[Touch-packages] [Bug 1850887] Re: Audio / Sound reverts to HDMI when power event occurs

2019-11-06 Thread Wissam Youssef
Happens to me as well after upgrade from 19.04 to 19.10

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pulseaudio in Ubuntu.
https://bugs.launchpad.net/bugs/1850887

Title:
  Audio / Sound reverts to HDMI when power event occurs

Status in pulseaudio package in Ubuntu:
  Confirmed

Bug description:
  PulseAudio reverts the sound to HDMI all the time when a HDMI related
  power event occurs. That means, although I have set another USB sound
  device plugged in and set as default under sound settings, when an
  application like Kodi or the system shuts off the HDMI monitor and I
  reactivate the monitor, the sound is set to HDMI output again and
  again.

  That probably has to do with the fix to the reported Bug # 1711101 and
  definitely not happened at Ubuntu 19.04. I switched to Ubuntu 19.10
  two days ago.

  Setting the USB device as default does not help, even when done by
  PulseAudio mixer (gui) and removing HDMI output from the alternatives
  option.

  Expected behavior:
  PulseAudio keeps the sound setting to the selected device

  Actual behavior: 
  PulseAudio changes to HDMI at every HDMI power event

  Annoying manual workaround:
  Setting the desired Audio option on the control panel after every HDMI power 
event again

  ProblemType: Bug
  DistroRelease: Ubuntu 19.10
  Component: pulseaudio
  Version: 1:13.0-1ubuntu1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pulseaudio/+bug/1850887/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1718658] Re: ecryptfs-mount-private fails to initialize ecryptfs keys

2019-11-06 Thread arQon
#34 said:
This bug affects a cryptographic (read: highly sensitive) feature, is 15 months 
old, a patch was proposed 12 months ago, but it is still of "Undecided" 
importance and still "Unassigned"? Come on! Are the ecryptfs-utils and systemd 
packages unmaintained at Ubuntu?

Well, this bug is now over TWO YEARS old, and is still broken in 19.10.

Expecting the systemd devs to care is, frankly, naive. I would have
expected Canonical to at least do SOMETHING by now, even if it was just
to add the keyctl hack to .profile, but that still leaves a ton of
problems like non-root users never being unable to unmount their
encrypted data - especially when you add in the OTHER systemd bugs that
cause it to stay mounted and unencrypted even after logout.

The problem here is that Kirkland was the one who was hot for ecryptfs,
and he left Canonical a long time ago. While he may technically still be
listed as the maintainer of the package, he clearly gives 0 f**ks about
it. (He was still on Ubuntu staff when this bug first surfaced, and
didn't even care THEN when it was literally (part of) his job, so it's
no surprise he still doesn't now).

The package needs to be demoted out of the repos, and the default
behavior for encrypted /home changed to use something else - anything
else, really - if it hasn't been already. In the meantime, the best
thing you can do is just warn people not to use it, because at 2 years
and counting I wouldn't hold my breath waiting for it to ever get sorted
out...

TLDR: use the keyctl hack from #26 to get your data back, then get the
hell off ecryptfs as fast as possible.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1718658

Title:
  ecryptfs-mount-private fails to initialize ecryptfs keys

Status in ecryptfs-utils package in Ubuntu:
  Confirmed
Status in systemd package in Ubuntu:
  Confirmed

Bug description:
  ecryptfs-mount-private fails to mount the ecryptfs after the 1st
  reboot after creating the ecryptfs by ecryptfs-setup-private.

  After the unsucessful attempt dmesg contains:

  [ 1265.695388] Could not find key with description: []
  [ 1265.695393] process_request_key_err: No key
  [ 1265.695394] Could not find valid key in user session keyring for sig 
specified in mount option: []
  [ 1265.695395] One or more global auth toks could not properly register; rc = 
[-2]
  [ 1265.695396] Error parsing options; rc = [-2]

  Note: The correct key ID has been replaced in the "".

  I also accidentally found an workaround - just running ecrytpfs-
  manager and then the ecryptfs-mount-private (it does not ask for
  password for the second time and mounts the ecryptfs correctly):

  host:~$ ecryptfs-manager

  eCryptfs key management menu
  ---
1. Add passphrase key to keyring
2. Add public key to keyring
3. Generate new public/private keypair
4. Exit

  Make selection: 4
  host:~$ ls Private/
  Access-Your-Private-Data.desktop  README.txt
  host:~$ ecryptfs-mount-private 
  host:~$ ls Private/
  

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1718658/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1851337] Re: package openssh-server 1:8.0p1-6build1 failed to install/upgrade: installed openssh-server package post-installation script subprocess returned error exit status 1

2019-11-06 Thread Bryce Harrington
Hi csozo,

It looks like your system was under some form of memory pressure prior
to the openssh installation.  So I don't think this is a fault
necessarily in openssh itself but rather due to your computer having run
out of memory and gotten into some sort of inconsistent state.

I would recommend rebooting the machine (if you haven't already), and
running `apt-get -f install`.  It looks like there might have been some
reconfiguration questions (possibly updates to some of your manual
configuration work?) so I'd run it from a terminal window and keep an
eye on it.

Once you've done that, can you let us know if the issue is resolved or
if you get a better insight as to what went wrong?

** Description changed:

  I don't know.
  
  ProblemType: Package
  DistroRelease: Ubuntu 19.10
  Package: openssh-server 1:8.0p1-6build1
  ProcVersionSignature: Ubuntu 5.3.0-19.20-generic 5.3.1
  Uname: Linux 5.3.0-19-generic x86_64
  ApportVersion: 2.20.11-0ubuntu8.1
  Architecture: amd64
  Date: Tue Nov  5 08:22:46 2019
  ErrorMessage: installed openssh-server package post-installation script 
subprocess returned error exit status 1
  InstallationDate: Installed on 2019-01-15 (293 days ago)
  InstallationMedia: Ubuntu 18.10 "Cosmic Cuttlefish" - Release amd64 
(20181017.3)
  Python3Details: /usr/bin/python3.7, Python 3.7.5rc1, python3-minimal, 3.7.5-1
  PythonDetails: /usr/bin/python2.7, Python 2.7.17rc1, python-minimal, 2.7.17-1
  RelatedPackageVersions:
   dpkg 1.19.7ubuntu2
   apt  1.9.4
  SSHDConfig: Error: command ['/usr/sbin/sshd', '-T'] failed with exit code 1: 
sshd: no hostkeys available -- exiting.
  SourcePackage: openssh
  Title: package openssh-server 1:8.0p1-6build1 failed to install/upgrade: 
installed openssh-server package post-installation script subprocess returned 
error exit status 1
  UpgradeStatus: Upgraded to eoan on 2019-11-05 (0 days ago)
  
- 
  The dpkg log shows:
  
+ ...
  Setting up default-jre-headless (2:1.11-72) ...
  Setting up libpangoxft-1.0-0:amd64 (1.42.4-7) ...
  Setting up libqt4-network:amd64 (4:4.8.7+dfsg-7ubuntu3) ...
  Setting up openssh-server (1:8.0p1-6build1) ...
  Installing new version of config file /etc/ssh/moduli ...
  rescue-ssh.target is a disabled or a static unit, not starting it.
  Job for ssh.service failed because the control process exited with error code.
  See "systemctl status ssh.service" and "journalctl -xe" for details.
  invoke-rc.d: initscript ssh, action "restart" failed.
  ● ssh.service - OpenBSD Secure Shell server
-Loaded: loaded 
(]8;;file://csozo-PC/lib/systemd/system/ssh.service/lib/systemd/system/ssh.service]8;;;
 enabled; vendor preset: enabled)
-Active: activating (auto-restart) (Result: exit-code) since Tue 2019-11-05 
08:22:46 CET; 6ms ago
-  Docs: ]8;;man:sshd(8)man:sshd(8)]8;;
-]8;;man:sshd_config(5)man:sshd_config(5)]8;;
-   Process: 7160 ExecStartPre=/usr/sbin/sshd -t (code=exited, 
status=1/FAILURE)
+    Loaded: loaded 
(]8;;file://csozo-PC/lib/systemd/system/ssh.service/lib/systemd/system/ssh.service]8;;;
 enabled; vendor preset: enabled)
+    Active: activating (auto-restart) (Result: exit-code) since Tue 2019-11-05 
08:22:46 CET; 6ms ago
+  Docs: ]8;;man:sshd(8)man:sshd(8)]8;;
+    ]8;;man:sshd_config(5)man:sshd_config(5)]8;;
+   Process: 7160 ExecStartPre=/usr/sbin/sshd -t (code=exited, 
status=1/FAILURE)
  dpkg: error processing package openssh-server (--configure):
-  installed openssh-server package post-installation script subprocess 
returned error exit status 1
+  installed openssh-server package post-installation script subprocess 
returned error exit status 1
+ 
+ Apt ordering shows:
+ 
+ ...
+ python-lockfile:amd64: Install
+ rygel:amd64: Install
+ xbrlapi:amd64: Install
+ NULL: ConfigurePending
+ 
+ Dmesg indicates that an OOM killer event had occurred previously:
+ 
+ [26198.228512] gsd-housekeepin invoked oom-killer: 
gfp_mask=0x6200ca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0
+ [26198.228515] CPU: 0 PID: 4355 Comm: gsd-housekeepin Tainted: G   OE 
5.0.0-32-generic #34-Ubuntu
+ [26198.228515] Hardware name: System manufacturer System Product Name/H61M-K, 
BIOS 0801 07/21/2014
+ [26198.228516] Call Trace:
+ [26198.228522]  dump_stack+0x63/0x8a
+ [26198.228525]  dump_header+0x54/0x2fb
+ [26198.228527]  ? sched_clock+0x9/0x10
+ [26198.228529]  oom_kill_process.cold.30+0xb/0x1d6
+ [26198.228530]  out_of_memory+0x1c3/0x490
+ [26198.228532]  __alloc_pages_slowpath+0xb68/0xea0
+ [26198.228534]  __alloc_pages_nodemask+0x2c4/0x2e0
+ [26198.228536]  alloc_pages_current+0x81/0xe0
+ [26198.228538]  __page_cache_alloc+0x6a/0xa0
+ [26198.228540]  filemap_fault+0x3f0/0x8b0
+ [26198.228541]  ? filemap_map_pages+0x1ae/0x380
+ [26198.228544]  ext4_filemap_fault+0x31/0x44
+ [26198.228546]  __do_fault+0x3c/0x130
+ [26198.228548]  __handle_mm_fault+0xe4b/0x1280
+ [26198.228550]  ? __switch_to_asm+0x41/0x70
+ [26198.228552]  

[Touch-packages] [Bug 1851337] Re: package openssh-server 1:8.0p1-6build1 failed to install/upgrade: installed openssh-server package post-installation script subprocess returned error exit status 1

2019-11-06 Thread Bryce Harrington
** Description changed:

  I don't know.
  
  ProblemType: Package
  DistroRelease: Ubuntu 19.10
  Package: openssh-server 1:8.0p1-6build1
  ProcVersionSignature: Ubuntu 5.3.0-19.20-generic 5.3.1
  Uname: Linux 5.3.0-19-generic x86_64
  ApportVersion: 2.20.11-0ubuntu8.1
  Architecture: amd64
  Date: Tue Nov  5 08:22:46 2019
  ErrorMessage: installed openssh-server package post-installation script 
subprocess returned error exit status 1
  InstallationDate: Installed on 2019-01-15 (293 days ago)
  InstallationMedia: Ubuntu 18.10 "Cosmic Cuttlefish" - Release amd64 
(20181017.3)
  Python3Details: /usr/bin/python3.7, Python 3.7.5rc1, python3-minimal, 3.7.5-1
  PythonDetails: /usr/bin/python2.7, Python 2.7.17rc1, python-minimal, 2.7.17-1
  RelatedPackageVersions:
-  dpkg 1.19.7ubuntu2
-  apt  1.9.4
+  dpkg 1.19.7ubuntu2
+  apt  1.9.4
  SSHDConfig: Error: command ['/usr/sbin/sshd', '-T'] failed with exit code 1: 
sshd: no hostkeys available -- exiting.
  SourcePackage: openssh
  Title: package openssh-server 1:8.0p1-6build1 failed to install/upgrade: 
installed openssh-server package post-installation script subprocess returned 
error exit status 1
  UpgradeStatus: Upgraded to eoan on 2019-11-05 (0 days ago)
+ 
+ 
+ The dpkg log shows:
+ 
+ Setting up default-jre-headless (2:1.11-72) ...
+ Setting up libpangoxft-1.0-0:amd64 (1.42.4-7) ...
+ Setting up libqt4-network:amd64 (4:4.8.7+dfsg-7ubuntu3) ...
+ Setting up openssh-server (1:8.0p1-6build1) ...
+ Installing new version of config file /etc/ssh/moduli ...
+ rescue-ssh.target is a disabled or a static unit, not starting it.
+ Job for ssh.service failed because the control process exited with error code.
+ See "systemctl status ssh.service" and "journalctl -xe" for details.
+ invoke-rc.d: initscript ssh, action "restart" failed.
+ ● ssh.service - OpenBSD Secure Shell server
+Loaded: loaded 
(]8;;file://csozo-PC/lib/systemd/system/ssh.service/lib/systemd/system/ssh.service]8;;;
 enabled; vendor preset: enabled)
+Active: activating (auto-restart) (Result: exit-code) since Tue 2019-11-05 
08:22:46 CET; 6ms ago
+  Docs: ]8;;man:sshd(8)man:sshd(8)]8;;
+]8;;man:sshd_config(5)man:sshd_config(5)]8;;
+   Process: 7160 ExecStartPre=/usr/sbin/sshd -t (code=exited, 
status=1/FAILURE)
+ dpkg: error processing package openssh-server (--configure):
+  installed openssh-server package post-installation script subprocess 
returned error exit status 1

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1851337

Title:
  package openssh-server 1:8.0p1-6build1 failed to install/upgrade:
  installed openssh-server package post-installation script subprocess
  returned error exit status 1

Status in openssh package in Ubuntu:
  Incomplete

Bug description:
  I don't know.

  ProblemType: Package
  DistroRelease: Ubuntu 19.10
  Package: openssh-server 1:8.0p1-6build1
  ProcVersionSignature: Ubuntu 5.3.0-19.20-generic 5.3.1
  Uname: Linux 5.3.0-19-generic x86_64
  ApportVersion: 2.20.11-0ubuntu8.1
  Architecture: amd64
  Date: Tue Nov  5 08:22:46 2019
  ErrorMessage: installed openssh-server package post-installation script 
subprocess returned error exit status 1
  InstallationDate: Installed on 2019-01-15 (293 days ago)
  InstallationMedia: Ubuntu 18.10 "Cosmic Cuttlefish" - Release amd64 
(20181017.3)
  Python3Details: /usr/bin/python3.7, Python 3.7.5rc1, python3-minimal, 3.7.5-1
  PythonDetails: /usr/bin/python2.7, Python 2.7.17rc1, python-minimal, 2.7.17-1
  RelatedPackageVersions:
   dpkg 1.19.7ubuntu2
   apt  1.9.4
  SSHDConfig: Error: command ['/usr/sbin/sshd', '-T'] failed with exit code 1: 
sshd: no hostkeys available -- exiting.
  SourcePackage: openssh
  Title: package openssh-server 1:8.0p1-6build1 failed to install/upgrade: 
installed openssh-server package post-installation script subprocess returned 
error exit status 1
  UpgradeStatus: Upgraded to eoan on 2019-11-05 (0 days ago)

  The dpkg log shows:

  ...
  Setting up default-jre-headless (2:1.11-72) ...
  Setting up libpangoxft-1.0-0:amd64 (1.42.4-7) ...
  Setting up libqt4-network:amd64 (4:4.8.7+dfsg-7ubuntu3) ...
  Setting up openssh-server (1:8.0p1-6build1) ...
  Installing new version of config file /etc/ssh/moduli ...
  rescue-ssh.target is a disabled or a static unit, not starting it.
  Job for ssh.service failed because the control process exited with error code.
  See "systemctl status ssh.service" and "journalctl -xe" for details.
  invoke-rc.d: initscript ssh, action "restart" failed.
  ● ssh.service - OpenBSD Secure Shell server
     Loaded: loaded 
(]8;;file://csozo-PC/lib/systemd/system/ssh.service/lib/systemd/system/ssh.service]8;;;
 enabled; vendor preset: enabled)
     Active: activating (auto-restart) (Result: exit-code) since Tue 2019-11-05 
08:22:46 CET; 6ms ago
   Docs: ]8;;man:sshd(8)man:sshd(8)]8;;
     

[Touch-packages] [Bug 1850184] Re: losetup -f broken in 2.0.6-1ubuntu2

2019-11-06 Thread Launchpad Bug Tracker
This bug was fixed in the package klibc - 2.0.7-1ubuntu4

---
klibc (2.0.7-1ubuntu4) focal; urgency=medium

  * Fix losetup, by switching to kernel uapi header, instead of buggy
klibc one. LP: #1850184

 -- Dimitri John Ledkov   Thu, 07 Nov 2019 01:08:13
+

** Changed in: klibc (Ubuntu Focal)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to klibc in Ubuntu.
https://bugs.launchpad.net/bugs/1850184

Title:
  losetup -f broken in 2.0.6-1ubuntu2

Status in klibc package in Ubuntu:
  Fix Released
Status in klibc source package in Eoan:
  Confirmed
Status in klibc source package in Focal:
  Fix Released

Bug description:
  [Impact]

   * sudo /usr/lib/klibc/bin/losetup -vf, which appears to be missbuilt,
  as main(argc) is reset to zero, after ioctl() operations in a function
  call, quite unexpectadly.

  [Test Case]

   * $ sudo /usr/lib/klibc/bin/losetup -vf
  Loop device is /dev/loop20
  loop: can't get info on device /dev/loop20: No such device or address

  is bad.

  Note that ioctl() must succeed, thus loop0 device must be configured
  to trigger the bug.

  
  [Regression Potential]

   * klibc is quite special, as it uses linux kernel headers/assembly.
  It seems like there is incompatibility between klibc sources, and
  gcc-9 with linux-5.3 when used to build userspace programmes.

   * disabling cf-protection and stack-clash-protection did not help.

   * building with gcc-8 does not exhibit the problem.

   * the workaround is quite simple in the code, keep a copy of argc to
  compare to it later in the code.

  [Other Info]

   * Original bug report

  http://autopkgtest.ubuntu.com/packages/c/casper/focal/amd64

  
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac
  /autopkgtest-focal/focal/amd64/c/casper/20191025_214555_df8b8@/log.gz

  ...
  [   11.751912] EXT4-fs (sda1): mounting ext2 file system using the ext4 
subsystem
  [   11.761441] EXT4-fs (sda1): mounted filesystem without journal. Opts: 
(null)
  loop: can't get info on device /dev/loop1: No such device or address

  BusyBox v1.30.1 (Ubuntu 1:1.30.1-4ubuntu4) built-in shell (ash)
  Enter 'help' for a list of built-in commands.

  (initramfs) + mkdir result
  + set -x
  + read LINE
  + grep -e '^--OUT .* BEGIN-- .* --END--$' qemu-output.txt
  ++ grep -q /rofs result/lsblk.txt
  grep: result/lsblk.txt: No such file or directory
  autopkgtest [21:45:45]: test boot: ---]
  autopkgtest [21:45:45]: test boot:  - - - - - - - - - - results - - - - - - - 
- - -
  boot FAIL non-zero exit status 2
  autopkgtest [21:45:45]:  summary
  boot FAIL non-zero exit status 2
  ...

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/klibc/+bug/1850184/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1851453] Re: mir FTBFS in focal, blocks nettle transition

2019-11-06 Thread Chris Halse Rogers
This is due to the new googletest 1.9 git snapshot in focal-proposed,
which is (at least part way) through a big set of deprecations.

If this needs to be pushed through urgently, we could evict googletest
from focal-proposed, do the nettle transition, and then let googletest
back in.

I'll also keep working on making Mir build with the git snapshot gtest.
Additionally we should probably update gtest to 1.10, which is an actual
release ;)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mir in Ubuntu.
https://bugs.launchpad.net/bugs/1851453

Title:
  mir FTBFS in focal, blocks nettle transition

Status in mir package in Ubuntu:
  New

Bug description:
  a no-change rebuild of mir in focal has failed, for reasons that
  appear unrelated to nettle itself.

  [...]
  [ 61%] Linking CXX shared module ../../lib/client-modules/dummy.so
  cd /<>/build-amd64/tests/mir_test_framework && /usr/bin/cmake -E 
cmake_link_script CMakeFiles/mirclientplatformstub.dir/link.txt --verbose=1
  /usr/bin/c++ -fPIC -g -O2 -fdebug-prefix-map=/<>=. 
-fstack-protector-strong -Wformat -Werror=format-security -Wdate-time 
-D_FORTIFY_SOURCE=2 -pthread -g -std=c++14 -Wall -fno-strict-aliasing -pedantic 
-Wnon-virtual-dtor -Wextra -fPIC -Werror -Wno-psabi -ffat-lto-objects 
-Wno-error=null-dereference -Wno-error=overloaded-virtual -Wno-sign-compare 
-fno-lto -Dregister= 
-Wl,--version-script,/<>/tests/mir_test_framework/symbols-client.map
 -Wl,-Bsymbolic-fu
  nctions -Wl,-z,relro -Wl,-z,now -Wl,--as-needed -fuse-ld=gold 
-Wl,--no-undefined -shared  -o ../../lib/client-modules/dummy.so 
CMakeFiles/mirclientplatformstub.dir/stub_client_platform_module.cpp.o 
-Wl,-rpath,/<>/build-amd64/lib: libmir-test-framework-static.a 
-lumockdev -lgobject-2.0 -lglib-2.0 -lumockdev -lgobject-2.0 -lglib-2.0 
../../lib/libmirserver.so.50 ../../lib/libmirplatform.so.16 
../../lib/libmirwayland.so.0 -lwayland-server 
../../src/platforms/common/server/libserver_platform_common.a 
../../src/platforms/common/server/kms-utils/libkms_utils.a -ldrm -ldrm 
/usr/lib/x86_64-linux-gnu/libEGL.so -lGLESv2 -lGLESv2 -lepoxy -lepoxy -ludev 
-ludev -lgio-2.0 -lgio-2.0 -luuid -luuid -lxcb -lxcb -lxcb-composite 
-lxcb-composite -lxcb-xfixes -lxcb-xfixes -lxcb-render -lxcb-render -lXcursor 
-lXcursor -llttng-ust -ldl -llttng-ust -latomic ../../lib/libmirclient.so.9 
../../lib/libmircommon.so.7 ../../src/capnproto/libmircapnproto.a 
/usr/lib/x86_64-linux-gnu/libcapnp-0.7.0.so 
/usr/lib/x86_64-linux-gnu/libkj-0.7.0.so -lpthread -pthread 
../../lib/libmircore.so.1 -ldl ../../lib/libmirprotobuf.so.3 
/usr/lib/x86_64-linux-gnu/libprotobuf-lite.so ../../lib/libmircookie.so.2 
-lnettle /usr/lib/x86_64-linux-gnu/libxkbcommon.so 
/usr/lib/x86_64-linux-gnu/libboost_date_time.so 
/usr/lib/x86_64-linux-gnu/libboost_system.so 
/usr/lib/x86_64-linux-gnu/libboost_program_options.so 
/usr/lib/x86_64-linux-gnu/libboost_filesystem.so 
/usr/lib/x86_64-linux-gnu/libboost_iostreams.so 
/usr/lib/x86_64-linux-gnu/libboost_regex.so 
/usr/lib/x86_64-linux-gnu/libgtest.a /usr/lib/x86_64-linux-gnu/libgtest_main.a 
/usr/lib/x86_64-linux-gnu/libgtest.a /usr/lib/x86_64-linux-gnu/libgtest_main.a 
../../libGMock.a -lpthread -lgobject-2.0 -lglib-2.0 -lumockdev -lgobject-2.0 
-lglib-2.0 
  /usr/src/gmock/src/gmock.cc:135: error: undefined reference to 
'testing::Message::Message()'
  /usr/src/gmock/src/gmock.cc:135: error: undefined reference to 
'testing::internal::ParseInt32(testing::Message const&, char const*, int*)'
  /usr/src/gmock/src/gmock-internal-utils.cc:181: error: undefined reference to 
'testing::UnitTest::GetInstance()'
  /usr/src/gmock/src/gmock-internal-utils.cc:181: error: undefined reference to 
'testing::internal::GetCurrentOsStackTraceExceptTop[abi:cxx11](testing::UnitTest*,
 int)'
  /usr/include/gtest/internal/gtest-port.h:1651: error: undefined reference to 
'testing::internal::GTestLog::GTestLog(testing::internal::GTestLogSeverity, 
char const*, int)'
  /usr/include/gtest/internal/gtest-port.h:1651: error: undefined reference to 
'testing::internal::GTestLog::~GTestLog()'
  [...]

  (https://launchpad.net/ubuntu/+source/mir/1.4.0-0ubuntu4/+build/18005823)

  This is holding up a mass of intertwined start-of-cycle library
  transitions in focal-proposed right now.  Please fix this asap.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mir/+bug/1851453/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1834875] Re: cloud-init growpart race with udev

2019-11-06 Thread Dimitri John Ledkov
flock will not block inotify or udev events being emitted.

See
https://github.com/systemd/systemd/blob/master/src/udev/udevd.c#L322
https://github.com/systemd/systemd/blob/master/src/udev/udevd.c#L409

it will prevent udevd from running the rules against it. Thus
effectively the event will be fired and done, but nothing actually
executed for it.

" /* apply rules, create node, symlinks */"

Also, most importantly udevd also takes locks on devices, thus if one
cannot take a lock on it, it means it shouldn't be touched yet as udevd
is still processing it.

Yeah, i read code and ioctls both call, and I have no idea which one is
better, or what the difference is. If partx works, cool. But also, I
thought udev should be updating partition tables all by itself. I
somehow wonder if we even need partx call, if we properly flock the
device and trigger udev after everything is done.

Udev rules should be safe to be retriggered like that. But also, we
should retrigger the expected events which have been skipped. So does
growpart create partition? move it? delete/recreate one? i.e does ADD
happen? or like REMOVE & ADD? or maybe it's like just MOVE or CHANGE? Do
we have logs of the emitted events already?

Don't like flags, as then we'll have to supported forever =) maybe env
variable? or like simply change in focal and compare focal vs eoan?

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1834875

Title:
  cloud-init growpart race with udev

Status in cloud-init:
  Incomplete
Status in cloud-utils:
  New
Status in linux-azure package in Ubuntu:
  New
Status in systemd package in Ubuntu:
  Incomplete

Bug description:
  On Azure, it happens regularly (20-30%), that cloud-init's growpart
  module fails to extend the partition to full size.

  Such as in this example:

  

  2019-06-28 12:24:18,666 - util.py[DEBUG]: Running command ['growpart', 
'--dry-run', '/dev/sda', '1'] with allowed return codes [0] (shell=False, 
capture=True)
  2019-06-28 12:24:19,157 - util.py[DEBUG]: Running command ['growpart', 
'/dev/sda', '1'] with allowed return codes [0] (shell=False, capture=True)
  2019-06-28 12:24:19,726 - util.py[DEBUG]: resize_devices took 1.075 seconds
  2019-06-28 12:24:19,726 - handlers.py[DEBUG]: finish: 
init-network/config-growpart: FAIL: running config-growpart with frequency 
always
  2019-06-28 12:24:19,727 - util.py[WARNING]: Running module growpart () failed
  2019-06-28 12:24:19,727 - util.py[DEBUG]: Running module growpart () failed
  Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/cloudinit/stages.py", line 812, in 
_run_modules
  freq=freq)
File "/usr/lib/python3/dist-packages/cloudinit/cloud.py", line 54, in run
  return self._runners.run(name, functor, args, freq, clear_on_fail)
File "/usr/lib/python3/dist-packages/cloudinit/helpers.py", line 187, in run
  results = functor(*args)
File "/usr/lib/python3/dist-packages/cloudinit/config/cc_growpart.py", line 
351, in handle
  func=resize_devices, args=(resizer, devices))
File "/usr/lib/python3/dist-packages/cloudinit/util.py", line 2521, in 
log_time
  ret = func(*args, **kwargs)
File "/usr/lib/python3/dist-packages/cloudinit/config/cc_growpart.py", line 
298, in resize_devices
  (old, new) = resizer.resize(disk, ptnum, blockdev)
File "/usr/lib/python3/dist-packages/cloudinit/config/cc_growpart.py", line 
159, in resize
  return (before, get_size(partdev))
File "/usr/lib/python3/dist-packages/cloudinit/config/cc_growpart.py", line 
198, in get_size
  fd = os.open(filename, os.O_RDONLY)
  FileNotFoundError: [Errno 2] No such file or directory: 
'/dev/disk/by-partuuid/a5f2b49f-abd6-427f-bbc4-ba5559235cf3'

  

  @rcj suggested this is a race with udev. This seems to only happen on
  Cosmic and later.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1834875/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1851542] Re: autopkgtest fails due to aspell SRU

2019-11-06 Thread dann frazier
** Changed in: apport (Ubuntu Eoan)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1851542

Title:
  autopkgtest fails due to aspell SRU

Status in apport package in Ubuntu:
  Fix Released
Status in apport source package in Bionic:
  New
Status in apport source package in Disco:
  New
Status in apport source package in Eoan:
  Fix Committed

Bug description:
  [Impact]
  A new autopkgtest test regression began appearing after (and due to) an 
aspell SRU.

  ==
  FAIL: test_install_packages_versioned (__main__.T)
  install_packages() with versions and with cache
  --
  Traceback (most recent call last):
File "./test_backend_apt_dpkg.py", line 557, in 
test_install_packages_versioned
  self.assertIn(result, 'aspell-doc version 1.1 required, but 
0.60.7~20110707-3build1 is available\n')
  AssertionError: 'aspell-doc version 1.1 required, but 
0.60.7~20110707-3ubuntu0.1 is available\n' not found in 'aspell-doc version 1.1 
required, but 0.60.7~20110707-3build1 is available\n'

  --
  Ran 37 tests in 191.123s

  FAILED (failures=1)

  [Test Case]
  ## From within autopkgtest source package, with autopkgtest deps installed
  ## This is a slightly modified version if debian/tests/upstream-system

  # do not run in the source tree, as we want to check the system-installed
  # apport
  TESTDIR=${ADTTMP:-/tmp}/apport-tests
  mkdir -p $TESTDIR
  cp test/test_* test/run "$TESTDIR"
  cd "$TESTDIR"

  # clean up old crash reports
  rm -rf /var/crash/*

  export GNUPGHOME=$TESTDIR/gnupg
  mkdir -m 700 $GNUPGHOME

  ./run backend_apt_dpkg

  [Fix]
  
http://bazaar.launchpad.net/~ubuntu-core-dev/ubuntu/focal/apport/ubuntu/revision/2717

  [Regression Risk]
  Code is restricted to a test that is only ran via autopkgtest.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1851542/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1821376] Re: Report packages kept back by origins

2019-11-06 Thread Launchpad Bug Tracker
This bug was fixed in the package unattended-upgrades -
1.1ubuntu1.18.04.12

---
unattended-upgrades (1.1ubuntu1.18.04.12) bionic; urgency=medium

  * Report packages kept back by origin (LP: #1821376)
  * Store list of kept packages and report the number of them in motd
(LP: #1823070)
  * Default to "/" as rootdir to fix saving list of kept packages.
Thanks to Paul Wise (Closes: #932160)
  * debian/tests/control: Mark upgrade-between-snapshots as flaky
(Closes: #941752) (LP: #1848354)

 -- Balint Reczey   Fri, 18 Oct 2019 13:24:28 +0200

** Changed in: unattended-upgrades (Ubuntu Bionic)
   Status: Fix Committed => Fix Released

** Changed in: unattended-upgrades (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1821376

Title:
  Report packages kept back by origins

Status in unattended-upgrades package in Ubuntu:
  Fix Released
Status in unattended-upgrades source package in Xenial:
  Fix Released
Status in unattended-upgrades source package in Bionic:
  Fix Released
Status in unattended-upgrades source package in Disco:
  Fix Released

Bug description:
  [Impact]

  * Packages kept back are listed in the email report, but it is not
  clear from which origins they are installable. This information may
  help administrators to decide if the packages need to be manually
  upgraded.

  [Test Case]

  * test_mail.py test is updated to check if the kept back packages are
  reported per origin and this is checked at build time.

  *  For manual testing:
    1. Configure u-u to allow upgrades from the -updates pocket and send email 
with the upgrade report.
    2. Set up the system to have a few packages upgradable from both the 
-security and -updates pockets.
    3. Mark a subset of packages which are upgradable as held, marking packages 
from each of the pockets.
    4. Run u-u and observe the kept packages listed in the email. Each package 
is listed only in the allowed origin providing the highest version. (LP: 
#1848697 covers listing them in all origins from which the packages could be 
upgraded to.)

  [Regression Potential]

  * Unattended upgrades may crash while trying to perform updates or
  while trying to send the summary email. Build-time tests and
  autopkgtests include testing both functions.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1821376/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1821376] Re: Report packages kept back by origins

2019-11-06 Thread Launchpad Bug Tracker
This bug was fixed in the package unattended-upgrades -
1.1ubuntu1.18.04.7~16.04.4

---
unattended-upgrades (1.1ubuntu1.18.04.7~16.04.4) xenial; urgency=medium

  * Report packages kept back by origin (LP: #1821376)
  * Store list of kept packages and report the number of them in motd
(LP: #1823070)
  * Default to "/" as rootdir to fix saving list of kept packages.
Thanks to Paul Wise (Closes: #932160)
  * debian/tests/control: Mark upgrade-between-snapshots as flaky
(Closes: #941752) (LP: #1848354)

 -- Balint Reczey   Fri, 18 Oct 2019 13:29:41 +0200

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1821376

Title:
  Report packages kept back by origins

Status in unattended-upgrades package in Ubuntu:
  Fix Released
Status in unattended-upgrades source package in Xenial:
  Fix Released
Status in unattended-upgrades source package in Bionic:
  Fix Released
Status in unattended-upgrades source package in Disco:
  Fix Released

Bug description:
  [Impact]

  * Packages kept back are listed in the email report, but it is not
  clear from which origins they are installable. This information may
  help administrators to decide if the packages need to be manually
  upgraded.

  [Test Case]

  * test_mail.py test is updated to check if the kept back packages are
  reported per origin and this is checked at build time.

  *  For manual testing:
    1. Configure u-u to allow upgrades from the -updates pocket and send email 
with the upgrade report.
    2. Set up the system to have a few packages upgradable from both the 
-security and -updates pockets.
    3. Mark a subset of packages which are upgradable as held, marking packages 
from each of the pockets.
    4. Run u-u and observe the kept packages listed in the email. Each package 
is listed only in the allowed origin providing the highest version. (LP: 
#1848697 covers listing them in all origins from which the packages could be 
upgraded to.)

  [Regression Potential]

  * Unattended upgrades may crash while trying to perform updates or
  while trying to send the summary email. Build-time tests and
  autopkgtests include testing both functions.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1821376/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1821376] Update Released

2019-11-06 Thread Brian Murray
The verification of the Stable Release Update for unattended-upgrades
has completed successfully and the package is now being released to
-updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1821376

Title:
  Report packages kept back by origins

Status in unattended-upgrades package in Ubuntu:
  Fix Released
Status in unattended-upgrades source package in Xenial:
  Fix Released
Status in unattended-upgrades source package in Bionic:
  Fix Released
Status in unattended-upgrades source package in Disco:
  Fix Released

Bug description:
  [Impact]

  * Packages kept back are listed in the email report, but it is not
  clear from which origins they are installable. This information may
  help administrators to decide if the packages need to be manually
  upgraded.

  [Test Case]

  * test_mail.py test is updated to check if the kept back packages are
  reported per origin and this is checked at build time.

  *  For manual testing:
    1. Configure u-u to allow upgrades from the -updates pocket and send email 
with the upgrade report.
    2. Set up the system to have a few packages upgradable from both the 
-security and -updates pockets.
    3. Mark a subset of packages which are upgradable as held, marking packages 
from each of the pockets.
    4. Run u-u and observe the kept packages listed in the email. Each package 
is listed only in the allowed origin providing the highest version. (LP: 
#1848697 covers listing them in all origins from which the packages could be 
upgraded to.)

  [Regression Potential]

  * Unattended upgrades may crash while trying to perform updates or
  while trying to send the summary email. Build-time tests and
  autopkgtests include testing both functions.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1821376/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1821376] Re: Report packages kept back by origins

2019-11-06 Thread Launchpad Bug Tracker
This bug was fixed in the package unattended-upgrades - 1.10ubuntu5.2

---
unattended-upgrades (1.10ubuntu5.2) disco; urgency=medium

  * Report packages kept back by origin (LP: #1821376)
  * Store list of kept packages and report the number of them in motd
(LP: #1823070)
  * Default to "/" as rootdir to fix saving list of kept packages.
Thanks to Paul Wise (Closes: #932160) (LP: #1823070)
  * debian/tests/control: Mark upgrade-between-snapshots as flaky
(Closes: #941752) (LP: #1848354)

 -- Balint Reczey   Fri, 18 Oct 2019 13:22:02 +0200

** Changed in: unattended-upgrades (Ubuntu Disco)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1821376

Title:
  Report packages kept back by origins

Status in unattended-upgrades package in Ubuntu:
  Fix Released
Status in unattended-upgrades source package in Xenial:
  Fix Released
Status in unattended-upgrades source package in Bionic:
  Fix Released
Status in unattended-upgrades source package in Disco:
  Fix Released

Bug description:
  [Impact]

  * Packages kept back are listed in the email report, but it is not
  clear from which origins they are installable. This information may
  help administrators to decide if the packages need to be manually
  upgraded.

  [Test Case]

  * test_mail.py test is updated to check if the kept back packages are
  reported per origin and this is checked at build time.

  *  For manual testing:
    1. Configure u-u to allow upgrades from the -updates pocket and send email 
with the upgrade report.
    2. Set up the system to have a few packages upgradable from both the 
-security and -updates pockets.
    3. Mark a subset of packages which are upgradable as held, marking packages 
from each of the pockets.
    4. Run u-u and observe the kept packages listed in the email. Each package 
is listed only in the allowed origin providing the highest version. (LP: 
#1848697 covers listing them in all origins from which the packages could be 
upgraded to.)

  [Regression Potential]

  * Unattended upgrades may crash while trying to perform updates or
  while trying to send the summary email. Build-time tests and
  autopkgtests include testing both functions.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1821376/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1823070] Re: unattended-upgrades should tell the user (via motd) when security updates are held back

2019-11-06 Thread Launchpad Bug Tracker
This bug was fixed in the package unattended-upgrades -
1.1ubuntu1.18.04.7~16.04.4

---
unattended-upgrades (1.1ubuntu1.18.04.7~16.04.4) xenial; urgency=medium

  * Report packages kept back by origin (LP: #1821376)
  * Store list of kept packages and report the number of them in motd
(LP: #1823070)
  * Default to "/" as rootdir to fix saving list of kept packages.
Thanks to Paul Wise (Closes: #932160)
  * debian/tests/control: Mark upgrade-between-snapshots as flaky
(Closes: #941752) (LP: #1848354)

 -- Balint Reczey   Fri, 18 Oct 2019 13:29:41 +0200

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1823070

Title:
  unattended-upgrades should tell the user (via motd) when security
  updates are held back

Status in unattended-upgrades package in Ubuntu:
  Fix Released
Status in unattended-upgrades source package in Xenial:
  Fix Released
Status in unattended-upgrades source package in Bionic:
  Fix Released
Status in unattended-upgrades source package in Disco:
  Fix Released

Bug description:
  [Impact]

   * MOTD does not go into details about upgradable packages being security 
fixes or just normal updates.
   * Users should be made aware if some of the security updates could not have 
been applied.
   * The fix is adding a snipped to MOTD where the number of packages kept back 
by unattended-upgrades is shown.

  [Test Case]

   * The debian/tests/upgrade-all-security is extended to check if the number 
of kept back packages are shown in MOTD and a new test is added 
(test/test_motd.py) to check if the list of kept back packages are saved 
properly.
   * To test the fix manually:
     1. Mark a package upgradable from the -security pocket as held, then run 
unattended-upgrades.
     2. Observe MOTD messate showing the number of packages being kept back.

  [Regression Potential]

   * Unattended-upgrades may crash when saving kept packages and always
  return with failure. MOTD may hang or print error while printing the
  packages kept back by u-u.

   * It is not a regression, but the log referenced in MOTD does not
  always contain explanation why each package was kept back, unless
  debugging is enabled. One case where packages are not mentioned in the
  log is when the packages are held using 'apt-mark hold' command.

  [Original Bug Text]

  Currently we have the following pieces as part of the default UX on
  Ubuntu 18.04 and later:

   1) unattended-upgrades automatically installs security updates daily by 
default
   2) the motd reports the number of available updates, including security 
updates.

  A user who knows about 1) also knows that a non-zero number of pending
  security updates listed in 2) is nothing to worry about.

  However, unattended-upgrades will also cleverly detect when a security
  update cannot safely be installed non-interactively due to conffile
  changes on the system.

  In this case, unattended-upgrades should also inform the user via the
  motd that these updates are not being installed.  Otherwise, there's
  nothing to tell the user that the non-zero count of available security
  updates in motd is a *problem*.

  Suggested wording:

   N security updates will not be automatically installed due to local changes.
   See /var/log/foo for details.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1823070/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1823070] Re: unattended-upgrades should tell the user (via motd) when security updates are held back

2019-11-06 Thread Launchpad Bug Tracker
This bug was fixed in the package unattended-upgrades -
1.1ubuntu1.18.04.12

---
unattended-upgrades (1.1ubuntu1.18.04.12) bionic; urgency=medium

  * Report packages kept back by origin (LP: #1821376)
  * Store list of kept packages and report the number of them in motd
(LP: #1823070)
  * Default to "/" as rootdir to fix saving list of kept packages.
Thanks to Paul Wise (Closes: #932160)
  * debian/tests/control: Mark upgrade-between-snapshots as flaky
(Closes: #941752) (LP: #1848354)

 -- Balint Reczey   Fri, 18 Oct 2019 13:24:28 +0200

** Changed in: unattended-upgrades (Ubuntu Bionic)
   Status: Fix Committed => Fix Released

** Changed in: unattended-upgrades (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1823070

Title:
  unattended-upgrades should tell the user (via motd) when security
  updates are held back

Status in unattended-upgrades package in Ubuntu:
  Fix Released
Status in unattended-upgrades source package in Xenial:
  Fix Released
Status in unattended-upgrades source package in Bionic:
  Fix Released
Status in unattended-upgrades source package in Disco:
  Fix Released

Bug description:
  [Impact]

   * MOTD does not go into details about upgradable packages being security 
fixes or just normal updates.
   * Users should be made aware if some of the security updates could not have 
been applied.
   * The fix is adding a snipped to MOTD where the number of packages kept back 
by unattended-upgrades is shown.

  [Test Case]

   * The debian/tests/upgrade-all-security is extended to check if the number 
of kept back packages are shown in MOTD and a new test is added 
(test/test_motd.py) to check if the list of kept back packages are saved 
properly.
   * To test the fix manually:
     1. Mark a package upgradable from the -security pocket as held, then run 
unattended-upgrades.
     2. Observe MOTD messate showing the number of packages being kept back.

  [Regression Potential]

   * Unattended-upgrades may crash when saving kept packages and always
  return with failure. MOTD may hang or print error while printing the
  packages kept back by u-u.

   * It is not a regression, but the log referenced in MOTD does not
  always contain explanation why each package was kept back, unless
  debugging is enabled. One case where packages are not mentioned in the
  log is when the packages are held using 'apt-mark hold' command.

  [Original Bug Text]

  Currently we have the following pieces as part of the default UX on
  Ubuntu 18.04 and later:

   1) unattended-upgrades automatically installs security updates daily by 
default
   2) the motd reports the number of available updates, including security 
updates.

  A user who knows about 1) also knows that a non-zero number of pending
  security updates listed in 2) is nothing to worry about.

  However, unattended-upgrades will also cleverly detect when a security
  update cannot safely be installed non-interactively due to conffile
  changes on the system.

  In this case, unattended-upgrades should also inform the user via the
  motd that these updates are not being installed.  Otherwise, there's
  nothing to tell the user that the non-zero count of available security
  updates in motd is a *problem*.

  Suggested wording:

   N security updates will not be automatically installed due to local changes.
   See /var/log/foo for details.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1823070/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1848354] Re: upgrade-between-snapshots autopkgtest is flaky

2019-11-06 Thread Launchpad Bug Tracker
This bug was fixed in the package unattended-upgrades -
1.1ubuntu1.18.04.12

---
unattended-upgrades (1.1ubuntu1.18.04.12) bionic; urgency=medium

  * Report packages kept back by origin (LP: #1821376)
  * Store list of kept packages and report the number of them in motd
(LP: #1823070)
  * Default to "/" as rootdir to fix saving list of kept packages.
Thanks to Paul Wise (Closes: #932160)
  * debian/tests/control: Mark upgrade-between-snapshots as flaky
(Closes: #941752) (LP: #1848354)

 -- Balint Reczey   Fri, 18 Oct 2019 13:24:28 +0200

** Changed in: unattended-upgrades (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1848354

Title:
  upgrade-between-snapshots autopkgtest is flaky

Status in unattended-upgrades package in Ubuntu:
  Fix Released
Status in unattended-upgrades source package in Xenial:
  Fix Released
Status in unattended-upgrades source package in Bionic:
  Fix Released
Status in unattended-upgrades source package in Disco:
  Fix Released
Status in unattended-upgrades source package in Eoan:
  Fix Released

Bug description:
  [Impact]

   * Flaky upgrade-between-snapshots autopkgtest prevents developers to
  use the test efficiently.

  [Test Case]

   * Run autopkgtests, observe the upgrade-between-snapshots test
  passing or failing but being marked as FLAKY.

  [Regression Potential]

   * None, the test was failing often due to connectivity/internal
  errors of snapshot.debian.org.

  [Other Info]

   * The whole autopkgtest is marked to be failing on amd64 to mitigate
  the single flaky test, this marking can be removed after marking this
  single flaky test.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1848354/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1823070] Re: unattended-upgrades should tell the user (via motd) when security updates are held back

2019-11-06 Thread Launchpad Bug Tracker
This bug was fixed in the package unattended-upgrades - 1.10ubuntu5.2

---
unattended-upgrades (1.10ubuntu5.2) disco; urgency=medium

  * Report packages kept back by origin (LP: #1821376)
  * Store list of kept packages and report the number of them in motd
(LP: #1823070)
  * Default to "/" as rootdir to fix saving list of kept packages.
Thanks to Paul Wise (Closes: #932160) (LP: #1823070)
  * debian/tests/control: Mark upgrade-between-snapshots as flaky
(Closes: #941752) (LP: #1848354)

 -- Balint Reczey   Fri, 18 Oct 2019 13:22:02 +0200

** Changed in: unattended-upgrades (Ubuntu Disco)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1823070

Title:
  unattended-upgrades should tell the user (via motd) when security
  updates are held back

Status in unattended-upgrades package in Ubuntu:
  Fix Released
Status in unattended-upgrades source package in Xenial:
  Fix Released
Status in unattended-upgrades source package in Bionic:
  Fix Released
Status in unattended-upgrades source package in Disco:
  Fix Released

Bug description:
  [Impact]

   * MOTD does not go into details about upgradable packages being security 
fixes or just normal updates.
   * Users should be made aware if some of the security updates could not have 
been applied.
   * The fix is adding a snipped to MOTD where the number of packages kept back 
by unattended-upgrades is shown.

  [Test Case]

   * The debian/tests/upgrade-all-security is extended to check if the number 
of kept back packages are shown in MOTD and a new test is added 
(test/test_motd.py) to check if the list of kept back packages are saved 
properly.
   * To test the fix manually:
     1. Mark a package upgradable from the -security pocket as held, then run 
unattended-upgrades.
     2. Observe MOTD messate showing the number of packages being kept back.

  [Regression Potential]

   * Unattended-upgrades may crash when saving kept packages and always
  return with failure. MOTD may hang or print error while printing the
  packages kept back by u-u.

   * It is not a regression, but the log referenced in MOTD does not
  always contain explanation why each package was kept back, unless
  debugging is enabled. One case where packages are not mentioned in the
  log is when the packages are held using 'apt-mark hold' command.

  [Original Bug Text]

  Currently we have the following pieces as part of the default UX on
  Ubuntu 18.04 and later:

   1) unattended-upgrades automatically installs security updates daily by 
default
   2) the motd reports the number of available updates, including security 
updates.

  A user who knows about 1) also knows that a non-zero number of pending
  security updates listed in 2) is nothing to worry about.

  However, unattended-upgrades will also cleverly detect when a security
  update cannot safely be installed non-interactively due to conffile
  changes on the system.

  In this case, unattended-upgrades should also inform the user via the
  motd that these updates are not being installed.  Otherwise, there's
  nothing to tell the user that the non-zero count of available security
  updates in motd is a *problem*.

  Suggested wording:

   N security updates will not be automatically installed due to local changes.
   See /var/log/foo for details.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1823070/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1823070] Update Released

2019-11-06 Thread Brian Murray
The verification of the Stable Release Update for unattended-upgrades
has completed successfully and the package is now being released to
-updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1823070

Title:
  unattended-upgrades should tell the user (via motd) when security
  updates are held back

Status in unattended-upgrades package in Ubuntu:
  Fix Released
Status in unattended-upgrades source package in Xenial:
  Fix Released
Status in unattended-upgrades source package in Bionic:
  Fix Released
Status in unattended-upgrades source package in Disco:
  Fix Released

Bug description:
  [Impact]

   * MOTD does not go into details about upgradable packages being security 
fixes or just normal updates.
   * Users should be made aware if some of the security updates could not have 
been applied.
   * The fix is adding a snipped to MOTD where the number of packages kept back 
by unattended-upgrades is shown.

  [Test Case]

   * The debian/tests/upgrade-all-security is extended to check if the number 
of kept back packages are shown in MOTD and a new test is added 
(test/test_motd.py) to check if the list of kept back packages are saved 
properly.
   * To test the fix manually:
     1. Mark a package upgradable from the -security pocket as held, then run 
unattended-upgrades.
     2. Observe MOTD messate showing the number of packages being kept back.

  [Regression Potential]

   * Unattended-upgrades may crash when saving kept packages and always
  return with failure. MOTD may hang or print error while printing the
  packages kept back by u-u.

   * It is not a regression, but the log referenced in MOTD does not
  always contain explanation why each package was kept back, unless
  debugging is enabled. One case where packages are not mentioned in the
  log is when the packages are held using 'apt-mark hold' command.

  [Original Bug Text]

  Currently we have the following pieces as part of the default UX on
  Ubuntu 18.04 and later:

   1) unattended-upgrades automatically installs security updates daily by 
default
   2) the motd reports the number of available updates, including security 
updates.

  A user who knows about 1) also knows that a non-zero number of pending
  security updates listed in 2) is nothing to worry about.

  However, unattended-upgrades will also cleverly detect when a security
  update cannot safely be installed non-interactively due to conffile
  changes on the system.

  In this case, unattended-upgrades should also inform the user via the
  motd that these updates are not being installed.  Otherwise, there's
  nothing to tell the user that the non-zero count of available security
  updates in motd is a *problem*.

  Suggested wording:

   N security updates will not be automatically installed due to local changes.
   See /var/log/foo for details.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1823070/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1848354] Re: upgrade-between-snapshots autopkgtest is flaky

2019-11-06 Thread Launchpad Bug Tracker
This bug was fixed in the package unattended-upgrades -
1.1ubuntu1.18.04.7~16.04.4

---
unattended-upgrades (1.1ubuntu1.18.04.7~16.04.4) xenial; urgency=medium

  * Report packages kept back by origin (LP: #1821376)
  * Store list of kept packages and report the number of them in motd
(LP: #1823070)
  * Default to "/" as rootdir to fix saving list of kept packages.
Thanks to Paul Wise (Closes: #932160)
  * debian/tests/control: Mark upgrade-between-snapshots as flaky
(Closes: #941752) (LP: #1848354)

 -- Balint Reczey   Fri, 18 Oct 2019 13:29:41 +0200

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1848354

Title:
  upgrade-between-snapshots autopkgtest is flaky

Status in unattended-upgrades package in Ubuntu:
  Fix Released
Status in unattended-upgrades source package in Xenial:
  Fix Released
Status in unattended-upgrades source package in Bionic:
  Fix Released
Status in unattended-upgrades source package in Disco:
  Fix Released
Status in unattended-upgrades source package in Eoan:
  Fix Released

Bug description:
  [Impact]

   * Flaky upgrade-between-snapshots autopkgtest prevents developers to
  use the test efficiently.

  [Test Case]

   * Run autopkgtests, observe the upgrade-between-snapshots test
  passing or failing but being marked as FLAKY.

  [Regression Potential]

   * None, the test was failing often due to connectivity/internal
  errors of snapshot.debian.org.

  [Other Info]

   * The whole autopkgtest is marked to be failing on amd64 to mitigate
  the single flaky test, this marking can be removed after marking this
  single flaky test.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1848354/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1848354] Re: upgrade-between-snapshots autopkgtest is flaky

2019-11-06 Thread Launchpad Bug Tracker
This bug was fixed in the package unattended-upgrades - 1.10ubuntu5.2

---
unattended-upgrades (1.10ubuntu5.2) disco; urgency=medium

  * Report packages kept back by origin (LP: #1821376)
  * Store list of kept packages and report the number of them in motd
(LP: #1823070)
  * Default to "/" as rootdir to fix saving list of kept packages.
Thanks to Paul Wise (Closes: #932160) (LP: #1823070)
  * debian/tests/control: Mark upgrade-between-snapshots as flaky
(Closes: #941752) (LP: #1848354)

 -- Balint Reczey   Fri, 18 Oct 2019 13:22:02 +0200

** Changed in: unattended-upgrades (Ubuntu Disco)
   Status: Fix Committed => Fix Released

** Changed in: unattended-upgrades (Ubuntu Bionic)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1848354

Title:
  upgrade-between-snapshots autopkgtest is flaky

Status in unattended-upgrades package in Ubuntu:
  Fix Released
Status in unattended-upgrades source package in Xenial:
  Fix Released
Status in unattended-upgrades source package in Bionic:
  Fix Released
Status in unattended-upgrades source package in Disco:
  Fix Released
Status in unattended-upgrades source package in Eoan:
  Fix Released

Bug description:
  [Impact]

   * Flaky upgrade-between-snapshots autopkgtest prevents developers to
  use the test efficiently.

  [Test Case]

   * Run autopkgtests, observe the upgrade-between-snapshots test
  passing or failing but being marked as FLAKY.

  [Regression Potential]

   * None, the test was failing often due to connectivity/internal
  errors of snapshot.debian.org.

  [Other Info]

   * The whole autopkgtest is marked to be failing on amd64 to mitigate
  the single flaky test, this marking can be removed after marking this
  single flaky test.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1848354/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1848354] Update Released

2019-11-06 Thread Brian Murray
The verification of the Stable Release Update for unattended-upgrades
has completed successfully and the package is now being released to
-updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1848354

Title:
  upgrade-between-snapshots autopkgtest is flaky

Status in unattended-upgrades package in Ubuntu:
  Fix Released
Status in unattended-upgrades source package in Xenial:
  Fix Released
Status in unattended-upgrades source package in Bionic:
  Fix Released
Status in unattended-upgrades source package in Disco:
  Fix Released
Status in unattended-upgrades source package in Eoan:
  Fix Released

Bug description:
  [Impact]

   * Flaky upgrade-between-snapshots autopkgtest prevents developers to
  use the test efficiently.

  [Test Case]

   * Run autopkgtests, observe the upgrade-between-snapshots test
  passing or failing but being marked as FLAKY.

  [Regression Potential]

   * None, the test was failing often due to connectivity/internal
  errors of snapshot.debian.org.

  [Other Info]

   * The whole autopkgtest is marked to be failing on amd64 to mitigate
  the single flaky test, this marking can be removed after marking this
  single flaky test.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1848354/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1848354] Re: upgrade-between-snapshots autopkgtest is flaky

2019-11-06 Thread Brian Murray
** Tags removed: block-proposed-bionic block-proposed-disco block-
proposed-eoan block-proposed-xenial

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1848354

Title:
  upgrade-between-snapshots autopkgtest is flaky

Status in unattended-upgrades package in Ubuntu:
  Fix Released
Status in unattended-upgrades source package in Xenial:
  Fix Released
Status in unattended-upgrades source package in Bionic:
  Fix Released
Status in unattended-upgrades source package in Disco:
  Fix Released
Status in unattended-upgrades source package in Eoan:
  Fix Released

Bug description:
  [Impact]

   * Flaky upgrade-between-snapshots autopkgtest prevents developers to
  use the test efficiently.

  [Test Case]

   * Run autopkgtests, observe the upgrade-between-snapshots test
  passing or failing but being marked as FLAKY.

  [Regression Potential]

   * None, the test was failing often due to connectivity/internal
  errors of snapshot.debian.org.

  [Other Info]

   * The whole autopkgtest is marked to be failing on amd64 to mitigate
  the single flaky test, this marking can be removed after marking this
  single flaky test.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1848354/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1848354] Re: upgrade-between-snapshots autopkgtest is flaky

2019-11-06 Thread Launchpad Bug Tracker
This bug was fixed in the package unattended-upgrades - 1.14ubuntu1.1

---
unattended-upgrades (1.14ubuntu1.1) eoan; urgency=medium

  * debian/tests/control: Mark upgrade-between-snapshots as flaky
(Closes: #941752) (LP: #1848354)

 -- Balint Reczey   Wed, 16 Oct 2019 17:47:42 +0200

** Changed in: unattended-upgrades (Ubuntu Eoan)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1848354

Title:
  upgrade-between-snapshots autopkgtest is flaky

Status in unattended-upgrades package in Ubuntu:
  Fix Released
Status in unattended-upgrades source package in Xenial:
  Fix Released
Status in unattended-upgrades source package in Bionic:
  Fix Released
Status in unattended-upgrades source package in Disco:
  Fix Released
Status in unattended-upgrades source package in Eoan:
  Fix Released

Bug description:
  [Impact]

   * Flaky upgrade-between-snapshots autopkgtest prevents developers to
  use the test efficiently.

  [Test Case]

   * Run autopkgtests, observe the upgrade-between-snapshots test
  passing or failing but being marked as FLAKY.

  [Regression Potential]

   * None, the test was failing often due to connectivity/internal
  errors of snapshot.debian.org.

  [Other Info]

   * The whole autopkgtest is marked to be failing on amd64 to mitigate
  the single flaky test, this marking can be removed after marking this
  single flaky test.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1848354/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1823070] Re: unattended-upgrades should tell the user (via motd) when security updates are held back

2019-11-06 Thread Brian Murray
"1 updates"? Having an "s" for 1 update is incorrect.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1823070

Title:
  unattended-upgrades should tell the user (via motd) when security
  updates are held back

Status in unattended-upgrades package in Ubuntu:
  Fix Released
Status in unattended-upgrades source package in Xenial:
  Fix Released
Status in unattended-upgrades source package in Bionic:
  Fix Released
Status in unattended-upgrades source package in Disco:
  Fix Released

Bug description:
  [Impact]

   * MOTD does not go into details about upgradable packages being security 
fixes or just normal updates.
   * Users should be made aware if some of the security updates could not have 
been applied.
   * The fix is adding a snipped to MOTD where the number of packages kept back 
by unattended-upgrades is shown.

  [Test Case]

   * The debian/tests/upgrade-all-security is extended to check if the number 
of kept back packages are shown in MOTD and a new test is added 
(test/test_motd.py) to check if the list of kept back packages are saved 
properly.
   * To test the fix manually:
     1. Mark a package upgradable from the -security pocket as held, then run 
unattended-upgrades.
     2. Observe MOTD messate showing the number of packages being kept back.

  [Regression Potential]

   * Unattended-upgrades may crash when saving kept packages and always
  return with failure. MOTD may hang or print error while printing the
  packages kept back by u-u.

   * It is not a regression, but the log referenced in MOTD does not
  always contain explanation why each package was kept back, unless
  debugging is enabled. One case where packages are not mentioned in the
  log is when the packages are held using 'apt-mark hold' command.

  [Original Bug Text]

  Currently we have the following pieces as part of the default UX on
  Ubuntu 18.04 and later:

   1) unattended-upgrades automatically installs security updates daily by 
default
   2) the motd reports the number of available updates, including security 
updates.

  A user who knows about 1) also knows that a non-zero number of pending
  security updates listed in 2) is nothing to worry about.

  However, unattended-upgrades will also cleverly detect when a security
  update cannot safely be installed non-interactively due to conffile
  changes on the system.

  In this case, unattended-upgrades should also inform the user via the
  motd that these updates are not being installed.  Otherwise, there's
  nothing to tell the user that the non-zero count of available security
  updates in motd is a *problem*.

  Suggested wording:

   N security updates will not be automatically installed due to local changes.
   See /var/log/foo for details.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1823070/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1835738] Re: SRU: Update Python interpreter to 3.6.9 and 3.7.5

2019-11-06 Thread Matthias Klose
** Description changed:

  Update Python interpreter to 3.6.9 and 3.7.5.  As done with earlier
  subminor upstream releases (LP: #1822993).
  
  SRU: update Python 3.7 to the 3.7.5 release, update Python 3.6 to the
  3.6.9 release.
  
  python3-stdlib-extensions also updates the modules to the 3.6.9 release
  for Python 3.6.
  
  Acceptance Criteria: The package builds, and the test suite doesn't show
  regressions. The test suite passes in the autopkg tests. The new
  packages don't cause regressions in a test rebuild of the main
  component.
  
- 
http://people.canonical.com/~doko/ftbfs-report/test-rebuild-20190404-cosmic.html
- 
http://people.canonical.com/~doko/ftbfs-report/test-rebuild-20190404-gcc8-cosmic.html
+ 
https://people.canonical.com/~doko/ftbfs-report/test-rebuild-20191018-release-bionic.html
+ 
https://people.canonical.com/~doko/ftbfs-report/test-rebuild-20191018-release-tst-bionic.html
  
  The test rebuilds are finished, and don't show any regressions for the
  main component.
  
  Regression Potential: Python 3.7 isn't used by default, so we don't have many 
default users.
  Regression Potential: Python 3.6 could see some regressions, although we are 
trying to minimize the risk by doing the test rebuild.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to python3-defaults in
Ubuntu.
https://bugs.launchpad.net/bugs/1835738

Title:
  SRU: Update Python interpreter to 3.6.9 and 3.7.5

Status in python3-defaults package in Ubuntu:
  New
Status in python3-stdlib-extensions package in Ubuntu:
  Fix Released
Status in python3.7 package in Ubuntu:
  Fix Released
Status in python3-defaults source package in Bionic:
  New
Status in python3-stdlib-extensions source package in Bionic:
  New
Status in python3.6 source package in Bionic:
  New
Status in python3.7 source package in Bionic:
  New
Status in python3-defaults source package in Disco:
  New
Status in python3-stdlib-extensions source package in Disco:
  Fix Committed
Status in python3.7 source package in Disco:
  New
Status in python3-defaults source package in Eoan:
  New
Status in python3-stdlib-extensions source package in Eoan:
  Fix Committed
Status in python3.7 source package in Eoan:
  Fix Committed

Bug description:
  Update Python interpreter to 3.6.9 and 3.7.5.  As done with earlier
  subminor upstream releases (LP: #1822993).

  SRU: update Python 3.7 to the 3.7.5 release, update Python 3.6 to the
  3.6.9 release.

  python3-stdlib-extensions also updates the modules to the 3.6.9
  release for Python 3.6.

  Acceptance Criteria: The package builds, and the test suite doesn't
  show regressions. The test suite passes in the autopkg tests. The new
  packages don't cause regressions in a test rebuild of the main
  component.

  
https://people.canonical.com/~doko/ftbfs-report/test-rebuild-20191018-release-bionic.html
  
https://people.canonical.com/~doko/ftbfs-report/test-rebuild-20191018-release-tst-bionic.html

  The test rebuilds are finished, and don't show any regressions for the
  main component.

  Regression Potential: Python 3.7 isn't used by default, so we don't have many 
default users.
  Regression Potential: Python 3.6 could see some regressions, although we are 
trying to minimize the risk by doing the test rebuild.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python3-defaults/+bug/1835738/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1850887] Re: Audio / Sound reverts to HDMI when power event occurs

2019-11-06 Thread BloodyIron
So this is actually happening now every time I lock my computer, no
power change whatsoever (no standby, no suspend to RAM, no power
off/reboot). So this is now becoming very frustrating to work with as I
have to change my default audio device every time I use my computer now
so that my volume controls (up/down) actually work.

Can we PLEASE get this at least started to be looked at?

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pulseaudio in Ubuntu.
https://bugs.launchpad.net/bugs/1850887

Title:
  Audio / Sound reverts to HDMI when power event occurs

Status in pulseaudio package in Ubuntu:
  Confirmed

Bug description:
  PulseAudio reverts the sound to HDMI all the time when a HDMI related
  power event occurs. That means, although I have set another USB sound
  device plugged in and set as default under sound settings, when an
  application like Kodi or the system shuts off the HDMI monitor and I
  reactivate the monitor, the sound is set to HDMI output again and
  again.

  That probably has to do with the fix to the reported Bug # 1711101 and
  definitely not happened at Ubuntu 19.04. I switched to Ubuntu 19.10
  two days ago.

  Setting the USB device as default does not help, even when done by
  PulseAudio mixer (gui) and removing HDMI output from the alternatives
  option.

  Expected behavior:
  PulseAudio keeps the sound setting to the selected device

  Actual behavior: 
  PulseAudio changes to HDMI at every HDMI power event

  Annoying manual workaround:
  Setting the desired Audio option on the control panel after every HDMI power 
event again

  ProblemType: Bug
  DistroRelease: Ubuntu 19.10
  Component: pulseaudio
  Version: 1:13.0-1ubuntu1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pulseaudio/+bug/1850887/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 540751] Re: Unable to use dead keys with java and ibus

2019-11-06 Thread Gunnar Hjalmarsson
Re-opening the ibus task for now.

@Johny: This is a very old bug report, and a lot has been changed since
it was originally filed. Any chance you can provide some details about
how to reproduce the bug on 19.10?

** Changed in: ibus (Ubuntu)
   Status: Invalid => New

** Tags removed: lucid

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ibus in Ubuntu.
https://bugs.launchpad.net/bugs/540751

Title:
  Unable to use dead keys with java and ibus

Status in ibus package in Ubuntu:
  New
Status in openjdk-6 package in Ubuntu:
  Invalid
Status in openjdk-7 package in Ubuntu:
  Invalid

Bug description:
  Using latest Lucid packages, I am unable to use ^ key to generate ê
  french character in every Java programs (jEdit, Netbeans, etc.).

  Typing ^ + e give just the e character.
  Typing ^ + Space and nothing appears.

  I've tried with Sun JDK (6u18, 6u20, 7) and the bug is still present.

  I've tried to remove ibus and everything works again (I've just unset
  XMODIFIERS and GTK_IM_MODULE).

  I don't know if it's an ibus bug or openjdk one.

  ProblemType: Bug
  Architecture: amd64
  Date: Thu Mar 18 09:03:11 2010
  DistroRelease: Ubuntu 10.04
  ExecutablePath: /usr/lib/jvm/java-6-openjdk/jre/bin/java
  InstallationMedia: Error: [Errno 13] Permission non accordée: 
'/var/log/installer/media-info'
  NonfreeKernelModules: nvidia
  Package: openjdk-6-jre-headless 6b18~pre2-1ubuntu1
  ProcEnviron:
   SHELL=/bin/bash
   PATH=(custom, user)
   LANG=fr_FR.utf8
  ProcVersionSignature: Ubuntu 2.6.32-16.25-genUser Name
  SourcePackage: openjdk-6
  Uname: Linux 2.6.32-16-generic x86_64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ibus/+bug/540751/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1851542] Re: autopkgtest fails due to aspell SRU

2019-11-06 Thread Launchpad Bug Tracker
** Branch linked: lp:~ubuntu-core-dev/ubuntu/eoan/apport/ubuntu

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1851542

Title:
  autopkgtest fails due to aspell SRU

Status in apport package in Ubuntu:
  Fix Released
Status in apport source package in Bionic:
  New
Status in apport source package in Disco:
  New
Status in apport source package in Eoan:
  New

Bug description:
  [Impact]
  A new autopkgtest test regression began appearing after (and due to) an 
aspell SRU.

  ==
  FAIL: test_install_packages_versioned (__main__.T)
  install_packages() with versions and with cache
  --
  Traceback (most recent call last):
File "./test_backend_apt_dpkg.py", line 557, in 
test_install_packages_versioned
  self.assertIn(result, 'aspell-doc version 1.1 required, but 
0.60.7~20110707-3build1 is available\n')
  AssertionError: 'aspell-doc version 1.1 required, but 
0.60.7~20110707-3ubuntu0.1 is available\n' not found in 'aspell-doc version 1.1 
required, but 0.60.7~20110707-3build1 is available\n'

  --
  Ran 37 tests in 191.123s

  FAILED (failures=1)

  [Test Case]
  ## From within autopkgtest source package, with autopkgtest deps installed
  ## This is a slightly modified version if debian/tests/upstream-system

  # do not run in the source tree, as we want to check the system-installed
  # apport
  TESTDIR=${ADTTMP:-/tmp}/apport-tests
  mkdir -p $TESTDIR
  cp test/test_* test/run "$TESTDIR"
  cd "$TESTDIR"

  # clean up old crash reports
  rm -rf /var/crash/*

  export GNUPGHOME=$TESTDIR/gnupg
  mkdir -m 700 $GNUPGHOME

  ./run backend_apt_dpkg

  [Fix]
  
http://bazaar.launchpad.net/~ubuntu-core-dev/ubuntu/focal/apport/ubuntu/revision/2717

  [Regression Risk]
  Code is restricted to a test that is only ran via autopkgtest.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1851542/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1851542] Re: autopkgtest fails due to aspell SRU

2019-11-06 Thread dann frazier
** Description changed:

  [Impact]
  A new autopkgtest test regression began appearing after (and due to) an 
aspell SRU.
+ 
+ ==
+ FAIL: test_install_packages_versioned (__main__.T)
+ install_packages() with versions and with cache
+ --
+ Traceback (most recent call last):
+   File "./test_backend_apt_dpkg.py", line 557, in 
test_install_packages_versioned
+ self.assertIn(result, 'aspell-doc version 1.1 required, but 
0.60.7~20110707-3build1 is available\n')
+ AssertionError: 'aspell-doc version 1.1 required, but 
0.60.7~20110707-3ubuntu0.1 is available\n' not found in 'aspell-doc version 1.1 
required, but 0.60.7~20110707-3build1 is available\n'
+ 
+ --
+ Ran 37 tests in 191.123s
+ 
+ FAILED (failures=1)
  
  [Test Case]
  ## From within autopkgtest source package, with autopkgtest deps installed
  ## This is a slightly modified version if debian/tests/upstream-system
  
  # do not run in the source tree, as we want to check the system-installed
  # apport
  TESTDIR=${ADTTMP:-/tmp}/apport-tests
  mkdir -p $TESTDIR
  cp test/test_* test/run "$TESTDIR"
  cd "$TESTDIR"
  
  # clean up old crash reports
  rm -rf /var/crash/*
  
  export GNUPGHOME=$TESTDIR/gnupg
  mkdir -m 700 $GNUPGHOME
  
  ./run backend_apt_dpkg
  
- 
  [Fix]
  
http://bazaar.launchpad.net/~ubuntu-core-dev/ubuntu/focal/apport/ubuntu/revision/2717
  
  [Regression Risk]
  Code is restricted to a test that is only ran via autopkgtest.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1851542

Title:
  autopkgtest fails due to aspell SRU

Status in apport package in Ubuntu:
  Fix Released
Status in apport source package in Bionic:
  New
Status in apport source package in Disco:
  New
Status in apport source package in Eoan:
  New

Bug description:
  [Impact]
  A new autopkgtest test regression began appearing after (and due to) an 
aspell SRU.

  ==
  FAIL: test_install_packages_versioned (__main__.T)
  install_packages() with versions and with cache
  --
  Traceback (most recent call last):
File "./test_backend_apt_dpkg.py", line 557, in 
test_install_packages_versioned
  self.assertIn(result, 'aspell-doc version 1.1 required, but 
0.60.7~20110707-3build1 is available\n')
  AssertionError: 'aspell-doc version 1.1 required, but 
0.60.7~20110707-3ubuntu0.1 is available\n' not found in 'aspell-doc version 1.1 
required, but 0.60.7~20110707-3build1 is available\n'

  --
  Ran 37 tests in 191.123s

  FAILED (failures=1)

  [Test Case]
  ## From within autopkgtest source package, with autopkgtest deps installed
  ## This is a slightly modified version if debian/tests/upstream-system

  # do not run in the source tree, as we want to check the system-installed
  # apport
  TESTDIR=${ADTTMP:-/tmp}/apport-tests
  mkdir -p $TESTDIR
  cp test/test_* test/run "$TESTDIR"
  cd "$TESTDIR"

  # clean up old crash reports
  rm -rf /var/crash/*

  export GNUPGHOME=$TESTDIR/gnupg
  mkdir -m 700 $GNUPGHOME

  ./run backend_apt_dpkg

  [Fix]
  
http://bazaar.launchpad.net/~ubuntu-core-dev/ubuntu/focal/apport/ubuntu/revision/2717

  [Regression Risk]
  Code is restricted to a test that is only ran via autopkgtest.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1851542/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1848200] autopkgtest failure investigation

2019-11-06 Thread dann frazier
Stable Release Team,

I investigated the autopkgtest regression in Comment #12, and believe
it to not be a regression introduced by this gdb upload. apport has
been updated a couple of times via security since tests passed - and at
least one of those updates had known regressions. There is also a
false positive result due to an aspell SRU (see bug
1851542). Apparently autopkgtests don't run on security uploads by
default, so autopkgtest.ubuntu.com doesn't have apples/apples test
results to compare (prev-gdb/prev-apport vs. prev-gdb/new-apport). I
therefore ran some tests manually.

In the attached logs you'll see that:
 - I am able to reproduce the same failures as the official
   autopkgtests for apport
 - The failures are the same with both the current gdb and the
   bionic-proposed gdb

Therefore, please allow gdb to promulgate to -updates.

 -dann


** Attachment added: "gdb.i386"
   https://bugs.launchpad.net/bugs/1848200/+attachment/5303314/+files/gdb.i386

** Attachment added: "gdb.i386.proposed"
   
https://bugs.launchpad.net/bugs/1848200/+attachment/5303315/+files/gdb.i386.proposed

** Attachment added: "gdb.amd64"
   https://bugs.launchpad.net/bugs/1848200/+attachment/5303316/+files/gdb.amd64

** Attachment added: "gdb.amd64.proposed"
   
https://bugs.launchpad.net/bugs/1848200/+attachment/5303317/+files/gdb.amd64.proposed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gdb in Ubuntu.
https://bugs.launchpad.net/bugs/1848200

Title:
  gdb not stopping on breakpoint in a 32-bit program

Status in gdb package in Ubuntu:
  Fix Released
Status in gdb source package in Bionic:
  Fix Committed

Bug description:
  [Impact]
  After upgrading gdb from 8.1-0ubuntu3 to 8.1-0ubuntu3.1, gdb does not stop
  on breakpoint when running a 32-bit application (on 64-bit Ubuntu).

  [Test Case]
  This can be reproduced with a simple “hello world” program:

  $ cat hello.c
  #include 
  int main()
  {
     // printf() displays the string inside quotation
     printf("Hello, World!");
     return 0;
  }
  $ gcc -ggdb -m32 hello.c
  $ gdb a.out
  (gdb) b hello.c:5
  Breakpoint 1 at 0x536: file hello.c, line 5.
  (gdb) run
  Starting program: /home/user/sandbox/a.out
  warning: Breakpoint address adjusted from 0xf7fd9be0 to 0xf7fd9be0.
  warning: Breakpoint address adjusted from 0xf7fda195 to 0xf7fda195.
  warning: Breakpoint address adjusted from 0xf7fdbd1c to 0xf7fdbd1c.
  warning: Breakpoint address adjusted from 0xf7fdb924 to 0xf7fdb924.
  warning: Breakpoint address adjusted from 0xf7fe99b3 to 0xf7fe99b3.
  warning: Breakpoint address adjusted from 0xf7fea401 to 0xf7fea401.
  warning: Breakpoint address adjusted from 0xf7fea706 to 0xf7fea706.

  --- (and not stopping nor outputting the text…) ---

  [Regression Risk]
  Test case ran on arm64 and regression tested using the above test case on 
amd64, i386 and s390x.

  This regression was fixed on the upstream gdb-8.1 branch within a few
  weeks of the breakage back in May 2018. Since then there have been no
  other fixes in this area on that branch, implying this fixed the issue
  and there were no further regressions discovered.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gdb/+bug/1848200/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1851542] [NEW] autopkgtest fails due to aspell SRU

2019-11-06 Thread dann frazier
Public bug reported:

[Impact]
A new autopkgtest test regression began appearing after (and due to) an aspell 
SRU.

[Test Case]
## From within autopkgtest source package, with autopkgtest deps installed
## This is a slightly modified version if debian/tests/upstream-system

# do not run in the source tree, as we want to check the system-installed
# apport
TESTDIR=${ADTTMP:-/tmp}/apport-tests
mkdir -p $TESTDIR
cp test/test_* test/run "$TESTDIR"
cd "$TESTDIR"

# clean up old crash reports
rm -rf /var/crash/*

export GNUPGHOME=$TESTDIR/gnupg
mkdir -m 700 $GNUPGHOME

./run backend_apt_dpkg


[Fix]
http://bazaar.launchpad.net/~ubuntu-core-dev/ubuntu/focal/apport/ubuntu/revision/2717

[Regression Risk]
Code is restricted to a test that is only ran via autopkgtest.

** Affects: apport (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: apport (Ubuntu Bionic)
 Importance: Undecided
 Status: New

** Affects: apport (Ubuntu Disco)
 Importance: Undecided
 Status: New

** Affects: apport (Ubuntu Eoan)
 Importance: Undecided
 Status: New


** Tags: block-proposed-bionic block-proposed-disco block-proposed-eoan

** Also affects: apport (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: apport (Ubuntu Eoan)
   Importance: Undecided
   Status: New

** Also affects: apport (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Changed in: apport (Ubuntu)
   Status: New => Fix Released

** Tags added: block-proposed-disco

** Tags added: block-proposed-bionic block-proposed-eoan

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1851542

Title:
  autopkgtest fails due to aspell SRU

Status in apport package in Ubuntu:
  Fix Released
Status in apport source package in Bionic:
  New
Status in apport source package in Disco:
  New
Status in apport source package in Eoan:
  New

Bug description:
  [Impact]
  A new autopkgtest test regression began appearing after (and due to) an 
aspell SRU.

  [Test Case]
  ## From within autopkgtest source package, with autopkgtest deps installed
  ## This is a slightly modified version if debian/tests/upstream-system

  # do not run in the source tree, as we want to check the system-installed
  # apport
  TESTDIR=${ADTTMP:-/tmp}/apport-tests
  mkdir -p $TESTDIR
  cp test/test_* test/run "$TESTDIR"
  cd "$TESTDIR"

  # clean up old crash reports
  rm -rf /var/crash/*

  export GNUPGHOME=$TESTDIR/gnupg
  mkdir -m 700 $GNUPGHOME

  ./run backend_apt_dpkg

  
  [Fix]
  
http://bazaar.launchpad.net/~ubuntu-core-dev/ubuntu/focal/apport/ubuntu/revision/2717

  [Regression Risk]
  Code is restricted to a test that is only ran via autopkgtest.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1851542/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1835738] Re: SRU: Update Python interpreter to 3.6.9 and 3.7.5

2019-11-06 Thread Matthias Klose
** Description changed:

  Update Python interpreter to 3.6.9 and 3.7.5.  As done with earlier
  subminor upstream releases (LP: #1822993).
  
  SRU: update Python 3.7 to the 3.7.5 release, update Python 3.6 to the
  3.6.9 release.
  
  python3-stdlib-extensions also updates the modules to the 3.6.9 release
  for Python 3.6.
  
  Acceptance Criteria: The package builds, and the test suite doesn't show
  regressions. The test suite passes in the autopkg tests. The new
  packages don't cause regressions in a test rebuild of the main
  component.
  
- TODO: update after test rebuild
- 
https://people.canonical.com/~doko/ftbfs-report/test-rebuild-20191018-release-bionic.html
 
- 
https://people.canonical.com/~doko/ftbfs-report/test-rebuild-20191018-release-tst-bionic.html
+ 
http://people.canonical.com/~doko/ftbfs-report/test-rebuild-20190404-cosmic.html
+ 
http://people.canonical.com/~doko/ftbfs-report/test-rebuild-20190404-gcc8-cosmic.html
  
  The test rebuilds are finished, and don't show any regressions for the
  main component.
  
  Regression Potential: Python 3.7 isn't used by default, so we don't have many 
default users.
  Regression Potential: Python 3.6 could see some regressions, although we are 
trying to minimize the risk by doing the test rebuild.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to python3-defaults in
Ubuntu.
https://bugs.launchpad.net/bugs/1835738

Title:
  SRU: Update Python interpreter to 3.6.9 and 3.7.5

Status in python3-defaults package in Ubuntu:
  New
Status in python3-stdlib-extensions package in Ubuntu:
  Fix Released
Status in python3.7 package in Ubuntu:
  Fix Released
Status in python3-defaults source package in Bionic:
  New
Status in python3-stdlib-extensions source package in Bionic:
  New
Status in python3.6 source package in Bionic:
  New
Status in python3.7 source package in Bionic:
  New
Status in python3-defaults source package in Disco:
  New
Status in python3-stdlib-extensions source package in Disco:
  Fix Committed
Status in python3.7 source package in Disco:
  New
Status in python3-defaults source package in Eoan:
  New
Status in python3-stdlib-extensions source package in Eoan:
  Fix Committed
Status in python3.7 source package in Eoan:
  Fix Committed

Bug description:
  Update Python interpreter to 3.6.9 and 3.7.5.  As done with earlier
  subminor upstream releases (LP: #1822993).

  SRU: update Python 3.7 to the 3.7.5 release, update Python 3.6 to the
  3.6.9 release.

  python3-stdlib-extensions also updates the modules to the 3.6.9
  release for Python 3.6.

  Acceptance Criteria: The package builds, and the test suite doesn't
  show regressions. The test suite passes in the autopkg tests. The new
  packages don't cause regressions in a test rebuild of the main
  component.

  
http://people.canonical.com/~doko/ftbfs-report/test-rebuild-20190404-cosmic.html
  
http://people.canonical.com/~doko/ftbfs-report/test-rebuild-20190404-gcc8-cosmic.html

  The test rebuilds are finished, and don't show any regressions for the
  main component.

  Regression Potential: Python 3.7 isn't used by default, so we don't have many 
default users.
  Regression Potential: Python 3.6 could see some regressions, although we are 
trying to minimize the risk by doing the test rebuild.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python3-defaults/+bug/1835738/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 540751] Re: Unable to use dead keys with java and ibus

2019-11-06 Thread Johny
This bug is now on Ubuntu 19.10 with openjdk-11...

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ibus in Ubuntu.
https://bugs.launchpad.net/bugs/540751

Title:
  Unable to use dead keys with java and ibus

Status in ibus package in Ubuntu:
  Invalid
Status in openjdk-6 package in Ubuntu:
  Invalid
Status in openjdk-7 package in Ubuntu:
  Invalid

Bug description:
  Using latest Lucid packages, I am unable to use ^ key to generate ê
  french character in every Java programs (jEdit, Netbeans, etc.).

  Typing ^ + e give just the e character.
  Typing ^ + Space and nothing appears.

  I've tried with Sun JDK (6u18, 6u20, 7) and the bug is still present.

  I've tried to remove ibus and everything works again (I've just unset
  XMODIFIERS and GTK_IM_MODULE).

  I don't know if it's an ibus bug or openjdk one.

  ProblemType: Bug
  Architecture: amd64
  Date: Thu Mar 18 09:03:11 2010
  DistroRelease: Ubuntu 10.04
  ExecutablePath: /usr/lib/jvm/java-6-openjdk/jre/bin/java
  InstallationMedia: Error: [Errno 13] Permission non accordée: 
'/var/log/installer/media-info'
  NonfreeKernelModules: nvidia
  Package: openjdk-6-jre-headless 6b18~pre2-1ubuntu1
  ProcEnviron:
   SHELL=/bin/bash
   PATH=(custom, user)
   LANG=fr_FR.utf8
  ProcVersionSignature: Ubuntu 2.6.32-16.25-genUser Name
  SourcePackage: openjdk-6
  Uname: Linux 2.6.32-16-generic x86_64

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ibus/+bug/540751/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1834875] Re: cloud-init growpart race with udev

2019-11-06 Thread Ryan Harper
A couple of comments on the suggested path:

> Imho the sequency of commands should be:
> * take flock on the device, to neutralise udev

+1  on this approach. Do you know if the flock will block
systemd's inotify write watch on the block device which triggers
udevd?  This is the typical race we see with partition creation
and rules executing.

> * modify device with sfdisk
> * reread partitions tables (i would say with blockdev --rereadpt, rather than 
> partx/partprobe)

I'm not sure we can use blockdev --rereadpt as we are operating upon the
root disk we're booted on and my understanding is that the ioctl that
partx uses is the only way to update the kernel partition table while
the disk is in use, otherwise we'd see the normal warning message like
when you fdisk your booted device and it says the disk is busy and
cannot read the partition table.

> * release the flock

+1

> * udevadm trigger --action=add --wait device (or trigger && settle)

I don't relish the idea of *re-adding* actions on the disk again since the 
partx update
should have already emitted the uevents associated with the new partitions.  
However,
we could do this as a way to force reloading of everything.  I'd like to 
withhold
judgement on whether we need this after testing with use of flock on the device.

> And like have a canary "only use locked codepath on this region" such
that we can assert through testing that this no longer happens with new
code, but does with old code.

The change to cloud-utils growpart could add a flag (--use-flock) so
cloud-init could emit different log messages on which path it takes
(including a warning if we cannot use flock (ie, you may race).

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1834875

Title:
  cloud-init growpart race with udev

Status in cloud-init:
  Incomplete
Status in cloud-utils:
  New
Status in linux-azure package in Ubuntu:
  New
Status in systemd package in Ubuntu:
  Incomplete

Bug description:
  On Azure, it happens regularly (20-30%), that cloud-init's growpart
  module fails to extend the partition to full size.

  Such as in this example:

  

  2019-06-28 12:24:18,666 - util.py[DEBUG]: Running command ['growpart', 
'--dry-run', '/dev/sda', '1'] with allowed return codes [0] (shell=False, 
capture=True)
  2019-06-28 12:24:19,157 - util.py[DEBUG]: Running command ['growpart', 
'/dev/sda', '1'] with allowed return codes [0] (shell=False, capture=True)
  2019-06-28 12:24:19,726 - util.py[DEBUG]: resize_devices took 1.075 seconds
  2019-06-28 12:24:19,726 - handlers.py[DEBUG]: finish: 
init-network/config-growpart: FAIL: running config-growpart with frequency 
always
  2019-06-28 12:24:19,727 - util.py[WARNING]: Running module growpart () failed
  2019-06-28 12:24:19,727 - util.py[DEBUG]: Running module growpart () failed
  Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/cloudinit/stages.py", line 812, in 
_run_modules
  freq=freq)
File "/usr/lib/python3/dist-packages/cloudinit/cloud.py", line 54, in run
  return self._runners.run(name, functor, args, freq, clear_on_fail)
File "/usr/lib/python3/dist-packages/cloudinit/helpers.py", line 187, in run
  results = functor(*args)
File "/usr/lib/python3/dist-packages/cloudinit/config/cc_growpart.py", line 
351, in handle
  func=resize_devices, args=(resizer, devices))
File "/usr/lib/python3/dist-packages/cloudinit/util.py", line 2521, in 
log_time
  ret = func(*args, **kwargs)
File "/usr/lib/python3/dist-packages/cloudinit/config/cc_growpart.py", line 
298, in resize_devices
  (old, new) = resizer.resize(disk, ptnum, blockdev)
File "/usr/lib/python3/dist-packages/cloudinit/config/cc_growpart.py", line 
159, in resize
  return (before, get_size(partdev))
File "/usr/lib/python3/dist-packages/cloudinit/config/cc_growpart.py", line 
198, in get_size
  fd = os.open(filename, os.O_RDONLY)
  FileNotFoundError: [Errno 2] No such file or directory: 
'/dev/disk/by-partuuid/a5f2b49f-abd6-427f-bbc4-ba5559235cf3'

  

  @rcj suggested this is a race with udev. This seems to only happen on
  Cosmic and later.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1834875/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1834875] Re: cloud-init growpart race with udev

2019-11-06 Thread Dimitri John Ledkov
@ Cloud init team, do we want to try changing cloud-utils to use a lock?

And like have a canary "only use locked codepath on this region" such
that we can assert through testing that this no longer happens with new
code, but does with old code.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1834875

Title:
  cloud-init growpart race with udev

Status in cloud-init:
  Incomplete
Status in cloud-utils:
  New
Status in linux-azure package in Ubuntu:
  New
Status in systemd package in Ubuntu:
  Incomplete

Bug description:
  On Azure, it happens regularly (20-30%), that cloud-init's growpart
  module fails to extend the partition to full size.

  Such as in this example:

  

  2019-06-28 12:24:18,666 - util.py[DEBUG]: Running command ['growpart', 
'--dry-run', '/dev/sda', '1'] with allowed return codes [0] (shell=False, 
capture=True)
  2019-06-28 12:24:19,157 - util.py[DEBUG]: Running command ['growpart', 
'/dev/sda', '1'] with allowed return codes [0] (shell=False, capture=True)
  2019-06-28 12:24:19,726 - util.py[DEBUG]: resize_devices took 1.075 seconds
  2019-06-28 12:24:19,726 - handlers.py[DEBUG]: finish: 
init-network/config-growpart: FAIL: running config-growpart with frequency 
always
  2019-06-28 12:24:19,727 - util.py[WARNING]: Running module growpart () failed
  2019-06-28 12:24:19,727 - util.py[DEBUG]: Running module growpart () failed
  Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/cloudinit/stages.py", line 812, in 
_run_modules
  freq=freq)
File "/usr/lib/python3/dist-packages/cloudinit/cloud.py", line 54, in run
  return self._runners.run(name, functor, args, freq, clear_on_fail)
File "/usr/lib/python3/dist-packages/cloudinit/helpers.py", line 187, in run
  results = functor(*args)
File "/usr/lib/python3/dist-packages/cloudinit/config/cc_growpart.py", line 
351, in handle
  func=resize_devices, args=(resizer, devices))
File "/usr/lib/python3/dist-packages/cloudinit/util.py", line 2521, in 
log_time
  ret = func(*args, **kwargs)
File "/usr/lib/python3/dist-packages/cloudinit/config/cc_growpart.py", line 
298, in resize_devices
  (old, new) = resizer.resize(disk, ptnum, blockdev)
File "/usr/lib/python3/dist-packages/cloudinit/config/cc_growpart.py", line 
159, in resize
  return (before, get_size(partdev))
File "/usr/lib/python3/dist-packages/cloudinit/config/cc_growpart.py", line 
198, in get_size
  fd = os.open(filename, os.O_RDONLY)
  FileNotFoundError: [Errno 2] No such file or directory: 
'/dev/disk/by-partuuid/a5f2b49f-abd6-427f-bbc4-ba5559235cf3'

  

  @rcj suggested this is a race with udev. This seems to only happen on
  Cosmic and later.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1834875/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1850887] Re: Audio / Sound reverts to HDMI when power event occurs

2019-11-06 Thread datch
The same bug!

** Also affects: pulseaudio
   Importance: Undecided
   Status: New

** Changed in: pulseaudio (Ubuntu)
 Assignee: (unassigned) => datch (s-ogorodnick)

** No longer affects: pulseaudio

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pulseaudio in Ubuntu.
https://bugs.launchpad.net/bugs/1850887

Title:
  Audio / Sound reverts to HDMI when power event occurs

Status in pulseaudio package in Ubuntu:
  Confirmed

Bug description:
  PulseAudio reverts the sound to HDMI all the time when a HDMI related
  power event occurs. That means, although I have set another USB sound
  device plugged in and set as default under sound settings, when an
  application like Kodi or the system shuts off the HDMI monitor and I
  reactivate the monitor, the sound is set to HDMI output again and
  again.

  That probably has to do with the fix to the reported Bug # 1711101 and
  definitely not happened at Ubuntu 19.04. I switched to Ubuntu 19.10
  two days ago.

  Setting the USB device as default does not help, even when done by
  PulseAudio mixer (gui) and removing HDMI output from the alternatives
  option.

  Expected behavior:
  PulseAudio keeps the sound setting to the selected device

  Actual behavior: 
  PulseAudio changes to HDMI at every HDMI power event

  Annoying manual workaround:
  Setting the desired Audio option on the control panel after every HDMI power 
event again

  ProblemType: Bug
  DistroRelease: Ubuntu 19.10
  Component: pulseaudio
  Version: 1:13.0-1ubuntu1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pulseaudio/+bug/1850887/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1851063] Re: EPSON XP-960 printer unusable since installation of 19.10 (worked OK with 19.04)

2019-11-06 Thread Chris Pollock
As noted in the last comment I posted on this, I have managed to get the
printer to work OK.

Would it be possible to simplify/clarify somewhere what the different
connections made by printers such as this are and mean? That is, when
you plug this printer in, you get several 'printers' showing up in CUPS
and in the Settings GUI. As some of them don't actually work, could they
be either made to work or hidden in some way?

BTW, the Ubuntu Debugging printer problems WIKI could usefully be
changed to reflect that for a USB printer you shouldn't expect to see
any /dev/usb/lp* at all (or at least that seems to be the case for this
printer).

** Changed in: cups (Ubuntu)
   Status: New => Invalid

** Converted to question:
   https://answers.launchpad.net/ubuntu/+source/cups/+question/685657

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/1851063

Title:
  EPSON XP-960 printer unusable since installation of 19.10 (worked OK
  with 19.04)

Status in cups package in Ubuntu:
  Invalid

Bug description:
  [code]
  chris@chris-BlackTower:~$ lsmod | grep usb
  btusb  57344  0
  btrtl  20480  1 btusb
  btbcm  16384  1 btusb
  btintel24576  1 btusb
  bluetooth 581632  31 btrtl,btintel,btbcm,bnep,btusb,rfcomm
  snd_usb_audio 241664  4
  snd_usbmidi_lib36864  1 snd_usb_audio
  snd_hwdep  20480  2 snd_usb_audio,snd_hda_codec
  snd_rawmidi36864  2 snd_seq_midi,snd_usbmidi_lib
  usblp  24576  0
  snd_pcm   106496  4 
snd_hda_intel,snd_usb_audio,snd_hda_codec,snd_hda_core
  snd86016  28 
snd_hda_codec_generic,snd_seq,snd_seq_device,snd_hwdep,snd_hda_intel,snd_usb_audio,snd_usbmidi_lib,snd_hda_codec,snd_hda_codec_realtek,snd_timer,snd_pcm,snd_rawmidi
  mc 53248  5 
videodev,snd_usb_audio,videobuf2_v4l2,uvcvideo,videobuf2_common
  usb_storage77824  3 uas
  usbhid 57344  0
  hid   126976  2 usbhid,hid_generic
  chris@chris-BlackTower:~$ tail -f /var/log/syslog
  Nov  2 17:51:20 chris-BlackTower dbus-daemon[1927]: [session uid=1000 
pid=1927] Successfully activated service 'org.gnome.Terminal'
  Nov  2 17:51:20 chris-BlackTower systemd[1910]: Started GNOME Terminal Server.
  Nov  2 17:51:20 chris-BlackTower gnome-shell[2136]: # 
_g_io_module_get_default: Found default implementation dconf 
(DConfSettingsBackend) for ‘gsettings-backend’
  Nov  2 17:51:20 chris-BlackTower gnome-shell[2136]: # watch_fast: 
"/org/gnome/terminal/legacy/" (establishing: 0, active: 0)
  Nov  2 17:51:20 chris-BlackTower gnome-shell[2136]: # unwatch_fast: 
"/org/gnome/terminal/legacy/" (active: 0, establishing: 1)
  Nov  2 17:51:20 chris-BlackTower gnome-shell[2136]: # watch_established: 
"/org/gnome/terminal/legacy/" (establishing: 0)
  Nov  2 17:51:22 chris-BlackTower wpa_supplicant[1213]: wlp6s0: Reject scan 
trigger since one is already pending
  Nov  2 17:51:58 chris-BlackTower xdg-desktop-por[2074]: Failed to get 
application states: GDBus.Error:org.freedesktop.portal.Error.Failed: Could not 
get window list: GDBus.Error:org.freedesktop.DBus.Error.AccessDenied: App 
introspection not allowed
  Nov  2 17:52:17 chris-BlackTower kernel: [ 5451.623104] usb 1-2: USB 
disconnect, device number 5
  Nov  2 17:52:25 chris-BlackTower wpa_supplicant[1213]: wlp6s0: Reject scan 
trigger since one is already pending
  Nov  2 17:52:47 chris-BlackTower kernel: [ 5481.545188] audit: type=1400 
audit(1572717167.836:71): apparmor="DENIED" operation="exec" 
profile="snap.syncthing.syncthing" name="/sbin/route" pid=15859 
comm="syncthing" requested_mask="x" denied_mask="x" fsuid=1000 ouid=0
  Nov  2 17:52:47 chris-BlackTower kernel: [ 5481.545588] audit: type=1400 
audit(1572717167.836:72): apparmor="DENIED" operation="exec" 
profile="snap.syncthing.syncthing" name="/bin/ip" pid=15860 comm="syncthing" 
requested_mask="x" denied_mask="x" fsuid=1000 ouid=0
  Nov  2 17:52:47 chris-BlackTower kernel: [ 5481.545989] audit: type=1400 
audit(1572717167.836:73): apparmor="DENIED" operation="exec" 
profile="snap.syncthing.syncthing" name="/bin/ip" pid=15861 comm="syncthing" 
requested_mask="x" denied_mask="x" fsuid=1000 ouid=0
  Nov  2 17:52:58 chris-BlackTower xdg-desktop-por[2074]: Failed to get 
application states: GDBus.Error:org.freedesktop.portal.Error.Failed: Could not 
get window list: GDBus.Error:org.freedesktop.DBus.Error.AccessDenied: App 
introspection not allowed
  Nov  2 17:53:29 chris-BlackTower kernel: [ 5523.424278] usb 1-2: new 
high-speed USB device number 6 using ehci-pci
  Nov  2 17:53:29 chris-BlackTower kernel: [ 5523.584559] usb 1-2: New USB 
device found, idVendor=04b8, idProduct=1109, bcdDevice= 1.00
  Nov  2 17:53:29 chris-BlackTower kernel: [ 5523.584565] usb 1-2: New USB 
device strings: Mfr=1, 

[Touch-packages] [Bug 1851063] Re: EPSON XP-960 printer unusable since installation of 19.10 (worked OK with 19.04)

2019-11-06 Thread Chris Pollock
I have found a working combination of printer driver (from Epson) and
printer definition (one plugged in it shows up about three times as
different versions of the same XP-960), so this is not a 'bug'. Though I
have to say that it's not immediately obviouw what is going on!

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/1851063

Title:
  EPSON XP-960 printer unusable since installation of 19.10 (worked OK
  with 19.04)

Status in cups package in Ubuntu:
  Invalid

Bug description:
  [code]
  chris@chris-BlackTower:~$ lsmod | grep usb
  btusb  57344  0
  btrtl  20480  1 btusb
  btbcm  16384  1 btusb
  btintel24576  1 btusb
  bluetooth 581632  31 btrtl,btintel,btbcm,bnep,btusb,rfcomm
  snd_usb_audio 241664  4
  snd_usbmidi_lib36864  1 snd_usb_audio
  snd_hwdep  20480  2 snd_usb_audio,snd_hda_codec
  snd_rawmidi36864  2 snd_seq_midi,snd_usbmidi_lib
  usblp  24576  0
  snd_pcm   106496  4 
snd_hda_intel,snd_usb_audio,snd_hda_codec,snd_hda_core
  snd86016  28 
snd_hda_codec_generic,snd_seq,snd_seq_device,snd_hwdep,snd_hda_intel,snd_usb_audio,snd_usbmidi_lib,snd_hda_codec,snd_hda_codec_realtek,snd_timer,snd_pcm,snd_rawmidi
  mc 53248  5 
videodev,snd_usb_audio,videobuf2_v4l2,uvcvideo,videobuf2_common
  usb_storage77824  3 uas
  usbhid 57344  0
  hid   126976  2 usbhid,hid_generic
  chris@chris-BlackTower:~$ tail -f /var/log/syslog
  Nov  2 17:51:20 chris-BlackTower dbus-daemon[1927]: [session uid=1000 
pid=1927] Successfully activated service 'org.gnome.Terminal'
  Nov  2 17:51:20 chris-BlackTower systemd[1910]: Started GNOME Terminal Server.
  Nov  2 17:51:20 chris-BlackTower gnome-shell[2136]: # 
_g_io_module_get_default: Found default implementation dconf 
(DConfSettingsBackend) for ‘gsettings-backend’
  Nov  2 17:51:20 chris-BlackTower gnome-shell[2136]: # watch_fast: 
"/org/gnome/terminal/legacy/" (establishing: 0, active: 0)
  Nov  2 17:51:20 chris-BlackTower gnome-shell[2136]: # unwatch_fast: 
"/org/gnome/terminal/legacy/" (active: 0, establishing: 1)
  Nov  2 17:51:20 chris-BlackTower gnome-shell[2136]: # watch_established: 
"/org/gnome/terminal/legacy/" (establishing: 0)
  Nov  2 17:51:22 chris-BlackTower wpa_supplicant[1213]: wlp6s0: Reject scan 
trigger since one is already pending
  Nov  2 17:51:58 chris-BlackTower xdg-desktop-por[2074]: Failed to get 
application states: GDBus.Error:org.freedesktop.portal.Error.Failed: Could not 
get window list: GDBus.Error:org.freedesktop.DBus.Error.AccessDenied: App 
introspection not allowed
  Nov  2 17:52:17 chris-BlackTower kernel: [ 5451.623104] usb 1-2: USB 
disconnect, device number 5
  Nov  2 17:52:25 chris-BlackTower wpa_supplicant[1213]: wlp6s0: Reject scan 
trigger since one is already pending
  Nov  2 17:52:47 chris-BlackTower kernel: [ 5481.545188] audit: type=1400 
audit(1572717167.836:71): apparmor="DENIED" operation="exec" 
profile="snap.syncthing.syncthing" name="/sbin/route" pid=15859 
comm="syncthing" requested_mask="x" denied_mask="x" fsuid=1000 ouid=0
  Nov  2 17:52:47 chris-BlackTower kernel: [ 5481.545588] audit: type=1400 
audit(1572717167.836:72): apparmor="DENIED" operation="exec" 
profile="snap.syncthing.syncthing" name="/bin/ip" pid=15860 comm="syncthing" 
requested_mask="x" denied_mask="x" fsuid=1000 ouid=0
  Nov  2 17:52:47 chris-BlackTower kernel: [ 5481.545989] audit: type=1400 
audit(1572717167.836:73): apparmor="DENIED" operation="exec" 
profile="snap.syncthing.syncthing" name="/bin/ip" pid=15861 comm="syncthing" 
requested_mask="x" denied_mask="x" fsuid=1000 ouid=0
  Nov  2 17:52:58 chris-BlackTower xdg-desktop-por[2074]: Failed to get 
application states: GDBus.Error:org.freedesktop.portal.Error.Failed: Could not 
get window list: GDBus.Error:org.freedesktop.DBus.Error.AccessDenied: App 
introspection not allowed
  Nov  2 17:53:29 chris-BlackTower kernel: [ 5523.424278] usb 1-2: new 
high-speed USB device number 6 using ehci-pci
  Nov  2 17:53:29 chris-BlackTower kernel: [ 5523.584559] usb 1-2: New USB 
device found, idVendor=04b8, idProduct=1109, bcdDevice= 1.00
  Nov  2 17:53:29 chris-BlackTower kernel: [ 5523.584565] usb 1-2: New USB 
device strings: Mfr=1, Product=2, SerialNumber=3
  Nov  2 17:53:29 chris-BlackTower kernel: [ 5523.584568] usb 1-2: Product: 
XP-960 Series
  Nov  2 17:53:29 chris-BlackTower kernel: [ 5523.584570] usb 1-2: 
Manufacturer: EPSON
  Nov  2 17:53:29 chris-BlackTower kernel: [ 5523.584573] usb 1-2: 
SerialNumber: 57355359303299
  Nov  2 17:53:29 chris-BlackTower kernel: [ 5523.588547] usblp 1-2:1.1: 
usblp0: USB Bidirectional printer dev 6 if 1 alt 0 proto 2 vid 0x04B8 pid 0x1109
  Nov  2 17:53:29 chris-BlackTower kernel: [ 5523.588832] usb-storage 

[Touch-packages] [Bug 1851518] [NEW] [950SBE/951SBE, Realtek ALC298, Speaker, Internal] No sound on internal speakers, very very quiet on headphones

2019-11-06 Thread Martin S
Public bug reported:

I've been googling this issue for 10's of hours and tried many things.

Relase of Ubuntu: 19.10

Expected outcome: Music plays on the internal speakers and headphones.

Actual outcome: I can barely hear audio using headphones with volume
turned up to 150%.  Absolutely nothing comes out of the speakers. (The
speakers sound great under Windows 10.)

Complete alsa-info output is attached, but here are some snippets:

!!DMI Information
!!---

Manufacturer:  SAMSUNG ELECTRONICS CO., LTD.
Product Name:  950SBE/951SBE
Product Version:   P06RES
Firmware Version:  P06RES.075.190529.SP
Board Vendor:  SAMSUNG ELECTRONICS CO., LTD.
Board Name:NP950SBE-K01US


!!Kernel Information
!!--

Kernel release:5.3.0-19-generic
Operating System:  GNU/Linux
Architecture:  x86_64
Processor: x86_64
SMP Enabled:   Yes


!!ALSA Version
!!

Driver version: k5.3.0-19-generic
Library version:1.1.9
Utilities version:  1.1.9


!!Loaded ALSA modules
!!---

snd_hda_intel


!!Sound Servers on this system
!!

Pulseaudio:
  Installed - Yes (/usr/bin/pulseaudio)
  Running - Yes


!!Soundcards recognised by ALSA
!!-

 0 [PCH]: HDA-Intel - HDA Intel PCH
  HDA Intel PCH at 0x604b118000 irq 177


!!PCI Soundcards installed in the system
!!--

00:1f.3 Multimedia audio controller: Intel Corporation Cannon Point-LP
High Definition Audio Controller (rev 11)


!!Advanced information - PCI Vendor/Device/Subsystem ID's
!!---

00:1f.3 0401: 8086:9dc8 (rev 11)
DeviceName: Onboard - Sound


!!HDA-Intel Codec information
!!---
--startcollapse--

Codec: Realtek ALC298
Address: 0
AFG Function Id: 0x1 (unsol 1)
Vendor Id: 0x10ec0298
Subsystem Id: 0x144dc812
Revision Id: 0x100103
No Modem Function Group found
Default PCM:
rates [0x60]: 44100 48000
bits [0xe]: 16 20 24
formats [0x1]: PCM
Default Amp-In caps: N/A
Default Amp-Out caps: N/A
State of AFG node 0x01:
  Power states:  D0 D1 D2 D3 D3cold CLKSTOP EPSS
  Power: setting=D0, actual=D0
GPIO: io=8, o=0, i=0, unsolicited=1, wake=0
  IO[0]: enable=0, dir=0, wake=0, sticky=0, data=0, unsol=0
  IO[1]: enable=0, dir=0, wake=0, sticky=0, data=0, unsol=0
  IO[2]: enable=0, dir=0, wake=0, sticky=0, data=0, unsol=0
  IO[3]: enable=0, dir=0, wake=0, sticky=0, data=0, unsol=0
  IO[4]: enable=0, dir=0, wake=0, sticky=0, data=0, unsol=0
  IO[5]: enable=0, dir=0, wake=0, sticky=0, data=0, unsol=0
  IO[6]: enable=0, dir=0, wake=0, sticky=0, data=0, unsol=0
  IO[7]: enable=0, dir=0, wake=0, sticky=0, data=0, unsol=0
Node 0x02 [Audio Output] wcaps 0x41d: Stereo Amp-Out
  Control: name="Headphone Playback Volume", index=0, device=0
ControlAmp: chs=3, dir=Out, idx=0, ofs=0
  Device: name="ALC298 Analog", type="Audio", device=0
  Amp-Out caps: ofs=0x7f, nsteps=0x7f, stepsize=0x01, mute=0
  Amp-Out vals:  [0x00 0x00]
  Converter: stream=1, channel=0
  PCM:
rates [0x60]: 44100 48000
bits [0xe]: 16 20 24
formats [0x1]: PCM
  Power states:  D0 D1 D2 D3 EPSS
  Power: setting=D0, actual=D0
Node 0x03 [Audio Output] wcaps 0x41d: Stereo Amp-Out
  Control: name="Speaker Playback Volume", index=0, device=0
ControlAmp: chs=3, dir=Out, idx=0, ofs=0
  Amp-Out caps: ofs=0x7f, nsteps=0x7f, stepsize=0x01, mute=0
  Amp-Out vals:  [0x7f 0x7f]
  Converter: stream=1, channel=0

ProblemType: Bug
DistroRelease: Ubuntu 19.10
Package: alsa-base 1.0.25+dfsg-0ubuntu5
ProcVersionSignature: Ubuntu 5.3.0-19.20-generic 5.3.1
Uname: Linux 5.3.0-19-generic x86_64
ApportVersion: 2.20.11-0ubuntu8.2
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC0:  martin 1383 F pulseaudio
CurrentDesktop: ubuntu:GNOME
Date: Wed Nov  6 06:20:08 2019
InstallationDate: Installed on 2019-11-03 (3 days ago)
InstallationMedia: Ubuntu 19.10 "Eoan Ermine" - Release amd64 (20191017)
PackageArchitecture: all
ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=
 LANG=en_US.UTF-8
 SHELL=/bin/bash
SourcePackage: alsa-driver
Symptom: audio
Symptom_AlsaPlaybackTest: ALSA playback test through plughw:PCH failed
Symptom_Card: Built-in Audio - HDA Intel PCH
Symptom_DevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC0:  martin 1383 F pulseaudio
Symptom_Jack: Speaker, Internal
Symptom_Type: No sound at all
Title: [950SBE/951SBE, Realtek ALC298, Speaker, Internal] No sound at all
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 05/29/2019
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: P06RES.075.190529.SP
dmi.board.asset.tag: No Asset Tag
dmi.board.name: NP950SBE-K01US
dmi.board.vendor: SAMSUNG ELECTRONICS CO., LTD.
dmi.board.version: SGL9849A0Q-C01-G003-S0001+10.0.17763
dmi.chassis.asset.tag: No 

[Touch-packages] [Bug 1849785] Re: FTBFS on i386/ppc64/s390x (Eoan+Focal)

2019-11-06 Thread Christian Ehrhardt 
Only fails on arm64 now (all others good):
15-basic-resolver.c:58:46: error: ‘__NR_open’ undeclared (first use in this 
function)
   58 |  if (seccomp_syscall_resolve_name("open") != __NR_open)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libseccomp in Ubuntu.
https://bugs.launchpad.net/bugs/1849785

Title:
  FTBFS on i386/ppc64/s390x (Eoan+Focal)

Status in libseccomp:
  Fix Released
Status in libseccomp package in Ubuntu:
  Triaged
Status in libseccomp source package in Eoan:
  Triaged

Bug description:
  Due to the python 3.8 transition in focal this was rebuilt but fails atm.
  => 
https://launchpadlibrarian.net/448119198/buildlog_ubuntu-focal-s390x.libseccomp_2.4.1-0ubuntu0.19.10.4_BUILDING.txt.gz

  The simulations fail in this case:
   batch name: 36-sim-ipc_syscalls
   test mode:  c
   test type:  bpf-sim
  Test 36-sim-ipc_syscalls%%001-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%002-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%003-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%004-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%005-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%006-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%007-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%008-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%009-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%010-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%011-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%012-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%013-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%014-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%015-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%016-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%017-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%018-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%019-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%020-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%021-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%022-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%023-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%024-1 result:   ERROR 36-sim-ipc_syscalls rc=14
   test mode:  c
   test type:  bpf-valgrind
  Test 36-sim-ipc_syscalls%%025-1 result:   FAILURE 36-sim-ipc_syscalls 
rc=14
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390

  
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%001-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%002-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%003-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%004-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%005-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%006-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%007-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%008-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%009-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%010-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%011-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%012-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test mode:  c
   test type:  bpf-valgrind
  Test 37-sim-ipc_syscalls_be%%013-1 result:   FAILURE 
37-sim-ipc_syscalls_be rc=14

  
  It is always the s390x test - even when running on i386/ppc64
  On x86_64 this test succeeds:

  Test 36-sim-ipc_syscalls%%025-1 result:   SUCCESS
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390

To manage notifications about this bug go to:
https://bugs.launchpad.net/libseccomp/+bug/1849785/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : 

[Touch-packages] [Bug 1835738] Re: SRU: Update Python interpreter to 3.6.9 and 3.7.5

2019-11-06 Thread Matthias Klose
** Description changed:

  Update Python interpreter to 3.6.9 and 3.7.5.  As done with earlier
  subminor upstream releases (LP: #1822993).
  
  SRU: update Python 3.7 to the 3.7.5 release, update Python 3.6 to the
  3.6.9 release.
  
  python3-stdlib-extensions also updates the modules to the 3.6.9 release
  for Python 3.6.
  
  Acceptance Criteria: The package builds, and the test suite doesn't show
  regressions. The test suite passes in the autopkg tests. The new
  packages don't cause regressions in a test rebuild of the main
  component.
  
  TODO: update after test rebuild
- 
http://people.canonical.com/~doko/ftbfs-report/test-rebuild-20190404-cosmic.html
- 
http://people.canonical.com/~doko/ftbfs-report/test-rebuild-20190404-gcc8-cosmic.html
+ 
https://people.canonical.com/~doko/ftbfs-report/test-rebuild-20191018-release-bionic.html
 
+ 
https://people.canonical.com/~doko/ftbfs-report/test-rebuild-20191018-release-tst-bionic.html
  
  The test rebuilds are finished, and don't show any regressions for the
  main component.
  
  Regression Potential: Python 3.7 isn't used by default, so we don't have many 
default users.
  Regression Potential: Python 3.6 could see some regressions, although we are 
trying to minimize the risk by doing the test rebuild.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to python3-defaults in
Ubuntu.
https://bugs.launchpad.net/bugs/1835738

Title:
  SRU: Update Python interpreter to 3.6.9 and 3.7.5

Status in python3-defaults package in Ubuntu:
  New
Status in python3-stdlib-extensions package in Ubuntu:
  Fix Released
Status in python3.7 package in Ubuntu:
  Fix Released
Status in python3-defaults source package in Bionic:
  New
Status in python3-stdlib-extensions source package in Bionic:
  New
Status in python3.6 source package in Bionic:
  New
Status in python3.7 source package in Bionic:
  New
Status in python3-defaults source package in Disco:
  New
Status in python3-stdlib-extensions source package in Disco:
  Fix Committed
Status in python3.7 source package in Disco:
  New
Status in python3-defaults source package in Eoan:
  New
Status in python3-stdlib-extensions source package in Eoan:
  Fix Committed
Status in python3.7 source package in Eoan:
  Fix Committed

Bug description:
  Update Python interpreter to 3.6.9 and 3.7.5.  As done with earlier
  subminor upstream releases (LP: #1822993).

  SRU: update Python 3.7 to the 3.7.5 release, update Python 3.6 to the
  3.6.9 release.

  python3-stdlib-extensions also updates the modules to the 3.6.9
  release for Python 3.6.

  Acceptance Criteria: The package builds, and the test suite doesn't
  show regressions. The test suite passes in the autopkg tests. The new
  packages don't cause regressions in a test rebuild of the main
  component.

  TODO: update after test rebuild
  
https://people.canonical.com/~doko/ftbfs-report/test-rebuild-20191018-release-bionic.html
 
  
https://people.canonical.com/~doko/ftbfs-report/test-rebuild-20191018-release-tst-bionic.html

  The test rebuilds are finished, and don't show any regressions for the
  main component.

  Regression Potential: Python 3.7 isn't used by default, so we don't have many 
default users.
  Regression Potential: Python 3.6 could see some regressions, although we are 
trying to minimize the risk by doing the test rebuild.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python3-defaults/+bug/1835738/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1849785] Re: FTBFS on i386/ppc64/s390x (Eoan+Focal)

2019-11-06 Thread Christian Ehrhardt 
Offline build worked much better with these, but I still see some arches
fail (see PPA)

PPA: https://launchpad.net/~paelzer/+archive/ubuntu/bug-1849785
-libseccomp-ftbfs/+packages

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libseccomp in Ubuntu.
https://bugs.launchpad.net/bugs/1849785

Title:
  FTBFS on i386/ppc64/s390x (Eoan+Focal)

Status in libseccomp:
  Fix Released
Status in libseccomp package in Ubuntu:
  Triaged
Status in libseccomp source package in Eoan:
  Triaged

Bug description:
  Due to the python 3.8 transition in focal this was rebuilt but fails atm.
  => 
https://launchpadlibrarian.net/448119198/buildlog_ubuntu-focal-s390x.libseccomp_2.4.1-0ubuntu0.19.10.4_BUILDING.txt.gz

  The simulations fail in this case:
   batch name: 36-sim-ipc_syscalls
   test mode:  c
   test type:  bpf-sim
  Test 36-sim-ipc_syscalls%%001-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%002-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%003-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%004-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%005-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%006-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%007-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%008-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%009-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%010-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%011-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%012-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%013-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%014-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%015-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%016-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%017-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%018-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%019-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%020-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%021-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%022-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%023-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%024-1 result:   ERROR 36-sim-ipc_syscalls rc=14
   test mode:  c
   test type:  bpf-valgrind
  Test 36-sim-ipc_syscalls%%025-1 result:   FAILURE 36-sim-ipc_syscalls 
rc=14
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390

  
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%001-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%002-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%003-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%004-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%005-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%006-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%007-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%008-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%009-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%010-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%011-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%012-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test mode:  c
   test type:  bpf-valgrind
  Test 37-sim-ipc_syscalls_be%%013-1 result:   FAILURE 
37-sim-ipc_syscalls_be rc=14

  
  It is always the s390x test - even when running on i386/ppc64
  On x86_64 this test succeeds:

  Test 36-sim-ipc_syscalls%%025-1 result:   SUCCESS
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390

To manage notifications about this bug go to:
https://bugs.launchpad.net/libseccomp/+bug/1849785/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : 

[Touch-packages] [Bug 1850804] Re: Tab completion warnings with ubuntu-bug

2019-11-06 Thread Alistair Cunningham
# ls -l /usr/share/apport/symptoms/ubuntu-release-upgrader.py
-rw-r--r-- 1 root root 214 May 17 16:32 
/usr/share/apport/symptoms/ubuntu-release-upgrader.py

# dpkg -S /usr/share/apport/symptoms/ubuntu-release-upgrader.py
apport-symptoms: /usr/share/apport/symptoms/ubuntu-release-upgrader.py

# debsums apport-symptoms
/usr/share/apport/symptoms/_audio_checks.py   OK
/usr/share/apport/symptoms/_audio_data.py OK
/usr/share/apport/symptoms/_audio_mixercontrol.py OK
/usr/share/apport/symptoms/audio.py   OK
/usr/share/apport/symptoms/display.py OK
/usr/share/apport/symptoms/security.pyOK
/usr/share/apport/symptoms/storage.py OK
/usr/share/apport/symptoms/ubuntu-release-upgrader.py OK
/usr/share/doc/apport-symptoms/changelog.gz   OK
/usr/share/doc/apport-symptoms/copyright  OK

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1850804

Title:
  Tab completion warnings with ubuntu-bug

Status in apport package in Ubuntu:
  New

Bug description:
  When running ubuntu-bug on the command line, and tab completing the
  package name, the following warnings are printed:

  /usr/share/apport/symptoms/dist-upgrade.py: No such file or directory
  grep: /usr/share/apport/symptoms/release-upgrade.py: No such file or directory

  ProblemType: Bug
  DistroRelease: Ubuntu 19.10
  Package: apport 2.20.11-0ubuntu8.1
  ProcVersionSignature: Ubuntu 5.3.0-19.20-generic 5.3.1
  Uname: Linux 5.3.0-19-generic x86_64
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
  ApportLog:
   
  ApportVersion: 2.20.11-0ubuntu8.1
  Architecture: amd64
  CurrentDesktop: Unity:Unity7:ubuntu
  Date: Thu Oct 31 10:54:43 2019
  InstallationDate: Installed on 2017-08-16 (805 days ago)
  InstallationMedia: Ubuntu 17.04 "Zesty Zapus" - Release amd64 (20170412)
  PackageArchitecture: all
  SourcePackage: apport
  UpgradeStatus: Upgraded to eoan on 2019-10-04 (26 days ago)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1850804/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1849785] Re: FTBFS on i386/ppc64/s390x (Eoan+Focal)

2019-11-06 Thread Christian Ehrhardt 
Well the answer to the new fails is that we are now "too new" in my
tests I used kernel 5.3 and this is what Focal has. But the final fix
used 5.4-rc levels which brought in all the time64 things.

linux-libc-dev:amd64  5.3.0-21.22

5.3 already has the NR definitions like
/usr/include/x86_64-linux-gnu/bits/syscall.h:182:#ifdef __NR_clock_gettime64

But the updated seccomp code added things like:
src/arch-mips64-syscalls.c
 626 +»··{ "clock_settime64", __PNR_clock_settime64 },  
  

Usually there are compat defines inside seccomp include/seccomp.h
But the timers are not there.

So without the timers defined => tests fail re-resolving those
with them defined => build fails missing some other part of the definition.

What we overall need seems instead to be the slightly bigger set of:
44113f30 arch: add support for io-uring related system calls in kernel 5.1
0db8babb api: stop defining __NR_x values for syscalls that don't exist
80177ff2 build: ship seccomp-syscalls.h
be65b26b arch: update the internal syscall tables to Linux v5.4-rc4

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libseccomp in Ubuntu.
https://bugs.launchpad.net/bugs/1849785

Title:
  FTBFS on i386/ppc64/s390x (Eoan+Focal)

Status in libseccomp:
  Fix Released
Status in libseccomp package in Ubuntu:
  Triaged
Status in libseccomp source package in Eoan:
  Triaged

Bug description:
  Due to the python 3.8 transition in focal this was rebuilt but fails atm.
  => 
https://launchpadlibrarian.net/448119198/buildlog_ubuntu-focal-s390x.libseccomp_2.4.1-0ubuntu0.19.10.4_BUILDING.txt.gz

  The simulations fail in this case:
   batch name: 36-sim-ipc_syscalls
   test mode:  c
   test type:  bpf-sim
  Test 36-sim-ipc_syscalls%%001-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%002-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%003-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%004-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%005-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%006-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%007-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%008-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%009-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%010-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%011-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%012-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%013-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%014-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%015-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%016-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%017-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%018-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%019-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%020-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%021-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%022-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%023-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%024-1 result:   ERROR 36-sim-ipc_syscalls rc=14
   test mode:  c
   test type:  bpf-valgrind
  Test 36-sim-ipc_syscalls%%025-1 result:   FAILURE 36-sim-ipc_syscalls 
rc=14
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390

  
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%001-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%002-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%003-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%004-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%005-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%006-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%007-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%008-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%009-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
 

[Touch-packages] [Bug 1851504] Re: encrypted root fails to cryptsetup on disco

2019-11-06 Thread Klaus Rennecke
+source:
https://git.launchpad.net/ubuntu/+source/cryptsetup/tree/debian/initramfs/hooks/cryptroot?id=applied/2%252.1.0-6#n414

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1851504

Title:
  encrypted root fails to cryptsetup on disco

Status in cryptsetup:
  New
Status in initramfs-tools package in Ubuntu:
  New

Bug description:
  There is a subtle error message during update-initramfs:

  find: '': No such file or directory

  I could trace this to /usr/share/initramfs-tools/hooks/cryptroot line
  430:

  # libargon2 uses pthread_cancel
  LIBC_DIR="$(ldd /sbin/cryptsetup | sed -nr 's#.* => 
(/lib.*)/libc\.so\.[0-9.-]+ \(0x[[:xdigit:]]+\)$#\1#p')"
  >   find -L "$LIBC_DIR" -maxdepth 1 -name 'libgcc_s.*' -type f | while read 
so; do
  copy_exec "$so"
  done

  ldd output shows:

  libc.so.6 => /usr/lib/x86_64-linux-gnu/libc.so.6
  (0x7f41aa8c4000)

  so the library is not in /lib anymore but /usr/lib

  The root cause of this may be an update to libc, however the script
  may need adjusting anyway.

  cat /etc/lsb-release
  DISTRIB_ID=Ubuntu
  DISTRIB_RELEASE=19.04
  DISTRIB_CODENAME=disco
  DISTRIB_DESCRIPTION="Ubuntu 19.04"

To manage notifications about this bug go to:
https://bugs.launchpad.net/cryptsetup/+bug/1851504/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1830408] Re: [nouveau][XFCE] Do not see login screen after screen is blanked

2019-11-06 Thread crysman
Please, any new findings/new info? It is very annoying! :/ and got
worse. I must go to TTY1 and `killall light-locker` in order to be able
to use computer again...

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1830408

Title:
  [nouveau][XFCE] Do not see login screen after screen is blanked

Status in lightdm package in Ubuntu:
  New

Bug description:
  I've just upgraded to 18.10 from 18.04. Now when power manager (or
  whoever) puts the screen to blank, I cannot login, because I do not
  see anything. Befeore the upgrade, mouse move or keypress led to login
  screen. Now does not.

  Workaround:
  When I go to terminal on tty1 and then back CTRL+ALT+F7, login screen appears.

  Where is the problem and how to fix it please?

  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: xorg 1:7.7+19ubuntu8
  ProcVersionSignature: Ubuntu 4.18.0-20.21-generic 4.18.20
  Uname: Linux 4.18.0-20-generic x86_64
  ApportVersion: 2.20.10-0ubuntu13.3
  Architecture: amd64
  BootLog: Error: [Errno 13] Permission denied: '/var/log/boot.log'
  CompizPlugins: No value set for 
`/apps/compiz-1/general/screen0/options/active_plugins'
  CompositorRunning: None
  CurrentDesktop: XFCE
  Date: Fri May 24 17:59:31 2019
  DistUpgraded: 2019-05-24 13:40:45,847 ERROR got error from PostInstallScript 
./xorg_fix_proprietary.py (g-exec-error-quark: Failed to execute child process 
“./xorg_fix_proprietary.py” (No such file or directory) (8))
  DistroCodename: cosmic
  DistroVariant: ubuntu
  ExtraDebuggingInterest: Yes
  GraphicsCard:
   Intel Corporation 2nd Generation Core Processor Family Integrated Graphics 
Controller [8086:0116] (rev 09) (prog-if 00 [VGA controller])
 Subsystem: ASUSTeK Computer Inc. 2nd Generation Core Processor Family 
Integrated Graphics Controller [1043:1682]
   NVIDIA Corporation GF119M [GeForce GT 520M] [10de:1050] (rev a1) (prog-if 00 
[VGA controller])
 Subsystem: ASUSTeK Computer Inc. GF119M [GeForce GT 520M] [1043:1682]
  InstallationDate: Installed on 2018-09-03 (263 days ago)
  InstallationMedia: Xubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 
(20180725)
  MachineType: ASUSTeK Computer Inc. U36SD
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-4.18.0-20-generic 
root=UUID=aa87c0a2-5b06-40fb-82dd-fbccd7c800e6 ro quiet splash vt.handoff=1
  SourcePackage: xorg
  Symptom: display
  UpgradeStatus: Upgraded to cosmic on 2019-05-24 (0 days ago)
  dmi.bios.date: 07/12/2011
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: U36SD.205
  dmi.board.asset.tag: ATN12345678901234567
  dmi.board.name: U36SD
  dmi.board.vendor: ASUSTeK Computer Inc.
  dmi.board.version: 1.0
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: ASUSTeK Computer Inc.
  dmi.chassis.version: 1.0
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrU36SD.205:bd07/12/2011:svnASUSTeKComputerInc.:pnU36SD:pvr1.0:rvnASUSTeKComputerInc.:rnU36SD:rvr1.0:cvnASUSTeKComputerInc.:ct10:cvr1.0:
  dmi.product.family: U
  dmi.product.name: U36SD
  dmi.product.version: 1.0
  dmi.sys.vendor: ASUSTeK Computer Inc.
  version.compiz: compiz N/A
  version.libdrm2: libdrm2 2.4.95-1
  version.libgl1-mesa-dri: libgl1-mesa-dri 18.2.8-0ubuntu0~18.10.2
  version.libgl1-mesa-glx: libgl1-mesa-glx 18.2.8-0ubuntu0~18.10.2
  version.xserver-xorg-core: xserver-xorg-core 2:1.20.1-3ubuntu2.1
  version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
  version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:18.1.0-1
  version.xserver-xorg-video-intel: xserver-xorg-video-intel 
2:2.99.917+git20171229-1ubuntu1
  version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 1:1.0.15-3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lightdm/+bug/1830408/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1830408] Re: [nouveau][XFCE] Do not see login screen after screen is blanked

2019-11-06 Thread crysman
PS: turning the computer off performs normally, there is no delay any
more

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1830408

Title:
  [nouveau][XFCE] Do not see login screen after screen is blanked

Status in lightdm package in Ubuntu:
  New

Bug description:
  I've just upgraded to 18.10 from 18.04. Now when power manager (or
  whoever) puts the screen to blank, I cannot login, because I do not
  see anything. Befeore the upgrade, mouse move or keypress led to login
  screen. Now does not.

  Workaround:
  When I go to terminal on tty1 and then back CTRL+ALT+F7, login screen appears.

  Where is the problem and how to fix it please?

  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: xorg 1:7.7+19ubuntu8
  ProcVersionSignature: Ubuntu 4.18.0-20.21-generic 4.18.20
  Uname: Linux 4.18.0-20-generic x86_64
  ApportVersion: 2.20.10-0ubuntu13.3
  Architecture: amd64
  BootLog: Error: [Errno 13] Permission denied: '/var/log/boot.log'
  CompizPlugins: No value set for 
`/apps/compiz-1/general/screen0/options/active_plugins'
  CompositorRunning: None
  CurrentDesktop: XFCE
  Date: Fri May 24 17:59:31 2019
  DistUpgraded: 2019-05-24 13:40:45,847 ERROR got error from PostInstallScript 
./xorg_fix_proprietary.py (g-exec-error-quark: Failed to execute child process 
“./xorg_fix_proprietary.py” (No such file or directory) (8))
  DistroCodename: cosmic
  DistroVariant: ubuntu
  ExtraDebuggingInterest: Yes
  GraphicsCard:
   Intel Corporation 2nd Generation Core Processor Family Integrated Graphics 
Controller [8086:0116] (rev 09) (prog-if 00 [VGA controller])
 Subsystem: ASUSTeK Computer Inc. 2nd Generation Core Processor Family 
Integrated Graphics Controller [1043:1682]
   NVIDIA Corporation GF119M [GeForce GT 520M] [10de:1050] (rev a1) (prog-if 00 
[VGA controller])
 Subsystem: ASUSTeK Computer Inc. GF119M [GeForce GT 520M] [1043:1682]
  InstallationDate: Installed on 2018-09-03 (263 days ago)
  InstallationMedia: Xubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 
(20180725)
  MachineType: ASUSTeK Computer Inc. U36SD
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-4.18.0-20-generic 
root=UUID=aa87c0a2-5b06-40fb-82dd-fbccd7c800e6 ro quiet splash vt.handoff=1
  SourcePackage: xorg
  Symptom: display
  UpgradeStatus: Upgraded to cosmic on 2019-05-24 (0 days ago)
  dmi.bios.date: 07/12/2011
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: U36SD.205
  dmi.board.asset.tag: ATN12345678901234567
  dmi.board.name: U36SD
  dmi.board.vendor: ASUSTeK Computer Inc.
  dmi.board.version: 1.0
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: ASUSTeK Computer Inc.
  dmi.chassis.version: 1.0
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrU36SD.205:bd07/12/2011:svnASUSTeKComputerInc.:pnU36SD:pvr1.0:rvnASUSTeKComputerInc.:rnU36SD:rvr1.0:cvnASUSTeKComputerInc.:ct10:cvr1.0:
  dmi.product.family: U
  dmi.product.name: U36SD
  dmi.product.version: 1.0
  dmi.sys.vendor: ASUSTeK Computer Inc.
  version.compiz: compiz N/A
  version.libdrm2: libdrm2 2.4.95-1
  version.libgl1-mesa-dri: libgl1-mesa-dri 18.2.8-0ubuntu0~18.10.2
  version.libgl1-mesa-glx: libgl1-mesa-glx 18.2.8-0ubuntu0~18.10.2
  version.xserver-xorg-core: xserver-xorg-core 2:1.20.1-3ubuntu2.1
  version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
  version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:18.1.0-1
  version.xserver-xorg-video-intel: xserver-xorg-video-intel 
2:2.99.917+git20171229-1ubuntu1
  version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 1:1.0.15-3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lightdm/+bug/1830408/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1851504] Re: encrypted root fails to cryptsetup on disco

2019-11-06 Thread Klaus Rennecke
** Also affects: cryptsetup
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1851504

Title:
  encrypted root fails to cryptsetup on disco

Status in cryptsetup:
  New
Status in initramfs-tools package in Ubuntu:
  New

Bug description:
  There is a subtle error message during update-initramfs:

  find: '': No such file or directory

  I could trace this to /usr/share/initramfs-tools/hooks/cryptroot line
  430:

  # libargon2 uses pthread_cancel
  LIBC_DIR="$(ldd /sbin/cryptsetup | sed -nr 's#.* => 
(/lib.*)/libc\.so\.[0-9.-]+ \(0x[[:xdigit:]]+\)$#\1#p')"
  >   find -L "$LIBC_DIR" -maxdepth 1 -name 'libgcc_s.*' -type f | while read 
so; do
  copy_exec "$so"
  done

  ldd output shows:

  libc.so.6 => /usr/lib/x86_64-linux-gnu/libc.so.6
  (0x7f41aa8c4000)

  so the library is not in /lib anymore but /usr/lib

  The root cause of this may be an update to libc, however the script
  may need adjusting anyway.

  cat /etc/lsb-release
  DISTRIB_ID=Ubuntu
  DISTRIB_RELEASE=19.04
  DISTRIB_CODENAME=disco
  DISTRIB_DESCRIPTION="Ubuntu 19.04"

To manage notifications about this bug go to:
https://bugs.launchpad.net/cryptsetup/+bug/1851504/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1851504] Re: encrypted root fails to cryptsetup on disco

2019-11-06 Thread Klaus Rennecke
WORKAROUND: Change line 429 to read:

# libargon2 uses pthread_cancel
LIBC_DIR="$(ldd /sbin/cryptsetup | sed -nr 's#.* => 
(/.*)/libc\.so\.[0-9.-]+ \(0x[[:xdigit:]]+\)$#\1#p')"
find -L "$LIBC_DIR" -maxdepth 1 -name 'libgcc_s.*' -type f | while read so; 
do
copy_exec "$so"
done

This changes the first regexp group from "(/lib.*)" to "(/.*)" allowing
/usr/lib.* as well.

After running

update-initramfs -v -k 5.0.0-32-generic -c

cryptsetup succeeds in mounting the encrypted root.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1851504

Title:
  encrypted root fails to cryptsetup on disco

Status in initramfs-tools package in Ubuntu:
  New

Bug description:
  There is a subtle error message during update-initramfs:

  find: '': No such file or directory

  I could trace this to /usr/share/initramfs-tools/hooks/cryptroot line
  430:

  # libargon2 uses pthread_cancel
  LIBC_DIR="$(ldd /sbin/cryptsetup | sed -nr 's#.* => 
(/lib.*)/libc\.so\.[0-9.-]+ \(0x[[:xdigit:]]+\)$#\1#p')"
  >   find -L "$LIBC_DIR" -maxdepth 1 -name 'libgcc_s.*' -type f | while read 
so; do
  copy_exec "$so"
  done

  ldd output shows:

  libc.so.6 => /usr/lib/x86_64-linux-gnu/libc.so.6
  (0x7f41aa8c4000)

  so the library is not in /lib anymore but /usr/lib

  The root cause of this may be an update to libc, however the script
  may need adjusting anyway.

  cat /etc/lsb-release
  DISTRIB_ID=Ubuntu
  DISTRIB_RELEASE=19.04
  DISTRIB_CODENAME=disco
  DISTRIB_DESCRIPTION="Ubuntu 19.04"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1851504/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1851504] [NEW] encrypted root fails to cryptsetup on disco

2019-11-06 Thread Klaus Rennecke
Public bug reported:

There is a subtle error message during update-initramfs:

find: '': No such file or directory

I could trace this to /usr/share/initramfs-tools/hooks/cryptroot line
430:

# libargon2 uses pthread_cancel
LIBC_DIR="$(ldd /sbin/cryptsetup | sed -nr 's#.* => 
(/lib.*)/libc\.so\.[0-9.-]+ \(0x[[:xdigit:]]+\)$#\1#p')"
>   find -L "$LIBC_DIR" -maxdepth 1 -name 'libgcc_s.*' -type f | while read so; 
> do
copy_exec "$so"
done

ldd output shows:

libc.so.6 => /usr/lib/x86_64-linux-gnu/libc.so.6
(0x7f41aa8c4000)

so the library is not in /lib anymore but /usr/lib

The root cause of this may be an update to libc, however the script may
need adjusting anyway.

cat /etc/lsb-release
DISTRIB_ID=Ubuntu
DISTRIB_RELEASE=19.04
DISTRIB_CODENAME=disco
DISTRIB_DESCRIPTION="Ubuntu 19.04"

** Affects: initramfs-tools (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1851504

Title:
  encrypted root fails to cryptsetup on disco

Status in initramfs-tools package in Ubuntu:
  New

Bug description:
  There is a subtle error message during update-initramfs:

  find: '': No such file or directory

  I could trace this to /usr/share/initramfs-tools/hooks/cryptroot line
  430:

  # libargon2 uses pthread_cancel
  LIBC_DIR="$(ldd /sbin/cryptsetup | sed -nr 's#.* => 
(/lib.*)/libc\.so\.[0-9.-]+ \(0x[[:xdigit:]]+\)$#\1#p')"
  >   find -L "$LIBC_DIR" -maxdepth 1 -name 'libgcc_s.*' -type f | while read 
so; do
  copy_exec "$so"
  done

  ldd output shows:

  libc.so.6 => /usr/lib/x86_64-linux-gnu/libc.so.6
  (0x7f41aa8c4000)

  so the library is not in /lib anymore but /usr/lib

  The root cause of this may be an update to libc, however the script
  may need adjusting anyway.

  cat /etc/lsb-release
  DISTRIB_ID=Ubuntu
  DISTRIB_RELEASE=19.04
  DISTRIB_CODENAME=disco
  DISTRIB_DESCRIPTION="Ubuntu 19.04"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1851504/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1849785] Re: FTBFS on i386/ppc64/s390x (Eoan+Focal)

2019-11-06 Thread Christian Ehrhardt 
I have tried quickly to just backport [1] but it still fails in a full cross 
arch PPA build
OTOH adding those worked in the sbuild env when modifying things manually.
There must be more to it.

[1]:
https://github.com/seccomp/libseccomp/commit/be65b26b67099be2b2b4890d736dbd1ad15adf36

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libseccomp in Ubuntu.
https://bugs.launchpad.net/bugs/1849785

Title:
  FTBFS on i386/ppc64/s390x (Eoan+Focal)

Status in libseccomp:
  Fix Released
Status in libseccomp package in Ubuntu:
  Triaged
Status in libseccomp source package in Eoan:
  Triaged

Bug description:
  Due to the python 3.8 transition in focal this was rebuilt but fails atm.
  => 
https://launchpadlibrarian.net/448119198/buildlog_ubuntu-focal-s390x.libseccomp_2.4.1-0ubuntu0.19.10.4_BUILDING.txt.gz

  The simulations fail in this case:
   batch name: 36-sim-ipc_syscalls
   test mode:  c
   test type:  bpf-sim
  Test 36-sim-ipc_syscalls%%001-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%002-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%003-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%004-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%005-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%006-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%007-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%008-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%009-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%010-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%011-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%012-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%013-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%014-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%015-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%016-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%017-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%018-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%019-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%020-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%021-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%022-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%023-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%024-1 result:   ERROR 36-sim-ipc_syscalls rc=14
   test mode:  c
   test type:  bpf-valgrind
  Test 36-sim-ipc_syscalls%%025-1 result:   FAILURE 36-sim-ipc_syscalls 
rc=14
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390

  
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%001-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%002-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%003-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%004-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%005-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%006-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%007-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%008-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%009-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%010-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%011-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%012-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test mode:  c
   test type:  bpf-valgrind
  Test 37-sim-ipc_syscalls_be%%013-1 result:   FAILURE 
37-sim-ipc_syscalls_be rc=14

  
  It is always the s390x test - even when running on i386/ppc64
  On x86_64 this test succeeds:

  Test 36-sim-ipc_syscalls%%025-1 result:   SUCCESS
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390

To manage notifications about this bug go to:

[Touch-packages] [Bug 1849785] Re: FTBFS on i386/ppc64/s390x (Eoan+Focal)

2019-11-06 Thread Christian Ehrhardt 
Oh it now became a real build issue (not on unit tests) by breaking very early 
with things like:
arch-x86_64-syscalls.c:63:27: error: ‘__PNR_clock_getres_time64’ undeclared 
here (not in a function)
   63 |  { "clock_getres_time64", __PNR_clock_getres_time64 },

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libseccomp in Ubuntu.
https://bugs.launchpad.net/bugs/1849785

Title:
  FTBFS on i386/ppc64/s390x (Eoan+Focal)

Status in libseccomp:
  Fix Released
Status in libseccomp package in Ubuntu:
  Triaged
Status in libseccomp source package in Eoan:
  Triaged

Bug description:
  Due to the python 3.8 transition in focal this was rebuilt but fails atm.
  => 
https://launchpadlibrarian.net/448119198/buildlog_ubuntu-focal-s390x.libseccomp_2.4.1-0ubuntu0.19.10.4_BUILDING.txt.gz

  The simulations fail in this case:
   batch name: 36-sim-ipc_syscalls
   test mode:  c
   test type:  bpf-sim
  Test 36-sim-ipc_syscalls%%001-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%002-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%003-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%004-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%005-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%006-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%007-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%008-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%009-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%010-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%011-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%012-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%013-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%014-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%015-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%016-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%017-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%018-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%019-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%020-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%021-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%022-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%023-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%024-1 result:   ERROR 36-sim-ipc_syscalls rc=14
   test mode:  c
   test type:  bpf-valgrind
  Test 36-sim-ipc_syscalls%%025-1 result:   FAILURE 36-sim-ipc_syscalls 
rc=14
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390

  
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%001-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%002-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%003-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%004-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%005-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%006-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%007-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%008-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%009-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%010-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%011-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%012-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test mode:  c
   test type:  bpf-valgrind
  Test 37-sim-ipc_syscalls_be%%013-1 result:   FAILURE 
37-sim-ipc_syscalls_be rc=14

  
  It is always the s390x test - even when running on i386/ppc64
  On x86_64 this test succeeds:

  Test 36-sim-ipc_syscalls%%025-1 result:   SUCCESS
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390

To manage notifications about this bug go to:
https://bugs.launchpad.net/libseccomp/+bug/1849785/+subscriptions

-- 
Mailing 

[Touch-packages] [Bug 1851407] Re: NetworkManager 1.10.6-2ubuntu1.2 breaks VPN DNS

2019-11-06 Thread Dariusz Gadomski
Joe, thanks for reporting the bug.
I am unable to reproduce the issue in my test env.

Can you please provide a step-by-step procedure to reproduce it on a
clean 18.04 installation?

Thanks.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/1851407

Title:
  NetworkManager 1.10.6-2ubuntu1.2 breaks VPN DNS

Status in network-manager package in Ubuntu:
  Confirmed

Bug description:
  NetworkManager as of 1.10.6-2ubuntu1.2 has cause a regression whereby
  a VPN connection which sets it's dns-priority to a negative value,
  which should cause the DNS server supplied by the DNS connection to be
  placed first, instead now refuses to place the DNS server into the
  resolver under any circumstance.

  Pinning the 1.10.6-2ubuntu1.1 works around the issue.

  I suspect the fix-dns-leak-lp1754671.patch has caused this regression.

  This patch should be reverted as soon as possible to restore proper
  functionality of network manager with respect to VPN servers with DNS
  resolvers.

  $ lsb_release -rd
  Description:  Ubuntu 18.04.3 LTS
  Release:  18.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/1851407/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1849785] Re: FTBFS on i386/ppc64/s390x (Eoan+Focal)

2019-11-06 Thread Launchpad Bug Tracker
** Merge proposal linked:
   
https://code.launchpad.net/~paelzer/ubuntu/+source/libseccomp/+git/libseccomp/+merge/375205

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libseccomp in Ubuntu.
https://bugs.launchpad.net/bugs/1849785

Title:
  FTBFS on i386/ppc64/s390x (Eoan+Focal)

Status in libseccomp:
  Fix Released
Status in libseccomp package in Ubuntu:
  Triaged
Status in libseccomp source package in Eoan:
  Triaged

Bug description:
  Due to the python 3.8 transition in focal this was rebuilt but fails atm.
  => 
https://launchpadlibrarian.net/448119198/buildlog_ubuntu-focal-s390x.libseccomp_2.4.1-0ubuntu0.19.10.4_BUILDING.txt.gz

  The simulations fail in this case:
   batch name: 36-sim-ipc_syscalls
   test mode:  c
   test type:  bpf-sim
  Test 36-sim-ipc_syscalls%%001-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%002-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%003-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%004-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%005-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%006-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%007-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%008-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%009-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%010-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%011-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%012-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%013-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%014-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%015-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%016-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%017-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%018-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%019-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%020-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%021-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%022-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%023-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%024-1 result:   ERROR 36-sim-ipc_syscalls rc=14
   test mode:  c
   test type:  bpf-valgrind
  Test 36-sim-ipc_syscalls%%025-1 result:   FAILURE 36-sim-ipc_syscalls 
rc=14
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390

  
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%001-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%002-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%003-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%004-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%005-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%006-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%007-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%008-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%009-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%010-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%011-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%012-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test mode:  c
   test type:  bpf-valgrind
  Test 37-sim-ipc_syscalls_be%%013-1 result:   FAILURE 
37-sim-ipc_syscalls_be rc=14

  
  It is always the s390x test - even when running on i386/ppc64
  On x86_64 this test succeeds:

  Test 36-sim-ipc_syscalls%%025-1 result:   SUCCESS
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390

To manage notifications about this bug go to:
https://bugs.launchpad.net/libseccomp/+bug/1849785/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : 

[Touch-packages] [Bug 1850887] Re: Audio / Sound reverts to HDMI when power event occurs

2019-11-06 Thread Sebastien Bacher
Unsure the system has enough information from the hardware to tell
appart a disconnect from a power off, there is no mechanical check that
something is plugged in the port, it's just depending on whether a
signal is received. That said it looks like a duplicate of #1847570

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pulseaudio in Ubuntu.
https://bugs.launchpad.net/bugs/1850887

Title:
  Audio / Sound reverts to HDMI when power event occurs

Status in pulseaudio package in Ubuntu:
  Confirmed

Bug description:
  PulseAudio reverts the sound to HDMI all the time when a HDMI related
  power event occurs. That means, although I have set another USB sound
  device plugged in and set as default under sound settings, when an
  application like Kodi or the system shuts off the HDMI monitor and I
  reactivate the monitor, the sound is set to HDMI output again and
  again.

  That probably has to do with the fix to the reported Bug # 1711101 and
  definitely not happened at Ubuntu 19.04. I switched to Ubuntu 19.10
  two days ago.

  Setting the USB device as default does not help, even when done by
  PulseAudio mixer (gui) and removing HDMI output from the alternatives
  option.

  Expected behavior:
  PulseAudio keeps the sound setting to the selected device

  Actual behavior: 
  PulseAudio changes to HDMI at every HDMI power event

  Annoying manual workaround:
  Setting the desired Audio option on the control panel after every HDMI power 
event again

  ProblemType: Bug
  DistroRelease: Ubuntu 19.10
  Component: pulseaudio
  Version: 1:13.0-1ubuntu1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pulseaudio/+bug/1850887/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1850804] Re: Tab completion warnings with ubuntu-bug

2019-11-06 Thread Sebastien Bacher
What about
-ls -l /usr/share/apport/symptoms/ubuntu-release-upgrader.py
-dpkg -S /usr/share/apport/symptoms/ubuntu-release-upgrader.py
-debsums apport-symptoms

The file should be there...

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1850804

Title:
  Tab completion warnings with ubuntu-bug

Status in apport package in Ubuntu:
  New

Bug description:
  When running ubuntu-bug on the command line, and tab completing the
  package name, the following warnings are printed:

  /usr/share/apport/symptoms/dist-upgrade.py: No such file or directory
  grep: /usr/share/apport/symptoms/release-upgrade.py: No such file or directory

  ProblemType: Bug
  DistroRelease: Ubuntu 19.10
  Package: apport 2.20.11-0ubuntu8.1
  ProcVersionSignature: Ubuntu 5.3.0-19.20-generic 5.3.1
  Uname: Linux 5.3.0-19-generic x86_64
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
  ApportLog:
   
  ApportVersion: 2.20.11-0ubuntu8.1
  Architecture: amd64
  CurrentDesktop: Unity:Unity7:ubuntu
  Date: Thu Oct 31 10:54:43 2019
  InstallationDate: Installed on 2017-08-16 (805 days ago)
  InstallationMedia: Ubuntu 17.04 "Zesty Zapus" - Release amd64 (20170412)
  PackageArchitecture: all
  SourcePackage: apport
  UpgradeStatus: Upgraded to eoan on 2019-10-04 (26 days ago)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1850804/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1537056] Re: apt-add-repository returns "user or team does not exist." when erroring out due to proxy auth needed

2019-11-06 Thread Sebastien Bacher
** Summary changed:

- apt-add-repository always returns "user or team does not exist." for ppa repos
+ apt-add-repository returns "user or team does not exist." when erroring out 
due to proxy auth needed

** Changed in: software-properties (Ubuntu)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to software-properties in
Ubuntu.
https://bugs.launchpad.net/bugs/1537056

Title:
  apt-add-repository returns "user or team does not exist." when
  erroring out due to proxy auth needed

Status in software-properties package in Ubuntu:
  Confirmed

Bug description:
  I have just installed a fresh Ubuntu 15.10 to my machine and run into
  trouble with adding ppa repositories using apt-add-repository:

  for e.g. running 
  apt-add-repository ppa:git-core/ppa
  Cannot add PPA: 'ppa:~git-core/ubuntu/ppa'.
  ERROR: '~git-core' user or team does not exist.

  After debugging a lot of code, I found the trouble, the used proxy-
  server needs authentification but the apt-add-repository does not
  throw a correct error message fro this case:

  The PPAException raised here seems to be interpreted as not available,
  which is rather hard to debug.

  def _get_https_content_py3(lp_url):
  print("RETRIEVING URL: %s"%lp_url)
  try:
  request = urllib.request.Request(str(lp_url), headers={"Accept":" 
application/json"})
  lp_page = urllib.request.urlopen(request, cafile=LAUNCHPAD_PPA_CERT)
  json_data = lp_page.read().decode("utf-8", "strict")
  print("RV: %s"%str(json_data))
  except (URLError, HTTPException) as e:
  # HTTPException doesn't have a reason but might have a string
  # representation
  print(e)
  reason = hasattr(e, "reason") and e.reason or e
  raise PPAException("Error reading %s: %s" % (lp_url, reason), e)

  The last print(e) gives me the hint what went wrong:
  

  For the future it would be great to get a correct error message.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/software-properties/+bug/1537056/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1851451] Re: Performance is not good system freeze a lot of time

2019-11-06 Thread Sebastien Bacher
seems a disk issue rather than an xorg bug

** Changed in: xorg (Ubuntu)
   Importance: Undecided => Low

** Changed in: xorg (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1851451

Title:
  Performance is not good system freeze a lot of time

Status in xorg package in Ubuntu:
  Invalid

Bug description:
  freeze mouse and keyboard

  ProblemType: Bug
  DistroRelease: Ubuntu 19.10
  Package: xorg 1:7.7+19ubuntu12
  ProcVersionSignature: Ubuntu 5.3.0-19.20-generic 5.3.1
  Uname: Linux 5.3.0-19-generic x86_64
  ApportVersion: 2.20.11-0ubuntu8.2
  Architecture: amd64
  BootLog: Error: [Errno 13] Permission denied: '/var/log/boot.log'
  CompositorRunning: None
  CurrentDesktop: ubuntu:GNOME
  Date: Tue Nov  5 20:46:07 2019
  DistUpgraded: Fresh install
  DistroCodename: eoan
  DistroVariant: ubuntu
  ExtraDebuggingInterest: No
  GraphicsCard:
   Intel Corporation HD Graphics 620 [8086:5916] (rev 02) (prog-if 00 [VGA 
controller])
 Subsystem: Hewlett-Packard Company HD Graphics 620 [103c:81ee]
  InstallationDate: Installed on 2019-11-04 (1 days ago)
  InstallationMedia: Ubuntu 19.10 "Eoan Ermine" - Release amd64 (20191017)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 004: ID 064e:c346 Suyin Corp. HP TrueVision HD
   Bus 001 Device 003: ID 0bda:b008 Realtek Semiconductor Corp. Bluetooth Radio 
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: HP HP Notebook
  ProcEnviron:
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.3.0-19-generic 
root=UUID=bef4cfb0-ebad-44d4-aad1-914b2839dba4 ro quiet splash vt.handoff=7
  SourcePackage: xorg
  Symptom: display
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 10/27/2016
  dmi.bios.vendor: Insyde
  dmi.bios.version: F.21
  dmi.board.asset.tag: Type2 - Board Asset Tag
  dmi.board.name: 81EE
  dmi.board.vendor: HP
  dmi.board.version: 62.36
  dmi.chassis.type: 10
  dmi.chassis.vendor: HP
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnInsyde:bvrF.21:bd10/27/2016:svnHP:pnHPNotebook:pvrType1ProductConfigId:rvnHP:rn81EE:rvr62.36:cvnHP:ct10:cvrChassisVersion:
  dmi.product.family: 103C_5335KV G=N L=CON B=HP
  dmi.product.name: HP Notebook
  dmi.product.sku: 1AP08EA#BH5
  dmi.product.version: Type1ProductConfigId
  dmi.sys.vendor: HP
  version.compiz: compiz N/A
  version.libdrm2: libdrm2 2.4.99-1ubuntu1
  version.libgl1-mesa-dri: libgl1-mesa-dri 19.2.1-1ubuntu1
  version.libgl1-mesa-glx: libgl1-mesa-glx N/A
  version.xserver-xorg-core: xserver-xorg-core 2:1.20.5+git20191008-0ubuntu1
  version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
  version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:19.0.1-1ubuntu1
  version.xserver-xorg-video-intel: xserver-xorg-video-intel 
2:2.99.917+git20190815-1
  version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 1:1.0.16-1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/1851451/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1850762] Re: stub-resolver no longer optional, systemd dns broken

2019-11-06 Thread ts
Dimitri, indeed, my bad.

In other news: it seems that this issue has been known for a while and somebody 
has been (trying to) solv(e|ing) it - I guess the solution will come to Ubuntu 
at some stage...
https://github.com/systemd/systemd/pull/12004

Thanks for the feedback, looking forward to a working version in the
future (not looking forward to increasingly complex interdependencies,
but hey, who am I to complain, I could always start my own distribution
without systemd, I know...)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1850762

Title:
  stub-resolver no longer optional, systemd dns broken

Status in systemd package in Ubuntu:
  Incomplete

Bug description:
  systemd name resolution is broken in professional setups.

  https://askubuntu.com/a/974482 used to provide a solution, simply
  ignore stub-resolution (which is broken) and fall back to the normal
  name resolution as configured (e.g. through dhcp).

  this solution does not seem to be available after upgrading to ubuntu
  19.10 - there is no clean resolv.conf left.

  please advise as to how systemd name resolution through its local
  service can be disabled now (as it is broken).

  Thanks


  $ lsb_release -rd
  Description:  Ubuntu 19.10
  Release:  19.10


  $ apt-cache policy systemd
  systemd:
Installed: 242-7ubuntu3
Candidate: 242-7ubuntu3
Version table:
   *** 242-7ubuntu3 500
  500 http://de.archive.ubuntu.com/ubuntu eoan/main amd64 Packages
  100 /var/lib/dpkg/status


  I expected my computer to resolve names (it used to do so after the
  workaround for the systemd bug)

  It does not resolve all names anymore (and the old workaround doesn't
  work anymore).

  ProblemType: Bug
  DistroRelease: Ubuntu 19.10
  Package: systemd 242-7ubuntu3
  ProcVersionSignature: Ubuntu 5.3.0-19.20-generic 5.3.1
  Uname: Linux 5.3.0-19-generic x86_64
  ApportVersion: 2.20.11-0ubuntu8.1
  Architecture: amd64
  CurrentDesktop: MATE
  Date: Thu Oct 31 10:02:05 2019
  InstallationDate: Installed on 2019-04-10 (203 days ago)
  InstallationMedia: Ubuntu-MATE 19.04 "Disco Dingo" - Alpha amd64 (20190326.1)
  MachineType: LENOVO 20L8S29W00
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.3.0-19-generic 
root=UUID=fddb227e-dc5d-4f78-b605-443eeb5bf5c9 ro quiet splash vt.handoff=7
  SourcePackage: systemd
  UpgradeStatus: Upgraded to eoan on 2019-10-24 (6 days ago)
  dmi.bios.date: 09/13/2018
  dmi.bios.vendor: LENOVO
  dmi.bios.version: N22ET49W (1.26 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 20L8S29W00
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0R32862 WIN
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: None
  dmi.modalias: 
dmi:bvnLENOVO:bvrN22ET49W(1.26):bd09/13/2018:svnLENOVO:pn20L8S29W00:pvrThinkPadT480s:rvnLENOVO:rn20L8S29W00:rvrSDK0R32862WIN:cvnLENOVO:ct10:cvrNone:
  dmi.product.family: ThinkPad T480s
  dmi.product.name: 20L8S29W00
  dmi.product.sku: LENOVO_MT_20L8_BU_Think_FM_ThinkPad T480s
  dmi.product.version: ThinkPad T480s
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1850762/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1843757] Re: protobuf ftbfs in eoan (ppc64el)

2019-11-06 Thread Rion
Ignore the above about 3.10. I tried to compile without optimization.
That's why I didn't notice the problem. So 3.10 is also affected.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to protobuf in Ubuntu.
https://bugs.launchpad.net/bugs/1843757

Title:
  protobuf ftbfs in eoan (ppc64el)

Status in protobuf package in Ubuntu:
  Confirmed

Bug description:
  https://launchpadlibrarian.net/441264543/buildlog_ubuntu-eoan-
  ppc64el.protobuf_3.6.1.3-2_BUILDING.txt.gz

  g++ -DHAVE_CONFIG_H -I. -I..   -Wdate-time -D_FORTIFY_SOURCE=2 -pthread 
-DHAVE_PTHREAD=1 -DHAVE_ZLIB=1 -Wall -Wextra -Werror -Wno-unused-parameter -g 
-O3 -fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat 
-Werror=format-security -c -o google/protobuf/no_warning_test-any_test.pb.o 
`test -f 'google/protobuf/any_test.pb.cc' || echo 
'./'`google/protobuf/any_test.pb.cc
  In file included from /usr/include/string.h:494,
   from ./google/protobuf/stubs/port.h:38,
   from ./google/protobuf/stubs/common.h:46,
   from ./google/protobuf/any_test.pb.h:9,
   from google/protobuf/any_test.pb.cc:4:
  In function ‘void* memset(void*, int, size_t)’,
  inlined from ‘void protobuf_unittest::TestAny::SharedCtor()’ at 
google/protobuf/any_test.pb.cc:163:11,
  inlined from ‘protobuf_unittest::TestAny::TestAny()’ at 
google/protobuf/any_test.pb.cc:145:13,
  inlined from ‘void 
protobuf_google_2fprotobuf_2fany_5ftest_2eproto::InitDefaultsTestAny()’ at 
google/protobuf/any_test.pb.cc:141:1:
  /usr/include/powerpc64le-linux-gnu/bits/string_fortified.h:71:33: error: 
‘void* __builtin_memset(void*, int, long unsigned int)’ offset [49, 52] from 
the object at ‘protobuf_unittest::_TestAny_default_instance_’ is out of the 
bounds of referenced subobject ‘protobuf_unittest::TestAny::any_value_’ with 
type ‘google::protobuf::Any*’ at offset 40 [-Werror=array-bounds]
 71 |   return __builtin___memset_chk (__dest, __ch, __len, __bos0 
(__dest));
|  ~~~^~
  cc1plus: all warnings being treated as errors
  make[4]: *** [Makefile:4468: google/protobuf/no_warning_test-any_test.pb.o] 
Error 1
  make[4]: *** Waiting for unfinished jobs
  In file included from /usr/include/string.h:494,
   from ./google/protobuf/stubs/port.h:38,
   from ./google/protobuf/stubs/common.h:46,
   from ./google/protobuf/unittest_lite.pb.h:9,
   from google/protobuf/unittest_lite.pb.cc:4:
  In function ‘void* memset(void*, int, size_t)’,
  inlined from ‘void 
protobuf_unittest::TestAllTypesLite_NestedMessage::SharedCtor()’ at 
google/protobuf/unittest_lite.pb.cc:792:11,
  inlined from 
‘protobuf_unittest::TestAllTypesLite_NestedMessage::TestAllTypesLite_NestedMessage()’
 at google/protobuf/unittest_lite.pb.cc:777:13,
  inlined from ‘void 
protobuf_google_2fprotobuf_2funittest_5flite_2eproto::InitDefaultsTestAllTypesLite_NestedMessage()’
 at google/protobuf/unittest_lite.pb.cc:773:1:
  /usr/include/powerpc64le-linux-gnu/bits/string_fortified.h:71:33: error: 
‘void* __builtin_memset(void*, int, long unsigned int)’ offset [33, 36] from 
the object at 
‘protobuf_unittest::_TestAllTypesLite_NestedMessage_default_instance_’ is out 
of the bounds of referenced subobject 
‘protobuf_unittest::TestAllTypesLite_NestedMessage::cc_’ with type ‘long int’ 
at offset 24 [-Werror=array-bounds]
 71 |   return __builtin___memset_chk (__dest, __ch, __len, __bos0 
(__dest));
|  ~~~^~
  cc1plus: all warnings being treated as errors
  make[4]: *** [Makefile:4412: 
google/protobuf/no_warning_test-unittest_lite.pb.o] Error 1
  In file included from /usr/include/string.h:494,
   from ./google/protobuf/stubs/port.h:38,
   from ./google/protobuf/stubs/common.h:46,
   from ./google/protobuf/map_lite_unittest.pb.h:9,
   from google/protobuf/map_lite_unittest.pb.cc:4:
  In function ‘void* memset(void*, int, size_t)’,
  inlined from ‘void protobuf_unittest::TestRequiredLite::SharedCtor()’ at 
google/protobuf/map_lite_unittest.pb.cc:6417:11,
  inlined from ‘protobuf_unittest::TestRequiredLite::TestRequiredLite()’ at 
google/protobuf/map_lite_unittest.pb.cc:6394:13,
  inlined from ‘void 
protobuf_google_2fprotobuf_2fmap_5flite_5funittest_2eproto::InitDefaultsTestRequiredLite()’
 at google/protobuf/map_lite_unittest.pb.cc:6390:1:
  /usr/include/powerpc64le-linux-gnu/bits/string_fortified.h:71:33: error: 
‘void* __builtin_memset(void*, int, long unsigned int)’ offset [29, 36] from 
the object at ‘protobuf_unittest::_TestRequiredLite_default_instance_’ is out 
of the bounds of referenced subobject ‘protobuf_unittest::TestRequiredLite::a_’ 
with type ‘int’ at offset 24 

[Touch-packages] [Bug 1843757] Re: protobuf ftbfs in eoan (ppc64el)

2019-11-06 Thread Rion
I have the same protobuf problem with my personal code. 
Generated by protobuf code is definitely not compatible with currently 
installed system headers.
I also tested protobuf-3.10 and it works fine. So I think the protobuf package 
has to be upgraded in the Ubuntu repo.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to protobuf in Ubuntu.
https://bugs.launchpad.net/bugs/1843757

Title:
  protobuf ftbfs in eoan (ppc64el)

Status in protobuf package in Ubuntu:
  Confirmed

Bug description:
  https://launchpadlibrarian.net/441264543/buildlog_ubuntu-eoan-
  ppc64el.protobuf_3.6.1.3-2_BUILDING.txt.gz

  g++ -DHAVE_CONFIG_H -I. -I..   -Wdate-time -D_FORTIFY_SOURCE=2 -pthread 
-DHAVE_PTHREAD=1 -DHAVE_ZLIB=1 -Wall -Wextra -Werror -Wno-unused-parameter -g 
-O3 -fdebug-prefix-map=/<>=. -fstack-protector-strong -Wformat 
-Werror=format-security -c -o google/protobuf/no_warning_test-any_test.pb.o 
`test -f 'google/protobuf/any_test.pb.cc' || echo 
'./'`google/protobuf/any_test.pb.cc
  In file included from /usr/include/string.h:494,
   from ./google/protobuf/stubs/port.h:38,
   from ./google/protobuf/stubs/common.h:46,
   from ./google/protobuf/any_test.pb.h:9,
   from google/protobuf/any_test.pb.cc:4:
  In function ‘void* memset(void*, int, size_t)’,
  inlined from ‘void protobuf_unittest::TestAny::SharedCtor()’ at 
google/protobuf/any_test.pb.cc:163:11,
  inlined from ‘protobuf_unittest::TestAny::TestAny()’ at 
google/protobuf/any_test.pb.cc:145:13,
  inlined from ‘void 
protobuf_google_2fprotobuf_2fany_5ftest_2eproto::InitDefaultsTestAny()’ at 
google/protobuf/any_test.pb.cc:141:1:
  /usr/include/powerpc64le-linux-gnu/bits/string_fortified.h:71:33: error: 
‘void* __builtin_memset(void*, int, long unsigned int)’ offset [49, 52] from 
the object at ‘protobuf_unittest::_TestAny_default_instance_’ is out of the 
bounds of referenced subobject ‘protobuf_unittest::TestAny::any_value_’ with 
type ‘google::protobuf::Any*’ at offset 40 [-Werror=array-bounds]
 71 |   return __builtin___memset_chk (__dest, __ch, __len, __bos0 
(__dest));
|  ~~~^~
  cc1plus: all warnings being treated as errors
  make[4]: *** [Makefile:4468: google/protobuf/no_warning_test-any_test.pb.o] 
Error 1
  make[4]: *** Waiting for unfinished jobs
  In file included from /usr/include/string.h:494,
   from ./google/protobuf/stubs/port.h:38,
   from ./google/protobuf/stubs/common.h:46,
   from ./google/protobuf/unittest_lite.pb.h:9,
   from google/protobuf/unittest_lite.pb.cc:4:
  In function ‘void* memset(void*, int, size_t)’,
  inlined from ‘void 
protobuf_unittest::TestAllTypesLite_NestedMessage::SharedCtor()’ at 
google/protobuf/unittest_lite.pb.cc:792:11,
  inlined from 
‘protobuf_unittest::TestAllTypesLite_NestedMessage::TestAllTypesLite_NestedMessage()’
 at google/protobuf/unittest_lite.pb.cc:777:13,
  inlined from ‘void 
protobuf_google_2fprotobuf_2funittest_5flite_2eproto::InitDefaultsTestAllTypesLite_NestedMessage()’
 at google/protobuf/unittest_lite.pb.cc:773:1:
  /usr/include/powerpc64le-linux-gnu/bits/string_fortified.h:71:33: error: 
‘void* __builtin_memset(void*, int, long unsigned int)’ offset [33, 36] from 
the object at 
‘protobuf_unittest::_TestAllTypesLite_NestedMessage_default_instance_’ is out 
of the bounds of referenced subobject 
‘protobuf_unittest::TestAllTypesLite_NestedMessage::cc_’ with type ‘long int’ 
at offset 24 [-Werror=array-bounds]
 71 |   return __builtin___memset_chk (__dest, __ch, __len, __bos0 
(__dest));
|  ~~~^~
  cc1plus: all warnings being treated as errors
  make[4]: *** [Makefile:4412: 
google/protobuf/no_warning_test-unittest_lite.pb.o] Error 1
  In file included from /usr/include/string.h:494,
   from ./google/protobuf/stubs/port.h:38,
   from ./google/protobuf/stubs/common.h:46,
   from ./google/protobuf/map_lite_unittest.pb.h:9,
   from google/protobuf/map_lite_unittest.pb.cc:4:
  In function ‘void* memset(void*, int, size_t)’,
  inlined from ‘void protobuf_unittest::TestRequiredLite::SharedCtor()’ at 
google/protobuf/map_lite_unittest.pb.cc:6417:11,
  inlined from ‘protobuf_unittest::TestRequiredLite::TestRequiredLite()’ at 
google/protobuf/map_lite_unittest.pb.cc:6394:13,
  inlined from ‘void 
protobuf_google_2fprotobuf_2fmap_5flite_5funittest_2eproto::InitDefaultsTestRequiredLite()’
 at google/protobuf/map_lite_unittest.pb.cc:6390:1:
  /usr/include/powerpc64le-linux-gnu/bits/string_fortified.h:71:33: error: 
‘void* __builtin_memset(void*, int, long unsigned int)’ offset [29, 36] from 
the object at 

[Touch-packages] [Bug 1851453] Re: mir FTBFS in focal, blocks nettle transition

2019-11-06 Thread Michał Sawicz
** Changed in: mir (Ubuntu)
 Assignee: (unassigned) => Chris Halse Rogers (raof)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mir in Ubuntu.
https://bugs.launchpad.net/bugs/1851453

Title:
  mir FTBFS in focal, blocks nettle transition

Status in mir package in Ubuntu:
  New

Bug description:
  a no-change rebuild of mir in focal has failed, for reasons that
  appear unrelated to nettle itself.

  [...]
  [ 61%] Linking CXX shared module ../../lib/client-modules/dummy.so
  cd /<>/build-amd64/tests/mir_test_framework && /usr/bin/cmake -E 
cmake_link_script CMakeFiles/mirclientplatformstub.dir/link.txt --verbose=1
  /usr/bin/c++ -fPIC -g -O2 -fdebug-prefix-map=/<>=. 
-fstack-protector-strong -Wformat -Werror=format-security -Wdate-time 
-D_FORTIFY_SOURCE=2 -pthread -g -std=c++14 -Wall -fno-strict-aliasing -pedantic 
-Wnon-virtual-dtor -Wextra -fPIC -Werror -Wno-psabi -ffat-lto-objects 
-Wno-error=null-dereference -Wno-error=overloaded-virtual -Wno-sign-compare 
-fno-lto -Dregister= 
-Wl,--version-script,/<>/tests/mir_test_framework/symbols-client.map
 -Wl,-Bsymbolic-fu
  nctions -Wl,-z,relro -Wl,-z,now -Wl,--as-needed -fuse-ld=gold 
-Wl,--no-undefined -shared  -o ../../lib/client-modules/dummy.so 
CMakeFiles/mirclientplatformstub.dir/stub_client_platform_module.cpp.o 
-Wl,-rpath,/<>/build-amd64/lib: libmir-test-framework-static.a 
-lumockdev -lgobject-2.0 -lglib-2.0 -lumockdev -lgobject-2.0 -lglib-2.0 
../../lib/libmirserver.so.50 ../../lib/libmirplatform.so.16 
../../lib/libmirwayland.so.0 -lwayland-server 
../../src/platforms/common/server/libserver_platform_common.a 
../../src/platforms/common/server/kms-utils/libkms_utils.a -ldrm -ldrm 
/usr/lib/x86_64-linux-gnu/libEGL.so -lGLESv2 -lGLESv2 -lepoxy -lepoxy -ludev 
-ludev -lgio-2.0 -lgio-2.0 -luuid -luuid -lxcb -lxcb -lxcb-composite 
-lxcb-composite -lxcb-xfixes -lxcb-xfixes -lxcb-render -lxcb-render -lXcursor 
-lXcursor -llttng-ust -ldl -llttng-ust -latomic ../../lib/libmirclient.so.9 
../../lib/libmircommon.so.7 ../../src/capnproto/libmircapnproto.a 
/usr/lib/x86_64-linux-gnu/libcapnp-0.7.0.so 
/usr/lib/x86_64-linux-gnu/libkj-0.7.0.so -lpthread -pthread 
../../lib/libmircore.so.1 -ldl ../../lib/libmirprotobuf.so.3 
/usr/lib/x86_64-linux-gnu/libprotobuf-lite.so ../../lib/libmircookie.so.2 
-lnettle /usr/lib/x86_64-linux-gnu/libxkbcommon.so 
/usr/lib/x86_64-linux-gnu/libboost_date_time.so 
/usr/lib/x86_64-linux-gnu/libboost_system.so 
/usr/lib/x86_64-linux-gnu/libboost_program_options.so 
/usr/lib/x86_64-linux-gnu/libboost_filesystem.so 
/usr/lib/x86_64-linux-gnu/libboost_iostreams.so 
/usr/lib/x86_64-linux-gnu/libboost_regex.so 
/usr/lib/x86_64-linux-gnu/libgtest.a /usr/lib/x86_64-linux-gnu/libgtest_main.a 
/usr/lib/x86_64-linux-gnu/libgtest.a /usr/lib/x86_64-linux-gnu/libgtest_main.a 
../../libGMock.a -lpthread -lgobject-2.0 -lglib-2.0 -lumockdev -lgobject-2.0 
-lglib-2.0 
  /usr/src/gmock/src/gmock.cc:135: error: undefined reference to 
'testing::Message::Message()'
  /usr/src/gmock/src/gmock.cc:135: error: undefined reference to 
'testing::internal::ParseInt32(testing::Message const&, char const*, int*)'
  /usr/src/gmock/src/gmock-internal-utils.cc:181: error: undefined reference to 
'testing::UnitTest::GetInstance()'
  /usr/src/gmock/src/gmock-internal-utils.cc:181: error: undefined reference to 
'testing::internal::GetCurrentOsStackTraceExceptTop[abi:cxx11](testing::UnitTest*,
 int)'
  /usr/include/gtest/internal/gtest-port.h:1651: error: undefined reference to 
'testing::internal::GTestLog::GTestLog(testing::internal::GTestLogSeverity, 
char const*, int)'
  /usr/include/gtest/internal/gtest-port.h:1651: error: undefined reference to 
'testing::internal::GTestLog::~GTestLog()'
  [...]

  (https://launchpad.net/ubuntu/+source/mir/1.4.0-0ubuntu4/+build/18005823)

  This is holding up a mass of intertwined start-of-cycle library
  transitions in focal-proposed right now.  Please fix this asap.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mir/+bug/1851453/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1849785] Re: FTBFS on i386/ppc64/s390x (Eoan+Focal)

2019-11-06 Thread Christian Ehrhardt 
Code is on https://github.com/seccomp/libseccomp/tree/release-2.4 now.
But an official release would need 2.4.2 to be tagged by upstream.

But now fixes can be cherry-picked to fix the FTBFS in E+F

** Tags added: server-next

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libseccomp in Ubuntu.
https://bugs.launchpad.net/bugs/1849785

Title:
  FTBFS on i386/ppc64/s390x (Eoan+Focal)

Status in libseccomp:
  Fix Released
Status in libseccomp package in Ubuntu:
  Triaged
Status in libseccomp source package in Eoan:
  Triaged

Bug description:
  Due to the python 3.8 transition in focal this was rebuilt but fails atm.
  => 
https://launchpadlibrarian.net/448119198/buildlog_ubuntu-focal-s390x.libseccomp_2.4.1-0ubuntu0.19.10.4_BUILDING.txt.gz

  The simulations fail in this case:
   batch name: 36-sim-ipc_syscalls
   test mode:  c
   test type:  bpf-sim
  Test 36-sim-ipc_syscalls%%001-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%002-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%003-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%004-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%005-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%006-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%007-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%008-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%009-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%010-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%011-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%012-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%013-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%014-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%015-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%016-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%017-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%018-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%019-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%020-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%021-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%022-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%023-1 result:   ERROR 36-sim-ipc_syscalls rc=14
  Test 36-sim-ipc_syscalls%%024-1 result:   ERROR 36-sim-ipc_syscalls rc=14
   test mode:  c
   test type:  bpf-valgrind
  Test 36-sim-ipc_syscalls%%025-1 result:   FAILURE 36-sim-ipc_syscalls 
rc=14
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390

  
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%001-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%002-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%003-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%004-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%005-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%006-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%007-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%008-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%009-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%010-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%011-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test arch:  s390
  Test 37-sim-ipc_syscalls_be%%012-1 result:   ERROR 37-sim-ipc_syscalls_be 
rc=14
   test mode:  c
   test type:  bpf-valgrind
  Test 37-sim-ipc_syscalls_be%%013-1 result:   FAILURE 
37-sim-ipc_syscalls_be rc=14

  
  It is always the s390x test - even when running on i386/ppc64
  On x86_64 this test succeeds:

  Test 36-sim-ipc_syscalls%%025-1 result:   SUCCESS
   batch name: 37-sim-ipc_syscalls_be
   test mode:  c
   test type:  bpf-sim
   test arch:  s390

To manage notifications about this bug go to:
https://bugs.launchpad.net/libseccomp/+bug/1849785/+subscriptions

-- 
Mailing list: