I see that this dependency is persisting in the new BPO release of
linux-headers 6.7.12, and it still causes significant trouble for me on my
build system.
I still can't understand what problem it's supposed to be fixing. Was there
ever an original bug report indicating the issue?
Colm
--
Colm
the precise meaning of "significant functionality" in
the Debian policy.
Colm
On Tue, 2 Apr 2024 at 17:57, Colm Buckley wrote:
> Please explain. I am really sorry to be dragging this discussion out, but
> I honestly think there is some information I'm missing. Please tell me what
&g
e and headers packages. Users who
regularly build new modules should be encouraged to install this package
and have it pull in suitable versions of both headers and image.
Is this correct, Bastian? I'm sorry for taking so long to understand what
problem was being addressed here.
Colm
--
Colm Buckley | c...@tuatha.org
en change in the behavior of existing installations.
I welcome the thoughts of the community.
Colm
[1] If the kernel image file is not present, the legacy mechanism for
extracting symbols for BTF builds does not work; this is the same issue
which was addressed with vmlinux.h in
https://salsa.debian.org/kernel-team/linux/-/merge_requests/1005
Package: linux-headers-amd64
Version: 6.6.13-1~bpo12+1
Followup-For: Bug #1064976
X-Debbugs-Cc: c...@tuatha.org
Can I suggest in the interim that Depends: be replaced with Recommends:
or Suggests: given that most installations won't actually need the image
package?
Colm
should really be addressed using vmlinux.h
(the "skipping BTF generation" message should be ignored as all of this
information *should* be included in vmlinux.h).
Any further thoughts?
Colm
sure
that declaring it here is not the right thing.
Colm
build). Am I missing
something else? I confess I have only a very small amount of experience
with BPF code; I played with building a few modules, but I don't use it
regularly.
Colm
necessary type definitions for libbpf, for
the kernel source version in question - ie: instead of needing to run
pahole or bpftool to extract these definitions from a specific vmlinux
image, this file is distributed with them already included.
Colm
s that I have a specific build server which builds kernels and
modules for other machines in a farm. It needs to have the header files for
specific target kernel versions installed, but it is not sensible to have
the corresponding image packages installed (in many cases, those images
wouldn't ev
ing images.
Colm
On Thu 29 Feb 2024, 10:31 Bastian Blank, wrote:
> Control: tags -1 wontfix
>
> On Wed, Feb 28, 2024 at 05:19:39PM +, Colm Buckley wrote:
> > The linux-headers packages for kernel version 6.6 seem to depend on the
> corresponding
> > linux-image packag
Some previous versions, for contrast:
% apt-cache depends linux-headers-6.5.0-0.deb12.4-amd64
linux-headers-6.5.0-0.deb12.4-amd64
Depends: linux-headers-6.5.0-0.deb12.4-common
Depends: linux-kbuild-6.5.0-0.deb12.4
Depends: linux-compiler-gcc-12-x86
% apt-cache depends
-kbuild and
any necessary glibc headers or other build artifacts, but not on linux-image-*
Many thanks,
Colm
-- System Information:
Debian Release: 12.5
APT prefers stable-updates
APT policy: (900, 'stable-updates'), (900, 'stable-security'), (900, 'stable')
Architecture: amd64 (x86_64
iew it as their responsibility to deal with breakages in unstable, unless
there's some other compelling reason.
My personal preference, assuming maintainer time is available, would be to
continue to offer 2.1.X in stable, and 2.2.X in backports when 2.2.0 is
released (as opposed to being RC).
Colm
packaging 7.76.1 (which fixes this issue) for buster-bpo.
The stable version does not seem to suffer from this problem.
Thanks,
Colm
-- System Information:
Debian Release: 10.9
APT prefers stable-updates
APT policy: (900, 'stable-updates'), (900, 'stable')
Architecture: amd64 (x86_64)
Kernel
I suspect that the kernel and initrd
detection in this script could use a real reworking, see also bug #966503.
Thanks,
Colm
-- System Information:
Debian Release: 10.8
APT prefers stable-updates
APT policy: (900, 'stable-updates'), (900, 'stable')
Architecture: arm64 (aarch64)
Kernel: Linux 5.9
l"
... but there might be corner cases which this doesn't catch.
Colm
On Thu, 11 Feb 2021 at 17:45, Christoph Biedl <
debian.a...@manchmal.in-ulm.de> wrote:
> Petter Reinholdtsen wrote...
>
> > Any idea how to figure out if trimming is possible/useful?
>
> Haven't ch
oes report whether TRIM is supported for each vdev,
but the effort of parsing that in the cron script seems excessive. Grepping
out that specific error message would probably be okay as an interim
workaround.
Colm
On Thu, 11 Feb 2021 at 10:03, Petter Reinholdtsen wrote:
> [Christoph Biedl]
-bpo source and result in a
corrected package.
Thanks for your help!
Colm
this version to stable, until this issue is resolved.
Colm
That PR patches cleanly against the Debian source; so I'm building a local
package version now to test.
Will follow up here and with upstream.
Colm
On Sat, 5 Sep 2020 at 20:48, Michael Biebl wrote:
> Am 05.09.20 um 21:31 schrieb Colm Buckley:
> > Package: systemd
> > Version:
Thanks,
I see 0.8.1 in buster-bpo now. Thank you!
Oh, and to be clear, the process is rarely any more complex than "apt-get
source firewalld/testing" and "dpkg-buildpackage". firewalld's dependencies
are small and slow-changing, at the moment stable-bpo contains all
necessary versions for firewalld/testing.
Colm
On Wed, Nov
I configure it using the command line; I have found some of the new
features and bugfixes in 0.7 to be useful for my setup, so I've been
building a samizdat 0.7.2 package myself, which "seems to work". However, I
only install firewalld_xxx.deb, not firewall-applet_xxx nor
firewall-config
Hum. I can validate the operations of firewalld itself, but I don't use
either the applet or the config package.
Colm
On Wed, Nov 20, 2019 at 6:55 PM Michael Biebl wrote:
> Am 20.11.19 um 19:45 schrieb Colm Buckley:
> > I feel that the answer is both yes and no. The *packaging* i
the
details are taken care of.
Colm
On Wed, Nov 20, 2019 at 6:36 PM Michael Biebl wrote:
> Am 20.11.19 um 19:24 schrieb Colm Buckley:
> > @biebl - looks as though stable-bpo's nftables package tracks upstream
> > pretty closely; if https://github.com/firewalld/firewalld/issues/540
@biebl - looks as though stable-bpo's nftables package tracks upstream
pretty closely; if https://github.com/firewalld/firewalld/issues/540 is
resolved, would you consider looking at packaging 0.8.0 for backports?
Gerhard tells me that this is fixed in the latest upstream version -
1.7.3.3.
Can this be packaged for Debian shortly? I can look into an NMU if
necessary.
Colm
--
Colm Buckley / c...@tuatha.org / +353 87 2469146
Package: firewalld
Version: 0.7.1-1
Severity: wishlist
Dear Maintainer,
firewalld 0.7 introduces sufficient new capabilities that it would be great to
see
it more widely available in the stable distribution. I would like to suggest
that it be added to buster-backports.
It does not appear to
Package: src:linux
Version: 5.2.9-2
Severity: normal
Dear Maintainer,
This system is an Intel NUC with an onboard Intel I219-LM
Ethernet adapter (e1000e) and an additional dual Intel I210
Ethernet adapter (igb) connected via the onboard M.2 interface
(M.2 Dual Ethernet supplied by G2 Digital; I
Package: src:linux
Version: 4.18.6-1~bpo9+1
Severity: important
Tags: upstream patch
Please see
https://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace.git/commit/?h=for-linus
- invalidating
filesystems can cause dentry table corruption leading to busy loop in kernel.
Easily
Per upstream; this seems to be a kernel bug which is fixed in 4.18.20.
Unclear whether the fix (1e9c75fb9c47a75a9aec0cd17db5f6dc36b58e00) can be
cherrypicked back to current stable / bpo kernels; investigating.
This is fixed by https://github.com/att/ast/pull/63/ - should be ok to pull
from upstream.
Colm
--
Colm Buckley / c...@tuatha.org / +353 87 2469146
... which is exactly what the patch does.
On Fri 19 Oct 2018, 18:45 Petter Reinholdtsen
>
> [Richard Laager]
> > The sysvinit scripts are already in the upstream tree and the released
> > tarballs. You can see them in the package's .orig.tar.gz in the
> > etc/init.d directory. The patch simply
Source: zfs-linux
Version: v0.7.11-1
Severity: important
Tags: upstream
Descendent filesystems which have out-of-tree mount points are not
correctly recovered on 'zfs send | zfs receive', leading to apparent
corruption of the mount table. With kernel 4.18, processes accessing
problematic parts of
with both new and existing kernels (on all supported
architectures) before a release can be made, and the BPO kernel maintainers
occasionally include forward patches from other kernel trees. It's not
impossible to make this work, but it is labor-intensive and has an
unpredictable schedule.
Colm
I don't wish to be rude - but there has been an unusually long period with
no developer activity regarding this package; and the developers' mailing
list seems to have been removed or reconfigured. Is everything in order?
Are more maintainers needed?
Colm
Package: zfsutils-linux
Version: 0.7.3-1
As 'zfs allow' now allows certain functions to be executed by any user, I
suggest a symbolic link from /usr/bin/zfs to /usr/sbin/{zfs, zpool} be
included.
ch in turn calls the current crontab generator, but it strikes me that
there might be a more elegant way.
Any takers?
Colm
--
Colm Buckley / c...@tuatha.org / +353 87 2469146
The samba team are already aware of the problem.
https://bugzilla.samba.org/show_bug.cgi?id=5080
It appears to have been a change in cups which caused the problem.
http://www.cups.org/str.php?L2537
--
Dr Colm G. Connolly
School of Psychology and Institute of Neuroscience
The Lloyd Building
usethis so use sounds
http://img444.imageshack.us/img444/3067/bn74np6.png
takecare problem offer resources careof
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
help maintain health security freeing focus
http://img444.imageshack.us/img444/6348/lq2qnd1.jpg
nowKnow which of is
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
by
# aptitude install python-docutils
yields a complete install with no configuration errors.
I had previously purged python-docutils to eliminate errors on every aptitude
upgrade
On 29/07/06, Simon McVittie [EMAIL PROTECTED] wrote:
On Tue, 25 Jul 2006 at 09:17:58 +0100, Colm G. Connolly wrote
Package: python-docutils
Version: 0.4-3
Severity: normal
-- System Information:
Debian Release: testing/unstable
APT prefers testing
APT policy: (990, 'testing'), (101, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux
to pick
more up when I get time.
--
Colm MacCárthaighPublic Key: [EMAIL PROTECTED]
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
/notification: root
--
Colm MacCárthaigh / HEAnet, Teach Brooklawn, / Innealtóir Líonra
+353 1 6609040/ Bóthar Shelbourne, BÁC, IE / http://www.hea.net/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
ftp.ie.debian.org, I know all about the peaks from such things :)
It's not a huge problem (we certainly don't have any issues from it) -
but it is still worth fixing and to be honest, it's a bug rather than a
wishlist item.
Thanks for this, and your other bug report. I'll get on em!
--
Colm MacCárthaigh
--
Colm MacCrthaigh / HEAnet, Teach Brooklawn, / Innealtir Lonra
+353 1 6609040/ Bthar Shelbourne, BC, IE / http://www.hea.net/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Package: udev
Version: 0.056-2
Severity: wishlist
It might be useful to include some rules for the logcheck package so
certain messages from udev can ge ignored.
Something like the attached file might do the trick.
-- Package-specific info:
-- /etc/udev/rules.d/:
/etc/udev/rules.d/:
total 0
are currently pending an upgrade:
shellutils 5.2.1-2
textutils 5.2.1-2
Package Details:
Reading changelogs...
apt-listchanges: didn't find any valid .deb archives
=
--
Colm MacCárthaigh
(= 2.18), mailx, debconf
Description: cron-script to mail impending apt updates
- apticron is a a simple script to mail about impending apt updates
- such as security updates.
+ apticron is a simple script to mail about impending apt updates such
+ as security updates.
--
Colm MacCárthaigh
#: ../templates:4
msgid
Specify e-mail addresses, space seperated, that should be notified of
pending updates.
msgstr
Veuillez indiquer les adresses électroniques, séparées par
des espaces, des personnes qui doivent être prévenues des
mises à jour en attente.
--
Colm MacCárthaigh
: | cut -f 4
-d \ `
--
Colm MacCárthaigh / HEAnet, Teach Brooklawn, / Innealtóir Líonra
+353 1 6609040/ Bóthar Shelbourne, BÁC, IE / http://www.hea.net/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
autoclean' without even *mentioning*
this. If you think you want to delete people's .debs then please
mention it in the manpage and/or create a commandline switch.
--
Colm MacCárthaigh / HEAnet, Teach Brooklawn, / Innealtóir Líonra
+353 1 6609040/ Bóthar Shelbourne, BÁC, IE / http
information:
* apticron/notification: root
--
Colm MacCárthaigh / HEAnet, Teach Brooklawn, / Innealtóir Líonra
+353 1 6609040/ Bóthar Shelbourne, BÁC, IE / http://www.hea.net/
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL
On Tue, Mar 22, 2005 at 01:18:41PM -0500, Marc Sherman wrote:
Colm MacCarthaigh wrote:
On this front, I've been thinking it would be better to use
apt-listchanges --profile option, ie use --profile=apticron and allow
end-users to pick the output they desire that way. with defaults
somewhat
57 matches
Mail list logo