nrar to show me the 404).
My report concerns the Debian Manpages FAQ with canonical URL
https://manpages.debian.org/faq.html
(at least I hope that's the canonical URL!)
Best,
наб
signature.asc
Description: PGP signature
Hi!
On Thu, Oct 13, 2022 at 02:52:21PM +0200, Joost van Baal-Ilić wrote:
> On Thu, Oct 13, 2022 at 02:15:56PM +0200, наб wrote:
> > On Thu, Oct 13, 2022 at 01:55:42PM +0200, Joost van Baal-Ilić wrote:
> > > https://dyn.manpages.debian.org/faq.html redirects h
(in groff and 4.4BSD)
but Oo and Oc don't (likewise),
so this reads to me like compensation for like deficient font metrics
on the phototypesetters of yore? or something?
It'd be great if you could consider dropping them :)
Best,
наб
-- System Information:
Debian Release: 11.5
APT prefers stable
Now it's attached.
--- dracut-056.orig/modules.d/90kernel-modules/module-setup.sh
+++ dracut-056/modules.d/90kernel-modules/module-setup.sh
@@ -5,16 +5,6 @@ installkernel() {
local
racter
> following the single-quote or double-quote.
Compare printf.1:
[no data (??)]
Best,
наб
-- System Information:
Debian Release: 11.4
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500,
'stable-debug'), (500, 'stable')
Architecture: a
ide it.
This also contradicts the manual.
Best,
наб
-- System Information:
Debian Release: 11.4
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500,
'stable-debug'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Lin
nal compound-lists
* Exception 3. does not apply as -e was not being ignored while the
compound commands were being executed (indeed, the compound commands
do not run at all, as evidenced by the program terminating)
Best,
наб
[1]: https://salsa.debian.org/glibc-team/glibc/-/merge_requests
1 https://example.com/a�~@~]
I've narrowed it down to being linked to narrow-character ncurses(??)
and am attaching a patch (based on current Salsa) and have opened
https://salsa.debian.org/debian/urlview/-/merge_requests/3
Best,
наб
-- System Information:
Debian Release: 11.4
APT pref
-n1 -r0-$top_of_mod_range.
Best,
наб
From d46fe12c6161f3329c933514b1ac89c3c5e783da Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?=D0=BD=D0=B0=D0=B1?=
Date: Thu, 19 May 2022 16:52:23 +0200
Subject: [PATCH v3 1/2] Use shuf instead of bash to generate random numbers in
d/postinst
X-Mutt-PGP: OS
? Or is this some aspect of this
postscript that explodes it both ways? Please advise.
Best,
наб
p1-20.ps.Z
Description: Binary data
signature.asc
Description: PGP signature
I think Just Wrong as well,
but I'm not chasing this down in POSIX today.
Trivially, just lseek(0, 0, SEEK_END) in this case.
Best,
наб
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32 (x86_64)
Foreign Architectures: a
--
$ zgrep usr/share/menu/default Contents-all.gz Contents-amd64.gz
-- >8 --
so?
idk
Best,
наб
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32 (x86_64)
Foreign Architectures: amd64, i386
Kernel: Linux 6.0.0-6-am
.
-- >8 --
Which is apparently in v6.1-rc1; that, OTOH, cites commit
7572733b84997d23077ebd852703055034b7a1d2 ("perf tools: Fix version
kernel tag"), first seen in v5.18-rc1, so the time-line works out.
This probably means this will be fixed, no intervention required,
by the 6.1 kernel. Please veri
Control: retitle -1 coreutils: wc: -c st_size optimisation broken for files
larger than max(size_t)
Hi!
On Wed, Dec 28, 2022 at 01:31:12PM +, Pádraig Brady wrote:
> On 27/12/2022 19:38, наб wrote:
> > To repro this, run truncate -s 2E a, then wc -c a;
> > this comp
Hi!
