On Tue, Feb 25, 2020 at 08:17:55AM +0100, Michael Stapelberg wrote:
> Thanks for your report. Please file this issue on GitHub. There are
> Debian repositories you can use to get the latest version:
> https://i3wm.org/docs/repositories.html
Thank you for the link -- I didn't find it referenced in
are/gawk/manual/html_node/String-Functions.html
[2]:
https://invisible-island.net/mawk/manpage/mawk.html#h3-8_-Built-in-functions
Yours,
наб
-- System Information:
Debian Release: bullseye/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 5.
se
instead, as well as one that fixes a typo that bugged me.
If you prefer, there's also a git repository you can pull from at
<https://github.com/nabijaczleweli/partclone.deb>.
Best,
наб
-- System Information:
Debian Release: 10.3
APT prefers stable-updates
APT policy: (500, 'stable
t (c) 2003-2019 Fabrice Bellard and the QEMU Project developers
The same error happens on the sid kernel, with uname -a:
Linux qest 5.5.0-2-amd64 #1 SMP Debian 5.5.17-1 (2020-04-15) x86_64 GNU/Linux
Yours,
наб
-- System Information:
Debian Release: 10.3
APT prefers stable-updates
APT policy: (50
Hi!
I'm attaching a patch, based on the Salsa HEAD at 82d10d0,
to do just that.
The package builds with src/json.[ch] removed, too. Could probably be an
uscan exclusion rule, but I didn't want to touch the legacy d/copyright.
Best,
наб
File lists identical (after any substitutions)
Control
reasons,
but I'm licensing it as public domain and can certify (a), so,
if my reading of the DCO is right, you could certify either (b) or (c),
should you wish to bring the patch upstream;
thank you for understanding.
Best,
наб
-- System Information:
Debian Release: 10.4
APT prefers stable
at that same URL
<https://github.com/nabijaczleweli/neomutt.deb> ‒
based on the latest Salsa commit.
By happy coincidence, the packaging for 2020-05-01 was just about done
when I happened upon this report, and so here we are;
building it should be as straightforward as it gets.
Best,
наб
---
Thanks for the quick response!
Patch landed in the stable/v2.35 branch[1],
so this will be closed by 2.35.2.
[1]:
https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?h=stable/v2.35=a9ea0b33837f051ccb3c63ac8a5d850e41b9ce1e
signature.asc
Description: PGP signature
ell grep -qE 'stretch|ubuntu' /etc/os-release && echo
-Ddefault-dnssec=no)
-- >8 --
I don't know if DNSSEC support matured and this isn't needed anymore
anyway, but going by the comment this was probably overlooked
at some point; but now I looked at it, and here we are.
Best,
н
In further testing it appears to happen only on an actual VT and only
with TERM=linux (none of dumb, {xterm,st}{,-256color} crash).
I haven't been able to reproduce it over ssh, no matter the $TERM.
signature.asc
Description: PGP signature
a backtrace from amd64
or test on i386, but here are my findings so far.
Defeatedly,
наб
signature.asc
Description: PGP signature
Hi!
I'm attaching a patch that implements this, stolen from i-t:
https://sources.debian.org/src/initramfs-tools/0.139/update-initramfs/?hl=L158#L158
Best,
наб
From 4b5bcda703b4655c7eea52a092a21fdd61da1204 Mon Sep 17 00:00:00 2001
From: наб
Date: Tue, 15 Sep 2020 20:32:08 +0200
Subject
On Sun, Sep 13, 2020 at 11:03:46AM +0200, Michael Biebl wrote:
> So the issue is, that you both have an unversioned "initrd" and
> versioned "initrd.img-5.8.0-1-amd64" initrd file and the unversioned one
> is not used?
Essentially, yes; the unversioned one is added by the debian hook even
explicit
ich breaks on the symlink-to-nonexistent;
that patch is likely able to be dropped in a near future,
with gahr saying[3] that "ALL_FILES can probably be reworked a bit",
(though I haven't had free cycles to do it myself).
Best,
наб
[1]:
https://github.com/nabijaczleweli/neomu
nt by overriding it with a nop makes it work
just as well (or, well, better, since it doesn't crash;
granted, the selection start is still stuck
to the end of the Quit htop field when suspended,
but that's something for a different time),
and the two outcomes are dlopen()ning it again or being murdered anyway,
but this is not my area.
Updating severity to reflect the new reality as well
("htop fails on a port" =>
"ncurses+gpm segfaults all mouse programs").
Triumphantly,
наб
signature.asc
Description: PGP signature
to post to it twice, so I'm
opening this bug and attaching my patches, up/downdated for 0.8.4-2;
they're plug-and-play and I've been running them like this since early
May, but I'm not sure if there's anything more to be done on the
packaging side.
Best,
наб
[1]: https://github.com/openzfs/zfs/pull
ive
> +is_ports_architecture=
> +if [ -r /usr/lib/choose-mirror/port_architecture ]; then
> + is_ports_architecture=$(cat /usr/lib/choose-mirror/port_architecture)
Is there any good reason for this to be a subshell instead of read(1)?
> fi
наб
signature.asc
Description: PGP signature
chitecture function from
> /usr/lib/base-installer/library.sh?
It was, yes.
> Mmm, possibly, are we sure that choose-mirror is always installed in
> d-i? It seems that monolithic/netboot have it anyway, and cdrom installs
> it already? наб, perhaps you can try and check that it wo
tml>
These patches apply cleanly on top of the Salsa HEADs as of today
(e70510edbb6772e0eb98537c3a7175b977ce0423 for base-installer and
30f36f7e8617f52cbc7fc9942cfbf326d2b773c2 for apt-setup).
Best,
наб
--- Begin Message ---
This fixes, e.g., hurd installs from mini ISOs,
which require libp11-kit
memset(_opts, 0, sizeof listen_opts);
listen_opts.family = AF_UNSPEC;
listen_opts.flags |= F_EXT_DSN;
} ON listener_type
;
-- >8 --
And neither create_{sock,if}_listener() parse "all" specially.
Mayha
>8 --
As you can see, the search link was insered directly into the href of
the that contained the message ID. This results in the first link
(loupe on lists.d.o) being broken entirely,
and the other one linking directly to the message,
neither of which is what I indended.
Best,
наб
[1]: https://list
eed and libnettle7 3.5.1+really3.5.1-2+b1,
though the only version I saw in the pool was 3.6-2,
but that's, presumably, unrelated.
наб
signature.asc
Description: PGP signature
Hi!
The inclusion of the patch definitely simplifies building from source,
but, AFAICT neither packages.d.o nor buildd.d.o mention
the binary package for x32; I'm not familiar with this part
of Debian infrastructure, but mayhap a config needs to be tweaked to
trigger the builds?
Best,
наб
retitle 971068 linux-image-5.9.0-1-686-pae: Assertion failure in i915
intel_display.c#assert_plane() after resume from hibernation
found 971068 5.9.1-1
thanks
Turns out the delay was because my system was horriby starved for I/O,
switching to an SSD revealed that the display is ready immediately
generating there; this is not feasible
on a sealed system (mine) or one that boots off multiple striped NVMe
drives (his).
PLEASE apply this patch
(clean over b612af3ca30a04c5afbef1fcadeec76a516794ef)
and upload ASAP. I have verified it on my machine.
Best,
наб
-- System Information:
Debian Rel
On Mon, Jan 25, 2021 at 06:20:30PM +0100, László Böszörményi (GCS) wrote:
> Anyway, the solution to ask for 64 bit off_t with: -D_FILE_OFFSET_BITS=64
Agh, dammit. I only tried __USE_FILE_OFFSET64, after seeing it
in a header somewhere. -D_FILE_OFFSET_BITS=64 does work, cheers!
наб
signature.
~~
(sid-i386 fest)root@tarta:/#
And likewise with __USE_FILE_OFFSET64 (which supposedly guards this,
or so I gathered from skimming libc headers).
This renders the package unusable.
Best,
наб
-- System Information:
Debian Release: 10.7
APT prefers stable-updates
APT policy: (500,
on b0c80a72a9a32e17953483e1fb6b66dcfd8d0096,
that falls back to rename(2).
Best,
наб
-- Package-specific info:
System tainted due to merged-usr-via-symlinks.
