Bug#1072963: jpeg-xl: Failing autopkgtests on non-amd64

2024-06-11 Thread Julian Wollrath
Am Di, 11 Jun 2024 13:22:29 +0100
schrieb Simon McVittie :

> On Tue, 11 Jun 2024 at 13:28:52 +0200, Chris Hofstaedtler wrote:
> > Maybe smcv can chime in here.
>
> [...]
> > I think there is a better way than running a
> > postinst script in each individual package (triggers?).
>
> Yes, there is a better way, and it is triggers.
>
> libgdk-pixbuf-2.0-0 registers a trigger on
> /usr/lib/MULTIARCH/gdk-pixbuf-2.0/2.10.0/loaders which should result
> in it automatically running
> /usr/lib/MULTIARCH/gdk-pixbuf-2.0/gdk-pixbuf-query-loaders
> every time a package that provides a gdk-pixbuf loader is installed,
> removed or updated.
>
> As a result, a jpeg-xl loader for gdk-pixbuf should not need to do
> anything special in its postinst at all: it should install a loader
> that matches the naming convention set by gdk-pixbuf, and that should
> be enough for the gdk-pixbuf packaging to handle the rest. If the
> trigger is not sufficient, please report a bug with
> steps-to-reproduce.
>
> The naming convention is ${gdk_pixbuf_moduledir}/*.so, where
> ${gdk_pixbuf_moduledir} should be discovered at build-time from
> the gdk-pixbuf-2.0 pkgconf module. Hopefully the upstream build system
> already does this correctly.
>
> heif-gdk-pixbuf from src:libheif, librsvg2-common from src:rsvg, and
> webp-pixbuf-loader from src:webp-pixbuf-loader might be good examples
> of a working gdk-pixbuf loader.
>
> heif-gdk-pixbuf and webp-pixbuf-loader do not seem to have any
> hand-written code in their postinsts at all, so they completely rely
> on gdk-pixbuf's triggers, and that seems to work fine in practice.

Thank you for the explanation. Then the postinst/postrm scripts can be
dropped, since the trigger triggers.


Cheers,
Julian

--
 ()  ascii ribbon campaign - against html e-mail
 /\- against proprietary attachments



Bug#1072963: jpeg-xl: Failing autopkgtests on non-amd64

2024-06-11 Thread Julian Wollrath
Am Di, 11 Jun 2024 13:28:52 +0200
schrieb Chris Hofstaedtler :

> On Tue, Jun 11, 2024 at 01:04:06PM +0200, Julian Wollrath wrote:
> > > > Specifically, the problem is that
> > > > debian/libjxl-gdk-pixbuf.postinst and
> > > > debian/libjxl-gdk-pixbuf.postrm have hardcoded the amd64
> > > > architecture which means that libjxl-gdk-pixbuf is
> > > > uninstallable on architectures other than amd64.
> > >
> > > Could you comment on the above ?
> >
> > hmm, in principle that utility should be called, to make gdk-pixbuf
> > aware of the jpeg-xl loader. Maybe a workaround would be to have
> > $ cat libjxl-gdk-pixbuf.postinst
> > #!/bin/sh -e
> > for X in /usr/lib/*/gdk-pixbuf-2.0/gdk-pixbuf-query-loaders
> > do
> > if [ -x ${X} ]; then
> > ${X} --update-cache
> [..]
>
> > instead? And for libjxl-gdk-pixbuf.postrm this should also work. Or
> > is there a better way, to get the library triplet for the
> > architecture of the packet, that is being installed?
>
> https://manpages.debian.org/bookworm/debhelper/dh_installdeb.1.en.html#SUBSTITUTION_IN_MAINTAINER_SCRIPTS
> documents which tokens are available at build time to generate the
> maintscripts.

Thanks. So the path to the binary would be
/usr/lib/#DEB_TARGET_MULTIARCH#/gdk-pixbuf-2.0/gdk-pixbuf-query-loaders

>
> I've CCed smcv@, as I think there is a better way than running a
> postinst script in each individual package (triggers?). Maybe smcv
> can chime in here.

Agreed, seeing, that this is not the only available loader, a more
generic way could be cleaner.


Cheers,
Julian

>
> Chris
>



--
 ()  ascii ribbon campaign - against html e-mail
 /\- against proprietary attachments



Bug#1072963: jpeg-xl: Failing autopkgtests on non-amd64

2024-06-11 Thread Julian Wollrath
Hi,

Am Di, 11 Jun 2024 08:19:54 +0200
schrieb Mathieu Malaterre :

> Julian,
> 
> On Tue, Jun 11, 2024 at 1:06 AM Jeremy Bícha
>  wrote:
> >
> > Source: jpeg-xl
> > Version: 0.9.2-6
> > Severity: serious
> > Tags: experimental
> >
> > jpeg-xl in experimental has autopkgtests that are failing on all
> > architectures except for amd64.
> >
> > Specifically, the problem is that debian/libjxl-gdk-pixbuf.postinst
> > and debian/libjxl-gdk-pixbuf.postrm have hardcoded the amd64
> > architecture which means that libjxl-gdk-pixbuf is uninstallable on
> > architectures other than amd64.
> >
> > https://ci.debian.net/packages/j/jpeg-xl/unstable/arm64/
> >
> > https://salsa.debian.org/debian-phototools-team/libjxl/-/blob/debian/experimental/debian/libjxl-gdk-pixbuf.postinst
> >   
> 
> Could you comment on the above ?

hmm, in principle that utility should be called, to make gdk-pixbuf
aware of the jpeg-xl loader. Maybe a workaround would be to have
$ cat libjxl-gdk-pixbuf.postinst
#!/bin/sh -e
for X in /usr/lib/*/gdk-pixbuf-2.0/gdk-pixbuf-query-loaders
do
if [ -x ${X} ]; then
${X} --update-cache
fi
done
#DEBHELPER#

instead? And for libjxl-gdk-pixbuf.postrm this should also work. Or is
there a better way, to get the library triplet for the architecture of
the packet, that is being installed?


