Bug#1012789: Can you check if Img works at all?

2022-06-14 Thread Jeff Epler
Thanks for tryting LinuxCNC on aarch64. I don't know of anyone presently
using such a configuration.

As far as the "undefined symbol" message:

Please check whether in "wish", it works to "package require Img" or
whether the same error occurs. If it's the same error then may point to a
general problem between libtk-img and libtiff.

As far as the "LIBGL: Error while gathering supported extension
(eglInitialize: EGL_BAD_DISPLAY), default to none" message:

Most UIs for LinuxCNC require working OpenGL. You can try a different UI
such as tklinuxcnc, it doesn't use OpenGL and probably also doesn't use
Img. However, it's much less friendly (IMO)

Jeff


Bug#867282: live-wrapper: Lacks dependency on squashfs-tools

2017-07-05 Thread Jeff Epler
Package: live-wrapper
Version: 0.6+nmu1
Severity: serious
Justification: Policy 3.5

Dear Maintainer,

Hi.  after installing live-wrapper with --no-install-recommends, it does
not function properly, eventually issuing an error that /tmp/.../live
can not be found.  I believe that this is because it does not depend
on squashfs-tools to provide the "mksquashfs" program.

This dependency bug is often not visible, because "mksquashfs" is a
recommends, but not a depends, of vmdebootstrap.

Specifically, I created a new stretch schroot, then inside it I ran 'apt
install live-wrapper --no-install-recommends', and then 'lwr'.  The
eventual failure looked something like this:
  File "/usr/lib/python2.7/dist-packages/lwr/vm.py", line 66, in 
detect_kernels
filenames = os.listdir(os.path.join(cdroot, "live"))
OSError: [Errno 2] No such file or directory: '/tmp/tmpZDO8j6/live'

Thanks for your attention to this matter,
Jeff

-- System Information:
Debian Release: 9.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.9.0-3-rt-amd64 (SMP w/8 CPU cores; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages live-wrapper depends on:
ii  debian-archive-keyring  2017.5
ii  isolinux3:6.03+dfsg-14.1
ii  python  2.7.13-2
ii  python-apt  1.4.0~beta3
ii  python-cliapp   1.20160724-2
ii  python-distro-info  0.14
ii  python-pycurl   7.43.0-2
ii  python-requests 2.12.4-1
ii  vmdebootstrap   1.7-1
ii  xorriso 1.4.6-1+b1

live-wrapper recommends no packages.

Versions of packages live-wrapper suggests:
pn  cmdtest  

-- no debconf information



Bug#750870: Proposed OpenSSL linking exception

2014-07-27 Thread Jeff Epler
In the thread ITP: libressl, the OpenSSL linking exception was
discussed.  This is of great interest to people who would think that
LibreSSL may be a long-term viable fork of OpenSSL, because many
statements of the OpenSSL exception do not explicitly to permit linking
with modified and/or renamed versions of OpenSSL.  It would be better if
their wording did explicitly permit this.

However, as Joey Hess noted, in practice Debian already treats any
OpenSSL linking exception as allowing linking of Debian's modified
version of OpenSSL.
[summarizing https://lists.debian.org/debian-devel/2014/07/msg00564.html]

In any case, your upstream might consider this exception, which can be
found in at least wget and GnuPG:
| In addition, as a special exception, copyright holder gives permission to
| link the code of project with the OpenSSL project's OpenSSL library (or
| with modified versions of it that use the same license as the OpenSSL
| library), and distribute the linked executables. You must obey the GNU General
| Public License in all respects for all of the code used other than OpenSSL.
| If you modify this file, you may extend this exception to your version of the
| file, but you are not obligated to do so. If you do not wish to do so, delete
| this exception statement from your version.
[from http://mid.gmane.org/20140722013130.GA14673%40gauss.olasd.eu]

Jeff


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#628383: [kfreebsd-*] test failure: test-secmem

2014-05-18 Thread Jeff Epler
Apparently freebsd kernels 9.2 and later have
security.bsd.unprivileged_mlock, which appears to default to permitted.  
http://www.freebsd.org/cgi/man.cgi?query=mlocksektion=2manpath=FreeBSD+9.2-RELEASE
http://marc.info/?l=freebsd-archm=134617193210756

Is this test failure happening with kernel 9.2?  I can't see that in the
buildd logs.  I only have a 9.0 kernel to test on...

