and on upgrades. Thank you very much for your
work!

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#755807: CUPS listens on *all* interfaces per default when installed on machines using systemd

2014-07-23 Thread Alexander Kurtz
Package: cups-daemon
Version: 1.7.4-1
Severity: serious
Justification: Information leak and possible security vulnerability
Tags: security

Hi,

installing (not upgrading!) the cups-daemon package on a machine using systemd
as PID 1 creates the /etc/cups/cupsd-systemd-listen.conf file like this:

[Socket]
# This file was generated by CUPS and _WILL_ be deleted or overwritten 
by it!
# It has to be kept in sync with the Port and Listen stanzas in 
/etc/cups/cupsd.conf
# It is by default symlinked as cups-listen.conf in the
# /etc/systemd/system/cups.socket.d/ directory. Remove the symlink
# and write your own file there if you don't want this. See 
systemd.socket(5).
# Matches the default 'Listen localhost:631' from cupsd.conf.default
ListenStream=0.0.0.0:631
ListenStream=[::]:631

As this file gets symlinked from the /etc/systemd/system/cups.socket.d/
directory, this means that systemd will listen on *all* interfaces and
hand the incoming connections to CUPS.

Admittedly, CUPS still enforces it's own access limitations set
in /etc/cups/cupsd.conf, but only after initially accepting the
connection. It will then respond with a HTTP 403 (Forbidden) error page,
confirming that there is indeed a CUPS daemon running and leaking (at
least) its version number and the system locale.

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#755807: CUPS listens on *all* interfaces per default when installed on machines using systemd

2014-07-23 Thread Alexander Kurtz
Hi,

After looking over cups-daemon's preinst script which generates the
cupsd-systemd-listen.conf file, I think I found the problem(s):

 1  #!/bin/sh
 2  
 3  set -e
 4  
 5  
 6  case $1 in
 7  install|upgrade)
 8  if dpkg --compare-versions $2 le 1.6.1  [ -e 
/etc/cups/cupsd.conf ]; then
 9  # Move cupsd.conf away as it becomes a non-conffile
10  mv /etc/cups/cupsd.conf /etc/cups/cupsd.conf.conffile-bak
11  fi
12  
13  # If file doesn't exist or if it has two conflicting stanzas
14  if [ ! -f /etc/cups/cupsd-systemd-listen.conf ] || \
15 ( grep -q '^ListenStream=0.0.0.0:' 
/etc/cups/cupsd-systemd-listen.conf 2/dev/null  \
16   grep -q '^ListenStream=127.0.0.1:' 
/etc/cups/cupsd-systemd-listen.conf 2/dev/null ) ;\
17  then

This is problem #1. This means that /etc/cups/cupsd-systemd-listen.conf
will not regenerated if it already exists unless there are conflicting
stanzas. While this is generally a good idea for configuration files, it
also means that an incorrect file will never be corrected.

18  mkdir -p /etc/cups
19  cat /etc/cups/cupsd-systemd-listen.conf EOF
20  [Socket]
21  # This file was generated by CUPS and _WILL_ be deleted or overwritten 
by it!
22  # It has to be kept in sync with the Port and Listen stanzas in 
/etc/cups/cupsd.conf
23  # It is by default symlinked as cups-listen.conf in the
24  # /etc/systemd/system/cups.socket.d/ directory. Remove the symlink
25  # and write your own file there if you don't want this. See 
systemd.socket(5).
26  EOF
27  if [ -e /etc/cups/cupsd.conf ]; then

This is problem #2. This means, that the /etc/cups/cupsd.conf file will
only be parsed if it exists. However, this is the *pre*inst script,
meaning that this check will always fail on new installations since the
package isn't unpacked yet when this runs. [0]

28  if grep -q '^\s*Port' /etc/cups/cupsd.conf 2/dev/null; then
29  localport=`grep '^\s*Port' /etc/cups/cupsd.conf | head 
-n1 | sed -e 's/.*Port \([[:digit:]]*\)$/\1/'`
30  cat /etc/cups/cupsd-systemd-listen.conf EOF
31  # Matches 'Port $localport' from cupsd.conf
32  ListenStream=0.0.0.0:$localport
33  ListenStream=[::]:$localport
34  EOF
35  elif grep -q '^\s*Listen localhost:' /etc/cups/cupsd.conf 
2/dev/null; then
36  localport=`grep '^\s*Listen localhost:' 
/etc/cups/cupsd.conf | head -n1 | sed -e 's/.*localhost\:\([[:digit:]]*\)$/\1/'`
37  cat /etc/cups/cupsd-systemd-listen.conf EOF
38  # Matches 'Listen localhost:$localport' from cupsd.conf
39  ListenStream=127.0.0.1:$localport
40  ListenStream=[::1]:$localport
41  EOF
42  fi
43  else
44  cat /etc/cups/cupsd-systemd-listen.conf EOF
45  # Matches the default 'Listen localhost:631' from cupsd.conf.default
46  ListenStream=0.0.0.0:631
47  ListenStream=[::]:631

This is problem #3. This means that CUPS will listen on all interfaces
even though the comment directly above says exactly the opposite. This
looks a lot like a simple typo.

48  EOF
49  fi
50  fi
51  esac
52  
53  # Automatically added by dh_installdeb
54  dpkg-maintscript-helper rm_conffile /etc/cups/cupsd.conf.default 
1.7.1-3~ -- $@
55  # End automatically added section
56  # Automatically added by dh_installdeb
57  dpkg-maintscript-helper rm_conffile /etc/default/cups 1.7.1-6~ -- $@
58  # End automatically added section
59  # Automatically added by dh_installdeb
60  dpkg-maintscript-helper mv_conffile /etc/pam.d/cups-daemon 
/etc/pam.d/cups 1.7.3-2~ -- $@
61  # End automatically added section
62  
63  
64  exit 0

The result is, that because of problem #2, /etc/cups/cupsd.conf will
never actually be parsed on new installations. Instead the incorrect
fallback configuration will be used (problem #3). And because of problem
#1, this will never be corrected, even when the package is updated or
reinstalled.

Best regards

Alexander Kurtz

[0] http://www.debian.org/doc/debian-policy/ch-maintainerscripts.html


signature.asc
Description: This is a digitally signed message part


Bug#736472: Missing dependency on GCC

2014-01-23 Thread Alexander Kurtz
Package: ghc
Version: 7.6.3-6
Severity: serious
Justification: Makes the package unusable

Hi,

installing the ghc package without the gcc package results in this:

$ cat test.hs
main :: IO ()
main = putStrLn Hello World
$ ghc test.hs
[1 of 1] Compiling Main ( test.hs, test.o )
ghc: could not execute: /usr/bin/gcc
$ echo $?
1
$ ghci test.hs
GHCi, version 7.6.3: http://www.haskell.org/ghc/  :? for help
Loading package ghc-prim ... linking ... done.
ghc: could not execute: /usr/bin/gcc
$ echo $?
1
$ 

This problem can be trivially fixed by installing the gcc package.

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#680684: libaugeas-ruby depends on libaugeas-ruby1.8 but ruby 1.9 is the default now

2012-07-07 Thread Alexander Kurtz
Package: libaugeas-ruby
Version: 0.4.1-1
Severity: grave
Justification: Package doesn't fulfill its main purpose

Hi,

the package description says:

This is a dependency package which depends on Debian's default 
Ruby version (currently 1.8.x).

However, since 2012-06-03/2012-06-14 ruby 1.9 is the default ruby
version in both unstable and testing:

http://packages.qa.debian.org/r/ruby-defaults/news/20120603T212352Z.html
http://packages.qa.debian.org/r/ruby-defaults/news/20120614T163924Z.html

Please update the dependency and the description.

Best regards

Alexander Kurtz





signature.asc
Description: This is a digitally signed message part


Bug#680688: puppet-common depends on libaugeas-ruby1.8 but ruby 1.9 is the default now

2012-07-07 Thread Alexander Kurtz
Package: puppet-common
Version: 2.7.17-1
Severity: grave
Justification: Won't parse any manifests using the built-in augeas resource

Hi,

since 2012-06-03/2012-06-14 ruby 1.9 is the default ruby version in both
unstable and testing:

http://packages.qa.debian.org/r/ruby-defaults/news/20120603T212352Z.html
http://packages.qa.debian.org/r/ruby-defaults/news/20120614T163924Z.html

Newly installed system will therefore have ruby 1.9 installed by
default. However, puppet-common still depends on libaugeas-ruby1.8. This
means that puppet will choke on manifests using the built-in augeas
resource:

$ sudo puppet agent --test
[...]
err: Could not find a suitable provider for augeas
notice: Finished catalog run in 0.69 seconds
$ 

Installing libaugeas-ruby1.9.1 fixes the problem. A quick solution would
therefore be to change the dependency to libaugeas-ruby1.9.1. However, I
think the cleaner approach would be to wait for #680684[0] to be fixed
and to change the dependency to libaugeas-ruby.

Best regards

Alexander Kurtz

PS: You should probably check the other dependencies too: puppet-common
also depends on libshadow-ruby1.8 and suggests librrd-ruby1.8.

[0] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680684


signature.asc
Description: This is a digitally signed message part


Bug#674668: Starting Evolution often crashes the GNOME session

2012-05-26 Thread Alexander Kurtz
Package: gnome-shell
Version: 3.2.2.1-4
Severity: grave
Justification: Entire session crashes; can cause serious data loss

Hi,

for about a week now, I've had sudden crashes of the GNOME session, i.e.
the X session terminates (killing all running programs in the process)
and I'm back at the login screen. These crashes have always happened
directly after starting Evolution from gnome-shell's dash.

I first suspected a video driver bug, but now I've seen seen these
crashes on two machines (both with an up-to-date 64-bit Debian testing)
with different video cards. When trying to reproduce this behavior, I
discovered that I could reliably crash the session simply by starting
and closing Evolution repeatedly (on average about 10 times).

I've attached two .xsession-errors files from such crashes (line #42
from file #2 seems to be particularly interesting). Unfortunately there
have been no messages in the dmesg output. Please tell me if you need
anything else to reproduce and/or debug this problem.

Best regards

Alexander Kurtz
/etc/gdm3/Xsession: Beginning session setup...
localuser:alexander being added to access control list
GNOME_KEYRING_CONTROL=/tmp/keyring-jlPmrU
GPG_AGENT_INFO=/tmp/keyring-jlPmrU/gpg:0:1
GNOME_KEYRING_CONTROL=/tmp/keyring-jlPmrU
GPG_AGENT_INFO=/tmp/keyring-jlPmrU/gpg:0:1
GNOME_KEYRING_CONTROL=/tmp/keyring-jlPmrU
GPG_AGENT_INFO=/tmp/keyring-jlPmrU/gpg:0:1
GNOME_KEYRING_CONTROL=/tmp/keyring-jlPmrU
GPG_AGENT_INFO=/tmp/keyring-jlPmrU/gpg:0:1
SSH_AUTH_SOCK=/tmp/keyring-jlPmrU/ssh

(gnome-settings-daemon:29250): keybindings-plugin-WARNING **: Key binding 
(hamster-applet) is incomplete
Initializing tracker-store...
Tracker-Message: Setting up monitor for changes to config 
file:'/home/alexander/.config/tracker/tracker-store.cfg'
Tracker-Message: Setting up monitor for changes to config 
file:'/home/alexander/.config/tracker/tracker-store.cfg'
Starting log:
  File:'/home/alexander/.local/share/tracker/tracker-store.log'
Initializing tracker-miner-fs...
Tracker-Message: Setting up monitor for changes to config 
file:'/home/alexander/.config/tracker/tracker-miner-fs.cfg'
Starting log:
  File:'/home/alexander/.local/share/tracker/tracker-miner-fs.log'

(tracker-miner-fs:29304): Tracker-WARNING **: Couldn't properly parse desktop 
file 'file:///usr/share/applications/brasero-nautilus.desktop': 'Desktop file 
doesn't contain type'

** (nm-applet:29306): WARNING **: _nm_remote_settings_ensure_inited: 
(NMRemoteSettings) error initializing: Launch helper exited with unknown return 
code 1


** (nm-applet:29306): WARNING **: Could not initialize NMClient 
/org/freedesktop/NetworkManager: Launch helper exited with unknown return code 1
** Message: applet now removed from the notification area
Window manager warning: Log level 16: Could not initialize NMClient 
/org/freedesktop/NetworkManager: Launch helper exited with unknown return code 1
Window manager warning: Log level 16: _nm_remote_settings_ensure_inited: 
(NMRemoteSettings) error initializing: Launch helper exited with unknown return 
code 1


** (nm-applet:29306): WARNING **: fetch_connections_done: error fetching 
connections: (25) Launch helper exited with unknown return code 1.

** (nm-applet:29306): WARNING **: Failed to register as an agent: (25) Launch 
helper exited with unknown return code 1
** Message: applet now embedded in the notification area
Window manager warning: Log level 16: fetch_connections_done: error fetching 
connections: (25) Launch helper exited with unknown return code 1.
unhandled event type: 33
unhandled event type: 33
unhandled event type: 33
unhandled event type: 33
unhandled event type: 33
unhandled event type: 33
unhandled event type: 33
unhandled event type: 33
unhandled event type: 33
unhandled event type: 33
unhandled event type: 33
unhandled event type: 33

** (evolution:29438): CRITICAL **: categories_icon_theme_hack: assertion 
`filename != NULL  *filename != '\0'' failed

(evolution:29438): evolution-network-manager-WARNING **: 
network_manager_query_state: 
GDBus.Error:org.freedesktop.DBus.Error.Spawn.ChildExited: Launch helper exited 
with unknown return code 1

(gnome-shell:29293): Clutter-CRITICAL **: clutter_actor_iter_next: assertion 
`ri-age == ri-root-priv-age' failed

(gnome-shell:29293): Clutter-CRITICAL **: clutter_actor_iter_next: assertion 
`ri-age == ri-root-priv-age' failed
unhandled event type: 33
unhandled event type: 33
unhandled event type: 33
unhandled event type: 33
unhandled event type: 33
BrlAPI exception: Invalid parameter on Write request of size 26 (66 00 00 00 00 
00 00 01 00 00 00 00 00 00 00 00)
You may wish to add the -ldebug option to the brltty command line in order to 
get additional information in the system log

(evolution:29438): GLib-GObject-WARNING **: g_object_weak_unref: couldn't find 
weak ref 0x7f19238e8da0(0xbbb5c0)
Window manager warning: CurrentTime used to choose focus window; focus window 
may not be correct.
Window manager warning: Got a request to focus

Bug#674668: Starting Evolution often crashes the GNOME session

2012-05-26 Thread Alexander Kurtz
Hi,

I've just upgraded gnome-shell and evolution to version 3.4.1-1 and
3.4.2-1 (both from experimental). Unfortunately the crashes still occur.
What's interesting though, is that the crash actually seems to happen in
the X-Server. I found this in /var/log/Xorg.0.log.old:

[ 51714.050] 
[ 51714.050] Backtrace:
[ 51714.051] 0: /usr/bin/Xorg (xorg_backtrace+0x36) [0x7ff5cac0c796]
[ 51714.051] 1: /usr/bin/Xorg (0x7ff5caa8e000+0x1822b9) [0x7ff5cac102b9]
[ 51714.051] 2: /lib/x86_64-linux-gnu/libpthread.so.0 
(0x7ff5c9db6000+0xf030) [0x7ff5c9dc5030]
[ 51714.051] 3: /lib/x86_64-linux-gnu/libc.so.6 
(0x7ff5c8ac1000+0x383128) [0x7ff5c8e44128]
[ 51714.051] 
[ 51714.051] Segmentation fault at address 0x7ff5c8e44128
[ 51714.051] 
Fatal server error:
[ 51714.051] Caught signal 11 (Segmentation fault). Server aborting
[ 51714.051] 
[ 51714.051] 

Any ideas?

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#619723: brasero: diff for NMU version 3.2.0-3.1

2012-03-04 Thread Alexander Kurtz
Hi everybody,

On Sat, 2012-03-03 at 20:49 +, Simon McVittie wrote:
 The analysis and patch from Tanguy look correct, so
 I've prepared an NMU for brasero (versioned as 3.2.0-3.1) and
 uploaded it to DELAYED/7. Please feel free to tell me if I
 should delay it longer.

I can confirm that your patch (which is based on Tanguy Ortolo's patch)
does indeed fix the problem. I was able to successfully burn the test
case[0] which I submitted last year[1]. Thank you very much!

On Sun, 2012-03-04 at 00:33 +0100, Michael Biebl wrote:
 Thanks for the patch. Do you know if it has been forwarded upstream?

Tanguy Ortolo has forwarded[2] this bug and his patch on 2011-11-24 to
GNOME's bugzilla[3]. Unfortunately upstream has not yet responded.

Best regards

Alexander Kurtz

[0] 
http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=23;filename=testcase.tar.xz;att=1;bug=619723
[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=619723#23
[2] http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=56;bug=619723
[3] https://bugzilla.gnome.org/show_bug.cgi?id=664756


signature.asc
Description: This is a digitally signed message part


Bug#649384: gnash creates world-readable cookies under /tmp

2011-11-20 Thread Alexander Kurtz
Package: gnash
Version: 0.8.10~git20111001-1
Tags: security
Severity: critical
Justification: Introduces a new security hole

Hi,

after watching videos on YouTube I found this in /tmp:

$ ls -l /tmp/gnash*
-rw-r--r-- 1 alexander alexander 329 Nov 20 15:22 
/tmp/gnash-cookies.31032
$ 

Please note that the file is world-readable. This enables things like:

$ sudo -u nobody cat /tmp/gnash-cookies.31032 
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEw
Set-Cookie:  VISITOR_INFO1_LIVE=WEbeevRfDNo
Set-Cookie:  
recently_watched_video_id_list=885d7cf2658d586fc1bef37a995ce29cWwEAAABzCwAAAHV3SFIwM1pHd1k4
Set-Cookie:  
GEO=0bf89ff87b12d82d91e10ddf1da36d95cwszREVUmagnTskNGQ==
Set-Cookie:  PREF=f1=4000fv=10.1.999
$

Since gnash is installed per default and also starts playing as soon as
flash content is detected, this can be a serious security/privacy issue
on multi-user systems. Gnash should either use $HOME for storing cookies
or create them with sane permissions (0600).

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#649384: gnash creates world-readable cookies under /tmp

2011-11-20 Thread Alexander Kurtz
retitle 649384 gnash creates world-readable cookies under /tmp with predictable 
filenames
thanks

On Sun, 2011-11-20 at 18:01 +0100, Gabriele Giacone wrote:
 tags 649384 fixed-upstream
 thanks
 
 On Sun, Nov 20, 2011 at 03:39:36PM +0100, Alexander Kurtz wrote:
  or create them with sane permissions (0600).
 
 http://git.savannah.gnu.org/gitweb/?p=gnash.git;a=commitdiff;h=fa481c116e65ccf9137c7ddc8abc3cf05dc12f55

I don't think this fixes the underlying problem: An attacker would still
be able to read the cookie if he managed to win the race-condition and
opens the file before the chmod(). If you agree, please remove the
fixed-upstream tag.

Furthermore, I took a quick look at the code and noticed this:

1105 gnash::log_debug(The Cookie for %s is %s, url, ncookie);
1106 std::ofstream cookiefile;
1107 std::stringstream ss;
1108 ss  /tmp/gnash-cookies.  getpid();
1109 
1110 cookiefile.open(ss.str().c_str(), std::ios::out | 
std::ios::trunc);
 chmod (ss.str().c_str(), 0600);

I might be wrong, but I very strongly suspect a possible symlink attack
here which would enable an attacker to overwrite arbitrary files and
(with your patch) change their permissions.

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#649384: gnash creates world-readable cookies under /tmp

2011-11-20 Thread Alexander Kurtz
On Sun, 2011-11-20 at 21:12 +0100, Francesco Poli wrote:
 I would add the following consideration: why does gnash create cookies
 at all?

Good question.

 Could someone please tell me where is the option to disable cookies?
 I think there should be one, but I seem to be unable to find it...

I configured this via the gnash GUI:

$ grep -i sol ~/.gnashpluginrc 
set solReadOnly true
set solLocalDomain false
set SOLSafeDir /home/alexander/.gnash/SharedObjects
$

Hope this helps!

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#649384: gnash creates world-readable cookies under /tmp

2011-11-20 Thread Alexander Kurtz
On Sun, 2011-11-20 at 21:43 +0100, Francesco Poli wrote:
 And did gnash stop creating cookies in /tmp after that configuration
 change?

Nope.

 Also, does it refrain from creating cookies in your
 ~/.gnash/SharedObjects directory?

Yes. It still created some subdirectories, but no actual cookies.

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#645427: Stopped locking the screen when closing the laptop lid

2011-11-06 Thread Alexander Kurtz
On Sat, 2011-10-15 at 12:21 -0700, Josh Triplett wrote:
 I upgraded gnome-screensaver, and it stopped locking the screen when I
 close the lid of my laptop.  It now only locks if I explicitly lock the
 screen (ctrl-alt-L), or after some timeout (on the order of 5-15
 minutes, ).

I just read the whole bug log and noticed that nobody seemed to be
really sure what actually caused the bug. While bumping the dependency
on gnome-session-bin certainly didn't hurt, I suspect that the real
cause is actually #647358[0] which was recently fixed, so maybe you
could give it another try.

Hope this helps

Alexander Kurt

[0] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=647358


signature.asc
Description: This is a digitally signed message part


Bug#645427: Stopped locking the screen when closing the laptop lid

2011-11-06 Thread Alexander Kurtz
Thank you for merging the bugs. Please note that the workaround is no
longer necessary since g-p-m has been patched meanwhile[0]. Part of the
fix was also to add a dependency on gnome-screensaver (= 3.0). This
should avoid partial upgrades.

Best regards

Alexander Kurtz

PS: Maybe you could keep an eye open, I'm quite sure we'll see further
duplicates of #647358.

[0] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=647358#10


signature.asc
Description: This is a digitally signed message part


Bug#647358: g-p-m doesn't lock the screen on lid-close because it uses an obsolete GConf key

2011-11-02 Thread Alexander Kurtz
Package: gnome-power-manager
Version: 3.0.2-2
Severity: critical
Justification: Introduces a new security hole
Tags: fixed-upstream patch security

Hi,

the user can decide whether to lock his laptop on lid-close under

System Settings - Screen - Lock - On/Off

which sets org.gnome.desktop.screensaver.lock-enabled (GSettings),
buth g-p-m still uses /apps/gnome-screensaver/lock_enabled (GConf):
This query always fails and the screen is not locked on lid-close. A
good workaround is to manually re-create the old configuration key:

gconftool-2 --type boolean --set /apps/gnome-screensaver/lock_enabled 
true

This bug has been reported[0] and fixed upstream[1]. Please add this
patch in order to make laptops with GNOME 3 more secure. 

Best regards

Alexander Kurtz

[0] https://bugzilla.gnome.org/show_bug.cgi?id=650464
[1] 
http://git.gnome.org/browse/gnome-power-manager/commit/?id=312066e7514586eb830950dae7c089f4a9f13135


signature.asc
Description: This is a digitally signed message part


Bug#625606: upower: resets block-device tunings on startup

2011-10-30 Thread Alexander Kurtz
On Sun, 2011-10-30 at 19:09 +0100, Alexander Kurtz wrote:
 The end result is that the network card which actually should respond to
 every kind of WOL-event (pumbg) only responds to Magic-Packet (g) while
 all the other cards which should respond to nothing actually respond to
 Magic-Packets. Not really what I wanted...

Ok, now things get really funny ;-)

'/usr/sbin/pm-suspend' a.k.a. '/usr/lib/pm-utils/bin/pm-action' calls
'run_hooks sleep $ACTION $METHOD' right before suspending. This leads
to '/usr/lib/pm-utils/sleep.d/00powersave suspend' being called, which
in turn calls - you've guessed it - 'pm-powersave false'. As written
before this screws up WOL.

So, even if I somehow manage to set my custom WOL options without
somebody else overwriting them immediately, they will be overwritten
again just before suspending. Is that intended?

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#618046: batmon.app: FTBFS: BatteryModel.m:308: undefined reference to `assert'

2011-10-12 Thread Alexander Kurtz
On Sun, 2011-03-13 at 17:58 +0100, Lucas Nussbaum wrote:
 During a rebuild of all packages in sid, your package failed to build on
 amd64.

Since both #618046 and #618077 have been fixed for some time now and the
affected packages build fine[1][2], I'd like to close these bugs in a
few days. Any objections?

Best regards

Alexander Kurtz

[1] https://buildd.debian.org/status/package.php?p=etoile
[2] https://buildd.debian.org/status/package.php?p=batmon.app


signature.asc
Description: This is a digitally signed message part


Bug#510027: pavucontrol_0.9.7-1(sparc/experimental): FTBFS: undefined reference to `AO_store_full_emulation'

2011-10-12 Thread Alexander Kurtz
On Sun, 2008-12-28 at 20:15 +0100, Frank Lichtenheld wrote:
 your package failed to build from source.

Since #510027 has been fixed for some time now and the affected package
builds fine[1], I'd like to close this bug in a few days. Any
objections?

Best regards

Alexander Kurtz

[0] https://buildd.debian.org/status/package.php?p=pavucontrol


signature.asc
Description: This is a digitally signed message part


Bug#596351: ohai fails with: to_json: source sequence is illegal/malformed

2011-08-07 Thread Alexander Kurtz
Hi everybody,

AFAICT ohai works fine nowadays:

$ getent passwd 1000
alexander:x:1000:1000:Alexander' Kurtz£:/home/alexander:/bin/bash
$ ohai 
{
  [...]
  platform: debian
}
$ 

Chris Butler suggested[1] that this commit to ruby-json might be a fix:


https://github.com/flori/json/commit/dd06e48aa414674f52e81f9cdc7836b6456c04f8

This commit seems to be included in the latest version of ruby-json:

$ grep --recursive --context=3 'def benchmark_generator_ascii' 
ruby-json-1.5.3/
ruby-json-1.5.3/benchmarks/generator2_benchmark.rb-
ruby-json-1.5.3/benchmarks/generator2_benchmark.rb-  alias 
reset_benchmark_generator_pretty generic_reset_method
ruby-json-1.5.3/benchmarks/generator2_benchmark.rb-
ruby-json-1.5.3/benchmarks/generator2_benchmark.rb:  def 
benchmark_generator_ascii
ruby-json-1.5.3/benchmarks/generator2_benchmark.rb-@result = 
JSON.generate(@big, :ascii_only = true)
ruby-json-1.5.3/benchmarks/generator2_benchmark.rb-  end
ruby-json-1.5.3/benchmarks/generator2_benchmark.rb-
--
ruby-json-1.5.3/benchmarks/generator_benchmark.rb-
ruby-json-1.5.3/benchmarks/generator_benchmark.rb-  alias 
reset_benchmark_generator_pretty generic_reset_method
ruby-json-1.5.3/benchmarks/generator_benchmark.rb-
ruby-json-1.5.3/benchmarks/generator_benchmark.rb:  def 
benchmark_generator_ascii
ruby-json-1.5.3/benchmarks/generator_benchmark.rb-@result = 
JSON.generate(@big, :ascii_only = true)
ruby-json-1.5.3/benchmarks/generator_benchmark.rb-  end
ruby-json-1.5.3/benchmarks/generator_benchmark.rb-
$ 

Unless somebody tells me otherwise, I'm going to reassign this bug to
ruby-json and close it with the appropriate version in a few days.

Best regards

Alexander Kurtz

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=596351#50


signature.asc
Description: This is a digitally signed message part


Bug#620649: depends on nonexisting zeitgeist-datahub

2011-07-20 Thread Alexander Kurtz
fixed 620649 0.8.1-1
thanks

Hi,

it seems the BTS can't handle a bug being closed in another package. [1]
This bug therefore still prevents migration to testing. [2][3]

Since zeitgeist-datahub is now available in unstable[4], I'm marking
this as fixed in the latest version of zeitgeist.

Best regards

Alexander Kurtz

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=620649#20
[2] http://release.debian.org/migration/testing.pl?package=zeitgeist
[3] http://packages.qa.debian.org/z/zeitgeist.html
[4] http://packages.debian.org/sid/zeitgeist-datahub


signature.asc
Description: This is a digitally signed message part


Bug#631187: Kernel panics when removing external hard drive

2011-07-13 Thread Alexander Kurtz
On Wed, 2011-07-13 at 22:03 +1000, Linh Nguyen wrote:
 Hello Alexander,
 
 How are you? I came across your post 
 http://lists.debian.org/debian-kernel/2011/06/msg00580.html detailing 
 similar issue as to what I am experiencing.
 
