linux-signed-i386_4.19.235+1_source.changes is NEW

2022-03-19 Thread Debian FTP Masters
Mapping buster-proposed-updates to oldstable-proposed-updates.
binary:acpi-modules-4.19.0-20-686-di is NEW.
binary:acpi-modules-4.19.0-20-686-pae-di is NEW.
binary:ata-modules-4.19.0-20-686-di is NEW.
binary:ata-modules-4.19.0-20-686-pae-di is NEW.
binary:btrfs-modules-4.19.0-20-686-di is NEW.
binary:btrfs-modules-4.19.0-20-686-pae-di is NEW.
binary:cdrom-core-modules-4.19.0-20-686-di is NEW.
binary:cdrom-core-modules-4.19.0-20-686-pae-di is NEW.
binary:compress-modules-4.19.0-20-686-di is NEW.
binary:compress-modules-4.19.0-20-686-pae-di is NEW.
binary:crc-modules-4.19.0-20-686-di is NEW.
binary:crc-modules-4.19.0-20-686-pae-di is NEW.
binary:crypto-dm-modules-4.19.0-20-686-di is NEW.
binary:crypto-dm-modules-4.19.0-20-686-pae-di is NEW.
binary:crypto-modules-4.19.0-20-686-di is NEW.
binary:crypto-modules-4.19.0-20-686-pae-di is NEW.
binary:efi-modules-4.19.0-20-686-di is NEW.
binary:efi-modules-4.19.0-20-686-pae-di is NEW.
binary:event-modules-4.19.0-20-686-di is NEW.
binary:event-modules-4.19.0-20-686-pae-di is NEW.
binary:ext4-modules-4.19.0-20-686-di is NEW.
binary:ext4-modules-4.19.0-20-686-pae-di is NEW.
binary:fat-modules-4.19.0-20-686-di is NEW.
binary:fat-modules-4.19.0-20-686-pae-di is NEW.
binary:fb-modules-4.19.0-20-686-di is NEW.
binary:fb-modules-4.19.0-20-686-pae-di is NEW.
binary:firewire-core-modules-4.19.0-20-686-di is NEW.
binary:firewire-core-modules-4.19.0-20-686-pae-di is NEW.
binary:fuse-modules-4.19.0-20-686-di is NEW.
binary:fuse-modules-4.19.0-20-686-pae-di is NEW.
binary:i2c-modules-4.19.0-20-686-di is NEW.
binary:i2c-modules-4.19.0-20-686-pae-di is NEW.
binary:input-modules-4.19.0-20-686-di is NEW.
binary:input-modules-4.19.0-20-686-pae-di is NEW.
binary:isofs-modules-4.19.0-20-686-di is NEW.
binary:isofs-modules-4.19.0-20-686-pae-di is NEW.
binary:jfs-modules-4.19.0-20-686-di is NEW.
binary:jfs-modules-4.19.0-20-686-pae-di is NEW.
binary:kernel-image-4.19.0-20-686-di is NEW.
binary:kernel-image-4.19.0-20-686-pae-di is NEW.
binary:linux-image-4.19.0-20-686 is NEW.
binary:linux-image-4.19.0-20-686-pae is NEW.
binary:linux-image-4.19.0-20-rt-686-pae is NEW.
binary:loop-modules-4.19.0-20-686-di is NEW.
binary:loop-modules-4.19.0-20-686-pae-di is NEW.
binary:md-modules-4.19.0-20-686-di is NEW.
binary:md-modules-4.19.0-20-686-pae-di is NEW.
binary:mmc-core-modules-4.19.0-20-686-di is NEW.
binary:mmc-core-modules-4.19.0-20-686-pae-di is NEW.
binary:mmc-modules-4.19.0-20-686-di is NEW.
