Bug#801067: marked as done (nfs-common: Remove or updated README.Debian.nfsv4)

2022-03-07 Thread Debian Bug Tracking System
Your message dated Tue, 8 Mar 2022 06:38:03 +0100
with message-id 
and subject line Re: Bug#801067: nfs-common: Remove or updated 
README.Debian.nfsv4
has caused the Debian Bug report #801067,
regarding nfs-common: Remove or updated README.Debian.nfsv4
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
801067: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801067
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-common
Version: 1:1.2.8-6ubuntu1.1
Severity: normal

The README.Debian.nfsv4 file is now rather old; is NFSv4 really still
considered experimental?

Parts of this file may be worth keeping (I’m not an expert!), but at least
that claim should be removed, and mention of kernel versions and patch sets.

-- Package-specific info:
-- rpcinfo --
   program vers proto   port  service
104   tcp111  portmapper
103   tcp111  portmapper
102   tcp111  portmapper
104   udp111  portmapper
103   udp111  portmapper
102   udp111  portmapper
1000241   udp  43250  status
1000241   tcp  59720  status
-- /etc/default/nfs-common --
NEED_STATD=
STATDOPTS=
NEED_GSSD=
-- /etc/idmapd.conf --
[General]
Verbosity = 0
Pipefs-Directory = /run/rpc_pipefs
[Mapping]
Nobody-User = rrt
Nobody-Group = rrt
-- /etc/fstab --

-- System Information:
Debian Release: jessie/sid
  APT prefers trusty-updates
  APT policy: (500, 'trusty-updates'), (500, 'trusty-security'), (500, 
'trusty'), (400, 'trusty-proposed'), (100, 'trusty-backports'), (90, 
'wily-updates'), (90, 'wily')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.13.0-63-generic (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages nfs-common depends on:
ii  adduser 3.113+nmu3ubuntu3
ii  initscripts 2.88dsf-41ubuntu6.2
ii  libc6   2.19-0ubuntu6.6
ii  libcap2 1:2.24-0ubuntu2
ii  libcomerr2  1.42.9-3ubuntu1.3
ii  libdevmapper1.02.1  2:1.02.77-6ubuntu2
ii  libevent-2.0-5  2.0.21-stable-1ubuntu1.14.04.1
ii  libgssglue1 0.4-2ubuntu1
ii  libkeyutils11.5.6-1
ii  libkrb5-3   1.12+dfsg-2ubuntu5.1
ii  libmount1   2.20.1-5.1ubuntu20.7
ii  libnfsidmap20.25-5
ii  libtirpc1   0.2.2-5ubuntu2
ii  libwrap07.6.q-25
ii  lsb-base4.1+Debian11ubuntu6
ii  mountall2.53
ii  rpcbind 0.2.1-2ubuntu2.2
ii  sysv-rc 2.88dsf-41ubuntu6.2
ii  ucf 3.0027+nmu1

Versions of packages nfs-common recommends:
ii  python  2.7.5-5ubuntu3

Versions of packages nfs-common suggests:
pn  open-iscsi  
pn  watchdog

Versions of packages nfs-kernel-server depends on:
ii  libblkid1 2.20.1-5.1ubuntu20.7
ii  libc6 2.19-0ubuntu6.6
ii  libcap2   1:2.24-0ubuntu2
ii  libsqlite3-0  3.8.2-1ubuntu2.1
ii  libtirpc1 0.2.2-5ubuntu2
ii  libwrap0  7.6.q-25
ii  lsb-base  4.1+Debian11ubuntu6
ii  ucf   3.0027+nmu1

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: nfs-utils
Source-Version: 1:2.6.1-1

On Mon, Oct 05, 2015 at 09:32:39PM +0100, Reuben Thomas wrote:
> Package: nfs-common
> Version: 1:1.2.8-6ubuntu1.1
> Severity: normal
> 
> The README.Debian.nfsv4 file is now rather old; is NFSv4 really still
> considered experimental?
> 
> Parts of this file may be worth keeping (I???m not an expert!), but at least
> that claim should be removed, and mention of kernel versions and patch sets.

We have removed the outdated README.Debian.nfsv4 in the 1:2.6.1-1
upload.

Regards,
Salvatore--- End Message ---


Bug#553634: marked as done (nfs-common: README.Debian.nfsv4: directory persmissions (1777) for NFSv4)

2022-03-07 Thread Debian Bug Tracking System
Your message dated Tue, 8 Mar 2022 06:38:03 +0100
with message-id 
and subject line Re: Bug#801067: nfs-common: Remove or updated 
README.Debian.nfsv4
has caused the Debian Bug report #553634,
regarding nfs-common: README.Debian.nfsv4: directory persmissions (1777) for 
NFSv4
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
553634: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=553634
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-common
Version: 1:1.1.2-6lenny1
Severity: wishlist

It has taken me several attempts in the past weeks to switch from NFSv3
to NFSv4. Apparently the /nfs4exports directory I use as fsid=0 share
needs to have 1777 (rwxrwxrwt) directory permissions. Otherwise the
NFS client just hangs or throws error messages like "system call failed"
or "access denied" problems on the client issuing the "mount" command.
There are no decent log messages on the NFS server either. So it's
apparently important to set the permissions correctly.

It would be nice to get a hint about directory permissions in the
README.Debian.nfsv4. Could you please add that?

-- System Information:
Debian Release: 5.0.3
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-2-686 (SMP w/1 CPU core)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages nfs-common depends on:
ii  adduser 3.110add and remove users and groups
ii  initscripts 2.86.ds1-61  Scripts for initializing and shutt
ii  libc6   2.7-18   GNU C Library: Shared libraries
ii  libcomerr2  1.41.3-1 common error description library
ii  libevent1   1.3e-3   An asynchronous event notification
ii  libgssglue1 0.1-2mechanism-switch gssapi library
ii  libkrb531.6.dfsg.4~beta1-5lenny1 MIT Kerberos runtime libraries
ii  libnfsidmap20.20-1   An nfs idmapping library
ii  librpcsecgss3   0.18-1   allows secure rpc communication us
ii  libwrap07.6.q-16 Wietse Venema's TCP wrappers libra
ii  lsb-base3.2-20   Linux Standard Base 3.2 init scrip
ii  netbase 4.34 Basic TCP/IP networking system
ii  portmap 6.0-9RPC port mapper
ii  ucf 3.0016   Update Configuration File: preserv

nfs-common recommends no packages.

nfs-common suggests no packages.

-- debconf-show failed


--- End Message ---
--- Begin Message ---
Source: nfs-utils
Source-Version: 1:2.6.1-1

On Mon, Oct 05, 2015 at 09:32:39PM +0100, Reuben Thomas wrote:
> Package: nfs-common
> Version: 1:1.2.8-6ubuntu1.1
> Severity: normal
> 
> The README.Debian.nfsv4 file is now rather old; is NFSv4 really still
> considered experimental?
> 
> Parts of this file may be worth keeping (I???m not an expert!), but at least
> that claim should be removed, and mention of kernel versions and patch sets.

We have removed the outdated README.Debian.nfsv4 in the 1:2.6.1-1
upload.

Regards,
Salvatore--- End Message ---


Bug#801067: nfs-common: Remove or updated README.Debian.nfsv4

2022-03-07 Thread Salvatore Bonaccorso
Source: nfs-utils
Source-Version: 1:2.6.1-1

On Mon, Oct 05, 2015 at 09:32:39PM +0100, Reuben Thomas wrote:
> Package: nfs-common
> Version: 1:1.2.8-6ubuntu1.1
> Severity: normal
> 
> The README.Debian.nfsv4 file is now rather old; is NFSv4 really still
> considered experimental?
> 
> Parts of this file may be worth keeping (I???m not an expert!), but at least
> that claim should be removed, and mention of kernel versions and patch sets.

We have removed the outdated README.Debian.nfsv4 in the 1:2.6.1-1
upload.

Regards,
Salvatore



Re: Dependencies of linux-headers- packages

2022-03-07 Thread Ben Hutchings
On Thu, 2022-03-03 at 11:13 +, Moessbauer, Felix wrote:
> Hi,
> 
> the kernel header packages have a dependency to c/c++ compilers.
> E.g. the "linux-headers-5.10.0-10-arm64" package depends on gcc-
> 10:arm64 -> cpp-10:arm64 (on bullseye).
> 
> This becomes an issue when cross-compiling kernel modules for other
> target architectures:
> The linux-headers packages cannot be co-installed due to the not co-
> installable cpp- packages.
> 
> By that, cross-compilation of kernel modules for other Debian targets
> is currently not possible (at least without removing the hosts cpp
> infrastructure).
> 
> What is the reason to depend on compilers here?

We want installation of OOT modules to be as simple as possible for
those users that need it.  A dependency makes this more robust.

> Wouldn't be a "recommends" relation be sufficient here?
> An alternative might also be to depend via `:native`, but I did not
> check that yet.
[...]

Using :native would defeat the purpose.  But the attached patch
(untested) might fix the dependencies to allow for cross-compilation.

linux-kbuild does have some support for use in cross-compilation but I
don't know how well it works now.

Ben.


-- 
Ben Hutchings
Q.  Which is the greater problem in the world today,
ignorance or apathy?
A.  I don't know and I couldn't care less.
From ed870df3c0ab3d60aa60cf509ee6c3d10ab41276 Mon Sep 17 00:00:00 2001
From: Ben Hutchings 
Date: Tue, 8 Mar 2022 00:44:38 +0100
Subject: [PATCH linux] linux-headers: Fix compiler dependencies to allow for
 cross-builds
To: debian-kernel@lists.debian.org

---
 debian/changelog| 6 ++
 debian/config/amd64/defines | 2 +-
 debian/config/arm64/defines | 2 +-
 debian/config/armel/defines | 2 +-
 debian/config/armhf/defines | 2 +-
 debian/config/defines   | 1 +
 debian/config/i386/defines  | 2 +-
 debian/config/s390x/defines | 2 +-
 8 files changed, 13 insertions(+), 6 deletions(-)

diff --git a/debian/changelog b/debian/changelog
index a551e235a8b3..89210e4352c7 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,9 @@
+linux (5.17~rc6-1~exp2) UNRELEASED; urgency=medium
+
+  * linux-headers: Fix compiler dependencies to allow for cross-builds
+
+ -- Ben Hutchings   Tue, 08 Mar 2022 00:44:34 +0100
+
 linux (5.17~rc6-1~exp1) experimental; urgency=medium
 
   * New upstream release candidate
diff --git a/debian/config/amd64/defines b/debian/config/amd64/defines
index 975efaa90b9c..7b9eb9fbe75e 100644
--- a/debian/config/amd64/defines
+++ b/debian/config/amd64/defines
@@ -15,7 +15,7 @@ install-stem: vmlinuz
 breaks: xserver-xorg-input-vmmouse (<< 1:13.0.99)
 
 [relations]
-headers%gcc-11: linux-compiler-gcc-11-x86
+headers%gcc-11: linux-compiler-gcc-11-x86 | gcc-11-x86-64-linux-gnu
 
 [amd64_description]
 hardware: 64-bit PCs
diff --git a/debian/config/arm64/defines b/debian/config/arm64/defines
index dec69491a59c..f937ed24bb69 100644
--- a/debian/config/arm64/defines
+++ b/debian/config/arm64/defines
@@ -25,4 +25,4 @@ hardware-long: cloud platforms supporting arm64 virtual machines
 
 [relations]
 gcc-11: gcc-11 , gcc-11-aarch64-linux-gnu , gcc-arm-linux-gnueabihf 
-headers%gcc-11: gcc-11
+headers%gcc-11: gcc-11 | gcc-11-aarch64-linux-gnu
diff --git a/debian/config/armel/defines b/debian/config/armel/defines
index 031067afd01b..09440221cb66 100644
--- a/debian/config/armel/defines
+++ b/debian/config/armel/defines
@@ -13,7 +13,7 @@ uncompressed-image-file: arch/arm/boot/Image
 install-stem: vmlinuz
 
 [relations]
-headers%gcc-11: linux-compiler-gcc-11-arm
+headers%gcc-11: linux-compiler-gcc-11-arm | gcc-11-arm-linux-gnueabi
 
 [marvell_description]
 hardware: Marvell Kirkwood/Orion
diff --git a/debian/config/armhf/defines b/debian/config/armhf/defines
index 7607ea2d9f59..8c7d0c96ae9f 100644
--- a/debian/config/armhf/defines
+++ b/debian/config/armhf/defines
@@ -12,7 +12,7 @@ vdso: true
 install-stem: vmlinuz
 
 [relations]
-headers%gcc-11: linux-compiler-gcc-11-arm
+headers%gcc-11: linux-compiler-gcc-11-arm | gcc-11-arm-linux-gnueabihf
 
 [armmp_description]
 hardware: ARMv7 multiplatform compatible SoCs
diff --git a/debian/config/defines b/debian/config/defines
index 82e7c09bb89a..f3e1f0fc50d3 100644
--- a/debian/config/defines
+++ b/debian/config/defines
@@ -168,6 +168,7 @@ recommends: apparmor
 [relations]
 # compilers
 gcc-11: gcc-11 , gcc-11-@gnu-type-package@ 
+headers%gcc-11: gcc-11 | gcc-11-@gnu-type-package@
 
 # initramfs-generators
 initramfs-fallback: linux-initramfs-tool
diff --git a/debian/config/i386/defines b/debian/config/i386/defines
index d471d747d780..da729c4d2434 100644
--- a/debian/config/i386/defines
+++ b/debian/config/i386/defines
@@ -21,7 +21,7 @@ install-stem: vmlinuz
 breaks: xserver-xorg-input-vmmouse (<< 1:13.0.99)
 
 [relations]
-headers%gcc-11: linux-compiler-gcc-11-x86
+headers%gcc-11: linux-compiler-gcc-11-x86 | gcc-11-i686-linux-gnu
 
 [686_description]
 hardware: older PCs
diff --git a/debian/config/s390x/defines b/debian/config/s390x/defines

Bug#1006149: linux-image-5.16.0-1-686: Fails to boot on T41 Thinkpads

2022-03-07 Thread Axel Beckert
Hi Damien,

one of the affected users here.

Damien Le Moal wrote:
> In the bug report, I did not see a dmesg output for a failed boot. But I
> guess it is because the user cannot capture it.

Correct.

> Could you have a look at this bug report for Fedora:
> 
> https://bugzilla.kernel.org/show_bug.cgi?id=215519
> 
> This Debian case does sound similar. The problem is fixed with commit:
> 
> fda17afc6166 ("ata: libata-core: Fix ata_dev_config_cpr()")
> 
> which is included in kernel 5.16.9.

Then it didn't help.

> Could the users try that kernel version to see if that fixes the
> issue ?

Both affected users already tried 5.16.11 and the issue is still
there.

Nevertheless thanks for your prompt reply and all the details so far!

Regards, Axel
-- 
 ,''`.  |  Axel Beckert , https://people.debian.org/~abe/
: :' :  |  Debian Developer, ftp.ch.debian.org Admin
`. `'   |  4096R: 2517 B724 C5F6 CA99 5329  6E61 2FF9 CD59 6126 16B5
  `-|  1024D: F067 EA27 26B9 C3FC 1486  202E C09E 1D89 9593 0EDE



Bug#961691: marked as done (linux-image-5.6.0-1-amd64: System hangs all the time)

2022-03-07 Thread Debian Bug Tracking System
Your message dated Mon, 7 Mar 2022 15:44:48 -0500
with message-id 
and subject line Re: Bug#961691: linux-image-5.6.0-1-amd64: System hangs all 
the time
has caused the Debian Bug report #961691,
regarding linux-image-5.6.0-1-amd64: System hangs all the time
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
961691: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961691
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:linux
Version: 5.6.7-1
Severity: grave
Justification: renders package unusable

Dear Maintainer,

Since upgrade of 2020-05-18 system started to hang all the time without any 
reason,
forcing me to reboot computer each time loosing my work.

-- Package-specific info:
** Version:
Linux version 5.6.0-1-amd64 (debian-kernel@lists.debian.org) (gcc version 9.3.0 
(Debian 9.3.0-11)) #1 SMP Debian 5.6.7-1 (2020-04-29)

** Command line:
BOOT_IMAGE=/boot/vmlinuz-5.6.0-1-amd64 
root=UUID=284f2b06-aeb5-4d51-bffe-ddb426f4c63f ro

** Not tainted

** Kernel log:
[   10.387864] systemd[1]: Mounted Huge Pages File System.
[   10.390388] systemd[1]: Mounted POSIX Message Queue File System.
[   10.394777] systemd[1]: Mounted Kernel Debug File System.
[   10.399670] systemd[1]: Mounted Kernel Trace File System.
[   10.404568] systemd[1]: Finished Create list of static device nodes for the 
current kernel.
[   10.427001] RPC: Registered named UNIX socket transport module.
[   10.429045] RPC: Registered udp transport module.
[   10.431114] RPC: Registered tcp transport module.
[   10.433100] RPC: Registered tcp NFSv4.1 backchannel transport module.
[   10.437145] systemd[1]: Mounted RPC Pipe File System.
[   10.440980] systemd[1]: Starting pNFS block layout mapping daemon...
[   10.487925] systemd[1]: Finished Load Kernel Modules.
[   10.490130] systemd[1]: Condition check resulted in FUSE Control File System 
being skipped.
[   10.490243] systemd[1]: Condition check resulted in Kernel Configuration 
File System being skipped.
[   10.493417] systemd[1]: Starting Apply Kernel Variables...
[   10.516173] EXT4-fs (sda1): re-mounted. Opts: errors=remount-ro
[   10.522665] systemd[1]: Finished Remount Root and Kernel File Systems.
[   10.525011] systemd[1]: Started pNFS block layout mapping daemon.
[   10.646829] systemd[1]: Condition check resulted in Rebuild Hardware 
Database being skipped.
[   10.648586] systemd[1]: Condition check resulted in Platform Persistent 
Storage Archival being skipped.
[   10.651696] systemd[1]: Starting Load/Save Random Seed...
[   10.655199] systemd[1]: Starting Create System Users...
[   10.779957] systemd[1]: Finished udev Coldplug all Devices.
[   10.816807] systemd[1]: Starting Helper to synchronize boot up for 
ifupdown...
[   10.828057] Installing knfsd (copyright (C) 1996 o...@monad.swb.de).
[   10.831924] systemd[1]: Mounted NFSD configuration filesystem.
[   10.860106] systemd[1]: Finished Apply Kernel Variables.
[   10.930500] systemd[1]: Finished Load/Save Random Seed.
[   11.041107] systemd[1]: Finished Set the console keyboard layout.
[   11.050969] systemd[1]: Finished Create System Users.
[   11.056564] systemd[1]: Starting Create Static Device Nodes in /dev...
[   11.090135] systemd[1]: Started Journal Service.
[   11.119693] systemd-journald[258]: Received client request to flush runtime 
journal.
[   11.379257] systemd-journald[258]: File 
/var/log/journal/a7cfea2033ec4c4182a6354cbc46c69c/system.journal corrupted or 
uncleanly shut down, renaming and replacing.
[   13.136231] parport_pc 00:03: reported by Plug and Play ACPI
[   13.137946] parport0: PC-style at 0x378 (0x778), irq 7 [PCSPP,TRISTATE,EPP]
[   13.377785] sd 1:0:0:0: Attached scsi generic sg0 type 0
[   13.516053] ppdev: user-space parallel port driver
[   13.556030] iTCO_vendor_support: vendor-support=0
[   13.645501] iTCO_wdt: Intel TCO WatchDog Timer Driver v1.11
[   13.647259] iTCO_wdt: Found a ICH10 TCO device (Version=2, TCOBASE=0x0860)
[   13.649190] iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0)
[   14.563063] intel_powerclamp: No package C-state available
[   14.605586] intel_powerclamp: No package C-state available
[   14.641855] intel_powerclamp: No package C-state available
[   14.680160] intel_powerclamp: No package C-state available
[   15.115708] snd_hda_codec_via hdaudioC0D0: autoconfig for VT1708S: 
line_outs=4 (0x1c/0x19/0x22/0x23/0x0) type:line
[   15.117461] snd_hda_codec_via hdaudioC0D0:speaker_outs=0 
(0x0/0x0/0x0/0x0/0x0)
[   15.119133] snd_hda_codec_via hdaudioC0D0:hp_outs=1 
(0x1d/0x0/0x0/0x0/0x0)
[   15.120838] snd_hda_codec_via 

Bug#1006149: linux-image-5.16.0-1-686: Fails to boot on T41 Thinkpads

2022-03-07 Thread Diederik de Haas
Hi Damien,

On Sunday, 6 March 2022 23:26:03 CET Diederik de Haas wrote:
> Upstream commit 68dbbe7d5b4fde736d104cbbc9a2fce875562012 [1]
> seems potentially relevant (included in 5.16-rc1), but given ...
> 
> On Saturday, 5 March 2022 17:59:50 CET Petra R.-P. wrote:
> > The "Read log 0x00 page 0x00 failed" line has disappeared,
> 
> ... I don't know if building a new kernel with that commit reverted
> would be enough.
> 
> From the above mentioned commit message it very much seems the logic
> wrt slow drives was changed, but how exactly is 'above my pay grade'.
> The new timeout (15s) seems to work for SATA 6.0 Gbps links, but it appears
> the T41 uses PATA which I think is (quite a bit?) slower then that.

In https://bugs.debian.org/1006149 we have 2 users where the 5.16 kernel fails 
to boot, while the 5.15 kernel succeeded.
In the bug report there are a number of dmesg outputs posted which contain 
time gaps of ~ 20, 100 and even 160 seconds; i.e. more then 15 seconds.
The commit message mentions 'SATA link up 6.0 Gbps', but these users hava PATA 
links for their HDD. IIUC that means a max speed of ~600MB/s vs ~133MB/s.

As the author of the above mentioned commit, could you tell us whether it 
*could* be that your commit is causing the boot failures? Or is it completely 
irrelevant for this problem?

Cheers,
  Diederik


signature.asc
Description: This is a digitally signed message part.


[bts-link] source package src:linux

2022-03-07 Thread debian-bts-link
#
# bts-link upstream status pull for source package src:linux
# see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
# https://bts-link-team.pages.debian.net/bts-link/
#

user debian-bts-l...@lists.debian.org

# remote status report for #1006645 (http://bugs.debian.org/1006645)
# Bug title: aoe: removing aoe devices with flush (implicit in rmmod aoe) leads 
to page fault
#  * http://bugzilla.kernel.org/show_bug.cgi?id=215647
#  * remote status changed: (?) -> NEW
usertags 1006645 + status-NEW

thanks



linux-signed-amd64_5.10.92+1~bpo10+1_source.changes ACCEPTED into buster-backports->backports-policy, buster-backports

2022-03-07 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 03 Feb 2022 19:49:50 +0100
Source: linux-signed-amd64
Architecture: source
Version: 5.10.92+1~bpo10+1
Distribution: buster-backports
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Ben Hutchings 
Changes:
 linux-signed-amd64 (5.10.92+1~bpo10+1) buster-backports; urgency=medium
 .
   * Sign kernel from linux 5.10.92-1~bpo10+1
 .
   * Rebuild for buster-backports:
 - Change ABI number to 0.bpo.11
Checksums-Sha1:
 096cee7fa8bdbbb9e45a36b5f653899e24316713 9349 
linux-signed-amd64_5.10.92+1~bpo10+1.dsc
 608b187b4c8c2e6b91c9b4aaedd685eed964820b 2729412 
linux-signed-amd64_5.10.92+1~bpo10+1.tar.xz
Checksums-Sha256:
 9d7ed3ddfdab4e0f9bf88d86255eab7b38949197aac484b9b72043445722c760 9349 
linux-signed-amd64_5.10.92+1~bpo10+1.dsc
 07a224f7bbc3795903854577b2d25ed937f365b59cf4bb50882ef9138f5720c0 2729412 
linux-signed-amd64_5.10.92+1~bpo10+1.tar.xz
Files:
 8d2a1628444b4fcf439623790804853e 9349 kernel optional 
linux-signed-amd64_5.10.92+1~bpo10+1.dsc
 40849ae1adf4b1289c993a429d3a1968 2729412 kernel optional 
linux-signed-amd64_5.10.92+1~bpo10+1.tar.xz

-BEGIN PGP SIGNATURE-
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=XUkz
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



linux-signed-i386_5.10.92+1~bpo10+1_source.changes ACCEPTED into buster-backports->backports-policy, buster-backports

2022-03-07 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 03 Feb 2022 19:49:50 +0100
Source: linux-signed-i386
Architecture: source
Version: 5.10.92+1~bpo10+1
Distribution: buster-backports
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Ben Hutchings 
Changes:
 linux-signed-i386 (5.10.92+1~bpo10+1) buster-backports; urgency=medium
 .
   * Sign kernel from linux 5.10.92-1~bpo10+1
 .
   * Rebuild for buster-backports:
 - Change ABI number to 0.bpo.11
Checksums-Sha1:
 64ccc124737fe7d52130ff95b138063187b690e9 15630 
linux-signed-i386_5.10.92+1~bpo10+1.dsc
 c6b36c309e4e842c2a332198640673b9a032717a 3674528 
linux-signed-i386_5.10.92+1~bpo10+1.tar.xz
Checksums-Sha256:
 ae1b7bb0360822731949586339ffe34f6a280f4c4897d629ec267edfa6fcd763 15630 
linux-signed-i386_5.10.92+1~bpo10+1.dsc
 0556ff5ed680e0e3f25cca644347006a334d6aa037ab36cde9d076a7ed7da611 3674528 
linux-signed-i386_5.10.92+1~bpo10+1.tar.xz
Files:
 389cafc1e9c5b240dd49336b8767265e 15630 kernel optional 
linux-signed-i386_5.10.92+1~bpo10+1.dsc
 97e916af3d0f5ae40eaaeb5fa6b3ed29 3674528 kernel optional 
linux-signed-i386_5.10.92+1~bpo10+1.tar.xz

-BEGIN PGP SIGNATURE-
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=eqDR
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



linux-signed-arm64_5.10.92+1~bpo10+1_source.changes ACCEPTED into buster-backports->backports-policy, buster-backports

2022-03-07 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 03 Feb 2022 19:49:50 +0100
Source: linux-signed-arm64
Architecture: source
Version: 5.10.92+1~bpo10+1
Distribution: buster-backports
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Ben Hutchings 
Changes:
 linux-signed-arm64 (5.10.92+1~bpo10+1) buster-backports; urgency=medium
 .
   * Sign kernel from linux 5.10.92-1~bpo10+1
 .
   * Rebuild for buster-backports:
 - Change ABI number to 0.bpo.11
Checksums-Sha1:
 75c825922ddd01d85c0372036ab91f081fea9001 7948 
linux-signed-arm64_5.10.92+1~bpo10+1.dsc
 8d221b3546410f3edb06d097346b5c7d37e5b8dc 2473108 
linux-signed-arm64_5.10.92+1~bpo10+1.tar.xz
Checksums-Sha256:
 83c9200cb03949c6fcfd364de282dd0d12db263288ec34e62be8c7e593649afd 7948 
linux-signed-arm64_5.10.92+1~bpo10+1.dsc
 35c2d0eec0098f143a6c4bd9212e5122e5c15a8ffebe30ebfec94af5781acb1a 2473108 
linux-signed-arm64_5.10.92+1~bpo10+1.tar.xz
Files:
 212146c09df817a62f6481d472c38a39 7948 kernel optional 
linux-signed-arm64_5.10.92+1~bpo10+1.dsc
 ac7ef46b93b4937e03409fccb42c0f10 2473108 kernel optional 
linux-signed-arm64_5.10.92+1~bpo10+1.tar.xz

-BEGIN PGP SIGNATURE-
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=dj78
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



linux-signed-i386_5.10.92+2_source.changes ACCEPTED into proposed-updates->stable-new

2022-03-07 Thread Debian FTP Masters
Mapping stable-security to proposed-updates.

Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 28 Feb 2022 12:23:03 +0100
Source: linux-signed-i386
Architecture: source
Version: 5.10.92+2
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux-signed-i386 (5.10.92+2) bullseye-security; urgency=high
 .
   * Sign kernel from linux 5.10.92-2
 .
   * lib/iov_iter: initialize "flags" in new pipe_buffer
   * [x86] mwifiex: Fix skb_over_panic in mwifiex_usb_recv() (CVE-2021-43976)
   * [x86] drm/i915: Flush TLBs before releasing backing store (CVE-2022-0330)
   * [x86] drm/vmwgfx: Fix stale file descriptors on failed usercopy
 (CVE-2022-22942)
   * NFSv4: Handle case where the lookup of a directory fails (CVE-2022-24448)
   * yam: fix a memory leak in yam_siocdevprivate() (CVE-2022-24959)
   * tipc: improve size validations for received domain records (CVE-2022-0435)
   * [s390x] KVM: s390: Return error on SIDA memop on normal guest
 (CVE-2022-0516)
   * USB: gadget: validate interface OS descriptor requests (CVE-2022-25258)
   * usb: gadget: rndis: check size of RNDIS_MSG_SET command (CVE-2022-25375)
Checksums-Sha1:
 fe44754fa806f10219930e5978a6dedf65e10634 14257 linux-signed-i386_5.10.92+2.dsc
 ff5545834c809f3864a3083ec5f36db76c23e752 3674148 
linux-signed-i386_5.10.92+2.tar.xz
Checksums-Sha256:
 bf9ce69d52d94bd2ca1020398b21d9adff0019bc0ac3512a3557af42afd7490f 14257 
linux-signed-i386_5.10.92+2.dsc
 f3229fc491d6dae0ff00cd000e4ca9496c14dc874607c71bde5ea81d67a3ae20 3674148 
linux-signed-i386_5.10.92+2.tar.xz
Files:
 59b03e55395610db06992551db0d5438 14257 kernel optional 
linux-signed-i386_5.10.92+2.dsc
 52da4ec7aa133eee4c62dda7f10616dc 3674148 kernel optional 
linux-signed-i386_5.10.92+2.tar.xz

-BEGIN PGP SIGNATURE-
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=6usC
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



linux-signed-arm64_5.10.92+2_source.changes ACCEPTED into proposed-updates->stable-new

2022-03-07 Thread Debian FTP Masters
Mapping stable-security to proposed-updates.

Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 28 Feb 2022 12:23:03 +0100
Source: linux-signed-arm64
Architecture: source
Version: 5.10.92+2
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux-signed-arm64 (5.10.92+2) bullseye-security; urgency=high
 .
   * Sign kernel from linux 5.10.92-2
 .
   * lib/iov_iter: initialize "flags" in new pipe_buffer
   * [x86] mwifiex: Fix skb_over_panic in mwifiex_usb_recv() (CVE-2021-43976)
   * [x86] drm/i915: Flush TLBs before releasing backing store (CVE-2022-0330)
   * [x86] drm/vmwgfx: Fix stale file descriptors on failed usercopy
 (CVE-2022-22942)
   * NFSv4: Handle case where the lookup of a directory fails (CVE-2022-24448)
   * yam: fix a memory leak in yam_siocdevprivate() (CVE-2022-24959)
   * tipc: improve size validations for received domain records (CVE-2022-0435)
   * [s390x] KVM: s390: Return error on SIDA memop on normal guest
 (CVE-2022-0516)
   * USB: gadget: validate interface OS descriptor requests (CVE-2022-25258)
   * usb: gadget: rndis: check size of RNDIS_MSG_SET command (CVE-2022-25375)
Checksums-Sha1:
 f75f91029350aceab9cc1aec65a6b210ae8f56cf 7332 linux-signed-arm64_5.10.92+2.dsc
 cf0fda11f79ca10229f5d0864251940946634019 2472424 
linux-signed-arm64_5.10.92+2.tar.xz
Checksums-Sha256:
 33dca75dc77551281a4a01a803953170b31f6cf1fef43dcf2bc44e39c2ecbb8a 7332 
linux-signed-arm64_5.10.92+2.dsc
 548163ce451c03e65b49ac2b3e762a7517d0f5c52c22c29911cfa725e9987fd4 2472424 
linux-signed-arm64_5.10.92+2.tar.xz
Files:
 3b5b70e867da10cb9b5706bedee8e26c 7332 kernel optional 
linux-signed-arm64_5.10.92+2.dsc
 9e05b1abb6a087f5dc4f6d29af68 2472424 kernel optional 
linux-signed-arm64_5.10.92+2.tar.xz

-BEGIN PGP SIGNATURE-
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=8lkd
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



linux-signed-amd64_5.10.92+2_source.changes ACCEPTED into proposed-updates->stable-new

2022-03-07 Thread Debian FTP Masters
Mapping stable-security to proposed-updates.

Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 28 Feb 2022 12:23:03 +0100
Source: linux-signed-amd64
Architecture: source
Version: 5.10.92+2
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux-signed-amd64 (5.10.92+2) bullseye-security; urgency=high
 .
   * Sign kernel from linux 5.10.92-2
 .
   * lib/iov_iter: initialize "flags" in new pipe_buffer
   * [x86] mwifiex: Fix skb_over_panic in mwifiex_usb_recv() (CVE-2021-43976)
   * [x86] drm/i915: Flush TLBs before releasing backing store (CVE-2022-0330)
   * [x86] drm/vmwgfx: Fix stale file descriptors on failed usercopy
 (CVE-2022-22942)
   * NFSv4: Handle case where the lookup of a directory fails (CVE-2022-24448)
   * yam: fix a memory leak in yam_siocdevprivate() (CVE-2022-24959)
   * tipc: improve size validations for received domain records (CVE-2022-0435)
   * [s390x] KVM: s390: Return error on SIDA memop on normal guest
 (CVE-2022-0516)
   * USB: gadget: validate interface OS descriptor requests (CVE-2022-25258)
   * usb: gadget: rndis: check size of RNDIS_MSG_SET command (CVE-2022-25375)
Checksums-Sha1:
 7914ab1984daabf4ed498be8f378717f0a1a 8601 linux-signed-amd64_5.10.92+2.dsc
 ecc48df92c9c332763b8c2b522aa7001471cb861 2728484 
linux-signed-amd64_5.10.92+2.tar.xz
Checksums-Sha256:
 cc477e4400eb495d50a0cc4945adbd8278d590c140b0eea0f02a4338ac69125e 8601 
linux-signed-amd64_5.10.92+2.dsc
 62462dffc9c5b7befdaf023ff56fb9cc9a1970516bda3ed90c1f8fcb41d5bcca 2728484 
linux-signed-amd64_5.10.92+2.tar.xz
Files:
 613fc6a9a3a7e449e06b0c5b947befcd 8601 kernel optional 
linux-signed-amd64_5.10.92+2.dsc
 a107895b735873564cb6a7433f146807 2728484 kernel optional 
linux-signed-amd64_5.10.92+2.tar.xz

-BEGIN PGP SIGNATURE-
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=in02
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



linux_5.10.92-2_source.changes ACCEPTED into proposed-updates->stable-new

2022-03-07 Thread Debian FTP Masters
Mapping stable-security to proposed-updates.

Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 28 Feb 2022 12:23:03 +0100
Source: linux
Architecture: source
Version: 5.10.92-2
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux (5.10.92-2) bullseye-security; urgency=high
 .
   * lib/iov_iter: initialize "flags" in new pipe_buffer
   * [x86] mwifiex: Fix skb_over_panic in mwifiex_usb_recv() (CVE-2021-43976)
   * [x86] drm/i915: Flush TLBs before releasing backing store (CVE-2022-0330)
   * [x86] drm/vmwgfx: Fix stale file descriptors on failed usercopy
 (CVE-2022-22942)
   * NFSv4: Handle case where the lookup of a directory fails (CVE-2022-24448)
   * yam: fix a memory leak in yam_siocdevprivate() (CVE-2022-24959)
   * tipc: improve size validations for received domain records (CVE-2022-0435)
   * [s390x] KVM: s390: Return error on SIDA memop on normal guest
 (CVE-2022-0516)
   * USB: gadget: validate interface OS descriptor requests (CVE-2022-25258)
   * usb: gadget: rndis: check size of RNDIS_MSG_SET command (CVE-2022-25375)
Checksums-Sha1:
 c7f32e8cb91a3b31a28468231854a92ae55a4eea 197231 linux_5.10.92-2.dsc
 139a7341197ccf83b3eec62644b956c38b177243 3403124 linux_5.10.92-2.debian.tar.xz
 faac26d13afb444d27518fb46d4398f6e8ebc81f 6456 linux_5.10.92-2_source.buildinfo
Checksums-Sha256:
 8f7fbd051cc75a44d2f0296109fb16858f8c1e27154addc0e297f0633eda88a6 197231 
linux_5.10.92-2.dsc
 210c4701031f60ccfa5a32277ff0f9fb3c48aa6d9d6cfab9dc4991cfa287306e 3403124 
linux_5.10.92-2.debian.tar.xz
 b58c68ffd7ef9ac79ab33bb1442af7d3d4931b9ad34beee2becc03ee54d25e05 6456 
linux_5.10.92-2_source.buildinfo
Files:
 3432ef381176dad7383f750a5fba72f2 197231 kernel optional linux_5.10.92-2.dsc
 3cb8037c4cfbcdca52a572b15f549aa3 3403124 kernel optional 
linux_5.10.92-2.debian.tar.xz
 2bab3b96c25d256f09fbbc5cac34abd9 6456 kernel optional 
linux_5.10.92-2_source.buildinfo

-BEGIN PGP SIGNATURE-

iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmIcsaNfFIAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
ZWJpYW4ub3JnAAoJEAVMuPMTQ89EG3EP/0kam14NLR0GZBgkfp4Ph6R3X2UoqwLF
I3uexYrvdAIGRXr25glimOHmWt9g0FxqsEIu7d7UU2ajYqj2PE+zqXqWjx/G6H4O
ZFMt7UZ+xgHVfrP8cm64zxO+UdS84mqrwHj4Wq3aiSvWa3ss0e7fy74+KjzHdHNK
un2uNJ1d1cJKXQS/zIlttENbXAaZif+989VKBNxH7LcID48ikB20WzCym+JK/rWw
7iJB+fGdpcpBbxGFZay2o6SjrzFkg5zf6NiGEDTx71XYshw19v7FE7v2B4vvK1SH
a4aZ0lYmP5uFJIH8eNvN4e15ENELO95Jxo3nwLd+fcEoAPzybLn1mIxKEgvNUxxK
qW/Ba965pd/RTaOnlcxh3NKwh8DmtSkniWnTIqWQfJPFBVRS09ArFQtAYrkSDZ0V
+hjeBg+5xczayTunluLzWCglodyKLjuLAN5KoqLnthEPMjmpaszkbw8eYe7uym1J
6V3LOTHwMab9UI+InPiFHmwFX6viEfVBZjpnh7C2QlJoILL8YznTl43KKn4i7jvf
qg+yb0N84eyC+rr/BXx7ip9sqADhG3NllPE0TYlffNRoGoCyLThYSiDoPSgnIoYy
XJMxkAw3FZmGyQ0cuZPVJZt1upy91w3680lCaVbUSG/1D+jzK2TVTjDK0kbVyhCo
1c0mvylJtJRE
=RZjR
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



linux_5.16.11-1~bpo11+1_source.changes ACCEPTED into bullseye-backports, bullseye-backports

2022-03-07 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 02 Mar 2022 22:26:09 +0100
Source: linux
Architecture: source
Version: 5.16.11-1~bpo11+1
Distribution: bullseye-backports
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Ben Hutchings 
Closes: 890343 947179 983757 988044 997907 998835 1001080 1001083 1001731 
1002460 1002706 1004095 1004495 1005141 1005884 1006275
Changes:
 linux (5.16.11-1~bpo11+1) bullseye-backports; urgency=medium
 .
   * Rebuild for bullseye-backports:
 - Change ABI number to 0.bpo.3
 .
 linux (5.16.11-1) unstable; urgency=medium
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.11
 - drm/nouveau/pmu/gm200-: use alternate falcon reset sequence
 - HID:Add support for UGTABLET WP5540
 - [x86] Revert "svm: Add warning message for AVIC IPI invalid target"
 - mmc: block: fix read single on recovery logic
 - mm: don't try to NUMA-migrate COW pages that have other uses
 - [amd64] HID: amd_sfh: Add illuminance mask to limit ALS max value
 - [amd64] HID: amd_sfh: Increase sensor command timeout
 - [amd64] HID: amd_sfh: Correct the structure field name
 - [amd64] PCI: hv: Fix NUMA node assignment when kernel boots with custom
   NUMA topology
 - HID: apple: Set the tilde quirk flag on the Wellspring 5 and later
 - btrfs: don't hold CPU for too long when defragging a file
 - btrfs: send: in case of IO error log it
 - btrfs: defrag: don't try to defrag extents which are under writeback
 - [amd64] platform/x86: amd-pmc: Correct usage of SMU version
 - net: ieee802154: at86rf230: Stop leaking skb's
 - ax25: improve the incomplete fix to avoid UAF and NPD bugs
 - cifs: unlock chan_lock before calling cifs_put_tcp_session
 - vfs: make freeze_super abort when sync_filesystem returns error
 - vfs: make sync_filesystem return errors from ->sync_fs
 - quota: make dquot_quota_sync return errors from ->sync_fs
 - scsi: pm80xx: Fix double completion for SATA devices
 - scsi: core: Reallocate device's budget map on queue depth change
 - scsi: pm8001: Fix use-after-free for aborted TMF sas_task
 - scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task
 - drm/amd: Warn users about potential s0ix problems
 - nvme: fix a possible use-after-free in controller reset during load
 - nvme-tcp: fix possible use-after-free in transport error_recovery work
 - nvme-rdma: fix possible use-after-free in transport error_recovery work
 - drm/amd: add support to check whether the system is set to s3
 - drm/amd: Only run s3 or s0ix if system is configured properly
 - drm/amdgpu: fix logic inversion in check
 - [amd64] x86/Xen: streamline (and fix) PV CPU enumeration
 - Revert "module, async: async_synchronize_full() on module init iff async
   is used"
 - random: wake up /dev/random writers after zap
 - [x86] KVM: x86/xen: Fix runstate updates to be atomic when preempting 
vCPU
 - [x86] KVM: x86: nSVM/nVMX: set nested_run_pending on VM entry which is a
   result of RSM
 - [x86] KVM: x86: SVM: don't passthrough SMAP/SMEP/PKE bits in !NPT &&
   !gCR0.PG case
 - [x86] KVM: x86: nSVM: fix potential NULL derefernce on nested migration
 - [x86] KVM: x86: nSVM: mark vmcb01 as dirty when restoring SMM saved state
 - iwlwifi: remove deprecated broadcast filtering feature
 - iwlwifi: fix use-after-free (Closes: #1005884)
 - drm/radeon: Fix backlight control on iMac 12,1
 - drm/atomic: Don't pollute crtc_state->mode_blob with error pointers
 - drm/amdgpu: skipping SDMA hw_init and hw_fini for S0ix.
 - [x86] drm/i915/opregion: check port number bounds for SWSCI display power
   state
 - [x86] drm/i915: Fix dbuf slice config lookup
 - [x86] drm/i915: Fix mbus join config lookup
 - vsock: remove vsock from connected table when connect is interrupted by a
   signal
 - [arm64] tee: export teedev_open() and teedev_close_context()
 - [arm64] optee: use driver internal tee_context for some rpc
 - [arm*] drm/cma-helper: Set VM_DONTEXPAND for mmap
 - [x86] drm/i915/gvt: Make DRM_I915_GVT depend on X86
 - [x86] drm/i915/ttm: tweak priority hint selection
 - iwlwifi: pcie: fix locking when "HW not ready"
 - iwlwifi: pcie: gen2: fix locking when "HW not ready"
 - iwlwifi: mvm: fix condition which checks the version of rate_n_flags
 - iwlwifi: fix iwl_legacy_rate_to_fw_idx
 - iwlwifi: mvm: don't send SAR GEO command for 3160 devices
 - netfilter: nft_synproxy: unregister hooks on init error path
 - ipv4: fix data races in fib_alias_hw_flags_set
 - ipv6: fix data-race in fib6_info_hw_flags_set / fib6_purge_rt
 - ipv6: mcast: use rcu-safe version of ipv6_get_lladdr()
 - ipv6: per-netns exclusive flowlabel checks
 - Revert "net: ethernet: bgmac: Use 

Translation Services with Minimal Expenses

2022-03-07 Thread Preety Ahuja
Respected Sir/Ma’am,



I would like to introduce a *Translation Company* that specializes in the
providing *Translation, **Interpretation* (Language Translator on
contract/permanent
basis) and *Web/Soft/App. Localization* *services* since last 19 years.



The company is a pioneer in the fields of translation and interpretation
across the globe. It has on board a number of specialized translators and
interpreters who are specialized in different languages and areas.



Some reputed Clients: *TCS, Global Sign, BHEL**, **Interglobe Technologies,
Schneider Electric** and **NISC Export Services*



*I would be highly g**lad** if you consider us for providing **any of the
above** service**s.*



Kind Regards,

Preety Ahuja

Dept. (Tr & In)