Bug#952469: i3-wm: Moving windows in a specific way causes i3 to crash

2020-02-25 Thread наб
On Tue, Feb 25, 2020 at 08:17:55AM +0100, Michael Stapelberg wrote: > Thanks for your report. Please file this issue on GitHub. There are > Debian repositories you can use to get the latest version: > https://i3wm.org/docs/repositories.html Thank you for the link -- I didn't find it referenced in

Bug#956465: bash-completion: umount completion requires gawk

2020-04-11 Thread наб
are/gawk/manual/html_node/String-Functions.html [2]: https://invisible-island.net/mawk/manpage/mawk.html#h3-8_-Built-in-functions Yours, наб -- System Information: Debian Release: bullseye/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 5.

Bug#958924: partclone: Version splashes and usage use "unset_name" as executable name

2020-04-26 Thread наб
se instead, as well as one that fixes a typo that bugged me. If you prefer, there's also a git repository you can pull from at <https://github.com/nabijaczleweli/partclone.deb>. Best, наб -- System Information: Debian Release: 10.3 APT prefers stable-updates APT policy: (500, 'stable

Bug#959112: qemu-system-x86: Specifying -nic model=rocker Aborts during startup

2020-04-29 Thread наб
t (c) 2003-2019 Fabrice Bellard and the QEMU Project developers The same error happens on the sid kernel, with uname -a: Linux qest 5.5.0-2-amd64 #1 SMP Debian 5.5.17-1 (2020-04-15) x86_64 GNU/Linux Yours, наб -- System Information: Debian Release: 10.3 APT prefers stable-updates APT policy: (50

Bug#958256: Use system libjsonparser-dev

2020-05-11 Thread наб
Hi! I'm attaching a patch, based on the Salsa HEAD at 82d10d0, to do just that. The package builds with src/json.[ch] removed, too. Could probably be an uscan exclusion rule, but I didn't want to touch the legacy d/copyright. Best, наб File lists identical (after any substitutions) Control

Bug#960839: util-linux: Outdated references to kernel documentation

2020-05-17 Thread наб
reasons, but I'm licensing it as public domain and can certify (a), so, if my reading of the DCO is right, you could certify either (b) or (c), should you wish to bring the patch upstream; thank you for understanding. Best, наб -- System Information: Debian Release: 10.4 APT prefers stable

Bug#954444: neomutt: New upstream release (2020-05-01)

2020-05-05 Thread наб
at that same URL <https://github.com/nabijaczleweli/neomutt.deb> ‒ based on the latest Salsa commit. By happy coincidence, the packaging for 2020-05-01 was just about done when I happened upon this report, and so here we are; building it should be as straightforward as it gets. Best, наб ---

Bug#960839: util-linux: Outdated references to kernel documentation

2020-05-18 Thread наб
Thanks for the quick response! Patch landed in the stable/v2.35 branch[1], so this will be closed by 2.35.2. [1]: https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?h=stable/v2.35=a9ea0b33837f051ccb3c63ac8a5d850e41b9ce1e signature.asc Description: PGP signature

Bug#959996: src:systemd: d/rules disables resolved DNSSEC on "stable Debian", but checks for stretch

2020-05-07 Thread наб
ell grep -qE 'stretch|ubuntu' /etc/os-release && echo -Ddefault-dnssec=no) -- >8 -- I don't know if DNSSEC support matured and this isn't needed anymore anyway, but going by the comment this was probably overlooked at some point; but now I looked at it, and here we are. Best, н

Bug#961097: htop: segfaults after ^Z+fg on x32

2020-05-20 Thread наб
In further testing it appears to happen only on an actual VT and only with TERM=linux (none of dumb, {xterm,st}{,-256color} crash). I haven't been able to reproduce it over ssh, no matter the $TERM. signature.asc Description: PGP signature

Bug#961097: Reassigning to gpm with new findings

2020-05-23 Thread наб
a backtrace from amd64 or test on i386, but here are my findings so far. Defeatedly, наб signature.asc Description: PGP signature

Bug#753752: Bootloader hooks patch for dracut

2020-09-15 Thread наб
Hi! I'm attaching a patch that implements this, stolen from i-t: https://sources.debian.org/src/initramfs-tools/0.139/update-initramfs/?hl=L158#L158 Best, наб From 4b5bcda703b4655c7eea52a092a21fdd61da1204 Mon Sep 17 00:00:00 2001 From: наб Date: Tue, 15 Sep 2020 20:32:08 +0200 Subject

Bug#970213: systemd: kernel/install.d/85-initrd.install: Please don't duplicate initrd in ESP when an explicit one was passed

2020-09-13 Thread наб
On Sun, Sep 13, 2020 at 11:03:46AM +0200, Michael Biebl wrote: > So the issue is, that you both have an unversioned "initrd" and > versioned "initrd.img-5.8.0-1-amd64" initrd file and the unversioned one > is not used? Essentially, yes; the unversioned one is added by the debian hook even explicit