Cheers,
Julian

> 
> Thanks



-- 
 ()  ascii ribbon campaign - against html e-mail 
 /\- against proprietary attachments



Bug#1012275: closing 1012275

2022-06-06 Thread Julian Wollrath
reopen 1012275
tags 1012275 patch


Hi,

On Sun, 05 Jun 2022 23:46:25 +0200 Christoph Anton Mitterer
 wrote:
> On Sat, 2022-06-04 at 14:42 +0200, Vincent Bernat wrote:
> > Unfortunately, Firefox is not buildable due to depending on a
> > version of
> > Cargo not available in unstable.
>
> Shouldn't that be reopened then?
>
> I wouldn't be surprised if quite a number of people use the non ESR
> FF, probably also DDs/DMs.
>
> And because of rust deps, it seems to happen more often now, that
> security critical upgrades cannot enter unstable. (And yes I'm well
> aware, that unstable has no official security support, but still).

I am not sure though why the packaging requires a newer cargo version
then available from unstable and not just a newer rustc version, I
tried lowering the required version (see patch below) and it builds
just fine for me.


Cheers,
Julian


Patch:

diff -upNr a/debian/control b/debian/control
--- a/debian/control2022-05-31 23:07:37.0 +0200
+++ b/debian/control2022-06-06 13:50:48.239713566 +0200
@@ -28,7 +28,7 @@ Build-Depends: autotools-dev,
yasm,
nasm (>= 2.14) [amd64 i386],
rustc (>= 1.59),
-   cargo (>= 0.60),
+   cargo (>= 0.57),
llvm-dev,
libclang-dev,
clang,
diff -upNr a/debian/control.in b/debian/control.in
--- a/debian/control.in 2022-05-31 23:04:04.0 +0200
+++ b/debian/control.in 2022-06-06 13:51:17.093109680 +0200
@@ -51,9 +51,9 @@ Build-Depends: autotools-dev,
rustc (>= 1.59),
 %endif
 %if DIST == bullseye || DIST == buster || DIST == stretch
-   cargo-mozilla (>= 0.60),
+   cargo-mozilla (>= 0.57),
 %else
-   cargo (>= 0.60),
+   cargo (>= 0.57),
 %endif
 %if DIST == stretch
gcc-mozilla (>= 7.1),
diff -upNr a/debian/patches/debian-hacks/Lower-cargo-version.patch 
b/debian/patches/debian-hacks/Lower-cargo-version.patch
--- a/debian/patches/debian-hacks/Lower-cargo-version.patch 1970-01-01 
01:00:00.0 +0100
+++ b/debian/patches/debian-hacks/Lower-cargo-version.patch 2022-06-06 
14:13:11.030629556 +0200
@@ -0,0 +1,13 @@
+diff --git a/python/mozboot/mozboot/util.py b/python/mozboot/mozboot/util.py
+index 86720993d0..fdbf48f3ed 100644
+--- a/python/mozboot/mozboot/util.py
 b/python/mozboot/mozboot/util.py
+@@ -23,7 +23,7 @@ if sys.version_info < (3,):
+ else:
+ from urllib.request import urlopen
+
+-MINIMUM_RUST_VERSION = "1.59.0"
++MINIMUM_RUST_VERSION = "1.56.0"
+
+
+ def get_tools_dir(srcdir=False):
diff -upNr a/debian/patches/series b/debian/patches/series
--- a/debian/patches/series 2022-05-31 22:51:42.0 +0200
+++ b/debian/patches/series 2022-06-06 14:13:27.027350785 +0200
@@ -17,3 +17,4 @@ debian-hacks/Avoid-using-vmrs-vmsr-on-ar
 debian-hacks/Use-build-id-as-langpack-version-for-reproducibility.patch
 debian-hacks/Allow-to-build-with-older-versions-of-nodejs-10.patch
 debian-hacks/Fix-math_private.h-for-i386-FTBFS.patch
+debian-hacks/Lower-cargo-version.patch



--
 ()  ascii ribbon campaign - against html e-mail
 /\- against proprietary attachments



Bug#873627: fixed in udisks2 2.7.2-2

2017-08-30 Thread Julian Wollrath
Hi,

this does not fix it for me, I still get a complain:
udisksd[15752]: udisks daemon version 2.7.2 starting
udisksd[15752]: Cannot load the part plugin: The 'sgdisk' utility is
not available
udisksd[15752]: Error initializing libblockdev library: Failed to load
plugins (g-bd-init-error-quark, 0)
systemd[1]: udisks2.service: Main process exited, code=killed,
status=5/TRAP
systemd[1]: Failed to start Disk Manager.
systemd[1]: udisks2.service: Unit entered failed state.
systemd[1]: udisks2.service: Failed with result 'signal'.

It seems to me, that 'gdisk' is a non obligatory dependency too and
indeed installing 'gdisk' makes udisks2 start again.

Cheers,
Julian

On Wed, 30 Aug 2017 09:06:08 + Andreas Henriksson
 wrote:
> Source: udisks2
> Source-Version: 2.7.2-2
> 
> We believe that the bug you reported is fixed in the latest version of
> udisks2, which is due to be installed in the Debian FTP archive.
> 
> A summary of the changes between this version and the previous one is
> attached.
> 
> Thank you for reporting the bug, which will now be closed.  If you
> have further comments please address them to 873...@bugs.debian.org,
> and the maintainer will reopen the bug report if appropriate.
> 
> Debian distribution maintenance software
> pp.
> Andreas Henriksson  (supplier of updated udisks2
> package)
> 
> (This message was generated automatically at their request; if you
> believe that there is a problem with it please contact the archive
> administrators by mailing ftpmas...@ftp-master.debian.org)
> 
> 
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> Format: 1.8
> Date: Wed, 30 Aug 2017 09:36:18 +0200
> Source: udisks2
> Binary: udisks2 udisks2-doc libudisks2-0 libudisks2-dev
> gir1.2-udisks-2.0 Architecture: source
> Version: 2.7.2-2
> Distribution: unstable
> Urgency: medium
> Maintainer: Utopia Maintenance Team
>  Changed-By: Andreas
> Henriksson  Description:
>  gir1.2-udisks-2.0 - GObject based library to access udisks2 -
> introspection data libudisks2-0 - GObject based library to access
> udisks2 libudisks2-dev - GObject based library to access udisks2 -
> development files udisks2- D-Bus service to access and manipulate
> storage devices udisks2-doc - udisks2 documentation
> Closes: 873627
> Changes:
>  udisks2 (2.7.2-2) unstable; urgency=medium
>  .
>* Depend on blockdev plugins required by udisks2 core (Closes:
> #873627)
>* Add libblockdev plugins used by udisks modules to suggests
> Checksums-Sha1:
>  cda6ef6deecebaf3258d529517294050c8ab3c24 3026 udisks2_2.7.2-2.dsc
>  2b963c7e1dc87977613e229b630a2f75bbf5880e 13308
> udisks2_2.7.2-2.debian.tar.xz
> 5b33cc95f61e943b600f3e834bd4b7b547ed1db5 12795
> udisks2_2.7.2-2_amd64.buildinfo Checksums-Sha256:
> 73029bc345f07b082c96319573fb6e66dce478892862ddee48410faecb05d1f2 3026
> udisks2_2.7.2-2.dsc
> e96ad56de9baf8021cf5a1cc5d8de8e2b1f2187ee4154962da0e6aba414d0f49
> 13308 udisks2_2.7.2-2.debian.tar.xz
> 5584a9bd8816620c4a733b8162d987b5eda6a29df01814548556373209c1c8f7
> 12795 udisks2_2.7.2-2_amd64.buildinfo Files:
> 4056e291230932c7c06bd0908055a4e4 3026 admin optional
> udisks2_2.7.2-2.dsc 1d476835a887a24001edb37c490f75db 13308 admin
> optional udisks2_2.7.2-2.debian.tar.xz
> 0506a5da3e4cd9901b15f0c4b58c721a 12795 admin optional
> udisks2_2.7.2-2_amd64.buildinfo
> 



-- 
 ()  ascii ribbon campaign - against html e-mail 
 /\- against proprietary attachments



Bug#853119: texlive-luatex: basic lualatex document does not compile anymore without additionnal dependencies

2017-02-06 Thread Julian Wollrath
Hi,

sorry, this of course than can be fixed by e.g.
\usepackage[T1]{fontenc}

Cheers,
Julian

Am Mon, 6 Feb 2017 08:51:03 +0100
schrieb Julian Wollrath <jwollr...@web.de>:

