Bug#911916: x11-apps: xcacl won't divide correctly on buster

2018-10-25 Thread Per Gunnarsson
Package: x11-apps
Version: 7.7+7
Severity: important

Dear Maintainer,

I was trying to calculate how much carfentanil I needed, and when I tried
0.2/5000 I got the result 4e-05




-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.18.0-2-amd64 (SMP w/4 CPU cores)
Locale: LANG=sv_SE.UTF-8, LC_CTYPE=sv_SE.UTF-8 (charmap=UTF-8), 
LANGUAGE=sv_SE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages x11-apps depends on:
ii  libc62.27-6
ii  libpng16-16  1.6.34-2
ii  libsm6   2:1.2.2-1+b3
ii  libx11-6 2:1.6.7-1
ii  libxaw7  2:1.0.13-1+b2
ii  libxcursor1  1:1.1.15-1
ii  libxext6 2:1.3.3-1+b2
ii  libxft2  2.3.2-2
ii  libxkbfile1  1:1.0.9-2
ii  libxmu6  2:1.1.2-2
ii  libxmuu1 2:1.1.2-2
ii  libxrender1  1:0.9.10-1
ii  libxt6   1:1.1.5-1
ii  man-db   2.8.4-2+b1
ii  zlib1g   1:1.2.11.dfsg-1

Versions of packages x11-apps recommends:
ii  xbitmaps  1.1.1-2

Versions of packages x11-apps suggests:
pn  mesa-utils  

-- no debconf information



xorg-server_1.19.2-1+deb9u4_source.changes ACCEPTED into proposed-updates->stable-new

2018-10-25 Thread Debian FTP Masters
Mapping stable-security to proposed-updates.

Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 25 Oct 2018 11:19:09 +0200
Source: xorg-server
Binary: xserver-xorg-core xserver-xorg-core-udeb xserver-xorg-dev xdmx 
xdmx-tools xnest xvfb xserver-xephyr xserver-common xorg-server-source xwayland 
xserver-xorg-legacy
Architecture: source
Version: 2:1.19.2-1+deb9u4
Distribution: stretch-security
Urgency: medium
Maintainer: Debian X Strike Force 
Changed-By: Julien Cristau 
Description:
 xdmx   - distributed multihead X server
 xdmx-tools - Distributed Multihead X tools
 xnest  - Nested X server
 xorg-server-source - Xorg X server - source files
 xserver-common - common files used by various X servers
 xserver-xephyr - nested X server
 xserver-xorg-core - Xorg X server - core server
 xserver-xorg-core-udeb - Xorg X server - core server (udeb)
 xserver-xorg-dev - Xorg X server - development files
 xserver-xorg-legacy - setuid root Xorg server wrapper
 xvfb   - Virtual Framebuffer 'fake' X server
 xwayland   - Xwayland X server
Changes:
 xorg-server (2:1.19.2-1+deb9u4) stretch-security; urgency=medium
 .
   * Disable -logfile and -modulepath when running with elevated privileges.
 Addresses CVE-2018-14665.
Checksums-Sha1:
 98edc0e683d6c2f26ccd2350b908a680a61b151a 4843 xorg-server_1.19.2-1+deb9u4.dsc
 7359561980bd9062aa0c34f69a231febdcdbba74 147006 
xorg-server_1.19.2-1+deb9u4.diff.gz
Checksums-Sha256:
 3b57380df1b08413d41373000ad1ac6f4bb48cc2bd1aa95021534e829f84c474 4843 
xorg-server_1.19.2-1+deb9u4.dsc
 18958561a093570c406ea62c3a4838de1c896c22df5200974a4567331def2db0 147006 
xorg-server_1.19.2-1+deb9u4.diff.gz
Files:
 b8090c0c0caa249d109f986eb7ee1163 4843 x11 optional 
xorg-server_1.19.2-1+deb9u4.dsc
 d8932aa4b1089c302f40163d2052b335 147006 x11 optional 
xorg-server_1.19.2-1+deb9u4.diff.gz

-BEGIN PGP SIGNATURE-
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=zF5D
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



xorg-server_1.19.2-1+deb9u3_source.changes ACCEPTED into proposed-updates->stable-new

2018-10-25 Thread Debian FTP Masters
Mapping stable-security to proposed-updates.

Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 15 Oct 2018 16:17:31 +0200
Source: xorg-server
Binary: xserver-xorg-core xserver-xorg-core-udeb xserver-xorg-dev xdmx 
xdmx-tools xnest xvfb xserver-xephyr xserver-common xorg-server-source xwayland 
xserver-xorg-legacy
Architecture: source
Version: 2:1.19.2-1+deb9u3
Distribution: stretch-security
Urgency: high
Maintainer: Debian X Strike Force 
Changed-By: Julien Cristau 
Description:
 xdmx   - distributed multihead X server
 xdmx-tools - Distributed Multihead X tools
 xnest  - Nested X server
 xorg-server-source - Xorg X server - source files
 xserver-common - common files used by various X servers
 xserver-xephyr - nested X server
 xserver-xorg-core - Xorg X server - core server
 xserver-xorg-core-udeb - Xorg X server - core server (udeb)
 xserver-xorg-dev - Xorg X server - development files
 xserver-xorg-legacy - setuid root Xorg server wrapper
 xvfb   - Virtual Framebuffer 'fake' X server
 xwayland   - Xwayland X server
Changes:
 xorg-server (2:1.19.2-1+deb9u3) stretch-security; urgency=high
 .
   * Disable -logfile when running with elevated privileges.
 Addresses CVE-2018-14665.
Checksums-Sha1:
 9d0c720f225e95150cd30ea473077325e01c5dec 4843 xorg-server_1.19.2-1+deb9u3.dsc
 a96d46f0ef4fd887fbd18276d42fff0fb02136b6 147028 
xorg-server_1.19.2-1+deb9u3.diff.gz
Checksums-Sha256:
 3b374141d00877f1643efb867c6916c5d473b7dd096527b48a5302c79c78c070 4843 
xorg-server_1.19.2-1+deb9u3.dsc
 2dd7f73cf144dd675e73e47293892926f5a27afab98a2712af405309f1601614 147028 
xorg-server_1.19.2-1+deb9u3.diff.gz
Files:
 237ee14a04ec9c31946aae48e27390f4 4843 x11 optional 
xorg-server_1.19.2-1+deb9u3.dsc
 8c661b7dd775a41fc36ecb5a62d7a165 147028 x11 optional 
xorg-server_1.19.2-1+deb9u3.diff.gz

-BEGIN PGP SIGNATURE-
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=Vg+U
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



