From owner-freebsd-x11@freebsd.org Sun Feb 28 19:20:34 2021 Return-Path: Delivered-To: freebsd-x11@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 28C9353E681; Sun, 28 Feb 2021 19:20:34 +0000 (UTC) (envelope-from mad@madpilot.net) Received: from mail.madpilot.net (vogon.madpilot.net [159.69.1.99]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4DpYBn1sNvz4lSr; Sun, 28 Feb 2021 19:20:33 +0000 (UTC) (envelope-from mad@madpilot.net) Received: from mail (mail [192.168.254.3]) by mail.madpilot.net (Postfix) with ESMTP id 4DpYBf2MvSz6dT0; Sun, 28 Feb 2021 20:20:26 +0100 (CET) Received: from mail.madpilot.net ([192.168.254.3]) by mail (mail.madpilot.net [192.168.254.3]) (amavisd-new, port 10026) with ESMTP id 3JEUNxlVZy1y; Sun, 28 Feb 2021 20:20:24 +0100 (CET) Subject: Re: [CFT] Upstream patch fixing keys grabbing in xfce (bug 244290) To: xfce@FreeBSD.org, "freebsd-x11@freebsd.org" References: <9cfaa693-0967-2fd1-8296-a9905d05ede6@madpilot.net> From: Guido Falsi Message-ID: <2d74d428-002b-f4cb-c381-f1a2f6bc872f@madpilot.net> Date: Sun, 28 Feb 2021 20:20:23 +0100 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 4DpYBn1sNvz4lSr X-Spamd-Bar: - X-Spamd-Result: default: False [-2.00 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; RBL_DBL_DONT_QUERY_IPS(0.00)[159.69.1.99:from]; R_DKIM_ALLOW(-0.20)[madpilot.net:s=bjowvop61wgh]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; MISSING_MIME_VERSION(2.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-1.00)[-1.000]; SPAMHAUS_ZRD(0.00)[159.69.1.99:from:127.0.2.255]; RCVD_COUNT_THREE(0.00)[3]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; DKIM_TRACE(0.00)[madpilot.net:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[madpilot.net,quarantine]; NEURAL_HAM_SHORT(-1.00)[-1.000]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:24940, ipnet:159.69.0.0/16, country:DE]; MID_RHS_MATCH_FROM(0.00)[]; MAILMAN_DEST(0.00)[freebsd-x11,xfce] X-BeenThere: freebsd-x11@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: X11 on FreeBSD -- maintaining and support List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 28 Feb 2021 19:20:34 -0000 On 20/02/21 16:31, Guido Falsi via freebsd-xfce wrote: > On 20/02/21 16:13, Guido Falsi via freebsd-xfce wrote: >> Hi! >> >> I'm sending this message to ask for people experiencing the issue >> described in bug 244290 [1] and willing to test the patch I posted in >> that bug report. >> >> I've also created an already patched port as an archive here [2] >> >> Unluckily I'm not experiencing the issue, so I'm unable to confirm to >> the upstream the patch works. >> >> What is needed is someone having the issue confirming this patch fixes >> it. Or confirming that the patch makes no difference. >> >> I'd really like to solve that issue, but upstream, (reasonably) asks >> for some report about the patch actually working before committing it >> to their tree. >> > > I just got information from upsstream that a revised and improved > version of the patch is going to be published in a few days, so, no > hurry to test this version right now. > > I'll followup once I get the new patch. > Upstream updated it's patch, so testing is strongly needed now. The new patch (or tarball) are available in the bug report and link posted there: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=244290#c76 Thanks in advance! -- Guido Falsi