linux-signed-arm64_6.1.66+1_source.changes is NEW
Mapping bookworm-proposed-updates to proposed-updates. binary:ata-modules-6.1.0-15-arm64-di is NEW. binary:btrfs-modules-6.1.0-15-arm64-di is NEW. binary:cdrom-core-modules-6.1.0-15-arm64-di is NEW. binary:crc-modules-6.1.0-15-arm64-di is NEW. binary:crypto-dm-modules-6.1.0-15-arm64-di is NEW. binary:crypto-modules-6.1.0-15-arm64-di is NEW. binary:efi-modules-6.1.0-15-arm64-di is NEW. binary:event-modules-6.1.0-15-arm64-di is NEW. binary:ext4-modules-6.1.0-15-arm64-di is NEW. binary:f2fs-modules-6.1.0-15-arm64-di is NEW. binary:fat-modules-6.1.0-15-arm64-di is NEW. binary:fb-modules-6.1.0-15-arm64-di is NEW. binary:fuse-modules-6.1.0-15-arm64-di is NEW. binary:i2c-modules-6.1.0-15-arm64-di is NEW. binary:input-modules-6.1.0-15-arm64-di is NEW. binary:isofs-modules-6.1.0-15-arm64-di is NEW. binary:jfs-modules-6.1.0-15-arm64-di is NEW. binary:kernel-image-6.1.0-15-arm64-di is NEW. binary:leds-modules-6.1.0-15-arm64-di is NEW. binary:linux-image-6.1.0-15-arm64 is NEW. binary:linux-image-6.1.0-15-cloud-arm64 is NEW. binary:linux-image-6.1.0-15-rt-arm64 is NEW. binary:loop-modules-6.1.0-15-arm64-di is NEW. binary:md-modules-6.1.0-15-arm64-di is NEW. binary:mmc-modules-6.1.0-15-arm64-di is NEW. binary:mtd-core-modules-6.1.0-15-arm64-di is NEW. binary:multipath-modules-6.1.0-15-arm64-di is NEW. binary:nbd-modules-6.1.0-15-arm64-di is NEW. binary:nic-modules-6.1.0-15-arm64-di is NEW. binary:nic-shared-modules-6.1.0-15-arm64-di is NEW. binary:nic-usb-modules-6.1.0-15-arm64-di is NEW. binary:nic-wireless-modules-6.1.0-15-arm64-di is NEW. binary:ppp-modules-6.1.0-15-arm64-di is NEW. binary:sata-modules-6.1.0-15-arm64-di is NEW. binary:scsi-core-modules-6.1.0-15-arm64-di is NEW. binary:scsi-modules-6.1.0-15-arm64-di is NEW. binary:scsi-nic-modules-6.1.0-15-arm64-di is NEW. binary:sound-modules-6.1.0-15-arm64-di is NEW. binary:speakup-modules-6.1.0-15-arm64-di is NEW. binary:squashfs-modules-6.1.0-15-arm64-di is NEW. binary:udf-modules-6.1.0-15-arm64-di is NEW. binary:uinput-modules-6.1.0-15-arm64-di is NEW. binary:usb-modules-6.1.0-15-arm64-di is NEW. binary:usb-serial-modules-6.1.0-15-arm64-di is NEW. binary:usb-storage-modules-6.1.0-15-arm64-di is NEW. binary:xfs-modules-6.1.0-15-arm64-di is NEW. Your package has been put into the NEW queue, which requires manual action from the ftpteam to process. The upload was otherwise valid (it had a good OpenPGP signature and file hashes are valid), so please be patient. Packages are routinely processed through to the archive, and do feel free to browse the NEW queue[1]. If there is an issue with the upload, you will receive an email from a member of the ftpteam. If you have any questions, you may reply to this email. [1]: https://ftp-master.debian.org/new.html or https://ftp-master.debian.org/backports-new.html for *-backports
Processing of linux-signed-arm64_6.1.66+1_source.changes
linux-signed-arm64_6.1.66+1_source.changes uploaded successfully to localhost along with the files: linux-signed-arm64_6.1.66+1.dsc linux-signed-arm64_6.1.66+1.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)
linux-signed-amd64_6.1.66+1_source.changes is NEW
Mapping bookworm-proposed-updates to proposed-updates. binary:acpi-modules-6.1.0-15-amd64-di is NEW. binary:ata-modules-6.1.0-15-amd64-di is NEW. binary:btrfs-modules-6.1.0-15-amd64-di is NEW. binary:cdrom-core-modules-6.1.0-15-amd64-di is NEW. binary:crc-modules-6.1.0-15-amd64-di is NEW. binary:crypto-dm-modules-6.1.0-15-amd64-di is NEW. binary:crypto-modules-6.1.0-15-amd64-di is NEW. binary:efi-modules-6.1.0-15-amd64-di is NEW. binary:event-modules-6.1.0-15-amd64-di is NEW. binary:ext4-modules-6.1.0-15-amd64-di is NEW. binary:f2fs-modules-6.1.0-15-amd64-di is NEW. binary:fat-modules-6.1.0-15-amd64-di is NEW. binary:fb-modules-6.1.0-15-amd64-di is NEW. binary:firewire-core-modules-6.1.0-15-amd64-di is NEW. binary:fuse-modules-6.1.0-15-amd64-di is NEW. binary:i2c-modules-6.1.0-15-amd64-di is NEW. binary:input-modules-6.1.0-15-amd64-di is NEW. binary:isofs-modules-6.1.0-15-amd64-di is NEW. binary:jfs-modules-6.1.0-15-amd64-di is NEW. binary:kernel-image-6.1.0-15-amd64-di is NEW. binary:linux-image-6.1.0-15-amd64 is NEW. binary:linux-image-6.1.0-15-cloud-amd64 is NEW. binary:linux-image-6.1.0-15-rt-amd64 is NEW. binary:loop-modules-6.1.0-15-amd64-di is NEW. binary:md-modules-6.1.0-15-amd64-di is NEW. binary:mmc-core-modules-6.1.0-15-amd64-di is NEW. binary:mmc-modules-6.1.0-15-amd64-di is NEW. binary:mouse-modules-6.1.0-15-amd64-di is NEW. binary:mtd-core-modules-6.1.0-15-amd64-di is NEW. binary:multipath-modules-6.1.0-15-amd64-di is NEW. binary:nbd-modules-6.1.0-15-amd64-di is NEW. binary:nic-modules-6.1.0-15-amd64-di is NEW. binary:nic-pcmcia-modules-6.1.0-15-amd64-di is NEW. binary:nic-shared-modules-6.1.0-15-amd64-di is NEW. binary:nic-usb-modules-6.1.0-15-amd64-di is