On 12/28/24 1:09 AM, Salvatore Bonaccorso wrote:
Hi,
On Fri, Dec 27, 2024 at 04:31:44PM -0500, Chuck Lever wrote:
On 12/27/24 1:36 AM, Salvatore Bonaccorso wrote:
Hi,
On Thu, Dec 26, 2024 at 08:17:45PM +0100, Salvatore Bonaccorso wrote:
Hi Chuck, hi all,
On Thu, Dec 26, 2024 at 11:33:01AM
On 12/27/24 1:36 AM, Salvatore Bonaccorso wrote:
Hi,
On Thu, Dec 26, 2024 at 08:17:45PM +0100, Salvatore Bonaccorso wrote:
Hi Chuck, hi all,
On Thu, Dec 26, 2024 at 11:33:01AM -0500, Chuck Lever wrote:
On 12/26/24 11:24 AM, Salvatore Bonaccorso wrote:
Hi Jur,
On Mon, Dec 09, 2024 at 04:50
lib/nfs/nfsdcld/
and
sqlite3 /var/lib/nfs/nfsdcld/main.sqlite <
--
Chuck Lever
Package: claws-mail Version: 4.1.1-2+b1
Severity: normal
Tags: a11y
Dear Maintainer,
New pristeen installation with Debian 12 (Bookworm) with pre-existing
filter rules causes this. Filters mark some message-list entries in
red but not others. This can be seen as soon as the rules are
complete,
> On Apr 6, 2024, at 3:15 PM, Salvatore Bonaccorso wrote:
>
> Hi Chuck, hi Steve,
>
> In Debian, as you might have heard there is a 64bit time_t
> transition[1] ongoing affecting the armel and armhf architectures.
> While doing so, nfs-utils was found to fa
On 1/13/2023 9:08 PM, Chuck Zmudzinski wrote:
> On 1/13/23 6:59 PM, Hans van Kranenburg wrote:
> > Hi,
> >
> > On 1/13/23 22:45, Chuck Zmudzinski wrote:
> >> On 1/13/23 7:39 AM, Marek Marczykowski-Górecki wrote:
> >>> On Fri, Jan 13, 2023 at 12:58:29AM
On 1/13/23 6:59 PM, Hans van Kranenburg wrote:
> Hi,
>
> On 1/13/23 22:45, Chuck Zmudzinski wrote:
>> On 1/13/23 7:39 AM, Marek Marczykowski-Górecki wrote:
>>> On Fri, Jan 13, 2023 at 12:58:29AM -0500, Chuck Zmudzinski wrote:
>>>> On 1/11/2023 10:58 PM, Chuck
On 1/13/23 7:39 AM, Marek Marczykowski-Górecki wrote:
> On Fri, Jan 13, 2023 at 12:58:29AM -0500, Chuck Zmudzinski wrote:
>> On 1/11/2023 10:58 PM, Chuck Zmudzinski wrote:
>> > On 1/9/23 12:55 PM, Hans van Kranenburg wrote:
>> > > Hi!
>> > >
>>
On 1/11/2023 10:58 PM, Chuck Zmudzinski wrote:
> On 1/9/23 12:55 PM, Hans van Kranenburg wrote:
> > Hi!
> >
> > On 09/01/2023 18:44, Chuck Zmudzinski wrote:
> >> Control: tag -1 + moreinfo
> >>
> >> thanks
> >>
> >> On 1/9/23 8:
Package: general
Severity: normal
Dear Maintainer,
It is a bug that Debian considers the DSC so important, yet,
the concept of a contract is totally meaningless outside of
the context of a legal system where the obligations and rights
that arise from the terms of the contract can be enforced.
Pr
On 1/9/23 12:55 PM, Hans van Kranenburg wrote:
> Hi!
>
> On 09/01/2023 18:44, Chuck Zmudzinski wrote:
>> Control: tag -1 + moreinfo
>>
>> thanks
>>
>> On 1/9/23 8:09 AM, Hans van Kranenburg wrote:
>>> Hi Chuck,
>>>
>>> On 1/
On 1/9/23 12:55 PM, Hans van Kranenburg wrote:
> Hi!
>
> On 09/01/2023 18:44, Chuck Zmudzinski wrote:
> ...