Jeff


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#707733: pygobject: FTBFS on kfreebsd

2013-05-14 Thread Jeff Epler
Another bug that may be similar: 
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=671785

In that bug I remark that a problem with pthread_mutex_unlock can be
observed on linux with valgrind --tool=helgrind.  I haven't tried to
determine whether it's a similar problem here, but it might be worth
valgrinding it on Linux. (unfortunately I can't do this at the moment;
if I get a chance I'll report the results here)

Jeff


signature.asc
Description: Digital signature


Bug#701832: doxygen consistently segfaults on kfreebsd-i386 when building opendnssec documentation

2013-03-04 Thread Jeff Epler
On Sun, Mar 03, 2013 at 12:20:57PM +, Steven Chamberlain wrote:
  #5  0x000800d21f2c in *__GI___libc_free (mem=optimized out) at 
  malloc.c:3736
  ar_ptr = 0x800ff3240
  p = optimized out
  #6  0x000800844a79 in gvFreeContext () from /usr/lib/libgvc.so.5
  No symbol table info available.
  #7  0x00400fd8 in ?? ()
  No symbol table info available.
  #8  0x00080389bf04 in __pthread_sighandler

As many of you are probably aware, it's not permitted in POSIX to call free()
in signal handler context without some additional guarantees about what the
interrupted function may be.
http://pubs.opengroup.org/onlinepubs/9699919799/functions/V2_chap02.html
(search for async-signal-safe)

It looks like this is what will happen when sending ctrl-c, though.
That's why a hang can be provoked in this way.

static void intr(int s)
{
/* if interrupted we try to produce a partial rendering before exiting */
if (G)
gvRenderJobs(Gvc, G);
/* Note that we don't call gvFinalize() so that we don't start event-driven
 * devices like -Tgtk or -Txlib */
exit (gvFreeContext(Gvc));
}
... and in main():
signal(SIGINT, intr);

for that matter, whatever gvRenderJobs is intended to do is likely hard
to guarantee to be only doing async-signal-safe things (let alone things that
are data-structure safe).  Indeed, I got a sigsegv when sending SIGINT exactly
when the first free inside gvLayoutJobs is holding the lock:

Breakpoint 3, 0x000800843b50 in gvLayoutJobs () from /usr/lib/libgvc.so.5
(gdb) ena 2
(gdb) c
Continuing.

Breakpoint 2, *__GI___libc_free (mem=0x61d940) at malloc.c:3736
3736in malloc.c
(gdb) signal 2
Continuing with signal SIGINT.

Program received signal SIGSEGV, Segmentation fault.
0x000800867778 in ?? () from /usr/lib/libgvc.so.5
(gdb) where
#0  0x000800867778 in ?? () from /usr/lib/libgvc.so.5
#1  0x000800870811 in ?? () from /usr/lib/libgvc.so.5
#2  0x000800873efd in emit_graph () from /usr/lib/libgvc.so.5
#3  0x000800875c9a in gvRenderJobs () from /usr/lib/libgvc.so.5
#4  0x00400fcc in ?? ()
#5  0x00080389bf04 in __pthread_sighandler (signo=6550134, _code=0, 
_sg=0x80063f276, ctx=0xa) at sighandler.c:39
#6  0x7083 in ?? ()
#7  0x00080389be60 in ?? () at internals.h:545
   from /lib/x86_64-kfreebsd-gnu/libpthread.so.0
#8  0x in ?? ()

possibly getting the segv is more common than the hang?  I haven't managed to
get the hang once using this break-and-signal-in-gdb methodology (amd64
kfreebsd sid/wheezy).

Jeff


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698102: eglibc: initgroups changes egid on kfreebsd

2013-01-29 Thread Jeff Epler
Michael,

For now it sounds like there's no consensus that this is a bug in
initgroups(3) in eglibc or setgroups(2) in kfreebsd.

If you're aware of this leading to a bug in a specific Debian package
(particularly if it is a bug with a security impact), please file a bug
against that package.

Jeff


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#698102: eglibc: initgroups changes egid on kfreebsd

2013-01-27 Thread Jeff Epler
I've reworked the test program as follows:

#include stdio.h
#include stdlib.h
#include unistd.h

#define NGROUPS 32

void call() {
gid_t groups[NGROUPS];


int ngroups = getgroups(NGROUPS, groups), i;
printf(gid = %d egid = %d  groups =, (int) getgid(), (int) 
getegid());
for(i =0; i ngroups; i++) printf( %d, (int) groups[i]);
printf(\n);
}

int main(void) {
gid_t groups[] = {1, 2};
call();
setgroups(2, groups);
call();
setgid(groups[0]);
call();
setuid(groups[0]);
call();
}

now the dependence on glibc initgroups() is removed.