On Wed, Dec 28, 2022 at 01:38:00PM +, Pádraig Brady wrote:
> On 27/12/2022 19:31, наб wrote:
> It's a good point.
> We might just output ERR or NAN or something
> in place of a total value in the overflow case.
Given that you can't process that file as anything other than
rse on ILP32 platforms given #1027412;
if this were just one off the end of 2^64, eh, who cares.
Best,
наб
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32 (x86_64)
Foreign Architectures: amd64, i386
Kernel: Linux 6.0.0-6-amd64
he data type to be bigger.
The manual says nothing of this.
наб
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32 (x86_64)
Foreign Architectures: amd64, i386
Kernel: Linux 6.0.0-6-amd64 (SMP w/2 CPU threads; PREEMPT)
Kernel
And, well, if the default executable is /path/to/qemu-bridge-helper then
it's broken, because that's /usr/lib/qemu/qemu-bridge-helper,
according to dpkg -S.
If it's not then the manual's broken, because it doesn't match the
actual path.
Best,
наб
-- System Information:
Debian Release: 11.6
APT pref
lseye, and quite an insidious one.
I assume my reaction is gonna mirror others' quite well.
/Please/ add this to the NEWS.
Thanks,
наб
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32 (x86_64)
Foreign Archi
all to enable them, trun‐
cate, to enable warnings about field truncation, and
no-truncate, to disable them.
Multiple -W options accumulate.
-- >8 --
Dunno what that's doing there,
it appears to serve no grammatical function.
Best,
наб
-- System Infor
Hi!
On Fri, Jan 06, 2023 at 10:52:31AM +0100, Andrej Shadura wrote:
> On Thu, 5 Jan 2023, at 21:32, наб wrote:
> > Bisecting over the upstream git, I got
> > commit 8f9cca055bc661c4c690a5f5e1ca71370d129bc3 (HEAD, refs/bisect/bad)
> > Author: Herbert Xu
> > Date:
Control: tags -1 + fixed-upstream
Fixed in
https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=4bdefd16c6ea4b5b7c2b4dc2fccf5226401e13b7
наб
signature.asc
Description: PGP signature
Control: tags -1 + fixed-upstream
Fixed in
https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=c3b97c70d8ffec83122caf2bfd0489380610217c
The message references the wrong Bebian bug; mea culpa.
наб
signature.asc
Description: PGP signature
kill :
https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=447bcdca000f218d56c6a6c5ef610e5d61a917cb
false:
https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=2beac674c4862a7129eca3a8cb7d27cee7ff667b
наб
signature.asc
Description: PGP signature
Control: tags -1 + fixed-upstream
Fixed in
https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=8dbbff647de1e3a1510866fa1ec983c3b88f432c
наб
signature.asc
Description: PGP signature
On Sun, Jan 08, 2023 at 02:38:48PM +0100, наб wrote:
> This new-found bug (-2 if i got my headers right) has been fixed in:
>
> https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=4ec545e8dc98a3f461cf56bed03adafa81c64aec
The fix itself has been fixed in:
https://git.kerne
Control: tags -1 + fixed-upstream
Fixed this series (v3 in forwarded-to thread):
https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=d89761b0e1652e212e9354fd3c96f977de873a06
https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=f96ec8765cf37eb0c222a563de2f767ebfbf56db
наб
Control: clone -1 -2
Control: retitle -2 dash: accepts anything as an alias name and doesn't quote
it, then eval $(alias) will run alias as code
Control: tags -2 - wontfix
Control: tags -2 + fixed-upstream
On Sat, Dec 17, 2022 at 08:11:57PM +0100, наб wrote:
> Indeed; escaping of any k
Control: tags -1 + fixed-upstream
Turns out it was /not/ a one-line fix, since it exposed a lot of other
latent bugs; either way, fixed upstream in this series:
https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=07cad228ae4d1567aeb6d13d2af83d0a28d13b67
, only fixed to be consistent,
since "dash doesn't claim compatibility with XSI", and type is XSI-shaded
наб
signature.asc
Description: PGP signature
bf:8a3b:3:1c:7f:15:4:0:1:0:11:13:1a:0:12:f:17:16:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0
Best,
наб
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32 (x86_64)
Foreign Architectures: amd64, i386
Kernel: Linux 6.0.0-6-amd64 (SMP w/2
Package: coreutils
Version: 9.1-1
Severity: normal
Dear Maintainer,
This is a regression against 8.32-4+b1 (bullseye).