> This is why it is very much recommended to build the packages using
> something like sbuild, so that you can be sure that every time it will
> start with a super mini
Control: tag -1 + moreinfo
thanks
On 1/9/23 8:09 AM, Hans van Kranenburg wrote:
> Hi Chuck,
>
> On 1/8/23 23:18, Chuck Zmudzinski wrote:
>> [...]
>>
>> The build failed:
>>
>>debian/rules override_dh_missing
>> make[1]: Entering direc
/xen which appeared in
--snip--
Thanks for all your work. Apart from this little problem, it
appears Xen 4.17 will work well on Bookworm.
Kind regards,
Chuck
d of a new version
you apply a workaround such as this patch or another workaround
until the missing systemd files are installed and configured
correctly.
Kind regards,
Chuck
-- System Information:
Debian Release: bookworm/sid
APT prefers unstable
APT policy: (500, 'unstable')
On 10/26/2021 10:06 AM, Chuck Zmudzinski wrote:
On 10/25/2021 4:45 PM, Chuck Zmudzinski wrote:
On 10/23/2021 11:11 AM, Hans van Kranenburg wrote:
Hi!
On 5/10/2021 1:33 PM, Chuck Zmudzinski wrote:
[...] with buster and bullseye running as the Dom0, I can only get
the VGA/Passthrough feature
On 10/26/2021 10:06 AM, Chuck Zmudzinski wrote:
On 10/25/2021 4:45 PM, Chuck Zmudzinski wrote:
On 10/23/2021 11:11 AM, Hans van Kranenburg wrote:
Hi!
On 5/10/2021 1:33 PM, Chuck Zmudzinski wrote:
[...] with buster and bullseye running as the Dom0, I can only get
the VGA/Passthrough feature
setting. It would be better to have hardware
that works without this relaxed rdm_policy because allowing passthrough
of devices that overlap with other devices' memory is obviously a
security concern, but my setup does not involve any untrusted domains
so I am comfortable using it in my environment.
All the best,
Chuck
On 10/23/2021 11:11 AM, Hans van Kranenburg wrote:
Hi!
On 10/19/21 5:44 AM, Chuck Zmudzinski wrote:
On 5/10/2021 1:33 PM, Chuck Zmudzinski wrote:
[...] with buster and bullseye running as the Dom0, I can only get the
VGA/Passthrough feature to work with Windows Xen HVMs. I would expect both
On 5/10/2021 1:33 PM, Chuck Zmudzinski wrote:
Package: src:linux
Version: 5.10.28-1
Severity: normal
Tags: upstream
Dear Maintainer,
I have been using Xen's PCI and VGA passthrough feature since wheezy and jessie
were the stable versions, and back then both Windows HVMs and Linux HVMs
On 10/4/2021 1:51 PM, Diederik de Haas wrote:
On Monday, 4 October 2021 17:27:22 CEST Chuck Zmudzinski wrote:
I can confirm these 4 fix the bug on my hardware.
\o/
Thanks for testing and reporting back :-)
Cheers,
Diederik
Thank you, Diederik, for your good work finding the commits
As discussed in message #91, the submitter of this bug accepts the
package maintainer's fix which will close this bug.
s fix can close #994899 and #995341,
since as Hans noted, they are part of the upstream stable 4.15 branch
and I presume that will make them stable enough for bullseye.
Thank you Hans, Diederik, and Elliott.
All the best,
Chuck
On 10/3/2021 11:21 AM, Chuck Zmudzinski wrote:
On 10/1/2021 5:48 AM, Diederik de Haas wrote:
We've already identified a possible fix, which I can point to if so
desired,
I think the fix referred to is here:
https://salsa.debian.org/xen-team/debian-xen/-/tree/knorrie/for-diederik-3-
The original submitter has proposed a fix (see messages #30 and #35).
Another contributor to this report has indicated the package maintainer
does not endorse the submitter of the bug's proposed fix and is working
on another fix (see messages #40 and #65). The original submitter of the
bug thin
able 4.14 branch and
its future stable point releases 4.14.x.
IMO, the debdiff attached to message #30:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=995341#30
is a better suited fix more in accordance with the stability/security
requirements of a typical Debian stable release.
Regards,
Chuck Zmudzinski
On 10/1/2021 5:48 AM, Diederik de Haas wrote:
Hi Release Team,
I want to make sure that you're aware of what I consider HIGHLY inappropriate
behavior by Chuck where he is trying to sidestep/override the Xen maintainers
by filing this bug directly to the release.debian.org pseudo package.
On 10/1/2021 5:48 AM, Diederik de Haas wrote:
Hi Release Team,
I want to make sure that you're aware of what I consider HIGHLY inappropriate
behavior by Chuck where he is trying to sidestep/override the Xen maintainers
by filing this bug directly to the release.debian.org pseudo package
On 9/29/2021 7:26 PM, Chuck Zmudzinski wrote:
Special instructions for applying the debdiff:
Please note that an updated debdiff has been provided
to target the correct distribution and use the correct
version number for the updated package at the following
link:
https://bugs.debian.org/cgi
On 9/29/2021 7:26 PM, Chuck Zmudzinski wrote:
Ordinarily, as I understand the process, a bug in the
stable version is first fixed in the unstable release
and then the fix is migrated (backported) to the
stable release. But it appears to me a fix in the
unstable release will not be forthcoming
On 9/30/2021 2:57 PM, Paul Gevers wrote:
Hi Chuck,
On 30-09-2021 18:15, Chuck Zmudzinski wrote:
... the debdiff I uploaded to BTS has UNRELEASED
rather than bullseye for the distribution field of the changelog,
and the new target version is ...deb11u1.1 instead of deb11u2.
That is how dch
On 9/30/2021 2:57 PM, Paul Gevers wrote:
Hi Chuck,
On 30-09-2021 18:15, Chuck Zmudzinski wrote:
... the debdiff I uploaded to BTS has UNRELEASED
rather than bullseye for the distribution field of the changelog,
and the new target version is ...deb11u1.1 instead of deb11u2.
That is how dch
Control: severity -1 normal
After reading some other bug reports, I now think this
bug's severity should be normal, not important.
Regards,
Chuck
, please see the
messages in #994899:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994899
and in #991967:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991967
All the best,
Chuck Zmudzinski
diff -Nru xen-4.14.3/debian/changelog xen-4.14.3/debian/changelog
--- xen-4.14.3/debian/changelog
some highly popular ARM devices.
When you decide what to do here, I would like to check it to
see if it works on my hardware and if you don't hear anything
from me, you can assume it worked fine on my hardware.
Cheers,
Chuck
ra three
commits. Perhaps it depends on differences in the BIOS or EFI, or
maybe systemd vs. sysv.
I share this result in case it is of help to you.
Regards,
Chuck Zmudzinski
A patch has been uploaded (see message #67). For more information, see
message #34.
atches on amd64|i386 to fix #994899
+ * debian/control - add Build Dependency quilt
+
+ -- Chuck Zmudzinski Mon, 27 Sep 2021 11:51:04 -0400
+
xen (4.14.3-1~deb11u1) bullseye-security; urgency=medium
* Rebuild for bullseye-security
diff -Nru xen-4.14.3/debian/control xen-4.14.3/debian/c
A patch has been uploaded (message #55). For more information, see
message #34.
into a separate directory
+ * debian/rules - disable RPI4 patches on amd64|i386 to fix #994899
+ * debian/control - add Build Dependency quilt
+
+ -- Chuck Zmudzinski Sun, 26 Sep 2021 22:23:21 -0400
+
xen (4.14.3-1~deb11u1) bullseye-security; urgency=medium
* Rebuild for bullseye-security
diff -N
Added tag upstream. Explanation is in discussion at
related bug #991967 here:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991967#169
and here:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991967#174
Briefly, since we are currently shipping a fork of Xen-4.14
on our unstable, testin
On 9/26/2021 8:46 AM, Chuck Zmudzinski wrote:
On 9/25/2021 11:27 PM, Elliott Mitchell wrote:
Unfortunately I was too quick at installing the rebuilt 4.14.3-1 and I
missed trying the vanilla Debian 4.14.2+25-gb6a8c4f72d-2 with
Linux 4.19.181-1. I believe this combination would have hung during
On 9/25/2021 11:27 PM, Elliott Mitchell wrote:
Unfortunately I was too quick at installing the rebuilt 4.14.3-1 and I
missed trying the vanilla Debian 4.14.2+25-gb6a8c4f72d-2 with
Linux 4.19.181-1. I believe this combination would have hung during
reboot.
In light of what I discovered while
On 9/25/2021 11:27 PM, Elliott Mitchell wrote:
The second we seem to have a fix. The only question is how many patches
to cherry pick? bc141e8ca562 is non-urgent as it is merely superficial
and not needed for functionality.
5a4087004d1a is a workaround for Linux kernel breakage, but how likely
On 9/25/2021 11:27 PM, Elliott Mitchell wrote:
On Tue, Sep 21, 2021 at 06:33:20AM -0400, Chuck Zmudzinski wrote:
I presume you are suggesting I try booting 4.19.181-1 on the
current version of Xen-4.14 for bullseye as a dom0. I am not
inclined to try it until an official Debian developer
discussing the matter with
me in a private email.
Cheers,
Chuck Zmudzinski
o
the Debian developers to decide. Instead, I will select
this message to be a summary of the bug.
Happy computing on Debian,
Chuck Zmudzinski
On 9/23/2021 5:50 PM, Diederik de Haas wrote:
On donderdag 23 september 2021 21:54:49 CEST Chuck Zmudzinski wrote:
While I did respond point by point privately to the author
Don't do that. Any discussion relevant to the bug should be sent to the bug
itself so that everyone has all the rel
On 9/23/2021 12:49 PM, Diederik de Haas wrote:
Control: tag -1 -newcomer
Control: tag -1 -upstream
On woensdag 22 september 2021 21:50:16 CEST Chuck Zmudzinski wrote:
Finally, I tag the bug newcomer simply because there is a known solution but
That's what the 'patch' tag is for
visor
as proposed here.
Regards,
Chuck Zmudzinski
*** Reporter, please consider answering these questions, where
appropriate ***
* What led up to the situation?
* What exactly did you do (or not do) that was effective (or
ineffective)?
* What was the outcome of this action?
*
een tested to apparently fix this bug and
the bug has been elevated to important and tagged patch and upstream,
AFAICT there is no action yet upstream or anywhere else after more than
three weeks. Is this patch dead as a possible fix for this bug?
Best wishes,
Chuck
On 9/21/2021 9:13 AM, Chuck Zmudzinski wrote:
On 9/20/2021 10:37 PM, Elliott Mitchell wrote:
On Mon, Sep 20, 2021 at 10:23:39PM -0400, Chuck Zmudzinski wrote:
On 9/20/21 7:39 PM, Diederik de Haas wrote:
On dinsdag 21 september 2021 01:15:15 CEST Elliott Mitchell wrote:
Merely having the path
On 9/20/2021 10:37 PM, Elliott Mitchell wrote:
On Mon, Sep 20, 2021 at 10:23:39PM -0400, Chuck Zmudzinski wrote:
On 9/20/21 7:39 PM, Diederik de Haas wrote:
On dinsdag 21 september 2021 01:15:15 CEST Elliott Mitchell wrote:
Merely having the path is a sufficiently strong indicator for me to
On 9/21/21 7:22 AM, Fr. Chuck Zmudzinski, C.P.M. wrote:
On Sat, 7 Aug 2021 08:40:14 +0200 Salvatore Bonaccorso
wrote:
> Control: tags -1 + moreinfo
>
> Hi,
>
> On Fri, Aug 06, 2021 at 11:50:54AM -0700, Elliott Mitchell wrote:
> > Package: src:linux
> > Vers
On 9/20/21 10:12 PM, Chuck Zmudzinski wrote:
On 9/20/21 6:29 PM, Chuck Zmudzinski wrote:
On 9/20/21 1:43 PM, Chuck Zmudzinski wrote:
On 9/20/21 12:27 AM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 01:05:56AM -0400, Chuck Zmudzinski wrote:
I suspect the following patch is the culprit
On 9/20/21 10:37 PM, Elliott Mitchell wrote:
On Mon, Sep 20, 2021 at 10:23:39PM -0400, Chuck Zmudzinski wrote:
On 9/20/21 7:39 PM, Diederik de Haas wrote:
On dinsdag 21 september 2021 01:15:15 CEST Elliott Mitchell wrote:
Merely having the path is a sufficiently strong indicator for me to
s as a bug in src:xen, since the original reporter
has not been able to identify a commit in src:linux that caused
the bug and no one has been able to reproduce the bug on
Xen-4.11/Linux-4.19.194-3.
Regards,
Chuck Zmudzinski
On 9/20/21 7:39 PM, Diederik de Haas wrote:
On dinsdag 21 september 2021 01:15:15 CEST Elliott Mitchell wrote:
Merely having the path is a sufficiently strong indicator for me to
simply wave it past. I though would suggest Debian should instead
cherry-pick commit 0f089bbf43ecce6f27576cb548ba4
On 9/20/21 6:29 PM, Chuck Zmudzinski wrote:
On 9/20/21 1:43 PM, Chuck Zmudzinski wrote:
On 9/20/21 12:27 AM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 01:05:56AM -0400, Chuck Zmudzinski wrote:
I suspect the following patch is the culprit for problems
shutting down on the amd64
On 9/20/21 1:43 PM, Chuck Zmudzinski wrote:
On 9/20/21 12:27 AM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 01:05:56AM -0400, Chuck Zmudzinski wrote:
I suspect the following patch is the culprit for problems
shutting down on the amd64 architecture:
0030-xen-acpi-Rework
On 9/20/21 12:27 AM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 01:05:56AM -0400, Chuck Zmudzinski wrote:
I suspect the following patch is the culprit for problems
shutting down on the amd64 architecture:
0030-xen-acpi-Rework-acpi_os_map_memory-and-acpi_os_unmap.patch
This patch does
On 9/20/21 12:27 AM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 01:05:56AM -0400, Chuck Zmudzinski wrote:
xen hypervisor version: 4.14.2+25-gb6a8c4f72d-2, amd64
linux kernel version: 5.10.46-4 (the current amd64 kernel
for bullseye)
Boot system: EFI, not using secure boot, booting xen
On 9/19/2021 9:30 PM, Chuck Zmudzinski wrote:
On 9/19/2021 4:53 PM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 03:54:01PM -0400, Chuck Zmudzinski wrote:
On 9/19/2021 1:29 PM, Elliott Mitchell wrote:
Have you tried memory ballooning with PVH or HVM domains?
That combination has been
On 9/19/2021 4:53 PM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 03:54:01PM -0400, Chuck Zmudzinski wrote:
On 9/19/2021 1:29 PM, Elliott Mitchell wrote:
Have you tried memory ballooning with PVH or HVM domains?
That combination has been reliably crashing Xen for me for a while
On 9/19/2021 1:29 PM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 01:05:56AM -0400, Chuck Zmudzinski wrote:
I noticed this bug on bullseye ever since I have been
running bullseye as a dom0, but my testing indicates
there is no problem with src:linux but the problem
appeared in src:xen with
On 9/19/2021 10:56 AM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 01:05:56AM -0400, Chuck Zmudzinski wrote:
On Sat, 11 Sep 2021 13:29:12 +0200 Salvatore Bonaccorso
wrote:
>
> On Fri, Sep 10, 2021 at 06:47:12PM -0700, Elliott Mitchell wrote:
> > An experiment lead to
On 9/19/2021 1:05 AM, Chuck Zmudzinski wrote:
Hello Elliott and Salvatore,
I noticed this bug on bullseye ever since I have been
running bullseye as a dom0, but my testing indicates
there is no problem with src:linux but the problem
appeared in src:xen with the 4.14 version of xen on
bullseye
s a bug in src:xen.
I also would inquire with the Debian Xen Team about why they
are backporting patches from the upstream xen unstable
branch into Debian's 4.14 package that is currently shipping
on Debian stable (bullseye). IMHO, the aforementioned
patches that are not in the stable 4.14 bra
On 8/26/2021 8:01 AM, Chuck Zmudzinski wrote:
On 8/24/2021 7:12 PM, Ben Hutchings wrote:
The current limit on the environment of a uevent appears to be 2 KB
(UEVENT_BUFFER_SIZE defined in ).� That seems like it
*might* be easier to change, so long as user-space doesn't have a
similar
in many years, and I never built a Debian
kernel before.
All the best,
Chuck
On 8/25/2021 4:16 PM, Phillip Susi wrote:
Chuck Zmudzinski writes:
If it doesn't work, I am also willing to try approach a by patching
the Linux kernel xen-kbdfront driver by removing the for loops that
advertise those 654 keys. I tend to agree with Philip that this is
totally unnecessary
ailed. The build was checking symbols when
it failed.
This will take a little while because it takes over an hour to build the
kernel on my system.
Chuck
On 8/25/2021 12:45 PM, Chuck Zmudzinski wrote:
On 8/24/2021 7:12 PM, Ben Hutchings wrote:
On Tue, Aug 24, 2021 at 03:27:19PM -0400, Phillip Susi wrote:
Ben Hutchings writes:
I think a proper fix would be one of:
a. If the Xen virtual keyboard driver is advertising capabilities it
��ï
I could be wrong about that.
I read the discussion Philip had with the Xen developers and they
seemed to want to keep the Xen keyboard driver as it is.
Chuck
On 8/25/2021 10:54 AM, Ben Hutchings wrote:
On Tue, 2021-08-24 at 15:19 -0400, Chuck Zmudzinski wrote:
On 8/24/2021 1:12 PM, Ben Hutchings wrote:
[...]
I think a proper fix would be one of:
a. If the Xen virtual keyboard driver is advertising capabilities it
doesn't have, stop it
On 8/24/2021 1:12 PM, Ben Hutchings wrote:
On Tue, 2021-08-24 at 10:56 -0400, Chuck Zmudzinski wrote:
On 5/24/2021 3:30 AM, Michael Biebl wrote:
Hi Phillip
Am 24.05.2021 um 06:19 schrieb Cyril Brulebois:
trigger to cold plug all devices. Both scripts are set -e. The Xen
Virtual Keyboard
to
update old device drivers so they are compatible with the
modern version? Does the Xen virtual keyboard need to be
managed by udev? Is there a simple way to disable incompatible
devices so udev ignores them?
Chuck Zmudzinski
on media is for.
Chuck Zmudzinski
Package: qemu-system-x86
Version: 6.0+dfsg-1~exp0 and 5.2+dfsg-10
Severity: normal
Tags: patch upstream
Dear Maintainer,
I find that when using qemu with a Windows Xen HVM DomU and also passing
through the Intel integrated graphics device (IGD) to the Windows Xen HVM DomU,
it is much more relia
Package: src:linux
Version: 5.10.28-1
Severity: normal
Tags: upstream
Dear Maintainer,
I have been using Xen's PCI and VGA passthrough feature since wheezy and jessie
were the stable versions, and back then both Windows HVMs and Linux HVMs would
function with the Intel Integrated Graphics Devic
0% reproducible with any kernel from 4.9 to 5.4, stable or backports. It
> may exist in earlier versions, but I do not have a machine with anything
> before 4.9 to test at present.
Confirming you are varying client-side kernels. Should the Linux
NFS client maintainers be Cc'd?
> From 1-2 make clean && make cycles to one afternoon depending on the number
> of machine cores. More cores/threads the faster it does it.
>
> I tried playing with protocol minor versions, caching options, etc - it is
> still reproducible for any nfs4 settings as long as there is client side
> caching of metadata.
>
> A.
>
>>
>> Regards,
>> Salvatore
>>
>
> --
> Anton R. Ivanov
> Cambridgegreys Limited. Registered in England. Company Number 10273661
> https://www.cambridgegreys.com/
--
Chuck Lever
Package: wordpress
Version: 5.0.10+dfsg1-0+deb10u1
Severity: normal
Dear Maintainer,
When attempting to log out of a newly installed WordPress site, it redirects
to "http://wp-login.php/?loggedout=true"; (it's miss ing the hostname). I
followed the instructions on the wiki to install:
https
Package: pcmanfm
Version: 1.3.1-1
Severity: wishlist
Dear Maintainer,
For configuring *pcmanfm* via scripts, it's important to realize that it
responds to some settings such as "quick_exec" in
~/.config/libfm/libfm.conf. It would be helpful if this sensitivity
were disclosed in the MAN page in ca
Alternatively, 'char i' in processCommandLineArgs can also be changed to
'int i' rather than the more ham-fisted approach I originally suggested.
Chuck Ricketts
h it's under a new license and
I'm unsure how official the license change is. But if that is the new upstream,
then it has yet to be fixed there either.
Chuck Ricketts
-- System Information:
Distributor ID: Raspbian
Description:Raspbian GNU/Linux 10 (buster)
Release:10
Codename:
least by using the ugly "2>&1", the misbehaving tool is
clearly marked.
Cheers - Chuck
primitive support for ignoring debug-trace output on
standard-error via the PS4 environment variable, so maybe a new option isn't
needed? Or maybe the PS4 mechanism needs enhancing...
Cheers - Chuck
> On May 17, 2018, at 5:48 PM, Moritz Schlarb wrote:
>
> Hi Chuck,
>
> On 17.05.2018 16:15, Chuck Lever wrote:
>
>> Just a shot in the dark: Wondering if v3.16 needs
>>
>> commit ea96d1ecbe4fcb1df487d99309d3157b4ff5fc02
>> Author: Anna Schumak
we could try.
Just a shot in the dark: Wondering if v3.16 needs
commit ea96d1ecbe4fcb1df487d99309d3157b4ff5fc02
Author: Anna Schumaker
AuthorDate: Fri Apr 3 14:35:59 2015 -0400
Commit: Trond Myklebust
CommitDate: Thu Apr 23 14:43:54 2015 -0400
nfs: Fetch MOUNTED_ON_FILEID when upda
I edited .claws-mail/clawsrc to set use_gpg_agent=1. I'm not sure how
to do this in real life. Anyway, that fixed it. PGP passphrase is
now saved for a brief period.
--
.. Be Seeing You,
.. Chuck Rhode, Sheboygan, WI, USA
.. Weather: http://LacusVeris.com/WX
.. 21° — Wind WNW
bian project if the Debian Xen team is interested in adding it to
the Debian packages archive, either in main, contrib, or non-free as
appropriate. I am not including any debdiff patches here because they
are too large.
Chuck Zmudzinski
, but jessie doesn't. For these reasons, you are better off trying
wheezy
or stretch for VGA passthrough until Debian provides a solution for jessie.
Chuck
On 02/12/2017 01:37 PM, Juergen Schinker wrote:
can you add your hw specs and also what about Debian-Stretch?
J
- On 12 F
emu-dm cannot be
restored to Debian Jessie's offical xen package.
Thank you for your consideration of my question.
Sincerely,
Chuck Zmudzinski
refox-esr [www-browser] 45.6.0esr-1~deb8u1
ii gedit 3.14.0-3
ii w3m [www-browser] 0.5.3-19
-- no debconf information
--
.. Be Seeing You,
.. Chuck Rhode, Sheboygan, WI, USA
.. Weather: http://LacusVeris.com/WX
.. 24° — Wind W 16 mph
pgpAgljk22Mmj.pgp
Description: OpenPGP digital signature
Package: tempest
Version: 1:12.2.0-1
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu zesty ubuntu-patch
Dear Maintainer,
In Ubuntu, the attached patch was applied to achieve the following:
* debian/{python-tempest.postinst, python-tempest.postrm,
py
Package: cryptsetup
Version: 2:1.7.0-2
Severity: important
Dear Maintainer,
* What led up to the situation?
Configuring a machine with RAID and encrypted disks.
* What exactly did you do (or not do) that was effective (or ineffective)?
Begin by encrypting entire disks:
cryptsetup luksFormat
You have some missing messages, to retrieve your missing messages Click
Here<http://ow.ly/VoGOG> to update your email by entering your details
correctly.
Secretary
Chuck McCarley
Mail Admin.
Package: chuck
Version: 1.2.0.8.dfsg-1.4
There is a new upstream version available: 1.3.5.0
http://chuck.cs.princeton.edu/release/
until 2016 or perhaps later... According to
https://en.wikipedia.org/wiki/Term_of_patent#United_States the patent
term is over, so how is it more than 20 years and why can't Debian
distribute it now, ie. after June 1, 2014?
Chuck
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Package: migrate
Version: 0.8.2-3
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu trusty ubuntu-patch
Dear Maintainer,
migrate fails to build from source due to a missing openstack-pkg-tools
dependency.
*** /tmp/tmpJcBkR5/bug_body
In Ubuntu, the attached
1 - 100 of 200 matches
Mail list logo