-- System Information:
Debian Release: 10.7
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable
if (buf->buf[pos] != '\0')
3320 mandoc_msg(MANDOCERR_ARG_SKIP, ln, pos,
3321 ".EQ %s", buf->buf + pos);
3322
3323 return ROFF_IGN;
3324 }
-- >8 --
I'm not sure what other token is better suited here (or, indeed, if at
all), but I think s
milarly,
tok = TOKEN_NONE, type = ROFFT_TBL,
Would it make sense to pass tbl(7) and eqn(7) through,
like it's done in man input mode?
Best,
наб
.TS
l .
a
.TE
.\" SPDX-License-Identifier: 0BSD
.\"
.Dd
.Dt SHA1SUM 1
.Os
.
.Sh NAME
.Nm sha*sum , b2sum , md5sum
.Nd generate or verify c
trimming before,
you will need to run
zfs set org.debian:periodic-trim=enable sata-pool
to restore previous behaviour.
-- >8 --
would be great, feel free to just steal this.
Best,
наб
diff --git a/debian/tree/zfsutils-linux/usr/lib/zfs-linux/scrub
b/debian/tree/zfsutils-linux/usr/lib/zfs-
ure or, at the very least, significant
performance degradation.
I mean, I'm a maniac and I do read all changelogs, but the /vast/
majority of people don't, and this feels like the prime use of NEWS.
But I agree, having this in README.Debian would be good as well.
Best,
наб
signature.asc
Description:
should work (but please verify this before uploading!).
Best,
наб
signature.asc
Description: PGP signature
Package: zfsutils-linux
Version: 2.0.3-1~bpo10+1
Severity: minor
Tags: patch
Dear Maintainer,
Please consider the patch below, based on current Salsa HEAD
(8cfc39d59fff85bdbefcee22c728aab83adb19eb).
Best,
наб
-- System Information:
Debian Release: 10.8
APT prefers stable-updates
APT policy
n't mounted at any point when e2fsck/resize2fs
were running, hence why I obliged to clearing the MMP in the first place.
I've tried the patches and they appear to work pefectly,
and I can no longer trigger this in any configuration
in either environment.
Thanks!
наб
signature.asc
Description: PGP signature
s ${bpool}`
+ if [ "$bootfs" = "-" ]; then
+ bootfs="${mounted}"
+ fi
+ LINUX_ROOT_DEVICE="ZFS=${bootfs}"
;;
esac
-- >8 --
Same applies to 20_linux_xen.
Please consider this vague inspiration and a thread bump.
Best,
наб
signature.asc
Description: PGP signature
ken by this, since
python3-minimal Depends: pythonVER-minimal, and by default the symlink
will get updated to what it would be at present.
Except that you can roll back if it breaks.
But maybe I'm missing something more precise and intricate than a vague
"it breaks modules/dependencies"?
наб
Hi!
Just hit this, great time, I'd just like to narrow down this regression,
the previous 5.10.0-5 (5.10.24) works fine, but 5.10.26 is broken.
Best,
наб
signature.asc
Description: PGP signature
this is slim-to-nil,
so I'd like to ask for your opinion first:
1. Assuming the source can be acquired,
would merging/importing the glyphs be reasonable?
2. Would upstream take it?
3. If not, would you be willing to ship them as a patch?
Thanks!
наб
Glyph diff:
-- >8 --
Glyph “.n
ched patch,
which also uses symbolic names for the trap signals
Best,
наб
-- System Information:
Debian Release: 10.10
APT prefers oldstable-updates
APT policy: (500, 'oldstable-updates'), (500, 'oldstable-debug'), (500,
'oldstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Ker
Hi!
On Tue, Aug 24, 2021 at 07:30:31PM +0200, Jonas Smedegaard wrote:
> Quoting наб (2021-08-24 18:58:36)
> > The current approach that update-gsfontmap takes is very complicated,
> > to no apparent end, since all it achieves is concatenating all the
> > files; please
d0 9e 09 0a 2d 31 30 3b 31 31 2d 09 d1 8f d0 b9 |-10;11-.|
0100 d1 86 d0 be 09 0a 09 d0 af d0 99 d0 a6 d0 9e 09 ||
0110 0a |.|
0111
-- >8 --
Best,
наб
signature.asc
Description: PGP signature
5c 30 30 31 27 01 |\001'.|
0006
Sheesh!
As far as I can tell, a sequence of any string that needs escaping,
followed by an apostrophe, followed by another string that needs
escaping will trigger this, and the example above is the minimal case.
наб
UGINFOD_URLS"
diff --git a/usr/share/libdebuginfod-common/debuginfod.csh
b/etc/profile.d/debuginfod.csh
index 17f15bb..186fa6d 100644
--- a/usr/share/libdebuginfod-common/debuginfod.csh
+++ b/etc/profile.d/debuginfod.csh
@@ -9,3 +9,4 @@ if ("https://debuginfod.debian.net; != ""
setenv DEBUGINFOD_URLS "https://debuginfod.debian.net;
endif
endif
if [ "false" = "true" ] && [ -n "https://debuginfod.debian.net; ]; then
DEBUGINFOD_URLS="${DEBUGINFOD_URLS-}${DEBUGINFOD_URLS:+
}https://debuginfod.debian.net;
e
y this
as anything but "actively malicious".
Either don't recognise -n at all or implement it.
Don't destroy the input while actively flaunting defying the standard.
наб
-- System Information:
Debian Release: 11.0
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32
Control: forwarded -1 https://savannah.gnu.org/bugs/?61104
Landed in groff and mandoc:
https://git.savannah.gnu.org/cgit/groff.git/commit/?id=21d307286a3f82ba9ddf91fa3fc0a2932a4d7c4c
https://marc.info/?l=mandoc-source=16307876699
Next groff release will close this.
наб
se),
> apply the following patch, and tell me whether it looks reasonable
> and works for you?
Yeah, save for the tab thing above, I haven't managed to fault it,
in tests or real pages.
> When this gets committed, i will credit you for reporting the
> missing feature. Do i understand corr
Commands Manual
V(1)
texttexttexttexttexttext
text
text
text
text
text
text
text
text
text
August 8, 2021
Debian
-- >8 --
This is, also, as expected, if suboptimal because of the general
HTML \fC[BI] handling.
Best,
на
Hi!
tbl's -Thtml ignores font requests; additionally, the tbl f-request
parser only allows single-character fonts. Cf. the Debian bug
(http://bugs.debian.org/992002) for additional context.
Please consider the following patch.
наб
---
With this patch, the following document:
-- >8 --
.Dd
.D
stemtap:i386
Depends: systemtap-common:i386 (= 4.4-2)
Depends: make:i386
make-guile:i386
-make-guile
Depends:
lsb-release
Suggests: systemtap-doc:i386
-- >8 --
It's pointing toward beign nothing especially
with the @@ -89036,7 +89011,6 @@ hunk, which is missing the entire
qu
Hi!
Ran into this just now, too.
The referenced upstream commit cleanly drops in as a patch to 1:2.11-5,
and does indeed fix the issue.
Best,
наб
signature.asc
Description: PGP signature
Control: tags -1 + upstream
On Tue, Jan 04, 2022 at 05:24:54PM +0100, Chris Hofstaedtler wrote:
> * наб [220104 00:06]:
> > (This, at least, responds to ^\, but it also seems to function
> > slightly differently. Also, this is a race and you're more
> > likely to
See below for a git patch that can be applied cleanly
to the current Salsa HEAD (e51778226f53f8479c76f0d53e52dcebb0b6f78b).
наб
From 0c0a59de958ba472c80e6682c84ebd17e847e716 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?=D0=BD=D0=B0=D0=B1?=
Date: Tue, 4 Jan 2022 21:38:30 +0100
Subject: [PATCH] d
8 --
Though in that case you can make the argument that all of these neomutts
can potentially depend on libtokyocabinet9 (but, well, there is no
additional information over just the one with no versions listed).
Best,
наб
For reference, here's the listing (amd64 only, repeats for i386 and x32):
-- >
panics since the paths *are* longer than PATH_MAX, but you
can't pass those to syscalls anyway and restructuring around that would
be non-trivial (in this case, your workaround should be applied
instead :P).
Best,
наб
Date: Wed, 29 Dec 2021 16:26:07 +0100
From: наб
Subject: Don't trust MAXPATHLEN
Control: tag -1 + patch
Hi!
See scissor-patch, below, which fixes this.
I tortured it a bit and ironed out all the problems I could find;
both script and test_pty work (well, test_pty still doesn't process
newlines properly but it was like that when I found it).
Best,
наб
-- >8 --
Subj
Control: severity -1 important
Control: reassign -1 libmailutils8 1:3.14-1
Control: retitle -1 libmailutils8: 1:3.14-1 breaks ABI vs 1:3.13-1, doesn't
bump abiver
Hi!
On Sat, Jan 15, 2022 at 09:40:45AM +0100, Jordi Mallach wrote:
> El ds. 15 de 01 de 2022 a les 05:10 +0100, en/na наб
On Sat, Jan 15, 2022 at 10:55:00PM +0100, наб wrote:
> Attached, you'll find patches, applying to less-590-1,
> that improve consistency, fix some bugs, and rewrite the manual.
If I had more than two functional brain-cells I wouldn't've forgotten to
actually attach them; soz.
Please co
numbers in the title is what
reportbug gave me when filtering for lesspipe and, from their titles,
I assume this also fixes.
Best,
наб
-- System Information:
Debian Release: 11.2
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500,
'stable-debug'), (500
However, please consider new, simplified, patch below,
applying to current Salsa HEAD
(4ff688068d05a82039f7cbf88ae99e4d6a4bc327, 0.186-1).
Thanks,
наб
From 868e5606b4c22ac84fafeff2028a1c74f710728f Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?=D0=BD=D0=B0=D0=B1?=
Date: Mon, 17 Jan 2022 18:26:42 +010
Hi!
Bumping this patch after 2ish weeks :)
Best,
On Fri, Jan 14, 2022 at 12:28:12AM +0100, наб wrote:
> Subject: Put master PTY into non-blocking mode and buffer its output
> to avoid deadlock
>
> If we filled the script->child buffer before the child had a chance
> to re
as bug 14969.
наб
signature.asc
Description: PGP signature
libinn_" could be done in the
> upcoming INN 2.6.5 release (in a few days/weeks),
In that case, the next release of man-pages should (semi-, there's a
script that picks up the file list from sid, but the maintainer doesn't
seem to always run it? but they will this time to close #951598)
automatically include list.3.
Thanks,
наб
signature.asc
Description: PGP signature
Control: found -1 2:4.13.14+dfsg-1
Rebuilt sid samba (2:4.13.14+dfsg-1) for bullseye,
still happens; backtrace below.
None of my attempts to reproduce this in controlled conditions,
or invoke it in response to any explicit stimulus yielded any progress,
unfortunately.
наб
--- Begin Message
ce -f screen (which indicates that it catches SIGABRT,
not SIGSEGV? wild) and the coredump (after raising ulimit -c).
Please advise? Am I holding it wrong? (How wrong indeed if it ends up
like this?)
Best,
наб
-- Package-specific info:
File Existence and Permissions
--
such a time that the write won't block:
https://reviews.freebsd.org/D33789
This seems much easier to apply to the current single-process util-linux
model (which is to say: I've tried to cleave the current implementation
into two processes and failed miserably).
наб
signature.asc
Description
On Thu, Jan 20, 2022 at 10:13:46AM +0800, Paul Wise wrote:
> On Mon, 2022-01-17 at 18:38 +0100, наб wrote:
> > I don't disagree, but /e/p.d/* can't be symlinks to /u/s.
> I don't think that is correct (since systemd symlinks from /etc to
> /usr), but if it were then just copying
restored
(list.3, for example), but that's for a different bug.
наб
-- >8 --
Subject: Re-run d/check-conflicts (Closes: #951598)
diff --git manpages-5.10.orig/debian/rules manpages-5.10/debian/rules
index e9c79c2..30b062f 100755
--- manpages-5.10.orig/debian/rules
+++ manpages-5.10/debian/ru
On Mon, Apr 11, 2022 at 12:08:06PM +0200, Karel Zak wrote:
> On Fri, Jan 14, 2022 at 12:28:11AM +0100, наб wrote:
> > -static int write_to_child(struct ul_pty *pty, char *buf, size_t bufsz)
> > +static int schedule_child_write(struct ul_pty *pty, char *buf, size_t
>
o HEAD
and works as-expected.
наб
signature.asc
Description: PGP signature
, I wrote "stty" with echo off).
Probably don't do that? ^D restores the teletype to its previous state.
Best,
наб
-- System Information:
Debian Release: 12.1
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500,
'stable-debug'), (500, 'st
Package: nfs4-acl-tools
Version: 0.3.7-1
Severity: normal
Dear Maintainer,
All manuals have a
-- >8 --
CONTACT
Please send bug reports, feature requests, and comments to
.
-- >8 --
stanza, but http://linux-nfs.org/wiki/index.php/Main_Page says
-- >8 --
Mailing lists:
(return code = 512). Do you still want to file a report [y|N|q|?]?
y
from reportbug. I just don't have any configuration!
$ find /etc/nfs.conf*
/etc/nfs.conf
/etc/nfs.conf.d
Best,
наб
-- Package-specific info:
-- rpcinfo --
program vers proto port service
104 tcp111
Package: nfs-kernel-server
Version: 1:2.6.3-3
Severity: normal
File: /usr/sbin/fsidd
Dear Maintainer,
This makes ss -l output super annoying without grep -v fsidd | column -t again.
I'm assuming it wants to bind to @/run/fsid.sock instead but someone forgor
Best,
наб
-- Package-specific
of what df -l is supposed to do.
A similarly-easy fix, probably.
Best,
наб
-- System Information:
Debian Release: 12.1
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500,
'stable-debug'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign
4, 1992
.Dt RPCBIND 8
.Os
.Sh NAME
.Nm rpcbind
.Nd universal addresses to RPC program number mapper
.Sh SYNOPSIS
.Nm
.Op Fl adhiLlsr
.Sh DESCRIPTION
-- >8 --
Baffling! Remove it please?
Best,
наб
-- System Information:
Debian Release: trixie/sid
APT prefers unstable
APT policy: (500, 'unst
MB | 16384 MB | 16384 MB | 16384 MB | 16384 MB |
16384 MB |
---+-+
наб
-- System Information:
Debian Release: 12.1
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security
7fce0729c370] -> #24
mail_set_attachment_keywords[0x7fce072a16b0] -> #25
doveadm_print_sticky[0x55ecf6b2dfb0] -> #26 who_lookup[0x55ecf6b1fb20] -> #27
doveadm_cmd_ver2_to_mail_cmd_wrapper[0x55ecf6b20cc0] -> #28
doveadm_cmd_run_ver2[0x55ecf6b2b120] -> #29
doveadm_cmd_try_run_ver2[0
Package: pdns-recursor
Version: 4.7.3-1+b1
Severity: normal
Dear Maintainer,
$ dpkg -l | grep pdns
$ id pdns
uid=113(pdns) gid=119(pdns) groups=119(pdns)
I'd just uninstalled pdns-recursor, so this is probably due to that.
Best,
наб
-- System Information:
Debian Release: trixie/sid
APT
# deluser pdns
info: Removing crontab ...
info: Removing user `pdns' ...
# rm -d /var/spool/powerdns
(apparently! find /etc/ /var/ /usr/ -name 'p*dns' returns empty now).
crontab -s didn't list pdns but deluser clearly did, so?
signature.asc
Description: PGP signature
Source: nsd
Version: 4.7.0-1
Severity: normal
Dear Maintainer,
I had purged nsd, but
-- >8 --
nsd:x:116:122::/var/lib/nsd:/usr/sbin/nologin
-- >8 --
and
-- >8 --
nsd:x:122:
-- >8 --
/var/lib/nsd doesn't exist, so accd'g to dh_sysuser(1),
nsd is safe to get killed, but clearly wasn't
tinydns:x:996:
-- >8 --
Naturally, /nonexistent doesn't exist. Neither does /var/lib/rbldns.
Accd'g to dh_sysuser(1), this should mean the users are safe to delete
and should get deleted by dh-sysuser.
Clearly not!
Best,
наб
-- System Information:
Debian Release: trixie/sid
APT prefers un
On Fri, Sep 01, 2023 at 09:55:37AM +0200, Chris Hofstaedtler wrote:
> * наб [230901 03:18]:
> > I'd just uninstalled pdns-recursor, so this is probably due to that.
> This is by design, as deleting users (in prerm)
Well then delete them in postrm, or in postrm-on-purge,
Package: knot
Version: 3.3.0-2
Severity: normal
Dear Maintainer,
I have
-- >8 --
statistics:
timer: 1h
file: /run/knot-log-tail/debug.fifo
append: true
-- >8 --
set, and appear to be losing metrics on my dashboard since the 3.3.0 upgrade:
-- >8 --
$ grep knot: /var/log/dpkg.log
2023-09-01
In the upstream changelog I see
-- >8 --
Knot DNS 3.3.0 (2023-08-28)
===
Improvements:
-
- knotd: stats no longer dump empty or zero counters
-- >8 --
which looks one hell of a lot like "we forgot to also close the scope
for mod-cookies in this case" to me?
Control: tags -1 + upstream
On Sat, Sep 02, 2023 at 12:09:38AM +0200, наб wrote:
> which looks one hell of a lot like "we forgot to also close the scope
> for mod-cookies in this case" to me?
Yes, can confirm this. I apt sourced knot,
curl
https://gitlab.nic.cz/knot/k
Control: forwarded -1 https://gitlab.nic.cz/knot/knot-dns/-/issues/874
Forwarded upstream, for now that SHA can be reversed in Debian with no
conflicts (cf. attached).
patch -p1 -R < 2decb9ea3da74d13f54316d86ad9e7f727254164.patch
--- knot-3.3.0.orig/src/knot/common/stats.c
+++
Control: tags -1 + upstream fixed-upstream
The thread bore fruit, fixed upstream in
https://hg.nginx.org/nginx/rev/35bb47f65cab
signature.asc
Description: PGP signature
s they say.
Best,
наб
-- System Information:
Debian Release: 12.1
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500,
'stable-debug'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 6.1.0-9-amd64 (SMP w/24 C
Control: tag -1 + confirmed upstream
On Tue, Sep 12, 2023 at 10:11:58PM +0200, Alexandre Detiste wrote:
> In v1.x the trailing "> /dev/null" was purposely chopped of the end of the
> line
> because there wasn't an OnSucces= handler anyway and the goal
> was to further parse the bash-one liner.
>
ss.zst
Description: application/zstd
signature.asc
Description: PGP signature
r whatever.
"Client hangup" isn't a valid excuse to behave like this,
especially for a network-native program.
Best,
наб
-- System Information:
Debian Release: 12.1
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500,
'stable-debug'),
On Wed, Sep 13, 2023 at 12:00:51AM +0200, Alexandre Detiste wrote:
> I think that the risk that some user start by themselves moving around
> some programs
> around the PATH directories and expect nothing to break is quiet moot.
I don't. Users love putting stuff in /usr/local/{,s}bin. And then
eived 124 B
;; Time 2023-09-09 02:09:49 CEST
;; From 127.0.0.1@5353(UDP) in 0.4 ms
So this is a. dnsmasq cache-hit thing?
Best,
наб
-- System Information:
Debian Release: 12.1
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500,
'stable-debug'), (500, 'stable'
p -P '^\.(BR|IR) [\w]*\([\d]*\)$'
(but '\('s are highlighted here so idk what this could possibly mean).
sid and bookworm.
Best,
наб
-- System Information:
Debian Release: 12.1
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500,
'stable-debug')
Control: retitle -1 git grep -F and BRE fail for "'('" with "fatal: unmatched
parenthesis" but work for "-- '('"?
This is correct:
$ git grep '\(' | head -n1
fatal: command line, '\(': Unmatched ( or \(
This ain't:
$ git grep '(' | head -n1
fatal: unmatched parenthesis
$ git grep -- '(' |
/bin/free
# free
free: error while loading shared libraries: libproc2.so.0: cannot open
shared object file: No such file or directory
Best,
наб
-- System Information:
Debian Release: trixie/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32 (x86_64)
F
ommu=on zfs.zfs_arc_max=12884901888 quiet
module.sig_enforce=1
-- >8 --
So..?
Best,
наб
-- System Information:
Debian Release: trixie/sid
APT prefers unstable-debug
APT policy: (500, 'unstable-debug'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 6.1.0-9-amd64
Package: neochat
Version: 23.04.3-1
Severity: normal
Dear Maintainer,
-- >8 --
olumnView: Binding loop detected for property "columnWidth"
file:///usr/lib/x86_64-linux-gnu/qt5/qml/org/kde/kirigami.2/PageRow.qml:947:9:
QML ColumnView: Binding loop detected for property "columnWidth"
1 - 100 of 471 matches
Mail list logo