 Every time I unmount a portable HDD (normal USB sticks are fine), i get 
 a kernel panic the the power/level is deprecated; use power/control 
 instead error message.
 
 Despite my extensive googling, i've not been able to find a solution. I 
 was wondering whether or not you have solved your issue. Cheers. :)
 
 
 Sincerely,
 
 L

Sorry, I've got no solution either. Since this is kind of a low-priority
bug for me, I'm fine with manually unmounting (using umount or some GUI)
my external drive before removing it. My current plan is to wait for 3.0
and then maybe do a git bisect if it's not fixed by then. However, you
should check out the Debian bug report[1], the Ubuntu bug report[2] and
the upstream bug report[3], maybe you'll find something there.

Best regards

Alexander Kurtz

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631187
[2] https://bugs.launchpad.net/ubuntu/+source/linux/+bug/793796
[3] https://bugzilla.kernel.org/show_bug.cgi?id=38842



signature.asc
Description: This is a digitally signed message part


Bug#631187: Kernel panics when removing external hard drive

2011-07-09 Thread Alexander Kurtz
On Fri, 2011-07-08 at 04:30 +0100, Ben Hutchings wrote:
 Alexander, please test the new package version.

I just tested 2.6.39-3 from sid and 3.0.0~rc6-1~experimental.1 from
experimental. Unfortunately both reliably panic when safely removing my
external hard drive. 2.6.38-5 (still) works fine. Seems like it's time
for me to do a git bisect, or do you any other ideas?

Best regards

Alexander Kurtz



signature.asc
Description: This is a digitally signed message part


Bug#613592: /sbin/fdisk: Can't create at sector 63

2011-06-29 Thread Alexander Kurtz
On Tue, 2011-06-28 at 14:05 +0200, Olaf van der Spek wrote:
 True, but deleting and recreating was advised in a number of how to's.

Yeah, fdisk is kind of limited, see below.

 Isn't it kind of silly to have so many tools that try to do the same thing?

GNU parted has way more features than {c,s,}fdisk  will probably ever
have; the most popular being perhaps support for a lot of different
partition layouts[1] including the future standard GPT. And it can
actually resize partitions...

 It wasn't clear to me at all what DOS-compatibility meant, so I had no
 idea that'd allow me to create a partition at sector 63.

Basically DOS-compatible means aligning partitions to cylinder
boundaries, since DOS requires that. And since the default is 63
sectors/track this means that the first partition normally starts at
sector 63, i.e. at the beginning of the second cylinder.

Hope this makes the situation more clear! Tell me if you're still having
problems with fdisk!

Best regards

Alexander Kurtz

[1] http://www.gnu.org/software/parted/manual/parted.html#mklabel


signature.asc
Description: This is a digitally signed message part


Bug#613592: /sbin/fdisk: Can't create at sector 63

2011-06-29 Thread Alexander Kurtz
On Wed, 2011-06-29 at 18:24 +0200, Olaf van der Spek wrote:
 So what's the advantage of c/sfdisk?

Well, it's smaller, has fewer dependencies and is installed on almost
every system. And since most administrators are familiar with it and it
is more than sufficient for most of the common tasks, there is no reason
not to keep it...

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#620649: depends on nonexisting zeitgeist-datahub

2011-06-26 Thread Alexander Kurtz
On Sun, 2011-04-03 at 12:42 +0200, Siegfried Gevatter wrote:
 zeitgeist-datahub has been moved to a separate source package (which
 is still in NEW).

zeitgeist-datahub has been accepted in experimental meanwhile:

http://packages.qa.debian.org/z/zeitgeist-datahub/news/20110410T130444Z.html

If there are no serious issues, maybe you could consider uploading
zeitgeist-datahub to unstable, so this bug can be closed.

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#631187: Kernel panics when removing external hard drive

2011-06-22 Thread Alexander Kurtz
On Wed, 2011-06-22 at 03:40 +0100, Ben Hutchings wrote:
 Which version of GNOME is this?

2.30.2. Apart from the newer kernel, this is a pure Squeeze system.

 The panic message shows there was an earlier kernel warning; please can
 you provide that.

Thanks to netconsole (a really great tool!) I was able to so. The
attached kernel log starts right before I plug the drive in.
Surprisingly the kernel didn't crash the first time, but after trying
again, everything went as expected (see lines 17 and 35). Please note
that I replaced the drive's serial number.

Best regards

Alexander Kurtz
[ 1420.016231] usb 1-3: new high speed USB device number 6 using ehci_hcd
[ 1420.150838] usb 1-3: New USB device found, idVendor=1058, idProduct=1010
[ 1420.150867] usb 1-3: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 1420.150891] usb 1-3: Product: External HDD
[ 1420.150900] usb 1-3: Manufacturer: Western Digital 
[ 1420.150914] usb 1-3: SerialNumber: XX
[ 1420.152513] scsi7 : usb-storage 1-3:1.0
[ 1421.154225] scsi 7:0:0:0: Direct-Access WD   2500BEV External 1.75 
PQ: 0 ANSI: 4
[ 1421.158259] sd 7:0:0:0: [sdc] 488397168 512-byte logical blocks: (250 GB/232 
GiB)
[ 1421.159053] sd 7:0:0:0: [sdc] Write Protect is off
[ 1421.159069] sd 7:0:0:0: [sdc] Mode Sense: 23 00 00 00
[ 1421.159080] sd 7:0:0:0: [sdc] Assuming drive cache: write through
[ 1421.161796] sd 7:0:0:0: [sdc] Assuming drive cache: write through
[ 1421.179973]  sdc: sdc1
[ 1421.182628] sd 7:0:0:0: [sdc] Assuming drive cache: write through
[ 1421.182657] sd 7:0:0:0: [sdc] Attached SCSI disk
[ 1454.865926] WARNING! power/level is deprecated; use power/control instead
[ 1454.944178] usb 1-3: USB disconnect, device number 6
[ 1477.564219] usb 1-2: new high speed USB device number 7 using ehci_hcd
[ 1477.698789] usb 1-2: New USB device found, idVendor=1058, idProduct=1010
[ 1477.698817] usb 1-2: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[ 1477.698841] usb 1-2: Product: External HDD
[ 1477.698850] usb 1-2: Manufacturer: Western Digital 
[ 1477.698867] usb 1-2: SerialNumber: XX
[ 1477.700552] scsi8 : usb-storage 1-2:1.0
[ 1478.702244] scsi 8:0:0:0: Direct-Access WD   2500BEV External 1.75 
PQ: 0 ANSI: 4
[ 1478.705375] sd 8:0:0:0: [sdc] 488397168 512-byte logical blocks: (250 GB/232 
GiB)
[ 1478.705994] sd 8:0:0:0: [sdc] Write Protect is off
[ 1478.706023] sd 8:0:0:0: [sdc] Mode Sense: 23 00 00 00
[ 1478.706035] sd 8:0:0:0: [sdc] Assuming drive cache: write through
[ 1478.708338] sd 8:0:0:0: [sdc] Assuming drive cache: write through
[ 1478.725489]  sdc: sdc1
[ 1478.728353] sd 8:0:0:0: [sdc] Assuming drive cache: write through
[ 1478.728383] sd 8:0:0:0: [sdc] Attached SCSI disk
[ 1491.693027] BUG: unable to handle kernel NULL pointer dereference at 
0048
[ 1491.693229] IP: [8118b2e3] elv_completed_request+0x38/0x47
[ 1491.693380] PGD 1b7f16067 
[ 1491.693435] Buffer I/O error on device sdc1, logical block 61048968
[ 1491.693448] Buffer I/O error on device sdc1, logical block 61048968
[ 1491.693486] Buffer I/O error on device sdc1, logical block 61048992
[ 1491.693494] Buffer I/O error on device sdc1, logical block 61048992
[ 1491.693510] Buffer I/O error on device sdc1, logical block 61048998
[ 1491.693517] Buffer I/O error on device sdc1, logical block 61048998
[ 1491.693554] Buffer I/O error on device sdc1, logical block 61048999
[ 1491.693567] Buffer I/O error on device sdc1, logical block 0
[ 1491.693578] Buffer I/O error on device sdc1, logical block 0
[ 1491.693590] Buffer I/O error on device sdc1, logical block 256
[ 1491.694599] PUD 1b7f23067 PMD 0 
[ 1491.694689] Oops:  [#1] SMP 
[ 1491.694777] last sysfs file: 
/sys/devices/pci:00/:00:12.2/usb1/1-2/power/autosuspend
[ 1491.694945] CPU 1 
[ 1491.694991] Modules linked in: netconsole configfs parport_pc ppdev lp 
parport bridge stp bnep rfcomm bluetooth powernow_k8 mperf cpufreq_stats 
cpufreq_userspace cpufreq_powersave cpufreq_conservative binfmt_misc fuse 
snd_hda_codec_hdmi joydev snd_hda_codec_conexant radeon arc4 ecb ttm 
drm_kms_helper snd_hda_intel thinkpad_acpi rtl8192ce drm snd_hda_codec 
rtl8192c_common snd_hwdep i2c_algo_bit rtlwifi snd_pcm snd_seq snd_seq_device 
mac80211 snd_timer snd cfg80211 i2c_piix4 shpchp soundcore tpm_tis tpm psmouse 
tpm_bios snd_page_alloc wmi nvram k10temp rfkill pcspkr pci_hotplug i2c_core 
evdev serio_raw battery video ac edac_core power_supply edac_mce_amd button 
processor ext4 mbcache jbd2 crc16 sha256_generic cryptd aes_x86_64 aes_generic 
cbc dm_crypt dm_mod raid10 raid456 async_raid6_recov async_pq raid6_pq 
async_xor xor async_memcpy async_tx raid1 raid0 multipath linear md_mod sd_mod 
usb_storage crc_t10dif uas ahci libahci ohci_hcd libata ehci_hcd r8169 thermal 
scsi_mod usbcore mii thermal_sys [last unloaded: configfs]
[ 1491.696825] 
[ 1491.696825] Pid: 10, comm: ksoftirqd/1 Tainted: GW2.6.39-2-amd64 
#1

Bug#624569: closed by Tzafrir Cohen tzaf...@debian.org (Bug#624569: fixed in asterisk 1:1.8.4-1)

2011-05-16 Thread Alexander Kurtz
Hi,

asterisk still can't be built on sparc (still missing libsrtp0-dev) and
now also FTBFS on mips, powerpc and s390, see here:

https://buildd.debian.org/status/package.php?p=asterisk

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#561593: background image config/handling (plus password handling)

2011-05-05 Thread Alexander Kurtz
On Wed, 2011-05-04 at 13:28 +0200, deb...@x.ray.net wrote:
 sorry, spamassassin problem over here, it seems to have been broken
 on the occasion that support was dropped (mailserver is etch) - i found
 about your mail just now.
Security support for etch was discontinued in February 2010...

 yes, the first part was about setting menucolors in case of a background
 image - just as the provided patch suggests to fix it.
Unfortunately that patch isn't perfect, see

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608283#26

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#624569: FTBFS because of missing build-dependencies

2011-04-29 Thread Alexander Kurtz
Package: src:asterisk
Version: 1:1.8.3.3-1
Severity: serious

Hi,

asterisk currently FTBFS on the hurd, kfreebsd-amd64/-i386 and sparc
because of missing build-dependencies[1]. The missing packages are
libtonezone-dev (src:dahdi-tools) and libsrtp0-dev (src:srpt).

Since it seems unlikely that these packages get fixed soon[2][3], you
should consider building asterisk without these libraries or temporarily
removing asterisk from the affected architectures via [4].

This is especially important since the latest asterisk fixes some
security issues (DSA 2225[5]) but won't be able to migrate to testing
any time soon in the current state.

Please don't hesitate to reassign this bug to the buggy libraries if you
think it's appropriate.

Best regards

Alexander Kurtz

[1] https://buildd.debian.org/status/package.php?p=asterisk
[2] https://buildd.debian.org/status/package.php?p=dahdi-tools
[3] https://buildd.debian.org/status/package.php?p=srtp
[4] https://buildd.debian.org/quinn-diff/sid/Packages-arch-specific
[5] http://www.debian.org/security/2011/dsa-2225


signature.asc
Description: This is a digitally signed message part


Bug#599095: schroedinger: Generates a 500M build log

2011-04-07 Thread Alexander Kurtz
Hi,

what are the chances of #599095 being fixed soon? This bug currently
blocks VLC[1][2] from migrating to testing which would fix some
important security issues[3][4] (DSA 2211-1 [5]).

Best regards

Alexander Kurtz

[1] http://release.debian.org/migration/testing.pl?package=vlc
[2] https://buildd.debian.org/status/package.php?p=vlc
[3] http://security-tracker.debian.org/tracker/CVE-2010-3275
[4] http://security-tracker.debian.org/tracker/CVE-2010-3276
[5] http://lists.debian.org/debian-security-announce/2011/msg00080.html


signature.asc
Description: This is a digitally signed message part


Bug#616577: Upgrading libpango1.0-0 fails: rm: cannot remove `/usr/share/doc/libpango1.0-0': Is a directory

2011-04-04 Thread Alexander Kurtz
Am Montag, den 04.04.2011, 10:54 +0200 schrieb Emilio Pozuelo Monfort:
 I already fixed this in svn. I'll upload it when pango migrates unless Julien
 thinks we should really fix this before that happens.

Perfect, thank you! But won't this bug block pango from migrating? If
so, don't hesitate to lower the severity!

BTW: While searching for the relevant commit[1] I saw that you moved
pango1.0 experimental branch to unstable[2], but I think you forgot to
update the Vcs-* fields, see [3].

Best regards

Alexander Kurtz

[1] http://svn.debian.org/viewsvn/pkg-gnome?view=revrevision=27121
[2] http://svn.debian.org/viewsvn/pkg-gnome?view=revrevision=27092
[3] 
http://svn.debian.org/viewsvn/pkg-gnome/desktop/unstable/pango1.0/debian/control?revision=27092view=markuppathrev=27092


signature.asc
Description: This is a digitally signed message part


Bug#616577: Upgrading libpango1.0-0 fails: rm: cannot remove `/usr/share/doc/libpango1.0-0': Is a directory

2011-04-04 Thread Alexander Kurtz
Am Montag, den 04.04.2011, 11:37 +0200 schrieb Emilio Pozuelo Monfort:
 Pretty sure I did in a later commit.