NEW. binary:nic-wireless-modules-6.1.0-15-amd64-di is NEW. binary:pata-modules-6.1.0-15-amd64-di is NEW. binary:pcmcia-modules-6.1.0-15-amd64-di is NEW. binary:pcmcia-storage-modules-6.1.0-15-amd64-di is NEW. binary:ppp-modules-6.1.0-15-amd64-di is NEW. binary:rfkill-modules-6.1.0-15-amd64-di is NEW. binary:sata-modules-6.1.0-15-amd64-di is NEW. binary:scsi-core-modules-6.1.0-15-amd64-di is NEW. binary:scsi-modules-6.1.0-15-amd64-di is NEW. binary:scsi-nic-modules-6.1.0-15-amd64-di is NEW. binary:serial-modules-6.1.0-15-amd64-di is NEW. binary:sound-modules-6.1.0-15-amd64-di is NEW. binary:speakup-modules-6.1.0-15-amd64-di is NEW. binary:squashfs-modules-6.1.0-15-amd64-di is NEW. binary:udf-modules-6.1.0-15-amd64-di is NEW. binary:uinput-modules-6.1.0-15-amd64-di is NEW. binary:usb-modules-6.1.0-15-amd64-di is NEW. binary:usb-serial-modules-6.1.0-15-amd64-di is NEW. binary:usb-storage-modules-6.1.0-15-amd64-di is NEW. binary:xfs-modules-6.1.0-15-amd64-di is NEW. Your package has been put into the NEW queue, which requires manual action from the ftpteam to process. The upload was otherwise valid (it had a good OpenPGP signature and file hashes are valid), so please be patient. Packages are routinely processed through to the archive, and do feel free to browse the NEW queue[1]. If there is an issue with the upload, you will receive an email from a member of the ftpteam. If you have any questions, you may reply to this email. [1]: https://ftp-master.debian.org/new.html or https://ftp-master.debian.org/backports-new.html for *-backports
Processing of linux-signed-amd64_6.1.66+1_source.changes
linux-signed-amd64_6.1.66+1_source.changes uploaded successfully to localhost along with the files: linux-signed-amd64_6.1.66+1.dsc linux-signed-amd64_6.1.66+1.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)
Re: No longer sign i386 kernels
On Wed, Dec 06, 2023 at 09:09:01PM +, Steve McIntyre wrote: > We should publicise this for users and be consistent for all the EFI > signed binaries - there's no point in signing i386 grub and fwupd or > having a signed shim if we don't have a signed kernel. > Agreed? Signing of i386 kernels is gone. https://salsa.debian.org/kernel-team/linux/-/merge_requests/944 Bastian -- Suffocating together ... would create heroic camaraderie. -- Khan Noonian Singh, "Space Seed", stardate 3142.8
linux_6.1.66-1_source.changes ACCEPTED into proposed-updates
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 09 Dec 2023 16:48:39 +0100 Source: linux Architecture: source Version: 6.1.66-1 Distribution: bookworm Urgency: medium Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Closes: 1032104 1057790 1057843 Changes: linux (6.1.66-1) bookworm; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.65 - afs: Fix afs_server_list to be cleaned up with RCU - afs: Make error on cell lookup failure consistent with OpenAFS - [arm64,armhf] drm/panel: simple: Fix Innolux G101ICE-L01 bus flags - [arm64,armhf] drm/panel: simple: Fix Innolux G101ICE-L01 timings - wireguard: use DEV_STATS_INC() - ata: pata_isapnp: Add missing error check for devm_ioport_map() - [x86] drm/i915: do not clean GT table on error path - [arm64,armhf] drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full - HID: fix HID device resource race between HID core and debugging support - ipv4: Correct/silence an endian warning in __ip_do_redirect - net: usb: ax88179_178a: fix failed operations during ax88179_reset - net/smc: avoid data corruption caused by decline - [armhf] arm/xen: fix xen_vcpu_info allocation alignment - [amd64,arm64] amd-xgbe: handle corner-case during sfp hotplug - [amd64,arm64] amd-xgbe: handle the corner-case during tx completion - [amd64,arm64] amd-xgbe: propagate the correct speed and duplex status - afs: Return ENOENT if no cell DNS record can be found - afs: Fix file locking on R/O volumes to operate in local mode - mm,kfence: decouple kfence from page granularity mapping judgement - i40e: use ERR_PTR error print in i40e messages - i40e: Fix adding unsupported cloud filters - [arm64] USB: dwc3: qcom: fix resource leaks on probe deferral - [arm64] USB: dwc3: qcom: fix ACPI platform device leak - lockdep: Fix block chain corruption - cifs: minor cleanup of some headers - smb3: allow dumping session and tcon id to improve stats analysis and debugging - cifs: print last update time for interface list - cifs: distribute channels across interfaces based on speed - cifs: account for primary channel in the interface list - cifs: fix leak of iface for primary channel - ext4: add a new helper to check if es must be kept - ext4: factor out __es_alloc_extent() and __es_free_extent() - ext4: use pre-allocated es in __es_insert_extent() - ext4: use pre-allocated es in __es_remove_extent() - ext4: using nofail preallocation in ext4_es_remove_extent() - ext4: using nofail preallocation in ext4_es_insert_delayed_block() - ext4: using nofail preallocation in ext4_es_insert_extent() - ext4: fix slab-use-after-free in ext4_es_insert_extent() - ext4: make sure allocate pending entry not fail - NFSD: Fix "start of NFS reply" pointer passed to nfsd_cache_update() - NFSD: Fix checksum mismatches in the duplicate reply cache - ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA - swiotlb-xen: provide the "max_mapping_size" method - bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() - md: fix bi_status reporting in md_end_clone_io - bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race - io_uring/fs: consider link->flags when getting path for LINKAT - [s390x] dasd: protect device queue against concurrent access - USB: serial: option: add Luat Air72*U series products - hv_netvsc: fix race of netvsc and VF register_netdevice - hv_netvsc: Fix race of register_netdevice_notifier and VF register - hv_netvsc: Mark VF as slave before exposing it to user-mode - dm-delay: fix a race between delay_presuspend and delay_bio - bcache: check return value from btree_node_alloc_replacement() - bcache: prevent potential division by zero error - bcache: fixup init dirty data errors - bcache: fixup lock c->root error - USB: serial: option: add Fibocom L7xx modules - USB: serial: option: fix FM101R-GL defines - USB: serial: option: don't claim interface 4 for ZTE MF290 - usb: typec: tcpm: Skip hard reset when in error recovery - [arm64,armhf] USB: dwc2: write HCINT with INTMASK applied - [arm64,armhf] usb: dwc3: Fix default mode initialization - [arm64,armhf] usb: dwc3: set the dma max_seg_size - [arm64] USB: dwc3: qcom: fix software node leak on probe errors - [arm64] USB: dwc3: qcom: fix wakeup after probe deferral - io_uring: fix off-by one bvec index https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.66 - cifs: Fix FALLOC_FL_ZERO_RANGE by setting i_size if EOF moved - cifs: Fix FALLOC_FL_INSERT_RANGE by setting i_size after EOF moved
Bug#1057843: marked as done (linux: ext4 data corruption in 6.1.64-1)
Your message dated Sat, 09 Dec 2023 17:56:32 + with message-id and subject line Bug#1057843: fixed in linux 6.1.66-1 has caused the Debian Bug report #1057843, regarding linux: ext4 data corruption in 6.1.64-1 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1057843: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: linux Version: 6.1.64-1 Severity: grave Tags: upstream Justification: causes non-serious data loss X-Debbugs-Cc: debian-rele...@lists.debian.org, car...@debian.org, a...@debian.org Hi I'm filling this for visibility. There might be a ext4 data corruption issue with the kernel released in the 12.3 bookworm point release (which is addressed in 6.1.66 upstream already). The report about the regression and some details: https://lore.kernel.org/stable/20231205122122.dfhhoaswsfscuhc3@quack3/ Regards, Salvatore --- End Message --- --- Begin Message --- Source: linux Source-Version: 6.1.66-1 Done: Salvatore Bonaccorso We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1057...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 09 Dec 2023 16:48:39 +0100 Source: linux Architecture: source Version: 6.1.66-1 Distribution: bookworm Urgency: medium Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Closes: 1032104 1057790 1057843 Changes: linux (6.1.66-1) bookworm; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.65 - afs: Fix afs_server_list to be cleaned up with RCU - afs: Make error on cell lookup failure consistent with OpenAFS - [arm64,armhf] drm/panel: simple: Fix Innolux G101ICE-L01 bus flags - [arm64,armhf] drm/panel: simple: Fix Innolux G101ICE-L01 timings - wireguard: use DEV_STATS_INC() - ata: pata_isapnp: Add missing error check for devm_ioport_map() - [x86] drm/i915: do not clean GT table on error path - [arm64,armhf] drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full - HID: fix HID device resource race between HID core and debugging support - ipv4: Correct/silence an endian warning in __ip_do_redirect - net: usb: ax88179_178a: fix failed operations during ax88179_reset - net/smc: avoid data corruption caused by decline - [armhf] arm/xen: fix xen_vcpu_info allocation alignment - [amd64,arm64] amd-xgbe: handle corner-case during sfp hotplug - [amd64,arm64] amd-xgbe: handle the corner-case during tx completion - [amd64,arm64] amd-xgbe: propagate the correct speed and duplex status - afs: Return ENOENT if no cell DNS record can be found - afs: Fix file locking on R/O volumes to operate in local mode - mm,kfence: decouple kfence from page granularity mapping judgement - i40e: use ERR_PTR error print in i40e messages - i40e: Fix adding unsupported cloud filters - [arm64] USB: dwc3: qcom: fix resource leaks on probe deferral - [arm64] USB: dwc3: qcom: fix ACPI platform device leak - lockdep: Fix block chain corruption - cifs: minor cleanup of some headers - smb3: allow dumping session and tcon id to improve stats analysis and debugging - cifs: print last update time for interface list - cifs: distribute channels across interfaces based on speed - cifs: account for primary channel in the interface list - cifs: fix leak of iface for primary channel - ext4: add a new helper to check if es must be kept - ext4: factor out __es_alloc_extent() and __es_free_extent() - ext4: use pre-allocated es in __es_insert_extent() - ext4: use pre-allocated es in __es_remove_extent() - ext4: using nofail preallocation in ext4_es_remove_extent() - ext4: using nofail preallocation in ext4_es_insert_delayed_block() - ext4: using nofail preallocation in
Bug#1057790: marked as done (linux-image-6.5.0-5-amd64: deadlock on RTL8125 in jumbo mtu mode)
Your message dated Sat, 09 Dec 2023 17:56:32 + with message-id and subject line Bug#1057790: fixed in linux 6.1.66-1 has caused the Debian Bug report #1057790, regarding linux-image-6.5.0-5-amd64: deadlock on RTL8125 in jumbo mtu mode to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1057790: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057790 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: linux-image-6.5.0-5-amd64 Version: linux-image-6.5.0-5-amd64 Severity: important Dear Maintainer, My RTL8125 NIC stoped working after upgrading the kernel (linux-image-amd64) from version 6.5.10+1 to 6.5.13+1. More specifically, the previous kernel that this meta package depends on (package linux-image-6.5.0-4-amd64) worked fine; but the new dependency (linux-image-6.5.0-5-amd64) causes my NIC to stop working. I found this upstream bug report: https://bugzilla.kernel.org/show_bug.cgi?id=218187 And I can confirm that I'm also using a jumbo MTU (9000 bytes). The issue has been fixed in kernel 6.6.5: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/drivers/net/ethernet/realtek?h=v6.6.5=a9ef897677f957401842e45f2006167cdf757ee4 But I'm not sure if kernel 6.5.x will still receive a fix, as it's EOL. I added below two snippets from the syslog, illustrating the issue. Cheers, Timo --- NIC working correctly with kernel version 6.5.10 (Debian linux-image-6.5.0-4-amd64): kernel: [0.00] Linux version 6.5.0-4-amd64 (debian-kernel@lists.debian.org) (gcc-13 (Debian 13.2.0-6) 13.2.0, GNU ld (GNU Binutils for Debian) 2.41) #1 SMP PREEMPT_DYNAMIC Debian 6.5.10-1 (2023-11-03) (...) kernel: [0.664766] r8169 :01:00.0: enabling device ( -> 0003) kernel: [0.664885] r8169 :01:00.0: can't disable ASPM; OS doesn't have ASPM control kernel: [0.684835] r8169 :01:00.0 eth0: RTL8125A, 00:8e:25:70:01:42, XID 609, IRQ 126 kernel: [0.684838] r8169 :01:00.0 eth0: jumbo features [frames: 9194 bytes, tx checksumming: ko] kernel: [0.687592] r8169 :01:00.0 lan1: renamed from eth0 kernel: [7.581712] r8169 :01:00.0: firmware: direct-loading firmware rtl_nic/rtl8125a-3.fw kernel: [7.607571] RTL8226 2.5Gbps PHY r8169-0-100:00: attached PHY driver (mii_bus:phy_addr=r8169-0-100:00, irq=MAC) kernel: [7.767905] r8169 :01:00.0 lan1: Link is Down kernel: [ 10.175613] r8169 :01:00.0 lan1: Link is Up - 2.5Gbps/Full - flow control off NIC stops working with kernel version 6.5.13 (Debian linux-image-6.5.0-5-amd64): kernel: [0.00] Linux version 6.5.0-5-amd64 (debian-kernel@lists.debian.org) (gcc-13 (Debian 13.2.0-7) 13.2.0, GNU ld (GNU Binutils for Debian) 2.41) #1 SMP PREEMPT_DYNAMIC Debian 6.5.13-1 (2023-11-29) (...) kernel: [0.683111] r8169 :01:00.0: enabling device ( -> 0003) kernel: [0.683212] r8169 :01:00.0: can't disable ASPM; OS doesn't have ASPM control kernel: [0.701390] r8169 :01:00.0 eth0: RTL8125A, 00:8e:25:70:01:42, XID 609, IRQ 125 kernel: [0.701392] r8169 :01:00.0 eth0: jumbo features [frames: 9194 bytes, tx checksumming: ko] kernel: [0.704404] r8169 :01:00.0 lan1: renamed from eth0 kernel: [7.473392] r8169 :01:00.0: firmware: direct-loading firmware rtl_nic/rtl8125a-3.fw kernel: [7.499525] RTL8226 2.5Gbps PHY r8169-0-100:00: attached PHY driver (mii_bus:phy_addr=r8169-0-100:00, irq=MAC) kernel: [ 242.686979] rtl_reset_work+0x1bd/0x3b0 [r8169] kernel: [ 242.687002] r8169_phylink_handler+0x5b/0x240 [r8169] kernel: [ 363.528597] rtl_reset_work+0x1bd/0x3b0 [r8169] kernel: [ 363.528620] r8169_phylink_handler+0x5b/0x240 [r8169] kernel: [ 484.363011] rtl_reset_work+0x1bd/0x3b0 [r8169] kernel: [ 484.363034] r8169_phylink_handler+0x5b/0x240 [r8169] kernel: [ 605.190516] rtl_reset_work+0x1bd/0x3b0 [r8169] kernel: [ 605.190538] r8169_phylink_handler+0x5b/0x240 [r8169] kernel: [ 726.019534] rtl_reset_work+0x1bd/0x3b0 [r8169] kernel: [ 726.019556] r8169_phylink_handler+0x5b/0x240 [r8169] kernel: [ 846.848552] rtl_reset_work+0x1bd/0x3b0 [r8169] kernel: [ 846.848576] r8169_phylink_handler+0x5b/0x240 [r8169] kernel: [ 967.677539] rtl_reset_work+0x1bd/0x3b0 [r8169] kernel: [ 967.677562] r8169_phylink_handler+0x5b/0x240 [r8169] kernel: [ 1088.506682] rtl_reset_work+0x1bd/0x3b0 [r8169] kernel: [ 1088.506705] r8169_phylink_handler+0x5b/0x240
Bug#1032104: marked as done (linux: ppc64el iouring corrupted read)
Your message dated Sat, 09 Dec 2023 17:56:32 + with message-id and subject line Bug#1032104: fixed in linux 6.1.66-1 has caused the Debian Bug report #1032104, regarding linux: ppc64el iouring corrupted read to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1032104: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032104 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: linux Version: 5.10.0-21-powerpc64le Severity: grave Justification: causes non-serious data loss X-Debbugs-Cc: dan...@mariadb.org Dear Maintainer, *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? * What exactly did you do (or not do) that was effective (or ineffective)? * What was the outcome of this action? * What outcome did you expect instead? *** End of the template - remove these template lines *** >From https://jira.mariadb.org/browse/MDEV-30728 MariaDB's mtr tests on a number of specific tests depend on the correct kernel operation. As observed in these tests, there is a ~1/5 chance the encryption.innodb_encryption test will read zeros on the later part of the 16k pages that InnoDB uses by default. This affects MariaDB-10.6+ packages where there is a liburing in the distribution. This has been observed in the CI of Debian (https://ci.debian.net/packages/m/mariadb/testing/ppc64el/) and upstreams https://buildbot.mariadb.org/#/builders/318. The one ppc64le worker that has the Debian 5.10.0-21 kernel, the same as the Debian CI, has the prefix ppc64le-db-bbw1-*. Test faults occur on all MariaDB 10.6+ builds in containers on this kernel. There a no faults on non-ppc64le or RHEL7/8 based ppc64le kernels. To reproduce: apt-get install mariadb-test cd /usr/share/mysql/mysql-test ./mtr --mysqld=--innodb-flush-method=fsync --mysqld=--innodb-use-native-aio=1 --vardir=/var/lib/mysql --force encryption.innodb_encryption,innodb,undo0 --repeat=12 A test will frequenty fail. 2023-02-28 1:41:01 0 [ERROR] InnoDB: Database page corruption on disk or a failed read of file './ibdata1' page [page id: space=0, page number=282]. You may have to recover from a backup. (the page number isn't predictable) The complete mtr error log of mariadb server is $PWD/var/log/mysqld.1.err I tested on tmpfs. This is a different fault from bug #1020831 as: * there is no iouring error, just a bunch of zeros where data was expected. * this is ppc64le only. Note, more serious faults exist on overlayfs (MDEV-28751) and remote filesystems so sticking to local xfs, ext4, btrfs is recommended. -- System Information: Debian Release: bullseye APT prefers jammy-updates APT policy: (500, 'jammy-updates'), (500, 'jammy-security'), (500, 'jammy'), (100, 'jammy-backports') Architecture: ppc64el (ppc64le) Kernel: Linux 5.10.0-21-powerpc64le (SMP w/128 CPU threads) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: unable to detect --- End Message --- --- Begin Message --- Source: linux Source-Version: 6.1.66-1 Done: Salvatore Bonaccorso We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1032...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 09 Dec 2023 16:48:39 +0100 Source: linux Architecture: source Version: 6.1.66-1 Distribution: bookworm Urgency: medium Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Closes: 1032104 1057790 1057843 Changes: linux (6.1.66-1) bookworm; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.65 - afs: Fix afs_server_list to be cleaned up with RCU - afs: Make error on cell lookup failure consistent with OpenAFS - [arm64,armhf] drm/panel: simple: Fix Innolux G101ICE-L01 bus flags - [arm64,armhf] drm/panel: simple: Fix Innolux G101ICE-L01 timings - wireguard: use
Bug#1052304: Debian 6.1 Kernels suspect
On 2023-12-08 15:59, Diederik de Haas wrote: On Saturday, 9 December 2023 00:28:50 CET Jeffrey Altman wrote: The bug is considered valid by upstream. A proposed fix for this issue is being reviewed. http://lists.infradead.org/pipermail/linux-afs/2023-December/007408.html Please leave this issue open until the fix has been back ported into the kernels shipped by Debian. https://kernel-team.pages.debian.net/kernel-handbook/ch-common-tasks.html#id-1.6.6.4 describes a simple procedure with which one can test patches. I've attached the above referenced patch and verified that it applies (cleanly) onto a 6.1 kernel. Bill: can you test this patch and see if it resolved the issue? Yes, I can test it. Mostly likely I will not get to doing that until Sunday night here in California. For sure Monday morning at the latest. Bill -- My heart is warm with the friends I make, And better friends I'll not be knowing, Yet there isn't a train I wouldn't take, No matter where it's going. Edna St Vincent Millay
linux_6.1.66-1_source.changes is NEW
Mapping bookworm to stable. Mapping stable to proposed-updates. binary:affs-modules-6.1.0-15-4kc-malta-di is NEW. binary:affs-modules-6.1.0-15-5kc-malta-di is NEW. binary:affs-modules-6.1.0-15-loongson-3-di is NEW. binary:affs-modules-6.1.0-15-mips32r2el-di is NEW. binary:affs-modules-6.1.0-15-mips64r2el-di is NEW. binary:affs-modules-6.1.0-15-octeon-di is NEW. binary:ata-modules-6.1.0-15-4kc-malta-di is NEW. binary:ata-modules-6.1.0-15-5kc-malta-di is NEW. binary:ata-modules-6.1.0-15-armmp-di is NEW. binary:ata-modules-6.1.0-15-loongson-3-di is NEW. binary:ata-modules-6.1.0-15-mips32r2el-di is NEW. binary:ata-modules-6.1.0-15-mips64r2el-di is NEW. binary:ata-modules-6.1.0-15-octeon-di is NEW. binary:ata-modules-6.1.0-15-powerpc64le-di is NEW. binary:btrfs-modules-6.1.0-15-4kc-malta-di is NEW. binary:btrfs-modules-6.1.0-15-5kc-malta-di is NEW. binary:btrfs-modules-6.1.0-15-armmp-di is NEW. binary:btrfs-modules-6.1.0-15-loongson-3-di is NEW. binary:btrfs-modules-6.1.0-15-marvell-di is NEW. binary:btrfs-modules-6.1.0-15-mips32r2el-di is NEW. binary:btrfs-modules-6.1.0-15-mips64r2el-di is NEW. binary:btrfs-modules-6.1.0-15-octeon-di is NEW. binary:btrfs-modules-6.1.0-15-powerpc64le-di is NEW. binary:btrfs-modules-6.1.0-15-s390x-di is NEW. binary:cdrom-core-modules-6.1.0-15-4kc-malta-di is NEW. binary:cdrom-core-modules-6.1.0-15-5kc-malta-di is NEW. binary:cdrom-core-modules-6.1.0-15-armmp-di is NEW. binary:cdrom-core-modules-6.1.0-15-loongson-3-di is NEW. binary:cdrom-core-modules-6.1.0-15-marvell-di is NEW. binary:cdrom-core-modules-6.1.0-15-mips32r2el-di is NEW. binary:cdrom-core-modules-6.1.0-15-mips64r2el-di is NEW. binary:cdrom-core-modules-6.1.0-15-octeon-di is NEW. binary:cdrom-core-modules-6.1.0-15-powerpc64le-di is NEW. binary:cdrom-core-modules-6.1.0-15-s390x-di is NEW. binary:crc-modules-6.1.0-15-4kc-malta-di is NEW. binary:crc-modules-6.1.0-15-5kc-malta-di is NEW. binary:crc-modules-6.1.0-15-armmp-di is NEW. binary:crc-modules-6.1.0-15-loongson-3-di is NEW. binary:crc-modules-6.1.0-15-marvell-di is NEW. binary:crc-modules-6.1.0-15-mips32r2el-di is NEW. binary:crc-modules-6.1.0-15-mips64r2el-di is NEW. binary:crc-modules-6.1.0-15-octeon-di is NEW. binary:crc-modules-6.1.0-15-powerpc64le-di is NEW. binary:crc-modules-6.1.0-15-s390x-di is NEW. binary:crypto-dm-modules-6.1.0-15-4kc-malta-di is NEW. binary:crypto-dm-modules-6.1.0-15-5kc-malta-di is NEW. binary:crypto-dm-modules-6.1.0-15-armmp-di is NEW. binary:crypto-dm-modules-6.1.0-15-loongson-3-di is NEW. binary:crypto-dm-modules-6.1.0-15-marvell-di is NEW. binary:crypto-dm-modules-6.1.0-15-mips32r2el-di is NEW. binary:crypto-dm-modules-6.1.0-15-mips64r2el-di is NEW. binary:crypto-dm-modules-6.1.0-15-octeon-di is NEW. binary:crypto-dm-modules-6.1.0-15-powerpc64le-di is NEW. binary:crypto-dm-modules-6.1.0-15-s390x-di is NEW. binary:crypto-modules-6.1.0-15-4kc-malta-di is NEW. binary:crypto-modules-6.1.0-15-5kc-malta-di is NEW. binary:crypto-modules-6.1.0-15-armmp-di is NEW. binary:crypto-modules-6.1.0-15-loongson-3-di is NEW. binary:crypto-modules-6.1.0-15-marvell-di is NEW. binary:crypto-modules-6.1.0-15-mips32r2el-di is NEW. binary:crypto-modules-6.1.0-15-mips64r2el-di is NEW. binary:crypto-modules-6.1.0-15-octeon-di is NEW. binary:crypto-modules-6.1.0-15-powerpc64le-di is NEW. binary:crypto-modules-6.1.0-15-s390x-di is NEW. binary:dasd-extra-modules-6.1.0-15-s390x-di is NEW. binary:dasd-modules-6.1.0-15-s390x-di is NEW. binary:efi-modules-6.1.0-15-armmp-di is NEW. binary:event-modules-6.1.0-15-4kc-malta-di is NEW. binary:event-modules-6.1.0-15-5kc-malta-di is NEW. binary:event-modules-6.1.0-15-armmp-di is NEW. binary:event-modules-6.1.0-15-loongson-3-di is NEW. binary:event-modules-6.1.0-15-marvell-di is NEW. binary:event-modules-6.1.0-15-mips32r2el-di is NEW. binary:event-modules-6.1.0-15-mips64r2el-di is NEW. binary:event-modules-6.1.0-15-octeon-di is NEW. binary:event-modules-6.1.0-15-powerpc64le-di is NEW. binary:ext4-modules-6.1.0-15-4kc-malta-di is NEW. binary:ext4-modules-6.1.0-15-5kc-malta-di is NEW. binary:ext4-modules-6.1.0-15-armmp-di is NEW. binary:ext4-modules-6.1.0-15-loongson-3-di is NEW. binary:ext4-modules-6.1.0-15-marvell-di is NEW. binary:ext4-modules-6.1.0-15-mips32r2el-di is NEW. binary:ext4-modules-6.1.0-15-mips64r2el-di is NEW. binary:ext4-modules-6.1.0-15-octeon-di is NEW. binary:ext4-modules-6.1.0-15-powerpc64le-di is NEW. binary:ext4-modules-6.1.0-15-s390x-di is NEW. binary:f2fs-modules-6.1.0-15-4kc-malta-di is NEW. binary:f2fs-modules-6.1.0-15-5kc-malta-di is NEW. binary:f2fs-modules-6.1.0-15-armmp-di is NEW. binary:f2fs-modules-6.1.0-15-loongson-3-di is NEW. binary:f2fs-modules-6.1.0-15-marvell-di is NEW. binary:f2fs-modules-6.1.0-15-mips32r2el-di is NEW. binary:f2fs-modules-6.1.0-15-mips64r2el-di is NEW. binary:f2fs-modules-6.1.0-15-octeon-di is NEW. binary:f2fs-modules-6.1.0-15-powerpc64le-di is NEW. binary:f2fs-modules-6.1.0-15-s390x-di is NEW. binary:fancontrol-modules-6.1.0-15-powerpc64le-di is NEW.
Processing of linux_6.1.66-1_source.changes
linux_6.1.66-1_source.changes uploaded successfully to localhost along with the files: linux_6.1.66-1.dsc linux_6.1.66.orig.tar.xz linux_6.1.66-1.debian.tar.xz linux_6.1.66-1_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
Processed: tagging 1057843
Processing commands for cont...@bugs.debian.org: > tags 1057843 + pending Bug #1057843 [src:linux] linux: ext4 data corruption in 6.1.64-1 Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 1057843: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#1057843: linux: ext4 data corruption in 6.1.64-1
Hi, On Sat, Dec 09, 2023 at 03:07:37PM +0100, Salvatore Bonaccorso wrote: > Source: linux > Version: 6.1.64-1 > Severity: grave > Tags: upstream > Justification: causes non-serious data loss > X-Debbugs-Cc: debian-rele...@lists.debian.org, car...@debian.org, > a...@debian.org > > Hi > > I'm filling this for visibility. > > There might be a ext4 data corruption issue with the kernel released > in the 12.3 bookworm point release (which is addressed in 6.1.66 > upstream already). > > The report about the regression and some details: > > https://lore.kernel.org/stable/20231205122122.dfhhoaswsfscuhc3@quack3/ 6.1.66 upstream fixes the issue: # uname -a Linux bookworm-amd64 6.1.0-15-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.66-1 (2023-12-06) x86_64 GNU/Linux # LTP_SINGLE_FS_TYPE=ext4 LTP_DEV_FS_TYPE=ext4 ./preadv03_64 tst_device.c:96: TINFO: Found free device 0 '/dev/loop0' tst_test.c:1690: TINFO: LTP version: 20230929-194-g5c096b2cf tst_test.c:1574: TINFO: Timeout per run is 0h 00m 30s tst_supported_fs_types.c:149: TINFO: WARNING: testing only ext4 tst_supported_fs_types.c:90: TINFO: Kernel supports ext4 tst_supported_fs_types.c:55: TINFO: mkfs.ext4 does exist tst_test.c:1650: TINFO: === Testing on ext4 === tst_test.c:1105: TINFO: Formatting /dev/loop0 with ext4 opts='' extra opts='' mke2fs 1.47.0 (5-Feb-2023) tst_test.c:1119: TINFO: Mounting /dev/loop0 to /tmp/LTP_preGGYjTj/mntpoint fstyp=ext4 flags=0 preadv03.c:102: TINFO: Using block size 512 preadv03.c:87: TPASS: preadv(O_DIRECT) read 512 bytes successfully with content 'a' expectedly preadv03.c:87: TPASS: preadv(O_DIRECT) read 512 bytes successfully with content 'a' expectedly preadv03.c:87: TPASS: preadv(O_DIRECT) read 512 bytes successfully with content 'b' expectedly Summary: passed 3 failed 0 broken 0 skipped 0 warnings 0 Regards, Salvatore
Processed: tagging 1057843
Processing commands for cont...@bugs.debian.org: > tags 1057843 + fixed-upstream Bug #1057843 [src:linux] linux: ext4 data corruption in 6.1.64-1 Added tag(s) fixed-upstream. > thanks Stopping processing here. Please contact me if you need assistance. -- 1057843: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#1057843: linux: ext4 data corruption in 6.1.64-1
Running the single test with ext4: # LTP_SINGLE_FS_TYPE=ext4 LTP_DEV_FS_TYPE=ext4 ./preadv03_64 tst_device.c:96: TINFO: Found free device 0 '/dev/loop0' tst_test.c:1690: TINFO: LTP version: 20230929-194-g5c096b2cf tst_test.c:1574: TINFO: Timeout per run is 0h 00m 30s tst_supported_fs_types.c:149: TINFO: WARNING: testing only ext4 tst_supported_fs_types.c:90: TINFO: Kernel supports ext4 tst_supported_fs_types.c:55: TINFO: mkfs.ext4 does exist tst_test.c:1650: TINFO: === Testing on ext4 === tst_test.c:1105: TINFO: Formatting /dev/loop0 with ext4 opts='' extra opts='' mke2fs 1.47.0 (5-Feb-2023) tst_test.c:1119: TINFO: Mounting /dev/loop0 to /tmp/LTP_preWBHd7l/mntpoint fstyp=ext4 flags=0 preadv03.c:102: TINFO: Using block size 512 preadv03.c:77: TFAIL: Buffer wrong at 0 have 62 expected 61 preadv03.c:77: TFAIL: Buffer wrong at 0 have 62 expected 61 preadv03.c:66: TFAIL: preadv(O_DIRECT) read 0 bytes, expected 512 Summary: passed 0 failed 3 broken 0 skipped 0 warnings 0
Processed: bug 1057843 is forwarded to https://lore.kernel.org/stable/20231205122122.dfhhoaswsfscuhc3@quack3/
Processing commands for cont...@bugs.debian.org: > forwarded 1057843 > https://lore.kernel.org/stable/20231205122122.dfhhoaswsfscuhc3@quack3/ Bug #1057843 [src:linux] linux: ext4 data corruption in 6.1.64-1 Set Bug forwarded-to-address to 'https://lore.kernel.org/stable/20231205122122.dfhhoaswsfscuhc3@quack3/'. > thanks Stopping processing here. Please contact me if you need assistance. -- 1057843: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: tagging 1057843
Processing commands for cont...@bugs.debian.org: > tags 1057843 + confirmed Bug #1057843 [src:linux] linux: ext4 data corruption in 6.1.64-1 Added tag(s) confirmed. > thanks Stopping processing here. Please contact me if you need assistance. -- 1057843: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#1057843: linux: ext4 data corruption in 6.1.64-1
Source: linux Version: 6.1.64-1 Severity: grave Tags: upstream Justification: causes non-serious data loss X-Debbugs-Cc: debian-rele...@lists.debian.org, car...@debian.org, a...@debian.org Hi I'm filling this for visibility. There might be a ext4 data corruption issue with the kernel released in the 12.3 bookworm point release (which is addressed in 6.1.66 upstream already). The report about the regression and some details: https://lore.kernel.org/stable/20231205122122.dfhhoaswsfscuhc3@quack3/ Regards, Salvatore
Processed: limit source to linux, tagging 1055649
Processing commands for cont...@bugs.debian.org: > limit source linux Limiting to bugs with field 'source' containing at least one of 'linux' Limit currently set to 'source':'linux' > tags 1055649 + pending Bug #1055649 [linux] linux: Microphone does not work on ThinPad P14s AMD (Zen4/Phoenix), fixed by enabling 2 SOC DSP modules Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 1055649: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055649 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: limit source to linux, tagging 1050353, tagging 1053187
Processing commands for cont...@bugs.debian.org: > limit source linux Limiting to bugs with field 'source' containing at least one of 'linux' Limit currently set to 'source':'linux' > tags 1050353 + pending Bug #1050353 [src:linux] linux: Enable System Trace Modules and Intel_TH_STH Added tag(s) pending. > tags 1053187 + pending Bug #1053187 [src:linux] linux: Enable Intel's Topology Aware Register and PM Capsule Interface (TPMI) Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 1050353: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050353 1053187: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053187 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#1052304: Debian 6.1 Kernels suspect
Hi Jeffrey, On Fri, Dec 08, 2023 at 06:28:50PM -0500, Jeffrey Altman wrote: > On Wed, 29 Nov 2023 18:06:23 +0100 Salvatore Bonaccorso > wrote: > > Control: tags -1 + moreinfo > > > > Hi > > > > On Sat, Oct 14, 2023 at 11:31:14PM -0700, Bill MacAllister wrote: > > > After more testing Jeff Altman and Marc Dionne have reported that > > > the problem accessing AFS files using kafs does not occur if the > > > client has IPv6 configured. > > > > Were you able to further track down the issue? I would suggest that > > once you are able to identify reproduction steps and requirements to > > have a look with upstream. > > > > But if you were already in contact with Marc Dionne: is the bug > > considered valid by upstream or should it be closed here? > > > > Regards, > > Salvatore > > The bug is considered valid by upstream. A proposed fix for this issue is > being reviewed. > http://lists.infradead.org/pipermail/linux-afs/2023-December/007408.html > Please leave this issue open until the fix has been back ported into the > kernels shipped by Debian. Perfect thank you. Prequisite is that you make sure that the fix lands in the currently supported upstream stable series, then we will pick it up autoamtically up on the next rebases. Regards, Salvatore
Processed: found 1052304 in 5.0.1-1~exp1
Processing commands for cont...@bugs.debian.org: > found 1052304 5.0.1-1~exp1 Bug #1052304 [src:linux] linux-image-6.1.0-12-amd64: Accessing /afs file system causes system hang or crash Marked as found in versions linux/5.0.1-1~exp1. > thanks Stopping processing here. Please contact me if you need assistance. -- 1052304: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052304 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: bug 1052304 is forwarded to http://lists.infradead.org/pipermail/linux-afs/2023-December/007408.html
Processing commands for cont...@bugs.debian.org: > forwarded 1052304 > http://lists.infradead.org/pipermail/linux-afs/2023-December/007408.html Bug #1052304 [src:linux] linux-image-6.1.0-12-amd64: Accessing /afs file system causes system hang or crash Set Bug forwarded-to-address to 'http://lists.infradead.org/pipermail/linux-afs/2023-December/007408.html'. > thanks Stopping processing here. Please contact me if you need assistance. -- 1052304: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052304 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: tagging 1052304, tagging 1052304
Processing commands for cont...@bugs.debian.org: > tags 1052304 - moreinfo Bug #1052304 [src:linux] linux-image-6.1.0-12-amd64: Accessing /afs file system causes system hang or crash Removed tag(s) moreinfo. > tags 1052304 + upstream Bug #1052304 [src:linux] linux-image-6.1.0-12-amd64: Accessing /afs file system causes system hang or crash Added tag(s) upstream. > thanks Stopping processing here. Please contact me if you need assistance. -- 1052304: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052304 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems