Processing commands for cont...@bugs.debian.org:
> close 1005236 1:2.5.4-1~exp1
Bug #1005236 [nfs-kernel-server] nfs-kernel-server 1.3.4 does not support
security_label option for SELinux over NFS 4.2
Marked as fixed in versions nfs-utils/1:2.5.4-1~exp1.
Bug #1005236 [nfs-kernel-server] nfs-kerne
On Mon, 2022-02-07 at 22:22 +0900, Masahiro Yamada wrote:
> On Sat, Feb 5, 2022 at 7:30 AM Matthew Wilcox wrote:
> >
> > On Wed, Jan 05, 2022 at 12:39:57AM +0900, Masahiro Yamada wrote:
> > > +CC the maintainers of CERTIFICATE HANDLING
> > > M: David Howells
> > > M: David Woodhouse
>
On Wed, Feb 9, 2022 at 10:21 PM James Bottomley
wrote:
>
> On Tue, 2022-02-08 at 13:10 +, Matthew Wilcox wrote:
> > On Tue, Feb 08, 2022 at 12:01:22PM +0100, Julian Andres Klode wrote:
> > > It's worth pointing out that in Ubuntu, the generated MOK key
> > > is for module signing only (extende
On Wed, Feb 9, 2022 at 1:13 AM Julian Andres Klode
wrote:
>
> On Tue, Feb 08, 2022 at 01:10:34PM +, Matthew Wilcox wrote:
> > On Tue, Feb 08, 2022 at 12:01:22PM +0100, Julian Andres Klode wrote:
> > > It's worth pointing out that in Ubuntu, the generated MOK key
> > > is for module signing onl
Hi,
Subject: 983357: Why is it not mentioned in bullseye release notes /
installation guide?
For at least the release notes, because nobody asked the editors to
include it.
On 09-02-2022 21:04, Chuck Zmudzinski wrote:
However, this is a well-known problem, but neither the Bullseye release
- Original Message -
> From: "Salvatore Bonaccorso"
> To: "Timothy Pearson" , "990279"
> <990...@bugs.debian.org>
> Cc: "Christian König" , "Xi Ruoyao"
> , "Alex Deucher"
>
> Sent: Wednesday, February 9, 2022 2:18:34 PM
> Subject: Re: Bug#990279: Status?
> Hi Timothy,
>
> On Wed, F
Hi Timothy,
On Wed, Feb 09, 2022 at 01:20:40PM -0600, Timothy Pearson wrote:
> - Original Message -
> > From: "Christian König"
> > To: "Timothy Pearson" , "Salvatore
> > Bonaccorso"
> >>
> >> If you need me to generate / submit a patch just let me know.
> >
> > Please do, I don't have
Processing control commands:
> tags -1 + moreinfo
Bug #995877 [src:linux] linux-image-5.14.0-2-amd64: "pagealloc: memory
corruption" during SCSI initialization
Added tag(s) moreinfo.
--
995877: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=995877
Debian Bug Tracking System
Contact ow...@bug
Control: tags -1 + moreinfo
Hi Laurent,
On Wed, Feb 09, 2022 at 08:36:33PM +0100, Laurent Bonnaud wrote:
> Hi,
>
> this bug still occurs with the 5.16.7-1 kernel:
>
> [3.860611] sdg: sdg1
> [3.861521] sd 10:0:0:0: [sdg] Attached SCSI disk
> [3.873581] pagealloc: memory corruption
>
Processing commands for cont...@bugs.debian.org:
> found 995877 5.16.7-1
Bug #995877 [src:linux] linux-image-5.14.0-2-amd64: "pagealloc: memory
corruption" during SCSI initialization
Marked as found in versions linux/5.16.7-1.
> thanks
Stopping processing here.
Please contact me if you need assi
Package: src:linux
Version: 5.15.15-2
Severity: important
X-Debbugs-Cc: quentin.lambo...@hotmail.com
Dear Maintainer,
*** Reporter, please consider answering these questions, where appropriate ***
* What led up to the situation?
* What exactly did you do (or not do) that was effective (or
Provided to fix stable Bullseye kernels
Signed-off-by: Timothy Pearson
---
.../debian/fix-ppc64-amdgpu-page-size.patch | 22 +++
debian/patches/series | 1 +
2 files changed, 23 insertions(+)
create mode 100644 debian/patches/debian/fix-ppc64-amdgpu-pa
Provided to fix stable Bullseye kernels
Signed-off-by: Timothy Pearson
---
.../debian/fix-ppc64-amdgpu-page-size.patch | 22 +++
debian/patches/series | 1 +
2 files changed, 23 insertions(+)
create mode 100644 debian/patches/debian/fix-ppc64-amdgpu-pa
Package: nfs-kernel-server
Version: 1:1.3.4-6
Severity: important
X-Debbugs-Cc: xksz...@gmail.com
This is was initially handled by RHEL:
- https://bugzilla.redhat.com/show_bug.cgi?id=1406885
To summarize:
- SELinux label can be forwarded to client in NFS 4.2
- Kernel enabled that behavior by def
Processing commands for cont...@bugs.debian.org:
> found 1005005 5.16.7-1
Bug #1005005 [src:linux] linux-image-5.15.0-3-amd64: suspend failure with admgpu
Marked as found in versions linux/5.16.7-1.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
1005005: https://
On Tuesday, 8 February 2022 08:11:46 CET Salvatore Bonaccorso wrote:
> > > (5.16.7-1 should land soon as well).
>
> > I'll try it when it's available
5.16.7-1 is also broken
> > > Any chance
> > > you can bisect the commit introducing the issue?
> Some help is here:
>
> https://wiki.debian.org/
Package: src:linux
Version: 4.19.208-1
Severity: important
Dear Maintainer,
* What led up to the situation?
Installing and running in production a fresh debian 10 with php/apache2
installed.
This is a virtual machine with 8 virtual CPU / 4 physical CPU / 8 GB Ram,
running on
an Open
On Tue, 2022-02-08 at 13:10 +, Matthew Wilcox wrote:
> On Tue, Feb 08, 2022 at 12:01:22PM +0100, Julian Andres Klode wrote:
> > It's worth pointing out that in Ubuntu, the generated MOK key
> > is for module signing only (extended key usage
> > 1.3.6.1.4.1.2312.16.1.2), kernels signed with it w
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 09 Feb 2022 09:35:55 +0100
Source: linux
Architecture: source
Version: 5.16.7-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Kernel Team
Changed-By: Salvatore Bonaccorso
Closes: 1005141
Changes:
li
Your message dated Wed, 09 Feb 2022 09:04:51 +
with message-id
and subject line Bug#1005141: fixed in linux 5.16.7-2
has caused the Debian Bug report #1005141,
regarding linux-perf: Removes diversions on upgrade breaking it
to be marked as done.
This means that you claim that the problem has
linux_5.16.7-2_source.changes uploaded successfully to localhost
along with the files:
linux_5.16.7-2.dsc
linux_5.16.7-2.debian.tar.xz
linux_5.16.7-2_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
21 matches
Mail list logo