The included patch fixes the problem where CAserial no longer works.
Note that you now have to give either CAserial or CAcreateserial (or
both) in order to use a serial number file.
The first hunk of the patch fixes the actual bug report. The second hunk
fixes a bug where there is more than one
I'm also seeing this problem. I can trigger these errors trivially by
doing:
/sbin/lvcreate -A n -L500M -s -nvar-backup /dev/vg0/var
and
/sbin/lvremove -A n -f /dev/vg0/var-backup
Seeing lots of these two errors:
Mar 24 10:53:25 feynman kernel: [4198946.403294] mdadm: sending ioctl
1261 to a p
Package: sendmail-base
Version: 8.14.4-4+deb7u1
Severity: minor
I have /etc/mail/tls and also /etc/mail/ssl which contains dhparam.pem.
On upgrading sendmail-base the pre-inst script does:
# Move files to new home
if [ -d /etc/mail/ssl ]; then
On Fri, 23 Feb 2024, Andreas B. Mundt wrote:
Hi Tim,
thanks for the provided patch! We see the same issue here, so I
included it in a locally built package to give it a try on our
infrastructure.
So far it looks quite promising, no errors up to now .
That's great! I've been running it for
This same problem happens for SUBSHELL_PAREN, SUBSHELL_COMSUB,
SUBSHELL_PIPE and SUBSHELL_COPROC as well as SUBSHELL_ASYNC
Test case (This must be sourced to see SHLVL == 1 which causes
/etc/bash.bashrc to be sourced in a shell started by ssh)
$ cat test.sh
test1="bash -c 'echo \$SHLVL'"
test2="
I'd like to propose a slightly modified patch:
diff -urN bash-5.1.orig/debian/etc.bash.bashrc bash-5.1/debian/etc.bash.bashrc
--- bash-5.1.orig/debian/etc.bash.bashrc2022-03-27 18:36:06.0
+
+++ bash-5.1/debian/etc.bash.bashrc 2022-03-27 18:36:06.0 +
@@ -4,7 +4
Package: apt-cacher-ng
Version: 3.7.4-1
Severity: minor
Dear Maintainer,
The /etc/cron.daily/apt-cacher-ng installed by apt-cacher-ng uses
/usr/bin/xz from xz-utils but apt-cacher-ng does not depend on that
package.
Please consider adding this dependency otherwise you can get emails from
cron li
Guess we're finding out where everyone's update windows are. Some
though may report before resolving the issue or somewhat after.
Or people may not have noticed yet if they haven't rebooted or attempted
to start a new guest.
It doesn't affect buster hosts. bullseye is impacted.
This bug is still present in bookworm. Attached updated patch.
diff -urN bash-5.2.15.orig/execute_cmd.c bash-5.2.15/execute_cmd.c
--- bash-5.2.15.orig/execute_cmd.c 2022-12-13 17:09:02.0 +
+++ bash-5.2.15/execute_cmd.c 2022-12-13 17:09:02.0 +
@@ -5633,7 +5633,12 @@
/
Unfortunately, I've found that my patch has some serious issues on
bookworm and isn't any good.
--- opendkim.orig/librbl/rbl.c 2018-11-15 00:47:38.0 +
+++ opendkim/librbl/rbl.c 2024-08-25 09:37:34.860816615 +
@@ -329,7 +329,7 @@
rbl_res_close(void *srv)
{
#ifdef HAVE_RES_NINIT
- struct state *res;
+ struct __res_state *res;
res = srv;
This i
This patch fixes the FTBFS for libopendbx.
The root cause is that the "generic" items in odbx_t and odbx_lo_t are
really FB_API_HANDLE and this is a void* on 32 bit and int on 64 bit.
This code is not strictly portable as it relies on the bitwise
representation of the nullptr being all bits zero
Attached is the patch also included on 1075339diff -ur opendkim.orig/debian/opendkim.default opendkim/debian/opendkim.default
--- opendkim.orig/debian/opendkim.default 2023-06-16 19:52:26.0 +
+++ opendkim/debian/opendkim.default 2024-08-25 14:31:08.938597424 +
@@ -3,8 +3,8 @@
# /e
Package: dump
Version: 0.4b47-4+~tjw12r5
Severity: normal
Dear Maintainer,
Dump cannot handle more than 2^32 blocks. This was reported upstream
some years ago along with a patch that I am including here.
I'm reporting this as I have another ext4 patch that I've built on top
of this one.
I've al
Package: dump
Version: 0.4b47-4+~tjw12r5
Severity: normal
Dear Maintainer,
When using restore -C lgetflags returns 0 for symlinks as flags are not
vaild/settable on a symlink.
However, if EXT4_EXTENTS_FL is set then the verification fails saying
that the flags have changed.
./long_symlink: flag
Package: dump
Version: 0.4b47-4+~tjw12r5
Severity: important
Dear Maintainer,
Dump includes data read from EXT2_EXTENT_FLAGS_UNINIT extents in the
dump instead of writing zeros (or nothing) to the tape.
This means that restores are corrupted.
The attached patch is a quick fix for this. Better w
Package: dump
Version: 0.4b47-4+~tjw12r5
Severity: important
Dear Maintainer,
Many years ago I reported a bug with verifying attributes on files where
the count was sometimes wrong. You fixed this (Thanks!)
However, it turns out the same bug is present for directories too.
Unfortunately, the fi
There is a separate issue which I think only applies if the backup
itself has over 2^32 blocks written to tape so that the next tape
starting block has wrapped.
I haven't tried to reproduce this issue as I do not have any systems
with anything like that amount of data to test with plus I suspect
I should have been clearer originally - this particular patch isn't my
work, it was suggested upstream in https://sourceforge.net/p/dump/bugs/174/
I picked it up while trying to fix the uninitialized read bug #1081009.
That patch changes the same lines of code in one place so it was
slightly easi
I've found a bug in the original patches where it wasn't correctly
dumping an EA block >2^32. The original patch also relied on a cast to a
64 bit value which only worked on little endian and only if the next
four bytes were zero (which they appear to always be)
This patch now addresses both thos
Package: sendmail-bin
Version: 8.14.3-5
Severity: minor
It's possible to install sendmail without having the procps package
installed. However /etc/init.d/sendmail uses ps to determine if sendmail
is running.
Tim.
-- Package-specific info:
Ouput of /usr/share/bug/sendmail-bin/script:
Versions
I've had exactly the same problem.
Upgraded to etch with 2.4 kernel - everything working fine.
Upgraded to 2.6 kernel - won't boot.
In the rescue shell, vgchange -ay vg0 gives "no volumes group found".
Everything is at the latest version in etch.
partition table is /dev/hda1 for /boot
/dev/hd
I've just found this comment attached to bug#381351:
"I just did a bit of investigation into a slimilar issue - it seems that
the image created by initramfs-tools doesn't work with LVM if mdadm is
not installed."
I suspect that this was my problem as I didn't have mdadm installed.
It may be
Package: multipath-tools
Version: 0.4.7-1.1etch1
Severity: normal
The /etc/udev/rules.d/multipath.rules exposes a race that causes LVM
snapshots to fail to be created intermittently.
This caused my backups to suddenly start failing when I installed this
package to get kpartx.
/sbin/lvcreate -A n
On Sat, 7 Jun 2008, Guido Günther wrote:
On Fri, Jun 06, 2008 at 10:33:36PM +0100, Tim Woodall wrote:
The /etc/udev/rules.d/multipath.rules exposes a race that causes LVM
snapshots to fail to be created intermittently.
You mean:
# take care of devmap partitioning
ACTION=="add",
On Sat, 7 Jun 2008, Guido Günther wrote:
On Sat, Jun 07, 2008 at 04:07:49PM +0100, Tim Woodall wrote:
With the add replaced with change, or the udev rule removed completely I've
never seen a failure.
O.k. find. A mark the bug as fixed in lenny then.
Do you have a chance to try the pac
Package: console-tools
Version: 1:0.2.3dbs-56
Followup-For: Bug #312844
I'm having exactly the same problem while attempting to build a kernel
for the psion 5mx (http://linux-7110.sourceforge.net/)
This contains a number of special keycodes for controlling things like
backlight, contrast, power o
I've now constructed a patch that fixes this problem for me. (I don't
think this will fix the original problem as that was running loadkeys
without --mktable)
I now do:
LD_PRELOAD=./libconsole.so ./loadkeys -u --mktable keymap_psion_us.map
>keymap_psion_us.patch.c
and the mapfile is created co
I've discovered that the version of loadkeys in Sid already fixes the
problem building the keyboard map for the psion if you supply the -u
option. Still have the problem that you must be root (patch in bug
#341956 that fixes this)
Has the original poster tried using loadkeys with the -u flag? Or
The version in Sid, together with this patch, also fixes the problems
I've reported in Bug #312844
Tim.
--
God said, "div D = rho, div B = 0, curl E = - @B/@t, curl H = J + @D/@t,"
and there was light.
http://tjw.hn.org/ http://www.locofungus.btinternet.co.uk/
--
To UNSUBSCRIBE, ema
Identical problem, fixed by same patch, in package kbd.
(Patch is same change, but the above patch will not apply to the source
in kbd - the indenting is different)
Can this bug also be attached to package kbd? Or does a new bug need
opening?
Tim.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED
Bother - what I meant to say in that last message and forgot is the
following that is extremely annoying:
Apr 3 22:54:49 pauli upsd[981]: Data for UPS [belkin] is stale - check driver
Apr 3 22:54:50 pauli upsmon[985]: Poll UPS [EMAIL PROTECTED] failed - Data
stale
Apr 3 22:54:50 pauli upsmon[
I'm seeing a similar problem with the belkin driver attached to the
serial port.
Nut Version: 2.0.1-4
pauli:/etc/nut# uname -a
Linux pauli.home.woodall.me.uk 2.4.27-3-k6 #1 Wed Feb 8 12:52:54 UTC
2006 i586 GNU/Linux
In my case this seems to be caused by using the scanner which is
attached by an
On Fri, 25 Sep 2009, Jose Luis Rivas wrote:
Hi Tim,
What Jamie says is easy to check, just see the log of xscreensaver and
check if this is the case.
If that's true then this bug should be reassigned.
I'm still not able to find any logs for xscreensaver at all.
But I now think that I'm not
This is still happening. I've not found a way to fix it.
There was an earlier comment about checking xscreensaver logs but I
don't know where these logs are.
Tim
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...
Package: dump
Version: 0.4b43-1
Severity: important
Tags: upstream patch
einstein:~# /sbin/dump -0 -f- /var/spool/news/overview/ | restore -oax -f-
DUMP: Date of this level 0 dump: Sat Feb 19 13:27:45 2011
DUMP: Dumping /dev/mapper/vg0-var (/var (dir /spool/news/overview)) to
standard output
Upstream now has a fix for this. version 1.72 of traverse.c
Index: traverse.c
===
RCS file: /cvsroot/dump/dump/dump/traverse.c,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -w -r1.71 -r1.72
--- traverse.c 10 Jun 2010 1
I've been having a similar problem trying to get lvm on raid booting
with root=UUID=...
I've managed to get it working as follows:
1. Copy /sbin/dmsetup to sbin in the initramfs.
2. Add lvm=vg0 to the kernel commandline
3. Apply the following:
diff -ur y/init x/init
--- y/init 2009-02-22
Package: xscreensaver
Version: 5.05-3
Severity: important
If you are switched to a virtual terminal e.g. ctrl-alt-f1 then the X
session does not lock.
The old behaviour in etch: when you switched back to the X session
ctrl-alt-f7 the screen would momentarily display the old screen before
the scr
Sorry, only just seen this reply. (My spamfilter thinks anything not
sent via BTS is spam)
Where is the xscreensaver log? I cannot see anything in Xorg.log but I'm
not sure what I'm looking for.
Tim.
--
God said, "div D = rho, div B = 0, curl E = - @B/@t, curl H = J + @D/@t,"
and there was ligh
On Wed, 8 Sep 2021, Helmut Grohne wrote:
I do see the advantages of using https. I do not see how to not make it
happen without breaking relevant use cases. Same with the /usr-merge. I
do see the advantages. I've stopped counting the things that broke. Most
recent one is the uucp FTBFS. Change h
Hi,
I'm seeing a similar issue trying to install build-deps.
Steps to reproduce:
Minimal system with build-essential installed running on a system that
does not have systemd installed
fakeroot fakechroot chroot ${buildchroot}
apt-get -y --only-source build-dep openssh=1:7.9p1-10+deb10u2
...
Package: make
Version: 4.3-4
Severity: normal
Dear Maintainer,
(N.B. I've backported make 4.3-4 to buster as I need grouped targets but
I have made no changes other than to depend on guile-2.2-dev instead of
guile-3.0-dev)
In some cases you need to run make -t multiple times to touch all the
ta
Might not be related, but a trivial makefile:
foo bar &:
echo
make -t only touches foo, not bar. Rerunning says 'foo is up to date'
Package: passwd
Version: 1:4.5-1.1
Severity: minor
Dear Maintainer,
passwd has a dependency on grep and base-passwd but does not explicitly
state those dependency.
When attempting to configure without base-passwd configured you get:
Setting up passwd (1:4.5-1.1) ...
pwck: cannot open /etc/p
On Sun, 21 Feb 2021, Chris Hofstaedtler wrote:
* Tim Woodall [210221 15:28]:
I am unsure how debootstrap avoids the first problem - It could just be
down to luck that debootstrap configures base-passwd before passwd. grep
is Priority: required and Essential: yes so it could be argued that it
On Sun, 21 Feb 2021, Chris Hofstaedtler wrote:
* Tim Woodall [210221 15:28]:
I am unsure how debootstrap avoids the first problem - It could just be
down to luck that debootstrap configures base-passwd before passwd. grep
is Priority: required and Essential: yes so it could be argued that it
Hi,
A. /etc/passwd is part of base-passwd's interface and base-files is
right in relying on it working at all times. Then base-passwd is rc
buggy for violating a policy must. Fixing this violation is
technically impossible.
I seem to have hit this same issue independently.
Could you e
On Mon, 22 Feb 2021, Tim Woodall wrote:
On Sun, 21 Feb 2021, Chris Hofstaedtler wrote:
* Tim Woodall [210221 15:28]:
I am unsure how debootstrap avoids the first problem - It could just be
down to luck that debootstrap configures base-passwd before passwd. grep
is Priority: required and
On Mon, 22 Feb 2021, Colin Watson wrote:
On Mon, Feb 22, 2021 at 07:33:10AM +, Tim Woodall wrote:
As far as I can see, making base-passwd not essential, only required,
and then making passwd and base-files pre-depend on base-passwd the
system seems to bootstrap /etc/passed and /etc/group
On Mon, 22 Feb 2021, Helmut Grohne wrote:
On Mon, Feb 22, 2021 at 07:33:10AM +, Tim Woodall wrote:
A. /etc/passwd is part of base-passwd's interface and base-files is
right in relying on it working at all times. Then base-passwd is rc
buggy for violating a policy must. Fixing
On Mon, 22 Feb 2021, Johannes Schauer Marin Rodrigues wrote:
So yes, workarounds are (sadly) still necessary to debootstrap Debian. But
arguing with Debian policy is the wrong way forward as policy does not talk
about the debootstrap scenario but only about the system where your packages
were at
Package: dpkg
Version: 1.20.7.1
Severity: wishlist
Dear Maintainer,
This is a wishlist item relate to:
Re: Bug#924401: #924401 base-files fails postinst when base-passwd is unpacked
With the patch included below the problem packages, Provides: awk and
base-passwd can be trivially modified so tha
Package: debianutils
Version: 4.8.6.1
Severity: wishlist
Dear Maintainer,
add-shell uses the following construct to ensure that the last line of
/etc/shells contains a newline:
if ! awk '{print}' "$file" > "$tmpfile"
I'd like to request that it be changed to
if ! grep '' "$file" > "$tmpfile"
Package: usbip
Version: 2.0+4.19.160-2
Severity: important
Dear Maintainer,
usbip stops working (this has been a long standing issue) and not the
bug I'm reporting.
Previously, when this happens I would do rmmod usbip_host, modprobe
usbip_host and then it would start working again.
Now, when I
Awesome, thank you! Confirmed that this has fixed my verification
failure. (FWIW, my failure was on ext3)
On Sun, 6 Oct 2019, Debian Bug Tracking System wrote:
This is an automatic notification regarding your Bug report
which was filed against the dump package:
#940473: dump: Verify fails when
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1044 (0x9896ac)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = GB, ST = London, O = Certificate Authority, CN = Tim
Woodall CA
Validity
Not Before: Sep 15 13:20:28 2019 GMT
I've just upgraded to buster and this problem is resolved.
Package: dump
Version: 0.4b46-3
Severity: minor
Dear Maintainer,
This is a very longstanding, but minor, bug that I've finally got around
to reporting. I did investigate trying to fix but it appeared highly
non-trivial.
Note that this only affects a verify. A restore gives the correct
results.
I have also hit this bug while backporting openssh from unstable to bullseye
(ironically so I can avoid the need to use dpkg-divert)
I've redone the patch proposed above so that it applies against the
unpacked source package:
apt-mirror@aptmirror17:/mnt/mirror/local-debs (master)$ cat main/u/ucf
My mistake. I was looking at the imap certificate but forgot to look at
the SMTP certificate - which is where the Subject Alternative Name was
missing.
This can be closed.
Package: chromium
Version: 80.0.3987.149-1~deb10u1
Severity: normal
Dear Maintainer,
If you start chromium with valid working ipv6 proxy config but no default
route configured then chromium will say:
No internet
There is something wrong with the proxy server, or the address is incorrect.
Add
I've managed to reproduce this issue when many hosts hit apt-cacher-ng
at the same time.
Attached a patch which fixes it for me - this is a quick and hacky
patch!
Sent debug logs of a run that reproduces this problem and a run with
this patch applied directly to the maintainer.
diff --git a/CMak
I've cleaned up the patch and got rid of a lot of the cruft that got
added while I was debugging.
Also found one more race condition in my original solution that I
believe is now fixed.
And I believe it's now safe even if different urls map to the same cache
file which the previous patch didn't
Try again - without the old patch at the top.diff --git a/CMakeLists.txt b/CMakeLists.txt
index 024f6a0..011ab42 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -1,5 +1,7 @@
cmake_minimum_required(VERSION 3.1)
+set(CMAKE_EXPORT_COMPILE_COMMANDS ON)
+
# try to set the best C++ language leve
Package: tgt
Version: 1:1.0.85-1
Severity: wishlist
Dear Maintainer,
Under in the tgtadm man page under the media_home documentation there
are tgtadm commands to set this a virtual jukebox. However, the first
step, "The dvd starts out without a backing store" isn't supported by
tgt-admin.
I prop
Hopefully the final patch!
Neither sockets nor pipes had their attributes verified correctly when
doing restore -C.
diff -urN dump-0.4b47.orig/restore/tape.c dump-0.4b47/restore/tape.c
--- dump-0.4b47.orig/restore/tape.c 2022-05-03 10:02:27.0 +
+++ dump-0.4b47/restore/tape.c 2022-05-0
Attached the debian.tar.xz of my local build with many fixes included.
configure-ac.patch ... 1
compiler-warnings.patch .. 1
handle-bigfiles.patch 4
xattr_verify.patch ... 3
ignore-ext4-extents-flag.patch . 2
fix-uninit-blocks.patch .. 4
fix-write-estima
Package: apt
Version: 2.6.1
Severity: wishlist
Dear Maintainer,
Please consider supporting No-Support-For-Architecture-all in
apt-ftparchive. This is a one line change to ftparchive/writer.cc
tim@dirac:~/git/apt (main)$ git diff
diff --git a/ftparchive/writer.cc b/ftparchive/writer.cc
index 3c52
69 matches
Mail list logo