/srv/irclogs.ubuntu.com/2016/10/20/#ubuntu-devel.txt

pittiGood morning06:01
=== _salem is now known as salem_
=== King_InuYasha is now known as Son_Goku
=== sunweaver is now known as IonicBSc
=== IonicBSc is now known as sunweaver
=== salem_ is now known as _salem
Bluefoxicyawesome11:44
Bluefoxicyvendor incompatibilities and fragmentation11:44
* Bluefoxicy manually edits /etc/libvirt/qemu/*.xml because 16.10 breaks thanks to a machine type of "pc-i440fx-vivid" instead of just "pc"11:45
sarnoldBluefoxicy: please talk with cpaelzer if something feels wrong; he's put a lot of effort into making libvirt nice, including some machine type changes11:49
sarnoldBluefoxicy: oh, I'm sorry, it's Christian Ehrhardt11:51
sarnoldBluefoxicy: see e.g. https://lists.ubuntu.com/archives/ubuntu-server/2016-September/007411.html11:52
Bluefoxicysarnold: nice11:59
Bluefoxicysarnold:  the problem with all that is eventually they apparently drop support for machine types, so a machine created 5 releases ago suddenly stops working unless you tinker with it.  There's nothing that says, "Oh, it's like 3 releases back; should we change it to -xenial?"12:03
Bluefoxicythen you get to -yak and it's dropped -vivid and it goes "OMG WHAT IS THIS?!"12:03
BluefoxicyI'll have to file a bug or raise this on the devel-discuss list for further comment12:04
rbasakBluefoxicy: FYI cpaelzer is out today and tomorrow so I expect he may not reply until Monday.12:18
rbasakBluefoxicy: but please do raise your concerns on the thread. Feedback appreciated.12:19
Bluefoxicyrbasak:  I might need to use gmane or something to respond to that thread on ubuntu-server since i'm not subscribed12:20
Bluefoxicy"We're going through a complete rebuild, so some things are very broken. Please see our blog at http://home.gmane.org/ for news."  XD12:21
coreycbrbasak, hello, would you by any chance be able to accept nova 2:13.1.1-0ubuntu1.1 into xenial-updates?  bug 160893412:21
ubottubug 1608934 in nova (Ubuntu Xenial) "ephemeral/swap disk creation fails for local storage with image type raw/lvm" [High,Fix committed] https://launchpad.net/bugs/160893412:21
Bluefoxicyanyway, I have to go to what is allegedly "work" now12:21
Bluefoxicyso I'll do that later, after I finish reading web comics for 8 hours.12:21
sarnoldBluefoxicy: actually it's probably sad news about gmane :( https://lars.ingebrigtsen.no/2016/07/28/the-end-of-gmane/12:23
rbasakBluefoxicy: I moderate the list fairly regularly so that shouldn't be a problem - I can let it through. I can also add you to the whitelist when I do that.12:39
rbasakBluefoxicy: in general, if you don't want to subscribe to a mailman list but post to it, you can subscribe and immediately disable deliveries. Then you don't hit moderation even if it's subscriber-only. No need for ubuntu-server though.12:40
rbasakcoreycb: I don't have the powers yet. Sorry!12:40
coreycbrbasak, np :)12:41
rbasakgmane> :-(12:41
coreycbpitti, hello, would you by any chance be able to accept nova 2:13.1.1-0ubuntu1.1 into xenial-updates?  bug 160893412:41
ubottubug 1608934 in nova (Ubuntu Xenial) "ephemeral/swap disk creation fails for local storage with image type raw/lvm" [High,Fix committed] https://launchpad.net/bugs/160893412:41
pitticoreycb: not right now; can do another SRU shift tonight, but if it's urgent please ask around for others12:42
coreycbpitti, it's not urgent, later would be fine12:42
xnoxLaney, http://baturin.org/docs/iproute2/#Delete a link13:04
smosernacc, fixing13:26
=== _salem is now known as salem_
=== salem_ is now known as _salem
=== _salem is now known as salem_
TheMusoAnybody have any idea why sbuild is slow for me? I'm using directory based chroots with overlay fs and have both tmpfs and disk based overlay chroots set up. Sbuild takes ages to start downloading deps and building... This on yakkety.13:38
sarnold'ages to start' sounds vaguely like dns; there's six second delays if there's failures talking to dns servers in /etc/resolv.conf13:39
smoserTheMuso, i've seen similar behavior13:40
TheMusoNope, not that. I have the same problem at home on another box. Sbuild used to be rather quick in processing build deps required and downloading/buidling.13:40
smosernot debugged. i suspected kernel upgrade. :-(13:40
smoserit seems really slow on yakkety.13:40
TheMusosmoser: Hrm possible... I think I saw it ona 4.4 kernel, but don't have that kernel here to test with. Something to test when xenial has 4.8 I suspect.13:40
smoseralthough i can't rule out sarnold's suggestion.13:40
pittiTheMuso: archive.u.c. seems quite loaded these days, I also get long hangs tryign to download Pacakges.gz or debs (after DNS resolution)13:41
TheMusopitti: This is before even starting to download deps, and when at home, I use a mirror in Australia.13:41
smoseri dont think its archive related.13:41
smoseryeah.13:41
pittiwell, I wrote it off as post-release slowness; maybe it indeed is something else13:41
smosersarnold's suggestion seems plausible to me13:41
smoserwith addition / usage of systemd-resolvd13:42
TheMusoWell, I am here at the sprint using archive.conference... and its still slow.13:42
pittithe other day I had three dozen dnsmasq instances spawned by NM which made DNS slow -- can you check?13:42
TheMusoi.e I changed my chroots to use archive.conference directly.13:42
sarnold12 packets transmitted, 8 received, 33% packet loss, time 11041ms13:42
sarnoldow13:42
TheMusoStill one instance.13:42
* sarnold hugs mosh13:42
TheMusoi.e only one instance of dnsmasq.13:43
TheMusoI don't *think* its network, unless sbuild does a lot of network stuff at the beginning while its working out deps to download.13:44
TheMusoAnd I think its not even schroot created, because I can update my chroots just as quickly as I have been able to in the past.13:45
TheMusorelated*13:45
TheMusoAnyway, I *may* have a 4.4 kernel on my yakkety install at home, so will check when I get back and test if so.13:45
=== salem_ is now known as _salem
=== _salem is now known as salem_
pittiTheMuso: oh right -- when I start sbuild, my load goes up to 50; might be another fallout of bug 162643614:27
ubottubug 1626436 in linux (Ubuntu) "[4.8 regression] boot has become very slow" [Medium,Triaged] https://launchpad.net/bugs/162643614:27
=== lucas_ is now known as lucas
smoserpitti, around ?15:48
smoser https://launchpad.net/ubuntu/yakkety/+queue?queue_state=1&queue_text=ifupdown15:48
smoserwhat shal i do about that ? i can just upload it to zesty..15:49
pittismoser: yeah, sounds better now; we have a new gcc, binutils etc, and zesty is fully open15:50
pittiso we shouldn't do binary copies any more at this point (just for the 0-day ones)15:50
smoserpitti, then go ahead and NACKK that15:53
pittismoser: why that? the fix is good?15:54
smoserbecuse i would update the ubuntu3 to zesty15:55
smoserso the one in yakket-proposed need to have version adjusted15:55
smoserno ?15:55
pittismoser: or just upload to zesty as ubuntu4?15:56
pittismoser: I mean, I'm fine with rejecting if you prefer "nicer" version numbers, but I don't think it's a requirement15:57
* pitti needs to go AFK for a bit15:57
smoserpitti, thats fine too.16:02
smoseri'll upload as ubuntu4 "no change rebuild" ?16:02
pittismoser: or "* upload to zesty" (and use -v to include the previous record)16:10
smoserpitti, i dont understnd that.  i need the new version, right?16:11
naccrbasak: do we want upload/ tags to be annotated to the developer or the uploader?16:18
sinzuihallyn: Do you have any sight into this lxc1 error on s390x? https://pastebin.canonical.com/168526/16:22
rbasaknacc: the person running the importer, I think.16:33
rbasakSince it's both a confirmation of the version but also how it was done.16:33
sinzuistgraber: ^ mayeb you have insight into https://pastebin.canonical.com/168526/16:33
rbasakWhereas a commit tries to be exactly what the person uploaded.16:33
stgrabersinzui: you shouldn't use pastebin.canonical.com for public pastes16:35
naccrbasak: ack, the upload tag itself is created outside the importer, though16:35
naccrbasak: import tags will be annotated to the user running the importer, to be clear16:35
naccrbasak: but upload tags are part of the review process now, in theory16:35
sinzuistgraber: sorry, the paste has circulated. I can redo in ubuntu. nothing secret in it16:35
stgrabersinzui: if you want hallyn to be able to see it, you'd have to since he's not at Canonical anymore :)16:36
stgrabersinzui: anyway, that error usually comes from lack of seccomp support in the kernel16:36
sinzuistgraber: well that aligns with the fact we got a new kernel16:36
sinzuistgraber: do you recommend I look for a downgrade?16:37
stgrabersinzui: I'm looking at something real quick, it could be that this is caused by LXC 2.0.5 now supporting seccomp on s390x16:38
stgraberjust confirming that it's indeed something that was "fixed" in 2.0.5 (lack of seccomp support on s390x) which could cause this regression16:38
sinzuistgraber: 2.0.5-0ubuntu1~ubuntu16.04.1 was installed recently16:38
stgrabersinzui: right, confirmed that s390x seccomp support was added to LXC 2.0.5, previous one was skipping seccomp entirely which would explain why it was working16:39
stgrabersinzui: checking when s390x seccomp support was added to the kernel, to see if it's just a missing config in our kernel that'd fix that cleanly or if we'd need it backported to 4.4 which would be a bit more annoying16:40
stgraberhmm, that was the 3.6 kernel supposedly, so a bit confused as to why we wouldn't have it in our 4.416:41
stgrabersinzui: config-4.4.0-45-generic is what you're running right?16:42
stgraberhmm, so I see it enabled in that kernel, not sure what's going on then16:43
sinzuistgraber uname-a says 4.4.0-45-generic16:43
stgraberok, let me reboot my s390x system to run on that kernel and LXC and see what's going on16:43
stgrabersinzui: reproduced the issue here16:46
sinzuiI suppose I could cheer16:47
stgrabersinzui: you can workaround it by putting a file with lxc.seccomp= in /usr/share/lxc/config/common.conf.d/, that should get you going again16:48
sinzuistgraber: I will try16:48
stgrabersinzui: got one of my guys looking at it now16:49
sinzuithank you stgraber : have a working container. I will let the build scripts try to do the same16:51
stgraberobviously once we sort it out, it'll be good to remove that file as seccomp is a useful security feature16:52
stgraberbut since 2.0.4 didn't support it at all, it's no worse at least :)16:52
smoserSubject: [ubuntu/zesty-proposed] ifupdown 0.8.13ubuntu4 (Waiting for approval)16:54
smoseris that by design ?16:54
smoser"waiting for approval"16:55
stgrabersmoser: see topic, not open yet17:02
smoserfudge.17:03
smoserwell, i have two waitin for approval.17:04
stgraberslangasek: looks like LP is returning those OOPS right now, turned off cron17:29
stgraberslangasek: trying to get an LP URL from import-images17:29
stgraberslangasek: ok, so LP does return a 500, so someone will need to fix the importer to properly detect and deal with those, since apparently urlretrieve doesn't trigger an exception on those17:33
stgraberslangasek: the URL that's failing to import is https://git.launchpad.net/~device-release/turbo/+git/device_tarball/plain/device.tar.xz?h=candidate17:33
stgrabersil2100: FYI ^17:33
stgraberso current state is cron disabled and sil2100's e-mail address marked as the target for cron mail when re-enabled17:34
* stgraber gets back to being off17:35
naccslangasek: have a quick q for you re: a package in 16.04 that was technically unmaintained upstream at the time (mkstutil). There is LP: #1568714 for it, and a fix provided. However, that fix is not what upstream did (because upstream removed the feature completely (https://sourceforge.net/p/msktutil/code/ci/19066f9777a19b6fda8c62e7774b4bb2157eb32a/)). I feel like there are three options: 1) SRU the17:35
ubottuLaunchpad bug 1568714 in msktutil (Ubuntu Xenial) "stack smashing detected ***: msktutil terminated for version 0.5.1+git8158aa2b-1" [Undecided,New] https://launchpad.net/bugs/156871417:35
naccmaintained version from yakkety back to xenial; 2) just take the submitted patch, although it's not identical to upstream's changes, as it has been tested to fix the issue; 3) backport the upstream fix, but that changes the supported features for the package (even if the supported feature was arguably buggy per upstream).17:35
naccslangasek: not urgent to provide input, but any advice you could give on which would be preferred would be appreciate it17:35
stgrabersinzui: status update is that it's not a LXC or kernel bug, xenial's libseccomp was patched to add s390x support but apparently incorrectly so, so LXC detects support, uses it but then the library fails to set things up somehow. We're still digging and will most likely send a SRU for libseccomp in xenial17:39
koikecjwatson, hey, you are one of the grub2 maintainers right? In debian we need to create a monolithc version of grub in the arquives to be able to sign it with all its modules, is it ok if I change the packages like grub-efi-amd64-bin_2.02~beta3-1_amd64.deb to build a monolithic version of grub? Or maybe to create something like grub-efi-monolithic-amd64-bin_2.02~beta3-1_amd64.deb ?17:40
koikecjwatson, so I would like your opinion about the solution before I start working on it17:49
slangasekstgraber: AFAICS the HTTP code isn't even returned at all by urlretrieve(), I don't see it as part of the returned headers struct17:55
slangaseknacc: was this upstream feature usable at all, or was it completely broken by the above bug?17:56
naccslangasek: it's hard to say; the above bug is a stack smash that makes the tool itself unusable regarldess of the feature (ldaps + tls). It seems like the upstream feature (ldaps + tls) never worked, though.17:57
slangaseknacc: I don't object to an SRU that removes a broken and unusable feature in order to leave the package usable for other purposes.  I would object to an SRU removing a feature that might be broken for some people in some circumstances, but usable in others17:58
naccslangasek: ack, that makes sense, i'll do some more examination17:59
sinzuistgraber: Is there a bug I can track so that I know when to remove my hack?18:08
stgrabersinzui: we'll file one on LP once we're sure where the problem is18:18
stgraberslangasek: right, but my (clearly wrong) expectation was that it'd raise an exception as it does for the other error cases (timeouts and such)18:18
smoserwhy does this not work?18:43
smoser 18:43
smoser# hostnamectl status18:43
smoserin a container doesnt work.18:44
smoserhoray18:44
stgrabersmoser: looks like a systemd thing18:50
stgraberOct 20 18:49:36 yak systemd[6322]: systemd-hostnamed.service: Failed at step NETWORK spawning /lib/systemd/systemd-hostnamed: Permission denied18:50
stgraber[62189.667647] audit: type=1400 audit(1476989376.082:576): apparmor="DENIED" operation="file_lock" profile="lxd-yak_</var/lib/lxd>" pid=19491 comm="(ostnamed)" family="unix" sock_type="dgram" protocol=0 addr=none18:50
stgraberso maybe an apparmor bug actually because I can't think of why our profile would block this18:51
jgrimmstgraber, smoser: confirmed xenial container behaves that way.  trusty container worked tho18:54
stgraberjgrimm: would make sense since trusty wasn't using systemd18:55
jgrimmyep18:55
stgraberjgrimm: running hostnamed directly by hand works fine too18:55
smoserstgraber, running hostnamed ?18:56
stgrabersmoser: in a shell, run "/lib/systemd/systemd-hostnamed", in another, run hostnamectl :)18:56
slangasekxnox: yay, new jitsi is dep-wait ;)18:58
smoserwhat a pit18:59
smoserpita18:59
pittismoser: yes, but use -v...ubuntu2 to include the ubuntu3 revision to19:12
smoserpitti, i did. thanks19:13
* pitti goes for a round of SRU review19:27
pitticyphermox: so your initramfs-tools 0.125ubuntu6.1 in the unapproved queue refers to bug 1631474 which is already closed (fixed by the previous SRU)19:41
ubottubug 1631474 in initramfs-tools (Ubuntu Zesty) "No networking with initramfs-tools 0.122ubuntu8.3 and ip=dhcp boot option" [High,Fix committed] https://launchpad.net/bugs/163147419:41
pitticyphermox: typoed the bug #? if the reversion should use the same bug, can you please reopen and adjust the description?19:41
cjwatsonkoike: no, don't do that, I'll be switching on the Ubuntu patch set to implement signed GRUB builds as soon as Debian has the necessary signing implementation in place; you'd be wasting your time working on it since it's already implemented22:08
koikecjwatson, but in Ubuntu the grub2 package doesn't publish a monolithic version, does it? To make grub-signed build reproducible we need this available, so grub-signed can depend on it22:10
cjwatsonkoike: yes it does, debian/build-efi-images produces that as a custom upload22:11
cjwatsonkoike: I'm not going to add another binary package, it's already complicated enough!22:11
cjwatsonkoike: we shouldn't need another binary package for reproducibility, we just need grub-mkimage's output to be reproducible given the same inputs22:12
cjwatsonkoike: which if it's not the case today shouldn't be far off22:13
cjwatsonkoike: I'm totally happy to take patches to improve reproducibility BTW, I think that's an excellent goal, just want to make direction clear22:15
koikecjwatson, sure, thanks for your feedback, I am checking some other things that I am not entirely sure about, I'll also get some opinion at #debian-efi too22:17
cjwatsonkoike: the other thing I want to do is integrate Mathieu's Ubuntu patches for better MOK integration, which I think can be done in Debian as well now and would make it possible to require signed kernels22:18
cjwatsonbut ETIME22:18
koikecjwatson, I see, ETIME is a problem indeed. Could you send me a link to these patches (I am having some trouble finding them)22:24
cjwatsonkoike: I think they're in people/cyphermox/<somethingorother> in the Debian git repository, though not sure if they're up to date; the current Ubuntu source package can be found at https://launchpad.net/ubuntu/+source/grub222:26
cjwatsonI'm hoping I can nag cyphermox into submitting them in a form I can easily apply :)22:26
cjwatson(possibly simpler after rebasing on 2.02~beta3-1)22:26
cyphermoxthere is that22:27
cyphermoxyou mean the patches for the new shim filenames?22:27
cjwatsoncyphermox: I meant the whole mokutil workflow with the extra debconf questions and such22:27
cyphermoxah, ok22:27
cyphermoxthat's removed from grub, actually. here's hoping there isn't anything left22:28
cyphermoxall moved to shim-signed22:28
cjwatsonand obviously anything else that seems relevant, I'd like to get back in sync but of course with cherry-picked patches and such it's a fair bit of source to compare22:28
cyphermoxif beta3 is ready in the git branch I can get you the other patches ready22:29
cjwatsoncyphermox: it's in unstable, though indeed in git too22:29
cyphermoxok, I hadn't noticed, been busy with other things22:30
cyphermoxI'll want to get beta3 in zesty anyway though22:30
=== salem_ is now known as _salem
naccis it a known bug in `apt-get changelog that when a source package lives in main but has binaries published in universe (e.g., qemu), it tries to load a changelog from universe?22:43
=== _salem is now known as salem_
=== salem_ is now known as _salem
=== _salem is now known as salem_
=== salem_ is now known as _salem
naccI noticed just now that there is a 'new' -u option for rmadison to look at the debian new queue. Is the ubuntu new queue exposed similarly?23:32

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!