[Touch-packages] [Bug 2021484] Re: Editing a VPN ask to introduce credentials but if you cancel can be accessed anyway

2023-10-06 Thread Launchpad Bug Tracker
[Expired for ubuntu-settings (Ubuntu) because there has been no activity
for 60 days.]

** Changed in: ubuntu-settings (Ubuntu)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-settings in Ubuntu.
https://bugs.launchpad.net/bugs/2021484

Title:
  Editing a VPN ask to introduce credentials but if you cancel can be
  accessed anyway

Status in ubuntu-settings package in Ubuntu:
  Expired

Bug description:
  I'm logged as a normal user without admin privileges. When I try to
  edit a VPN I'm asked to introduce the credentials of the admin,
  nevertheless if I click cancel I can still access to the VPN
  configuration.

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: ubuntu-settings 20.04.6
  ProcVersionSignature: Ubuntu 5.15.0-72.79~20.04.1-generic 5.15.98
  Uname: Linux 5.15.0-72-generic x86_64
  ApportVersion: 2.20.11-0ubuntu27.26
  Architecture: amd64
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Mon May 29 11:16:38 2023
  InstallationDate: Installed on 2022-05-04 (389 days ago)
  InstallationMedia: Ubuntu 20.04.3 LTS "Focal Fossa" - Release amd64 (20210819)
  PackageArchitecture: all
  SourcePackage: ubuntu-settings
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-settings/+bug/2021484/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2036467] Re: superblock checksum mismatch in resize2fs

2023-10-06 Thread Krister Johansen
Thanks for all the responses.  I'm not sure how quickly I'll be able to
get to this either, so I'm hesitant to commit to fixing myself.  That
said, if I can get time to send patches before your team gets to fixing
it, I'll do my best.

To answer the question about how frequently we see this: it was about
4-5 times a day until I applied the patches to our forked version of
e2fsprogs.

A few other things to note about what's going on here.  In 1.45.7,
e2fsprogs added some additional retries to the checksum validation path
on open:

https://git.kernel.org/pub/scm/fs/ext2/e2fsprogs.git/commit/?id=6338a8467564c3a0a12e9fcb08bdd748d736ac2f

I picked up this patch as well, and found that it helped a bit, but I
was still able to reproduce the problem with the reproducer that I
shared.

My team is running on the linux-aws-5.15 HWE kernel that's from jammy
but shipped to focal.  There's a kernel fix that may help with this
problem too, and it has been present since 5.10.  That said, I haven't
tested this on systems that are running 5.4.  (We don't have very many
of these anymore.)

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=05c2c00f3769abb9e323fcaca70d2de0b48af7ba

The 05c2c00f3769 ("ext4: protect superblock modifications with a buffer
lock") may help to ensure that the superblock contents are always
consistent on disk, prior to the DIO read, since the directio path
writes out any dirty cached sb pages prior to issuing the read.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to e2fsprogs in Ubuntu.
https://bugs.launchpad.net/bugs/2036467

Title:
  superblock checksum mismatch in resize2fs

Status in cloud-images:
  New
Status in e2fsprogs package in Ubuntu:
  Confirmed
Status in e2fsprogs source package in Focal:
  New
Status in e2fsprogs source package in Jammy:
  New
Status in e2fsprogs source package in Mantic:
  Confirmed

Bug description:
  Hi,
  We run ext4 on EBS volumes on EC2.  During provisioning, cloud-init will 
occasionally report that resize2fs has failed due to a superblock checksum 
mismatch.  We debugged this internally, and were able to come up with the 
following reproducer:

 #!/usr/bin/bash
 set -euxo pipefail

 while true
 do
 parted /dev/nvme1n1 mklabel gpt mkpart primary 2048s 2099200s
 sleep .5
 mkfs.ext4 /dev/nvme1n1p1
 mount -t ext4 /dev/nvme1n1p1 /mnt
 stress-ng --temp-path /mnt -D 4 &
 STRESS_PID=$!
 sleep 1
 growpart /dev/nvme1n1 1
 resize2fs /dev/nvme1n1p1
 kill $STRESS_PID
 wait $STRESS_PID
 umount /mnt
 wipefs -a /dev/nvme1n1p1
 wipefs -a /dev/nvme1n1
 done

  (This was on a 60gb gp3 volume attached to a c5.4xlarge)

  We were able to find a fix that works and get the patch accepted
  upstream.  The short explanation is that by switching the superblock
  read to direct io, we no longer see the problem.

  The patch is available here, but hasn't been published in a released
  version of e2fsprogs:

  
https://git.kernel.org/pub/scm/fs/ext2/e2fsprogs.git/commit/?id=43a498e938887956f393b5e45ea6ac79cc5f4b84

  A longer thread with the maintainer is available here:

  https://lore.kernel.org/linux-ext4/20230609042239.ga1436...@mit.edu/

  This bug report is to request that Ubuntu backport this patch to the
  versions of e2fsprogs that are in releases that are available in
  images on AWS, preferably Focal and Jammy.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/2036467/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038561] Re: Requesting Ubuntu package manager to release openssh updates to focal and jammy

2023-10-06 Thread Prashanth Suvarna
Hi Mitchell,

Thanks for taking a look at this bug report.

In my Ubuntu-22.04 environment, I am building openssl 3.1.2 myself,
packaging it and installing it on the box.

Instead of selectively taking one patch, would it be worth just moving the 
newer versions of openssh ?
Debian appear to have moved to 1:9.4p1-1 on their development branch 'sid'
https://packages.debian.org/sid/openssh-server

Would it be possible to see if the above version of the code builds
file? All the original sources plus debian's patches can be seen at :
https://packages.debian.org/source/sid/openssh

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/2038561

Title:
  Requesting Ubuntu package manager to release openssh updates to focal
  and jammy

Status in openssh package in Ubuntu:
  Incomplete

Bug description:
  We're are unable to test OpenSSL 3.1 versions on Ubuntu 22.04 and
  20.04 machines because the machine gets bricked and loses SSH after
  installation of OpenSSL 3.1.2.

  This is because SSHD gets restarted when OpenSSL 3.1 gets installed.
  But it fails to come up and we lose SSH access to the box.

  Debug logging on SSHD shows the below error when it tries to start : 
  OpenSSL version mismatch. Built against 3020, you have 30100020

  After researching in online forums, it appears that this is an OpenSSH bug 
and it's been fixed in version 9.4p1 and 9.5p1 via this fix : 
  
https://github.com/openssh/openssh-portable/commit/b7afd8a4ecaca8afd3179b55e9db79c0ff210237

  However, it appears that only 8.9p1 version of openssh-client and
  openssh-server are available in Ubuntu packages.

  Requesting you to please release openssh versions 9.4p1 or 9.5p1 on
  Jammy and Focal which will help us move past this bug and start
  testing OpenSSL 3.1 for our use cases.

  
  Additional information about our environment:
  $ lsb_release -rd
  Description:  Ubuntu 22.04.3 LTS
  Release:  22.04

  $ apt-cache policy openssh-server
  openssh-server:
Installed: 1:8.9p1-3ubuntu0.4
Candidate: 1:8.9p1-3ubuntu0.4
Version table:
   *** 1:8.9p1-3ubuntu0.4 500
  500 http://us-west-2.ec2.archive.ubuntu.com/ubuntu jammy-updates/main 
amd64 Packages
  100 /var/lib/dpkg/status
   1:8.9p1-3ubuntu0.3 500
  500 http://security.ubuntu.com/ubuntu jammy-security/main amd64 
Packages
   1:8.9p1-3 500
  500 http://us-west-2.ec2.archive.ubuntu.com/ubuntu jammy/main amd64 
Packages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2038561/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2037417] Re: mantic images after 20230917 are failing to deploy with failure to mount root and kernel filesystems

2023-10-06 Thread Francis Ginther
Special maas image built with util-linux, 2.39.1-4ubuntu2, from
https://ppa.launchpadcontent.net/xnox/release-critical/ubuntu is looking
good. I have one machine deployed with this:

ubuntu@rumford:~$ uname -r
6.5.0-5-lowlatency
ubuntu@rumford:~$ apt-cache policy util-linux
util-linux:
  Installed: 2.39.1-4ubuntu2
  Candidate: 2.39.1-4ubuntu2
  Version table:
 *** 2.39.1-4ubuntu2 500
500 https://ppa.launchpadcontent.net/xnox/release-critical/ubuntu 
mantic/main amd64 Packages
100 /var/lib/dpkg/status
 2.39.1-4ubuntu1 500
500 http://archive.ubuntu.com/ubuntu mantic/main amd64 Packages
ubuntu@rumford:~$ cat /etc/cloud/build.info 
build_name: server
serial: 20231006.1732

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/2037417

Title:
  mantic images after 20230917 are failing to deploy with failure to
  mount root and kernel filesystems

Status in cloud-images:
  New
Status in maas-images:
  Confirmed
Status in The Ubuntu-power-systems project:
  Invalid
Status in Release Notes for Ubuntu:
  New
Status in linux package in Ubuntu:
  Invalid
Status in systemd package in Ubuntu:
  Invalid
Status in util-linux package in Ubuntu:
  Triaged
Status in linux source package in Mantic:
  Invalid
Status in systemd source package in Mantic:
  Invalid
Status in util-linux source package in Mantic:
  Triaged

Bug description:
  Mantic arm64 deploys started failing on Sept 18th with:

  [   41.913552] systemd[1]: Starting systemd-remount-fs.service - Remount Root 
and Kernel File Systems...
   Starting systemd-remount-f鈥t Root and Kernel File 
Systems...
  [   41.940748] systemd[1]: Starting systemd-udev-trigger.service - Coldplug 
All udev Devices...
   Starting systemd-udev-trig鈥0m - Coldplug All udev 
Devices...
  [   41.964758] systemd[1]: Started systemd-journald.service - Journal Service.
  [  OK  ] Started systemd-journald.service - Journal 
Service.
  [  OK  ] Mounted dev-hugepages.mount - Huge Pages 
File System.
  [  OK  ] Mounted dev-mqueue.mount[鈥�- POSIX Message 
Queue File System.
  [  OK  ] Mounted sys-kernel-debug.m鈥t - Kernel Debug 
File System.
  [  OK  ] Mounted sys-kernel-tracing鈥t - Kernel Trace 
File System.
  [  OK  ] Finished keyboard-setup.se鈥�- Set the console 
keyboard layout.
  [  OK  ] Finished kmod-static-nodes鈥eate List of Static 
Device Nodes.
  [  OK  ] Finished lvm2-monitor.serv鈥ing dmeventd or 
progress polling.
  [  OK  ] Finished modprobe@configfs鈥0m - Load Kernel 
Module configfs.
  [  OK  ] Finished modprobe@dm_mod.s鈥 - Load Kernel 
Module dm_mod.
  [  OK  ] Finished modprobe@drm.service - Load Kernel 
Module drm.
  [  OK  ] Finished modprobe@efi_psto鈥 - Load Kernel 
Module efi_pstore.
  [  OK  ] Finished modprobe@fuse.service - Load Kernel 
Module fuse.
  [  OK  ] Finished modprobe@loop.service - Load Kernel 
Module loop.
  [  OK  ] Finished systemd-modules-l鈥ervice - Load 
Kernel Modules.
  [FAILED] Failed to start systemd-re鈥unt Root and 
Kernel File Systems.
  See 'systemctl status systemd-remount-fs.service' for details.

  After this many other services and cloud-init fails. See the full
  kopter-0918.log. For comparison, a log from the prior day's test is
  also attached.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/2037417/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2037417] Re: mantic images after 20230917 are failing to deploy with failure to mount root and kernel filesystems

2023-10-06 Thread Dimitri John Ledkov
** Changed in: util-linux (Ubuntu Mantic)
   Status: New => Triaged

** Changed in: util-linux (Ubuntu Mantic)
   Importance: Undecided => Critical

** Changed in: systemd (Ubuntu Mantic)
   Status: Confirmed => Incomplete

** Changed in: linux (Ubuntu Mantic)
   Status: Incomplete => Invalid

** Changed in: systemd (Ubuntu Mantic)
   Status: Incomplete => Invalid

** Changed in: ubuntu-power-systems
   Status: Confirmed => Invalid

** Changed in: maas-images
   Status: New => Confirmed

** Also affects: cloud-images
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/2037417

Title:
  mantic images after 20230917 are failing to deploy with failure to
  mount root and kernel filesystems

Status in cloud-images:
  New
Status in maas-images:
  Confirmed
Status in The Ubuntu-power-systems project:
  Invalid
Status in Release Notes for Ubuntu:
  New
Status in linux package in Ubuntu:
  Invalid
Status in systemd package in Ubuntu:
  Invalid
Status in util-linux package in Ubuntu:
  Triaged
Status in linux source package in Mantic:
  Invalid
Status in systemd source package in Mantic:
  Invalid
Status in util-linux source package in Mantic:
  Triaged

Bug description:
  Mantic arm64 deploys started failing on Sept 18th with:

  [   41.913552] systemd[1]: Starting systemd-remount-fs.service - Remount Root 
and Kernel File Systems...
   Starting systemd-remount-f鈥t Root and Kernel File 
Systems...
  [   41.940748] systemd[1]: Starting systemd-udev-trigger.service - Coldplug 
All udev Devices...
   Starting systemd-udev-trig鈥0m - Coldplug All udev 
Devices...
  [   41.964758] systemd[1]: Started systemd-journald.service - Journal Service.
  [  OK  ] Started systemd-journald.service - Journal 
Service.
  [  OK  ] Mounted dev-hugepages.mount - Huge Pages 
File System.
  [  OK  ] Mounted dev-mqueue.mount[鈥�- POSIX Message 
Queue File System.
  [  OK  ] Mounted sys-kernel-debug.m鈥t - Kernel Debug 
File System.
  [  OK  ] Mounted sys-kernel-tracing鈥t - Kernel Trace 
File System.
  [  OK  ] Finished keyboard-setup.se鈥�- Set the console 
keyboard layout.
  [  OK  ] Finished kmod-static-nodes鈥eate List of Static 
Device Nodes.
  [  OK  ] Finished lvm2-monitor.serv鈥ing dmeventd or 
progress polling.
  [  OK  ] Finished modprobe@configfs鈥0m - Load Kernel 
Module configfs.
  [  OK  ] Finished modprobe@dm_mod.s鈥 - Load Kernel 
Module dm_mod.
  [  OK  ] Finished modprobe@drm.service - Load Kernel 
Module drm.
  [  OK  ] Finished modprobe@efi_psto鈥 - Load Kernel 
Module efi_pstore.
  [  OK  ] Finished modprobe@fuse.service - Load Kernel 
Module fuse.
  [  OK  ] Finished modprobe@loop.service - Load Kernel 
Module loop.
  [  OK  ] Finished systemd-modules-l鈥ervice - Load 
Kernel Modules.
  [FAILED] Failed to start systemd-re鈥unt Root and 
Kernel File Systems.
  See 'systemctl status systemd-remount-fs.service' for details.

  After this many other services and cloud-init fails. See the full
  kopter-0918.log. For comparison, a log from the prior day's test is
  also attached.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/2037417/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038439] Re: Update network-manager to 1.44.2

2023-10-06 Thread Launchpad Bug Tracker
This bug was fixed in the package network-manager - 1.44.2-1ubuntu1

---
network-manager (1.44.2-1ubuntu1) mantic; urgency=medium

  * Merge with Debian (LP: #2038439)

network-manager (1.44.2-1) unstable; urgency=medium

  * New upstream version 1.44.2
  * Rebase patches

 -- Jeremy Bícha   Wed, 04 Oct 2023 09:40:22 -0400

** Changed in: network-manager (Ubuntu)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/2038439

Title:
  Update network-manager to 1.44.2

Status in network-manager package in Ubuntu:
  Fix Released

Bug description:
  New upstream bugfix release in the stable 1.44 series

  
https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/compare/1.44.0...1.44.2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/2038439/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038567] Re: Disable restricting unprivileged change_profile by default, due to LXD latest/stable not yet compatible with this new apparmor feature

2023-10-06 Thread Dimitri John Ledkov
Fix under review https://lists.ubuntu.com/archives/kernel-
team/2023-October/146015.html

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/2038567

Title:
  Disable restricting unprivileged change_profile by default, due to LXD
  latest/stable not yet compatible with this new apparmor feature

Status in Release Notes for Ubuntu:
  New
Status in apparmor package in Ubuntu:
  New
Status in linux package in Ubuntu:
  Triaged
Status in lxd package in Ubuntu:
  Triaged
Status in snapd package in Ubuntu:
  New

Bug description:
  Following upgrade to 6.5.0-7 kernel in mantic cloud images we are
  seeing a regression in our cloud image tests. The test runs the
  following:

  ```
  lxd init --auto --storage-backend dir
  lxc launch ubuntu-daily:mantic mantic
  lxc info mantic
  lxc exec mantic -- cloud-init status --wait
  ```

  The `lxc exec mantic -- cloud-init status --wait` times out after 240s
  and will fail our test as a result.

  I have been able to replicate in a local VM

  ```
  wget 
http://cloud-images.ubuntu.com/mantic/20231005/mantic-server-cloudimg-amd64.img 
  wget --output-document=launch-qcow2-image-qemu.sh 
https://gist.githubusercontent.com/philroche/14c241c086a5730481e24178b654268f/raw/7af95cd4dfc8e1d0600e6118803d2c866765714e/gistfile1.txt
 
  chmod +x launch-qcow2-image-qemu.sh 

  ./launch-qcow2-image-qemu.sh --password passw0rd --image 
./mantic-server-cloudimg-amd64.img 
  cat < "./reproducer.sh"
  #!/bin/bash -eux
  lxd init --auto --storage-backend dir
  lxc launch ubuntu-daily:mantic mantic
  lxc info mantic
  lxc exec mantic -- cloud-init status --wait
  EOF
  chmod +x ./reproducer.sh
  sshpass -p passw0rd scp -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -P  ./reproducer.sh ubuntu@127.0.0.1:~/
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 sudo apt-get update
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 sudo apt-get upgrade 
--assume-yes
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 ./reproducer.sh
  ```

  The issue is not present with the 6.5.0-5 kernel and the issue is
  present regardless of the container launched. I tried the jammy
  container to test this.

  From my test VM

  ```
  ubuntu@cloudimg:~$ uname --all
  Linux cloudimg 6.5.0-7-generic #7-Ubuntu SMP PREEMPT_DYNAMIC Fri Sep 29 
09:14:56 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux
  ubuntu@cloudimg:~$ uname --kernel-release
  6.5.0-7-generic
  ```

  This is a regression in our test that will block 23.10 cloud image
  release next week.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/2038567/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2036128] Re: [FFe] enable unprivileged user namespace restrictions by default for mantic

2023-10-06 Thread John Johansen
Closing this FFe, it needs to wait on the next LXD releases in a few
weeks and it is already too late to land this in Mantic.

If it is to land it will have to be done via an SRU after the LXD
releases, and verification that all is good with LXD.

Marking as invalid and unsubscribing the release team.

** Changed in: apparmor (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/2036128

Title:
  [FFe] enable unprivileged user namespace restrictions by default for
  mantic

Status in apparmor package in Ubuntu:
  Invalid

Bug description:
  As per https://discourse.ubuntu.com/t/spec-unprivileged-user-
  namespace-restrictions-via-apparmor-in-ubuntu-23-10/37626,
  unprivileged user namespace restrictions for Ubuntu 23.10 are to be
  enabled by default via a sysctl.d conf file in apparmor.

  In https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2035315 new
  apparmor profiles were added to the apparmor package for various
  applications which require unprivileged user namespaces, using a new
  unconfined profile mode. To support this an additional change was
  added to the mantic kernel in https://git.launchpad.net/~ubuntu-
  kernel/ubuntu/+source/linux/+git/mantic/commit?h=master-
  next=7327726a2dbf571e05f7c095916dcce0347790b4 which is still
  currently unreleased.

  Without this kernel change, if userns restrictions are enabled the
  existing policies added above will not actually work to allow them to
  be used by the various applications. As such we need to ensure that
  userns restrictions are not enabled via sysctl when this feature is
  not present / enabled.

  Whilst it may be possible to capture the dependency logic via
  `Breaks:` or similar, this would not help in the case that a user
  booted into an older kernel with the new apparmor userspace package.

  As such, as well as enabling the sysctl via the sysctl.d conf file, it
  is proposed to add logic into the apparmor.service systemd unit to
  check that the kernel supports the aforementioned unconfined profile
  mode and that it is enabled - and if not then to force disable the
  userns restrictions sysctl via the following logic:

  userns_restricted=$(sysctl -n kernel.apparmor_restrict_unprivileged_userns)
  unconfined_userns=$([ -f 
/sys/kernel/security/apparmor/features/policy/unconfined_restrictions/userns ] 
&& cat 
/sys/kernel/security/apparmor/features/policy/unconfined_restrictions/userns || 
echo 0)
  if [ -n "$userns_restricted" ] && [ "$userns_restricted" -eq 1 ]; then
    if [ "$unconfined_userns" -eq 0 ]; then
  # userns restrictions rely on unconfined userns to be supported
  echo "disabling unprivileged userns restrictions since unconfined userns 
is not supported / enabled"
  sysctl -w kernel.apparmor_restrict_unprivileged_userns=0
    fi
  fi

  this allows a local admin to disable the sysctl via the regular
  sysctl.d conf approach, but to also make sure we don't inadvertently
  enable it when it is not supported by the kernel.

