[Bug 1248131] Re: glabels had support EAN-8 / Code128 in previous version - now it does not have it.
While trying to recreate this package by myself this is what I get in config.log: configure:14593: checking for Barcode_Create in -lbarcode configure:14618: gcc -o conftest -g -O2 -fPIE -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -D_FORTIFY_SOURCE=2 -Wl,-Bsymbolic-functions -fPIE -pie -Wl,-z,relro -Wl,-z,now -Wl,--as-needed conftest.c -lbarcode >&5 /usr/bin/ld: /usr/lib/gcc/x86_64-linux-gnu/4.8/../../../../lib/libbarcode.a(library.o): relocation R_X86_64_32 against `encodings' can not be used when making a shared object; recompile with -fPIC /usr/lib/gcc/x86_64-linux-gnu/4.8/../../../../lib/libbarcode.a: error adding symbols: Bad value collect2: error: ld returned 1 exit status configure:14618: $? = 1 configure: failed program was: | /* confdefs.h */ | #define PACKAGE_NAME "glabels" | #define PACKAGE_TARNAME "glabels" | #define PACKAGE_VERSION "3.2.0" | #define PACKAGE_STRING "glabels 3.2.0" | #define PACKAGE_BUGREPORT "http://bugzilla.gnome.org/enter_bug.cgi?product=glabels"; | #define PACKAGE_URL "" | #define PACKAGE "glabels" | #define VERSION "3.2.0" | #define STDC_HEADERS 1 | #define HAVE_SYS_TYPES_H 1 | #define HAVE_SYS_STAT_H 1 | #define HAVE_STDLIB_H 1 | #define HAVE_STRING_H 1 | #define HAVE_MEMORY_H 1 | #define HAVE_STRINGS_H 1 | #define HAVE_INTTYPES_H 1 | #define HAVE_STDINT_H 1 | #define HAVE_UNISTD_H 1 | #define HAVE_DLFCN_H 1 | #define LT_OBJDIR ".libs/" | #define HAVE_LIBEBOOK 1 | /* end confdefs.h. */ | | /* Override any GCC internal prototype to avoid an error. |Use char because int might match the return type of a GCC |builtin and then its argument prototype would still apply. */ | #ifdef __cplusplus | extern "C" | #endif | char Barcode_Create (); | int | main () | { | return Barcode_Create (); | ; | return 0; | } Problem is that glabels is being built using 'DEB_BUILD_MAINT_OPTIONS = hardening=+all', which implies -fPIC, while barcode is being built without it. This was fixed in Debian with barcode-0.98+debian-9.1 by adding '-fPIC' to CFLAGS. I'll request backporting this version to precise. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1248131 Title: glabels had support EAN-8 / Code128 in previous version - now it does not have it. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/glabels/+bug/1248131/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 189523] [NEW] unable to update kernel inside ltsp image
Public bug reported: Binary package hint: ltsp-client-core I was trying to update LTSP chroot so I've made `apt-get update` and `apt-get upgrade` inside the chroot. Upgrade failed on "linux-image" package, the output was: Examining /etc/kernel/postinst.d. run-parts: executing /etc/kernel/postinst.d/ltsp-update-kernels Cannot open ``/boot/nbi.img-2.6.22-14-386'':File exists run-parts: /etc/kernel/postinst.d/ltsp-update-kernels exited with return code 1 Failed to process /etc/kernel/postinst.d at /var/lib/dpkg/info/linux-image-2.6.22-14-386.postinst line 1002. Problem is caused by /etc/kernel/postinst.d/ltsp-update-kernels script line 139. When the mkelfimage package is installed the script tries to create /boot/nbi-kernel-version file. If it is a kernel update (and kernel version didn't change) the nbi file will be already in place and mkelfimage will return error. The same problem can occure at line 152 with netabootwrap command, but I didn't test it. To fix it we should first create the nbi file in some temporary directory, and then move it (mv -f) to $BOOT dir. ** Affects: ltsp (Ubuntu) Importance: Undecided Status: New -- unable to update kernel inside ltsp image https://bugs.launchpad.net/bugs/189523 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 38410] Re: sabayon blocks ssh based ltsp logins if not user profiles are created
Problem still occurs in feisty and gutsy. It is caused by /etc/X11/Xsession.d/60sabayon_apply script. Because of 'set -e' at the beginning of Xsession script any command that won't return true will stop whole Xsession script. /usr/sbin/sabayon-apply returns 1 if the profile is not set for current user causing whole Xsession to stop with an error. As this error is non-fatal this shouldn't happen. As a workaround one can ensure that subject line will return true by adding '|| true' at the end of this line. It should look like: if [ -x /usr/sbin/sabayon-apply ] ; then /usr/sbin/sabayon-apply || true fi This can be a bit problematic as all sabayon-apply errors (even fatal) would be thrown away, but I don't have idea how can it be solved differently. -- sabayon blocks ssh based ltsp logins if not user profiles are created https://bugs.launchpad.net/bugs/38410 You received this bug notification because you are a member of Ubuntu Bugs, which is a direct subscriber. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 129209] Re: segfault in mount.cifs
pam_mount umounting issue is unrelated to this bug, sorry for mistake. However this segfaults add significant delay to logging process (especially with lots of shares) and can be really annoying. -- segfault in mount.cifs https://bugs.launchpad.net/bugs/129209 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 129209] Re: segfault in mount.cifs
** Attachment added: "gdb-backtrace" http://launchpadlibrarian.net/8603425/gdb-mount.cifs.txt -- segfault in mount.cifs https://bugs.launchpad.net/bugs/129209 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 129209] segfault in mount.cifs
Public bug reported: Binary package hint: smbfs We have samba (3.0.22-1ubuntu3.3 on dapper) configured as PDC in our domain . When I try to mount any of the cifs shares on the client (feisty samba 3.0.24-2ubuntu1.2) using command like: mount -t cifs //fileserver/share /some/where -o user=name i got this: *** glibc detected *** /sbin/mount.cifs: free(): invalid pointer: 0x0805080a *** === Backtrace: = /lib/tls/i686/cmov/libc.so.6[0xb7ee17cd] /lib/tls/i686/cmov/libc.so.6(cfree+0x90)[0xb7ee4e30] /sbin/mount.cifs(main+0xef8)[0x804b458] /lib/tls/i686/cmov/libc.so.6(__libc_start_main+0xdc)[0xb7e8febc] /sbin/mount.cifs[0x80491a1] === Memory map: 08048000-0804d000 r-xp 08:05 9971078/sbin/mount.cifs 0804d000-0804e000 rw-p 4000 08:05 9971078/sbin/mount.cifs 0804e000-0806f000 rw-p 0804e000 00:00 0 [heap] b780-b7821000 rw-p b780 00:00 0 b7821000-b790 ---p b7821000 00:00 0 b796e000-b7979000 r-xp 08:05 25166072 /lib/libgcc_s.so.1 b7979000-b797a000 rw-p a000 08:05 25166072 /lib/libgcc_s.so.1 b7988000-b7ab2000 r-xp 08:05 8427384 /usr/lib/i686/cmov/libcrypto.so.0.9.8 b7ab2000-b7ac6000 rw-p 00129000 08:05 8427384 /usr/lib/i686/cmov/libcrypto.so.0.9.8 b7ac6000-b7aca000 rw-p b7ac6000 00:00 0 b7ad4000-b7ad7000 r-xp 08:05 29389739 /usr/lib/sasl2/libplain.so.2.0.22 b7ad7000-b7ad8000 rw-p 3000 08:05 29389739 /usr/lib/sasl2/libplain.so.2.0.22 b7ad8000-b7ae3000 r-xp 08:05 29389720 /usr/lib/sasl2/libdigestmd5.so.2.0.22 b7ae3000-b7ae4000 rw-p a000 08:05 29389720 /usr/lib/sasl2/libdigestmd5.so.2.0.22 b7ae4000-b7bba000 r-xp 08:05 29361277 /usr/lib/libdb-4.2.so b7bba000-b7bbc000 rw-p 000d6000 08:05 29361277 /usr/lib/libdb-4.2.so b7bbd000-b7bc4000 r-xp 08:05 29389730 /usr/lib/sasl2/libntlm.so.2.0.22 b7bc4000-b7bc5000 rw-p 6000 08:05 29389730 /usr/lib/sasl2/libntlm.so.2.0.22 b7bc5000-b7bc9000 r-xp 08:05 29389711 /usr/lib/sasl2/libcrammd5.so.2.0.22 b7bc9000-b7bca000 rw-p 3000 08:05 29389711 /usr/lib/sasl2/libcrammd5.so.2.0.22 b7bca000-b7bcd000 r-xp 08:05 29361245 /usr/lib/libgpg-error.so.0.3.0 b7bcd000-b7bce000 rw-p 2000 08:05 29361245 /usr/lib/libgpg-error.so.0.3.0 b7bce000-b7c1d000 r-xp 08:05 29361137 /usr/lib/libgcrypt.so.11.2.2 b7c1d000-b7c1f000 rw-p 0004e000 08:05 29361137 /usr/lib/libgcrypt.so.11.2.2 b7c1f000-b7c32000 r-xp 08:05 29361099 /usr/lib/libz.so.1.2.3 b7c32000-b7c33000 rw-p 00012000 08:05 29361099 /usr/lib/libz.so.1.2.3 b7c33000-b7c47000 r-xp 08:05 29389574 /usr/lib/libtasn1.so.3.0.6 b7c47000-b7c48000 rw-p 00013000 08:05 29389574 /usr/lib/libtasn1.so.3.0.6 b7c48000-b7c4b000 r-xp 08:05 29458947 /usr/lib/libkrb5support.so.0.0 b7c4b000-b7c4c000 rw-p 3000 08:05 29458947 /usr/lib/libkrb5support.so.0.0 b7c4c000-b7c4e000 r-xp 08:05 25166066 /lib/libcom_err.so.2.1 b7c4e000-b7c4f000 rw-p 1000 08:05 25166066 /lib/libcom_err.so.2.1 b7c4f000-b7c73000 r-xp 08:05 29458944 /usr/lib/libk5crypto.so.3.0 b7c73000-b7c74000 rw-p 00024000 08:05 29458944 /usr/lib/libk5crypto.so.3.0 b7c74000-b7cef000 r-xp 08:05 29458946 /usr/lib/libkrb5.so.3.2 b7cef000-b7cf1000 rw-p 0007b000 08:05 29458946 /usr/lib/libkrb5.so.3.2 b7cf1000-b7d5b000 r-xp 08:05 29361230 /usr/lib/libgnutls.so.13.0.9 b7d5b000-b7d61000 rw-p 0006a000 08:05 29361230 /usr/lib/libgnutls.so.13.0.9 b7d61000-b7d77000 r-xp 08:05 29389750 /usr/lib/libsasl2.so.2.0.22 b7d77000-b7d78000 rw-p 00015000 08:05 29389750 /usr/lib/libsasl2.so.2.0.22 b7d78000-b7d7d000 r-xp 08:05 12600782 /lib/tls/i686/cmov/libcrypt-2.5.so b7d7d000-b7d7f000 rw-p 4000 08:05 12600782 /lib/tls/i686/cmov/libcrypt-2.5.so b7d7f000-b7da6000 rw-p b7d7f000 00:00 0 b7da6000-b7db9000 r-xp 08:05 12600794 /lib/tls/i686/cmov/libpthread-2.5.so b7db9000-b7dbb000 rw-p 00013000 08:05 12600794 /lib/tls/i686/cmov/libpthread-2.5.so b7dbb000-b7dbd000 rw-p b7dbb000 00:00 0 b7dbd000-b7dd r-xp 08:05 12600786 /lib/tls/i686/cmov/libnsl-2.5.so b7dd-b7dd2000 rw-p 00012000 08:05 12600786 /lib/tls/i686/cmov/libnsl-2.5.so b7dd2000-b7dd4000 rw-p b7dd2000 00:00 0 b7dd4000-b7dd6000 r-xp 08:05 12600783 /lib/tls/i686/cmov/libdl-2.5.so b7dd6000-b7dd8000 rw-p 1000 08:05 12600783 /lib/tls/i686/cmov/libdl-2.5.so b7dd8000-b7df3000 r-xp 08:05 30385661 /usr/lib/libgssapi_krb5.so.2.2 b7df3000-b7df4000 rw-p 0001b000 08:05 30385661 /usr/lib/libgssapi_krb5.so.2.2 b7df4000-b7e0 r-xp 08:05 29361322 /usr/lib/liblber.so.2.0.130 b7e0-b7e01000 rw-p b000 08:05 29361322 /usr/lib/liblber.so.2.0.130 b7e01000-b7e36000 r-xp 08:05 29361325 /usr/lib/libldap_r.so.2.0.130 b7e36000-b7e37000 rw-p 00035000 08:05 29361325 /usr/lib/libldap_r.so.2.0.130 b7e37000-b7e49000 r-xp 08:05 25681037 /lib/libnss_ldap-2.5.so b7e49000-