Yes you did[1]. Sorry for the noise.

Best regards

Alexander Kurtz

[1] http://svn.debian.org/viewsvn/pkg-gnome?view=revrevision=27112


signature.asc
Description: This is a digitally signed message part


Bug#616577: Upgrading libpango1.0-0 fails: rm: cannot remove `/usr/share/doc/libpango1.0-0': Is a directory

2011-04-03 Thread Alexander Kurtz
reopen 616577
forcemerge 616577 619771
thanks

Am Montag, den 14.03.2011, 16:23 +0100 schrieb Alexander Kurtz:
 Am Sonntag, den 13.03.2011, 21:35 + schrieb Emilio Pozuelo Monfort:
  Yes, I know. See e.g. #609565 for a similar case. Downgrades are not 
  supported,
  so in that case you get to fix it.
 
 Alright then.

It seems like there *are* actually other causes for this bug: I agree
with Michael Bienia[1] that the actual bug was probably in some old
version which failed to do the transition properly. Together with Julien
Cristau's comment[2] on the issue this sounds like a pretty good
explanation.

Meanwhile quite a few people[3][4] experienced this bug, so please apply
my patch[5] now. Ubuntu has already applied it[6].

Best regards

Alexander Kurtz

[1] https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/703230/comments/9
[2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616577#27
[3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=619771
[4] https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/703230
[5] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616577#20
[6] https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/703230/comments/8


signature.asc
Description: This is a digitally signed message part


Bug#619858: vlc FTBFS because of incorrect build-dependency

2011-03-27 Thread Alexander Kurtz
Package: vlc
Version: 1.1.8-1
Severity: serious
Justification: FTBFS

Hi,

vlc 1.1.8-1 currently FTBFS on hppa, s390 and sparc because of a wrong
build-dependency[1]. The log files[2][3][4] all contain this:

checking for THEORA... yes
checking for DIRAC... yes
checking for SCHROEDINGER... no
configure: error: Library schroedinger-1.0 = 1.0.10 needed for 
schroedinger was not found
make[1]: *** [override_dh_auto_configure] Error 1
make[1]: Leaving directory 
`/build/buildd-vlc_1.1.8-1-hppa-UUvoDW/vlc-1.1.8'
make: *** [build] Error 2
dpkg-buildpackage: error: debian/rules build gave error exit status 2

However, vlc 1.1.8-1 currently only depends on libschroedinger-dev
(=1.0.7). You should probably update the build-dependencies.

Although bumping the bumping the build-dependencies would probably be
the correct solution, it won't solve the problem completely, see [5].

Best regards

Alexander Kurtz

[1] https://buildd.debian.org/status/package.php?p=vlc
[2] 
https://buildd.debian.org/fetch.cgi?pkg=vlcarch=hppaver=1.1.8-1stamp=1301109058file=logas=raw
[3] 
https://buildd.debian.org/fetch.cgi?pkg=vlcarch=s390ver=1.1.8-1stamp=1301077844file=logas=raw
[4] 
https://buildd.debian.org/fetch.cgi?pkg=vlcarch=sparcver=1.1.8-1stamp=1301013257file=logas=raw
[5] https://buildd.debian.org/status/package.php?p=schroedinger


signature.asc
Description: This is a digitally signed message part


Bug#590961: Make the relationship of #580873, #580874 and #590961 more clear

2011-03-24 Thread Alexander Kurtz
affects 580873 brasero
affects 590961 brasero
block 580874 by 580873
block 580874 by 590961
thanks

Hi,

I recently got aware of the fact that there seems to be a lot of
confusion on the net regarding optical disc burning with Brasero in
Debian/Ubuntu because of #580873, #580874 and #590961.

This has lead to a lot of bug reports[1-6] which are most likely
duplicates of #580874 and even to Ubuntu disabling Brasero's plugin
version check completely for lucid[7] and maverick[8]. IMHO this is not
necessary and backporting the fix for #590961 would have been the better
solution.

Hopyfully this mail makes the situation more clear. If not, don't
hesitate to ask!

Best regards

Alexander Kurtz

[1] https://bugs.launchpad.net/ubuntu/+source/brasero/+bug/695269
[2] https://bugs.launchpad.net/ubuntu/+source/brasero/+bug/695275
[3] https://bugs.launchpad.net/ubuntu/+source/brasero/+bug/682329
[4] https://bugs.launchpad.net/ubuntu/+source/brasero/+bug/566784
[5] https://bugs.launchpad.net/ubuntu/+source/brasero/+bug/605603
[6] https://bugs.launchpad.net/ubuntu/+source/brasero/+bug/529696
[7] https://bugs.launchpad.net/ubuntu/+source/brasero/+bug/529696/comments/169
[8] https://bugs.launchpad.net/ubuntu/+source/brasero/+bug/529696/comments/170


signature.asc
Description: This is a digitally signed message part


Bug#561593: background image config/handling (plus password handling)

2011-03-23 Thread Alexander Kurtz
Hi,

if I understand you correctly, you are searching for a way to set custom
menu colors, right? That would be #608283[1]. I'm working on that, but
it will need some time. Or did you want something else?

Best regards

Alexander Kurtz

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608283


signature.asc
Description: This is a digitally signed message part


Bug#616577: Upgrading libpango1.0-0 fails: rm: cannot remove `/usr/share/doc/libpango1.0-0': Is a directory

2011-03-13 Thread Alexander Kurtz
Am Dienstag, den 08.03.2011, 11:27 +0100 schrieb Julien Cristau:
  It seems like dpkg won't overwrite a directory with a symlink (bug?) so
 
 No, not bug.

So my patch[1] should be the correct solution in this situation, right?

Best regards

Alexander Kurtz

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616577#20


signature.asc
Description: This is a digitally signed message part


Bug#616577: Upgrading libpango1.0-0 fails: rm: cannot remove `/usr/share/doc/libpango1.0-0': Is a directory

2011-03-13 Thread Alexander Kurtz
Am Sonntag, den 13.03.2011, 19:16 + schrieb Emilio Pozuelo Monfort:
 No. Your system was messed up since you didn't have a symlink there (as you
 should). I'm tempted to close this bug.

I don't know why *I* had a directory instead of a symbolic link, but I
can think of at least one not very unlikely way: Imagine you install
pango 1.28.3-4, then go back to an earlier version and re-upgrade some
time later: You would be screwed.

Since there is absolutely no downside in checking ones assumptions
(i.e. /usr/share/doc/libpango1.0-0 being a symlink), I think you should
re-consider applying the patch.

However, it's your decision; feel free to close the bug if you want to.

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#616577: Upgrading libpango1.0-0 fails: rm: cannot remove `/usr/share/doc/libpango1.0-0': Is a directory

2011-03-06 Thread Alexander Kurtz
tags 616577 + patch
thanks

Hi,

I have written and successfully tested the attached patch. If there are
no objections, I suggest applying it to the next upload.

Best regards

Alexander Kurtz
diff -Naur pango1.0-1.28.3.orig/debian/changelog pango1.0-1.28.3/debian/changelog
--- pango1.0-1.28.3.orig/debian/changelog	2011-01-13 00:04:25.0 +0100
+++ pango1.0-1.28.3/debian/changelog	2011-03-06 14:52:04.818002938 +0100
@@ -1,3 +1,10 @@
+pango1.0 (1.28.3-4.1) experimental; urgency=low
+  * Non-maintainer upload
+  * preinst: Check if /usr/share/doc/libpango1.0-0 actually is a symlink before
+attempting to remove it. Closes: #616577.
+
+ -- Alexander Kurtz kurtz.a...@googlemail.com  Sun, 06 Mar 2011 13:48:33 +0100
+
 pango1.0 (1.28.3-4) experimental; urgency=low
 
   * Switch to source format 3.0 (quilt).
diff -Naur pango1.0-1.28.3.orig/debian/libpango1.0-0.preinst pango1.0-1.28.3/debian/libpango1.0-0.preinst
--- pango1.0-1.28.3.orig/debian/libpango1.0-0.preinst	2011-01-11 02:26:22.0 +0100
+++ pango1.0-1.28.3/debian/libpango1.0-0.preinst	2011-03-06 14:54:29.290308829 +0100
@@ -2,7 +2,11 @@
 set -e
 
 if [ $1 = upgrade ]  dpkg --compare-versions $2 lt-nl 1.28.3-4; then
-rm -f /usr/share/doc/libpango1.0-0
+# Check if /usr/share/doc/libpango1.0-0 actually is a symlink before
+# attempting to remove it. Closes: #616577.
+if [ -L /usr/share/doc/libpango1.0-0 ]; then
+rm -f /usr/share/doc/libpango1.0-0
+fi
 fi
 
 #DEBHELPER#


signature.asc
Description: This is a digitally signed message part


Bug#616577: Upgrading libpango1.0-0 fails: rm: cannot remove `/usr/share/doc/libpango1.0-0': Is a directory

2011-03-05 Thread Alexander Kurtz
Package: libpango1.0-0
Version: 1.28.3-4
Severity: serious
Justification: Fails to install

Hi,

upgrading libpango1.0-0 from 1.28.3-1+squeeze2 (Squeeze) to 1.28.3-4
(experimental) fails:

$ sudo apt-get install libpango1.0-0=1.28.3-4
Reading package lists... Done
Building dependency tree   
Reading state information... Done
The following packages were automatically installed and are no longer 
required:
  libxcb-render-util0 libpango1.0-common
Use 'apt-get autoremove' to remove them.
Suggested packages:
  ttf-japanese-gothic ttf-japanese-mincho ttf-thryomanes ttf-baekmuk 
ttf-arphic-gbsn00lp ttf-arphic-bsmi00lp ttf-arphic-gkai00mp ttf-arphic-bkai00mp
The following packages will be upgraded:
  libpango1.0-0
1 upgraded, 0 newly installed, 0 to remove and 847 not upgraded.
34 not fully installed or removed.
Need to get 0 B/409 kB of archives.
After this operation, 131 kB of additional disk space will be used.
(Reading database ... 207505 files and directories currently installed.)
Preparing to replace libpango1.0-0 1.28.3-1+squeeze2 (using 
.../libpango1.0-0_1.28.3-4_i386.deb) ...
rm: cannot remove `/usr/share/doc/libpango1.0-0': Is a directory
dpkg: error processing 
/var/cache/apt/archives/libpango1.0-0_1.28.3-4_i386.deb (--unpack):
 subprocess new pre-installation script returned error exit status 1
configured to not write apport reports
  Errors were encountered while 
processing:
 /var/cache/apt/archives/libpango1.0-0_1.28.3-4_i386.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)
$

Looking at the pre-installation script reveals this:

$ cat libpango1.0-0_1.28.3-4_amd64/DEBIAN/preinst 
#!/bin/sh
set -e

if [ $1 = upgrade ]  dpkg --compare-versions $2 lt-nl 1.28.3-4; 
then
rm -f /usr/share/doc/libpango1.0-0
fi


$

It seems that rm is missing the -r option. After manually removing the
directory everything works fine:

$ sudo rmdir /usr/share/doc/libpango1.0-0
$

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#616577: Upgrading libpango1.0-0 fails: rm: cannot remove `/usr/share/doc/libpango1.0-0': Is a directory

2011-03-05 Thread Alexander Kurtz
I investigated this further after realizing that on my other machine
`/usr/share/doc/libpango1.0-0' is a symlink to `libpango1.0-common'.

I first tried to re-install the old versions:

$ sudo dpkg -i libpango1.0-0_1.28.3-1+squeeze2_i386.deb 
libpango1.0-common_1.28.3-1+squeeze2_all.deb 
[...]
$ file /usr/share/doc/libpango*
/usr/share/doc/libpango-perl:  directory
/usr/share/doc/libpango1.0-0:  directory
/usr/share/doc/libpango1.0-common: directory
/usr/share/doc/libpangomm-1.4-1:   directory
$

I then removed the directory and re-installed:



signature.asc
Description: This is a digitally signed message part


Bug#616577: Upgrading libpango1.0-0 fails: rm: cannot remove `/usr/share/doc/libpango1.0-0': Is a directory

2011-03-05 Thread Alexander Kurtz
[ My last mail got cropped for some reason, here it is again ]

I investigated this further after realizing that on my other machine
`/usr/share/doc/libpango1.0-0' is a symlink to `libpango1.0-common'.

I first tried to re-install the old versions:

$ sudo dpkg -i libpango1.0-0_1.28.3-1+squeeze2_i386.deb 
libpango1.0-common_1.28.3-1+squeeze2_all.deb 
[...]
$ file /usr/share/doc/libpango*
/usr/share/doc/libpango-perl:  directory
/usr/share/doc/libpango1.0-0:  directory
/usr/share/doc/libpango1.0-common: directory
/usr/share/doc/libpangomm-1.4-1:   directory
$

I then removed the directory and re-installed:

$ sudo rmdir -v /usr/share/doc/libpango1.0-0
rmdir: removing directory, `/usr/share/doc/libpango1.0-0'
$ sudo dpkg -i libpango1.0-0_1.28.3-1+squeeze2_i386.deb 
libpango1.0-common_1.28.3-1+squeeze2_all.deb 
[...]
$ file /usr/share/doc/libpango*
/usr/share/doc/libpango-perl:  directory
/usr/share/doc/libpango1.0-0:  symbolic link to `libpango1.0-common'
/usr/share/doc/libpango1.0-common: directory
/usr/share/doc/libpangomm-1.4-1:   directory
$

I then removed the symlink, created a directory and re-installed:

$ sudo rm -v /usr/share/doc/libpango1.0-0 
removed `/usr/share/doc/libpango1.0-0'
$ sudo mkdir -v /usr/share/doc/libpango1.0-0
mkdir: created directory `/usr/share/doc/libpango1.0-0'
$ sudo dpkg -i libpango1.0-0_1.28.3-1+squeeze2_i386.deb 
libpango1.0-common_1.28.3-1+squeeze2_all.deb 
[...]
$ sudo file /usr/share/doc/libpango* 
/usr/share/doc/libpango-perl:  directory
/usr/share/doc/libpango1.0-0:  directory
/usr/share/doc/libpango1.0-common: directory
/usr/share/doc/libpangomm-1.4-1:   directory
$ 

It seems like dpkg won't overwrite a directory with a symlink (bug?) so
if /usr/share/doc/libpango1.0-0 has ever been a directory on your
machine, installing the latest libpango will fail.