On FreeBSD and kFreeBSD, the first group passed to setgroups becomes the
effective group ID.  On Linux, it does not:

kfreebsd# gcc test.c  ./a.out
gid = 0 egid = 0  groups = 0
gid = 0 egid = 1  groups = 1 2
gid = 1 egid = 1  groups = 1 2
gid = 1 egid = 1  groups = 1 2

freebsd9chroot# gcc test.c  ./a.out
gid = 0 egid = 0  groups = 0
gid = 0 egid = 1  groups = 1 2
gid = 1 egid = 1  groups = 1 2
gid = 1 egid = 1  groups = 1 2

linux# gcc test.c sudo ./a.out
gid = 0 egid = 0  groups = 0
gid = 0 egid = 0  groups = 1 2
gid = 1 egid = 1  groups = 1 2
gid = 1 egid = 1  groups = 1 2

The original program in freebsd9chroot (modified to use a different
username):
# ./a.out
pw_name=jepler
pw_uid=1001
pw_gid=1001
uid=0(root) gid=0(wheel) groups=0(wheel)
uid=0(root) gid=0(wheel) egid=1001(jepler) groups=1001(jepler),5(operator)
uid=0(root) gid=0(wheel) egid=1001(jepler) groups=1001(jepler),5(operator)
uid=1001(jepler) gid=1001(jepler) groups=1001(jepler),5(operator)

Unfortuantely, POSIX declined to specify setgroups() and initgroups() is
not in any standard, so it's hard to say which behavior is right and
which is wrong.  It seems possible to argue any of the following:

 1. The bug is in kFreeBSD's implementation of setgroups(), which must
be fixed so that eglibc's initgroups() implementation works as
expected.

 2. The bug is in eglibc's implementation of initgroups(), which must be
fixed so that it works properly with kFreeBSD's setgroups().

 3. Since both behaviors of setgroups() and initgroups() are seen in
the wild, programs that depend on the linux kernel behavior are
broken and should be fixed as they become known.

Personally I'm leaning towards 3 here, since these are buggy not only on
debian/kFreeBSD but on real FreeBSD as well.

Jeff


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#685625: libgeom: may cause segfault of grub-probe

2012-12-29 Thread Jeff Epler
If it's a question of minimal impact to fix the specific crash that
grub-probe encounters, then there are two more minimal ways to fix this
specific problem that come to mind:

replace reallocf with realloc---but in the unlikely case that realloc
fails, it doesn't deallocate the argument (this is the point of
reallocf)

explicitly declare reallocf instead of using the bsd/ header:
void *reallocf(void *, size_t)

however, I don't think either of these is better than the approach I
originally proposed, to add a #include directive that matches the one in
the reallocf manpage that debian ships.

(dropping the -Werror= flag addition would of course make it a bit more
minimal; it might avoid an FTBFS in the future, but if it's an FTBFS
that would point right at another crashing bug, well, it might be a
bonus rather than a detriment to FTBFS)

Being unfamiliar with the culture and practices of Debian, I can't speak
to whether a more invasive ('overlay') approach is appropriate or not in
light of the present freeze, but it seems that Guillem Jover has
concerns about doing that at this moment.

The machine where I originally encountered the trouble isn't yet in
production, so if there's an alternate fix proposed soon I'll be happy
to test it out.  On the other hand, I think the presence or absence of
the implicit declaration warning is enough to indicate whether the bug
is present under any given fix...

Jeff


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#685625: implicit declaration of function ‘reallocf’

2012-12-21 Thread Jeff Epler
[snipped astute observations about the size of the xml data being important]

On Fri, Dec 21, 2012 at 10:02:45PM +, Steven Chamberlain wrote:
 And I'm worried about some of the other packages mentioned, where the
 error shows on kfreebsd-* or maybe hurd-*, but not on other arches.
 Should they really all be doing this:
 
  ++#include bsd/stdlib.h
 
 Or should we be trying to fix this elsewhere, in GNU/kFreeBSD headers maybe?

I don't know the right fix.  I chose to #include bsd/stdlib.h because the
manpage (on debian-kFreeBSD) lists that as the proper header:

debian-kFreeBSD$ man reallocf
MALLOC(3)BSD Library Functions ManualMALLOC(3)

NAME
 reallocf — general purpose memory allocation functions

LIBRARY
 Utility functions from BSD systems (libbsd, -lbsd)

SYNOPSIS
 #include bsd/stdlib.h

 void *
 reallocf(void *ptr, size_t size);

I notice now that the guidance in the FreeBSD project's manpage is to simply
include stdlib.h for the declaration of reallocf:
http://www.freebsd.org/cgi/man.cgi?query=reallocf

Unless you were going to put reallocf in eglibc I don't think you want it in
stdlib.h, since on debian-kFreeBSD use of reallocf will result in a link
error without -lbsd.

You can't simply make the bsd header be included via #include stdlib.h, as
-I/usr/include/bsd on the gcc commandline leads to a recursive inclusion error.

Jeff


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org