Bug#954444: Updated neomutt to 20200501 in salsa

2020-06-01 Thread наб
ich breaks on the symlink-to-nonexistent; that patch is likely able to be dropped in a near future, with gahr saying[3] that "ALL_FILES can probably be reworked a bit", (though I haven't had free cycles to do it myself). Best, наб [1]: https://github.com/nabijaczleweli/neomu

Bug#961097: Despite all odds, this turned out to be a problem in ncurses; it's good, I promise

2020-05-24 Thread наб
nt by overriding it with a nop makes it work just as well (or, well, better, since it doesn't crash; granted, the selection start is still stuck to the end of the Quit htop field when suspended, but that's something for a different time), and the two outcomes are dlopen()ning it again or being murdered anyway, but this is not my area. Updating severity to reflect the new reality as well ("htop fails on a port" => "ncurses+gpm segfaults all mouse programs"). Triumphantly, наб signature.asc Description: PGP signature

Bug#968256: src:zfs-linux: x32 support

2020-08-11 Thread наб
to post to it twice, so I'm opening this bug and attaching my patches, up/downdated for 0.8.4-2; they're plug-and-play and I've been running them like this since early May, but I'm not sure if there's anything more to be done on the packaging side. Best, наб [1]: https://github.com/openzfs/zfs/pull

Bug#879151: debian-ports support when setting up sources.list

2020-07-30 Thread наб
ive > +is_ports_architecture= > +if [ -r /usr/lib/choose-mirror/port_architecture ]; then > + is_ports_architecture=$(cat /usr/lib/choose-mirror/port_architecture) Is there any good reason for this to be a subshell instead of read(1)? > fi наб signature.asc Description: PGP signature

Bug#964248: base-installer: Pass "--extra-suites=unreleased" to debootstrap on ports arches

2020-07-31 Thread наб
chitecture function from > /usr/lib/base-installer/library.sh? It was, yes. > Mmm, possibly, are we sure that choose-mirror is always installed in > d-i? It seems that monolithic/netboot have it anyway, and cdrom installs > it already? наб, perhaps you can try and check that it wo

Bug#964248: base-installer: Pass "--extra-suites=unreleased" to debootstrap on ports arches

2020-07-04 Thread наб
tml> These patches apply cleanly on top of the Salsa HEADs as of today (e70510edbb6772e0eb98537c3a7175b977ce0423 for base-installer and 30f36f7e8617f52cbc7fc9942cfbf326d2b773c2 for apt-setup). Best, наб --- Begin Message --- This fixes, e.g., hurd installs from mini ISOs, which require libp11-kit

Bug#963252: opensmtpd: Default /etc/smtpd.conf suggests invalid "listen on all"

2020-06-21 Thread наб
memset(_opts, 0, sizeof listen_opts); listen_opts.family = AF_UNSPEC; listen_opts.flags |= F_EXT_DSN; } ON listener_type ; -- >8 -- And neither create_{sock,if}_listener() parse "all" specially. Mayha

Bug#962920: mhonarc: Links that include a message ID are mangled

2020-06-15 Thread наб
>8 -- As you can see, the search link was insered directly into the href of the that contained the message ID. This results in the first link (loupe on lists.d.o) being broken entirely, and the other one linking directly to the message, neither of which is what I indended. Best, наб [1]: https://list

Bug#964248: base-installer: Pass "--extra-suites=unreleased" to debootstrap on ports arches

2020-07-16 Thread наб
eed and libnettle7 3.5.1+really3.5.1-2+b1, though the only version I saw in the pool was 3.6-2, but that's, presumably, unrelated. наб signature.asc Description: PGP signature

Bug#968256: closed by Debian FTP Masters (reply to Mo Zhou ) (Bug#968256: fixed in zfs-linux 0.8.5-2)

2020-11-10 Thread наб
Hi! The inclusion of the patch definitely simplifies building from source, but, AFAICT neither packages.d.o nor buildd.d.o mention the binary package for x32; I'm not familiar with this part of Debian infrastructure, but mayhap a config needs to be tweaked to trigger the builds? Best, наб

Bug#971068: linux-image-5.8.0-2-686-pae: Assertion failure in i915 intel_display.c#assert_plane() after resume from hibernation

2020-10-31 Thread наб
retitle 971068 linux-image-5.9.0-1-686-pae: Assertion failure in i915 intel_display.c#assert_plane() after resume from hibernation found 971068 5.9.1-1 thanks Turns out the delay was because my system was horriby starved for I/O, switching to an SSD revealed that the display is ready immediately

Bug#980464: zfs-dracut: dracut+ZFS-on-root systems rendered unbootable

2021-01-19 Thread наб
generating there; this is not feasible on a sealed system (mine) or one that boots off multiple striped NVMe drives (his). PLEASE apply this patch (clean over b612af3ca30a04c5afbef1fcadeec76a516794ef) and upload ASAP. I have verified it on my machine. Best, наб -- System Information: Debian Rel

Bug#981012: libfuse3-dev: Users broken on i386

2021-01-25 Thread наб
On Mon, Jan 25, 2021 at 06:20:30PM +0100, László Böszörményi (GCS) wrote: > Anyway, the solution to ask for 64 bit off_t with: -D_FILE_OFFSET_BITS=64 Agh, dammit. I only tried __USE_FILE_OFFSET64, after seeing it in a header somewhere. -D_FILE_OFFSET_BITS=64 does work, cheers! наб signature.

Bug#981012: libfuse3-dev: Users broken on i386

2021-01-25 Thread наб
~~ (sid-i386 fest)root@tarta:/# And likewise with __USE_FILE_OFFSET64 (which supposedly guards this, or so I gathered from skimming libc headers). This renders the package unusable. Best, наб -- System Information: Debian Release: 10.7 APT prefers stable-updates APT policy: (500,

Bug#979997: dpkg: Please fall back to rename if making back-up link fails

2021-01-12 Thread наб
on b0c80a72a9a32e17953483e1fb6b66dcfd8d0096, that falls back to rename(2). Best, наб -- Package-specific info: System tainted due to merged-usr-via-symlinks. -- System Information: Debian Release: 10.7 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable

Bug#901636: mandoc: "mandoc -mdoc -T man" causes memory dump

2021-06-07 Thread наб
if (buf->buf[pos] != '\0') 3320 mandoc_msg(MANDOCERR_ARG_SKIP, ln, pos, 3321 ".EQ %s", buf->buf + pos); 3322 3323 return ROFF_IGN; 3324 } -- >8 -- I'm not sure what other token is better suited here (or, indeed, if at all), but I think s

Bug#901636: mandoc: "mandoc -mdoc -T man" causes memory dump

2021-07-03 Thread наб
milarly, tok = TOKEN_NONE, type = ROFFT_TBL, Would it make sense to pass tbl(7) and eqn(7) through, like it's done in man input mode? Best, наб .TS l . a .TE .\" SPDX-License-Identifier: 0BSD .\" .Dd .Dt SHA1SUM 1 .Os . .Sh NAME .Nm sha*sum , b2sum , md5sum .Nd generate or verify c

Bug#986185: closed by Debian FTP Masters (reply to Mo Zhou ) (Bug#986185: fixed in zfs-linux 2.0.3-3)

2021-04-02 Thread наб
trimming before, you will need to run zfs set org.debian:periodic-trim=enable sata-pool to restore previous behaviour. -- >8 -- would be great, feel free to just steal this. Best, наб diff --git a/debian/tree/zfsutils-linux/usr/lib/zfs-linux/scrub b/debian/tree/zfsutils-linux/usr/lib/zfs-

Bug#986185: closed by Debian FTP Masters (reply to Mo Zhou ) (Bug#986185: fixed in zfs-linux 2.0.3-3)

2021-04-02 Thread наб
ure or, at the very least, significant performance degradation. I mean, I'm a maniac and I do read all changelogs, but the /vast/ majority of people don't, and this feels like the prime use of NEWS. But I agree, having this in README.Debian would be good as well. Best, наб signature.asc Description:

Bug#986299: closed by Debian FTP Masters (reply to Mo Zhou ) (Bug#986299: fixed in zfs-linux 2.0.3-5)

2021-04-04 Thread наб
should work (but please verify this before uploading!). Best, наб signature.asc Description: PGP signature

Bug#985349: /lib/zfs-linux/scrub: misleading comment implying that scrubs on HDD-only pools must fail

2021-03-16 Thread наб
Package: zfsutils-linux Version: 2.0.3-1~bpo10+1 Severity: minor Tags: patch Dear Maintainer, Please consider the patch below, based on current Salsa HEAD (8cfc39d59fff85bdbefcee22c728aab83adb19eb). Best, наб -- System Information: Debian Release: 10.8 APT prefers stable-updates APT policy

Bug#984472: e2fsprogs: resize2fs on inconsistent filesystem (in a way that e2fsck doesn't detect) completely corrupts MMP data (in a way e2fsck can't recover from)

2021-03-09 Thread наб
n't mounted at any point when e2fsck/resize2fs were running, hence why I obliged to clearing the MMP in the first place. I've tried the patches and they appear to work pefectly, and I can no longer trigger this in any configuration in either environment. Thanks! наб signature.asc Description: PGP signature

Bug#848945: grub-common: Empty rpool leaves ZFS systems unbootable

2021-03-09 Thread наб
s ${bpool}` + if [ "$bootfs" = "-" ]; then + bootfs="${mounted}" + fi + LINUX_ROOT_DEVICE="ZFS=${bootfs}" ;; esac -- >8 -- Same applies to 20_linux_xen. Please consider this vague inspiration and a thread bump. Best, наб signature.asc Description: PGP signature

Bug#985521: python3-minimal: Please use alternatives system for pythonVER-minimal instead of stiff links

2021-03-19 Thread наб
ken by this, since python3-minimal Depends: pythonVER-minimal, and by default the symlink will get updated to what it would be at present. Except that you can roll back if it breaks. But maybe I'm missing something more precise and intricate than a vague "it breaks modules/dependencies"? наб

Bug#986619: linux-image-5.10.0-5-amd64: bonding broken on 5.10.0-5 (5.10.26)

2021-04-09 Thread наб
Hi! Just hit this, great time, I'd just like to narrow down this regression, the previous 5.10.0-5 (5.10.24) works fine, but 5.10.26 is broken. Best, наб signature.asc Description: PGP signature

Bug#992739: fonts-courier-prime: Would it be possible to include Cyrillic?

