Processed: tagging 865303

2017-10-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 865303 - moreinfo Bug #865303 [src:linux] libreoffice: Libreoffice Java features crash with Linux 3.16.43-2+deb8u1 Bug #865866 [src:linux] libreoffice-writer crash on startup Debian 9 i386 arch Bug #869161 [src:linux] libreoffice-base

Processed: unmerging 820081, reassign 820081 to libreoffice-writer, found 820081 in 1:5.1.2~rc1-1 ...

2017-10-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > unmerge 820081 Bug #820081 [src:linux] libreoffice-writer: can't open LibreOffice Writer Bug #865303 [src:linux] libreoffice: Libreoffice Java features crash with Linux 3.16.43-2+deb8u1 Bug #865866 [src:linux] libreoffice-writer crash on startup

Processed: reassign 820081 to src:linux, severity of 820081 is grave, forcibly merging 865303 820081

2017-10-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 820081 src:linux Bug #820081 [libreoffice-writer] libreoffice-writer: can't open LibreOffice Writer Bug reassigned from package 'libreoffice-writer' to 'src:linux'. No longer marked as found in versions libreoffice/1:5.2.7-1 and

Bug#877809: libreoffice writer java kernel crash

2017-10-05 Thread Rene Engelhard
reassign 877809 src:linux forcemerge 865303 877809 thanks On Thu, Oct 05, 2017 at 10:19:18PM +0100, Andrew Rule wrote: > I recently upgraded to libreoffice 5.4.1-1 i386, and experienced the following > problem: > > While using > openjdk-8-jre version 8u144-b01-1 i386 > kernel 4.9.21 i686 built

Processed: Re: Bug#877809: libreoffice writer java kernel crash

2017-10-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 877809 src:linux Bug #877809 [libreoffice] libreoffice writer java kernel crash Bug reassigned from package 'libreoffice' to 'src:linux'. No longer marked as found in versions libreoffice/1:5.4.1-1. Ignoring request to alter fixed

Processed: limit source to linux, tagging 877760

2017-10-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > limit source linux Limiting to bugs with field 'source' containing at least one of 'linux' Limit currently set to 'source':'linux' > tags 877760 + pending confirmed Bug #877760 [src:linux] linux: KEYS: request_key() does not update/replace

Processed: tagging 877760

2017-10-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 877760 + upstream fixed-upstream Bug #877760 [src:linux] linux: KEYS: request_key() does not update/replace expired keys Added tag(s) fixed-upstream and upstream. > thanks Stopping processing here. Please contact me if you need assistance.

Bug#877760: linux: KEYS: request_key() does not update/replace expired keys

2017-10-05 Thread Salvatore Bonaccorso
Control: tags -1 + patch Hi On Thu, Oct 05, 2017 at 09:06:33AM +0200, Salvatore Bonaccorso wrote: > Source: linux > Version: 3.16.7-ckt7-1 > Severity: normal > > Hi > > In 3.16.7-ckt7-1 we applied a backport of "EYS: request_key() should > reget expired keys rather than give EKEYEXPIRED",

Processed: Re: Bug#877760: linux: KEYS: request_key() does not update/replace expired keys

2017-10-05 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + patch Bug #877760 [src:linux] linux: KEYS: request_key() does not update/replace expired keys Added tag(s) patch. -- 877760: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877760 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Secure boot signing infrastructure - feedback request

2017-10-05 Thread Helen Koike
Hello all, As you probably already know, Debian doesn't support the Secure Boot chain yet. To support it we need to sign Grub and the Kernel with our key, so we are discussing the best infrastructure for this workflow. The first approach we had was to add a by-hand script in Dak as described

Re: [PATCH v3] scripts/package/builddeb: split generating packaging and build

2017-10-05 Thread Ritesh Raj Sarraf
On Wed, 2017-10-04 at 13:38 +0300, Riku Voipio wrote: > > I see the same problem for bindeb-pkg as in v2. > > The parallel build overload? I'm totally puzzled then. Debian is > still > stuck with make 4.1, so I guess there is a change in behaviour on > later makes. > > > "make deb-pkg" gave me

Processed: [bts-link] source package linux

2017-10-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > # > # bts-link upstream status pull for source package linux > # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html > # > user bts-link-upstr...@lists.alioth.debian.org Setting user to

Bug#877764: linux-image-amd64: cifs mount gets automatically the file_mode=0755,dir_mode=0755 options

2017-10-05 Thread matecs
hi, when sid pulled the 4.13 kernel, i noticed that these mounts automatically get the file_mode=0755 and dir_mode=0755 options. It appears that this indicates the server does not support Unix extensions. What is the file server running? it's the debian sid's samba daemon: Version

Bug#877764: linux-image-amd64: cifs mount gets automatically the file_mode=0755,dir_mode=0755 options

2017-10-05 Thread Ben Hutchings
Control: reassign -1 src:linux 4.13.4-1 Control: tag -1 moreinfo On Thu, 2017-10-05 at 10:18 +0200, matecs wrote: > Package: linux-image-amd64 > Version: 4.13+86 > Severity: normal > > Dear Maintainer, > > i'm mounting my shares through cifs for years. > when sid pulled the 4.13 kernel, i

Processed: Re: Bug#877764: linux-image-amd64: cifs mount gets automatically the file_mode=0755,dir_mode=0755 options

2017-10-05 Thread Debian Bug Tracking System
Processing control commands: > reassign -1 src:linux 4.13.4-1 Bug #877764 [linux-image-amd64] linux-image-amd64: cifs mount gets automatically the file_mode=0755,dir_mode=0755 options Bug reassigned from package 'linux-image-amd64' to 'src:linux'. No longer marked as found in versions

Bug#877779: linux: modpost uses wrong sizes for mips-octeon kernel

2017-10-05 Thread James Cowgill
Source: linux Version: 4.12.13-1 Severity: normal Hi, I recently attempted to install an out-of-tree module (an old version of the octeon mmc driver) on an octeon machine running big endian 32-bit mips. In this configuration, the kernel is 64-bit, but userspace is 32-bit. The module build

Processed: fixed 877760 in 3.18-1~exp1

2017-10-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > fixed 877760 3.18-1~exp1 Bug #877760 [src:linux] linux: KEYS: request_key() does not update/replace expired keys Marked as fixed in versions linux/3.18-1~exp1. > thanks Stopping processing here. Please contact me if you need assistance. --

Re: reports bugs

2017-10-05 Thread Uwe Kleine-König
On Mon, Oct 02, 2017 at 10:41:03PM +0200, Alain wrote: > don't want to receive reports bugs . please take care  of ! You either subscribed to the debian-kernel mailing list or to the pts. If the former please send a message to debian-kernel-requ...@lists.debian.org with Subject:

Bug#877764: linux-image-amd64: cifs mount gets automatically the file_mode=0755,dir_mode=0755 options

2017-10-05 Thread matecs
Package: linux-image-amd64 Version: 4.13+86 Severity: normal Dear Maintainer, i'm mounting my shares through cifs for years. when sid pulled the 4.13 kernel, i noticed that these mounts automatically get the file_mode=0755 and dir_mode=0755 options. the fstab looks like this:

Re: [PATCH v3] scripts/package/builddeb: split generating packaging and build

2017-10-05 Thread Masahiro Yamada
Hi Riku, 2017-10-04 19:38 GMT+09:00 Riku Voipio : > On 4 October 2017 at 12:12, Masahiro Yamada > wrote: >> Hi Riku, > >> 2017-10-02 19:43 GMT+09:00 : >>> From: Riku Voipio >>> >>> Move

Bug#877763: WARNING: CPU: 1 PID: 431 at /build/linux-wJBo44/linux-4.13.4/fs/btrfs/ctree.h:1559 btrfs_update_device+0x1b2/0x1c0 [btrfs]

2017-10-05 Thread Roman Lebedev
Package: src:linux Version: 4.13.4-1 Severity: normal -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 After upgrading to 4.13.0-1-amd64, i'm seeing new traces in the dmesg. - -- Package-specific info: ** Version: Linux version 4.13.0-1-amd64 (debian-kernel@lists.debian.org) (gcc version 6.4.0

Bug#877760: linux: KEYS: request_key() does not update/replace expired keys

2017-10-05 Thread Salvatore Bonaccorso
Source: linux Version: 3.16.7-ckt7-1 Severity: normal Hi In 3.16.7-ckt7-1 we applied a backport of "EYS: request_key() should reget expired keys rather than give EKEYEXPIRED", adressing #758870, 0b0a84154eff56913e91df29de5c3a03a0029e38. I noticed that in jessie, with still up to

Processed: retitle 876762 to linux-image-3.16.0-4-amd64: tmpfs file system sometimes has undeletable directories/files

2017-10-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > retitle 876762 linux-image-3.16.0-4-amd64: tmpfs file system sometimes has > undeletable directories/files Bug #876762 [src:linux] linux-image-3.16.0-4-amd64: tmpf file system sometimes has undeletable directories/files Changed Bug title to