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#536376: tagging 536376

2011-03-01 Thread Alexander Kurtz
Hi,

Am Samstag, den 12.02.2011, 21:00 +0100 schrieb Albin Tonnerre:
 tags 536376 + pending
 thanks

Any news on this? Some way I can help?

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#614785: Found too in oldstable/lenny?

2011-02-24 Thread Alexander Kurtz
Hi everybody,

Am Mittwoch, den 23.02.2011, 16:13 +0100 schrieb Michael Biebl: 
 A fixed package has been uploaded to unstable and stable-security (squeeze).

First the good news: I can confirm that upgrading *all* avahi packages
to 0.6.28-4 fixes the problem (only upgrading avahi-daemon does not!).

Am Donnerstag, den 24.02.2011, 13:27 +0100 schrieb Salvatore Bonaccorso: 
 I can reproduce this too on lenny, can someone confirm that? Up to
 date lenny system with avahi-daemon 0.6.23-3lenny2.

Now the bad news: The Debian security tracker[1] says:

[lenny] - avahi not-affected (Vulnerable code not present, introduced 
in 0.6.25)

That's wrong: Looking at the source code reveals this:

$ cat avahi-0.6.23/debian/patches/15_CVE-2010-2244.patch 
--- a/avahi-core/socket.c   
+++ avahi-0.6.23/avahi-core/socket.c
@@ -652,6 +652,10 @@ AvahiDnsPacket *avahi_recv_dns_packet_ipv4(
 goto fail;
 }
 
+/* corrupt packets have zero size */
+if (!ms)
+goto fail;
+
 p = avahi_dns_packet_new(ms + AVAHI_DNS_PACKET_EXTRA_SIZE);
 
 io.iov_base = AVAHI_DNS_PACKET_DATA(p);
@@ -805,6 +809,10 @@ AvahiDnsPacket *avahi_recv_dns_packet_ipv6(
 goto fail;
 }
 
+/* corrupt packets have zero size */
+if (!ms)
+goto fail;
+
 p = avahi_dns_packet_new(ms + AVAHI_DNS_PACKET_EXTRA_SIZE);
 
 io.iov_base = AVAHI_DNS_PACKET_DATA(p);
$

So, the code which introduced this vulnerability (CVE-2011-1002[1]) was
actually added[2] when fixing another vulnerability (CVE-2010-2244[3]).
As a consequence, lenny IS indeed vulnerable and needs to be fixed too.

Best regards and thank you very much for your work!

Alexander Kurtz

[1] http://security-tracker.debian.org/tracker/CVE-2011-1002
[2] http://packages.qa.debian.org/a/avahi/news/20100805T140231Z.html
[3] http://security-tracker.debian.org/tracker/CVE-2010-2244


signature.asc
Description: This is a digitally signed message part


Bug#614785: Found too in oldstable/lenny?

2011-02-24 Thread Alexander Kurtz
Am Donnerstag, den 24.02.2011, 15:57 +0100 schrieb Michael Biebl:
 But you are right, the security tracker should be updated

http://svn.debian.org/wsvn/secure-testing/?rev=16247

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#614785: avahi-daemon uses 100% of cpu when scanned with nmap (DoS possible?)

2011-02-23 Thread Alexander Kurtz
Package: avahi-daemon
Version: 0.6.27-2
Tags: security
Severity: critical
Justification: Introduces possible denial-of-service scenario.

Hi,

when I scan my server from another machine on the network using nmap, I
get this:

# nmap -sU -p5353 192.168.2.2

Starting Nmap 5.00 ( http://nmap.org ) at 2011-02-23 13:15 CET
Interesting ports on 192.168.2.2:
PORT STATE SERVICE
5353/udp open|filtered zeroconf
MAC Address: XX:XX:XX:XX:XX:XX (Netgear)

Nmap done: 1 IP address (1 host up) scanned in 0.50 seconds
# 

As soon as the scan starts, avahi-daemon on the server starts running
amok, top shows this: 

  PID USER  PR  NI  VIRT  RES  SHR S %CPU %MEMTIME+  COMMAND
 5535 avahi 20   0 33884 1600 1280 R  100  0.0   2:28.47 
avahi-daemon

Restarting avahi-daemon is not possible: 

# /etc/init.d/avahi-daemon restart
Restarting Avahi mDNS/DNS-SD Daemon: avahi-daemonFailed to kill daemon: 
Timer expired
.
#

Simply terminating the process doesn't work either: 

# ps -Af | grep avahi-daemon
avahi 5535 1 87 13:14 ?00:04:43 avahi-daemon: running 
[server.local]
avahi 5536  5535  0 13:14 ?00:00:00 avahi-daemon: chroot 
helper
root  5610  5581  0 13:20 pts/200:00:00 grep avahi-daemon
# kill 5535
# ps -Af | grep avahi-daemon
avahi 5535 1 88 13:14 ?00:05:02 avahi-daemon: running 
[server.local]
avahi 5536  5535  0 13:14 ?00:00:00 avahi-daemon: chroot 
helper
root  5614  5581  0 13:20 pts/200:00:00 grep avahi-daemon
#

Forcibly killing the process works:

# kill -9 5535
# ps -Af | grep avahi-daemon
root  5629  5581  0 13:23 pts/200:00:00 grep avahi-daemon
# 

I don't know what kind of data nmap sends when scanning for open UDP
ports, but it definitely shouldn't cause avahi-daemon to run amok.

Please note that I have not changed the Avahi configuration in any way,
so you should be able to reproduce this easily. Please tell me if you
need any more information!

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#614785: [Pkg-utopia-maintainers] Bug#614785: avahi-daemon uses 100% of cpu when scanned with nmap (DoS possible?)

2011-02-23 Thread Alexander Kurtz
Am Mittwoch, den 23.02.2011, 13:58 +0100 schrieb Michael Biebl:
 I was able to reproduce this problem on a squeeze system, but not on unstable.
 
 Can you confirm that?

Negative, I tried upgrading avahi-daemon and libavahi-* to the sid
versions (0.6.28-3) but the problem is still there.

However, I haven't tried a complete upgrade to sid, so the problem may
very well be in some third-party package which is fixed in sid.

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#536376: [Pkg-e-devel] Bug#536376: evas: Not suitable for testing yet

2011-02-01 Thread Alexander Kurtz
Hi,

Am Sonntag, den 08.08.2010, 23:31 +0200 schrieb Albin Tonnerre:
 Given that Testing just got frozen, I guess it'll have to wait. By the time
 Squeeze releases, things should have gotten closer to a release, and I'll
 reconsider letting it go into testing.

Well, Squeeze will release in a few days[1] and the Enlightement
developers just released Evas 1.0.0[2]. It would really be great if you
could upload the new version and close this bug!

Best regards

Alexander Kurtz

[1] http://lists.debian.org/debian-devel-announce/2011/01/msg3.html
[2] http://www.enlightenment.org/?p=news/showl=ennews_id=28


signature.asc
Description: This is a digitally signed message part


Bug#605705: FYI: Possible duplicates of #605705

2011-01-02 Thread Alexander Kurtz
Am Dienstag, den 14.12.2010, 19:19 + schrieb Alexander Kurtz:
 I just noticed that the following bugs look very similar to this one:
 
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495282
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495616
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=500134
I merged those with #608283[1].

 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550984
That's a bug in desktop-base which was fixed in version 6.0.0 [2].

 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=561593
I merged that one with this bug report (#605705[3])

Best regards

Alexander Kurtz

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608283
[2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550984#31
[3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605705


signature.asc
Description: This is a digitally signed message part


Bug#608519: grub-pc: 05_debian_theme assumes background image was copied from an installed desktop-base

2011-01-02 Thread Alexander Kurtz
severity 608519 important
tag 608519 confirmed wontfix
thanks

Hi,

Am Freitag, den 31.12.2010, 19:39 + schrieb Brian Potkin:
 I have a machine running unstable. The background image is
 moreblue-orbit-grub.png which is in /boot/grub. The image was copied
 from desktop-base but the package itself has never been installed on the
 system and, due to space restrictions, never will be.
 
 The recent upgrade has deleted moreblue-orbit-grub.png and made it
 impossible for it to be used when in /boot/grub. Basically, you can have
 any image in that location provided it isn't moreblue-orbit-grub or
 debian-blueish-wallpaper-640x48!

Unfortunately I can't think of any way to fix this. 05_debian_theme is
already comparing filenames AND checksums to make sure it doesn't delete
user-generated files. I was also thinking about comparing the timestamps
so that problems like yours could be avoided, however if you take a look
at the old postinst code...

# /boot/grub/ has more chances of being accessible by GRUB
if test -e /boot/grub/grub.cfg ; then
  for i in /usr/share/grub/unicode.pf2 
/usr/share/images/desktop-base/moreblue-orbit-grub.png ; do
if test -e $i ; then
  cp $i /boot/grub/
fi
  done
fi

... you'll see that `cp' was used without the `-a' switch, so timestamps
were not preserved. Therefore I don't think there is any way to
determine whether that file was put there by you or GRUB's postinst.

That was the bad news. However, there is also good news:

 a) 05_debian_theme compares both filename and checksum. If you rename 
the file to something like `my_custom_background.png' everything 
should work just fine.

 b) The code which cleans up old background images shouldn't be 
necessary any more if you had at least the squeeze version 
installed. I'm therefore planning to remove that code at some
point after squeeze's release. The patch is already written,
I'm just waiting for the mail from debian-annou...@d.o ;-)

I hope this helps!

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#607427: libopensc: protect for possible buffer overflows from rogue cards.

2010-12-18 Thread Alexander Kurtz
Package: libopensc2
Version: 0.11.4-5+lenny1
Tags: security
Severity: critical

Hi,

a buffer overflow vulnerability was detected in libopensc.

For details please see this press article (German: [1], English: [2])
and the detailed report[3] including a proof-of-concept by MWR
InfoSecurity[4].

The OpenSC developers have released a patch which should fix this
vulnerability[5].

If Debian isn't affected by this vulnerability or if it has already been
fixed, please don't hesitate to downgrade or close this bug.

Best regards

Alexander Kurtz

[1] 
http://www.heise.de/security/meldung/Wenn-die-Smartcard-den-Rechner-rootet-1154599.html
[2] 
http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html
[3] 
http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf
[4] http://www.mwrinfosecurity.com/index.php
[5] https://www.opensc-project.org/opensc/changeset/4913





signature.asc
Description: This is a digitally signed message part


Bug#604472: firmware-b43-installer but after reboot I got a black screen!

2010-11-25 Thread Alexander Kurtz
Am Dienstag, den 23.11.2010, 12:08 +0100 schrieb k k:
 Hi, Alexander Kurtz
 
 I Just installed proprietary STA driver it works but not as good as the b43,
 it disconnects me.
 I'll reinstall my system and try out the latest kernel.
 
 Thank u!

You don't have to reinstall, you can just add

deb http://ftp.debian.org/debian/ experimental main

to your /etc/apt/sources.list and then execute this:

apt-get update
apt-get -t experimental install linux-image-2.6.36-trunk-686

If your system is currently unable to boot, you can try adding nolapic
and/or acpi=off to the kernel parameters when booting. This will
deactivate your wifi. This is a valid workaround, but no longtime
solution since this breaks (amongst others) SMP.

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#604472: firmware-b43-installer but after reboot I got a black screen!

2010-11-25 Thread Alexander Kurtz
Am Donnerstag, den 25.11.2010, 16:59 +0100 schrieb k k:
 Hi Alexander,
 
 Thank u it worked, the expermimental kernel has fixed it!
 So will this bug be fixed in the current kernel perhaps patch?
 
 Thank u!

Hopefully yes. I'll reassign this bug to linux-2.6. Let's see what the
kernel maintainers say.

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#604472: b43/ssb driver causes some laptops to freeze during boot

2010-11-25 Thread Alexander Kurtz
reassign 604472 linux-2.6
retitle 604472 b43/ssb driver causes some laptops to freeze during boot
severity 604472 serious
tags 604472 patch upstream fixed-upstream
forwarded 604472 https://bugzilla.kernel.org/show_bug.cgi?id=14716
thanks

Dear kernel maintainers,

There is a known bug[1] in the linux kernel which causes some laptops
(for example the HP Compaq 615) to freeze during boot (screen turns
black, machine doesn't react on anything). The problem has been located
in the b43/ssb driver and has been fixed[2] some time ago.

As a workaround, one can use the proprietary wifi driver[3] (I'm doing
so on my HP Compaq 615) or start the kernel with nolapic and/or
acpi=off (disables wifi completely, but also SMP).

The people currently seeing this bug include myself and
k k kade...@gmail.com, who has recently filed this bug report
against firmware-b43-installer and who was able to confirm[4] that the
latest linux kernel from experimental fixes the problem.

It would be great if the upstream patch could be backported and included
in the squeeze kernel! If you'd like, I can test the patched version
first.

Many thanks for your work and with best regards

Alexander Kurtz

[1] https://bugzilla.kernel.org/show_bug.cgi?id=14716
[2] 
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.35.y.git;a=commit;h=9d1ac34ec3a67713308ae0883c3359c557f14d17
[3] http://packages.debian.org/squeeze/broadcom-sta-source
[4] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=604472#20


signature.asc
Description: This is a digitally signed message part


Bug#604472: firmware-b43-installer but after reboot I got a black screen!

2010-11-23 Thread Alexander Kurtz
Hi,

This might be a known kernel bug[1] which got fixed recently. The
problem is somewhere in the b43/ssb driver, which won't get activated
until you install the necessary firmware files. Could you try the latest
linux kernel from experimental?
I'm having this problem (black screen, machine freezes during boot) on
one of my notebooks (HP Compaq 615). I'm using the proprietary driver[2]
as a workaround for the time being. That works w/o problems.

Best regards

Alexander Kurtz

[1] https://bugzilla.kernel.org/show_bug.cgi?id=14716 (currently broken)
[2] http://packages.debian.org/squeeze/broadcom-sta-source


signature.asc
Description: This is a digitally signed message part


Bug#582342: Let's try to figure out bug #582342 finally

2010-11-07 Thread Alexander Kurtz
Hi,

your Debian bug #582342[2]  has been on my todo list for quite some time
now - let's try to finally figure this out! I do have a similar setup,
with / on a luks-encrypted raid6 and /boot on raid1, the only difference
seems to be that I'm still using MBR while you've already switched to
GPT. Since my setup works fine I'm confident that we will be able to
solve your problem together!

First let's make sure I get the facts right:

 * You've filed bug #582177[1] against initramfs-tools and #582342[2]  
   against grub-pc
 * For both bugs you are apparently the only one who experiences them
 * the main symptom of these bugs is that your system doesn't boot
   anymore

Everything correct so far? Then I have some questions:

 * Does your system still have problems booting?

 * If so, what problems *exactly* do you have? I've been
   reading both bug reports but have been unable to determine
   in what stage your system fails to boot. So
   * do you get to the GRUB screen
   * do the kernel and the initramfs get loaded by GRUB
   * do the kernel and the initramfs boot correctly
   I need the exact error messages to help you. A screenshot might also 
   be a good idea.

 * I'd like to merge #582177[1] and #582342[2] so that we can focus on 
   one bug report instead of spreading the information across multiple 
   bugs. Overall this seems to be just one problem and we can always 
   unmerge them later if necessary. Any objections?

 * You mentioned that your problems have disappeared and then 
   reappeared after some hardware rearrangements:
   * Do you remember what you did exactly?
   * Can you make the problem disappear/reappear again?
   * Are you sure that it's not some HW/BIOS issue?

 * What method/steps do you currently use to boot your system?

 * Does it help if you run
dpkg-reconfigure grub-pc
   when your system is up and reinstall grub to every harddrive to want 
   to boot off?

 * Does it help if you run
update-initramfs -u
   when your system is up to make sure you have a clean initramfs?

 * Is your squeeze system up-to-date? There have been quite some 
   bugfixes recently which might affect your system, for example mdadm 
   bug #583917[3] and friends.

So, that's all I can think of right now - I'm looking forward to reading
your detailed answers!

Best regards

Alexander Kurtz

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582177
[2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582342
[3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583917




signature.asc
Description: This is a digitally signed message part


Bug#599306: manpages-de 0.6-1 should conflict/break manpages-de-dev = 0.5-5 and vice versa

2010-10-06 Thread Alexander Kurtz
Package: manpages-de
Version: 0.6-1
Severity: serious

Hi,

the unattended upgrade failed today with this error message:

2010-10-06 12:51:13,135 INFO Initial blacklisted packages: 
2010-10-06 12:51:13,136 INFO Starting unattended upgrades script
2010-10-06 12:51:13,136 INFO Allowed origins are: [('Debian', 'stable'), 
('Debian', 'squeeze-security'), ('Debian', 'testing'), 
('volatile.debian.org', 'stable')]
2010-10-06 12:51:26,202 INFO Packages that are upgraded: libasound2 
libdrm-intel1 libdrm-nouveau1 libdrm-radeon1 libdrm2 manpages-de manpages-de-dev
2010-10-06 12:51:26,202 INFO Writing dpkg log to 
'/var/log/unattended-upgrades/unattended-upgrades-dpkg_2010-10-06_12:51:26.202429.log'
2010-10-06 12:51:37,769 ERROR Installing the upgrades failed!
2010-10-06 12:51:37,770 ERROR error message: 'E:Sub-process /usr/bin/dpkg 
returned an error code (1)'
2010-10-06 12:51:37,770 ERROR dpkg returned a error! See 
'/var/log/unattended-upgrades/unattended-upgrades-dpkg_2010-10-06_12:51:26.202429.log'
 for details

The detailed log file is attached. After running apt-get dist-upgrade
manually again, everything worked perfectly and manpages-de 0.6-1 was
installed without a problem, because there were no conflicting files
anymore now that manpages-de-dev had been updated.

I'm filing this as serious because this could break upgrades from lenny
to squeeze. Don't hesitate to downgrade/close if you think it's
appropriate!

Best regards

Alexander Kurtz




(Reading database ... 186529 files and directories currently installed.)
Preparing to replace libasound2 1.0.23-1 (using .../libasound2_1.0.23-2_amd64.deb) ...
Unpacking replacement libasound2 ...
Preparing to replace libdrm2 2.4.18-6 (using .../libdrm2_2.4.21-1~squeeze3_amd64.deb) ...
Unpacking replacement libdrm2 ...
Preparing to replace libdrm-intel1 2.4.18-6 (using .../libdrm-intel1_2.4.21-1~squeeze3_amd64.deb) ...
Unpacking replacement libdrm-intel1 ...
Preparing to replace libdrm-nouveau1 2.4.18-6 (using .../libdrm-nouveau1_2.4.21-1~squeeze3_amd64.deb) ...
Unpacking replacement libdrm-nouveau1 ...
Preparing to replace libdrm-radeon1 2.4.18-6 (using .../libdrm-radeon1_2.4.21-1~squeeze3_amd64.deb) ...
Unpacking replacement libdrm-radeon1 ...
Preparing to replace manpages-de 0.5-5 (using .../manpages-de_0.6-1_all.deb) ...
Unpacking replacement manpages-de ...
dpkg: error processing /var/cache/apt/archives/manpages-de_0.6-1_all.deb (--unpack):
 trying to overwrite '/usr/share/man/de/man2/intro.2.gz', which is also in package manpages-de-dev 0.5-5
configured to not write apport reports
dpkg-deb: subprocess paste killed by signal (Broken pipe)
Preparing to replace manpages-de-dev 0.5-5 (using .../manpages-de-dev_0.6-1_all.deb) ...
Unpacking replacement manpages-de-dev ...
Processing triggers for man-db ...
Errors were encountered while processing:
 /var/cache/apt/archives/manpages-de_0.6-1_all.deb


signature.asc
Description: This is a digitally signed message part


Bug#594472: grub-pc: scary messages and very long boot time after upgrade

2010-09-24 Thread Alexander Kurtz
So after all this was just mdadm bug #583917 combined with the fact that
you used to wrong name (compared to /etc/cryptsetup) when unlocking the
crypto device manually. This of course caused the cryptsetup initramfs
hook to break when recreating the initramfs. As a consequence, your
cryptroot didn't get unlocked during early boot stage. Correct?

Best regards

Alexander Kurtz

PS: You should revert /etc/cryptab to the state it had before all the
debugging (i.e. with UUID=). You should also revert the change you
made to the cryptsetup initramfs hook, for example like this:
   apt-get --reinstall install cryptsetup


signature.asc
Description: This is a digitally signed message part


Bug#594472: grub-pc: scary messages and very long boot time after upgrade

2010-09-24 Thread Alexander Kurtz
reassign 594472 mdadm
forcemerge 583917 594472
thanks

Hi Toni,

Everybody else's problems were definitely caused[1][2] by mdadm bug
#583917[3]. Could you try upgrading to mdadm 3.1.4 (has reached squeeze
already), regenerate your initramfs and report whether this solves your
booting problems?

If your system doesn't currently boot at all, please see my former
mail[4] for instructions.

When doing so, please make sure that you use the right names (compared
to /etc/crypttab) when unlocking your crypto devices. Not doing so was
why Andreas could still not boot after upgrading mdadm[5].

Best regards

Alexander Kurtz

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594472#119
[2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594472#199
[3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583917
[4] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594472#164
[5] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594472#204 


signature.asc
Description: This is a digitally signed message part


Bug#594472: grub-pc: scary messages and very long boot time after upgrade

2010-09-20 Thread Alexander Kurtz
Now we are getting somewhere! Here's what I suspect to be the problem:

Am Montag, den 20.09.2010, 09:59 +0200 schrieb Andreas von Heydwolff:
 * What exactly do you have to do to boot your system manually
   after being thrown to a rescue shell (precise commands)?
 
 # cryptsetup luksOpen /dev/md1 vg-md1dm0
That is wrong. According to your /etc/crypttab[1] the cleartext device
for /dev/md1 is md1_crypt not vg-md1md0. The line should therefore
look like this:

cryptsetup luksOpen /dev/md1 md1_crypt

If you use the wrong command this is what happens:

 * The LVM you set up manually (which contains your root fs) will 
   use /dev/mapper/vg-md1dm0 as its physical volume.

 * When the initramfs is regenerated, the cryptsetup hooks searches for 
   vg-md1dm0 in /etc/crypttab as this contains the PV for the LV on 
   which the root fs of the currently running system is. Since there
   is of course no such entry you get those error messages and your 
   crypto devices don't get unlocked before the root fs is mounted.
 
 * Since cryptsetup therefore thinks that /dev/md1 is just a normal 
   encrypted volume, it will unlock it together with /dev/md2 
   (your /home) during normal boot. That's why why you have to 
   enter /dev/md1's passphrase again and why you also 
   have /dev/mapper/md1_crypt which (of course) has the same UUID 
   as /dev/mapper/vg-md1md0.

 That's what I think (manual creation). And without specifying the vg I 
 receive the error message  that no volume groups are found
That's because you didn't scan the devices. Use
vgscan
vgchange -ay
Note that you don't need to enter the LVM shell for that.

Best regards

Alexander Kurtz

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594472#169


signature.asc
Description: This is a digitally signed message part


Bug#594472: grub-pc: scary messages and very long boot time after upgrade

2010-09-18 Thread Alexander Kurtz
Hi Andreas,

let's try to keep this short, this bug report is already long enough:

Am Samstag, den 18.09.2010, 01:38 +0200 schrieb Andreas von Heydwolff:
 ii  cryptsetup2:1.1.3-3
 ii  lvm2  2.02.66-3
 ii  mdadm 3.1.4-1+8efb9d1
Good.

 # update-initramfs -u
 update-initramfs: Generating /boot/initrd.img-2.6.32-5-amd64
 
 ... and nothing else as output.
Even better.

 the initramfs came up but I got
 ALERT! /dev/mapper/vg--md1dm0-slash does not exist
 and ls -l /dev/dm* was empty,
 ls -l /dev/mapper showed only /dev/mapper/control
Not so good.

Ok, let me summarize:
 * You did have[1] the problem that was caused by mdadm bug #583917[2].
   However, after upgrading to mdadm 3.1.4 that is solved.
 * You did have[3] some issue with cryptsetups initramfs hook.
   However, for some reason that is gone now.
 * You do still have the problem that for some reason your root file 
   system is not correctly mounted during initramfs stage.

Everything correct so far? If so we can focus on tackling the last
point!

Best regards

Alexander Kurtz

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594472#44
[2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583917
[3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594472#124


signature.asc
Description: This is a digitally signed message part


Bug#594472: grub-pc: scary messages and very long boot time after upgrade

2010-09-18 Thread Alexander Kurtz
Am Samstag, den 18.09.2010, 23:04 +0200 schrieb Andreas von Heydwolff:
 It is gone because I replaced in line 185 of
 
   /usr/share/initramfs-tools/hooks/cryptroot
 
   echo cryptsetup: WARNING: invalid line in /etc/crypttab - $opt 2
 
 with
 
   echo cryptsetup: WARNING: invalid line in /etc/crypttab - $opt 
 (target=$target, extraopts=$extraopts, @=$@)
 
 as you suggested. When I revert to the old line I again get this situation:
 
   # update-initramfs -u
   update-initramfs: Generating /boot/initrd.img-2.6.32-5-amd64
   cryptsetup: WARNING: invalid line in /etc/crypttab -
   cryptsetup: WARNING: invalid line in /etc/crypttab -
Ehm... I suggested to change that line for *diagnosing only*. The fix
was that apparently you forgot the 2 part at the end, therefore the
output is not redirected to stderr. Please re-read my old mail.

* You do still have the problem that for some reason your root file
  system is not correctly mounted during initramfs stage.
 
 Yes
Questions:

 * What exactly fails at booting during the initramfs stage?
   Do the raid devices get assembled correctly? Do the crypto 
   devices get unlocked? What about LVM?
   In short: What works, what doesn't?
 
 * What exactly do you have to do to boot your system manually 
   after being thrown to a rescue shell (precise commands)?

 * The double-UUID-problem: What is /dev/mapper/vg-md1dm0?
   Do somehow manually create it when booting the system by hand?
   What happens if you use *only* vgscan; vgchange -ay to activate
   all logical volumes?

Best regards

Alexander Kurtz

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594472#159


signature.asc
Description: This is a digitally signed message part


Bug#594472: grub-pc: scary messages and very long boot time after upgrade

2010-09-17 Thread Alexander Kurtz
Hi,

I think a little more information would be helpful. IMHO your problem
can be divided into three parts. Let's discuss them separately:

1. Just for the record: You do have mdadm 3.1.4-1+8efb9d1 installed (it 
   should migrate to squeeze today[1])?

Am Freitag, den 17.09.2010, 01:38 +0200 schrieb Andreas von Heydwolff:
 Hm. All three variants yielded the same result:
 
 # update-initramfs -u
 update-initramfs: Generating /boot/initrd.img-2.6.32-5-amd64
 cryptsetup: WARNING: invalid line in /etc/crypttab -
 cryptsetup: WARNING: invalid line in /etc/crypttab -

2. Ok I really want to know why this error message appears. This is the 
   relevant code:

$ sed -n '179,187p' /usr/share/initramfs-tools/hooks/cryptroot
opt=$( grep ^$target\b /etc/crypttab | head -1 | sed 
's/[[:space:]]\+/ /g' )
source=$( echo $opt | cut -d   -f2 )
key=$( echo $opt | cut -d   -f3 )
rootopts=$( echo $opt | cut -d   -f4- )

if [ -z $opt ] || [ -z $source ] || [ -z $key ] || [ -z 
$rootopts ]; then
echo cryptsetup: WARNING: invalid line in /etc/crypttab - 
$opt 2
return 1
fi

   Looking at your error message, I guess $opt is empty (which would
   also make the other variables empty). That can only happen if the 
   grep which is supposed to fill $opt returns nothing. Can you 

* append the complete output of
   + ls -l /dev/mapper
   + mount
   + cat /etc/fstab
   + cat /etc/crypttab

* temporarily change line 185 of /usr/share/initramfs-tools/hooks/cryptroot
  like this for more information:

   echo cryptsetup: WARNING: invalid line in /etc/crypttab - $opt 
(target=$target, extraopts=$extraopts, @=$@) 2

* run update-initramfs -u with the modified hook and send me the 
  output?

 Then I followed this previously mentioned error message:
 
 # update-grub
 Generating grub.cfg ...
 Found background image: moreblue-orbit-grub.png
 Found linux image: /boot/vmlinuz-2.6.32-5-amd64
 Found initrd image: /boot/initrd.img-2.6.32-5-amd64
Found duplicate PV c1Evvwvx3ZfBwDWRyhhI0nY864wtPZ3o: using /dev/dm-11 
 not /dev/dm-0
 Found Debian GNU/Linux (squeeze/sid) on /dev/sda2 [my rescue system]
 done
 
 # blkid | grep Evv
 /dev/mapper/md1_crypt: UUID=c1Evvw-vx3Z-fBwD-WRyh-hI0n-Y864-wtPZ3o 
 TYPE=LVM2_member
 /dev/mapper/vg-md1dm0: UUID=c1Evvw-vx3Z-fBwD-WRyh-hI0n-Y864-wtPZ3o 
 TYPE=LVM2_member
 
 # l /dev/mapper/
 insgesamt 0
 crw--- 1 root root 10, 59 14. Sep 20:59 control
 lrwxrwxrwx 1 root root  8 14. Sep 20:59 md1_crypt - ../dm-11
 lrwxrwxrwx 1 root root  8 14. Sep 20:59 md2_crypt - ../dm-12
 lrwxrwxrwx 1 root root  7 14. Sep 20:53 vg-md1dm0 - ../dm-0
 
 Perhaps this is the source of confusion? Identical UUIDs for the 
 encrypted RAID1 pv and the vg that emerges when the pv has been unlocked 
 with cryptsetup? This is the configuration on the running system on 
 which md1_crypt and the vg had been unlocked and started manually. Do I 
 have to remove one symlink, either to dm-0 or to dm-11 in order to 
 create a functioning initramdisk? I had to unlock md1_crypt twice, once 
 from within busybox and once after exiting lvm and busybox.

3. I don't know much about LVM. I tend to think that the
   identical UUIDs might actually be correct - but I may be wrong here.

   It would be very helpful if you could give a short overview over your
   block devices and how the work together (a drawing would be great).
   Please include everything from the physical disks, physical and 
   logical partitions, RAID, LVM, CRYPTO up to the FS level. Please
   also include the UUIDs in this.

   Finally the complete output of `blkid' would be great.

Please excuse me if I'm asking for information you have already provided
- the bug report is just quite long by now and I might have missed it.
If this is the case, just tell me.

Best regards

Alexander Kurtz

[1] http://release.debian.org/migration/testing.pl?package=mdadm


signature.asc
Description: This is a digitally signed message part


Bug#594472: grub-pc: scary messages and very long boot time after upgrade: proposal for solution

2010-09-17 Thread Alexander Kurtz
Hi everybody,

I spent the last hour re-reading the entire bug report, testing the new
mdadm version and testing a way to restore the system using a live CD.
Here's what I found:

 * I am really sure that this is not a GRUB bug. You all get to the 
   initramfs. That's where problems start. GRUB is innocent here.

 * I am quite sure now that you all have been bitten by mdadm bug 
   #583917[1] and friends. The symptoms are quite unique (loads of 
   /sys/devices/virtual/block/md0 messages and high/endless disk 
   activity). Look here[2] for a good explanation of what happens.

   This bug was fixed in mdadm 3.1.4-1+8efb9d1 which just migrated to 
   testing/squeeze[3]. I verified that with this version my system 
   boots fine, even without the workaround[4].

So the important part is how to get your systems back online.
Here's what you can do, if your system is still not booting (you might
want to print this out):

1. Get the current Debian Live CD[5]
32 bit: 
http://cdimage.debian.org/cdimage/squeeze_live_alpha2/i386/iso-hybrid/debian-live-60alpha2-i386-standard.iso
64 bit: 
http://cdimage.debian.org/cdimage/squeeze_live_alpha2/amd64/iso-hybrid/debian-live-60alpha2-amd64-standard.iso
   burn it to a CD/DVD or write it to a USB drive using dd (if your 
   machine can boot from USB) and boot the live system (note that 
   you'll get a US keyboard layout first, this[6] might be helpful)

2. Get root and install the required tools
sudo su
apt-get update
apt-get install console-data cryptsetup less lvm2 mdadm

3. Configure the keyboard layout (if necessary)
dpkg-reconfigure console-data

4. Start your RAID arrays if not yet done. See man mdadm.

5. Start your LVM VGs (if any). See man lvm.

6. Load the dm_crypt kernel module using
modprobe dm_crypt
   and open your crypto devices (see man cryptsetup), e.g.
cryptsetup luksOpen /dev/mapper/lv0 root

By now all your systems block devices should be available and useable.

7. Mount your system to /mnt, e.g.
mount /dev/mapper/root /mnt
mount /dev/md0 /mnt/boot
...

8. Bind-mount the virtual file systems:
mount -o bind /dev /mnt/dev
mount -o bind /dev/pts /mnt/dev/pts
mount -o bind /proc/mnt/proc
mount -o bind /sys /mnt/sys

9. Chroot into your main system
chroot /mnt

10. Update the required tools
apt-get update
apt-get install cryptsetup lvm2 mdadm
Ensure that you have mdadm v3.1.4:
mdadm --version

11. Check your mdadm configuration
/usr/share/mdadm/mkconf
If the output seems sane, write it to disk
/usr/share/mdadm/mkconf  /etc/mdadm/mdadm.conf

12. Carefully check whether the contents of /etc/fstab 
and /etc/crypttab are correct and up to date.

13. On my system mdadm didn't create the necessary links 
under /dev/md/. Check if they are *all* there
ls -l /dev/md/
If some links are missing, create them manually, e.g.
ln -s /dev/md0 /dev/md/0
See the mdadm.conf you just generated for the exact names.

14. Now you should be able to recreate the initramfs and update grub
update-initramfs -u
update-grub
This should work now without any errors.

15. Exit the chroot and reboot
exit
init 6

16. Check if your system boots now. If so, then run
update-initramfs -u
update-grub
again from the main system and reboot one last time.

I hope that you'll be able to repair your systems with that. Please
report any success or failure (Which part of the above fails? What error
messages are shown?)!

Hope this helps!

Alexander Kurtz

[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583917
[2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=585015#45
[3] http://release.debian.org/migration/testing.pl?package=mdadm
[4] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594418#25
[5] http://live.debian.net/ 
[6] 
http://upload.wikimedia.org/wikipedia/commons/5/51/KB_United_States-NoAltGr.svg



signature.asc
Description: This is a digitally signed message part


Bug#594472: grub-pc: scary messages and very long boot time after upgrade

2010-09-14 Thread Alexander Kurtz
Am Dienstag, den 14.09.2010, 21:28 +0200 schrieb Andreas von Heydwolff:
My /etc/crypttab reads
 
 md1_crypt UUID=3a10eb55-2dd8-4846-97e5-74649abf234f none luks
 md2_crypt UUID=e78a6bea-cafb-41a7-89e9-03e999b38d6c none luks

Just some thoughts: What happens if you

 * try `/dev/disk/by-uuid/' instead of `UUID=' 
 * try the raw devices (presumably /dev/md1 and /dev/md2)
 * try the symlinks to the devices (presumably /dev/md/1 and /dev/md/2)
   (note that you *might* need the new mdadm version for that to work)

I remember trying the `UUID=' way myself some time ago and that didn't
work, however `/dev/disk/by-uuid/' did.

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#594472: grub-pc: scary messages and very long boot time after upgrade

2010-09-14 Thread Alexander Kurtz
Am Dienstag, den 14.09.2010, 23:01 +0200 schrieb Toni Mueller:
 since I really need my machine now, I didn't yet dare to reboot. I also
 don't understand the issue too well, but simply want to contribute my
 data for comparison.
Explanation: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=585015#45

 I guess that this 'Generating udev events...' messages comes from
 mdadm's postinst?
No, it comes from the init script (/etc/init.d/mdadm-raid).

 Mine looks like this:
 
 $ cat /etc/crypttab 
 md1_crypt /dev/md1 none luks
 $
That looks ok to me.

 I can't confirm this one:
 
 # pvscan
   PV /dev/dm-0   VG ev0   lvm2 [931.32 GiB / 0free]
   Total: 1 [931.32 GiB] / in use: 1 [931.32 GiB] / in no VG: 0 [0   ]
 #

I think, you should really try whether upgrading mdadm to version
3.1.4-1+8efb9d1 helps.

You may want to rebuild the initramfs manually (run `update-initramfs
-u' as root) to _ensure_ that you are actually using the new mdadm.

You may also want to update grub (run `update-grub' as root) to _ensure_
that you are actually using the new initramfs.

Best regards

Alexander Kurtz

PS: Having a Live-CD/USB at hand is always useful if things break. Have
a look at http://live.debian.net/ . Ubuntu should also work.



signature.asc
Description: This is a digitally signed message part


Bug#596698: webkit 1.2.4-1 FTBFS on mipsel

2010-09-13 Thread Alexander Kurtz
Source: webkit
Version: 1.2.4-1
Severity: serious

Hi,

webkit 1.2.4-1 FTBFS on mipsel[1] with this error:

[...]

/bin/mkdir -p ./.deps/DerivedSources
  CXXLD  libJavaScriptCore.la
  CXXLD  TestNetscapePlugin/libtestnetscapeplugin.la
  CXXLD  Programs/jsc
  CXXLD  libwebkit-1.0.la
  CCLD   Programs/minidom
collect2: ld terminated with signal 9 [Killed]
make[2]: *** [libwebkit-1.0.la] Error 1
make[2]: Leaving directory 
`/build/buildd-webkit_1.2.4-1-mipsel-BevWyR/webkit-1.2.4/build'
make[1]: *** [all] Error 2
make[1]: Leaving directory 
`/build/buildd-webkit_1.2.4-1-mipsel-BevWyR/webkit-1.2.4/build'
make: *** [build-stamp] Error 2
dpkg-buildpackage: error: debian/rules build gave error exit status 2

[...]

The full build log is available at [2]. This blocks the migration to
testing[3] which would fix some security issues[4].

Best regards

Alexander Kurtz

[1] https://buildd.debian.org/status/package.php?p=webkit
[2] 
https://buildd.debian.org/fetch.cgi?pkg=webkitarch=mipselver=1.2.4-1stamp=1283821607file=logas=raw
[3] http://release.debian.org/migration/testing.pl?package=webkit
[4] 
http://packages.debian.org/changelogs/pool/main/w/webkit/webkit_1.2.4-1/changelog


signature.asc
Description: This is a digitally signed message part


Bug#594472: grub-pc: scary messages and very long boot time after upgrade

2010-09-06 Thread Alexander Kurtz
Am Donnerstag, den 26.08.2010, 11:07 +0200 schrieb Toni Mueller: 
 After several (5?) minutes where the machine didn't do anything I was
 able to see, the screen was suddenly flushed with a large number of
 messages like:
 
   /sys/devices/virtual/block/md0 (10715)
   /sys/devices/virtual/block/md1 (10716)
   /sys/devices/virtual/block/md0 (10717)
   /sys/devices/virtual/block/md1 (10718)
   /sys/devices/virtual/block/md0 (10719)
   /sys/devices/virtual/block/md1 (10720)
   /sys/devices/virtual/block/md0 (10721)
 Unlocking the disk /dev/md1 (md1_crypt)
 Enter the passphrase:

Am Samstag, den 28.08.2010, 23:58 +0200 schrieb Andreas v. Heydwolff:
 Then I tried to boot, GRUB came up, the mds were started, and
 
   /sys/devices/virtual/block/md0 (numbers in the high 5000s here)
 
 scrolled by for all 3 arrays. The passphrase was entered and the machine
 just remained stuck with the single server case hdd activity light on all the 
 time, both with a regular boot and a rescue mode boot, so I never got
 past the passphrase promt.

Am Sonntag, den 29.08.2010, 02:35 +0200 schrieb Agustin Martin:
 May this be related to #583917,  mdadm: long delay (6-200 minutes)
 during boot (root device detection) after upgrade on RAID/LVM/LUKS
 setup?

Am Samstag, den 04.09.2010, 04:22 +0100 schrieb Darren:
 upgrading to mdadm 3.1.4-1+8efb9d1 from sid solved my boot problems.
 That is for both, the VM I set up for testing, as well as my base PC.
 Both are booting fine now.


This *might* indeed be a duplicate of #594418:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594418

Best regards

Alexander Kurtz 


signature.asc
Description: This is a digitally signed message part


Bug#589836: mdadm: breaks initramfs on fresh (chroot) installation

2010-08-29 Thread Alexander Kurtz
Am Montag, den 16.08.2010, 07:27 +0200 schrieb martin f krafft: 
 Thanks. FYI, I plan to push 3.1.3 soon and will try to get a release
 exception for that too.
The current git version appears to be missing the fix for this bug: 

http://git.debian.org/?p=pkg-mdadm/mdadm.git;a=blob;f=debian/initramfs/hook
Just ignore me if I'm wrong...

Alexander Kurtz 


signature.asc
Description: This is a digitally signed message part


Bug#594418: confirming that 3.0.3-2 is not affected by #594418

2010-08-25 Thread Alexander Kurtz
Hi,

after adding

deb http://snapshot.debian.org/archive/debian/20100824T210238Z/ squeeze 
main

to my `sources.list' and downgrading mdadm to version 3.0.3-2 I can now
confirm that this version is not affected by the bug (booting works
without any problems).