2021-08-22 Thread наб
this is slim-to-nil, so I'd like to ask for your opinion first: 1. Assuming the source can be acquired, would merging/importing the glyphs be reasonable? 2. Would upstream take it? 3. If not, would you be willing to ship them as a patch? Thanks! наб Glyph diff: -- >8 -- Glyph “.n

Bug#992893: ps2ascii: odd option handling

2021-08-24 Thread наб
ched patch, which also uses symbolic names for the trap signals Best, наб -- System Information: Debian Release: 10.10 APT prefers oldstable-updates APT policy: (500, 'oldstable-updates'), (500, 'oldstable-debug'), (500, 'oldstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Ker

Bug#992889: /usr/sbin/update-gsfontmap: overly complicated

2021-08-24 Thread наб
Hi! On Tue, Aug 24, 2021 at 07:30:31PM +0200, Jonas Smedegaard wrote: > Quoting наб (2021-08-24 18:58:36) > > The current approach that update-gsfontmap takes is very complicated, > > to no apparent end, since all it achieves is concatenating all the > > files; please

Bug#992666: /usr/bin/cut: -n ignored => mangles output ‒ more succinct test data

2021-08-28 Thread наб
d0 9e 09 0a 2d 31 30 3b 31 31 2d 09 d1 8f d0 b9 |-10;11-.| 0100 d1 86 d0 be 09 0a 09 d0 af d0 99 d0 a6 d0 9e 09 || 0110 0a |.| 0111 -- >8 -- Best, наб signature.asc Description: PGP signature

Bug#992161: /usr/bin/printf: %q outputs garbage for \1'\1

2021-08-14 Thread наб
5c 30 30 31 27 01 |\001'.| 0006 Sheesh! As far as I can tell, a sequence of any string that needs escaping, followed by an apostrophe, followed by another string that needs escaping will trigger this, and the example above is the minimal case. наб

Bug#987787: libdebuginfod-common: wrong permissions on /etc/profile.d/debuginfod.{c,}sh (and odd content)

2021-08-16 Thread наб
UGINFOD_URLS" diff --git a/usr/share/libdebuginfod-common/debuginfod.csh b/etc/profile.d/debuginfod.csh index 17f15bb..186fa6d 100644 --- a/usr/share/libdebuginfod-common/debuginfod.csh +++ b/etc/profile.d/debuginfod.csh @@ -9,3 +9,4 @@ if ("https://debuginfod.debian.net; != ""

Bug#987787: libdebuginfod-common: wrong permissions on /etc/profile.d/debuginfod.{c,}sh (and odd content)

2021-08-16 Thread наб
setenv DEBUGINFOD_URLS "https://debuginfod.debian.net; endif endif if [ "false" = "true" ] && [ -n "https://debuginfod.debian.net; ]; then DEBUGINFOD_URLS="${DEBUGINFOD_URLS-}${DEBUGINFOD_URLS:+ }https://debuginfod.debian.net; e

Bug#992666: /usr/bin/cut: -n ignored => mangles output

2021-08-21 Thread наб
y this as anything but "actively malicious". Either don't recognise -n at all or implement it. Don't destroy the input while actively flaunting defying the standard. наб -- System Information: Debian Release: 11.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: x32

Bug#991633: mdoc: At: 32V is "[AT] UNIX/32V", not "Version 32V AT UNIX"

2021-09-08 Thread наб
Control: forwarded -1 https://savannah.gnu.org/bugs/?61104 Landed in groff and mandoc: https://git.savannah.gnu.org/cgit/groff.git/commit/?id=21d307286a3f82ba9ddf91fa3fc0a2932a4d7c4c https://marc.info/?l=mandoc-source=16307876699 Next groff release will close this. наб

Bug#992002: [PATCH][Debian#992002] tbl: allow two-character fonts and format fonts in -Thtml

2021-08-09 Thread наб
se), > apply the following patch, and tell me whether it looks reasonable > and works for you? Yeah, save for the tab thing above, I haven't managed to fault it, in tests or real pages. > When this gets committed, i will credit you for reporting the > missing feature. Do i understand corr

Bug#992002: mandoc: -Thtml: tbl font requests ignored

2021-08-08 Thread наб
Commands Manual V(1) texttexttexttexttexttext text text text text text text text text text August 8, 2021 Debian -- >8 -- This is, also, as expected, if suboptimal because of the general HTML \fC[BI] handling. Best, на

Bug#992002: [PATCH][Debian#992002] tbl: allow two-character fonts and format fonts in -Thtml

2021-08-08 Thread наб
Hi! tbl's -Thtml ignores font requests; additionally, the tbl f-request parser only allows single-character fonts. Cf. the Debian bug (http://bugs.debian.org/992002) for additional context. Please consider the following patch. наб --- With this patch, the following document: -- >8 -- .Dd .D

