I had a look to that gist; the steps look mostly sane (still not to be applied blindly I'd say), however they are not safe for corner cases, as Sergio's comment points out.
Without steps to reproduce or at least the full system logs it's difficult to guess what may have happened. At the moment there's little we can do to investigate the problem.
I had a look to that gist; the steps look mostly sane (still not to be applied blindly I'd say), however they are not safe for corner cases, as Sergio's comment points out.
Without steps to reproduce or at least the full system logs it's difficult to guess what may have happened. At the moment there's little we can do to investigate the problem.