[Touch-packages] [Bug 1887210] Re: USB DAC/AMP unselectable from Sound Settings and crashes alsamixer

2021-03-12 Thread postroutine
Any news ?

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to alsa-driver in Ubuntu.
https://bugs.launchpad.net/bugs/1887210

Title:
  USB DAC/AMP unselectable from Sound Settings  and crashes alsamixer

Status in alsa-driver package in Ubuntu:
  Confirmed

Bug description:
  I am experiencing the same issue with the same device described in
  this report comment: https://bugs.launchpad.net/ubuntu/+source/alsa-
  driver/+bug/1267866/comments/26

  The device works as expected with Windows 10 and macOS no drivers
  required. However, the device is not an option from Ubuntu's sound
  settings. It is visible in alsamixer, however, it crashes immediately
  upon selection with 'cannot load mixer controls: Broken pipe'.

  Here's some more debug information. Let me know if there is anymore I
  can provide or feel free to redirect me if there is another place this
  is better reported.

  Device: Schiit Audio Fulla 3 USB DAC/AMP
  Kernel version: 5.4.0-40-generic
  Ubuntu version: 20.04

  Alsa debug output: http://alsa-
  project.org/db/?f=3f494b2155bdde7f5ee0e52240da77468bcb

  `dmesg -w` output upon re-plugging in the device:
  [  895.624302] usb 3-2.3: new high-speed USB device number 8 using xhci_hcd
  [  895.739125] usb 3-2.3: New USB device found, idVendor=30be, 
idProduct=0100, bcdDevice= 1.02
  [  895.739129] usb 3-2.3: New USB device strings: Mfr=1, Product=2, 
SerialNumber=0
  [  895.739131] usb 3-2.3: Product: I'm Fulla Schiit
  [  895.739133] usb 3-2.3: Manufacturer: Schiit Audio
  [  896.076914] input: Schiit Audio I'm Fulla Schiit as 
/devices/pci:00/:00:07.1/:11:00.3/usb3/3-2/3-2.3/3-2.3:1.3/0003:30BE:0100.0007/input/input20
  [  896.136457] hid-generic 0003:30BE:0100.0007: input,hidraw5: USB HID v1.00 
Device [Schiit Audio I'm Fulla Schiit] on usb-:11:00.3-2.3/input3
  [  896.228480] audit: type=1107 audit(1594446870.681:57): pid=1286 uid=105 
auid=4294967295 ses=4294967295 msg='apparmor="DENIED" operation="dbus_signal"  
bus="system" path="/org/freedesktop/NetworkManager" 
interface="org.freedesktop.NetworkManager" member="CheckPermissions" 
name=":1.8" mask="receive" pid=10228 label="snap.spotify.spotify" peer_pid=1287 
peer_label="unconfined"
  exe="/usr/bin/dbus-daemon" sauid=105 hostname=? addr=? 
terminal=?'
  [  896.238190] usb 3-2.3: cannot get ctl value: req = 0x81, wValue = 0x100, 
wIndex = 0x1100, type = 1
  [  896.298659] usb 3-2.3: cannot get ctl value: req = 0x81, wValue = 0x100, 
wIndex = 0x1100, type = 1
  [  896.427249] usb 3-2.3: cannot get ctl value: req = 0x81, wValue = 0x100, 
wIndex = 0x1100, type = 1
  [  896.618498] usb 3-2.3: cannot get ctl value: req = 0x81, wValue = 0x100, 
wIndex = 0x1100, type = 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/alsa-driver/+bug/1887210/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1919003] Re: Network Name Resolution fails with iproute2 4.15.0-2ubuntu1.3

2021-03-12 Thread Roger Fischer
My initial conclusion may not have been correct.

I now think that the fix in iproute2 4.15.0-2ubuntu1.3 made the problem
more apparent.

The Network Name Resolution service is not actually failing. It is being
stopped and restarted (based on the logs).

So the real problem seems to be a very aggressive approach to restarting
the Network Name Resolution service.

In our case, the DHCPClient request is not getting a response, yet the
Network Name Resolution service is still being restarted.

Mar 13 03:43:32 em-vf-ns1 dhclient[3443]: DHCPDISCOVER on nsblk01 to 
255.255.255.255 port 67 interval 5 (xid=0xe499a07d)
Mar 13 03:43:37 em-vf-ns1 dhclient[3443]: No DHCPOFFERS received.
Mar 13 03:43:37 em-vf-ns1 dhclient[3443]: No working leases in persistent 
database - sleeping.

Mar 13 03:43:37 em-vf-ns1 systemd[1]: Stopping Network Name Resolution...
Mar 13 03:43:37 em-vf-ns1 systemd[1]: Stopped Network Name Resolution.
Mar 13 03:43:37 em-vf-ns1 systemd[1]: Starting Network Name Resolution...
Mar 13 03:43:37 em-vf-ns1 systemd[1]: Started Network Name Resolution.
Mar 13 03:43:37 em-vf-ns1 systemd[1]: Starting 
resolvconf-pull-resolved.service...
Mar 13 03:43:37 em-vf-ns1 systemd[1]: Started resolvconf-pull-resolved.service.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to iproute2 in Ubuntu.
https://bugs.launchpad.net/bugs/1919003

Title:
  Network Name Resolution fails with iproute2 4.15.0-2ubuntu1.3

Status in iproute2 package in Ubuntu:
  New

Bug description:
  The following is repeated periodically in the syslog:

  Feb 28 20:25:02 em-cel1 systemd[1]: Started Network Name Resolution.
  Feb 28 20:25:02 em-cel1 systemd[1]: Starting 
resolvconf-pull-resolved.service...
  Feb 28 20:25:02 em-cel1 systemd[1]: Started resolvconf-pull-resolved.service.
  Feb 28 20:25:19 em-cel1 systemd[1]: Stopping Network Name Resolution...
  Feb 28 20:25:19 em-cel1 systemd[1]: Stopped Network Name Resolution.
  Feb 28 20:25:19 em-cel1 systemd[1]: Starting Network Name Resolution...

  There is no log anywhere to indicate why the service failed.

  The service stopped failing when we downgraded iproute2 from
  4.15.0-2ubuntu1.3 to 4.15.0-2ubuntu1.1.

  The DHCPClient seems to be involved in the chain of events.

  At the same frequency as the service failures, we do an ifup on a non-
  auto dhcp interface. The ifup results in a DHCP request, which in this
  case does not get a response (the link to the DHCP server is down.

  When we stop the process that does the periodic ifup, the service
  remains up (with iproute2 4.15.0-2ubuntu1.3).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/iproute2/+bug/1919003/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1890572] Re: USB backend never ends if the printer is not connected

2021-03-12 Thread Bug Watch Updater
** Changed in: cups
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/1890572

Title:
  USB backend never ends if the printer is not connected

Status in CUPS:
  Fix Released
Status in cups package in Ubuntu:
  New

Bug description:
  USB backend never ends if the printer is not connected. We have been
  able to identify a infinity loop in print_device function in usb-
  libusb.c file:

  ```
    fprintf(stderr, "DEBUG: Printing on printer with URI: %s\n", uri);
    while ((g.printer = find_device(print_cb, uri)) == NULL)
    {
  _cupsLangPrintFilter(stderr, "INFO",
  _("Waiting for printer to become available."));
  sleep(5);
    }
  ```

  It's also easy to test by invoking the backend by hand:

  ```
  # export DEVICE_URI='usb://Printer/Model?serial=?'
  # /usr/lib/cups/backend/usb 0 root title 1 '' data.file

  DEBUG: Loading USB quirks from "/usr/share/cups/usb".
  DEBUG: Loaded 159 quirks.
  DEBUG: Printing on printer with URI: usb://Printer/Model?serial=?
  DEBUG: libusb_get_device_list=6
  INFO: Waiting for printer to become available.
  DEBUG: libusb_get_device_list=6
  INFO: Waiting for printer to become available.
  DEBUG: libusb_get_device_list=6
  INFO: Waiting for printer to become available.
  DEBUG: libusb_get_device_list=6
  INFO: Waiting for printer to become available.
  DEBUG: libusb_get_device_list=6
  INFO: Waiting for printer to become available.
  ...

  ```

  Setting a job timeout policy or manually stopping work are not options
  for us. We may have jobs that take hours to complete.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cups/+bug/1890572/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1919003] [NEW] Network Name Resolution fails with iproute2 4.15.0-2ubuntu1.3

2021-03-12 Thread Roger Fischer
Public bug reported:

The following is repeated periodically in the syslog:

Feb 28 20:25:02 em-cel1 systemd[1]: Started Network Name Resolution.
Feb 28 20:25:02 em-cel1 systemd[1]: Starting resolvconf-pull-resolved.service...
Feb 28 20:25:02 em-cel1 systemd[1]: Started resolvconf-pull-resolved.service.
Feb 28 20:25:19 em-cel1 systemd[1]: Stopping Network Name Resolution...
Feb 28 20:25:19 em-cel1 systemd[1]: Stopped Network Name Resolution.
Feb 28 20:25:19 em-cel1 systemd[1]: Starting Network Name Resolution...

There is no log anywhere to indicate why the service failed.

The service stopped failing when we downgraded iproute2 from
4.15.0-2ubuntu1.3 to 4.15.0-2ubuntu1.1.

The DHCPClient seems to be involved in the chain of events.

At the same frequency as the service failures, we do an ifup on a non-
auto dhcp interface. The ifup results in a DHCP request, which in this
case does not get a response (the link to the DHCP server is down.

When we stop the process that does the periodic ifup, the service
remains up (with iproute2 4.15.0-2ubuntu1.3).

