[wheezy][linux-3.2.60] Booting from a Debian system on an external USB-3.0 hdd hangs
[ Please CC me - I am not subscribed to this ML ] Hi, I cannot boot with my current linux-3.2.y Debian/wheezy kernel as my system hangs and reports xhci problems. ( Unfortunately, nothing in the logs and no picture from my screen for you ). FYI: My system and bootloader etc. is on an external USB-3.0 (xhci) hdd. linux-image (3.2.57-3+deb7u1) was OK and (3.2.60-1+deb7u1) was 1st causing the problem. AFAICS this is the missing fix which is included in linux-3.2.61 [1]. commit 5dc2808c4729bf080487e61b80ee04e0fdb12a37 upstream. xhci: delete endpoints from bandwidth list before freeing whole device I have seen linux-3.2.62 was released recently. Can you integrate above fix as a hotfix or do you plan to push a linux-3.2.62 kernel soon? Thanks in advance. Regards, - Sedat - P.S.: If you need additional informations, please let me know. [1] http://git.kernel.org/cgit/linux/kernel/git/bwh/linux-3.2.y-queue.git /tree/releases/3.2.61/xhci-delete-endpoints-from-bandwidth-list-befor e-freeing-whole.patch -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/ca+iczuvena6c8xucrkqdjzt4mpmuddskuasbexroonz4zo6...@mail.gmail.com
Bug#756810: linux-image-3.16-rc6-armmp: HDMI on wandboard/cubox-i no longer works
On 2014-08-11, Vagrant Cascadian wrote: I think this is caused by dropping CONFIG_DRM_IMX_IPUV3_CORE=m, which was moved out of staging into drivers/gpu/ipu-v3/Kconfig. And the configuration option was also renamed to CONFIG_IMX_IPUV3_CORE... I've tested that the following patch on a Cubox-i works: diff --git a/config/armhf/config.armmp b/config/armhf/config.armmp index 2e9343e..8c2ce84 100644 --- a/config/armhf/config.armmp +++ b/config/armhf/config.armmp @@ -191,6 +191,11 @@ CONFIG_DRM_I2C_NXP_TDA998X=m CONFIG_DRM_TILCDC=m ## +## file: drivers/gpu/ipu-v3/Kconfig +## +CONFIG_IMX_IPUV3_CORE=m + +## ## file: drivers/hwspinlock/Kconfig ## CONFIG_HWSPINLOCK_OMAP=m live well, vagrant pgp6ibGM9q8nW.pgp Description: PGP signature
Bug#757805: linux: linux-3.14.13/drivers/gpu/drm/i915/intel_panel.c:696 i9xx_enable_backlight+0xd4/0x100 [i915]()
On Mon, Aug 11, 2014 at 17:46:55 +0300, Martin-Éric Racine wrote: 2014-08-11 16:56 GMT+03:00 maximilian attems m...@stro.at: On Mon, Aug 11, 2014 at 04:30:01PM +0300, Martin-Éric Racine wrote: Package: src:linux Version: 3.14.13-2 Severity: normal File: linux While debugging something else, I found the following in syslog: can you reproduce with latest 3.16 (should be in exp). Yes, I can. See attached kernel oops dump. Please report this upstream following the instructions at https://01.org/linuxgraphics/documentation/how-report-bugs Thanks, Julien signature.asc Description: Digital signature
Bug#756810: linux-image-3.16-rc6-armmp: HDMI on wandboard/cubox-i no longer works
On Mon, Aug 11, 2014 at 11:43:15PM -0700, Vagrant Cascadian wrote: On 2014-08-11, Vagrant Cascadian wrote: I think this is caused by dropping CONFIG_DRM_IMX_IPUV3_CORE=m, which was moved out of staging into drivers/gpu/ipu-v3/Kconfig. And the configuration option was also renamed to CONFIG_IMX_IPUV3_CORE... I've tested that the following patch on a Cubox-i works: diff --git a/config/armhf/config.armmp b/config/armhf/config.armmp thank you, applied! (will be in next 3.16 upload, very likely for sid) happy hacking. (: -- maks -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20140812091746.GA31354@gluino
Bug#709616: floods the network with pause packets
Hello, Since I've upgraded to Linux 3.14, this bug occurs more often. The record of uptime so far is 7 days and 18 hours. Tail of uprecords -b -m 0 output: 46 19 days, 23:50:56 | Linux 3.13-1-amd64 Tue Apr 22 09:37:55 2014 477 days, 04:20:44 | Linux 3.14-1-amd64 Mon May 19 15:08:40 2014 487 days, 07:20:52 | Linux 3.14-1-amd64 Tue Jun 24 09:58:19 2014 496 days, 15:31:00 | Linux 3.14-1-amd64 Fri Jul 18 18:24:48 2014 507 days, 18:00:42 | Linux 3.14-2-amd64 Mon Aug 4 17:40:44 2014 - 510 days, 00:06:01 | Linux 3.14-2-amd64 Tue Aug 12 11:51:28 2014 All reboots were due to the bug. Cheers, -- Stéphane -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/53e9e752.9070...@debian.org
Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing
Package: nfs-kernel-server Version: 1:1.2.8-6 Followup-For: Bug #757835 Dear Maintainer, I got segfaults too, below are the last working versions, anything newer segfaults, whether I upgrade libtirpc1 or nfs-kernel-server. For those who need quick fix/workaround: deb http://snapshot.debian.org/archive/debian/20140808/ unstable main contrib non-free ... and downgrade to libtirpc1 0.2.4-1 and nfs-kernel-server 1:1.2.8-6. Have a nice day! -- Package-specific info: -- rpcinfo -- program vers proto port service 104 tcp111 portmapper 103 tcp111 portmapper 102 tcp111 portmapper 104 udp111 portmapper 103 udp111 portmapper 102 udp111 portmapper 1000241 udp 8 status 1000241 tcp 56008 status 132 tcp 2049 nfs 133 tcp 2049 nfs 134 tcp 2049 nfs 1002272 tcp 2049 1002273 tcp 2049 132 udp 2049 nfs 133 udp 2049 nfs 134 udp 2049 nfs 1002272 udp 2049 1002273 udp 2049 1000211 udp 34725 nlockmgr 1000213 udp 34725 nlockmgr 1000214 udp 34725 nlockmgr 1000211 tcp 34779 nlockmgr 1000213 tcp 34779 nlockmgr 1000214 tcp 34779 nlockmgr 151 udp 47250 mountd 151 tcp 48360 mountd 152 udp 54973 mountd 152 tcp 60512 mountd 153 udp 39291 mountd 153 tcp 34776 mountd -- /etc/default/nfs-kernel-server -- RPCNFSDCOUNT=8 RPCNFSDPRIORITY=0 RPCMOUNTDOPTS=--manage-gids NEED_SVCGSSD= RPCSVCGSSDOPTS= -- System Information: Debian Release: 7.6 APT prefers stable APT policy: (750, 'stable'), (600, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 3.4-trunk-686-pae (SMP w/4 CPU cores) Locale: LANG=cs_CZ.utf8, LC_CTYPE=cs_CZ.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages nfs-kernel-server depends on: ii libblkid1 2.20.1-5.3 ii libc6 2.19-7 ii libcap2 1:2.22-1.2 ii libgssglue1 0.4-2 ii libsqlite3-0 3.8.5-2 ii libtirpc1 0.2.4-1 ii libwrap0 7.6.q-25 ii lsb-base 4.1+Debian13 ii nfs-common1:1.2.8-6 ii ucf 3.0030 nfs-kernel-server recommends no packages. nfs-kernel-server suggests no packages. -- no debconf information -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20140812120528.8051.88385.reportbug@localhost
Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing
Control: reassign -1 gcc-4.9,nfs-kernel-server Control: found -1 nfs-kernel-server/1.2.8-8 Control: found -1 gcc-4.9/4.9.1 On Mon, Aug 11, 2014 at 12:54:00PM -0700, Petr Vandrovec wrote: amd64. I think it affects all architectures. In case you want to follow-up, attached is minimum testcase I could come up with. It crashes with gcc-4.9 and -O2. No crash with gcc-4.8, or at -O1. $gcc-4.9 -W -Wall -O2 client.c ./a.out Segmentation fault $gcc-4.8 -W -Wall -O2 client.c ./a.out $gcc-4.9 -W -Wall -O1 client.c ./a.out $ Thanks. Matthias, could you please have a look at the below test case? We have a regression in the latest nfs-kernel-server build, which appears to be caused by a gcc-4.9 bug. Should I work around this in nfs-utils, or is a quick fix possible in gcc-4.9? char buf[100]; void add_name(char *old) { char *cp = old; while (cp *cp) { cp++; } __builtin_strncpy(buf, old, cp-old); if (cp != old) { buf[0] = 'Q'; } if (cp *cp) { buf[0] = 'Q'; } } int main(void) { add_name(0); return 0; } -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. Ubuntu Developerhttp://www.debian.org/ slanga...@ubuntu.com vor...@debian.org signature.asc Description: Digital signature
Processed: Re: Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing
Processing control commands: reassign -1 gcc-4.9,nfs-kernel-server Bug #757835 [nfs-kernel-server] nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing Bug reassigned from package 'nfs-kernel-server' to 'gcc-4.9,nfs-kernel-server'. No longer marked as found in versions nfs-utils/1:1.2.8-8 and nfs-utils/1:1.2.8-6. Ignoring request to alter fixed versions of bug #757835 to the same values previously set found -1 nfs-kernel-server/1.2.8-8 Bug #757835 [gcc-4.9,nfs-kernel-server] nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing The source nfs-kernel-server and version 1.2.8-8 do not appear to match any binary packages Marked as found in versions nfs-kernel-server/1.2.8-8. found -1 gcc-4.9/4.9.1 Bug #757835 [gcc-4.9,nfs-kernel-server] nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing The source gcc-4.9 and version 4.9.1 do not appear to match any binary packages Marked as found in versions gcc-4.9/4.9.1. -- 757835: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757835 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.b757835.1407859548495.transcr...@bugs.debian.org
Processed: found 757835 in nfs-utils/1:1.2.8-8
Processing commands for cont...@bugs.debian.org: found 757835 nfs-utils/1:1.2.8-8 Bug #757835 [gcc-4.9,nfs-kernel-server] nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing Marked as found in versions nfs-utils/1:1.2.8-8. thanks Stopping processing here. Please contact me if you need assistance. -- 757835: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757835 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/handler.s.c.14078601514981.transcr...@bugs.debian.org
Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing
Am 12.08.2014 um 18:05 schrieb Steve Langasek: Control: reassign -1 gcc-4.9,nfs-kernel-server Control: found -1 nfs-kernel-server/1.2.8-8 Control: found -1 gcc-4.9/4.9.1 On Mon, Aug 11, 2014 at 12:54:00PM -0700, Petr Vandrovec wrote: amd64. I think it affects all architectures. In case you want to follow-up, attached is minimum testcase I could come up with. It crashes with gcc-4.9 and -O2. No crash with gcc-4.8, or at -O1. $gcc-4.9 -W -Wall -O2 client.c ./a.out Segmentation fault $gcc-4.8 -W -Wall -O2 client.c ./a.out $gcc-4.9 -W -Wall -O1 client.c ./a.out $ Thanks. Matthias, could you please have a look at the below test case? We have a regression in the latest nfs-kernel-server build, which appears to be caused by a gcc-4.9 bug. Should I work around this in nfs-utils, or is a quick fix possible in gcc-4.9? char buf[100]; void add_name(char *old) { char *cp = old; while (cp *cp) { cp++; } if (old) __builtin_strncpy(buf, old, cp-old); if (cp != old) { buf[0] = 'Q'; } if (cp *cp) { buf[0] = 'Q'; } } int main(void) { add_name(0); return 0; } guard the strncpy. I did see a similar issue like this (can't find it anymore), and the recommendation was to guard the strncpy. -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/53ea45ae.3030...@debian.org
Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing
On Tue, 2014-08-12 at 19:23 +0100, Ben Hutchings wrote: On Tue, 2014-08-12 at 09:05 -0700, Steve Langasek wrote: [...] Matthias, could you please have a look at the below test case? We have a regression in the latest nfs-kernel-server build, which appears to be caused by a gcc-4.9 bug. Should I work around this in nfs-utils, or is a quick fix possible in gcc-4.9? char buf[100]; void add_name(char *old) { char *cp = old; while (cp *cp) { cp++; } __builtin_strncpy(buf, old, cp-old); [...] So far as I know (haven't checked the latest standard), pointer subtraction has undefined behaviour unless both operands point into (or one beyond) the same array. As this is not true of null pointers, the compiler may infer that old can't be null, so cp can't be null, so there is no need to check whether it is. I.e. this is a bug in nfs-utils, not the compiler. By the way, in case there are similar bugs elsewhere in nfs-utils, it may be sensible to work around this with the compiler option -fno-delete-null-pointer-checks. Ben. -- Ben Hutchings Humans are not rational beings; they are rationalising beings. signature.asc Description: This is a digitally signed message part
Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing
On Tue, 2014-08-12 at 09:05 -0700, Steve Langasek wrote: [...] Matthias, could you please have a look at the below test case? We have a regression in the latest nfs-kernel-server build, which appears to be caused by a gcc-4.9 bug. Should I work around this in nfs-utils, or is a quick fix possible in gcc-4.9? char buf[100]; void add_name(char *old) { char *cp = old; while (cp *cp) { cp++; } __builtin_strncpy(buf, old, cp-old); [...] So far as I know (haven't checked the latest standard), pointer subtraction has undefined behaviour unless both operands point into (or one beyond) the same array. As this is not true of null pointers, the compiler may infer that old can't be null, so cp can't be null, so there is no need to check whether it is. I.e. this is a bug in nfs-utils, not the compiler. Ben. -- Ben Hutchings Humans are not rational beings; they are rationalising beings. signature.asc Description: This is a digitally signed message part
Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing
On 2014-08-12 20:23 +0200, Ben Hutchings wrote: On Tue, 2014-08-12 at 09:05 -0700, Steve Langasek wrote: [...] Matthias, could you please have a look at the below test case? We have a regression in the latest nfs-kernel-server build, which appears to be caused by a gcc-4.9 bug. Should I work around this in nfs-utils, or is a quick fix possible in gcc-4.9? char buf[100]; void add_name(char *old) { char *cp = old; while (cp *cp) { cp++; } __builtin_strncpy(buf, old, cp-old); [...] So far as I know (haven't checked the latest standard), pointer subtraction has undefined behaviour unless both operands point into (or one beyond) the same array. As this is not true of null pointers, the compiler may infer that old can't be null, so cp can't be null, so there is no need to check whether it is. This is true in C, unfortunately. However… I.e. this is a bug in nfs-utils, not the compiler. …Petr's example program crashes even when compiled with g++-4.9, and in C++ subtracting two null pointers is valid, yielding zero. Cheers, Sven -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/874mxhmtbw@turtle.gmx.de
Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing
Package: nfs-kernel-server Version: 1:1.2.8-8 Followup-For: Bug #757835 -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 This bug is already fixed in upstream (included since 1.3.1-rc2): http://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=25e83c2270b2d2966c992885faed0b79be09f474 -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBCgAGBQJT6nbsAAoJEGlMre9Rx7W2L44P+wSVHGZkD63Xgz7irAfiSePT crwAzvf8qy3YAzYwZvpvM3Q7q+on61DPWAJ7ESEc7cj6KQa/IS5lUYgBety2uAsk loi+mxXdV9RaIEY51xcyFl9tTdRJ+cK1cnbmwC5J9thcVM3cUbGdPWCvLz4wHfaS adUQuh+Zxi6vdO8Vxj1AjeADRwgg52uEfwLnhUjO8N1sduuwxwu51jADJSFhZCEj D+EZHTcSBZ34pXRq4gSTWQJIVmB8JUWmkPuizLVIwL3NUZa3H/b8lvkVfyOaYUsq ObplyM2gM0EfyFPL12nfHQ3CbKqJp/pWIj2T0I3RCwLGXWplFabQXBPFzJSLLNJI hDAi1h5ThtyLv//iZxSnrmZkTwJqyTclxx5ZFYDdcCsU4kuqNQuypq2+NqPtA8kk yiKzXrhOhlBMowEc674vch5GPdLNGamakziWcDFIQL9xg2e8rmxokmTulEeZkWcS F3L5UJohB5MeRrlK5N0u2y7ADi0Ie0+ZI97i/dmWdp3zY2AQiup5VETKCw4KmCUA y0lM8qtXB8DWI6+m0AIfyC7DOnrTgeaKOtZlRRxHcTaXc055r/+oh2TxR0ztp5+5 GUVNoAqcqWcIErn55PZkrHDFJZ8fcDqJaAEF1cvJ3YOPbkJT5D2sEdE5lP3r6BPe wizkDvwmWCW9r07rK4wt =p/T8 -END PGP SIGNATURE- -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20140812202000.28480.95548.reportbug@kashyyyk.local
Bug#757835: nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing
On Tue, 2014-08-12 at 20:54 +0200, Sven Joachim wrote: On 2014-08-12 20:23 +0200, Ben Hutchings wrote: On Tue, 2014-08-12 at 09:05 -0700, Steve Langasek wrote: [...] Matthias, could you please have a look at the below test case? We have a regression in the latest nfs-kernel-server build, which appears to be caused by a gcc-4.9 bug. Should I work around this in nfs-utils, or is a quick fix possible in gcc-4.9? char buf[100]; void add_name(char *old) { char *cp = old; while (cp *cp) { cp++; } __builtin_strncpy(buf, old, cp-old); [...] So far as I know (haven't checked the latest standard), pointer subtraction has undefined behaviour unless both operands point into (or one beyond) the same array. As this is not true of null pointers, the compiler may infer that old can't be null, so cp can't be null, so there is no need to check whether it is. This is true in C, unfortunately. However… I.e. this is a bug in nfs-utils, not the compiler. …Petr's example program crashes even when compiled with g++-4.9, and in C++ subtracting two null pointers is valid, yielding zero. Ah, I wasn't aware of that difference. The compiler might then be relying on the source argument to __builtin_strncpy() being non-null. The standard says that the pointer arguments must be pointers to arrays, which seems to make this a valid assumption. However, I suspect many programs depend on 'copying' 0 characters to or from NULL being a safe no-op (I've probably done it myself in the past). It's probably a bad idea for the compiler to assume programs don't do that. Ben. -- Ben Hutchings Humans are not rational beings; they are rationalising beings. signature.asc Description: This is a digitally signed message part
Processing of nfs-utils_1.2.8-9_amd64.changes
nfs-utils_1.2.8-9_amd64.changes uploaded successfully to localhost along with the files: nfs-kernel-server_1.2.8-9_amd64.deb nfs-common_1.2.8-9_amd64.deb nfs-utils_1.2.8-9.dsc nfs-utils_1.2.8-9.debian.tar.bz2 Greetings, Your Debian queue daemon (running on host franck.debian.org) -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/e1xhmuf-0006lb...@franck.debian.org
Bug#757835: marked as done (nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing)
Your message dated Wed, 13 Aug 2014 01:18:47 + with message-id e1xhndd-ed...@franck.debian.org and subject line Bug#757835: fixed in nfs-utils 1:1.2.8-9 has caused the Debian Bug report #757835, regarding nfs-kernel-server: after update 1.2.8-6-1.2.8-8 rpc.mountd starts crashing to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 757835: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757835 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems ---BeginMessage--- Package: nfs-kernel-server Version: 1:1.2.8-8 Severity: normal Dear Maintainer, Here is snippet from /var/log/messages of my nfs-server: Aug 11 20:54:05 muikku kernel: [12322.241131] NFSD: Using /var/lib/nfs/v4recovery as the NFSv4 state recovery directory Aug 11 20:54:05 muikku kernel: [12322.241875] NFSD: starting 90-second grace period (net c15dd380) Aug 11 20:54:14 muikku kernel: [12331.154343] rpc.mountd[12851]: segfault at 0 ip 0804ffb6 sp bfb01150 error 4 in rpc.mountd[8048000+19000] naturally shares fail to get mounted on client boxes. My network interfaces are like this: # /etc/network/interfaces -- configuration file for ifup(8), ifdown(8) # The loopback interface auto lo eth3 eth5 iface lo inet loopback # The first network card - this entry was created during the Debian installation # (network, broadcast and gateway are optional) iface eth5 inet static address 10.0.2.31 netmask 255.255.255.0 network 10.0.2.0 broadcast 10.0.2.255 gateway 10.0.2.15 iface eth3 inet static address 83.145.224.120 netmask 255.255.255.192 gateway 83.145.224.126 -- Package-specific info: -- rpcinfo -- program vers proto port service 104 tcp111 portmapper 103 tcp111 portmapper 102 tcp111 portmapper 104 udp111 portmapper 103 udp111 portmapper 102 udp111 portmapper 1000241 udp 59703 status 1000241 tcp 49718 status 132 tcp 2049 nfs 133 tcp 2049 nfs 134 tcp 2049 nfs 1002272 tcp 2049 1002273 tcp 2049 132 udp 2049 nfs 133 udp 2049 nfs 134 udp 2049 nfs 1002272 udp 2049 1002273 udp 2049 1000211 udp 33578 nlockmgr 1000213 udp 33578 nlockmgr 1000214 udp 33578 nlockmgr 1000211 tcp 58476 nlockmgr 1000213 tcp 58476 nlockmgr 1000214 tcp 58476 nlockmgr 151 udp 38809 mountd 151 tcp 60430 mountd 152 udp 34400 mountd 152 tcp 49733 mountd 153 udp 33372 mountd 153 tcp 53894 mountd -- /etc/default/nfs-kernel-server -- RPCNFSDCOUNT=8 RPCNFSDPRIORITY=0 RPCMOUNTDOPTS=--manage-gids NEED_SVCGSSD= RPCSVCGSSDOPTS= -- /etc/exports -- /u fisuvaan(rw,async,subtree_check,no_auth_nlm) 10.0.2.15(rw,subtree_check,no_auth_nlm) /home fisuvaan(rw,async,subtree_check,no_auth_nlm) 10.0.2.15(rw,subtree_check,no_auth_nlm) /var/mail fisuvaan(rw,subtree_check,no_auth_nlm) 10.0.2.15(rw,subtree_check,no_auth_nlm) /opt/ltsp *(ro,no_root_squash,async,no_subtree_check) -- /proc/fs/nfs/exports -- # Version 1.1 # Path Client(Flags) # IPs -- System Information: Debian Release: jessie/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 3.14-2-686-pae (SMP w/1 CPU core) Locale: LANG=fi_FI.UTF-8, LC_CTYPE=fi_FI.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages nfs-kernel-server depends on: ii libblkid1 2.20.1-5.8 ii libc6 2.19-7 ii libcap2 1:2.24-4 ii libsqlite3-0 3.8.5-2 ii libtirpc1 0.2.4-2.1 ii libwrap0 7.6.q-25 ii lsb-base 4.1+Debian13 ii nfs-common1:1.2.8-8 ii ucf 3.0030 nfs-kernel-server recommends no packages. nfs-kernel-server suggests no packages. -- Configuration Files: /etc/default/nfs-kernel-server changed: RPCNFSDCOUNT=8 RPCNFSDPRIORITY=0 RPCMOUNTDOPTS=--manage-gids NEED_SVCGSSD= RPCSVCGSSDOPTS= /etc/exports changed: /u fisuvaan(rw,async,subtree_check,no_auth_nlm) 10.0.2.15(rw,subtree_check,no_auth_nlm) /home fisuvaan(rw,async,subtree_check,no_auth_nlm) 10.0.2.15(rw,subtree_check,no_auth_nlm) /var/mail fisuvaan(rw,subtree_check,no_auth_nlm) 10.0.2.15(rw,subtree_check,no_auth_nlm) /opt/ltsp *(ro,no_root_squash,async,no_subtree_check) -- no debconf information ---End Message--- ---BeginMessage---
nfs-utils_1.2.8-9_amd64.changes ACCEPTED into unstable
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 12 Aug 2014 17:12:38 -0700 Source: nfs-utils Binary: nfs-kernel-server nfs-common Architecture: source amd64 Version: 1:1.2.8-9 Distribution: unstable Urgency: medium Maintainer: Debian kernel team debian-kernel@lists.debian.org Changed-By: Steve Langasek vor...@debian.org Description: nfs-common - NFS support files common to client and server nfs-kernel-server - support for NFS kernel server Closes: 757835 Changes: nfs-utils (1:1.2.8-9) unstable; urgency=medium . * debian/patches/22-mountd-fix-segfault-in-add_name-with-newer-gcc- compi.patch: cherry-pick fix from upstream for a segfault in add_name with newer gcc compilers. Closes: #757835, LP: #1355829. Checksums-Sha1: 1a9ed05cb2930ec57669610ece7965c0751d2572 2257 nfs-utils_1.2.8-9.dsc 242da06d0c1e038e46fdb35fd3c57b12870f338e 40171 nfs-utils_1.2.8-9.debian.tar.bz2 9127bec47a9555445ca536102dcd3c2862de8d26 114774 nfs-kernel-server_1.2.8-9_amd64.deb 7bc2bcdd50df41937f3208cb76c917b9d5dd0eec 205588 nfs-common_1.2.8-9_amd64.deb Checksums-Sha256: 097a0c817a8018b485b8218fac943c711e05165cd530d52a554c723dd9963840 2257 nfs-utils_1.2.8-9.dsc ed30d32760d26afa01a4affce25d3834c4c2364f2a5262680a9805ea78833aec 40171 nfs-utils_1.2.8-9.debian.tar.bz2 cd8c9d733d8519b909aa7e1b9b7206019ad2772a89a4465995f9bb1d97bcd2a4 114774 nfs-kernel-server_1.2.8-9_amd64.deb 8a70040382b5eb0b9488667c73e8f9e88ce242d739529cfc292dcd8c01d81b1d 205588 nfs-common_1.2.8-9_amd64.deb Files: cf903f869a976c1b42be0ed9b0dea1c5 114774 net optional nfs-kernel-server_1.2.8-9_amd64.deb c667388ed766fe79b06f12152491b567 205588 net standard nfs-common_1.2.8-9_amd64.deb 3f510304d1b36d2cb6ef3a8eabab3a62 2257 net standard nfs-utils_1.2.8-9.dsc 3f18f3ffd5209e91e8a483d82c9cb369 40171 net standard nfs-utils_1.2.8-9.debian.tar.bz2 -BEGIN PGP SIGNATURE- Version: GnuPG v1 iQIcBAEBCAAGBQJT6rfGAAoJEFaNMPMhshM94XAP/jM5wOmYmIT1Sb8tVZMi2hah HRKvRs9xq0DOjVcdvTY+rofkDdjc89vlLknc5IWeb4CMF9XjiYLVWH44VCjo9Vh+ KnR/jJRBmMb0kCQgsCS8C/FN4q6GCcz3bINPM1FaKjo4EyCJNtQyPbDMulmAggpt MHqHWX0LTKqOBH0bPUCg1MY1NmT451ZLFNA8lWH4tQVIwgV4x1g7EAt+oI9UaMET vCtCJa/J6JhQu1Gz5Ph1IEBWK78C1+sNAibFJ4dUwHUPQ1woKsb9KC6uadw5Nx+C mjNP/QZ00FXlzJGUu8IFwsNo5VAyWXrwR/CKX4kHOmJftv247/vbx7JfF8ScgJR/ iMDDU7QFJ/yA7IXm1JYYrKJUk35N/dvMxqTqDd1tm6Pwd306Kk3oFdPclb4dTEvf gbDY5OIUVmznhPv+uE0fvdMguRuRE4HPmkfDcAxVSzrGAKRPa4xCZJm99lPUSwFb QX4mI+u3mmOcFCaDA8f/vdDAOQuZ/9lZrL9ty0mik0NpH3gil8lExl/usNm83Oys 5J7TCIUj+7rF0Z1D2idx+og6cgQ/yhb7Dfp23Lzs7lUuXTNpQ3sUDlb6kpR4pufk JuHkYisnofRZX/pqQQo41lzBJx4R2k586RkuXSOPN+i6W9K7W1Wlcxt1fBysvxDX RkciJNkGvHbtv+wtDkxO =S3TS -END PGP SIGNATURE- Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/e1xhndd-eu...@franck.debian.org