> Hi Norbert,
> 
> yes, the crash is unrelated, but it was the only log I had; sorry, I
> should have used a better example. Lets make the same point I tried to
> make in a different way:
> \documentclass{article}
> 
> \usepackage[osf,sc,slantedGreek]{mathpazo}
> \linespread{1.08}
> 
> \begin{document}
> Test
> \end{document}
> 
> % cat test.log 
> This is LuaTeX, Version 0.95.0 (TeX Live 2016/Debian)
> (format=lualatex 2017.2.6)  6 FEB 2017 08:45 restricted system
> commands enabled. **test.tex
> (./test.tex
> LaTeX2e <2017/01/01>
> Lua module: luaotfload-main 2016/06/16 2.70003 OpenType layout system.
> Lua module: lualibs 2016-04-06 2.4 ConTeXt Lua standard libraries.
> Lua module: lualibs-extended 2016-04-06 2.4 ConTeXt Lua libraries --
> extended co llection.(using write
> cache: /home/wolle/.texlive2016/texmf-var/luatex-cache/gen eric)(using
> read cache: /var/lib/texmf/luatex-cache/generic /home/wolle/.texlive
> 2016/texmf-var/luatex-cache/generic) luaotfload | conf : Root cache
> directory is /home/wolle/.texlive2016/texmf-var/l
> uatex-cache/generic/names. luaotfload | init : Loading fontloader
> “fontloader-2016-06-16.lua” from kpse -resolved path
> “/usr/share/texlive/texmf-dist/tex/luatex/luaotfload/fontloader
> -2016-06-16.lua”. Lua-only attribute luaotfload@state = 1
> Lua-only attribute luaotfload@noligature = 2
> Lua-only attribute luaotfload@syllabe = 3
> luaotfload | init : Context OpenType loader version “3.023”
> Inserting `luaotfload.node_processor' at position 1 in
> `pre_linebreak_filter'. Inserting `luaotfload.node_processor' at
> position 1 in `hpack_filter'. Inserting `luaotfload.define_font' at
> position 1 in `define_font'. Lua-only attribute
> luaotfload_color_attribute = 4 luaotfload | conf : Root cache
> directory is /home/wolle/.texlive2016/texmf-var/l
> uatex-cache/generic/names. Inserting
> `luaotfload.aux.set_sscale_dimens' at position 1 in
> `luaotfload.patch_ font'. Inserting
> `luaotfload.aux.patch_cambria_domh' at position 2 in
> `luaotfload.patch _font'. Inserting `luaotfload.aux.fixup_fontdata'
> at position 1 in `luaotfload.patch_fon t_unsafe'.
> Inserting `luaotfload.aux.set_capheight' at position 3 in
> `luaotfload.patch_font '.
> Inserting `luaotfload.rewrite_fontname' at position 4 in
> `luaotfload.patch_font' .
> luaotfload | main : initialization completed in 0.105 seconds
> Babel <3.9r> and hyphenation patterns for 1 language(s) loaded.
> (/usr/share/texlive/texmf-dist/tex/latex/base/article.cls
> Document Class: article 2014/09/29 v1.4h Standard LaTeX document class
> (/usr/share/texlive/texmf-dist/tex/latex/base/size10.clo
> File: size10.clo 2014/09/29 v1.4h Standard LaTeX file (size option)
> luaotfload | db : Font names database loaded
> from /home/wolle/.texlive2016/texmf
> -var/luatex-cache/generic/names/luaotfload-names.luc(compiling
> luc: /var/lib/tex
> mf/luatex-cache/generic/fonts/otl/lmroman10-regular.luc)(load
> luc: /home/wolle/.
> texlive2016/texmf-var/luatex-cache/generic/fonts/otl/lmroman10-regular.luc))
> \c@part=\count79 \c@section=\count80 \c@subsection=\count81
> \c@subsubsection=\count82 \c@paragraph=\count83
> \c@subparagraph=\count84
> \c@figure=\count85
> \c@table=\count86
> \abovecaptionskip=\skip41
> \belowcaptionskip=\skip42
> \bibindent=\dimen102
> ) (/usr/share/texlive/texmf-dist/tex/latex/psnfss/mathpazo.sty
> Package: mathpazo 2005/04/12 PSNFSS-v9.2a Palatino w/ Pazo Math
> (D.Puga, WaS) \symupright=\mathgroup4
> ) (./test.aux)
> \openout1 = test.aux
> 
> LaTeX Font Info:Checking defaults for OML/cmm/m/it on input line
> 10. LaTeX Font Info:... okay on input line 10.
> LaTeX Font Info:Checking defaults for T1/cmr/m/n on input line 10.
> LaTeX Font Info:... okay on input line 10.
> LaTeX Font Info:Checking defaults for OT1/cmr/m/n on input line
> 10. LaTeX Font Info:... okay on input line 10.
> LaTeX Font Info:Checking defaults for OMS/cmsy/m/n on input line
> 10. LaTeX Font Info:... okay on input line 10.
> LaTeX Font Info:Checking defaults for TU/lmr/m/n on input line 10.
> LaTeX Font Info:... okay on input line 10.
> LaTeX Font Info:Checking defaults for OMX/cmex/m/n on input line
> 10. LaTeX Font Info:... okay on input line 10.
> LaTeX Font Info:Checking defaults for U/cmr/m/n on input line 10.
> LaTeX Font Info:... okay on input line 10.
> LaTeX Font Info:Try loading font information for TU+pplj on input
> line 10. LaTeX Font Info:No file TUpplj.fd. on input line 10.
> 
> L

Bug#853119: texlive-luatex: basic lualatex document does not compile anymore without additionnal dependencies

2017-02-05 Thread Julian Wollrath
Hi Norbert,

yes, the crash is unrelated, but it was the only log I had; sorry, I
should have used a better example. Lets make the same point I tried to
make in a different way:
\documentclass{article}

\usepackage[osf,sc,slantedGreek]{mathpazo}
\linespread{1.08}

\begin{document}
Test
\end{document}

% cat test.log 
This is LuaTeX, Version 0.95.0 (TeX Live 2016/Debian)  (format=lualatex
2017.2.6)  6 FEB 2017 08:45 restricted system commands enabled.
**test.tex
(./test.tex
LaTeX2e <2017/01/01>
Lua module: luaotfload-main 2016/06/16 2.70003 OpenType layout system.
Lua module: lualibs 2016-04-06 2.4 ConTeXt Lua standard libraries.
Lua module: lualibs-extended 2016-04-06 2.4 ConTeXt Lua libraries --
extended co llection.(using write
cache: /home/wolle/.texlive2016/texmf-var/luatex-cache/gen eric)(using
read cache: /var/lib/texmf/luatex-cache/generic /home/wolle/.texlive
2016/texmf-var/luatex-cache/generic) luaotfload | conf : Root cache
directory is /home/wolle/.texlive2016/texmf-var/l
uatex-cache/generic/names. luaotfload | init : Loading fontloader
“fontloader-2016-06-16.lua” from kpse -resolved path
“/usr/share/texlive/texmf-dist/tex/luatex/luaotfload/fontloader
-2016-06-16.lua”. Lua-only attribute luaotfload@state = 1
Lua-only attribute luaotfload@noligature = 2
Lua-only attribute luaotfload@syllabe = 3
luaotfload | init : Context OpenType loader version “3.023”
Inserting `luaotfload.node_processor' at position 1 in
`pre_linebreak_filter'. Inserting `luaotfload.node_processor' at
position 1 in `hpack_filter'. Inserting `luaotfload.define_font' at
position 1 in `define_font'. Lua-only attribute
luaotfload_color_attribute = 4 luaotfload | conf : Root cache directory
is /home/wolle/.texlive2016/texmf-var/l uatex-cache/generic/names.
Inserting `luaotfload.aux.set_sscale_dimens' at position 1 in
`luaotfload.patch_ font'.
Inserting `luaotfload.aux.patch_cambria_domh' at position 2 in
`luaotfload.patch _font'.
Inserting `luaotfload.aux.fixup_fontdata' at position 1 in
`luaotfload.patch_fon t_unsafe'.
Inserting `luaotfload.aux.set_capheight' at position 3 in
`luaotfload.patch_font '.
Inserting `luaotfload.rewrite_fontname' at position 4 in
`luaotfload.patch_font' .
luaotfload | main : initialization completed in 0.105 seconds
Babel <3.9r> and hyphenation patterns for 1 language(s) loaded.
(/usr/share/texlive/texmf-dist/tex/latex/base/article.cls
Document Class: article 2014/09/29 v1.4h Standard LaTeX document class
(/usr/share/texlive/texmf-dist/tex/latex/base/size10.clo
File: size10.clo 2014/09/29 v1.4h Standard LaTeX file (size option)
luaotfload | db : Font names database loaded
from /home/wolle/.texlive2016/texmf
-var/luatex-cache/generic/names/luaotfload-names.luc(compiling
luc: /var/lib/tex
mf/luatex-cache/generic/fonts/otl/lmroman10-regular.luc)(load
luc: /home/wolle/.
texlive2016/texmf-var/luatex-cache/generic/fonts/otl/lmroman10-regular.luc))
\c@part=\count79 \c@section=\count80 \c@subsection=\count81
\c@subsubsection=\count82 \c@paragraph=\count83
\c@subparagraph=\count84
\c@figure=\count85
\c@table=\count86
\abovecaptionskip=\skip41
\belowcaptionskip=\skip42
\bibindent=\dimen102
) (/usr/share/texlive/texmf-dist/tex/latex/psnfss/mathpazo.sty
Package: mathpazo 2005/04/12 PSNFSS-v9.2a Palatino w/ Pazo Math
(D.Puga, WaS) \symupright=\mathgroup4
) (./test.aux)
\openout1 = test.aux

