Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 19 Jun 2019 23:16:58 +0100
Source: linux
Architecture: source
Version: 4.19.37-5
Distribution: unstable
Urgency: medium
Maintainer: Debian Kernel Team
Changed-By: Ben Hutchings
Closes: 926539 930743
Changes:
li
Your message dated Thu, 20 Jun 2019 00:36:19 +
with message-id
and subject line Bug#930743: fixed in linux 4.19.37-5
has caused the Debian Bug report #930743,
regarding ABI changed without an ABI bump
to be marked as done.
This means that you claim that the problem has been dealt with.
If thi
Your message dated Thu, 20 Jun 2019 00:36:19 +
with message-id
and subject line Bug#926539: fixed in linux 4.19.37-5
has caused the Debian Bug report #926539,
regarding rootskel: steal-ctty no longer works on at least sparc64
to be marked as done.
This means that you claim that the problem ha
linux_4.19.37-5_source.changes uploaded successfully to localhost
along with the files:
linux_4.19.37-5.dsc
linux_4.19.37-5.debian.tar.xz
linux_4.19.37-5_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Your message dated Thu, 20 Jun 2019 00:36:19 +
with message-id
and subject line Bug#930743: fixed in linux 4.19.37-5
has caused the Debian Bug report #930743,
regarding linux-image-4.19.0-5-amd64: wlan/wifi not working
to be marked as done.
This means that you claim that the problem has been
Processing commands for cont...@bugs.debian.org:
> severity 930743 serious
Bug #930743 [src:linux] ABI changed without an ABI bump
Bug #930744 [src:linux] linux-image-4.19.0-5-amd64: wlan/wifi not working
Severity set to 'serious' from 'important'
Severity set to 'serious' from 'important'
> thank
Processing control commands:
> tag -1 + patch
Bug #930754 [initramfs-tools] Warnings when using bzip2 or lzma
Added tag(s) patch.
--
930754: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930754
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tag -1 + patch
Hello,
On Wed, Jun 19, 2019 at 11:09:28PM +0200, Uwe Kleine-König wrote:
> I tested the different options for the COMPRESS variable in initramfs.conf
> and noticed that when using bzip2 or lzma I get a warning when an
> initramfs is created:
>
> "W: Unknown compress
Package: initramfs-tools
Version: 0.133
Severity: minor
Hello,
I tested the different options for the COMPRESS variable in initramfs.conf
and noticed that when using bzip2 or lzma I get a warning when an
initramfs is created:
"W: Unknown compression command bzip2"
. It is harmless thoug
Processing commands for cont...@bugs.debian.org:
> reassign 929060 cryptsetup-initramfs
Bug #929060 [initramfs-tools] update-initramfs silently failed to change \
Bug reassigned from package 'initramfs-tools' to 'cryptsetup-initramfs'.
Ignoring request to alter found versions of bug #929060 to the
Processing commands for cont...@bugs.debian.org:
> forcemerge 930743 930744
Bug #930743 [src:linux] ABI changed without an ABI bump
Bug #930744 [src:linux] linux-image-4.19.0-5-amd64: wlan/wifi not working
Severity set to 'important' from 'normal'
Merged 930743 930744
> thanks
Stopping processing
On Wed, 2019-06-19 at 00:37 +0200, Mihai Moldovan wrote:
> * On 6/18/19 3:22 PM, Bastian Blank wrote:
> > See #847154 for the workaround.
> Thanks. Seems to work fine.
>
> This triggered another question, though: can I assume that buster kernels are
> also affected by that problem by default? Give
Package: src:linux
Version: 4.19.37-4
Severity: normal
Dear Maintainer,
my WiFi stopped working after the kernel upgrade.
When booting 4.19.0.4, I see
lt-nkiesel kernel: wl: loading out-of-tree module taints kernel.
lt-nkiesel kernel: wl: module license 'MIXED/Proprietary' taints kernel.
lt-nkie
Package: src:linux
Version: 4.19.37-4
Severity: important
We forgot to add an ABI reference for 4.19.0-5 after the last ABI
bump, and many symbol versions have changed between versions 4.19.37-3
and -4.
I don't yet understand why that is, as the corresponding versions
for stretch-backports have t
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 19 Jun 2019 01:48:57 +0100
Source: linux
Binary: linux-support-4.19.0-0.bpo.5 linux-doc-4.19 linux-cpupower libcpupower1
libcpupower-dev usbip hyperv-daemons lockdep liblockdep4.19 liblockdep-dev
libbpf4.19 libb
linux_4.19.37-4~bpo9+1_source.changes uploaded successfully to localhost
along with the files:
linux_4.19.37-4~bpo9+1.dsc
linux_4.19.37-4~bpo9+1.debian.tar.xz
linux_4.19.37-4~bpo9+1_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Hi!
On 6/14/19 7:55 AM, John Paul Adrian Glaubitz wrote:
> My patch has been merged upstream now and is planned for -stable [1].
It's now part of the 4.19 [1] and 5.1 [2] stable queues, so I guess we just
have to wait a little now.
@Ben: Can you make sure this bug gets closed with the next stabl
Dear,
Your early response will be evaluated.
I am Mr.Nattan Komor, a practicing lawyer in the Republic of Togo,
West Africa , a deceased client, who died in a car crash together with
his wife and their only daughter,Kara Expressway April 21, 2008, I
contacted you to help me in the allocation of
18 matches
Mail list logo