xorg-server_1.20.3-1_source.changes ACCEPTED into unstable

2018-10-25 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 25 Oct 2018 20:15:23 +0200
Source: xorg-server
Binary: xserver-xorg-core xserver-xorg-core-udeb xserver-xorg-dev xdmx 
xdmx-tools xnest xvfb xserver-xephyr xserver-common xorg-server-source xwayland 
xserver-xorg-legacy
Architecture: source
Version: 2:1.20.3-1
Distribution: unstable
Urgency: medium
Maintainer: Debian X Strike Force 
Changed-By: Andreas Boll 
Description:
 xdmx   - distributed multihead X server
 xdmx-tools - Distributed Multihead X tools
 xnest  - Nested X server
 xorg-server-source - Xorg X server - source files
 xserver-common - common files used by various X servers
 xserver-xephyr - nested X server
 xserver-xorg-core - Xorg X server - core server
 xserver-xorg-core-udeb - Xorg X server - core server (udeb)
 xserver-xorg-dev - Xorg X server - development files
 xserver-xorg-legacy - setuid root Xorg server wrapper
 xvfb   - Virtual Framebuffer 'fake' X server
 xwayland   - Xwayland X server
Changes:
 xorg-server (2:1.20.3-1) unstable; urgency=medium
 .
   * New upstream release.
 - Disables -logfile and -modulepath when running with elevated
   privileges (CVE-2018-14665).
Checksums-Sha1:
 dcdb11606397eb5e39b39ae776da5076f013a56d 4175 xorg-server_1.20.3-1.dsc
 375466fff4dfbb2f6a87d9fbb4abc132f1ef623a 8634895 xorg-server_1.20.3.orig.tar.gz
 9a30dd44cefe78bef9cc311ed06a5b4cb54d855d 150602 xorg-server_1.20.3-1.diff.gz
Checksums-Sha256:
 674bf1157b0904ca08a8e6924ace38876965b03601cf8ff1df69de6433687c09 4175 
xorg-server_1.20.3-1.dsc
 d9e4fbefe1a31a4999c9a5f1c81a8e34e1d1b9056f3ac225f299f515eab2bcb8 8634895 
xorg-server_1.20.3.orig.tar.gz
 9cfe6163cca5d60cb5a38f7aa7dcb23f18faa16fc91f5be0e363b0c3086259b0 150602 
xorg-server_1.20.3-1.diff.gz
Files:
 96231435ba9f536684632302ab9dcab1 4175 x11 optional xorg-server_1.20.3-1.dsc
 a993394d1493c6db19de654b43a82f0b 8634895 x11 optional 
xorg-server_1.20.3.orig.tar.gz
 7ad81a2fea6ecad16b47cb4f8fd67e50 150602 x11 optional 
xorg-server_1.20.3-1.diff.gz

-BEGIN PGP SIGNATURE-
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=FpGN
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Processing of xorg-server_1.20.3-1_source.changes

2018-10-25 Thread Debian FTP Masters
xorg-server_1.20.3-1_source.changes uploaded successfully to localhost
along with the files:
  xorg-server_1.20.3-1.dsc
  xorg-server_1.20.3.orig.tar.gz
  xorg-server_1.20.3-1.diff.gz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



[Git][xorg-team/xserver/xorg-server][debian-unstable] 8 commits: xfree86: fix readlink call

2018-10-25 Thread Andreas Boll
Andreas Boll pushed to branch debian-unstable at X Strike Force / xserver / 
xorg-server


Commits:
cfc3dec0 by Peter Hutterer at 2018-10-16T14:22:05Z
xfree86: fix readlink call

Misplaced parenthesis caused us to compare the sizeof, not the readlink return
value.

Signed-off-by: Peter Hutterer 
(cherry picked from commit bd5fe7593fd0df236f3b2be1f062166ddba7d67c)

- - - - -
8a59e3b7 by Matthieu Herrb at 2018-10-25T13:18:06Z
Disable -logfile and -modulepath when running with elevated privileges

Could cause privilege elevation and/or arbitrary files overwrite, when
the X server is running with elevated privileges (ie when Xorg is
installed with the setuid bit set and started by a non-root user).

CVE-2018-14665

Issue reported by Narendra Shinde and Red Hat.

Signed-off-by: Matthieu Herrb 
Reviewed-by: Alan Coopersmith 
Reviewed-by: Peter Hutterer 
Reviewed-by: Adam Jackson 
(cherry picked from commit 50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e)

- - - - -
da15c741 by Matthieu Herrb at 2018-10-25T13:18:06Z
LogFilePrep: add a comment to the unsafe format string.

CVE-2018-14665 also made it possible to exploit this to access
memory. With -logfile forbidden when running with elevated privileges
this is no longer an issue.

Signed-off-by: Matthieu Herrb 
Reviewed-by: Adam Jackson 
(cherry picked from commit 248d164eae27f1f310266d78e52f13f64362f81e)

- - - - -
971d4181 by Adam Jackson at 2018-10-25T13:18:06Z
xserver 1.20.3

Signed-off-by: Adam Jackson 

- - - - -
92afe8a7 by Andreas Boll at 2018-10-25T17:54:47Z
Merge tag 'xorg-server-1.20.3' into debian-unstable

xorg-server-1.20.3

- - - - -
2de2bf45 by Andreas Boll at 2018-10-25T17:55:21Z
Bump changelog

- - - - -
3ae799da by Andreas Boll at 2018-10-25T18:15:04Z
Document CVE-2018-14665

- - - - -
9cad8963 by Andreas Boll at 2018-10-25T18:15:29Z
Upload to unstable.

- - - - -


6 changed files:

- configure.ac
- debian/changelog
- hw/xfree86/common/xf86Init.c
- hw/xfree86/fbdevhw/fbdevhw.c
- meson.build
- os/log.c


Changes:

=
configure.ac
=
@@ -26,9 +26,9 @@ dnl
 dnl Process this file with autoconf to create configure.
 
 AC_PREREQ(2.60)
-AC_INIT([xorg-server], 1.20.2, 
[https://bugs.freedesktop.org/enter_bug.cgi?product=xorg], xorg-server)
-RELEASE_DATE="2018-10-15"
-RELEASE_NAME="Tofu Biryani"
+AC_INIT([xorg-server], 1.20.3, 
[https://bugs.freedesktop.org/enter_bug.cgi?product=xorg], xorg-server)
+RELEASE_DATE="2018-10-25"
+RELEASE_NAME="Harissa Roasted Carrots"
 AC_CONFIG_SRCDIR([Makefile.am])
 AC_CONFIG_MACRO_DIR([m4])
 AM_INIT_AUTOMAKE([foreign dist-bzip2])


=
debian/changelog
=
@@ -1,3 +1,11 @@
+xorg-server (2:1.20.3-1) unstable; urgency=medium
+
+  * New upstream release.
+- Disables -logfile and -modulepath when running with elevated
+  privileges (CVE-2018-14665).
+
+ -- Andreas Boll   Thu, 25 Oct 2018 20:15:23 +0200
+
 xorg-server (2:1.20.2-1) unstable; urgency=medium
 
   * New upstream release.


=
hw/xfree86/common/xf86Init.c
=
@@ -1027,14 +1027,18 @@ ddxProcessArgument(int argc, char **argv, int i)
 /* First the options that are not allowed with elevated privileges */
 if (!strcmp(argv[i], "-modulepath")) {
 CHECK_FOR_REQUIRED_ARGUMENT();
-xf86CheckPrivs(argv[i], argv[i + 1]);
+if (xf86PrivsElevated())
+  FatalError("\nInvalid argument -modulepath "
+"with elevated privileges\n");
 xf86ModulePath = argv[i + 1];
 xf86ModPathFrom = X_CMDLINE;
 return 2;
 }
 if (!strcmp(argv[i], "-logfile")) {
 CHECK_FOR_REQUIRED_ARGUMENT();
-xf86CheckPrivs(argv[i], argv[i + 1]);
+if (xf86PrivsElevated())
+  FatalError("\nInvalid argument -logfile "
+"with elevated privileges\n");
 xf86LogFile = argv[i + 1];
 xf86LogFileFrom = X_CMDLINE;
 return 2;


=
hw/xfree86/fbdevhw/fbdevhw.c
=
@@ -336,7 +336,7 @@ fbdev_open(int scrnIndex, const char *dev, char **namep)
 char *node = strrchr(dev, '/') + 1;
 
 if (asprintf(&sysfs_path, "/sys/class/graphics/%s", node) < 0 ||
-readlink(sysfs_path, buf, sizeof(buf) < 0) ||
+readlink(sysfs_path, buf, sizeof(buf)) < 0 ||
 strstr(buf, "devices/pci")) {
 free(sysfs_path);
 close(fd);


=
meson.build
=
@@ -3,7 +3,7 @@ project('xserver', 'c',
 'buildtype=debugoptimized',
 'c_std=gnu99',
 ],
-version: '1.20.2',
+version: '1.

