https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268189
Bug ID: 268189
Summary: BSD tar incorectly encode UTF-8 sequences
Product: Base System
Version: 13.1-RELEASE
Hardware: Any
OS: Any
Status: New
Sever
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268189
--- Comment #1 from Aleksander Derevianko ---
Correction: First name become replaced by second, So, 'и' and diacritic become
replaced by 'й'
--
You are receiving this mail because:
You are the assignee for the bug.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268194
Bug ID: 268194
Summary: ntdp fails to start
Product: Base System
Version: 12.4-RELEASE
Hardware: amd64
OS: Any
Status: New
Severity: Affects Many Pe
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268186
Michael Osipov changed:
What|Removed |Added
CC||michael.osi...@siemens.com
--- Co
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268186
Cy Schubert changed:
What|Removed |Added
CC||c...@freebsd.org
--- Comment #2 from
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268076
--- Comment #11 from Gavin D. Howard ---
I cannot reproduce the fatal I/O error at all. Maybe it's because I can only
use QEMU, but I don't think so because I'm sending SIGWINCH to bc with kill.
Maybe it's because I'm not running -CURRENT
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268199
Bug ID: 268199
Summary: Upgrade from 12.3-RELESE to 12.4-RELEASE breaks remote
ssh until next reboot
Product: Base System
Version: 12.4-RELEASE
Hardware: amd64
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268200
Bug ID: 268200
Summary: Upgrade from 12.3-RELESE to 12.4-RELEASE breaks remote
ssh until next reboot
Product: Base System
Version: 12.4-RELEASE
Hardware: amd64
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268086
Graham Perrin changed:
What|Removed |Added
Assignee|b...@freebsd.org|n...@freebsd.org
C
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268076
Graham Perrin changed:
What|Removed |Added
URL||https://git.yzena.com/gavin
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268063
Graham Perrin changed:
What|Removed |Added
Assignee|b...@freebsd.org|pkgb...@freebsd.org
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268200
Graham Perrin changed:
What|Removed |Added
Assignee|b...@freebsd.org|grahamper...@freebsd.org
R
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268199
--- Comment #1 from Graham Perrin ---
*** Bug 268200 has been marked as a duplicate of this bug. ***
--
You are receiving this mail because:
You are the assignee for the bug.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268199
Graham Perrin changed:
What|Removed |Added
CC||d...@freebsd.org,
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=196736
Mateusz Piotrowski <0...@freebsd.org> changed:
What|Removed |Added
CC||0...@freebsd
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268194
Graham Perrin changed:
What|Removed |Added
Status|New |Open
Keywords|
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268194
--- Comment #2 from Maarten de Vries ---
Yes, I keep them up to date.
It appears that ntpd broke down when we went to 12.3-RELEASE-p10 last week
(22/11/30).
Silly that I didn't notice before.
--
You are receiving this mail because:
You
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268186
--- Comment #3 from amend...@gmail.com ---
The built-in Heimdal klist does not support the `-e` parameter. The MIT package
(security/krb5) does, although it gives an error:
klist: Unknown credential cache type while resolving ccache
Here
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268194
John Grafton changed:
What|Removed |Added
CC||john.graf...@runbox.com
--- Comment
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268194
--- Comment #4 from Maarten de Vries ---
Absolutely. Please download it from here:
https://www.netraam.nl/od/ntpd.core.tbz
--
You are receiving this mail because:
You are the assignee for the bug.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268186
--- Comment #4 from Cy Schubert ---
You can circumvent Heimdal with MIT by pkg install pam_krbt krb5.
Then replace the pam_krb5 lines in /etc/pam.d/sshd with the following:
authsufficient /usr/local/lib/security/pam_krb5.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268186
--- Comment #5 from Cy Schubert ---
(In reply to Cy Schubert from comment #4)
That should be pam_krb5 instead of pam_krbt.
--
You are receiving this mail because:
You are the assignee for the bug.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268194
--- Comment #5 from John Grafton ---
(In reply to Maarten de Vries from comment #4)
Ah, the core file doesn't have symbols (of course, it's a release build). That
makes it difficult to figure out what's going on.
If you're up for it, you
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268194
Cy Schubert changed:
What|Removed |Added
CC||c...@freebsd.org
--- Comment #6 from
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268194
--- Comment #7 from Maarten de Vries ---
(In reply to John Grafton from comment #5)
Love to help. Been a while since I compiled stuff, but here is the core dump
from a freshly compiled ntp daemon: https://www.netraam.nl/od/new_ntpd.core.tb
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268194
--- Comment #8 from Cy Schubert ---
(In reply to Maarten de Vries from comment #7)
Unfortunately a 12.4-RELEASE core dump will display symbols properly.
Fortunately, we don't need symbols since the stack is corrupted. A corrupted
stack is
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268020
--- Comment #2 from Marcin Gryszkalis ---
For unknown reason I wrongly assumed 64-bit int. I guess it was overflow of
signed 32-bit int. I could be wrong about 1.3TB (it could be more and possibly
I checked usage with du without -A while ha
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268194
--- Comment #9 from Maarten de Vries ---
(In reply to Cy Schubert from comment #6)
The patch applied successfully but then the binary still crashed.
However, adding that line to rc.conf and then starting ntpd did work!
--
You are receiv
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268186
--- Comment #6 from Michael Osipov ---
(In reply to amendlik from comment #3)
Please check wether the keytab on the target server supports the encryption:
"klist -k -e" with MIT Kerberos as well. You could also try gss-server and
gss-clien
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268194
--- Comment #10 from Cy Schubert ---
This suggests that PIE has been MFCed to stable/12 (kernel) but not the fix to
PIE that avoids this problem. Without looking at the 12.4 kernel more closely I
doubt the additional work to ASLR/PIE can be
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268186
--- Comment #7 from Cy Schubert ---
(In reply to Michael Osipov from comment #6)
In that case you would need to xst a new keytab.
--
You are receiving this mail because:
You are the assignee for the bug.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268076
--- Comment #13 from Gavin D. Howard ---
I have successfully reproduced this on a VM with -CURRENT, dwm, and st, and it
happened immediately.
I'm not sure what is different about this environment that causes the error,
but I'll dig into it
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268076
--- Comment #14 from Marcin Cieślak ---
I have set a breakpoint on the signal handler and single-stepped it a bit:
+b bc_vm_sig
Note: breakpoint 1 also set at pc 0x23a66b.
Breakpoint 2 at 0x23a66b: file ./src/vm.c, line 123.
+run
Starting
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268076
--- Comment #15 from Gavin D. Howard ---
That is my bad. I thought libedit would handle EINTR. Guess I was wrong.
The latest master
(https://git.yzena.com/gavin/bc/commit/3cb0a4b2ec65cfed9d147180230e416b4639e834)
should fix the problem by
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=268076
--- Comment #16 from Piotr Pawel Stefaniak ---
(In reply to Graham Perrin from comment #12)
I don't want to step on se@'s toes.
(In reply to Gavin D. Howard from comment #15)
Could you describe the libedit problem to Christos Zoulas
? I'm
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=266248
--- Comment #16 from schakraba...@microsoft.com ---
Any progress on this bug?
--
You are receiving this mail because:
You are the assignee for the bug.
36 matches
Mail list logo