LaTeX Font Info:Checking defaults for OML/cmm/m/it on input line 10.
LaTeX Font Info:... okay on input line 10.
LaTeX Font Info:Checking defaults for T1/cmr/m/n on input line 10.
LaTeX Font Info:... okay on input line 10.
LaTeX Font Info:Checking defaults for OT1/cmr/m/n on input line 10.
LaTeX Font Info:... okay on input line 10.
LaTeX Font Info:Checking defaults for OMS/cmsy/m/n on input line 10.
LaTeX Font Info:... okay on input line 10.
LaTeX Font Info:Checking defaults for TU/lmr/m/n on input line 10.
LaTeX Font Info:... okay on input line 10.
LaTeX Font Info:Checking defaults for OMX/cmex/m/n on input line 10.
LaTeX Font Info:... okay on input line 10.
LaTeX Font Info:Checking defaults for U/cmr/m/n on input line 10.
LaTeX Font Info:... okay on input line 10.
LaTeX Font Info:Try loading font information for TU+pplj on input
line 10. LaTeX Font Info:No file TUpplj.fd. on input line 10.

LaTeX Font Warning: Font shape `TU/pplj/m/n' undefined
(Font)  using `TU/lmr/m/n' instead on input line 10.

\big@size=\dimen103
[1

{/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}] (./test.aux)

LaTeX Font Warning: Some font shapes were not available, defaults
substituted.

)

Here is how much of LuaTeX's memory you used:
 305 strings out of 494611
 10,89155 words of node,token memory allocated
 369 words of node memory still in use:
   2 hlist, 1 vlist, 1 rule, 6 glue, 5 attribute, 41 glue_spec, 5
attribute_list , 1 write nodes
   avail lists: 2:17,3:2,4:1,5:11,6:6,7:22,8:1,9:6
 4408 multiletter control sequences out of 65536+60
 15 fonts using 723615 

Bug#853119: texlive-luatex: basic lualatex document does not compile anymore without additionnal dependencies

2017-02-05 Thread Julian Wollrath
Hi,

for me, just installing lmodern did not fix the issue with the
following example:

