[Bug 1248131] Re: glabels had support EAN-8 / Code128 in previous version - now it does not have it.

2014-12-01 Thread Krzysztof Chojnowski
While trying to recreate this package by myself this is what I get in
config.log:

configure:14593: checking for Barcode_Create in -lbarcode
configure:14618: gcc -o conftest -g -O2 -fPIE -fstack-protector 
--param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall 
-D_FORTIFY_SOURCE=2 -Wl,-Bsymbolic-functions -fPIE -pie -Wl,-z,relro -Wl,-z,now 
-Wl,--as-needed conftest.c -lbarcode   >&5
/usr/bin/ld: 
/usr/lib/gcc/x86_64-linux-gnu/4.8/../../../../lib/libbarcode.a(library.o): 
relocation R_X86_64_32 against `encodings' can not be used when making a shared 
object; recompile with -fPIC
/usr/lib/gcc/x86_64-linux-gnu/4.8/../../../../lib/libbarcode.a: error adding 
symbols: Bad value
collect2: error: ld returned 1 exit status
configure:14618: $? = 1
configure: failed program was:
| /* confdefs.h */
| #define PACKAGE_NAME "glabels"
| #define PACKAGE_TARNAME "glabels"
| #define PACKAGE_VERSION "3.2.0"
| #define PACKAGE_STRING "glabels 3.2.0"
| #define PACKAGE_BUGREPORT 
"http://bugzilla.gnome.org/enter_bug.cgi?product=glabels";
| #define PACKAGE_URL ""
| #define PACKAGE "glabels"
| #define VERSION "3.2.0"
| #define STDC_HEADERS 1
| #define HAVE_SYS_TYPES_H 1
| #define HAVE_SYS_STAT_H 1
| #define HAVE_STDLIB_H 1
| #define HAVE_STRING_H 1
| #define HAVE_MEMORY_H 1
| #define HAVE_STRINGS_H 1
| #define HAVE_INTTYPES_H 1
| #define HAVE_STDINT_H 1
| #define HAVE_UNISTD_H 1
| #define HAVE_DLFCN_H 1
| #define LT_OBJDIR ".libs/"
| #define HAVE_LIBEBOOK 1
| /* end confdefs.h.  */
|
| /* Override any GCC internal prototype to avoid an error.
|Use char because int might match the return type of a GCC
|builtin and then its argument prototype would still apply.  */
| #ifdef __cplusplus
| extern "C"
| #endif
| char Barcode_Create ();
| int
| main ()
| {
| return Barcode_Create ();
|   ;
|   return 0;
| }


Problem is that glabels is being built using 'DEB_BUILD_MAINT_OPTIONS = 
hardening=+all', which implies -fPIC, while barcode is being built without it. 
This was fixed in Debian with barcode-0.98+debian-9.1 by adding '-fPIC' to 
CFLAGS. I'll request backporting this version to precise.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1248131

Title:
  glabels had support EAN-8 / Code128 in previous version - now it does
  not have it.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glabels/+bug/1248131/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 189523] [NEW] unable to update kernel inside ltsp image

2008-02-06 Thread Krzysztof Chojnowski
Public bug reported:

Binary package hint: ltsp-client-core

I was trying to update LTSP chroot so I've made `apt-get update` and `apt-get 
upgrade` inside the chroot. Upgrade failed on "linux-image" package, the output 
was:
Examining /etc/kernel/postinst.d.
run-parts: executing /etc/kernel/postinst.d/ltsp-update-kernels
Cannot open ``/boot/nbi.img-2.6.22-14-386'':File exists
run-parts: /etc/kernel/postinst.d/ltsp-update-kernels exited with return code 1
Failed to process /etc/kernel/postinst.d at 
/var/lib/dpkg/info/linux-image-2.6.22-14-386.postinst line 1002.

Problem is caused by /etc/kernel/postinst.d/ltsp-update-kernels script
line 139. When the mkelfimage package is installed the script tries to
create /boot/nbi-kernel-version file. If it is a kernel update (and
kernel version didn't change) the nbi file will be already in place and
mkelfimage will return error. The same problem can occure at line 152
with netabootwrap command, but I didn't test it.

To fix it we should first create the nbi file in some temporary
directory, and then move it (mv -f) to $BOOT dir.

