nd stop_levels are never undefined, so this additional
patch should fix the regression
make check now passes all 240 tests
thanks for the review and happy hacking! :)
>From 4a3b1e90f23792b6f640e8d9bc28c334cafce843 Mon Sep 17 00:00:00 2001
From: Trek
Date: Tue, 15 Dec 2020 20:00:18 +0100
Subjec
ully
understand the implications of removing those overwrites, so I just
moved the code before this part
the second patch is for the manpage about empty fields, that are
allowed by insserv, but probably it could be explained better
please to tell me if you need some more info or work to be done :)
On Mon, 14 Dec 2020 03:54:28 +0100
Lorenzo wrote:
> if you are searching in the source under /debian directory, the code
> that you are looking for will be written by dh-installinit in place of
> the #DEBHEPLER# placeholder, during the build of the package.
@Lorenzo oh yeah, many thanks :)
so t
On Sun, 13 Dec 2020 11:03:57 +0100
Robert Luberda wrote:
> sysstat's init.d has the following lines in /etc/init.d/sysstat
> # Default-Start: 2 3 4 5
> # Default-Stop:
> I'm not sure how empty Default-Stop is interpreted, so I've just tried
it seems to me that on empty Default-Stop the runle
On Tue, 24 Sep 2019 07:28:29 +0800
Ian Campbell wrote:
> Has anyone investigated late dynamic binding using a stub library
> which merely determines which init is running and then dlopens the
> appropriate libsystemd0 of libelogind0 library and forwards the calls
> to it?
it could be in the form
Control: tag -1 patch
this patch should fix the issue
ciao!
diff -urN a/debian/lprng.init.in b/debian/lprng.init.in
--- a/debian/lprng.init.in 2012-06-11 09:47:19.0 +0200
+++ b/debian/lprng.init.in 2019-05-17 16:54:10.750983282 +0200
@@ -106,7 +106,8 @@
;;
stop)
[ "$VERBOSE" != no
the connections you found can be blocked by changing these
configuration directives:
browser.newtabpage.enabled
security.OCSP.enabled
browser.safebrowsing.enabled
browser.safebrowsing.malware.enabled
privacy.trackingprotection.pbmode.enabled
browser.search.suggest.enabled
browser.search.update
ext
On Sun, 24 Feb 2013 16:34:32 +0100
Andreas Metzler wrote:
>relevant patches. Could you please test whether
>http://people.debian.org/~ametzler/libgcrypt11_1.5.0-3+test+2_i386.deb
>also does the trick? It just adds three patches
>(35_Avoid-dereferencing-pointer-right-after-the-end.patch
>39_Fix-se
On Sun, 24 Feb 2013 11:44:05 +0100
Andreas Metzler wrote:
>upstream has a couple of patches in in their LIBGCRYPT-1-5-BRANCH,
>would you mind checking whether the issue is fixed there?
>
>I have built binary packages for i386, and have temporarily uploaded
>them to people.debian.org.
>http://peop
you may find interesting this bug report:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640501
that was fixed downgrading libgcrypt11 to the 1.4.6-9 version from:
http://snapshot.debian.org/archive/debian/20110807T212024Z/pool/main/libg/libgcrypt11/
may be it is the same bug?
Ciao
--
To
Hi,
can you try to downgrade libgcrypt11 to the version 1.4.6-9?
You can download it from:
http://snapshot.debian.org/archive/debian/20110807T212024Z/pool/main/libg/libgcrypt11/
this resolved a bug using claws-mail and midori with libgcrypt 1.5,
that seems to have problems with its memory manag
Hi,
can you try to downgrade libgcrypt11 to the version 1.4.6-9?
You can download it from:
http://snapshot.debian.org/archive/debian/20110807T212024Z/pool/main/libg/libgcrypt11/
this resolved a bug using claws-mail and midori with libgcrypt 1.5,
that seems to have problems with its memory manag
12 matches
Mail list logo