binary:mmc-modules-4.19.0-20-686-pae-di is NEW.
binary:mouse-modules-4.19.0-20-686-di is NEW.
binary:mouse-modules-4.19.0-20-686-pae-di is NEW.
binary:mtd-core-modules-4.19.0-20-686-di is NEW.
binary:mtd-core-modules-4.19.0-20-686-pae-di is NEW.
binary:multipath-modules-4.19.0-20-686-di is NEW.
binary:multipath-modules-4.19.0-20-686-pae-di is NEW.
binary:nbd-modules-4.19.0-20-686-di is NEW.
binary:nbd-modules-4.19.0-20-686-pae-di is NEW.
binary:nic-modules-4.19.0-20-686-di is NEW.
binary:nic-modules-4.19.0-20-686-pae-di is NEW.
binary:nic-pcmcia-modules-4.19.0-20-686-di is NEW.
binary:nic-pcmcia-modules-4.19.0-20-686-pae-di is NEW.
binary:nic-shared-modules-4.19.0-20-686-di is NEW.
binary:nic-shared-modules-4.19.0-20-686-pae-di is NEW.
binary:nic-usb-modules-4.19.0-20-686-di is NEW.
binary:nic-usb-modules-4.19.0-20-686-pae-di is NEW.
binary:nic-wireless-modules-4.19.0-20-686-di is NEW.
binary:nic-wireless-modules-4.19.0-20-686-pae-di is NEW.
binary:pata-modules-4.19.0-20-686-di is NEW.
binary:pata-modules-4.19.0-20-686-pae-di is NEW.
binary:pcmcia-modules-4.19.0-20-686-di is NEW.
binary:pcmcia-modules-4.19.0-20-686-pae-di is NEW.
binary:pcmcia-storage-modules-4.19.0-20-686-di is NEW.
binary:pcmcia-storage-modules-4.19.0-20-686-pae-di is NEW.
binary:ppp-modules-4.19.0-20-686-di is NEW.
binary:ppp-modules-4.19.0-20-686-pae-di is NEW.
binary:sata-modules-4.19.0-20-686-di is NEW.
binary:sata-modules-4.19.0-20-686-pae-di is NEW.
binary:scsi-core-modules-4.19.0-20-686-di is NEW.
binary:scsi-core-modules-4.19.0-20-686-pae-di is NEW.
binary:scsi-modules-4.19.0-20-686-di is NEW.
binary:scsi-modules-4.19.0-20-686-pae-di is NEW.
binary:scsi-nic-modules-4.19.0-20-686-di is NEW.
binary:scsi-nic-modules-4.19.0-20-686-pae-di is NEW.
binary:serial-modules-4.19.0-20-686-di is NEW.
binary:serial-modules-4.19.0-20-686-pae-di is NEW.
binary:sound-modules-4.19.0-20-686-di is NEW.
binary:sound-modules-4.19.0-20-686-pae-di is NEW.
binary:speakup-modules-4.19.0-20-686-di is NEW.
binary:speakup-modules-4.19.0-20-686-pae-di is NEW.
binary:squashfs-modules-4.19.0-20-686-di is NEW.
binary:squashfs-modules-4.19.0-20-686-pae-di is NEW.
binary:udf-modules-4.19.0-20-686-di is NEW.
binary:udf-modules-4.19.0-20-686-pae-di is NEW.
binary:uinput-modules-4.19.0-20-686-di is NEW.
binary:uinput-modules-4.19.0-20-686-pae-di is NEW.
binary:usb-modules-4.19.0-20-686-di is NEW.
binary:usb-modules-4.19.0-20-686-pae-di is NEW.
binary:usb-serial-modules-4.19.0-20-686-di is NEW.
binary:usb-serial-modules-4.19.0-20-686-pae-di is NEW.
binary:usb-stora

Processing of linux-signed-i386_4.19.235+1_source.changes

2022-03-19 Thread Debian FTP Masters
linux-signed-i386_4.19.235+1_source.changes uploaded successfully to localhost
along with the files:
  linux-signed-i386_4.19.235+1.dsc
  linux-signed-i386_4.19.235+1.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



linux-latest_105+deb10u15_source.changes ACCEPTED into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates

2022-03-19 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 19 Mar 2022 07:54:21 +0100
Source: linux-latest
Architecture: source
Version: 105+deb10u15
Distribution: buster
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux-latest (105+deb10u15) buster; urgency=medium
 .
   * Update to 4.19.0-20
Checksums-Sha1:
 ba54b93034a243e9030bf39a96a243d83faa228c 11743 linux-latest_105+deb10u15.dsc
 0eca5483e8610c98917ba99f7c56cea0bd2ab291 20808 linux-latest_105+deb10u15.tar.xz
 35d278d1bf830df7b2ab2113c3de0ea4cec61e9b 6309 
linux-latest_105+deb10u15_source.buildinfo
Checksums-Sha256:
 22349bf4af1af2abb05e1fe55ba27ea882670948bd15f922d80e0f20d4226c7d 11743 
linux-latest_105+deb10u15.dsc
 10e7ba0e101c5f8c69c1580e4fdd888ab2a9b44b5867ca7bcf08d340a94e6d8f 20808 
linux-latest_105+deb10u15.tar.xz
 d178463ae4c2909cb140c94dda3572d6d69db6bd2d90a6fe870b3d5a22fb282e 6309 
linux-latest_105+deb10u15_source.buildinfo
Files:
 1ceef865ca19be6f5109c81240711f8d 11743 kernel optional 
linux-latest_105+deb10u15.dsc
 e559a0e673fc1910696aab437ad01684 20808 kernel optional 
linux-latest_105+deb10u15.tar.xz
 211d7b9bc3acda4c37d3b9d5b8683ef5 6309 kernel optional 
linux-latest_105+deb10u15_source.buildinfo

-BEGIN PGP SIGNATURE-
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=DYhT
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



linux-signed-i386_5.10.103+1~bpo10+1_source.changes is NEW

2022-03-19 Thread Debian FTP Masters
binary:acpi-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:acpi-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:ata-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:ata-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:btrfs-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:btrfs-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:cdrom-core-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:cdrom-core-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:crc-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:crc-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:crypto-dm-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:crypto-dm-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:crypto-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:crypto-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:efi-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:efi-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:event-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:event-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:ext4-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:ext4-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:f2fs-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:f2fs-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:fat-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:fat-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:fb-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:fb-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:firewire-core-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:firewire-core-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:fuse-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:fuse-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:i2c-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:i2c-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:input-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:input-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:isofs-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:isofs-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:jfs-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:jfs-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:kernel-image-5.10.0-0.bpo.12-686-di is NEW.
binary:kernel-image-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:linux-image-5.10.0-0.bpo.12-686 is NEW.
binary:linux-image-5.10.0-0.bpo.12-686-pae is NEW.
binary:linux-image-5.10.0-0.bpo.12-rt-686-pae is NEW.
binary:loop-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:loop-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:md-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:md-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:mmc-core-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:mmc-core-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:mmc-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:mmc-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:mouse-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:mouse-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:mtd-core-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:mtd-core-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:multipath-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:multipath-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:nbd-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:nbd-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:nic-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:nic-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:nic-pcmcia-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:nic-pcmcia-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:nic-shared-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:nic-shared-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:nic-usb-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:nic-usb-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:nic-wireless-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:nic-wireless-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:pata-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:pata-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:pcmcia-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:pcmcia-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:pcmcia-storage-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:pcmcia-storage-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:ppp-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:ppp-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:rfkill-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:rfkill-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:sata-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:sata-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:scsi-core-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:scsi-core-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:scsi-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:scsi-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:scsi-nic-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:scsi-nic-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:serial-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:serial-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:sound-modules-5.10.0-0.bpo.12-686-di is NEW.
binary:sound-modules-5.10.0-0.bpo.12-686-pae-di is NEW.
binary:speakup-modules-5.10.0-0.b

Processing of linux-signed-i386_5.10.103+1~bpo10+1_source.changes

2022-03-19 Thread Debian FTP Masters
linux-signed-i386_5.10.103+1~bpo10+1_source.changes uploaded successfully to 
localhost
along with the files:
  linux-signed-i386_5.10.103+1~bpo10+1.dsc
  linux-signed-i386_5.10.103+1~bpo10+1.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



linux-signed-arm64_4.19.235+1_source.changes ACCEPTED into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates

2022-03-19 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 17 Mar 2022 20:48:39 +0100
Source: linux-signed-arm64
Architecture: source
Version: 4.19.235+1
Distribution: buster-proposed-updates
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux-signed-arm64 (4.19.235+1) buster; urgency=medium
 .
   * Sign kernel from linux 4.19.235-1
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.233
 - mac80211_hwsim: report NOACK frames in tx_status
 - mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
 - [arm*] i2c: bcm2835: Avoid clock stretching timeouts
 - [x86] ASoC: rt5682: do not block workqueue if card is unbound
 - Input: clear BTN_RIGHT/MIDDLE on buttonpads
 - cifs: fix double free race when mount fails in cifs_get_root()
 - net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990
 - usb: gadget: don't release an existing dev->buf (CVE-2022-24958)
 - usb: gadget: clear related members when goto fail (CVE-2022-24958)
 - ata: pata_hpt37x: fix PCI clock detection
 - [x86] ALSA: intel_hdmi: Fix reference to PCM buffer address
 - ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
 - xfrm: fix MTU regression
 - netfilter: fix use-after-free in __nf_register_net_hook()
 - xfrm: fix the if_id check in changelink
 - xfrm: enforce validity of offload input flags
 - netfilter: nf_queue: don't assume sk is full socket
 - netfilter: nf_queue: fix possible use-after-free
 - batman-adv: Request iflink once in batadv-on-batadv check
 - batman-adv: Request iflink once in batadv_get_real_netdevice
 - batman-adv: Don't expect inter-netns unique iflink indices
 - net: dcb: flush lingering app table entries for unregistered devices
 - net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error generated by client
 - net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server
 - block: Fix fsync always failed if once failed
 - PCI: pciehp: Fix infinite loop in IRQ handler upon power fault
 - xen/netfront: destroy queues before real_num_tx_queues is zeroed
 - mac80211: fix forwarded mesh frames AC & queue selection
 - [arm64,armhf] net: stmmac: fix return value of __setup handler
 - net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
 - efivars: Respect "block" flag in efivar_entry_set_safe()
 - can: gs_usb: change active_channels's type from atomic_t to u8
 - [armel,armhf] 9182/1: mmu: fix returns from early_param() and __setup()
   functions
 - net: chelsio: cxgb3: check the return value of pci_find_capability()
 - nl80211: Handle nla_memdup failures in handle_nan_filter
 - Input: elan_i2c - move regulator_[en|dis]able() out of
   elan_[en|dis]able_power()
 - Input: elan_i2c - fix regulator enable count imbalance after
   suspend/resume
 - HID: add mapping for KEY_ALL_APPLICATIONS
 - memfd: fix F_SEAL_WRITE after shmem huge page allocated
 - tracing/histogram: Fix sorting on old "cpu" value
 - btrfs: add missing run of delayed items after unlink during log replay
 - net: dcb: disable softirqs in dcbnl_flush_dev()
 - hamradio: fix macro redefine warning
 https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.234
 - [arm*] Provide a wrapper for SMCCC 1.1 calls
 - [arm64,armhf] smccc/psci: add arm_smccc_1_1_get_conduit()
 - [armhf] report Spectre v2 status through sysfs
 - [armel,armhf] early traps initialisation
 - [armel,armhf] use LOADADDR() to get load address of sections
 - [armel,armhf] Spectre-BHB workaround
 - [armel,armhf] include unprivileged BPF status in Spectre V2 reporting
 - [armel,armhf] fix build error when BPF_SYSCALL is disabled
 - [armel,armhf] fix co-processor register typo
 - [armel,armhf] Do not use NOCROSSREFS directive with ld.lld
 - [armhf] fix build warning in proc-v7-bugs.c
 - xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
   (CVE-2022-23040, XSA-396)
 - xen/grant-table: add gnttab_try_end_foreign_access() (CVE-2022-23036,
   CVE-2022-23038, XSA-396)
 - xen/blkfront: don't use gnttab_query_foreign_access() for mapped status
   (CVE-2022-23036, XSA-396)
 - xen/netfront: don't use gnttab_query_foreign_access() for mapped status
   (CVE-2022-23037, XSA-396)
 - xen/scsifront: don't use gnttab_query_foreign_access() for mapped status
   (CVE-2022-23038, XSA-396)
 - xen/gntalloc: don't use gnttab_query_foreign_access() (CVE-2022-23039,
   XSA-396)
 - xen: remove gnttab_query_foreign_access()
 - xen/9p: use alloc/free_pages_exact() (CVE-2022-23041, XSA-396)
 - xen/pvcalls: use alloc/free_pages_exact() (CVE-2022-23041, XSA-396)
 - xen/gnttab: fix gnttab_end_foreign_access() without page specified
   (CVE-2022-23041, XSA-396)
  

Bug#711021: mount.nfs timeout for GETPORT is much too short

2022-03-19 Thread Ben Hutchings
I'm not sure that this bug was ever fixed.

nfs-utils actually uses nfs_getport() to get the port.  That passes a
timeout of {-1, 0} to libtirpc, which is invalid and should result in
using the rpcbind client's default timeout.

