Processed: fixed 649294 in 3.1.1-1

2011-12-01 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 fixed 649294 3.1.1-1
Bug #649294 [linux-2.6] linux-2.6: Duplicate battery after suspend/resume
There is no source info for the package 'linux-2.6' at version '3.1.1-1' with 
architecture ''
Unable to make a source version for version '3.1.1-1'
Bug Marked as fixed in versions 3.1.1-1.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
649294: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649294
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.13227420309876.transcr...@bugs.debian.org



Bug#613321: linux-image-amd64: Please enable 'memtest' option for all linux kernels

2011-12-01 Thread Jonathan Nieder
Dmitry Smirnov wrote:

 It is probably obvious to everyone that MEMTEST is harmless. 
 Then why not enable it without painful discussions? 

Having a feature enabled in the Debian kernel (at release time) is a
promise to continue supporting it for the period in which that release
is supported.  It seems perfectly sane to me that the kernel
maintainers might apply their own taste in deciding whether it is
worth doing so.

(Kernel image size is also a consideration, though probably not a
major worry in this particular example.)

[...]
 If just few requests for a feature is not enough to convince that we need it, 
 how many people should ask, exactly, in order to make the change?

One reliable contributor.  Or just describe a use case that makes it a
compelling addition to Debian.  (Since there is already a memtest86+
package, replacing memtest86+ isn't one.)

Thanks for your interest, and hope that helps,
Jonathan



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20111201120903.ga10...@elie.hsd1.il.comcast.net



Bug#613321: linux-image-amd64: Please enable 'memtest' option for all linux kernels

2011-12-01 Thread Uwe Kleine-König
On Thu, Dec 01, 2011 at 06:09:03AM -0600, Jonathan Nieder wrote:
 Dmitry Smirnov wrote:
 
  It is probably obvious to everyone that MEMTEST is harmless. 
  Then why not enable it without painful discussions? 
 
 Having a feature enabled in the Debian kernel (at release time) is a
 promise to continue supporting it for the period in which that release
 is supported.  It seems perfectly sane to me that the kernel
 maintainers might apply their own taste in deciding whether it is
 worth doing so.
 
 (Kernel image size is also a consideration, though probably not a
 major worry in this particular example.)
 
 [...]
  If just few requests for a feature is not enough to convince that we need 
  it, 
  how many people should ask, exactly, in order to make the change?
 
 One reliable contributor.  Or just describe a use case that makes it a
 compelling addition to Debian.  (Since there is already a memtest86+
 package, replacing memtest86+ isn't one.)
If I understood correctly the usecase is a bit different from
memtest86+. With the latter you have a test case to determine if your
RAM is bad (or not). With the memtest kernel option memory is tested
before it's given out to kmalloc. So it is able in some cases to just
not give out bad parts of RAM allowing to use RAM that is a bit broken.

Having said that I don't know if it's sensible to add to Debian as I
didn't test runtime and binary size overhead.

Best regards
Uwe

-- 
Pengutronix e.K.   | Uwe Kleine-König|
Industrial Linux Solutions | http://www.pengutronix.de/  |



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20111201130912.gk26...@pengutronix.de



Bug#633526: vserver kernel breaks ssh public_key authentication on NFS

2011-12-01 Thread Mirco Bauer
tags 633526 + patch
retitle 633526 NFS client uid/gid cache broken on VServer kernels
thanks

Herbert Poetzl wrote:

 we now understand the problem, and it was fixed for 
 3.0.4 with the following patch: 

 http://vserver.13thfloor.at/ExperimentalT/delta-nfs-fix02.diff

I can confirm that this patch is fixing the issue. I have tested the patch on 
top of linux-2.6 2.6.32-37 on a production server
and we no longer experience the NFS uid/gid issue.

The issue can easily be tested by doing ls -l $file on a NFS mount. The 
values will show up correctly.
After cat $file  /dev/null; ls -l $file it will suddenly show wrong uid/gid 
values of: 4294967294/4294967294 (-2/-2)
Waiting for about 20 seconds ls -l $file will show again correct values. So 
the client cached values are clearly the problem.

I strongly recommend to include the patch into the next stable point release as 
this is major NFS regression from Debian Lenny.

Regards,

Mirco 'meebey' Bauer

PGP-Key ID: 0xEEF946C8

FOSS Developermee...@meebey.net  http://www.meebey.net/
PEAR Developermee...@php.net http://pear.php.net/
Debian Developer  mee...@debian.org  http://www.debian.org/




-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4ed78693.1050...@debian.org



Processed: Re: vserver kernel breaks ssh public_key authentication on NFS

2011-12-01 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 633526 + patch
Bug #633526 [linux-2.6] vserver kernel breaks ssh public_key authentication on 
NFS
Added tag(s) patch.
 retitle 633526 NFS client uid/gid cache broken on VServer kernels
Bug #633526 [linux-2.6] vserver kernel breaks ssh public_key authentication on 
NFS
Changed Bug title to 'NFS client uid/gid cache broken on VServer kernels' from 
'vserver kernel breaks ssh public_key authentication on NFS'
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
633526: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=633526
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.132274811820203.transcr...@bugs.debian.org



Bug#650652: linux-image-2.6.32-5-amd64: Kernel IPsec code rejects 288-bit keys for AES-CTR as being too long

2011-12-01 Thread Calvin Owens

Package: linux-2.6
Version: 2.6.32-38
Severity: important
Tags: patch


The kernel incorrectly rejects 288-bit keys for AES-CTR (256 + 32 for 
nonce) as being too
long. This is a rather major deficiency, as it prevents using 
AES-256-CTR at all for IPsec.


This has been fixed as of the 3.0.3-stable kernel release upstream.
Here is the patch: https://lkml.org/lkml/2011/8/14/188

-- Package-specific info:
** Version:
Linux version 2.6.32-5-amd64 (Debian 2.6.32-38) (b...@decadent.org.uk) 
(gcc version 4.3.5 (Debian 4.3.5-4) ) #1 SMP Mon Oct 3 03:59:20 UTC 2011


** Command line:
BOOT_IMAGE=/boot/vmlinuz-2.6.32-5-amd64 
root=UUID=f6d920b5-0a98-418c-bb19-1657b61fc7e5 ro quiet


** Not tainted

** Kernel log:
[1190996.380519] device eth1 entered promiscuous mode
[1190998.570627] device eth1 left promiscuous mode
[1191001.504018] device eth1 entered promiscuous mode
[1191003.256015] device eth1 left promiscuous mode
[1191013.064018] device eth1 entered promiscuous mode
[1191014.264016] device eth1 left promiscuous mode
[1191016.692018] device eth1 entered promiscuous mode
[1191020.424015] device eth1 left promiscuous mode
[1191028.900018] device eth1 entered promiscuous mode
[1191028.932016] device eth1 left promiscuous mode
[1191033.364018] device eth1 entered promiscuous mode
[1191033.396015] device eth1 left promiscuous mode
[1191039.504018] device eth1 entered promiscuous mode
[1191040.852014] device eth1 left promiscuous mode

** Model information
sys_vendor: Gigabyte Technology Co., Ltd.
product_name: GA-MA770-DS3P
product_version:
chassis_vendor: Gigabyte Technology Co., Ltd.
chassis_version:
bios_vendor: Award Software International, Inc.
bios_version: F5
board_vendor: Gigabyte Technology Co., Ltd.
board_name: GA-MA770-DS3P
board_version: x.x

** Loaded modules:
Module  Size  Used by
xt_owner1063  1
ipt_LOG 4518  2
xt_state1303  4
xt_tcpudp   2319  15
xt_mark  917  2
iptable_mangle  2817  1
xt_MARK  917  1
ipt_MASQUERADE  1554  1
iptable_nat 4299  1
nf_nat 13388  2 ipt_MASQUERADE,iptable_nat
nf_conntrack_ipv4   9833  7 iptable_nat,nf_nat
nf_defrag_ipv4  1139  1 nf_conntrack_ipv4
ip6table_filter 2384  1
ip6_tables 15107  1 ip6table_filter
iptable_filter  2258  1
ip_tables  13915  3 iptable_mangle,iptable_nat,iptable_filter
x_tables   12845  10 
xt_owner,ipt_LOG,xt_state,xt_tcpudp,xt_mark,xt_MARK,ipt_MASQUERADE,iptable_nat,ip6_tables,ip_tables

nf_conntrack_irc3347  0
nf_conntrack_ftp5537  0
nf_conntrack   46535  7 
xt_state,ipt_MASQUERADE,iptable_nat,nf_nat,nf_conntrack_ipv4,nf_conntrack_irc,nf_conntrack_ftp

authenc 5674  2
esp44805  2
xfrm4_mode_tunnel   1696  4
deflate 1767  0
zlib_deflate   17746  1 deflate
ctr 3363  0
twofish 6025  0
twofish_common 13472  1 twofish
camellia   17463  0
serpent16791  0
blowfish7944  0
cast5  16349  0
des_generic15475  0
cbc 2539  2
aes_x86_64  7340  4
aes_generic25714  1 aes_x86_64
xcbc2325  0
rmd160  7104  0
sha256_generic  8692  0
sha1_generic1759  2
hmac2593  4
crypto_null 2492  0
af_key 25421  0
loop   11799  0
firewire_sbp2  11514  0
arc41274  2
ath5k 122959  0
ath13386  1 ath5k
radeon574908  0
mac80211  178876  1 ath5k
ttm40162  1 radeon
cfg80211  130170  3 ath5k,ath,mac80211
rfkill 13044  1 cfg80211
compat 12014  3 ath5k,mac80211,cfg80211
drm_kms_helper 20369  1 radeon
pcmcia_core24118  1 compat
led_class   2433  2 ath5k,compat
drm   142279  3 radeon,ttm,drm_kms_helper
i2c_algo_bit4225  1 radeon
snd_hda_codec_realtek   235618  1
edac_core  29261  0
edac_mce_amd6433  0
i2c_piix4   8328  0
i2c_core   15819  5 
radeon,drm_kms_helper,drm,i2c_algo_bit,i2c_piix4

snd_hda_intel  20035  0
snd_hda_codec  54244  2 snd_hda_codec_realtek,snd_hda_intel
snd_hwdep   5380  1 snd_hda_codec
k8temp  3283  0
snd_pcm60487  2 snd_hda_intel,snd_hda_codec
snd_timer  15598  1 snd_pcm
snd46526  6 
snd_hda_codec_realtek,snd_hda_intel,snd_hda_codec,snd_hwdep,snd_pcm,snd_timer

soundcore   4598  1 snd
snd_page_alloc  6249  2 snd_hda_intel,snd_pcm
pcspkr  1699  0
evdev   7352  3
processor  29935  0
wmi

Re: Moving default module/package lists out of kernel-wedge

2011-12-01 Thread Joey Hess
Ben Hutchings wrote:
 It's fairly obvious that the default module lists for Linux should be
 moved to the linux-2.6 source package.  We can do that right now and use
 relative paths to include them in the per-architecture/flavour lists.
 However the #include foo-modules syntax would then be unused.  It
 seems like it would be better to allow overriding the directory that is
 searched.

Yes, or search in both places.

 Also, kernel-wedge has a single package template shared between Linux
 and kFreeBSD.  Is this necessary?  (I don't know how the installer
 selects module packages to use.)  Should the Linux package template also
 be moved to the linux-2.6 source package?

It does so based on Priority, plus some special cases. There would not
be much duplication involved in copying the package-list into linux-2.6,
since kfreebsd only uses 8 entries from that so far. And beyond the odd
module udeb name that might be hardcoded into d-i and needs to be the
same across linux and kfreebsd, there seems to be only benefit in
untangling the two kernels' package-list files.

 I was considering changing kernel-wedge to support a KW_DEFCONFIG_DIR
 variable, similar to the KW_CONFIG_DIR variable, that would affect where
 all of these files are looked for.  The (untested) change is pretty
 small:
 
 diff --git a/README b/README
 index 6bf5b87..df52199 100644
 --- a/README
 +++ b/README
 @@ -84,7 +84,12 @@ Suppose we want a different set of modules in the speakup 
 flavored kernel.
  Then create a modules/arch-flavor/nic-modules instead, it will be used
  by preference. One udeb will be created for each modules list file,
  containing the listed modules. The names of the files should match the
 -names of the various modules listed in /usr/share/kernel-wedge/package-list.
 +names of the various modules listed in the package-list file in the
 +default-configuration directory.
 +
 +The default-configuration directory is either specified by the
 +environment variable $KW_DEFCONFIG_DIR or else defaults to
 +/usr/share/kernel-wedge.

I don't see why this is necessary. If
/usr/share/kernel-wedge/package-list does not exist or is empty,
kernel-wedge should still use the package-list file from the linux-2.6
source package, and that's the right place to list all the module udebs.

-- 
see shy jo


signature.asc
Description: Digital signature


Bug#649294: marked as done (linux-2.6: Duplicate battery after suspend/resume)

2011-12-01 Thread Debian Bug Tracking System
Your message dated Thu, 1 Dec 2011 19:22:58 +0100
with message-id 20111201182258.gn3...@radis.cristau.org
and subject line Re: Bug#649294: linux-2.6: Duplicate battery after 
suspend/resume
has caused the Debian Bug report #649294,
regarding linux-2.6: Duplicate battery after suspend/resume
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
649294: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649294
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: linux-2.6
Severity: normal

Dear Maintainer,

After suspend/resume, the kernel seems to think I have 2 batteries, one empty 
and my real battery. Of course I have only one battery on this laptop (DELL 
Latitude E6400). It works fine after a reboot: acpi reports only one battery.

Here is the output of acpi -i -s before suspend:
Battery 0: Full, 100%
Battery 0: design capacity 5200 mAh, last full capacity 4464 mAh = 85%

Here is the output of acpi -i -s after suspend/resume:
Battery 0: slot empty
Battery 1: Full, 100%
Battery 1: design capacity 5200 mAh, last full capacity 4464 mAh = 85%

Do not hesitate to ask for more logs or output, I'll be happy to provide any 
information necessary.

Regards,
Bertrand


-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.0.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


---End Message---
---BeginMessage---
Version: 3.1.1-1

On Wed, Nov 30, 2011 at 23:12:16 +0100, Bertrand Marc wrote:

 I can confirm it is fixed with 3.1.1-1.
 
Closing.

Cheers,
Julien

---End Message---


Bug#650652: Patch

2011-12-01 Thread Calvin Owens

commit 4203223a1aed862b4445fdcd260d6139603a51d9
Author: Tushar Gohad tgo...@mvista.com
Date:   Thu Jul 28 10:36:20 2011 +

xfrm: Fix key lengths for rfc3686(ctr(aes))

Fix the min and max bit lengths for AES-CTR (RFC3686) keys.
The number of bits in key spec is the key length (128/256)
plus 32 bits of nonce.

This change takes care of the Invalid key length errors
reported by setkey when specifying 288 bit keys for aes-ctr.

Signed-off-by: Tushar Gohad tgo...@mvista.com
Acked-by: Herbert Xu herb...@gondor.apana.org.au
Signed-off-by: David S. Miller da...@davemloft.net

diff --git a/net/xfrm/xfrm_algo.c b/net/xfrm/xfrm_algo.c
index 58064d9..791ab2e 100644
--- a/net/xfrm/xfrm_algo.c
+++ b/net/xfrm/xfrm_algo.c
@@ -462,8 +462,8 @@ static struct xfrm_algo_desc ealg_list[] = {
.desc = {
.sadb_alg_id = SADB_X_EALG_AESCTR,
.sadb_alg_ivlen = 8,
-   .sadb_alg_minbits = 128,
-   .sadb_alg_maxbits = 256
+   .sadb_alg_minbits = 160,
+   .sadb_alg_maxbits = 288
}
 },
 };



--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4ed7cd94.3040...@smu.edu



Bug#594676: [giggzounets...@googlemail.com: Re: Files Download Pb with the atl1c module and my ReadyNAS]

2011-12-01 Thread Jonathan Nieder
Forwarding with permission.
---BeginMessage---
Le jeudi 24 novembre 2011 à 00:42 -0600, Jonathan Nieder a écrit :
 Hi Guillaume,
 
 Ben Hutchings wrote:
  On Sat, 2010-08-28 at 11:23 +0200, giggz wrote:
 
  I have an eeepc 1201n with debian stable lenny+backports. So I'm using
  the kernel 2.6.32-bpo.5-amd64. The Ethernet controller is driven by
  the module atl1c. I'm using firestarter as firewall.
 
  I have a file transfer problem between my NAS (readyNAS Duo from
  Netgear); 
 
  at first the symptoms:
  - with firestarter installed (stopped or in use) I can connect my
  eeepc to my NAS through FTP, CIFS or NFS. For example I can list or go
  through my shares. But when I'm trying to download a file it is so
  slow. I get 12Ko in 10minutes...
  [...]
 
  Does this firewall block ICMP?
 
 Ping.  Could you answer this?
 
 It would also be interesting to hear what kernel you use now, how it
 behaves, and whether you've learned anything else new in the meantime.
 
 Thanks for an interesting report.

Hi,

On my LAN my routeur always forces the mtu of my laptops to 1492. I have
a laptop with debian sid and an eeepc with debian stable lenny. On this
LAN I have a NAS (readyNAS duo of Netgear). With my laptop with sid I
don't have any problem at all to upload/download file from my NAS with
ftp/cifs/NFS and with firestarter installed. But with my eeepc (with
ethernet atl1c) I get one:
- with firestarter installed
- with an mtu set to 1492
I can't download file from my NAS through ftp/cifs/NFS. But I can upload
without problem.

So I have a little bit researched on the problem:
- with mtu of 1500 on my eeepc the problem disappears. even firestarter
is installed.
- the net.ipv4.tcp_timestamps value ist set to 0 by firestarter. When I
force it to 1 it works out of the box even with an mtu of 1492.

Regards,
giggzounet

---End Message---


Bug#613321: linux-image-amd64: Please enable 'memtest' option for all linux kernels

2011-12-01 Thread Jonathan Nieder
Uwe Kleine-König wrote:

 With the latter you have a test case to determine if your
 RAM is bad (or not). With the memtest kernel option memory is tested
 before it's given out to kmalloc. So it is able in some cases to just
 not give out bad parts of RAM allowing to use RAM that is a bit broken.

That would be fun.  Alas, the code just seems to run a memory test at
boot time (not at kmalloc-time) and reserve areas that do not pass so
they don't get used during the corresponding run of the kernel.

 Having said that I don't know if it's sensible to add to Debian as I
 didn't test runtime and binary size overhead.

No opinion on that from me.  It does seem a shame that many kinds of
faults would be likely to be missed:

  http://www.memtest86.com/tech.html#philo

That seems like the bigger potential cost.  When someone runs into
corruption that the memtest option did not catch, what can we say to
such a person?  (It would be easier if there were a manpage for kernel
parameters and a culture such that everyone read it before enabling
them.)

I should have just been quiet. :)



--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20111201205902.gd4...@elie.hsd1.il.comcast.net



Bug#613321: linux-image-amd64: Please enable 'memtest' option for all linux kernels

2011-12-01 Thread Dmitry Smirnov
On Thursday 01 December 2011 23:09:03 Jonathan Nieder wrote:
 (Kernel image size is also a consideration, though probably not a
 major worry in this particular example.)

Indeed. In this case we're talking about 130 lines of source code (3 KB), see 
arch/x86/mm/memtest.c

  If just few requests for a feature is not enough to convince that we need
  it, how many people should ask, exactly, in order to make the change?
 
 One reliable contributor.  Or just describe a use case that makes it a
 compelling addition to Debian.  (Since there is already a memtest86+
 package, replacing memtest86+ isn't one.)

We have three:

Romain Francoise rfranco...@debian.org, who reported (closed) 556365,
me and intrigeri intrig...@boum.org.

I guess all three of us should be working on our reliability... :)

 Thanks for your interest, and hope that helps,
 Jonathan

Thank you.



Bug#613321: linux-image-amd64: Please enable 'memtest' option for all linux kernels

2011-12-01 Thread Dmitry Smirnov
On Friday 02 December 2011 07:59:02 Jonathan Nieder wrote:
  Having said that I don't know if it's sensible to add to Debian as I
  didn't test runtime and binary size overhead.

Binary size overhead is really negligible.

 No opinion on that from me.  It does seem a shame that many kinds of
 faults would be likely to be missed:

Let's not fall into discussion about the quality of this feature. It doesn't 
matter. It doesn't have to be perfect to be included. Personally I think it is 
good enough for inclusion as is, because it do catch some errors. 

ECC is not perfect either, and MEMTEST appears to be better or at least as 
useful as ECC.

 
 That seems like the bigger potential cost.  When someone runs into
 corruption that the memtest option did not catch, what can we say to
 such a person?  (It would be easier if there were a manpage for kernel
 parameters and a culture such that everyone read it before enabling
 them.)

Such person, if capable of activating MEMTEST with boot-time argument to 
kernel, may have already read something about it. 
We can't take responsibility for that person's decisions (or expectations). 

Use case for MEMTEST is not to catch all errors but to minimize damage.
ECC doesn't catch all errors but it is better to have it to avoid massive data 
corruption due to bad RAM.

Vast majority of computers out there do not have any form of ECC and we're not 
allowing users to have any protection against RAM errors because someone have 
unexplained reluctance regarding MEMTEST inclusion.

Is my test case not good enough?

I've seen faulty RAM on servers running 24/7 for years when fault was 
discovered only after hardware upgrade. Data corruption was probably happening 
for a very long time and impact is very difficult to understand.

MEMTEST can be helpful for this scenario and it can be helpful for notebooks 
and desktop PCs where people work with sensitive data and do not routinely 
check their memory on weekly/monthly basis. (who does?)

 
 I should have just been quiet. :)

No worries, you're thoughts are welcome. :)




-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201112020953.03562.only...@member.fsf.org



[bts-link] source package linux-2.6

2011-12-01 Thread bts-link-upstream
#
# bts-link upstream status pull for source package linux-2.6
# see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
#

user bts-link-upstr...@lists.alioth.debian.org

# remote status report for #600846 (http://bugs.debian.org/600846)
# Bug title: linux-image-2.6.32-5-amd64: Suspend-To-RAM not works for some 
months, Suspend-To-Disk not works since last update.
#  * https://bugs.freedesktop.org/show_bug.cgi?id=43278
#  * remote status changed: (?) - NEW
usertags 600846 + status-NEW

thanks


--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20111201231548.26971.24730.btsl...@busoni.debian.org



Processed: Re: linux-image-3.1.0-1-686-pae: Invalid opcode running df on seed Btrfs filesystem

2011-12-01 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 649847 linux-2.6/3.1.1-1
Bug #649847 [linux-2.6] linux-image-3.1.0-1-686-pae: Invalid opcode running df 
on seed Btrfs filesystem
Bug Marked as found in versions linux-2.6/3.1.1-1.
 # Regression introduced by 6d07bcec969a (btrfs: fix wrong free space
 # information of btrfs, 2011-01-05).
 found 649847 linux-2.6/2.6.38~rc6-1~experimental.1
Bug #649847 [linux-2.6] linux-image-3.1.0-1-686-pae: Invalid opcode running df 
on seed Btrfs filesystem
Bug Marked as found in versions linux-2.6/2.6.38~rc6-1~experimental.1.
 # Fixed in mainline by b772a86ea6d9 (Btrfs: fix oops when calling
 # statfs on readonly device, 2011-11-28).
 tags 649847 + fixed-upstream
Bug #649847 [linux-2.6] linux-image-3.1.0-1-686-pae: Invalid opcode running df 
on seed Btrfs filesystem
Added tag(s) fixed-upstream.

End of message, stopping processing here.

Please contact me if you need assistance.
-- 
649847: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649847
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.13227834127708.transcr...@bugs.debian.org