/srv/irclogs.ubuntu.com/2021/09/21/#ubuntu-devel.txt

=== genii is now known as genii-core
=== sem2peie- is now known as sem2peie
=== sem2peie- is now known as sem2peie
=== RikMills__ is now known as RikMills
xypronI am looking for a sponsor for vim: https://bugs.launchpad.net/ubuntu/+source/vim/+bug/194441910:31
ubottuLaunchpad bug 1944419 in vim (Ubuntu) "vim: impish missing in debchangelog.vim" [Undecided, New]10:31
rbasakxypron: that looks good, but Impish is in freeze now, and vim is seeded. So it needs to wait.10:32
xypronrbasak: thanks for reviewing. So it could be sponsored directly after release date?10:33
rbasakxypron: probably best to do it after beta is released, before final release.10:35
xypronrbasak: thanks10:35
rbasakxypron: https://lists.ubuntu.com/archives/ubuntu-devel-announce/2021-September/001297.html has the details if you haven't seen that10:35
=== cpaelzer_ is now known as cpaelzer
seb128rbasak, xypron, the release team recommendation has always been 'just upload, queue will be reviewed when suitable', I don't think we should restain from queuing changes during freezes10:54
rbasakseb128: the email says "Please hold off11:05
rbasakwith everything else until after we release on Thursday."11:05
rbasakWhich I take to mean "don't upload".11:05
rbasakOtherwise "please hold off" has no meaning for non-release-team uploaders.11:05
seb128rbasak, you are right, I've read the email now and I understand it like that11:05
seb128my memory failed me there or recommendations changed11:06
rbasakNo worries!11:06
jawn-smithbryceh, cjwatson: I've made some progress in determining the issues with the new openssh merge from Debian. It appears to be an actual regression with openssh built with glibc 2.34 running on kernels that don't have the close_range syscall.14:28
jawn-smithThis appears when trying to run sshd in a chroot. Strace shows an ENOSYS when calling close_from, and then libc's closefrom tries to open /proc/self/fd in the chroot, which doesn't exist14:30
jawn-smithWhat I'm still failing to understand is why we're only seeing the issue on armhf. I'll keep digging on that part, but wanted to give you updated14:31
jawn-smithkeep* you updated14:31
cjwatsonjawn-smith: Isn't it likely just the seccomp filter?14:42
cjwatsonIt's not uncommon for that to need to differ across architectures.14:42
jawn-smithcjwatson: I will look into that. The issue exists upstream as well, just FYI14:43
cjwatsonjawn-smith: Indeed14:43
cjwatsonjawn-smith: It probably just needs a patch sent upstream to add close_range to the seccomp filter with suitable rationale, which we can then cherry-pick14:44
jawn-smithcjwatson: Excellent I'll take a look at that. Thanks!14:44
brycehjawn-smith, thanks for the update14:45
cjwatson(FWIW I am working on a full upstream update, but need to first sort out the GSSAPI patch for which we share maintenance with Fedora)14:52
bdmurrayoSoMoN: Do you know how to test https://code.launchpad.net/~osomon/ubuntu-release-upgrader/+git/ubuntu-release-upgrader/+merge/408838 ?16:16
oSoMoNbdmurray, I did run the unit tests, and also ran a dist-upgrade in a hirsute VM per instructions in README.devel16:18
oSoMoNare there other types of tests that can be run?16:18
bdmurrayOh, I hadn't reloaded since comment #616:19
=== sem2peie- is now known as sem2peie
=== sem2peie- is now known as sem2peie
Eickmeyerjuliank: Sorry about the bad patch for packagekit. I have it fixed now, submitted upstream. I think it's safe to wait until after beta to upload.17:58
juliankEickmeyer: ack, ping me after the beta in case I forget to sponsor a new patch18:02
Eickmeyerjuliank: Thanks. :)18:07
ijohnson[m]what is the link to view oops ID's again? I can't seem to find it going to errors.ubuntu.com ? I was added to the group to oops for snaps a while ago but can't remember the way to view a particular oops given the ID20:08
cjwatsonijohnson[m]: oops.canonical.com and there's a text box20:08
ijohnson[m]ahhh that's the link thanks @cjwatson20:09
cjwatsonThough the snap API is mostly on Sentry nowadays, I thought?20:09
cjwatsonSSO and LP use oops20:09
ijohnson[m]oh hmm20:09
ijohnson[m]I am trying to debug a failure from snapd with the OOPS ID fc126488-17ef-11ec-bc20-fa163e98362920:10
ijohnson[m]I guess next question then is how do I access sentry :-)20:10
bdmurrayhttps://errors.ubuntu.com/oops/fc126488-17ef-11ec-bc20-fa163e98362920:11
ijohnson[m]ah perfect thanks @bdmurray20:11
cjwatsonAh OK, so that's snapd client rather than snap store API, I see20:11
ijohnson[m]yeah it came from snapd after failing to install a snap20:13
EickmeyerIt appears the latest gtk+3.0 upload broke Electron-based apps. bug 194446820:41
ubottuBug 1944468 in gtk+3.0 (Ubuntu) "Electron applications all crash upon launch" [High, New] https://launchpad.net/bugs/194446820:41
sarnolddoes downgrading the gtk+3.0 packages make it work again?20:58
mwhudsonjawn-smith, cjwatson: we only see it on armhf because that is the only environment we test old kernel + new userland in21:29
mwhudsonjawn-smith, cjwatson: there is nothing seccomp or architecture specific in all this aiui21:29
Eickmeyersarnold: I need to try that, but I'd have to find the package first.21:29
jawn-smithmwhudson: thanks for the input. I hadn't realized armhf was the only environment with old kernel + new userland21:30
jawn-smithback to the upstream bugs plan then21:30
mwhudsonjawn-smith: please (i mean they might point fingers at each other but well)21:30
cjwatsonmwhudson: That would explain why it only shows up on this architecture, but the ENOSYS still indicates that it's likely to do with OpenSSH's seccomp sandbox, surely21:32
cjwatsonOr do I have the wrong end of the stick somehow?21:32
mwhudsoncjwatson: close_range was only added in 5.8 or somethign?21:33
jawn-smithmwhudson: 5.921:33
bdmurrayEickmeyer: the ones here? https://launchpad.net/ubuntu/+source/gtk+3.0/3.24.29-1ubuntu1/+build/2159822121:33
mwhudsonjawn-smith: thanks for knowing the details :)21:33
cjwatsonmwhudson: Oh I see, now that I look at libc's closefrom.c it makes sense21:33
Eickmeyerbdmurray: Yeah, those. Actually, I get you to it, I'm there already21:34
Eickmeyer*beat21:34
Eickmeyer/s/get/beat21:34
cjwatsonSo the real difference is that now OpenSSH is using libc's closefrom when it previously used its own version?21:34
mwhudsoncjwatson: yeah, the "eh /proc/self/fd isn't there let's do nothing" is certainly a design choice of some kind21:34
cjwatsonIn that case telling configure that libc doesn't have closefrom would also be a viable workaround here, given the limited environment in sshd's network monitor21:35
mwhudsonyeah i think that's probably best21:35
cjwatsonConfigure with ac_cv_func_closefrom=false or so21:36
cjwatsonShould still file an upstream bug since maybe they'll want to just avoid glibc's closefrom or maybe do something else, but that would be an easy packaging fix21:36
cjwatsonOr indeed perhaps use glibc's closefrom everywhere except the sshd network monitor with its weird environment21:37
Eickmeyer*sigh* downgrading didn't work. Back to the drawing board.21:37
EickmeyerUnless I need to reboot to clear the gtk cache.21:38
cjwatson(Or wherever it is.  I'm assuming it must be in the monitor because otherwise you'd think /proc/self/fd would exist)21:38
jawn-smithcjwatson: to make sure I have this straight: I should file the upstream bugs and also make an update to our openssh package to configure differently21:38
cjwatsonWell, see if ac_cv_func_closefrom=false fixes it first, especially if you have some way to run tests on armhf without making an upload21:39
mwhudsoncjwatson: the test case is running sftp chrooted21:39
jawn-smithcjwatson: that's correct, running sshd -oChrootDirectory=/var/run and then attempting to sftp from that21:40
mwhudsonthis sort of thing https://www.thegeekstuff.com/2012/03/chroot-sftp-setup/21:40
cjwatsonBut if that does the job then I think an upstream bug would be worthwhile explaining that glibc's new closefrom implementation breaks openssh's regression tests, <big explanation with example output etc.>, here's what we did to workaround it but maybe you have a better idea, would be worthwhile21:40
jawn-smithalso, I have an unreasonable number of Pi's here so I can definitely recreate this locally without having to do an upload21:40
cjwatsonOK, that's not the monitor, different kind of restricted environment21:40
cjwatsonThe monitor is the thing that sshd's privilege separation runs so that it can do preauth parsing of network packets with significantly reduced scope for compromise in case of parsing bugs21:41
cjwatsonFrom what you've both said, I'd suggest building upstream master from git and running its regression tests on an x86 system with latest glibc and pre-5.9 kernel21:42
cjwatsonThat would make for a nice standalone bug report21:43
jawn-smithcjwatson: I can do that21:43
cjwatsonAnd nobody would have to spend time arguing whether if it's arm-specific weirdness21:43
cjwatsons/ if//21:43
Eickmeyersarnold, bdmurray: The downgrade didn't work, so I tried downgrading nvidia drivers from 470 to 460, no change in behavior.21:50
EickmeyerMeaning, it's not GTK, but maybe someone else can help me figure this out because I'm coming up on EOD.21:57
sarnoldEickmeyer: dang :(22:31

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!