\documentclass{standalone}

\usepackage[utf8]{luainputenc}

\usepackage[osf,sc,slantedGreek]{mathpazo}
\linespread{1.08}

\begin{document}
Test
\end{document}

% lualatex test.tex
This is LuaTeX, Version 0.95.0 (TeX Live 2016/Debian) 
 restricted system commands enabled.
(./test.tex
LaTeX2e <2017/01/01>
(using write
cache: /home/wolle/.texlive2016/texmf-var/luatex-cache/generic)(us ing
read
cache: /var/lib/texmf/luatex-cache/generic /home/wolle/.texlive2016/te
xmf-var/luatex-cache/generic) luaotfload | main : initialization
completed in 0.104 seconds Babel <3.9r> and hyphenation patterns for 1
language(s) loaded.
(/usr/share/texlive/texmf-dist/tex/latex/standalone/standalone.cls
Document Class: standalone 2015/07/15 v1.2 Class to compile TeX
sub-files stand alone
(/usr/share/texlive/texmf-dist/tex/generic/oberdiek/ifluatex.sty)
(/usr/share/texlive/texmf-dist/tex/generic/oberdiek/ifpdf.sty)
(/usr/share/texlive/texmf-dist/tex/generic/ifxetex/ifxetex.sty)
(/usr/share/texlive/texmf-dist/tex/latex/xkeyval/xkeyval.sty
(/usr/share/texlive/texmf-dist/tex/generic/xkeyval/xkeyval.tex
(/usr/share/texlive/texmf-dist/tex/generic/xkeyval/xkvutils.tex
(/usr/share/texlive/texmf-dist/tex/generic/xkeyval/keyval.tex
(/usr/share/texlive/texmf-dist/tex/latex/standalone/standalone.cfg)
(/usr/share/texlive/texmf-dist/tex/latex/base/article.cls Document
Class: article 2014/09/29 v1.4h Standard LaTeX document class
(/usr/share/texlive/texmf-dist/tex/latex/base/size10.clo luaotfload |
db : Reload initiated (formats: otf,ttf,ttc); reason: "File not found:
lmroman10-regular.".(compiling luc: /var/li
b/texmf/luatex-cache/generic/fonts/otl/lmroman10-regular.luc)(compiling
luc: /h
ome/wolle/.texlive2016/texmf-var/luatex-cache/generic/fonts/otl/lmroman10-regul
ar.luc)(save: /home/wolle/.texlive2016/texmf-var/luatex-cache/generic/fonts/otl 
/lmroman10-regular.lua)(save: /home/wolle/.texlive2016/texmf-var/luatex-cache/g
eneric/fonts/otl/lmroman10-regular.luc
(/usr/share/texlive/texmf-dist/tex/lualatex/luainputenc/luainputenc.sty
(/usr/share/texlive/texmf-dist/tex/luatex/luatexbase/luatexbase.sty
(/usr/share/texlive/texmf-dist/tex/luatex/ctablestack/ctablestack.sty))
(/usr/share/texlive/texmf-dist/tex/lualatex/luainputenc/lutf8.def
(/usr/share/texlive/texmf-dist/tex/latex/base/t1enc.dfu)
(/usr/share/texlive/texmf-dist/tex/latex/base/ot1enc.dfu)
(/usr/share/texlive/texmf-dist/tex/latex/base/omsenc.dfu)))
(/usr/share/texlive/texmf-dist/tex/latex/psnfss/mathpazo.sty) No file
test.aux.

LaTeX Font Warning: Font shape `TU/pplj/m/n' undefined
(Font)  using `TU/lmr/m/n' instead on input line 11.

! Undefined control sequence.
\sa@placebox ->\newpage \global \pdfpagewidth 
  =\wd \sa@box \global
\pdfpageh...

l.13 \end{document}
 
? x
 411 words of node memory still in use:
   3 hlist, 1 rule, 1 dir, 6 glue, 1 kern, 4 glyph, 6 attribute, 41
glue_spec, 6 attribute_list, 2 if_stack, 1 write nodes
   avail lists: 2:6,3:1,4:1,5:2,7:2,8:1,9:1

warning  (pdf backend): no pages of output.
Transcript written on test.log.


It seems, like the luaotfload is loaded unconditionally even when it is
not needed, since type1 fonts are requested to used (mathpazo). It
tries to use lmr anyways since it is forced to use TU encoding, which
mathpazo does not have.
In /usr/share/texlive/texmf-dist/tex/latex/base/latexrelease.sty I
found the following change, which is probably part of the issue:
+\IncludeInRelease{2017/01/01}%
+ {\fontencoding}{TU in everyjob}%
+\fontencoding{TU}\let\encodingdefault\f@encoding
+\ifx\directlua\@undefined\else
+  \directlua{%
+%% Horrible hack, locally reset the luatex version number
+%% This is not required for the source version of luaotfload
+%% but is required due to an error in the version check in the
+%% public version (January 2017)
+%% https://github.com/lualatex/luaotfload/issues/387
+%% It is expected that this will be removed before TeXLive 2017
+  local tmp_version=tex.luatexversion %
+  tex.luatexversion=199 %
+  if xpcall(function ()%
+ require('luaotfload-main')%
+end,texio.write_nl) then %
+  local _void = luaotfload.main ()%
+  else %
+  texio.write_nl('Error in luaotfload: reverting to OT1')%
+  tex.print('\string\\def\string\\encodingdefault{OT1}')%
+  end %
+  tex.luatexversion=tmp_version%
+  }%
+  \let\f@encoding\encodingdefault
+  \expandafter\let\csname v...@luaotfload.sty\endcsname\fmtversion
+\fi
+\EndIncludeInRelease

Best regards,
Julian
-- 
 ()  ascii ribbon campaign - against html e-mail 
 /\- against proprietary attachments



Bug#828601: wpa: FTBFS with openssl 1.1.0

2016-11-13 Thread Julian Wollrath
Hi,

I cannot do it myself but since the openssl transistion is ongoing now,
maybe the wpa version from experimental, which fixes this bug, should
be uploaded to unstable?

Cheers,
Julian
-- 
 ()  ascii ribbon campaign - against html e-mail 
 /\- against proprietary attachments



Bug#824944: closed by Julian Wollrath <jwollr...@web.de> (Bug#824944: fixed in lua-discount 2.1.8-1)

2016-07-16 Thread Julian Wollrath
Hi,

the problem seems to lie with discount (bug #826197). The architectures
you mention have discount 2.1.8, while the others have a newer version.
It seems like the output of discount changed between these versions.


Cheers,
Julian



Bug#824944: Update on #824944

2016-07-04 Thread Julian Wollrath
Hi,

thanks for your interest. I modified it myself to incorporate (and
hopefully support) the flags of discount 2.1.8, therefore the version
change, since upstream seems inactive. I am in contact with Enrico
Tassi, who sponsored previous uploads to get it uploaded.