The TCP client interface is implemented in src/clnt_vc.c.  It has a
default timeout (ct_wait field) that can be set with CLNT_CONTROL(...,
CLSET_TIMEOUT, ...), but nfs-utils doesn't seem to do that.  So it
seems like there is a default timeout of 0!

Ben.

-- 
Ben Hutchings
Beware of programmers who carry screwdrivers. - Leonard Brandwein


signature.asc
Description: This is a digitally signed message part


linux-signed-amd64_4.19.235+1_source.changes ACCEPTED into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates

2022-03-19 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 17 Mar 2022 20:48:39 +0100
Source: linux-signed-amd64
Architecture: source
Version: 4.19.235+1
Distribution: buster-proposed-updates
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux-signed-amd64 (4.19.235+1) buster; urgency=medium
 .
   * Sign kernel from linux 4.19.235-1
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.233
 - mac80211_hwsim: report NOACK frames in tx_status
 - mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
 - [arm*] i2c: bcm2835: Avoid clock stretching timeouts
 - [x86] ASoC: rt5682: do not block workqueue if card is unbound
 - Input: clear BTN_RIGHT/MIDDLE on buttonpads
 - cifs: fix double free race when mount fails in cifs_get_root()
 - net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990
 - usb: gadget: don't release an existing dev->buf (CVE-2022-24958)
 - usb: gadget: clear related members when goto fail (CVE-2022-24958)
 - ata: pata_hpt37x: fix PCI clock detection
 - [x86] ALSA: intel_hdmi: Fix reference to PCM buffer address
 - ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
 - xfrm: fix MTU regression
 - netfilter: fix use-after-free in __nf_register_net_hook()
 - xfrm: fix the if_id check in changelink
 - xfrm: enforce validity of offload input flags
 - netfilter: nf_queue: don't assume sk is full socket
 - netfilter: nf_queue: fix possible use-after-free
 - batman-adv: Request iflink once in batadv-on-batadv check
 - batman-adv: Request iflink once in batadv_get_real_netdevice
 - batman-adv: Don't expect inter-netns unique iflink indices
 - net: dcb: flush lingering app table entries for unregistered devices
 - net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error generated by client
 - net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server
 - block: Fix fsync always failed if once failed
 - PCI: pciehp: Fix infinite loop in IRQ handler upon power fault
 - xen/netfront: destroy queues before real_num_tx_queues is zeroed
 - mac80211: fix forwarded mesh frames AC & queue selection
 - [arm64,armhf] net: stmmac: fix return value of __setup handler
 - net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
 - efivars: Respect "block" flag in efivar_entry_set_safe()
 - can: gs_usb: change active_channels's type from atomic_t to u8
 - [armel,armhf] 9182/1: mmu: fix returns from early_param() and __setup()
   functions
 - net: chelsio: cxgb3: check the return value of pci_find_capability()
 - nl80211: Handle nla_memdup failures in handle_nan_filter
 - Input: elan_i2c - move regulator_[en|dis]able() out of
   elan_[en|dis]able_power()
 - Input: elan_i2c - fix regulator enable count imbalance after
   suspend/resume
 - HID: add mapping for KEY_ALL_APPLICATIONS
 - memfd: fix F_SEAL_WRITE after shmem huge page allocated
 - tracing/histogram: Fix sorting on old "cpu" value
 - btrfs: add missing run of delayed items after unlink during log replay
 - net: dcb: disable softirqs in dcbnl_flush_dev()
 - hamradio: fix macro redefine warning
 https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.234
 - [arm*] Provide a wrapper for SMCCC 1.1 calls
 - [arm64,armhf] smccc/psci: add arm_smccc_1_1_get_conduit()
 - [armhf] report Spectre v2 status through sysfs
 - [armel,armhf] early traps initialisation
 - [armel,armhf] use LOADADDR() to get load address of sections
 - [armel,armhf] Spectre-BHB workaround
 - [armel,armhf] include unprivileged BPF status in Spectre V2 reporting
 - [armel,armhf] fix build error when BPF_SYSCALL is disabled
 - [armel,armhf] fix co-processor register typo
 - [armel,armhf] Do not use NOCROSSREFS directive with ld.lld
 - [armhf] fix build warning in proc-v7-bugs.c
 - xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
   (CVE-2022-23040, XSA-396)
 - xen/grant-table: add gnttab_try_end_foreign_access() (CVE-2022-23036,
   CVE-2022-23038, XSA-396)
 - xen/blkfront: don't use gnttab_query_foreign_access() for mapped status
   (CVE-2022-23036, XSA-396)
 - xen/netfront: don't use gnttab_query_foreign_access() for mapped status
   (CVE-2022-23037, XSA-396)
 - xen/scsifront: don't use gnttab_query_foreign_access() for mapped status
   (CVE-2022-23038, XSA-396)
 - xen/gntalloc: don't use gnttab_query_foreign_access() (CVE-2022-23039,
   XSA-396)
 - xen: remove gnttab_query_foreign_access()
 - xen/9p: use alloc/free_pages_exact() (CVE-2022-23041, XSA-396)
 - xen/pvcalls: use alloc/free_pages_exact() (CVE-2022-23041, XSA-396)
 - xen/gnttab: fix gnttab_end_foreign_access() without page specified
   (CVE-2022-23041, XSA-396)
  

Bug#833925: marked as done (nfs-kernel-server: no_root_squash broken on amd64)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 19:59:51 +0100
with message-id 
and subject line Re: nfs-kernel-server: all exports are read only
has caused the Debian Bug report #709403,
regarding nfs-kernel-server: no_root_squash broken on amd64
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
709403: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709403
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-kernel-server
Version: 1:1.2.8-9
Severity: normal

The no_root_squash option appears to work on i386, but not on amd64.

wooledg@wooledg:~$ grep '^[^#]' /etc/exports
/home   -no_subtree_check arc1(ro,no_root_squash,sync)

arc1:~# ls /net/hosts/wooledg/home/wooledg/.bash*
/net/hosts/wooledg/home/wooledg/.bash_history
/net/hosts/wooledg/home/wooledg/.bash_logout
/net/hosts/wooledg/home/wooledg/.bashrc
arc1:~# ls /net/hosts/wooledg/home/wooledg/Maildir
ls: cannot open directory /net/hosts/wooledg/home/wooledg/Maildir: Permission 
denied

This is somewhat similar to bug #492970, but it's architecture specific
and it appears to be on the server side, not the client side.  I've
confirmed with NFSv3 and NFSv4 mounts from other Debian systems, and
with an HP-UX client.

See also:
https://lists.debian.org/debian-user/2016/08/msg00245.html
https://lists.debian.org/debian-user/2016/08/msg00275.html

I filed the bug report from "wooledg" (my desktop box) because it has an
absolutely minimal configuration that still demonstrates the problem.
The real problem that I care about is on a server with many other exports
as well.  Same problem: jessie, amd64, no_root_squash is ignored.

Jessie i386 systems work fine.

-- Package-specific info:
-- rpcinfo --
   program vers proto   port  service
104   tcp111  portmapper
103   tcp111  portmapper
102   tcp111  portmapper
104   udp111  portmapper
103   udp111  portmapper
102   udp111  portmapper
1000241   udp  55248  status
1000241   tcp  48807  status
132   tcp   2049  nfs
133   tcp   2049  nfs
134   tcp   2049  nfs
1002272   tcp   2049
1002273   tcp   2049
132   udp   2049  nfs
133   udp   2049  nfs
134   udp   2049  nfs
1002272   udp   2049
1002273   udp   2049
1000211   udp  55895  nlockmgr
1000213   udp  55895  nlockmgr
1000214   udp  55895  nlockmgr
1000211   tcp  38500  nlockmgr
1000213   tcp  38500  nlockmgr
1000214   tcp  38500  nlockmgr
151   udp  43131  mountd
151   tcp  49060  mountd
152   udp  47185  mountd
152   tcp  49686  mountd
153   udp  52717  mountd
153   tcp  35670  mountd
-- /etc/default/nfs-kernel-server --
RPCNFSDCOUNT=8
RPCNFSDPRIORITY=0
RPCMOUNTDOPTS="--manage-gids"
NEED_SVCGSSD=""
RPCSVCGSSDOPTS=""
-- /etc/exports --
/home   -no_subtree_check arc1(ro,no_root_squash,sync)
-- /proc/fs/nfs/exports --
# Version 1.1
# Path Client(Flags) # IPs

-- System Information:
Debian Release: 8.5
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.16.0-4-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages nfs-kernel-server depends on:
ii  libblkid1 2.25.2-6
ii  libc6 2.19-18+deb8u4
ii  libcap2   1:2.24-8
ii  libsqlite3-0  3.8.7.1-1+deb8u1
ii  libtirpc1 0.2.5-1
ii  libwrap0  7.6.q-25
ii  lsb-base  4.1+Debian13+nmu1
ii  nfs-common1:1.2.8-9
ii  ucf   3.0030

nfs-kernel-server recommends no packages.

nfs-kernel-server suggests no packages.