To repro this, run truncate -s 2E a, then wc -c a;
this completes instantly on bullseye and spins in a read(2) loop on sid.
Found as part of #1027100.
Best,
наб
-- System
c
9 2305843009213693952 a
1 18446744073709551615 total
$ wc -c a a a a a a a a a a | uniq -c
10 2305843009213693952 a
1 18446744073709551615 total
-- >8 --
Which is just about the best solution here,
since this is hardly a common occurrence.
Best,
наб
-- System Information:
Debian Release
8f 63 d1 64 0a |a.b.c.d.|
0008
-- >8 --
?
наб
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32 (x86_64)
Foreign Architectures: amd64, i386
Kernel: Linux 6.0.0-2-amd64 (SMP w/2 CPU threads; PREEMPT)
it.
Adding just the latter to the presumably-run-by-the-postinst
bit may've worked as well, but we were hardly in a clinical
environment.
Best,
наб
signature.asc
Description: PGP signature
-Sources: http://deb.debian.org/debian-ports sid/main x32 Packages
So the Suggests: on ash can just be dropped there, I'll post a patch.
May it make sense to get rid of the ash package for bullseye+2?
Best,
наб
signature.asc
Description: PGP signature
ash,
and this appears to have been added recently with no comment
(6b67dfb1b7b0d32e7f537d1d39b78c3ecc55f0ba).
Patch that removes the Suggests:, based on current Salsa, below.
Cf. #920644.
Best,
наб
-- System Information:
Debian Release: 11.5
APT prefers stable-updates
APT policy: (500, 'stable-upda
f %s\n, for echo -n use printf %s,
for SysIII-style echo-with-escapes use printf %b\n
(or convert to a native printf expression).
The only thing echo makes sense for is to Just Write A New-Line
if you don't give it arguments, and even then…
наб
signature.asc
Description: PGP signature
-to.
наб
signature.asc
Description: PGP signature
es where maximal portability
is of concern, replace:
test expr1 -a expr2
with:
test expr1 && test expr2
and replace:
test expr1 -o expr2
with:
test expr1 || test expr2
but note that, in test, -a has higher precedence than -o while "&&"
and "||" have equal precedence in the shell.
Parentheses or braces can be used in the shell command language to
effect grouping.
Parentheses must be escaped when using sh; for example:
test \( expr1 -a expr2 \) -o expr3
This command is not always portable even on XSI-conformant systems
depending on the expressions specified by expr1, expr2, and expr3. The
following form can be used instead:
( test expr1 && test expr2 ) || test expr3
Best,
наб
signature.asc
Description: PGP signature
tation fix for ulimit -w
(and the synopsis), archived at forwarded-to.
Those are the only mis-match problems with ulimit, AFAICT at least.
наб
signature.asc
Description: PGP signature
/a54b9dea2b316ef9f5749cbde95417a2bad7a4d1.1651788702.git.nabijaczlew...@nabijaczleweli.xyz/t/
and have just re-sent it alongside some new patches,
archived at forwarded-to.
наб
signature.asc
Description: PGP signature
s: a'b: invalid name
alias: ls: invalid name
and commit no aliases.
наб
signature.asc
Description: PGP signature
not/ interrupt this expansion,
be it with intr or quit. I killed bash from another teletype when it
threatened to start evicting my caches when it reached 80G RSS.
Please make brace expansion interruptible.
Best,
наб
-- System Information:
Debian Release: 11.6
APT prefers stable-updates
APT
compatible with ksh93 and bash,
but compatible with zsh in this regard. Seeing as this is an extension
to POSIX (which requires that the name matches [a-zA-Z0-9_!%,@]+),
both approaches are valid.
Tentatively tagging as wontfix, maybe Andrej will want to pull that in
as a patch, but upstream has s
Control: block -1 by 1026096
parallel 20221122+ds-2 was just uploaded, removing Suggests: ash;
no other ash dependencies remain in the archive.
наб
signature.asc
Description: PGP signature
Hi!
On Mon, Dec 19, 2022 at 11:29:36PM +0100, Vincent Lefevre wrote:
> On 2022-12-19 22:58:44 +0100, наб wrote:
> > This makes dash, as you note, incompatible with ksh93 and bash,
> > but compatible with zsh in this regard. Seeing as this is an extension
> > to POSIX (which r
Hi!
On Tue, Dec 20, 2022 at 01:09:47AM +0100, Vincent Lefevre wrote:
> On 2022-12-19 23:46:48 +0100, наб wrote:
> > As in one /can/ accept anything in the name (XBD, 3.10 Alias Name),
> > but /must not/ expand aliases when the word is in any way quoted.
> I would say that
@, archived at forwarded-to.
наб
signature.asc
Description: PGP signature
Control: forwarded -1
https://lore.kernel.org/dash/20221213221732.6mvv22u7ktdoz...@tarta.nabijaczleweli.xyz/t/
Looks like a trivial one-line fix to, quite literally,
read with count=1 if reading from the standard input stream;
patch posted to dash@, archived at forwarded-to.
наб
signature.asc
Control: tags -1 + upstream
Control: forwarded -1
https://lore.kernel.org/dash/20221214023130.u7pn4ca6ma4ku...@tarta.nabijaczleweli.xyz/t/
Patch posted to dash@, archived at forwarded-to.
наб
signature.asc
Description: PGP signature
any/ value of anything, is equivalent to "hash -r".
I've posted a patch to dash@, archived at forwarded-to,
which also removes the -v documentation
(it doesn't appear to have ever existed, at least insofar as git reaches).
наб
signature.asc
Description: PGP signature
suffer from this bug.
наб
signature.asc
Description: PGP signature
-to.
наб
signature.asc
Description: PGP signature
/utils/dash/dash.git/diff/?id=dcf4ee38025a06e7392063f02f37afc0c08e0e2f^=4bbf8721a3ac6401ced6a0454956801f6ba37256
The release includes a bunch of fixes, incl. for this bug.
Please consider pulling it in.
наб
signature.asc
Description: PGP signature
tags 1017531 + fixed-upstream
thanks
Fixed in upstream commit
https://git.kernel.org/pub/scm/utils/dash/dash.git/commit/?id=f42ee97f9e6fa15b7b6d85bb2faace4cadc1613e
(and possibly the previous one?),
part of the first batch since september of last year.
наб
signature.asc
Description: PGP
.
- Under certain circumstances, bash attempts to expand variables in
-- >8 --
Which means that this is very much not the current state of the package.
It'd be great if the d/control fields were updated to point to the
current VCS.
Thanks,
наб
-- System Information:
Debian Release:
-dkms+bbswitch-dkms+adv-17v35x-dkms_installed=on_percent=on_legend=on_ticks=on_date=_date=_date=_fmt=%25Y-%25m=1
:)
At least it didn't migrate to testing.
наб
signature.asc
Description: PGP signature
-- >8 --
Best,
наб
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32 (x86_64)
Foreign Architectures: amd64, i386
Kernel: Linux 6.0.0-6-amd64 (SMP w/2 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE
*}repeat the previous pattern as many times as possible
but then inconsistently uses it as
88{∞}
/10/1 {until no more matches}
Best,
наб
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32 (x86_64)
Foreign Architectures:
9
10
...
29
==> xx02 <==
30
...
94
==> xx03 <==
95
==> xx04 <==
96
==> xx05 <==
100
101
102
103
104
105
106
107
108
109
==> xx06 <==
110
...
999
-- >8 --
So, again, this appears to be lookbehind rearing its filthy head again.
Best,
наб
¹ I don't think this is
=> xx01 <==
100
101
102
103
104
105
106
107
108
109
110
-- >8 --
Additionally to the triviality of this observation,
NetBSD agrees with my assessment.
Best,
наб
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32 (
/rejects/ the portable spelling!
$ seq 9 | csplit - '/8
/'
csplit: ‘/8\n/’: match not found
18
which is wrong.
наб
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32 (x86_64)
Foreign Architectures: amd64, i386
Kernel
Booted with both, hibernated, resumed; full dmesg below.
Best,
-- >8 --
[0.00] Linux version 6.1.0-2-686-pae (debian-ker...@lists.debian.org)
(gcc-12 (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40) #1
SMP PREEMPT_DYNAMIC Debian 6.1.7-1 (2023-01-18)
[0.00]
ion 'old_value > 0' failed
-- >8 --
It did Just Work tho, so idk. Maybe it's not /that/ critical.
Best,
наб
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable-debug
APT policy: (500, 'unstable-debug'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Arch
d: Method "ChangeFolder"
with signature "s" on interface "org.bluez.obex.FileTransfer" doesn't exist
>
-- >8 --
наб
signature.asc
Description: PGP signature
directory
-- >8 --
Best,
наб
signature.asc
Description: PGP signature
m on a relatively normal set-up; happy to test whatever,
but neither python nor qt are my preferred brand of poison,
so dunno what I'd start with.
Best,
наб
-- System Information:
Debian Release: 11.6
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-sec
On Wed, Jan 18, 2023 at 10:25:38AM +0100, Fabio Pedretti wrote:
> Can you check with 22.3.3-1 (now in testing) or 23.0.0~rc1-1 (in
> experimental) if the issue is fixed or still not?
Same error with 23.0.0~rc1-1; log below.
Best,
наб
[19.585] (--) Log file renamed from
"/var/lib/
; printf '%s\n' q w e r t | csplit -z - 1 4)
6
4
$ find z
z
z/xx01
z/xx00
$ head z/*
==> z/xx00 <==
q
w
e
==> z/xx01 <==
r
t
-- >8 --
Hm. Smells to me like the empty sexions are just ignored entirely
not removed afterward.
наб
-- System Information:
Debian Release: bookwor
Control: found -1 6.1.7-1
Can repro on the sid kernel, uname -a of
Linux nabtop 6.1.0-2-686-pae #1 SMP PREEMPT_DYNAMIC Debian 6.1.7-1
(2023-01-18) i686 GNU/Linux
Log below. Backtrace is only trivially different.
Best,
наб
-- >8 --
Jan 22 14:06:46 nabtop kernel: OOM killer disabled.
Jan
mfs.
Same as --unpack, but only unpack files from early
cpio part.
-v, --verbose unpack verbosely.
-k, --kver inspect the initramfs of .
-- >8 --
All those images were autogenerated; this works on bullseye.
наб
-- System Information:
Debian Release: bookworm/sid
Package: coreutils
Version: 9.1-1
Severity: normal
Dear Maintainer,
Given the following (or any Debian changelog, really; I've annotated this one
with line numbers tho):
-- >8 --
tzpfms (0.3.2-1~bpo11) bullseye; urgency=medium 1
2
* Rebuild for bullseye. 3
4
--
shows /var/lib/dhcp/dhcpd.leases.
Best,
наб
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32 (x86_64)
Foreign Architectures: amd64, i386
Kernel: Linux 6.0.0-2-amd64 (SMP w/2 CPU threads; PREEMPT)
Kernel taint flags
ile "", line 1, in
SystemError: new style getargs format but argument is not a tuple
>>>
-- >8 --
This makes the (-nox) package useless.
Best,
наб
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32 (x86_
‒
instead of overriding/stripping the original DKIM signature,
it appends new signatures for the updated mail.
Please consider this or some other solution to bugs.d.o distributing
counterfeit mail with broken signatures.
Best,
наб
--- Begin Message ---
A message claiming to be from you
Control: tags -1 + fixed-upstream
Fixed in upstream
https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=aa13246a1bf1be9e4f6eb331f4d4d2dbc875e22f
signature.asc
Description: PGP signature
[0x565a0013]
Aborted
Probably not what you want, is it.
Best,
наб
-- Package-specific info:
-- System Information:
Debian Release: 12.0
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32 (x86_64)
Foreign Architectures: amd64, i386
Kernel: Linux 6.1.0-2-amd64 (
bar' | write nabijaczleweli pts/5
Message from nabijaczleweli@tarta on pts/5 at 20:29 ...
foo \303\245\303\244\303\266 \304\205\304\231\304\207\305\272\305\274\305\204
bar
EOF
-- >8 --
наб
signature.asc
Description: PGP signature
...
foo åäö ąęćźżń bar
EOF
$ echo 'foo åäö ąęćźżń bar' | wall
Broadcast message from nabijaczleweli@tarta (pts/4) (Tue Mar 14 23:06:57
2023):
foo åäö ąęćźżń bar
наб
signature.asc
Description: PGP signature
Package: postfix
Version: 3.5.17-0+deb11u1
Version: 3.7.4-2
Severity: normal
Tags: upstream patch
Dear Maintainer,
Please see patch, below, for more info.
Best,
наб
-- System Information:
Debian Release: 11.6
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable
F68746D6C0D0A5472616E736665722D456E636F64696E673A206368756E6B65640D0A0D0A33350D0A3C6D65746120636861727365743D7574662D383E3C7469746C653E657370333270736B6F3C2F7469746C653E43757272656E743A200D0A340D0A444F574E0D0A34330D0A3C6272202F3E3C666F726D206D6574686F643D706F73743E3C6C6162656C3E4E65773A203C696E70757420747970653D636865636B626F78206E616D653D76616C75650D0A32640D0A3E3C2F6C6162656C3E3C696E70757420747970653D7375626D69742076616C75653D5365743E3C2F666F726D3E0D0A300D0A0D0A
| base16 -d | nc -lp 8000
and open localhost:8000, for a cheaper r
, it shouldn't)
change anything if you aren't a MOK user, and I'm not.
Please advise.
наб
signature.asc
Description: PGP signature
Control: found -1 6.1.20-1
Updated to linux-image-6.1.0-7-amd64 (6.1.20-1);
still happens.
наб
Mar 25 01:38:54 babtop kernel: microcode: microcode updated early to revision
0xf4, date = 2022-07-31
Mar 25 01:38:54 babtop kernel: Linux version 6.1.0-7-amd64
(debian-ker...@lists.debian.org) (gcc
which initially put me onto "this is a kernel bug" rather than
"this is a security tunable", I'll write a blurb there.
Best,
наб
signature.asc
Description: PGP signature
On Sat, Mar 25, 2023 at 05:54:23PM +0100, наб wrote:
> -- >8 --
> /srv# echo /srv/f > f
> /srv# mkdir -m 1777 1777
> /srv# ln -s /srv/f 1777/
> /srv# chown _apt 1777/
>
> /srv$ cat 1777/f
> cat: 1777/f: Permission denied
> /srv$ cat f
> /srv/f
> -
cat also succeeds.
Naturally, it should succeed in every scenario.
Best,
наб
-- System Information:
Debian Release: 12.0
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: x32 (x86_64)
Foreign Architectures: amd64, i386
Kernel: Linux 6.1.0-2-amd64 (SMP w/2 CPU threads; PRE
ackage, no funny options) on current sid
with no hiccups.
Tail of log below.
Best,
наб
-- >8 --
Check File: debian/libnss3/usr/lib/x86_64-linux-gnux32/libnssdbm3.chk
Generate an HMAC key ...
Library File Size: 173560 bytes
key: 32 bytes
ae 74 83 c2 ce 8e 82 9a e6 a3
24 0e 71 ab 72 63
of multipath-tools and dmraid is part of dmraid.
dmraid is a Recommends:. I don't have it installed. The module doesn't run for
me:
# dracut -f
...
dracut: dracut module 'dmraid' will not be installed, because command
'dmraid' could not be found!
...
I don't want to have kpartx install
>8 --
This is fatal. /No one/ can edit /anything/, it seems,
until /var/tmp is made writable (be it by remounting / rw,
or, indeed mounting tmpfs on /var/tmp).
This should be a non-fatal warning.
наб
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy
, presumably, so idk. Please advise :)
Best,
наб
-- Journal begins at Sun 2022-08-07 15:25:18 CEST, ends at Sun 2023-02-26
23:52:38 CET. --
Aug 07 15:25:18 ciastko-malinowe kernel: Booting Linux on physical CPU 0x0
Aug 07 15:25:18 ciastko-malinowe kernel: Linux version 6.0.0-0.deb11.6-rpi
(debian
("[used, input, pull-up,
both-edges]" in lsgpio parlance)
So, in short, "in usb-host mode, when subscribed to falling edges,
both edges are returned, but labelled as falling" I guess?
Will try to upda
TLDR partition" and lets the installation progress normally.
Please consider applying this.
наб
-- System Information:
Debian Release: 11.6
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500,
'stable-debug'), (500, 'stable')
Architecture: amd64 (x86_64
that are, well.
Best,
наб
signature.asc
Description: PGP signature
on current Salsa HEAD (e2da187de2da19a4aa8e9520)
to turn the one usage into correct user:group.
Best,
наб
-- System Information:
Debian Release: 11.6
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500,
'stable-debug'), (500, 'stable')
Architecture: amd64
-l mosquitto
dpkg-query: no packages found matching mosquitto
-- >8 --
I'm attaching a patch that fixes this, based on the debian HEAD (1ca9e5984b2);
modelled off snmpd.postinst, so presumably correct.
Best,
наб
-- System Information:
Debian Release: 11.6
APT prefers stable-updates
APT policy
One day I'll attach a patch when I say I am.
From 67c3d7fb00b2e538d19eaa354afa51efe44dd7bf Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?=D0=BD=D0=B0=D0=B1?=
Date: Wed, 1 Mar 2023 14:51:03 +0100
Subject: [PATCH] Remove mosquitto UID and GID on purge
X-Mutt-PGP: OS
---
debian/mosquitto.postrm | 2 ++
't really see
why I'd want to change it instead of it just using the one from the config.
Best,
наб
ORNO-MIB can be found at
https://git.sr.ht/~nabijaczleweli/ORNO-OR-WE-504-505-507-snmp/tree/03d104a05c7e6e0314f38ccf9be78dd10b5e1955/item/ORNO-MIB
-- System Information:
Debian Release: 11.6
Package: snmp
Version: 5.9+dfsg-4+deb11u1
Version: 5.9.3+dfsg-2
Severity: minor
Tags: upstream patch
Dear Maintainer,
I couldn't for the life of me find where I'd post this, so I trust you
understand upstream's link jungle and can forward this in my stead.
Thanks,
наб
-- System Information
m is x32, which you
don't build for, apparently. But from what I'd gotten out of the config
I did manage to generate, p-s-e is not the right tool for my use-case,
so it doesn't really matter either way.
Best,
наб
signature.asc
Description: PGP signature
201 - 300 of 501 matches
Mail list logo