Bug#1002021: apt-cache [--installed] lists package name for each available version

2021-12-20 Thread наб
stemtap:i386 Depends: systemtap-common:i386 (= 4.4-2) Depends: make:i386 make-guile:i386 -make-guile Depends: lsb-release Suggests: systemtap-doc:i386 -- >8 -- It's pointing toward beign nothing especially with the @@ -89036,7 +89011,6 @@ hunk, which is missing the entire qu

Bug#1002010: find-completion: don't look for -exec etc command if completing before it

2021-12-25 Thread наб
Hi! Ran into this just now, too. The referenced upstream commit cleanly drops in as a patch to 1:2.11-5, and does indeed fix the issue. Best, наб signature.asc Description: PGP signature

Bug#1003095: /usr/bin/script: hangs when child doesn't read input fast enough

2022-01-04 Thread наб
Control: tags -1 + upstream On Tue, Jan 04, 2022 at 05:24:54PM +0100, Chris Hofstaedtler wrote: > * наб [220104 00:06]: > > (This, at least, responds to ^\, but it also seems to function > > slightly differently. Also, this is a race and you're more > > likely to

Bug#1000185: [Bug#1000185] Failed to add dependency on autofs, ignoring: Invalid argument

2022-01-04 Thread наб
See below for a git patch that can be applied cleanly to the current Salsa HEAD (e51778226f53f8479c76f0d53e52dcebb0b6f78b). наб From 0c0a59de958ba472c80e6682c84ebd17e847e716 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=D0=BD=D0=B0=D0=B1?= Date: Tue, 4 Jan 2022 21:38:30 +0100 Subject: [PATCH] d

Bug#1002021: apt-cache [--installed] lists package name for each available version

2021-12-20 Thread наб
8 -- Though in that case you can make the argument that all of these neomutts can potentially depend on libtokyocabinet9 (but, well, there is no additional information over just the one with no versions listed). Best, наб For reference, here's the listing (amd64 only, repeats for i386 and x32): -- >

Bug#995996: dump: segfaults on long paths

2021-12-29 Thread наб
panics since the paths *are* longer than PATH_MAX, but you can't pass those to syscalls anyway and restructuring around that would be non-trivial (in this case, your workaround should be applied instead :P). Best, наб Date: Wed, 29 Dec 2021 16:26:07 +0100 From: наб Subject: Don't trust MAXPATHLEN

Bug#1003095: /usr/bin/script: hangs when child doesn't read input fast enough

2022-01-13 Thread наб
Control: tag -1 + patch Hi! See scissor-patch, below, which fixes this. I tortured it a bit and ironed out all the problems I could find; both script and test_pty work (well, test_pty still doesn't process newlines properly but it was like that when I found it). Best, наб -- >8 -- Subj

Bug#1003755: mailutils: mail(1) completely broken, fails with "undefined symbol: mu_stream_timed_getdelim" on start

2022-01-15 Thread наб
Control: severity -1 important Control: reassign -1 libmailutils8 1:3.14-1 Control: retitle -1 libmailutils8: 1:3.14-1 breaks ABI vs 1:3.13-1, doesn't bump abiver Hi! On Sat, Jan 15, 2022 at 09:40:45AM +0100, Jordi Mallach wrote: > El ds. 15 de 01 de 2022 a les 05:10 +0100, en/na наб

Bug#1003793: [PATCH] lesspipe; lesspipe.1: consistency, cleanup, #995948, #720520; rewrite, #988570

2022-01-15 Thread наб
On Sat, Jan 15, 2022 at 10:55:00PM +0100, наб wrote: > Attached, you'll find patches, applying to less-590-1, > that improve consistency, fix some bugs, and rewrite the manual. If I had more than two functional brain-cells I wouldn't've forgotten to actually attach them; soz. Please co

Bug#1003793: lesspipe; lesspipe.1: consistency, cleanup, #995948, #720520; rewrite, #988570

2022-01-15 Thread наб
numbers in the title is what reportbug gave me when filtering for lesspipe and, from their titles, I assume this also fixes. Best, наб -- System Information: Debian Release: 11.2 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500

Bug#987787: libdebuginfod-common: wrong permissions on /etc/profile.d/debuginfod.{c,}sh (and odd content)

2022-01-17 Thread наб
However, please consider new, simplified, patch below, applying to current Salsa HEAD (4ff688068d05a82039f7cbf88ae99e4d6a4bc327, 0.186-1). Thanks, наб From 868e5606b4c22ac84fafeff2028a1c74f710728f Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=D0=BD=D0=B0=D0=B1?= Date: Mon, 17 Jan 2022 18:26:42 +010

Bug#1003095: /usr/bin/script: hangs when child doesn't read input fast enough

2022-02-02 Thread наб
Hi! Bumping this patch after 2ish weeks :) Best, On Fri, Jan 14, 2022 at 12:28:12AM +0100, наб wrote: > Subject: Put master PTY into non-blocking mode and buffer its output > to avoid deadlock > > If we filled the script->child buffer before the child had a chance > to re

