[Bug 1971034] Re: Several security issues in libpod 3.4.x

2022-05-19 Thread Steve Dodd
I wonder if it really makes sense to keep podman in the Ubuntu repositories, at least if it's going to stay in universe? It's the sort of software that people who use it are going rely on being secure and up-to-date, and so far at least it has been quite a fast-moving target. I'm not normally a

[Bug 1865642] Re: package dma 0.11-2 failed to install/upgrade: installed dma package post-installation script subprocess returned error exit status 128

2022-04-21 Thread Steve Dodd
Ah, looks like upstream bug https://bugs.debian.org/cgi- bin/bugreport.cgi?bug=940219 is the answer to my problem.. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865642 Title: package dma 0.11-2

[Bug 1865642] Re: package dma 0.11-2 failed to install/upgrade: installed dma package post-installation script subprocess returned error exit status 128

2022-04-21 Thread Steve Dodd
I'm dealing with a very similar bug building containers with jammy beta. If there's an existing /etc/dma/dma.conf, I get the above error message. Oddly, attempting to strace or add too much debug to the .postinst or .config scripts makes the problem go away, which makes it seem like some sort of

[Bug 1938088] Re: acpi-support prevents Groovy and Hirsute booting in LXC

2022-04-01 Thread Steve Dodd
Hit the same thing trying to upgrade a bionic container to jammy in systemd-nspawn :( -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1938088 Title: acpi-support prevents Groovy and Hirsute booting

[Bug 1878076] Re: GTK save-dialogs input-focus moves from filename to file search if a folder is selected

2022-03-30 Thread Steve Dodd
The bug has been periodically tripping me up for years, but recently I discovered that it has basically stopped my elderly uncle from using Libreoffice (which defaults to GTK file picker on Xubuntu at least) on bionic. Priority really needs to be higher, at least if the intent is for Ubuntu to be

[Bug 1932305] Re: fstrim doesn't trim my /home separate partition

2022-03-30 Thread Steve Dodd
This is due to "ProtectHome=yes" in the .service file; the workaround is to add: [Service] ProtectHome=no In e.g. /etc/systemd/system/fstrim.service.d/allow-home.conf -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1963751] Re: focal security update 2.34.6-0ubuntu0.20.04.1 cannot be automatically installed due to new dependency

2022-03-07 Thread Steve Dodd
The other option in u-a might be to split Unattended-Upgrade::Allowed- Origins into "Automatic origins" and "permitted origins", so only packages in the former will be automatically installed, but upgraded dependencies could be pulled from the latter if required? -- You received this bug

[Bug 1963751] Re: focal security update 2.34.6-0ubuntu0.20.04.1 cannot be automatically installed due to new dependency

2022-03-07 Thread Steve Dodd
I suppose there's an argument to be made that if the user is prepared to periodically manually install non-security updates, then they should be prepared to check for held back security updates too. I tend to work from the command-line so don't know what the GUI interface(s) allow and indicate in

[Bug 1963751] Re: focal security update 2.34.6-0ubuntu0.20.04.1 cannot be automatically installed due to new dependency

2022-03-07 Thread Steve Dodd
Digging a bit further - this machine was manually dist-upgraded on 30-May-2021 (it has -updates enabled, but is set to install only security updates automatically.) That update pulled in libglvnd 1.3.2-1~ubuntu0.20.04.1 (source for libegl1, libglvnd0, etc.) To upgrade to webkit2gtk

[Bug 1963751] Re: focal security update 2.34.6-0ubuntu0.20.04.1 cannot be automatically installed due to new dependency

2022-03-07 Thread Steve Dodd
OK, have manually rolled back the system to previous state (the old versions of the packages were still available on my apt-cacher-ng server), and run unattended-upgrades in debug mode - file attached. I guess the key lines are: sanity check failed for:

[Bug 1963751] Re: focal security update 2.34.6-0ubuntu0.20.04.1 cannot be automatically installed due to new dependency

2022-03-07 Thread Steve Dodd
OK, here is dpkg.log section from one machine: 2022-03-05 14:45:14 startup archives unpack 2022-03-05 14:45:14 install libopengl0:amd64 1.3.2-1~ubuntu0.20.04.1 2022-03-05 14:45:14 status triggers-pending libc-bin:amd64 2.31-0ubuntu9.2 2022-03-05 14:45:14 status half-installed libopengl0:amd64

[Bug 1963751] Re: focal security update 2.34.6-0ubuntu0.20.04.1 cannot be automatically installed due to new dependency

2022-03-07 Thread Steve Dodd
Unfortunately I've already done that on the two affected machines and didn't make a note of the output. I will try to dig out the dpkg logs. As I said, the extra dependency on libopengl0 seemed to be the issue. It's also just possible I took a snapshot or backup so I can roll back and retry - I

[Bug 1892108] Re: ping prints ip address octets backwards on host redirect

2022-03-05 Thread Steve Dodd
Fixed by https://github.com/iputils/iputils/commit/e2e9a2dd4639924614bdbee43907a49134e8da19 it seems. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1892108 Title: ping prints ip address octets

[Bug 1878601] Re: Merge nfs-utils from Debian experimental for 22.04 - version in Ubuntu is *very* old

2022-02-15 Thread Steve Dodd
I've rebuilt my 'LAN services' container with the packages linked here, and nothing seems to have exploded over the last hour or so. Not sure if that constitutes extensive testing :) As it seems stable I'll leave it running indefinitely to catch any wrinkles.. -- You received this bug

[Bug 1768340] Re: fscrypt does not work for home directory encryption

2022-01-18 Thread Steve Dodd
Note that lightdm in focal seems to have problems with v1 policies too, at least in some cases: https://github.com/google/fscrypt/issues/203 . ** Bug watch added: github.com/google/fscrypt/issues #203 https://github.com/google/fscrypt/issues/203 -- You received this bug notification because

[Bug 1882993] Re: Package needs newer version with v2 encryption policy

2022-01-18 Thread Steve Dodd
Note that in particular, lightdm seems have to problems when using v1 policies, see https://github.com/google/fscrypt/issues/203. I had to upgrade one focal laptop to v2 policies to get lightdm to work - although oddly I had no problems on another, and I can't see the difference between them. I

[Bug 1878601] Re: Merge nfs-utils from Debian experimental for 22.04 - version in Ubuntu is *very* old

2021-12-02 Thread Steve Dodd
Bug #1901709 should be fixed by a resync, too. I don't know how many people other than me are mad enough to be running nfs servers in containers .. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1451797] Re: rc.local should require network-online.target

2021-11-14 Thread Steve Dodd
This commit actually didn't reliably fix this bug, but given the length of time here, I've opened a new bug #1950906 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1451797 Title: rc.local should

[Bug 1950906] [NEW] etc/rc.local should Want or Require network-online.target

2021-11-14 Thread Steve Dodd
Public bug reported: The fix for bug #1451797 introduced /lib/systemd/system/rc- local.service.d/debian.conf with the intent that rc.local would always run after the network was fully online. However, it only has an After= line, without actually pulling in network-online.target. Systemd docs say:

[Bug 1943049] Re: Docker ubuntu:impish: Problem executing scripts DPkg::Post-Invoke 'rm -f /var/cache/apt/archives/*.deb /var/cache/apt/archives/partial/*.deb /var/cache/apt/*.bin || true'

2021-09-23 Thread Steve Dodd
The long-term solution to all of this tediousness is probably for seccomp to be able to give some indication if a syscall is "new": https://github.com/seccomp/libseccomp/issues/286 ** Bug watch added: github.com/seccomp/libseccomp/issues #286 https://github.com/seccomp/libseccomp/issues/286

[Bug 1944436] Re: Please backport support for "close_range" syscall

2021-09-22 Thread Steve Dodd
I think the long test case in #5 now works. Note that later versions of crun have worked around the problem: https://github.com/containers/crun/pull/672 Still worth fixing, though, I think, as it is likely to cause further problems as more code starts to use close_range. -- You received this

[Bug 1944436] Re: Please backport support for "close_range" syscall

2021-09-22 Thread Steve Dodd
Still working out kinks in the above, but here's a simpler one. Needs running in an nspawn container again (steps 1-2 above); should either succeed (no output) or print "function not implemented", but without seccomp support nspawn will block it and it will print "not permitted" #include

[Bug 1944436] Re: Please backport support for "close_range" syscall

2021-09-22 Thread Steve Dodd
It's not going to be simple I'm afraid, at least for the original problem! "scmp_sys_resolver close_range" will quickly test whether current seccomp has support for close_range (prints "-1" if not supported, "436" otherwise - at least on x86_64.) Ubuntu seccomp maintainers have been pretty happy

[Bug 1944436] Re: Please backport support for "close_range" syscall

2021-09-21 Thread Steve Dodd
Can confirm rebuilding seccomp in focal with the relevant bits of the above two commits allows me to whitelist close_range in systemd-nspawn, solving my problem. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1944436] Re: Please backport support for "close_range" syscall

2021-09-21 Thread Steve Dodd
https://github.com/seccomp/libseccomp/pull/322/ (or at least parts of it) probably required too. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1944436 Title: Please backport support for

[Bug 1944436] [NEW] Please backport support for "close_range" syscall

2021-09-21 Thread Steve Dodd
Public bug reported: Please backport support for the "close_range" syscall .. may be as simple as cherrypicking https://github.com/seccomp/libseccomp/commit/01e5750e7c84bb14e5a5410c924bed519209db06 from upstream. I've hit problems running buildah in a systemd-nspawn container, but this will

[Bug 1810565] Re: Ubuntu 16.04 to Ubuntu18.04 upgrade fails on snap debug connectivity without logging any useful logs

2021-08-30 Thread Steve Dodd
Bug #1926267 is related. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1810565 Title: Ubuntu 16.04 to Ubuntu18.04 upgrade fails on snap debug connectivity without logging any useful logs To

[Bug 1810565] Re: Ubuntu 16.04 to Ubuntu18.04 upgrade fails on snap debug connectivity without logging any useful logs

2021-08-30 Thread Steve Dodd
This hit me trying to run a container upgrade in an environment where snapd wasn't running. Not a supported situation I'm sure but the extra logging would be good - just capturing the "snap debug connectivity" output and dumping to log would be fine.. -- You received this bug notification

[Bug 1926267] Re: do-release-upgrade failed silently after failed to connect to snap service

2021-08-30 Thread Steve Dodd
Bug #1810565 related. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1926267 Title: do-release-upgrade failed silently after failed to connect to snap service To manage notifications about this

[Bug 1905285] Re: socket-activated sshd breaks on concurrent connections

2021-06-19 Thread Steve Dodd
I'm seeing something similar to this (messages more like those in underlying debian bug report) - in this case triggered by a script which sshs in (invoking unison) twice in quick succession. Underlying hardware is an ARM board which may a little slow, don't know if that helps to trigger race?

[Bug 1871336] Re: blueman-tray crashed with FileNotFoundError in check_single_instance():[Errno 2]

2021-05-13 Thread Steve Dodd
Upstream bug, I assume: https://github.com/blueman- project/blueman/issues/1210 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1871336 Title: blueman-tray crashed with FileNotFoundError in

[Bug 1871336] Re: blueman-tray crashed with FileNotFoundError in check_single_instance():[Errno 2]

2021-05-13 Thread Steve Dodd
I guess this is a race condition? Lockfile being removed by previous instance between the file being read and the is_running check or remove call? ** Bug watch added: github.com/blueman-project/blueman/issues #1210 https://github.com/blueman-project/blueman/issues/1210 -- You received this

[Bug 1841378] Re: MACVLAN= in .nspawn file vs command line results in /sys/class/net showing host interfaces

2021-03-15 Thread Steve Dodd
It's just possible that the commit linked may fix https://github.com/systemd/systemd/issues/12313 as well .. ** Bug watch added: github.com/systemd/systemd/issues #12313 https://github.com/systemd/systemd/issues/12313 -- You received this bug notification because you are a member of Ubuntu

[Bug 1883447] Re: nspawn on some 32-bit archs blocks _time64 syscalls, breaks upgrade to focal in containers

2021-03-08 Thread Steve Dodd
LGTM! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1883447 Title: nspawn on some 32-bit archs blocks _time64 syscalls, breaks upgrade to focal in containers To manage notifications about this

Re: [Bug 1915205] Re: CVE-2020-9366

2021-02-09 Thread Steve Dodd
Ah, my apologies - hadn't spotted that it was a recently introduced bug! On Tue, 9 Feb 2021, 22:20 Steve Beattie, <1915...@bugs.launchpad.net> wrote: > Hello Steve, > > Thanks for reporting this issue. In this case, it is believed that the > vulnerability was introduced in screen 4.7.0 (via > >

[Bug 1915205] Re: CVE-2020-9366

2021-02-09 Thread Steve Dodd
Marking public as this is already known; might as well avoid dupes.. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1915205 Title: CVE-2020-9366 To manage notifications about this bug go to:

[Bug 1915205] [NEW] CVE-2020-9366

2021-02-09 Thread Steve Dodd
*** This bug is a security vulnerability *** Public security bug reported: screen <4.8.0 has a buffer overflow that can be triggered by program output. It doesn't seem to be clear yet how exploitable it is: https://nvd.nist.gov/vuln/detail/CVE-2020-9366

[Bug 1891810] Re: Missing openat2 syscall, causes problems for fuse-overlayfs in nspawn containers

2021-01-20 Thread Steve Dodd
Ah, looks like I don't need to do anything for focal's systemd-nspawn other than add openat2 to SyscallFilters= in the .nspawn file. With that, and the seccomp from the PPA, everything seems OK - thank you! -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1891810] Re: Missing openat2 syscall, causes problems for fuse-overlayfs in nspawn containers

2021-01-20 Thread Steve Dodd
OK, this is getting complicated. seccomp 2.5.0 and systemd-nspawn both have bugs which when combined cause most/all syscall filters to actually be disabled! See https://github.com/seccomp/libseccomp/issues/273#issuecomment-668458070 So I think your new packages are probably OK, but as they pull

[Bug 1891810] Re: Missing openat2 syscall, causes problems for fuse-overlayfs in nspawn containers

2021-01-20 Thread Steve Dodd
Attached is a trivial test case, needs to be run in a container by a container manager that uses seccomp for syscall filtering (e.g. nspawn.) It should either silently succeed or print "openat2: Function not implemented" ; if seccomp combined with the container manager (e.g. nspawn) blocks the

[Bug 1891810] Re: Missing openat2 syscall, causes problems for fuse-overlayfs in nspawn containers

2021-01-20 Thread Steve Dodd
Hmm, I tested with libseccomp2_2.5.1-0ubuntu0.20.04.1_test4_amd64.deb from the PPA and it doesn't seem to fix the openat2 problem - just realised I should have added I'm now using focal not bionic for my container host.. will try to investigate why once I'm back on my desktop machine. -- You

[Bug 1891810] Re: Missing openat2 syscall, causes problems for fuse-overlayfs in nspawn containers

2021-01-15 Thread Steve Dodd
Any progress on this? I've just run into it again, and due to my appalling memory have spent two hours debugging and now discovered my own bug report again :/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1910815] Re: race on boot between multiple invocations of grub-editenv

2021-01-08 Thread Steve Dodd
Fix might well be as simple as adding "After=grub-common.service" to /lib/systemd/system/grub-initrd-fallback.service - it's worked for one boot so far, which is obviously not a great test of a race condition :) It does seem to lead to sequential ordering of the two jobs, though: Jan 08 20:31:26

[Bug 1910815] [NEW] race on boot between multiple invocations of grub-editenv

2021-01-08 Thread Steve Dodd
Public bug reported: On focal, it appears systemd can run /etc/init.d/grub-common in parallel with /lib/systemd/system/grub-initrd-fallback.service. Both of these invoke grub-editenv for different reasons, apparently resulting in race conditions that generate messages like this: Jan 08 18:07:15

[Bug 1848180] Re: LVM initrd fails to activate btrfs multidevice root

2020-12-28 Thread Steve Dodd
** Attachment added: "/etc/initramfs-tools/scripts/local-top/btrfs-lvm" https://bugs.launchpad.net/ubuntu/+source/lvm2/+bug/1848180/+attachment/5447426/+files/local-top.script -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1848180] Re: LVM initrd fails to activate btrfs multidevice root

2020-12-28 Thread Steve Dodd
OK, attached are some initramfs scripts: local-top.hook -> /etc/initramfs-tools/hooks/btrfs-lvm local-top.script -> /etc/initramfs-tools/scripts/local-top/btrfs-lvm I've tried to make them reasonably generic, the root fs is examined on initramfs creation, component btrfs devices extracted and

[Bug 1848180] Re: LVM initrd fails to activate btrfs multidevice root

2020-12-28 Thread Steve Dodd
I'm seeing this on focal as well. Running vgchange when the initramfs crashes to shell no longer seems to work - it just hangs. I have to add break=mount to kernel command line and do it there. Now working on hacking something into /etc/initramfs-tools/scripts/local-top/ - @Gabriele, that should

[Bug 1909149] [NEW] package lxd 3.0.3-0ubuntu1~18.04.1 failed to install/upgrade: new lxd package pre-installation script subprocess returned error exit status 1

2020-12-23 Thread Steve Dodd
Public bug reported: Not sure what happened here, this line might be key: - Run install hook of "lxd" snap if present (run hook "install": cannot perform operation: mount --rbind /home /tmp/snap.rootfs_FrMoDy//home: Permission denied) If I remember correctly, /home is a symlink on this

[Bug 1877844] Re: [SRU] data corruption issue in all versions before 1.1.11

2020-11-26 Thread Steve Dodd
I've gone through the upstream bug https://github.com/borgbackup/borg/issues/4829 and not found any data which could be used as a test case. While the description of the bug there is quite detailed, I think one would have to be incredibly familiar with borg internals & code to create a reproducer.

[Bug 1877844] Re: [SRU] data corruption issue in all versions before 1.1.11

2020-11-26 Thread Steve Dodd
Given this is a *known data corrupting bug* declared by upstream, it would seem really odd to hold up the release for bionic and focal, where the solution is just an upgrade to the upstream version containing the fix! (I can possibly see the argument for being more careful with cherrypicked

[Bug 1901709] [NEW] build nfsdcld to avoid grace period in containers

2020-10-27 Thread Steve Dodd
Public bug reported: Trying to use kernel nfs server in containers generally works, but generates dmesg warnings as follows: [ 23.392559] NFSD: attempt to initialize umh client tracking in a container ignored. [ 23.395065] NFSD: attempt to initialize legacy client tracking in a container

[Bug 882878] Re: With IPv6 disabled, openssh will not forward X connections

2020-10-15 Thread Steve Dodd
Still broken in bionic in 2020! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/882878 Title: With IPv6 disabled, openssh will not forward X connections To manage notifications about this bug go to:

[Bug 1859829] Re: server will not boot after updating lvm2 package

2020-08-20 Thread Steve Dodd
This has just happened on yet another machine. It seems to occur if there's a snapshot of root volume in existence? Any chance of a fix? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1859829 Title:

[Bug 1891810] Re: Missing openat2 syscall, causes problems for fuse-overlayfs in nspawn containers

2020-08-16 Thread Steve Dodd
Actually, I recommend not looking at 2.5.0 or master until https://github.com/seccomp/libseccomp/issues/273 is fixed! Definitely a security issue. ** Bug watch added: github.com/seccomp/libseccomp/issues #273 https://github.com/seccomp/libseccomp/issues/273 -- You received this bug

[Bug 1891810] [NEW] Missing openat2 syscall, causes problems for fuse-overlayfs in nspawn containers

2020-08-16 Thread Steve Dodd
Public bug reported: The version of libseccomp2 in bionic does not know about the openat2 syscall. In my particular usecase, I was trying to run podman/buildah in an nspawn container, using fuse-overlayfs. This leads to peculiar failure modes as described in this issue:

[Bug 1883447] Re: nspawn on some 32-bit archs blocks _time64 syscalls, breaks upgrade to focal in containers

2020-08-06 Thread Steve Dodd
This bug also seems to generate "Assertion 'clock_gettime(map_clock_id(clock_id), ) == 0' failed at src/basic /time-util.c:55, function now(). Aborting" in various places if you try to boot an existing 20.04 container on bionic with systemd-nspawn. -- You received this bug notification because

[Bug 1883447] Re: nspawn on arm blocks _time64 syscalls, breaks upgrade to focal in containers

2020-06-14 Thread Steve Dodd
Thinking about it, it probably only applies to arm, or at least to 32 bit archs (I think 64bit archs use 64-bit time already.) I'll try and find a reference for that .. ** Summary changed: - nspawn blocks _time64 syscalls, breaks upgrade to focal in containers + nspawn on arm blocks _time64

[Bug 1883447] Re: nspawn on arm blocks _time64 syscalls, breaks upgrade to focal in containers

2020-06-14 Thread Steve Dodd
https://patchwork.kernel.org/patch/10756415/ is the upstream kernel patch it seems. ** Summary changed: - nspawn on arm blocks _time64 syscalls, breaks upgrade to focal in containers + nspawn on some 32-bit archs blocks _time64 syscalls, breaks upgrade to focal in containers ** Description

[Bug 1883447] [NEW] nspawn blocks _time64 syscalls, breaks upgrade to focal in containers

2020-06-14 Thread Steve Dodd
Public bug reported: This may only affect armhf, but I can't see why it should. Recent Linux kernels introduced a number of new syscalls ending in _time64 to fix Y2038 problem; it appears recent glibc, including the version in focal, test for the existence of these. systemd-nspawn in bionic

[Bug 1882973] [NEW] Versions >=20190125 build-depend on meson >=0.47

2020-06-10 Thread Steve Dodd
Public bug reported: The following upstream commit https://github.com/systemd/casync/commit/8d30d6d8ebe4b12e251fe4b72d1a2e6f3121b994 makes the build require meson >= 0.47, but the package in 20.04 still build-depends on 0.40. Just hit this trying to backport to bionic, which generates error

[Bug 1859829] Re: server will not boot after updating lvm2 package

2020-06-04 Thread Steve Dodd
This has just bitten me again on yet another machine - is it ever going to be fixed? If it helps I suspect it's something to do with having snapshots kicking around .. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1877844] [NEW] data corruption issue in all versions before 1.1.11

2020-05-10 Thread Steve Dodd
Public bug reported: Per the "important notes" section of the borg docs: https://borgbackup.readthedocs.io/en/stable/changes.html "Pre-1.1.11 potential index corruption / data loss issue A bug was discovered in our hashtable code, see issue #4829. The code is used for the client-side chunks

[Bug 1877844] Re: data corruption issue in all versions before 1.1.11

2020-05-10 Thread Steve Dodd
Upstream bug: https://github.com/borgbackup/borg/issues/4829 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1877844 Title: data corruption issue in all versions before 1.1.11 To manage

[Bug 1859829] Re: server will not boot after updating lvm2 package

2020-04-04 Thread Steve Dodd
Just reported my own bug #1870783 - my server appears to hang (without above message), but eventually successfully boots after ~ 180 secs. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1859829 Title:

[Bug 1863919] Re: [regression] lingering pvscan during boot

2020-04-04 Thread Steve Dodd
Do you also see slow shutdowns? One of my servers which has other problems with this patch (bug #1870783) has been seen to get stuck shutting down / rebooting showing a message about (I think) lvmetad (hard to tell due to very small server console truncating message) .. systemd eventually times it

[Bug 1870783] [NEW] 2.02.176-4.1ubuntu3.18.04.2 causes 3 min boot hang

2020-04-04 Thread Steve Dodd
Public bug reported: 2.02.176-4.1ubuntu3.18.04.2 causes at least one of my servers to hang on boot for ~ 3 minutes. adding debug=y to kernel command line seems to show the last script was init-top/udev. Downgrading to 2.02.176-4.1ubuntu3 resolves the problem. Possibly related to bug #1859829 and

[Bug 1776447] Re: Indirect GLX (LIBGL_ALWAYS_INDIRECT=1) causes opengl programms to crash

2020-01-28 Thread Steve Dodd
That would be excellent - thanks! IGLX is one of those things probably not many people use, but those of us who do kind of really need it. It also seems to be a thing in HPC / research circles: https://www.phoronix.com/scan.php?page=news_item=Xorg-IGLX-Potential- Bye-Bye FWIW, I'm now (finally)

[Bug 656675] Re: Two saned processes and "bind failed: Address already in use"

2019-12-28 Thread Steve Dodd
OK, I think this is not a (huge) bug .. looking at saned code, it tries to bind v6 and v4 sockets separately. If /proc/sys/net/ipv6/bindv6only isn't set, binding v6 will also bind v4, making the later explicit v4 bind fail. The second process is probably the one responsible for avahi

[Bug 656675] Re: Two saned processes and "bind failed: Address already in use"

2019-12-28 Thread Steve Dodd
Still seeing this in 18.04! Gave up, disabled /etc/init.d/saned, and used the systemd socket service - but this doesn't seem to advertise the saned server. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1785383] Re: missing EDNS0 record confuses systemd-resolved

2019-12-02 Thread Steve Dodd
Any news on this? Recent upgrade has removed my patches to dnsmasq, and I'm hitting this again. Still convinced the Ubuntu-specific patch to systemd-resolved is flawed as well. I will try to get brain back into gear to have at look at this all again. If nothing else, would be good to SRU the

[Bug 1840640] Re: sync_file_range fails in nspawn containers on arm, ppc

2019-11-17 Thread Steve Dodd
Just tested on bionic, looks good - thanks everyone! ** Tags removed: verification-needed verification-needed-bionic ** Tags added: verification-done verification-done-bionic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1840640] Re: sync_file_range fails in nspawn containers on arm, ppc

2019-11-10 Thread Steve Dodd
OK, so my kernel didn't have seccomp support compiled in and systemd just silently fails to set seccomp filters in that case. Have now reproduced the bug on an armhf disco VM, and verified that the package in proposed, 240-6ubuntu5.8 fixes it. ** Tags removed: verification-needed-disco ** Tags

[Bug 1840640] Re: sync_file_range fails in nspawn containers on arm, ppc

2019-11-10 Thread Steve Dodd
OK, I've had a go, but oddly I can't reproduce this in a disco VM at the moment, which makes testing the fix tricky.. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1840640 Title: sync_file_range

[Bug 1840640] Re: sync_file_range fails in nspawn containers on arm, ppc

2019-11-10 Thread Steve Dodd
@vorlon, will do my best to test the disco version, but I don't currently have an ARM disco environment, and usual health battles mean it'll probably be a struggle to set one up - I'll have a go though! The bionic version I will of course be all over :) -- You received this bug notification

Re: [Bug 1840640] Re: sync_file_range fails in nspawn containers on arm, ppc

2019-10-03 Thread Steve Dodd
Can't check at the moment, but details should have been added by apport. Is it possible arm64 abi is different from armhf (32bit?) On Thu, 3 Oct 2019, 22:41 Dan Streetman, wrote: > I'm having trouble reproducing this on a Bionic nspawn container on > arm64; what host release, and container

[Bug 1539934] Re: Load thin Kernel Modules in initramfs for support on boot

2019-09-03 Thread Steve Dodd
Looks like this may finally have been fixed in Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774560 ** Bug watch added: Debian Bug tracker #774560 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774560 -- You received this bug notification because you are a member of Ubuntu

[Bug 1841918] Re: wakeonlan no longer works with r8169 after upgrade to 5.0 kernel

2019-08-29 Thread Steve Dodd
Aha .. https://github.com/systemd/systemd/blob/master/src/shared/ethtool- util.c#L279 Reads current WOL settings and doesn't set them again if not necessary - we're back the r8169 driver or the BIOS possibly not quite initializing something correctly on start-up, which an explicit ioctl to set

[Bug 1841918] Re: wakeonlan no longer works with r8169 after upgrade to 5.0 kernel

2019-08-29 Thread Steve Dodd
Interestingly, if I enable WOL by hand with ethtool (even though ethtool is showing it as already enabled), it works. /sys/class/net/laneth0/device/power/wakeup shows "disabled" if I let systemd enable WOL via the .link file, but after doing it manually with ethtool it shows "enabled." Note that

[Bug 1841918] [NEW] wakeonlan no longer works with r8169 after upgrade to 5.0 kernel

2019-08-29 Thread Steve Dodd
Public bug reported: Latest in the eternal saga of WOL problems with r8169 on certain platforms. 4.15.0-58 (bionic) worked; installing the latest HWE (5.0.0-25) stops wakeonlan working. lspci output: 00:00.0 Host bridge: Intel Corporation Xeon E3-1200 v2/3rd Gen Core processor DRAM Controller

[Bug 1102906] Re: Cannot broadcast both on global and link address on same interface

2019-08-28 Thread Steve Dodd
Would it be possible to add a flag to AvahiPublishFlags to allow the application to request the required behaviour on a per-service basis? I can't see any options for Pidgin that don't require pretty radical restructuring of its codebase (more discussion at

[Bug 1841621] Re: Bonjour messages not received if one party has global ipv6 address and one doesn't

2019-08-28 Thread Steve Dodd
Thanks for the explanation. Pidgin probably needs to keep the source address matching partly for security, and also possibly to disambiguate users. Binding to the advertised address probably wouldn't work in this case, as the target wouldn't have a route back for the global address prefix. I

[Bug 1102906] Re: Cannot broadcast both on global and link address on same interface

2019-08-27 Thread Steve Dodd
** Bug watch added: github.com/lathiat/avahi/issues #243 https://github.com/lathiat/avahi/issues/243 ** Also affects: avahi via https://github.com/lathiat/avahi/issues/243 Importance: Unknown Status: Unknown -- You received this bug notification because you are a member of

[Bug 1102906] Re: Cannot broadcast both on global and link address on same interface

2019-08-27 Thread Steve Dodd
I found a mailing list post which mentioned this, but no replies: https://lists.freedesktop.org/archives/avahi/2010-March/001863.html It actually causes problems for Pidgin in certain circumstances, see bug #1841621. -- You received this bug notification because you are a member of Ubuntu

[Bug 1841621] Re: Bonjour messages not received if one party has global ipv6 address and one doesn't

2019-08-27 Thread Steve Dodd
Just found bug #1102906 raised against avahi for this behaviour years ago.. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1841621 Title: Bonjour messages not received if one party has global ipv6

[Bug 1841621] Re: Bonjour messages not received if one party has global ipv6 address and one doesn't

2019-08-27 Thread Steve Dodd
Just realised that the heat had addled my brain - this will get the link local address of target, not the originator. We could enumerate link local addresses on the originator and add a field to the mdns text record, but by definition those addresses are only valid on a particular interface, and

[Bug 1841621] Re: Bonjour messages not received if one party has global ipv6 address and one doesn't

2019-08-27 Thread Steve Dodd
Proof of concept of getting link local address for a specific ifindex. ** Attachment added: "getif.c" https://bugs.launchpad.net/ubuntu/+source/pidgin/+bug/1841621/+attachment/5285029/+files/getif.c -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1841621] Re: Bonjour messages not received if one party has global ipv6 address and one doesn't

2019-08-27 Thread Steve Dodd
Looking at the source, when browsing/resolving mdns, we get an interface ID passed to the callback. So it should be possible call if_indextoname() on that, then walk getifaddr() output to find the interface and then its link-local address, and that add that to the list of IPs ... -- You received

[Bug 1841621] Re: Bonjour messages not received if one party has global ipv6 address and one doesn't

2019-08-27 Thread Steve Dodd
May be a long-standing avahi problem, but Pidgin may need to work around it: https://lists.freedesktop.org/archives/avahi/2010-March/001863.html -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1841621

[Bug 1841621] Re: Bonjour messages not received if one party has global ipv6 address and one doesn't

2019-08-27 Thread Steve Dodd
https://github.com/lathiat/avahi/blob/1cc2b8e8d62e939b8bd683f795794878863931af /avahi-core/iface.c#L707][1] -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1841621 Title: Bonjour messages not

[Bug 1841621] Re: Bonjour messages not received if one party has global ipv6 address and one doesn't

2019-08-27 Thread Steve Dodd
(For those trying to work around this, just disabling IPv6 through sysctl doesn't necessarily help - some combination of Network Manager and avahi seems to manage to advertise a link-local address even in this instance. v6 support can be turned off separately in avahi-daemon.conf) -- You

[Bug 1841621] [NEW] Bonjour messages not received if one party has global ipv6 address and one doesn't

2019-08-27 Thread Steve Dodd
Public bug reported: Something in the stack - Pidgin or avahi - gets confused if one machine has a global IPv6 address and the other only has a link-local address. Pidgin sees the global address advertised by mDNS, but connections come from the link-local address, and it rejects them because of

[Bug 1841378] Re: MACVLAN= in .nspawn file vs command line results in /sys/class/net showing host interfaces

2019-08-26 Thread Steve Dodd
The "obvious fix" (attached) does indeed solve the problem - haven't done enough testing as of yet to be sure there are no weird consequences. ** Description changed: I have machine with the following nspawn file: -- [Network] MACVLAN=laneth0 [Exec] PrivateUsers=false --

[Bug 1841378] [NEW] MACVLAN= in .nspawn file vs command line results in /sys/class/net showing host interfaces

2019-08-25 Thread Steve Dodd
Public bug reported: I have machine with the following nspawn file: -- [Network] MACVLAN=laneth0 [Exec] PrivateUsers=false -- if I start it with systemctl start systemd-nspawn@name, all works as expected. If I start manually with systemd-nspawn -M name -b, I seem to correctly get a new

[Bug 1752379] Re: ubuntu-support-status could more clearly define 'support'

2019-08-20 Thread Steve Dodd
I'm utterly confused about what the support policy actually is .. is "Supported:" in universe still updated/meaningful? Apparently I have 123 unsupported packages on bionic, including things like apcupsd, iftop, fatrace, distcc, systemd-container ..? -- You received this bug notification because

[Bug 1574670] Re: ubuntu-support-status returns inaccurate information

2019-08-20 Thread Steve Dodd
Just found this, still very confused .. is "Supported:" in universe still updated/meaningful? Apparently I have 123 unsupported packages on bionic, including things like apcupsd, iftop, fatrace, distcc, systemd- container ..? Hard to get a grasp on current support policies. -- You received this

[Bug 1840640] Re: sync_file_range fails in nspawn containers on arm, ppc

2019-08-19 Thread Steve Dodd
Test packages in case anyone wants them: https://www.dropbox.com/sh/gxuy14k1t2chwbu/AABKX2idDrGu2R3Fwio0DAOTa?dl=0 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1840640 Title: sync_file_range fails

[Bug 1840640] [NEW] sync_file_range fails in nspawn containers on arm, ppc

2019-08-19 Thread Steve Dodd
Public bug reported: ARM has two sync_file_range syscalls, sync_file_range and sync_file_range2. The former is apparently not used, and glibc calls the latter whenever a userspace program calls sync_file_range. I'm guessing systemd-nspawn doesn't know this, because the follow code consistently

[Bug 1826405] Re: Repeatedly "storage error [503 Inconsistent file state], last errno: File exists

2019-08-15 Thread Steve Dodd
Well, touch wood, something I've done has made things happier. I moved everything from the cache directory to a subfolder, made it inaccessible, removed apt lists from clients and ran apt-get update, then linked all the original cache files into _import and made acng reimport them. The first time

[Bug 1826405] Re: Repeatedly "storage error [503 Inconsistent file state], last errno: File exists

2019-08-15 Thread Steve Dodd
I was seeing the dreaded "503 Inconsistent file state" talking to the canonical (sorry) package repositories. As I said, there are no explicit upstream proxies, but who knows what the ISP is doing (this would be a big argument in favour of running apt-get over https to my mind..) Anyway, at the

[Bug 1826405] Re: Repeatedly "storage error [503 Inconsistent file state], last errno: File exists

2019-08-15 Thread Steve Dodd
acng seems totally broken in bionic. I'm not knowingly behind a proxy - can't completely rule out ISP doing something evil though. Anyone have any pointers on this? Very few google hits, nothing on bugs.debian.org that I can see, very little activity for acng on salsa.debian.org .. -- You

  1   2   3   4   >