/srv/irclogs.ubuntu.com/2015/04/21/#ubuntu-devel.txt

Mirvcould a core-dev ack the following packaging changes (the debian/ parts, others are just FYI)? https://ci-train.ubuntu.com/job/ubuntu-landing-004-1-build/129/artifact/ubuntu-ui-toolkit_packaging_changes.diff05:48
Mirvremoving of python2 support from tests (and dependencies), plus switching to QT_SELECT=qt5 and therefore removing cruft from the dependencies05:49
Mirvoh, as a remark, it's not going at this moment to vivid archives, but targets w. but we treat the current overlay PPA as archive.05:50
=== ara is now known as Guest22932
RAOFMirv: Looks sensible.06:36
Mirvthanks!06:37
dholbachgood morning07:08
pittiGood morning08:07
infinityjamespage: Should nova-serialproxy be explicitly seeded, or dropped to universe?08:49
didrocksmvo: hey, stupid snappy question for you. So, if you have apps A depending on framework B, how can app A knows the path from the libs (or helpers) included in framework B?08:56
pittididrocks: you don't really08:57
davmor2seb128: so we still have the issue in vivid where you put something into the waste bin and then right click the icon in the launcher and empty the waste bin that is randomly opens a nautilus window08:58
seb128davmor2, correct08:58
didrockspitti: I guess we have misconceptions about frameworks, we read about the fact that it shouldn't contain libs08:58
pittididrocks: right now frameworks can export binaries, but not libs08:58
didrocksso08:58
didrocksif I have a mir framework08:58
pittididrocks: it should contain libs, but not export them08:58
didrockshow to run apps?08:58
davmor2seb128: fair enough :)08:58
pittididrocks: (and yes, I think that's wrong, but that's how it is right now)08:58
didrockspitti: I guess all this was discussed in a desktop context, right?08:58
pittididrocks: bundle everything08:58
didrocksso every apps contains Mir libs?08:59
mvodidrocks: you need to hardcode that right now, I think we will include a better mechanism for this but we are not there yet, sorry08:59
pittiyes, duplication is the future!08:59
didrocksmvo: seems like we have some requirements on the very short term to have a snappy desktop09:00
didrocksmvo: so, we are experimenting (and will have a list of requirements from you)09:00
didrocksmvo: is it better to send a long email with all our questions on the ML?09:00
mvodidrocks: eh, we release in 2 days, there is nothing new coming09:00
didrocksmvo: well, I guess this is for the incoming cycle :p09:01
mvodidrocks: i.e. if you need anything new it won't be based on 15.04, maybe 15.04.1 or something09:01
didrocksI hope at least09:01
mvodidrocks: aha, ok09:01
mvodidrocks: thats different :)09:01
mvodidrocks: I was shocked for a minute09:01
mvodidrocks: either way is fine, irc or mail09:01
didrocksmvo: no heart attack (yet)09:01
didrockswe will be able to panic tomorrow :p09:01
didrocksmvo: shouldn't we have a quick hangout (robert ancell, I and you) to unfog the first questions?09:02
didrocksnot sure how much you thought about snappy in a dekstop context09:02
didrocks(we are sprinting this week)09:03
didrocksI guess we can draft an email, better for async thinking09:04
mvodidrocks: maybe send mail and then hangout? this way I get some to think about the questions and more people can jump in if needed?09:05
didrocksmvo: sounds good, robert and I will draft our thoughts09:07
mvota09:07
addikshi, i am getting a segfault when running test for unity which prevents me from building unity packages. This happenes on the version i get from "apt-get source unity", and also the one from "bzr branch lp:unity". I am currently running a bisection, but i dont know if the information from that are usable because i neither have very much experience with bazaar nor with bisecting. I have a backtrace from GDB, it just does not make much se09:18
addiksnse to me. What should i do next?09:18
infinityjamespage: Also, please subscribe the server team to dns-root-data bugs, per bug #142646009:25
ubottubug 1426460 in dns-root-data (Ubuntu) "[MIR] dns-root-data" [Undecided,New] https://launchpad.net/bugs/142646009:25
jamespageinfinity, looking now09:25
infinityjamespage: To the bug sub, or the nova-thingee seed? :)09:26
jamespageboth09:26
infinityjamespage: (But thanks in advance for both)09:26
jamespagebug sub done09:26
jamespageinfinity, as nova-serialproxy is completely untested by my team, I'd prefer we demoted to universe for this cycle please09:29
infinityjamespage: Fair enough.09:30
infinityjamespage: Sounds kinda awesome, though, would be nice to test and support it in the future.09:31
infinityjamespage: Hint, hint. :)09:31
jamespageinfinity, I agree09:31
jamespageon the list for +109:31
infinityjamespage: Also, a bug sub on ndg-httpsclient (a new dep of python-urllib3, which is already the server team's) would be swell.10:09
jamespageinfinity, ok - doing so now10:09
infinityjamespage: \o/10:09
jamespageinfinity, done10:09
tkamppetermterry, hi10:22
=== MacSlow is now known as MacSlow|lunch
rbasakHow should we package an upstream that requires -march=core2?11:44
rbasakThey're using sse3.5-specific intrinsics.11:45
strikovrbasak: i found this for example: http://packages.ubuntu.com/trusty/radiance-sse311:46
strikovrbasak: the difference is that it's something like a plugin11:47
larsutyhicks:  hey! we're working on that gsettings confinemnet dameon. Where do we get the list of keys an app is allowed11:56
larsu               to access?11:56
=== MacSlow|lunch is now known as MacSlow
=== chrisccoulson_ is now known as chrisccoulson
=== greyback__ is now known as greyback
=== _salem is now known as salem_
shadeslayercjwatson: what was the link where I could view cdimage logs?12:07
shadeslayerit was somewhere on this team https://launchpad.net/~ubuntu-cdimage/12:07
cjwatsonNo it wasn't :-)12:08
cjwatsonshadeslayer: http://people.canonical.com/~ubuntu-archive/cd-build-logs/12:08
shadeslayerhm ok, I recall there being a launchpad page with the logs too12:08
shadeslayercjwatson: on that note, is there a archive of ubuntu touch images somewhere12:09
cjwatsonshadeslayer: Live filesystem build logs are stored on Launchpad, but right now it's easiest to find them from the above link.12:09
shadeslayerok12:09
cjwatsonshadeslayer: If an image isn't on cdimage.u.c or releases.u.c or old-releases.u.c any more, then in general it's gone.12:09
shadeslayercjwatson: aw drat12:13
shadeslayerRiddell: ^^12:13
mterrytkamppeter, hello!  I left IRC on all night, wasn't around12:40
hallyn_infinity: so we ran into a little bug in vivid in that ulimit for root on vivid says it can hav 64k files, but libc's __FD_SETSIZE is 102413:05
hallyn_so when lxd opens an fd > 1024 and then tries to select on it, it gets a crash and 'buffer overflow' msg from FD_SET13:05
hallyn_ok to push a glibc which bumps __FD_SETSIZE?13:06
hallyn_doko_: ^13:06
hallyn_(sorry, biab)13:06
rbasakhallyn_: this reminds me of https://lists.ubuntu.com/archives/ubuntu-devel/2010-September/031446.html13:07
rbasakI get the impression it's non-trivial to change that.13:07
doko_hallyn_, that would be better an infinity question13:08
=== doko_ is now known as doko
rbasakhallyn_: the kernel defines __FD_SETSIZE so I don't think you can change it easily.13:15
* rbasak wonders how the default nofile got bumped.13:16
rbasaksystemd switch perhaps?13:16
infinityhallyn_: No.13:35
hallyn_infinity: ok, that's quite a problem.  any daemon that takes a lot of connections is gonna end up crashing13:36
hallyn_rbasak: heh, yup, looks like kees was on the ball there13:37
rbasakhallyn_: I wonder if we have an indavertent issue here though. From my brief look systemd is just passing on the kernel default. Is there something upstart was doing before to set the fd limit to 1024?13:38
infinityhallyn_: That statement is provably false.  Perhaps you're after epoll?13:38
rbasakIn which case, should we be doing the same, if we haven't rebuilt all packages against the new fortification stuff?13:38
hallyn_infinity: what statement is provably false?13:38
infinityhallyn_: The daemons crashing.  Oh, unless you mean ulimit has changed, and is now a lie...13:39
hallyn_infinity: rharper is running large parallel tess against lxd, which golang (threaded) so all the threads share fdtable;  so they pretty quickly get past 1024 fds.13:39
hallyn_every crash i've seen was it opening a unix fd, trying to FD_SET it to select, and hitting the check in libc13:39
rbasakhallyn_: the right thing to do is to not use select in that case I think.13:40
hallyn_"in that case"13:40
hallyn_^ that basically means, never use select13:40
rbasakIf you want >1024 fds.13:40
hallyn_no, i don't13:40
hallyn_i'm liblxc, i just want to open a unix fd and select on it13:40
infinityhallyn_: Hrm, ulimit -n is indeed different on vivid than on trusty.  That's irksome.13:40
hallyn_rbasak: and i only have a single fd i care about.  it happens to be > 1024.13:40
rbasakinfinity: yeah, just verified that it's gone from 1024 to 65536 between Uoptic and Vivid.13:41
rharperI'm running on vivid13:41
rbasakinfinity: looks like /etc/systemd/system.conf can configure the default, and that systemd uses the kernel default by default.13:41
hallyn_now i agree part of the problem is golang's use of threads :)13:41
rbasakinfinity: so is this an inadvertent change that we need to fix?13:42
hallyn_bc if we drop the ulimit then we'll just get a different failure13:42
rharperhallyn_: that's a feature not a bug =)13:42
rbasakhallyn_: if you're selecting on just one fd, then surely you only need an fd_set size of 1?13:42
infinityrbasak: pitti and I are talking about it here.13:42
hallyn_rharper: https://lists.ubuntu.com/archives/ubuntu-devel/2010-September/031446.html says no :)13:42
rbasakOh, no that's stupid.13:42
rbasakIf the fd could be greater than 1024, then you can't use select.13:42
rharperhallyn_: eww13:42
rbasakUse poll instead maybe?13:42
hallyn_rbasak: every library in the archive would need to not use select13:42
hallyn_ever13:43
rbasakhallyn_: correct. Which is why the file descriptor limit is (was) set to 1024 by default.13:43
infinityrbasak: epoll, even.13:43
rbasakselect is fundamentally flawed for large number of file descriptors.13:43
rbasakA bit field passed through a system call is not going to scale.13:43
hallyn_rbasak: but so https://lists.ubuntu.com/archives/ubuntu-devel/2010-September/031446.html doesn't tell me what bad things happen when we bump FD_SETSIZE in glibc13:44
rharperhallyn_: does that mean that on trusty we should be "ok" due to the upper limit ?  it still seems strange; does go limit the number of threads it can create by FD limits ?13:44
hallyn_and fwiw rharper and i are runnign with that now13:44
infinityhallyn_: So, yeah.  There are two bugs here.  (A) the ulimit defaulting to over 1024 is obviously wrong.  But (B) if that's not working for your use case, this is 2015, epoll isn't exactly new and shiny.13:44
hallyn_rharper: good q.  maybe13:44
hallyn_that would be almost smart13:44
rharperwell, I don't think they should, a single thread could do lots of work on many FDs13:44
hallyn_infinity: that liblxc code has been around since bfeore 2008 :)13:44
hallyn_rharper: yeah, but i guess a "couldn't open fd' error would be better than "BUFFER OVERFLOW OMG"13:45
infinityhallyn_: epoll has been around since Linux 2.5.44 and glibc 2.3.2, I suspect it's older. :P13:45
rbasakinfinity: for simple programs I have just used poll. Is that wrong? Is poll deprecated somehow? If I'm testing just a handful of fds, why should I use epoll instead?13:45
hallyn_infinity: good point, and liblxc does use epoll13:45
hallyn_but noone has ever declared select deprecated13:45
hallyn_and more to th epoint, i'm pretty sure if we change all seleects in liblxc, we'll run into other libraries doing the same thing13:46
rharperdont we really want eventfd though ?13:46
hallyn_well, that's more detailed than we need to be right now,13:46
rharperin any case, the discussion of what else to use is secondary to the bugs if there is agreement that going back to 1024 won't "fix" liblxc/lxd13:46
hallyn_the q is, do we fix glibc or do we change al lsoftware saying it is too old otherwise13:46
rharperyeah13:46
infinityrbasak: epoll is significantly fancier, but it all depends on the level of fancy you need.13:47
rharperhallyn_: the thing I still don't understand is if we "fix" glibc , does that fix lxd/liblxc ?13:47
hallyn_we use epoll for use with signalfd etc irc13:47
rbasakinfinity: minimal fancy. So I think select is fine if you know an fd won't be greater than FD_SETSIZE, and poll otherwise.13:47
hallyn_rharper: you were doing the testing :)13:47
rharperI can re-run it on trusty13:47
rharperwhere the limit is still at 102413:47
hallyn_rbasak: that sounds like nonsense though13:47
hallyn_rbasak: you cannot know a priori what the fd will be, so you'd have to check and have both codepaths anyway13:48
hallyn_so just use epoll13:48
rbasakhallyn_: for a library, yes.13:48
hallyn_so it comes down to - do we have to switch over the whole archive13:48
hallyn_yes13:48
infinityhallyn_: We're not "fixing" glibc, that's not happening.  But the default ulimit is clearly wrong.13:48
cjwatsonWe obviously don't have to switch the whole archive; lots of programs reliably never get anywhere near fd 1024.13:48
hallyn_libraries13:48
cjwatsonLibraries that couldn't guarantee not to hit 1024 were likely always buggy.13:49
hallyn_infinity: is there something that will break with the glibc change?13:49
* rbasak wonders how select(2) is implemented inside glibc.13:49
rbasakI see select(2) calls in strace output. So does FD_SETSIZE need to be tuned inside the kernel as well for this to work?13:50
hallyn_cjwatson: you may feel that was always the case, but the manpage doesn 'tmention that, and to me it feels like glibc breaking the contract.13:50
rbasakOr does the kernel just understand a larger nfds?13:50
hallyn_rbasak: it's not select, it's FD_SET13:50
hallyn_(FD_ENT)13:50
hallyn_ok, well i'll personally hold this against libc and pretend someone cares :)  but i guess i'll update lxc to not use select in any library part13:51
rbasakhallyn_: glibc's contract is defined by FD_SETSIZE though. Not a broken contract, just a hole where open(2) returns an fd greater than FD_SETSIZE so prevents you from using select(2) with it.13:51
cjwatsonhallyn_: Changing FD_SETSIZE would be a pretty disastrous ABI change.  Lots of programs declare fd_sets (there's no allocator function) and pass them to select.13:51
hallyn_rbasak: FD_SETSIZE is internal to libc13:51
cjwatsonNo it's not.  It's exposed by the size of struct fd_set.13:52
hallyn_oh, i guess so13:52
rbasakPerhaps userspace should deprecate select, even if the kernel doesn't. Then non-deprecated stacks can have LimitNOFILE set higher or to unlimited.13:53
rbasakOtherwise we're forever stuck leaving it for users who want >1024 fds to guess and tune, which sucks.13:54
hallyn_seems clear to me that it should13:54
cjwatsonAnd the man page does have a bit in NOTES about fd_sets being fixed size.13:55
cjwatsonThough the difficulty of raising it is left to the reader to infer ...13:55
hallyn_and it also doesn't make clear that the limit is actually pretty low by default13:55
hallyn_that note doesn't seem to raise the appropriate level of alarm13:56
hallyn_but maybe that's just me13:56
hallyn_anyway i guess i've got some lxc patches to write13:56
hallyn_and some glibc effigees to burn13:56
cjwatsonI think it depends what you're doing.  I've never run into this in libpipeline, for instance, which uses select.13:56
cjwatsonAlthough I should likely update that to use poll.13:56
* rharper hands hallyn_ a torch13:56
cjwatsonI'd totally regard it as my bug if one of my users ran into it there though :-)13:57
rbasakWhat if we made glibc abort() if select() is called with SELECT_IS_BANNED is defined in the environment.13:58
flexiondotorgdholbach, Do you have a sec? I'd like to file a sync request for mate-tweak from Debian unstable. If fixes and bug and add translations. The package has not previously been synced from Debian so that changelog and history are different from the Ubuntu package.13:58
hallyn_most liblxc users wouldn't run into it either.  It's just golang which fires off a slew of threads using the lxc api all sharing hte same fdtable13:58
flexiondotorgdholbach, Is there anything "special" I need to do?13:58
rbasakThen anything that ups the file descriptor limit could also set that environment variable and bump it safely.13:58
hallyn_i suppose that could give a clearer error msg (than having to look at objdmp output for libc), but otherwise it doesn't seem any better13:59
dholbachflexiondotorg, no, I'm afraid I don't have time - sorry13:59
dholbachcan you maybe subscribe the release team?=13:59
cjwatsonI'm sure there are easier ways to improve select's error message ...13:59
dholbachor ping somebody on the release team?14:00
flexiondotorgdholbach, OK. Thanks.14:00
dholbachthanks flexiondotorg!14:00
hallyn_cjwatson: hah, yes, and maybe i'll send a patch for that after i "fix" lxc (i can put tha tin quotes too :)14:01
hallyn_all right, thanks all.  at least know where stand.14:02
smoseris there a tool to rename network devices ?14:35
smoseri'm aware of how to configure udev to do it for me14:36
smoserbut if i want to manually do it14:36
smoserie: net-rename eth1 eth214:36
cyphermoxsmoser: possibly ip link set dev $oldname name $newname14:37
cyphermoxcan't really try it out to see how well it does right now :)14:38
smoserright. yeah, i just saw that. thanks.14:38
smosertrying that.14:38
=== pgraner is now known as pgraner-afk
pittirbasak, hallyn_: FTR, if I boot with init=/sbin/upstart I still get ulimit -n == 6553615:09
rbasakInteresting. I wonder what set it before?15:10
pittiwhere does that default come from? kernel? libc?15:10
pittiRiddell: is bug 1362599 still RC? it sounded like you added a workaroud some months ago15:19
ubottubug 1362599 in Kubuntu PPA "ubiquity-dm does not transition to sddm to plasma5 desktop" [Undecided,Confirmed] https://launchpad.net/bugs/136259915:19
pittior bug 1431332?15:19
ubottubug 1431332 in sddm (Ubuntu) "sddm not starting after upgrade" [High,Incomplete] https://launchpad.net/bugs/143133215:19
Riddellpitti: worse, now if you click "Try Kubuntu" it just goes to a blank screen and I've no idea why :(15:31
pittiRiddell: that was my fault, ubiquity .24 fixes that15:38
Riddellpitti: oh really?15:39
pittiRiddell: if you pick live or istall in the gfxboot menu it should owrk15:39
pittiand FTR, typing is hard15:39
Riddellok I'll rebuild the cd images and see what's still broken15:40
pittiRiddell: we got a new casper, you might watn to wait for that15:42
infinityRiddell: I'll do your images for you.15:54
Riddellinfinity: ok, I clicked rebuild but feel free to stop if you think it needs to wait15:55
infinityRiddell: I can't stop it, but I can re-do it.15:55
gQuigsIs there a recent discussion on making btrfs the default file system?  I'm curious if Ubuntu has plans to switch for 15.10/16.0416:45
strikovpitti: rbasak: hallyn_ : this fileno limit (to my understanding) comes from kernel because /proc/1/limits contains this 65536 value; pam_limits comes into play later and basically uses /proc/1/limits as defaults; I have no idea why kernel sets 65536 though because it has 1024/4096 in the source code; Looks like a bug16:45
gQuigsso far I've only found it last discussed for 12.10 -  http://www.phoronix.com/scan.php?page=news_item&px=MTEwMDE16:48
dobeygQuigs: afaik, there are no plans to deviate from ext as the default16:52
hallyn_apw: ^ did we consciously up the fd ulimit?17:07
rbasakhallyn_, infinity: who's taking charge of this question? We probably should resolve it before release.17:08
rbasakDropping the limit down in an SRU will not be pleasant.17:09
rbasakFailing that, we could configure systemd to set it to 1024 before release.17:09
rbasakThen at least we can raise it in an SRU later if safe.17:09
hallyn_rbasak: i'm somehwat in favor of leaving it as is17:11
rbasakhallyn_: I'm concerned that this could introduce issues in things like server daemons that use select().17:11
rbasakPerhaps security issues, given Kees' email.17:12
rbasakAs we're not sure that everything is rebuilt with the new fortification.17:12
hallyn_rbasak: glibc checks for the fd > 1024 and stops the program17:12
rbasakhallyn_: not unless stuff is rebuilt though, right? I haven't looked at the patch but have been assuming that.17:13
hallyn_no that went into glibc in like 2011 didn't it?17:14
hallyn_see the libc buglink at the bottom of kees link you pasted earlier today17:14
rbasakEven then, is everything correctly being built with the correct fortification setting?17:20
rbasakI'm concerned because this change is one that we deliberately did not make in the past, and now it's happening "by accident".17:21
strikovrbasak, hallyn_: i just looked at my vivid machine with trusty kernel and it still has 65536; so it's somehow vivid related17:24
hallyn_rbasak: see misc/bits/select2.h in the glibc source17:28
hallyn_I don't think userspace can opt out of those checks17:28
rbasak#if __USE_FORTIFY_LEVEL > 0 && defined __GNUC__17:33
rbasak# include <bits/select2.h>17:33
rbasak#endif17:33
rbasakhallyn_: ^^17:33
hallyn_rbasak: yes, but that's at build time, and i'm telling you it is getting checked :)17:34
rbasak<hallyn_> I don't think userspace can opt out of those checks17:35
rbasak#undef __USE_FORTIFY_LEVEL and you can, no?17:35
pittirbasak, hallyn_: sorry, seems I botched my init=/sbin/upstart test, my VM didn't have upstart installed; it's indeed 1024 under upstart17:36
rbasakdpkg-buildflags says CPPFLAGS=-D_FORTIFY_SOURCE=2 but a build that fails to use that wouldn't do it.17:36
pittihm, grepping systemd for "ulimit" yields nothing except a manpage; where else does that get set?17:37
pittiand neither does upstart17:37
pittiah, setrlimit()17:38
strikovpitti: http://bazaar.launchpad.net/~registry/systemd/master/view/head:/src/core/main.c#L104317:38
strikovpitti: looks suspicious because it bumps to 65536 exactly17:38
strikovpitti: it looks like it doesn't revert it back17:38
pitti        * PID 1 will now increase its RLIMIT_NOFILE to 64K by default17:39
pitti          (but not for its children which will stay at the kernel17:39
pitti          default). This should allow setups with a lot more listening17:39
pitti          sockets.17:39
pittiso apparently that "but not.." doesn't work17:39
strikovpitti: i don't understand this code then: http://bazaar.launchpad.net/~ubuntu-core-dev/pam/ubuntu/view/head:/modules/pam_limits/pam_limits.c#L36917:40
strikovpitti: pam relies on /proc/1/limits17:40
pittistrikov: oh, so it copies pid1's limits -- pid1 has intentionally 64K17:41
rbasakpitti: as a workaround we could set DefaultLimitNOFILE in /etc/systemd/system.conf, although conffile prompt.17:42
pittiindeed, e. g. crond has 102417:42
strikovpitti: yeah, it gets defaults from /proc/1 and then overwrites it with /etc/security/limits.conf; at least that's my understanding17:42
pittiso its children do have 1024, but pam sets it to pid1's instaed of the default for sessions?17:42
rbasakAh17:42
rbasakGood job figuring that one out!17:42
pittiso we need to set it in /etc/security/limits.conf?17:42
pitti(sorry for delay, juggling more installer/plymouth bugs here than I'd ever wanted to look at)17:43
rbasak/usr/sbin/lightdm and /usr/bin/X are 1024 on my system.17:44
rbasakAnd lightdm --session-child is 65536.17:44
rbasakSo that would be consistent with PAM.17:44
pittiI'd rather drop a file into /etc/security/limits.d/ instad of changing the conffile17:44
pittiright17:45
rbasak/etc/security/limits.d/ sounds like it would work and be reasonable to me.17:45
pittiso we either drop a conffile snippet there, or we change PAM to not read it from pid 1 but from itself?17:45
rbasakIf from itself, what about an su-type case?17:46
rbasakI have some very limited user but su to root. Should I expect my limit to go up?17:46
pittimy gut feeling is that compiled-in default >> conffile, but at this point of the release cycle we might need to make compromises indeed17:47
infinityI think the right fix is to switch PAM from using the PID1 defaults to using the defaults of its own process.17:47
rbasakMaybe change PAM to read from pid 1, but cap at 1024?17:47
pittirbasak: good point17:47
strikovyeah, i don't like removing all defaults, just nofiles=1024 is much better17:47
pittirbasak: trying that here17:48
rbasakEven cleaner, cap to FD_SETSIZE.17:48
* sbeattie hrms, pondering su with an fd limit of 1...17:48
pittiyes, it does get inherited :/17:49
rbasakWhat did you try exactly? Limited nofile on user gets inherited on su to root?17:49
pittiulimit -n 5017:49
pittisu - joe17:50
pittibut in fact that's happening on current vivid17:50
pittii. e. su/pam already inherit from the parent17:50
pittiit's just getting the 64K from the initial lightdm session or so?17:50
hallyn_rbasak: when I say "userspace can't opt out" I mean for instance liblxc.  obviously you can rebuild and opt out.17:53
rbasakpitti: su to root doesn't reset it. But after I've su'd to root, "login -f root" does.17:53
keesI was pretty sure pam uses init's values for the defaults, not the parent. that was the whole reason /proc/$pid/limits was added, IIRC17:54
rbasak/etc/pam.d/login uses pam_limits.so. /etc/pam.d/su does not.17:54
rbasakWhat does lightdm use? /etc/pam.d/login as well?17:55
pittiyes, should all be pam17:55
pittiwe just checked getty17:55
rbasakSo I think pam_limits.so reset me back to 65536.17:55
pittigetty itself has 1024 as it sohld17:55
pittionce you login, the "login" process gets 64K17:55
rbasakSo I think the fix should be to cap it to FD_SETSIZE in pam_limits.so when reading limits from pid 1.17:55
infinityThat would work too, sure.17:56
pittirbasak: WFM; this is easier to change in an SRU than conffiles17:56
infinitySomeone whip up a patch and pass it by slangasek, please.17:56
infinityAnything but changing conffiles to work around it.17:56
rbasakThe pam package is version 1, uses dh --with-quilt, sets export QUILT_PATCH_DIR = debian/patches-applied in debian/rules and if I try to use quilt patches apply with fuzz. WTF?18:17
rbasakWell, one patch applies with fuzz.18:17
mdeslaurrbasak: yeah, fuzz only fails with src format 3.018:19
mdeslaurit used to be ok, unfortunately18:19
rbasakOh, OK. Thanks.18:21
Unit193Howdy.  Two things, 1: Is https://bugs.launchpad.net/bugs/1404783 going to be fixed for trusty?  Would be very useful.  2. Pretty sure no name for 15.10 yet, so no point in poking. :P18:22
ubottuLaunchpad bug 1404783 in compiz (Ubuntu) "warnings from apt: W: Unknown Multi-Arch type 'no' for package 'compiz-core'" [Undecided,Confirmed]18:22
rbasakhallyn_, pitti, infinity: previously the hard limit was 4096, and only the soft limit was FD_SETSIZE at 1024. If I cap just the soft limit now, the hard limit will have increased to 65536. I presume this is OK?19:05
rbasakkees: ^^19:05
hallyn_rbasak: i think that's ok,19:06
hallyn_that way lxd can bump its soft limit higher if it wants to.19:06
hallyn_(which it probably will)19:06
hallyn_while unsuspecting sw is still protected19:07
rbasakYeah that was my logic. I presume that was the previous logic in having a hard limit of 4096 before.19:08
rbasakslangasek: could you review http://paste.ubuntu.com/10863087/ please? I'm also not sure how to go about upstreaming this as pam_limits seems to be heavily patched already.19:54
rbasakinfinity, pitti, hallyn_: ^^19:54
rbasakinfinity: do you want an upload or a 0-day SRU?19:55
slangasekthose are the same thing ;)19:56
slangasekrbasak: it'll be late afternoon before I can review it fwiw19:56
rbasakOK, thanks.19:56
=== salem_ is now known as _salem
boaxhello22:21
boaxi found a critical bug in 15.04!22:21
boaxit makes the complete system unusable for many cases!!22:22
boaxcan a dev here help me to get able to debug that? The bug was there in 15.04 beta2 and is still there in 15.04 daily build from 21.04.2015!22:23
boaxthe whole X-Server is crashing22:24
boaxin Xorg i get the message "Cought signal 11" and the server goes down!22:25
tarpmanboax: https://wiki.ubuntu.com/X/Reporting22:25
boaxtarpman: yes, i have already reported a bug the one or other time. But i cant find out what could be the problem that causes this bug22:26
boaxtarpman: are you a dev?22:26
tarpmanboax: reporting a bug is still the best place to start; apport (ubuntu-bug) will include information that could contain clues, and the bug report is a better place to discuss it22:27
tarpmanboax: no, just a user22:27
boaxthere are just two days till release. thats critical. i dont think that the normal way would help fix that till release22:27
boaxhttp://pastebin.com/9K0W1NwU22:42
boaxan xorg dev say: <alanc> looks like it crashed in call from libglamoregl.so to libfb.so22:43
tarpmanboax: bug 1280527 and bug 1443456 look similar22:48
ubottubug 1280527 in xserver-xorg-video-ati (Ubuntu) "Xorg crashed with SIGABRT in fbBltOne()" [Medium,New] https://launchpad.net/bugs/128052722:48
ubottubug 1443456 in xorg-server (Ubuntu) "Xorg crashed with SIGABRT in fbBltOne()" [Medium,New] https://launchpad.net/bugs/144345622:48
boaxhere someone with the same error: https://bbs.archlinux.org/viewtopic.php?id=19566622:49
boaxwhat gnome version would be into ubuntu 15.04?23:15
Unit193!info gnome3 vivid23:15
ubottuPackage gnome3 does not exist in vivid23:16
Unit193!info gnome-shell vivid23:16
ubottugnome-shell (source: gnome-shell): graphical shell for the GNOME desktop. In component universe, is optional. Version 3.14.4-0ubuntu1 (vivid), package size 623 kB, installed size 6923 kB23:16
Unit193boax: 3.1423:16
boaxUnit193: people report that after updating gnome from 3.14 to recent version the reported bug is gone23:17
boaxhttps://bbs.archlinux.org/viewtopic.php?id=19481923:19
boaxcould you please bump the gnome version? the one inside 15.04 is causing such xorg crashes23:21
boaxtarpman: you was right with bug number 1443456. RAOF  have checked the crash log and told that i have exactly this error23:49

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!