Bug#1021709: manpages.debian.org: FAQ is full of deadlinks, incl. to the static assets repo

2022-10-13 Thread наб
nrar to show me the 404). My report concerns the Debian Manpages FAQ with canonical URL https://manpages.debian.org/faq.html (at least I hope that's the canonical URL!) Best, наб signature.asc Description: PGP signature

Bug#1021709: manpages.debian.org: FAQ is full of deadlinks, incl. to the static assets repo

2022-10-13 Thread наб
Hi! On Thu, Oct 13, 2022 at 02:52:21PM +0200, Joost van Baal-Ilić wrote: > On Thu, Oct 13, 2022 at 02:15:56PM +0200, наб wrote: > > On Thu, Oct 13, 2022 at 01:55:42PM +0200, Joost van Baal-Ilić wrote: > > > https://dyn.manpages.debian.org/faq.html redirects h

Bug#1021795: groff-base: Please consider removing the extra spaces in Pq (& Po/Pc) and Bq (& Bo/Bc)

2022-10-14 Thread наб
(in groff and 4.4BSD) but Oo and Oc don't (likewise), so this reads to me like compensation for like deficient font metrics on the phototypesetters of yore? or something? It'd be great if you could consider dropping them :) Best, наб -- System Information: Debian Release: 11.5 APT prefers stable

Bug#1017411: dracut: 90kernel-modules spends 150ms doing a 3ms grep in bash

2022-08-15 Thread наб
Now it's attached. --- dracut-056.orig/modules.d/90kernel-modules/module-setup.sh +++ dracut-056/modules.d/90kernel-modules/module-setup.sh @@ -5,16 +5,6 @@ installkernel() { local

Bug#1017110: coreutils: printf 'X takes X to be a byte, not a character (and missing in manual)?

2022-08-13 Thread наб
racter > following the single-quote or double-quote. Compare printf.1: [no data (??)] Best, наб -- System Information: Debian Release: 11.4 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'stable') Architecture: a

Bug#1016456: coreutils: who default isn't -s, -s doesn't force "only name, line, and time" output

2022-07-31 Thread наб
ide it. This also contradicts the manual. Best, наб -- System Information: Debian Release: 11.4 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'stable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Lin

Bug#1017531: dash: for/while/if suppress errors from redirections with -e, POSIX violation

2022-08-17 Thread наб
nal compound-lists * Exception 3. does not apply as -e was not being ignored while the compound commands were being executed (indeed, the compound commands do not run at all, as evidenced by the program terminating) Best, наб [1]: https://salsa.debian.org/glibc-team/glibc/-/merge_requests

Bug#1017569: urlview: Mangles non-ASCII URLs for display

2022-08-17 Thread наб
1 https://example.com/a�~@~] I've narrowed it down to being linked to narrow-character ncurses(??) and am attaching a patch (based on current Salsa) and have opened https://salsa.debian.org/debian/urlview/-/merge_requests/3 Best, наб -- System Information: Debian Release: 11.4 APT pref

Bug#1011284: popularity-contest: d/postinst: remove bash dependency, fix shellcheck

2022-08-01 Thread наб
-n1 -r0-$top_of_mod_range. Best, наб From d46fe12c6161f3329c933514b1ac89c3c5e783da Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=D0=BD=D0=B0=D0=B1?= Date: Thu, 19 May 2022 16:52:23 +0200 Subject: [PATCH v3 1/2] Use shuf instead of bash to generate random numbers in d/postinst X-Mutt-PGP: OS

Bug#805357: cups-pdf: Print job with multiple input files doesn't work

2022-08-06 Thread наб
? Or is this some aspect of this postscript that explodes it both ways? Please advise. Best, наб p1-20.ps.Z Description: Binary data signature.asc Description: PGP signature

Bug#1026977: coreutils: wc: -c optimisation brokenly doesn't consume the input

2022-12-25 Thread наб
I think Just Wrong as well, but I'm not chasing this down in POSIX today. Trivially, just lseek(0, 0, SEEK_END) in this case. Best, наб -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (x86_64) Foreign Architectures: a

Bug#1026872: menu: READMEs mention /usr/share/menu/default, which doesn't exist, as documentation

2022-12-22 Thread наб
-- $ zgrep usr/share/menu/default Contents-all.gz Contents-amd64.gz -- >8 -- so? idk Best, наб -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (x86_64) Foreign Architectures: amd64, i386 Kernel: Linux 6.0.0-6-am

Bug#1027041: linux-perf: perf version blank in sid, correct in bullseye

2022-12-26 Thread наб
. -- >8 -- Which is apparently in v6.1-rc1; that, OTOH, cites commit 7572733b84997d23077ebd852703055034b7a1d2 ("perf tools: Fix version kernel tag"), first seen in v5.18-rc1, so the time-line works out. This probably means this will be fixed, no intervention required, by the 6.1 kernel. Please veri

Bug#1027101: coreutils: wc: -c no longer optimises to st_size for regular files

2022-12-28 Thread наб
Control: retitle -1 coreutils: wc: -c st_size optimisation broken for files larger than max(size_t) Hi! On Wed, Dec 28, 2022 at 01:31:12PM +, Pádraig Brady wrote: > On 27/12/2022 19:38, наб wrote: > > To repro this, run truncate -s 2E a, then wc -c a; > > this comp

Bug#1027100: coreutils: wc: total overflows unchecked

2022-12-28 Thread наб
Hi! On Wed, Dec 28, 2022 at 01:38:00PM +, Pádraig Brady wrote: > On 27/12/2022 19:31, наб wrote: > It's a good point. > We might just output ERR or NAN or something > in place of a total value in the overflow case. Given that you can't process that file as anything other than

Bug#1027413: coreutils: shuf: -i forbids 2^64-1/2^32-1, max value is ...-2?

2022-12-30 Thread наб
rse on ILP32 platforms given #1027412; if this were just one off the end of 2^64, eh, who cares. Best, наб -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (x86_64) Foreign Architectures: amd64, i386 Kernel: Linux 6.0.0-6-amd64

Bug#1027412: coreutils: shuf: -i EOVERFLOW when speccing either side of the range >2^32 (ILP32 only: limited to size_t?!?)

2022-12-30 Thread наб
he data type to be bigger. The manual says nothing of this. наб -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (x86_64) Foreign Architectures: amd64, i386 Kernel: Linux 6.0.0-6-amd64 (SMP w/2 CPU threads; PREEMPT) Kernel

Bug#1027447: qemu: path to qemu-bridge-helper broken in qemu-system-* manuals

2022-12-31 Thread наб
And, well, if the default executable is /path/to/qemu-bridge-helper then it's broken, because that's /usr/lib/qemu/qemu-bridge-helper, according to dpkg -S. If it's not then the manual's broken, because it doesn't match the actual path. Best, наб -- System Information: Debian Release: 11.6 APT pref

Bug#1028002: dash: sid dash globs no longer allow [^...] to negate a class; upcoming breaking change from bullseye

2023-01-05 Thread наб
lseye, and quite an insidious one. I assume my reaction is gonna mirror others' quite well. /Please/ add this to the NEWS. Thanks, наб -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (x86_64) Foreign Archi

Bug#1028057: /usr/share/man/man1/cpio.1.gz: Stray и in manual

2023-01-06 Thread наб
all to enable them, trun‐ cate, to enable warnings about field truncation, and no-truncate, to disable them. Multiple -W options accumulate. -- >8 -- Dunno what that's doing there, it appears to serve no grammatical function. Best, наб -- System Infor

Bug#1028002: dash: sid dash globs no longer allow [^...] to negate a class; upcoming breaking change from bullseye

2023-01-06 Thread наб
Hi! On Fri, Jan 06, 2023 at 10:52:31AM +0100, Andrej Shadura wrote: > On Thu, 5 Jan 2023, at 21:32, наб wrote: > > Bisecting over the upstream git, I got > > commit 8f9cca055bc661c4c690a5f5e1ca71370d129bc3 (HEAD, refs/bisect/bad) > > Author: Herbert Xu > > Date:

Bug#975326: dash: inconsistency between ulimit -r and ulimit -a

2023-01-05 Thread наб
Control: tags -1 + fixed-upstream Fixed in https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=4bdefd16c6ea4b5b7c2b4dc2fccf5226401e13b7 наб signature.asc Description: PGP signature

Bug#975325: dash(1) man page: ulimit documentation is inconsistent and out-of-date

2023-01-05 Thread наб
Control: tags -1 + fixed-upstream Fixed in https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=c3b97c70d8ffec83122caf2bfd0489380610217c The message references the wrong Bebian bug; mea culpa. наб signature.asc Description: PGP signature

Bug#558607: dash: jobs builtin is missing in manpage

2023-01-05 Thread наб
kill : https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=447bcdca000f218d56c6a6c5ef610e5d61a917cb false: https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=2beac674c4862a7129eca3a8cb7d27cee7ff667b наб signature.asc Description: PGP signature

Bug#819829: dash: "hash: Illegal option -v"

2023-01-05 Thread наб
Control: tags -1 + fixed-upstream Fixed in https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=8dbbff647de1e3a1510866fa1ec983c3b88f432c наб signature.asc Description: PGP signature

Bug#1028203: dash: accepts anything as an alias name and doesn't quote it, then eval $(alias) will run alias as code

2023-01-09 Thread наб
On Sun, Jan 08, 2023 at 02:38:48PM +0100, наб wrote: > This new-found bug (-2 if i got my headers right) has been fixed in: > > https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=4ec545e8dc98a3f461cf56bed03adafa81c64aec The fix itself has been fixed in: https://git.kerne

Bug#966156: dash -n: stack overflow on long sequence of backticks

2023-01-08 Thread наб
Control: tags -1 + fixed-upstream Fixed this series (v3 in forwarded-to thread): https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=d89761b0e1652e212e9354fd3c96f977de873a06 https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=f96ec8765cf37eb0c222a563de2f767ebfbf56db наб

Bug#758542: dash: defining an alias with a backslash should return an error

2023-01-08 Thread наб
Control: clone -1 -2 Control: retitle -2 dash: accepts anything as an alias name and doesn't quote it, then eval $(alias) will run alias as code Control: tags -2 - wontfix Control: tags -2 + fixed-upstream On Sat, Dec 17, 2022 at 08:11:57PM +0100, наб wrote: > Indeed; escaping of any k

Bug#862907: dash: Incorrectly slurps script from stdin (POSIX compliance issue)

2023-01-08 Thread наб
Control: tags -1 + fixed-upstream Turns out it was /not/ a one-line fix, since it exposed a lot of other latent bugs; either way, fixed upstream in this series: https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=07cad228ae4d1567aeb6d13d2af83d0a28d13b67

Bug#870317: dash: "type" doesn't threat "--" specially (POSIX compliance issue)

2023-01-08 Thread наб
, only fixed to be consistent, since "dash doesn't claim compatibility with XSI", and type is XSI-shaded наб signature.asc Description: PGP signature

Bug#1027442: coreutils: stty: soft-wrapping broken, wraps to cols+1

2022-12-31 Thread наб
bf:8a3b:3:1c:7f:15:4:0:1:0:11:13:1a:0:12:f:17:16:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 Best, наб -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (x86_64) Foreign Architectures: amd64, i386 Kernel: Linux 6.0.0-6-amd64 (SMP w/2

Bug#1027101: coreutils: wc: -c no longer optimises to st_size for regular files

2022-12-27 Thread наб
Package: coreutils Version: 9.1-1 Severity: normal Dear Maintainer, This is a regression against 8.32-4+b1 (bullseye). To repro this, run truncate -s 2E a, then wc -c a; this completes instantly on bullseye and spins in a read(2) loop on sid. Found as part of #1027100. Best, наб -- System

Bug#1027100: coreutils: wc: total overflows unchecked

2022-12-27 Thread наб
c 9 2305843009213693952 a 1 18446744073709551615 total $ wc -c a a a a a a a a a a | uniq -c 10 2305843009213693952 a 1 18446744073709551615 total -- >8 -- Which is just about the best solution here, since this is hardly a common occurrence. Best, наб -- System Information: Debian Release

Bug#1025342: coreutils: paste tokenises -d on bytes, not characters, contrary to POSIX

2022-12-02 Thread наб
8f 63 d1 64 0a |a.b.c.d.| 0008 -- >8 -- ? наб -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (x86_64) Foreign Architectures: amd64, i386 Kernel: Linux 6.0.0-2-amd64 (SMP w/2 CPU threads; PREEMPT)

Bug#992592: lightdm fails to start after update to bullseye (missing '/var/lib/lightdm/data')

2022-12-06 Thread наб
it. Adding just the latter to the presumably-run-by-the-postinst bit may've worked as well, but we were hardly in a clinical environment. Best, наб signature.asc Description: PGP signature

Bug#920644: ash: consider the removal of the ash package

2022-12-14 Thread наб
-Sources: http://deb.debian.org/debian-ports sid/main x32 Packages So the Suggests: on ash can just be dropped there, I'll post a patch. May it make sense to get rid of the ash package for bullseye+2? Best, наб signature.asc Description: PGP signature

Bug#1026096: parallel: Please revert the Suggests: ash stanza

2022-12-14 Thread наб
ash, and this appears to have been added recently with no comment (6b67dfb1b7b0d32e7f537d1d39b78c3ecc55f0ba). Patch that removes the Suggests:, based on current Salsa, below. Cf. #920644. Best, наб -- System Information: Debian Release: 11.5 APT prefers stable-updates APT policy: (500, 'stable-upda

Bug#1021418: builtin: echo: Treat -n as a string

2022-12-15 Thread наб
f %s\n, for echo -n use printf %s, for SysIII-style echo-with-escapes use printf %b\n (or convert to a native printf expression). The only thing echo makes sense for is to Just Write A New-Line if you don't give it arguments, and even then… наб signature.asc Description: PGP signature

Bug#975326: dash: inconsistency between ulimit -r and ulimit -a

2022-12-16 Thread наб
-to. наб signature.asc Description: PGP signature

Bug#850202: dash: test with multiple conditions cannot handle variable whose expanded value is same as an operator

2022-12-17 Thread наб
es where maximal portability is of concern, replace: test expr1 -a expr2 with: test expr1 && test expr2 and replace: test expr1 -o expr2 with: test expr1 || test expr2 but note that, in test, -a has higher precedence than -o while "&&" and "||" have equal precedence in the shell. Parentheses or braces can be used in the shell command language to effect grouping. Parentheses must be escaped when using sh; for example: test \( expr1 -a expr2 \) -o expr3 This command is not always portable even on XSI-conformant systems depending on the expressions specified by expr1, expr2, and expr3. The following form can be used instead: ( test expr1 && test expr2 ) || test expr3 Best, наб signature.asc Description: PGP signature

Bug#975325: dash(1) man page: ulimit documentation is inconsistent and out-of-date

2022-12-17 Thread наб
tation fix for ulimit -w (and the synopsis), archived at forwarded-to. Those are the only mis-match problems with ulimit, AFAICT at least. наб signature.asc Description: PGP signature

Bug#558607: dash: jobs builtin is missing in manpage

2022-12-14 Thread наб
/a54b9dea2b316ef9f5749cbde95417a2bad7a4d1.1651788702.git.nabijaczlew...@nabijaczleweli.xyz/t/ and have just re-sent it alongside some new patches, archived at forwarded-to. наб signature.asc Description: PGP signature

Bug#758542: dash: defining an alias with a backslash should return an error

2022-12-17 Thread наб
s: a'b: invalid name alias: ls: invalid name and commit no aliases. наб signature.asc Description: PGP signature

Bug#1026340: bash: brace ({a..z}) expansion uninterruptible

2022-12-18 Thread наб
not/ interrupt this expansion, be it with intr or quit. I killed bash from another teletype when it threatened to start evicting my caches when it reached 80G RSS. Please make brace expansion interruptible. Best, наб -- System Information: Debian Release: 11.6 APT prefers stable-updates APT

Bug#758542: dash: defining an alias with a backslash should return an error

2022-12-19 Thread наб
compatible with ksh93 and bash, but compatible with zsh in this regard. Seeing as this is an extension to POSIX (which requires that the name matches [a-zA-Z0-9_!%,@]+), both approaches are valid. Tentatively tagging as wontfix, maybe Andrej will want to pull that in as a patch, but upstream has s

Bug#920644: ash: consider the removal of the ash package

2022-12-19 Thread наб
Control: block -1 by 1026096 parallel 20221122+ds-2 was just uploaded, removing Suggests: ash; no other ash dependencies remain in the archive. наб signature.asc Description: PGP signature

Bug#758542: dash: defining an alias with a backslash should return an error

2022-12-19 Thread наб
Hi! On Mon, Dec 19, 2022 at 11:29:36PM +0100, Vincent Lefevre wrote: > On 2022-12-19 22:58:44 +0100, наб wrote: > > This makes dash, as you note, incompatible with ksh93 and bash, > > but compatible with zsh in this regard. Seeing as this is an extension > > to POSIX (which r

Bug#758542: dash: defining an alias with a backslash should return an error

2022-12-19 Thread наб
Hi! On Tue, Dec 20, 2022 at 01:09:47AM +0100, Vincent Lefevre wrote: > On 2022-12-19 23:46:48 +0100, наб wrote: > > As in one /can/ accept anything in the name (XBD, 3.10 Alias Name), > > but /must not/ expand aliases when the word is in any way quoted. > I would say that

Bug#966156: dash -n: stack overflow on long sequence of backticks

2022-12-14 Thread наб
@, archived at forwarded-to. наб signature.asc Description: PGP signature

Bug#862907: dash: Incorrectly slurps script from stdin (POSIX compliance issue)

2022-12-13 Thread наб
Control: forwarded -1 https://lore.kernel.org/dash/20221213221732.6mvv22u7ktdoz...@tarta.nabijaczleweli.xyz/t/ Looks like a trivial one-line fix to, quite literally, read with count=1 if reading from the standard input stream; patch posted to dash@, archived at forwarded-to. наб signature.asc

Bug#985478: dash: unset OPTIND returns 2 (Illegal number)

2022-12-13 Thread наб
Control: tags -1 + upstream Control: forwarded -1 https://lore.kernel.org/dash/20221214023130.u7pn4ca6ma4ku...@tarta.nabijaczleweli.xyz/t/ Patch posted to dash@, archived at forwarded-to. наб signature.asc Description: PGP signature

Bug#819829: dash: "hash: Illegal option -v"

2022-12-13 Thread наб
any/ value of anything, is equivalent to "hash -r". I've posted a patch to dash@, archived at forwarded-to, which also removes the -v documentation (it doesn't appear to have ever existed, at least insofar as git reaches). наб signature.asc Description: PGP signature

Bug#1024635: dash: segfaults during runtime when executing a script with invalid syntax

2022-12-13 Thread наб
suffer from this bug. наб signature.asc Description: PGP signature

Bug#870317: dash: "type" doesn't threat "--" specially (POSIX compliance issue)

2022-12-13 Thread наб
-to. наб signature.asc Description: PGP signature

Bug#1017531: dash: for/while/if suppress errors from redirections with -e, POSIX violation

2022-12-13 Thread наб
/utils/dash/dash.git/diff/?id=dcf4ee38025a06e7392063f02f37afc0c08e0e2f^=4bbf8721a3ac6401ced6a0454956801f6ba37256 The release includes a bunch of fixes, incl. for this bug. Please consider pulling it in. наб signature.asc Description: PGP signature

Bug#1017531: dash: for/while/if suppress errors from redirections with -e, POSIX violation

2022-12-07 Thread наб
tags 1017531 + fixed-upstream thanks Fixed in upstream commit https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=f42ee97f9e6fa15b7b6d85bb2faace4cadc1613e (and possibly the previous one?), part of the first batch since september of last year. наб signature.asc Description: PGP

Bug#1024158: bash: Please fix d/control pointing to ancient bazaar repository(?)

2022-11-15 Thread наб
. - Under certain circumstances, bash attempts to expand variables in -- >8 -- Which means that this is very much not the current state of the package. It'd be great if the d/control fields were updated to point to the current VCS. Thanks, наб -- System Information: Debian Release:

Bug#1025214: dkms: --environment-overrides causes several module build failures

2022-11-30 Thread наб
-dkms+bbswitch-dkms+adv-17v35x-dkms_installed=on_percent=on_legend=on_ticks=on_date=_date=_date=_fmt=%25Y-%25m=1 :) At least it didn't migrate to testing. наб signature.asc Description: PGP signature

Bug#1029119: coreutils: csplit: makes an empty file when an expression goes backwards, must error per POSIX

2023-01-17 Thread наб
-- >8 -- Best, наб -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (x86_64) Foreign Architectures: amd64, i386 Kernel: Linux 6.0.0-6-amd64 (SMP w/2 CPU threads; PREEMPT) Kernel taint flags: TAINT_PROPRIETARY_MODULE

Bug#1029120: coreutils: csplit: handles {*} repetitions inconsistently

2023-01-17 Thread наб
*}repeat the previous pattern as many times as possible but then inconsistently uses it as 88{∞} /10/1 {until no more matches} Best, наб -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (x86_64) Foreign Architectures:

Bug#1029220: coreutils: csplit: expr with lookbehind loses lines vs equivalent no-offset construct

2023-01-19 Thread наб
9 10 ... 29 ==> xx02 <== 30 ... 94 ==> xx03 <== 95 ==> xx04 <== 96 ==> xx05 <== 100 101 102 103 104 105 106 107 108 109 ==> xx06 <== 110 ... 999 -- >8 -- So, again, this appears to be lookbehind rearing its filthy head again. Best, наб ¹ I don't think this is

Bug#1029220: coreutils: csplit: expr with lookbehind loses lines vs equivalent no-offset construct

2023-01-19 Thread наб
=> xx01 <== 100 101 102 103 104 105 106 107 108 109 110 -- >8 -- Additionally to the triviality of this observation, NetBSD agrees with my assessment. Best, наб -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (

Bug#1029335: coreutils: csplit: regexes don't match literal newline at the end, must do so per POSIX and for portability

2023-01-21 Thread наб
/rejects/ the portable spelling! $ seq 9 | csplit - '/8 /' csplit: ‘/8\n/’: match not found 18 which is wrong. наб -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (x86_64) Foreign Architectures: amd64, i386 Kernel

Bug#971068: Assertion failure in i915 intel_display.c#assert_plane() after resume from hibernation

2023-01-24 Thread наб
Booted with both, hibernated, resumed; full dmesg below. Best, -- >8 -- [0.00] Linux version 6.1.0-2-686-pae (debian-ker...@lists.debian.org) (gcc-12 (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40) #1 SMP PREEMPT_DYNAMIC Debian 6.1.7-1 (2023-01-18) [0.00]

Bug#1030091: bluez-tools: bt-obex -s yields "GLib-CRITICAL" errors, works fine otherwise

2023-01-30 Thread наб
ion 'old_value > 0' failed -- >8 -- It did Just Work tho, so idk. Maybe it's not /that/ critical. Best, наб -- System Information: Debian Release: bookworm/sid APT prefers unstable-debug APT policy: (500, 'unstable-debug'), (500, 'unstable') Architecture: amd64 (x86_64) Foreign Arch

Bug#1030091: bluez-tools: bt-obex -s yields "GLib-CRITICAL" errors, works fine otherwise

2023-01-30 Thread наб
d: Method "ChangeFolder" with signature "s" on interface "org.bluez.obex.FileTransfer" doesn't exist > -- >8 -- наб signature.asc Description: PGP signature

Bug#858496: obexftp: broken symlinks: /usr/share/man/man1/obex{rm, put, ls, get}.1.gz -> obexftp.1.gz

2023-01-30 Thread наб
directory -- >8 -- Best, наб signature.asc Description: PGP signature

Bug#1029925: nut-monitor: exits by SIGABRTing

2023-01-28 Thread наб
m on a relatively normal set-up; happy to test whatever, but neither python nor qt are my preferred brand of poison, so dunno what I'd start with. Best, наб -- System Information: Debian Release: 11.6 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-sec

Bug#1027867: Unable to run X server since 22.3.1-1 upgrade

2023-01-28 Thread наб
On Wed, Jan 18, 2023 at 10:25:38AM +0100, Fabio Pedretti wrote: > Can you check with 22.3.3-1 (now in testing) or 23.0.0~rc1-1 (in > experimental) if the issue is fixed or still not? Same error with 23.0.0~rc1-1; log below. Best, наб [19.585] (--) Log file renamed from "/var/lib/

Bug#1029103: coreutils: csplit: -z misdocumented

2023-01-17 Thread наб
; printf '%s\n' q w e r t | csplit -z - 1 4) 6 4 $ find z z z/xx01 z/xx00 $ head z/* ==> z/xx00 <== q w e ==> z/xx01 <== r t -- >8 -- Hm. Smells to me like the empty sexions are just ignored entirely not removed afterward. наб -- System Information: Debian Release: bookwor

Bug#971068: linux-image-5.8.0-2-686-pae: Assertion failure in i915 intel_display.c#assert_plane() after resume from hibernation

2023-01-22 Thread наб
Control: found -1 6.1.7-1 Can repro on the sid kernel, uname -a of Linux nabtop 6.1.0-2-686-pae #1 SMP PREEMPT_DYNAMIC Debian 6.1.7-1 (2023-01-18) i686 GNU/Linux Log below. Backtrace is only trivially different. Best, наб -- >8 -- Jan 22 14:06:46 nabtop kernel: OOM killer disabled. Jan

Bug#1029413: dracut: no-argument lsinitrd broken (says "the default image '' cannot be accessed!")

2023-01-22 Thread наб
mfs. Same as --unpack, but only unpack files from early cpio part. -v, --verbose unpack verbosely. -k, --kver inspect the initramfs of . -- >8 -- All those images were autogenerated; this works on bullseye. наб -- System Information: Debian Release: bookworm/sid

Bug#1029264: coreutils: csplit: /regex/+1 matches past the end of the file?

2023-01-20 Thread наб
Package: coreutils Version: 9.1-1 Severity: normal Dear Maintainer, Given the following (or any Debian changelog, really; I've annotated this one with line numbers tho): -- >8 -- tzpfms (0.3.2-1~bpo11) bullseye; urgency=medium 1 2 * Rebuild for bullseye. 3 4 --

Bug#1023475: isc-dhcp-server: dhcp-lease-list(8), FILES says /var/lib/dhcp3/dhcpd.leases; dhcp.leases(5) notes the correct /var/lib/dhcp/dhcpd.leases

2022-11-04 Thread наб
shows /var/lib/dhcp/dhcpd.leases. Best, наб -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (x86_64) Foreign Architectures: amd64, i386 Kernel: Linux 6.0.0-2-amd64 (SMP w/2 CPU threads; PREEMPT) Kernel taint flags

Bug#1023777: fontforge: Setting fontforge.font.bitmapSizes broken/impossible?

2022-11-09 Thread наб
ile "", line 1, in SystemError: new style getargs format but argument is not a tuple >>> -- >8 -- This makes the (-nox) package useless. Best, наб -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (x86_

Bug#1033206: Subject: in submit@ mails is /always/ changed before forwarding, but not re-DKIM-signed ‒ please add ARC signatures?

2023-03-19 Thread наб
‒ instead of overriding/stripping the original DKIM signature, it appends new signatures for the updated mail. Please consider this or some other solution to bugs.d.o distributing counterfeit mail with broken signatures. Best, наб --- Begin Message --- A message claiming to be from you

Bug#826596: bsdutils: wall, write unable to handle UTF-8 characters.

2023-03-17 Thread наб
Control: tags -1 + fixed-upstream Fixed in upstream https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=aa13246a1bf1be9e4f6eb331f4d4d2dbc875e22f signature.asc Description: PGP signature

Bug#1033172: /usr/bin/sieve-test: panicks, dumps backtrace, aborts, when mail-file not seekable

2023-03-18 Thread наб
[0x565a0013] Aborted Probably not what you want, is it. Best, наб -- Package-specific info: -- System Information: Debian Release: 12.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (x86_64) Foreign Architectures: amd64, i386 Kernel: Linux 6.1.0-2-amd64 (

Bug#826596: bsdutils: wall, write unable to handle UTF-8 characters.

2023-03-14 Thread наб
bar' | write nabijaczleweli pts/5 Message from nabijaczleweli@tarta on pts/5 at 20:29 ... foo \303\245\303\244\303\266 \304\205\304\231\304\207\305\272\305\274\305\204 bar EOF -- >8 -- наб signature.asc Description: PGP signature

Bug#826596: bsdutils: wall, write unable to handle UTF-8 characters.

2023-03-14 Thread наб
... foo åäö ąęćźżń bar EOF $ echo 'foo åäö ąęćźżń bar' | wall Broadcast message from nabijaczleweli@tarta (pts/4) (Tue Mar 14 23:06:57 2023): foo åäö ąęćźżń bar наб signature.asc Description: PGP signature

Bug#1033346: postfix: default master.cf bsmtp service vulnerable to allow_min_user injection out-of-box

2023-03-22 Thread наб
Package: postfix Version: 3.5.17-0+deb11u1 Version: 3.7.4-2 Severity: normal Tags: upstream patch Dear Maintainer, Please see patch, below, for more info. Best, наб -- System Information: Debian Release: 11.6 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable

Bug#1033423: lynx: Status line stuck on "HTTP/1.1 200 OK", body not rendered, no input accepted when receiving a specifically-formatted response

2023-03-24 Thread наб
F68746D6C0D0A5472616E736665722D456E636F64696E673A206368756E6B65640D0A0D0A33350D0A3C6D65746120636861727365743D7574662D383E3C7469746C653E657370333270736B6F3C2F7469746C653E43757272656E743A200D0A340D0A444F574E0D0A34330D0A3C6272202F3E3C666F726D206D6574686F643D706F73743E3C6C6162656C3E4E65773A203C696E70757420747970653D636865636B626F78206E616D653D76616C75650D0A32640D0A3E3C2F6C6162656C3E3C696E70757420747970653D7375626D69742076616C75653D5365743E3C2F666F726D3E0D0A300D0A0D0A | base16 -d | nc -lp 8000 and open localhost:8000, for a cheaper r

Bug#1030200: linux-image-6.1.0-3-amd64: "Loading of module with unavailable key is rejected", /proc/keys says key is loaded; system unbootable

2023-03-24 Thread наб
, it shouldn't) change anything if you aren't a MOK user, and I'm not. Please advise. наб signature.asc Description: PGP signature

Bug#1030200: linux-image-6.1.0-3-amd64: "Loading of module with unavailable key is rejected", /proc/keys says key is loaded; system unbootable

2023-03-24 Thread наб
Control: found -1 6.1.20-1 Updated to linux-image-6.1.0-7-amd64 (6.1.20-1); still happens. наб Mar 25 01:38:54 babtop kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Mar 25 01:38:54 babtop kernel: Linux version 6.1.0-7-amd64 (debian-ker...@lists.debian.org) (gcc

Bug#1033477: linux: symlink in sticky directory not owned 0:0 behaves weirdly (EACCES if mode 1777, okay if 1755, )

2023-03-25 Thread наб
which initially put me onto "this is a kernel bug" rather than "this is a security tunable", I'll write a blurb there. Best, наб signature.asc Description: PGP signature

Bug#1033477: linux: symlink in sticky directory not owned 0:0 behaves weirdly (EACCES if mode 1777, okay if 1755, )

2023-03-25 Thread наб
On Sat, Mar 25, 2023 at 05:54:23PM +0100, наб wrote: > -- >8 -- > /srv# echo /srv/f > f > /srv# mkdir -m 1777 1777 > /srv# ln -s /srv/f 1777/ > /srv# chown _apt 1777/ > > /srv$ cat 1777/f > cat: 1777/f: Permission denied > /srv$ cat f > /srv/f > -

Bug#1033477: linux: symlink in sticky directory not owned 0:0 behaves weirdly (EACCES if mode 1777, okay if 1755, )

2023-03-25 Thread наб
cat also succeeds. Naturally, it should succeed in every scenario. Best, наб -- System Information: Debian Release: 12.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (x86_64) Foreign Architectures: amd64, i386 Kernel: Linux 6.1.0-2-amd64 (SMP w/2 CPU threads; PRE

Bug#1007233: nss: FTBFS on x32 architecture

2023-03-26 Thread наб
ackage, no funny options) on current sid with no hiccups. Tail of log below. Best, наб -- >8 -- Check File: debian/libnss3/usr/lib/x86_64-linux-gnux32/libnssdbm3.chk Generate an HMAC key ... Library File Size: 173560 bytes key: 32 bytes ae 74 83 c2 ce 8e 82 9a e6 a3 24 0e 71 ab 72 63

Bug#1033158: dracut-core: hard-depends kpartx, other dependencies for the modules are just recommends; please downgrade

2023-03-18 Thread наб
of multipath-tools and dmraid is part of dmraid. dmraid is a Recommends:. I don't have it installed. The module doesn't run for me: # dracut -f ... dracut: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! ... I don't want to have kpartx install

Bug#1031836: nvi: refuses to start with read-only rootfs (/var/tmp)

2023-02-23 Thread наб
>8 -- This is fatal. /No one/ can edit /anything/, it seems, until /var/tmp is made writable (be it by remounting / rw, or, indeed mounting tmpfs on /var/tmp). This should be a non-fatal warning. наб -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy

Bug#1032042: linux: gpio in falling-edge mode returns both falling /and/ rising edge events and /both/ are tagged as falling [Raspberry Pi Zero W, usb-host]

2023-02-26 Thread наб
, presumably, so idk. Please advise :) Best, наб -- Journal begins at Sun 2022-08-07 15:25:18 CEST, ends at Sun 2023-02-26 23:52:38 CET. -- Aug 07 15:25:18 ciastko-malinowe kernel: Booting Linux on physical CPU 0x0 Aug 07 15:25:18 ciastko-malinowe kernel: Linux version 6.0.0-0.deb11.6-rpi (debian

Bug#1032042: linux: gpio in falling-edge mode returns both falling /and/ rising edge events and /both/ are tagged as falling [Raspberry Pi Zero W, usb-host]

2023-02-26 Thread наб
("[used, input, pull-up, both-edges]" in lsgpio parlance) So, in short, "in usb-host mode, when subscribed to falling edges, both edges are returned, but labelled as falling" I guess? Will try to upda

Bug#1032355: systemd-boot: bootctl install/update completely broken with /boot on ZFS

2023-03-04 Thread наб
TLDR partition" and lets the installation progress normally. Please consider applying this. наб -- System Information: Debian Release: 11.6 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'stable') Architecture: amd64 (x86_64

Bug#1031836: nvi: refuses to start with read-only rootfs (/var/tmp)

2023-02-24 Thread наб
that are, well. Best, наб signature.asc Description: PGP signature

Bug#1032201: snmpd: uses chown user.group syntax

2023-03-01 Thread наб
on current Salsa HEAD (e2da187de2da19a4aa8e9520) to turn the one usage into correct user:group. Best, наб -- System Information: Debian Release: 11.6 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable-debug'), (500, 'stable') Architecture: amd64

Bug#1032200: mosquitto: leaves behind mosquitto user and group on purge

2023-03-01 Thread наб
-l mosquitto dpkg-query: no packages found matching mosquitto -- >8 -- I'm attaching a patch that fixes this, based on the debian HEAD (1ca9e5984b2); modelled off snmpd.postinst, so presumably correct. Best, наб -- System Information: Debian Release: 11.6 APT prefers stable-updates APT policy

Bug#1032200: mosquitto: leaves behind mosquitto user and group on purge

2023-03-01 Thread наб
One day I'll attach a patch when I say I am. From 67c3d7fb00b2e538d19eaa354afa51efe44dd7bf Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=D0=BD=D0=B0=D0=B1?= Date: Wed, 1 Mar 2023 14:51:03 +0100 Subject: [PATCH] Remove mosquitto UID and GID on purge X-Mutt-PGP: OS --- debian/mosquitto.postrm | 2 ++

Bug#1032138: prometheus-snmp-exporter: generator doesn't honour snmp.conf, so it misses site-specific MIBs

2023-02-28 Thread наб
't really see why I'd want to change it instead of it just using the one from the config. Best, наб ORNO-MIB can be found at https://git.sr.ht/~nabijaczleweli/ORNO-OR-WE-504-505-507-snmp/tree/03d104a05c7e6e0314f38ccf9be78dd10b5e1955/item/ORNO-MIB -- System Information: Debian Release: 11.6

Bug#1032139: snmp: snmpbulkwalk.1 mentions snmpbulkget instead of snmpbulkwalk

2023-02-28 Thread наб
Package: snmp Version: 5.9+dfsg-4+deb11u1 Version: 5.9.3+dfsg-2 Severity: minor Tags: upstream patch Dear Maintainer, I couldn't for the life of me find where I'd post this, so I trust you understand upstream's link jungle and can forward this in my stead. Thanks, наб -- System Information

Bug#1032138: prometheus-snmp-exporter: generator doesn't honour snmp.conf, so it misses site-specific MIBs

2023-03-01 Thread наб
m is x32, which you don't build for, apparently. But from what I'd gotten out of the config I did manage to generate, p-s-e is not the right tool for my use-case, so it doesn't really matter either way. Best, наб signature.asc Description: PGP signature

<    1   2   3   4   5   6   >