Bug#801067: marked as done (nfs-common: Remove or updated README.Debian.nfsv4)
Your message dated Tue, 8 Mar 2022 06:38:03 +0100 with message-id and subject line Re: Bug#801067: nfs-common: Remove or updated README.Debian.nfsv4 has caused the Debian Bug report #801067, regarding nfs-common: Remove or updated README.Debian.nfsv4 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 801067: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801067 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: nfs-common Version: 1:1.2.8-6ubuntu1.1 Severity: normal The README.Debian.nfsv4 file is now rather old; is NFSv4 really still considered experimental? Parts of this file may be worth keeping (I’m not an expert!), but at least that claim should be removed, and mention of kernel versions and patch sets. -- Package-specific info: -- rpcinfo -- program vers proto port service 104 tcp111 portmapper 103 tcp111 portmapper 102 tcp111 portmapper 104 udp111 portmapper 103 udp111 portmapper 102 udp111 portmapper 1000241 udp 43250 status 1000241 tcp 59720 status -- /etc/default/nfs-common -- NEED_STATD= STATDOPTS= NEED_GSSD= -- /etc/idmapd.conf -- [General] Verbosity = 0 Pipefs-Directory = /run/rpc_pipefs [Mapping] Nobody-User = rrt Nobody-Group = rrt -- /etc/fstab -- -- System Information: Debian Release: jessie/sid APT prefers trusty-updates APT policy: (500, 'trusty-updates'), (500, 'trusty-security'), (500, 'trusty'), (400, 'trusty-proposed'), (100, 'trusty-backports'), (90, 'wily-updates'), (90, 'wily') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.13.0-63-generic (SMP w/4 CPU cores) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages nfs-common depends on: ii adduser 3.113+nmu3ubuntu3 ii initscripts 2.88dsf-41ubuntu6.2 ii libc6 2.19-0ubuntu6.6 ii libcap2 1:2.24-0ubuntu2 ii libcomerr2 1.42.9-3ubuntu1.3 ii libdevmapper1.02.1 2:1.02.77-6ubuntu2 ii libevent-2.0-5 2.0.21-stable-1ubuntu1.14.04.1 ii libgssglue1 0.4-2ubuntu1 ii libkeyutils11.5.6-1 ii libkrb5-3 1.12+dfsg-2ubuntu5.1 ii libmount1 2.20.1-5.1ubuntu20.7 ii libnfsidmap20.25-5 ii libtirpc1 0.2.2-5ubuntu2 ii libwrap07.6.q-25 ii lsb-base4.1+Debian11ubuntu6 ii mountall2.53 ii rpcbind 0.2.1-2ubuntu2.2 ii sysv-rc 2.88dsf-41ubuntu6.2 ii ucf 3.0027+nmu1 Versions of packages nfs-common recommends: ii python 2.7.5-5ubuntu3 Versions of packages nfs-common suggests: pn open-iscsi pn watchdog Versions of packages nfs-kernel-server depends on: ii libblkid1 2.20.1-5.1ubuntu20.7 ii libc6 2.19-0ubuntu6.6 ii libcap2 1:2.24-0ubuntu2 ii libsqlite3-0 3.8.2-1ubuntu2.1 ii libtirpc1 0.2.2-5ubuntu2 ii libwrap0 7.6.q-25 ii lsb-base 4.1+Debian11ubuntu6 ii ucf 3.0027+nmu1 -- no debconf information --- End Message --- --- Begin Message --- Source: nfs-utils Source-Version: 1:2.6.1-1 On Mon, Oct 05, 2015 at 09:32:39PM +0100, Reuben Thomas wrote: > Package: nfs-common > Version: 1:1.2.8-6ubuntu1.1 > Severity: normal > > The README.Debian.nfsv4 file is now rather old; is NFSv4 really still > considered experimental? > > Parts of this file may be worth keeping (I???m not an expert!), but at least > that claim should be removed, and mention of kernel versions and patch sets. We have removed the outdated README.Debian.nfsv4 in the 1:2.6.1-1 upload. Regards, Salvatore--- End Message ---
Bug#553634: marked as done (nfs-common: README.Debian.nfsv4: directory persmissions (1777) for NFSv4)
Your message dated Tue, 8 Mar 2022 06:38:03 +0100 with message-id and subject line Re: Bug#801067: nfs-common: Remove or updated README.Debian.nfsv4 has caused the Debian Bug report #553634, regarding nfs-common: README.Debian.nfsv4: directory persmissions (1777) for NFSv4 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 553634: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553634 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: nfs-common Version: 1:1.1.2-6lenny1 Severity: wishlist It has taken me several attempts in the past weeks to switch from NFSv3 to NFSv4. Apparently the /nfs4exports directory I use as fsid=0 share needs to have 1777 (rwxrwxrwt) directory permissions. Otherwise the NFS client just hangs or throws error messages like "system call failed" or "access denied" problems on the client issuing the "mount" command. There are no decent log messages on the NFS server either. So it's apparently important to set the permissions correctly. It would be nice to get a hint about directory permissions in the README.Debian.nfsv4. Could you please add that? -- System Information: Debian Release: 5.0.3 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Kernel: Linux 2.6.26-2-686 (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages nfs-common depends on: ii adduser 3.110add and remove users and groups ii initscripts 2.86.ds1-61 Scripts for initializing and shutt ii libc6 2.7-18 GNU C Library: Shared libraries ii libcomerr2 1.41.3-1 common error description library ii libevent1 1.3e-3 An asynchronous event notification ii libgssglue1 0.1-2mechanism-switch gssapi library ii libkrb531.6.dfsg.4~beta1-5lenny1 MIT Kerberos runtime libraries ii libnfsidmap20.20-1 An nfs idmapping library ii librpcsecgss3 0.18-1 allows secure rpc communication us ii libwrap07.6.q-16 Wietse Venema's TCP wrappers libra ii lsb-base3.2-20 Linux Standard Base 3.2 init scrip ii netbase 4.34 Basic TCP/IP networking system ii portmap 6.0-9RPC port mapper ii ucf 3.0016 Update Configuration File: preserv nfs-common recommends no packages. nfs-common suggests no packages. -- debconf-show failed --- End Message --- --- Begin Message --- Source: nfs-utils Source-Version: 1:2.6.1-1 On Mon, Oct 05, 2015 at 09:32:39PM +0100, Reuben Thomas wrote: > Package: nfs-common > Version: 1:1.2.8-6ubuntu1.1 > Severity: normal > > The README.Debian.nfsv4 file is now rather old; is NFSv4 really still > considered experimental? > > Parts of this file may be worth keeping (I???m not an expert!), but at least > that claim should be removed, and mention of kernel versions and patch sets. We have removed the outdated README.Debian.nfsv4 in the 1:2.6.1-1 upload. Regards, Salvatore--- End Message ---
Bug#801067: nfs-common: Remove or updated README.Debian.nfsv4
Source: nfs-utils Source-Version: 1:2.6.1-1 On Mon, Oct 05, 2015 at 09:32:39PM +0100, Reuben Thomas wrote: > Package: nfs-common > Version: 1:1.2.8-6ubuntu1.1 > Severity: normal > > The README.Debian.nfsv4 file is now rather old; is NFSv4 really still > considered experimental? > > Parts of this file may be worth keeping (I???m not an expert!), but at least > that claim should be removed, and mention of kernel versions and patch sets. We have removed the outdated README.Debian.nfsv4 in the 1:2.6.1-1 upload. Regards, Salvatore
Re: Dependencies of linux-headers- packages
On Thu, 2022-03-03 at 11:13 +, Moessbauer, Felix wrote: > Hi, > > the kernel header packages have a dependency to c/c++ compilers. > E.g. the "linux-headers-5.10.0-10-arm64" package depends on gcc- > 10:arm64 -> cpp-10:arm64 (on bullseye). > > This becomes an issue when cross-compiling kernel modules for other > target architectures: > The linux-headers packages cannot be co-installed due to the not co- > installable cpp- packages. > > By that, cross-compilation of kernel modules for other Debian targets > is currently not possible (at least without removing the hosts cpp > infrastructure). > > What is the reason to depend on compilers here? We want installation of OOT modules to be as simple as possible for those users that need it. A dependency makes this more robust. > Wouldn't be a "recommends" relation be sufficient here? > An alternative might also be to depend via `:native`, but I did not > check that yet. [...] Using :native would defeat the purpose. But the attached patch (untested) might fix the dependencies to allow for cross-compilation. linux-kbuild does have some support for use in cross-compilation but I don't know how well it works now. Ben. -- Ben Hutchings Q. Which is the greater problem in the world today, ignorance or apathy? A. I don't know and I couldn't care less. From ed870df3c0ab3d60aa60cf509ee6c3d10ab41276 Mon Sep 17 00:00:00 2001 From: Ben Hutchings Date: Tue, 8 Mar 2022 00:44:38 +0100 Subject: [PATCH linux] linux-headers: Fix compiler dependencies to allow for cross-builds To: debian-kernel@lists.debian.org --- debian/changelog| 6 ++ debian/config/amd64/defines | 2 +- debian/config/arm64/defines | 2 +- debian/config/armel/defines | 2 +- debian/config/armhf/defines | 2 +- debian/config/defines | 1 + debian/config/i386/defines | 2 +- debian/config/s390x/defines | 2 +- 8 files changed, 13 insertions(+), 6 deletions(-) diff --git a/debian/changelog b/debian/changelog index a551e235a8b3..89210e4352c7 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,9 @@ +linux (5.17~rc6-1~exp2) UNRELEASED; urgency=medium + + * linux-headers: Fix compiler dependencies to allow for cross-builds + + -- Ben Hutchings Tue, 08 Mar 2022 00:44:34 +0100 + linux (5.17~rc6-1~exp1) experimental; urgency=medium * New upstream release candidate diff --git a/debian/config/amd64/defines b/debian/config/amd64/defines index 975efaa90b9c..7b9eb9fbe75e 100644 --- a/debian/config/amd64/defines +++ b/debian/config/amd64/defines @@ -15,7 +15,7 @@ install-stem: vmlinuz breaks: xserver-xorg-input-vmmouse (<< 1:13.0.99) [relations] -headers%gcc-11: linux-compiler-gcc-11-x86 +headers%gcc-11: linux-compiler-gcc-11-x86 | gcc-11-x86-64-linux-gnu [amd64_description] hardware: 64-bit PCs diff --git a/debian/config/arm64/defines b/debian/config/arm64/defines index dec69491a59c..f937ed24bb69 100644 --- a/debian/config/arm64/defines +++ b/debian/config/arm64/defines @@ -25,4 +25,4 @@ hardware-long: cloud platforms supporting arm64 virtual machines [relations] gcc-11: gcc-11 , gcc-11-aarch64-linux-gnu , gcc-arm-linux-gnueabihf -headers%gcc-11: gcc-11 +headers%gcc-11: gcc-11 | gcc-11-aarch64-linux-gnu diff --git a/debian/config/armel/defines b/debian/config/armel/defines index 031067afd01b..09440221cb66 100644 --- a/debian/config/armel/defines +++ b/debian/config/armel/defines @@ -13,7 +13,7 @@ uncompressed-image-file: arch/arm/boot/Image install-stem: vmlinuz [relations] -headers%gcc-11: linux-compiler-gcc-11-arm +headers%gcc-11: linux-compiler-gcc-11-arm | gcc-11-arm-linux-gnueabi [marvell_description] hardware: Marvell Kirkwood/Orion diff --git a/debian/config/armhf/defines b/debian/config/armhf/defines index 7607ea2d9f59..8c7d0c96ae9f 100644 --- a/debian/config/armhf/defines +++ b/debian/config/armhf/defines @@ -12,7 +12,7 @@ vdso: true install-stem: vmlinuz [relations] -headers%gcc-11: linux-compiler-gcc-11-arm +headers%gcc-11: linux-compiler-gcc-11-arm | gcc-11-arm-linux-gnueabihf [armmp_description] hardware: ARMv7 multiplatform compatible SoCs diff --git a/debian/config/defines b/debian/config/defines index 82e7c09bb89a..f3e1f0fc50d3 100644 --- a/debian/config/defines +++ b/debian/config/defines @@ -168,6 +168,7 @@ recommends: apparmor [relations] # compilers gcc-11: gcc-11 , gcc-11-@gnu-type-package@ +headers%gcc-11: gcc-11 | gcc-11-@gnu-type-package@ # initramfs-generators initramfs-fallback: linux-initramfs-tool diff --git a/debian/config/i386/defines b/debian/config/i386/defines index d471d747d780..da729c4d2434 100644 --- a/debian/config/i386/defines +++ b/debian/config/i386/defines @@ -21,7 +21,7 @@ install-stem: vmlinuz breaks: xserver-xorg-input-vmmouse (<< 1:13.0.99) [relations] -headers%gcc-11: linux-compiler-gcc-11-x86 +headers%gcc-11: linux-compiler-gcc-11-x86 | gcc-11-i686-linux-gnu [686_description] hardware: older PCs diff --git a/debian/config/s390x/defines b/debian/config/s390x/defines
Bug#1006149: linux-image-5.16.0-1-686: Fails to boot on T41 Thinkpads
Hi Damien, one of the affected users here. Damien Le Moal wrote: > In the bug report, I did not see a dmesg output for a failed boot. But I > guess it is because the user cannot capture it. Correct. > Could you have a look at this bug report for Fedora: > > https://bugzilla.kernel.org/show_bug.cgi?id=215519 > > This Debian case does sound similar. The problem is fixed with commit: > > fda17afc6166 ("ata: libata-core: Fix ata_dev_config_cpr()") > > which is included in kernel 5.16.9. Then it didn't help. > Could the users try that kernel version to see if that fixes the > issue ? Both affected users already tried 5.16.11 and the issue is still there. Nevertheless thanks for your prompt reply and all the details so far! Regards, Axel -- ,''`. | Axel Beckert , https://people.debian.org/~abe/ : :' : | Debian Developer, ftp.ch.debian.org Admin `. `' | 4096R: 2517 B724 C5F6 CA99 5329 6E61 2FF9 CD59 6126 16B5 `-| 1024D: F067 EA27 26B9 C3FC 1486 202E C09E 1D89 9593 0EDE
Bug#961691: marked as done (linux-image-5.6.0-1-amd64: System hangs all the time)
Your message dated Mon, 7 Mar 2022 15:44:48 -0500 with message-id and subject line Re: Bug#961691: linux-image-5.6.0-1-amd64: System hangs all the time has caused the Debian Bug report #961691, regarding linux-image-5.6.0-1-amd64: System hangs all the time to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 961691: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961691 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: src:linux Version: 5.6.7-1 Severity: grave Justification: renders package unusable Dear Maintainer, Since upgrade of 2020-05-18 system started to hang all the time without any reason, forcing me to reboot computer each time loosing my work. -- Package-specific info: ** Version: Linux version 5.6.0-1-amd64 (debian-kernel@lists.debian.org) (gcc version 9.3.0 (Debian 9.3.0-11)) #1 SMP Debian 5.6.7-1 (2020-04-29) ** Command line: BOOT_IMAGE=/boot/vmlinuz-5.6.0-1-amd64 root=UUID=284f2b06-aeb5-4d51-bffe-ddb426f4c63f ro ** Not tainted ** Kernel log: [ 10.387864] systemd[1]: Mounted Huge Pages File System. [ 10.390388] systemd[1]: Mounted POSIX Message Queue File System. [ 10.394777] systemd[1]: Mounted Kernel Debug File System. [ 10.399670] systemd[1]: Mounted Kernel Trace File System. [ 10.404568] systemd[1]: Finished Create list of static device nodes for the current kernel. [ 10.427001] RPC: Registered named UNIX socket transport module. [ 10.429045] RPC: Registered udp transport module. [ 10.431114] RPC: Registered tcp transport module. [ 10.433100] RPC: Registered tcp NFSv4.1 backchannel transport module. [ 10.437145] systemd[1]: Mounted RPC Pipe File System. [ 10.440980] systemd[1]: Starting pNFS block layout mapping daemon... [ 10.487925] systemd[1]: Finished Load Kernel Modules. [ 10.490130] systemd[1]: Condition check resulted in FUSE Control File System being skipped. [ 10.490243] systemd[1]: Condition check resulted in Kernel Configuration File System being skipped. [ 10.493417] systemd[1]: Starting Apply Kernel Variables... [ 10.516173] EXT4-fs (sda1): re-mounted. Opts: errors=remount-ro [ 10.522665] systemd[1]: Finished Remount Root and Kernel File Systems. [ 10.525011] systemd[1]: Started pNFS block layout mapping daemon. [ 10.646829] systemd[1]: Condition check resulted in Rebuild Hardware Database being skipped. [ 10.648586] systemd[1]: Condition check resulted in Platform Persistent Storage Archival being skipped. [ 10.651696] systemd[1]: Starting Load/Save Random Seed... [ 10.655199] systemd[1]: Starting Create System Users... [ 10.779957] systemd[1]: Finished udev Coldplug all Devices. [ 10.816807] systemd[1]: Starting Helper to synchronize boot up for ifupdown... [ 10.828057] Installing knfsd (copyright (C) 1996 o...@monad.swb.de). [ 10.831924] systemd[1]: Mounted NFSD configuration filesystem. [ 10.860106] systemd[1]: Finished Apply Kernel Variables. [ 10.930500] systemd[1]: Finished Load/Save Random Seed. [ 11.041107] systemd[1]: Finished Set the console keyboard layout. [ 11.050969] systemd[1]: Finished Create System Users. [ 11.056564] systemd[1]: Starting Create Static Device Nodes in /dev... [ 11.090135] systemd[1]: Started Journal Service. [ 11.119693] systemd-journald[258]: Received client request to flush runtime journal. [ 11.379257] systemd-journald[258]: File /var/log/journal/a7cfea2033ec4c4182a6354cbc46c69c/system.journal corrupted or uncleanly shut down, renaming and replacing. [ 13.136231] parport_pc 00:03: reported by Plug and Play ACPI [ 13.137946] parport0: PC-style at 0x378 (0x778), irq 7 [PCSPP,TRISTATE,EPP] [ 13.377785] sd 1:0:0:0: Attached scsi generic sg0 type 0 [ 13.516053] ppdev: user-space parallel port driver [ 13.556030] iTCO_vendor_support: vendor-support=0 [ 13.645501] iTCO_wdt: Intel TCO WatchDog Timer Driver v1.11 [ 13.647259] iTCO_wdt: Found a ICH10 TCO device (Version=2, TCOBASE=0x0860) [ 13.649190] iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) [ 14.563063] intel_powerclamp: No package C-state available [ 14.605586] intel_powerclamp: No package C-state available [ 14.641855] intel_powerclamp: No package C-state available [ 14.680160] intel_powerclamp: No package C-state available [ 15.115708] snd_hda_codec_via hdaudioC0D0: autoconfig for VT1708S: line_outs=4 (0x1c/0x19/0x22/0x23/0x0) type:line [ 15.117461] snd_hda_codec_via hdaudioC0D0:speaker_outs=0 (0x0/0x0/0x0/0x0/0x0) [ 15.119133] snd_hda_codec_via hdaudioC0D0:hp_outs=1 (0x1d/0x0/0x0/0x0/0x0) [ 15.120838] snd_hda_codec_via
Bug#1006149: linux-image-5.16.0-1-686: Fails to boot on T41 Thinkpads
Hi Damien, On Sunday, 6 March 2022 23:26:03 CET Diederik de Haas wrote: > Upstream commit 68dbbe7d5b4fde736d104cbbc9a2fce875562012 [1] > seems potentially relevant (included in 5.16-rc1), but given ... > > On Saturday, 5 March 2022 17:59:50 CET Petra R.-P. wrote: > > The "Read log 0x00 page 0x00 failed" line has disappeared, > > ... I don't know if building a new kernel with that commit reverted > would be enough. > > From the above mentioned commit message it very much seems the logic > wrt slow drives was changed, but how exactly is 'above my pay grade'. > The new timeout (15s) seems to work for SATA 6.0 Gbps links, but it appears > the T41 uses PATA which I think is (quite a bit?) slower then that. In https://bugs.debian.org/1006149 we have 2 users where the 5.16 kernel fails to boot, while the 5.15 kernel succeeded. In the bug report there are a number of dmesg outputs posted which contain time gaps of ~ 20, 100 and even 160 seconds; i.e. more then 15 seconds. The commit message mentions 'SATA link up 6.0 Gbps', but these users hava PATA links for their HDD. IIUC that means a max speed of ~600MB/s vs ~133MB/s. As the author of the above mentioned commit, could you tell us whether it *could* be that your commit is causing the boot failures? Or is it completely irrelevant for this problem? Cheers, Diederik signature.asc Description: This is a digitally signed message part.
[bts-link] source package src:linux
# # bts-link upstream status pull for source package src:linux # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html # https://bts-link-team.pages.debian.net/bts-link/ # user debian-bts-l...@lists.debian.org # remote status report for #1006645 (http://bugs.debian.org/1006645) # Bug title: aoe: removing aoe devices with flush (implicit in rmmod aoe) leads to page fault # * http://bugzilla.kernel.org/show_bug.cgi?id=215647 # * remote status changed: (?) -> NEW usertags 1006645 + status-NEW thanks
linux-signed-amd64_5.10.92+1~bpo10+1_source.changes ACCEPTED into buster-backports->backports-policy, buster-backports
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 03 Feb 2022 19:49:50 +0100 Source: linux-signed-amd64 Architecture: source Version: 5.10.92+1~bpo10+1 Distribution: buster-backports Urgency: medium Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Changes: linux-signed-amd64 (5.10.92+1~bpo10+1) buster-backports; urgency=medium . * Sign kernel from linux 5.10.92-1~bpo10+1 . * Rebuild for buster-backports: - Change ABI number to 0.bpo.11 Checksums-Sha1: 096cee7fa8bdbbb9e45a36b5f653899e24316713 9349 linux-signed-amd64_5.10.92+1~bpo10+1.dsc 608b187b4c8c2e6b91c9b4aaedd685eed964820b 2729412 linux-signed-amd64_5.10.92+1~bpo10+1.tar.xz Checksums-Sha256: 9d7ed3ddfdab4e0f9bf88d86255eab7b38949197aac484b9b72043445722c760 9349 linux-signed-amd64_5.10.92+1~bpo10+1.dsc 07a224f7bbc3795903854577b2d25ed937f365b59cf4bb50882ef9138f5720c0 2729412 linux-signed-amd64_5.10.92+1~bpo10+1.tar.xz Files: 8d2a1628444b4fcf439623790804853e 9349 kernel optional linux-signed-amd64_5.10.92+1~bpo10+1.dsc 40849ae1adf4b1289c993a429d3a1968 2729412 kernel optional linux-signed-amd64_5.10.92+1~bpo10+1.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmIPoxAACgkQi0FRiLdO NzbJUxAAjGhrrTm++Xtt8rz76m/5AvneDnaLSxoVricIxWZelf+Oy01uwrnYo8HU 9za4NWii7pNNo04UiZ1m0W57XZRMt8jhPk2Oe1AGyqktEGpQwvJazKRLPgYY+7Qj 48FYqmDUuggLLSd4mbGDjuNlLCb3Cgcp1IqpwF157qSvI+fPJsgXsseeWGj8hvFs NQ5F9C+/ZnSALvToZiEvzvF021VAqhfRvQYyrDrclAb/oAMn4NvXlyF1Sx7aisTo /+dvy/iMFh4iA4S6ProyL/5TZD/qoJQdfJ/xh3oxQE3u7dWT68jrVznD/zR1otbp UZf5lQ8cLMEXSMCzPP3FKagjCmHIGn4RM7vwsRqq/rx+kM0tS1C6OLnPaZ+fR0CF ANBMnztzGYzYcAmDcvkKyY1ttlXgnaaa0z5yeaRxZaIkHifWPVu1B6TSgiUlOgWf 46TNBLIjfLKjDQdWNiPPNybqvL2dZY1kurFBe6YhMtjWcuvcRtQdygcI5yvM4lD8 FQFRcSEJUsqvBNS23+lEWAwMq+I/KvEz+wlOJUB29mWMszElZVMZo8KVNUGtSqda GesAxHphUcGDbYRN4JsX0sPVQ4jzxuNljzefD4jvrdhZ+Y0cNj9er9226nERvXLS da9ueYd1mA95XhKXI/fN7AxIF9tMgUpefMCU9z8IOrLptnza8Dg= =XUkz -END PGP SIGNATURE- Thank you for your contribution to Debian.
linux-signed-i386_5.10.92+1~bpo10+1_source.changes ACCEPTED into buster-backports->backports-policy, buster-backports
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 03 Feb 2022 19:49:50 +0100 Source: linux-signed-i386 Architecture: source Version: 5.10.92+1~bpo10+1 Distribution: buster-backports Urgency: medium Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Changes: linux-signed-i386 (5.10.92+1~bpo10+1) buster-backports; urgency=medium . * Sign kernel from linux 5.10.92-1~bpo10+1 . * Rebuild for buster-backports: - Change ABI number to 0.bpo.11 Checksums-Sha1: 64ccc124737fe7d52130ff95b138063187b690e9 15630 linux-signed-i386_5.10.92+1~bpo10+1.dsc c6b36c309e4e842c2a332198640673b9a032717a 3674528 linux-signed-i386_5.10.92+1~bpo10+1.tar.xz Checksums-Sha256: ae1b7bb0360822731949586339ffe34f6a280f4c4897d629ec267edfa6fcd763 15630 linux-signed-i386_5.10.92+1~bpo10+1.dsc 0556ff5ed680e0e3f25cca644347006a334d6aa037ab36cde9d076a7ed7da611 3674528 linux-signed-i386_5.10.92+1~bpo10+1.tar.xz Files: 389cafc1e9c5b240dd49336b8767265e 15630 kernel optional linux-signed-i386_5.10.92+1~bpo10+1.dsc 97e916af3d0f5ae40eaaeb5fa6b3ed29 3674528 kernel optional linux-signed-i386_5.10.92+1~bpo10+1.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmIQHZoACgkQi0FRiLdO NzY98g//WWzf421JE0VEx44KIbBXkWibF74CIEmdLgJigCctfNHoPoOa1CsNSfA8 PdupktqJDVUg1w2vhZ+3vAtwxzClAL1dax8qdQJvyjcrxn9R3HX++7au3yYqbwbB z52kcvEs3zUyxQ6JrwZ38XQ6WUoSOELOuvWM+EKbaaHu+ncAaOo/9GfiJFwNQe6B an7EN5nuDGwW1h5PGebj/Q50fIgTX0Re6j5DstZ7mFRSef+opCUfeGdUsT6EkZPd gPZUfiMNeTcZGOFpp03xeRLTt4klWVHLMq1NqnEVO1l5wO70VNAfIif5iOTJSCCW rH2ldVIl4gXcbukbyrtMZQdhObttSdwlzPik+/eedcOhE8TftUVM5kfkwtAKOT7X aBtnKDhMqm9Qr/BVQQD7mTrcVv8uq2+ENwksoTWjyyOiYNZ7IAsbtkSEsB+bg6ez ZtrM1YjHpNVor5ebBJUkkjoVGv+qf5rpNkK+VHQ2zPcK/IWHTEZ8hSCPSjexWN5S gUiGK/7JISvjtjyYQu44AyHEuUSqWWGNDcsNnIrp07r4d7ZMxo6W8AePUiRAm3Jh 5/DkPeNSGL4miZ2WR8esDYt/n7tUIzdZYxYBhanvuEULbaMJgpRAF+Af1yWC8edq ghZWvTgLT3FdfzPOr8/+1vyQW5Uz1/jNPjE7Yl/KAG68yqNloiw= =eqDR -END PGP SIGNATURE- Thank you for your contribution to Debian.
linux-signed-arm64_5.10.92+1~bpo10+1_source.changes ACCEPTED into buster-backports->backports-policy, buster-backports
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 03 Feb 2022 19:49:50 +0100 Source: linux-signed-arm64 Architecture: source Version: 5.10.92+1~bpo10+1 Distribution: buster-backports Urgency: medium Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Changes: linux-signed-arm64 (5.10.92+1~bpo10+1) buster-backports; urgency=medium . * Sign kernel from linux 5.10.92-1~bpo10+1 . * Rebuild for buster-backports: - Change ABI number to 0.bpo.11 Checksums-Sha1: 75c825922ddd01d85c0372036ab91f081fea9001 7948 linux-signed-arm64_5.10.92+1~bpo10+1.dsc 8d221b3546410f3edb06d097346b5c7d37e5b8dc 2473108 linux-signed-arm64_5.10.92+1~bpo10+1.tar.xz Checksums-Sha256: 83c9200cb03949c6fcfd364de282dd0d12db263288ec34e62be8c7e593649afd 7948 linux-signed-arm64_5.10.92+1~bpo10+1.dsc 35c2d0eec0098f143a6c4bd9212e5122e5c15a8ffebe30ebfec94af5781acb1a 2473108 linux-signed-arm64_5.10.92+1~bpo10+1.tar.xz Files: 212146c09df817a62f6481d472c38a39 7948 kernel optional linux-signed-arm64_5.10.92+1~bpo10+1.dsc ac7ef46b93b4937e03409fccb42c0f10 2473108 kernel optional linux-signed-arm64_5.10.92+1~bpo10+1.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmIP2tgACgkQi0FRiLdO NzY7lw//dixMj01nwpC7NbjDCSZoKFjXzBnoKzXF0IZxZIQ4N5Eqw5bAAJW8Iiod ZI6SvuIx4T+F5w5VpnJXV+gWkTeHTwm2TPNDs66QE4Oy1GxF7KDYvMMwsvO7DM5K wc1yTJ3TbO8HlAjL6TRIqL5na4jBzmCxUoLNKkCmexCtC1tpkzsYXSHMe3O9whjX M9ClhSj19AkOlpe+nr5xgvtVt70iwjb+jrMVXrbfAGPDhvtfslpYPp8k7OsMUcRn D9+KRhGyuDutSUjFfUmcmItsDe94YOHN3gClJC9Ca8YFR4k1dhVPq8RyY5iBVRZ6 IPmbtMQmr5+D3FYpu+WGIw4QUlP3FgsXPg4Ou/dFYCP35SBD45xbuolbWg9oINGI lWaFnkQdg5MXmpK66KgwmZQbzQrkmP1PBQugrcOkv8CA17f211tbdHk7SCj2lysB M2NQal5cvwOsQOTgWXNWiBNCZKOj2yPxtDGmFkaeYPZxR1jZIKIEm169HkVKvPLJ 9leMbrSJLQMJ3XeXYB7n9Y9xERTABVH7d3PumP8NzXWNljkEnRjBO1EBL+Y1+5fa cZPRCenXQAGuzerdtAamdYfWMBQLi7Q8fDtfrEYf8p5TkHyzKEm+TzIlAkIZ+Npr dX1Mth9zVXUUo4Lrc9UI0FhSRJyBmW59BNoJJEiXyFT1iT6lfIU= =dj78 -END PGP SIGNATURE- Thank you for your contribution to Debian.
linux-signed-i386_5.10.92+2_source.changes ACCEPTED into proposed-updates->stable-new
Mapping stable-security to proposed-updates. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 28 Feb 2022 12:23:03 +0100 Source: linux-signed-i386 Architecture: source Version: 5.10.92+2 Distribution: bullseye-security Urgency: high Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Changes: linux-signed-i386 (5.10.92+2) bullseye-security; urgency=high . * Sign kernel from linux 5.10.92-2 . * lib/iov_iter: initialize "flags" in new pipe_buffer * [x86] mwifiex: Fix skb_over_panic in mwifiex_usb_recv() (CVE-2021-43976) * [x86] drm/i915: Flush TLBs before releasing backing store (CVE-2022-0330) * [x86] drm/vmwgfx: Fix stale file descriptors on failed usercopy (CVE-2022-22942) * NFSv4: Handle case where the lookup of a directory fails (CVE-2022-24448) * yam: fix a memory leak in yam_siocdevprivate() (CVE-2022-24959) * tipc: improve size validations for received domain records (CVE-2022-0435) * [s390x] KVM: s390: Return error on SIDA memop on normal guest (CVE-2022-0516) * USB: gadget: validate interface OS descriptor requests (CVE-2022-25258) * usb: gadget: rndis: check size of RNDIS_MSG_SET command (CVE-2022-25375) Checksums-Sha1: fe44754fa806f10219930e5978a6dedf65e10634 14257 linux-signed-i386_5.10.92+2.dsc ff5545834c809f3864a3083ec5f36db76c23e752 3674148 linux-signed-i386_5.10.92+2.tar.xz Checksums-Sha256: bf9ce69d52d94bd2ca1020398b21d9adff0019bc0ac3512a3557af42afd7490f 14257 linux-signed-i386_5.10.92+2.dsc f3229fc491d6dae0ff00cd000e4ca9496c14dc874607c71bde5ea81d67a3ae20 3674148 linux-signed-i386_5.10.92+2.tar.xz Files: 59b03e55395610db06992551db0d5438 14257 kernel optional linux-signed-i386_5.10.92+2.dsc 52da4ec7aa133eee4c62dda7f10616dc 3674148 kernel optional linux-signed-i386_5.10.92+2.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmIdWccACgkQi0FRiLdO NzbsLg//ajXwRc9F6qSZ4g+DzjpiaTemPG4o8O7GD/w0hcVXYR27bLN/gEA5PnNj yCidqaU04aPm6ORO669mCsCYNl1dO9oR2s/ObkBFmPu5J7BBN0MAvrvU6RSHLUO9 GJ0n0M7+ckmjLmFR6BDRQe+cuXm3I5D3GF3PR3MOWiRz9CYvZ2dZGO5VgZj+DsBe jPXWHPoE6yk5lG/HaTJydujK/EaEevW9zywYXUUvxKgtrURlvbcfF4I5G8ciMMy8 mFvYbPvelPHCc+JLnFBUbJKJVcr6q0g1QA7Bpr63+q8ExvAFGg3/8h3k/8wWsxyK lZhGq2+9OdajKGc/4v8b/5K336/+lZ9hf5pNxHBrIxPO1OfWDuY6C+E8yGWxknGd NzhKru07NH/ooWar0bNxWDOsmO1NJmkiakWAee9iN2X26uJ5Di18xtNVAlR39ogh ZbbrQXsCgXkSAbvkKZcY+D9kQF0C8iLXRkCzoWzrYcmpW0Umw+JTNBbzoHtm5F0S 664hCXBWe/C0Q5ARoaWlk32JsJziaD50CkwmvFwZU9yjJlh0LfmN1URbRLsorfkB AMltMzu4o2ADBY6bDsreFFw2wiWqcD0TwpbCT6IT2hpSTakGw+RYRuTBF8PC9RTf rxDEQpvun7p9h2NIhKHxJa3zbZeO8pYO37tJ7uc9HvMXyFWzRVM= =6usC -END PGP SIGNATURE- Thank you for your contribution to Debian.
linux-signed-arm64_5.10.92+2_source.changes ACCEPTED into proposed-updates->stable-new
Mapping stable-security to proposed-updates. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 28 Feb 2022 12:23:03 +0100 Source: linux-signed-arm64 Architecture: source Version: 5.10.92+2 Distribution: bullseye-security Urgency: high Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Changes: linux-signed-arm64 (5.10.92+2) bullseye-security; urgency=high . * Sign kernel from linux 5.10.92-2 . * lib/iov_iter: initialize "flags" in new pipe_buffer * [x86] mwifiex: Fix skb_over_panic in mwifiex_usb_recv() (CVE-2021-43976) * [x86] drm/i915: Flush TLBs before releasing backing store (CVE-2022-0330) * [x86] drm/vmwgfx: Fix stale file descriptors on failed usercopy (CVE-2022-22942) * NFSv4: Handle case where the lookup of a directory fails (CVE-2022-24448) * yam: fix a memory leak in yam_siocdevprivate() (CVE-2022-24959) * tipc: improve size validations for received domain records (CVE-2022-0435) * [s390x] KVM: s390: Return error on SIDA memop on normal guest (CVE-2022-0516) * USB: gadget: validate interface OS descriptor requests (CVE-2022-25258) * usb: gadget: rndis: check size of RNDIS_MSG_SET command (CVE-2022-25375) Checksums-Sha1: f75f91029350aceab9cc1aec65a6b210ae8f56cf 7332 linux-signed-arm64_5.10.92+2.dsc cf0fda11f79ca10229f5d0864251940946634019 2472424 linux-signed-arm64_5.10.92+2.tar.xz Checksums-Sha256: 33dca75dc77551281a4a01a803953170b31f6cf1fef43dcf2bc44e39c2ecbb8a 7332 linux-signed-arm64_5.10.92+2.dsc 548163ce451c03e65b49ac2b3e762a7517d0f5c52c22c29911cfa725e9987fd4 2472424 linux-signed-arm64_5.10.92+2.tar.xz Files: 3b5b70e867da10cb9b5706bedee8e26c 7332 kernel optional linux-signed-arm64_5.10.92+2.dsc 9e05b1abb6a087f5dc4f6d29af68 2472424 kernel optional linux-signed-arm64_5.10.92+2.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmIdMbMACgkQi0FRiLdO Nzah+g/+Lg82MTzXECks9VijGts0RwdDfDuSBC2Dj73E1/YAiZi8Vd0FVpQadqSh zV6ROMiwMd41lGmA/IyqCTiySUQFS9FvtgGKdMFy1yHS9EaSoeA54R4laNQxaZAk eu1r0MMr2RkTqUjUfsIUo5wBq1f29ztJ/uJjPCWx6HIbRGkhcD9BKoQ+sWHAQ81s F8/lrAH6Wqo1c/fc3BjAwdmXf5S+wkpYOZ5B3mWInFUi9NTczycDwQ93Otvl7R/1 LWrEQL+G9QSfUEb80C3pqqlHflg8145xQ6A5WkBgaS7cV8itrngAdsgm13NaTZAH E/k4jDT/58VGcEVBLKhJYF/GiU3moshLW+y42yldAdHMLsGUU92SMMwGfS1l9z7D ecI8bS8dNrLOhwoD66yitHe8FplLwO6iWcvmgqJdnZNJnKqcaJ02Cg9QBPTzISk2 YIBHrAct92PJOF3rxQpz4a/o19C4WpGusBUMU4KWIhfxlg4dqfhhsG+rC9UDNIJ+ CXDSihVQWe+pO40wuu6XacvJO8QHzN5y61XSGoPYRifTkNrLlsgPJ9PLt+bCW2EN HPHe4Ot4K8FHOfLPkte7kc62+r4KkSRM4CgNCTMcILyfYgYNNKVGTUyRqKsqGumZ Gv1EyN97YlqMyusrjFOqW1mXOR56YHGPiI4eH1ukrbs8awUVjrU= =8lkd -END PGP SIGNATURE- Thank you for your contribution to Debian.
linux-signed-amd64_5.10.92+2_source.changes ACCEPTED into proposed-updates->stable-new
Mapping stable-security to proposed-updates. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 28 Feb 2022 12:23:03 +0100 Source: linux-signed-amd64 Architecture: source Version: 5.10.92+2 Distribution: bullseye-security Urgency: high Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Changes: linux-signed-amd64 (5.10.92+2) bullseye-security; urgency=high . * Sign kernel from linux 5.10.92-2 . * lib/iov_iter: initialize "flags" in new pipe_buffer * [x86] mwifiex: Fix skb_over_panic in mwifiex_usb_recv() (CVE-2021-43976) * [x86] drm/i915: Flush TLBs before releasing backing store (CVE-2022-0330) * [x86] drm/vmwgfx: Fix stale file descriptors on failed usercopy (CVE-2022-22942) * NFSv4: Handle case where the lookup of a directory fails (CVE-2022-24448) * yam: fix a memory leak in yam_siocdevprivate() (CVE-2022-24959) * tipc: improve size validations for received domain records (CVE-2022-0435) * [s390x] KVM: s390: Return error on SIDA memop on normal guest (CVE-2022-0516) * USB: gadget: validate interface OS descriptor requests (CVE-2022-25258) * usb: gadget: rndis: check size of RNDIS_MSG_SET command (CVE-2022-25375) Checksums-Sha1: 7914ab1984daabf4ed498be8f378717f0a1a 8601 linux-signed-amd64_5.10.92+2.dsc ecc48df92c9c332763b8c2b522aa7001471cb861 2728484 linux-signed-amd64_5.10.92+2.tar.xz Checksums-Sha256: cc477e4400eb495d50a0cc4945adbd8278d590c140b0eea0f02a4338ac69125e 8601 linux-signed-amd64_5.10.92+2.dsc 62462dffc9c5b7befdaf023ff56fb9cc9a1970516bda3ed90c1f8fcb41d5bcca 2728484 linux-signed-amd64_5.10.92+2.tar.xz Files: 613fc6a9a3a7e449e06b0c5b947befcd 8601 kernel optional linux-signed-amd64_5.10.92+2.dsc a107895b735873564cb6a7433f146807 2728484 kernel optional linux-signed-amd64_5.10.92+2.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmIejQcACgkQi0FRiLdO NzZieQ//ff0PK5rVoUw9ZUXqRRqU8p6PpaIfE4d1tkt/HE4eTKjjw5hCcrJQtOzs IVesI9kkznSjJ5DoNgifFKTRTCv6JrQuZDWFIK57G+jvIL7y56gJKlMc91V6FLjB ZqmkkCcispNuCxVYmRPbSvu0DeTmUj25XvjFHHQ8fh2cPLWFCqYAR7EglWBUcUKz eVSNkD0fA2gEJH1jIjT5Kk5jun10MdbOhqz/DqAjMSwgzlXxmRNOu/FZG43Hdpcn Lr0HDvJcHgFt7K0/OUdRs4/iMGtXmIEPLSTZK41yhpz4Wwao92ryaQ9s86V+6dzg WkxDsghNU10t+EeGonQ9buTT74hfjfPXm3L/RJRqgndWexnI5u6y2c5uv+IjOrjn cTLeFORkGyQpSQhnvlYY2rvsubdbBuro+zTyeh08KfxJBflB+04+6yxEHimsUAYt z3ooyCBw2gtJqn/s5MOLgIG8OHrMwhthp2RljAng8Gp3bqutk/4MowBC5V+Y37Oj ojxr/WOZWoRnKv3LfBpjmS0kFh4sj3StLu4qTIbLCnZ0/KwyHnHEC9j3xr+i6Ntj c5sRV5PZm6G1qksQy6Oo2ep+7eQLmoIx+p71Iml1q0tZh1wRuFBI8be8QfEdku0c tp+zOKw5d1MTlJMZqXC9/nN1fXn+2qrmRuO4CCezl7MR0hEfhEw= =in02 -END PGP SIGNATURE- Thank you for your contribution to Debian.
linux_5.10.92-2_source.changes ACCEPTED into proposed-updates->stable-new
Mapping stable-security to proposed-updates. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 28 Feb 2022 12:23:03 +0100 Source: linux Architecture: source Version: 5.10.92-2 Distribution: bullseye-security Urgency: high Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Changes: linux (5.10.92-2) bullseye-security; urgency=high . * lib/iov_iter: initialize "flags" in new pipe_buffer * [x86] mwifiex: Fix skb_over_panic in mwifiex_usb_recv() (CVE-2021-43976) * [x86] drm/i915: Flush TLBs before releasing backing store (CVE-2022-0330) * [x86] drm/vmwgfx: Fix stale file descriptors on failed usercopy (CVE-2022-22942) * NFSv4: Handle case where the lookup of a directory fails (CVE-2022-24448) * yam: fix a memory leak in yam_siocdevprivate() (CVE-2022-24959) * tipc: improve size validations for received domain records (CVE-2022-0435) * [s390x] KVM: s390: Return error on SIDA memop on normal guest (CVE-2022-0516) * USB: gadget: validate interface OS descriptor requests (CVE-2022-25258) * usb: gadget: rndis: check size of RNDIS_MSG_SET command (CVE-2022-25375) Checksums-Sha1: c7f32e8cb91a3b31a28468231854a92ae55a4eea 197231 linux_5.10.92-2.dsc 139a7341197ccf83b3eec62644b956c38b177243 3403124 linux_5.10.92-2.debian.tar.xz faac26d13afb444d27518fb46d4398f6e8ebc81f 6456 linux_5.10.92-2_source.buildinfo Checksums-Sha256: 8f7fbd051cc75a44d2f0296109fb16858f8c1e27154addc0e297f0633eda88a6 197231 linux_5.10.92-2.dsc 210c4701031f60ccfa5a32277ff0f9fb3c48aa6d9d6cfab9dc4991cfa287306e 3403124 linux_5.10.92-2.debian.tar.xz b58c68ffd7ef9ac79ab33bb1442af7d3d4931b9ad34beee2becc03ee54d25e05 6456 linux_5.10.92-2_source.buildinfo Files: 3432ef381176dad7383f750a5fba72f2 197231 kernel optional linux_5.10.92-2.dsc 3cb8037c4cfbcdca52a572b15f549aa3 3403124 kernel optional linux_5.10.92-2.debian.tar.xz 2bab3b96c25d256f09fbbc5cac34abd9 6456 kernel optional linux_5.10.92-2_source.buildinfo -BEGIN PGP SIGNATURE- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmIcsaNfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89EG3EP/0kam14NLR0GZBgkfp4Ph6R3X2UoqwLF I3uexYrvdAIGRXr25glimOHmWt9g0FxqsEIu7d7UU2ajYqj2PE+zqXqWjx/G6H4O ZFMt7UZ+xgHVfrP8cm64zxO+UdS84mqrwHj4Wq3aiSvWa3ss0e7fy74+KjzHdHNK un2uNJ1d1cJKXQS/zIlttENbXAaZif+989VKBNxH7LcID48ikB20WzCym+JK/rWw 7iJB+fGdpcpBbxGFZay2o6SjrzFkg5zf6NiGEDTx71XYshw19v7FE7v2B4vvK1SH a4aZ0lYmP5uFJIH8eNvN4e15ENELO95Jxo3nwLd+fcEoAPzybLn1mIxKEgvNUxxK qW/Ba965pd/RTaOnlcxh3NKwh8DmtSkniWnTIqWQfJPFBVRS09ArFQtAYrkSDZ0V +hjeBg+5xczayTunluLzWCglodyKLjuLAN5KoqLnthEPMjmpaszkbw8eYe7uym1J 6V3LOTHwMab9UI+InPiFHmwFX6viEfVBZjpnh7C2QlJoILL8YznTl43KKn4i7jvf qg+yb0N84eyC+rr/BXx7ip9sqADhG3NllPE0TYlffNRoGoCyLThYSiDoPSgnIoYy XJMxkAw3FZmGyQ0cuZPVJZt1upy91w3680lCaVbUSG/1D+jzK2TVTjDK0kbVyhCo 1c0mvylJtJRE =RZjR -END PGP SIGNATURE- Thank you for your contribution to Debian.
linux_5.16.11-1~bpo11+1_source.changes ACCEPTED into bullseye-backports, bullseye-backports
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 02 Mar 2022 22:26:09 +0100 Source: linux Architecture: source Version: 5.16.11-1~bpo11+1 Distribution: bullseye-backports Urgency: medium Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Closes: 890343 947179 983757 988044 997907 998835 1001080 1001083 1001731 1002460 1002706 1004095 1004495 1005141 1005884 1006275 Changes: linux (5.16.11-1~bpo11+1) bullseye-backports; urgency=medium . * Rebuild for bullseye-backports: - Change ABI number to 0.bpo.3 . linux (5.16.11-1) unstable; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.11 - drm/nouveau/pmu/gm200-: use alternate falcon reset sequence - HID:Add support for UGTABLET WP5540 - [x86] Revert "svm: Add warning message for AVIC IPI invalid target" - mmc: block: fix read single on recovery logic - mm: don't try to NUMA-migrate COW pages that have other uses - [amd64] HID: amd_sfh: Add illuminance mask to limit ALS max value - [amd64] HID: amd_sfh: Increase sensor command timeout - [amd64] HID: amd_sfh: Correct the structure field name - [amd64] PCI: hv: Fix NUMA node assignment when kernel boots with custom NUMA topology - HID: apple: Set the tilde quirk flag on the Wellspring 5 and later - btrfs: don't hold CPU for too long when defragging a file - btrfs: send: in case of IO error log it - btrfs: defrag: don't try to defrag extents which are under writeback - [amd64] platform/x86: amd-pmc: Correct usage of SMU version - net: ieee802154: at86rf230: Stop leaking skb's - ax25: improve the incomplete fix to avoid UAF and NPD bugs - cifs: unlock chan_lock before calling cifs_put_tcp_session - vfs: make freeze_super abort when sync_filesystem returns error - vfs: make sync_filesystem return errors from ->sync_fs - quota: make dquot_quota_sync return errors from ->sync_fs - scsi: pm80xx: Fix double completion for SATA devices - scsi: core: Reallocate device's budget map on queue depth change - scsi: pm8001: Fix use-after-free for aborted TMF sas_task - scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task - drm/amd: Warn users about potential s0ix problems - nvme: fix a possible use-after-free in controller reset during load - nvme-tcp: fix possible use-after-free in transport error_recovery work - nvme-rdma: fix possible use-after-free in transport error_recovery work - drm/amd: add support to check whether the system is set to s3 - drm/amd: Only run s3 or s0ix if system is configured properly - drm/amdgpu: fix logic inversion in check - [amd64] x86/Xen: streamline (and fix) PV CPU enumeration - Revert "module, async: async_synchronize_full() on module init iff async is used" - random: wake up /dev/random writers after zap - [x86] KVM: x86/xen: Fix runstate updates to be atomic when preempting vCPU - [x86] KVM: x86: nSVM/nVMX: set nested_run_pending on VM entry which is a result of RSM - [x86] KVM: x86: SVM: don't passthrough SMAP/SMEP/PKE bits in !NPT && !gCR0.PG case - [x86] KVM: x86: nSVM: fix potential NULL derefernce on nested migration - [x86] KVM: x86: nSVM: mark vmcb01 as dirty when restoring SMM saved state - iwlwifi: remove deprecated broadcast filtering feature - iwlwifi: fix use-after-free (Closes: #1005884) - drm/radeon: Fix backlight control on iMac 12,1 - drm/atomic: Don't pollute crtc_state->mode_blob with error pointers - drm/amdgpu: skipping SDMA hw_init and hw_fini for S0ix. - [x86] drm/i915/opregion: check port number bounds for SWSCI display power state - [x86] drm/i915: Fix dbuf slice config lookup - [x86] drm/i915: Fix mbus join config lookup - vsock: remove vsock from connected table when connect is interrupted by a signal - [arm64] tee: export teedev_open() and teedev_close_context() - [arm64] optee: use driver internal tee_context for some rpc - [arm*] drm/cma-helper: Set VM_DONTEXPAND for mmap - [x86] drm/i915/gvt: Make DRM_I915_GVT depend on X86 - [x86] drm/i915/ttm: tweak priority hint selection - iwlwifi: pcie: fix locking when "HW not ready" - iwlwifi: pcie: gen2: fix locking when "HW not ready" - iwlwifi: mvm: fix condition which checks the version of rate_n_flags - iwlwifi: fix iwl_legacy_rate_to_fw_idx - iwlwifi: mvm: don't send SAR GEO command for 3160 devices - netfilter: nft_synproxy: unregister hooks on init error path - ipv4: fix data races in fib_alias_hw_flags_set - ipv6: fix data-race in fib6_info_hw_flags_set / fib6_purge_rt - ipv6: mcast: use rcu-safe version of ipv6_get_lladdr() - ipv6: per-netns exclusive flowlabel checks - Revert "net: ethernet: bgmac: Use
Translation Services with Minimal Expenses
Respected Sir/Ma’am, I would like to introduce a *Translation Company* that specializes in the providing *Translation, **Interpretation* (Language Translator on contract/permanent basis) and *Web/Soft/App. Localization* *services* since last 19 years. The company is a pioneer in the fields of translation and interpretation across the globe. It has on board a number of specialized translators and interpreters who are specialized in different languages and areas. Some reputed Clients: *TCS, Global Sign, BHEL**, **Interglobe Technologies, Schneider Electric** and **NISC Export Services* *I would be highly g**lad** if you consider us for providing **any of the above** service**s.* Kind Regards, Preety Ahuja Dept. (Tr & In)