** Affects: iproute2 (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to iproute2 in Ubuntu.
https://bugs.launchpad.net/bugs/1919003

Title:
  Network Name Resolution fails with iproute2 4.15.0-2ubuntu1.3

Status in iproute2 package in Ubuntu:
  New

Bug description:
  The following is repeated periodically in the syslog:

  Feb 28 20:25:02 em-cel1 systemd[1]: Started Network Name Resolution.
  Feb 28 20:25:02 em-cel1 systemd[1]: Starting 
resolvconf-pull-resolved.service...
  Feb 28 20:25:02 em-cel1 systemd[1]: Started resolvconf-pull-resolved.service.
  Feb 28 20:25:19 em-cel1 systemd[1]: Stopping Network Name Resolution...
  Feb 28 20:25:19 em-cel1 systemd[1]: Stopped Network Name Resolution.
  Feb 28 20:25:19 em-cel1 systemd[1]: Starting Network Name Resolution...

  There is no log anywhere to indicate why the service failed.

  The service stopped failing when we downgraded iproute2 from
  4.15.0-2ubuntu1.3 to 4.15.0-2ubuntu1.1.

  The DHCPClient seems to be involved in the chain of events.

  At the same frequency as the service failures, we do an ifup on a non-
  auto dhcp interface. The ifup results in a DHCP request, which in this
  case does not get a response (the link to the DHCP server is down.

  When we stop the process that does the periodic ifup, the service
  remains up (with iproute2 4.15.0-2ubuntu1.3).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/iproute2/+bug/1919003/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1878969] Re: time-epoch never changes in SRUs

2021-03-12 Thread Dan Streetman
focal:

$ pull-lp-source systemd 245.4-4ubuntu3.4
...
$ stat -c '%y' systemd-245.4/NEWS
2020-04-01 13:23:42.0 -0400

$ lxc launch --vm ubuntu:focal lp1878969-f
...
$ lxc exec lp1878969-f systemctl disable systemd-timesyncd
Removed /etc/systemd/system/sysinit.target.wants/systemd-timesyncd.service.
Removed /etc/systemd/system/dbus-org.freedesktop.timesync1.service.

$ lxc stop lp1878969-f 
$ sudo date -s '1990-01-01'
Mon Jan  1 00:00:00 UTC 1990
$ lxc start lp1878969-f 
$ lxc console lp1878969-f
...
ubuntu@lp1878969-f:~$ dpkg -l systemd|grep systemd
ii  systemd245.4-4ubuntu3.4 amd64system and service manager
ubuntu@lp1878969-f:~$ date
Wed Apr  1 17:24:01 UTC 2020


>From https://launchpad.net/ubuntu/+source/systemd/245.4-4ubuntu3.5
" -- Ioanna Alifieraki   Tue, 23 Feb 
2021 00:18:57 +"

$ sudo date -s '1990-01-01'
Mon Jan  1 00:00:00 UTC 1990
$ lxc start lp1878969-f 
$ lxc console lp1878969-f
...
ubuntu@lp1878969-f:~$ systemctl status systemd-timesyncd.service --no-pager
● systemd-timesyncd.service - Network Time Synchronization
 Loaded: loaded (/lib/systemd/system/systemd-timesyncd.service; disabled; 
vendor preset: enabled)
 Active: inactive (dead)
   Docs: man:systemd-timesyncd.service(8)
ubuntu@lp1878969-f:~$ dpkg -l systemd|grep systemd
ii  systemd245.4-4ubuntu3.5 amd64system and service manager
ubuntu@lp1878969-f:~$ date
Tue Feb 23 00:19:42 UTC 2021

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1878969

Title:
  time-epoch never changes in SRUs

Status in ubuntu-core-initramfs:
  Fix Released
Status in systemd package in Ubuntu:
  Fix Released
Status in systemd source package in Xenial:
  New
Status in systemd source package in Bionic:
  Fix Committed
Status in systemd source package in Focal:
  Fix Committed

Bug description:
  [Impact]

   * Systems without hwclock come up with a fixed time epoch which is not 
updated in SRUs
   * Ideally booting with a newer built of systemd should move time epoch to be 
at least when systemd was last built. For example to the value of 
SOURCE_DATE_EPOCH.

  [Test Case]

   * Boot without network NTP or hwclock
   * Observe that the epoch is the same as the time when NEWS entry in the 
systemd source code was last touched.
   * Boot newer update of systemd, observe that the time epoch is at least 2020

  [Regression Potential]

   * Bad epoch, may result in unable to perform TLS connections,
  validated GPG signatures, and snapd assertions. Changing epoch to be
  more recent is desired. Some machines may rely on the fact that
  "bionic" without hwclock always comes up in year 2018. But in practice
  that is incorrect thing to do.

  [Other Info]
   
   * By default

  option('time-epoch', type : 'integer', value : '-1',
 description : 'time epoch for time clients')

  in systemd is set to the modification time of the NEW entry
  time_epoch = run_command(stat, '-c', '%Y', NEWS).stdout().to_int()

  If available, it should be set to SOURCE_DATE_EPOCH=1585051767 value
  to be compliant with the https://reproducible-
  builds.org/docs/timestamps/ specification.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-core-initramfs/+bug/1878969/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1907472] Re: glibc x32 autopkgtest fails in hirsute with binutils and audit in -proposed

2021-03-12 Thread Balint Reczey
I've observed the failure in the i386 build of glibc_2.33-0ubuntu4:

Linux lcy01-amd64-014 4.15.0-136-generic #140-Ubuntu SMP Thu Jan 28 05:20:47 
UTC 2021 i686 athlon i686 GNU/Linux
...
if [ -f /proc/cpuinfo ] ; then cat /proc/cpuinfo ; fi
processor   : 0
vendor_id   : AuthenticAMD
cpu family  : 16
model   : 2
model name  : AMD Opteron 23xx (Gen 3 Class Opteron)
stepping: 3
microcode   : 0x165
cpu MHz : 2500.048
cache size  : 512 KB
physical id : 0
siblings: 1
core id : 0
cpu cores   : 1
apicid  : 0
initial apicid  : 0
fpu : yes
fpu_exception   : yes
cpuid level : 5
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov 
pat pse36 clflush mmx fxsr sse sse2 syscall nx mmxext fxsr_opt pdpe1gb lm 
3dnowext 3dnow rep_good nopl cpuid extd_apicid tsc_known_freq pni cx16 x2apic 
popcnt hypervisor lahf_lm cmp_legacy svm cr8_legacy abm sse4a misalignsse 
3dnowprefetch osvw vmmcall
bugs: tlb_mmatch fxsave_leak sysret_ss_attrs null_seg spectre_v1 
spectre_v2
bogomips: 5000.09
TLB size: 1024 4K pages
clflush size: 64
cache_alignment : 64
address sizes   : 40 bits physical, 48 bits virtual
power management:
...

+-+
| Encountered regressions that don't match expected failures. |
+-+
FAIL: math/test-double-libmvec-sincos
FAIL: math/test-double-vlen2-sincos
FAIL: math/test-float-libmvec-sincosf
FAIL: math/test-float-vlen4-sincos
touch /<>/stamp-dir/check_x32
CHECK SUMMARY
check for check_libc passed
check for check_amd64 passed
check for check_x32 failed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to audit in Ubuntu.
https://bugs.launchpad.net/bugs/1907472

Title:
  glibc x32 autopkgtest fails in hirsute with binutils and audit in
  -proposed

Status in audit package in Ubuntu:
  New
Status in binutils package in Ubuntu:
  New
Status in glibc package in Ubuntu:
  New

Bug description:
  
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac
  /autopkgtest-
  hirsute/hirsute/amd64/g/glibc/20201208_160143_17354@/log.gz

  --
  FAIL: math/test-double-libmvec-sincos
  original exit status 1
  Didn't expect signal from child: got `Illegal instruction'
  --
  --
  FAIL: math/test-double-vlen2-sincos
  original exit status 132
  --
  --
  FAIL: math/test-float-libmvec-sincosf
  original exit status 1
  Didn't expect signal from child: got `Illegal instruction'
  --
  --
  FAIL: math/test-float-vlen4-sincos
  original exit status 132
  --

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/audit/+bug/1907472/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1917763] Re: FFE: new upstream release 21.0 and migrate to llvm 12

2021-03-12 Thread Iain Lane
ACK, go for it (with 11 for now, I agree that switching to an RC
compiler feels dodgy)

** Changed in: mesa (Ubuntu)
   Status: New => Triaged

** Changed in: mesa (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mesa in Ubuntu.
https://bugs.launchpad.net/bugs/1917763

Title:
  FFE: new upstream release 21.0 and migrate to llvm 12

Status in mesa package in Ubuntu:
  Triaged

Bug description:
  Mesa 21.0.0 will be released soon, and we still want it in 21.04. It's
  been in Debian experimental since rc1. The packaging also migrates it
  to use llvm 12.

  The risks involve graphical issues or even crashes when running more
  intense OpenGL/Vulkan apps like games. Running a desktop is a simple
  use-case and should work fine across the board. Upstream gitlab has a
  fairly extensive CI for various drivers, while Intel tests on their
  own CI. This means that any showstoppers should be shaken out already.

  We will be able to pull maybe two point-releases before hirsute is
  frozen, and then push more as an SRU.

  I've tested 21.0.0-rc's on Intel and AMD (RX 5700) and the latter too
  with some games, all good.

  packages for hirsute are available on ppa:canonical-x/x-staging

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mesa/+bug/1917763/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1917763] Re: FFE: new upstream release 21.0 and migrate to llvm 12

2021-03-12 Thread Timo Aaltonen
Note that migrating to llvm 12 can be done later, and use llvm 11 for
now until 12.0 is released (is at rc3 now).

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mesa in Ubuntu.
https://bugs.launchpad.net/bugs/1917763

Title:
  FFE: new upstream release 21.0 and migrate to llvm 12

Status in mesa package in Ubuntu:
  New

Bug description:
  Mesa 21.0.0 will be released soon, and we still want it in 21.04. It's
  been in Debian experimental since rc1. The packaging also migrates it
  to use llvm 12.

  The risks involve graphical issues or even crashes when running more
  intense OpenGL/Vulkan apps like games. Running a desktop is a simple
  use-case and should work fine across the board. Upstream gitlab has a
  fairly extensive CI for various drivers, while Intel tests on their
  own CI. This means that any showstoppers should be shaken out already.

  We will be able to pull maybe two point-releases before hirsute is
  frozen, and then push more as an SRU.

  I've tested 21.0.0-rc's on Intel and AMD (RX 5700) and the latter too
  with some games, all good.

  packages for hirsute are available on ppa:canonical-x/x-staging

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mesa/+bug/1917763/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1918955] Re: SRU network: fix LXC_NET_NONE cleanup

2021-03-12 Thread Scott Moser
** Description changed:

  Hi.  I'm using 20.04, and I need a fix for
  https://github.com/lxc/lxc/pull/3589
  
- I think my only options to get that via packaging are 
-  a.) https://launchpad.net/~ubuntu-lxc/+archive/ubuntu/lxc-git-master
-  b.) build my own.
+ I think my only options to get that via packaging are
+  a.) https://launchpad.net/~ubuntu-lxc/+archive/ubuntu/lxc-git-master
+  b.) build my own.
  
  I don't love either of those options.
  
  Can we please get a SRU update to 20.04 of an lxc with that fix?
+ 
+ The fix is not in 4.0.5, so I marked this as affecting Groovy (currently
+ 1:4.0.4-0ubuntu3) without testing.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1918955

Title:
  SRU network: fix LXC_NET_NONE cleanup

Status in lxc package in Ubuntu:
  Fix Released
Status in lxc source package in Focal:
  Confirmed
Status in lxc source package in Groovy:
  Confirmed
Status in lxc source package in Hirsute:
  Fix Released

Bug description:
  Hi.  I'm using 20.04, and I need a fix for
  https://github.com/lxc/lxc/pull/3589

  I think my only options to get that via packaging are
   a.) https://launchpad.net/~ubuntu-lxc/+archive/ubuntu/lxc-git-master
   b.) build my own.

  I don't love either of those options.

  Can we please get a SRU update to 20.04 of an lxc with that fix?

  The fix is not in 4.0.5, so I marked this as affecting Groovy
  (currently 1:4.0.4-0ubuntu3) without testing.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1918955/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1918954] [NEW] [MS-7293, Realtek ALC883, Orange Line Out, Rear] No sound at all

2021-03-12 Thread LE GRAND
Public bug reported:

We have no sounds on speakers nor signals during the starting.

ProblemType: Bug
DistroRelease: Ubuntu 18.04
Package: pulseaudio 1:11.1-1ubuntu7.11
ProcVersionSignature: Ubuntu 4.15.0-136.140-generic 4.15.18
Uname: Linux 4.15.0-136-generic i686
ApportVersion: 2.20.9-0ubuntu7.23
Architecture: i386
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC0:  hmljkl 1444 F pulseaudio
 /dev/snd/controlC1:  hmljkl 1444 F pulseaudio
CurrentDesktop: Unity:Unity7:ubuntu
Date: Fri Mar 12 17:19:26 2021
InstallationDate: Installed on 2021-03-11 (1 days ago)
InstallationMedia: Ubuntu 16.04.3 LTS "Xenial Xerus" - Release i386 (20170801)
SourcePackage: pulseaudio
Symptom: audio
Symptom_AlsaPlaybackTest: ALSA playback test through plughw:VT82xx successful
Symptom_Card: VT8237A/VT8251 HDA Controller - HDA VIA VT82xx
Symptom_DevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC0:  hmljkl 1444 F pulseaudio
 /dev/snd/controlC1:  hmljkl 1444 F pulseaudio
Symptom_Jack: Orange Line Out, Rear
Symptom_PulsePlaybackTest: PulseAudio playback test failed
Symptom_Type: No sound at all
Title: [MS-7293, Realtek ALC883, Orange Line Out, Rear] No sound at all
UpgradeStatus: Upgraded to bionic on 2021-03-12 (0 days ago)
dmi.bios.date: 10/27/2006
dmi.bios.vendor: Phoenix Technologies, LTD
dmi.bios.version: 6.00 PG
dmi.board.name: MS-7293
dmi.board.vendor: FUJITSU SIEMENS
dmi.board.version: 1.00
dmi.chassis.type: 3
dmi.modalias: 
dmi:bvnPhoenixTechnologies,LTD:bvr6.00PG:bd10/27/2006:svnFUJITSUSIEMENS:pnMS-7293:pvr1.00:rvnFUJITSUSIEMENS:rnMS-7293:rvr1.00:cvn:ct3:cvr:
dmi.product.name: MS-7293
dmi.product.version: 1.00
dmi.sys.vendor: FUJITSU SIEMENS

** Affects: pulseaudio (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: apport-bug bionic i386

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pulseaudio in Ubuntu.
https://bugs.launchpad.net/bugs/1918954

Title:
  [MS-7293, Realtek ALC883, Orange Line Out, Rear] No sound at all

Status in pulseaudio package in Ubuntu:
  New

Bug description:
  We have no sounds on speakers nor signals during the starting.

  ProblemType: Bug
  DistroRelease: Ubuntu 18.04
  Package: pulseaudio 1:11.1-1ubuntu7.11
  ProcVersionSignature: Ubuntu 4.15.0-136.140-generic 4.15.18
  Uname: Linux 4.15.0-136-generic i686
  ApportVersion: 2.20.9-0ubuntu7.23
  Architecture: i386
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  hmljkl 1444 F pulseaudio
   /dev/snd/controlC1:  hmljkl 1444 F pulseaudio
  CurrentDesktop: Unity:Unity7:ubuntu
  Date: Fri Mar 12 17:19:26 2021
  InstallationDate: Installed on 2021-03-11 (1 days ago)
  InstallationMedia: Ubuntu 16.04.3 LTS "Xenial Xerus" - Release i386 (20170801)
  SourcePackage: pulseaudio
  Symptom: audio
  Symptom_AlsaPlaybackTest: ALSA playback test through plughw:VT82xx successful
  Symptom_Card: VT8237A/VT8251 HDA Controller - HDA VIA VT82xx
  Symptom_DevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  hmljkl 1444 F pulseaudio
   /dev/snd/controlC1:  hmljkl 1444 F pulseaudio
  Symptom_Jack: Orange Line Out, Rear
  Symptom_PulsePlaybackTest: PulseAudio playback test failed
  Symptom_Type: No sound at all
  Title: [MS-7293, Realtek ALC883, Orange Line Out, Rear] No sound at all
  UpgradeStatus: Upgraded to bionic on 2021-03-12 (0 days ago)
  dmi.bios.date: 10/27/2006
  dmi.bios.vendor: Phoenix Technologies, LTD
  dmi.bios.version: 6.00 PG
  dmi.board.name: MS-7293
  dmi.board.vendor: FUJITSU SIEMENS
  dmi.board.version: 1.00
  dmi.chassis.type: 3
  dmi.modalias: 
dmi:bvnPhoenixTechnologies,LTD:bvr6.00PG:bd10/27/2006:svnFUJITSUSIEMENS:pnMS-7293:pvr1.00:rvnFUJITSUSIEMENS:rnMS-7293:rvr1.00:cvn:ct3:cvr:
  dmi.product.name: MS-7293
  dmi.product.version: 1.00
  dmi.sys.vendor: FUJITSU SIEMENS

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pulseaudio/+bug/1918954/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1918955] [NEW] SRU network: fix LXC_NET_NONE cleanup

2021-03-12 Thread Scott Moser
Public bug reported:

Hi.  I'm using 20.04, and I need a fix for
https://github.com/lxc/lxc/pull/3589

I think my only options to get that via packaging are 
 a.) https://launchpad.net/~ubuntu-lxc/+archive/ubuntu/lxc-git-master
 b.) build my own.

I don't love either of those options.

Can we please get a SRU update to 20.04 of an lxc with that fix?

** Affects: lxc (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: lxc (Ubuntu Focal)
 Importance: Undecided
 Status: Confirmed

** Affects: lxc (Ubuntu Groovy)
 Importance: Undecided
 Status: Confirmed

** Affects: lxc (Ubuntu Hirsute)
 Importance: Undecided
 Status: Fix Released

** Also affects: lxc (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Also affects: lxc (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

** Also affects: lxc (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: lxc (Ubuntu Hirsute)
   Status: New => Fix Released

** Changed in: lxc (Ubuntu Groovy)
   Status: New => Confirmed

** Changed in: lxc (Ubuntu Focal)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1918955

Title:
  SRU network: fix LXC_NET_NONE cleanup

Status in lxc package in Ubuntu:
  Fix Released
Status in lxc source package in Focal:
  Confirmed
Status in lxc source package in Groovy:
  Confirmed
Status in lxc source package in Hirsute:
  Fix Released

Bug description:
  Hi.  I'm using 20.04, and I need a fix for
  https://github.com/lxc/lxc/pull/3589

  I think my only options to get that via packaging are 
   a.) https://launchpad.net/~ubuntu-lxc/+archive/ubuntu/lxc-git-master
   b.) build my own.

  I don't love either of those options.

  Can we please get a SRU update to 20.04 of an lxc with that fix?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1918955/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1917625] Re: OpenSSL TLS 1.1 handshake fails internal error

2021-03-12 Thread Christian Heimes
> I feel that openssl upstream needs to add:
server_context.verify_consistent()

Yeah, I agree with you. :) The idea came up three years ago when I filed
issue https://github.com/openssl/openssl/issues/5127


> 1) if openssl version 3.x, and security level is greater than 0, assume no 
> TLS1.1 is available

Thank you, I'll consider this fact when I implement OpenSSL 3.0.0
support


> 2) if openssl version 1.1.1+, and security level is greater than 1, assume no 
> TLS1.1 is available

TLS 1.1 connections work fine on seclevel 2 with default upstream
OpenSSL 1.1.1 and with Fedora's OpenSSL 1.1.1 using crypto-policy
"DEFAULT". I'm using

server_context.set_ciphers("@SECLEVEL=2:ALL")

to change the security level. Here Ubuntu deviates from standard OpenSSL
1.1.1 policies. So I ask again: Should we detect and special case the
deviation and document it?


> 3) if ctx.get_min_proto_level returns TLS1.2 assume no TLS1.1 is available

That's the original problem,
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1899878 . On
Ubuntu SSL_CTX_get_min_proto_version() returns 0 (lowest available
version) and TLS1_VERSION is available.


> 4) else try setting min_proto_level and run tests

The setter SSL_CTX_set_min_proto_version() does not return an error
indication.

** Bug watch added: github.com/openssl/openssl/issues #5127
   https://github.com/openssl/openssl/issues/5127

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1917625

Title:
  OpenSSL TLS 1.1 handshake fails internal error

Status in openssl package in Ubuntu:
  Confirmed
Status in openssl source package in Hirsute:
  Confirmed

Bug description:
  OpenSSL's SSL_do_handshake() method fails with
  TLSV1_ALERT_INTERNAL_ERROR when client side has TLS 1.0 to 1.2 enabled
  but server side has only TLS 1.0 and 1.1 enabled. The issue breaks
  Python's test suite for test_ssl. It looks like the problem is caused
  by an Ubuntu downstream patch. Vanilla OpenSSL, Debian, and Fedora are
  not affected.

  A simple reproducer is:

  import ssl
  import socket
  from test.test_ssl import testing_context, ThreadedEchoServer, HOST

  client_context, server_context, hostname = testing_context()
  # client 1.0 to 1.2, server 1.0 to 1.1
  client_context.minimum_version = ssl.TLSVersion.TLSv1
  client_context.maximum_version = ssl.TLSVersion.TLSv1_2
  server_context.minimum_version = ssl.TLSVersion.TLSv1
  server_context.maximum_version = ssl.TLSVersion.TLSv1_1

  with ThreadedEchoServer(context=server_context) as server:
  with client_context.wrap_socket(socket.socket(),
  server_hostname=hostname) as s:
  s.connect((HOST, server.port))
  assert s.version() == 'TLSv1.1'

  
  On Ubuntu 20.04 the code fails with:
  Traceback (most recent call last):
File "/internalerror.py", line 15, in 
  s.connect((HOST, server.port))
File "/usr/lib/python3.8/ssl.py", line 1342, in connect
  self._real_connect(addr, False)
File "/usr/lib/python3.8/ssl.py", line 1333, in _real_connect
  self.do_handshake()
File "/usr/lib/python3.8/ssl.py", line 1309, in do_handshake
  self._sslobj.do_handshake()
  ssl.SSLError: [SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error 
(_ssl.c:1123)

  On Debian testing and Fedora 33 the same test passes with out:
   server:  new connection from ('127.0.0.1', 52346)
   server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
   server: selected protocol is now None

  You can find Dockerfiles with reproducers at https://github.com/tiran
  /distro-truststore/tree/main/tests/ubuntu-1899878

  Also see:
  * https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1899878
  * https://bugs.python.org/issue43382
  * https://bugs.python.org/issue41561

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1917625/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1917625] Re: OpenSSL TLS 1.1 handshake fails internal error

2021-03-12 Thread Christian Heimes
> s->cert->sec_cb() and then call it with SSL_SECOP_VERSION operation
with nbits set to TLS1.1 version? then it will return and tell us if it
is acceptable or not, by the security level.

Nice!
Could you hook up the check to SSL_CTX_set_min_proto_version() and return an 
error code when level and security policy don't match? It's a modern setter, so 
it can return 0 on error.

int SSL_CTX_set_min_proto_version(SSL_CTX *ctx, int version);

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1917625

Title:
  OpenSSL TLS 1.1 handshake fails internal error

Status in openssl package in Ubuntu:
  Confirmed
Status in openssl source package in Hirsute:
  Confirmed

Bug description:
  OpenSSL's SSL_do_handshake() method fails with
  TLSV1_ALERT_INTERNAL_ERROR when client side has TLS 1.0 to 1.2 enabled
  but server side has only TLS 1.0 and 1.1 enabled. The issue breaks
  Python's test suite for test_ssl. It looks like the problem is caused
  by an Ubuntu downstream patch. Vanilla OpenSSL, Debian, and Fedora are
  not affected.

  A simple reproducer is:

  import ssl
  import socket
  from test.test_ssl import testing_context, ThreadedEchoServer, HOST

  client_context, server_context, hostname = testing_context()
  # client 1.0 to 1.2, server 1.0 to 1.1
  client_context.minimum_version = ssl.TLSVersion.TLSv1
  client_context.maximum_version = ssl.TLSVersion.TLSv1_2
  server_context.minimum_version = ssl.TLSVersion.TLSv1
  server_context.maximum_version = ssl.TLSVersion.TLSv1_1

  with ThreadedEchoServer(context=server_context) as server:
  with client_context.wrap_socket(socket.socket(),
  server_hostname=hostname) as s:
  s.connect((HOST, server.port))
  assert s.version() == 'TLSv1.1'

  
  On Ubuntu 20.04 the code fails with:
  Traceback (most recent call last):
File "/internalerror.py", line 15, in 
  s.connect((HOST, server.port))
File "/usr/lib/python3.8/ssl.py", line 1342, in connect
  self._real_connect(addr, False)
File "/usr/lib/python3.8/ssl.py", line 1333, in _real_connect
  self.do_handshake()
File "/usr/lib/python3.8/ssl.py", line 1309, in do_handshake
  self._sslobj.do_handshake()
  ssl.SSLError: [SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error 
(_ssl.c:1123)

  On Debian testing and Fedora 33 the same test passes with out:
   server:  new connection from ('127.0.0.1', 52346)
   server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
   server: selected protocol is now None

  You can find Dockerfiles with reproducers at https://github.com/tiran
  /distro-truststore/tree/main/tests/ubuntu-1899878

  Also see:
  * https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1899878
  * https://bugs.python.org/issue43382
  * https://bugs.python.org/issue41561

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1917625/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1899878] Re: Python's test_ssl fails starting from Ubuntu 20.04

2021-03-12 Thread Dimitri John Ledkov
On SSLcontext, security callback has prototype

/* Security callback */
int (*sec_cb) (const SSL *s, const SSL_CTX *ctx, int op, int bits, int nid,
   void *other, void *ex);

if one calls that function, with context passed in, "op" set to
SSL_SECOP_VERSION, "bits" set to zero, "nid" set to protocol version,
other set to NULL, and ex set to null => then the security callback will
tell us if at the current configuration a given protocol version is
acceptable.

This should work on OpenSSL 1.1.0+

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1899878

Title:
  Python's test_ssl fails starting from Ubuntu 20.04

Status in openssl package in Ubuntu:
  Incomplete

Bug description:
  Please take a look at https://bugs.python.org/issue41561. Developers
  who work on Python think that the issue is due to a change in Ubuntu
  20.04 that is best described by
  https://bugs.python.org/issue41561#msg378089:

  "It sounds like a Debian/Ubuntu patch is breaking an assumption. Did
  somebody report the bug with Debian/Ubuntu maintainers of OpenSSL
  already? Fedora also configures OpenSSL with minimum protocol version
  of TLS 1.2. The distribution does it in a slightly different way that
  makes the restriction discoverable and that is compatible with
  Python's test suite."

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1899878/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1918930] Re: Unexpected file size of one package interrupts update process for all packages and leaves system vulnerable

2021-03-12 Thread David Kalnischkies
APT can't know how "critical" the other packages are compared to the
packages which failed to download (which really shouldn't happen to
begin with). I mean, if you don't (normally) use an SSH server, but
hard-depend on a sublime text-editor experience…

Have you tried the --fix-missing option the error message points to? It
will make it so that apt still shows the errors, but it will continue on
and install all packages it could successfully acquire. That is still a
failure for the whole process though (if that would be silent it would
be too easy for an attacker to fail these downloads and make you believe
you are up-to-date while nothing was installed – especially in
unattended processes).

Perhaps we should make that an interactive question in "apt" to have it
more easily discoverable for an interactive user?

(not commenting on the LP things, you may want to talk to them directly
about this rather than venting in an unrelated bugreport)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1918930

Title:
  Unexpected file size of one package interrupts update process for all
  packages and leaves system vulnerable

Status in apt package in Ubuntu:
  New

Bug description:
  An unexpected file size error of *one* package interrupts the whole
  update process for *all* packages and this can leave the system in a
  vulnerable state - this is not a constructed situation, but very real
  right now, look at the following console output - sublime has some
  problems with its package size, but then important ssh updates are not
  executed. Bad.

  The following packages will be upgraded:
brave-browser git git-man libpython2.7-minimal libpython2.7-stdlib 
linux-firmware openssh-client openssh-server openssh-sftp-server python2.7 
python2.7-minimal python3-pil sublime-merge
  13 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  Need to get 4.548 kB/199 MB of archives.
  After this operation, 1.744 kB of additional disk space will be used.
  Do you want to continue? [Y/n]
  Get:1 https://download.sublimetext.com apt/stable/ sublime-merge 2049 [4.548 
kB]
  Err:1 https://download.sublimetext.com apt/stable/ sublime-merge 2049
File has unexpected size (4542548 != 4548032). Mirror sync in progress? 
[IP: 104.236.0.104 443]
Hashes of expected file:
 - 
SHA512:f65ce3ca80ff0877da48826a0151036cd8e0bdf28b03d225a03f202262ca1278accdac8e7eb46a22904203750ccf06e3abe496a44f7a4b0c3363076501f72369
 - SHA256:e71fcf37e9d934a60b5112a7b79c819f03f55d331371ec0e9b02378c6234478c
 - SHA1:7fe54a9f7ea5383dbdfc0aae39310e2902c6d7f5 [weak]
 - MD5Sum:fd78a3b986bd7da8b2ebd1f659f5938c [weak]
 - Filesize:4548032 [weak]
  E: Failed to fetch 
https://download.sublimetext.com/files/sublime-merge_build-2049_amd64.deb  File 
has unexpected size (4542548 != 4548032). Mirror sync in progress? [IP: 
104.236.0.104 443]
 Hashes of expected file:
  - 
SHA512:f65ce3ca80ff0877da48826a0151036cd8e0bdf28b03d225a03f202262ca1278accdac8e7eb46a22904203750ccf06e3abe496a44f7a4b0c3363076501f72369
  - SHA256:e71fcf37e9d934a60b5112a7b79c819f03f55d331371ec0e9b02378c6234478c
  - SHA1:7fe54a9f7ea5383dbdfc0aae39310e2902c6d7f5 [weak]
  - MD5Sum:fd78a3b986bd7da8b2ebd1f659f5938c [weak]
  - Filesize:4548032 [weak]
  E: Unable to fetch some archives, maybe run apt-get update or try with 
--fix-missing?

  Note: This issue is not about the package size error in a third party
  repo - I do not blame Ubuntu for problems with that. This is about
  breaking the whole process of updating the system because one single
  sub-task fails.

  Why not make the basic tools really robust and reliable?

  BTW - here are s many free pixels on this screen - why not add two
  or three small sentences about text formatting syntax available in
  this extremely primitive text input box? Is there any text formatting
  at all? Why not put just a little bit of love to the user perspective
  and experience? Just two little senteces about formatting would make
  it so much more user friendly to type here. It feels so quick-and-
  dirty, it hurts. Very sad.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1918930/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1917625] Re: OpenSSL TLS 1.1 handshake fails internal error

2021-03-12 Thread Dimitri John Ledkov
Oooh,

can we add bindings for:

s->cert->sec_cb() and then call it with SSL_SECOP_VERSION operation with
nbits set to TLS1.1 version? then it will return and tell us if it is
acceptable or not, by the security level.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1917625

Title:
  OpenSSL TLS 1.1 handshake fails internal error

Status in openssl package in Ubuntu:
  Confirmed
Status in openssl source package in Hirsute:
  Confirmed

Bug description:
  OpenSSL's SSL_do_handshake() method fails with
  TLSV1_ALERT_INTERNAL_ERROR when client side has TLS 1.0 to 1.2 enabled
  but server side has only TLS 1.0 and 1.1 enabled. The issue breaks
  Python's test suite for test_ssl. It looks like the problem is caused
  by an Ubuntu downstream patch. Vanilla OpenSSL, Debian, and Fedora are
  not affected.

  A simple reproducer is:

  import ssl
  import socket
  from test.test_ssl import testing_context, ThreadedEchoServer, HOST

  client_context, server_context, hostname = testing_context()
  # client 1.0 to 1.2, server 1.0 to 1.1
  client_context.minimum_version = ssl.TLSVersion.TLSv1
  client_context.maximum_version = ssl.TLSVersion.TLSv1_2
  server_context.minimum_version = ssl.TLSVersion.TLSv1
  server_context.maximum_version = ssl.TLSVersion.TLSv1_1

  with ThreadedEchoServer(context=server_context) as server:
  with client_context.wrap_socket(socket.socket(),
  server_hostname=hostname) as s:
  s.connect((HOST, server.port))
  assert s.version() == 'TLSv1.1'

  
  On Ubuntu 20.04 the code fails with:
  Traceback (most recent call last):
File "/internalerror.py", line 15, in 
  s.connect((HOST, server.port))
File "/usr/lib/python3.8/ssl.py", line 1342, in connect
  self._real_connect(addr, False)
File "/usr/lib/python3.8/ssl.py", line 1333, in _real_connect
  self.do_handshake()
File "/usr/lib/python3.8/ssl.py", line 1309, in do_handshake
  self._sslobj.do_handshake()
  ssl.SSLError: [SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error 
(_ssl.c:1123)

  On Debian testing and Fedora 33 the same test passes with out:
   server:  new connection from ('127.0.0.1', 52346)
   server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
   server: selected protocol is now None

  You can find Dockerfiles with reproducers at https://github.com/tiran
  /distro-truststore/tree/main/tests/ubuntu-1899878

  Also see:
  * https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1899878
  * https://bugs.python.org/issue43382
  * https://bugs.python.org/issue41561

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1917625/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1917625] Re: OpenSSL TLS 1.1 handshake fails internal error

2021-03-12 Thread Dimitri John Ledkov
ideally it would be nice if we could access sec_cb and call it with the
protocol versions to check the versions there.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1917625

Title:
  OpenSSL TLS 1.1 handshake fails internal error

Status in openssl package in Ubuntu:
  Confirmed
Status in openssl source package in Hirsute:
  Confirmed

Bug description:
  OpenSSL's SSL_do_handshake() method fails with
  TLSV1_ALERT_INTERNAL_ERROR when client side has TLS 1.0 to 1.2 enabled
  but server side has only TLS 1.0 and 1.1 enabled. The issue breaks
  Python's test suite for test_ssl. It looks like the problem is caused
  by an Ubuntu downstream patch. Vanilla OpenSSL, Debian, and Fedora are
  not affected.

  A simple reproducer is:

  import ssl
  import socket
  from test.test_ssl import testing_context, ThreadedEchoServer, HOST

  client_context, server_context, hostname = testing_context()
  # client 1.0 to 1.2, server 1.0 to 1.1
  client_context.minimum_version = ssl.TLSVersion.TLSv1
  client_context.maximum_version = ssl.TLSVersion.TLSv1_2
  server_context.minimum_version = ssl.TLSVersion.TLSv1
  server_context.maximum_version = ssl.TLSVersion.TLSv1_1

  with ThreadedEchoServer(context=server_context) as server:
  with client_context.wrap_socket(socket.socket(),
  server_hostname=hostname) as s:
  s.connect((HOST, server.port))
  assert s.version() == 'TLSv1.1'

  
  On Ubuntu 20.04 the code fails with:
  Traceback (most recent call last):
File "/internalerror.py", line 15, in 
  s.connect((HOST, server.port))
File "/usr/lib/python3.8/ssl.py", line 1342, in connect
  self._real_connect(addr, False)
File "/usr/lib/python3.8/ssl.py", line 1333, in _real_connect
  self.do_handshake()
File "/usr/lib/python3.8/ssl.py", line 1309, in do_handshake
  self._sslobj.do_handshake()
  ssl.SSLError: [SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error 
(_ssl.c:1123)

  On Debian testing and Fedora 33 the same test passes with out:
   server:  new connection from ('127.0.0.1', 52346)
   server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
   server: selected protocol is now None

  You can find Dockerfiles with reproducers at https://github.com/tiran
  /distro-truststore/tree/main/tests/ubuntu-1899878

  Also see:
  * https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1899878
  * https://bugs.python.org/issue43382
  * https://bugs.python.org/issue41561

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1917625/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1917625] Re: OpenSSL TLS 1.1 handshake fails internal error

2021-03-12 Thread Dimitri John Ledkov
I feel that openssl upstream needs to add:

server_context.verify_consistent()

Because in the above example, even before trying to establish the
connection between the two context, the server context is already
internally inconsistent.

And upstream has changed the meaning of security levels in the past, and
will do so again in the future. Ditto distro customization which brought
the preview of such change earlier.

It does feel that until such API arrives upstream, one needs to do
something to the effect of:

1) if openssl version 3.x, and security level is greater than 0, assume no 
TLS1.1 is available
2) if openssl version 1.1.1+, and security level is greater than 1, assume no 
TLS1.1 is available
3) if ctx.get_min_proto_level returns TLS1.2 assume no TLS1.1 is available
4) else try setting min_proto_level and run tests
5) if min_proto_lvel is not available the build is against openssl 1.0.2x 
series, TLS1.1 is probably available.

Above logic should cover the next upstream openssl version; the current
deployments of ubuntu derivatives; the debian derivatives; and
fedora/rhel derivatives.

I think

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1917625

Title:
  OpenSSL TLS 1.1 handshake fails internal error

Status in openssl package in Ubuntu:
  Confirmed
Status in openssl source package in Hirsute:
  Confirmed

Bug description:
  OpenSSL's SSL_do_handshake() method fails with
  TLSV1_ALERT_INTERNAL_ERROR when client side has TLS 1.0 to 1.2 enabled
  but server side has only TLS 1.0 and 1.1 enabled. The issue breaks
  Python's test suite for test_ssl. It looks like the problem is caused
  by an Ubuntu downstream patch. Vanilla OpenSSL, Debian, and Fedora are
  not affected.

  A simple reproducer is:

  import ssl
  import socket
  from test.test_ssl import testing_context, ThreadedEchoServer, HOST

  client_context, server_context, hostname = testing_context()
  # client 1.0 to 1.2, server 1.0 to 1.1
  client_context.minimum_version = ssl.TLSVersion.TLSv1
  client_context.maximum_version = ssl.TLSVersion.TLSv1_2
  server_context.minimum_version = ssl.TLSVersion.TLSv1
  server_context.maximum_version = ssl.TLSVersion.TLSv1_1

  with ThreadedEchoServer(context=server_context) as server:
  with client_context.wrap_socket(socket.socket(),
  server_hostname=hostname) as s:
  s.connect((HOST, server.port))
  assert s.version() == 'TLSv1.1'

  
  On Ubuntu 20.04 the code fails with:
  Traceback (most recent call last):
File "/internalerror.py", line 15, in 
  s.connect((HOST, server.port))
File "/usr/lib/python3.8/ssl.py", line 1342, in connect
  self._real_connect(addr, False)
File "/usr/lib/python3.8/ssl.py", line 1333, in _real_connect
  self.do_handshake()
File "/usr/lib/python3.8/ssl.py", line 1309, in do_handshake
  self._sslobj.do_handshake()
  ssl.SSLError: [SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error 
(_ssl.c:1123)

  On Debian testing and Fedora 33 the same test passes with out:
   server:  new connection from ('127.0.0.1', 52346)
   server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
   server: selected protocol is now None

  You can find Dockerfiles with reproducers at https://github.com/tiran
  /distro-truststore/tree/main/tests/ubuntu-1899878

  Also see:
  * https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1899878
  * https://bugs.python.org/issue43382
  * https://bugs.python.org/issue41561

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1917625/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1918930] [NEW] Unexpected file size of one package interrupts update process for all packages and leaves system vulnerable

2021-03-12 Thread Ubu Foo
Public bug reported:

An unexpected file size error of *one* package interrupts the whole
update process for *all* packages and this can leave the system in a
vulnerable state - this is not a constructed situation, but very real
right now, look at the following console output - sublime has some
problems with its package size, but then important ssh updates are not
executed. Bad.

The following packages will be upgraded:
  brave-browser git git-man libpython2.7-minimal libpython2.7-stdlib 
linux-firmware openssh-client openssh-server openssh-sftp-server python2.7 
python2.7-minimal python3-pil sublime-merge
13 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
Need to get 4.548 kB/199 MB of archives.
After this operation, 1.744 kB of additional disk space will be used.
Do you want to continue? [Y/n]
Get:1 https://download.sublimetext.com apt/stable/ sublime-merge 2049 [4.548 kB]
Err:1 https://download.sublimetext.com apt/stable/ sublime-merge 2049
  File has unexpected size (4542548 != 4548032). Mirror sync in progress? [IP: 
104.236.0.104 443]
  Hashes of expected file:
   - 
SHA512:f65ce3ca80ff0877da48826a0151036cd8e0bdf28b03d225a03f202262ca1278accdac8e7eb46a22904203750ccf06e3abe496a44f7a4b0c3363076501f72369
   - SHA256:e71fcf37e9d934a60b5112a7b79c819f03f55d331371ec0e9b02378c6234478c
   - SHA1:7fe54a9f7ea5383dbdfc0aae39310e2902c6d7f5 [weak]
   - MD5Sum:fd78a3b986bd7da8b2ebd1f659f5938c [weak]
   - Filesize:4548032 [weak]
E: Failed to fetch 
https://download.sublimetext.com/files/sublime-merge_build-2049_amd64.deb  File 
has unexpected size (4542548 != 4548032). Mirror sync in progress? [IP: 
104.236.0.104 443]
   Hashes of expected file:
- 
SHA512:f65ce3ca80ff0877da48826a0151036cd8e0bdf28b03d225a03f202262ca1278accdac8e7eb46a22904203750ccf06e3abe496a44f7a4b0c3363076501f72369
- SHA256:e71fcf37e9d934a60b5112a7b79c819f03f55d331371ec0e9b02378c6234478c
- SHA1:7fe54a9f7ea5383dbdfc0aae39310e2902c6d7f5 [weak]
- MD5Sum:fd78a3b986bd7da8b2ebd1f659f5938c [weak]
- Filesize:4548032 [weak]
E: Unable to fetch some archives, maybe run apt-get update or try with 
--fix-missing?

Note: This issue is not about the package size error in a third party
repo - I do not blame Ubuntu for problems with that. This is about
breaking the whole process of updating the system because one single
sub-task fails.

Why not make the basic tools really robust and reliable?

BTW - here are s many free pixels on this screen - why not add two
or three small sentences about text formatting syntax available in this
extremely primitive text input box? Is there any text formatting at all?
Why not put just a little bit of love to the user perspective and
experience? Just two little senteces about formatting would make it so
much more user friendly to type here. It feels so quick-and-dirty, it
hurts. Very sad.

** Affects: apt (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1918930

Title:
  Unexpected file size of one package interrupts update process for all
  packages and leaves system vulnerable

Status in apt package in Ubuntu:
  New

Bug description:
  An unexpected file size error of *one* package interrupts the whole
  update process for *all* packages and this can leave the system in a
  vulnerable state - this is not a constructed situation, but very real
  right now, look at the following console output - sublime has some
  problems with its package size, but then important ssh updates are not
  executed. Bad.

  The following packages will be upgraded:
brave-browser git git-man libpython2.7-minimal libpython2.7-stdlib 
linux-firmware openssh-client openssh-server openssh-sftp-server python2.7 
python2.7-minimal python3-pil sublime-merge
  13 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
  Need to get 4.548 kB/199 MB of archives.
  After this operation, 1.744 kB of additional disk space will be used.
  Do you want to continue? [Y/n]
  Get:1 https://download.sublimetext.com apt/stable/ sublime-merge 2049 [4.548 
kB]
  Err:1 https://download.sublimetext.com apt/stable/ sublime-merge 2049
File has unexpected size (4542548 != 4548032). Mirror sync in progress? 
[IP: 104.236.0.104 443]
Hashes of expected file:
 - 
SHA512:f65ce3ca80ff0877da48826a0151036cd8e0bdf28b03d225a03f202262ca1278accdac8e7eb46a22904203750ccf06e3abe496a44f7a4b0c3363076501f72369
 - SHA256:e71fcf37e9d934a60b5112a7b79c819f03f55d331371ec0e9b02378c6234478c
 - SHA1:7fe54a9f7ea5383dbdfc0aae39310e2902c6d7f5 [weak]
 - MD5Sum:fd78a3b986bd7da8b2ebd1f659f5938c [weak]
 - Filesize:4548032 [weak]
  E: Failed to fetch 
https://download.sublimetext.com/files/sublime-merge_build-2049_amd64.deb  File 
has unexpected size (4542548 != 4548032). Mirror sync in progress? [IP: 
104.236.0.104 443]
 Hashes of expected file:
  - 
SHA512:f65ce3

[Touch-packages] [Bug 1918928] [NEW] APT 2021/03 SRU release scheduling

2021-03-12 Thread Julian Andres Klode
Public bug reported:

We want to release the APT SRUs from Mar 2021 in a staggered manner,
such that we have 2-3 days between each release to get more chance to
discover regressions before rolling out to older releases.

Hence this bug, which we tag block-proposed-{bionic,focal} and then
untag once the delay has passed.

For groovy, we just want the normal aging :-)

** Affects: apt (Ubuntu)
 Importance: Undecided
 Status: In Progress


** Tags: block-proposed-bionic block-proposed-focal

** Changed in: apt (Ubuntu)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1918928

Title:
  APT 2021/03 SRU release scheduling

Status in apt package in Ubuntu:
  In Progress

Bug description:
  We want to release the APT SRUs from Mar 2021 in a staggered manner,
  such that we have 2-3 days between each release to get more chance to
  discover regressions before rolling out to older releases.

  Hence this bug, which we tag block-proposed-{bionic,focal} and then
  untag once the delay has passed.

  For groovy, we just want the normal aging :-)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1918928/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1574186] Re: applications-development icon is partly black

2021-03-12 Thread Jouni Mettala
According to migrated upstream bug
https://gitlab.gnome.org/GNOME/librsvg/-/issues/141

This works correctly on librsvg 2.42.3.

** Bug watch added: gitlab.gnome.org/GNOME/librsvg/-/issues #141
   https://gitlab.gnome.org/GNOME/librsvg/-/issues/141

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to librsvg in Ubuntu.
https://bugs.launchpad.net/bugs/1574186

Title:
  applications-development icon is partly black

Status in librsvg package in Ubuntu:
  Triaged

Bug description:
  The issue appeared after upgrading to Ubuntu 16.04, the icon was right
  in 15.10. I'm using Ubuntu Mate but the issue is likely indpendant of
  the DE.

  When displaying the applications-development.svg icon (from
  categories), either in Caja (Nautilus fork) or the Applications menu,
  the silver part is black instead of the normal appearance. It only
  appears with sizes 16, 22, 24 & 32; sizes 48, 64 & 128 appear fine.

  The weird things is that it doesn't happen if I open the icons in
  Inkscape or display them in a HTML page. It only happens in the file
  manager and Apps menu (and probably other places I haven't been able
  to check, like menus and such). Might be a Gtk rendering issue rather
  than the icons themselves.

  I attach a montage that shows the black-ish icons.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/librsvg/+bug/1574186/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1899878] Re: Python's test_ssl fails starting from Ubuntu 20.04

2021-03-12 Thread Marc Deslauriers
I've read through this bug and I don't see a good way forward with a
solution here. OpenSSL 1.1.1 doesn't provide the exact API that is
required to solve it, which would probably be 3) as suggested above, but
I don't think Ubuntu should change the meaning of the value returned by
that API.

Ubuntu is returning the value that is expected of the upstream 1.1.1
code when security levels are used.

While Ubuntu, Debian, and Fedora use different approaches to achieve a
similar goal, and Ubuntu did modify the meaning of security level 2 to
restrict it further than the upstream default, the fact remains that
building OpenSSL with a higher default security level results in a
situation where there seems to be no good API to request what the
minimum TLS version is.

It may appear reasonable that a simple query to the current security
level could have given a hardcoded indication of what is available.
Unfortunately, that assumption doesn't stand the test of time as it is
no longer valid once the security levels have been modified to align
with the current best practices, either in a new OpenSSL release, or by
a distro.

This is a less than ideal situation, but I think the only way forward
currently available when obsolete TLS versions need to be used is to set
the minimum security level accepted by OpenSSL.

We should work with upstream OpenSSL to make sure 3.0 provides the right
APIs, documentation, and guidance that are required to handle changing
defaults like this more elegantly in the future.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1899878

Title:
  Python's test_ssl fails starting from Ubuntu 20.04

Status in openssl package in Ubuntu:
  Incomplete

Bug description:
  Please take a look at https://bugs.python.org/issue41561. Developers
  who work on Python think that the issue is due to a change in Ubuntu
  20.04 that is best described by
  https://bugs.python.org/issue41561#msg378089:

  "It sounds like a Debian/Ubuntu patch is breaking an assumption. Did
  somebody report the bug with Debian/Ubuntu maintainers of OpenSSL
  already? Fedora also configures OpenSSL with minimum protocol version
  of TLS 1.2. The distribution does it in a slightly different way that
  makes the restriction discoverable and that is compatible with
  Python's test suite."

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1899878/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1829860] Re: APT unlocks in same order as it locks

2021-03-12 Thread Julian Andres Klode
** Changed in: apt (Ubuntu Xenial)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1829860

Title:
  APT unlocks in same order as it locks

Status in apt package in Ubuntu:
  Fix Released
Status in apt source package in Xenial:
  Won't Fix
Status in apt source package in Bionic:
  Fix Released
Status in apt source package in Disco:
  Fix Released

Bug description:
  [Impact]
  APT releases the locks in the same order it acquires them, rather than 
reverse order. Given that we have no waiting for locks, this is not _super_ 
problematic, but it might be wrong: You'd get a lock failure on dpkg's lock, 
rather than lock-frontend.

  [Test case]
  Watch lock release with strace and see that it unlocks the right way.

  [Regression potential]
  Some other locking races or something?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1829860/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1918907] Re: Default Acquire::AllowReleaseInfoChange::Suite to "true"

2021-03-12 Thread Julian Andres Klode
Fixed since 2.1.10, which is in groovy already.

** No longer affects: apt (Ubuntu Groovy)

** Changed in: apt (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1918907

Title:
  Default Acquire::AllowReleaseInfoChange::Suite to "true"

Status in apt package in Ubuntu:
  Fix Released
Status in apt source package in Bionic:
  New
Status in apt source package in Focal:
  New

Bug description:
  [Impact]
  APT 1.6-2.0 deny third-party repositories from changing their Suite value. 
This change was reverted in later apt releases, and will be reverted in 1.8 in 
Debian as well, so for consistency, we want to push that change to stable

  [Test plan]
  We added test cases to our extensive integration test suite run by 
autopkgtest.

  [Where problems could occur]
  It's hard to imagine anything here, we simply turn the flag for allowed from 
false to true. We even add tests for Suite changes :)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1918907/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1918880] Re: pulseaudio threaded-ml suspend issue

2021-03-12 Thread kailoran
"; realtime-scheduling = yes" is commented away in
/etc/pulse/daemon.conf (this is a very fresh install of 20.04 and I
haven't customized much). Should I enable this?

Either way, I'll try to exercise suspend and keep an eye out for this
issue happening again. I tried looking around but didn't find any
similar reports.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pulseaudio in Ubuntu.
https://bugs.launchpad.net/bugs/1918880

Title:
  pulseaudio threaded-ml suspend issue

Status in pulseaudio package in Ubuntu:
  Incomplete

Bug description:
  My laptop failed to suspend overnight and was unresponsive when I
  opened it back up. This is on Ubuntu 20.04.2 LTS with kernel
  5.6.0-1048-oem and pulseaudio:amd64/focal-updates
  1:13.99.1-1ubuntu3.10 uptodate. In syslog, I found a stream of suspend
  attempts with pulseaudio-related issues repeating in a 40s cycle, so
  reporting this as a PA issue.

  Mar 12 00:08:31 churn systemd[1]: Reached target Sleep.
  Mar 12 00:08:31 churn upowerd[1698]: Could not acquire inhibitor lock: 
GDBus.Error:org.freedesktop.login1.OperationInProgress: The operation 
inhibition has been requested for is already running
  Mar 12 00:08:31 churn systemd[1]: Starting Suspend...
  Mar 12 00:08:31 churn ModemManager[1427]:   [sleep-monitor] inhibit 
failed: GDBus.Error:org.freedesktop.login1.OperationInProgress: The operation 
inhibition has been requested for is already running
  Mar 12 00:08:31 churn kernel: [883904.845262] iwlwifi :00:14.3: Applying 
debug destination EXTERNAL_DRAM
  Mar 12 00:08:31 churn ModemManager[1427]:   Couldn't check support for 
device '/sys/devices/pci:00/:00:14.3': Device support check task 
already available for device '/sys/devices/pci:00/:00:14.3'
  Mar 12 00:08:31 churn systemd-sleep[516395]: Suspending system...
  Mar 12 00:08:31 churn kernel: [883904.853576] PM: suspend entry (s2idle)
  Mar 12 00:08:51 churn kernel: [883904.856917] Filesystems sync: 0.003 seconds
  Mar 12 00:08:51 churn kernel: [883904.857284] Freezing user space processes 
... 
  Mar 12 00:08:51 churn kernel: [883904.991749] iwlwifi :00:14.3: FW 
already configured (0) - re-configuring
  Mar 12 00:08:51 churn kernel: [883924.868069] Freezing of tasks failed after 
20.010 seconds (1 tasks refusing to freeze, wq_busy=0):
  Mar 12 00:08:51 churn kernel: [883924.868160] threaded-ml D0  3306   
2128 0x80004326
  Mar 12 00:08:51 churn kernel: [883924.868166] Call Trace:
  Mar 12 00:08:51 churn kernel: [883924.868183]  __schedule+0x2d8/0x760
  Mar 12 00:08:51 churn kernel: [883924.868188]  schedule+0x55/0xc0
  Mar 12 00:08:51 churn kernel: [883924.868195]  do_exit.cold+0x9f/0xb5
  Mar 12 00:08:51 churn kernel: [883924.868200]  rewind_stack_do_exit+0x17/0x20
  Mar 12 00:08:51 churn kernel: [883924.868205] RIP: 0033:0x7fc8a96ebcb9
  Mar 12 00:08:51 churn kernel: [883924.868216] Code: Bad RIP value.
  Mar 12 00:08:51 churn kernel: [883924.868219] RSP: 002b:7fc899504850 
EFLAGS: 0293 ORIG_RAX: 0007
  Mar 12 00:08:51 churn kernel: [883924.868223] RAX: fdfc RBX: 
208bbe357f60 RCX: 7fc8a96ebcb9
  Mar 12 00:08:51 churn kernel: [883924.868225] RDX: 7530 RSI: 
0003 RDI: 208bbe357f60
  Mar 12 00:08:51 churn kernel: [883924.868227] RBP: 0003 R08: 
 R09: 1587756a
  Mar 12 00:08:51 churn kernel: [883924.868229] R10: 0f90 R11: 
0293 R12: 7530
  Mar 12 00:08:51 churn kernel: [883924.868231] R13: 7530 R14: 
208bbe3285d0 R15: 7fff6f13d440
  Mar 12 00:08:51 churn kernel: [883924.868427] OOM killer enabled.
  Mar 12 00:08:51 churn rtkit-daemon[1608]: The canary thread is apparently 
starving. Taking action.
  Mar 12 00:08:51 churn NetworkManager[1297]:   [1615504131.1026] device 
(p2p-dev-wlp0s20f3): state change: unmanaged -> unavailable (reason 'managed', 
sys-iface-state: 'managed')
  Mar 12 00:08:51 churn rtkit-daemon[1608]: Demoting known real-time threads.
  Mar 12 00:08:51 churn NetworkManager[1297]:   [1615504131.1036] 
manager: NetworkManager state is now DISCONNECTED
  Mar 12 00:08:51 churn rtkit-daemon[1608]: Demoted 0 threads.
  Mar 12 00:08:51 churn NetworkManager[1297]:   [1615504131.1039] 
manager: sleep: sleep requested (sleeping: no  enabled: yes)
  Mar 12 00:08:51 churn NetworkManager[1297]:   [1615504131.1039] device 
(wlp0s20f3): state change: unavailable -> unmanaged (reason 'sleeping', 
sys-iface-state: 'managed')
  Mar 12 00:08:51 churn pulseaudio[2134]: q overrun, queuing locally
  Mar 12 00:08:51 churn kernel: [883924.868429] Restarting tasks ... done.
  Mar 12 00:08:51 churn pulseaudio[2134]: message repeated 4 times: [ q 
overrun, queuing locally]
  Mar 12 00:08:51 churn NetworkManager[1297]:   [1615504131.1245] device 
(p2p-dev-wlp0s20f3): state change: unavailable -> unmanaged (reason 'sleeping', 
sys-iface-state: 'ma

[Touch-packages] [Bug 1918920] Re: Harden test for no new acquires after transaction abort

2021-03-12 Thread Julian Andres Klode
This is fixed in 2.2.2 which will be synced ASAP, but this bug was
created after 2.2.2 and hence is not closed in the changelog.

** Changed in: apt (Ubuntu)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1918920

Title:
  Harden test for no new acquires after transaction abort

Status in apt package in Ubuntu:
  Fix Committed
Status in apt source package in Bionic:
  New
Status in apt source package in Focal:
  New
Status in apt source package in Groovy:
  New

Bug description:
  [Impact]
  test-pdiff-usage is somewhat flaky, especially on Debian, this makes it less 
flaky. No end user impact as it's a test-only change.

  [Test plan]
  Running autopkgtest, which runs our extensive integration test suite which 
includes the changed test.

  [Where problems could occur]
  No end user regression potential on its own, but might slightly change 
regression potential for future pdiff changes:

  Test approach is slightly different now. It still catches that updates
  fail correctly, but tests more concretely that a transaction was
  aborted rather than that no worker received work (which was not
  guaranteed, the work could be scheduled before it was aborted).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1918920/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1918920] [NEW] Harden test for no new acquires after transaction abort

2021-03-12 Thread Julian Andres Klode
Public bug reported:

[Impact]
test-pdiff-usage is somewhat flaky, especially on Debian, this makes it less 
flaky. No end user impact as it's a test-only change.

[Test plan]
Running autopkgtest, which runs our extensive integration test suite which 
includes the changed test.

[Where problems could occur]
No end user regression potential on its own, but might slightly change 
regression potential for future pdiff changes:

Test approach is slightly different now. It still catches that updates
fail correctly, but tests more concretely that a transaction was aborted
rather than that no worker received work (which was not guaranteed, the
work could be scheduled before it was aborted).

** Affects: apt (Ubuntu)
 Importance: Undecided
 Status: Fix Committed

** Affects: apt (Ubuntu Bionic)
 Importance: Undecided
 Status: New

** Affects: apt (Ubuntu Focal)
 Importance: Undecided
 Status: New

** Affects: apt (Ubuntu Groovy)
 Importance: Undecided
 Status: New

** Also affects: apt (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: apt (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Also affects: apt (Ubuntu Bionic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1918920

Title:
  Harden test for no new acquires after transaction abort

Status in apt package in Ubuntu:
  Fix Committed
Status in apt source package in Bionic:
  New
Status in apt source package in Focal:
  New
Status in apt source package in Groovy:
  New

Bug description:
  [Impact]
  test-pdiff-usage is somewhat flaky, especially on Debian, this makes it less 
flaky. No end user impact as it's a test-only change.

  [Test plan]
  Running autopkgtest, which runs our extensive integration test suite which 
includes the changed test.

  [Where problems could occur]
  No end user regression potential on its own, but might slightly change 
regression potential for future pdiff changes:

  Test approach is slightly different now. It still catches that updates
  fail correctly, but tests more concretely that a transaction was
  aborted rather than that no worker received work (which was not
  guaranteed, the work could be scheduled before it was aborted).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1918920/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1894172] Re: isc-dhcp-server using wrong env variable for INTERFACES

2021-03-12 Thread Utkarsh Gupta
Hey,

The above regression was a false-positive; there were several retries,
all of them passed (cf:
https://autopkgtest.ubuntu.com/packages/c/chrony/bionic/armhf).

So this should be good to go (regression-wise)! \o/

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu.
https://bugs.launchpad.net/bugs/1894172

Title:
  isc-dhcp-server using wrong env variable for INTERFACES

Status in isc-dhcp package in Ubuntu:
  Fix Released
Status in isc-dhcp source package in Bionic:
  Fix Committed
Status in isc-dhcp source package in Focal:
  Fix Committed
Status in isc-dhcp source package in Groovy:
  Fix Committed

Bug description:
  [Impact]

  When checking isc-dhcp-server unit file it was seen that isc-dhcp-
  server is being started by:

  ConditionPathExists=/etc/default/isc-dhcp-server
  ConditionPathExists=|/etc/ltsp/dhcpd.conf
  ConditionPathExists=|/etc/dhcp/dhcpd.conf

  [Service]
  EnvironmentFile=/etc/default/isc-dhcp-server
  RuntimeDirectory=dhcp-server
  # The leases files need to be root:dhcpd even when dropping privileges
  ExecStart=/bin/sh -ec '\
  CONFIG_FILE=/etc/dhcp/dhcpd.conf; \
  if [ -f /etc/ltsp/dhcpd.conf ]; then CONFIG_FILE=/etc/ltsp/dhcpd.conf; 
fi; \
  [ -e /var/lib/dhcp/dhcpd.leases ] || touch /var/lib/dhcp/dhcpd.leases; \
  chown root:dhcpd /var/lib/dhcp /var/lib/dhcp/dhcpd.leases; \
  chmod 775 /var/lib/dhcp ; chmod 664 /var/lib/dhcp/dhcpd.leases; \
  exec dhcpd -user dhcpd -group dhcpd -f -4 -pf /run/dhcp-server/dhcpd.pid 
-cf $CONFIG_FILE $INTERFACES'

  But the /etc/default/isc-dhcp-server file sets $INTERFACESv4 and
  $INTERFACESv6.

  This causes the service to listen on all interfaces, which is what the
  user might not want. In case the user wants to use *only* IPv6 and not
  IPv4, this could maybe lead to problems as what the user intended to
  do could be really different from what the outcome turns out to be
  (because of this bug).

  The previous upload(er) forgot to mention (and split) the INTERFACES
  variable to v4 and v6 and as a result, it has been this way for so
  long.

  The SRU would split the variables into respective names, thereby
  making sure that what /etc/default/isc-dhcp-serve sets, is available
  in the respective service file.

  [Test Plan]

  To reproduce this bug, simply do the following:

  $ lxc launch ubuntu-daily:focal isc-dhcp-lp1894172-focal

  $ lxc shell isc-dhcp-lp1894172-focal

  # apt update && apt install isc-dhcp-server -y

  # grep "INTERFACES" /etc/default/isc-dhcp-server
  INTERFACESv4=""
  INTERFACESv6=""

  grep "INTERFACES" /lib/systemd/system/isc-dhcp-server.service
  exec dhcpd -user dhcpd -group dhcpd -f -4 -pf /run/dhcp-server/dhcpd.pid 
-cf $CONFIG_FILE $INTERFACES'

  # grep "INTERFACES" /lib/systemd/system/isc-dhcp-server6.service
  exec dhcpd -user dhcpd -group dhcpd -f -6 -pf /run/dhcp-server/dhcpd6.pid 
-cf $CONFIG_FILE $INTERFACES'

  With this, it is clearly visible that even though /lib/systemd/system
  /isc-dhcp-server{,6}.service file uses the INTERFACES variable but the
  /etc/default/isc-dhcp-server defines 2 different variables,
  INTERFACESv4 and INTERFACESv6.

  After the SRU is performed, the respective services files should use
  INTERFACESv4 and INTERFACESv6 variable, instead of just INTERFACES.

  To ensure smooth upgrade of this package, we'd check if the user
  hasn't manually set a INTERFACESv{4,6} variable to workaround this
  bug. If they have, then we simply check and make sure, we use the
  correct variable.

  [Where problems could occur]

  The problem could occur if the user has manually set some different
  workaround for this bug and so the usual upgrade could break some of
  their old configuration(s).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/1894172/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1918907] Re: Default Acquire::AllowReleaseInfoChange::Suite to "true"

2021-03-12 Thread Julian Andres Klode
** Also affects: apt (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: apt (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Also affects: apt (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

** Also affects: apt (Ubuntu Focal)
   Importance: Undecided
   Status: New

** No longer affects: apt (Ubuntu Hirsute)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1918907

Title:
  Default Acquire::AllowReleaseInfoChange::Suite to "true"

Status in apt package in Ubuntu:
  New
Status in apt source package in Bionic:
  New
Status in apt source package in Focal:
  New
Status in apt source package in Groovy:
  New

Bug description:
  [Impact]
  APT 1.6-2.0 deny third-party repositories from changing their Suite value. 
This change was reverted in later apt releases, and will be reverted in 1.8 in 
Debian as well, so for consistency, we want to push that change to stable

  [Test plan]
  We added test cases to our extensive integration test suite run by 
autopkgtest.

  [Where problems could occur]
  It's hard to imagine anything here, we simply turn the flag for allowed from 
false to true. We even add tests for Suite changes :)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1918907/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 1918907] [NEW] Default Acquire::AllowReleaseInfoChange::Suite to "true"

2021-03-12 Thread Julian Andres Klode
Public bug reported:

[Impact]
APT 1.6-2.0 deny third-party repositories from changing their Suite value. This 
change was reverted in later apt releases, and will be reverted in 1.8 in 
Debian as well, so for consistency, we want to push that change to stable

[Test plan]
We added test cases to our extensive integration test suite run by autopkgtest.

[Where problems could occur]
It's hard to imagine anything here, we simply turn the flag for allowed from 
false to true. We even add tests for Suite changes :)

** Affects: apt (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1918907

Title:
  Default Acquire::AllowReleaseInfoChange::Suite to "true"

Status in apt package in Ubuntu:
  New

Bug description:
  [Impact]
  APT 1.6-2.0 deny third-party repositories from changing their Suite value. 
This change was reverted in later apt releases, and will be reverted in 1.8 in 
Debian as well, so for consistency, we want to push that change to stable

  [Test plan]
  We added test cases to our extensive integration test suite run by 
autopkgtest.

  [Where problems could occur]
  It's hard to imagine anything here, we simply turn the flag for allowed from 
false to true. We even add tests for Suite changes :)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1918907/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp