Bug#820013: general: Touchpad not working on Lenovo IdeaPad Yoga 13 after updating from 8.3 to 8.4

2016-04-05 Thread Juho
Most likely the kernel.  However, I can't see any obviously relevant changes.  What does this command show:     ls -l /sys/class/input/mouse*/device/device/driver -- $ ls -l /sys/class/input/mouse*/device/device/driver lrwxrwxrwx 1 root root 0 Apr 6 06:34

Processed: Re: Bug#820156: parse_numeric function cannot handle composite device numbers of more than 8 hex digits

2016-04-05 Thread Debian Bug Tracking System
Processing control commands: > severity -1 wishlist Bug #820156 [initramfs-tools-core] parse_numeric function cannot handle composite device numbers of more than 8 hex digits Severity set to 'wishlist' from 'minor' -- 820156: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820156 Debian Bug

Bug#820156: parse_numeric function cannot handle composite device numbers of more than 8 hex digits

2016-04-05 Thread Ben Hutchings
Control: severity -1 wishlist On Tue, 2016-04-05 at 19:13 -0400, Stephen Powell wrote: > Package: initramfs-tools-core > Version: 0.123 > Severity: minor > Tags: patch > > Congratulations on initramfs-tools version 0.123!  Many bugs in version 0.120 > have been fixed in this version.  However,

Bug#820013: general: Touchpad not working on Lenovo IdeaPad Yoga 13 after updating from 8.3 to 8.4

2016-04-05 Thread Dimitri John Ledkov
On 6 April 2016 at 00:32, Ben Hutchings wrote: > On Wed, 2016-04-06 at 00:22 +0100, Ben Hutchings wrote: > [...] >> But I also found this commit in 3.17: >> >> commit f79a901331a823ae370584b15cd39dd110b95a0a >> Author: Hans de Goede >> Date: Fri Jul

Bug#820013: general: Touchpad not working on Lenovo IdeaPad Yoga 13 after updating from 8.3 to 8.4

2016-04-05 Thread Ben Hutchings
On Wed, 2016-04-06 at 00:22 +0100, Ben Hutchings wrote: [...] > But I also found this commit in 3.17: > > commit f79a901331a823ae370584b15cd39dd110b95a0a > Author: Hans de Goede > Date:   Fri Jul 18 12:21:47 2014 +0200 > > ideapad-laptop: Disable touchpad interface on

Bug#820013: general: Touchpad not working on Lenovo IdeaPad Yoga 13 after updating from 8.3 to 8.4

2016-04-05 Thread Ben Hutchings
On Tue, 2016-04-05 at 23:18 +0100, Dimitri John Ledkov wrote: > On 5 April 2016 at 22:49, Ben Hutchings wrote: > > > > Control: reassign -1 src:linux 3.16.7-ckt25-1 > > Control: tag -1 moreinfo > > > > On Mon, 2016-04-04 at 22:11 +0300, Juho wrote: > > > > > > Package:

Bug#820156: parse_numeric function cannot handle composite device numbers of more than 8 hex digits

2016-04-05 Thread Stephen Powell
Package: initramfs-tools-core Version: 0.123 Severity: minor Tags: patch Congratulations on initramfs-tools version 0.123! Many bugs in version 0.120 have been fixed in this version. However, it appears that the parse_numeric function, while improved over the 0.120 version, still doesn't handle

Bug#820013: general: Touchpad not working on Lenovo IdeaPad Yoga 13 after updating from 8.3 to 8.4

2016-04-05 Thread Dimitri John Ledkov
On 5 April 2016 at 22:49, Ben Hutchings wrote: > Control: reassign -1 src:linux 3.16.7-ckt25-1 > Control: tag -1 moreinfo > > On Mon, 2016-04-04 at 22:11 +0300, Juho wrote: >> Package: general >> Severity: important >> >> After running "apt-get update && apt-get

Processed: Re: Bug#820013: general: Touchpad not working on Lenovo IdeaPad Yoga 13 after updating from 8.3 to 8.4

2016-04-05 Thread Debian Bug Tracking System
Processing control commands: > reassign -1 src:linux 3.16.7-ckt25-1 Bug #820013 [general] general: Touchpad not working on Lenovo IdeaPad Yoga 13 after updating from 8.3 to 8.4 Bug reassigned from package 'general' to 'src:linux'. Ignoring request to alter found versions of bug #820013 to the

Processed: reassign 820061 to src:linux, forcibly merging 819881 820061

2016-04-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 820061 src:linux Bug #820061 [linux-image-amd64] linux-image-amd64: kernel hangs since debian 8.4 Bug reassigned from package 'linux-image-amd64' to 'src:linux'. No longer marked as found in versions 3.16.7-ckt25-1. Ignoring request to

linux_3.16.7-ckt25-1~bpo70+1_multi.changes ACCEPTED into wheezy-backports->backports-policy, wheezy-backports

2016-04-05 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 02 Apr 2016 14:44:46 +0100 Source: linux Binary: linux-source-3.16 linux-doc-3.16 linux-manual-3.16 linux-support-3.16.0-0.bpo.4 linux-libc-dev linux-headers-3.16.0-0.bpo.4-all

Bug#820008: Support for securelevel and Secure Boot

2016-04-05 Thread Ben Hutchings
On Tue, 2016-04-05 at 09:34 +0200, Florian Weimer wrote: > * Ben Hutchings: > > > > > To ensure the integrity of the kernel, we should support a securelevel > > where all modules must be signed by a trusted key and all APIs > > allowing arbitrary memory writes are disabled. > What is a trusted

Processed (with 1 error): forcibly merging 819881 820061

2016-04-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > forcemerge 819881 820061 Bug #819881 [src:linux] radeon_fence_ref BUG: unable to handle kernel NULL pointer dereference Bug #817874 [src:linux] linux-image-3.16.0-4-amd64: 3.16.7-ckt25-1 freeze with radeon driver Unable to merge bugs because:

Bug#783063: Xen domU freeze with "Guest Rx stalled"

2016-04-05 Thread Wolodja Wentland
Hello, we have been observing this behaviour over the last couple of months and can report that it still happens with recent kernels in wheezy-backports. In particular the following kernels where used: Dom0: 3.16.7-ckt11-1+deb8u6~bpo70+1 DomU: 3.16.7-ckt20-1+deb8u3~bpo70+1 We still only see

Bug#820061: linux-image-amd64: kernel hangs since debian 8.4

2016-04-05 Thread Bjørn Mork
Benoît Tonnerre writes: > Apr 4 18:52:55 pci003-01 kernel: [ 79.329223] RIP: > 0010:[] > [] radeon_fence_ref+0xd/0x50 [radeon] > Apr 4 18:52:55 pci003-01 kernel: [ 79.330192] RSP: 0018:88003639fb18 > EFLAGS: 00010292 > Apr 4 18:52:55 pci003-01 kernel: [ 79.331154]

Bug#820008: Support for securelevel and Secure Boot

2016-04-05 Thread Florian Weimer
* Ben Hutchings: > To ensure the integrity of the kernel, we should support a securelevel > where all modules must be signed by a trusted key and all APIs > allowing arbitrary memory writes are disabled. What is a trusted key? I'm not convinced we can align this with Debian's principles. > To