[Git][xorg-team/xserver/xorg-server][upstream-unstable] 4 commits: xfree86: fix readlink call

2018-10-25 Thread Andreas Boll
Andreas Boll pushed to branch upstream-unstable at X Strike Force / xserver / 
xorg-server


Commits:
cfc3dec0 by Peter Hutterer at 2018-10-16T14:22:05Z
xfree86: fix readlink call

Misplaced parenthesis caused us to compare the sizeof, not the readlink return
value.

Signed-off-by: Peter Hutterer 
(cherry picked from commit bd5fe7593fd0df236f3b2be1f062166ddba7d67c)

- - - - -
8a59e3b7 by Matthieu Herrb at 2018-10-25T13:18:06Z
Disable -logfile and -modulepath when running with elevated privileges

Could cause privilege elevation and/or arbitrary files overwrite, when
the X server is running with elevated privileges (ie when Xorg is
installed with the setuid bit set and started by a non-root user).

CVE-2018-14665

Issue reported by Narendra Shinde and Red Hat.

Signed-off-by: Matthieu Herrb 
Reviewed-by: Alan Coopersmith 
Reviewed-by: Peter Hutterer 
Reviewed-by: Adam Jackson 
(cherry picked from commit 50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e)

- - - - -
da15c741 by Matthieu Herrb at 2018-10-25T13:18:06Z
LogFilePrep: add a comment to the unsafe format string.

CVE-2018-14665 also made it possible to exploit this to access
memory. With -logfile forbidden when running with elevated privileges
this is no longer an issue.

Signed-off-by: Matthieu Herrb 
Reviewed-by: Adam Jackson 
(cherry picked from commit 248d164eae27f1f310266d78e52f13f64362f81e)

- - - - -
971d4181 by Adam Jackson at 2018-10-25T13:18:06Z
xserver 1.20.3

Signed-off-by: Adam Jackson 

- - - - -


5 changed files:

- configure.ac
- hw/xfree86/common/xf86Init.c
- hw/xfree86/fbdevhw/fbdevhw.c
- meson.build
- os/log.c


Changes:

=
configure.ac
=
@@ -26,9 +26,9 @@ dnl
 dnl Process this file with autoconf to create configure.
 
 AC_PREREQ(2.60)
-AC_INIT([xorg-server], 1.20.2, 
[https://bugs.freedesktop.org/enter_bug.cgi?product=xorg], xorg-server)
-RELEASE_DATE="2018-10-15"
-RELEASE_NAME="Tofu Biryani"
+AC_INIT([xorg-server], 1.20.3, 
[https://bugs.freedesktop.org/enter_bug.cgi?product=xorg], xorg-server)
+RELEASE_DATE="2018-10-25"
+RELEASE_NAME="Harissa Roasted Carrots"
 AC_CONFIG_SRCDIR([Makefile.am])
 AC_CONFIG_MACRO_DIR([m4])
 AM_INIT_AUTOMAKE([foreign dist-bzip2])


=
hw/xfree86/common/xf86Init.c
=
@@ -1027,14 +1027,18 @@ ddxProcessArgument(int argc, char **argv, int i)
 /* First the options that are not allowed with elevated privileges */
 if (!strcmp(argv[i], "-modulepath")) {
 CHECK_FOR_REQUIRED_ARGUMENT();
-xf86CheckPrivs(argv[i], argv[i + 1]);
+if (xf86PrivsElevated())
+  FatalError("\nInvalid argument -modulepath "
+"with elevated privileges\n");
 xf86ModulePath = argv[i + 1];
 xf86ModPathFrom = X_CMDLINE;
 return 2;
 }
 if (!strcmp(argv[i], "-logfile")) {
 CHECK_FOR_REQUIRED_ARGUMENT();
-xf86CheckPrivs(argv[i], argv[i + 1]);
+if (xf86PrivsElevated())
+  FatalError("\nInvalid argument -logfile "
+"with elevated privileges\n");
 xf86LogFile = argv[i + 1];
 xf86LogFileFrom = X_CMDLINE;
 return 2;


=
hw/xfree86/fbdevhw/fbdevhw.c
=
@@ -336,7 +336,7 @@ fbdev_open(int scrnIndex, const char *dev, char **namep)
 char *node = strrchr(dev, '/') + 1;
 
 if (asprintf(&sysfs_path, "/sys/class/graphics/%s", node) < 0 ||
-readlink(sysfs_path, buf, sizeof(buf) < 0) ||
+readlink(sysfs_path, buf, sizeof(buf)) < 0 ||
 strstr(buf, "devices/pci")) {
 free(sysfs_path);
 close(fd);


=
meson.build
=
@@ -3,7 +3,7 @@ project('xserver', 'c',
 'buildtype=debugoptimized',
 'c_std=gnu99',
 ],
-version: '1.20.2',
+version: '1.20.3',
 meson_version: '>= 0.42.0',
 )
 add_project_arguments('-DHAVE_DIX_CONFIG_H', language: 'c')


=
os/log.c
=
@@ -194,6 +194,8 @@ LogFilePrep(const char *fname, const char *backup, const 
char *idstring)
 {
 char *logFileName = NULL;
 
+/* the format string below is controlled by the user,
+   this code should never be called with elevated privileges */
 if (asprintf(&logFileName, fname, idstring) == -1)
 FatalError("Cannot allocate space for the log file name\n");
 



View it on GitLab: 
https://salsa.debian.org/xorg-team/xserver/xorg-server/compare/2a0c6c15c35cd262e7cdb86dcc43cb1aeb714c8e...971d418113740cae2d7d393850bad4926d1a7e86

-- 
View it on GitLab: 
https://salsa.debian.org/xorg-team/xserver/x

[Git][xorg-team/xserver/xorg-server] Pushed new tag xorg-server-2_1.20.3-1

2018-10-25 Thread Andreas Boll
Andreas Boll pushed new tag xorg-server-2_1.20.3-1 at X Strike Force / xserver 
/ xorg-server

-- 
View it on GitLab: 
https://salsa.debian.org/xorg-team/xserver/xorg-server/tree/xorg-server-2_1.20.3-1
You're receiving this email because of your account on salsa.debian.org.


[Git][xorg-team/xserver/xorg-server] Pushed new tag xorg-server-2_1.19.2-1+deb9u4

2018-10-25 Thread Julien Cristau
Julien Cristau pushed new tag xorg-server-2_1.19.2-1+deb9u4 at X Strike Force / 
xserver / xorg-server

-- 
View it on GitLab: 
https://salsa.debian.org/xorg-team/xserver/xorg-server/tree/xorg-server-2_1.19.2-1+deb9u4
You're receiving this email because of your account on salsa.debian.org.


[Git][xorg-team/xserver/xorg-server][debian-stretch] 2 commits: Disable -logfile when running with elevated privileges. Addresses CVE-2018-14665.

2018-10-25 Thread Julien Cristau
Julien Cristau pushed to branch debian-stretch at X Strike Force / xserver / 
xorg-server


Commits:
c921b1f2 by Julien Cristau at 2018-10-15T14:17:59Z
Disable -logfile when running with elevated privileges. Addresses 
CVE-2018-14665.

- - - - -
6d61e16a by Julien Cristau at 2018-10-25T09:22:17Z
Disable -logfile and -modulepath when running with elevated privileges.

- - - - -


5 changed files:

- debian/changelog
- debian/patches/02_kbsd-input-devd.diff
- debian/patches/03_static-nettle.diff
- + debian/patches/11_xfree86-Disable-logfile-and-modulepath.patch
- debian/patches/series


Changes:

=
debian/changelog
=
@@ -1,3 +1,10 @@
+xorg-server (2:1.19.2-1+deb9u4) stretch-security; urgency=medium
+
+  * Disable -logfile and -modulepath when running with elevated privileges.
+Addresses CVE-2018-14665.
+
+ -- Julien Cristau   Thu, 25 Oct 2018 11:19:09 +0200
+
 xorg-server (2:1.19.2-1+deb9u2) stretch-security; urgency=high
 
   * Unvalidated extra length in ProcEstablishConnection (CVE-2017-12176)


=
debian/patches/02_kbsd-input-devd.diff
=
@@ -25,7 +25,7 @@ v2 - Emilio Pozuelo Monfort 
 
 --- a/config/Makefile.am
 +++ b/config/Makefile.am
-@@ -34,6 +34,10 @@
+@@ -34,6 +34,10 @@ if CONFIG_WSCONS
  libconfig_la_SOURCES += wscons.c
  endif # CONFIG_WSCONS
  
@@ -38,7 +38,7 @@ v2 - Emilio Pozuelo Monfort 
  endif # !CONFIG_UDEV
 --- a/config/config-backends.h
 +++ b/config/config-backends.h
-@@ -44,3 +44,8 @@
+@@ -44,3 +44,8 @@ void config_hal_fini(void);
  int config_wscons_init(void);
  void config_wscons_fini(void);
  #endif
@@ -49,7 +49,7 @@ v2 - Emilio Pozuelo Monfort 
 +#endif
 --- a/config/config.c
 +++ b/config/config.c
-@@ -55,6 +55,9 @@
+@@ -55,6 +55,9 @@ config_init(void)
  #elif defined(CONFIG_WSCONS)
  if (!config_wscons_init())
  ErrorF("[config] failed to initialise wscons\n");
@@ -59,7 +59,7 @@ v2 - Emilio Pozuelo Monfort 
  #endif
  }
  
-@@ -67,6 +70,8 @@
+@@ -67,6 +70,8 @@ config_fini(void)
  config_hal_fini();
  #elif defined(CONFIG_WSCONS)
  config_wscons_fini();
@@ -448,7 +448,7 @@ v2 - Emilio Pozuelo Monfort 
 +}
 --- a/configure.ac
 +++ b/configure.ac
-@@ -627,6 +627,7 @@
+@@ -631,6 +631,7 @@ AC_ARG_ENABLE(dpms,   AS_HELP_ST
  AC_ARG_ENABLE(config-udev,AS_HELP_STRING([--enable-config-udev], [Build 
udev support (default: auto)]), [CONFIG_UDEV=$enableval], [CONFIG_UDEV=auto])
  AC_ARG_ENABLE(config-udev-kms,AS_HELP_STRING([--enable-config-udev-kms], 
[Build udev kms support (default: auto)]), [CONFIG_UDEV_KMS=$enableval], 
[CONFIG_UDEV_KMS=auto])
  AC_ARG_ENABLE(config-hal, AS_HELP_STRING([--disable-config-hal], [Build 
HAL support (default: auto)]), [CONFIG_HAL=$enableval], [CONFIG_HAL=auto])
@@ -456,7 +456,7 @@ v2 - Emilio Pozuelo Monfort 
  AC_ARG_ENABLE(config-wscons,  AS_HELP_STRING([--enable-config-wscons], [Build 
wscons config support (default: auto)]), [CONFIG_WSCONS=$enableval], 
[CONFIG_WSCONS=auto])
  AC_ARG_ENABLE(xfree86-utils, AS_HELP_STRING([--enable-xfree86-utils], 
[Build xfree86 DDX utilities (default: enabled)]), [XF86UTILS=$enableval], 
[XF86UTILS=yes])
  AC_ARG_ENABLE(vgahw,  AS_HELP_STRING([--enable-vgahw], [Build Xorg 
with vga access (default: enabled)]), [VGAHW=$enableval], [VGAHW=yes])
-@@ -1017,6 +1018,21 @@
+@@ -1021,6 +1022,21 @@ if test "x$CONFIG_WSCONS" = xyes; then
AC_DEFINE(CONFIG_WSCONS, 1, [Use wscons for input auto configuration])
  fi
  
@@ -478,7 +478,7 @@ v2 - Emilio Pozuelo Monfort 
  
  AC_MSG_CHECKING([for glibc...])
  AC_PREPROC_IFELSE([AC_LANG_SOURCE([
-@@ -2566,7 +2582,7 @@
+@@ -2570,7 +2586,7 @@ AC_SUBST([prefix])
  
  AC_CONFIG_COMMANDS([sdksyms], [touch hw/xfree86/sdksyms.dep])
  
@@ -489,7 +489,7 @@ v2 - Emilio Pozuelo Monfort 
   Neither HAL nor udev backend will be enabled.
 --- a/hw/xfree86/common/xf86Config.c
 +++ b/hw/xfree86/common/xf86Config.c
-@@ -1375,15 +1375,18 @@
+@@ -1375,15 +1375,18 @@ checkCoreInputDevices(serverLayoutPtr se
  }
  
  if (!xf86Info.forceInputDevices && !(foundPointer && foundKeyboard)) {
@@ -512,7 +512,7 @@ v2 - Emilio Pozuelo Monfort 
  "input devices.\n\tIf no devices become available, "
 --- a/hw/xfree86/common/xf86Globals.c
 +++ b/hw/xfree86/common/xf86Globals.c
-@@ -122,7 +122,8 @@
+@@ -122,7 +122,8 @@ xf86InfoRec xf86Info = {
  .pmFlag = TRUE,
  .disableRandR = FALSE,
  .randRFrom = X_DEFAULT,
@@ -524,7 +524,7 @@ v2 - Emilio Pozuelo Monfort 
  .autoEnableDevices = TRUE,
 --- a/include/dix-config.h.in
 +++ b/include/dix-config.h.in
-@@ -445,6 +445,9 @@
+@@ -454,6 +454,9 @@
  /* Enable systemd-logind integration */
  #undef SYSTEMD_LOGIND 1
  


=
debian/patches/03_static-nettle.diff
=
@@ -4,7 +4,7 @@ There's no libnettle udeb.
 
 --- a/configure.ac
 +++ b/configure.ac
-@@ -1725,

xorg-server_1.20.2-1_source.changes ACCEPTED into unstable

2018-10-25 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 25 Oct 2018 10:19:31 +0200
Source: xorg-server
Binary: xserver-xorg-core xserver-xorg-core-udeb xserver-xorg-dev xdmx 
xdmx-tools xnest xvfb xserver-xephyr xserver-common xorg-server-source xwayland 
xserver-xorg-legacy
Architecture: source
Version: 2:1.20.2-1
Distribution: unstable
Urgency: medium
Maintainer: Debian X Strike Force 
Changed-By: Andreas Boll 
Description:
 xdmx   - distributed multihead X server
 xdmx-tools - Distributed Multihead X tools
 xnest  - Nested X server
 xorg-server-source - Xorg X server - source files
 xserver-common - common files used by various X servers
 xserver-xephyr - nested X server
 xserver-xorg-core - Xorg X server - core server
 xserver-xorg-core-udeb - Xorg X server - core server (udeb)
 xserver-xorg-dev - Xorg X server - development files
 xserver-xorg-legacy - setuid root Xorg server wrapper
 xvfb   - Virtual Framebuffer 'fake' X server
 xwayland   - Xwayland X server
Closes: 777625 881891 911146 911680
Changes:
 xorg-server (2:1.20.2-1) unstable; urgency=medium
 .
   * New upstream release.
 - Fixes various crashes with xwayland (Closes: #777625, #881891,
   #911146).
 - Fixes a crash when running the X server inside virtualbox
   (Closes: #911680).
   * Drop 08_dont-init-glamor-on-llvmpipe.diff, upstream.
   * Set source format to 1.0.
Checksums-Sha1:
 44597818a83a7e8b6837de1a39f24dd160a7a97c 4175 xorg-server_1.20.2-1.dsc
 caa683c79c6f5f45acab18091806553dfe6638e9 8634406 xorg-server_1.20.2.orig.tar.gz
 e0d3160cadda276b2f78c766fd1cfde26fc11010 150764 xorg-server_1.20.2-1.diff.gz
Checksums-Sha256:
 bcbb3f7cb867ae1c69ea6d3fe5b89ec85021425e4427fb0d40a22088f7676778 4175 
xorg-server_1.20.2-1.dsc
 a560c199fdf5a6f99578627cf524933d6140a8cc04054cecb1443eabcd306530 8634406 
xorg-server_1.20.2.orig.tar.gz
 5b911c9cf65eb02978823da9bf2c94510d7e8f3b73bda1bde4f347620bac1417 150764 
xorg-server_1.20.2-1.diff.gz
Files:
 d15ece4de2a4303cd2856655a0811469 4175 x11 optional xorg-server_1.20.2-1.dsc
 dc243869c97ece2968a5e59c27cadffd 8634406 x11 optional 
xorg-server_1.20.2.orig.tar.gz
 8a32bfdb623190e1baefd9e562633493 150764 x11 optional 
xorg-server_1.20.2-1.diff.gz

-BEGIN PGP SIGNATURE-

iQJFBAEBCgAvFiEE45C5cAWC+uqVmsrUHu9T04o6nGcFAlvRfOcRHGFib2xsQGRl
Ymlhbi5vcmcACgkQHu9T04o6nGfDTQ/8Cvg7IY+YbdkX2sKaHTGMggeeGG6iVNod
VQyOjxQycUBowUgvDQIzz22YBHlY8BBLa6JtzSuN7JRr9agHIIyJjbruzKveRYks
f6qM56qr4/IFP6OH8Wm0SCkRF57dHhyKv66KZ2Ap3OKvkjQgy4qdwQ3oj31zfPSP
y1PGKPjl9RAo+C5HUETx/o/Oc0KEPln0Ek/pxjEii/9qOHi6F6hb9LiZzSGmJ4/A
D4z7jDfd8F2SidmnvDF9aoZzGjyKj3kILeVBSfR6QyulZQHoaa+HbTji8CfHLmoz
4wbxBOaMs/NF9tfcNllWqXfrFnvMr9eDjWI2q6jcjEvJ0M6jj5TCO1T9aLU5lJ9B
cHGNVKa/yBXJC55IPlLSd1kI8jjmGCIRMn1aWuMn+o1KaZldgA9PCE8A8GHqXtG8
ec2u7E6mASDEs7JQZPjPTyPbbpxSyKxNDUONpWMKy1hBwXROnVT16Aj92oYFQOWn
f5USoGwTrzzS9x+rDp87HYKCV2+94NRoqeRfk4lqv1bcrNCw41EgeFu6Gi2wgso6
PFDc8WqNaqJq9k/X2MG0uMxNb0UVrHBC4wjAZzfntLJGgGCAAvI+h5PPgiLTenqY
ugWY/7GQusqCOg1v1P62ee7Yekaee8dUayxzUW3FWqc3jORpL4r0eq5xCvuCZqgk
dunGPwuKFGE=
=v65d
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



[Git][xorg-team/lib/mesa][debian-experimental] 43 commits: docs: add sha256 checksums for 18.2.2

2018-10-25 Thread Andreas Boll
Andreas Boll pushed to branch debian-experimental at X Strike Force / lib / mesa


Commits:
cb63a4e1 by Juan A. Suarez Romero at 2018-10-05T10:45:35Z
docs: add sha256 checksums for 18.2.2

Signed-off-by: Juan A. Suarez Romero 

- - - - -
4ba6f668 by Jason Ekstrand at 2018-10-08T11:49:48Z
nir/cf: Remove phi sources if needed in nir_handle_add_jump

If the block in which the jump is inserted is the predecessor of a phi
then we need to remove phi sources otherwise the phi may end up with
things improperly connected.  This fixes the following CTS test when
dEQP is run with SPIR-V optimization recipe 1:

dEQP-VK.glsl.functions.control_flow.return_in_nested_loop_vertex

Cc: mesa-sta...@lists.freedesktop.org
Reviewed-by: Iago Toral Quiroga 
(cherry picked from commit bfc89c668e288747f51e447729914c91d27207e8)

- - - - -
57aeec6f by Józef Kucia at 2018-10-08T11:49:48Z
radeonsi: avoid sending GS_EMIT in shaders without outputs

Fixes GPU hangs.

Cc: 18.1 18.2 
Bugzilla: https://bugs.freedesktop.org/show_bug.cgi?id=107857
Signed-off-by: Józef Kucia 
Signed-off-by: Marek Olšák 
(cherry picked from commit e24a4e05c7a7b9f3a06fa55284d6258ceff44fdd)

- - - - -
382099b7 by Emil Velikov at 2018-10-08T11:49:48Z
st/nine: do not double-close the fd on teardown

As the newly introduced comment says:
 The pipe loader takes ownership of the fd

Thus, there's no need to close it again.

Cc: Patrick Rudolph 
Cc: Axel Davy 
Cc: mesa-sta...@lists.freedesktop.org>
Signed-off-by: Emil Velikov 
Reviewed-by: Axel Davy 
(cherry picked from commit 7b8d1b313cd01bb916898d8bb92a566534e37677)

- - - - -
d75a6028 by Emil Velikov at 2018-10-08T11:49:49Z
egl: make eglSwapInterval a no-op for !window surfaces

As the spec says, the function is a no-op when the surface is not a
window one.

That spec implies that EGL_TRUE should be returned in that case, yet
the ARM driver seems to return EGL_FALSE + EGL_BAD_SURFACE.

The Nvidia driver returns EGL_TRUE. We follow that behaviour until a
decision is made.

https://gitlab.khronos.org/egl/API/merge_requests/17

Cc: samiuddi 
Cc: Erik Faye-Lund 
Cc: Tomasz Figa 
Cc: 
Signed-off-by: Emil Velikov 
Reviewed-by: Eric Engestrom 
(cherry picked from commit 64b4ccde0cab4bbabba8abbf206ec5aa53399821)

- - - - -
164a28ad by Emil Velikov at 2018-10-08T11:54:30Z
egl: make eglSwapBuffers* a no-op for !window surfaces

Analogous to the previous commit - the spec says the function is a
no-op when a pbuffer or pixmap surface is used.

Cc: samiuddi 
Cc: Erik Faye-Lund 
Cc: Tomasz Figa 
Cc: 
Signed-off-by: Emil Velikov 
Reviewed-by: Eric Engestrom 
(cherry picked from commit 8f66743ca2cd781e912a3998196bf2ef1b9f8f4c)

- - - - -
8927cf03 by Jason Ekstrand at 2018-10-10T09:51:18Z
anv: Use separate MOCS settings for external BOs

On Broadwell and above, we have to use different MOCS settings to allow
the kernel to take over and disable caching when needed for external
buffers.  On Broadwell, this is especially important because the kernel
can't disable eLLC so we have to do it in userspace.  We very badly
don't want to do that on everything so we need separate MOCS for
external and internal BOs.

In order to do this, we add an anv-specific BO flag for "external" and
use that to distinguish between buffers which may be shared with other
processes and/or display and those which are entirely internal.  That,
together with an anv_mocs_for_bo helper lets us choose the right MOCS
settings for each BO use.

Bugzilla: https://bugs.freedesktop.org/show_bug.cgi?id=99507
Cc: mesa-sta...@lists.freedesktop.org
Reviewed-by: Lionel Landwerlin 
(cherry picked from commit 7a89a0d9edae638e68e4b4ee8e0cbb34baa9c080)
[Juan A. Suarez: resolve trivial conflicts]
Signed-off-by: Juan A. Suarez Romero 

Conflicts:
src/intel/vulkan/anv_image.c
src/intel/vulkan/genX_gpu_memcpy.c

- - - - -
857750d2 by Marek Olšák at 2018-10-10T09:53:44Z
drirc: add a workaround for ARMA 3

Cc: 18.2 
(cherry picked from commit 8e0b4cb8a1fcb1572be8eca16a806520aac08a61)

- - - - -
713e9911 by Tapani Pälli at 2018-10-10T10:09:21Z
glsl: do not attempt assignment if operand type not parsed correctly

v2: check types of both operands (Ian)

Cc: mesa-sta...@lists.freedesktop.org
Signed-off-by: Tapani Pälli 
Reviewed-by: Ian Romanick 
Bugzilla: https://bugs.freedesktop.org/show_bug.cgi?id=108012
(cherry pic

[Git][xorg-team/lib/mesa][upstream-experimental] 41 commits: docs: add sha256 checksums for 18.2.2

2018-10-25 Thread Andreas Boll
Andreas Boll pushed to branch upstream-experimental at X Strike Force / lib / 
mesa


Commits:
cb63a4e1 by Juan A. Suarez Romero at 2018-10-05T10:45:35Z
docs: add sha256 checksums for 18.2.2

Signed-off-by: Juan A. Suarez Romero 

- - - - -
4ba6f668 by Jason Ekstrand at 2018-10-08T11:49:48Z
nir/cf: Remove phi sources if needed in nir_handle_add_jump

If the block in which the jump is inserted is the predecessor of a phi
then we need to remove phi sources otherwise the phi may end up with
things improperly connected.  This fixes the following CTS test when
dEQP is run with SPIR-V optimization recipe 1:

dEQP-VK.glsl.functions.control_flow.return_in_nested_loop_vertex

Cc: mesa-sta...@lists.freedesktop.org
Reviewed-by: Iago Toral Quiroga 
(cherry picked from commit bfc89c668e288747f51e447729914c91d27207e8)

- - - - -
57aeec6f by Józef Kucia at 2018-10-08T11:49:48Z
radeonsi: avoid sending GS_EMIT in shaders without outputs

Fixes GPU hangs.

Cc: 18.1 18.2 
Bugzilla: https://bugs.freedesktop.org/show_bug.cgi?id=107857
Signed-off-by: Józef Kucia 
Signed-off-by: Marek Olšák 
(cherry picked from commit e24a4e05c7a7b9f3a06fa55284d6258ceff44fdd)

- - - - -
382099b7 by Emil Velikov at 2018-10-08T11:49:48Z
st/nine: do not double-close the fd on teardown

As the newly introduced comment says:
 The pipe loader takes ownership of the fd

Thus, there's no need to close it again.

Cc: Patrick Rudolph 
Cc: Axel Davy 
Cc: mesa-sta...@lists.freedesktop.org>
Signed-off-by: Emil Velikov 
Reviewed-by: Axel Davy 
(cherry picked from commit 7b8d1b313cd01bb916898d8bb92a566534e37677)

- - - - -
d75a6028 by Emil Velikov at 2018-10-08T11:49:49Z
egl: make eglSwapInterval a no-op for !window surfaces

As the spec says, the function is a no-op when the surface is not a
window one.

That spec implies that EGL_TRUE should be returned in that case, yet
the ARM driver seems to return EGL_FALSE + EGL_BAD_SURFACE.

The Nvidia driver returns EGL_TRUE. We follow that behaviour until a
decision is made.

https://gitlab.khronos.org/egl/API/merge_requests/17

Cc: samiuddi 
Cc: Erik Faye-Lund 
Cc: Tomasz Figa 
Cc: 
Signed-off-by: Emil Velikov 
Reviewed-by: Eric Engestrom 
(cherry picked from commit 64b4ccde0cab4bbabba8abbf206ec5aa53399821)

- - - - -
164a28ad by Emil Velikov at 2018-10-08T11:54:30Z
egl: make eglSwapBuffers* a no-op for !window surfaces

Analogous to the previous commit - the spec says the function is a
no-op when a pbuffer or pixmap surface is used.

Cc: samiuddi 
Cc: Erik Faye-Lund 
Cc: Tomasz Figa 
Cc: 
Signed-off-by: Emil Velikov 
Reviewed-by: Eric Engestrom 
(cherry picked from commit 8f66743ca2cd781e912a3998196bf2ef1b9f8f4c)

- - - - -
8927cf03 by Jason Ekstrand at 2018-10-10T09:51:18Z
anv: Use separate MOCS settings for external BOs

On Broadwell and above, we have to use different MOCS settings to allow
the kernel to take over and disable caching when needed for external
buffers.  On Broadwell, this is especially important because the kernel
can't disable eLLC so we have to do it in userspace.  We very badly
don't want to do that on everything so we need separate MOCS for
external and internal BOs.

In order to do this, we add an anv-specific BO flag for "external" and
use that to distinguish between buffers which may be shared with other
processes and/or display and those which are entirely internal.  That,
together with an anv_mocs_for_bo helper lets us choose the right MOCS
settings for each BO use.

Bugzilla: https://bugs.freedesktop.org/show_bug.cgi?id=99507
Cc: mesa-sta...@lists.freedesktop.org
Reviewed-by: Lionel Landwerlin 
(cherry picked from commit 7a89a0d9edae638e68e4b4ee8e0cbb34baa9c080)
[Juan A. Suarez: resolve trivial conflicts]
Signed-off-by: Juan A. Suarez Romero 

Conflicts:
src/intel/vulkan/anv_image.c
src/intel/vulkan/genX_gpu_memcpy.c

- - - - -
857750d2 by Marek Olšák at 2018-10-10T09:53:44Z
drirc: add a workaround for ARMA 3

Cc: 18.2 
(cherry picked from commit 8e0b4cb8a1fcb1572be8eca16a806520aac08a61)

- - - - -
713e9911 by Tapani Pälli at 2018-10-10T10:09:21Z
glsl: do not attempt assignment if operand type not parsed correctly

v2: check types of both operands (Ian)

Cc: mesa-sta...@lists.freedesktop.org
Signed-off-by: Tapani Pälli 
Reviewed-by: Ian Romanick 
Bugzilla: https://bugs.freedesktop.org/show_bug.cgi?id=108012
(cherry 

Bug#881891: marked as done (xwayland: FatalError() when new monitor is added (not always reproced))

2018-10-25 Thread Debian Bug Tracking System
Your message dated Thu, 25 Oct 2018 09:01:05 +
with message-id 
and subject line Bug#881891: fixed in xorg-server 2:1.20.2-1
has caused the Debian Bug report #881891,
regarding xwayland: FatalError() when new monitor is added (not always reproced)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
881891: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881891
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: xwayland
Version: 2:1.19.5-1
Severity: important
Tags: upstream

Dear maintainers and developers,

My laptop OS is Debian Buster. The xwayland crashed when one new monitor was
added. This cannot be always triggered when the new monitor is added. After I
install the debugging symbols of xwayland, the crash is from one FatalError.
Attach stack trace:

mdl@debian:~/CoreDump$ gdb /usr/bin/Xwayland core.0
GNU gdb (Debian 7.12-6+b1) 7.12.0.20161007-git
Copyright (C) 2016 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later 
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
.
Find the GDB manual and other documentation resources online at:
.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/bin/Xwayland...Reading symbols from
/usr/lib/debug/.build-
id/d9/b82a9beaac3da55807c1a81c5a73f7afdcbe1a.debug...done.
done.
[New LWP 2172]
[New LWP 2173]
[New LWP 2174]
[New LWP 2175]
[New LWP 2176]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/bin/Xwayland :0 -rootless -terminate -core -listen
4 -listen 5 -displayfd'.
Program terminated with signal SIGABRT, Aborted.
#0  __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:51
51  ../sysdeps/unix/sysv/linux/raise.c: No such file or directory.
[Current thread is 1 (Thread 0x7f197b7a0a40 (LWP 2172))]
(gdb) info stack
#0  __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:51
#1  0x7f19786a442a in __GI_abort () at abort.c:89
#2  0x55c7d23858ba in OsAbort () at ../../../../os/utils.c:1361
#3  0x55c7d238b3d3 in AbortServer () at ../../../../os/log.c:877
#4  0x55c7d238c1f5 in FatalError (
f=f@entry=0x55c7d2393e20 "failed to read Wayland events: %s\n")
at ../../../../os/log.c:1015
#5  0x55c7d221384f in xwl_read_events (xwl_screen=0x55c7d4430340)
at ../../../../../hw/xwayland/xwayland.c:592
#6  0x55c7d2383371 in ospoll_wait (ospoll=0x55c7d4425660,
timeout=) at ../../../../os/ospoll.c:412
#7  0x55c7d237c35b in WaitForSomething (are_ready=)
at ../../../../os/WaitFor.c:226
#8  0x55c7d2348193 in Dispatch () at ../../../../dix/dispatch.c:422
#9  0x55c7d234c410 in dix_main (argc=11, argv=0x7fffbcb77c68,
envp=) at ../../../../dix/main.c:287
#10 0x7f19786902e1 in __libc_start_main (main=0x55c7d2212e60 ,
argc=11, argv=0x7fffbcb77c68, init=,
fini=, rtld_fini=,
stack_end=0x7fffbcb77c58) at ../csu/libc-start.c:291
#11 0x55c7d2212e9a in _start ()



-- System Information:
Debian Release: buster/sid
  APT prefers testing-debug
  APT policy: (500, 'testing-debug'), (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.13.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages xwayland depends on:
ii  libaudit1   1:2.8.1-2
ii  libbsd0 0.8.6-3
ii  libc6   2.24-17
ii  libdrm2 2.4.85-1
ii  libegl1 1.0.0-1
ii  libepoxy0   1.3.1-3
ii  libgbm1 17.2.4-1+b1
ii  libgcrypt20 1.7.9-2
ii  libgl1  1.0.0-1
ii  libpixman-1-0   0.34.0-1
ii  libselinux1 2.7-2
ii  libsystemd0 235-2
ii  libwayland-client0  1.14.0-1
ii  libxau6 1:1.0.8-1+b2
ii  libxdmcp6   1:1.1.2-3
ii  libxfont2   1:2.0.1-4
ii  libxshmfence1   1.2-1+b2
ii  xserver-common  2:1.19.5-1

xwayland recommends no packages.

xwayland suggests no packages.

-- no debconf information
--- End Messa

Bug#911146: marked as done (xwayland spurious crashes)

2018-10-25 Thread Debian Bug Tracking System
Your message dated Thu, 25 Oct 2018 09:01:05 +
with message-id 
and subject line Bug#911146: fixed in xorg-server 2:1.20.2-1
has caused the Debian Bug report #911146,
regarding xwayland spurious crashes
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
911146: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911146
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: xwayland
Version: 2:1.20.1-5
Severity: normal

Hi,
since a couple of days I'm seeing spurious xwayland crashes like

Core was generated by `Xwayland :0 -rootless -terminate -listen 12 -listen 13 
-wm 53'.
Program terminated with signal SIGABRT, Aborted.
#0  __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:51
#1  0x7f367b3f32f1 in __GI_abort () at abort.c:79
#2  0x5647cc51258a in OsAbort () at ../../../../os/utils.c:1350
#3  0x5647cc518093 in AbortServer () at ../../../../os/log.c:877
#4  0x5647cc518ef9 in FatalError (f=f@entry=0x5647cc53c050 "Caught signal 
%d (%s). Server aborting\n") at ../../../../os/log.c:1015
#5  0x5647cc50f9a1 in OsSigHandler (signo=11, sip=, 
unused=) at ../../../../os/osinit.c:156
#6  
#7  0x5647cc476c3e in present_vblank_notify 
(vblank=vblank@entry=0x5647cd3455f0, kind=kind@entry=0 '\000', 
mode=mode@entry=1 '\001', ust=ust@entry=15726925190, crtc_msc=1)
at ../../../../present/present_vblank.c:37
#8  0x5647cc47844c in present_wnmd_flip_notify (crtc_msc=, 
ust=15726925190, vblank=0x5647cd3455f0) at 
../../../../present/present_wnmd.c:194
#9  present_wnmd_event_notify (window=, event_id=, ust=15726925190, msc=) at 
../../../../present/present_wnmd.c:228
#10 0x5647cc3ba2c7 in xwl_present_sync_callback (data=0x5647cd67f840, 
callback=, time=) at 
../../../../../hw/xwayland/xwayland-present.c:282
#11 0x7f367aee0fce in ffi_call_unix64 () from 
/usr/lib/x86_64-linux-gnu/libffi.so.6
#12 0x7f367aee093f in ffi_call () from /usr/lib/x86_64-linux-gnu/libffi.so.6
#13 0x7f367c6e928d in wl_closure_invoke 
(closure=closure@entry=0x5647cd685990, flags=flags@entry=1, target=, target@entry=0x5647cd3456b0, opcode=opcode@entry=0, data=)
at ../src/connection.c:1006
#14 0x7f367c6e5ac9 in dispatch_event (display=display@entry=0x5647cccfc680, 
queue=) at ../src/wayland-client.c:1427
#15 0x7f367c6e6f94 in dispatch_queue (queue=0x5647cccfc748, 
display=0x5647cccfc680) at ../src/wayland-client.c:1573
#16 wl_display_dispatch_queue_pending (display=0x5647cccfc680, 
queue=0x5647cccfc748) at ../src/wayland-client.c:1815
#17 0x7f367c6e6fec in wl_display_dispatch_pending (display=) 
at ../src/wayland-client.c:1878
#18 0x5647cc3afd2b in xwl_read_events (xwl_screen=0x5647cccf88c0) at 
../../../../../hw/xwayland/xwayland.c:814
#19 0x5647cc510351 in ospoll_wait (ospoll=0x5647cccedf90, 
timeout=) at ../../../../os/ospoll.c:651
#20 0x5647cc5093d3 in WaitForSomething (are_ready=0) at 
../../../../os/WaitFor.c:208
#21 0x5647cc4d97fc in Dispatch () at ../../../../include/list.h:220
#22 0x5647cc4dd9f6 in dix_main (argc=10, argv=0x7fff86573498, 
envp=) at ../../../../dix/main.c:276
#23 0x7f367b3deb17 in __libc_start_main (main=0x5647cc3af1b0 , 
argc=10, argv=0x7fff86573498, init=, fini=, 
rtld_fini=, stack_end=0x7fff86573488)
at ../csu/libc-start.c:310

I'm usually running emacs, firefox and pidgin at that time and often it
happens when I'm not using these applications at all. The wayland
compositor used is rootston contained in
https://packages.debian.org/experimental/libwlroots-examples

I'd be thankful for any pointers to track that down.

Cheers,
 -- Guido

-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable-debug'), (500, 
'testing-debug'), (500, 'stable-updates'), (500, 'unstable'), (500, 'stable'), 
(1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, armhf

Kernel: Linux 4.18.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages xwayland depends on:
ii  libaudit1   1:2.8.4-2
ii  libbsd0 0.9.1-1
ii  libc6   2.27-6
ii  libdrm2 2.4.94-1
ii  libegl1 1.1.0-1
ii  libepoxy0   1.5.2-0.3
ii  libgbm1 18.1.7-1
ii  libgcrypt20 1.8.3-1
ii  libgl1  1.1.0-1
ii  libpixman-1-0   0.34.0-2
ii  libselinux1 2.8-1+b1
ii  libsystemd0 239-10
ii 

Bug#911680: marked as done (xserver-xorg-core: X server crashes when loading libglamorgl.so module)

2018-10-25 Thread Debian Bug Tracking System
Your message dated Thu, 25 Oct 2018 09:01:05 +
with message-id 
and subject line Bug#911680: fixed in xorg-server 2:1.20.2-1
has caused the Debian Bug report #911680,
regarding xserver-xorg-core: X server crashes when loading libglamorgl.so module
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
911680: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=911680
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: xserver-xorg-core
Version: 2:1.20.1-5
Severity: grave
Justification: renders package unusable

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
Apparently after xserver-xorg-core had been updated to 1.20.1 the X
server stopped working at all
   * What exactly did you do (or not do) that was effective (or
 ineffective)?
Nothing effective could be done. The configuration has changed only
the binary package was updated
   * What was the outcome of this action?
X server crashes but the machine can be accessed through its console
   * What outcome did you expect instead?
The X server has been working OK so far, since no configuration change had 
been
made, only regular updates, I didn't expect a problem to occur 
at the binary level with any of the modules shipped by this package

*** End of the template - remove these template lines ***


-- Package-specific info:
/etc/X11/X does not exist.
/etc/X11/X is not a symlink.
/etc/X11/X is not executable.

VGA-compatible devices on PCI bus:
--
00:02.0 VGA compatible controller [0300]: InnoTek Systemberatung GmbH 
VirtualBox Graphics Adapter [80ee:beef]

/etc/X11/xorg.conf does not exist.

/etc/X11/xorg.conf.d does not exist.

/etc/modprobe.d contains no KMS configuration files.

Kernel version (/proc/version):
---
Linux version 4.18.0-2-amd64 (debian-ker...@lists.debian.org) (gcc version 
7.3.0 (Debian 7.3.0-29)) #1 SMP Debian 4.18.10-2 (2018-10-07)

Xorg X server log files on system:
--
-rw-r--r-- 1 manghi manghi 7392 Oct 22 14:52 
/home/manghi/.local/share/xorg/Xorg.0.log
-rw-r--r-- 1 root   root   7138 Oct 23 13:30 /var/log/Xorg.0.log

Contents of most recent Xorg X server log file (/var/log/Xorg.0.log):
-
[23.816] 
X.Org X Server 1.20.1
X Protocol Version 11, Revision 0
[23.816] Build Operating System: Linux 4.9.0-8-amd64 x86_64 Debian
[23.816] Current Operating System: Linux buster 4.18.0-2-amd64 #1 SMP 
Debian 4.18.10-2 (2018-10-07) x86_64
[23.816] Kernel command line: BOOT_IMAGE=/boot/vmlinuz-4.18.0-2-amd64 
root=UUID=91ec105a-aee4-4ee4-9b23-bf6ba598c8bb ro quiet
[23.816] Build Date: 10 October 2018  04:23:15PM
[23.816] xorg-server 2:1.20.1-5 (https://www.debian.org/support) 
[23.816] Current version of pixman: 0.34.0
[23.816]Before reporting problems, check http://wiki.x.org
to make sure that you have the latest version.
[23.816] Markers: (--) probed, (**) from config file, (==) default setting,
(++) from command line, (!!) notice, (II) informational,
(WW) warning, (EE) error, (NI) not implemented, (??) unknown.
[23.816] (==) Log file: "/var/log/Xorg.0.log", Time: Tue Oct 23 13:30:39 
2018
[23.816] (==) Using system config directory "/usr/share/X11/xorg.conf.d"
[23.816] (==) No Layout section.  Using the first Screen section.
[23.816] (==) No screen section available. Using defaults.
[23.816] (**) |-->Screen "Default Screen Section" (0)
[23.816] (**) |   |-->Monitor ""
[23.817] (==) No monitor specified for screen "Default Screen Section".
Using a default monitor configuration.
[23.817] (==) Automatically adding devices
[23.817] (==) Automatically enabling devices
[23.817] (==) Automatically adding GPU devices
[23.817] (==) Max clients allowed: 256, resource mask: 0x1f
[23.817] (WW) The directory "/usr/share/fonts/X11/cyrillic" does not exist.
[23.817]Entry deleted from font path.
[23.817] (==) FontPath set to:
/usr/share/fonts/X11/misc,
/usr/share/fonts/X11/100dpi/:unscaled,
/usr/share/fonts/X11/75dpi/:unscaled,
/usr/share/fonts/X11/Type1,
/usr/share/fonts/X11/100dpi,
/usr/share/fonts/X11/75dpi,
built-ins
[23.817] (==) ModulePath set to "/usr/lib/xorg/modules"
[23.817] (II) The server relies on udev to provide the list of input 
devices.
If no d

Processing of xorg-server_1.20.2-1_source.changes

2018-10-25 Thread Debian FTP Masters
xorg-server_1.20.2-1_source.changes uploaded successfully to localhost
along with the files:
  xorg-server_1.20.2-1.dsc
  xorg-server_1.20.2.orig.tar.gz
  xorg-server_1.20.2-1.diff.gz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



[Git][xorg-team/xserver/xorg-server][debian-unstable] 2 commits: Set source format to 1.0.

2018-10-25 Thread Andreas Boll
Andreas Boll pushed to branch debian-unstable at X Strike Force / xserver / 
xorg-server


Commits:
487c7527 by Andreas Boll at 2018-10-25T08:19:05Z
Set source format to 1.0.

- - - - -
9f6be25a by Andreas Boll at 2018-10-25T08:19:40Z
Upload to unstable.

- - - - -


2 changed files:

- debian/changelog
- + debian/source/format


Changes:

=
debian/changelog
=
@@ -1,4 +1,4 @@
-xorg-server (2:1.20.2-1) UNRELEASED; urgency=medium
+xorg-server (2:1.20.2-1) unstable; urgency=medium
 
   * New upstream release.
 - Fixes various crashes with xwayland (Closes: #777625, #881891,
@@ -6,8 +6,9 @@ xorg-server (2:1.20.2-1) UNRELEASED; urgency=medium
 - Fixes a crash when running the X server inside virtualbox
   (Closes: #911680).
   * Drop 08_dont-init-glamor-on-llvmpipe.diff, upstream.
+  * Set source format to 1.0.
 
- -- Andreas Boll   Wed, 24 Oct 2018 13:32:00 +0200
+ -- Andreas Boll   Thu, 25 Oct 2018 10:19:31 +0200
 
 xorg-server (2:1.20.1-5) unstable; urgency=medium
 


=
debian/source/format
=
@@ -0,0 +1 @@
+1.0



View it on GitLab: 
https://salsa.debian.org/xorg-team/xserver/xorg-server/compare/44caf37585e095531df665d2ff6d7c9e76bd52ab...9f6be25a5b6b1f10c471778115679432fe940c2d

-- 
View it on GitLab: 
https://salsa.debian.org/xorg-team/xserver/xorg-server/compare/44caf37585e095531df665d2ff6d7c9e76bd52ab...9f6be25a5b6b1f10c471778115679432fe940c2d
You're receiving this email because of your account on salsa.debian.org.


[Git][xorg-team/xserver/xorg-server] Pushed new tag xorg-server-2_1.20.2-1

2018-10-25 Thread Andreas Boll
Andreas Boll pushed new tag xorg-server-2_1.20.2-1 at X Strike Force / xserver 
/ xorg-server

-- 
View it on GitLab: 
https://salsa.debian.org/xorg-team/xserver/xorg-server/tree/xorg-server-2_1.20.2-1
You're receiving this email because of your account on salsa.debian.org.