Bug#1000158: samba: random segfaults since upgrading to bullseye

2022-02-02 Thread наб
as bug 14969. наб signature.asc Description: PGP signature

Bug#1004888: inn2: libinn2-dev ships list.3, conflicting with man-pages

2022-02-03 Thread наб
libinn_" could be done in the > upcoming INN 2.6.5 release (in a few days/weeks), In that case, the next release of man-pages should (semi-, there's a script that picks up the file list from sid, but the maintainer doesn't seem to always run it? but they will this time to close #951598) automatically include list.3. Thanks, наб signature.asc Description: PGP signature

Bug#1000158: samba: random segfaults since upgrading to bullseye

2022-01-20 Thread наб
Control: found -1 2:4.13.14+dfsg-1 Rebuilt sid samba (2:4.13.14+dfsg-1) for bullseye, still happens; backtrace below. None of my attempts to reproduce this in controlled conditions, or invoke it in response to any explicit stimulus yielded any progress, unfortunately. наб --- Begin Message

Bug#1003257: screen: segfaults ("screen caught signal 11. (core dumped)])") when run with no arguments/-r

2022-01-06 Thread наб
ce -f screen (which indicates that it catches SIGABRT, not SIGSEGV? wild) and the coredump (after raising ulimit -c). Please advise? Am I holding it wrong? (How wrong indeed if it ends up like this?) Best, наб -- Package-specific info: File Existence and Permissions --

Bug#1003095: /usr/bin/script: hangs when child doesn't read input fast enough

2022-01-08 Thread наб
such a time that the write won't block: https://reviews.freebsd.org/D33789 This seems much easier to apply to the current single-process util-linux model (which is to say: I've tried to cleave the current implementation into two processes and failed miserably). наб signature.asc Description

Bug#987787: libdebuginfod-common: wrong permissions on /etc/profile.d/debuginfod.{c,}sh (and odd content)

2022-01-20 Thread наб
On Thu, Jan 20, 2022 at 10:13:46AM +0800, Paul Wise wrote: > On Mon, 2022-01-17 at 18:38 +0100, наб wrote: > > I don't disagree, but /e/p.d/* can't be symlinks to /u/s. > I don't think that is correct (since systemd symlinks from /etc to > /usr), but if it were then just copying

Bug#951598: restore the tmpfs(5) manpage

2022-01-23 Thread наб
restored (list.3, for example), but that's for a different bug. наб -- >8 -- Subject: Re-run d/check-conflicts (Closes: #951598) diff --git manpages-5.10.orig/debian/rules manpages-5.10/debian/rules index e9c79c2..30b062f 100755 --- manpages-5.10.orig/debian/rules +++ manpages-5.10/debian/ru

Bug#1003095: /usr/bin/script: hangs when child doesn't read input fast enough

2022-04-12 Thread наб
On Mon, Apr 11, 2022 at 12:08:06PM +0200, Karel Zak wrote: > On Fri, Jan 14, 2022 at 12:28:11AM +0100, наб wrote: > > -static int write_to_child(struct ul_pty *pty, char *buf, size_t bufsz) > > +static int schedule_child_write(struct ul_pty *pty, char *buf, size_t >

Bug#1003095: /usr/bin/script: hangs when child doesn't read input fast enough

2022-04-07 Thread наб
o HEAD and works as-expected. наб signature.asc Description: PGP signature

Bug#1051273: /usr/bin/nsupdate: ^C leaves tty in unusable state

2023-09-05 Thread наб
, I wrote "stty" with echo off). Probably don't do that? ^D restores the teletype to its previous state. Best, наб -- System Information: Debian Release: 12.1 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'st

Bug#1051145: nfs4-acl-tools: all manuals point to nf...@linux-nfs.org, which upstream describes as defunct

2023-09-03 Thread наб
Package: nfs4-acl-tools Version: 0.3.7-1 Severity: normal Dear Maintainer, All manuals have a -- >8 -- CONTACT Please send bug reports, feature requests, and comments to . -- >8 -- stanza, but http://linux-nfs.org/wiki/index.php/Main_Page says -- >8 -- Mailing lists:

Bug#1051133: nfs-kernel-server: bug script fails with grep: /etc/nfs.conf.d/*.conf: No such file or directory

2023-09-03 Thread наб
(return code = 512). Do you still want to file a report [y|N|q|?]? y from reportbug. I just don't have any configuration! $ find /etc/nfs.conf* /etc/nfs.conf /etc/nfs.conf.d Best, наб -- Package-specific info: -- rpcinfo -- program vers proto port service 104 tcp111

Bug#1051132: /usr/sbin/fsidd: bound to @/run/fsid.sock@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

2023-09-03 Thread наб
Package: nfs-kernel-server Version: 1:2.6.3-3 Severity: normal File: /usr/sbin/fsidd Dear Maintainer, This makes ss -l output super annoying without grep -v fsidd | column -t again. I'm assuming it wants to bind to @/run/fsid.sock instead but someone forgor  Best, наб -- Package-specific

Bug#1051136: coreutils: df: respects -l too late with filesystem specified

2023-09-03 Thread наб
of what df -l is supposed to do. A similarly-easy fix, probably. Best, наб -- System Information: Debian Release: 12.1 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'stable') Architecture: amd64 (x86_64) Foreign

Bug#1051148: /usr/share/man/man8/rpcbind.8.gz: stray n in header?

2023-09-03 Thread наб
4, 1992 .Dt RPCBIND 8 .Os .Sh NAME .Nm rpcbind .Nd universal addresses to RPC program number mapper .Sh SYNOPSIS .Nm .Op Fl adhiLlsr .Sh DESCRIPTION -- >8 -- Baffling! Remove it please? Best, наб -- System Information: Debian Release: trixie/sid APT prefers unstable APT policy: (500, 'unst

Bug#1051908: rasdaemon: ras-mc-ctl --layout: tabulated incorrectly

2023-09-13 Thread наб
MB | 16384 MB | 16384 MB | 16384 MB | 16384 MB | 16384 MB | ---+-+ наб -- System Information: Debian Release: 12.1 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security

Bug#1050978: dovecot-imapd: Error: Next message unexpectedly lost from mbox file /mnt/filling/mail/.../INBOX at 53591 (cached)

2023-08-31 Thread наб
7fce0729c370] -> #24 mail_set_attachment_keywords[0x7fce072a16b0] -> #25 doveadm_print_sticky[0x55ecf6b2dfb0] -> #26 who_lookup[0x55ecf6b1fb20] -> #27 doveadm_cmd_ver2_to_mail_cmd_wrapper[0x55ecf6b20cc0] -> #28 doveadm_cmd_run_ver2[0x55ecf6b2b120] -> #29 doveadm_cmd_try_run_ver2[0

Bug#1050982: pdns-recursor: leaves behind pdns user and group

2023-08-31 Thread наб
Package: pdns-recursor Version: 4.7.3-1+b1 Severity: normal Dear Maintainer, $ dpkg -l | grep pdns $ id pdns uid=113(pdns) gid=119(pdns) groups=119(pdns) I'd just uninstalled pdns-recursor, so this is probably due to that. Best, наб -- System Information: Debian Release: trixie/sid APT

Bug#1050982: pdns-recursor: leaves behind pdns user and group

2023-08-31 Thread наб
# deluser pdns info: Removing crontab ... info: Removing user `pdns' ... # rm -d /var/spool/powerdns (apparently! find /etc/ /var/ /usr/ -name 'p*dns' returns empty now). crontab -s didn't list pdns but deluser clearly did, so? signature.asc Description: PGP signature

Bug#1050984: nsd: leaves behind nsd user and group

2023-08-31 Thread наб
Source: nsd Version: 4.7.0-1 Severity: normal Dear Maintainer, I had purged nsd, but -- >8 -- nsd:x:116:122::/var/lib/nsd:/usr/sbin/nologin -- >8 -- and -- >8 -- nsd:x:122: -- >8 -- /var/lib/nsd doesn't exist, so accd'g to dh_sysuser(1), nsd is safe to get killed, but clearly wasn't

Bug#1050983: djbdns: leaves behind rbldns and tinydns users and groups

2023-08-31 Thread наб
tinydns:x:996: -- >8 -- Naturally, /nonexistent doesn't exist. Neither does /var/lib/rbldns. Accd'g to dh_sysuser(1), this should mean the users are safe to delete and should get deleted by dh-sysuser. Clearly not! Best, наб -- System Information: Debian Release: trixie/sid APT prefers un

Bug#1050982: pdns-recursor: leaves behind pdns user and group

2023-09-01 Thread наб
On Fri, Sep 01, 2023 at 09:55:37AM +0200, Chris Hofstaedtler wrote: > * наб [230901 03:18]: > > I'd just uninstalled pdns-recursor, so this is probably due to that. > This is by design, as deleting users (in prerm) Well then delete them in postrm, or in postrm-on-purge,

Bug#1051067: knot: statistics output broken since 3.3.0?

2023-09-01 Thread наб
Package: knot Version: 3.3.0-2 Severity: normal Dear Maintainer, I have -- >8 -- statistics: timer: 1h file: /run/knot-log-tail/debug.fifo append: true -- >8 -- set, and appear to be losing metrics on my dashboard since the 3.3.0 upgrade: -- >8 -- $ grep knot: /var/log/dpkg.log 2023-09-01

Bug#1051067: knot: statistics output broken since 3.3.0?

2023-09-01 Thread наб
In the upstream changelog I see -- >8 -- Knot DNS 3.3.0 (2023-08-28) === Improvements: - - knotd: stats no longer dump empty or zero counters -- >8 -- which looks one hell of a lot like "we forgot to also close the scope for mod-cookies in this case" to me?

Bug#1051067: knot: statistics output broken since 3.3.0?

2023-09-01 Thread наб
Control: tags -1 + upstream On Sat, Sep 02, 2023 at 12:09:38AM +0200, наб wrote: > which looks one hell of a lot like "we forgot to also close the scope > for mod-cookies in this case" to me? Yes, can confirm this. I apt sourced knot, curl https://gitlab.nic.cz/knot/k

Bug#1051067: knot: statistics output broken since 3.3.0?

2023-09-01 Thread наб
Control: forwarded -1 https://gitlab.nic.cz/knot/knot-dns/-/issues/874 Forwarded upstream, for now that SHA can be reversed in Debian with no conflicts (cf. attached). patch -p1 -R < 2decb9ea3da74d13f54316d86ad9e7f727254164.patch --- knot-3.3.0.orig/src/knot/common/stats.c +++

Bug#1050571: [Pkg-nginx-maintainers] Bug#1050571: reportbug: nginx normalises "Status: 123 " and "Status: 123" to invalid "HTTP/1.1 123" (must be "HTTP/1.1 123 ")

2023-09-01 Thread наб
Control: tags -1 + upstream fixed-upstream The thread bore fruit, fixed upstream in https://hg.nginx.org/nginx/rev/35bb47f65cab signature.asc Description: PGP signature

Bug#1051817: unbound: local_datas without \4\n reuses last read buffer(?) and produces infinite error output

2023-09-12 Thread наб
s they say. Best, наб -- System Information: Debian Release: 12.1 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'stable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 6.1.0-9-amd64 (SMP w/24 C

Bug#1051805: systemd-cron: shell redirect not working in crontab entries

2023-09-12 Thread наб
Control: tag -1 + confirmed upstream On Tue, Sep 12, 2023 at 10:11:58PM +0200, Alexandre Detiste wrote: > In v1.x the trailing "> /dev/null" was purposely chopped of the end of the > line > because there wasn't an OnSucces= handler anyway and the goal > was to further parse the bash-one liner. >

Bug#1051817: unbound: local_datas without \4\n reuses last read buffer(?) and produces infinite error output

2023-09-12 Thread наб
ss.zst Description: application/zstd signature.asc Description: PGP signature

Bug#1051818: unbound: floods journal (100%CPU unbound, 100%CPU sd-journald) with errors when it can't reply to control socket peer

2023-09-12 Thread наб
r whatever. "Client hangup" isn't a valid excuse to behave like this, especially for a network-native program. Best, наб -- System Information: Debian Release: 12.1 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'),

Bug#1051805: systemd-cron: shell redirect not working in crontab entries

2023-09-12 Thread наб
On Wed, Sep 13, 2023 at 12:00:51AM +0200, Alexandre Detiste wrote: > I think that the risk that some user start by themselves moving around > some programs > around the PATH directories and expect nothing to break is quiet moot. I don't. Users love putting stuff in /usr/local/{,s}bin. And then

Bug#1051517: dnsmasq: only returns SOA for A queries on the first (going-to-upstream) query, returns empty on subsequent ones

2023-09-08 Thread наб
eived 124 B ;; Time 2023-09-09 02:09:49 CEST ;; From 127.0.0.1@5353(UDP) in 0.4 ms So this is a. dnsmasq cache-hit thing? Best, наб -- System Information: Debian Release: 12.1 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'stable'

Bug#1051205: git grep -F isn't ‒ '(' fails with "fatal: unmatched parenthesis"

2023-09-04 Thread наб
p -P '^\.(BR|IR) [\w]*\([\d]*\)$' (but '\('s are highlighted here so idk what this could possibly mean). sid and bookworm. Best, наб -- System Information: Debian Release: 12.1 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug')

Bug#1051205: git grep -F isn't ‒ '(' fails with "fatal: unmatched parenthesis"

2023-09-04 Thread наб
Control: retitle -1 git grep -F and BRE fail for "'('" with "fatal: unmatched parenthesis" but work for "-- '('"? This is correct: $ git grep '\(' | head -n1 fatal: command line, '\(': Unmatched ( or \( This ain't: $ git grep '(' | head -n1 fatal: unmatched parenthesis $ git grep -- '(' |

Bug#1054030: tar: -P is "Don't strip leading slashes from file names when creating archives." but also disables stripping on extraxion

2023-10-16 Thread наб
/bin/free # free free: error while loading shared libraries: libproc2.so.0: cannot open shared object file: No such file or directory Best, наб -- System Information: Debian Release: trixie/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (x86_64) F

Bug#1055526: efibootmgr: output broken and shows hex dump after update (can be fixed with -u, which is documented as unrelated)

2023-11-07 Thread наб
ommu=on zfs.zfs_arc_max=12884901888 quiet module.sig_enforce=1 -- >8 -- So..? Best, наб -- System Information: Debian Release: trixie/sid APT prefers unstable-debug APT policy: (500, 'unstable-debug'), (500, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 6.1.0-9-amd64

Bug#1053372: neochat: SIGINT segfaults

2023-10-02 Thread наб
Package: neochat Version: 23.04.3-1 Severity: normal Dear Maintainer, -- >8 -- olumnView: Binding loop detected for property "columnWidth" file:///usr/lib/x86_64-linux-gnu/qt5/qml/org/kde/kirigami.2/PageRow.qml:947:9: QML ColumnView: Binding loop detected for property "columnWidth"

  1   2   3   4   5   >