Processed: tagging 865303
Processing commands for cont...@bugs.debian.org: > tags 865303 - moreinfo Bug #865303 [src:linux] libreoffice: Libreoffice Java features crash with Linux 3.16.43-2+deb8u1 Bug #865866 [src:linux] libreoffice-writer crash on startup Debian 9 i386 arch Bug #869161 [src:linux] libreoffice-base crashes with code 139 when creating a new base or opening an existing one Bug #869613 [src:linux] libreoffice write crashes (Debian 9) Bug #869649 [src:linux] Debian 9 i386 - Libreoffice write crash Bug #870070 [src:linux] Debian 9.1 stretch: LibreOffice Writer crashes at startup Bug #875269 [src:linux] libreoffice-base: LibreOffice-Base crashes when trying to open Tables view in Debian 9 Stretch. Bug #876021 [src:linux] libreoffice-writer: launching writer makes libreoffice crash Bug #876458 [src:linux] LibreOffice Writer does not launch Bug #877339 [src:linux] libreoffice-core: libreoffice SEGV in _expand_stack_to on most documents Bug #877809 [src:linux] libreoffice writer java kernel crash Removed tag(s) moreinfo. Removed tag(s) moreinfo. Removed tag(s) moreinfo. Removed tag(s) moreinfo. Removed tag(s) moreinfo. Removed tag(s) moreinfo. Removed tag(s) moreinfo. Removed tag(s) moreinfo. Removed tag(s) moreinfo. Removed tag(s) moreinfo. Removed tag(s) moreinfo. > thanks Stopping processing here. Please contact me if you need assistance. -- 865303: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865303 865866: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865866 869161: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869161 869613: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869613 869649: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869649 870070: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870070 875269: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875269 876021: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876021 876458: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876458 877339: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877339 877809: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877809 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: unmerging 820081, reassign 820081 to libreoffice-writer, found 820081 in 1:5.1.2~rc1-1 ...
Processing commands for cont...@bugs.debian.org: > unmerge 820081 Bug #820081 [src:linux] libreoffice-writer: can't open LibreOffice Writer Bug #865303 [src:linux] libreoffice: Libreoffice Java features crash with Linux 3.16.43-2+deb8u1 Bug #865866 [src:linux] libreoffice-writer crash on startup Debian 9 i386 arch Bug #869161 [src:linux] libreoffice-base crashes with code 139 when creating a new base or opening an existing one Bug #869613 [src:linux] libreoffice write crashes (Debian 9) Bug #869649 [src:linux] Debian 9 i386 - Libreoffice write crash Bug #870070 [src:linux] Debian 9.1 stretch: LibreOffice Writer crashes at startup Bug #875269 [src:linux] libreoffice-base: LibreOffice-Base crashes when trying to open Tables view in Debian 9 Stretch. Bug #876021 [src:linux] libreoffice-writer: launching writer makes libreoffice crash Bug #876458 [src:linux] LibreOffice Writer does not launch Bug #877339 [src:linux] libreoffice-core: libreoffice SEGV in _expand_stack_to on most documents Bug #877809 [src:linux] libreoffice writer java kernel crash Disconnected #820081 from all other report(s). > reassign 820081 libreoffice-writer Bug #820081 [src:linux] libreoffice-writer: can't open LibreOffice Writer Bug reassigned from package 'src:linux' to 'libreoffice-writer'. No longer marked as found in versions linux/3.2.89-1, linux/4.9.30-2+deb9u1, linux/4.11.6-1, linux/3.16.43-2+deb8u1, and linux/4.9.30-2+deb9u2. Ignoring request to alter fixed versions of bug #820081 to the same values previously set > found 820081 1:5.1.2~rc1-1 Bug #820081 [libreoffice-writer] libreoffice-writer: can't open LibreOffice Writer Marked as found in versions libreoffice/1:5.1.2~rc1-1. > found 820081 1:5.2.7-1 Bug #820081 [libreoffice-writer] libreoffice-writer: can't open LibreOffice Writer Marked as found in versions libreoffice/1:5.2.7-1. > thanks Stopping processing here. Please contact me if you need assistance. -- 820081: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820081 865303: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865303 865866: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865866 869161: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869161 869613: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869613 869649: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869649 870070: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870070 875269: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875269 876021: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876021 876458: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876458 877339: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877339 877809: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877809 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: reassign 820081 to src:linux, severity of 820081 is grave, forcibly merging 865303 820081
