Bug#321497: listen is not set suid root in postinst
Package: ax25-apps Version: 0.0.6-10 Tags: patch Postinst adds an statoverride if listen should be installed suid root but does not update the actual permissions. I suggest to use the --update param to statoverride. --- postinst.orig 2005-08-05 22:05:34.270600304 +0200 +++ postinst2005-08-05 22:08:33.753314784 +0200 @@ -31,7 +31,7 @@ { # Try registering with dpkg-statoverride first if [ -x /usr/sbin/dpkg-statoverride ] ; then - /usr/sbin/dpkg-statoverride --add --force root root 4755 /usr/bin/listen + /usr/sbin/dpkg-statoverride --update --add --force root root 4755 /usr/bin/listen else # change program directly chmod 4755 /usr/bin/listen
Bug#398215: gnupg2: New upstream version 2.0.0
On Sun, Nov 12, 2006 at 03:02:35PM +0100, Michael Bienia wrote: > gnupg 2.0.0 got released on 2006-11-11. > See also > http://lists.gnupg.org/pipermail/gnupg-users/2006-November/029688.html I've created an updated package based on Ludovic Rousseau packages. You can find them on: http://www.ping.de/~dh/gnupg2/ Greetings Daniel signature.asc Description: Digital signature
Bug#400248: iceweasel: Please make "Deb Search" icon transparent
Package: iceweasel Version: 2.0+dfsg-1 Severity: wishlist Tags: patch Please make the icon of the "Deb Search" Search engine transparent, so it fits to the new background of the pulldown chooser. An patch with an replacement png for the current gif is included. TIA Daniel diff -Nur iceweasel-2.0+dfsg.orig/debian/debsearch.gif.uu iceweasel-2.0+dfsg/debian/debsearch.gif.uu --- iceweasel-2.0+dfsg.orig/debian/debsearch.gif.uu 2006-11-24 18:21:41.0 +0100 +++ iceweasel-2.0+dfsg/debian/debsearch.gif.uu 1970-01-01 01:00:00.0 +0100 @@ -1,12 +0,0 @@ -begin 644 debsearch.gif -M1TE&.#EA$``0`*4``/___^^_S]!(<,``0,@80-`H8-A@@.>[EMAIL PROTECTED] -M<[EMAIL PROTECTED]"(H.>?K\`(0._'S\@@4/??W^_/[EMAIL PROTECTED]'G]AH@/?G[^^_O_??[^^O [EMAIL PROTECTED]<,@84-A@<,@[EMAIL PROTECTED]>/K_?/W___ -M -M_R'[EMAIL PROTECTED]:"!4:&4@ [EMAIL PROTECTED](!<[EMAIL PROTECTED]@<[EMAIL PROTECTED]>"Q#R80R9%02 -M#T"`(&&22LQT>[EMAIL PROTECTED],#P?#B&$J'&(`#*U0DF!8C?&I")%R$:48("8Q&"FD- -M#F%J!A`11`.756X`FI)"&1I#&WQ4#QU,'T,1("$)(@[EMAIL PROTECTED]/B(0*D[9I)B(9 -$A$$`.P`` -` -end diff -Nur iceweasel-2.0+dfsg.orig/debian/debsearch.png.uu iceweasel-2.0+dfsg/debian/debsearch.png.uu --- iceweasel-2.0+dfsg.orig/debian/debsearch.png.uu 1970-01-01 01:00:00.0 +0100 +++ iceweasel-2.0+dfsg/debian/debsearch.png.uu 2006-11-24 19:06:12.0 +0100 @@ -0,0 +1,14 @@ +begin 644 debsearch.png +MB5!.1PT*&@[EMAIL PROTECTED]"`8```%H],_W!F)+1T0`_P#_ +M`/[EMAIL PROTECTED]:>3"7!(67,``)G*``"9R@'CD:0B!W1)344'[EMAIL PROTECTED] +M)@```7I)1$%4.,N-TL^+C6$4!_#/O:;K1]$8I5%DH6;Q%O^`#$V)Q2D+45+* +M0FHV%O84*SNEJ5F02,I2O\ +MW^_W.>?I`2GN&8T4#WH=EF!QW +MY%H-3[$UQ1KT2V.QT6["(6BT7[$WQ41UO^XDG4QQ=-01C.KWAD1]7,5E_,(2/F$'CA39#=QLM/\" +MBO$@'N-K[8NCB/JZD>%<,,RG.8J'1SH_:[_JXFUXW +K4LRF>%Z?S'K0&[EMAIL PROTECTED])14Y$KD)@@@`` +` +end diff -Nur iceweasel-2.0+dfsg.orig/debian/iceweasel.install iceweasel-2.0+dfsg/debian/iceweasel.install --- iceweasel-2.0+dfsg.orig/debian/iceweasel.install2006-11-24 18:21:41.0 +0100 +++ iceweasel-2.0+dfsg/debian/iceweasel.install 2006-11-24 19:08:21.0 +0100 @@ -29,7 +29,7 @@ debian/iceweasel.js etc/iceweasel/pref debian/iceweasel.cfg usr/lib/iceweasel -debian/debsearch.gif usr/share/iceweasel/searchplugins +debian/debsearch.png usr/share/iceweasel/searchplugins debian/debsearch.src usr/share/iceweasel/searchplugins debian/wikipedia.gif usr/share/iceweasel/searchplugins diff -Nur iceweasel-2.0+dfsg.orig/debian/rules iceweasel-2.0+dfsg/debian/rules --- iceweasel-2.0+dfsg.orig/debian/rules2006-11-24 18:21:41.0 +0100 +++ iceweasel-2.0+dfsg/debian/rules 2006-11-24 19:09:06.0 +0100 @@ -102,7 +102,7 @@ dh_testdir (cd debian && uudecode iceweasel.png.uu \ - && uudecode debsearch.gif.uu && uudecode about.png.uu) + && uudecode debsearch.png.uu && uudecode about.png.uu) cd debian && uudecode wikipedia.gif.uu if [ ! -f browser/base/branding/about.png.upstream ]; then \ mv -f browser/base/branding/about.png \ @@ -118,7 +118,7 @@ dh_testdir dh_testroot rm -f build-stamp install-stamp MPL \ - debian/iceweasel.png debian/debsearch.gif debian/about.png + debian/iceweasel.png debian/debsearch.png debian/about.png rm -f debian/wikipedia.gif mv -f browser/base/branding/about.png.upstream \ browser/base/branding/about.png || true signature.asc Description: Digital signature
Bug#297324: libvcs-perl: Missing depend on liburi-perl
Package: libvcs-perl Version: 0.14-2 Severity: normal libvcs-perl doesn't depend on liburi-perl, but does not work without. When trying to use (use vcs;) libvcs-perl while liburi-perl not installed does produce folowing message: [EMAIL PROTECTED]:~$ ./test.pl Can't locate URI.pm in @INC (@INC contains: /etc/perl /usr/local/lib/perl/5.8.4 /usr/local/share/perl/5.8.4 /usr/lib/perl5 /usr/share/perl5 /usr/lib/perl/5.8 /usr/share/perl/5.8 /usr/local/lib/site_perl) at /usr/share/perl5/VCS.pm line 10. BEGIN failed--compilation aborted at /usr/share/perl5/VCS.pm line 10. Regards Daniel Hess -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.4.28-ping1-vs1.29 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages libvcs-perl depends on: ii perl 5.8.4-6Larry Wall's Practical Extraction -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#682709: NFS4 krb5 mounts hang under nfs-utils 1.2.6-3
Hello everyone, I've been affected by this bug as well. After some further investigations I found the root cause of this bug. This bug is triggered when the client's IP address can't be mapped to an hostname. The evil part is inside rpc.mountd, which is also the only binary affected by this bug. Being unable to map the client's IP address rpc.mountd enters an error path which silently leaves the Kernels request unanswered. Waiting for an answer the Kernel does not send a response back to the client, which then keeps waiting on the NFS server. This bug was introduced between version 1.2.5 and version 1.2.6 of nfs-utils and was later fixed upstream. After bisecting through the upstream git repository I found cb3b81d6c4167ede8886115e271584a96ea55565 ([1]) to fix this bug. This very small patch can be directly applied to the Debian package version 1.2.6-3. I've therefore build a NMU including only this small change (debdiff patch attached to this Mail) and put the source and binary packages (i386+amd64) here: http://www.inf.fh-dortmund.de/~dh/debian-682709/ I would like to ask the maintainers to include this patch in Wheezy, because it fixes a regression compared to Squeeze, where this bug was not present and Kerberos enabled NFS exports worked. As the change is very small and already included in upstream's git repository, it should not cause side effects. Cheers, Daniel Links: [1]: http://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=cb3b81d6c4167ede8886115e271584a96ea55565 -- Kind regards, Daniel Heß Fachhochschule Dortmund University of Applied Sciences and Arts Daniel Heß FB Informatik, Emil-Figge-Str. 42 - D-44227 Dortmund RaumEFS 42 C.2.45 Tel +49 231 755-6761 Fax +49 231 755-6710 daniel.h...@fh-dortmund.de http://www.fh-dortmund.de/ diff -Nru nfs-utils-1.2.6/debian/changelog nfs-utils-1.2.6/debian/changelog --- nfs-utils-1.2.6/debian/changelog 2012-07-10 19:42:42.0 +0200 +++ nfs-utils-1.2.6/debian/changelog 2013-04-10 14:33:23.0 +0200 @@ -1,3 +1,11 @@ +nfs-utils (1:1.2.6-3.1) unstable; urgency=low + + * Non-maintainer upload. + * Add 20-mountd-auth_unix_ip-should-downcall-on-error-to-prev.patch to +avoid hangs on Kerberos mounts (Closes: #682709). + + -- Daniel Hess Wed, 10 Apr 2013 14:30:21 +0200 + nfs-utils (1:1.2.6-3) unstable; urgency=low * Iterate through exports.d to look for expors (Closes: #676604). diff -Nru nfs-utils-1.2.6/debian/patches/20-mountd-auth_unix_ip-should-downcall-on-error-to-prev.patch nfs-utils-1.2.6/debian/patches/20-mountd-auth_unix_ip-should-downcall-on-error-to-prev.patch --- nfs-utils-1.2.6/debian/patches/20-mountd-auth_unix_ip-should-downcall-on-error-to-prev.patch 1970-01-01 01:00:00.0 +0100 +++ nfs-utils-1.2.6/debian/patches/20-mountd-auth_unix_ip-should-downcall-on-error-to-prev.patch 2013-04-10 16:02:57.0 +0200 @@ -0,0 +1,51 @@ +From cb3b81d6c4167ede8886115e271584a96ea55565 Mon Sep 17 00:00:00 2001 +From: "J. Bruce Fields" +Date: Wed, 28 Nov 2012 09:11:29 -0500 +Subject: [PATCH] mountd: auth_unix_ip should downcall on error to prevent + hangs + +Since bf6a4febaa78bf188896b7b5b02c46562dd08b70 "mountd: handle +allocation failures in auth_unix_ip upcall", a failure to map the +address of an incoming client to a name could result in a hang. + +We should be responding with an error in the case, not just skipping the +downcall and leaving everybody hanging. + +Signed-off-by: J. Bruce Fields +Signed-off-by: Steve Dickson +--- + utils/mountd/cache.c | 11 --- + 1 file changed, 4 insertions(+), 7 deletions(-) + +diff --git a/utils/mountd/cache.c b/utils/mountd/cache.c +index e950ec6..c13f305 100644 +--- a/utils/mountd/cache.c b/utils/mountd/cache.c +@@ -109,12 +109,10 @@ static void auth_unix_ip(FILE *f) + struct addrinfo *ai = NULL; + + ai = client_resolve(tmp->ai_addr); +- if (ai == NULL) +- goto out; +- client = client_compose(ai); +- freeaddrinfo(ai); +- if (!client) +- goto out; ++ if (ai) { ++ client = client_compose(ai); ++ freeaddrinfo(ai); ++ } + } + qword_print(f, "nfsd"); + qword_print(f, ipaddr); +@@ -127,7 +125,6 @@ static void auth_unix_ip(FILE *f) + xlog(D_CALL, "auth_unix_ip: client %p '%s'", client, client?client: "DEFAULT"); + + free(client); +-out: + freeaddrinfo(tmp); + + } +-- +1.7.10.4 + diff -Nru nfs-utils-1.2.6/debian/patches/series nfs-utils-1.2.6/debian/patches/series --- nfs-utils-1.2.6/debian/patches/series 2012-07-10 19:42:42.0 +0200 +++ nfs-utils-1.2.6/debian/patches/series 2013-04-10 14:30:08.0 +0200 @@ -6,3 +6,4 @@ 17-multiarch-kerberos-paths.patch 18-osd_login-sbindir.patch 19-iscsiadm-path.patch +20-mountd-auth_unix_ip-should-downcall-on-error-to-prev.patch
Bug#528653: player: Please update package to newer upstream release
Hi there, On Mon, Jul 13, 2009 at 11:32:43AM -0500, Jamuraa wrote: > Most of the problems were copyright related. I plan to send a > message to player-dev today in order to work out the copyright issues > and hopefully get a new version approved. in the meantime Player 3.0.* was released, maybe the copyright problem was fixed there? I have checked the Player 3.0.1 source and found some files in the replace dir that might be non-free (as obviously not covered by README/COPYING files) but the rest should *imho* be ok (some files are missing their copyright header but a central place states they are GPL/LGPL/GFDL and they are only minor support scripts). While checking the source I've updated the Player package to version 3.0.1 and remove the files, that I think are not dfsg free. It's mostly the XDR stuff which is only needed on platforms, that don't have a RPC/XDR implementation. But eglibc provides one, that is used instead of the one in Player, so we would not need it anyway (and it is easy to fix upstream as Sun released the source under BSD license). You can find the updated packages here: http://www.db3ydh.de/~daniel/player/ It would be really nice to get Player back into Squeeze, maybe my packages can help you on that. TIA Daniel signature.asc Description: Digital signature
Bug#438189: seconded
Hi, I would also like to see such a ml. I think at least some of the non native English speaking teachers would prefer to not subscribe the regular debian-edu@ ml to fish the announcements out of all the english mails. TIA Daniel signature.asc Description: Digital signature
Bug#456416: linux-2.6: regression on kernel config with 2.6.23 on arm iop32x
Package: linux-2.6 Version: 2.6.23-1 Severity: important Hello, with svn revision 9706 some config options got removed from debian/config/arm/config.iop32x. This changes removed USB_NET and PPP from the config completely. Please readd this config options so PPP and USB Ethernet devices are usable again (see attached patch for what I did locally). TIA Daniel Index: arm/config.iop32x === --- arm/config.iop32x (revision 9956) +++ arm/config.iop32x (working copy) @@ -167,6 +167,16 @@ # Networking # CONFIG_NET=y +CONFIG_USB_USBNET=m +CONFIG_PPP=m +CONFIG_PPP_MULTILINK=y +CONFIG_PPP_FILTER=y +CONFIG_PPP_ASYNC=m +CONFIG_PPP_SYNC_TTY=m +CONFIG_PPP_DEFLATE=m +CONFIG_PPP_BSDCOMP=m +CONFIG_PPPOE=m +CONFIG_PPPOATM=m # # Networking options signature.asc Description: Digital signature
Bug#172562: Status request
Hello altogether, i would like to know what the current status of this bug is. As this bug is very old an still present in unstable (2.3.6-7) it would be nice to know if you're going to include Simons patch (still applies, only the filename has changed to strtod_l.c) or forward this bug to upstream. TIA Daniel -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Bug#377894: licq-plugin-qt: "OK" Button without function when creating a new profile with existing UIN
On Wed, Jul 12, 2006 at 11:31:09AM +0200, Peter Eisentraut wrote: > Am Freitag, 7. Juli 2006 00:00 schrieb David Mika: > > When creating a new profile / use Licq first - with an existing UIN the > > "OK" Button in the "Edit Account" window is wihout any function. > > I just tried it. Works fine. Have tried this too. First i was not able to reproduce the problem, but as I've seen it fail on Davids system with my own eyes i tried to reproduce it. To make a long story short, it depends on what's in our ~/.qt/qtrc file. I've reduced mine to the following: [General] style=none It does not matter what style is set to, as long it is set to something. If style is missing i can get the problem David describes. As my ~/.qt/qtrc contains a style assignment i guess something like kde had created that when i had played with it. On an other system where kde was never installed and used it is missing too. Hopes this helps to track the bug down :) - Daniel
Bug#377894: licq-plugin-qt: "OK" Button without function when creating a new profile with existing UIN
tags 377894 + patch thanks Hello, I've played with the licq source. The described problem is in the plugins/qt-gui/src/ownermanagerdlg.cpp file. If the "Ok"-button is clicked or enter is pressed in the userid or password field the OwnerEditDlg::slot_ok() method is called. To find out which protocol has been selected the method iterates thru the a list of supported protocols provided by the licq core. Every protocol has a name which is set with an QString object. To compare the protocol selected with the one current in the iteration the function strcmp is used. The first parameter it get passed is a char-pointer obtained thru cmbProtocol->currentText().latin1() earlier. The second parameter is the name used to create combo entry. Now the problem is, that with an unset style (described in last mail) the latin1() method used to create the char-pointer for the first parameter returns something strange, which is compared to the second parameter smaller (result -1). The fix for this problem is, to not convert to a char-pointer using latin1() in first place, but to use the QString-object returned by currentText() directly. The class QString provides the necessary method to do the comparison, which does succeed. A tested patch is included as attachment. Greetings - Daniel diff -Nur licq-1.3.2.orig/plugins/qt-gui/src/ownermanagerdlg.cpp licq-1.3.2/plugins/qt-gui/src/ownermanagerdlg.cpp --- licq-1.3.2.orig/plugins/qt-gui/src/ownermanagerdlg.cpp 2005-09-20 15:46:41.0 +0200 +++ licq-1.3.2/plugins/qt-gui/src/ownermanagerdlg.cpp 2006-07-18 05:12:30.0 +0200 @@ -130,7 +130,7 @@ const char *szPassword = 0; if (!edtPassword->text().isEmpty()) szPassword = edtPassword->text().latin1(); - const char *szProtocol = cmbProtocol->currentText().latin1(); + QString szProtocol = cmbProtocol->currentText(); unsigned long nPPID = 0; ProtoPluginsList pl; @@ -138,7 +138,7 @@ server->ProtoPluginList(pl); for (it = pl.begin(); it != pl.end(); it++) { -if (strcmp(szProtocol, (*it)->Name()) == 0) +if (QString::compare(szProtocol, (*it)->Name()) == 0) { nPPID = (*it)->PPID(); break; signature.asc Description: Digital signature
