<<< metadata_duplicate_useflag_description >>> net-misc/networkmanager|elogind:wifi|gnome@gentoo.org <<< packages_pkgcheck_scan >>> ExcessiveLineLength: version 1.46.0-r1: excessive line length (over 120 characters) on line: 8 VariableOrderWrong: version 1.46.0-r1: variable KEYWORDS should occur before RESTRICT <<< open bugs >>> https://bugs.gentoo.org/650328 net-misc/networkmanager_does_not_run_dispatch_scripts_on_openrc https://bugs.gentoo.org/728776 net-misc/networkmanager-1.18.6_ignores_polkit_rules_upon_start https://bugs.gentoo.org/831635 net-misc/networkmanager_does_not_wait_for_net-wireless/iwd_on_OpenRC_systems https://bugs.gentoo.org/865017 net-misc/networkmanager_1.38.4_defaults_use_to_'+iwd',_may_require_news. https://bugs.gentoo.org/865523 net-misc/networkmanager-1.38.4_and_net-wireless/iwd:_"IWD_agent_request_for_a_wrong_network_object"_when_connecting_to_hidden_network https://bugs.gentoo.org/905668 net-misc/networkmanager-1.42.6-r1_default_policy_allows_all_users_to_manage_system_connections_making_plugdev_group_ineffective_for_managing_permissions https://bugs.gentoo.org/928989 net-misc/networkmanager:_please_add_a_use-flag_for_wired_802.1x https://bugs.gentoo.org/705960 net-misc/networkmanager-1.18.4-r2_changes_WiFi_MAC_address_with_every_activation https://bugs.gentoo.org/714168 net-misc/networkmanager-1.26.2:_udev_rule_for_setting_ENV{ID_NET_DRIVER}_on_devices_is_broken_because_of_wrong_hardcoded_path_for_sed https://bugs.gentoo.org/732708 net-vpn/strongswan_charon_program_complains_about_missing_caps_(net-misc/networkmanager_needs_CAP_SETPCAP?) https://bugs.gentoo.org/926694 net-misc/networkmanager-1.46.0:_-flto-partition=none_not_supported._Disable_link-time_optimization_with_-Db_lto=false https://bugs.gentoo.org/926943 net-misc/networkmanager-1.46.0:_fails_to_establish_ipv4_connection:_acd_pending https://bugs.gentoo.org/928878 net-misc/networkmanager-1.46.0-r1:_QA_Notice:_Unresolved_soname_dependency https://bugs.gentoo.org/792345 net-misc/networkmanager-1.30.0:_Denial_of_service_vulnerability_(CVE-2021-20297)