Cheers,
Julian



Bug#787371: wpa: CVE-2015-4143 CVE-2015-4144 CVE-2015-4145 CVE-2015-4146: EAP-pwd missing payload length validation

2015-10-26 Thread Julian Wollrath
Hi Salvatore,

Am Sun, 25 Oct 2015 16:14:56 +0100
schrieb Salvatore Bonaccorso <car...@debian.org>:

> Hi Julian,
> 
> On Sat, Oct 24, 2015 at 05:04:56PM +0200, Julian Wollrath wrote:
> > +wpa (2.3-1+deb8u2) jessie-security; urgency=high
> > +
> > +  * Add fixes for http://w1.fi/security/2015-5/
> > +  * Add fixes for CVE-2015-4141, CVE-2015-4142, CVE-2015-4143,
> > CVE-2015-4144,
> > +CVE-2015-4145, CVE-2015-4146 (Closes: #787371).  
> 
> Only looked from a changelog point of view: Please close as well the
> other releated bugs in the changelog entries:
> 
> fixes for http://w1.fi/security/2015-5/ -> #795740
> CVE-2015-4141 -> #787372
> CVE-2015-4142 -> #787373
> CVE-2015-4143 -> #787371
> CVE-2015-4144 -> #787371
> CVE-2015-4145 -> #787371
> CVE-2015-4146 -> #787371
> 
> (you can find the information via the security-tracker, i.e.
> https://security-tracker.debian.org/wpa)
> 
> The reason i filled different bug reports is that different version
> ranges are affected, so that we have proper version tracking as well
> for the BTS.
ok. I can change that. Not sure though, if I have time for it today.

> 
> Thanks for having worked on that update and attached your patchset.
> Hav you worked as well on wheezy?
No I have not and I am unsure, if I have time do look at it before the
weekend.

Cheers,
Julian



Bug#787371: wpa: CVE-2015-4143 CVE-2015-4144 CVE-2015-4145 CVE-2015-4146: EAP-pwd missing payload length validation

2015-10-24 Thread Julian Wollrath
tags 787371 patch

Hi,

I attached a patch to fix these (and more) security issues for jessie.
For unstable I uploaded an updated package to [1], that fixes the
security issues and updates the package to upstream version 2.5.

Since I am no Debian Developer, I will not be able to upload these
updates to the archive.


Cheers,
Julian

[1] http://rbw.goe.net/jw/debiandiff -Nru wpa-2.3/debian/changelog wpa-2.3/debian/changelog
--- wpa-2.3/debian/changelog	2015-04-23 19:33:58.0 +0200
+++ wpa-2.3/debian/changelog	2015-10-24 16:56:08.0 +0200
@@ -1,3 +1,11 @@
+wpa (2.3-1+deb8u2) jessie-security; urgency=high
+
+  * Add fixes for http://w1.fi/security/2015-5/
+  * Add fixes for CVE-2015-4141, CVE-2015-4142, CVE-2015-4143, CVE-2015-4144,
+CVE-2015-4145, CVE-2015-4146 (Closes: #787371).
+
+ -- Julian Wollrath <jwollr...@web.de>  Sat, 24 Oct 2015 16:27:19 +0200
+
 wpa (2.3-1+deb8u1) jessie-security; urgency=high
 
   * import "P2P: Validate SSID element length before copying it
diff -Nru wpa-2.3/debian/patches/2015-01/0001-P2P-Validate-SSID-element-length-before-copying-it-C.patch wpa-2.3/debian/patches/2015-01/0001-P2P-Validate-SSID-element-length-before-copying-it-C.patch
--- wpa-2.3/debian/patches/2015-01/0001-P2P-Validate-SSID-element-length-before-copying-it-C.patch	1970-01-01 01:00:00.0 +0100
+++ wpa-2.3/debian/patches/2015-01/0001-P2P-Validate-SSID-element-length-before-copying-it-C.patch	2015-10-24 16:24:26.0 +0200
@@ -0,0 +1,37 @@
+From 9ed4eee345f85e3025c33c6e20aa25696e341ccd Mon Sep 17 00:00:00 2001
+From: Jouni Malinen <jo...@qca.qualcomm.com>
+Date: Tue, 7 Apr 2015 11:32:11 +0300
+Subject: [PATCH] P2P: Validate SSID element length before copying it
+ (CVE-2015-1863)
+
+This fixes a possible memcpy overflow for P2P dev->oper_ssid in
+p2p_add_device(). The length provided by the peer device (0..255 bytes)
+was used without proper bounds checking and that could have resulted in
+arbitrary data of up to 223 bytes being written beyond the end of the
+dev->oper_ssid[] array (of which about 150 bytes would be beyond the
+heap allocation) when processing a corrupted management frame for P2P
+peer discovery purposes.
+
+This could result in corrupted state in heap, unexpected program
+behavior due to corrupted P2P peer device information, denial of service
+due to process crash, exposure of memory contents during GO Negotiation,
+and potentially arbitrary code execution.
+
+Thanks to Google security team for reporting this issue and smart
+hardware research group of Alibaba security team for discovering it.
+
+Signed-off-by: Jouni Malinen <jo...@qca.qualcomm.com>
+---
+ src/p2p/p2p.c | 1 +
+ 1 file changed, 1 insertion(+)
+
+--- a/src/p2p/p2p.c
 b/src/p2p/p2p.c
+@@ -736,6 +736,7 @@ int p2p_add_device(struct p2p_data *p2p,
+ 	if (os_memcmp(addr, p2p_dev_addr, ETH_ALEN) != 0)
+ 		os_memcpy(dev->interface_addr, addr, ETH_ALEN);
+ 	if (msg.ssid &&
++	msg.ssid[1] <= sizeof(dev->oper_ssid) &&
+ 	(msg.ssid[1] != P2P_WILDCARD_SSID_LEN ||
+ 	 os_memcmp(msg.ssid + 2, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN)
+ 	 != 0)) {
diff -Nru wpa-2.3/debian/patches/2015-01/wpa_supplicant-p2p-ssid-overflow.txt wpa-2.3/debian/patches/2015-01/wpa_supplicant-p2p-ssid-overflow.txt
--- wpa-2.3/debian/patches/2015-01/wpa_supplicant-p2p-ssid-overflow.txt	1970-01-01 01:00:00.0 +0100
+++ wpa-2.3/debian/patches/2015-01/wpa_supplicant-p2p-ssid-overflow.txt	2015-10-24 16:24:26.0 +0200
@@ -0,0 +1,68 @@
+wpa_supplicant P2P SSID processing vulnerability
+
+Published: April 22, 2015
+Identifier: CVE-2015-1863
+Latest version available from: http://w1.fi/security/2015-1/
+
+
+Vulnerability
+
+A vulnerability was found in how wpa_supplicant uses SSID information
+parsed from management frames that create or update P2P peer entries
+(e.g., Probe Response frame or number of P2P Public Action frames). SSID
+field has valid length range of 0-32 octets. However, it is transmitted
+in an element that has a 8-bit length field and potential maximum
+payload length of 255 octets. wpa_supplicant was not sufficiently
+verifying the payload length on one of the code paths using the SSID
+received from a peer device.
+
+This can result in copying arbitrary data from an attacker to a fixed
+length buffer of 32 bytes (i.e., a possible overflow of up to 223
+bytes). The SSID buffer is within struct p2p_device that is allocated
+from heap. The overflow can override couple of variables in the struct,
+including a pointer that gets freed. In addition about 150 bytes (the
+exact length depending on architecture) can be written beyond the end of
+the heap allocation.
+
+This could result in corrupted state in heap, unexpected program
+behavior due to corrupted P2P peer device information, denial of service
+due to wpa_supplicant process crash, exposure of memory contents during
+GO Negotiation, and potentially arbitrary code execution.
+
+Vulnerab

Bug#764930: beignet: FTBFS - uses versioned llvm commands, but unversioned build dependency

2014-10-30 Thread Julian Wollrath
Am Thu, 30 Oct 2014 19:34:17 +0100
schrieb gregor herrmann gre...@debian.org:
 Just out of curiosity:
 
 The test failure in #759933 was fixed by a patch that changed the
 dependencies in 0.8-1.1 from the versioned|general vresions to the
 versioned ones:
 
 - llvm-3.4-dev | llvm-dev (= 1:3.4),
 - clang-3.4 | clang (= 1:3.4) | clang (= 3.4),
 - clang-3.4 | clang (= 1:3.4) | clang ( 1:0),
 - libclang-3.4-dev | libclang-dev (= 1:3.4) | libclang-dev (= 3.4),
 - libclang-3.4-dev | libclang-dev (= 1:3.4) | libclang-dev ( 1:0),
 + llvm-dev (= 1:3.4),
 + clang (= 1:3.4),
 + libclang-dev (= 1:3.4),
 
 And now with those dependencies we see #764930 and the proposed patch
 is change the dependencies back to the versioned variants:
 
 - llvm-dev (= 1:3.4),
 - clang (= 1:3.4),
 - libclang-dev (= 1:3.4),
 + llvm-3.4-dev,
 + clang-3.4,
 + libclang-3.4-dev,
 
 
 The latter makes sense from the explanation; I'm just wondering where
 the build failure in late August with exactly those dependencies came
 from and why the change fixed them?

As stated in the log, posted in the bugreport, during compilation clang
was called but could not be found:
 cd /«PKGBUILDDIR»/obj-x86_64-linux-gnu/backend/src  clang -cc1 -x
 cl -triple spir -ffp-contract=off -fno-builtin
 -DGEN7_SAMPLER_CLAMP_BORDER_WORKAROUND --relocatable-pch -emit-pch
 -isysroot /«PKGBUILDDIR»/obj-x86_64-linux-gnu/backend/src 
 /«PKGBUILDDIR»/obj-x86_64-linux-gnu/backend/src/usr/lib/beignet/ocl_stdlib.h
 -o 
 /«PKGBUILDDIR»/obj-x86_64-linux-gnu/backend/src/usr/lib/beignet/ocl_stdlib.h.pch
  /bin/sh:
 1: clang: not found
Only the clang metapackage but not the clang-some.version package
provides /usr/bin/clang. Hence, changing the dependency to the clang
metapackage fixed the issue at hand (but in hindsight it was not the
right fix (tm)).

Cheers,
Julian


pgpy7VE_BHJN9.pgp
Description: Digitale Signatur von OpenPGP


Bug#759933: beignet: FTBFS: /bin/sh: 1: clang: not found

2014-08-31 Thread Julian Wollrath
Control: tags -1 patch

Hi,

the attached patch fixes the problem.


Cheers,
Julian

fix_ftbfs
Description: Binary data


Bug#759933: beignet: FTBFS: /bin/sh: 1: clang: not found

2014-08-31 Thread Julian Wollrath
Control: tags -1 patch

Hi,

the attached patch fixes the problem.


Cheers,
Julian

fix_ftbfs
Description: Binary data


Bug#759943: [RFS] fix bug Bug#759943: libclc: FTBFS: /bin/sh: 1: clang: not found

2014-08-31 Thread Julian Wollrath
Control: tags -1 patch

Hi,

the attached patch fixes the problem (and also removes myself from
uploaders, since I do not have the hardware anymore to use this
package). Could someone please sponsor the upload?


Cheers,
Julian

fix_ftbfs
Description: Binary data


Bug#757395: fixed upstream beignet: CMakeLists.txt prohibits copying

2014-08-30 Thread Julian Wollrath
Control: tag -1 patch

I attached a patch for an NMU, which cherry-picks the upstream commit
to fix the licensing issue.


Cheers,
Julian

nmudiff
Description: Binary data