[wheezy][linux-3.2.60] Booting from a Debian system on an external USB-3.0 hdd hangs

2014-08-12 Thread Sedat Dilek
[ Please CC me - I am not subscribed to this ML ]

Hi,

I cannot boot with my current linux-3.2.y Debian/wheezy kernel as my
system hangs and reports xhci problems.
( Unfortunately, nothing in the logs and no picture from my screen for you ).

FYI: My system and bootloader etc. is on an external USB-3.0 (xhci) hdd.

linux-image (3.2.57-3+deb7u1) was OK and (3.2.60-1+deb7u1) was 1st
causing the problem.

AFAICS this is the missing fix which is included in linux-3.2.61 [1].

commit 5dc2808c4729bf080487e61b80ee04e0fdb12a37 upstream.
xhci: delete endpoints from bandwidth list before freeing whole device

I have seen linux-3.2.62 was released recently.

Can you integrate above fix as a hotfix or do you plan to push a
linux-3.2.62 kernel soon?

Thanks in advance.

Regards,
- Sedat -

P.S.: If you need additional informations, please let me know.

[1] http://git.kernel.org/cgit/linux/kernel/git/bwh/linux-3.2.y-queue.git
/tree/releases/3.2.61/xhci-delete-endpoints-from-bandwidth-list-befor
e-freeing-whole.patch


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/ca+iczuvena6c8xucrkqdjzt4mpmuddskuasbexroonz4zo6...@mail.gmail.com



Bug#756810: linux-image-3.16-rc6-armmp: HDMI on wandboard/cubox-i no longer works

2014-08-12 Thread Vagrant Cascadian
On 2014-08-11, Vagrant Cascadian wrote:
 I think this is caused by dropping CONFIG_DRM_IMX_IPUV3_CORE=m, which
 was moved out of staging into drivers/gpu/ipu-v3/Kconfig.

And the configuration option was also renamed to
CONFIG_IMX_IPUV3_CORE...

I've tested that the following patch on a Cubox-i works:

diff --git a/config/armhf/config.armmp b/config/armhf/config.armmp
index 2e9343e..8c2ce84 100644
--- a/config/armhf/config.armmp
+++ b/config/armhf/config.armmp
@@ -191,6 +191,11 @@ CONFIG_DRM_I2C_NXP_TDA998X=m
 CONFIG_DRM_TILCDC=m

 ##
+## file: drivers/gpu/ipu-v3/Kconfig
+##
+CONFIG_IMX_IPUV3_CORE=m
+
+##
 ## file: drivers/hwspinlock/Kconfig
 ##
 CONFIG_HWSPINLOCK_OMAP=m


live well,
  vagrant


pgp6ibGM9q8nW.pgp
Description: PGP signature


Bug#757805: linux: linux-3.14.13/drivers/gpu/drm/i915/intel_panel.c:696 i9xx_enable_backlight+0xd4/0x100 [i915]()

2014-08-12 Thread Julien Cristau
On Mon, Aug 11, 2014 at 17:46:55 +0300, Martin-Éric Racine wrote:

 2014-08-11 16:56 GMT+03:00 maximilian attems m...@stro.at:
  On Mon, Aug 11, 2014 at 04:30:01PM +0300, Martin-Éric Racine wrote:
  Package: src:linux
  Version: 3.14.13-2
  Severity: normal
  File: linux
 
  While debugging something else, I found the following in syslog:
 
  can you reproduce with latest 3.16 (should be in exp).
 
 Yes, I can. See attached kernel oops dump.
 
Please report this upstream following the instructions at
https://01.org/linuxgraphics/documentation/how-report-bugs

Thanks,
Julien


signature.asc
Description: Digital signature


Bug#756810: linux-image-3.16-rc6-armmp: HDMI on wandboard/cubox-i no longer works

2014-08-12 Thread maximilian attems
On Mon, Aug 11, 2014 at 11:43:15PM -0700, Vagrant Cascadian wrote:
 On 2014-08-11, Vagrant Cascadian wrote:
  I think this is caused by dropping CONFIG_DRM_IMX_IPUV3_CORE=m, which
  was moved out of staging into drivers/gpu/ipu-v3/Kconfig.
 
 And the configuration option was also renamed to
 CONFIG_IMX_IPUV3_CORE...
 
 I've tested that the following patch on a Cubox-i works:
 
 diff --git a/config/armhf/config.armmp b/config/armhf/config.armmp

thank you, applied! (will be in next 3.16 upload, very likely for sid)

happy hacking. (:

-- 
maks


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140812091746.GA31354@gluino



Bug#709616: floods the network with pause packets

2014-08-12 Thread Stéphane Glondu
Hello,

Since I've upgraded to Linux 3.14, this bug occurs more often. The
record of uptime so far is 7 days and 18 hours.

Tail of uprecords -b -m 0 output:
   46   19 days, 23:50:56 | Linux 3.13-1-amd64  Tue Apr 22 09:37:55 2014
   477 days, 04:20:44 | Linux 3.14-1-amd64  Mon May 19 15:08:40 2014
   487 days, 07:20:52 | Linux 3.14-1-amd64  Tue Jun 24 09:58:19 2014
   496 days, 15:31:00 | Linux 3.14-1-amd64  Fri Jul 18 18:24:48 2014
   507 days, 18:00:42 | Linux 3.14-2-amd64  Mon Aug  4 17:40:44 2014
- 510 days, 00:06:01 | Linux 3.14-2-amd64  Tue Aug 12 11:51:28 2014

All reboots were due to the bug.


Cheers,

-- 
Stéphane


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53e9e752.9070...@debian.org



Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing

2014-08-12 Thread Josef Kufner
Package: nfs-kernel-server
Version: 1:1.2.8-6
Followup-For: Bug #757835

Dear Maintainer,
I got segfaults too, below are the last working versions, anything newer
segfaults, whether I upgrade libtirpc1 or nfs-kernel-server.

For those who need quick fix/workaround:
  deb http://snapshot.debian.org/archive/debian/20140808/ unstable main contrib 
non-free
... and downgrade to libtirpc1 0.2.4-1 and nfs-kernel-server 1:1.2.8-6.

Have a nice day!


-- Package-specific info:
-- rpcinfo --
   program vers proto   port  service
104   tcp111  portmapper
103   tcp111  portmapper
102   tcp111  portmapper
104   udp111  portmapper
103   udp111  portmapper
102   udp111  portmapper
1000241   udp  8  status
1000241   tcp  56008  status
132   tcp   2049  nfs
133   tcp   2049  nfs
134   tcp   2049  nfs
1002272   tcp   2049
1002273   tcp   2049
132   udp   2049  nfs
133   udp   2049  nfs
134   udp   2049  nfs
1002272   udp   2049
1002273   udp   2049
1000211   udp  34725  nlockmgr
1000213   udp  34725  nlockmgr
1000214   udp  34725  nlockmgr
1000211   tcp  34779  nlockmgr
1000213   tcp  34779  nlockmgr
1000214   tcp  34779  nlockmgr
151   udp  47250  mountd
151   tcp  48360  mountd
152   udp  54973  mountd
152   tcp  60512  mountd
153   udp  39291  mountd
153   tcp  34776  mountd
-- /etc/default/nfs-kernel-server --
RPCNFSDCOUNT=8
RPCNFSDPRIORITY=0
RPCMOUNTDOPTS=--manage-gids
NEED_SVCGSSD=
RPCSVCGSSDOPTS=
-- System Information:
Debian Release: 7.6
  APT prefers stable
  APT policy: (750, 'stable'), (600, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 3.4-trunk-686-pae (SMP w/4 CPU cores)
Locale: LANG=cs_CZ.utf8, LC_CTYPE=cs_CZ.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages nfs-kernel-server depends on:
ii  libblkid1 2.20.1-5.3
ii  libc6 2.19-7
ii  libcap2   1:2.22-1.2
ii  libgssglue1   0.4-2
ii  libsqlite3-0  3.8.5-2
ii  libtirpc1 0.2.4-1
ii  libwrap0  7.6.q-25
ii  lsb-base  4.1+Debian13
ii  nfs-common1:1.2.8-6
ii  ucf   3.0030

nfs-kernel-server recommends no packages.

nfs-kernel-server suggests no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140812120528.8051.88385.reportbug@localhost



Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing

2014-08-12 Thread Steve Langasek
Control: reassign -1 gcc-4.9,nfs-kernel-server
Control: found -1 nfs-kernel-server/1.2.8-8
Control: found -1 gcc-4.9/4.9.1

On Mon, Aug 11, 2014 at 12:54:00PM -0700, Petr Vandrovec wrote:
 amd64.  I think it affects all architectures.  In case you want to
 follow-up, attached is minimum testcase I could come up with.  It
 crashes with gcc-4.9 and -O2.  No crash with gcc-4.8, or at -O1.

 $gcc-4.9 -W -Wall -O2 client.c  ./a.out
 Segmentation fault
 $gcc-4.8 -W -Wall -O2 client.c  ./a.out
 $gcc-4.9 -W -Wall -O1 client.c  ./a.out
 $

Thanks.

Matthias, could you please have a look at the below test case?  We have a
regression in the latest nfs-kernel-server build, which appears to be caused
by a gcc-4.9 bug.

Should I work around this in nfs-utils, or is a quick fix possible in
gcc-4.9?

 char buf[100];
 
 void
 add_name(char *old)
 {
   char *cp = old;
 
   while (cp  *cp) {
   cp++;
   }
   __builtin_strncpy(buf, old, cp-old);
   if (cp != old) {
   buf[0] = 'Q';
   }
   if (cp  *cp) {
   buf[0] = 'Q';
   }
 }
 
 int main(void) {
 add_name(0);
 return 0;
 }
 


-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
Ubuntu Developerhttp://www.debian.org/
slanga...@ubuntu.com vor...@debian.org


signature.asc
Description: Digital signature


Processed: Re: Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing

2014-08-12 Thread Debian Bug Tracking System
Processing control commands:

 reassign -1 gcc-4.9,nfs-kernel-server
Bug #757835 [nfs-kernel-server] nfs-kernel-server: after update 
1.2.8-6-1.2.8-8 rpc.mountd starts crashing
Bug reassigned from package 'nfs-kernel-server' to 'gcc-4.9,nfs-kernel-server'.
No longer marked as found in versions nfs-utils/1:1.2.8-8 and 
nfs-utils/1:1.2.8-6.
Ignoring request to alter fixed versions of bug #757835 to the same values 
previously set
 found -1 nfs-kernel-server/1.2.8-8
Bug #757835 [gcc-4.9,nfs-kernel-server] nfs-kernel-server: after update 
1.2.8-6-1.2.8-8 rpc.mountd starts crashing
The source nfs-kernel-server and version 1.2.8-8 do not appear to match any 
binary packages
Marked as found in versions nfs-kernel-server/1.2.8-8.
 found -1 gcc-4.9/4.9.1
Bug #757835 [gcc-4.9,nfs-kernel-server] nfs-kernel-server: after update 
1.2.8-6-1.2.8-8 rpc.mountd starts crashing
The source gcc-4.9 and version 4.9.1 do not appear to match any binary packages
Marked as found in versions gcc-4.9/4.9.1.

-- 
757835: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757835
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.b757835.1407859548495.transcr...@bugs.debian.org



Processed: found 757835 in nfs-utils/1:1.2.8-8

2014-08-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 found 757835 nfs-utils/1:1.2.8-8
Bug #757835 [gcc-4.9,nfs-kernel-server] nfs-kernel-server: after update 
1.2.8-6-1.2.8-8 rpc.mountd starts crashing
Marked as found in versions nfs-utils/1:1.2.8-8.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
757835: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757835
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/handler.s.c.14078601514981.transcr...@bugs.debian.org



Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing

2014-08-12 Thread Matthias Klose
Am 12.08.2014 um 18:05 schrieb Steve Langasek:
 Control: reassign -1 gcc-4.9,nfs-kernel-server
 Control: found -1 nfs-kernel-server/1.2.8-8
 Control: found -1 gcc-4.9/4.9.1
 
 On Mon, Aug 11, 2014 at 12:54:00PM -0700, Petr Vandrovec wrote:
 amd64.  I think it affects all architectures.  In case you want to
 follow-up, attached is minimum testcase I could come up with.  It
 crashes with gcc-4.9 and -O2.  No crash with gcc-4.8, or at -O1.
 
 $gcc-4.9 -W -Wall -O2 client.c  ./a.out
 Segmentation fault
 $gcc-4.8 -W -Wall -O2 client.c  ./a.out
 $gcc-4.9 -W -Wall -O1 client.c  ./a.out
 $
 
 Thanks.
 
 Matthias, could you please have a look at the below test case?  We have a
 regression in the latest nfs-kernel-server build, which appears to be caused
 by a gcc-4.9 bug.
 
 Should I work around this in nfs-utils, or is a quick fix possible in
 gcc-4.9?
 
 char buf[100];

 void
 add_name(char *old)
 {
  char *cp = old;

  while (cp  *cp) {
  cp++;
  }
if (old)
  __builtin_strncpy(buf, old, cp-old);
  if (cp != old) {
  buf[0] = 'Q';
  }
  if (cp  *cp) {
  buf[0] = 'Q';
  }
 }

 int main(void) {
 add_name(0);
 return 0;
 }

guard the strncpy. I did see a similar issue like this (can't find it anymore),
and the recommendation was to guard the strncpy.


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/53ea45ae.3030...@debian.org



Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing

2014-08-12 Thread Ben Hutchings
On Tue, 2014-08-12 at 19:23 +0100, Ben Hutchings wrote:
 On Tue, 2014-08-12 at 09:05 -0700, Steve Langasek wrote:
 [...]
  Matthias, could you please have a look at the below test case?  We have a
  regression in the latest nfs-kernel-server build, which appears to be caused
  by a gcc-4.9 bug.
  
  Should I work around this in nfs-utils, or is a quick fix possible in
  gcc-4.9?
  
   char buf[100];
   
   void
   add_name(char *old)
   {
 char *cp = old;
   
 while (cp  *cp) {
 cp++;
 }
 __builtin_strncpy(buf, old, cp-old);
 [...]
 
 So far as I know (haven't checked the latest standard), pointer
 subtraction has undefined behaviour unless both operands point into (or
 one beyond) the same array.  As this is not true of null pointers, the
 compiler may infer that old can't be null, so cp can't be null, so there
 is no need to check whether it is.
 
 I.e. this is a bug in nfs-utils, not the compiler.

By the way, in case there are similar bugs elsewhere in nfs-utils, it
may be sensible to work around this with the compiler option
-fno-delete-null-pointer-checks.

Ben.

-- 
Ben Hutchings
Humans are not rational beings; they are rationalising beings.


signature.asc
Description: This is a digitally signed message part


Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing

2014-08-12 Thread Ben Hutchings
On Tue, 2014-08-12 at 09:05 -0700, Steve Langasek wrote:
[...]
 Matthias, could you please have a look at the below test case?  We have a
 regression in the latest nfs-kernel-server build, which appears to be caused
 by a gcc-4.9 bug.
 
 Should I work around this in nfs-utils, or is a quick fix possible in
 gcc-4.9?
 
  char buf[100];
  
  void
  add_name(char *old)
  {
  char *cp = old;
  
  while (cp  *cp) {
  cp++;
  }
  __builtin_strncpy(buf, old, cp-old);
[...]

So far as I know (haven't checked the latest standard), pointer
subtraction has undefined behaviour unless both operands point into (or
one beyond) the same array.  As this is not true of null pointers, the
compiler may infer that old can't be null, so cp can't be null, so there
is no need to check whether it is.

I.e. this is a bug in nfs-utils, not the compiler.

Ben.

-- 
Ben Hutchings
Humans are not rational beings; they are rationalising beings.


signature.asc
Description: This is a digitally signed message part


Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing

2014-08-12 Thread Sven Joachim
On 2014-08-12 20:23 +0200, Ben Hutchings wrote:

 On Tue, 2014-08-12 at 09:05 -0700, Steve Langasek wrote:
 [...]
 Matthias, could you please have a look at the below test case?  We have a
 regression in the latest nfs-kernel-server build, which appears to be caused
 by a gcc-4.9 bug.
 
 Should I work around this in nfs-utils, or is a quick fix possible in
 gcc-4.9?
 
  char buf[100];
  
  void
  add_name(char *old)
  {
 char *cp = old;
  
 while (cp  *cp) {
 cp++;
 }
 __builtin_strncpy(buf, old, cp-old);
 [...]

 So far as I know (haven't checked the latest standard), pointer
 subtraction has undefined behaviour unless both operands point into (or
 one beyond) the same array.  As this is not true of null pointers, the
 compiler may infer that old can't be null, so cp can't be null, so there
 is no need to check whether it is.

This is true in C, unfortunately.  However…

 I.e. this is a bug in nfs-utils, not the compiler.

…Petr's example program crashes even when compiled with g++-4.9, and in
C++ subtracting two null pointers is valid, yielding zero.

Cheers,
   Sven


--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/874mxhmtbw@turtle.gmx.de



Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing

2014-08-12 Thread Michael Fladischer
Package: nfs-kernel-server
Version: 1:1.2.8-8
Followup-For: Bug #757835

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

This bug is already fixed in upstream (included since 1.3.1-rc2):

http://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=25e83c2270b2d2966c992885faed0b79be09f474

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQIcBAEBCgAGBQJT6nbsAAoJEGlMre9Rx7W2L44P+wSVHGZkD63Xgz7irAfiSePT
crwAzvf8qy3YAzYwZvpvM3Q7q+on61DPWAJ7ESEc7cj6KQa/IS5lUYgBety2uAsk
loi+mxXdV9RaIEY51xcyFl9tTdRJ+cK1cnbmwC5J9thcVM3cUbGdPWCvLz4wHfaS
adUQuh+Zxi6vdO8Vxj1AjeADRwgg52uEfwLnhUjO8N1sduuwxwu51jADJSFhZCEj
D+EZHTcSBZ34pXRq4gSTWQJIVmB8JUWmkPuizLVIwL3NUZa3H/b8lvkVfyOaYUsq
ObplyM2gM0EfyFPL12nfHQ3CbKqJp/pWIj2T0I3RCwLGXWplFabQXBPFzJSLLNJI
hDAi1h5ThtyLv//iZxSnrmZkTwJqyTclxx5ZFYDdcCsU4kuqNQuypq2+NqPtA8kk
yiKzXrhOhlBMowEc674vch5GPdLNGamakziWcDFIQL9xg2e8rmxokmTulEeZkWcS
F3L5UJohB5MeRrlK5N0u2y7ADi0Ie0+ZI97i/dmWdp3zY2AQiup5VETKCw4KmCUA
y0lM8qtXB8DWI6+m0AIfyC7DOnrTgeaKOtZlRRxHcTaXc055r/+oh2TxR0ztp5+5
GUVNoAqcqWcIErn55PZkrHDFJZ8fcDqJaAEF1cvJ3YOPbkJT5D2sEdE5lP3r6BPe
wizkDvwmWCW9r07rK4wt
=p/T8
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/20140812202000.28480.95548.reportbug@kashyyyk.local



Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing

2014-08-12 Thread Ben Hutchings
On Tue, 2014-08-12 at 20:54 +0200, Sven Joachim wrote:
 On 2014-08-12 20:23 +0200, Ben Hutchings wrote:
 
  On Tue, 2014-08-12 at 09:05 -0700, Steve Langasek wrote:
  [...]
  Matthias, could you please have a look at the below test case?  We have a
  regression in the latest nfs-kernel-server build, which appears to be 
  caused
  by a gcc-4.9 bug.
  
  Should I work around this in nfs-utils, or is a quick fix possible in
  gcc-4.9?
  
   char buf[100];
   
   void
   add_name(char *old)
   {
char *cp = old;
   
while (cp  *cp) {
cp++;
}
__builtin_strncpy(buf, old, cp-old);
  [...]
 
  So far as I know (haven't checked the latest standard), pointer
  subtraction has undefined behaviour unless both operands point into (or
  one beyond) the same array.  As this is not true of null pointers, the
  compiler may infer that old can't be null, so cp can't be null, so there
  is no need to check whether it is.
 
 This is true in C, unfortunately.  However…
 
  I.e. this is a bug in nfs-utils, not the compiler.
 
 …Petr's example program crashes even when compiled with g++-4.9, and in
 C++ subtracting two null pointers is valid, yielding zero.

Ah, I wasn't aware of that difference.

The compiler might then be relying on the source argument to
__builtin_strncpy() being non-null.  The standard says that the pointer
arguments must be pointers to arrays, which seems to make this a valid
assumption.  However, I suspect many programs depend on 'copying' 0
characters to or from NULL being a safe no-op (I've probably done it
myself in the past).  It's probably a bad idea for the compiler to
assume programs don't do that.

Ben.

-- 
Ben Hutchings
Humans are not rational beings; they are rationalising beings.


signature.asc
Description: This is a digitally signed message part


Processing of nfs-utils_1.2.8-9_amd64.changes

2014-08-12 Thread Debian FTP Masters
nfs-utils_1.2.8-9_amd64.changes uploaded successfully to localhost
along with the files:
  nfs-kernel-server_1.2.8-9_amd64.deb
  nfs-common_1.2.8-9_amd64.deb
  nfs-utils_1.2.8-9.dsc
  nfs-utils_1.2.8-9.debian.tar.bz2

Greetings,

Your Debian queue daemon (running on host franck.debian.org)


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1xhmuf-0006lb...@franck.debian.org




Bug#757835: marked as done (nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing)

2014-08-12 Thread Debian Bug Tracking System
Your message dated Wed, 13 Aug 2014 01:18:47 +
with message-id e1xhndd-ed...@franck.debian.org
and subject line Bug#757835: fixed in nfs-utils 1:1.2.8-9
has caused the Debian Bug report #757835,
regarding nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts 
crashing
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
757835: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757835
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: nfs-kernel-server
Version: 1:1.2.8-8
Severity: normal

Dear Maintainer,

Here is snippet from /var/log/messages of my nfs-server:
Aug 11 20:54:05 muikku kernel: [12322.241131] 
NFSD: Using /var/lib/nfs/v4recovery as the NFSv4 state recovery directory
Aug 11 20:54:05 muikku kernel: [12322.241875] 
NFSD: starting 90-second grace period (net c15dd380)
Aug 11 20:54:14 muikku kernel: [12331.154343] rpc.mountd[12851]: segfault at 0 
ip 0804ffb6 sp bfb01150 error 4 in rpc.mountd[8048000+19000]

naturally shares fail to get mounted on client boxes. My network interfaces
are like this:

# /etc/network/interfaces -- configuration file for ifup(8), ifdown(8)

# The loopback interface
auto lo eth3 eth5
iface lo inet loopback

# The first network card - this entry was created during the Debian installation
# (network, broadcast and gateway are optional)
iface eth5 inet static
address 10.0.2.31
netmask 255.255.255.0
network 10.0.2.0
broadcast 10.0.2.255
gateway 10.0.2.15

iface eth3 inet static
address 83.145.224.120
netmask 255.255.255.192
gateway 83.145.224.126


-- Package-specific info:
-- rpcinfo --
   program vers proto   port  service
104   tcp111  portmapper
103   tcp111  portmapper
102   tcp111  portmapper
104   udp111  portmapper
103   udp111  portmapper
102   udp111  portmapper
1000241   udp  59703  status
1000241   tcp  49718  status
132   tcp   2049  nfs
133   tcp   2049  nfs
134   tcp   2049  nfs
1002272   tcp   2049
1002273   tcp   2049
132   udp   2049  nfs
133   udp   2049  nfs
134   udp   2049  nfs
1002272   udp   2049
1002273   udp   2049
1000211   udp  33578  nlockmgr
1000213   udp  33578  nlockmgr
1000214   udp  33578  nlockmgr
1000211   tcp  58476  nlockmgr
1000213   tcp  58476  nlockmgr
1000214   tcp  58476  nlockmgr
151   udp  38809  mountd
151   tcp  60430  mountd
152   udp  34400  mountd
152   tcp  49733  mountd
153   udp  33372  mountd
153   tcp  53894  mountd
-- /etc/default/nfs-kernel-server --
RPCNFSDCOUNT=8
RPCNFSDPRIORITY=0
RPCMOUNTDOPTS=--manage-gids
NEED_SVCGSSD=
RPCSVCGSSDOPTS=
-- /etc/exports --
/u  fisuvaan(rw,async,subtree_check,no_auth_nlm) 
10.0.2.15(rw,subtree_check,no_auth_nlm)
/home   fisuvaan(rw,async,subtree_check,no_auth_nlm) 
10.0.2.15(rw,subtree_check,no_auth_nlm)
/var/mail   fisuvaan(rw,subtree_check,no_auth_nlm) 
10.0.2.15(rw,subtree_check,no_auth_nlm)
/opt/ltsp   *(ro,no_root_squash,async,no_subtree_check)
-- /proc/fs/nfs/exports --
# Version 1.1
# Path Client(Flags) # IPs

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 3.14-2-686-pae (SMP w/1 CPU core)
Locale: LANG=fi_FI.UTF-8, LC_CTYPE=fi_FI.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages nfs-kernel-server depends on:
ii  libblkid1 2.20.1-5.8
ii  libc6 2.19-7
ii  libcap2   1:2.24-4
ii  libsqlite3-0  3.8.5-2
ii  libtirpc1 0.2.4-2.1
ii  libwrap0  7.6.q-25
ii  lsb-base  4.1+Debian13
ii  nfs-common1:1.2.8-8
ii  ucf   3.0030

nfs-kernel-server recommends no packages.

nfs-kernel-server suggests no packages.

-- Configuration Files:
/etc/default/nfs-kernel-server changed:
RPCNFSDCOUNT=8
RPCNFSDPRIORITY=0
RPCMOUNTDOPTS=--manage-gids
NEED_SVCGSSD=
RPCSVCGSSDOPTS=

/etc/exports changed:
/u  fisuvaan(rw,async,subtree_check,no_auth_nlm) 
10.0.2.15(rw,subtree_check,no_auth_nlm)
/home   fisuvaan(rw,async,subtree_check,no_auth_nlm) 
10.0.2.15(rw,subtree_check,no_auth_nlm)
/var/mail   fisuvaan(rw,subtree_check,no_auth_nlm) 
10.0.2.15(rw,subtree_check,no_auth_nlm)
/opt/ltsp   *(ro,no_root_squash,async,no_subtree_check)


-- no debconf information
---End Message---
---BeginMessage---

nfs-utils_1.2.8-9_amd64.changes ACCEPTED into unstable

2014-08-12 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Tue, 12 Aug 2014 17:12:38 -0700
Source: nfs-utils
Binary: nfs-kernel-server nfs-common
Architecture: source amd64
Version: 1:1.2.8-9
Distribution: unstable
Urgency: medium
Maintainer: Debian kernel team debian-kernel@lists.debian.org
Changed-By: Steve Langasek vor...@debian.org
Description:
 nfs-common - NFS support files common to client and server
 nfs-kernel-server - support for NFS kernel server
Closes: 757835
Changes:
 nfs-utils (1:1.2.8-9) unstable; urgency=medium
 .
   * debian/patches/22-mountd-fix-segfault-in-add_name-with-newer-gcc-
 compi.patch: cherry-pick fix from upstream for a segfault in
 add_name with newer gcc compilers.  Closes: #757835, LP: #1355829.
Checksums-Sha1:
 1a9ed05cb2930ec57669610ece7965c0751d2572 2257 nfs-utils_1.2.8-9.dsc
 242da06d0c1e038e46fdb35fd3c57b12870f338e 40171 nfs-utils_1.2.8-9.debian.tar.bz2
 9127bec47a9555445ca536102dcd3c2862de8d26 114774 
nfs-kernel-server_1.2.8-9_amd64.deb
 7bc2bcdd50df41937f3208cb76c917b9d5dd0eec 205588 nfs-common_1.2.8-9_amd64.deb
Checksums-Sha256:
 097a0c817a8018b485b8218fac943c711e05165cd530d52a554c723dd9963840 2257 
nfs-utils_1.2.8-9.dsc
 ed30d32760d26afa01a4affce25d3834c4c2364f2a5262680a9805ea78833aec 40171 
nfs-utils_1.2.8-9.debian.tar.bz2
 cd8c9d733d8519b909aa7e1b9b7206019ad2772a89a4465995f9bb1d97bcd2a4 114774 
nfs-kernel-server_1.2.8-9_amd64.deb
 8a70040382b5eb0b9488667c73e8f9e88ce242d739529cfc292dcd8c01d81b1d 205588 
nfs-common_1.2.8-9_amd64.deb
Files:
 cf903f869a976c1b42be0ed9b0dea1c5 114774 net optional 
nfs-kernel-server_1.2.8-9_amd64.deb
 c667388ed766fe79b06f12152491b567 205588 net standard 
nfs-common_1.2.8-9_amd64.deb
 3f510304d1b36d2cb6ef3a8eabab3a62 2257 net standard nfs-utils_1.2.8-9.dsc
 3f18f3ffd5209e91e8a483d82c9cb369 40171 net standard 
nfs-utils_1.2.8-9.debian.tar.bz2

-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=S3TS
-END PGP SIGNATURE-


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1xhndd-eu...@franck.debian.org