Best regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#594418: /sbin/mdadm --detail --export $tempnode seems to be the culprit

2010-08-25 Thread Alexander Kurtz
Hi,

after a little trial-and-error I now know that (for me) this is the
difference between a non-bootable system (for symptoms see my initial
mail) and a bootable one:

$ diff -u 3.1.2-2.1/lib/udev/rules.d/64-md-raid.rules 
/lib/udev/rules.d/64-md-raid.rules 
--- 3.1.2-2.1/lib/udev/rules.d/64-md-raid.rules 2010-08-25 
23:30:07.814576367 +0200
+++ /lib/udev/rules.d/64-md-raid.rules  2010-08-25 23:47:46.300056953 
+0200
@@ -21,7 +21,7 @@
 ATTR{md/array_state}==|clear|inactive, GOTO=md_end
 LABEL=md_ignore_state
 
-IMPORT{program}=/sbin/mdadm --detail --export $tempnode
+#IMPORT{program}=/sbin/mdadm --detail --export $tempnode
 ENV{DEVTYPE}==disk, ENV{MD_NAME}==?*, 
SYMLINK+=disk/by-id/md-name-$env{MD_NAME}, OPTIONS+=string_escape=replace
 ENV{DEVTYPE}==disk, ENV{MD_UUID}==?*, 
SYMLINK+=disk/by-id/md-uuid-$env{MD_UUID}
 ENV{DEVTYPE}==disk, ENV{MD_DEVNAME}==?*, 
SYMLINK+=md/$env{MD_DEVNAME}

This seems logical since:

a) There were no changes to /lib/udev/rules.d/64-md-raid.rules 
   between 3.0.3-2 and 3.1.2-2.1:

$ md5sum 3.0.3-2/lib/udev/rules.d/64-md-raid.rules 
3.1.2-2.1/lib/udev/rules.d/64-md-raid.rules 
4a574fcd059040d33ea18a8aa605a184  
3.0.3-2/lib/udev/rules.d/64-md-raid.rules
4a574fcd059040d33ea18a8aa605a184  
3.1.2-2.1/lib/udev/rules.d/64-md-raid.rules

   However the older version works fine, see my previous mail. So it 
   makes sense that line causing the problems is the one actually 
   calling the (changed) mdadm binary.

b) This command is what I saw in `top', see `screen7.jpg' from my 
   initial mail.

Any thoughts on this?

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#594418: Confirming that adding `mkdir -p /lib/init/rw' fixes the problem

2010-08-25 Thread Alexander Kurtz
Am Donnerstag, den 26.08.2010, 07:57 +1000 schrieb Neil Brown:
 I'm fairly sure this is a known bug which is fixed in 3.1.3 which has just
 been released in Debian (I think).
Unfortunately that has not happened yet[1].

 If you repeat your experiment with init=/bin/sh, and
mkdir -p /lib/init/rw
 before starting udev, I think you will find that it works better.
Yes this actually fixes the problem. I am using this as a workaround now
until 3.1.3 is available in Debian:

$ diff -u /usr/share/initramfs-tools/scripts/local-top/mdadm 
/etc/initramfs-tools/scripts/local-top/mdadm 
--- /usr/share/initramfs-tools/scripts/local-top/mdadm  2010-08-14 
17:34:00.0 +0200
+++ /etc/initramfs-tools/scripts/local-top/mdadm2010-08-26 
00:41:11.307448188 +0200
@@ -1,4 +1,5 @@
 #!/bin/sh
+mkdir -p /lib/init/rw
 #
 # Copyright © 2006-2008 Martin F. Krafft madd...@debian.org
 # based on the scripts in the initramfs-tools package.

Thank you very much for your help!

Alexander Kurtz

[1] http://packages.debian.org/search?keywords=mdadm



signature.asc
Description: This is a digitally signed message part


Bug#591215: warzone2100: version 2.3.4 fixes remaining issues

2010-08-13 Thread Alexander Kurtz
Hi,

warzone2100 2.3.4 fixes some remaining issues[1]. However, I am not
reopening this bug since 2.3.3 won't migrate to testing anyway due to
the freeze[2].

Best regards

Alexander Kurtz

[1] http://wz2100.net/news/6163
[2] http://packages.qa.debian.org/w/warzone2100.html


signature.asc
Description: This is a digitally signed message part


Bug#591366: ufraw depends on libexiv2-4

2010-08-02 Thread Alexander Kurtz
Hmmm, on my system ufraw works fine... probably because it doesn't link
against libexiv2.so.4 but against libexiv2.so.9:

 $ ldd /usr/bin/ufraw | grep exiv
libexiv2.so.9 = /usr/lib/libexiv2.so.9 (0x7f9ba2d17000)

This seems to match the packages dependencies[1]. Looking at [2] I just
saw that the only ufraw version currently in squeeze which is depending
on libexiv2-4 is the m68k version (that arch isn't supported anymore
AFAIK).

So could you make sure that you haven't accidentally missed some
updates? Or are you using m68k? ;-)
I'm asking this because your kernel version suggests that your system
isn't up to date.

If that doesn't help, please provide the output of these commands:

 dpkg -l ufraw

 ldd /usr/bin/ufraw

 apt-cache showpkg ufraw

Please also mention if you're using any third-party repositories (your
sources.list would be helpful in that case).

Best regards

Alexander Kurtz

[1] http://packages.debian.org/squeeze/ufraw
[2] http://packages.debian.org/sid/ufraw


signature.asc
Description: This is a digitally signed message part


Bug#591215: warzone 2.3.2 has serious issues, should not migrate to testing, wait for 2.3.3

2010-08-01 Thread Alexander Kurtz
Package: warzone2100
Severity: serious
Version: 2.3.2-1

Hi,

according to upstream warzone 2.3.2 has serious issues[1], they
therefore recommend to use 2.3.1 until 2.3.3 is out. This bug blocks
2.3.2 from migrating to testing.

Please feel free to close this bug if you think it is appropriate.

Best regards

Alexander Kurtz

[1] http://wz2100.net/news/6047


signature.asc
Description: This is a digitally signed message part


Bug#591232: network-manager uninstall should not deactivate network

2010-08-01 Thread Alexander Kurtz
fixed 591232 0.8.0.999-1
tag 591232 confirmed
severity 591232 important
thanks

Hi,

I investigated this problem in a VM. Here's what I found:

Test time   | Network-Manager Version | Network connection is configured by
| | /etc/network/interfaces | 
Network-Manager
+-+-+
after install   | 0.6.6-3 (lenny) | connection is recreated | 
connection is recreated
after remove| 0.6.6-3 (lenny) | connection is down  | 
connection is down
after install   | 0.8.0.999-1 (squeeze)   | connection is untouched | 
connection is recreated
after remove| 0.8.0.999-1 (squeeze)   | connection is untouched | 
connection is untouched

So my conclusions are:

 a) Network-Manager does indeed have the described bug (connection down 
after removal).

 b) The connection is also down after removal even if it was configured 
manually.

 c) a) and b) only apply to the version in lenny, the NM version in 
squeeze seems to behave in a sensible way

 d) The package description clearly says that Network Manager

 is intended only for the desktop use-case, and is not intended
  for usage on servers

Therefore you should expect things to break if you have it installed
on a server. If you want to install Gnome on your server do a 
standard (non-graphical) install and then use

 apt-get install gnome network-manager-

This will install gnome without NM.

I have changed the bug report according to the above. If you or the
maintainer think that is wrong, feel free to revert the changes.

Best regards

Alexander


signature.asc
Description: This is a digitally signed message part


Bug#590961: libao4: Please raise suggestions to depencies, breaks other software otherwise

2010-07-30 Thread Alexander Kurtz
Package: libao4
Version: 1.0.0-4
Severity: serious
Justification: Breaks other software

Hi,

since version 2.30 brasero[1] (a graphical burning program) explicitly
checks the versions of the third-party tools it is using[2]; among these
is cdrdao[3] (Disk-At-Once recorder). Normally this looks like this:

 $ cdrdao version | sed 's/^/STDIN:/g'
 Cdrdao version 1.2.3 - (C) Andreas Mueller andr...@daneb.de

 (As you can see everything goes to stderr)

Now if libaudio2[4] is not installed it looks like this:

 $ cdrdao version | sed 's/^/STDIN:/g'
 ERROR: Failed to load plugin /usr/lib/ao/plugins-4/libnas.so = dlopen() failed
 Cdrdao version 1.2.3 - (C) Andreas Mueller andr...@daneb.de

This is because /usr/lib/ao/plugins-4/libnas.so links against
libaudio.so.2 which is provided by libaudio2. As a consequence brasero
can't parse the cdrdao version string anymore (see [5]) and thus fails
to recognize it correctly which results in audio disc creation being
disabled.

Now most users won't see this error because some other package pulled in
libaudio2, but if not, unrelated things like brasero will break.

This problem is not limited to libaudio2 but also affects the other
suggestions. If I install cdrdao in a fresh chroot set up by debootstrap
I get this:

 $ cdrdao version | sed 's/^/STDIN:/g'
 ERROR: Failed to load plugin /usr/lib/ao/plugins-4/libalsa.so = dlopen() 
failed
 ERROR: Failed to load plugin /usr/lib/ao/plugins-4/libnas.so = dlopen() failed
 ERROR: Failed to load plugin /usr/lib/ao/plugins-4/libpulse.so = dlopen() 
failed
 ERROR: Failed to load plugin /usr/lib/ao/plugins-4/libesd.so = dlopen() failed
 Cdrdao version 1.2.3 - (C) Andreas Mueller andr...@daneb.de

Note that not only software packaged in Debian might parse such version
strings but also local programs, scripts, etc. We should therefore
prevent this error messages from screwing up things by preventing them
from being printed at all. And that can only happen by changing libao4's
suggestions[6] to depencies.

Best Regards

Alexander Kurtz

[1] http://packages.debian.org/sid/brasero
[2] 
http://git.gnome.org/browse/brasero/commit/?id=62bda5dab82ddba07b0d1af3af333860a97d39c3
[3] http://packages.debian.org/sid/cdrdao
[4] http://packages.debian.org/sid/libaudio2
[5] 
http://git.gnome.org/browse/brasero/diff/plugins/cdrdao/burn-cdrdao.c?id=62bda5dab82ddba07b0d1af3af333860a97d39c3
[6] http://packages.debian.org/sid/libao4


signature.asc
Description: This is a digitally signed message part


Bug#590393: icu: FTBFS: /usr/bin/install: cannot stat `doc/html/*.gif': No such file or directory

2010-07-28 Thread Alexander Kurtz
tags 590393 patch
thanks

Hi,

building seems to fail because there simply aren't any .gif files
generated. After applying the attached patch, the package builds
successfully.

Best Regards

Alexander Kurtz
Description: fix FTBFS because of missing .gif files, there simply aren't any.
Author: Alexander Kurtz kurtz.a...@googlemail.com
Bug: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590393

diff -Naur icu-4.4.1.orig/source/Makefile.in icu-4.4.1/source/Makefile.in
--- icu-4.4.1.orig/source/Makefile.in	2010-04-28 17:28:54.0 +0200
+++ icu-4.4.1/source/Makefile.in	2010-07-28 22:50:45.056353070 +0200
@@ -18,7 +18,7 @@
 docsubdir = $(PACKAGE)$(ICULIBDASHSUFFIX)/html
 docsubsrchdir = $(docsubdir)/search
 docfilesdir = doc/html
-docfiles = $(docfilesdir)/*.gif $(docfilesdir)/*.png $(docfilesdir)/*.html $(docfilesdir)/*.css $(docfilesdir)/*.tag $(docfilesdir)/installdox
+docfiles = $(docfilesdir)/*.png $(docfilesdir)/*.html $(docfilesdir)/*.css $(docfilesdir)/*.tag $(docfilesdir)/installdox
 docsrchdir = $(docfilesdir)/search
 docsrchfiles = $(docsrchdir)/*
 


signature.asc
Description: This is a digitally signed message part


Bug#536376: evas: Not suitable for testing yet

2010-07-24 Thread Alexander Kurtz
Hi,

Am Donnerstag, den 09.07.2009, 16:17 +0200 schrieb Albin Tonnerre: 
 Package: evas
 Version: 0.9.9.061-1
 Severity: serious
 
 The Evas API is changing frequently, and it would be better to wait until 
 it's a
 bit more stable until it goes into testing.

Since it's been over a year now I'd like to ask whether the above is
still true? Or do you think that evas is `stable enough' nowadays, so
that it could migrate to testing?

The reason I'd love to see evas in squeeze is this super-sexy
media-center called enna[1] which is blocked by this bug.

Thank you for your work!

Alexander Kurtz

[1] http://enna.geexbox.org/
[2] http://release.debian.org/migration/testing.pl?package=enna



Bug#582342: Godel and inconsistency; never will know...; system with RAID and CRYPTO

2010-07-07 Thread Alexander Kurtz
Am Dienstag, den 06.07.2010, 23:12 -0400 schrieb crop...@acm.org:
 The problem with grub and my system abruptly disappeared; for whatever reason 
 it has something to do with the MPTSAS driver, the SATA_NV driver, or the 
 bios 
 on my system.  Tinkering with my sata DVD writers vanquished the problem!
 
 [...]
 
 Computer POSTs.  Grub menu appears.  Select 2.6.32-5-amd64 and voila... the 
 machine boots without a problem.  Grub bug # 582342 seems to be no more...!?!
 
 
 
 Any further questions or comments?  Otherwise, I will be bidding adieu.

Can this bug report be closed then?

Best Regards

Alexander Kurtz


signature.asc
Description: This is a digitally signed message part


Bug#520189: nspluginwrapper does not work on kernel 2.6.26: Please downgrade severity

2010-06-11 Thread Alexander Kurtz
Ari Pollak wrote:
 Read my earlier message. There is no minimum kernel requirement of
 2.6.27 or higher for squeeze, and you can't just declare a kernel
 dependency and hope the user isn't running a lower kernel version.

You're right, but if this bug apparently only affects older kernels, it
should therefore be declared `important' (a bug which has a major
effect on the usability of a package, without rendering it completely
unusable to everyone, see [1]) instead of `serious'.

Yes nspluginwrapper might be broken under rare circumstances, but right
now, nspluginwrapper isn't available for anyone using squeeze because
this bug blocks the migration[2]. I just don't see why that is the
better alternative.

What makes the situation worse, is that Adobe stopped Flash support for
amd64 today[3], which leaves amd64 users with this choices:

 a) no flash (don't mention gnash - it's beta quality)
 b) use older Flash version (0-day vulnerability known)
 c) use nspluginwrapper

I think c) is the best solution under these circumstances, so I kindly
ask you or the maintainer to lower the severity, if there are no good
reasons against doing so.

Best Regards

Alexander Kurtz

[1] http://www.debian.org/Bugs/Developer.en.html#severities
[2] http://release.debian.org/migration/testing.pl?package=nspluginwrapper
[2] http://labs.adobe.com/technologies/flashplayer10/64bit.html


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


  1   2   >