Bug#528653: player: Please update package to newer upstream release
Hi, I have updated the dependencies of the *-dev packages. The are more strict now and reflect inter library depends. The debdiff is attached and I have uploaded the new version to the old URL. Greetings Daniel diff -u player-2.1.2/debian/changelog player-2.1.2/debian/changelog --- player-2.1.2/debian/changelog +++ player-2.1.2/debian/changelog @@ -1,3 +1,13 @@ +player (2.1.2-0.2) unstable; urgency=low + + * Non-maintainer upload. + * Tighten depends between libplayer*-dev and libplayer* packages by +including exact version. + * Reflect changes to *.pc files in the corresponding libplayer*-dev +packages. + + -- Daniel Hess Wed, 27 May 2009 21:22:08 +0200 + player (2.1.2-0.1) unstable; urgency=low * Non-maintainer upload. diff -u player-2.1.2/debian/control player-2.1.2/debian/control --- player-2.1.2/debian/control +++ player-2.1.2/debian/control @@ -35,7 +35,7 @@ Package: robot-player-dev Architecture: all -Depends: libplayertcp2-dev, libplayerc++2-dev, libplayerdrivers2-dev +Depends: libplayertcp2-dev (>= ${source:Version}), libplayerc++2-dev (>= ${source:Version}), libplayerdrivers2-dev (>= ${source:Version}) Homepage: http://playerstage.sourceforge.net/ Description: Networked server for robots and sensors - development package Player proovides a common interface to a variety of robot and @@ -63,7 +63,7 @@ Conflicts: libplayererror-dev Section: libdevel Architecture: any -Depends: ${shlibs:Depends}, ${misc:Depends}, libplayererror2 +Depends: ${shlibs:Depends}, ${misc:Depends}, libplayererror2 (= ${binary:Version}) Homepage: http://playerstage.sourceforge.net/ Description: Networked server for robots and sensors - error handling development files Provides a network interface to a variety of robot and sensor @@ -97,7 +97,7 @@ Conflicts: libplayercore-dev Section: libdevel Architecture: any -Depends: ${shlibs:Depends}, ${misc:Depends}, libplayercore2, libplayererror2-dev +Depends: ${shlibs:Depends}, ${misc:Depends}, libplayercore2 (= ${binary:Version}), libplayererror2-dev (= ${binary:Version}), libplayerutils2-dev (= ${binary:Version}), libplayerxdr2-dev (= ${binary:Version}) Homepage: http://playerstage.sourceforge.net/ Description: Networked server for robots and sensors - core library development files Provides a network interface to a variety of robot and sensor @@ -133,7 +133,7 @@ Conflicts: libplayertcp-dev Section: libdevel Architecture: any -Depends: ${shlibs:Depends}, ${misc:Depends}, libplayertcp2, libplayercore2-dev, libplayerxdr2-dev +Depends: ${shlibs:Depends}, ${misc:Depends}, libplayertcp2 (= ${binary:Version}), libplayercore2-dev (= ${binary:Version}), libplayerxdr2-dev (= ${binary:Version}), libplayererror2-dev (= ${binary:Version}) Homepage: http://playerstage.sourceforge.net/ Description: Networked server for robots and sensors - core library development files Provides a network interface to a variety of robot and sensor @@ -168,7 +168,7 @@ Conflicts: libplayerxdr-dev Section: libdevel Architecture: any -Depends: ${shlibs:Depends}, ${misc:Depends}, libplayerxdr2, libplayererror2-dev, python +Depends: ${shlibs:Depends}, ${misc:Depends}, libplayerxdr2 (= ${binary:Version}), libplayererror2-dev (= ${binary:Version}), python Homepage: http://playerstage.sourceforge.net/ Description: Networked server for robots and sensors - xdr library development files Provides a network interface to a variety of robot and sensor @@ -202,7 +202,7 @@ Conflicts: libplayerc-dev Section: libdevel Architecture: any -Depends: ${shlibs:Depends}, ${misc:Depends}, libplayerc2, libplayerxdr2-dev +Depends: ${shlibs:Depends}, ${misc:Depends}, libplayerc2 (= ${binary:Version}), libplayerxdr2-dev (= ${binary:Version}), libplayererror2-dev (= ${binary:Version}) Homepage: http://playerstage.sourceforge.net/ Description: Networked server for robots and sensors - C client library development files Provides a network interface to a variety of robot and sensor @@ -234,7 +234,7 @@ Conflicts: libplayerc++-dev Section: libdevel Architecture: any -Depends: ${shlibs:Depends}, ${misc:Depends}, libplayerc++2, libplayerc2-dev, libboost-thread-dev, libboost-signals-dev +Depends: ${shlibs:Depends}, ${misc:Depends}, libplayerc++2 (= ${binary:Version}), libplayerc2-dev (= ${binary:Version}), libboost-thread-dev, libboost-signals-dev, libplayerxdr2-dev (= ${binary:Version}), libplayerutils2-dev (= ${binary:Version}), libplayererror2-dev (= ${binary:Version}) Homepage: http://playerstage.sourceforge.net/ Description: Networked server for robots and sensors - C++ client library development files Provides a network interface to a variety of robot and sensor @@ -267,7 +267,7 @@ Conflicts: libplayerdrivers-dev Section: libdevel Architecture: any -Depends: ${shlibs:Depends}, ${misc:Depends}, libplayerdrivers2, libplayercore2-dev, libplayerjpeg2-dev, libcv-dev, libcvaux-dev, libgsl0-dev, libdc1394-dev, libhighgui-dev +Depends: ${shlibs:Depends}, ${mis
Bug#528653: player: Please update package to newer upstream release
Hi, I've seen, that an updated version has been in the new queue, but was removed. Are there any problems with the package I can help fixing? Greetings Daniel signature.asc Description: Digital signature
Bug#528653: player: Please update package to newer upstream release
Hi, some further tests on the real hardware showed, that the 2.1.2 version of player has a regression of no longer be able to connect to a real Pioneer 3-AT robot. The problem is within the checksum code for the p2os driver and was already fixed upstream in svn revisions 7539 and 7543. I have attached the dpatch, generated out of the upstream changes, that I am currently using. Please include this two changes (maybe through the new upstream release you are asking for). TIA Daniel #! /bin/sh /usr/share/dpatch/dpatch-run ## 04-fixp2oschecksum.dpatch by ## ## All lines beginning with `## DP:' are a description of the patch. ## DP: Cherry pick upstream svn commits 7539 and 7543 to fix ## DP: checksum calculation in the p2os driver @DPATCH@ diff -Nur player-2.1.2.orig/server/drivers/mixed/p2os/packet.cc player-2.1.2/server/drivers/mixed/p2os/packet.cc --- player-2.1.2.orig/server/drivers/mixed/p2os/packet.cc 2009-01-15 19:56:08.0 +0100 +++ player-2.1.2/server/drivers/mixed/p2os/packet.cc2009-07-15 17:24:11.0 +0200 @@ -56,14 +56,10 @@ bool P2OSPacket::Check() { - short chksum; - chksum = CalcChkSum(); + unsigned short recv_chksum = static_cast (CalcChkSum() & 0x); + unsigned short pkt_chksum = (static_cast(packet[size-2]) << 8) | packet[size-1]; - if ( chksum == (packet[size-2] << 8 | packet[size-1])) -return(true); - - - return(false); + return recv_chksum == pkt_chksum; } int P2OSPacket::CalcChkSum() { @@ -136,7 +132,7 @@ } int P2OSPacket::Build( unsigned char *data, unsigned char datasize ) { - short chksum; + unsigned short chksum; size = datasize + 5; @@ -152,7 +148,7 @@ memcpy( &packet[3], data, datasize ); - chksum = CalcChkSum(); + chksum = static_cast (CalcChkSum() & 0x); packet[3+datasize] = chksum >> 8; packet[3+datasize+1] = chksum & 0xFF; signature.asc Description: Digital signature
Bug#431730: libpam-foreground: Does not differentiate between local (e.g. login or *dm) and remote (e.g. ssh) sessions
Package: libpam-foreground Version: 0.2 Severity: important Hi, when using libpam-foreground in common-session, pam_foreground does create a lockfile independently from where the user comes. This way a lockfile is also created, when the users uses ssh to login from a network host. The number of the active virtual terminal does not give any sensible informations under such condition as it reflects the virtual terminal active on the "target" system and has nothing to do with ssh. Appended is a patch which checks the pam rhost for information about local or remote connections. When coming from remote rhost will contain information about the remote host and prevents the lockfile from being created. Greetings Daniel --- libpam-foreground-0.2.orig/pam_foreground.c 2006-01-24 02:00:42.0 +0100 +++ libpam-foreground-0.2/pam_foreground.c 2007-07-03 23:49:53.415530194 +0200 @@ -76,6 +76,7 @@ struct vt_stat vtstat; size_t len; int retval; + const char *rhost=NULL; retval = pam_get_user(pamh, &user, NULL); if (retval != PAM_SUCCESS) { @@ -83,6 +84,12 @@ return retval; } + retval = pam_get_item(pamh, PAM_RHOST, (const void **)&rhost); + if (retval != PAM_SUCCESS) { + D(("get remote host returned error: %s", pam_strerror(pamh,retval))); + return retval; + } + if (stat (AUTH_DIR, &finfo)) { if (errno != ENOENT) { D(("Can't access %s - %s\n", AUTH_DIR, @@ -139,7 +146,11 @@ sprintf(filename,"%s/%s:%d",AUTH_DIR,user,console); - fd = open(filename,O_CREAT|O_WRONLY|O_EXCL,0644); + /* Only for local sessions */ + + if (rhost == NULL || *rhost == '\0') { + fd = open(filename,O_CREAT|O_WRONLY|O_EXCL,0644); + } if (fd < 1) { D(("Can't open %s - %s\n",filename,strerr(errno))); @@ -163,6 +174,7 @@ unlink(filename); free: free(filename); + free(rhost); close(fd); fail: user = NULL; signature.asc Description: Digital signature
Bug#431730: libpam-foreground: Does not differentiate between local (e.g. login or *dm) and remote (e.g. ssh) sessions
Thanks to Petter for doing a very good job on cleaning up the mess I offered him as a patch. But one last thing is not correct. While negating the logical expression in the if block I did miss the second part. Here is the correct patch: --- libpam-foreground-0.2.orig/pam_foreground.c 2006-01-24 02:00:42.0 +0100 +++ libpam-foreground-0.2/pam_foreground.c 2007-07-07 00:35:29.968989507 +0200 @@ -76,6 +76,7 @@ struct vt_stat vtstat; size_t len; int retval; + void *rhost=NULL; retval = pam_get_user(pamh, &user, NULL); if (retval != PAM_SUCCESS) { @@ -83,6 +84,17 @@ return retval; } + retval = pam_get_item(pamh, PAM_RHOST, (const void **)&rhost); + if (retval != PAM_SUCCESS) { + D(("get remote host returned error: %s", pam_strerror(pamh,retval))); + return retval; + } + + /* Skip lockfile creation when non-local */ + if (rhost != NULL && *(char *)rhost != '\0') { + return PAM_SUCCESS; + } + if (stat (AUTH_DIR, &finfo)) { if (errno != ENOENT) { D(("Can't access %s - %s\n", AUTH_DIR, signature.asc Description: Digital signature
Bug#432086: hal: On an terminal-server setup all users get KDE/Gnome popup messages about storage-devices inserted into the terminal-server
Package: hal Version: 0.5.8.1-9 Severity: wishlist Tags: patch On a system like a ltsp server all users get messages like AddDevice when someone working directly on the terminal server, even if he or she is not in the plugdev group. This will trigger popup windows on KDE/Gnome desktops even on remote users who did not inserted the volume and surly don't want to work with. Attached is a patch which solves the problem for me. Greetings Daniel --- /root/hal.conf 2007-07-03 00:36:54.0 +0200 +++ system.d/hal.conf 2007-07-03 01:10:08.0 +0200 @@ -44,6 +44,8 @@ + + @@ -52,6 +54,8 @@ + + @@ -62,6 +66,8 @@ + + @@ -71,6 +77,8 @@ + + signature.asc Description: Digital signature
Bug#547347: consolekit: Creates TAGFILES in /var/run/console for ssh connections
Package: consolekit Version: 0.3.0-4 Severity: important Tags: patch Hi, consolekit is creating tagfiles in /var/run/console on login. This tagfiles are used by dbus to check if a user is logged in locally and should be able to send some messages (for example to mount a removable device). In Debian Edu we also use the at_console check to send messages about new devices to locally logged in users only (to prevent LTSP users from being notified about devices plugged into the terminal server). In Etch we used libpam-foreground, but switched to consolekit for Lenny. Back in the Etch times libpam-foreground did not differentiate between local and remote users (see bug #431730) and consolekit does now the same. I would like to ask to extend pam-foreground-compat.ck for a check which prevents tagfile creation for remote users. See attached patch for a possible modification. TIA and kind regards, Daniel -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.30-1-686 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages consolekit depends on: ii dbus 1.2.16-2 simple interprocess messaging syst ii libc6 2.9-26GNU C Library: Shared libraries ii libck-connector0 0.3.0-4 ConsoleKit libraries ii libdbus-1-31.2.16-2 simple interprocess messaging syst ii libdbus-glib-1-2 0.82-1simple interprocess messaging syst ii libglib2.0-0 2.20.5-1 The GLib library of C routines ii libx11-6 2:1.2.2-1 X11 client-side library ii zlib1g 1:1.2.3.3.dfsg-15 compression library - runtime Versions of packages consolekit recommends: pn libpam-ck-connector(no description available) consolekit suggests no packages. -- no debconf information --- pam-foreground-compat.ck 2009-09-18 19:41:39.0 +0200 +++ /usr/lib/ConsoleKit/run-session.d/pam-foreground-compat.ck 2009-09-18 19:44:57.0 +0200 @@ -5,7 +5,7 @@ TAGFILE="$TAGDIR/`getent passwd $CK_SESSION_USER_UID | cut -f 1 -d:`" -if [ "$1" = "session_added" ]; then +if [ -z "$CK_SESSION_REMOTE_HOST_NAME" ] && [ "$1" = "session_added" ]; then mkdir -p "$TAGDIR" echo "$CK_SESSION_ID" >> "$TAGFILE" fi signature.asc Description: Digital signature
Bug#499694: localization-config: creation of '/etc/kde3/system.kdeglobals' conffile makes kpersonalizer appear
Package: localization-config Version: 1.03 Severity: important Tags: patch When running update-locale-config the config file '/etc/kde3/system.kdeglobals' is created. In this file the country and language as well as the preferred encoding is configured. Nowadays KDE find the correct values using the configured locale and configuring explicitly via '/etc/kde3/system.kdeglobals' just makes kpersonalizer popup on first login to KDE. It also configures the charset to use, which is in (almost) all cases non unicode. The charset configured is also not depending on the encoding part of the locale supplied when calling update-locale-config (e.g. not UTF-8 for de_DE.UTF-8). As Debian has switched to default to unicode before etch release I think this make this bug important. We currently test a modified version of localization-config in Debian Edu including the attached patch. If problems caused by this patch show up I'll report here. Greetings Daniel -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages localization-config depends on: ii debconf [debconf-2.0] 1.5.22 Debian configuration management sy ii libapt-pkg-perl 0.1.22+b1 Perl interface to libapt-pkg ii libconfig-inifiles-perl 2.39-5 Read .ini-style configuration file ii locales 2.7-13 GNU C Library: National Language ( ii perl-base 5.10.0-13 minimal Perl system localization-config recommends no packages. localization-config suggests no packages. -- debconf information: base-config/menu/localization-config-preinst: base-config/menu/localization-config-postinst: diff -Nur localization-config-1.03.orig/conffiles.d/kde.postinst localization-config-1.03/conffiles.d/kde.postinst --- localization-config-1.03.orig/conffiles.d/kde.postinst 2007-05-06 05:32:08.0 +0200 +++ localization-config-1.03/conffiles.d/kde.postinst 2008-09-21 12:32:44.0 +0200 @@ -19,6 +19,7 @@ my %vermap = ( '2.2.2-14.7', => { RELEASE => 'woody' }, '4:3.2.2-1', => { RELEASE => 'sarge' }, '3.5.5a.dfsg.1-6',=> { RELEASE => 'etch' }, + '4:3.5.9.dfsg.1-5',=> { RELEASE => 'lenny' }, ); # Get lang entry diff -Nur localization-config-1.03.orig/conffiles.d/lenny/kde localization-config-1.03/conffiles.d/lenny/kde --- localization-config-1.03.orig/conffiles.d/lenny/kde 1970-01-01 01:00:00.0 +0100 +++ localization-config-1.03/conffiles.d/lenny/kde 2008-09-21 12:32:44.0 +0200 @@ -0,0 +1,206 @@ +#!/usr/bin/perl +# This script configures KDE 3 +use strict; +use warnings; + +# We use postconfig() helper subroutine so we have to include +# its definition +require '/usr/lib/localization-config/common/postconfig.pl'; +require '/usr/lib/localization-config/common/langmap.pl'; +require '/usr/lib/localization-config/common/log.pl'; + +# If no locale is given as argument, quit +my $lang = $ARGV[0] or log_die("$0: No language given"); + +# The config filenames +# KDM does not honour the global KDE settings, +# we need to edit kdmrc too +my $global = '/etc/kde3/system.kdeglobals'; +my $kdmrc = '/etc/kde3/kdm/kdmrc'; + +# These are X settings -> see /usr/X11R6/lib/locale for charset names +my %lang_map = ( +#entries sorted alphabetically +'Australian'=> { 'Locale/Country' => 'au', + 'Locale/Language' => 'en', + 'Locale/Charset' => 'iso8859-1', +}, +'American (US)' => { 'Locale/Country' => 'us', + 'Locale/Language' => 'en', + 'Locale/Charset' => 'iso8859-1', + }, +'Bosnian' => { 'Locale/Country' => 'ba', +'Locale/Language' => 'bs_BA', +'Locale/Charset' => 'iso8859-2', + }, +'Brazilian' => { 'Locale/Country' => 'br', + 'Locale/Language' => 'pt_BR', + 'Locale/Charset' => 'iso8859-1', + }, +'Canadian' => { 'Locale/Country' => 'ca', + 'Locale/Language' => 'en', + 'Locale/Charset' => 'iso8859-1', + }, +'Catalan' => { 'Locale/Country' => 'es', + 'Locale/Language' => 'ca_ES', + 'Locale/Charset' => 'iso8859-15', + }, +'Danish'=> { 'Locale/Country' => 'dk', + 'Locale/Language' => 'da_DK', + 'Locale/Charset' => 'iso8859-1', + }, +'Dutch (BE)
Bug#498095: localization-config: configures kde wrong when called with de_DE.UTF-8 as language
Package: localization-config Version: 1.03 Severity: important Tags: patch When calling update-locale-config like "/usr/sbin/update-locale-config de_DE.UTF-8" KDE (as in /etc/kde3/system.kdeglobals and /etc/kde3/kdm/kdmrc) is configured for Belgium German settings ("be" as country and "de" as language). The problem is in the way the locale is mapped to the KDE language. "langmap.pl" is mapping "de_DE.UTF-8" (actually "de.*") to 'German (BE)'. As for de_DE… there is only "[EMAIL PROTECTED]" in the list and the algorithm used to determine the entry strips the original local to de.* and not "de_DE.*". To make a log story short, the "[EMAIL PROTECTED]" key in langmap.pl may be change to "de_DE.UTF-8" (as this is the locale you get when you install Debian with Germany/German settings) or even better "de_DE". This way the correct language is chosen and the algorithm to find the correct entry does not need to be modified (this short before the lenny release). This bug is important for Debian Edu/Skolelinux there localization-config is used during installation and new users would be greeted in Dutch (which happens to be the primary language for Belgium in KDE) and not German. So it would be nice if a fixed version could be uploaded to sid and be requested to get a freeze exception for lenny. Thanks in advance Greetings Daniel -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages localization-config depends on: ii debconf [debconf-2.0] 1.5.22 Debian configuration management sy ii libapt-pkg-perl 0.1.22+b1 Perl interface to libapt-pkg ii libconfig-inifiles-perl 2.39-5 Read .ini-style configuration file ii locales 2.7-13 GNU C Library: National Language ( ii perl-base 5.10.0-13 minimal Perl system localization-config recommends no packages. localization-config suggests no packages. -- debconf information: base-config/menu/localization-config-preinst: base-config/menu/localization-config-postinst: Index: conffiles.d/common/langmap.pl === --- conffiles.d/common/langmap.pl (revision 52332) +++ conffiles.d/common/langmap.pl (working copy) @@ -14,7 +14,7 @@ 'da_DK' => 'Danish', '[EMAIL PROTECTED]' => 'German (BE)', 'de_CH' => 'Swiss (DE)', -'[EMAIL PROTECTED]' => 'German (DE)', +'de_DE' => 'German (DE)', 'el_GR.UTF-8' => 'Greek', 'en_AU' => 'Australian', 'en_CA' => 'Canadian', signature.asc Description: Digital signature
Bug#479377: Can't install kdm in parallel to gdm when using dependency based boot
Package: kdm Version: 4:3.5.9.dfsg.1-2+b1 Severity: important When installing kdm while gdm is already installed insserv fails because more than on init-script provides the `x-display-manager' service. random:~# apt-get install kdm Reading package lists... Done Building dependency tree Reading state information... Done Suggested packages: kdepasswd ksmserver The following NEW packages will be installed: kdm 0 upgraded, 1 newly installed, 0 to remove and 87 not upgraded. Need to get 0B/678kB of archives. After this operation, 1675kB of additional disk space will be used. Preconfiguring packages ... Selecting previously deselected package kdm. (Reading database ... 204255 files and directories currently installed.) Unpacking kdm (from .../kdm_4%3a3.5.9.dfsg.1-2+b1_amd64.deb) ... Processing triggers for man-db ... Setting up kdm (4:3.5.9.dfsg.1-2+b1) ... insserv: script kdm: service x-display-manager already provided! insserv: exiting now! dpkg: error processing kdm (--configure): subprocess post-installation script returned error exit status 1 Errors were encountered while processing: kdm E: Sub-process /usr/bin/dpkg returned an error code (1) -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.23-1-amd64 (SMP w/2 CPU cores) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages kdm depends on: ii debconf [debconf-2.0 1.5.21 Debian configuration management sy ii kdebase-bin 4:3.5.9.dfsg.1-2+b1 core binaries for the KDE base mod ii kdebase-data 4:3.5.9.dfsg.1-2shared data files for the KDE base ii kdelibs4c2a 4:3.5.9.dfsg.1-4core libraries and binaries for al ii libc62.7-10 GNU C Library: Shared libraries ii libdbus-1-3 1.2.1-2 simple interprocess messaging syst ii libgcc1 1:4.3.0-3 GCC support library ii libpam-runtime 0.99.7.1-6 Runtime support for the PAM librar ii libpam0g 0.99.7.1-6 Pluggable Authentication Modules l ii libqt3-mt3:3.3.8b-5 Qt GUI Library (Threaded runtime v ii libstdc++6 4.3.0-3 The GNU Standard C++ Library v3 ii libx11-6 2:1.0.3-7 X11 client-side library ii libxau6 1:1.0.3-2 X11 authorisation library ii libxdmcp61:1.0.2-2 X11 Display Manager Control Protoc ii libxtst6 2:1.0.3-1 X11 Testing -- Resource extension Versions of packages kdm recommends: ii logrotate 3.7.1-3Log rotation utility ii xserver-xorg 1:7.3+10 the X.Org X server -- debconf information: kdm/stop_running_server_with_children: false * shared/default-x-display-manager: gdm kdm/daemon_name: /usr/bin/kdm signature.asc Description: Digital signature
Bug#479377: Can't install kdm in parallel to gdm when using dependency based boot
clone 479377 -1 reassign -1 gdm thanks On Sun, May 04, 2008 at 11:57:28AM -0500, Raphael Geissert wrote: > The problem is that kdm's and gdm's init scripts are 'enabled' (they have > symlinks in rcX.d/); so whenever insserv tries to recalculate the boot > order it finds two init scripts providing the same service. > > The way around this issue is removing the rc2.d symlink of either gdm or > kdm, the one that is not going to be used. > > I know this is not pretty, but that's how insserv works, as that's the only > information it knows about (send feedback to Petter Reinholdtsen). We have had a short discussion on #debian-edu channel on irc. Petter suggested that maybe x-display-manager can be dropped from both. When no other packages or init-scripts need a running display-manager this could also be a workaround. In any case this is something that needs to be solved for gdm too, as the other way around (installing gdm when kdm is already installed) would also fail. I've therefore cloned the bug to gdm. Greetings Daniel signature.asc Description: Digital signature
Bug#493853: comedi-source: RTAI is not found anymore
Package: comedi-source Version: 0.7.76-1+RTAIFIX.1 Severity: important Tags: patch Since some versions the RTAI package in Debian uses a prefix of “/usr”. As a result of this the RTAI headers need to build with RTAI support are now found in “/usr/include/rtai”. This makes at least two changes necessary in comedi-source package. First the “--with-rtaidir” should point to “/usr”. This makes configure find RTAI again. The second change is needed in the rtai.m4 macro. Currently it checks or sets “${RTAI_DIR}/include” as “-I” for the compiler. This makes COMEDI fail to build as the header are in “/usr/include/rtai”. See attached patch for the fix I currently use. TIA Daniel -- System Information: Debian Release: lenny/sid APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.24-ipip (SMP w/2 CPU cores; PREEMPT) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages comedi-source depends on: ii bzip2 1.0.5-0.1 high-quality block-sorting file co ii debhelper 7.0.15 helper programs for debian/rules ii module-assistant 0.10.11.0 tool to make module package creati comedi-source recommends no packages. Versions of packages comedi-source suggests: ii kernel-package11.001-0.1 A utility for building Linux kerne -- no debconf information -- Fachhochschule Dortmund University of Applied Sciences and Arts Daniel Heß FB Informatik, Emil-Figge-Str. 42 - D-44227 Dortmund RaumEFS 42 C.2.45 Tel +49 231 755-6761 Fax +49 231 755-6710 [EMAIL PROTECTED] http://www.fh-dortmund.de/ diff -u comedi-0.7.76/debian/control comedi-0.7.76/debian/control --- comedi-0.7.76/debian/control +++ comedi-0.7.76/debian/control @@ -8,7 +8,7 @@ Package: comedi-source Section: admin Architecture: all -Depends: module-assistant, debhelper (>= 5), bzip2 +Depends: module-assistant, debhelper (>= 5), bzip2, librtai-dev Suggests: kernel-package, libcomedi0 Description: Comedi kernel module source Comedi (Control and Measurement Device Interface) is a collection diff -u comedi-0.7.76/debian/rules comedi-0.7.76/debian/rules --- comedi-0.7.76/debian/rules +++ comedi-0.7.76/debian/rules @@ -53,7 +53,7 @@ CFLAGS="$(CFLAGS)" ./configure \ --host=$(DEB_HOST_GNU_TYPE) \ --build=$(DEB_BUILD_GNU_TYPE) \ - --with-rtaidir=/usr/lib/realtime \ + --with-rtaidir=/usr \ --enable-pcmcia $(MAKE) KERNEL_DIR=$(KSRC) KVERS=$(KVERS) only in patch2: unchanged: --- comedi-0.7.76.orig/configure +++ comedi-0.7.76/configure @@ -5063,7 +5063,9 @@ if test "${ENABLE_RTAI}" = "yes" -a \( "${CONFIG_RTHAL}" != "no" -o "${CONFIG_ADEOS}" != "no" -o "${CONFIG_IPIPE}" != "no" \); then { echo "$as_me:$LINENO: checking RTAI directory ${RTAI_DIR}" >&5 echo $ECHO_N "checking RTAI directory ${RTAI_DIR}... $ECHO_C" >&6; } - if [ -d ${RTAI_DIR}/include ] ; then + if [ -d ${RTAI_DIR}/include/rtai ] ; then + RTAI_CFLAGS="-I${RTAI_DIR}/include/rtai" + elif [ -d ${RTAI_DIR}/include ] ; then RTAI_CFLAGS="-I${RTAI_DIR}/include" else if [ -d ${RTAI_DIR}/rtai-core/include ] ; then only in patch2: unchanged: --- comedi-0.7.76.orig/m4/rtai.m4 +++ comedi-0.7.76/m4/rtai.m4 @@ -13,7 +13,9 @@ if test "${ENABLE_RTAI}" = "yes" -a \( "${CONFIG_RTHAL}" != "no" -o "${CONFIG_ADEOS}" != "no" -o "${CONFIG_IPIPE}" != "no" \); then AC_MSG_CHECKING([RTAI directory ${RTAI_DIR}]) - if [[ -d ${RTAI_DIR}/include ]] ; then + if [[ -d ${RTAI_DIR}/include/rtai ]] ; then + RTAI_CFLAGS="-I${RTAI_DIR}/include/rtai" + elif [[ -d ${RTAI_DIR}/include ]] ; then RTAI_CFLAGS="-I${RTAI_DIR}/include" else if [[ -d ${RTAI_DIR}/rtai-core/include ]] ; then
Bug#452899: sitesummary: fails to parse ifconfig output from systems with local != en
Package: sitesummary Version: 0.0.31 Severity: important Sitesummary fails to get the mac address if the system where sitesummary-client runs has a local != en. See attached for one possible fix. Greetings Daniel Gemeinsame Unterverzeichnisse: sitesummary-0.0.31.orig/collect.d und sitesummary-0.0.31/collect.d. Gemeinsame Unterverzeichnisse: sitesummary-0.0.31.orig/debian und sitesummary-0.0.31/debian. Gemeinsame Unterverzeichnisse: sitesummary-0.0.31.orig/handler.d und sitesummary-0.0.31/handler.d. diff -u sitesummary-0.0.31.orig/sitesummary-client sitesummary-0.0.31/sitesummary-client --- sitesummary-0.0.31.orig/sitesummary-client 2007-10-12 17:34:51.0 +0200 +++ sitesummary-0.0.31/sitesummary-client 2007-11-25 23:21:00.038257253 +0100 @@ -9,6 +9,8 @@ PATH=/sbin:/usr/sbin:/bin:/usr/bin +export LC_ALL=C + # Make sure to store files in a ramfs backed # storage area on diskless clients, so use /tmp/. tmpdir=/tmp/sitesummary-$$ signature.asc Description: Digital signature
Bug#300638: ircd-hybrid: unportable usage of va_list in src/send.c: fixed-upstream
tags 300638 + patch fixed-upstream thanks This bug is caused by the way va_list is used in src/send.c which seems to cause problems on (at least) amd64 and ppc. Upstream has fixed this last December (see r286 and r288 in svn). Backporting this changes to the version in unstable fixes the problem for me (amd64). diff -Nur ircd-hybrid-7.0.3/src/send.c ircd-hybrid-7.0.3.patched/src/send.c --- ircd-hybrid-7.0.3/src/send.c2004-02-10 05:28:40.0 +0100 +++ ircd-hybrid-7.0.3.patched/src/send.c2006-04-20 02:50:14.0 +0200 @@ -501,7 +501,7 @@ struct Channel *chptr, char *command, const char *pattern, ...) { - va_listargs; + va_listalocal, aremote, auid; buf_head_t local_linebuf; buf_head_t remote_linebuf; buf_head_t uid_linebuf; @@ -509,23 +509,27 @@ linebuf_newbuf(&local_linebuf); linebuf_newbuf(&remote_linebuf); linebuf_newbuf(&uid_linebuf); - va_start(args, pattern); + va_start(alocal, pattern); + va_start(aremote, pattern); + va_start(auid, pattern); if(IsServer(from)) -linebuf_putmsg(&local_linebuf, pattern, &args, ":%s %s %s ", +linebuf_putmsg(&local_linebuf, pattern, &alocal, ":%s %s %s ", from->name, command, RootChan(chptr)->chname); else -linebuf_putmsg(&local_linebuf, pattern, &args, ":[EMAIL PROTECTED] %s %s ", +linebuf_putmsg(&local_linebuf, pattern, &alocal, ":[EMAIL PROTECTED] %s %s ", from->name, from->username, from->host, command, RootChan(chptr)->chname); - linebuf_putmsg(&remote_linebuf, pattern, &args, ":%s %s %s ", + linebuf_putmsg(&remote_linebuf, pattern, &aremote, ":%s %s %s ", from->name, command, chptr->chname); - linebuf_putmsg(&uid_linebuf, pattern, &args, ":%s %s %s ", + linebuf_putmsg(&uid_linebuf, pattern, &auid, ":%s %s %s ", ID(from), command, chptr->chname); - va_end(args); + va_end(auid); + va_end(aremote); + va_end(alocal); ++current_serial; @@ -1045,7 +1049,7 @@ char *mask, int what, const char *pattern, ...) { - va_list args; + va_list alocal, aremote; struct Client *client_p; dlink_node *ptr; dlink_node *ptr_next; @@ -1054,13 +1058,15 @@ linebuf_newbuf(&local_linebuf); linebuf_newbuf(&remote_linebuf); - va_start(args, pattern); + va_start(alocal, pattern); + va_start(aremote, pattern); - linebuf_putmsg(&remote_linebuf, pattern, &args, ":%s ", from->name); - linebuf_putmsg(&local_linebuf, pattern, &args, ":[EMAIL PROTECTED] ", from->name, + linebuf_putmsg(&remote_linebuf, pattern, &aremote, ":%s ", from->name); + linebuf_putmsg(&local_linebuf, pattern, &alocal, ":[EMAIL PROTECTED] ", from->name, from->username, from->host); - va_end(args); + va_end(aremote); + va_end(alocal); /* scan the local clients */ DLINK_FOREACH_SAFE(ptr, ptr_next, lclient_list.head) @@ -1416,16 +1422,18 @@ buf_head_t linebuf_uid; buf_head_t linebuf_nick; - va_start(args, pattern); - if(HasID(source_p)) { have_uid = 1; +va_start(args, pattern); linebuf_newbuf(&linebuf_uid); linebuf_putmsg(&linebuf_uid, pattern, &args, ":%s KILL %s :", me.name, ID(source_p)); +va_end(args); } + va_start(args, pattern); + linebuf_newbuf(&linebuf_nick); linebuf_putmsg(&linebuf_nick, pattern, &args, ":%s KILL %s :", me.name, source_p->name); signature.asc Description: Digital signature
Bug#362296: x-ttcidfont-conf: Can't exec "/usr/X11R6/bin/mkfontdir": fixed with xserver-xorg > 1:7.0.11
tags 362296 + patch retitle 362296 x-ttcidfont-conf: X11R7 transition thanks David Nusinow has fixed the symptom by introducing the /usr/X11R6/bin > /usr/bin symlink. But this package needs some help anyway. The encoding directory has moved from /usr/X11R6/lib/X11/fonts/encodings to /usr/share/fonts/X11/encodings (patch to fix this is attached). Last but not least mkcfm had been drooped out of xutils because it's non-free. cid_term() tries to call mkcfm and will fail doing so with with recent versions of xutils. diff -Nur x-ttcidfont-conf-21.orig/debian/defoma x-ttcidfont-conf-21/debian/defoma --- x-ttcidfont-conf-21.orig/debian/defoma 2004-04-16 13:25:27.0 +0200 +++ x-ttcidfont-conf-21/debian/defoma 2006-04-20 20:59:01.0 +0200 @@ -249,9 +249,9 @@ close F; -system('/usr/X11R6/bin/mkfontdir', - '-e', '/usr/X11R6/lib/X11/fonts/encodings', - '-e', '/usr/X11R6/lib/X11/fonts/encodings/large', +system('/usr/bin/mkfontdir', + '-e', '/usr/share/fonts/X11/encodings', + '-e', '/usr/share/fonts/X11/encodings/large', "$PkgDir/dirs/$category"); return 0; signature.asc Description: Digital signature
Bug#362258: problem is caused by x-ttcidfont-conf
reassign 362258 x-ttcidfont-conf thanks The problem is caused by x-ttcidfont-conf which has not yet changed to the new layout introduced by X11R7. As a workaround David Nusinow has made an symlink from /usr/X11R6/bin to /usr/bin which solves such problems until all packages have altered their path. signature.asc Description: Digital signature
Bug#360233: asterisk-config: care about other packages directories
tags 360233 + patch thanks The directories /var/log/asterisk, /var/run/asterisk and /var/spool/asterisk are not created by asterisk-config so postinst should check if they exists, before trying to chmod them or don't care about them at all (and leave the chmod to the packages who create them). I've attached a patch which checks for the existence of the directories not created by asterisk-config fist and only chmod them if they exists. diff -Nur asterisk-1.2.4.dfsg.orig/debian/asterisk-config.postinst asterisk-1.2.4.dfsg/debian/asterisk-config.postinst --- asterisk-1.2.4.dfsg.orig/debian/asterisk-config.postinst2006-04-21 02:09:58.0 +0200 +++ asterisk-1.2.4.dfsg/debian/asterisk-config.postinst 2006-04-21 02:09:33.0 +0200 @@ -29,8 +29,10 @@ test -d /var/lib/asterisk || mkdir -p /var/lib/asterisk test -d /etc/asterisk || mkdir -p /etc/asterisk - chown -R asterisk.asterisk /var/log/asterisk /var/run/asterisk \ - /var/spool/asterisk /var/lib/asterisk /etc/asterisk + chown -R asterisk.asterisk /var/lib/asterisk /etc/asterisk + test -d /var/log/asterisk && chown -R asterisk.asterisk /var/log/asterisk + test -d /var/run/asterisk && chown -R asterisk.asterisk /var/run/asterisk + test -d /var/spool/asterisk && chown -R asterisk.asterisk /var/spool/asterisk chmod 0660 /etc/asterisk/*.conf # doing web-vmail foo... signature.asc Description: Digital signature
Bug#357536: please install openct.reader.conf
Package: openct Version: 0.6.6-2 Severity: wishlist The config file for pcscd found in the debian directory of the source-pakage is not installed, which makes it more difficult to access openct with pcscd. Could you please include this file in the binary package and set DEVICENAME to /dev/null. TIA Daniel -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.15.6 Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Versions of packages openct depends on: ii adduser 3.85 Add and remove users and groups ii dpkg 1.13.16package maintenance system for Deb ii libc6 2.3.6-3GNU C Library: Shared libraries an ii libltdl3 1.5.22-4 A system independent dlopen wrappe ii libopenct10.6.6-2middleware framework for smart car ii libusb-0.1-4 2:0.1.11-6 userspace USB programming library Versions of packages openct recommends: ii udev [hotplug]0.087-2/dev/ and hotplug management daemo -- no debconf information signature.asc Description: Digital signature
Bug#357536: please install openct.reader.conf
On Sat, Mar 18, 2006 at 09:37:23AM +0100, Andreas Jellinghaus wrote: > please don't. or only install a file that is commented out > and needs to be changed. That's the way it is. I got myself a CardMan 4000 yesterday. The linux kernel as well as openct do support this device, but neither gnupg or pcscd does. As somebody first time using openct I've had some problems to figure the connection between openct an pcscd out. If openct.reader.conf where placed by the package, dpkg -L openct would had put me on the right way. This way I've had to get the source-package and search there in. After installing openct.reader.conf manually and removing the comments pcscd told me to change DEVNAME to /dev/null. After this everything worked as expected. If you do think placing an commented out config-file is bad, please put it in as an example file. Not having it at all makes it more difficult, if not even impossible (for the average user who do not care to get source-packages just for obtaining an config file) to use openct with pcscd. Daniel signature.asc Description: Digital signature
Bug#584232: player: FTBS on alpha, armel, ia64, mips and mipsel
Package: player Version: 3.0.1+dfsg-1 Tags: patch Player 3.0 fails to build on alpha, armel, ia64, mips and mipsel because of two problems. The first problem is, that on alpha, arm(el) and ia64 the "_p" variants of outb/inb do not exists. After some research on the internet it looks like on this archs no pause is needed for outb/inb and therefore only the normal version exists. The second problem is, that on mips and mipsel the "struct sigaction" is defined different (the members are ordered differently). This way the zero initializer does not work on this arch(s). As the zero initializer does not do much anyway (as the variables are initialized immediately afterwards) I think we can skip that. Please find attached a patch for this two problems. As I do not have access to the above archs I only checked if player still builds on i386 (which it does). It would be nice to see if this patch works and gets the missing archs back so that player can be part of Squeeze. TIA Daniel diff -Nru player-3.0.1+dfsg/debian/changelog player-3.0.1+dfsg/debian/changelog --- player-3.0.1+dfsg/debian/changelog 2010-05-22 12:11:07.0 +0200 +++ player-3.0.1+dfsg/debian/changelog 2010-06-02 11:52:09.0 +0200 @@ -1,3 +1,15 @@ +player (3.0.1+dfsg-1.2) unstable; urgency=low + + * Non-maintainer upload. + * Fix FTBS on armel, alpha and ia64 by using non-paused port io operations +instead of the “_p” onces not defined on this architectures +(fix-portio.patch). + * Fix FTBS on mips and mipsel by removing zero initializer from 'struct +sigaction' variables. 'struct sigaction' is defined different on mips and +mipsel and the variables are set directly after declaration anyway. + + -- Daniel Hess Wed, 02 Jun 2010 11:45:35 +0200 + player (3.0.1+dfsg-1.1) unstable; urgency=low * Non-maintainer upload. diff -Nru player-3.0.1+dfsg/debian/patches/fix-portio.patch player-3.0.1+dfsg/debian/patches/fix-portio.patch --- player-3.0.1+dfsg/debian/patches/fix-portio.patch 1970-01-01 01:00:00.0 +0100 +++ player-3.0.1+dfsg/debian/patches/fix-portio.patch 2010-06-02 11:44:11.0 +0200 @@ -0,0 +1,67 @@ +diff -Nur player-3.0.1+dfsg.orig/server/drivers/dio/portio/portio.cc player-3.0.1+dfsg/server/drivers/dio/portio/portio.cc +--- player-3.0.1+dfsg.orig/server/drivers/dio/portio/portio.cc 2010-04-09 23:24:54.0 +0200 player-3.0.1+dfsg/server/drivers/dio/portio/portio.cc 2010-06-02 11:35:37.0 +0200 +@@ -179,8 +179,12 @@ + #ifdef __QNXNTO__ + out8(this->portptr, this->init_val); + #else ++#if defined(__alpha__) || defined(__arm__) || defined(__ia64__) ++ outb(this->init_val, this->port); ++#else + outb_p(this->init_val, this->port); + #endif ++#endif + } + + void PortIO::Main() +@@ -191,8 +195,12 @@ + #ifdef __QNXNTO__ + this->init_val = in8(this->portptr); + #else ++#if defined(__alpha__) || defined(__arm__) || defined(__ia64__) ++ this->init_val = inb(this->port); ++#else + this->init_val = inb_p(this->port); + #endif ++#endif + for (;;) + { + pthread_testcancel(); +@@ -208,8 +216,12 @@ + #ifdef __QNXNTO__ + data.bits = in8(this->portptr); + #else ++#if defined(__alpha__) || defined(__arm__) || defined(__ia64__) ++data.bits = inb(this->port); ++#else + data.bits = inb_p(this->port); + #endif ++#endif + this->Publish(this->dio_provided_addr, PLAYER_MSGTYPE_DATA, PLAYER_DIO_DATA_VALUES, reinterpret_cast(&data), 0, NULL); + } + } +@@ -236,16 +248,24 @@ + #ifdef __QNXNTO__ + u = in8(this->portptr); + #else ++#if defined(__alpha__) || defined(__arm__) || defined(__ia64__) ++u = inb(this->port); ++#else + u = inb_p(this->port); + #endif ++#endif + v = (u & (~(masks[digits - 1]))) | (cmd.digout & (masks[digits - 1])); + if (u != v) + { + #ifdef __QNXNTO__ + out8(this->portptr, v); + #else ++#if defined(__alpha__) || defined(__arm__) || defined(__ia64__) ++ outb(v, this->port); ++#else + outb_p(v, this->port); + #endif ++#endif + } + return 0; + } diff -Nru player-3.0.1+dfsg/debian/patches/fix-sigaction.patch player-3.0.1+dfsg/debian/patches/fix-sigaction.patch --- player-3.0.1+dfsg/debian/patches/fix-sigaction.patch 1970-01-01 01:00:00.0 +0100 +++ player-3.0.1+dfsg/debian/patches/fix-sigaction.patch 2010-06-02 11:54:48.0 +0200 @@ -0,0 +1,17 @@ +diff -Nur player-3.0.1+dfsg.orig/server/server.cc player-3.0.1+dfsg/server/server.cc +--- player-3.0.1+dfsg.orig/server/server.cc 2010-04-09 23:24:54.0 +0200 player-3.0.1+dfsg/server/server.cc 2010-06-02 11:54:11.0 +0200 +@@ -148,11 +148,11 @@ + exit(-1); + } + #else +- struct sigaction quit_action = {{0}}; ++ struct sigaction quit_action; + quit_action.sa_handler = Quit; + sigemptyset (&quit_action.sa_mask); + quit_action.sa_flags = SA_RESETHAND; +- struct sigaction ignore_action
Bug#562777: exim4: Please include authenticated_id in local_scan.h
Package: exim4 Version: 4.69-9 Severity: wishlist Tags: patch Hello, could you please include the authenticated_id global variable in local_scan.h so that local_scan() functions could use this information. We are using the authenticated_id to get the user name from smtp auth in our local_scan function. Since Lenny this symbol is not accessible without patching and deploying a patched exim4 version. Therefore it would be nice, if you could include this global variable in local_scan.h. TIA Daniel diff -Nru exim4-4.71/debian/changelog exim4-4.71/debian/changelog --- exim4-4.71/debian/changelog 2009-12-12 13:24:46.0 +0100 +++ exim4-4.71/debian/changelog 2009-12-27 21:10:09.0 +0100 @@ -1,3 +1,10 @@ +exim4 (4.71-2.1) unstable; urgency=low + + * Non-maintainer upload. + * Include authenticated_id symbol local_scan.h exports list. + + -- Daniel Hess Sun, 27 Dec 2009 21:02:21 +0100 + exim4 (4.71-2) unstable; urgency=low * Pulled from upstream: 20_PDKIM-Upgrade-PolarSSL.diff. Update files copied diff -Nru exim4-4.71/debian/patches/50_localscan_dlopen.dpatch exim4-4.71/debian/patches/50_localscan_dlopen.dpatch --- exim4-4.71/debian/patches/50_localscan_dlopen.dpatch 2009-12-12 12:53:45.0 +0100 +++ exim4-4.71/debian/patches/50_localscan_dlopen.dpatch 2009-12-27 21:12:53.0 +0100 @@ -263,7 +263,17 @@ #include "config.h" #include "mytypes.h" #include "store.h" -@@ -192,4 +193,6 @@ extern uschar *string_copy(uschar *); +@@ -161,6 +162,9 @@ + extern BOOLsmtp_batched_input; /* TRUE if SMTP batch (no interaction) */ + extern BOOLsmtp_input; /* TRUE if input is via SMTP */ + ++/* General global variables usable for local_scan function */ ++ ++extern uschar *authenticated_id; /* ID that was authenticated */ + + /* Functions that are documented as visible in local_scan(). */ + +@@ -192,4 +196,6 @@ extern uschar *string_copyn(uschar *, int); extern uschar *string_sprintf(char *, ...); diff -Nru exim4-4.71/debian/patches/debian-changes-4.71-2.1 exim4-4.71/debian/patches/debian-changes-4.71-2.1 --- exim4-4.71/debian/patches/debian-changes-4.71-2.1 1970-01-01 01:00:00.0 +0100 +++ exim4-4.71/debian/patches/debian-changes-4.71-2.1 2009-12-27 21:16:16.0 +0100 @@ -0,0 +1,37 @@ +Description: Upstream changes introduced in version 4.71-2.1 + This patch has been created by dpkg-source during the package build. + Here's the last changelog entry, hopefully it gives details on why + those changes were made: + . + exim4 (4.71-2.1) unstable; urgency=low + . + * Non-maintainer upload. + * Include authenticated_id symbol local_scan.h exports list. + . + The person named in the Author field signed this changelog entry. +Author: Daniel Hess + +--- +The information above should follow the Patch Tagging Guidelines, please +checkout http://dep.debian.net/deps/dep3/ to learn about the format. Here +are templates for supplementary fields that you might want to add: + +Origin: , +Bug: +Bug-Debian: http://bugs.debian.org/ +Forwarded: +Reviewed-By: +Last-Update: + +--- exim4-4.71.orig/src/local_scan.h exim4-4.71/src/local_scan.h +@@ -162,9 +162,6 @@ extern int sender_host_port; / + extern BOOLsmtp_batched_input; /* TRUE if SMTP batch (no interaction) */ + extern BOOLsmtp_input; /* TRUE if input is via SMTP */ + +-/* General global variables usable for local_scan function */ +- +-extern uschar *authenticated_id; /* ID that was authenticated */ + + /* Functions that are documented as visible in local_scan(). */ + diff -Nru exim4-4.71/debian/patches/series exim4-4.71/debian/patches/series --- exim4-4.71/debian/patches/series 2009-12-12 12:53:45.0 +0100 +++ exim4-4.71/debian/patches/series 2009-12-27 21:16:16.0 +0100 @@ -9,3 +9,4 @@ 60_convert4r4.dpatch 66_enlarge-dh-parameters-size.dpatch 70_remove_exim-users_references.dpatch +debian-changes-4.71-2.1 signature.asc Description: Digital signature