  This proposed change has been tested via the QA Regression Testing
  project, in particular with the specific test added in
  https://git.launchpad.net/qa-regression-
  testing/commit/?id=6f2c5ab7c8659174adac772ce0e894328bb5045d

  This produces the following output, confirming the fallback works as
  expected on the current mantic kernel (which does not fully support
  the userns restrictions):

  
---

  Running test: './test-apparmor.py' distro: 'Ubuntu 23.10' kernel: '6.5.0-5.5 
(Ubuntu 6.5.0-5.5-generic 6.5.0)' arch: 'amd64' init: 'systemd' uid: 0/0 
SUDO_USER: 'ubuntu')
  test_unconfined_userns (__main__.ApparmorTest.test_unconfined_userns)
  Test that unconfined userns restrictions are applied ... Skipping private 
tests

  WARN: kernel rate limiting in effect
  Disabling ratelimiting until the next reboot. To renable, run:
  # sysctl -w kernel.printk_ratelimit=5

  (enabling userns restrictions) (restarting apparmor) (checking userns
  restrictions got disabled) ok

  --
  Ran 1 test in 0.232s

  OK

  
---

  
  Also we can see on a fresh-boot with this new version installed that 
apparmor.service shows it has disabled the sysctl before loading any profiles 
even though the conf file has it enabled - and finally we can see that unshare 
-U works as expected:

  root@sec-mantic-amd64:~# uptime
   07:04:48 up 0 min,  0 user,  load average: 0.00, 0.00, 0.00

  root@sec-mantic-amd64:~# journalctl -b0 --unit apparmor.service --no-pager
  Sep 15 07:04:47 sec-mantic-amd64 systemd[1]: Starting apparmor.service - Load 
AppArmor profiles...
  Sep 15 07:04:47 sec-mantic-amd64 apparmor.systemd[308]: 

[Touch-packages] [Bug 2038561] Re: Requesting Ubuntu package manager to release openssh updates to focal and jammy

2023-10-06 Thread Mitchell Dzurick
** Changed in: openssh (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/2038561

Title:
  Requesting Ubuntu package manager to release openssh updates to focal
  and jammy

Status in openssh package in Ubuntu:
  Incomplete

Bug description:
  We're are unable to test OpenSSL 3.1 versions on Ubuntu 22.04 and
  20.04 machines because the machine gets bricked and loses SSH after
  installation of OpenSSL 3.1.2.

  This is because SSHD gets restarted when OpenSSL 3.1 gets installed.
  But it fails to come up and we lose SSH access to the box.

  Debug logging on SSHD shows the below error when it tries to start : 
  OpenSSL version mismatch. Built against 3020, you have 30100020

  After researching in online forums, it appears that this is an OpenSSH bug 
and it's been fixed in version 9.4p1 and 9.5p1 via this fix : 
  
https://github.com/openssh/openssh-portable/commit/b7afd8a4ecaca8afd3179b55e9db79c0ff210237

  However, it appears that only 8.9p1 version of openssh-client and
  openssh-server are available in Ubuntu packages.

  Requesting you to please release openssh versions 9.4p1 or 9.5p1 on
  Jammy and Focal which will help us move past this bug and start
  testing OpenSSL 3.1 for our use cases.

  
  Additional information about our environment:
  $ lsb_release -rd
  Description:  Ubuntu 22.04.3 LTS
  Release:  22.04

  $ apt-cache policy openssh-server
  openssh-server:
Installed: 1:8.9p1-3ubuntu0.4
Candidate: 1:8.9p1-3ubuntu0.4
Version table:
   *** 1:8.9p1-3ubuntu0.4 500
  500 http://us-west-2.ec2.archive.ubuntu.com/ubuntu jammy-updates/main 
amd64 Packages
  100 /var/lib/dpkg/status
   1:8.9p1-3ubuntu0.3 500
  500 http://security.ubuntu.com/ubuntu jammy-security/main amd64 
Packages
   1:8.9p1-3 500
  500 http://us-west-2.ec2.archive.ubuntu.com/ubuntu jammy/main amd64 
Packages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2038561/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038567] Re: Disable restricting unprivileged change_profile by default, due to LXD latest/stable not yet compatible with this new apparmor feature

2023-10-06 Thread John Johansen
Fix for the ptrace issue


** Patch added: 
"0001-UBUNTU-SAUCE-no-up-apparmor-disable-1ea37b26d720-UBU.patch"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2038567/+attachment/5707461/+files/0001-UBUNTU-SAUCE-no-up-apparmor-disable-1ea37b26d720-UBU.patch

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/2038567

Title:
  Disable restricting unprivileged change_profile by default, due to LXD
  latest/stable not yet compatible with this new apparmor feature

Status in Release Notes for Ubuntu:
  New
Status in apparmor package in Ubuntu:
  New
Status in linux package in Ubuntu:
  Triaged
Status in lxd package in Ubuntu:
  Triaged
Status in snapd package in Ubuntu:
  New

Bug description:
  Following upgrade to 6.5.0-7 kernel in mantic cloud images we are
  seeing a regression in our cloud image tests. The test runs the
  following:

  ```
  lxd init --auto --storage-backend dir
  lxc launch ubuntu-daily:mantic mantic
  lxc info mantic
  lxc exec mantic -- cloud-init status --wait
  ```

  The `lxc exec mantic -- cloud-init status --wait` times out after 240s
  and will fail our test as a result.

  I have been able to replicate in a local VM

  ```
  wget 
http://cloud-images.ubuntu.com/mantic/20231005/mantic-server-cloudimg-amd64.img 
  wget --output-document=launch-qcow2-image-qemu.sh 
https://gist.githubusercontent.com/philroche/14c241c086a5730481e24178b654268f/raw/7af95cd4dfc8e1d0600e6118803d2c866765714e/gistfile1.txt
 
  chmod +x launch-qcow2-image-qemu.sh 

  ./launch-qcow2-image-qemu.sh --password passw0rd --image 
./mantic-server-cloudimg-amd64.img 
  cat < "./reproducer.sh"
  #!/bin/bash -eux
  lxd init --auto --storage-backend dir
  lxc launch ubuntu-daily:mantic mantic
  lxc info mantic
  lxc exec mantic -- cloud-init status --wait
  EOF
  chmod +x ./reproducer.sh
  sshpass -p passw0rd scp -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -P  ./reproducer.sh ubuntu@127.0.0.1:~/
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 sudo apt-get update
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 sudo apt-get upgrade 
--assume-yes
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 ./reproducer.sh
  ```

  The issue is not present with the 6.5.0-5 kernel and the issue is
  present regardless of the container launched. I tried the jammy
  container to test this.

  From my test VM

  ```
  ubuntu@cloudimg:~$ uname --all
  Linux cloudimg 6.5.0-7-generic #7-Ubuntu SMP PREEMPT_DYNAMIC Fri Sep 29 
09:14:56 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux
  ubuntu@cloudimg:~$ uname --kernel-release
  6.5.0-7-generic
  ```

  This is a regression in our test that will block 23.10 cloud image
  release next week.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/2038567/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038561] Re: Requesting Ubuntu package manager to release openssh updates to focal and jammy

2023-10-06 Thread Mitchell Dzurick
Hello Prashanth, thank you very much for making this bug report and
making Ubuntu better!

Are you building openssl 3.1.2 or pulling the package from somewhere?

I tried installing a slightly newer version in a jammy LXC container and
see this error when trying to install libssl3 (a requirement to install
the newer openssl package).

I did:
$ lxc launch ubuntu:jammy j
$ lxc shell j
# apt install -y ssh
# wget 
http://ftp.us.debian.org/debian/pool/main/o/openssl/libssl3_3.1.3-1_amd64.deb
# dpkg -i libssl3_3.1.3-1_amd64.deb
dpkg: regarding libssl3_3.1.3-1_amd64.deb containing libssl3:amd64:
 libssl3:amd64 breaks openssh-client (<< 1:9.4p1)
  openssh-client (version 1:8.9p1-3ubuntu0.4) is present and installed.

dpkg: error processing archive libssl3_3.1.3-1_amd64.deb (--install):
 installing libssl3:amd64 would break openssh-client, and
 deconfiguration is not permitted (--auto-deconfigure might help)
Errors were encountered while processing:
 libssl3_3.1.3-1_amd64.deb

So the package is aware that this configuration will not work.


FWIW I tried adding the patch you mentioned into openssh, and it builds fine, 
but one of the tests now fails - 
https://launchpad.net/~mitchdz/+archive/ubuntu/lp2038561-openssh-version-mismatch/+packages

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/2038561

Title:
  Requesting Ubuntu package manager to release openssh updates to focal
  and jammy

Status in openssh package in Ubuntu:
  Incomplete

Bug description:
  We're are unable to test OpenSSL 3.1 versions on Ubuntu 22.04 and
  20.04 machines because the machine gets bricked and loses SSH after
  installation of OpenSSL 3.1.2.

  This is because SSHD gets restarted when OpenSSL 3.1 gets installed.
  But it fails to come up and we lose SSH access to the box.

  Debug logging on SSHD shows the below error when it tries to start : 
  OpenSSL version mismatch. Built against 3020, you have 30100020

  After researching in online forums, it appears that this is an OpenSSH bug 
and it's been fixed in version 9.4p1 and 9.5p1 via this fix : 
  
https://github.com/openssh/openssh-portable/commit/b7afd8a4ecaca8afd3179b55e9db79c0ff210237

  However, it appears that only 8.9p1 version of openssh-client and
  openssh-server are available in Ubuntu packages.

  Requesting you to please release openssh versions 9.4p1 or 9.5p1 on
  Jammy and Focal which will help us move past this bug and start
  testing OpenSSL 3.1 for our use cases.

  
  Additional information about our environment:
  $ lsb_release -rd
  Description:  Ubuntu 22.04.3 LTS
  Release:  22.04

  $ apt-cache policy openssh-server
  openssh-server:
Installed: 1:8.9p1-3ubuntu0.4
Candidate: 1:8.9p1-3ubuntu0.4
Version table:
   *** 1:8.9p1-3ubuntu0.4 500
  500 http://us-west-2.ec2.archive.ubuntu.com/ubuntu jammy-updates/main 
amd64 Packages
  100 /var/lib/dpkg/status
   1:8.9p1-3ubuntu0.3 500
  500 http://security.ubuntu.com/ubuntu jammy-security/main amd64 
Packages
   1:8.9p1-3 500
  500 http://us-west-2.ec2.archive.ubuntu.com/ubuntu jammy/main amd64 
Packages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2038561/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038567] Re: Disable restricting unprivileged change_profile by default, due to LXD latest/snap not yet compatible with this new apparmor feature

2023-10-06 Thread Dimitri John Ledkov
** Summary changed:

- Mantic 6.5.0-7 kernel causes regression in LXD container usage
+ Disable restricting unprivileged change_profile by default, due to LXD 
latest/snap not yet compatible with this new apparmor feature

** Changed in: lxd (Ubuntu)
   Importance: Undecided => High

** Changed in: lxd (Ubuntu)
   Status: New => Triaged

** Changed in: linux (Ubuntu)
   Status: Incomplete => Triaged

** Summary changed:

- Disable restricting unprivileged change_profile by default, due to LXD 
latest/snap not yet compatible with this new apparmor feature
+ Disable restricting unprivileged change_profile by default, due to LXD 
latest/stable not yet compatible with this new apparmor feature

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/2038567

Title:
  Disable restricting unprivileged change_profile by default, due to LXD
  latest/stable not yet compatible with this new apparmor feature

Status in Release Notes for Ubuntu:
  New
Status in apparmor package in Ubuntu:
  New
Status in linux package in Ubuntu:
  Triaged
Status in lxd package in Ubuntu:
  Triaged
Status in snapd package in Ubuntu:
  New

Bug description:
  Following upgrade to 6.5.0-7 kernel in mantic cloud images we are
  seeing a regression in our cloud image tests. The test runs the
  following:

  ```
  lxd init --auto --storage-backend dir
  lxc launch ubuntu-daily:mantic mantic
  lxc info mantic
  lxc exec mantic -- cloud-init status --wait
  ```

  The `lxc exec mantic -- cloud-init status --wait` times out after 240s
  and will fail our test as a result.

  I have been able to replicate in a local VM

  ```
  wget 
http://cloud-images.ubuntu.com/mantic/20231005/mantic-server-cloudimg-amd64.img 
  wget --output-document=launch-qcow2-image-qemu.sh 
https://gist.githubusercontent.com/philroche/14c241c086a5730481e24178b654268f/raw/7af95cd4dfc8e1d0600e6118803d2c866765714e/gistfile1.txt
 
  chmod +x launch-qcow2-image-qemu.sh 

  ./launch-qcow2-image-qemu.sh --password passw0rd --image 
./mantic-server-cloudimg-amd64.img 
  cat < "./reproducer.sh"
  #!/bin/bash -eux
  lxd init --auto --storage-backend dir
  lxc launch ubuntu-daily:mantic mantic
  lxc info mantic
  lxc exec mantic -- cloud-init status --wait
  EOF
  chmod +x ./reproducer.sh
  sshpass -p passw0rd scp -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -P  ./reproducer.sh ubuntu@127.0.0.1:~/
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 sudo apt-get update
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 sudo apt-get upgrade 
--assume-yes
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 ./reproducer.sh
  ```

  The issue is not present with the 6.5.0-5 kernel and the issue is
  present regardless of the container launched. I tried the jammy
  container to test this.

  From my test VM

  ```
  ubuntu@cloudimg:~$ uname --all
  Linux cloudimg 6.5.0-7-generic #7-Ubuntu SMP PREEMPT_DYNAMIC Fri Sep 29 
09:14:56 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux
  ubuntu@cloudimg:~$ uname --kernel-release
  6.5.0-7-generic
  ```

  This is a regression in our test that will block 23.10 cloud image
  release next week.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/2038567/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038681] Re: nvidia-driver-535.113.01 crash

2023-10-06 Thread Bert RAM Aerts
** Package changed: xorg (Ubuntu) => nvidia-graphics-drivers-535
(Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/2038681

Title:
  nvidia-driver-535.113.01 crash

Status in nvidia-graphics-drivers-535 package in Ubuntu:
  New

Bug description:
  It was running RealVNC server, VMware Workstation Pro with Windows 11 guest, 
Firefox and Thunderbird.
  I used it with RealVNC Viewer on another machine and suddenly my VNC 
connection dropped.
  Coming to my nVIDIA laptop it was showing no gnome desktop anymore but a 
black screen.
  I could still ssh to the laptop to trigger a reboot.
  Via journalctl I saw that nVIDIA driver had crashed.
  I have seen this now with both
  535.113.01-0ubuntu0.23.04.1 
  535.113.01-0ubuntu0.23.04.3 
   
  Oct 06 17:01:57 legion5ubuntu /usr/libexec/gdm-x-session[3110]: (EE) 
NVIDIA(0): The NVIDIA X driver has encountered an error; attempting to
  Oct 06 17:01:57 legion5ubuntu /usr/libexec/gdm-x-session[3110]: (EE) 
NVIDIA(0): recover...
  Oct 06 17:02:37 legion5ubuntu /usr/libexec/gdm-x-session[3110]: (EE) 
NVIDIA(GPU-0): Failed to initialize DMA.
  Oct 06 17:02:37 legion5ubuntu /usr/libexec/gdm-x-session[3110]: (EE) 
NVIDIA(0): Failed to allocate push buffer
  Oct 06 17:02:37 legion5ubuntu /usr/libexec/gdm-x-session[3110]: (EE) 
NVIDIA(0): Error recovery failed.
  Oct 06 17:02:37 legion5ubuntu /usr/libexec/gdm-x-session[3110]: (EE) 
NVIDIA(0):  *** Aborting ***
  Oct 06 17:02:37 legion5ubuntu /usr/libexec/gdm-x-session[3110]: (EE)
  Oct 06 17:02:37 legion5ubuntu /usr/libexec/gdm-x-session[3110]: Fatal server 
error:
  Oct 06 17:02:37 legion5ubuntu /usr/libexec/gdm-x-session[3110]: (EE) Failed 
to recover from error!

  ProblemType: Bug
  DistroRelease: Ubuntu 23.04
  Package: xorg 1:7.7+23ubuntu2
  ProcVersionSignature: Ubuntu 6.2.0-34.34-generic 6.2.16
  Uname: Linux 6.2.0-34-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  .proc.driver.nvidia.capabilities.gpu0: Error: path was not a regular file.
  .proc.driver.nvidia.capabilities.mig: Error: path was not a regular file.
  .proc.driver.nvidia.gpus..01.00.0: Error: path was not a regular file.
  .proc.driver.nvidia.registry: Binary: ""
  .proc.driver.nvidia.suspend: suspend hibernate resume
  .proc.driver.nvidia.suspend_depth: default modeset uvm
  .proc.driver.nvidia.version:
   NVRM version: NVIDIA UNIX x86_64 Kernel Module  535.113.01  Tue Sep 12 
19:41:24 UTC 2023
   GCC version:  gcc version 12.3.0 (Ubuntu 12.3.0-1ubuntu1~23.04)
  ApportVersion: 2.26.1-0ubuntu2
  Architecture: amd64
  BootLog: Error: [Errno 13] Permission denied: '/var/log/boot.log'
  CasperMD5CheckResult: pass
  CompositorRunning: None
  CurrentDesktop: GNOME
  Date: Fri Oct  6 19:12:16 2023
  DistUpgraded: 2023-04-14 13:11:36,442 DEBUG Running PostInstallScript: 
'/usr/lib/ubuntu-advantage/upgrade_lts_contract.py'
  DistroCodename: lunar
  DistroVariant: ubuntu
  DkmsStatus:
   nvidia/535.113.01, 6.2.0-33-generic, x86_64: installed
   nvidia/535.113.01, 6.2.0-34-generic, x86_64: installed
  ExtraDebuggingInterest: Yes
  GraphicsCard:
   NVIDIA Corporation TU106M [GeForce RTX 2060 Mobile] [10de:1f15] (rev a1) 
(prog-if 00 [VGA controller])
 Subsystem: Lenovo TU106M [GeForce RTX 2060 Mobile] [17aa:3f8c]
  InstallationDate: Installed on 2021-05-17 (871 days ago)
  InstallationMedia: Ubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: LENOVO 81Y6
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-6.2.0-34-generic 
root=UUID=998a3bca-88e2-4d44-ab68-6776750daa09 ro nvidia-drm.modeset=1 
acpi_backlight=native nvidia.NVreg_RegistryDwords=EnableBrightnessControl=1
  SourcePackage: xorg
  Symptom: display
  Title: Xorg crash
  UpgradeStatus: Upgraded to lunar on 2023-04-14 (175 days ago)
  dmi.bios.date: 06/09/2023
  dmi.bios.release: 1.59
  dmi.bios.vendor: LENOVO
  dmi.bios.version: EFCN59WW
  dmi.board.asset.tag: NO Asset Tag
  dmi.board.name: LNVNB161216
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0R32862 WIN
  dmi.chassis.asset.tag: NO Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Lenovo Legion 5 15IMH05H
  dmi.ec.firmware.release: 1.59
  dmi.modalias: 
dmi:bvnLENOVO:bvrEFCN59WW:bd06/09/2023:br1.59:efr1.59:svnLENOVO:pn81Y6:pvrLenovoLegion515IMH05H:rvnLENOVO:rnLNVNB161216:rvrSDK0R32862WIN:cvnLENOVO:ct10:cvrLenovoLegion515IMH05H:skuLENOVO_MT_81Y6_BU_idea_FM_Legion515IMH05H:
  dmi.product.family: Legion 5 15IMH05H
  dmi.product.name: 81Y6
  dmi.product.sku: LENOVO_MT_81Y6_BU_idea_FM_Legion 5 15IMH05H
  dmi.product.version: Lenovo Legion 5 15IMH05H
  dmi.sys.vendor: LENOVO
  version.compiz: compiz N/A
  version.libdrm2: libdrm2 2.4.114-1
  version.libgl1-mesa-dri: libgl1-mesa-dri 23.0.4-0ubuntu1~23.04.1
  version.libgl1-mesa-glx: libgl1-mesa-glx N/A
  version.nvidia-graphics-drivers: nvidia-graphics-drivers-* N/A
  version.xserver-xorg-core: 

[Touch-packages] [Bug 2038567] Re: Mantic 6.5.0-7 kernel causes regression in LXD container usage

2023-10-06 Thread John Johansen
Thanks John,

it has been confirmed that

1ea37b26d720 UBUNTU: SAUCE: apparmor4.0.0 [73/76]: userns - allow
restricting unprivileged change_profile

is causing the issue. It has a sysctl to disable its behavior, but the sysctl 
can't be defaulted to off in the kernel. So to disable the sysctl, either
1. lxd needs to do it dynamically like it is doing for some other sysctls
2. we need the disable it at the system level
3. we revert the patch

For the time frame we are looking at, I recommend reverting the patch.
Doing so will not materially affect the userns mediation feature. This
patch is about closing off a confinement escape.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/2038567

Title:
  Mantic 6.5.0-7 kernel causes regression in LXD container usage

Status in Release Notes for Ubuntu:
  New
Status in apparmor package in Ubuntu:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in lxd package in Ubuntu:
  New
Status in snapd package in Ubuntu:
  New

Bug description:
  Following upgrade to 6.5.0-7 kernel in mantic cloud images we are
  seeing a regression in our cloud image tests. The test runs the
  following:

  ```
  lxd init --auto --storage-backend dir
  lxc launch ubuntu-daily:mantic mantic
  lxc info mantic
  lxc exec mantic -- cloud-init status --wait
  ```

  The `lxc exec mantic -- cloud-init status --wait` times out after 240s
  and will fail our test as a result.

