apt-get source linux behaves weird

2015-08-14 Thread Daniel Reichelt
Hi folks,

when I do 'apt-get source linux' with jessie+sid enabled in sources.list,
there's no way to select jessie's ksrc version by target release. Neither
of these work:

- apt-get source linux
- apt-get -t jessie source linux
- apt-get source linux/jessie


Everytime the result is:
---8<---
$ apt-get source linux/jessie
Reading package lists... Done
Building dependency tree   
Reading state information... Done
Selected version '4.1.3-1' (jessie) for linux
NOTICE: 'linux' packaging is maintained in the 'Svn' version control system at:
svn://anonscm.debian.org/svn/kernel/dists/trunk/linux/
Need to get 85.2 MB of source archives.
Get:1 http://ftp.de.debian.org/debian/ sid/main linux 4.1.3-1 (dsc) [139 kB]
Get:2 http://ftp.de.debian.org/debian/ sid/main linux 4.1.3-1 (tar) [84.3 MB]
Get:3 http://ftp.de.debian.org/debian/ sid/main linux 4.1.3-1 (diff) [743 kB]
Fetched 85.2 MB in 1s (76.5 MB/s)
dpkg-source: info: extracting linux in linux-4.1.3
dpkg-source: info: unpacking linux_4.1.3.orig.tar.xz
[...]
---8<---

Doing an 'apt-get source linux=3.16.7-ckt11-1+deb8u3' works as expected.


My sources.list at this point is

--8<-
deb http://ftp.de.debian.org/debian jessie main contrib non-free
deb-src http://ftp.de.debian.org/debian jessie main contrib non-free

deb http://security.debian.org jessie/updates main contrib non-free
deb-src http://security.debian.org jessie/updates main contrib non-free

deb http://ftp.de.debian.org/debian jessie-updates main contrib non-free
deb-src http://ftp.de.debian.org/debian jessie-updates main contrib non-free

deb http://ftp.de.debian.org/debian jessie-proposed-updates main contrib 
non-free
deb-src http://ftp.de.debian.org/debian jessie-proposed-updates main contrib 
non-free

deb http://ftp.de.debian.org/debian jessie-backports main contrib non-free
deb-src http://ftp.de.debian.org/debian jessie-backports main contrib non-free

deb http://ftp.de.debian.org/debian sid main contrib non-free
deb-src http://ftp.de.debian.org/debian sid main contrib non-free
--8<-


Am I missing something or is this a bug in apt?
Any hints are greatly appreciated.

Daniel


PS: Please CC me, I'm not subscribed to the list



Deployment of buildd machines [was: Re: usrmerge -- plan B?]

2018-11-28 Thread Daniel Reichelt
On 11/22/18 1:56 PM, Ian Jackson wrote:
> (Bear in mind of course that happily our build machines
> *can* be reverted because they are frequently re-imaged.[…])

Using code from a debian package? Some script being hand-knitted using
hot needles? Anyways, I'm interested in how this is done…"this" meaning
the imaging/deployment part. Not the setup/configuration of a buildd itself.

Thanks!

Daniel



signature.asc
Description: OpenPGP digital signature


Depends of libnss3

2018-12-18 Thread Daniel Reichelt
Hi,

why does libnss3/buster depend on libc6 >= 2.28 for i386 but for amd64,
>= 2.14 suffices?

I'm running stretch/amd64 with libnss3 pinned to buster, using stretch's
libc6. On that machine, live-build'ing an i386 stretch image no longer
works since the current libnss3 migrated to buster a few days ago. As a
consequence, stretch's libc6/i386 is too old to be able to accomodate
libnss3/buster.

Is there a technical rationale for this or is it maybe a problem with
the i386 buildd on which libnss3/i386 was built?

Thanks!
Daniel



signature.asc
Description: OpenPGP digital signature


Re: Please drop anacron from task-desktop

2019-03-08 Thread Daniel Reichelt
> Shouldn't that be the other way around?  Having .timer but not a cronjob is
> a nasty bug, having a cronjob but not .timer is fine (at least unless you
> have no cron implementation at all).

+1!



signature.asc
Description: OpenPGP digital signature


Re: Please drop anacron from task-desktop

2019-03-08 Thread Daniel Reichelt
> And surely we support other, strange and not so strange, choices,
> sometimes more and sometimes less, but yawn.

And yet Debian claims to support - pardon - offer init systems other
than systemd for usage.


Either: make a clean cut, kick out everything that has been obsoleted™
by pötterd, thereby putting off (an unqualified number of) users


Or: quit yawning and stick to offering different init systems - with all
the shenannigans that follow.


Sorry for flaming. Then again, yawning is not quite not-flaming as well.


Thx
Daniel



signature.asc
Description: OpenPGP digital signature


nvidia-smi:i386/stretch-bpo

2019-03-26 Thread Daniel Reichelt
Hi Axel,

I'm wondering why there's no nvidia-smi:i386=410.104-1~bpo9+1 but only
390.87-8~bpo9+1.

Has the binary package just not been built yet for i386/stretch-bpo or
is nvidia-smi no longer supported for i386 by upstream?

Thanks!
Daniel



signature.asc
Description: OpenPGP digital signature


Re: nvidia-smi:i386/stretch-bpo

2019-03-26 Thread Daniel Reichelt
Thanks for your detailed explanation!


> PS: today I uploaded src:nvidia-graphics-drivers with transitional
> packages nvidia-driver, xserver-xorg-video-nvidia added on i386,armhf
> that depend on the corresponding legacy driver packages.
> I could do that for nvidia-smi as well. Any other (non-lib) packages?

That would by *very* helpful - at least until some dependent requires a
new feature not provided by -legacy-390xx or the latter gets from the
archives for good. I'll let you know when I stumble over any other
dependencies breaking my current live-build/i386…



signature.asc
Description: OpenPGP digital signature


Fwd: nvidia-driver meta package missing from stretch bpo

2019-04-27 Thread Daniel Reichelt
I haven't received a reply so far, so forwarding to -devel.

Thanks
Daniel



 Forwarded Message 
Subject: nvidia-driver meta package missing from stretch bpo
Date: Sat, 13 Apr 2019 20:32:20 +
From: Daniel Reichelt 
To: Andreas Beckmann , Debian NVIDIA Maintainers


Hi *,

a couple of days ago I did an apt upgrade and
nvidia-driver:amd64=410.104-1~bpo9+1 got installed, everything fine.
Just now I did an apt-get upgrade and it wanted to install
nvidia-driver/buster.

It seems like nvidia-driver is missing again from strech-bpo: [1]

Is this a bug or a problem with the archive? If the removal was
intentional, I'm curious as to why…


Thanks!
Daniel


[1]
https://packages.debian.org/search?suite=stretch-backports&searchon=names&keywords=nvidia-driver





signature.asc
Description: OpenPGP digital signature


Expired InRelease files

2019-07-15 Thread Daniel Reichelt
Hi,

not sure against which package to file a bug so I'm posting here.

Since today on apt update I get:


E: Release file for
http://ftp.de.debian.org/debian-debug/dists/bullseye-debug/InRelease is
expired (invalid since 4h 32min 12s). Updates for this repository will
not be applied.
E: Release file for
http://ftp.de.debian.org/debian-debug/dists/sid-debug/InRelease is
expired (invalid since 4h 32min 13s). Updates for this repository will
not be applied.



Cheers
Daniel



signature.asc
Description: OpenPGP digital signature


packages.d.o and listed suites

2021-05-09 Thread Daniel Reichelt
Hi *,

since yesterday (roughly, probably earlier) some of my live-build images
fail due to a new and faulty version of shim-signed.

After a quick look on packages.d.o, I was pretty confused: nothing new
listeded there for stable. Only 'apt-cache policy shim-signed' revealed
to me that a new version was being dropped by buster-proposed-updates.

Why is this suite not listed on packages.d.o?


Thanks!
Daniel



signature.asc
Description: OpenPGP digital signature


Re: kernel nvidia dkms rebuild after upgrade?

2018-01-07 Thread Daniel Reichelt
On 01/07/2018 07:47 PM, Boyan Penkov wrote:
> and a backport (4.14.0-bpo2) -- in light of meltdown --

To avoid a false sense of security: according to [1], [2], [3], the
current stretch-bpo kernel (linux-image-4.14.0-0.bpo.2-$arch) does *NOT*
yet include any mitigations against meltdown.

Daniel



[1] https://security-tracker.debian.org/tracker/CVE-2017-5753
[2] https://security-tracker.debian.org/tracker/CVE-2017-5754
[3] https://security-tracker.debian.org/tracker/CVE-2017-5715



signature.asc
Description: OpenPGP digital signature


Re: Maintaining a custom out-of-tree patched Debian kernel for specific hardware

2018-01-22 Thread Daniel Reichelt
Hi,

what about ripping out the affected kernel modules and provide the
patched sources in a separate package and have them built at install
time via DKMS?

In order to not interfere with the modules provided by the linux-image-*
packages, you could

- rename the kernel modules provided by your module package
- add the original module names to a blacklist in /etc/modprobe.d
- add your modules to /etc/modules-load.d/something
- and finally add the blacklist and load list to your package as well.

(An alternative to changing module names might be to use
update-alternatives or dpkg-divert and just provide/integrate the
renamed .ko files)

The initial setup of the packaging/build script will require a bit of
fiddling around but in the long run you'll be able to provide your users
with updates much faster and without havingt to go through the
time-consuming kernel build process. Moreover, the required storage and
bandwith for the infrastructure holding your repository will be tiny
compared to those for holding a full-blown kernel package.


Cheers

Daniel


On 01/22/2018 03:08 PM, Kumar Appaiah wrote:
> Dear Debian Developers,
> 
> I am part of a team working on getting Debian on low cost laptops (see
> http://www.rdp.in for details) so that they can be sold with Debian
> preinstalled. While vanilla Debian largely works, unfortunately,
> making Bluetooth and sound work require kernel rebuilding. The patches
> and config changes are not likely to be upstreamed any time soon, so
> we would have to ship the laptop with a patched (non-Debian
> kernel). Our team is, thus, taking up the responsibility of ensuring
> that up-to-date kernel (with security fixes) are made available to the
> users of our laptop. The patches and configs are adapted from here:
> https://github.com/sundarnagarajan/kernel_build
> 
> The unfortunate situation is that I am forced to issue this patched
> kernel. Since I'd like to be a good citizen of the ecosystem, I'd like
> to outline the solution I have in mind. I'd like your opinion and
> suggestion on this. All code being developed for this purpose will be
> released under a DFSG compliant license, and all packages I refer to
> that aren't in Debian will lie in our custom (outside of Debian)
> repository. If there are any things I can do to make things better,
> please do let me know.
> 
> 1. The laptop will ship with stretch preinstalled, but with a custom
> kernel built using the linux-source-x.xx.xx package with a custom
> version number, such as linux-image-4.14.13-iitb-amd64.
> 
> 2. The installation will contain a package called
> linux-image-iitb-amd64 that conflicts with linux-image-amd64, and this
> package will depend on the latest patched kernel built in the previous
> step.
> 
> 3. The sources.list on the installation will have an entry pointing to
> my custom repository in addition to the regular http://deb.debian.org,
> and will be pinned so that the kernel and kernel related packages are
> obtained from my custom repository. Needless to say, the custom
> repository's public key will also be pre-shipped with the laptop.
> 
> 4. Users will be made aware of the fact that this is Debian with a
> custom kernel without ambiguity.
> 
> Now, whenever there is a kernel update in Debian, our team will fetch
> the source of the updated kernel, patch, rebuild and make it available
> in our repository.
> 
> Please let me know if the proposed solution is good, else I am open to
> suggestions.
> 
> Thanks.
> 
> Kumar
> 




signature.asc
Description: OpenPGP digital signature


Re: Maintaining a custom out-of-tree patched Debian kernel for specific hardware

2018-01-23 Thread Daniel Reichelt
On 01/23/2018 10:56 AM, Philipp Kern wrote:
> On 01/23/2018 01:34 AM, Daniel Reichelt wrote:
>> In order to not interfere with the modules provided by the linux-image-*
>> packages, [...]
>> (An alternative to changing module names might be to use
>> update-alternatives or dpkg-divert and just provide/integrate the
>> renamed .ko files)
> FWIW, this technically isn't required. You can simply overwrite existing
> modules and dkms will handle that fine. It will shadow the stock ones
> when putting the new versions into updates/dkms.
> 
> Kind regards
> Philipp Kern

Thanks for pointing that out!




signature.asc
Description: OpenPGP digital signature


Re: OpenSSL disables TLS 1.0 and 1.1

2017-08-12 Thread Daniel Reichelt
On 08/12/2017 02:16 PM, Tollef Fog Heen wrote:
> While I think we might want to ship buster with TLS 1.0 available, I
> think running with it disabled for parts of the development cycle is
> very useful, since it exposes bugs we have in packages that will use
> that version out of the box (isync being referred to elsethread).
> Finding and fixing those bugs is good.
> 

This got me thinking... how about a split of the generated binary
packages to generate a (default) set with only TLS 1.2 available and a
fallback set with the current configuration?


One would have to work out a convention for whether

1) the fallback set would have both Provides and Conflicts set or

2)  both sets should cooperate with each other and how
2.1) via alternatives
2.2) a more fine-grained approach to select an appropriately configured
library on a per-application basis (e.g. LD_PRELOAD?)


Cheers
Daniel



signature.asc
Description: OpenPGP digital signature


Switching to sysvinit-core fails miserably in buster/sid

2017-10-24 Thread Daniel Reichelt
Hi *,

for development purposes I frequently create xen-vms via
xen-create-image (jessie, stretch, buster, sid - each in 32 and 64bit)
on a stretch Dom0. In a custom role script for xen-tools, I install
sysvinit-core. (For non-users of xen-tools: this happens after
debootstrap has completed.) Until a few weeks ago, this used to be
enough and everything worked just fine.

Now, after sysvinit-core is installed, init scripts don't get enabled
(i.e. S* symlinks are missing in /etc/rc?.d), which leaves a big
mess of things as not even networking or ssh are enabled.

It seems to me, this happens to init scripts of packages which were
installed prior to sysvinit-core. I have yet to work out the details of
this time-dependency, i.e.


- whether it's sufficient that sysvinit-core gets processed prior to a
init-script-carrying package

- or if the entire run of dpkg installing sysvinit-core has to finish,
and init scripts get processed correctly only if they're installed
during a subsequent invocation of dpkg.


As a workaround, after sysvinit-core is installed from the role script,
I therein run

cd /etc/init.d
for script in *
do
update-rc.d "$script" enable
done


as well, which I suspect is quite crude and shouldn't be necessary in
the first place. I don't have the first clue which package I should file
a bug report against. Any hints appreciated!


Thanks

Daniel









signature.asc
Description: OpenPGP digital signature


Re: Switching to sysvinit-core fails miserably in buster/sid

2017-10-25 Thread Daniel Reichelt
Thanks a lot, Adam, for your detailed answer!

With your information I could hunt this down and just filed #879771.


Cheers
Daniel



signature.asc
Description: OpenPGP digital signature


Re: Switching to sysvinit-core fails miserably in buster/sid

2017-10-26 Thread Daniel Reichelt
On 10/25/2017 08:03 PM, Felipe Sateler wrote:
> Mea Culpa. This was a bug in the "defaults-disabled" implementation. I 
> have just uploaded a fixed version.
> 
> Thanks for reporting.

Don't sweat it, big thanks for your quick response from me, too.



signature.asc
Description: OpenPGP digital signature