** Affects: ltsp (Ubuntu)
 Importance: Undecided
 Status: New

-- 
unable to update kernel inside ltsp image
https://bugs.launchpad.net/bugs/189523
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 38410] Re: sabayon blocks ssh based ltsp logins if not user profiles are created

2007-08-17 Thread Krzysztof Chojnowski
Problem still occurs in feisty and gutsy. It is caused by 
/etc/X11/Xsession.d/60sabayon_apply script. Because of 'set -e' at the 
beginning of Xsession script any command that won't return true will stop whole 
Xsession script. /usr/sbin/sabayon-apply returns 1 if the profile is not set 
for current user causing whole Xsession to stop with an error. As this error is 
non-fatal this shouldn't happen. As a workaround one can ensure that subject 
line will return true by adding '|| true' at the end of this line. It should 
look like:
if [ -x /usr/sbin/sabayon-apply ] ; then
/usr/sbin/sabayon-apply || true
fi

This can be a bit problematic as all sabayon-apply errors (even fatal)
would be thrown away, but I don't have idea how can it be solved
differently.

-- 
sabayon blocks ssh based ltsp logins if not user profiles are created
https://bugs.launchpad.net/bugs/38410
You received this bug notification because you are a member of Ubuntu
Bugs, which is a direct subscriber.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 129209] Re: segfault in mount.cifs

2007-07-30 Thread Krzysztof Chojnowski
pam_mount umounting issue is unrelated to this bug, sorry for mistake.
However this segfaults add significant delay to logging process
(especially with lots of shares) and can be really annoying.

-- 
segfault in mount.cifs
https://bugs.launchpad.net/bugs/129209
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 129209] Re: segfault in mount.cifs

2007-07-30 Thread Krzysztof Chojnowski

** Attachment added: "gdb-backtrace"
   http://launchpadlibrarian.net/8603425/gdb-mount.cifs.txt

-- 
segfault in mount.cifs
https://bugs.launchpad.net/bugs/129209
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 129209] segfault in mount.cifs

2007-07-30 Thread Krzysztof Chojnowski
Public bug reported:

Binary package hint: smbfs

We have samba (3.0.22-1ubuntu3.3 on dapper) configured as PDC in our domain . 
When I try to mount any of the cifs shares on the client (feisty samba 
3.0.24-2ubuntu1.2) using command like:
mount -t cifs //fileserver/share /some/where -o user=name
i got this:

*** glibc detected *** /sbin/mount.cifs: free(): invalid pointer: 0x0805080a ***
=== Backtrace: =
/lib/tls/i686/cmov/libc.so.6[0xb7ee17cd]
/lib/tls/i686/cmov/libc.so.6(cfree+0x90)[0xb7ee4e30]
/sbin/mount.cifs(main+0xef8)[0x804b458]
/lib/tls/i686/cmov/libc.so.6(__libc_start_main+0xdc)[0xb7e8febc]
/sbin/mount.cifs[0x80491a1]
=== Memory map: 
08048000-0804d000 r-xp  08:05 9971078/sbin/mount.cifs
0804d000-0804e000 rw-p 4000 08:05 9971078/sbin/mount.cifs
0804e000-0806f000 rw-p 0804e000 00:00 0  [heap]
b780-b7821000 rw-p b780 00:00 0 
b7821000-b790 ---p b7821000 00:00 0 
b796e000-b7979000 r-xp  08:05 25166072   /lib/libgcc_s.so.1
b7979000-b797a000 rw-p a000 08:05 25166072   /lib/libgcc_s.so.1
b7988000-b7ab2000 r-xp  08:05 8427384
/usr/lib/i686/cmov/libcrypto.so.0.9.8
b7ab2000-b7ac6000 rw-p 00129000 08:05 8427384
/usr/lib/i686/cmov/libcrypto.so.0.9.8
b7ac6000-b7aca000 rw-p b7ac6000 00:00 0 
b7ad4000-b7ad7000 r-xp  08:05 29389739   
/usr/lib/sasl2/libplain.so.2.0.22
b7ad7000-b7ad8000 rw-p 3000 08:05 29389739   
/usr/lib/sasl2/libplain.so.2.0.22
b7ad8000-b7ae3000 r-xp  08:05 29389720   
/usr/lib/sasl2/libdigestmd5.so.2.0.22
b7ae3000-b7ae4000 rw-p a000 08:05 29389720   
/usr/lib/sasl2/libdigestmd5.so.2.0.22
b7ae4000-b7bba000 r-xp  08:05 29361277   /usr/lib/libdb-4.2.so
b7bba000-b7bbc000 rw-p 000d6000 08:05 29361277   /usr/lib/libdb-4.2.so
b7bbd000-b7bc4000 r-xp  08:05 29389730   
/usr/lib/sasl2/libntlm.so.2.0.22
b7bc4000-b7bc5000 rw-p 6000 08:05 29389730   
/usr/lib/sasl2/libntlm.so.2.0.22
b7bc5000-b7bc9000 r-xp  08:05 29389711   
/usr/lib/sasl2/libcrammd5.so.2.0.22
b7bc9000-b7bca000 rw-p 3000 08:05 29389711   
/usr/lib/sasl2/libcrammd5.so.2.0.22
b7bca000-b7bcd000 r-xp  08:05 29361245   /usr/lib/libgpg-error.so.0.3.0
b7bcd000-b7bce000 rw-p 2000 08:05 29361245   /usr/lib/libgpg-error.so.0.3.0
b7bce000-b7c1d000 r-xp  08:05 29361137   /usr/lib/libgcrypt.so.11.2.2
b7c1d000-b7c1f000 rw-p 0004e000 08:05 29361137   /usr/lib/libgcrypt.so.11.2.2
b7c1f000-b7c32000 r-xp  08:05 29361099   /usr/lib/libz.so.1.2.3
b7c32000-b7c33000 rw-p 00012000 08:05 29361099   /usr/lib/libz.so.1.2.3
b7c33000-b7c47000 r-xp  08:05 29389574   /usr/lib/libtasn1.so.3.0.6
b7c47000-b7c48000 rw-p 00013000 08:05 29389574   /usr/lib/libtasn1.so.3.0.6
b7c48000-b7c4b000 r-xp  08:05 29458947   /usr/lib/libkrb5support.so.0.0
b7c4b000-b7c4c000 rw-p 3000 08:05 29458947   /usr/lib/libkrb5support.so.0.0
b7c4c000-b7c4e000 r-xp  08:05 25166066   /lib/libcom_err.so.2.1
b7c4e000-b7c4f000 rw-p 1000 08:05 25166066   /lib/libcom_err.so.2.1
b7c4f000-b7c73000 r-xp  08:05 29458944   /usr/lib/libk5crypto.so.3.0
b7c73000-b7c74000 rw-p 00024000 08:05 29458944   /usr/lib/libk5crypto.so.3.0
b7c74000-b7cef000 r-xp  08:05 29458946   /usr/lib/libkrb5.so.3.2
b7cef000-b7cf1000 rw-p 0007b000 08:05 29458946   /usr/lib/libkrb5.so.3.2
b7cf1000-b7d5b000 r-xp  08:05 29361230   /usr/lib/libgnutls.so.13.0.9
b7d5b000-b7d61000 rw-p 0006a000 08:05 29361230   /usr/lib/libgnutls.so.13.0.9
b7d61000-b7d77000 r-xp  08:05 29389750   /usr/lib/libsasl2.so.2.0.22
b7d77000-b7d78000 rw-p 00015000 08:05 29389750   /usr/lib/libsasl2.so.2.0.22
b7d78000-b7d7d000 r-xp  08:05 12600782   
/lib/tls/i686/cmov/libcrypt-2.5.so
b7d7d000-b7d7f000 rw-p 4000 08:05 12600782   
/lib/tls/i686/cmov/libcrypt-2.5.so
b7d7f000-b7da6000 rw-p b7d7f000 00:00 0 
b7da6000-b7db9000 r-xp  08:05 12600794   
/lib/tls/i686/cmov/libpthread-2.5.so
b7db9000-b7dbb000 rw-p 00013000 08:05 12600794   
/lib/tls/i686/cmov/libpthread-2.5.so
b7dbb000-b7dbd000 rw-p b7dbb000 00:00 0 
b7dbd000-b7dd r-xp  08:05 12600786   
/lib/tls/i686/cmov/libnsl-2.5.so
b7dd-b7dd2000 rw-p 00012000 08:05 12600786   
/lib/tls/i686/cmov/libnsl-2.5.so
b7dd2000-b7dd4000 rw-p b7dd2000 00:00 0 
b7dd4000-b7dd6000 r-xp  08:05 12600783   /lib/tls/i686/cmov/libdl-2.5.so
b7dd6000-b7dd8000 rw-p 1000 08:05 12600783   /lib/tls/i686/cmov/libdl-2.5.so
b7dd8000-b7df3000 r-xp  08:05 30385661   /usr/lib/libgssapi_krb5.so.2.2
b7df3000-b7df4000 rw-p 0001b000 08:05 30385661   /usr/lib/libgssapi_krb5.so.2.2
b7df4000-b7e0 r-xp  08:05 29361322   /usr/lib/liblber.so.2.0.130
b7e0-b7e01000 rw-p b000 08:05 29361322   /usr/lib/liblber.so.2.0.130
b7e01000-b7e36000 r-xp  08:05 29361325   /usr/lib/libldap_r.so.2.0.130
b7e36000-b7e37000 rw-p 00035000 08:05 29361325   /usr/lib/libldap_r.so.2.0.130
b7e37000-b7e49000 r-xp  08:05 25681037   /lib/libnss_ldap-2.5.so
b7e49000-