  I have been able to replicate in a local VM

  ```
  wget 
http://cloud-images.ubuntu.com/mantic/20231005/mantic-server-cloudimg-amd64.img 
  wget --output-document=launch-qcow2-image-qemu.sh 
https://gist.githubusercontent.com/philroche/14c241c086a5730481e24178b654268f/raw/7af95cd4dfc8e1d0600e6118803d2c866765714e/gistfile1.txt
 
  chmod +x launch-qcow2-image-qemu.sh 

  ./launch-qcow2-image-qemu.sh --password passw0rd --image 
./mantic-server-cloudimg-amd64.img 
  cat < "./reproducer.sh"
  #!/bin/bash -eux
  lxd init --auto --storage-backend dir
  lxc launch ubuntu-daily:mantic mantic
  lxc info mantic
  lxc exec mantic -- cloud-init status --wait
  EOF
  chmod +x ./reproducer.sh
  sshpass -p passw0rd scp -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -P  ./reproducer.sh ubuntu@127.0.0.1:~/
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 sudo apt-get update
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 sudo apt-get upgrade 
--assume-yes
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 ./reproducer.sh
  ```

  The issue is not present with the 6.5.0-5 kernel and the issue is
  present regardless of the container launched. I tried the jammy
  container to test this.

  From my test VM

  ```
  ubuntu@cloudimg:~$ uname --all
  Linux cloudimg 6.5.0-7-generic #7-Ubuntu SMP PREEMPT_DYNAMIC Fri Sep 29 
09:14:56 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux
  ubuntu@cloudimg:~$ uname --kernel-release
  6.5.0-7-generic
  ```

  This is a regression in our test that will block 23.10 cloud image
  release next week.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/2038567/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038681] [NEW] nvidia-driver-535.113.01 crash

2023-10-06 Thread Bert RAM Aerts
Public bug reported:

It was running RealVNC server, VMware Workstation Pro with Windows 11 guest, 
Firefox and Thunderbird.
I used it with RealVNC Viewer on another machine and suddenly my VNC connection 
dropped.
Coming to my nVIDIA laptop it was showing no gnome desktop anymore but a black 
screen.
I could still ssh to the laptop to trigger a reboot.
Via journalctl I saw that nVIDIA driver had crashed.
I have seen this now with both
535.113.01-0ubuntu0.23.04.1 
535.113.01-0ubuntu0.23.04.3 
 
Oct 06 17:01:57 legion5ubuntu /usr/libexec/gdm-x-session[3110]: (EE) NVIDIA(0): 
The NVIDIA X driver has encountered an error; attempting to
Oct 06 17:01:57 legion5ubuntu /usr/libexec/gdm-x-session[3110]: (EE) NVIDIA(0): 
recover...
Oct 06 17:02:37 legion5ubuntu /usr/libexec/gdm-x-session[3110]: (EE) 
NVIDIA(GPU-0): Failed to initialize DMA.
Oct 06 17:02:37 legion5ubuntu /usr/libexec/gdm-x-session[3110]: (EE) NVIDIA(0): 
Failed to allocate push buffer
Oct 06 17:02:37 legion5ubuntu /usr/libexec/gdm-x-session[3110]: (EE) NVIDIA(0): 
Error recovery failed.
Oct 06 17:02:37 legion5ubuntu /usr/libexec/gdm-x-session[3110]: (EE) NVIDIA(0): 
 *** Aborting ***
Oct 06 17:02:37 legion5ubuntu /usr/libexec/gdm-x-session[3110]: (EE)
Oct 06 17:02:37 legion5ubuntu /usr/libexec/gdm-x-session[3110]: Fatal server 
error:
Oct 06 17:02:37 legion5ubuntu /usr/libexec/gdm-x-session[3110]: (EE) Failed to 
recover from error!

ProblemType: Bug
DistroRelease: Ubuntu 23.04
Package: xorg 1:7.7+23ubuntu2
ProcVersionSignature: Ubuntu 6.2.0-34.34-generic 6.2.16
Uname: Linux 6.2.0-34-generic x86_64
NonfreeKernelModules: nvidia_modeset nvidia
.proc.driver.nvidia.capabilities.gpu0: Error: path was not a regular file.
.proc.driver.nvidia.capabilities.mig: Error: path was not a regular file.
.proc.driver.nvidia.gpus..01.00.0: Error: path was not a regular file.
.proc.driver.nvidia.registry: Binary: ""
.proc.driver.nvidia.suspend: suspend hibernate resume
.proc.driver.nvidia.suspend_depth: default modeset uvm
.proc.driver.nvidia.version:
 NVRM version: NVIDIA UNIX x86_64 Kernel Module  535.113.01  Tue Sep 12 
19:41:24 UTC 2023
 GCC version:  gcc version 12.3.0 (Ubuntu 12.3.0-1ubuntu1~23.04)
ApportVersion: 2.26.1-0ubuntu2
Architecture: amd64
BootLog: Error: [Errno 13] Permission denied: '/var/log/boot.log'
CasperMD5CheckResult: pass
CompositorRunning: None
CurrentDesktop: GNOME
Date: Fri Oct  6 19:12:16 2023
DistUpgraded: 2023-04-14 13:11:36,442 DEBUG Running PostInstallScript: 
'/usr/lib/ubuntu-advantage/upgrade_lts_contract.py'
DistroCodename: lunar
DistroVariant: ubuntu
DkmsStatus:
 nvidia/535.113.01, 6.2.0-33-generic, x86_64: installed
 nvidia/535.113.01, 6.2.0-34-generic, x86_64: installed
ExtraDebuggingInterest: Yes
GraphicsCard:
 NVIDIA Corporation TU106M [GeForce RTX 2060 Mobile] [10de:1f15] (rev a1) 
(prog-if 00 [VGA controller])
   Subsystem: Lenovo TU106M [GeForce RTX 2060 Mobile] [17aa:3f8c]
InstallationDate: Installed on 2021-05-17 (871 days ago)
InstallationMedia: Ubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
MachineType: LENOVO 81Y6
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-6.2.0-34-generic 
root=UUID=998a3bca-88e2-4d44-ab68-6776750daa09 ro nvidia-drm.modeset=1 
acpi_backlight=native nvidia.NVreg_RegistryDwords=EnableBrightnessControl=1
SourcePackage: xorg
Symptom: display
Title: Xorg crash
UpgradeStatus: Upgraded to lunar on 2023-04-14 (175 days ago)
dmi.bios.date: 06/09/2023
dmi.bios.release: 1.59
dmi.bios.vendor: LENOVO
dmi.bios.version: EFCN59WW
dmi.board.asset.tag: NO Asset Tag
dmi.board.name: LNVNB161216
dmi.board.vendor: LENOVO
dmi.board.version: SDK0R32862 WIN
dmi.chassis.asset.tag: NO Asset Tag
dmi.chassis.type: 10
dmi.chassis.vendor: LENOVO
dmi.chassis.version: Lenovo Legion 5 15IMH05H
dmi.ec.firmware.release: 1.59
dmi.modalias: 
dmi:bvnLENOVO:bvrEFCN59WW:bd06/09/2023:br1.59:efr1.59:svnLENOVO:pn81Y6:pvrLenovoLegion515IMH05H:rvnLENOVO:rnLNVNB161216:rvrSDK0R32862WIN:cvnLENOVO:ct10:cvrLenovoLegion515IMH05H:skuLENOVO_MT_81Y6_BU_idea_FM_Legion515IMH05H:
dmi.product.family: Legion 5 15IMH05H
dmi.product.name: 81Y6
dmi.product.sku: LENOVO_MT_81Y6_BU_idea_FM_Legion 5 15IMH05H
dmi.product.version: Lenovo Legion 5 15IMH05H
dmi.sys.vendor: LENOVO
version.compiz: compiz N/A
version.libdrm2: libdrm2 2.4.114-1
version.libgl1-mesa-dri: libgl1-mesa-dri 23.0.4-0ubuntu1~23.04.1
version.libgl1-mesa-glx: libgl1-mesa-glx N/A
version.nvidia-graphics-drivers: nvidia-graphics-drivers-* N/A
version.xserver-xorg-core: xserver-xorg-core 2:21.1.7-1ubuntu3
version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:19.1.0-3
version.xserver-xorg-video-intel: xserver-xorg-video-intel 
2:2.99.917+git20210115-1
version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 1:1.0.17-2build1

** Affects: xorg (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug crash lunar ubuntu

-- 
You received this bug notification because you are a member of Ubuntu

[Touch-packages] [Bug 2026757] Re: dnsmasq on Ubuntu Jammy/Lunar crashes on neutron-dhcp-agent updates

2023-10-06 Thread Paride Legovini
The bug description says "dnsmasq on Ubuntu Jammy/Lunar crashes [...]",
but IIUC it's actually only the Jammy one that crashes (the lunar-on-
jammy one maybe has other issues, but doesn't exhibit the crash). Am I
right? In this case please update the bug description accordingly.
Thanks!

Edit: I did this myself as the Lunar bug was set to Invalid already, per
comment 12.

** Summary changed:

- dnsmasq on Ubuntu Jammy/Lunar crashes on neutron-dhcp-agent updates
+ dnsmasq on Ubuntu Jammy crashes on neutron-dhcp-agent updates

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
https://bugs.launchpad.net/bugs/2026757

Title:
  dnsmasq on Ubuntu Jammy crashes on neutron-dhcp-agent updates

Status in Ironic:
  New
Status in neutron:
  New
Status in dnsmasq package in Ubuntu:
  Invalid
Status in dnsmasq source package in Jammy:
  Incomplete
Status in dnsmasq source package in Kinetic:
  Won't Fix
Status in dnsmasq source package in Lunar:
  Invalid
Status in dnsmasq source package in Mantic:
  Invalid

Bug description:
  The Ironic project's CI has been having major blocking issues moving
  to utilizing Ubuntu Jammy and with some investigation we were able to
  isolate the issues down to the dhcp updates causing dnsmasq to crash
  on Ubuntu Jammy, which ships with dnsmasq 2.86. This issue sounds
  similar to an issue known about to the dnsmasq maintainers, where
  dnsmasq would crash with updates occurring due to configuration
  refresh[0].

  This resulted in us upgrading dnsmasq to the version which ships with
  Ubuntu Lunar.

  Which was no better. Dnsmasq still crashed upon record updates for
  addresses and ports getting configuration added/changed/removed.

  We later downgraded to the version of dnsmasq shipped in Ubuntu Focal,
  and dnsmasq stopped crashing and appeared stable enough to utilize for
  CI purposes.

  ** Kernel log from Ubuntu Jammy Package **

  [229798.876726] dnsmasq[81586]: segfault at 7c28 ip 7f6e8313147e sp 
7fffb3d6f830 error 4 in libc.so.6[7f6e830b4000+195000]
  [229798.876745] Code: 98 13 00 e8 04 b9 ff ff 0f 1f 40 00 f3 0f 1e fa 48 85 
ff 0f 84 bb 00 00 00 55 48 8d 77 f0 53 48 83 ec 18 48 8b 1d 92 39 17 00 <48> 8b 
47 f8 64 8b 2b a8 02 75 57 48 8b 15 18 39 17 00 64 48 83 3a
  [229805.444912] dnsmasq[401428]: segfault at dce8 ip 7fe63bf6a47e sp 
7ffdb105b440 error 4 in libc.so.6[7fe63beed000+195000]
  [229805.444933] Code: 98 13 00 e8 04 b9 ff ff 0f 1f 40 00 f3 0f 1e fa 48 85 
ff 0f 84 bb 00 00 00 55 48 8d 77 f0 53 48 83 ec 18 48 8b 1d 92 39 17 00 <48> 8b 
47 f8 64 8b 2b a8 02 75 57 48 8b 15 18 39 17 00 64 48 83 3a
  [230414.213448] dnsmasq[401538]: segfault at 78b8 ip 7f12160e447e sp 
7ffed6ef2190 error 4 in libc.so.6[7f1216067000+195000]
  [230414.213467] Code: 98 13 00 e8 04 b9 ff ff 0f 1f 40 00 f3 0f 1e fa 48 85 
ff 0f 84 bb 00 00 00 55 48 8d 77 f0 53 48 83 ec 18 48 8b 1d 92 39 17 00 <48> 8b 
47 f8 64 8b 2b a8 02 75 57 48 8b 15 18 39 17 00 64 48 83 3a
  [230465.098989] dnsmasq[402665]: segfault at c378 ip 7f81458f047e sp 
7fff0db334a0 error 4 in libc.so.6[7f8145873000+195000]
  [230465.099005] Code: 98 13 00 e8 04 b9 ff ff 0f 1f 40 00 f3 0f 1e fa 48 85 
ff 0f 84 bb 00 00 00 55 48 8d 77 f0 53 48 83 ec 18 48 8b 1d 92 39 17 00 <48> 8b 
47 f8 64 8b 2b a8 02 75 57 48 8b 15 18 39 17 00 64 48 83 3a
  [231787.247374] dnsmasq[402863]: segfault at 7318 ip 7f3940b9147e sp 
7ffc8df4f010 error 4 in libc.so.6[7f3940b14000+195000]
  [231787.247392] Code: 98 13 00 e8 04 b9 ff ff 0f 1f 40 00 f3 0f 1e fa 48 85 
ff 0f 84 bb 00 00 00 55 48 8d 77 f0 53 48 83 ec 18 48 8b 1d 92 39 17 00 <48> 8b 
47 f8 64 8b 2b a8 02 75 57 48 8b 15 18 39 17 00 64 48 83 3a
  [231844.886399] dnsmasq[405182]: segfault at dc58 ip 7f32a29e147e sp 
7ffddedd7480 error 4 in libc.so.6[7f32a2964000+195000]
  [231844.886420] Code: 98 13 00 e8 04 b9 ff ff 0f 1f 40 00 f3 0f 1e fa 48 85 
ff 0f 84 bb 00 00 00 55 48 8d 77 f0 53 48 83 ec 18 48 8b 1d 92 39 17 00 <48> 8b 
47 f8 64 8b 2b a8 02 75 57 48 8b 15 18 39 17 00 64 48 83 3a
  [234692.482154] dnsmasq[405289]: segfault at 67d8 ip 7fab0c5c447e sp 
7fffd6fd8fa0 error 4 in libc.so.6[7fab0c547000+195000]
  [234692.482173] Code: 98 13 00 e8 04 b9 ff ff 0f 1f 40 00 f3 0f 1e fa 48 85 
ff 0f 84 bb 00 00 00 55 48 8d 77 f0 53 48 83 ec 18 48 8b 1d 92 39 17 00 <48> 8b 
47 f8 64 8b 2b a8 02 75 57 48 8b 15 18 39 17 00 64 48 83 3a

  ** Kernel log entries from Ubuntu Lunar package **

  [234724.842339] dnsmasq[409843]: segfault at fffd ip 
7f35a147647e sp 7ffd536038c0 error 5 in libc.so.6[7f35a13f9000+195000]
  [234724.842368] Code: 98 13 00 e8 04 b9 ff ff 0f 1f 40 00 f3 0f 1e fa 48 85 
ff 0f 84 bb 00 00 00 55 48 8d 77 f0 53 48 83 ec 18 48 8b 1d 92 39 17 00 <48> 8b 
47 f8 64 8b 2b a8 02 75 57 48 8b 15 18 39 17 00 64 48 83 3a
  [234784.918116] dnsmasq[410019]: segfault at fffd ip 
7f634233947e sp 7fff33877f20 error 

[Touch-packages] [Bug 2026757] Re: dnsmasq on Ubuntu Jammy/Lunar crashes on neutron-dhcp-agent updates

2023-10-06 Thread Paride Legovini
Hello, I verified that Sergio's PPA contains the candidate upstream
patch (upstream commit d290630d31f4517ab26392d00753d1397f9a4114). If the
crash is still happening that probably wasn't the issue after all.

I see two possible ways forward here. One is classic git based
debugging:

1. compile 2.86 from upstream git and verify that the crash happens
2. compile 2.89 from upstream and verify that the crash doesn't happen
3. use `git bisect` to find the the commit that introduced the bug.

If that's not practical [but we may have to bite the bullet here!], we
could do some work guesswork after figuring out if the Ubuntu packaged
dnsmasq 2.87 is buggy or not. That version is not available anymore in
the Ubuntu archive, it has been in the archive at some point (in Lunar),
and compiled debs are still available here:

https://launchpad.net/ubuntu/+source/dnsmasq/2.87-1.1/+build/24632779

So by testing those we'll be able to tell whether the bug has been fixed
between 2.86-1.1ubuntu0.3 and 2.87-1.1 or not. You'll need to manually
install those packages via `dpkg -i` (no need to mention that this is
normally not recommended!).

I'd test some of this myself, but without a reproducer I won't be able
to tell much.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
https://bugs.launchpad.net/bugs/2026757

Title:
  dnsmasq on Ubuntu Jammy crashes on neutron-dhcp-agent updates

Status in Ironic:
  New
Status in neutron:
  New
Status in dnsmasq package in Ubuntu:
  Invalid
Status in dnsmasq source package in Jammy:
  Incomplete
Status in dnsmasq source package in Kinetic:
  Won't Fix
Status in dnsmasq source package in Lunar:
  Invalid
Status in dnsmasq source package in Mantic:
  Invalid

Bug description:
  The Ironic project's CI has been having major blocking issues moving
  to utilizing Ubuntu Jammy and with some investigation we were able to
  isolate the issues down to the dhcp updates causing dnsmasq to crash
  on Ubuntu Jammy, which ships with dnsmasq 2.86. This issue sounds
  similar to an issue known about to the dnsmasq maintainers, where
  dnsmasq would crash with updates occurring due to configuration
  refresh[0].

  This resulted in us upgrading dnsmasq to the version which ships with
  Ubuntu Lunar.

  Which was no better. Dnsmasq still crashed upon record updates for
  addresses and ports getting configuration added/changed/removed.

  We later downgraded to the version of dnsmasq shipped in Ubuntu Focal,
  and dnsmasq stopped crashing and appeared stable enough to utilize for
  CI purposes.

  ** Kernel log from Ubuntu Jammy Package **

  [229798.876726] dnsmasq[81586]: segfault at 7c28 ip 7f6e8313147e sp 
7fffb3d6f830 error 4 in libc.so.6[7f6e830b4000+195000]
  [229798.876745] Code: 98 13 00 e8 04 b9 ff ff 0f 1f 40 00 f3 0f 1e fa 48 85 
ff 0f 84 bb 00 00 00 55 48 8d 77 f0 53 48 83 ec 18 48 8b 1d 92 39 17 00 <48> 8b 
47 f8 64 8b 2b a8 02 75 57 48 8b 15 18 39 17 00 64 48 83 3a
  [229805.444912] dnsmasq[401428]: segfault at dce8 ip 7fe63bf6a47e sp 
7ffdb105b440 error 4 in libc.so.6[7fe63beed000+195000]
  [229805.444933] Code: 98 13 00 e8 04 b9 ff ff 0f 1f 40 00 f3 0f 1e fa 48 85 
ff 0f 84 bb 00 00 00 55 48 8d 77 f0 53 48 83 ec 18 48 8b 1d 92 39 17 00 <48> 8b 
47 f8 64 8b 2b a8 02 75 57 48 8b 15 18 39 17 00 64 48 83 3a
  [230414.213448] dnsmasq[401538]: segfault at 78b8 ip 7f12160e447e sp 
7ffed6ef2190 error 4 in libc.so.6[7f1216067000+195000]
  [230414.213467] Code: 98 13 00 e8 04 b9 ff ff 0f 1f 40 00 f3 0f 1e fa 48 85 
ff 0f 84 bb 00 00 00 55 48 8d 77 f0 53 48 83 ec 18 48 8b 1d 92 39 17 00 <48> 8b 
47 f8 64 8b 2b a8 02 75 57 48 8b 15 18 39 17 00 64 48 83 3a
  [230465.098989] dnsmasq[402665]: segfault at c378 ip 7f81458f047e sp 
7fff0db334a0 error 4 in libc.so.6[7f8145873000+195000]
  [230465.099005] Code: 98 13 00 e8 04 b9 ff ff 0f 1f 40 00 f3 0f 1e fa 48 85 
ff 0f 84 bb 00 00 00 55 48 8d 77 f0 53 48 83 ec 18 48 8b 1d 92 39 17 00 <48> 8b 
47 f8 64 8b 2b a8 02 75 57 48 8b 15 18 39 17 00 64 48 83 3a
  [231787.247374] dnsmasq[402863]: segfault at 7318 ip 7f3940b9147e sp 
7ffc8df4f010 error 4 in libc.so.6[7f3940b14000+195000]
  [231787.247392] Code: 98 13 00 e8 04 b9 ff ff 0f 1f 40 00 f3 0f 1e fa 48 85 
ff 0f 84 bb 00 00 00 55 48 8d 77 f0 53 48 83 ec 18 48 8b 1d 92 39 17 00 <48> 8b 
47 f8 64 8b 2b a8 02 75 57 48 8b 15 18 39 17 00 64 48 83 3a
  [231844.886399] dnsmasq[405182]: segfault at dc58 ip 7f32a29e147e sp 
7ffddedd7480 error 4 in libc.so.6[7f32a2964000+195000]
  [231844.886420] Code: 98 13 00 e8 04 b9 ff ff 0f 1f 40 00 f3 0f 1e fa 48 85 
ff 0f 84 bb 00 00 00 55 48 8d 77 f0 53 48 83 ec 18 48 8b 1d 92 39 17 00 <48> 8b 
47 f8 64 8b 2b a8 02 75 57 48 8b 15 18 39 17 00 64 48 83 3a
  [234692.482154] dnsmasq[405289]: segfault at 67d8 ip 7fab0c5c447e sp 
7fffd6fd8fa0 error 4 in libc.so.6[7fab0c547000+195000]
  [234692.482173] Code: 98 13 00 e8 04 b9 ff ff 0f 1f 40 00 

[Touch-packages] [Bug 2038443] Re: mantic:linux: ubuntu_qrt_apparmor: ApparmorTestsuites.test_regression_testsuiteattach_disconnected.

2023-10-06 Thread Stefan Bader
I was going over the ADT results for the complete linux suite:
https://autopkgtest.ubuntu.com/results/autopkgtest-
mantic/mantic/amd64/l/linux/20231002_144159_55314@/log.gz (6.5.0-7.7)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/2038443

Title:
  mantic:linux: ubuntu_qrt_apparmor:
  ApparmorTestsuites.test_regression_testsuiteattach_disconnected.

Status in apparmor package in Ubuntu:
  New
Status in linux package in Ubuntu:
  Confirmed
Status in apparmor source package in Mantic:
  New
Status in linux source package in Mantic:
  Confirmed

Bug description:
  This might be apparmor, the test case, kernel or anything in between:

  7720s   running attach_disconnected
  7720s   Fatal Error (unix_fd_server): Unable to run test sub-executable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2038443/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038662] Re: systemd-nspawn error: "Failed to mount image file system: Value too large for defined data type"

2023-10-06 Thread Brian Candler
Grr... it works if I first run a dummy command within the machine:

systemd-nspawn -M jammy-rootfs --as-pid2 passwd root 
machinectl start jammy-rootfs   # it's working now!
machinectl login jammy-rootfs

(Even just "echo hello world" does the job)

However if you go back to a *fresh* image then it fails:

machinectl stop jammy-rootfs
machinectl remove jammy-rootfs
machinectl pull-raw 
http://cloud-images.ubuntu.com/jammy/current/jammy-server-cloudimg-amd64.img 
jammy-rootfs
# Both of these commands consistently fail:
machinectl start jammy-rootfs
systemd-nspawn -M jammy-rootfs -U -b -n

Conclusion: this is confusing. The solution is to manually spawn any
command within the image, *before* attempting to start the image with
--boot.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/2038662

Title:
  systemd-nspawn error: "Failed to mount image file system: Value too
  large for defined data type"

Status in systemd package in Ubuntu:
  New

Bug description:
  Two-line reproducer: run this on an Ubuntu 22.04 server.

  sudo machinectl pull-raw 
http://cloud-images.ubuntu.com/jammy/current/jammy-server-cloudimg-amd64.img 
jammy-rootfs
  sudo machinectl start jammy-rootfs

  Response:
  Job for systemd-nspawn@jammy-rootfs.service failed because the control 
process exited with error code.

  Here's the relevant output from "journalctl -xeu 
systemd-nspawn@jammy-rootfs.service"
  
  ░░ A start job for unit systemd-nspawn@jammy-rootfs.service has begun 
execution.
  ░░
  ░░ The job identifier is 3223.
  Oct 06 13:13:21 brian-kit systemd-nspawn[36720]: Failed to mount image file 
system: Value too large for defined data type
  Oct 06 13:13:21 brian-kit systemd-nspawn[36688]: Short read while reading 
cgroup mode (0 bytes). The child is most likely dead.
  Oct 06 13:13:21 brian-kit systemd[1]: systemd-nspawn@jammy-rootfs.service: 
Main process exited, code=exited, status=1/FAILURE
  ░░ Subject: Unit process exited
  ░░ Defined-By: systemd
  ░░ Support: http://www.ubuntu.com/support
  ░░
  ░░ An ExecStart= process belonging to unit 
systemd-nspawn@jammy-rootfs.service has exited.
  ░░
  ░░ The process' exit code is 'exited' and its exit status is 1.
  Oct 06 13:13:21 brian-kit systemd[1]: systemd-nspawn@jammy-rootfs.service: 
Failed with result 'exit-code'.
  

  This appears to be similar to
  https://github.com/systemd/systemd/issues/20989

  If so, a fix was committed in March 2022: 
https://github.com/systemd/systemd/pull/22774
  but maybe that was too late for 22.04? Or this is a different problem?

  EDIT: the reproducer from
  https://github.com/systemd/systemd/issues/20989#issuecomment-997024152
  also reproduces the problem.

  # rm -rf /var/lib/machines/my-container/
  # mkdir -p /var/lib/machines/my-container/etc
  # cp /etc/os-release /var/lib/machines/my-container/etc/
  # systemd-nspawn -U -b -D /var/lib/machines/my-container/
  Spawning container my-container on /var/lib/machines/my-container.
  Press ^] three times within 1s to kill container.
  Selected user namespace base 972619776 and range 65536.
  Failed to create directory at /var/lib/machines/my-container/usr: Value too 
large for defined data type

  
  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: systemd-container 249.11-0ubuntu3.10
  ProcVersionSignature: Ubuntu 5.15.0-84.93-generic 5.15.116
  Uname: Linux 5.15.0-84-generic x86_64
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
  ApportVersion: 2.20.11-0ubuntu82.5
  Architecture: amd64
  CasperMD5CheckResult: pass
  CloudArchitecture: x86_64
  CloudID: none
  CloudName: none
  CloudPlatform: none
  CloudSubPlatform: config
  Date: Fri Oct  6 13:10:41 2023
  InstallationDate: Installed on 2022-11-04 (335 days ago)
  InstallationMedia: Ubuntu-Server 22.04.1 LTS "Jammy Jellyfish" - Release 
amd64 (20220809)
  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   LANG=en_GB.UTF-8
   SHELL=/bin/bash
  SourcePackage: systemd
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/2038662/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2023545] Re: [UBUNTU 22.04] openssl with ibmca engine configured dumps core when creating a new certificate

2023-10-06 Thread Adrien Nader
** Tags removed: foundations-todo

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/2023545

Title:
  [UBUNTU 22.04] openssl with ibmca engine configured dumps core when
  creating a new certificate

Status in Ubuntu on IBM z Systems:
  In Progress
Status in openssl package in Ubuntu:
  In Progress
Status in openssl source package in Jammy:
  In Progress
Status in openssl source package in Lunar:
  Fix Released

Bug description:
  === SRU information ===
  [Meta]
  This bug is part of a series of four bugs for a single SRU.
  The "central" bug with the global information and debdiff is 
http://pad.lv/2033422

  [Impact]
  Openssl using an engine dumps core upon certificate creation; other 
operations are probably affected too. Overall, engines are likely mostly 
unusable.

  [Test plan]
  An engine is needed to test the fix and I don't think we have many in the 
archive. This complicates reproducing the issue. I have been relying on user 
reports which have been very detailled and helpful.
  The issue has also been reported independently and with another engine 
(devcrypto).
  The issue is fixed in openssl 3.0.8 which landed in lunar.

  [Where problems could occur]
  I don't pretend to understand the lifecycle of providers in openssl3 but the 
patch is simple and has been widely tested by now, including on ubuntu. Thus, I 
see little chance an unexpected problem would occur with it.

  [Patches]
  The patches come directly from upstream and apply cleanly.

  https://github.com/openssl/openssl/issues/18578

  *
  
https://git.launchpad.net/~adrien-n/ubuntu/+source/openssl/tree/debian/patches/jammy-
  sru-0001-Release-the-drbg-in-the-global-default-context-
  befor.patch?h=jammy-sru=04ef023920ab08fba214817523fba897527dfff0

  === Original description ===

  openssl req -new -newkey rsa:2048 -x509 -sha256 -nodes -out __cert.pem
  -keyout __key.pem --subj '/CN=US'

  ---Problem Description---
  OpenSSL with ibmca engine configured dumps core when creating a new 
certificate.

  # openssl engine
  (dynamic) Dynamic engine loading support
  (ibmca) Ibmca hardware engine support
  # openssl req  -new -newkey rsa:2048 -x509 -sha256 -nodes -out __cert.pem 
-keyout __key.pem --subj '/CN=US'
  Segmentation fault (core dumped)

  # journalctl
  Jun 07 13:06:08 SYSTEM kernel: User process fault: interruption code 003b 
ilc:2 in libc.so.6[3ffae08+1ca000]
  Jun 07 13:06:08 SYSTEM kernel: Failing address:  TEID: 
0800
  Jun 07 13:06:08 SYSTEM kernel: Fault in primary space mode while using user 
ASCE.
  Jun 07 13:06:08 SYSTEM kernel: AS:9c2941c7 R3:0024
  Jun 07 13:06:08 SYSTEM kernel: CPU: 2 PID: 2344 Comm: openssl Kdump: loaded 
Not tainted 5.15.0-73-generic #80-Ubuntu
  Jun 07 13:06:08 SYSTEM kernel: Hardware name: IBM 3931 A01 703 (z/VM 7.3.0)
  Jun 07 13:06:08 SYSTEM kernel: User PSW : 070500018000 03ffae11c708
  Jun 07 13:06:08 SYSTEM kernel:R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:1 
AS:0 CC:0 PM:0 RI:0 EA:3
  Jun 07 13:06:08 SYSTEM kernel: User GPRS: 0007 03ffae11c6f0 
 02aa3289f9d0
  Jun 07 13:06:08 SYSTEM kernel:02aa1825980f 02aa3289f9d0 
 02aa328a4300
  Jun 07 13:06:08 SYSTEM kernel:03ffae870720 03ffae657128 
02aa03ff 
  Jun 07 13:06:08 SYSTEM kernel:03ffae24dd10 03ffae657120 
03ffae437c22 03ffec2fe000
  Jun 07 13:06:08 SYSTEM kernel: User Code: 03ffae11c6fc: b90400b2  
  lgr%r11,%r2
    03ffae11c700: 
4700bc0,0
   #03ffae11c704: 
b24f00a0ear%r10,%a0
   >03ffae11c708: 
58102018l%r1,24(%r2)
    03ffae11c70c: 
ebaa002dsllg%r10,%r10,32
    03ffae11c712: 
b24f00a1ear%r10,%a1
    03ffae11c716: 
5910a0d0c%r1,208(%r10)
    03ffae11c71a: 
a7840033brc8,03ffae11c780
  Jun 07 13:06:08 SYSTEM kernel: Last Breaking-Event-Address:
  Jun 07 13:06:08 SYSTEM kernel:  [<03ffae33242c>] 0x3ffae33242c
  Jun 07 13:06:08 SYSTEM systemd[1]: Started Process Core Dump (PID 2345/UID 0).
  Jun 07 13:06:08 SYSTEM systemd-coredump[2350]: Process 2344 (openssl) of user 
0 dumped core.

     Found module 
linux-vdso64.so.1 with build-id: 

[Touch-packages] [Bug 2038665] [NEW] bluetooth not working proper; ly

2023-10-06 Thread Santiago
Public bug reported:

My bluetooth it's loosing connection every 3 or 4 seconds.

ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: bluetooth 5.53-0ubuntu3.6
ProcVersionSignature: Ubuntu 5.15.0-86.96~20.04.1-generic 5.15.122
Uname: Linux 5.15.0-86-generic x86_64
NonfreeKernelModules: nvidia_modeset nvidia
ApportVersion: 2.20.11-0ubuntu27.27
Architecture: amd64
CasperMD5CheckResult: skip
CurrentDesktop: ubuntu:GNOME
Date: Fri Oct  6 11:21:08 2023
InstallationDate: Installed on 2023-10-04 (1 days ago)
InstallationMedia: Ubuntu 20.04.6 LTS "Focal Fossa" - Release amd64 (20230316)
InterestingModules: rfcomm bnep btusb bluetooth
MachineType: ASUS System Product Name
PackageArchitecture: all
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-86-generic 
root=UUID=9828ca97-751b-4832-b775-db6c7dab004d ro quiet splash vt.handoff=7
SourcePackage: bluez
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 11/04/2022
dmi.bios.release: 8.5
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: 0805
dmi.board.asset.tag: Default string
dmi.board.name: ROG STRIX X670E-E GAMING WIFI
dmi.board.vendor: ASUSTeK COMPUTER INC.
dmi.board.version: Rev 1.xx
dmi.chassis.asset.tag: Default string
dmi.chassis.type: 3
dmi.chassis.vendor: Default string
dmi.chassis.version: Default string
dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr0805:bd11/04/2022:br8.5:svnASUS:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnROGSTRIXX670E-EGAMINGWIFI:rvrRev1.xx:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
dmi.product.family: To be filled by O.E.M.
dmi.product.name: System Product Name
dmi.product.sku: SKU
dmi.product.version: System Version
dmi.sys.vendor: ASUS
hciconfig:
 hci0:  Type: Primary  Bus: USB
BD Address: 2C:0D:A7:1D:E9:2F  ACL MTU: 1021:4  SCO MTU: 96:6
UP RUNNING PSCAN 
RX bytes:2128 acl:114 sco:417074 events:3840 errors:0
TX bytes:24227828 acl:3643 sco:414720 commands:147 errors:0

** Affects: bluez (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug focal

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/2038665

Title:
  bluetooth not working proper;ly

Status in bluez package in Ubuntu:
  New

Bug description:
  My bluetooth it's loosing connection every 3 or 4 seconds.

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: bluetooth 5.53-0ubuntu3.6
  ProcVersionSignature: Ubuntu 5.15.0-86.96~20.04.1-generic 5.15.122
  Uname: Linux 5.15.0-86-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.20.11-0ubuntu27.27
  Architecture: amd64
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Fri Oct  6 11:21:08 2023
  InstallationDate: Installed on 2023-10-04 (1 days ago)
  InstallationMedia: Ubuntu 20.04.6 LTS "Focal Fossa" - Release amd64 (20230316)
  InterestingModules: rfcomm bnep btusb bluetooth
  MachineType: ASUS System Product Name
  PackageArchitecture: all
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-86-generic 
root=UUID=9828ca97-751b-4832-b775-db6c7dab004d ro quiet splash vt.handoff=7
  SourcePackage: bluez
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 11/04/2022
  dmi.bios.release: 8.5
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 0805
  dmi.board.asset.tag: Default string
  dmi.board.name: ROG STRIX X670E-E GAMING WIFI
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev 1.xx
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr0805:bd11/04/2022:br8.5:svnASUS:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnROGSTRIXX670E-EGAMINGWIFI:rvrRev1.xx:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: ASUS
  hciconfig:
   hci0:Type: Primary  Bus: USB
BD Address: 2C:0D:A7:1D:E9:2F  ACL MTU: 1021:4  SCO MTU: 96:6
UP RUNNING PSCAN 
RX bytes:2128 acl:114 sco:417074 events:3840 errors:0
TX bytes:24227828 acl:3643 sco:414720 commands:147 errors:0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/2038665/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038665] Re: bluetooth not working proper; ly

2023-10-06 Thread Santiago
Bluetooth not working as expected in ubuntu 20.04.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/2038665

Title:
  bluetooth not working proper;ly

Status in bluez package in Ubuntu:
  New

Bug description:
  My bluetooth it's loosing connection every 3 or 4 seconds.

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: bluetooth 5.53-0ubuntu3.6
  ProcVersionSignature: Ubuntu 5.15.0-86.96~20.04.1-generic 5.15.122
  Uname: Linux 5.15.0-86-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.20.11-0ubuntu27.27
  Architecture: amd64
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Fri Oct  6 11:21:08 2023
  InstallationDate: Installed on 2023-10-04 (1 days ago)
  InstallationMedia: Ubuntu 20.04.6 LTS "Focal Fossa" - Release amd64 (20230316)
  InterestingModules: rfcomm bnep btusb bluetooth
  MachineType: ASUS System Product Name
  PackageArchitecture: all
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-86-generic 
root=UUID=9828ca97-751b-4832-b775-db6c7dab004d ro quiet splash vt.handoff=7
  SourcePackage: bluez
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 11/04/2022
  dmi.bios.release: 8.5
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 0805
  dmi.board.asset.tag: Default string
  dmi.board.name: ROG STRIX X670E-E GAMING WIFI
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev 1.xx
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr0805:bd11/04/2022:br8.5:svnASUS:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnROGSTRIXX670E-EGAMINGWIFI:rvrRev1.xx:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: ASUS
  hciconfig:
   hci0:Type: Primary  Bus: USB
BD Address: 2C:0D:A7:1D:E9:2F  ACL MTU: 1021:4  SCO MTU: 96:6
UP RUNNING PSCAN 
RX bytes:2128 acl:114 sco:417074 events:3840 errors:0
TX bytes:24227828 acl:3643 sco:414720 commands:147 errors:0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/2038665/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2037497]

2023-10-06 Thread updates
FEDORA-2023-86e10b6cae has been pushed to the Fedora 39 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh 
--advisory=FEDORA-2023-86e10b6cae`
You can provide feedback for this update here: 
https://bodhi.fedoraproject.org/updates/FEDORA-2023-86e10b6cae

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more
information on how to test updates.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mesa in Ubuntu.
https://bugs.launchpad.net/bugs/2037497

Title:
  gnome-shell crashes on Intel Ice Lake with SIGSEGV at NULL from
  end_query() from cogl_gl_create_timestamp_query() from
  cogl_onscreen_egl_swap_buffers_with_damage()

Status in Mesa:
  New
Status in mesa package in Ubuntu:
  Triaged
Status in mesa package in Fedora:
  Fix Committed

Bug description:
  crash after update
  wayland session is not accessible anymore

  ProblemType: Crash
  DistroRelease: Ubuntu 23.10
  Package: gnome-shell 45.0-1ubuntu1
  ProcVersionSignature: Ubuntu 6.5.0-5.5-generic 6.5.0
  Uname: Linux 6.5.0-5-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.27.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 27 05:52:26 2023
  DisplayManager: gdm3
  ExecutablePath: /usr/bin/gnome-shell
  InstallationDate: Installed on 2023-09-26 (0 days ago)
  InstallationMedia: Ubuntu 23.10 "Mantic Minotaur" - Beta amd64 (20230924)
  ProcCmdline: /usr/bin/gnome-shell
  ProcEnviron:
   LANG=fr_FR.UTF-8
   PATH=(custom, no user)
   SHELL=/bin/bash
   XDG_RUNTIME_DIR=
  RelatedPackageVersions: mutter-common 45.0-2ubuntu1
  Signal: 11
  SourcePackage: gnome-shell
  StacktraceTop:
   ?? ()
   ?? () from /usr/lib/x86_64-linux-gnu/dri/iris_dri.so
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /lib/x86_64-linux-gnu/libmutter-13.so.0
  Title: gnome-shell crashed with SIGSEGV
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip libvirt lpadmin plugdev sudo users
  separator:

To manage notifications about this bug go to:
https://bugs.launchpad.net/mesa/+bug/2037497/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2037497]

2023-10-06 Thread awilliam
Thanks James, I've sent an official update as you can see.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mesa in Ubuntu.
https://bugs.launchpad.net/bugs/2037497

Title:
  gnome-shell crashes on Intel Ice Lake with SIGSEGV at NULL from
  end_query() from cogl_gl_create_timestamp_query() from
  cogl_onscreen_egl_swap_buffers_with_damage()

Status in Mesa:
  New
Status in mesa package in Ubuntu:
  Triaged
Status in mesa package in Fedora:
  Fix Committed

Bug description:
  crash after update
  wayland session is not accessible anymore

  ProblemType: Crash
  DistroRelease: Ubuntu 23.10
  Package: gnome-shell 45.0-1ubuntu1
  ProcVersionSignature: Ubuntu 6.5.0-5.5-generic 6.5.0
  Uname: Linux 6.5.0-5-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.27.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 27 05:52:26 2023
  DisplayManager: gdm3
  ExecutablePath: /usr/bin/gnome-shell
  InstallationDate: Installed on 2023-09-26 (0 days ago)
  InstallationMedia: Ubuntu 23.10 "Mantic Minotaur" - Beta amd64 (20230924)
  ProcCmdline: /usr/bin/gnome-shell
  ProcEnviron:
   LANG=fr_FR.UTF-8
   PATH=(custom, no user)
   SHELL=/bin/bash
   XDG_RUNTIME_DIR=
  RelatedPackageVersions: mutter-common 45.0-2ubuntu1
  Signal: 11
  SourcePackage: gnome-shell
  StacktraceTop:
   ?? ()
   ?? () from /usr/lib/x86_64-linux-gnu/dri/iris_dri.so
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /lib/x86_64-linux-gnu/libmutter-13.so.0
  Title: gnome-shell crashed with SIGSEGV
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip libvirt lpadmin plugdev sudo users
  separator:

To manage notifications about this bug go to:
https://bugs.launchpad.net/mesa/+bug/2037497/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2037497]

2023-10-06 Thread updates
FEDORA-2023-86e10b6cae has been submitted as an update to Fedora 39.
https://bodhi.fedoraproject.org/updates/FEDORA-2023-86e10b6cae

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mesa in Ubuntu.
https://bugs.launchpad.net/bugs/2037497

Title:
  gnome-shell crashes on Intel Ice Lake with SIGSEGV at NULL from
  end_query() from cogl_gl_create_timestamp_query() from
  cogl_onscreen_egl_swap_buffers_with_damage()

Status in Mesa:
  New
Status in mesa package in Ubuntu:
  Triaged
Status in mesa package in Fedora:
  Fix Committed

Bug description:
  crash after update
  wayland session is not accessible anymore

  ProblemType: Crash
  DistroRelease: Ubuntu 23.10
  Package: gnome-shell 45.0-1ubuntu1
  ProcVersionSignature: Ubuntu 6.5.0-5.5-generic 6.5.0
  Uname: Linux 6.5.0-5-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.27.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 27 05:52:26 2023
  DisplayManager: gdm3
  ExecutablePath: /usr/bin/gnome-shell
  InstallationDate: Installed on 2023-09-26 (0 days ago)
  InstallationMedia: Ubuntu 23.10 "Mantic Minotaur" - Beta amd64 (20230924)
  ProcCmdline: /usr/bin/gnome-shell
  ProcEnviron:
   LANG=fr_FR.UTF-8
   PATH=(custom, no user)
   SHELL=/bin/bash
   XDG_RUNTIME_DIR=
  RelatedPackageVersions: mutter-common 45.0-2ubuntu1
  Signal: 11
  SourcePackage: gnome-shell
  StacktraceTop:
   ?? ()
   ?? () from /usr/lib/x86_64-linux-gnu/dri/iris_dri.so
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /lib/x86_64-linux-gnu/libmutter-13.so.0
  Title: gnome-shell crashed with SIGSEGV
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip libvirt lpadmin plugdev sudo users
  separator:

To manage notifications about this bug go to:
https://bugs.launchpad.net/mesa/+bug/2037497/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2037497] Re: gnome-shell crashes on Intel Ice Lake with SIGSEGV at NULL from end_query() from cogl_gl_create_timestamp_query() from cogl_onscreen_egl_swap_buffers_with_damage()

2023-10-06 Thread Bug Watch Updater
** Changed in: mesa (Fedora)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mesa in Ubuntu.
https://bugs.launchpad.net/bugs/2037497

Title:
  gnome-shell crashes on Intel Ice Lake with SIGSEGV at NULL from
  end_query() from cogl_gl_create_timestamp_query() from
  cogl_onscreen_egl_swap_buffers_with_damage()

Status in Mesa:
  New
Status in mesa package in Ubuntu:
  Triaged
Status in mesa package in Fedora:
  Fix Committed

Bug description:
  crash after update
  wayland session is not accessible anymore

  ProblemType: Crash
  DistroRelease: Ubuntu 23.10
  Package: gnome-shell 45.0-1ubuntu1
  ProcVersionSignature: Ubuntu 6.5.0-5.5-generic 6.5.0
  Uname: Linux 6.5.0-5-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.27.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 27 05:52:26 2023
  DisplayManager: gdm3
  ExecutablePath: /usr/bin/gnome-shell
  InstallationDate: Installed on 2023-09-26 (0 days ago)
  InstallationMedia: Ubuntu 23.10 "Mantic Minotaur" - Beta amd64 (20230924)
  ProcCmdline: /usr/bin/gnome-shell
  ProcEnviron:
   LANG=fr_FR.UTF-8
   PATH=(custom, no user)
   SHELL=/bin/bash
   XDG_RUNTIME_DIR=
  RelatedPackageVersions: mutter-common 45.0-2ubuntu1
  Signal: 11
  SourcePackage: gnome-shell
  StacktraceTop:
   ?? ()
   ?? () from /usr/lib/x86_64-linux-gnu/dri/iris_dri.so
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /lib/x86_64-linux-gnu/libmutter-13.so.0
  Title: gnome-shell crashed with SIGSEGV
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip libvirt lpadmin plugdev sudo users
  separator:

To manage notifications about this bug go to:
https://bugs.launchpad.net/mesa/+bug/2037497/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2037497]

2023-10-06 Thread james
(In reply to Adam Williamson from comment #20)
> Scratch build is done for x86_64:
> https://koji.fedoraproject.org/koji/taskinfo?taskID=107101328
> 
> can folks test that and see if it helps? Thanks!

Works after updating to the packages in that Koji task.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mesa in Ubuntu.
https://bugs.launchpad.net/bugs/2037497

Title:
  gnome-shell crashes on Intel Ice Lake with SIGSEGV at NULL from
  end_query() from cogl_gl_create_timestamp_query() from
  cogl_onscreen_egl_swap_buffers_with_damage()

Status in Mesa:
  New
Status in mesa package in Ubuntu:
  Triaged
Status in mesa package in Fedora:
  Fix Committed

Bug description:
  crash after update
  wayland session is not accessible anymore

  ProblemType: Crash
  DistroRelease: Ubuntu 23.10
  Package: gnome-shell 45.0-1ubuntu1
  ProcVersionSignature: Ubuntu 6.5.0-5.5-generic 6.5.0
  Uname: Linux 6.5.0-5-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.27.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 27 05:52:26 2023
  DisplayManager: gdm3
  ExecutablePath: /usr/bin/gnome-shell
  InstallationDate: Installed on 2023-09-26 (0 days ago)
  InstallationMedia: Ubuntu 23.10 "Mantic Minotaur" - Beta amd64 (20230924)
  ProcCmdline: /usr/bin/gnome-shell
  ProcEnviron:
   LANG=fr_FR.UTF-8
   PATH=(custom, no user)
   SHELL=/bin/bash
   XDG_RUNTIME_DIR=
  RelatedPackageVersions: mutter-common 45.0-2ubuntu1
  Signal: 11
  SourcePackage: gnome-shell
  StacktraceTop:
   ?? ()
   ?? () from /usr/lib/x86_64-linux-gnu/dri/iris_dri.so
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /lib/x86_64-linux-gnu/libmutter-13.so.0
  Title: gnome-shell crashed with SIGSEGV
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip libvirt lpadmin plugdev sudo users
  separator:

To manage notifications about this bug go to:
https://bugs.launchpad.net/mesa/+bug/2037497/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2037497]

2023-10-06 Thread awilliam
Scratch build is done for x86_64:
https://koji.fedoraproject.org/koji/taskinfo?taskID=107101328

can folks test that and see if it helps? Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mesa in Ubuntu.
https://bugs.launchpad.net/bugs/2037497

Title:
  gnome-shell crashes on Intel Ice Lake with SIGSEGV at NULL from
  end_query() from cogl_gl_create_timestamp_query() from
  cogl_onscreen_egl_swap_buffers_with_damage()

Status in Mesa:
  New
Status in mesa package in Ubuntu:
  Triaged
Status in mesa package in Fedora:
  Fix Committed

Bug description:
  crash after update
  wayland session is not accessible anymore

  ProblemType: Crash
  DistroRelease: Ubuntu 23.10
  Package: gnome-shell 45.0-1ubuntu1
  ProcVersionSignature: Ubuntu 6.5.0-5.5-generic 6.5.0
  Uname: Linux 6.5.0-5-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.27.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 27 05:52:26 2023
  DisplayManager: gdm3
  ExecutablePath: /usr/bin/gnome-shell
  InstallationDate: Installed on 2023-09-26 (0 days ago)
  InstallationMedia: Ubuntu 23.10 "Mantic Minotaur" - Beta amd64 (20230924)
  ProcCmdline: /usr/bin/gnome-shell
  ProcEnviron:
   LANG=fr_FR.UTF-8
   PATH=(custom, no user)
   SHELL=/bin/bash
   XDG_RUNTIME_DIR=
  RelatedPackageVersions: mutter-common 45.0-2ubuntu1
  Signal: 11
  SourcePackage: gnome-shell
  StacktraceTop:
   ?? ()
   ?? () from /usr/lib/x86_64-linux-gnu/dri/iris_dri.so
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /lib/x86_64-linux-gnu/libmutter-13.so.0
  Title: gnome-shell crashed with SIGSEGV
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip libvirt lpadmin plugdev sudo users
  separator:

To manage notifications about this bug go to:
https://bugs.launchpad.net/mesa/+bug/2037497/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2037497]

2023-10-06 Thread awilliam
Some upstream discussion indicates
https://gitlab.freedesktop.org/mesa/mesa/-/commit/9590bce3e249a34665b2c42b20bfdbdc7f32147f
may fix this. Setting POST, will do a scratch build for folks to test
shortly.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mesa in Ubuntu.
https://bugs.launchpad.net/bugs/2037497

Title:
  gnome-shell crashes on Intel Ice Lake with SIGSEGV at NULL from
  end_query() from cogl_gl_create_timestamp_query() from
  cogl_onscreen_egl_swap_buffers_with_damage()

Status in Mesa:
  New
Status in mesa package in Ubuntu:
  Triaged
Status in mesa package in Fedora:
  Fix Committed

Bug description:
  crash after update
  wayland session is not accessible anymore

  ProblemType: Crash
  DistroRelease: Ubuntu 23.10
  Package: gnome-shell 45.0-1ubuntu1
  ProcVersionSignature: Ubuntu 6.5.0-5.5-generic 6.5.0
  Uname: Linux 6.5.0-5-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.27.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 27 05:52:26 2023
  DisplayManager: gdm3
  ExecutablePath: /usr/bin/gnome-shell
  InstallationDate: Installed on 2023-09-26 (0 days ago)
  InstallationMedia: Ubuntu 23.10 "Mantic Minotaur" - Beta amd64 (20230924)
  ProcCmdline: /usr/bin/gnome-shell
  ProcEnviron:
   LANG=fr_FR.UTF-8
   PATH=(custom, no user)
   SHELL=/bin/bash
   XDG_RUNTIME_DIR=
  RelatedPackageVersions: mutter-common 45.0-2ubuntu1
  Signal: 11
  SourcePackage: gnome-shell
  StacktraceTop:
   ?? ()
   ?? () from /usr/lib/x86_64-linux-gnu/dri/iris_dri.so
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /lib/x86_64-linux-gnu/libmutter-13.so.0
  Title: gnome-shell crashed with SIGSEGV
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip libvirt lpadmin plugdev sudo users
  separator:

To manage notifications about this bug go to:
https://bugs.launchpad.net/mesa/+bug/2037497/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038443] Re: mantic:linux: ubuntu_qrt_apparmor: ApparmorTestsuites.test_regression_testsuiteattach_disconnected.

2023-10-06 Thread Georgia Garcia
Hi!

Could you share the kernel and apparmor version?
I tested on mantic with the configuration below and I wasn't able to reproduce 
the failure for this specific test.
I did see an unrelated dbus issue with the test suite and proposed a fixed on 
https://code.launchpad.net/~georgiag/qa-regression-testing/+git/qa-regression-testing/+merge/453056


georgia@sec-mantic-amd64:~/qrt-test-apparmor$ sudo ./test-apparmor.py 
ApparmorTestsuites.test_regression_testsuite
[sudo] password for georgia: 
Skipping private tests

  preparing apparmor_4.0.0~alpha2-0ubuntu5.dsc...  done

 (disabling ptrace for this test)
.
--
Ran 1 test in 574.715s

OK
georgia@sec-mantic-amd64:~/qrt-test-apparmor$ uname -a
Linux sec-mantic-amd64 6.5.0-7-generic #7-Ubuntu SMP PREEMPT_DYNAMIC Fri Sep 29 
09:14:56 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux
georgia@sec-mantic-amd64:~/qrt-test-apparmor$ apt-cache policy apparmor
apparmor:
  Installed: 4.0.0~alpha2-0ubuntu5
  Candidate: 4.0.0~alpha2-0ubuntu5
  Version table:
 *** 4.0.0~alpha2-0ubuntu5 500
500 http://archive.ubuntu.com/ubuntu mantic/main amd64 Packages
100 /var/lib/dpkg/status
georgia@sec-mantic-amd64:~/qrt-test-apparmor$ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:Ubuntu Mantic Minotaur (development branch)
Release:23.10
Codename:   mantic

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/2038443

Title:
  mantic:linux: ubuntu_qrt_apparmor:
  ApparmorTestsuites.test_regression_testsuiteattach_disconnected.

Status in apparmor package in Ubuntu:
  New
Status in linux package in Ubuntu:
  Confirmed
Status in apparmor source package in Mantic:
  New
Status in linux source package in Mantic:
  Confirmed

Bug description:
  This might be apparmor, the test case, kernel or anything in between:

  7720s   running attach_disconnected
  7720s   Fatal Error (unix_fd_server): Unable to run test sub-executable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2038443/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038662] Re: systemd-nspawn error: "Failed to mount image file system: Value too large for defined data type"

2023-10-06 Thread Brian Candler
** Description changed:

  Two-line reproducer: run this on an Ubuntu 22.04 server.
  
  sudo machinectl pull-raw 
http://cloud-images.ubuntu.com/jammy/current/jammy-server-cloudimg-amd64.img 
jammy-rootfs
  sudo machinectl start jammy-rootfs
  
  Response:
  Job for systemd-nspawn@jammy-rootfs.service failed because the control 
process exited with error code.
  
  Here's the relevant output from "journalctl -xeu 
systemd-nspawn@jammy-rootfs.service"
  
  ░░ A start job for unit systemd-nspawn@jammy-rootfs.service has begun 
execution.
  ░░
  ░░ The job identifier is 3223.
  Oct 06 13:13:21 brian-kit systemd-nspawn[36720]: Failed to mount image file 
system: Value too large for defined data type
  Oct 06 13:13:21 brian-kit systemd-nspawn[36688]: Short read while reading 
cgroup mode (0 bytes). The child is most likely dead.
  Oct 06 13:13:21 brian-kit systemd[1]: systemd-nspawn@jammy-rootfs.service: 
Main process exited, code=exited, status=1/FAILURE
  ░░ Subject: Unit process exited
  ░░ Defined-By: systemd
  ░░ Support: http://www.ubuntu.com/support
  ░░
  ░░ An ExecStart= process belonging to unit 
systemd-nspawn@jammy-rootfs.service has exited.
  ░░
  ░░ The process' exit code is 'exited' and its exit status is 1.
  Oct 06 13:13:21 brian-kit systemd[1]: systemd-nspawn@jammy-rootfs.service: 
Failed with result 'exit-code'.
  
  
  This appears to be similar to
- https://github.com/systemd/systemd/issues/20989
+ https://github.com/systemd/systemd/issues/20989#issuecomment-997024152
  
  If so, a fix was committed in March 2022: 
https://github.com/systemd/systemd/pull/22774
  but maybe that was too late for 22.04? Or this is a different problem?
  
  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: systemd-container 249.11-0ubuntu3.10
  ProcVersionSignature: Ubuntu 5.15.0-84.93-generic 5.15.116
  Uname: Linux 5.15.0-84-generic x86_64
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
  ApportVersion: 2.20.11-0ubuntu82.5
  Architecture: amd64
  CasperMD5CheckResult: pass
  CloudArchitecture: x86_64
  CloudID: none
  CloudName: none
  CloudPlatform: none
  CloudSubPlatform: config
  Date: Fri Oct  6 13:10:41 2023
  InstallationDate: Installed on 2022-11-04 (335 days ago)
  InstallationMedia: Ubuntu-Server 22.04.1 LTS "Jammy Jellyfish" - Release 
amd64 (20220809)
  ProcEnviron:
-  TERM=xterm-256color
-  PATH=(custom, no user)
-  LANG=en_GB.UTF-8
-  SHELL=/bin/bash
+  TERM=xterm-256color
+  PATH=(custom, no user)
+  LANG=en_GB.UTF-8
+  SHELL=/bin/bash
  SourcePackage: systemd
  UpgradeStatus: No upgrade log present (probably fresh install)

** Description changed:

  Two-line reproducer: run this on an Ubuntu 22.04 server.
  
  sudo machinectl pull-raw 
http://cloud-images.ubuntu.com/jammy/current/jammy-server-cloudimg-amd64.img 
jammy-rootfs
  sudo machinectl start jammy-rootfs
  
  Response:
  Job for systemd-nspawn@jammy-rootfs.service failed because the control 
process exited with error code.
  
  Here's the relevant output from "journalctl -xeu 
systemd-nspawn@jammy-rootfs.service"
  
  ░░ A start job for unit systemd-nspawn@jammy-rootfs.service has begun 
execution.
  ░░
  ░░ The job identifier is 3223.
  Oct 06 13:13:21 brian-kit systemd-nspawn[36720]: Failed to mount image file 
system: Value too large for defined data type
  Oct 06 13:13:21 brian-kit systemd-nspawn[36688]: Short read while reading 
cgroup mode (0 bytes). The child is most likely dead.
  Oct 06 13:13:21 brian-kit systemd[1]: systemd-nspawn@jammy-rootfs.service: 
Main process exited, code=exited, status=1/FAILURE
  ░░ Subject: Unit process exited
  ░░ Defined-By: systemd
  ░░ Support: http://www.ubuntu.com/support
  ░░
  ░░ An ExecStart= process belonging to unit 
systemd-nspawn@jammy-rootfs.service has exited.
  ░░
  ░░ The process' exit code is 'exited' and its exit status is 1.
  Oct 06 13:13:21 brian-kit systemd[1]: systemd-nspawn@jammy-rootfs.service: 
Failed with result 'exit-code'.
  
  
  This appears to be similar to
- https://github.com/systemd/systemd/issues/20989#issuecomment-997024152
+ https://github.com/systemd/systemd/issues/20989
  
  If so, a fix was committed in March 2022: 
https://github.com/systemd/systemd/pull/22774
  but maybe that was too late for 22.04? Or this is a different problem?
+ 
+ EDIT: the reproducer from
+ https://github.com/systemd/systemd/issues/20989#issuecomment-997024152
+ also reproduces the problem.
+ 
+ # rm -rf /var/lib/machines/my-container/
+ # mkdir -p /var/lib/machines/my-container/etc
+ # cp /etc/os-release /var/lib/machines/my-container/etc/
+ # systemd-nspawn -U -b -D /var/lib/machines/my-container/
+ Spawning container my-container on /var/lib/machines/my-container.
+ Press ^] three times within 1s to kill container.
+ Selected user namespace base 972619776 and range 65536.
+ Failed to create directory at /var/lib/machines/my-container/usr: Value too 
large for defined data type
+ 
  
  ProblemType: Bug
  DistroRelease: Ubuntu 

[Touch-packages] [Bug 2038662] [NEW] systemd-nspawn error: "Failed to mount image file system: Value too large for defined data type"

2023-10-06 Thread Brian Candler
Public bug reported:

Two-line reproducer: run this on an Ubuntu 22.04 server.

sudo machinectl pull-raw 
http://cloud-images.ubuntu.com/jammy/current/jammy-server-cloudimg-amd64.img 
jammy-rootfs
sudo machinectl start jammy-rootfs

Response:
Job for systemd-nspawn@jammy-rootfs.service failed because the control process 
exited with error code.

Here's the relevant output from "journalctl -xeu 
systemd-nspawn@jammy-rootfs.service"

░░ A start job for unit systemd-nspawn@jammy-rootfs.service has begun execution.
░░
░░ The job identifier is 3223.
Oct 06 13:13:21 brian-kit systemd-nspawn[36720]: Failed to mount image file 
system: Value too large for defined data type
Oct 06 13:13:21 brian-kit systemd-nspawn[36688]: Short read while reading 
cgroup mode (0 bytes). The child is most likely dead.
Oct 06 13:13:21 brian-kit systemd[1]: systemd-nspawn@jammy-rootfs.service: Main 
process exited, code=exited, status=1/FAILURE
░░ Subject: Unit process exited
░░ Defined-By: systemd
░░ Support: http://www.ubuntu.com/support
░░
░░ An ExecStart= process belonging to unit systemd-nspawn@jammy-rootfs.service 
has exited.
░░
░░ The process' exit code is 'exited' and its exit status is 1.
Oct 06 13:13:21 brian-kit systemd[1]: systemd-nspawn@jammy-rootfs.service: 
Failed with result 'exit-code'.


This appears to be similar to
https://github.com/systemd/systemd/issues/20989

If so, a fix was committed in March 2022: 
https://github.com/systemd/systemd/pull/22774
but maybe that was too late for 22.04? Or this is a different problem?

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: systemd-container 249.11-0ubuntu3.10
ProcVersionSignature: Ubuntu 5.15.0-84.93-generic 5.15.116
Uname: Linux 5.15.0-84-generic x86_64
NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
ApportVersion: 2.20.11-0ubuntu82.5
Architecture: amd64
CasperMD5CheckResult: pass
CloudArchitecture: x86_64
CloudID: none
CloudName: none
CloudPlatform: none
CloudSubPlatform: config
Date: Fri Oct  6 13:10:41 2023
InstallationDate: Installed on 2022-11-04 (335 days ago)
InstallationMedia: Ubuntu-Server 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809)
ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 LANG=en_GB.UTF-8
 SHELL=/bin/bash
SourcePackage: systemd
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: systemd (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug jammy uec-images

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/2038662

Title:
  systemd-nspawn error: "Failed to mount image file system: Value too
  large for defined data type"

Status in systemd package in Ubuntu:
  New

Bug description:
  Two-line reproducer: run this on an Ubuntu 22.04 server.

  sudo machinectl pull-raw 
http://cloud-images.ubuntu.com/jammy/current/jammy-server-cloudimg-amd64.img 
jammy-rootfs
  sudo machinectl start jammy-rootfs

  Response:
  Job for systemd-nspawn@jammy-rootfs.service failed because the control 
process exited with error code.

  Here's the relevant output from "journalctl -xeu 
systemd-nspawn@jammy-rootfs.service"
  
  ░░ A start job for unit systemd-nspawn@jammy-rootfs.service has begun 
execution.
  ░░
  ░░ The job identifier is 3223.
  Oct 06 13:13:21 brian-kit systemd-nspawn[36720]: Failed to mount image file 
system: Value too large for defined data type
  Oct 06 13:13:21 brian-kit systemd-nspawn[36688]: Short read while reading 
cgroup mode (0 bytes). The child is most likely dead.
  Oct 06 13:13:21 brian-kit systemd[1]: systemd-nspawn@jammy-rootfs.service: 
Main process exited, code=exited, status=1/FAILURE
  ░░ Subject: Unit process exited
  ░░ Defined-By: systemd
  ░░ Support: http://www.ubuntu.com/support
  ░░
  ░░ An ExecStart= process belonging to unit 
systemd-nspawn@jammy-rootfs.service has exited.
  ░░
  ░░ The process' exit code is 'exited' and its exit status is 1.
  Oct 06 13:13:21 brian-kit systemd[1]: systemd-nspawn@jammy-rootfs.service: 
Failed with result 'exit-code'.
  

  This appears to be similar to
  https://github.com/systemd/systemd/issues/20989

  If so, a fix was committed in March 2022: 
https://github.com/systemd/systemd/pull/22774
  but maybe that was too late for 22.04? Or this is a different problem?

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: systemd-container 249.11-0ubuntu3.10
  ProcVersionSignature: Ubuntu 5.15.0-84.93-generic 5.15.116
  Uname: Linux 5.15.0-84-generic x86_64
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
  ApportVersion: 2.20.11-0ubuntu82.5
  Architecture: amd64
  CasperMD5CheckResult: pass
  CloudArchitecture: x86_64
  CloudID: none
  CloudName: none
  CloudPlatform: none
  CloudSubPlatform: config
  Date: Fri Oct  6 13:10:41 2023
  InstallationDate: Installed on 2022-11-04 (335 days ago)
  InstallationMedia: Ubuntu-Server 22.04.1 

[Touch-packages] [Bug 2034539] Re: Create the usbmux user in the preinst script

2023-10-06 Thread Launchpad Bug Tracker
This bug was fixed in the package usbmuxd - 1.1.1-3ubuntu1

---
usbmuxd (1.1.1-3ubuntu1) mantic; urgency=medium

  * Rename usbmuxd.postinst to usbmuxd.preinst (LP: #2034539)
- Due to an issue with Netplan (LP#1999178), upgrades from Lunar to Mantic
  are suffering from long pauses. One of the observed causes is the fact
  that usbmuxd will install a udev rules file referring to a user that
  will only be created later in the upgrade process. While we work on the
  proper fix, turning the postinst script that created the user to a
  preinst will help working around this issue.

 -- Danilo Egea Gondolfo   Wed, 06
Sep 2023 12:22:35 +0100

** Changed in: usbmuxd (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to usbmuxd in Ubuntu.
https://bugs.launchpad.net/bugs/2034539

Title:
  Create the usbmux user in the preinst script

Status in usbmuxd package in Ubuntu:
  Fix Released

Bug description:
  The installation of this package as part of the upgrade process from
  Lunar to Mantic (it's already present in Desktop images so it's not a
  problem there apparently) is triggering an issue in Netplan
  https://bugs.launchpad.net/netplan/+bug/1999178

  This package will install a udev .rules file referring to a user that
  will be created only in the final steps of the upgrade process. As
  systemd daemon-reload is called a number of times during the process.
  The issue is triggered many times and makes the upgrade take way
  longer than it should.

  In resume, Netplan is calling udevadm reload from a systemd generator,
  it will process .rules files. When it tries to check the users defined
  in these files, if they don't exist in /etc/passwd, it will go to
  systemd (thanks to our nsswitch.conf). But because we are in the
  middle of a daemon-reload, the userdb is not ready yet and the process
  will stuck until it times out (for like 2 minutes).

  The workaround would be to create the user sooner. But the problem
  will continue to happen if another package does the same thing.

  While this is an issue with Netplan, the proper fix is complicated and
  we are working on it https://github.com/canonical/netplan/pull/304

  
  How to reproduce the issue: launch a LXD Lunar default or cloud image and try 
to do a do-release-upgrade to mantic. You'll notice that at some point during 
the "setting up" phase the process will stuck every time a install script calls 
a systemctl daemon-reload.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/usbmuxd/+bug/2034539/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038567] Re: Mantic 6.5.0-7 kernel causes regression in LXD container usage

2023-10-06 Thread John Chittum
Repeating a bit with a Jammy container (hence new comment)

### PRE CONDITION

this is using the custom Mantic VM _and_ has
apparmor_restrict_unprivileged_unconfined disabled

sudo bash -c "echo 0 >
/proc/sys/kernel/apparmor_restrict_unprivileged_unconfined"

1. start a jammy container

lxc launch ubuntu:jammy
Creating the instance
Instance name is: alive-bee   
Starting alive-bee

2. see some apparmor denies in journal

Oct 06 12:32:57 mantic-cust-vm kernel: audit: type=1400 
audit(1696595577.647:954): apparmor="DENIED" operation="mount" class="mount" 
info="failed flags match" error=-13 
profile="lxd-alive-bee_" 
name="/run/systemd/unit-root/proc/" pid=5421 comm="(d-logind)" fstype="proc" 
srcname="proc" flags="rw, nosuid, nodev, noexec"
Oct 06 12:33:01 mantic-cust-vm kernel: kauditd_printk_skb: 20 callbacks 
suppressed
Oct 06 12:33:01 mantic-cust-vm kernel: audit: type=1400 
audit(1696595581.539:975): apparmor="DENIED" operation="file_inherit" 
class="file" namespace="root//lxd-alive-bee_" 
profile="snap.lxd.hook.install" name="/apparmor/.null" pid=5538 
comm="snap-exec" requested_mask="wr" denied_mask="wr" fsuid=100 ouid=0
Oct 06 12:33:03 mantic-cust-vm kernel: audit: type=1400 
audit(1696595583.771:976): apparmor="DENIED" operation="file_inherit" 
class="net" namespace="root//lxd-alive-bee_" 
profile="/snap/snapd/20092/usr/lib/snapd/snap-confine" pid=5784 
comm="snap-confine" family="netlink" sock_type="raw" protocol=15 
requested_mask="send receive" denied_mask="send receive"
Oct 06 12:33:03 mantic-cust-vm kernel: audit: type=1400 
audit(1696595583.779:977): apparmor="DENIED" operation="file_inherit" 
class="file" namespace="root//lxd-alive-bee_" 
profile="snap.lxd.hook.configure" name="/apparmor/.null" pid=5784 
comm="snap-exec" requested_mask="wr" denied_mask="wr" fsuid=100 ouid=0
Oct 06 12:33:03 mantic-cust-vm kernel: audit: type=1400 
audit(1696595583.791:978): apparmor="DENIED" operation="file_inherit" 
class="file" namespace="root//lxd-alive-bee_" 
profile="/snap/snapd/20092/usr/lib/snapd/snap-confine" name="/apparmor/.null" 
pid=5784 comm="aa-exec" requested_mask="wr" denied_mask="wr" fsuid=100 
ouid=0
Oct 06 12:33:04 mantic-cust-vm kernel: audit: type=1400 
audit(1696595584.007:979): apparmor="DENIED" operation="mount" class="mount" 
info="failed flags match" error=-13 
profile="lxd-alive-bee_" 
name="/run/systemd/unit-root/proc/" pid=5933 comm="(imedated)" fstype="proc" 
srcname="proc" flags="rw, nosuid, nodev, noexec"

3. snap changes is Done

root@alive-bee:~# snap changes
ID   Status  Spawn Ready   Summary
1Done9 days ago, at 02:11 UTC  today at 12:33 UTC  Initialize system 
state
2Donetoday at 12:32 UTCtoday at 12:33 UTC  Initialize device

4. cloud-init is done

root@alive-bee:~# cloud-init status
status: done


So using the latest released jammy container is also now launching 
"successfully." Unsure how the other apparmor things denies affect container 
performance. Running a quick spot check of my machine (Jammy) launching a Jammy 
container

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/2038567

Title:
  Mantic 6.5.0-7 kernel causes regression in LXD container usage

Status in Release Notes for Ubuntu:
  New
Status in apparmor package in Ubuntu:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in lxd package in Ubuntu:
  New
Status in snapd package in Ubuntu:
  New

Bug description:
  Following upgrade to 6.5.0-7 kernel in mantic cloud images we are
  seeing a regression in our cloud image tests. The test runs the
  following:

  ```
  lxd init --auto --storage-backend dir
  lxc launch ubuntu-daily:mantic mantic
  lxc info mantic
  lxc exec mantic -- cloud-init status --wait
  ```

  The `lxc exec mantic -- cloud-init status --wait` times out after 240s
  and will fail our test as a result.

  I have been able to replicate in a local VM

  ```
  wget 
http://cloud-images.ubuntu.com/mantic/20231005/mantic-server-cloudimg-amd64.img 
  wget --output-document=launch-qcow2-image-qemu.sh 
https://gist.githubusercontent.com/philroche/14c241c086a5730481e24178b654268f/raw/7af95cd4dfc8e1d0600e6118803d2c866765714e/gistfile1.txt
 
  chmod +x launch-qcow2-image-qemu.sh 

  ./launch-qcow2-image-qemu.sh --password passw0rd --image 
./mantic-server-cloudimg-amd64.img 
  cat < "./reproducer.sh"
  #!/bin/bash -eux
  lxd init --auto --storage-backend dir
  lxc launch ubuntu-daily:mantic mantic
  lxc info mantic
  lxc exec mantic -- cloud-init status --wait
  EOF
  chmod +x ./reproducer.sh
  sshpass -p passw0rd scp -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -P  ./reproducer.sh ubuntu@127.0.0.1:~/
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 sudo apt-get update
 

[Touch-packages] [Bug 2038567] Re: Mantic 6.5.0-7 kernel causes regression in LXD container usage

2023-10-06 Thread John Chittum
on my machine (specs at the end) running Jammy as the host, and
launching a Jammy container:

1. lxc launch ubuntu:jammy test-jammy-on-jammy

from journal

Oct 06 07:36:47 j5awry-sys76 kernel: audit: type=1400 
audit(1696595807.223:51559): apparmor="DENIED" operation="mount" class="mount" 
info="failed flags match" error=-13 
profile="lxd-test-jammy-on-jammy_" 
name="/run/systemd/unit-root/proc/" pid=723735 comm="(d-logind)" fstype="proc" 
srcname="proc" flags="rw, nosuid, nodev, noexec"
Oct 06 07:36:47 j5awry-sys76 kernel: audit: type=1400 
audit(1696595807.227:51560): apparmor="DENIED" operation="mount" class="mount" 
info="failed flags match" error=-13 
profile="lxd-test-jammy-on-jammy_" 
name="/run/systemd/unit-root/tmp/" pid=723724 comm="(crub_all)" flags="rw, 
nosuid, remount, bind"
Oct 06 07:36:47 j5awry-sys76 kernel: audit: type=1400 
audit(1696595807.239:51561): apparmor="DENIED" operation="mount" class="mount" 
info="failed flags match" error=-13 
profile="lxd-test-jammy-on-jammy_" 
name="/run/systemd/unit-root/proc/" pid=723750 comm="(ostnamed)" fstype="proc" 
srcname="proc" flags="rw, nosuid, nodev, noexec"


so i get the same `mount - failed flags match` that i see above, but not the 
`file-inherit` denies.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/2038567

Title:
  Mantic 6.5.0-7 kernel causes regression in LXD container usage

Status in Release Notes for Ubuntu:
  New
Status in apparmor package in Ubuntu:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in lxd package in Ubuntu:
  New
Status in snapd package in Ubuntu:
  New

Bug description:
  Following upgrade to 6.5.0-7 kernel in mantic cloud images we are
  seeing a regression in our cloud image tests. The test runs the
  following:

  ```
  lxd init --auto --storage-backend dir
  lxc launch ubuntu-daily:mantic mantic
  lxc info mantic
  lxc exec mantic -- cloud-init status --wait
  ```

  The `lxc exec mantic -- cloud-init status --wait` times out after 240s
  and will fail our test as a result.

  I have been able to replicate in a local VM

  ```
  wget 
http://cloud-images.ubuntu.com/mantic/20231005/mantic-server-cloudimg-amd64.img 
  wget --output-document=launch-qcow2-image-qemu.sh 
https://gist.githubusercontent.com/philroche/14c241c086a5730481e24178b654268f/raw/7af95cd4dfc8e1d0600e6118803d2c866765714e/gistfile1.txt
 
  chmod +x launch-qcow2-image-qemu.sh 

  ./launch-qcow2-image-qemu.sh --password passw0rd --image 
./mantic-server-cloudimg-amd64.img 
  cat < "./reproducer.sh"
  #!/bin/bash -eux
  lxd init --auto --storage-backend dir
  lxc launch ubuntu-daily:mantic mantic
  lxc info mantic
  lxc exec mantic -- cloud-init status --wait
  EOF
  chmod +x ./reproducer.sh
  sshpass -p passw0rd scp -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -P  ./reproducer.sh ubuntu@127.0.0.1:~/
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 sudo apt-get update
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 sudo apt-get upgrade 
--assume-yes
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 ./reproducer.sh
  ```

  The issue is not present with the 6.5.0-5 kernel and the issue is
  present regardless of the container launched. I tried the jammy
  container to test this.

  From my test VM

  ```
  ubuntu@cloudimg:~$ uname --all
  Linux cloudimg 6.5.0-7-generic #7-Ubuntu SMP PREEMPT_DYNAMIC Fri Sep 29 
09:14:56 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux
  ubuntu@cloudimg:~$ uname --kernel-release
  6.5.0-7-generic
  ```

  This is a regression in our test that will block 23.10 cloud image
  release next week.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/2038567/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038567] Re: Mantic 6.5.0-7 kernel causes regression in LXD container usage

2023-10-06 Thread John Chittum
Did the following:

1. launched a new VM from the custom build

lxc launch mantic-20231005 --vm --device root,size=20GiB mantic-cust-vm

2. pushed squashfs and lxc metadata from same custom build

lxc file push build.output/livecd.ubuntu-cpc.squashfs mantic-cust-vm/root/
lxc file push vm/mantic-server-cloudimg-amd64-lxd.tar.xz mantic-cust-vm/root/

3. initialized lxd

lxd init --auto

3. imported into lxc

lxc image import ./mantic-server-cloudimg-amd64-lxd.tar.xz
./livecd.ubuntu-cpc.squashfs --alias mantic-cust-con

4. launched the container

lxc launch mantic-cust-con m-c-c

5. observed the DENIED ptrace

Oct 06 12:27:01 mantic-cust-vm kernel: audit: type=1400
audit(1696595221.386:113): apparmor="DENIED" operation="ptrace"
class="ptrace" profile="lxd-m-c-c_" pid=2420
comm="systemd" requested_mask="read" denied_mask="read" peer="lxd-m-c-
c_//"

6. deleted the container

lxc stop m-c-c
lxc delete m-c-c

6. disabled apparmor_restrict_unprivileged_unconfined

sudo bash -c "echo 0 >
/proc/sys/kernel/apparmor_restrict_unprivileged_unconfined"

7. launched container

lxc launch mantic-cust-con m-c-c

8. see different apparmor denied messages:

Oct 06 12:29:58 mantic-cust-vm kernel: audit: type=1400 
audit(1696595398.722:905): apparmor="DENIED" operation="mount" class="mount" 
info="failed flags match" error=-13 
profile="lxd-m-c-c_" 
name="/run/systemd/unit-root/proc/" pid=4055 comm="(d-logind)" fstype="proc" 
srcname="proc" flags="rw, nosuid, nodev, noexec"
Oct 06 12:29:58 mantic-cust-vm kernel: audit: type=1400 
audit(1696595398.766:906): apparmor="DENIED" operation="mount" class="mount" 
info="failed flags match" error=-13 
profile="lxd-m-c-c_" 
name="/run/systemd/unit-root/proc/" pid=4048 comm="(polkitd)" fstype="proc" 
srcname="proc" flags="rw, nosuid, nodev, noexec"
Oct 06 12:29:58 mantic-cust-vm kernel: audit: type=1400 
audit(1696595398.818:907): apparmor="DENIED" operation="mount" class="mount" 
info="failed flags match" error=-13 
profile="lxd-m-c-c_" 
name="/run/systemd/unit-root/proc/" pid=4071 comm="(ostnamed)" fstype="proc" 
srcname="proc" flags="rw, nosuid, nodev, noexec"
Oct 06 12:29:58 mantic-cust-vm kernel: audit: type=1400 
audit(1696595398.874:908): apparmor="STATUS" operation="profile_replace" 
info="same as current profile, skipping" 
label="lxd-m-c-c_//&:lxd-m-c-c_:unconfined"
 name="rsyslogd" pid=4062 comm="apparmor_parser"
Oct 06 12:29:59 mantic-cust-vm kernel: audit: type=1400 
audit(1696595399.106:909): apparmor="STATUS" operation="profile_replace" 
info="same as current profile, skipping" 
label="lxd-m-c-c_//&:lxd-m-c-c_:unconfined"
 name="/usr/lib/snapd/snap-confine" pid=4130 comm="apparmor_parser"
Oct 06 12:29:59 mantic-cust-vm kernel: audit: type=1400 
audit(1696595399.106:910): apparmor="STATUS" operation="profile_replace" 
info="same as current profile, skipping" 
label="lxd-m-c-c_//&:lxd-m-c-c_:unconfined"
 name="/usr/lib/snapd/snap-confine//mount-namespace-capture-helper" pid=4130 
comm="apparmor_parser"
Oct 06 12:29:59 mantic-cust-vm kernel: audit: type=1400 
audit(1696595399.482:911): apparmor="DENIED" operation="file_inherit" 
class="net" namespace="root//lxd-m-c-c_" 
profile="/usr/lib/snapd/snap-confine" pid=4146 comm="snap-confine" 
family="netlink" sock_type="raw" protocol=15 requested_mask="send receive" 
denied_mask="send receive"
Oct 06 12:29:59 mantic-cust-vm kernel: audit: type=1400 
audit(1696595399.498:912): apparmor="DENIED" operation="file_inherit" 
class="file" namespace="root//lxd-m-c-c_" 
profile="snap-update-ns.lxd" name="/apparmor/.null" pid=4157 comm="6" 
requested_mask="wr" denied_mask="wr" fsuid=100 ouid=0
Oct 06 12:29:59 mantic-cust-vm kernel: audit: type=1400 
audit(1696595399.558:913): apparmor="DENIED" operation="file_inherit" 
class="file" namespace="root//lxd-m-c-c_" 
profile="snap.lxd.hook.install" name="/apparmor/.null" pid=4146 
comm="snap-exec" requested_mask="wr" denied_mask="wr" fsuid=100 ouid=0

9. However, these are not affecting the container in the same fashion.
Snap finishes initializing, and cloud-init finishes

root@mantic-cust-vm:~# lxc shell m-c-c
root@m-c-c:~# snap changes
ID   Status  Spawn   Ready   Summary
1Doneyesterday at 21:03 UTC  today at 12:30 UTC  Initialize system state
2Donetoday at 12:29 UTC  today at 12:30 UTC  Initialize device

root@m-c-c:~# cloud-init status
status: done

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/2038567

Title:
  Mantic 6.5.0-7 kernel causes regression in LXD container usage

Status in Release Notes for Ubuntu:
  New
Status in apparmor package in Ubuntu:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in lxd package in Ubuntu:
  New
Status in snapd package in Ubuntu:
  New

Bug description:
  Following upgrade to 6.5.0-7 kernel in mantic cloud images we are
  seeing a regression in our cloud image 

[Touch-packages] [Bug 2033440] Re: ubuntu-desktop: unnecessary hard "Depends: pipewire-audio"

2023-10-06 Thread Jeremy Bícha
We're not going to change the ubuntu-desktop metapackage to allow
switching to pulseaudio for Ubuntu 23.10.

There was a pipewire 1.0 RC (versioned as 0.3.81) release today with further 
JACK improvements. That version is too late for Ubuntu 23.10 but it will be in 
Ubuntu 24.04 LTS.
https://gitlab.freedesktop.org/pipewire/pipewire/-/releases

I'm curious if pipewire will be good enough for Ubuntu 24.04 LTS for
professional audio users.

It is much easier and more reliable to simply depend on pipewire-audio,
especially since we need to upgrade people from Ubuntu 22.04 LTS which
had pulseaudio as default. Trying to allow people to intentionally opt
out also means that people can accidentally end up with the option that
is not our recommended audio server.

** Tags removed: rls-mm-incoming
** Tags added: rls-mm-notfixing

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-meta in Ubuntu.
https://bugs.launchpad.net/bugs/2033440

Title:
  ubuntu-desktop: unnecessary hard "Depends: pipewire-audio"

Status in ubuntu-meta package in Ubuntu:
  New
Status in ubuntu-meta source package in Lunar:
  Won't Fix

Bug description:
  Recommend demoting pipewire-audio from Depends: to Recommends:.

  Reason: While it's not ideal, the Ubuntu Desktop can still function on
  the pulseaudio backend rather than using the direct pipewire-alsa
  backend which conflicts with the pulseaudio package. This would help
  people who wish to have a more traditional JACK setup that is bridged
  to pulseaudio. Right now, this setup is incompatible.

  
  Original description:

  I have installed successfully the standard Ubuntu 23.04 (on a 500 GB
  external USB drive). Immediately after the installation, I have also
  installed with apt the "ubuntustudio-installer" package.

  In the dialog provided by the ubuntustudio-installer, I have selected
  the following metapackages:

  - linux-lowlatency
  - ubuntustudio-lowlatency-settings
  - ubuntustudio-performance-tweaks
  - ubuntustudio-audio
  - ubuntu-pulseaudio-config

  and pressed "Modify installed Package Selection"

  After a while a "qaptbatch" dialog has appeared with title

  "Commit Error"

  and message

  "An error occurred while applying changes"

  So the installation has failed. Then I have tried to manually install
  each metapackage in the list above with apt and every package was
  installed successfully.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/2033440/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2033440] Re: ubuntu-desktop: unnecessary hard "Depends: pipewire-audio"

2023-10-06 Thread Jeremy Bícha
** Changed in: ubuntu-meta (Ubuntu Mantic)
   Status: New => Won't Fix

** No longer affects: ubuntu-meta (Ubuntu Mantic)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-meta in Ubuntu.
https://bugs.launchpad.net/bugs/2033440

Title:
  ubuntu-desktop: unnecessary hard "Depends: pipewire-audio"

Status in ubuntu-meta package in Ubuntu:
  New
Status in ubuntu-meta source package in Lunar:
  Won't Fix

Bug description:
  Recommend demoting pipewire-audio from Depends: to Recommends:.

  Reason: While it's not ideal, the Ubuntu Desktop can still function on
  the pulseaudio backend rather than using the direct pipewire-alsa
  backend which conflicts with the pulseaudio package. This would help
  people who wish to have a more traditional JACK setup that is bridged
  to pulseaudio. Right now, this setup is incompatible.

  
  Original description:

  I have installed successfully the standard Ubuntu 23.04 (on a 500 GB
  external USB drive). Immediately after the installation, I have also
  installed with apt the "ubuntustudio-installer" package.

  In the dialog provided by the ubuntustudio-installer, I have selected
  the following metapackages:

  - linux-lowlatency
  - ubuntustudio-lowlatency-settings
  - ubuntustudio-performance-tweaks
  - ubuntustudio-audio
  - ubuntu-pulseaudio-config

  and pressed "Modify installed Package Selection"

  After a while a "qaptbatch" dialog has appeared with title

  "Commit Error"

  and message

  "An error occurred while applying changes"

  So the installation has failed. Then I have tried to manually install
  each metapackage in the list above with apt and every package was
  installed successfully.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-meta/+bug/2033440/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038650] Re: crash reports not sent to the Error Tracker

2023-10-06 Thread Brian Murray
** Tags removed: rls-mm-incoming
** Tags added: foundations-todo

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/2038650

Title:
  crash reports not sent to the Error Tracker

Status in apport package in Ubuntu:
  New

Bug description:
  From what I can tell when I click the send button to send a crash
  report to the Error Tracker the crash doesn't actually get sent. My
  testing process follows:

  1) Launch xeyes
  2) pkill -11 xeyes
  3) Click send in the apport dialog
  4) ls -lh /var/crash

  I would expect there to be three files in /var/crash:

  -rw-r- 1 bdmurray whoopsie  3370567 Oct  6 11:53 _usr_bin_xeyes.1000.crash
  -rw-rw-r-- 1 bdmurray bdmurray0 Oct  6 11:53 
_usr_bin_xeyes.1000.upload
  -rw--- 1 whoopsie whoopsie   37 Oct  6 11:53 
_usr_bin_xeyes.1000.uploaded

  However, after step #4 I'm only seeing the .crash file and not a
  .upload or .uploaded.  I was able to get the .upload and .uploaded
  files created if I chose to "View Report" and then click "Send".

  It's worth noting though that I did notice the size of the .crash file
  increase after clicking "Send" so some post-processing was done.

  ProblemType: Bug
  DistroRelease: Ubuntu 23.10
  Package: apport 2.27.0-0ubuntu4
  ProcVersionSignature: Ubuntu 6.5.0-5.5-generic 6.5.0
  Uname: Linux 6.5.0-5-generic x86_64
  NonfreeKernelModules: zfs
  ApportVersion: 2.27.0-0ubuntu4
  Architecture: amd64
  CasperMD5CheckResult: pass
  CrashReports: 640:1000:123:20944237:2023-10-06 12:10:47.809248208 
+0100:2023-10-06 12:11:23.340030509 +0100:/var/crash/_usr_bin_mpv.1000.crash
  CurrentDesktop: ubuntu:GNOME
  Date: Fri Oct  6 12:12:46 2023
  InstallationDate: Installed on 2022-01-07 (637 days ago)
  InstallationMedia: Ubuntu 21.10 "Impish Indri" - Release amd64 (20211012)
  PackageArchitecture: all
  SourcePackage: apport
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/2038650/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2033422] Re: openssl: backport to jammy "clear method store / query cache confusion"

2023-10-06 Thread Adrien Nader
(did my mail answer from yesterday get eaten by launchpad?)

Here's an updated debdiff that:
- renames files using the lp- prefix,
- reworks the changelog to a more typical format:
* what (LP: #)
  - ${file}
- adds DEP-3 to the patches


I've pushed an updated build on LP at 
https://launchpad.net/~adrien-n/+archive/ubuntu/openssl-jammy-sru/+packages

It's still building unfortunately and I noticed typos in the changelog
which I corrected but didn't upload to the PPA due to how long it takes
to build. The differences are very minor (first level of the lsit in
d/changelog used - rather than *).

** Patch added: "openssl_3.0.2-0-ubuntu1.10-to-1.11.diff"
   
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/2033422/+attachment/5707350/+files/openssl_3.0.2-0-ubuntu1.10-to-1.11.diff

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/2033422

Title:
  openssl: backport to jammy "clear method store / query cache
  confusion"

Status in openssl package in Ubuntu:
  New
Status in openssl source package in Jammy:
  In Progress
Status in openssl source package in Lunar:
  Fix Released

Bug description:
  === SRU information ===
  [Meta]
  This bug is part of a series of four bugs for a single SRU.
  This ( #2033422 ) is the "central" bug with the global information and 
debdiff.

  This SRU addresses four issues with Jammy's openssl version:
  - http://pad.lv/1990216: Blowfish OFB/CFB decryption
  - http://pad.lv/1994165: ignored SMIME signature errors
  - http://pad.lv/2023545: imbca engine dumps core
  - http://pad.lv/2033422: very high CPU usage for concurrent TLS connections

  The SRU information has been added to the four bug reports and I am
  attaching the debdiff here only for all four.

  All the patches have been included in subsequent openssl 3.0.x
  releases which in turn have been included in subsequent Ubuntu
  releases. There has been no report of issues when updating to these
  Ubuntu releases.

  I have rebuilt the openssl versions and used abi-compliance-checker to
  compare the ABIs of the libraries in jammy and the one for the SRU.
  Both matched completely (FYI, mantic's matched completely too).

  The patch related to blowfish presents an annoying situation: jammy's openssl 
creates incompatible files and cannot read other files but fixing it will lead 
to files created on jammy so far to become unreadable. Fortunately, blowfish is 
long-deprecated and applications can be improved to handle this situation if 
the need arises in practice.
  This is stated in the SRU information in the bug and in d/changelog.
  The current situation in Jammy could be a security issue but due to the 
aforementioned deprecation, the low usage of blowfish and the fact that 
upstream didn't consider this worthy of a security notice, we (this includes 
the security team) chose not to pursue that path either.

  I have also pushed the code to git (without any attempt to make it
  git-ubuntu friendly).

  
https://code.launchpad.net/~adrien-n/ubuntu/+source/openssl/+git/openssl/+ref/jammy-
  sru

  I asked Brian Murray about phasing speed and he concurs a slow roll-out is 
probably better for openssl. There is a small uncertainty because a security 
update could come before the phasing is over, effectively fast-forwarding the 
SRU. Still, unless there is already a current pre-advisory, this is probably 
better than a 10% phasing which is over after only a couple days anyway.
  NB: at the moment openssl doesn't phase slowly so this needs to be 
implemented.

  [Impact]
  Severely degraded performance for concurrent operations compared to openssl 
1.1. The performance is so degraded that some workloads fail due to timeouts or 
insufficient resources (noone magically has 5 times more machines). As a 
consequence, a number of people use openssl 1.1 instead and do not get security 
updates.

  [Test plan]
  Rafael Lopez has shared a simple benchmarks in http://pad.lv/2009544 with 
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/2009544/+attachment/5690224/+files/main.py
 .
  Using this, I get the following numbers on my laptop:

  3.0.2:
  real  2m5.567s
  user  4m3.948s
  sys   2m0.233s

  this SRU:
  real  0m23.966s
  user  2m35.687s
  sys   0m1.920s

  As can be easily seen, the speed-up is massive: system time is divided
  by 60 and overall wall clock time is roughly five times lower.

  In http://pad.lv/2009544 , Rafael also shared his performance numbers
  and they are relatable to these. He used slightly different versions
  (upstreams rather than patched with cherry-picks) but at least one of
  the version used does not include other performance change. He also
  used different hardware and this performance issue seems to depend on
  the number of CPUs available but also obtained a performance several
  times better. Results on a given machine 

[Touch-packages] [Bug 2038650] Re: crash reports not sent to the Error Tracker

2023-10-06 Thread Sebastien Bacher
** Tags added: rls-mm-incoming

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/2038650

Title:
  crash reports not sent to the Error Tracker

Status in apport package in Ubuntu:
  New

Bug description:
  From what I can tell when I click the send button to send a crash
  report to the Error Tracker the crash doesn't actually get sent. My
  testing process follows:

  1) Launch xeyes
  2) pkill -11 xeyes
  3) Click send in the apport dialog
  4) ls -lh /var/crash

  I would expect there to be three files in /var/crash:

  -rw-r- 1 bdmurray whoopsie  3370567 Oct  6 11:53 _usr_bin_xeyes.1000.crash
  -rw-rw-r-- 1 bdmurray bdmurray0 Oct  6 11:53 
_usr_bin_xeyes.1000.upload
  -rw--- 1 whoopsie whoopsie   37 Oct  6 11:53 
_usr_bin_xeyes.1000.uploaded

  However, after step #4 I'm only seeing the .crash file and not a
  .upload or .uploaded.  I was able to get the .upload and .uploaded
  files created if I chose to "View Report" and then click "Send".

  It's worth noting though that I did notice the size of the .crash file
  increase after clicking "Send" so some post-processing was done.

  ProblemType: Bug
  DistroRelease: Ubuntu 23.10
  Package: apport 2.27.0-0ubuntu4
  ProcVersionSignature: Ubuntu 6.5.0-5.5-generic 6.5.0
  Uname: Linux 6.5.0-5-generic x86_64
  NonfreeKernelModules: zfs
  ApportVersion: 2.27.0-0ubuntu4
  Architecture: amd64
  CasperMD5CheckResult: pass
  CrashReports: 640:1000:123:20944237:2023-10-06 12:10:47.809248208 
+0100:2023-10-06 12:11:23.340030509 +0100:/var/crash/_usr_bin_mpv.1000.crash
  CurrentDesktop: ubuntu:GNOME
  Date: Fri Oct  6 12:12:46 2023
  InstallationDate: Installed on 2022-01-07 (637 days ago)
  InstallationMedia: Ubuntu 21.10 "Impish Indri" - Release amd64 (20211012)
  PackageArchitecture: all
  SourcePackage: apport
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/2038650/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038453] Re: [SRU] apt snapshot integration backport

2023-10-06 Thread Julian Andres Klode
jammy and focal packages uploaded to the archive for SRU

jammy, focal, and bionic also uploaded to

https://launchpad.net/~deity/+archive/ubuntu/apt/+packages

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/2038453

Title:
  [SRU] apt snapshot integration backport

Status in Ubuntu Pro:
  Triaged
Status in Ubuntu Pro 18.04 series:
  Triaged
Status in apt package in Ubuntu:
  Fix Released
Status in apt source package in Bionic:
  Won't Fix
Status in apt source package in Focal:
  In Progress
Status in apt source package in Jammy:
  In Progress
Status in apt source package in Lunar:
  Won't Fix
Status in apt source package in Mantic:
  Fix Released

Bug description:
  [Impact]
  The snapshot service provides users access to older states of the archive 
with ease of use, and enables a consistent user experience across all supported 
releases, as otherwise users would have to rewrite their sources.list to make 
use of snapshots and set up pinning; hence partners requested the feature be 
SRUed to older releases as well.

  [Test plan]
  The complete regression test suite in autopkgtests includes an automatic test 
case for this and the known limitations that have been fixed. Aside from that, 
it is also worthwhile to do an end-to-end test:

  Configure snapshot=yes for Ubuntu sources in your sources.list and

  1. run apt update - it should not use snapshot
  2. run apt update --snapshot 20231001T00Z, it should download the snapshot
  3. run apt policy --snapshot 20231001T00Z hello, it should show hello in 
the snapshot
  4. run apt install --snapshot 20231001T00Z hello, it should install hello 
from the snapshot
  5. Run apt update; observe snapshot not being downloaded
  6. Observe snapshots are gone from /var/lib/apt/lists again

  [Where problems could occur]
  The integration has been purposefully limited in how it works to reduce the 
impact it has on the APT code; hence it was possible to cherry-pick this into 
22.04, 20.04, and even 18.04, with only a minor editorial change. This 
significantly limits the risk.

  This feature is only enabled for sources with snapshot=yes (.list) or
  Snapshot: yes (.sources) or other truthy values apt recognizes. Most
  users will not have such entries as they did not have an APT
  supporting it.

  This combined should ensure that users do not experience any
  regressions. However the feature may be lacking in some ways that we
  may want to address in follow up SRUs; it has not been used in the
  wild a lot.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-pro/+bug/2038453/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038650] [NEW] crash reports not sent to the Error Tracker

2023-10-06 Thread Brian Murray
Public bug reported:

>From what I can tell when I click the send button to send a crash report
to the Error Tracker the crash doesn't actually get sent. My testing
process follows:

1) Launch xeyes
2) pkill -11 xeyes
3) Click send in the apport dialog
4) ls -lh /var/crash

I would expect there to be three files in /var/crash:

-rw-r- 1 bdmurray whoopsie  3370567 Oct  6 11:53 _usr_bin_xeyes.1000.crash
-rw-rw-r-- 1 bdmurray bdmurray0 Oct  6 11:53 _usr_bin_xeyes.1000.upload
-rw--- 1 whoopsie whoopsie   37 Oct  6 11:53 
_usr_bin_xeyes.1000.uploaded

However, after step #4 I'm only seeing the .crash file and not a .upload
or .uploaded.  I was able to get the .upload and .uploaded files created
if I chose to "View Report" and then click "Send".

It's worth noting though that I did notice the size of the .crash file
increase after clicking "Send" so some post-processing was done.

ProblemType: Bug
DistroRelease: Ubuntu 23.10
Package: apport 2.27.0-0ubuntu4
ProcVersionSignature: Ubuntu 6.5.0-5.5-generic 6.5.0
Uname: Linux 6.5.0-5-generic x86_64
NonfreeKernelModules: zfs
ApportVersion: 2.27.0-0ubuntu4
Architecture: amd64
CasperMD5CheckResult: pass
CrashReports: 640:1000:123:20944237:2023-10-06 12:10:47.809248208 
+0100:2023-10-06 12:11:23.340030509 +0100:/var/crash/_usr_bin_mpv.1000.crash
CurrentDesktop: ubuntu:GNOME
Date: Fri Oct  6 12:12:46 2023
InstallationDate: Installed on 2022-01-07 (637 days ago)
InstallationMedia: Ubuntu 21.10 "Impish Indri" - Release amd64 (20211012)
PackageArchitecture: all
SourcePackage: apport
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: apport (Ubuntu)
 Importance: High
 Status: New


** Tags: amd64 apport-bug mantic rls-mm-incoming wayland-session

** Changed in: apport (Ubuntu)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/2038650

Title:
  crash reports not sent to the Error Tracker

Status in apport package in Ubuntu:
  New

Bug description:
  From what I can tell when I click the send button to send a crash
  report to the Error Tracker the crash doesn't actually get sent. My
  testing process follows:

  1) Launch xeyes
  2) pkill -11 xeyes
  3) Click send in the apport dialog
  4) ls -lh /var/crash

  I would expect there to be three files in /var/crash:

  -rw-r- 1 bdmurray whoopsie  3370567 Oct  6 11:53 _usr_bin_xeyes.1000.crash
  -rw-rw-r-- 1 bdmurray bdmurray0 Oct  6 11:53 
_usr_bin_xeyes.1000.upload
  -rw--- 1 whoopsie whoopsie   37 Oct  6 11:53 
_usr_bin_xeyes.1000.uploaded

  However, after step #4 I'm only seeing the .crash file and not a
  .upload or .uploaded.  I was able to get the .upload and .uploaded
  files created if I chose to "View Report" and then click "Send".

  It's worth noting though that I did notice the size of the .crash file
  increase after clicking "Send" so some post-processing was done.

  ProblemType: Bug
  DistroRelease: Ubuntu 23.10
  Package: apport 2.27.0-0ubuntu4
  ProcVersionSignature: Ubuntu 6.5.0-5.5-generic 6.5.0
  Uname: Linux 6.5.0-5-generic x86_64
  NonfreeKernelModules: zfs
  ApportVersion: 2.27.0-0ubuntu4
  Architecture: amd64
  CasperMD5CheckResult: pass
  CrashReports: 640:1000:123:20944237:2023-10-06 12:10:47.809248208 
+0100:2023-10-06 12:11:23.340030509 +0100:/var/crash/_usr_bin_mpv.1000.crash
  CurrentDesktop: ubuntu:GNOME
  Date: Fri Oct  6 12:12:46 2023
  InstallationDate: Installed on 2022-01-07 (637 days ago)
  InstallationMedia: Ubuntu 21.10 "Impish Indri" - Release amd64 (20211012)
  PackageArchitecture: all
  SourcePackage: apport
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/2038650/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038453] Re: [SRU] apt snapshot integration backport

2023-10-06 Thread Julian Andres Klode
** Changed in: apt (Ubuntu Jammy)
   Status: Confirmed => In Progress

** Changed in: apt (Ubuntu Focal)
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/2038453

Title:
  [SRU] apt snapshot integration backport

Status in Ubuntu Pro:
  Triaged
Status in Ubuntu Pro 18.04 series:
  Triaged
Status in apt package in Ubuntu:
  Fix Released
Status in apt source package in Bionic:
  Won't Fix
Status in apt source package in Focal:
  In Progress
Status in apt source package in Jammy:
  In Progress
Status in apt source package in Lunar:
  Won't Fix
Status in apt source package in Mantic:
  Fix Released

Bug description:
  [Impact]
  The snapshot service provides users access to older states of the archive 
with ease of use, and enables a consistent user experience across all supported 
releases, as otherwise users would have to rewrite their sources.list to make 
use of snapshots and set up pinning; hence partners requested the feature be 
SRUed to older releases as well.

  [Test plan]
  The complete regression test suite in autopkgtests includes an automatic test 
case for this and the known limitations that have been fixed. Aside from that, 
it is also worthwhile to do an end-to-end test:

  Configure snapshot=yes for Ubuntu sources in your sources.list and

  1. run apt update - it should not use snapshot
  2. run apt update --snapshot 20231001T00Z, it should download the snapshot
  3. run apt policy --snapshot 20231001T00Z hello, it should show hello in 
the snapshot
  4. run apt install --snapshot 20231001T00Z hello, it should install hello 
from the snapshot
  5. Run apt update; observe snapshot not being downloaded
  6. Observe snapshots are gone from /var/lib/apt/lists again

  [Where problems could occur]
  The integration has been purposefully limited in how it works to reduce the 
impact it has on the APT code; hence it was possible to cherry-pick this into 
22.04, 20.04, and even 18.04, with only a minor editorial change. This 
significantly limits the risk.

  This feature is only enabled for sources with snapshot=yes (.list) or
  Snapshot: yes (.sources) or other truthy values apt recognizes. Most
  users will not have such entries as they did not have an APT
  supporting it.

  This combined should ensure that users do not experience any
  regressions. However the feature may be lacking in some ways that we
  may want to address in follow up SRUs; it has not been used in the
  wild a lot.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-pro/+bug/2038453/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038453] Re: [SRU] apt snapshot integration backport

2023-10-06 Thread Julian Andres Klode
** Description changed:

  [Impact]
  The snapshot service provides users access to older states of the archive 
with ease of use, and enables a consistent user experience across all supported 
releases, as otherwise users would have to rewrite their sources.list to make 
use of snapshots and set up pinning; hence partners requested the feature be 
SRUed to older releases as well.
  
  [Test plan]
  The complete regression test suite in autopkgtests includes an automatic test 
case for this and the known limitations that have been fixed. Aside from that, 
it is also worthwhile to do an end-to-end test:
  
  Configure snapshot=yes for Ubuntu sources in your sources.list and
  
  1. run apt update - it should not use snapshot
  2. run apt update --snapshot 20231001T00Z, it should download the snapshot
- 3. run apt install --snapshot 20231001T00Z hello, it should install hello 
from the snapshot
+ 3. run apt policy --snapshot 20231001T00Z hello, it should show hello in 
the snapshot
+ 4. run apt install --snapshot 20231001T00Z hello, it should install hello 
from the snapshot
+ 5. Run apt update
+ 6. Observe snapshots are gone from /var/lib/apt/lists again
  
  [Where problems could occur]
  The integration has been purposefully limited in how it works to reduce the 
impact it has on the APT code; hence it was possible to cherry-pick this into 
22.04, 20.04, and even 18.04, with only a minor editorial change. This 
significantly limits the risk.
  
  This feature is only enabled for sources with snapshot=yes (.list) or
  Snapshot: yes (.sources) or other truthy values apt recognizes. Most
  users will not have such entries as they did not have an APT supporting
  it.
  
  This combined should ensure that users do not experience any
  regressions. However the feature may be lacking in some ways that we may
  want to address in follow up SRUs; it has not been used in the wild a
  lot.

** Description changed:

  [Impact]
  The snapshot service provides users access to older states of the archive 
with ease of use, and enables a consistent user experience across all supported 
releases, as otherwise users would have to rewrite their sources.list to make 
use of snapshots and set up pinning; hence partners requested the feature be 
SRUed to older releases as well.
  
  [Test plan]
  The complete regression test suite in autopkgtests includes an automatic test 
case for this and the known limitations that have been fixed. Aside from that, 
it is also worthwhile to do an end-to-end test:
  
  Configure snapshot=yes for Ubuntu sources in your sources.list and
  
  1. run apt update - it should not use snapshot
  2. run apt update --snapshot 20231001T00Z, it should download the snapshot
  3. run apt policy --snapshot 20231001T00Z hello, it should show hello in 
the snapshot
  4. run apt install --snapshot 20231001T00Z hello, it should install hello 
from the snapshot
- 5. Run apt update
+ 5. Run apt update; observe snapshot not being downloaded
  6. Observe snapshots are gone from /var/lib/apt/lists again
  
  [Where problems could occur]
  The integration has been purposefully limited in how it works to reduce the 
impact it has on the APT code; hence it was possible to cherry-pick this into 
22.04, 20.04, and even 18.04, with only a minor editorial change. This 
significantly limits the risk.
  
  This feature is only enabled for sources with snapshot=yes (.list) or
  Snapshot: yes (.sources) or other truthy values apt recognizes. Most
  users will not have such entries as they did not have an APT supporting
  it.
  
  This combined should ensure that users do not experience any
  regressions. However the feature may be lacking in some ways that we may
  want to address in follow up SRUs; it has not been used in the wild a
  lot.

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/2038453

Title:
  [SRU] apt snapshot integration backport

Status in Ubuntu Pro:
  Triaged
Status in Ubuntu Pro 18.04 series:
  Triaged
Status in apt package in Ubuntu:
  Fix Released
Status in apt source package in Bionic:
  Won't Fix
Status in apt source package in Focal:
  In Progress
Status in apt source package in Jammy:
  In Progress
Status in apt source package in Lunar:
  Won't Fix
Status in apt source package in Mantic:
  Fix Released

Bug description:
  [Impact]
  The snapshot service provides users access to older states of the archive 
with ease of use, and enables a consistent user experience across all supported 
releases, as otherwise users would have to rewrite their sources.list to make 
use of snapshots and set up pinning; hence partners requested the feature be 
SRUed to older releases as well.

  [Test plan]
  The complete regression test suite in autopkgtests includes an automatic test 
case for this and the known limitations that have been fixed. Aside from that, 
it is also 

[Touch-packages] [Bug 2037202] Re: Mantic/23.10: PXE boot tries to initialize DHCP before network link is up

2023-10-06 Thread Marian Rainer-Harbach
I tested on two machines where the boot failed previously. With the new
`scripts/functions`, the boot now works properly. Thanks you!

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/2037202

Title:
  Mantic/23.10: PXE boot tries to initialize DHCP before network link is
  up

Status in initramfs-tools package in Ubuntu:
  Fix Released

Bug description:
  I'm not sure whether this is the correct package for this bug, please
  reassign if not.

  I'm booting the Ubuntu Mantic/23.10 desktop beta image via PXE in
  order to perform an unattended installation. The kernel command line
  looks like that:

  iso/casper/vmlinuz --- ip=dhcp netboot=nfs
  nfsroot=192.168.1.1:/export/ubuntu autoinstall ds=nocloud\;s=

  This has worked perfectly before. However, in 23.10, the kernel tries
  to intialize DHCP before a network link is up.

  I can see a few instances of messages like the following:
  dhcpcd-10.0.2 starting
  dev: loaded udev
  no interfaces have a carrier
  exiting due to oneshot
  dhcpcd exited

  Then, the kernel tries to mount NFS, even though neither an IP address nor 
even a link is available:
  connect: Network is unreachable
  NFS over TCP not available from 192.168.1.1

  This is repeated for a while. In between, a message tells that now the link 
is up:
  [10.0002805] e1000e :00:19.0 enp0s25: NIC Link is Up 1000 Mbps Full 
Duplex, Flow Control: Rx/Tx

  The NFS messages repeat for a while, until the system gives up and I'm
  dropped into a busybox prompt.

  Executing dhcpcd now correctly gets IP addresses, but I don't know how
  to continue the boot from there.

  The problem occurs on most physical machines that I tried, but not in
  VMs.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/2037202/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2037497] Re: gnome-shell crashes on Intel Ice Lake with SIGSEGV at NULL from end_query() from cogl_gl_create_timestamp_query() from cogl_onscreen_egl_swap_buffers_with_damage()

2023-10-06 Thread Daniel van Vugt
** Changed in: mesa (Ubuntu)
Milestone: mantic-updates => ubuntu-23.10

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mesa in Ubuntu.
https://bugs.launchpad.net/bugs/2037497

Title:
  gnome-shell crashes on Intel Ice Lake with SIGSEGV at NULL from
  end_query() from cogl_gl_create_timestamp_query() from
  cogl_onscreen_egl_swap_buffers_with_damage()

Status in Mesa:
  New
Status in mesa package in Ubuntu:
  Triaged
Status in mesa package in Fedora:
  Confirmed

Bug description:
  crash after update
  wayland session is not accessible anymore

  ProblemType: Crash
  DistroRelease: Ubuntu 23.10
  Package: gnome-shell 45.0-1ubuntu1
  ProcVersionSignature: Ubuntu 6.5.0-5.5-generic 6.5.0
  Uname: Linux 6.5.0-5-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.27.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 27 05:52:26 2023
  DisplayManager: gdm3
  ExecutablePath: /usr/bin/gnome-shell
  InstallationDate: Installed on 2023-09-26 (0 days ago)
  InstallationMedia: Ubuntu 23.10 "Mantic Minotaur" - Beta amd64 (20230924)
  ProcCmdline: /usr/bin/gnome-shell
  ProcEnviron:
   LANG=fr_FR.UTF-8
   PATH=(custom, no user)
   SHELL=/bin/bash
   XDG_RUNTIME_DIR=
  RelatedPackageVersions: mutter-common 45.0-2ubuntu1
  Signal: 11
  SourcePackage: gnome-shell
  StacktraceTop:
   ?? ()
   ?? () from /usr/lib/x86_64-linux-gnu/dri/iris_dri.so
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /lib/x86_64-linux-gnu/libmutter-13.so.0
  Title: gnome-shell crashed with SIGSEGV
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip libvirt lpadmin plugdev sudo users
  separator:

To manage notifications about this bug go to:
https://bugs.launchpad.net/mesa/+bug/2037497/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2037497] Re: gnome-shell crashes on Intel Ice Lake with SIGSEGV at NULL from end_query() from cogl_gl_create_timestamp_query() from cogl_onscreen_egl_swap_buffers_with_damage()

2023-10-06 Thread Timo Aaltonen
I'll add that patch to mantic now, as it would take some time to get it
via a bugfix release

** Changed in: mesa (Ubuntu)
 Assignee: (unassigned) => Timo Aaltonen (tjaalton)

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mesa in Ubuntu.
https://bugs.launchpad.net/bugs/2037497

Title:
  gnome-shell crashes on Intel Ice Lake with SIGSEGV at NULL from
  end_query() from cogl_gl_create_timestamp_query() from
  cogl_onscreen_egl_swap_buffers_with_damage()

Status in Mesa:
  New
Status in mesa package in Ubuntu:
  Triaged
Status in mesa package in Fedora:
  Confirmed

Bug description:
  crash after update
  wayland session is not accessible anymore

  ProblemType: Crash
  DistroRelease: Ubuntu 23.10
  Package: gnome-shell 45.0-1ubuntu1
  ProcVersionSignature: Ubuntu 6.5.0-5.5-generic 6.5.0
  Uname: Linux 6.5.0-5-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.27.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 27 05:52:26 2023
  DisplayManager: gdm3
  ExecutablePath: /usr/bin/gnome-shell
  InstallationDate: Installed on 2023-09-26 (0 days ago)
  InstallationMedia: Ubuntu 23.10 "Mantic Minotaur" - Beta amd64 (20230924)
  ProcCmdline: /usr/bin/gnome-shell
  ProcEnviron:
   LANG=fr_FR.UTF-8
   PATH=(custom, no user)
   SHELL=/bin/bash
   XDG_RUNTIME_DIR=
  RelatedPackageVersions: mutter-common 45.0-2ubuntu1
  Signal: 11
  SourcePackage: gnome-shell
  StacktraceTop:
   ?? ()
   ?? () from /usr/lib/x86_64-linux-gnu/dri/iris_dri.so
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /usr/lib/x86_64-linux-gnu/mutter-13/libmutter-cogl-13.so.0
   ?? () from /lib/x86_64-linux-gnu/libmutter-13.so.0
  Title: gnome-shell crashed with SIGSEGV
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip libvirt lpadmin plugdev sudo users
  separator:

To manage notifications about this bug go to:
https://bugs.launchpad.net/mesa/+bug/2037497/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2031340] Re: slic3r-prusa autopkgtest flaky

2023-10-06 Thread Vladimir Petko
Submitted:

https://github.com/prusa3d/PrusaSlicer/issues/11429

While I have a MP that hides the problem by making tests verbose, I do
not want to proceed with it unless absolutely necessary as this is a
quite breaking bug for the GUI.


** Bug watch added: github.com/prusa3d/PrusaSlicer/issues #11429
   https://github.com/prusa3d/PrusaSlicer/issues/11429

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gmp in Ubuntu.
https://bugs.launchpad.net/bugs/2031340

Title:
  slic3r-prusa autopkgtest flaky

Status in fontconfig package in Ubuntu:
  Fix Released
Status in gmp package in Ubuntu:
  Fix Released
Status in nlopt package in Ubuntu:
  Fix Released
Status in slic3r-prusa package in Ubuntu:
  New

Bug description:
  autopkgtest was added to slic3r-prusa as late as last April. They have
  never let version 2.6.0 of slic3r-prusa migrate to Debian testing, and
  seemingly need more work. slic3r-prusa 2.6.0+dfsg-2 was uploaded to
  unstable on July 27 but hasn't migrated to testing yet due to failing
  autopkgtest.

  In Ubuntu the flaky tests currently prevent fontconfig and nlopt (in
  addition to slic3r-prusa itself) from migrating to mantic-release.
  Probably some kind of hint is motivated.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/fontconfig/+bug/2031340/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2037642] Re: [FFe] Raspberry Pi 5 support

2023-10-06 Thread Brian Murray
** Also affects: ubuntu-release-notes
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mesa in Ubuntu.
https://bugs.launchpad.net/bugs/2037642

Title:
  [FFe] Raspberry Pi 5 support

Status in Release Notes for Ubuntu:
  New
Status in libcamera package in Ubuntu:
  Triaged
Status in linux-meta-raspi package in Ubuntu:
  Fix Released
Status in linux-raspi package in Ubuntu:
  Fix Released
Status in mesa package in Ubuntu:
  Fix Released
Status in pipewire package in Ubuntu:
  Invalid
Status in rpi-eeprom package in Ubuntu:
  Fix Released
Status in ubuntu-settings package in Ubuntu:
  Fix Released

Bug description:
  [ Impact ]

   * HWE for Raspberry Pi 5 https://raspberrypi.com/5

  [ Test Plan ]

   * Private builds tested on all existing/supported Raspberry Pi SKUs
  in armhf & arm64 variants

   * No regressions on any existing SKUs

   * Test that Raspberry Pi 5 boards work

  [ Where problems could occur ]

   * Mesa is upgraded, and there are patches to mesa, the raspberry-pi
  specific provider this has been tested but not as extensively.
  Separately there is mesa FFe granted to upgrade to latest release,
  thus these changes piggy-back on top of it.

   * libcamera has new build-depends on new package libpisp for the
  raspberry-pi specific provider which also affects pipewire to provide
  full webcam support.

   * These dependencies, will need to make their way into gnome platform
  snaps to be usable by default in Firefox.

  [ Other Info ]

   * The proposed code changes have been tested in private, prior to
  public announcement

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/2037642/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038610] [NEW] package linux-image-6.2.0-34-generic 6.2.0-34.34~22.04.1 failed to install/upgrade: run-parts: /etc/kernel/postinst.d/initramfs-tools exited with return code 1

2023-10-06 Thread Andrew Adams
Public bug reported:

System crashed when installing update

ProblemType: Package
DistroRelease: Ubuntu 22.04
Package: linux-image-6.2.0-34-generic 6.2.0-34.34~22.04.1
ProcVersionSignature: Ubuntu 6.2.0-33.33~22.04.1-generic 6.2.16
Uname: Linux 6.2.0-33-generic x86_64
ApportVersion: 2.20.11-0ubuntu82.5
Architecture: amd64
CasperMD5CheckResult: pass
Date: Fri Oct  6 06:44:43 2023
ErrorMessage: run-parts: /etc/kernel/postinst.d/initramfs-tools exited with 
return code 1
InstallationDate: Installed on 2023-09-22 (13 days ago)
InstallationMedia: Ubuntu 22.04.3 LTS "Jammy Jellyfish" - Release amd64 
(20230807.2)
Python3Details: /usr/bin/python3.10, Python 3.10.12, python3-minimal, 
3.10.6-1~22.04
PythonDetails: N/A
RebootRequiredPkgs: Error: path contained symlinks.
RelatedPackageVersions:
 dpkg 1.21.1ubuntu2.2
 apt  2.4.10
SourcePackage: initramfs-tools
Title: package linux-image-6.2.0-34-generic 6.2.0-34.34~22.04.1 failed to 
install/upgrade: run-parts: /etc/kernel/postinst.d/initramfs-tools exited with 
return code 1
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: initramfs-tools (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-package jammy need-duplicate-check

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/2038610

Title:
  package linux-image-6.2.0-34-generic 6.2.0-34.34~22.04.1 failed to
  install/upgrade: run-parts: /etc/kernel/postinst.d/initramfs-tools
  exited with return code 1

Status in initramfs-tools package in Ubuntu:
  New

Bug description:
  System crashed when installing update

  ProblemType: Package
  DistroRelease: Ubuntu 22.04
  Package: linux-image-6.2.0-34-generic 6.2.0-34.34~22.04.1
  ProcVersionSignature: Ubuntu 6.2.0-33.33~22.04.1-generic 6.2.16
  Uname: Linux 6.2.0-33-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.5
  Architecture: amd64
  CasperMD5CheckResult: pass
  Date: Fri Oct  6 06:44:43 2023
  ErrorMessage: run-parts: /etc/kernel/postinst.d/initramfs-tools exited with 
return code 1
  InstallationDate: Installed on 2023-09-22 (13 days ago)
  InstallationMedia: Ubuntu 22.04.3 LTS "Jammy Jellyfish" - Release amd64 
(20230807.2)
  Python3Details: /usr/bin/python3.10, Python 3.10.12, python3-minimal, 
3.10.6-1~22.04
  PythonDetails: N/A
  RebootRequiredPkgs: Error: path contained symlinks.
  RelatedPackageVersions:
   dpkg 1.21.1ubuntu2.2
   apt  2.4.10
  SourcePackage: initramfs-tools
  Title: package linux-image-6.2.0-34-generic 6.2.0-34.34~22.04.1 failed to 
install/upgrade: run-parts: /etc/kernel/postinst.d/initramfs-tools exited with 
return code 1
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/2038610/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2031340] Re: slic3r-prusa autopkgtest flaky

2023-10-06 Thread Vladimir Petko
** Attachment added: "prusa-slicer.log.gz"
   
https://bugs.launchpad.net/ubuntu/+source/slic3r-prusa/+bug/2031340/+attachment/5707297/+files/prusa-slicer.log.gz

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gmp in Ubuntu.
https://bugs.launchpad.net/bugs/2031340

Title:
  slic3r-prusa autopkgtest flaky

Status in fontconfig package in Ubuntu:
  Fix Released
Status in gmp package in Ubuntu:
  Fix Released
Status in nlopt package in Ubuntu:
  Fix Released
Status in slic3r-prusa package in Ubuntu:
  New

Bug description:
  autopkgtest was added to slic3r-prusa as late as last April. They have
  never let version 2.6.0 of slic3r-prusa migrate to Debian testing, and
  seemingly need more work. slic3r-prusa 2.6.0+dfsg-2 was uploaded to
  unstable on July 27 but hasn't migrated to testing yet due to failing
  autopkgtest.

  In Ubuntu the flaky tests currently prevent fontconfig and nlopt (in
  addition to slic3r-prusa itself) from migrating to mantic-release.
  Probably some kind of hint is motivated.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/fontconfig/+bug/2031340/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2031340] Re: slic3r-prusa autopkgtest flaky

2023-10-06 Thread Vladimir Petko
The tests use boost background worker and are prone to race conditions.
Increasing verbosity of the test runner provides a band-aid by shifting
the test timings.

** Merge proposal linked:
   
https://code.launchpad.net/~vpa1977/ubuntu/+source/slic3r-prusa/+git/slic3r-prusa/+merge/453027

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gmp in Ubuntu.
https://bugs.launchpad.net/bugs/2031340

Title:
  slic3r-prusa autopkgtest flaky

Status in fontconfig package in Ubuntu:
  Fix Released
Status in gmp package in Ubuntu:
  Fix Released
Status in nlopt package in Ubuntu:
  Fix Released
Status in slic3r-prusa package in Ubuntu:
  New

Bug description:
  autopkgtest was added to slic3r-prusa as late as last April. They have
  never let version 2.6.0 of slic3r-prusa migrate to Debian testing, and
  seemingly need more work. slic3r-prusa 2.6.0+dfsg-2 was uploaded to
  unstable on July 27 but hasn't migrated to testing yet due to failing
  autopkgtest.

  In Ubuntu the flaky tests currently prevent fontconfig and nlopt (in
  addition to slic3r-prusa itself) from migrating to mantic-release.
  Probably some kind of hint is motivated.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/fontconfig/+bug/2031340/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp


[Touch-packages] [Bug 2038567] Re: Mantic 6.5.0-7 kernel causes regression in LXD container usage

2023-10-06 Thread John Johansen
To test if 1ea37b26d720 UBUNTU: SAUCE: apparmor4.0.0 [73/76]: userns -
allow restricting unprivileged change_profile is the cause of the ptrace
denials. You can disable it using

sudo bash -c "echo 0 >
/proc/sys/kernel/apparmor_restrict_unprivileged_unconfined"

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/2038567

Title:
  Mantic 6.5.0-7 kernel causes regression in LXD container usage

Status in Release Notes for Ubuntu:
  New
Status in apparmor package in Ubuntu:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in lxd package in Ubuntu:
  New
Status in snapd package in Ubuntu:
  New

Bug description:
  Following upgrade to 6.5.0-7 kernel in mantic cloud images we are
  seeing a regression in our cloud image tests. The test runs the
  following:

  ```
  lxd init --auto --storage-backend dir
  lxc launch ubuntu-daily:mantic mantic
  lxc info mantic
  lxc exec mantic -- cloud-init status --wait
  ```

  The `lxc exec mantic -- cloud-init status --wait` times out after 240s
  and will fail our test as a result.

  I have been able to replicate in a local VM

  ```
  wget 
http://cloud-images.ubuntu.com/mantic/20231005/mantic-server-cloudimg-amd64.img 
  wget --output-document=launch-qcow2-image-qemu.sh 
https://gist.githubusercontent.com/philroche/14c241c086a5730481e24178b654268f/raw/7af95cd4dfc8e1d0600e6118803d2c866765714e/gistfile1.txt
 
  chmod +x launch-qcow2-image-qemu.sh 

  ./launch-qcow2-image-qemu.sh --password passw0rd --image 
./mantic-server-cloudimg-amd64.img 
  cat < "./reproducer.sh"
  #!/bin/bash -eux
  lxd init --auto --storage-backend dir
  lxc launch ubuntu-daily:mantic mantic
  lxc info mantic
  lxc exec mantic -- cloud-init status --wait
  EOF
  chmod +x ./reproducer.sh
  sshpass -p passw0rd scp -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -P  ./reproducer.sh ubuntu@127.0.0.1:~/
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 sudo apt-get update
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 sudo apt-get upgrade 
--assume-yes
  sshpass -p passw0rd ssh -o UserKnownHostsFile=/dev/null -o CheckHostIP=no -o 
StrictHostKeyChecking=no -p  ubuntu@127.0.0.1 ./reproducer.sh
  ```

  The issue is not present with the 6.5.0-5 kernel and the issue is
  present regardless of the container launched. I tried the jammy
  container to test this.

  From my test VM

  ```
  ubuntu@cloudimg:~$ uname --all
  Linux cloudimg 6.5.0-7-generic #7-Ubuntu SMP PREEMPT_DYNAMIC Fri Sep 29 
09:14:56 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux
  ubuntu@cloudimg:~$ uname --kernel-release
  6.5.0-7-generic
  ```

  This is a regression in our test that will block 23.10 cloud image
  release next week.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/2038567/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp