Processed: Re: Bug#926539: rootskel: steal-ctty no longer works on at least sparc64

2019-06-13 Thread Debian Bug Tracking System
Processing control commands:

> reassign -1 src:linux
Bug #926539 [src:rootskel] rootskel: steal-ctty no longer works on at least 
sparc64
Bug reassigned from package 'src:rootskel' to 'src:linux'.
No longer marked as found in versions rootskel/1.128.
Ignoring request to alter fixed versions of bug #926539 to the same values 
previously set
> tags -1 patch
Bug #926539 [src:linux] rootskel: steal-ctty no longer works on at least sparc64
Added tag(s) patch.

-- 
926539: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926539
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#929824: Backport VMCI PPN64 patch

2019-06-13 Thread Adit Ranadive
Dear Maintainer,

Can you give me any ETA on when the patch in this bug would be applied
to the Debian linux image?

Thanks,
Adit


Bug#930498: Enabling VMware PVRDMA driver

2019-06-13 Thread Adit Ranadive
Package: linux-image-amd64
Version: 5.0.0-trunk
Severity: important

Hi,

Can the VMware Paravirtual RDMA driver be enabled by default in the next 
Debian release? The config option is CONFIG_INFINIBAND_VMWARE_PVRDMA=m.
This would allow Debian VMs to be deployed easily for virtual RDMA use.

Thanks,
Adit


[bts-link] source package src:linux

2019-06-13 Thread debian-bts-link
#
# bts-link upstream status pull for source package src:linux
# see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
# https://bts-link-team.pages.debian.net/bts-link/
#

user debian-bts-l...@lists.debian.org

# remote status report for #906180 (http://bugs.debian.org/906180)
# Bug title: linux: regression: drm: cmdline EDID override mechanisms no longer 
work since 4.15
#  * https://bugs.freedesktop.org/show_bug.cgi?id=107583
#  * remote status changed: NEEDINFO -> RESOLVED
#  * remote resolution changed: (?) -> FIXED
#  * closed upstream
tags 906180 + fixed-upstream
usertags 906180 - status-NEEDINFO
usertags 906180 + status-RESOLVED resolution-FIXED

thanks



Processed: [bts-link] source package src:linux

2019-06-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> #
> # bts-link upstream status pull for source package src:linux
> # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
> # https://bts-link-team.pages.debian.net/bts-link/
> #
> user debian-bts-l...@lists.debian.org
Setting user to debian-bts-l...@lists.debian.org (was 
debian-bts-l...@lists.debian.org).
> # remote status report for #906180 (http://bugs.debian.org/906180)
> # Bug title: linux: regression: drm: cmdline EDID override mechanisms no 
> longer work since 4.15
> #  * https://bugs.freedesktop.org/show_bug.cgi?id=107583
> #  * remote status changed: NEEDINFO -> RESOLVED
> #  * remote resolution changed: (?) -> FIXED
> #  * closed upstream
> tags 906180 + fixed-upstream
Bug #906180 [src:linux] linux: regression: drm: cmdline EDID override 
mechanisms no longer work since 4.15
Added tag(s) fixed-upstream.
> usertags 906180 - status-NEEDINFO
Usertags were: status-NEEDINFO.
Usertags are now: .
> usertags 906180 + status-RESOLVED resolution-FIXED
There were no usertags set.
Usertags are now: resolution-FIXED status-RESOLVED.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
906180: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906180
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#930351: linux-image-4.9.0-9-amd64: soft lockup / stuck in pid_revalidate

2019-06-13 Thread Bernhard M. Wiedemann
On 11/06/2019 22.28, Ben Hutchings wrote:
> On Tue, 2019-06-11 at 10:13 +0200, Bernhard M. Wiedemann wrote:
> [...]
>>  kernel:[1616241.072680] NMI watchdog: BUG: soft lockup - CPU#5 stuck for 
>> 22s! [ps:28525]
>>
>> [1626796.848128] CPU: 5 PID: 28525 Comm: ps Tainted: G  D  L  
>> 4.9.0-9-amd64 #1 Debian 4.9.168-1+deb9u2
> [...]
> 
> Please provide the log for the first BUG/Oops error, which will incldue
> the text "Not tainted" instead of "Tainted: ..."

Found the very first call trace in a rotated syslog:

general protection fault:  [#1] SMP
CPU: 4 PID: 76 Comm: kswapd0 Not tainted 4.9.0-9-amd64 #1 Debian
4.9.168-1+deb9u2
Hardware name: MSI MS-7816/H87-G43 (MS-7816), BIOS V2.14B4 07/31/2013
task: 88da78f18140 task.stack: 9e7fc37f4000
RIP: 0010:[]  []
page_lock_anon_vma_read+0x27/0xe0
RSP: 0018:9e7fc37f7ae0  EFLAGS: 00010202
RAX: 0001 RBX: 7fff89da77012751 RCX: 9e7fc37f7c18
RDX:  RSI: 9e7fc37f7b78 RDI: ee1c5eafdf00
RBP: ee1c5eafdf00 R08: ee1c5eafdf20 R09: 
R10: 0002 R11: 0004 R12: 
R13: 9e7fc37f7b78 R14: 0010 R15: ee1c5eafdf20
FS:  () GS:88da9eb0() knlGS:
CS:  0010 DS:  ES:  CR0: 80050033
CR2: 7fff304e0138 CR3: 000534208000 CR4: 00162670
Stack:
 ee1c5eafdf00 9e7fc37f7c18  9e7fc37f7b78
 98fc7403 7efe 0007efef717b 88da77012750
 7a700bd0 ee1c5eafdf00 9e7fc37f7c18 
Call Trace:
 [] ? rmap_walk_anon+0x1a3/0x280
 [] ? page_referenced+0x10e/0x180
 [] ? page_check_address_transhuge+0x440/0x440
 [] ? page_get_anon_vma+0x80/0x80
 [] ? shrink_active_list+0x19b/0x350
 [] ? shrink_node_memcg+0x69a/0x7d0
 [] ? shrink_node+0xe2/0x340
 [] ? kswapd+0x2e3/0x6e0
 [] ? mem_cgroup_shrink_node+0x170/0x170
 [] ? kthread+0xd9/0xf0
 [] ? __switch_to_asm+0x34/0x70
 [] ? kthread_park+0x60/0x60
 [] ? ret_from_fork+0x57/0x70


syslog.crash.gz
Description: application/gzip