Re: View / test *-ttf fonts

2024-05-28 Thread Rob Whitlock
Another way is to use

xfontsel -scaled

The -scaled option allows you to choose the sizes for scaled fonts, which 
usually list their sizes as 0.

> On May 25, 2024, at 3:05 PM, Todd Gruhn  wrote:
> 
> It did not impress me.
> 
> It shows me that I can see all the characters.
> 
> I can't see what a font looks like, are different sizes.
> 
> Now do I see / test  this?
> 
> On Sat, May 25, 2024 at 8:22 PM Thomas D. Dean  wrote:
>> 
>> On 5/25/24 07:22, Todd Gruhn wrote:
>>> Is there a way to view the *-ttf fonts?
>>> So I know what it will look like ...
>> 
>> xfd
>> 
>> Tom Dean
>> 



Re: RPi 4b Wifi Device

2024-04-20 Thread Rob Whitlock


> On Apr 20, 2024, at 1:01 AM, Thomas D. Dean  wrote:
> 
> On 4/19/24 18:35, Michael van Elst wrote:
>> tomd...@wavecable.com ("Thomas D. Dean") writes:
>>> How do I setup wpa_supplicant?
>> That depends on what you want to do.
>> Here are some examples:
>> https://wiki.netbsd.org/tutorials/how_to_use_wpa_supplicant/
> 
> I saw that.
> dhcp is working over the wired connection.
> 
> I thought I had everything configured for wifi. It just does not work.
> 
> I have a cable modem <-> wifi/wired router. I have several machines 
> connected. Linux and windoze, now. One RPi with NetBSD 10. Used to have some 
> FreeBSD machines, but, they have been replaced.
> 
> # etc/rc.d/wpa_supplicant reload
> Selected interface 'bwfm0'
> 21:58:35.931: OK
> 
> # wpa_cli status
> Selected interface 'bwfm0'
> 21:58:44.815: bssid=60:38:e0:db:a9:7a
> freq=0
> ssid=tddhome
> id=0
> mode=station
> pairwise_cipher=TKIP
> group_cipher=TKIP
> key_mgmt=WPA-PSK
> wpa_state=GROUP_HANDSHAKE
> ip_address=169.254.135.120
> address=e4:5f:01:da:eb:46
> 
> # ifconfig bwfm0
> bwfm0: flags=0x8843 mtu 1500
>   ssid "" nwkey 65536:"","","",""
>   powersave off
>   address: e4:5f:01:da:eb:46
>   media: IEEE802.11 autoselect (DS1 mode 11g)
>   status: no network
>   inet6 fe80::d7c0:41b9:46a5:a5ff%bwfm0/64 flags 0x8 scopeid 0x3
>   inet 169.254.135.120/16 broadcast 169.254.255.255 flags 0x4
> 
> 
> 
> I don't understand where the inet 169.254.135.120 comes from. The router pool 
> is 192.168.1.xxx.

That's an APIPA address from block 169.254.0.0/16. dhcpcd gives the interface 
an address from that block when it can't properly obtain one via DHCP, unless 
instructed not to.

> 
> Tom Dean



Re: Listing X11 grabs with XF86LogGrabInfo

2024-04-14 Thread Rob Whitlock


> On Mar 25, 2024, at 6:35 PM, RVP  wrote:
> 
> On Mon, 25 Mar 2024, Rob Whitlock wrote:
> 
>> Is there some trick to enabling this functionality
>> 
> 
> Yes. Try again after applying this patch (and restarting X).
> 
> ```
> --- usr/X11R7/lib/X11/XKeysymDB.orig  2024-03-18 22:47:19.0 +
> +++ usr/X11R7/lib/X11/XKeysymDB   2024-03-25 21:36:39.970222356 +
> @@ -370,6 +370,9 @@
> XF86_ClearGrab:1008FE21
> XF86_Next_VMode   :1008FE22
> XF86_Prev_VMode   :1008FE23
> +XF86LogWindowTree:1008FE24
> +XF86LogGrabInfo  :1008FE25
> +
> 
> usldead_acute :10A8
> usldead_grave :10A9
> ```
> 
> You could also just supply the key-sequence for this directly:
> 
> ```
> $ xdotool key Ctrl+Alt+F11
> ```

This did not work. It just printed "Failed to switch from vt05 to vt11: Invalid 
argument" in /var/log/Xorg.0.log.

>> or should I file a problem report?
>> 
> 
> Yes, with:
> 
> ```
> diff -urN a/xsrc/external/mit/libX11/dist/src/XKeysymDB 
> b/xsrc/external/mit/libX11/dist/src/XKeysymDB
> --- a/xsrc/external/mit/libX11/dist/src/XKeysymDB 2010-11-28 
> 07:34:33.0 +
> +++ b/xsrc/external/mit/libX11/dist/src/XKeysymDB 2024-03-25 
> 21:36:39.970222356 +
> @@ -370,6 +370,9 @@
> XF86_ClearGrab:1008FE21
> XF86_Next_VMode   :1008FE22
> XF86_Prev_VMode   :1008FE23
> +XF86LogWindowTree:1008FE24
> +XF86LogGrabInfo  :1008FE25
> +
> 
> usldead_acute :10A8
> usldead_grave :10A9
> ```

PR submitted: https://gnats.netbsd.org/58153

> Don't ask me why all the other keysyms just above have the extra
> `_'.  Going by the dates on that XKeysymDB file, it's rather old,
> and things may have changed since then. I also can't find that file
> in the tarballs in: https://www.x.org/releases/individual/lib/, but,
> I didn't search very hard--you should ask on the tech-x11 ML.
> 
> -RVP



Listing X11 grabs with XF86LogGrabInfo

2024-03-25 Thread Rob Whitlock
Hello,

The Internet suggests performing

xdotool key XF86LogGrabInfo

in order to list grabs that are currently running on the server, however it 
outputs

(symbol) No such key name 'XF86LogGrabInfo'. Ignoring it.
(symbol) No such key name 'XF86LogGrabInfo'. Ignoring it.

and does not print anything to the log file. I ran it through a debugger and it 
seems like it's failing because XStringToKeysym is returning NoSymbol when 
passed "XF86LogGrabInfo", as illustrated by the following code:

0 thinkpad$ cat m.c
#include 
#include 
#include 

int main() {
Display *dpy = XOpenDisplay(NULL);
if (dpy == NULL) {
fprintf(stderr, "XOpenDisplay failed.\n");
exit (1);
}

KeySym ksym = XStringToKeysym("XF86LogGrabInfo");
printf("Keysym: %lu\n", (unsigned long)ksym);

XCloseDisplay(dpy);
}
0 thinkpad$ cat Makefile   
a.out: m.c
cc -I/usr/X11R7/include -L/usr/X11R7/lib m.c -lX11 -Wl,-R/usr/X11R7/lib
0 thinkpad$ make
cc -I/usr/X11R7/include -L/usr/X11R7/lib m.c -lX11 -Wl,-R/usr/X11R7/lib
0 thinkpad$ ./a.out
Keysym: 0
0 thinkpad$

Considering that many other people used xdotool in this manner successfully, I 
suspect that either NetBSD has a bug here or there is some trick to make this 
work. As suggested in 
https://who-t.blogspot.com/2012/01/xkb-breaking-grabs-cve-2012-0064.html I ran

setxkbmap -option grab:break_actions

and also

setxkbmap -option grab:debug

and although these settings were reflected in the output of setxkbmap -query, 
they did not solve the problem.

Is there some trick to enabling this functionality or should I file a problem 
report?

Thanks!