Bug#768288: linux: FTBFS on i386: incomplete migration from 486 to 586 flavour
Source: linux Version: 3.16.7-1 Severity: serious Justification: fails to build from source (but built successfully in the past) linux/3.16.7-1 has this change: * [i386] Rename 486 flavour to 586, as it has not worked on 486 processors since we enabled CC_STACKPROTECTOR (Closes: #766105) - Select M586TSC instead of M486 but the i386 build log indicates that it is still trying (and now failing) to run kernel-wedge for the 486 flavour. Regards, S -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20141106092432.ga23...@reptile.pseudorandom.co.uk
Bug#768289: linux-image-3.16-3-amd64: Suspend/sleep causes laptop to never wake up, lose data
Package: src:linux Version: 3.16.5-1 Severity: grave Justification: causes non-serious data loss Dear Maintainer, * What led up to the situation? * What exactly did you do (or not do) that was effective (or ineffective)? When I close the lid on my laptop, it goes to sleep (suspend). * What was the outcome of this action? When I open it up, the system never wakes up, which equals to system crash and data loss. * What outcome did you expect instead? The system should come out of suspend/sleep and resume operation, which works fine on Windows 7 Pro on this very same PC. (Dual boot) More info: Hardware: Toshiba Portege Z30 Ultrabook, Intel Core i7 4600U DMI decode: http://pastebin.com/30Jhfr77 lspci -v: http://pastebin.com/sBWXCGjM The problem could be upower, or kernel itself. This bug makes Debian a non-functional on this laptop. Sadly I can't use Debian 7.0 Wheezy on it, due to lack of Ethernet drivers. I am using Debian GNU/Linux 8.0 Jessie BETA -- Package-specific info: ** Version: Linux version 3.16-3-amd64 (debian-kernel@lists.debian.org) (gcc version 4.8.3 (Debian 4.8.3-12) ) #1 SMP Debian 3.16.5-1 (2014-10-10) ** Command line: BOOT_IMAGE=/boot/vmlinuz-3.16-3-amd64 root=UUID=7db0fed9-1e96-400d-aa67-6f207494c318 ro nomodeset quiet ** Not tainted ** Kernel log: [2.889609] sound hdaudioC1D0:speaker_outs=0 (0x0/0x0/0x0/0x0/0x0) [2.889612] sound hdaudioC1D0:hp_outs=1 (0x21/0x0/0x0/0x0/0x0) [2.889613] sound hdaudioC1D0:mono: mono_out=0x0 [2.889615] sound hdaudioC1D0:inputs: [2.889617] sound hdaudioC1D0: Mic=0x19 [2.889619] sound hdaudioC1D0: Internal Mic=0x12 [2.894254] tpm_tis 00:01: 1.2 TPM (device-id 0xB, rev-id 16) [2.896801] mei_me :00:16.0: NFC MEI VERSION: IVN 0x1 Vendor ID 0x1 Type 0x1 [2.896884] media: Linux media interface: v0.10 [2.899023] Linux video capture interface: v2.00 [2.900243] input: PC Speaker as /devices/platform/pcspkr/input/input9 [2.900779] input: HDA Intel PCH Mic as /devices/pci:00/:00:1b.0/sound/card1/input7 [2.900818] input: HDA Intel PCH Headphone as /devices/pci:00/:00:1b.0/sound/card1/input8 [2.902105] usbcore: registered new interface driver cdc_ncm [2.903951] usbcore: registered new interface driver cdc_wdm [2.905371] uvcvideo: Found UVC 1.00 device TOSHIBA Web Camera - FHD (04f2:b3b2) [2.907487] input: TOSHIBA Web Camera - FHD as /devices/pci:00/:00:14.0/usb2/2-7/2-7:1.0/input/input11 [2.909160] usbcore: registered new interface driver uvcvideo [2.909163] USB Video Class driver (1.1.1) [2.909735] cdc_mbim 2-4:2.12: cdc-wdm0: USB WDM device [2.909898] cdc_mbim 2-4:2.12 wwan0: register 'cdc_mbim' at usb-:00:14.0-4, CDC MBIM, 9e:53:13:62:95:ce [2.909920] usbcore: registered new interface driver cdc_mbim [2.910139] snd_hda_intel :00:03.0: Cannot turn on display power on i915 [2.911142] iwlwifi :02:00.0: Detected Intel(R) Dual Band Wireless AC 7260, REV=0x144 [2.912241] iwlwifi :02:00.0: L1 Enabled; Disabling L0S [2.912730] iwlwifi :02:00.0: L1 Enabled; Disabling L0S [2.912776] AVX2 version of gcm_enc/dec engaged. [2.917712] alg: No test for __gcm-aes-aesni (__driver-gcm-aes-aesni) [2.924290] alg: No test for crc32 (crc32-pclmul) [2.945188] usb 2-6.3.2: new full-speed USB device number 7 using xhci_hcd [2.965220] iTCO_vendor_support: vendor-support=0 [2.965667] iTCO_wdt: Intel TCO WatchDog Timer Driver v1.11 [2.965701] iTCO_wdt: Found a Lynx Point_LP TCO device (Version=2, TCOBASE=0x1860) [2.965838] iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) [2.975733] Adding 2103292k swap on /dev/sda6. Priority:-1 extents:1 across:2103292k SSFS [2.999458] EXT4-fs (sda8): mounted filesystem with ordered data mode. Opts: (null) [3.010100] systemd-journald[166]: Received request to flush runtime journal from PID 1 [3.031414] usb 2-6.3.2: New USB device found, idVendor=0b97, idProduct=7772 [3.031418] usb 2-6.3.2: New USB device strings: Mfr=1, Product=2, SerialNumber=0 [3.031420] usb 2-6.3.2: Product: O2Micro CCID SC Reader [3.031422] usb 2-6.3.2: Manufacturer: O2 [3.031519] usb 2-6.3.2: ep 0x81 - rounding interval to 1024 microframes, ep desc says 2040 microframes [3.048094] toshiba_acpi: Accelerometer not supported [3.187490] e1000e :00:19.0: irq 58 for MSI/MSI-X [3.270648] usb 2-8: new full-speed USB device number 8 using xhci_hcd [3.282077] random: nonblocking pool is initialized [3.290638] e1000e :00:19.0: irq 58 for MSI/MSI-X [3.290744] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready [3.296232] ieee80211 phy0: Selected rate control algorithm 'iwl-mvm-rs' [3.399420] usb 2-8: New USB device found, idVendor=8087, idProduct=07dc [3.399421] usb 2-8: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [3.412408] Bluetooth: Core ver 2.19 [
Bug#768297: fix udeb packaging on hppa
Source: linux Version: 3.16.0-4 Severity: important Tags: patch This is a follow-up on Bug#766793. I'm not sure if I tested something wrong when I opened Bug#766793, but now while packaging the udeb packages we get this error: kernel-wedge install-files 3.16.0-4 install -D -m 644 debian/linux-image-3.16.0-4-parisc/boot/vmlinux-3.16.0-4-parisc debian/kernel-image-3.16.0-4-parisc-di/boot/vmlinux-3.16.0-4-parisc install -d debian/kernel-image-3.16.0-4-parisc-di/lib/modules/3.16.0-4-parisc install -m 644 debian/linux-image-3.16.0-4-parisc/lib/modules/3.16.0-4-parisc/modules.builtin debian/linux-image-3.16.0-4-parisc/lib/modules/3.16.0-4-parisc/modules.order debian/kernel-image-3.16.0-4-parisc-di/lib/modules/3.16.0-4-parisc/ install -D -m 644 debian/linux-image-3.16.0-4-parisc/boot/System.map-3.16.0-4-parisc debian/kernel-image-3.16.0-4-parisc-di/boot/System.map-3.16.0-4-parisc kernel-wedge copy-modules 3.16.0-4 parisc 3.16.0-4-parisc kernel-wedge find-dups 3.16.0-4-parisc some modules are in more than one package debian/sata-modules-3.16.0-4-parisc-di lib/modules/3.16.0-4-parisc/kernel/drivers/ata/libata.ko debian/pata-modules-3.16.0-4-parisc-di lib/modules/3.16.0-4-parisc/kernel/drivers/ata/libata.ko debian/nic-usb-modules-3.16.0-4-parisc-di lib/modules/3.16.0-4-parisc/kernel/drivers/net/phy/libphy.ko debian/nic-modules-3.16.0-4-parisc-di lib/modules/3.16.0-4-parisc/kernel/drivers/net/phy/libphy.ko debian/scsi-modules-3.16.0-4-parisc-di lib/modules/3.16.0-4-parisc/kernel/drivers/scsi/sym53c8xx_2/sym53c8xx.ko debian/scsi-common-modules-3.16.0-4-parisc-di lib/modules/3.16.0-4-parisc/kernel/drivers/scsi/sym53c8xx_2/sym53c8xx.ko command exited with status 1 The attached tar.gz file to the debian/installer subdirectory fixes this. Can you please apply it for the next upload? It adds ata-modules and nic-shared-modules to both hppa/hppa64 directories and modifies the scsi-modules by removing sym53c8xx.ko module (which is already in scsi-common-modules. Thanks, Helge hppa_installer_debs.tgz Description: application/gzip
Processed: Re: [Pkg-xen-devel] Bug#767261: xen-hypervisor-4.4-amd64: host lockup when DomU network iface is down
Processing control commands: reassign -1 src:linux Bug #767261 [xen-hypervisor-4.4-amd64] xen-hypervisor-4.4-amd64: host lockup when DomU network iface is down Bug reassigned from package 'xen-hypervisor-4.4-amd64' to 'src:linux'. No longer marked as found in versions xen/4.4.1-3. Ignoring request to alter fixed versions of bug #767261 to the same values previously set found -1 3.16.5-1 Bug #767261 [src:linux] xen-hypervisor-4.4-amd64: host lockup when DomU network iface is down Marked as found in versions linux/3.16.5-1. -- 767261: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=767261 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.b767261.141527626623565.transcr...@bugs.debian.org
Bug#768327: linux-image-amd64: Inclusion of 3.17 kernel in place of 3.16 kernel
Package: linux-image-amd64 Version: 3.16+62 Severity: wishlist Tags: security Hi, As I know currently freeze for Jessie happend on 5th November, 2014 and earlier communications suggests that kernel 3.16 has been chosen as a base for Jessie. As of 30th October 2014, 3.16.7 is the latest and last version for kernel 3.16 as it reached EOL. Currently keeping the 3.16 kernel for Jessie, which is due next year and will be supported for years to come afterwards, choosing a EOL kernel is both an extra headache for backporting security vulnerabilities fixes and featureset addition. I suggest we can use 3.18 kernel which will hopefully be a future LTS release or the next LTS kernel for Jessie. Warm Regards Abhisek Mukherjee -- System Information: Debian Release: jessie/sid APT prefers testing-updates APT policy: (500, 'testing-updates'), (500, 'testing') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.16-3-amd64 (SMP w/2 CPU cores) Locale: LANG=en_IN, LC_CTYPE=en_IN (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages linux-image-amd64 depends on: ii linux-image-3.16-3-amd64 3.16.5-1 linux-image-amd64 recommends no packages. linux-image-amd64 suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20141106144403.19699.70113.reportbug@Karma-X.WORKGROUP
Bug#768327: linux-image-amd64: Inclusion of 3.17 kernel in place of 3.16 kernel
Le jeu. 6 nov. 2014 à 15:44, Abhisek Mukherjee abhisek.mukher...@gmail.com a écrit : Package: linux-image-amd64 Version: 3.16+62 Severity: wishlist Tags: security Hi, Hello, As I know currently freeze for Jessie happend on 5th November, 2014 and earlier communications suggests that kernel 3.16 has been chosen as a base for Jessie. As of 30th October 2014, 3.16.7 is the latest and last version for kernel 3.16 as it reached EOL. Currently keeping the 3.16 kernel for Jessie, which is due next year and will be supported for years to come afterwards, choosing a EOL kernel is both an extra headache for backporting security vulnerabilities fixes and featureset addition. I suggest we can use 3.18 kernel which will hopefully be a future LTS release or the next LTS kernel for Jessie. Actually, the 3.16 kernel version will have an extended stable support! https://lists.debian.org/debian-kernel/2014/10/msg00543.html Warm Regards Abhisek Mukherjee Cheers, Vincent -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/1415286625.673...@smtp.free.fr
Bug#768327: linux-image-amd64: Inclusion of 3.17 kernel in place of 3.16 kernel
Le jeu. 6 nov. 2014 à 17:03, Abhisek Mukherjee abhisek.mukher...@gmail.com a écrit : Hi, As per I can see from the message that ubuntu team will maintain the kernel till April, 2014. I believe Jessie will be supported much longer than that. It will be maintained by the Ubuntu kernel team until April 2016, then Ben Hutchings from the Debian kernel team will probably take over the maintenance. -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/1415290341.832...@smtp.free.fr
Bug#768327: linux-image-amd64: Inclusion of 3.17 kernel in place of 3.16 kernel
Hi, As per I can see from the message that ubuntu team will maintain the kernel till April, 2014. I believe Jessie will be supported much longer than that. *Warm Regards* *Abhisek Mukherjee* *Contact: +91-9836482106* *E-mail: abhisek.mukher...@gmail.com abhisek.mukher...@gmail.com* *E-mail: abhisek1...@hotmail.com abhisek1...@hotmail.com* **When we remember we are all mad, the mysteries disappear and life stands explained. On Thu, Nov 6, 2014 at 8:40 PM, Vincent Blut vincent.deb...@free.fr wrote: Le jeu. 6 nov. 2014 à 15:44, Abhisek Mukherjee abhisek.mukher...@gmail.com a écrit : Package: linux-image-amd64 Version: 3.16+62 Severity: wishlist Tags: security Hi, Hello, As I know currently freeze for Jessie happend on 5th November, 2014 and earlier communications suggests that kernel 3.16 has been chosen as a base for Jessie. As of 30th October 2014, 3.16.7 is the latest and last version for kernel 3.16 as it reached EOL. Currently keeping the 3.16 kernel for Jessie, which is due next year and will be supported for years to come afterwards, choosing a EOL kernel is both an extra headache for backporting security vulnerabilities fixes and featureset addition. I suggest we can use 3.18 kernel which will hopefully be a future LTS release or the next LTS kernel for Jessie. Actually, the 3.16 kernel version will have an extended stable support! https://lists.debian.org/debian-kernel/2014/10/msg00543.html Warm Regards Abhisek Mukherjee Cheers, Vincent
Bug#768327: linux-image-amd64: Inclusion of 3.17 kernel in place of 3.16 kernel
On Thu, 2014-11-06 at 21:33 +0530, Abhisek Mukherjee wrote: Hi, As per I can see from the message that ubuntu team will maintain the kernel till April, 2014. I believe Jessie will be supported much longer than that. Please read again, you'll see we did actually think about this. Ben. -- Ben Hutchings Beware of programmers who carry screwdrivers. - Leonard Brandwein signature.asc Description: This is a digitally signed message part
Bug#767261: [Pkg-xen-devel] Bug#767261: xen-hypervisor-4.4-amd64: host lockup when DomU network iface is down
On 11/06/2014 07:17 AM, Ian Campbell wrote: Control: reassign -1 src:linux Control: found -1 3.16.5-1 On Wed, 2014-10-29 at 12:57 -0400, Gedalya wrote: On dom0 I get messages like 'vif vif-10-0 vif10.0: draining TX queue', starting as soon as the domU's boot up. I'm pretty sure this is a regression from Xen 4.1 in wheezy. [...] dom0 and domU kernel is linux 3.16-3-amd64 3.16.5-1 This is most likely to be a dom0 kernel side issue, so reassigning. Are there any interesting messages preceeding the draining TX queue ones? No... nothing at all. I suspect we will need to backport some xen-netback patch or other. I've put some feelers out to see if any of the upstream devs have any hints... OK so if it's just a matter of changing a kernel on one box, I can perhaps try to build a 3.18 this weekend Ian. -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/545b9c8e.5040...@gedalya.net
Processed: closing 768327
Processing commands for cont...@bugs.debian.org: close 768327 Bug #768327 [linux-image-amd64] linux-image-amd64: Inclusion of 3.17 kernel in place of 3.16 kernel Marked Bug as done thanks Stopping processing here. Please contact me if you need assistance. -- 768327: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768327 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.c.14152907692530.transcr...@bugs.debian.org
Bug#768297: fix udeb packaging on hppa
On Thu, 2014-11-06 at 11:32 +0100, Helge Deller wrote: Source: linux Version: 3.16.0-4 Severity: important Tags: patch This is a follow-up on Bug#766793. I'm not sure if I tested something wrong when I opened Bug#766793, but now while packaging the udeb packages we get this error: [...] This used to be non-fatal if you had distribution=UNRELEASED in debian/changelog; we've since realised what a terrible idea that was: r21830 | benh | 2014-09-12 18:01:30 +0100 (Fri, 12 Sep 2014) | 7 lines debian/rules.real: Never make kernel-wedge errors non-fatal Currently we set KW_CHECK_NONFATAL=y when building for experimental or an unreleased package. In theory people would be checking for kernel-wedge errors in the build logs. In practice this meant we didn't see them until they appear in unstable where they are fatal. Ben. -- Ben Hutchings Beware of programmers who carry screwdrivers. - Leonard Brandwein signature.asc Description: This is a digitally signed message part
linux_3.2.63-2+deb7u1_multi.changes ACCEPTED into proposed-updates-stable-new, proposed-updates
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 29 Oct 2014 23:35:20 + Source: linux Binary: linux-source-3.2 linux-doc-3.2 linux-manual-3.2 linux-support-3.2.0-4 linux-libc-dev linux-headers-3.2.0-4-all linux-headers-3.2.0-4-all-alpha linux-headers-3.2.0-4-common linux-image-3.2.0-4-alpha-generic linux-headers-3.2.0-4-alpha-generic linux-image-3.2.0-4-alpha-smp linux-headers-3.2.0-4-alpha-smp linux-image-3.2.0-4-alpha-legacy linux-headers-3.2.0-4-alpha-legacy linux-headers-3.2.0-4-all-amd64 kernel-image-3.2.0-4-amd64-di nic-modules-3.2.0-4-amd64-di nic-extra-modules-3.2.0-4-amd64-di nic-wireless-modules-3.2.0-4-amd64-di nic-shared-modules-3.2.0-4-amd64-di serial-modules-3.2.0-4-amd64-di usb-serial-modules-3.2.0-4-amd64-di ppp-modules-3.2.0-4-amd64-di pata-modules-3.2.0-4-amd64-di cdrom-core-modules-3.2.0-4-amd64-di firewire-core-modules-3.2.0-4-amd64-di scsi-core-modules-3.2.0-4-amd64-di scsi-modules-3.2.0-4-amd64-di scsi-common-modules-3.2.0-4-amd64-di scsi-extra-modules-3.2.0-4-amd64-di plip-modules-3.2.0-4-amd64-di floppy-modules-3.2.0-4-amd64-di loop-modules-3.2.0-4-amd64-di btrfs-modules-3.2.0-4-amd64-di ext2-modules-3.2.0-4-amd64-di ext3-modules-3.2.0-4-amd64-di ext4-modules-3.2.0-4-amd64-di isofs-modules-3.2.0-4-amd64-di jfs-modules-3.2.0-4-amd64-di ntfs-modules-3.2.0-4-amd64-di reiserfs-modules-3.2.0-4-amd64-di xfs-modules-3.2.0-4-amd64-di fat-modules-3.2.0-4-amd64-di ufs-modules-3.2.0-4-amd64-di qnx4-modules-3.2.0-4-amd64-di md-modules-3.2.0-4-amd64-di multipath-modules-3.2.0-4-amd64-di usb-modules-3.2.0-4-amd64-di usb-storage-modules-3.2.0-4-amd64-di pcmcia-storage-modules-3.2.0-4-amd64-di fb-modules-3.2.0-4-amd64-di input-modules-3.2.0-4-amd64-di event-modules-3.2.0-4-amd64-di mouse-modules-3.2.0-4-amd64-di irda-modules-3.2.0-4-amd64-di parport-modules-3.2.0-4-amd64-di nic-pcmcia-modules-3.2.0-4-amd64-di pcmcia-modules-3.2.0-4-amd64-di nic-usb-modules-3.2.0-4-amd64-di sata-modules-3.2.0-4-amd64-di core-modules-3.2.0-4-amd64-di acpi-modules-3.2.0-4-amd64-di i2c-modules-3.2.0-4-amd64-di crc-modules-3.2.0-4-amd64-di crypto-modules-3.2.0-4-amd64-di crypto-dm-modules-3.2.0-4-amd64-di efi-modules-3.2.0-4-amd64-di ata-modules-3.2.0-4-amd64-di mmc-core-modules-3.2.0-4-amd64-di mmc-modules-3.2.0-4-amd64-di nbd-modules-3.2.0-4-amd64-di squashfs-modules-3.2.0-4-amd64-di speakup-modules-3.2.0-4-amd64-di virtio-modules-3.2.0-4-amd64-di uinput-modules-3.2.0-4-amd64-di sound-modules-3.2.0-4-amd64-di zlib-modules-3.2.0-4-amd64-di hyperv-modules-3.2.0-4-amd64-di udf-modules-3.2.0-4-amd64-di fuse-modules-3.2.0-4-amd64-di linux-image-3.2.0-4-amd64 linux-headers-3.2.0-4-amd64 linux-image-3.2.0-4-amd64-dbg xen-linux-system-3.2.0-4-amd64 linux-headers-3.2.0-4-common-rt linux-image-3.2.0-4-rt-amd64 linux-headers-3.2.0-4-rt-amd64 linux-image-3.2.0-4-rt-amd64-dbg linux-headers-3.2.0-4-all-armel kernel-image-3.2.0-4-iop32x-di nic-modules-3.2.0-4-iop32x-di nic-shared-modules-3.2.0-4-iop32x-di usb-serial-modules-3.2.0-4-iop32x-di ppp-modules-3.2.0-4-iop32x-di pata-modules-3.2.0-4-iop32x-di cdrom-core-modules-3.2.0-4-iop32x-di scsi-core-modules-3.2.0-4-iop32x-di loop-modules-3.2.0-4-iop32x-di ipv6-modules-3.2.0-4-iop32x-di btrfs-modules-3.2.0-4-iop32x-di ext2-modules-3.2.0-4-iop32x-di ext3-modules-3.2.0-4-iop32x-di ext4-modules-3.2.0-4-iop32x-di isofs-modules-3.2.0-4-iop32x-di jffs2-modules-3.2.0-4-iop32x-di jfs-modules-3.2.0-4-iop32x-di reiserfs-modules-3.2.0-4-iop32x-di fat-modules-3.2.0-4-iop32x-di md-modules-3.2.0-4-iop32x-di multipath-modules-3.2.0-4-iop32x-di usb-modules-3.2.0-4-iop32x-di usb-storage-modules-3.2.0-4-iop32x-di event-modules-3.2.0-4-iop32x-di nic-usb-modules-3.2.0-4-iop32x-di sata-modules-3.2.0-4-iop32x-di core-modules-3.2.0-4-iop32x-di crc-modules-3.2.0-4-iop32x-di crypto-modules-3.2.0-4-iop32x-di crypto-dm-modules-3.2.0-4-iop32x-di ata-modules-3.2.0-4-iop32x-di nbd-modules-3.2.0-4-iop32x-di squashfs-modules-3.2.0-4-iop32x-di zlib-modules-3.2.0-4-iop32x-di udf-modules-3.2.0-4-iop32x-di fuse-modules-3.2.0-4-iop32x-di kernel-image-3.2.0-4-kirkwood-di nic-modules-3.2.0-4-kirkwood-di nic-shared-modules-3.2.0-4-kirkwood-di usb-serial-modules-3.2.0-4-kirkwood-di ppp-modules-3.2.0-4-kirkwood-di cdrom-core-modules-3.2.0-4-kirkwood-di scsi-core-modules-3.2.0-4-kirkwood-di loop-modules-3.2.0-4-kirkwood-di ipv6-modules-3.2.0-4-kirkwood-di btrfs-modules-3.2.0-4-kirkwood-di ext2-modules-3.2.0-4-kirkwood-di ext3-modules-3.2.0-4-kirkwood-di ext4-modules-3.2.0-4-kirkwood-di isofs-modules-3.2.0-4-kirkwood-di jfs-modules-3.2.0-4-kirkwood-di reiserfs-modules-3.2.0-4-kirkwood-di fat-modules-3.2.0-4-kirkwood-di minix-modules-3.2.0-4-kirkwood-di md-modules-3.2.0-4-kirkwood-di multipath-modules-3.2.0-4-kirkwood-di usb-modules-3.2.0-4-kirkwood-di usb-storage-modules-3.2.0-4-kirkwood-di fb-modules-3.2.0-4-kirkwood-di input-modules-3.2.0-4-kirkwood-di event-modules-3.2.0-4-kirkwood-di
Bug#766195: marked as done (linux: Network-related panic in Linux 3.2.63 (CVE-2014-7207))
Your message dated Thu, 06 Nov 2014 17:02:15 + with message-id e1xmqrr-0006zj...@franck.debian.org and subject line Bug#766195: fixed in linux 3.2.63-2+deb7u1 has caused the Debian Bug report #766195, regarding linux: Network-related panic in Linux 3.2.63 (CVE-2014-7207) to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 766195: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766195 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: linux Version: 3.2.63-2 Severity: important User: debian-ad...@lists.debian.org Usertags: needed-by-DSA-Team X-Debbugs-Cc: debian-ad...@lists.debian.org, m...@debian.org Hi, after the latest point release some debian.org hosts became unreliable. That was tracked down to a panic in the networking code. Ben provided a test patch: From: Ben Hutchings b...@decadent.org.uk Date: Tue, 21 Oct 2014 00:49:22 +0100 Subject: ipv6: ipv6_select_ident: handle null rt Forwarded: not-needed In Linux 3.2, ipv6_select_ident() can apparently still be called with rt == NULL and must avoid dereferencing it in this case. We should probably fix the callers, so WARN_ON_ONCE to get a clue about how this happens. --- --- a/net/ipv6/ip6_output.c +++ b/net/ipv6/ip6_output.c @@ -604,13 +604,18 @@ void ipv6_select_ident(struct frag_hdr * static bool hashrnd_initialized = false; u32 hash, id; + if (WARN_ON_ONCE(!rt)) { + hash = 0; + goto reserve; + } + if (unlikely(!hashrnd_initialized)) { hashrnd_initialized = true; get_random_bytes(ip6_idents_hashrnd, sizeof(ip6_idents_hashrnd)); } hash = __ipv6_addr_jhash(rt-rt6i_dst.addr, ip6_idents_hashrnd); hash = __ipv6_addr_jhash(rt-rt6i_src.addr, hash); - +reserve: id = ip_idents_reserve(hash, 1); fhdr-identification = htonl(id); } which resulted in the following trace: [ 436.375412] [ cut here ] [ 436.375439] WARNING: at /usr/src/linux-3.2.63/net/ipv6/ip6_output.c:607 ipv6_select_ident+0x28/0x8b() [ 436.375446] Hardware name: ProLiant DL585 G2 [ 436.375451] Modules linked in: ipmi_devintf ip6t_REJECT ip6t_LOG nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_filter ip6_tables ipt_REJECT ipt_ULOG xt_tcpudp nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ses xt_hashlimit enclosure xt_multiport iptable_filter ip_tables x_tables crc32c ib_iser rdma_cm ib_addr iw_cm ib_cm ib_sa ib_mad ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi bridge sd_mod dm_round_robin crc_t10dif bonding xfs ext4 crc16 jbd2 hmac drbd lru_cache 8021q garp stp dm_snapshot loop dm_multipath scsi_dh vhost_net tun macvtap macvlan kvm_amd kvm radeon ttm ipmi_si drm_kms_helper ipmi_msghandler k8temp powernow_k8 mperf hpilo drm power_supply i2c_algo_bit shpchp amd64_edac_mod edac_mce_amd edac_core psmouse hpwdt i2c_core snd_pcm snd_page_alloc snd_timer snd soundcore processor cdc_acm pcspkr evdev serio_raw container button thermal_sys ext3 mbcache jbd dm_mod usbhid hid sg sr_mod cdrom hpsa ata_generic lpfc pata_amd uhci_hcd libata scsi_transport_fc scsi_tgt ohci_hcd bnx2 ehci_hcd cciss scsi_mod usbcore usb_common [last unloaded: scsi_wait_scan] [ 436.375642] Pid: 12085, comm: unbound Not tainted 3.2.0-4-amd64 #1 Debian 3.2.63-2a~test [ 436.375647] Call Trace: [ 436.375666] [81046d61] ? warn_slowpath_common+0x78/0x8c [ 436.375676] [812ff40f] ? ipv6_select_ident+0x28/0x8b [ 436.375685] [81311411] ? udp6_ufo_fragment+0x124/0x1a2 [ 436.375696] [812fd569] ? ipv6_gso_segment+0xb8/0x14e [ 436.375705] [81036273] ? __wake_up_common+0x40/0x77 [ 436.375715] [812905b4] ? skb_gso_segment+0x208/0x28b [ 436.375725] [81037f7b] ? __wake_up+0x35/0x46 [ 436.375734] [81071295] ? arch_local_irq_save+0x11/0x17 [ 436.375746] [813508f9] ? _raw_spin_lock_irqsave+0x9/0x25 [ 436.375756] [8105266a] ? lock_timer_base.isra.29+0x23/0x47 [ 436.375764] [81350937] ? _raw_spin_unlock_irqrestore+0xe/0xf [ 436.375771] [81052926] ? __mod_timer+0x139/0x14b [ 436.375781] [8104c2c9] ? _local_bh_enable_ip.isra.11+0x1e/0x88 [ 436.375794] [a06b159a] ? ip6t_do_table+0x5b2/0x5e4 [ip6_tables] [ 436.375805] [81292337] ? dev_hard_start_xmit+0x32d/0x518 [ 436.375814] [812b28bd] ? nf_iterate+0x41/0x77 [ 436.375823] [812a8a63] ? sch_direct_xmit+0x61/0x135 [ 436.375833] [812927e4] ? dev_queue_xmit+0x2c2/0x46b [ 436.375856] [a05db84b] ?
Processing of linux_3.16.7-2_multi.changes
linux_3.16.7-2_multi.changes uploaded successfully to localhost along with the files: linux_3.16.7-2.dsc linux_3.16.7-2.debian.tar.xz linux-support-3.16.0-4_3.16.7-2_all.deb linux-doc-3.16_3.16.7-2_all.deb linux-manual-3.16_3.16.7-2_all.deb linux-source-3.16_3.16.7-2_all.deb Greetings, Your Debian queue daemon (running on host franck.debian.org) -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/e1xmt5n-0002ka...@franck.debian.org
Bug#692333: initramfs-tools: update-initramfs creates absolute symlink to /boot/initrd.img-..
Package: src:linux Version: 3.16.5-1 Followup-For: Bug #692333 -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 This breaks our automation trying to copy kernel and innitrd from a chroot to a PXE environment. The absolute symlink does not make any sense under all circumstances where a rootfs is mounted anywhere else than / (e.g. chroot, maintenance, ...). - -- Package-specific info: ** Version: Linux version 3.16-3-686-pae (debian-kernel@lists.debian.org) (gcc version 4.8.3 (Debian 4.8.3-12) ) #1 SMP Debian 3.16.5-1 (2014-10-10) ** Command line: BOOT_IMAGE=vmlinuz root=/dev/nfs initrd=initrd.img nfsroot=auto rw -- printk.time=1 log_buf_len=512k panic=30 loglevel=0 ** Not tainted ** Kernel log: [1.415620] RPC: Registered udp transport module. [1.416095] RPC: Registered tcp transport module. [1.416529] RPC: Registered tcp NFSv4.1 backchannel transport module. [1.425760] FS-Cache: Netfs 'nfs' registered for caching [1.524061] usb 1-1: new full-speed USB device number 2 using uhci_hcd [1.600047] tsc: Refined TSC clocksource calibration: 2992.473 MHz [1.686255] usb 1-1: New USB device found, idVendor=0627, idProduct=0001 [1.686897] usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=5 [1.687602] usb 1-1: Product: QEMU USB Tablet [1.688178] usb 1-1: Manufacturer: QEMU [1.688746] usb 1-1: SerialNumber: 42 [1.982771] systemd[1]: systemd 215 running in system mode. (+PAM +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ -SECCOMP -APPARMOR) [1.983892] systemd[1]: Detected virtualization 'kvm'. [1.984452] systemd[1]: Detected architecture 'x86'. [2.160362] systemd[1]: Inserted module 'autofs4' [3.085346] systemd[1]: Starting Forward Password Requests to Wall Directory Watch. [3.086567] systemd[1]: Started Forward Password Requests to Wall Directory Watch. [3.087730] systemd[1]: Starting Remote File Systems (Pre). [3.089156] systemd[1]: Reached target Remote File Systems (Pre). [3.089664] systemd[1]: Starting Arbitrary Executable File Formats File System Automount Point. [3.093133] systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. [3.093979] systemd[1]: Starting Dispatch Password Requests to Console Directory Watch. [3.094759] systemd[1]: Started Dispatch Password Requests to Console Directory Watch. [3.095531] systemd[1]: Starting Paths. [3.096813] systemd[1]: Reached target Paths. [3.097245] systemd[1]: Starting Swap. [3.098492] systemd[1]: Reached target Swap. [3.098924] systemd[1]: Starting Root Slice. [3.110122] systemd[1]: Created slice Root Slice. [3.110578] systemd[1]: Starting /dev/initctl Compatibility Named Pipe. [3.112130] systemd[1]: Listening on /dev/initctl Compatibility Named Pipe. [3.112644] systemd[1]: Starting Delayed Shutdown Socket. [3.114001] systemd[1]: Listening on Delayed Shutdown Socket. [3.114491] systemd[1]: Starting Journal Socket (/dev/log). [3.115921] systemd[1]: Listening on Journal Socket (/dev/log). [3.116423] systemd[1]: Starting Syslog Socket. [3.117722] systemd[1]: Listening on Syslog Socket. [3.118170] systemd[1]: Starting LVM2 metadata daemon socket. [3.119602] systemd[1]: Listening on LVM2 metadata daemon socket. [3.120149] systemd[1]: Starting Device-mapper event daemon FIFOs. [3.121791] systemd[1]: Listening on Device-mapper event daemon FIFOs. [3.122291] systemd[1]: Starting User and Session Slice. [3.123750] systemd[1]: Created slice User and Session Slice. [3.124254] systemd[1]: Starting udev Control Socket. [3.125570] systemd[1]: Listening on udev Control Socket. [3.126050] systemd[1]: Starting udev Kernel Socket. [3.127353] systemd[1]: Listening on udev Kernel Socket. [3.127833] systemd[1]: Starting Journal Socket. [3.129234] systemd[1]: Listening on Journal Socket. [3.130654] systemd[1]: Starting System Slice. [3.132172] systemd[1]: Created slice System Slice. [3.132781] systemd[1]: Mounting Temporary Directory... [3.134249] systemd[1]: tmp.mount: Directory /tmp to mount over is not empty, mounting anyway. [3.135882] systemd[1]: Mounting Debug File System... [3.137823] systemd[1]: Mounting POSIX Message Queue File System... [3.140781] systemd[1]: Starting udev Coldplug all Devices... [3.146027] systemd[1]: Mounting Huge Pages File System... [3.248138] systemd[1]: Starting Load Kernel Modules... [3.285256] systemd[1]: Starting Create list of required static device nodes for the current kernel... [3.315020] systemd[1]: Started Set Up Additional Binary Formats. [3.315621] systemd[1]: Starting system-getty.slice. [3.318036] systemd[1]: Created slice system-getty.slice. [3.318543] systemd[1]: Starting Journal Service... [3.326155] systemd[1]: Started Journal Service. [3.486252] lp: driver loaded but no devices found [3.519756] ppdev:
Processing of linux-latest_63_i386.changes
linux-latest_63_i386.changes uploaded successfully to localhost along with the files: linux-latest_63.dsc linux-latest_63.tar.gz linux-doc_3.16+63_all.deb linux-source_3.16+63_all.deb linux-tools_3.16+63_all.deb linux-image-486_3.16+63_i386.deb linux-headers-486_3.16+63_i386.deb linux-image-586_3.16+63_i386.deb linux-headers-586_3.16+63_i386.deb linux-image-686-pae_3.16+63_i386.deb linux-headers-686-pae_3.16+63_i386.deb linux-image-686-pae-dbg_3.16+63_i386.deb linux-image-amd64_3.16+63_i386.deb linux-headers-amd64_3.16+63_i386.deb Greetings, Your Debian queue daemon (running on host franck.debian.org) -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/e1xmu6t-wj...@franck.debian.org
Processed: tagging 768327
Processing commands for cont...@bugs.debian.org: tags 768327 - security Bug #768327 {Done: Ben Hutchings b...@decadent.org.uk} [linux-image-amd64] linux-image-amd64: Inclusion of 3.17 kernel in place of 3.16 kernel Removed tag(s) security. thanks Stopping processing here. Please contact me if you need assistance. -- 768327: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768327 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.c.14153087998757.transcr...@bugs.debian.org
linux_3.16.7-2_multi.changes is NEW
binary:acpi-modules-3.16.0-4-586-di is NEW. binary:ata-modules-3.16.0-4-586-di is NEW. binary:btrfs-modules-3.16.0-4-586-di is NEW. binary:cdrom-core-modules-3.16.0-4-586-di is NEW. binary:core-modules-3.16.0-4-586-di is NEW. binary:crc-modules-3.16.0-4-586-di is NEW. binary:crypto-dm-modules-3.16.0-4-586-di is NEW. binary:crypto-modules-3.16.0-4-586-di is NEW. binary:efi-modules-3.16.0-4-586-di is NEW. binary:event-modules-3.16.0-4-586-di is NEW. binary:ext4-modules-3.16.0-4-586-di is NEW. binary:fat-modules-3.16.0-4-586-di is NEW. binary:fb-modules-3.16.0-4-586-di is NEW. binary:firewire-core-modules-3.16.0-4-586-di is NEW. binary:fuse-modules-3.16.0-4-586-di is NEW. binary:hyperv-modules-3.16.0-4-586-di is NEW. binary:i2c-modules-3.16.0-4-586-di is NEW. binary:input-modules-3.16.0-4-586-di is NEW. binary:isofs-modules-3.16.0-4-586-di is NEW. binary:jfs-modules-3.16.0-4-586-di is NEW. binary:kernel-image-3.16.0-4-586-di is NEW. binary:loop-modules-3.16.0-4-586-di is NEW. binary:md-modules-3.16.0-4-586-di is NEW. binary:mmc-core-modules-3.16.0-4-586-di is NEW. binary:mmc-modules-3.16.0-4-586-di is NEW. binary:mouse-modules-3.16.0-4-586-di is NEW. binary:multipath-modules-3.16.0-4-586-di is NEW. binary:nbd-modules-3.16.0-4-586-di is NEW. binary:nic-modules-3.16.0-4-586-di is NEW. binary:nic-pcmcia-modules-3.16.0-4-586-di is NEW. binary:nic-shared-modules-3.16.0-4-586-di is NEW. binary:nic-usb-modules-3.16.0-4-586-di is NEW. binary:nic-wireless-modules-3.16.0-4-586-di is NEW. binary:ntfs-modules-3.16.0-4-586-di is NEW. binary:pata-modules-3.16.0-4-586-di is NEW. binary:pcmcia-modules-3.16.0-4-586-di is NEW. binary:pcmcia-storage-modules-3.16.0-4-586-di is NEW. binary:ppp-modules-3.16.0-4-586-di is NEW. binary:sata-modules-3.16.0-4-586-di is NEW. binary:scsi-common-modules-3.16.0-4-586-di is NEW. binary:scsi-core-modules-3.16.0-4-586-di is NEW. binary:scsi-extra-modules-3.16.0-4-586-di is NEW. binary:scsi-modules-3.16.0-4-586-di is NEW. binary:serial-modules-3.16.0-4-586-di is NEW. binary:sound-modules-3.16.0-4-586-di is NEW. binary:speakup-modules-3.16.0-4-586-di is NEW. binary:squashfs-modules-3.16.0-4-586-di is NEW. binary:udf-modules-3.16.0-4-586-di is NEW. binary:uinput-modules-3.16.0-4-586-di is NEW. binary:usb-modules-3.16.0-4-586-di is NEW. binary:usb-serial-modules-3.16.0-4-586-di is NEW. binary:usb-storage-modules-3.16.0-4-586-di is NEW. binary:virtio-modules-3.16.0-4-586-di is NEW. binary:xfs-modules-3.16.0-4-586-di is NEW. Your package has been put into the NEW queue, which requires manual action from the ftpteam to process. The upload was otherwise valid (it had a good OpenPGP signature and file hashes are valid), so please be patient. Packages are routinely processed through to the archive, and do feel free to browse the NEW queue[1]. If there is an issue with the upload, you will recieve an email from a member of the ftpteam. If you have any questions, you may reply to this email. [1]: https://ftp-master.debian.org/new.html -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/e1xmuzg-0006yx...@franck.debian.org
linux-latest_63_i386.changes is NEW
binary:linux-headers-586 is NEW. binary:linux-image-586 is NEW. Your package has been put into the NEW queue, which requires manual action from the ftpteam to process. The upload was otherwise valid (it had a good OpenPGP signature and file hashes are valid), so please be patient. Packages are routinely processed through to the archive, and do feel free to browse the NEW queue[1]. If there is an issue with the upload, you will recieve an email from a member of the ftpteam. If you have any questions, you may reply to this email. [1]: https://ftp-master.debian.org/new.html -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/e1xmuza-0006il...@franck.debian.org
linux_3.16.7-2_multi.changes ACCEPTED into unstable, unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 06 Nov 2014 17:42:26 + Source: linux Binary: linux-source-3.16 linux-doc-3.16 linux-manual-3.16 linux-support-3.16.0-4 linux-libc-dev linux-headers-3.16.0-4-all linux-headers-3.16.0-4-all-alpha linux-headers-3.16.0-4-common linux-image-3.16.0-4-alpha-generic linux-headers-3.16.0-4-alpha-generic linux-image-3.16.0-4-alpha-smp linux-headers-3.16.0-4-alpha-smp linux-image-3.16.0-4-alpha-legacy linux-headers-3.16.0-4-alpha-legacy linux-headers-3.16.0-4-all-amd64 kernel-image-3.16.0-4-amd64-di nic-modules-3.16.0-4-amd64-di nic-wireless-modules-3.16.0-4-amd64-di nic-shared-modules-3.16.0-4-amd64-di serial-modules-3.16.0-4-amd64-di usb-serial-modules-3.16.0-4-amd64-di ppp-modules-3.16.0-4-amd64-di pata-modules-3.16.0-4-amd64-di cdrom-core-modules-3.16.0-4-amd64-di firewire-core-modules-3.16.0-4-amd64-di scsi-core-modules-3.16.0-4-amd64-di scsi-modules-3.16.0-4-amd64-di scsi-common-modules-3.16.0-4-amd64-di scsi-extra-modules-3.16.0-4-amd64-di loop-modules-3.16.0-4-amd64-di btrfs-modules-3.16.0-4-amd64-di ext4-modules-3.16.0-4-amd64-di isofs-modules-3.16.0-4-amd64-di jfs-modules-3.16.0-4-amd64-di ntfs-modules-3.16.0-4-amd64-di xfs-modules-3.16.0-4-amd64-di fat-modules-3.16.0-4-amd64-di md-modules-3.16.0-4-amd64-di multipath-modules-3.16.0-4-amd64-di usb-modules-3.16.0-4-amd64-di usb-storage-modules-3.16.0-4-amd64-di pcmcia-storage-modules-3.16.0-4-amd64-di fb-modules-3.16.0-4-amd64-di input-modules-3.16.0-4-amd64-di event-modules-3.16.0-4-amd64-di mouse-modules-3.16.0-4-amd64-di nic-pcmcia-modules-3.16.0-4-amd64-di pcmcia-modules-3.16.0-4-amd64-di nic-usb-modules-3.16.0-4-amd64-di sata-modules-3.16.0-4-amd64-di core-modules-3.16.0-4-amd64-di acpi-modules-3.16.0-4-amd64-di i2c-modules-3.16.0-4-amd64-di crc-modules-3.16.0-4-amd64-di crypto-modules-3.16.0-4-amd64-di crypto-dm-modules-3.16.0-4-amd64-di efi-modules-3.16.0-4-amd64-di ata-modules-3.16.0-4-amd64-di mmc-core-modules-3.16.0-4-amd64-di mmc-modules-3.16.0-4-amd64-di nbd-modules-3.16.0-4-amd64-di squashfs-modules-3.16.0-4-amd64-di speakup-modules-3.16.0-4-amd64-di virtio-modules-3.16.0-4-amd64-di uinput-modules-3.16.0-4-amd64-di sound-modules-3.16.0-4-amd64-di hyperv-modules-3.16.0-4-amd64-di udf-modules-3.16.0-4-amd64-di fuse-modules-3.16.0-4-amd64-di linux-image-3.16.0-4-amd64 linux-headers-3.16.0-4-amd64 linux-image-3.16.0-4-amd64-dbg xen-linux-system-3.16.0-4-amd64 linux-headers-3.16.0-4-all-arm64 kernel-image-3.16.0-4-arm64-di nic-modules-3.16.0-4-arm64-di nic-wireless-modules-3.16.0-4-arm64-di nic-shared-modules-3.16.0-4-arm64-di ppp-modules-3.16.0-4-arm64-di cdrom-core-modules-3.16.0-4-arm64-di scsi-core-modules-3.16.0-4-arm64-di scsi-modules-3.16.0-4-arm64-di loop-modules-3.16.0-4-arm64-di btrfs-modules-3.16.0-4-arm64-di ext4-modules-3.16.0-4-arm64-di isofs-modules-3.16.0-4-arm64-di jfs-modules-3.16.0-4-arm64-di xfs-modules-3.16.0-4-arm64-di fat-modules-3.16.0-4-arm64-di md-modules-3.16.0-4-arm64-di multipath-modules-3.16.0-4-arm64-di usb-modules-3.16.0-4-arm64-di usb-storage-modules-3.16.0-4-arm64-di input-modules-3.16.0-4-arm64-di event-modules-3.16.0-4-arm64-di nic-usb-modules-3.16.0-4-arm64-di sata-modules-3.16.0-4-arm64-di core-modules-3.16.0-4-arm64-di crc-modules-3.16.0-4-arm64-di crypto-modules-3.16.0-4-arm64-di crypto-dm-modules-3.16.0-4-arm64-di efi-modules-3.16.0-4-arm64-di ata-modules-3.16.0-4-arm64-di mmc-modules-3.16.0-4-arm64-di nbd-modules-3.16.0-4-arm64-di squashfs-modules-3.16.0-4-arm64-di virtio-modules-3.16.0-4-arm64-di uinput-modules-3.16.0-4-arm64-di zlib-modules-3.16.0-4-arm64-di udf-modules-3.16.0-4-arm64-di fuse-modules-3.16.0-4-arm64-di linux-image-3.16.0-4-arm64 linux-headers-3.16.0-4-arm64 linux-image-3.16.0-4-arm64-dbg linux-headers-3.16.0-4-all-armel kernel-image-3.16.0-4-kirkwood-di nic-modules-3.16.0-4-kirkwood-di nic-shared-modules-3.16.0-4-kirkwood-di usb-serial-modules-3.16.0-4-kirkwood-di ppp-modules-3.16.0-4-kirkwood-di cdrom-core-modules-3.16.0-4-kirkwood-di scsi-core-modules-3.16.0-4-kirkwood-di loop-modules-3.16.0-4-kirkwood-di btrfs-modules-3.16.0-4-kirkwood-di ext4-modules-3.16.0-4-kirkwood-di isofs-modules-3.16.0-4-kirkwood-di jfs-modules-3.16.0-4-kirkwood-di fat-modules-3.16.0-4-kirkwood-di minix-modules-3.16.0-4-kirkwood-di md-modules-3.16.0-4-kirkwood-di multipath-modules-3.16.0-4-kirkwood-di usb-modules-3.16.0-4-kirkwood-di usb-storage-modules-3.16.0-4-kirkwood-di fb-modules-3.16.0-4-kirkwood-di input-modules-3.16.0-4-kirkwood-di event-modules-3.16.0-4-kirkwood-di mouse-modules-3.16.0-4-kirkwood-di nic-usb-modules-3.16.0-4-kirkwood-di sata-modules-3.16.0-4-kirkwood-di core-modules-3.16.0-4-kirkwood-di crc-modules-3.16.0-4-kirkwood-di crypto-modules-3.16.0-4-kirkwood-di crypto-dm-modules-3.16.0-4-kirkwood-di mmc-modules-3.16.0-4-kirkwood-di nbd-modules-3.16.0-4-kirkwood-di squashfs-modules-3.16.0-4-kirkwood-di uinput-modules-3.16.0-4-kirkwood-di
linux-latest_63_i386.changes ACCEPTED into unstable, unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 06 Nov 2014 20:46:28 + Source: linux-latest Binary: linux-source linux-doc linux-tools linux-image-alpha-generic linux-headers-alpha-generic linux-image-alpha-smp linux-headers-alpha-smp linux-image-alpha-legacy linux-headers-alpha-legacy linux-image-amd64 linux-headers-amd64 linux-image-amd64-dbg xen-linux-system-amd64 linux-image-arm64 linux-headers-arm64 linux-image-arm64-dbg linux-image-ixp4xx linux-headers-ixp4xx linux-image-kirkwood linux-headers-kirkwood linux-image-orion5x linux-headers-orion5x linux-image-versatile linux-headers-versatile linux-image-armmp linux-headers-armmp linux-image-armmp-lpae linux-headers-armmp-lpae linux-image-parisc linux-headers-parisc linux-image-parisc64-smp linux-headers-parisc64-smp linux-image-586 linux-headers-586 linux-image-686-pae linux-headers-686-pae linux-image-686-pae-dbg linux-image-itanium linux-headers-itanium linux-image-mckinley linux-headers-mckinley linux-image-m68k linux-headers-m68k linux-image-r4k-ip22 linux-headers-r4k-ip22 linux-image-r5k-ip32 linux-headers-r5k-ip32 linux-image-sb1-bcm91250a linux-headers-sb1-bcm91250a linux-image-4kc-malta linux-headers-4kc-malta linux-image-5kc-malta linux-headers-5kc-malta linux-image-octeon linux-headers-octeon linux-image-loongson-2e linux-headers-loongson-2e linux-image-loongson-2f linux-headers-loongson-2f linux-image-loongson-3 linux-headers-loongson-3 linux-image-powerpc linux-headers-powerpc linux-image-powerpc-smp linux-headers-powerpc-smp linux-image-powerpc64 linux-headers-powerpc64 linux-image-powerpcspe linux-headers-powerpcspe linux-image-powerpc64le linux-headers-powerpc64le linux-image-s390x linux-headers-s390x linux-image-s390x-dbg linux-image-sh7751r linux-headers-sh7751r linux-image-sh7785lcr linux-headers-sh7785lcr linux-image-sparc64 linux-headers-sparc64 linux-image-sparc64-smp linux-headers-sparc64-smp linux-image-486 linux-headers-486 Architecture: source all i386 Version: 63 Distribution: unstable Urgency: medium Maintainer: Debian Kernel Team debian-kernel@lists.debian.org Changed-By: Ben Hutchings b...@decadent.org.uk Description: linux-doc - Linux kernel specific documentation (meta-package) linux-headers-486 - Header files for Linux 486 configuration (dummy package) linux-headers-4kc-malta - Header files for Linux 4kc-malta configuration (meta-package) linux-headers-586 - Header files for Linux 586 configuration (meta-package) linux-headers-5kc-malta - Header files for Linux 5kc-malta configuration (meta-package) linux-headers-686-pae - Header files for Linux 686-pae configuration (meta-package) linux-headers-alpha-generic - Header files for Linux alpha-generic configuration (meta-package) linux-headers-alpha-legacy - Header files for Linux alpha-legacy configuration (meta-package) linux-headers-alpha-smp - Header files for Linux alpha-smp configuration (meta-package) linux-headers-amd64 - Header files for Linux amd64 configuration (meta-package) linux-headers-arm64 - Header files for Linux arm64 configuration (meta-package) linux-headers-armmp - Header files for Linux armmp configuration (meta-package) linux-headers-armmp-lpae - Header files for Linux armmp-lpae configuration (meta-package) linux-headers-itanium - Header files for Linux itanium configuration (meta-package) linux-headers-ixp4xx - Header files for Linux ixp4xx configuration (meta-package) linux-headers-kirkwood - Header files for Linux kirkwood configuration (meta-package) linux-headers-loongson-2e - Header files for Linux loongson-2e configuration (meta-package) linux-headers-loongson-2f - Header files for Linux loongson-2f configuration (meta-package) linux-headers-loongson-3 - Header files for Linux loongson-3 configuration (meta-package) linux-headers-m68k - Header files for Linux m68k configuration (meta-package) linux-headers-mckinley - Header files for Linux mckinley configuration (meta-package) linux-headers-octeon - Header files for Linux octeon configuration (meta-package) linux-headers-orion5x - Header files for Linux orion5x configuration (meta-package) linux-headers-parisc - Header files for Linux parisc configuration (meta-package) linux-headers-parisc64-smp - Header files for Linux parisc64-smp configuration (meta-package) linux-headers-powerpc - Header files for Linux powerpc configuration (meta-package) linux-headers-powerpc-smp - Header files for Linux powerpc-smp configuration (meta-package) linux-headers-powerpc64 - Header files for Linux powerpc64 configuration (meta-package) linux-headers-powerpc64le - Header files for Linux powerpc64le configuration (meta-package) linux-headers-powerpcspe - Header files for Linux powerpcspe configuration (meta-package) linux-headers-r4k-ip22 - Header files for Linux r4k-ip22 configuration (meta-package) linux-headers-r5k-ip32 - Header files for Linux r5k-ip32 configuration (meta-package)
Bug#764162: marked as done (linux-image-3.16-2-kirkwood: [regression 3.14-3.16] file data corruption, via network)
Your message dated Thu, 06 Nov 2014 22:00:10 + with message-id e1xmv6a-0002wj...@franck.debian.org and subject line Bug#764162: fixed in linux 3.16.7-2 has caused the Debian Bug report #764162, regarding linux-image-3.16-2-kirkwood: [regression 3.14-3.16] file data corruption, via network to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 764162: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=764162 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: src:linux Version: 3.16.3-2 Severity: serious Justification: may cause silent data corruption Hello, after upgrading the kernel of my NAS to 3.16-2-kirkwood, I noticed corrupt data on my files. The NAS works as a DHCP client on its single LAN port, the two hard drives run in a RAID1 configuration. Both drives are fine according to mdadm and smartctl. Kernel logs in both cases have not been eye-catching. Samba is configured with unix charset = ISO-8859-1. When copying data from the NAS to some other device using CIFS or Samba (the other devices run jessie/amd64 or wheezy/i686), the files are partly corrupt. The reported md5 checksums of files change every time the files are read. (And they differ from the checksums as stored on disk as well.) The files are not completely destroyed: ZIP archives show CRC errors only for some files in them, and video files remain generally playable, with lots of audio/video errors and crashing players. Shell access using SSH generally works. Trying to copy files with scp or sftp breaks the connection (invalid MAC packets or similar). File listing and mounting with sshfs work. Trying to copy files via sshfs results in a Socket not connected error, and the mount point is gone. As far as I can see, the on-disk data seems to be fine, as do files copied to the NAS while running the corrupt kernel. I am unable to check all new files, though - there might have been silent data corruption on new files. Data corruption on NAS devices is a serious issue for me. Reverting back to 3.14-2-kirkwood fixed the problems. Best Regards -- Package-specific info: ** Kernel log: boot messages should be attached ** Model information Hardware: QNAP TS-119/TS-219 Revision: ** PCI devices: 00:00.0 Host bridge [0600]: Marvell Technology Group Ltd. Device [11ab:6282] (rev 01) Subsystem: Marvell Technology Group Ltd. Device [11ab:11ab] Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx+ Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast TAbort- TAbort- MAbort+ SERR- PERR- INTx- Latency: 0, Cache Line Size: 32 bytes Interrupt: pin A routed to IRQ 9 Region 0: Memory at ignored (64-bit, prefetchable) Capabilities: access denied 00:01.0 SATA controller [0106]: JMicron Technology Corp. JMB363 SATA/IDE Controller [197b:2363] (rev 03) (prog-if 01 [AHCI 1.0]) Subsystem: JMicron Technology Corp. JMB363 SATA/IDE Controller [197b:2363] Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx- Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast TAbort- TAbort- MAbort- SERR- PERR- INTx- Latency: 0, Cache Line Size: 32 bytes Interrupt: pin A routed to IRQ 9 Region 5: Memory at e001 (32-bit, non-prefetchable) [size=8K] [virtual] Expansion ROM at e000 [disabled] [size=64K] Capabilities: access denied Kernel driver in use: ahci 00:01.1 IDE interface [0101]: JMicron Technology Corp. JMB363 SATA/IDE Controller [197b:2363] (rev 03) (prog-if 85 [Master SecO PriO]) Subsystem: JMicron Technology Corp. JMB363 SATA/IDE Controller [197b:2363] Control: I/O- Mem- BusMaster- SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx- Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast TAbort- TAbort- MAbort- SERR- PERR- INTx- Interrupt: pin B routed to IRQ 9 Region 0: I/O ports at 1010 [disabled] [size=8] Region 1: I/O ports at 1020 [disabled] [size=4] Region 2: I/O ports at 1018 [disabled] [size=8] Region 3: I/O ports at 1024 [disabled] [size=4] Region 4: I/O ports at 1000 [disabled] [size=16] Capabilities: access denied 01:00.0 Host bridge [0600]: Marvell Technology Group Ltd. Device [11ab:6282] (rev 01) Subsystem: Marvell Technology Group Ltd. Device [11ab:11ab] Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr+ Stepping- SERR+ FastB2B- DisINTx+ Status: Cap+ 66MHz- UDF- FastB2B- ParErr-
Bug#768288: marked as done (linux: FTBFS on i386: incomplete migration from 486 to 586 flavour)
Your message dated Thu, 06 Nov 2014 22:00:10 + with message-id e1xmv6a-0002wp...@franck.debian.org and subject line Bug#768288: fixed in linux 3.16.7-2 has caused the Debian Bug report #768288, regarding linux: FTBFS on i386: incomplete migration from 486 to 586 flavour to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 768288: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768288 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: linux Version: 3.16.7-1 Severity: serious Justification: fails to build from source (but built successfully in the past) linux/3.16.7-1 has this change: * [i386] Rename 486 flavour to 586, as it has not worked on 486 processors since we enabled CC_STACKPROTECTOR (Closes: #766105) - Select M586TSC instead of M486 but the i386 build log indicates that it is still trying (and now failing) to run kernel-wedge for the 486 flavour. Regards, S ---End Message--- ---BeginMessage--- Source: linux Source-Version: 3.16.7-2 We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 768...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ben Hutchings b...@decadent.org.uk (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 06 Nov 2014 17:42:26 + Source: linux Binary: linux-source-3.16 linux-doc-3.16 linux-manual-3.16 linux-support-3.16.0-4 linux-libc-dev linux-headers-3.16.0-4-all linux-headers-3.16.0-4-all-alpha linux-headers-3.16.0-4-common linux-image-3.16.0-4-alpha-generic linux-headers-3.16.0-4-alpha-generic linux-image-3.16.0-4-alpha-smp linux-headers-3.16.0-4-alpha-smp linux-image-3.16.0-4-alpha-legacy linux-headers-3.16.0-4-alpha-legacy linux-headers-3.16.0-4-all-amd64 kernel-image-3.16.0-4-amd64-di nic-modules-3.16.0-4-amd64-di nic-wireless-modules-3.16.0-4-amd64-di nic-shared-modules-3.16.0-4-amd64-di serial-modules-3.16.0-4-amd64-di usb-serial-modules-3.16.0-4-amd64-di ppp-modules-3.16.0-4-amd64-di pata-modules-3.16.0-4-amd64-di cdrom-core-modules-3.16.0-4-amd64-di firewire-core-modules-3.16.0-4-amd64-di scsi-core-modules-3.16.0-4-amd64-di scsi-modules-3.16.0-4-amd64-di scsi-common-modules-3.16.0-4-amd64-di scsi-extra-modules-3.16.0-4-amd64-di loop-modules-3.16.0-4-amd64-di btrfs-modules-3.16.0-4-amd64-di ext4-modules-3.16.0-4-amd64-di isofs-modules-3.16.0-4-amd64-di jfs-modules-3.16.0-4-amd64-di ntfs-modules-3.16.0-4-amd64-di xfs-modules-3.16.0-4-amd64-di fat-modules-3.16.0-4-amd64-di md-modules-3.16.0-4-amd64-di multipath-modules-3.16.0-4-amd64-di usb-modules-3.16.0-4-amd64-di usb-storage-modules-3.16.0-4-amd64-di pcmcia-storage-modules-3.16.0-4-amd64-di fb-modules-3.16.0-4-amd64-di input-modules-3.16.0-4-amd64-di event-modules-3.16.0-4-amd64-di mouse-modules-3.16.0-4-amd64-di nic-pcmcia-modules-3.16.0-4-amd64-di pcmcia-modules-3.16.0-4-amd64-di nic-usb-modules-3.16.0-4-amd64-di sata-modules-3.16.0-4-amd64-di core-modules-3.16.0-4-amd64-di acpi-modules-3.16.0-4-amd64-di i2c-modules-3.16.0-4-amd64-di crc-modules-3.16.0-4-amd64-di crypto-modules-3.16.0-4-amd64-di crypto-dm-modules-3.16.0-4-amd64-di efi-modules-3.16.0-4-amd64-di ata-modules-3.16.0-4-amd64-di mmc-core-modules-3.16.0-4-amd64-di mmc-modules-3.16.0-4-amd64-di nbd-modules-3.16.0-4-amd64-di squashfs-modules-3.16.0-4-amd64-di speakup-modules-3.16.0-4-amd64-di virtio-modules-3.16.0-4-amd64-di uinput-modules-3.16.0-4-amd64-di sound-modules-3.16.0-4-amd64-di hyperv-modules-3.16.0-4-amd64-di udf-modules-3.16.0-4-amd64-di fuse-modules-3.16.0-4-amd64-di linux-image-3.16.0-4-amd64 linux-headers-3.16.0-4-amd64 linux-image-3.16.0-4-amd64-dbg xen-linux-system-3.16.0-4-amd64 linux-headers-3.16.0-4-all-arm64 kernel-image-3.16.0-4-arm64-di nic-modules-3.16.0-4-arm64-di nic-wireless-modules-3.16.0-4-arm64-di nic-shared-modules-3.16.0-4-arm64-di ppp-modules-3.16.0-4-arm64-di cdrom-core-modules-3.16.0-4-arm64-di scsi-core-modules-3.16.0-4-arm64-di scsi-modules-3.16.0-4-arm64-di loop-modules-3.16.0-4-arm64-di btrfs-modules-3.16.0-4-arm64-di
Bug#768297: marked as done (fix udeb packaging on hppa)
Your message dated Thu, 06 Nov 2014 22:00:10 + with message-id e1xmv6a-0002wv...@franck.debian.org and subject line Bug#768297: fixed in linux 3.16.7-2 has caused the Debian Bug report #768297, regarding fix udeb packaging on hppa to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 768297: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768297 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Source: linux Version: 3.16.0-4 Severity: important Tags: patch This is a follow-up on Bug#766793. I'm not sure if I tested something wrong when I opened Bug#766793, but now while packaging the udeb packages we get this error: kernel-wedge install-files 3.16.0-4 install -D -m 644 debian/linux-image-3.16.0-4-parisc/boot/vmlinux-3.16.0-4-parisc debian/kernel-image-3.16.0-4-parisc-di/boot/vmlinux-3.16.0-4-parisc install -d debian/kernel-image-3.16.0-4-parisc-di/lib/modules/3.16.0-4-parisc install -m 644 debian/linux-image-3.16.0-4-parisc/lib/modules/3.16.0-4-parisc/modules.builtin debian/linux-image-3.16.0-4-parisc/lib/modules/3.16.0-4-parisc/modules.order debian/kernel-image-3.16.0-4-parisc-di/lib/modules/3.16.0-4-parisc/ install -D -m 644 debian/linux-image-3.16.0-4-parisc/boot/System.map-3.16.0-4-parisc debian/kernel-image-3.16.0-4-parisc-di/boot/System.map-3.16.0-4-parisc kernel-wedge copy-modules 3.16.0-4 parisc 3.16.0-4-parisc kernel-wedge find-dups 3.16.0-4-parisc some modules are in more than one package debian/sata-modules-3.16.0-4-parisc-di lib/modules/3.16.0-4-parisc/kernel/drivers/ata/libata.ko debian/pata-modules-3.16.0-4-parisc-di lib/modules/3.16.0-4-parisc/kernel/drivers/ata/libata.ko debian/nic-usb-modules-3.16.0-4-parisc-di lib/modules/3.16.0-4-parisc/kernel/drivers/net/phy/libphy.ko debian/nic-modules-3.16.0-4-parisc-di lib/modules/3.16.0-4-parisc/kernel/drivers/net/phy/libphy.ko debian/scsi-modules-3.16.0-4-parisc-di lib/modules/3.16.0-4-parisc/kernel/drivers/scsi/sym53c8xx_2/sym53c8xx.ko debian/scsi-common-modules-3.16.0-4-parisc-di lib/modules/3.16.0-4-parisc/kernel/drivers/scsi/sym53c8xx_2/sym53c8xx.ko command exited with status 1 The attached tar.gz file to the debian/installer subdirectory fixes this. Can you please apply it for the next upload? It adds ata-modules and nic-shared-modules to both hppa/hppa64 directories and modifies the scsi-modules by removing sym53c8xx.ko module (which is already in scsi-common-modules. Thanks, Helge hppa_installer_debs.tgz Description: application/gzip ---End Message--- ---BeginMessage--- Source: linux Source-Version: 3.16.7-2 We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 768...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ben Hutchings b...@decadent.org.uk (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 06 Nov 2014 17:42:26 + Source: linux Binary: linux-source-3.16 linux-doc-3.16 linux-manual-3.16 linux-support-3.16.0-4 linux-libc-dev linux-headers-3.16.0-4-all linux-headers-3.16.0-4-all-alpha linux-headers-3.16.0-4-common linux-image-3.16.0-4-alpha-generic linux-headers-3.16.0-4-alpha-generic linux-image-3.16.0-4-alpha-smp linux-headers-3.16.0-4-alpha-smp linux-image-3.16.0-4-alpha-legacy linux-headers-3.16.0-4-alpha-legacy linux-headers-3.16.0-4-all-amd64 kernel-image-3.16.0-4-amd64-di nic-modules-3.16.0-4-amd64-di nic-wireless-modules-3.16.0-4-amd64-di nic-shared-modules-3.16.0-4-amd64-di serial-modules-3.16.0-4-amd64-di usb-serial-modules-3.16.0-4-amd64-di ppp-modules-3.16.0-4-amd64-di pata-modules-3.16.0-4-amd64-di cdrom-core-modules-3.16.0-4-amd64-di firewire-core-modules-3.16.0-4-amd64-di scsi-core-modules-3.16.0-4-amd64-di scsi-modules-3.16.0-4-amd64-di scsi-common-modules-3.16.0-4-amd64-di scsi-extra-modules-3.16.0-4-amd64-di loop-modules-3.16.0-4-amd64-di btrfs-modules-3.16.0-4-amd64-di ext4-modules-3.16.0-4-amd64-di isofs-modules-3.16.0-4-amd64-di jfs-modules-3.16.0-4-amd64-di ntfs-modules-3.16.0-4-amd64-di
Processed: severity of 768289 is important
Processing commands for cont...@bugs.debian.org: severity 768289 important Bug #768289 [src:linux] linux-image-3.16-3-amd64: Suspend/sleep causes laptop to never wake up, lose data Severity set to 'important' from 'grave' thanks Stopping processing here. Please contact me if you need assistance. -- 768289: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768289 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.c.141531826111544.transcr...@bugs.debian.org