Processing commands for cont...@bugs.debian.org: > reassign 820081 src:linux Bug #820081 [libreoffice-writer] libreoffice-writer: can't open LibreOffice Writer Bug reassigned from package 'libreoffice-writer' to 'src:linux'. No longer marked as found in versions libreoffice/1:5.2.7-1 and libreoffice/1:5.1.2~rc1-1. Ignoring request to alter fixed versions of bug #820081 to the same values previously set > severity 820081 grave Bug #820081 [src:linux] libreoffice-writer: can't open LibreOffice Writer Severity set to 'grave' from 'important' > forcemerge 865303 820081 Bug #865303 [src:linux] libreoffice: Libreoffice Java features crash with Linux 3.16.43-2+deb8u1 Bug #865866 [src:linux] libreoffice-writer crash on startup Debian 9 i386 arch Bug #869161 [src:linux] libreoffice-base crashes with code 139 when creating a new base or opening an existing one Bug #869613 [src:linux] libreoffice write crashes (Debian 9) Bug #869649 [src:linux] Debian 9 i386 - Libreoffice write crash Bug #870070 [src:linux] Debian 9.1 stretch: LibreOffice Writer crashes at startup Bug #875269 [src:linux] libreoffice-base: LibreOffice-Base crashes when trying to open Tables view in Debian 9 Stretch. Bug #876021 [src:linux] libreoffice-writer: launching writer makes libreoffice crash Bug #876458 [src:linux] LibreOffice Writer does not launch Bug #877339 [src:linux] libreoffice-core: libreoffice SEGV in _expand_stack_to on most documents Bug #877809 [src:linux] libreoffice writer java kernel crash Bug #820081 [src:linux] libreoffice-writer: can't open LibreOffice Writer Added indication that 820081 affects libreoffice-base,libreoffice,openjdk-9-jre,jsvc,openjdk-7-jre,rustc,openjdk-8-jre,live-build,libreoffice-writer,security.debian.org The source linux and version 3.2.89-1 do not appear to match any binary packages Marked as found in versions linux/4.9.30-2+deb9u1, linux/3.16.43-2+deb8u1, linux/4.11.6-1, linux/3.2.89-1, and linux/4.9.30-2+deb9u2. Added tag(s) confirmed and upstream. Bug #865866 [src:linux] libreoffice-writer crash on startup Debian 9 i386 arch Bug #869161 [src:linux] libreoffice-base crashes with code 139 when creating a new base or opening an existing one Bug #869613 [src:linux] libreoffice write crashes (Debian 9) Bug #869649 [src:linux] Debian 9 i386 - Libreoffice write crash Bug #870070 [src:linux] Debian 9.1 stretch: LibreOffice Writer crashes at startup Bug #875269 [src:linux] libreoffice-base: LibreOffice-Base crashes when trying to open Tables view in Debian 9 Stretch. Bug #876021 [src:linux] libreoffice-writer: launching writer makes libreoffice crash Bug #876458 [src:linux] LibreOffice Writer does not launch Bug #877339 [src:linux] libreoffice-core: libreoffice SEGV in _expand_stack_to on most documents Bug #877809 [src:linux] libreoffice writer java kernel crash Merged 820081 865303 865866 869161 869613 869649 870070 875269 876021 876458 877339 877809 > thanks Stopping processing here. Please contact me if you need assistance. -- 820081: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820081 865303: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865303 865866: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865866 869161: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869161 869613: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869613 869649: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869649 870070: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870070 875269: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875269 876021: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876021 876458: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876458 877339: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877339 877809: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877809 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#877809: libreoffice writer java kernel crash
reassign 877809 src:linux forcemerge 865303 877809 thanks On Thu, Oct 05, 2017 at 10:19:18PM +0100, Andrew Rule wrote: > I recently upgraded to libreoffice 5.4.1-1 i386, and experienced the following > problem: > > While using > openjdk-8-jre version 8u144-b01-1 i386 > kernel 4.9.21 i686 built from source Yes, that kernel didn't have the bug. It doesn't have the Stack Clash security fix either I think? > then there is no problem at all, but, > > with either > kernel 4.9.51 i686 built from source, or > kernel 4.12.0-2-686-pae Debian 4.12.13-1 i686 Those have. > then using openjdk-8-jre in LibreOffice Calc works fine, Impress works fine, > but Writer crashes on load, with exit +139, both on an Intel i3 and an AMD A4. > If you turn off Java, or use the Free Software Foundation (gcj) it works and > does not crash. And you didn't even dare to check the libreoffice-writer bug list? Outstanding bugs -- Grave functionality bugs; More information needed (1 bug) #865303 [G|Mu|=☣] [src:linux] libreoffice: Libreoffice Java features crash with Linux 3.16.43-2+deb8u1 Outstanding bugs -- Important bugs; Patch Available (2 bugs) #876051 [i|+|☣] [openjdk-8-jre-headless] i386 applications using JNI may crash due to Hotspot workaround for Exec Shield #876069 [i|+|☣] [openjdk-9-jre-headless] i386 applications using JNI may crash due to Hotspot workaround for Exec Shield directly on the top You yourself say "libreoffice writer java kernel crash". The first bug says: Found in versions linux/4.9.30-2+deb9u1, linux/4.11.6-1, linux/3.2.89-1, linux/4.9.30-2+deb9u2, linux/3.16.43-2+deb8u1 and has many "friends" merged with it. > I have also amd64 architecture on the AMD A4, and have not experienced the > problem with that architecture. Yes, that is i386 only. See also https://lwn.net/Articles/727206/ https://lwn.net/Articles/727703/ Yes, this is still unfixed, but a kernel/OpenJDK bug. LO just calls JNI_StartJVM or how it's called. _OpenJDK_ crashes then. > ii libreoffice-wiki-publisher 1.2.0+LibO5.4.1-1 You can try removing this, this is just recommended to have a "full" LO install if one did apt-get install libreoffice. That one's Java and seems to be initialized on (most) "normal" writer startups, too -> the Java crash. Or use a architecture which wasn't already obsolete last decade. As you say yourself: amd64 works. Regards, Rene
Processed: Re: Bug#877809: libreoffice writer java kernel crash
Processing commands for cont...@bugs.debian.org: > reassign 877809 src:linux Bug #877809 [libreoffice] libreoffice writer java kernel crash Bug reassigned from package 'libreoffice' to 'src:linux'. No longer marked as found in versions libreoffice/1:5.4.1-1. Ignoring request to alter fixed versions of bug #877809 to the same values previously set > forcemerge 865303 877809 Bug #865303 [src:linux] libreoffice: Libreoffice Java features crash with Linux 3.16.43-2+deb8u1 Bug #865866 [src:linux] libreoffice-writer crash on startup Debian 9 i386 arch Bug #869161 [src:linux] libreoffice-base crashes with code 139 when creating a new base or opening an existing one Bug #869613 [src:linux] libreoffice write crashes (Debian 9) Bug #869649 [src:linux] Debian 9 i386 - Libreoffice write crash Bug #870070 [src:linux] Debian 9.1 stretch: LibreOffice Writer crashes at startup Bug #875269 [src:linux] libreoffice-base: LibreOffice-Base crashes when trying to open Tables view in Debian 9 Stretch. Bug #876021 [src:linux] libreoffice-writer: launching writer makes libreoffice crash Bug #876458 [src:linux] LibreOffice Writer does not launch Bug #877339 [src:linux] libreoffice-core: libreoffice SEGV in _expand_stack_to on most documents Bug #877809 [src:linux] libreoffice writer java kernel crash Severity set to 'grave' from 'important' Added indication that 877809 affects libreoffice-base,libreoffice,openjdk-9-jre,jsvc,openjdk-7-jre,rustc,openjdk-8-jre,live-build,libreoffice-writer,security.debian.org The source linux and version 3.2.89-1 do not appear to match any binary packages Marked as found in versions linux/3.16.43-2+deb8u1, linux/4.9.30-2+deb9u1, linux/4.11.6-1, linux/4.9.30-2+deb9u2, and linux/3.2.89-1. Added tag(s) confirmed and moreinfo. Bug #865866 [src:linux] libreoffice-writer crash on startup Debian 9 i386 arch Bug #869161 [src:linux] libreoffice-base crashes with code 139 when creating a new base or opening an existing one Bug #869613 [src:linux] libreoffice write crashes (Debian 9) Bug #869649 [src:linux] Debian 9 i386 - Libreoffice write crash Bug #870070 [src:linux] Debian 9.1 stretch: LibreOffice Writer crashes at startup Bug #875269 [src:linux] libreoffice-base: LibreOffice-Base crashes when trying to open Tables view in Debian 9 Stretch. Bug #876021 [src:linux] libreoffice-writer: launching writer makes libreoffice crash Bug #876458 [src:linux] LibreOffice Writer does not launch Bug #877339 [src:linux] libreoffice-core: libreoffice SEGV in _expand_stack_to on most documents Merged 865303 865866 869161 869613 869649 870070 875269 876021 876458 877339 877809 > thanks Stopping processing here. Please contact me if you need assistance. -- 865303: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865303 865866: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865866 869161: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869161 869613: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869613 869649: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869649 870070: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870070 875269: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875269 876021: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876021 876458: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876458 877339: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877339 877809: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877809 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: limit source to linux, tagging 877760
Processing commands for cont...@bugs.debian.org: > limit source linux Limiting to bugs with field 'source' containing at least one of 'linux' Limit currently set to 'source':'linux' > tags 877760 + pending confirmed Bug #877760 [src:linux] linux: KEYS: request_key() does not update/replace expired keys Added tag(s) confirmed and pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 877760: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877760 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: tagging 877760
Processing commands for cont...@bugs.debian.org: > tags 877760 + upstream fixed-upstream Bug #877760 [src:linux] linux: KEYS: request_key() does not update/replace expired keys Added tag(s) fixed-upstream and upstream. > thanks Stopping processing here. Please contact me if you need assistance. -- 877760: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877760 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#877760: linux: KEYS: request_key() does not update/replace expired keys
Control: tags -1 + patch Hi On Thu, Oct 05, 2017 at 09:06:33AM +0200, Salvatore Bonaccorso wrote: > Source: linux > Version: 3.16.7-ckt7-1 > Severity: normal > > Hi > > In 3.16.7-ckt7-1 we applied a backport of "EYS: request_key() should > reget expired keys rather than give EKEYEXPIRED", adressing #758870, > 0b0a84154eff56913e91df29de5c3a03a0029e38. [...] > Are we potentially miss any relevant needed commits between v3.16..v3.18? > (054f6180d8b5602b431b5924976c956e760488b1, "KEYS: Simplify > KEYRING_SEARCH_{NO,DO}_STATE_CHECK flags"?). I did some bisecting, and indeed it seems we were missing the second change as mentioned as well in the merge: https://git.kernel.org/linus/23c836ce5c1e1e0bb942f58a3cbc2f7fc05a08b5 > The second and third fix a bug in NFS idmapper handling whereby a key > representing a mapping between an id and a name expires and causing > EKEYEXPIRED to be seen internally in NFS (which prevents the mapping > from happening) rather than re-looking up the mapping" With attached patch on top of the (current) jessie branch in git, the problem is solved. Regards, Salvatore >From 83a57b39cea1cdd82e42483dc5a60f671c32252c Mon Sep 17 00:00:00 2001 From: Salvatore BonaccorsoDate: Thu, 5 Oct 2017 17:16:34 +0200 Subject: [PATCH] KEYS: Simplify KEYRING_SEARCH_{NO,DO}_STATE_CHECK flags Closes: #877760 --- debian/changelog | 3 + ...fy-KEYRING_SEARCH_-NO-DO-_STATE_CHECK-fla.patch | 96 ++ ...t_key-should-reget-expired-keys-rather-th.patch | 8 +- debian/patches/series | 1 + 4 files changed, 104 insertions(+), 4 deletions(-) create mode 100644 debian/patches/bugfix/all/KEYS-Simplify-KEYRING_SEARCH_-NO-DO-_STATE_CHECK-fla.patch diff --git a/debian/changelog b/debian/changelog index 55ac046e7..9bb4229ac 100644 --- a/debian/changelog +++ b/debian/changelog @@ -582,6 +582,9 @@ linux (3.16.48-1) UNRELEASED; urgency=medium - ext4: preserve i_mode if __ext4_set_acl() fails - ext4: Don't clear SGID when inheriting ACLs + [ Salvatore Bonaccorso ] + * KEYS: Simplify KEYRING_SEARCH_{NO,DO}_STATE_CHECK flags (Closes: #877760) + -- Ben Hutchings Sun, 06 Aug 2017 22:03:56 +0100 linux (3.16.43-2+deb8u5) jessie-security; urgency=medium diff --git a/debian/patches/bugfix/all/KEYS-Simplify-KEYRING_SEARCH_-NO-DO-_STATE_CHECK-fla.patch b/debian/patches/bugfix/all/KEYS-Simplify-KEYRING_SEARCH_-NO-DO-_STATE_CHECK-fla.patch new file mode 100644 index 0..44f9caee4 --- /dev/null +++ b/debian/patches/bugfix/all/KEYS-Simplify-KEYRING_SEARCH_-NO-DO-_STATE_CHECK-fla.patch @@ -0,0 +1,96 @@ +From: David Howells +Date: Mon, 1 Dec 2014 22:52:50 + +Subject: KEYS: Simplify KEYRING_SEARCH_{NO,DO}_STATE_CHECK flags +Origin: https://git.kernel.org/linus/054f6180d8b5602b431b5924976c956e760488b1 + +Simplify KEYRING_SEARCH_{NO,DO}_STATE_CHECK flags to be two variations of the +same flag. They are effectively mutually exclusive and one or the other +should be provided, but not both. + +Keyring cycle detection and key possession determination are the only things +that set NO_STATE_CHECK, except that neither flag really does anything there +because neither purpose makes use of the keyring_search_iterator() function, +but rather provides their own. + +For cycle detection we definitely want to check inside of expired keyrings, +just so that we don't create a cycle we can't get rid of. Revoked keyrings +are cleared at revocation time and can't then be reused, so shouldn't be a +problem either way. + +For possession determination, we *might* want to validate each keyring before +searching it: do you possess a key that's hidden behind an expired or just +plain inaccessible keyring? Currently, the answer is yes. Note that you +cannot, however, possess a key behind a revoked keyring because they are +cleared on revocation. + +keyring_search() sets DO_STATE_CHECK, which is correct. + +request_key_and_link() currently doesn't specify whether to check the key +state or not - but it should set DO_STATE_CHECK. + +key_get_instantiation_authkey() also currently doesn't specify whether to +check the key state or not - but it probably should also set DO_STATE_CHECK. + +Signed-off-by: David Howells +Tested-by: Chuck Lever +[carnil: Backported to 3.16: Adjust context] +--- + security/keys/keyring.c | 7 --- + security/keys/request_key.c | 1 + + security/keys/request_key_auth.c | 1 + + 3 files changed, 6 insertions(+), 3 deletions(-) + +--- a/security/keys/keyring.c b/security/keys/keyring.c +@@ -609,6 +609,10 @@ static bool search_nested_keyrings(struc + ctx->index_key.type->name, + ctx->index_key.description); + ++#define STATE_CHECKS (KEYRING_SEARCH_NO_STATE_CHECK | KEYRING_SEARCH_DO_STATE_CHECK) ++ BUG_ON((ctx->flags & STATE_CHECKS) == 0 || ++ (ctx->flags & STATE_CHECKS)
Processed: Re: Bug#877760: linux: KEYS: request_key() does not update/replace expired keys
Processing control commands: > tags -1 + patch Bug #877760 [src:linux] linux: KEYS: request_key() does not update/replace expired keys Added tag(s) patch. -- 877760: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877760 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Secure boot signing infrastructure - feedback request
Hello all, As you probably already know, Debian doesn't support the Secure Boot chain yet. To support it we need to sign Grub and the Kernel with our key, so we are discussing the best infrastructure for this workflow. The first approach we had was to add a by-hand script in Dak as described here https://wiki.debian.org/SecureBoot#First_option:_by-hand_script_in_dak But this option wasn't well received by the ftpteam The second approach we have is to add some debhelper scripts (e.g dh_sign...) that will access a signing service which will sign the binaries with Debian's key. We would use the dh_sign... helpers when making an extra binary package. buildd would then publish the -signed version of the package in the archives. Please see a more detailed explanation here https://wiki.debian.org/SecureBoot#Second_option:_use_buildd_.2B-_debhelper_instead_of_dak A current known issue with this approach is the NEW queue: it requires the maintainer to also upload binaries for an architecture on first upload, and these binaries are not rebuilt by the buildd ( see https://wiki.debian.org/SecureBoot#Issues ). I would like to know everyone's opinions about these approaches, if you agree to go forward with the second approach described above and how do we solve the NEW queue policy issue. Thanks Helen Koike
Re: [PATCH v3] scripts/package/builddeb: split generating packaging and build
On Wed, 2017-10-04 at 13:38 +0300, Riku Voipio wrote: > > I see the same problem for bindeb-pkg as in v2. > > The parallel build overload? I'm totally puzzled then. Debian is > still > stuck with make 4.1, so I guess there is a change in behaviour on > later makes. > > > "make deb-pkg" gave me tons of warnings, then finally fails to > > build: I have seen similar fork bombs when using kernel-package to build the kernel. And no, I couldn't much debug back then. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807574 At that time, realizing that the upstream kernel has a bindeb-pkg target, was a big relief. -- Given the large number of mailing lists I follow, I request you to CC me in replies for quicker response
Processed: [bts-link] source package linux
Processing commands for cont...@bugs.debian.org: > # > # bts-link upstream status pull for source package linux > # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html > # > user bts-link-upstr...@lists.alioth.debian.org Setting user to bts-link-upstr...@lists.alioth.debian.org (was bts-link-de...@lists.alioth.debian.org). > # remote status report for #863266 (http://bugs.debian.org/863266) > # Bug title: libvirt-daemon: spice port conflict - multiple VMs want Port 5900 > # * https://bugzilla.redhat.com/show_bug.cgi?id=1432684 > # * remote status changed: ON-QA -> CLOSED > # * remote resolution changed: (?) -> ERRATA > # * closed upstream > tags 863266 + fixed-upstream Bug #863266 [linux] libvirt-daemon: spice port conflict - multiple VMs want Port 5900 Added tag(s) fixed-upstream. > usertags 863266 - status-ON-QA Usertags were: status-ON-QA. Usertags are now: . > usertags 863266 + status-CLOSED resolution-ERRATA There were no usertags set. Usertags are now: resolution-ERRATA status-CLOSED. > thanks Stopping processing here. Please contact me if you need assistance. -- 863266: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863266 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#877764: linux-image-amd64: cifs mount gets automatically the file_mode=0755,dir_mode=0755 options
hi, when sid pulled the 4.13 kernel, i noticed that these mounts automatically get the file_mode=0755 and dir_mode=0755 options. It appears that this indicates the server does not support Unix extensions. What is the file server running? it's the debian sid's samba daemon: Version 4.6.7-Debian And the 'nounix' confirms that. ohhh, i did not noticed this. anyway i've looked at smbd config and i contains the line unix extensions = yes. Are there any messages in the kernel log relating to cifs? nothing interesting. [ 15.659306] FS-Cache: Netfs 'cifs' registered for caching [ 15.659358] Key type cifs.spnego registered [ 15.659362] Key type cifs.idmap registered regards, cs
Bug#877764: linux-image-amd64: cifs mount gets automatically the file_mode=0755,dir_mode=0755 options
Control: reassign -1 src:linux 4.13.4-1 Control: tag -1 moreinfo On Thu, 2017-10-05 at 10:18 +0200, matecs wrote: > Package: linux-image-amd64 > Version: 4.13+86 > Severity: normal > > Dear Maintainer, > > i'm mounting my shares through cifs for years. > when sid pulled the 4.13 kernel, i noticed that these mounts > automatically get the file_mode=0755 and dir_mode=0755 options. It appears that this indicates the server does not support Unix extensions. What is the file server running? > the fstab looks like this: > //nas.mchome.nop.hu/mc36 /nfs cifs > user=mc36,password=***,uid=mc36,gid=mc36 0 0 > > then the resulting mount looks like this: > //nas.mchome.nop.hu/mc36 on /nfs type cifs > (rw,relatime,vers=3.0,cache=strict,username=mc36,domain=,uid=1000,for > ceuid,gid=1000,forcegid,addr=2001:0db8:1001:0255:0200:4eff:fe36:4e35, > file_mode=0755,dir_mode=0755,nounix,serverino,mapposix,rsize=1048576, > wsize=1048576,echo_interval=60,actimeo=1,user=mc36) And the 'nounix' confirms that. Are there any messages in the kernel log relating to cifs? > things look similarly if i add vers=2.0 to the fstab. only vers=1.0 > solves the issue. [...] Version 1 should no longer be used as it has well-known and unfixable security issues. The default protocol version for the cifs filesystem was changed to 3 in Linux 4.13: https://git.kernel.org/linus/eef914a9eb5eb83e60eb498315a491cd1edc13a1 Ben. -- Ben Hutchings Make three consecutive correct guesses and you will be considered an expert. signature.asc Description: This is a digitally signed message part
Processed: Re: Bug#877764: linux-image-amd64: cifs mount gets automatically the file_mode=0755,dir_mode=0755 options
Processing control commands: > reassign -1 src:linux 4.13.4-1 Bug #877764 [linux-image-amd64] linux-image-amd64: cifs mount gets automatically the file_mode=0755,dir_mode=0755 options Bug reassigned from package 'linux-image-amd64' to 'src:linux'. No longer marked as found in versions linux-latest/86. Ignoring request to alter fixed versions of bug #877764 to the same values previously set Bug #877764 [src:linux] linux-image-amd64: cifs mount gets automatically the file_mode=0755,dir_mode=0755 options Marked as found in versions linux/4.13.4-1. > tag -1 moreinfo Bug #877764 [src:linux] linux-image-amd64: cifs mount gets automatically the file_mode=0755,dir_mode=0755 options Added tag(s) moreinfo. -- 877764: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877764 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#877779: linux: modpost uses wrong sizes for mips-octeon kernel
Source: linux Version: 4.12.13-1 Severity: normal Hi, I recently attempted to install an out-of-tree module (an old version of the octeon mmc driver) on an octeon machine running big endian 32-bit mips. In this configuration, the kernel is 64-bit, but userspace is 32-bit. The module build failed with this error: > LD [M] /var/lib/dkms/octeon-mmc/9/build/octeon-mmc.o > Building modules, stage 2. > MODPOST 1 modules > FATAL: /var/lib/dkms/octeon-mmc/9/build/octeon-mmc: sizeof(struct > of_device_id)=196 is not a modulo of the size of section > __mod_of___device_table=600. > Fix definition of struct of_device_id in mod_devicetable.h of_device_id is defined like this in mod_devicetable.h: > struct of_device_id { > charname[32]; > chartype[32]; > charcompatible[128]; > const void *data; > }; The size of this structure is 200 bytes and not 196 byte as modpost claims because the kernel is compiled as 64-bit (so the pointer at the end is 8 bytes instead of 4). I think there is a bug in the way Debian compiles modpost, because using upstream's modpost works correctly. I see that the real-XXX/devicetable-offsets.s file gets compiled with the target compiler, but not with the target flags so flags such as "-mabi=64 -mnoabicalls" which are used in 64-bit MIPS kernels are not used. This will cause the compiler to default to the userspace ABI which is 32-bit in this case. I'm not sure what the correct solution is here. Using the target flags directly might make modpost specific to a kernel flavour. Hacking in some special flags for mips* doesn't sound great either. I have not tested any other platforms, but I am guessing this issue will affect other platforms when the size of pointers in userspace and the kernel differ. James signature.asc Description: OpenPGP digital signature
Processed: fixed 877760 in 3.18-1~exp1
Processing commands for cont...@bugs.debian.org: > fixed 877760 3.18-1~exp1 Bug #877760 [src:linux] linux: KEYS: request_key() does not update/replace expired keys Marked as fixed in versions linux/3.18-1~exp1. > thanks Stopping processing here. Please contact me if you need assistance. -- 877760: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877760 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Re: reports bugs
On Mon, Oct 02, 2017 at 10:41:03PM +0200, Alain wrote: > don't want to receive reports bugs . please take care of ! You either subscribed to the debian-kernel mailing list or to the pts. If the former please send a message to debian-kernel-requ...@lists.debian.org with Subject: unsubscribe and then confirm the reply to unsubscribe from the list. If the latter (I think) go to https://tracker.debian.org/pkg/linux, login and then click unsubscribe. Best regards Uwe -- Pengutronix e.K. | Uwe Kleine-König| Industrial Linux Solutions | http://www.pengutronix.de/ |
Bug#877764: linux-image-amd64: cifs mount gets automatically the file_mode=0755,dir_mode=0755 options
Package: linux-image-amd64 Version: 4.13+86 Severity: normal Dear Maintainer, i'm mounting my shares through cifs for years. when sid pulled the 4.13 kernel, i noticed that these mounts automatically get the file_mode=0755 and dir_mode=0755 options. the fstab looks like this: //nas.mchome.nop.hu/mc36 /nfs cifs user=mc36,password=***,uid=mc36,gid=mc36 0 0 then the resulting mount looks like this: //nas.mchome.nop.hu/mc36 on /nfs type cifs (rw,relatime,vers=3.0,cache=strict,username=mc36,domain=,uid=1000,forceuid,gid=1000,forcegid,addr=2001:0db8:1001:0255:0200:4eff:fe36:4e35,file_mode=0755,dir_mode=0755,nounix,serverino,mapposix,rsize=1048576,wsize=1048576,echo_interval=60,actimeo=1,user=mc36) things look similarly if i add vers=2.0 to the fstab. only vers=1.0 solves the issue. -- System Information: Debian Release: buster/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 4.13.0-1-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US, LC_CTYPE=en_US (charmap=locale: Cannot set LC_CTYPE to default locale: No such file or directory locale: Cannot set LC_MESSAGES to default locale: No such file or directory locale: Cannot set LC_ALL to default locale: No such file or directory ANSI_X3.4-1968), LANGUAGE=en_US (charmap=locale: Cannot set LC_CTYPE to default locale: No such file or directory locale: Cannot set LC_MESSAGES to default locale: No such file or directory locale: Cannot set LC_ALL to default locale: No such file or directory ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages linux-image-amd64 depends on: ii linux-image-4.13.0-1-amd64 4.13.4-1 linux-image-amd64 recommends no packages. linux-image-amd64 suggests no packages. -- debconf information: perl: warning: Setting locale failed. perl: warning: Please check that your locale settings: LANGUAGE = (unset), LC_ALL = (unset), LANG = "en_US" are supported and installed on your system. perl: warning: Falling back to the standard locale ("C"). locale: Cannot set LC_CTYPE to default locale: No such file or directory locale: Cannot set LC_MESSAGES to default locale: No such file or directory locale: Cannot set LC_ALL to default locale: No such file or directory
Re: [PATCH v3] scripts/package/builddeb: split generating packaging and build
Hi Riku, 2017-10-04 19:38 GMT+09:00 Riku Voipio: > On 4 October 2017 at 12:12, Masahiro Yamada > wrote: >> Hi Riku, > >> 2017-10-02 19:43 GMT+09:00 : >>> From: Riku Voipio >>> >>> Move debian/ directory generation out of builddeb to a new script, >>> mkdebian. The package build commands are kept in builddeb, which >>> is now an internal command called from debian/rules. >>> >>> With these changes in place, we can now use dpkg-buildpackage from >>> deb-pkg and bindeb-pkg removing need for handrolled source/changes >>> generation. >>> >>> This patch is based on the criticism of the current state of builddeb >>> discussed on: >>> >>> https://patchwork.kernel.org/patch/9656403/ >>> >>> Signed-off-by: Riku Voipio >>> --- >>> changes since v2: >>> - revert back to intdeb-pkg target >>> - fix parellel builds from deb-pkg targets > >> No. Not fixed. > >> I see the same problem for bindeb-pkg as in v2. > > The parallel build overload? Yes. > I'm totally puzzled then. Debian is still > stuck with make 4.1, so I guess there is a change in behaviour on > later makes. Can you test the patch with GNU Make 4.2 or newer? You can download tarballs https://ftp.gnu.org/gnu/make/ The build process is pretty easy, ./configure, make, make install, as usual. >> "make deb-pkg" gave me tons of warnings, then finally fails to build: > >> rm -rf debian/*tmp debian/files >> mv debian/ debian.backup # debian/ might be cleaned away >> make clean >> mv debian.backup debian >> dpkg-source -i.git -b linux >> dpkg-source: warning: no source format specified in >> debian/source/format, see dpkg-source(1) >> dpkg-source: info: using source format '1.0' >> dpkg-source: warning: source directory 'linux' is not >> - 'linux-4.13.0+-4.13.0+' >> dpkg-source: warning: .orig directory name linux.orig is not >> - (wanted linux-4.13.0+-4.13.0+.orig) >> dpkg-source: info: building linux-4.13.0+ using existing >> linux-4.13.0+_4.13.0+.orig.tar.gz >> dpkg-source: info: building linux-4.13.0+ in linux-4.13.0+_4.13.0+-7.diff.gz >> dpkg-source: warning: ignoring deletion of file .scmversion, use >> --include-removal to override >> dpkg-source: warning: ignoring deletion of directory drivers/lguest >> dpkg-source: warning: ignoring deletion of file >> drivers/video/console/fbcon_rotate.h, use --include-removal to >> override >> dpkg-source: warning: ignoring deletion of file >> drivers/video/console/fbcon.h, use --include-removal to override >> dpkg-source: warning: ignoring deletion of file >> drivers/video/console/fbcon_cw.c, use --include-removal to override >> dpkg-source: warning: ignoring deletion of file >> drivers/video/console/fbcon_rotate.c, use --include-removal to >> override >> dpkg-source: warning: ignoring deletion of file >> drivers/video/console/fbcon.c, use --include-removal to override >> >> >> ... >> >> >> dpkg-source: info: use the '3.0 (quilt)' format to have separate and >> documented changes to upstream files, see dpkg-source(1) >> dpkg-source: error: unrepresentable changes to source >> >> >> Do you have a clue? > > It looks like making the tarball (or renaming it) failed, and > dpkg-source picked up and older orig.tar.gz with same name. I think a > full log would be useful here, because there probably is bug here in > my patch. I saw this build failure some times, but I cannot reproduce it today. I have not tracked down the condition it happens under. I will save the log if it happens next time. >>> +cat < debian/rules >>> +#!/usr/bin/make -f >>> + >>> +build: >>> + \$(MAKE) KERNELRELEASE=${version} ARCH=${ARCH} KBUILD_SRC= >>> + >>> +binary-arch: >>> + \$(MAKE) KERNELRELEASE=${version} ARCH=${ARCH} KBUILD_SRC= >>> intdeb-pkg >>> + >>> +clean: >>> + rm -rf debian/*tmp debian/files >>> + mv debian/ debian.backup # debian/ might be cleaned away >>> + \$(MAKE) clean >>> + mv debian.backup debian >> >> >> "mv debian debian.backup" is unnecessary, I think. >> >> >> I think you saw >> >> clean-dirs += $(objtree)/debian/ >> >> in scripts/package/Makefile. > >> Please notice this is cleaned-up by "make mrproper" >> because Kbuild does not descend under scripts/ for "make clean". > > That is how it was in the old version of builddeb as well. I'll submit > another patch to remove the mv-in-clean hack. Yes, please do so. -- Best Regards Masahiro Yamada
Bug#877763: WARNING: CPU: 1 PID: 431 at /build/linux-wJBo44/linux-4.13.4/fs/btrfs/ctree.h:1559 btrfs_update_device+0x1b2/0x1c0 [btrfs]
Package: src:linux Version: 4.13.4-1 Severity: normal -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 After upgrading to 4.13.0-1-amd64, i'm seeing new traces in the dmesg. - -- Package-specific info: ** Version: Linux version 4.13.0-1-amd64 (debian-kernel@lists.debian.org) (gcc version 6.4.0 20170920 (Debian 6.4.0-7)) #1 SMP Debian 4.13.4-1 (2017-10-01) ** Command line: BOOT_IMAGE=/@/boot/vmlinuz-4.13.0-1-amd64 root=UUID=ccd67dc6-6b12-47f6-bef7-a17c40b87332 ro rootflags=subvol=@ cryptdevice=UUID=7093dff9-dea8-49a2-bc83-653d5b677b9b:sdb3_luks,UUID=f533b8e8-b916-4b60-9cfc-10f4a56cc146:sdc3_luks,UUID=dcff9ee8-30d8-40e1-9b87-127c540d3d9d:sda3_luks ** Tainted: W (512) * Taint on warning. ** Kernel log: [ 3502.772087] [ cut here ] [ 3502.772124] WARNING: CPU: 7 PID: 18428 at /build/linux-wJBo44/linux-4.13.4/fs/btrfs/ctree.h:1559 btrfs_update_device+0x1b2/0x1c0 [btrfs] [ 3502.772126] Modules linked in: cpufreq_userspace cpufreq_powersave cpufreq_conservative snd_hda_codec_hdmi binfmt_misc nls_ascii nls_cp437 snd_hda_codec_realtek vfat snd_hda_codec_generic snd_hda_intel fat snd_hda_codec snd_hda_core eeepc_wmi asus_wmi sparse_keymap rfkill video amdkfd wmi_bmof snd_hwdep snd_pcm mxm_wmi radeon efi_pstore snd_timer xhci_pci edac_mce_amd snd efivars ttm xhci_hcd e1000e kvm_amd kvm irqbypass crct10dif_pclmul ptp fam15h_power pcspkr drm_kms_helper pps_core drm i2c_algo_bit k10temp sg button tpm_infineon soundcore crc32_pclmul ghash_clmulni_intel sp5100_tco i2c_piix4 wmi shpchp acpi_cpufreq it87 hwmon_vid configfs loop parport_pc ppdev lp parport sunrpc efivarfs ip_tables x_tables autofs4 dm_crypt dm_mod raid10 raid456 libcrc32c async_raid6_recov async_memcpy async_pq [ 3502.772159] async_xor async_tx raid1 raid0 multipath linear btrfs crc32c_generic xor raid6_pq md_mod joydev hid_generic usbhid hid sd_mod ohci_pci crc32c_intel aesni_intel aes_x86_64 crypto_simd ehci_pci cryptd ohci_hcd glue_helper evdev ahci ehci_hcd libahci serio_raw libata usbcore usb_common scsi_mod [ 3502.772178] CPU: 7 PID: 18428 Comm: ld Not tainted 4.13.0-1-amd64 #1 Debian 4.13.4-1 [ 3502.772180] Hardware name: To be filled by O.E.M. To be filled by O.E.M./CROSSHAIR V FORMULA-Z, BIOS 2201 03/23/2015 [ 3502.772182] task: 93cfae69e0c0 task.stack: bcc308d1 [ 3502.772201] RIP: 0010:btrfs_update_device+0x1b2/0x1c0 [btrfs] [ 3502.772202] RSP: 0018:bcc308d13af8 EFLAGS: 00010206 [ 3502.772204] RAX: 0fff RBX: 93d102d17310 RCX: 03a380fd1e00 [ 3502.772206] RDX: 0004 RSI: 3efa RDI: 93cfe462c7e8 [ 3502.772207] RBP: 93d1c6c80c00 R08: 3efe R09: bcc308d13ab0 [ 3502.772209] R10: R11: 0003 R12: [ 3502.772210] R13: 3eda R14: 93cfe462c7e8 R15: fff4 [ 3502.772212] FS: 7fe1328e2400() GS:93d1eedc() knlGS: [ 3502.772213] CS: 0010 DS: ES: CR0: 80050033 [ 3502.772214] CR2: 7f3970f4f000 CR3: 0005dd051000 CR4: 000406e0 [ 3502.772216] Call Trace: [ 3502.772237] ? btrfs_finish_chunk_alloc+0x131/0x4e0 [btrfs] [ 3502.772252] ? btrfs_insert_item+0x7e/0xf0 [btrfs] [ 3502.772267] ? btrfs_create_pending_block_groups+0x144/0x250 [btrfs] [ 3502.772284] ? __btrfs_end_transaction+0x8e/0x2e0 [btrfs] [ 3502.772301] ? __btrfs_prealloc_file_range+0x355/0x470 [btrfs] [ 3502.772319] ? btrfs_prealloc_file_range+0x10/0x20 [btrfs] [ 3502.772336] ? btrfs_fallocate+0x742/0x11f0 [btrfs] [ 3502.772340] ? vfs_fallocate+0x151/0x270 [ 3502.772342] ? SyS_fallocate+0x43/0x80 [ 3502.772345] ? system_call_fast_compare_end+0xc/0x97 [ 3502.772347] Code: 4c 89 f7 45 31 c0 ba 10 00 00 00 4c 89 ee e8 16 26 ff ff 4c 89 f7 e8 be fd fc ff e9 de fe ff ff 41 bc f4 ff ff ff e9 db fe ff ff <0f> ff eb b7 e8 75 93 2a ec 0f 1f 44 00 00 0f 1f 44 00 00 41 55 [ 3502.772370] ---[ end trace 258650fddcd0b268 ]--- [ 3502.772522] [ cut here ] [ 3502.772571] WARNING: CPU: 3 PID: 18436 at /build/linux-wJBo44/linux-4.13.4/fs/btrfs/ctree.h:1559 btrfs_update_device+0x1b2/0x1c0 [btrfs] [ 3502.772573] Modules linked in: cpufreq_userspace cpufreq_powersave cpufreq_conservative snd_hda_codec_hdmi binfmt_misc nls_ascii nls_cp437 snd_hda_codec_realtek vfat snd_hda_codec_generic snd_hda_intel fat snd_hda_codec snd_hda_core eeepc_wmi asus_wmi sparse_keymap rfkill video amdkfd wmi_bmof snd_hwdep snd_pcm mxm_wmi radeon efi_pstore snd_timer xhci_pci edac_mce_amd snd efivars ttm xhci_hcd e1000e kvm_amd kvm irqbypass crct10dif_pclmul ptp fam15h_power pcspkr drm_kms_helper pps_core drm i2c_algo_bit k10temp sg button tpm_infineon soundcore crc32_pclmul ghash_clmulni_intel sp5100_tco i2c_piix4 wmi shpchp acpi_cpufreq it87 hwmon_vid configfs loop parport_pc ppdev lp parport sunrpc efivarfs ip_tables x_tables autofs4 dm_crypt dm_mod raid10 raid456 libcrc32c async_raid6_recov async_memcpy async_pq [ 3502.772610]
Bug#877760: linux: KEYS: request_key() does not update/replace expired keys
Source: linux Version: 3.16.7-ckt7-1 Severity: normal Hi In 3.16.7-ckt7-1 we applied a backport of "EYS: request_key() should reget expired keys rather than give EKEYEXPIRED", adressing #758870, 0b0a84154eff56913e91df29de5c3a03a0029e38. I noticed that in jessie, with still up to 3.16.43-2+deb8u5 the following test-rocedure , [ keytest.sh ] | #!/bin/sh | keyctl request2 user debug:dummy a @s | keyctl timeout %user:debug:dummy 3 | keyctl show %user:debug:dummy | sleep 4 | keyctl request2 user debug:dummy a @s ` still leads to: root@jessie-amd64:~# ./keytest 542551421 Keyring 542551421 --alswrv 0 0 user: debug:dummy request_key: Key has expired root@jessie-amd64:~# ./keytest request_key: Key has expired Can't find 'user:debug:dummy' Can't find 'user:debug:dummy' request_key: Key has expired root@jessie-amd64:~# In stretch, this does not happen (with 4.9.30-2+deb9u5) root@stretch-amd64:~# ./keytest 89439986 Keyring 89439986 --alswrv 0 0 user: debug:dummy 25490408 root@stretch-amd64:~# ./keytest 25490408 Keyring 25490408 --alswrv 0 0 user: debug:dummy 546453714 root@stretch-amd64:~# or with 4.9.30-2+deb9u5~bpo8+1 from backports: root@jessie-amd64:~# ./keytest 142545203 Keyring 142545203 --alswrv 0 0 user: debug:dummy 86582269 root@jessie-amd64:~# ./keytest 86582269 Keyring 86582269 --alswrv 0 0 user: debug:dummy 358240859 root@jessie-amd64:~# Are we potentially miss any relevant needed commits between v3.16..v3.18? (054f6180d8b5602b431b5924976c956e760488b1, "KEYS: Simplify KEYRING_SEARCH_{NO,DO}_STATE_CHECK flags"?). Regards, Salvatore
Processed: retitle 876762 to linux-image-3.16.0-4-amd64: tmpfs file system sometimes has undeletable directories/files
Processing commands for cont...@bugs.debian.org: > retitle 876762 linux-image-3.16.0-4-amd64: tmpfs file system sometimes has > undeletable directories/files Bug #876762 [src:linux] linux-image-3.16.0-4-amd64: tmpf file system sometimes has undeletable directories/files Changed Bug title to 'linux-image-3.16.0-4-amd64: tmpfs file system sometimes has undeletable directories/files' from 'linux-image-3.16.0-4-amd64: tmpf file system sometimes has undeletable directories/files'. > thanks Stopping processing here. Please contact me if you need assistance. -- 876762: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876762 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems