Hello,
[Cc += sparse mailing list]
On Fri, Sep 14, 2018 at 05:04:09PM +0300, Adrian Bunk wrote:
> Control: reassign -1 sparse 0.5.2-1
> Control: affects -1 src:horst
>
> On Sat, Aug 25, 2018 at 10:09:47PM +0200, Christoph Biedl wrote:
> > Santiago Vila wrote...
> >
> > > make -j1 check
> > >
Hello,
sparse is a C code checker that reuses include files from gcc. Currently
there are missing the needed dependencies
(https://bugs.debian.org/906472).
Now I wonder, what is the right way to depend on gcc. For sparse it
would be enough to depend on libgcc-8-dev (I think), but as cgcc (which
i
Hello Luc,
On 09/24/2018 06:23 PM, Luc Van Oostenryck wrote:
> On Fri, Sep 14, 2018 at 09:45:44PM +0200, Uwe Kleine-König wrote:
>>>> Santiago Vila wrote...
>>>>
>>>>> make -j1 check
>>>>> make[1]: Entering directory '/<>
Control: affects 921982 + djmount
Hello,
On Mon, Jan 21, 2019 at 08:17:24PM +0100, Uwe Kleine-König wrote:
> I will report a request to remove djmount from unstable in February
> unless someone opposes (and does to work to convert it to libupnp-1.8).
I did this now, but forgot to Cc: th
Hello Michael,
On Thu, Feb 16, 2017 at 12:24:20AM +0100, Michael Biebl wrote:
> this bug is supposed to be fixed in 1.6.2.
> I've uploaded a test build to people.debian.org [1]. It would be great
> if you can test those packages and report back to confirm whether it's
> really fixed for you or not
Hello Michael,
On Sat, Mar 18, 2017 at 12:10:48AM +0100, Michael Biebl wrote:
> I've updated the packages at [1] to 1.6.2-3~test0 including the patches
> from the th/device-wifi-wait-for-scan-bgo770938 branch.
>
> Would be great if you can give those packages a try and report back.
I installed
{
Hello,
On 12/16/18 10:06 PM, Uwe Kleine-König wrote:
> On Wed, May 23, 2018 at 05:31:08PM +0200, Dario Minnucci wrote:
>> Sorry for the delay and thanks to invest time on this issue.
>>
>> On 18/05/18 23:30, Uwe Kleine-König wrote:
>>> On Tue, Jan 09, 2018 a
Control: block -1 by 713313
Hello,
On Fri, Jul 04, 2014 at 09:41:30PM +0200, Ralf Treinen wrote:
> Package: drift
> Version: 2.2.3-2.2
> Severity: grave
> User: trei...@debian.org
> Usertags: edos-uninstallable
>
> Hello, drift is not installable in sid on any architecture, and that is the
> cas
er upload.
+ * convert from dpatch to format 3.0 (quilt) folding local changed files into
+ghc-7.4-fixes.patch
+ * fix build errors with ghc 7.6 (Closes: #713313, #753765)
+
+ -- Uwe Kleine-König Sun, 16 Aug 2015 22:37:02 +0200
+
drift (2.2.3-2.2) unstable; urgency=low
* Non-maintai
Hello Clint,
On 08/17/2015 12:27 PM, Clint Adams wrote:
> On Sun, Aug 16, 2015 at 10:46:06PM +0200, Uwe Kleine-König wrote:
>> I'm currently in NM trying to become DD. As part of the process I
>> prepared an NMU for this with the following debdiff. It's that big
>>
nformation on OpenSSL errors
With these two fixes applied, rauc should build fine again as is.
Best regards
Uwe
--
Pengutronix e.K. | Uwe Kleine-König|
Industrial Linux Solutions | https://www.pengutronix.de/ |
signature.asc
Description: PGP signature
On Wed, Jul 24, 2019 at 10:06:08AM +0300, jim_p wrote:
> Package: e2fsprogs
> Version: 1.44.5-1
> Followup-For: Bug #932855
>
> Proof that I did install logsave 1 as I said above
>
> # cat var/log/apt/history.log | tail -5
> Start-Date: 2019-07-24 09:10:05
> Commandline: apt-get install logsave
On Mon, Apr 17, 2017 at 05:02:32PM +0100, Paul Brook wrote:
> Package: libsbc1
> Version: 1.3-1+b2
> Followup-For: Bug #856487
>
> Not a stack corruption.
>
> This is miscompilation of sbc_analyze_4b_8s_armv6. gcc appears to look
> into the asm function and decides that it does not clobber r3 (w
Hello,
after some discussion in #debian-arm, I have to revise this.
On 04/26/2017 10:30 AM, Uwe Kleine-König wrote:
> On Mon, Apr 17, 2017 at 05:02:32PM +0100, Paul Brook wrote:
>> Package: libsbc1
>> Version: 1.3-1+b2
>> Followup-For: Bug #856487
>>
>> Not
Control: tag -1 + patch
Hello,
On Tue, Oct 25, 2016 at 10:27:24PM +0200, Salvatore Bonaccorso wrote:
> the following vulnerability was published for libupnp. The issue is
> reproducible easily if libupnp compiled with ASAN and following the
> reproducing steps in the upstream bugreport.
I didn't
Hello Marcelo,
I created a patch for CVE-2016-8863 but forgot to Cc: you. Do you care
to take a look?
Best regards
Uwe
- Forwarded message from Uwe Kleine-König -
Date: Thu, 8 Dec 2016 14:20:32 +0100
From: Uwe Kleine-König
To: Salvatore Bonaccorso
Cc: 842...@bugs.debian.org
Subject
On Thu, Dec 08, 2016 at 02:36:01PM +0100, Uwe Kleine-König wrote:
> I created a patch for CVE-2016-8863 but forgot to Cc: you. Do you care
> to take a look?
I now created a more sophisticated patch and attached it to the original
bug report (https://sourceforge.net/p/pupnp/bugs/133/).
Fe
Hello,
there are two source packages (in sid, found via codesearch.d.n) that
include embedded copies of libupnp: djmount and mediatomb (maintainers
on Cc:).
djmount build-depends on libupnp-dev and calls configure with
--with-external-libupnp, so fixing libupnp should be good enough here.
mediat
(CVE-2016-8863, Closes: #842093)
+ * Fix usage on ipv6 enabled hosts (Closes: #813249)
+
+ -- Uwe Kleine-König Fri, 09 Dec 2016 10:40:28 +0100
+
libupnp (1:1.6.19+git20160116-1.1) unstable; urgency=high
* Non-maintainer upload.
diff -Nru libupnp-1.6.19+git20160116/debian/patches/CVE-2016-8863
On Fri, Dec 09, 2016 at 11:10:50AM +0100, Uwe Kleine-König wrote:
> Hello,
>
> as I didn't get any feedback from the maintainer of libupnp for #813249
> since January and the package has an open grave bug which was reported
> in October I intend to upload an NMU with the bel
Control: retitle -1 mediatomb: libupnp vulnerabilities CVE-2012-5958,
CVE-2012-5959, CVE-2012-5960, CVE-2016-6255, CVE-2016-8863
(This is title += CVE-2016-8863)
Hello,
the embedded copy of libupnp in mediatomb is also vulnerable to
CVE-2016-8863.
Best regards
Uwe
signature.asc
Description:
Hello,
On 12/09/2016 11:28 AM, Sebastian Ramacher wrote:
> On 2016-12-09 10:16:25, James Cowgill wrote:
>> On 09/12/16 09:27, Uwe Kleine-König wrote:
>>> there are two source packages (in sid, found via codesearch.d.n) that
>>> include embedded copies of lib
-6255 and CVE-2016-8863
+(Closes: #831857, #842093)
+
+ -- Uwe Kleine-König Tue, 13 Dec 2016 11:46:31 +0100
+
libupnp (1:1.6.19+git20141001-1) unstable; urgency=low
* Ack both NMUs, thankyou for your care of this package.
diff -Nru libupnp-1.6.19+git20141001/debian/patches/CVE-2016-6255
On Tue, Dec 13, 2016 at 02:03:50PM +0100, Sébastien Delafond wrote:
> On Dec/13, Uwe Kleine-König wrote:
> > Do you consider CVE-2016-6255 and CVE-2016-8863 bad enough to make a
> > security update for it? If so, I suggest the following debdiff.
>
> Yes, the first one is b
Package: network-manager
Version: 1.4.4-1
Severity: serious
Tags: upstream
Justification: affects other packages
Control: forwarded -1 https://bugzilla.gnome.org/show_bug.cgi?id=777831
Hello,
this is to track this bug in the Debian BTS. It is already reported
upstream.
tftpd-hpa has in it's init
; The following ones don't:
> > - linux-image-4.19.0-rc7-armmp-lpae_4.19~rc7-1~exp1_armhf.deb
> > - linux-image-5.0.0-trunk-armmp_5.0.2-1~exp1_armhf.deb
> >
> > My guess (I don't have time to try more now) is that the issue is caused
> > by the following change:
&g
Hello,
On Tue, Apr 30, 2019 at 10:12:27AM +0200, Uwe Kleine-König wrote:
> On Thu, Apr 25, 2019 at 09:17:32PM +0200, Aurelien Jarno wrote:
> > On 2019-04-25 14:50, Aurelien Jarno wrote:
> > > On 2019-04-23 22:16, Aurelien Jarno wrote:
> > > > Source: li
Hello,
adding the Debian Perl Group to Cc, maybe they can help here.
(for context look at https://bugs.debian.org/1002219)
On 12/30/21 10:12, Uwe Kleine-König wrote:
I got a bug report against the public-inbox 1.6.1 package about a
failing test, see below for the whole output. I didn't
Hello Eric,
On 12/30/21 20:17, Eric Wong wrote:
Uwe Kleine-König wrote:
Hello,
adding the Debian Perl Group to Cc, maybe they can help here.
(for context look at https://bugs.debian.org/1002219)
On 12/30/21 10:12, Uwe Kleine-König wrote:
I got a bug report against the public-inbox 1.6.1
Hello,
On Thu, Oct 03, 2019 at 03:36:26PM +, André Draszik wrote:
> Package: python3-rpi.gpio
> Version: 0.6.5-1
> Severity: grave
> Tags: upstream
> Justification: renders package unusable
>
>
> Hi,
>
> python3-rpi.gpio 0.6.5 as is current in sid, doesn't support
> aarch64:
>
> Traceback
Hello,
On 09/21/2018 04:33 PM, Uwe Kleine-König wrote:
> sparse is a C code checker that reuses include files from gcc. Currently
> there are missing the needed dependencies
> (https://bugs.debian.org/906472).
>
> Now I wonder, what is the right way to depend on gcc. For spars
Source: libupnp
Severity: serious
libupnp should be removed, it is about to be dropped from testing. This
bug is there to prevent it reentering testing.
-- System Information:
Debian Release: buster/sid
APT prefers testing
APT policy: (700, 'testing'), (600, 'unstable'), (500, 'unstable-debug
Hello,
On Wed, May 23, 2018 at 05:31:08PM +0200, Dario Minnucci wrote:
> Sorry for the delay and thanks to invest time on this issue.
>
> On 18/05/18 23:30, Uwe Kleine-König wrote:
> > Hello Dario,
> >
> > On Tue, Jan 09, 2018 at 09:17:35PM +0100, Rémi wrote:
>
Hello Santiago,
On Sat, Dec 29, 2018 at 12:25:29AM +, Santiago Vila wrote:
> The build was made in my autobuilder with "dpkg-buildpackage -B"
> but it also fails here:
>
> https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/sparse.html
>
> where you can get a full build log if
On Wed, Nov 07, 2018 at 10:24:28PM +0100, Sebastian Ramacher wrote:
> Source: ring
> Version: 20180816.2.e26b79f~ds1-3
> Severity: serious
> Justification: fails to build from source (but built successfully in the past)
> Tags: sid buster ftbfs
>
> ring FTBFS on 32 bit architectures:
> | ../../dol
Source: gmrender-resurrect
Version: 0.0.7~git20180618.d0f46f5-2
Severity: serious
Justification: broken build depends
Hello,
pupnp-1.8 provides since its last upload libupnp-dev but not
libupnp1.8-dev any more. This makes the binnmu that is part of the
libupnp transition fail to complete with BD-
Hello,
On Fri, Nov 09, 2018 at 11:20:28AM +0100, Uwe Kleine-König wrote:
> Source: gmrender-resurrect
> Version: 0.0.7~git20180618.d0f46f5-2
> Severity: serious
> Justification: broken build depends
>
> pupnp-1.8 provides since its last upload libupnp-dev but not
> libupnp1
Hello Tobi,
On 11/9/18 7:57 PM, Tobias Frost wrote:
> Go ahead with the NMU ( you can also do a teamupload, as the package is in
> the Debian group of salsa... At least I think it is, but I can't check due to
> weak internet here))
I interpreted that as an Ack to upload to delayed/0. I kept it
Control: unblock 884635 with -1
Hello James,
On Fri, Dec 22, 2017 at 11:50:00PM +, James Cowgill wrote:
> Source: gerbera
> Version: 1.1.0+dfsg-2
> Severity: important
> Tags: sid buster fixed-upstream
> Forwarded: https://github.com/gerbera/gerbera/issues/192
> Control: block 884635 by -1
>
Hello,
On Sat, Nov 17, 2018 at 09:40:39AM +0100, Sylvestre Ledru wrote:
> reassign 912566 sparse
> forwarded 912566 https://bugs.llvm.org/show_bug.cgi?id=8220
> thanks
similar to Adrian I fail to follow why this is spare's problem. Unless
sparse used llvm-config wrongly I think the problem at han
Package: rauc
Version: 1.1-1
Severity: serious
Tags: fixed-upstream patch
Justification: FTBFS on all archs
Hello,
rauc 1.1-1 failed on all arches that don't cheat by not using nocheck:
https://buildd.debian.org/status/package.php?p=rauc
I talked to upstream and four commits are needed.
; should work as well without further changes to RAUC.
I just confirmed that. I built libp11 in sid + openssl3. With the
resulting packages installed rauc just builds fine against openssl3.
So I'm unsure what I should do about this bug. Close it? Reassign to
libp11? Just wait until
Control: tag -1 += upstream fixed-upstream
Hello,
On Sun, Dec 10, 2017 at 05:47:43PM +0100, Tobias Frost wrote:
> I'm reassigning this bug as I'm suspecting it in the recent release of
> libupnp,
> after I had debugged it a bit.
>
> The bug does not trigger in 1.6.22.
>
> How to reproduce:
>
Hello,
On 08/28/2017 04:32 PM, Antoine Beaupré wrote:
> Control: severity 873508 serious
> Control: affects 873508 horst
>
> On 2017-08-28 15:22:20, James Clarke wrote:
>> As discussed on IRC, ppc64 and sparc64 are also affected; while they are
>> not release architectures and are thus less impor
Hello Antoine,
On Mon, Aug 28, 2017 at 03:10:10PM -0400, Antoine Beaupré wrote:
> On 2017-08-28 20:53:02, Uwe Kleine-König wrote:
> > On 08/28/2017 04:32 PM, Antoine Beaupré wrote:
> >> Control: severity 873508 serious
> >> Control: affects 873508 horst
> >>
Hello,
Antoine Beaupre (on Cc:) noticed that sparse doesn't work on some not so
common architectures like ppc32le, s390x, ppc64 and sparc64[1]. This is
nicely catched by the testsuite, e.g.:
ukleinek@plummer:~/sparse$ git rev-parse HEAD
958c11c35d98417eb6b948bffe2dffed14eb3320
Hello,
On Wed, Aug 30, 2017 at 05:55:00PM +0100, Ramsay Jones wrote:
> On 30/08/17 17:14, Uwe Kleine-König wrote:
> > ukleinek@plummer:~/sparse$ make check V=1
>
> It would be easier to see the results if you _didn't_ add V=1. ;-)
noted for the next time.
> [snip]
&
Hello Christopher,
On Wed, Aug 30, 2017 at 08:11:49PM -0400, Christopher Li wrote:
> On Wed, Aug 30, 2017 at 1:36 PM, Uwe Kleine-König
> wrote:
> >> >
> >> > diff --git a/validation/backend/sum.c b/validation/backend/sum.c
> >> > index 0604299..d0be
Hello,
On Thu, Aug 31, 2017 at 11:43:53PM +0100, Ramsay Jones wrote:
> On 31/08/17 21:55, Uwe Kleine-König wrote:
> > On Wed, Aug 30, 2017 at 08:11:49PM -0400, Christopher Li wrote:
> >> That is very much like on x86_64 missing define "#weak_define __x86_64__ 1"
>
On Fri, Sep 01, 2017 at 12:02:12AM -0700, Josh Triplett wrote:
> On Thu, Aug 31, 2017 at 08:47:55PM -0400, Christopher Li wrote:
> > On Thu, Aug 31, 2017 at 4:55 PM, Uwe Kleine-König Yes
> > that works. So to address the Debian bug I can do:
> > >
> > > - move
[readding people to Cc assuming that's ok]
Hello Luc,
On Mon, Sep 04, 2017 at 10:36:47PM +0200, Luc Van Oostenryck wrote:
> On Mon, Sep 4, 2017 at 10:57 AM, Uwe Kleine-König
> wrote:
> > On 09/03/2017 11:14 PM, Luc Van Oostenryck wrote:
> >> On Fri, Sep 1, 2017
Hello Christopher,
On Wed, Sep 06, 2017 at 11:18:04AM -0400, Christopher Li wrote:
> On Wed, Sep 6, 2017 at 10:44 AM, Uwe Kleine-König
> wrote:
> > and while it's ok to test the core stuff and not wanting the system
> > includes to interfere, there should also be tes
On Thu, Aug 31, 2017 at 08:47:55PM -0400, Christopher Li wrote:
> On Thu, Aug 31, 2017 at 4:55 PM, Uwe Kleine-König Yes
> that works. So to address the Debian bug I can do:
> >
> > - move sparse to /usr/lib
> > - teach cgcc about the move of sparse
> > - make
Hello Jussi,
On Sun, May 14, 2017 at 12:09:42AM +0300, Jussi Pakkanen wrote:
> Package: gcc
> Version: 6.3.0-4
>
> Gcc creates binaries that fail with "invalid instruction". To
> reproduce create the following main.c:
>
> int get_retval(void);
>
> int main(int argc, char **argv) {
> return g
Hello,
On Wed, Jun 21, 2017 at 09:09:41AM +0200, Uwe Kleine-König wrote:
> On Sun, May 14, 2017 at 12:09:42AM +0300, Jussi Pakkanen wrote:
> > Package: gcc
> > Version: 6.3.0-4
> >
> > Gcc creates binaries that fail with "invalid instruction". To
>
Hello Marcelo,
On 07/11/2017 11:21 PM, Marcelo Henrique Cerri wrote:
> Package: backfire-dkms
> Version: 1.0-1
> Tags: patch
> Followup-For: Bug #867706
>
> Can you please check if the attached patch fixes the problem for you?
It probably does but it is ugly and I already talked to upstream and
On 09/10/2017 03:22 AM, Luc Van Oostenryck wrote:
> On Sat, Sep 9, 2017 at 11:02 PM, Uwe Kleine-König
> wrote:
>>
>> I tried this on ppc64le and it fixes 2 tests, so were at
>>
>> Out of 287 tests, 273 passed, 14 failed (10 of them are known to
>>
On Tue, Sep 12, 2017 at 01:59:47AM -0400, Christopher Li wrote:
> On Wed, Sep 6, 2017 at 11:36 AM, Uwe Kleine-König
> wrote:
> > There is https://dsa.debian.org/doc/guest-account/ which would give you
> > the possibility to access some Debian machines. Other than that I intend
Control: clone 873508 -1
Control: retitle -1 Please use cgcc to check hosted C code instead of sparse
Control: severity -1 normal
Control: reassign -1 horst
On Fri, Sep 01, 2017 at 09:46:44AM +0200, Uwe Kleine-König wrote:
> @anarcat: Given that cgcc seems to work, would you agree to apply
Control: severity 873508 normal
Control: retitle 873508 Fix FTBFS for m68k, hurd, x32 and ppc64
On Thu, Sep 21, 2017 at 08:58:23PM +0200, Uwe Kleine-König wrote:
> I still expect some platforms to fail with the wrapper, too, because
> cgcc doesn't know about all platforms yet. But
Package: libopenmpi-dev
Version: 4.0.5-3
Severity: serious
Justification: Policy 7.4
During an apt run on a machine that runs a mix of stable and
testing/unstable I hit:
dpkg: error processing archive
/tmp/apt-dpkg-install-HP9Wwp/08-libopenmpi-dev_4.0.5-3_amd64.deb (--unpack):
t
commit/c73d7dab6f1f2346cebc751ea8f90406c614833f.
[2] https://tracker.debian.org/news/1086738/dh-virtualenv-removed-from-testing/
--
Pengutronix e.K. | Uwe Kleine-König|
Industrial Linux Solutions | https://www.pengutronix.de/ |
signature.asc
Description: PGP signature
that it MITMed by libfaketime.so.1 uses 64bit time_t and so
writes to a bigger memory chunk than is handed in by bash's struct
timeval *tv.
So to get it right faketime must be made aware that on platforms that
have __gettimeofday64 in libc gettimeofday uses 32bit time_t. (And the
same on
The reason here is that date uses __clock_gettime64() (i.e. the 64-bit
time_t variant of clock_gettime) while libfaketime doesn't provide an
override for this symbol and so the result isn't faked.
Best regards
Uwe
--
Pengutronix e.K. | Uwe Kleine-König|
Indust
debian/changelog
dh-virtualenv-1.2.2/debian/changelog
--- dh-virtualenv-1.2.2/debian/changelog2023-02-02 20:10:21.0
+0100
+++ dh-virtualenv-1.2.2/debian/changelog2023-11-17 19:40:18.0
+0100
@@ -1,3 +1,10 @@
+dh-virtualenv (1.2.2-1.4) UNRELEASED; urgency=medium
+
+ * Non-main
++ dh-virtualenv-1.2.2/debian/changelog2023-11-17 19:40:18.0
+0100
@@ -1,3 +1,10 @@
+dh-virtualenv (1.2.2-1.4) unstable; urgency=medium
+
+ * Non-maintainer upload.
+ * Drop Sphinx docs (Closes: #1042646)
+
+ -- Uwe Kleine-König Fri, 17 Nov 2023 19:40:18 +0100
+
dh-virtualenv (
program, just different versions. So I suggest to make
this a conflict for now and try to unify the versions in the long run.
Where can I find the changes done to cyclictest in xenomai-runtime?
Best regards
Uwe
--
Pengutronix e.K. | Uwe Kleine-König|
Ind
missing.
Reading http://bugs.debian.org/445682 makes me believe that pthreads on
hppa are not so completely implemented as on other architectures.
Best regards
Uwe
--
Pengutronix e.K. | Uwe Kleine-König|
Industrial Linux Solutions
nix e.K. | Uwe Kleine-König|
Industrial Linux Solutions | http://www.pengutronix.de/ |
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
s.
Uwe
--
Pengutronix e.K. | Uwe Kleine-König|
Industrial Linux Solutions| http://www.pengutronix.de/ |
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
e that want to do harm on purpose. So the
kernel solution is the only sensible IMHO.
Best regards
Uwe
--
Pengutronix e.K. | Uwe Kleine-König|
Industrial Linux Solutions | http://www.pengutronix.de/ |
--
To UNSUBSCRIBE, email to debian-b
tch most cases (among them all of the above instances).
Maybe also keep the cp semantics for copy_exec and only warn in the
failing cases? (i.e. test -d "$2" && test ! -d "$pathtoinitramfs/$2")
Best regards
Uwe
> should be fixed, but this is likely too late for wheezy, give
ked different enough, too.
Best regards
Uwe
--
Pengutronix e.K. | Uwe Kleine-König|
Industrial Linux Solutions | http://www.pengutronix.de/ |
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of
Source: gcc-arm-linux-gnueabihf
Version: 4.9.2-2
Severity: serious
Justification: Not installable
Hello wookey,
gcc-arm-linux-gnueabihf depends on gcc-4.9-arm-linux-gnueabihf which in
turn:
$ grep-aptavail -P -X -s Version,Depends gcc-4.9-arm-linux-gnueabihf
Version: 4.9.2-2
Depends: cpp-4.9-ar
Hello,
On Sun, Aug 16, 2015 at 10:46:06PM +0200, Uwe Kleine-König wrote:
> I'm currently in NM trying to become DD. As part of the process I
> prepared an NMU for this with the following debdiff. It's that big
> because I converted the package from dpatch to 3.0 (quilt).
M
Package: docbook2x
Version: 0.8.8-9
Severity: serious
Justification: makes unrelated software on the system break
Hello,
according to
https://packages.debian.org/jessie/arm64/docbook2x/filelist
https://packages.debian.org/jessie/powerpc/docbook2x/filelist
the docbook2x package s
Package: ed
Version: 1.10-2
Severity: serious
Justification: makes unrelated software on the system break
Hello,
according to
https://packages.debian.org/jessie/arm64/ed/filelist
the ed package ships a file /usr/share/info/dir.gz on arm64. Installing
this package overwrites the index of
Package: gxmessage
Version: 2.20.0-1
Severity: serious
Justification: Policy 12.2
Hello,
according to
https://packages.debian.org/jessie/arm64/gxmessage/filelist
the gxmessage package ships a file /usr/share/info/dir.gz on arm64.
Installing this package overwrites the index of installed
Package: stress
Version: 1.0.1-1
Severity: serious
Justification: Policy 12.2
Hello,
according to
https://packages.debian.org/jessie/arm64/stress/filelist
the stress package ships a file /usr/share/info/dir.gz on arm64.
Installing this package overwrites the index of installed info page
Package: libpam-poldi
Version: 0.4.1-3
Severity: serious
Justification: Policy 12.2
User: uwe+deb...@kleine-koenig.org
Usertags: ships-info-dir
Hello,
according to
https://packages.debian.org/sid/hppa/libpam-poldi/filelist
the libpam-poldi package ships a file /usr/share/info/dir.gz on
Hello,
On 09/21/2015 09:50 PM, Santiago Vila wrote:
> On Mon, Sep 21, 2015 at 09:06:58PM +0200, Uwe Kleine-König wrote:
>> Package: stress
>> Version: 1.0.1-1
>> Severity: serious
>> Justification: Policy 12.2
>>
>> Hello,
>>
>> according to
Package: google-glog
Severity: normal
Hello,
I looked a bit into this, here are my observations:
- I can reproduce the FTBFS on i386
- if I install libunwind7-dev, the package builds fine on i386
- the test suite succeeds, but there appear some scary messages while
it runs, like:
Package: pulseaudio
Version: 1.1-1
Severity: serious
Tags: sid
Justification: Policy 3.5
Hello,
$ dpkg -l libpulse0 pulseaudio
Desired=Unknown/Install/Remove/Purge/Hold
| Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend
|/ Err?=(none)/Reinst-required (Status,Err: upper
available, and the bug was that EVIOCGVERSION shouldn't be used
> to check with equality for EV_VERSION (version >= 0x010001 might
> be a valid check for software using EVIOCGKEYCODE_V2).
I think this is the way to go.
Best regards
Uwe
--
Pengutronix e.K. |
Package: cant
Version: 0.8.15
Severity: serious
Justification: Policy 2.1
Hello,
debian/copyright reads:
License: cant be given
This is definitively not DFSG-free.
BTW, there is a ' missing (unless there is a pun intended).
Best regards
Uwe
--
Uwe Kleine-König
Aprilstr. 1
ould need to be fixed there first.
Yeah, I have a 0.84-1 package in the queue and I'm already nagging my
sponsor.
Best regards
Uwe
--
Pengutronix e.K. | Uwe Kleine-König|
Industrial Linux Solutions | http://www.pengutronix.de/ |
--
To UN
Package: flash-kernel
Version: 3.35+deb8u2
Severity: critical
Justification: causes serious data loss
Control: block 806926 with -1
Hello,
when flash-kernel writes a kernel/initrd to NAND flash it uses plain
write(2) to /dev/mtdX (flash-kernel < 3.52) or flashcp
(flash-kernel >= 3.52). If the dev
Hello *,
On 02/07/2016 12:34 PM, Ian Campbell wrote:
> So far I see no evidence for the claim that flashcp should not be used
> for writing to NAND devices in either its --help or its source (it has
> no man page AFAICS).
>
> Having a tool in Debian called "flashcp" which can (according to this
>
d new marvell kernel flavour as alternative for orion5x and
kirkwood.
+ [ Uwe Kleine-König ]
+ * use nandwrite when writing to nand flash.
+
-- Colin Watson Fri, 29 Jan 2016 13:35:17 +
flash-kernel (3.56) unstable; urgency=medium
diff --git a/functions b/functions
index adfb85a..2
Control: tag 813995 + jessie sid
Hello,
among the supported machines (i.e. those in flash-kernel's db) there is
only a single type affected by this bug. That is "D-Link DNS-320 NAS
(Rev A1)" which has the respective mtd partitions on nand.
IMHO this means we should fix jessie's flash-kernel, too
nel and without loading
staging and out-of-tree modules?
Best regards
Uwe
--
Pengutronix e.K. | Uwe Kleine-König|
Industrial Linux Solutions | http://www.pengutronix.de/ |
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
wi
Hello,
On Tue, Dec 10, 2024 at 12:08:17PM +, Scott Ashcroft wrote:
> Still happening with 6.12.3.
> Pressing a number of keys (it doesn't need to be enter) will get the
> boot moving again.
So it's not "Pressing Enter makes the boot progress", but just pressing
(say) "A" for a few times helps
Control: close -1
Hello,
On Thu, Oct 10, 2024 at 10:17:37PM -0400, Bud Heal wrote:
> I am happy to hear that you are looking at this.
>
> I did create at least one 32GB filesystem but it was too large even
> compressed - but suitable for uploading.
>
> Now that buster is obsoleted, and bookworm
Hello,
On Sat, Nov 16, 2024 at 11:41:15AM +0100, Alejandro Colomar wrote:
> I upgraded the kernel
>
> linux-image-6.11.4-amd64 => linux-image-6.11.7-amd64
>
> and cannot boot with the new one. It gets stuck after (or maybe during,
> I'm not sure) cryptsetup unlocks the drive. The last li
Hello,
On Sun, Jan 19, 2025 at 11:41:04AM +, Simon McVittie wrote:
> Control: reassign -1 src:linux/6.1.76-1
I agree this looks like the kernel is at least involved in this problem.
Is someone able to do a bisect to help the kernel team to pinpoint the
issue?
Or does someone has a reproducer
Control: merge 1106743 -1
Hello,
On Tue, Jun 17, 2025 at 06:47:30PM +0200, Pásztor János wrote:
> Jun 16 22:23:08 asgard kernel: amdgpu :07:00.0: [drm] *ERROR*
> dc_dmub_srv_log_diagnostic_data: DMCUB error - collecting diagnostic data
> Jun 16 22:23:08 asgard kernel: amdgpu :07:00.0: [dr
Package: devscripts
Version: 2.25.15
Severity: serious
File: /usr/bin/uscan
X-Debbugs-Cc: wa...@debian.org, uklei...@debian.org
Hello,
the linux-kernel packages suffer from upstream still relying on SHA-1 in
their OpenPGP keys. This makes uscan fail to provide the orig.tar.xz
(as expected) when s
Hello Jochen,
On Wed, Jul 23, 2025 at 03:47:51PM +0200, Uwe Kleine-König wrote:
> On Fri, Jul 18, 2025 at 10:33:48AM +0200, Jochen Becker wrote:
> > Package: src:linux
> > Version: 6.12.35-1
> > Followup-For: Bug #1109203
> > X-Debbugs-Cc: debian-am...@lists.debian.
Hello Jochen,
On Fri, Jul 18, 2025 at 10:33:48AM +0200, Jochen Becker wrote:
> Package: src:linux
> Version: 6.12.35-1
> Followup-For: Bug #1109203
> X-Debbugs-Cc: debian-am...@lists.debian.org, deb...@beckerjochen.de
> User: debian-am...@lists.debian.org
> Usertags: amd64
>
> Dear Maintainer,
>
99 matches
Mail list logo