-- debconf-show failed
--- End Message ---
--- Begin Message ---
Version: 1:1.3.4-1

This was reported to be fixed in the above version.

Ben.

-- 
Ben Hutchings
Beware of programmers who carry screwdrivers. - Leonard Brandwein


signature.asc
Description: This is a digitally signed message part
--- End Message ---


Bug#783212: marked as done (nfs-kernel-server: exportfs fails to set rw, ro, no_root_squash, root_squash, no_all_squash and all_squash flags in some cases)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 19:59:51 +0100
with message-id 
and subject line Re: nfs-kernel-server: all exports are read only
has caused the Debian Bug report #709403,
regarding nfs-kernel-server: exportfs fails to set rw, ro, no_root_squash, 
root_squash, no_all_squash and all_squash flags in some cases
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
709403: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709403
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: nfs-kernel-server
Version: 1:1.2.8-9
Severity: important
Tags: fixed-upstream
Control: merge -1 709403

Dear Maintainer,

after upgrading from version 1:1.2.6-4 several exports on my server lost
their no_root_squash flag, causing "Permission denied" errors on the
corresponding clients when using root.

After some testing and debugging I came to the following conclusion:
Commit 11ba3b1e01b67b7d19f26fba94fabdb60878e809 (Add a default flavor to
an export's e_secinfo list) breaks export option parsing by exportfs in
some cases.
Upstream commit 7004991526be90ec2647d28c503936dc91bc9100 (exportfs: Fix
the default authentication flavour setting) fixes the bug as a side
effect of dealing with another problem sharing the same root cause.

The easiest workaround is to add a sec=xyz option at the beginning of
all export option strings.


My test configuration is as follows:

 -- /etc/exports --
/srv/nfs4   -fsid=0,async,no_subtree_check,insecure,all_squash 10.0.0.2 
10.0.0.3(secure,rw,no_root_squash,no_all_squash)

exportfs -v output from version 1:1.2.8-9:
/srv/nfs4   
10.0.0.2(ro,async,wdelay,insecure,root_squash,all_squash,no_subtree_check,fsid=0,sec=sys,ro,root_squash,all_squash)
/srv/nfs4   
10.0.0.3(ro,async,wdelay,root_squash,all_squash,no_subtree_check,fsid=0,sec=sys,ro,root_squash,all_squash)

but /var/lib/nfs/etab shows
/srv/nfs4   
10.0.0.2(ro,async,wdelay,hide,nocrossmnt,insecure,root_squash,all_squash,no_subtree_check,secure_locks,acl,fsid=0,anonuid=65534,anongid=65534,sec=sys,ro,root_squash,all_squash)
/srv/nfs4   
10.0.0.3(rw,async,wdelay,hide,nocrossmnt,secure,no_root_squash,no_all_squash,no_subtree_check,secure_locks,acl,fsid=0,anonuid=65534,anongid=65534,sec=sys,ro,root_squash,all_squash)
 ^  ^  
^   
   ^  ^   ^
meaning exportfs -a|-r produces an inconsistent etab line. Consequently
rw, no_root_squash and no_all_squash get dropped by exportfs -v and
mountd (last save wins). This happens under following conditions:

(1) A default option specification is present on the export line.
(2) The export line contains an export with rw, ro, [no_]root_squash or
[no_]squash_all options different from the implied or declared
default options
(3) The option string for this export doesn't contain a sec=xyz
option preceding the options named in (2).

The underlying bug is in function parseopts at ./support/nfs/exports.c:646:
A default security flavor containing duplicates of the specified default
values for the READONLY, ROOTSQUASH and ALLSQUASH flags is added to the
default options. This default flavor is erroneously reused for all exports
on the same line in spite of containing flags that can be altered by export
specifications. This results in possibly incorrect options at the end of
the export specifications in the etab file. The bug fix is to generate a
default security flavor seperately for each export that doesn't already have
one. This is in effect what upstream commit
7004991526be90ec2647d28c503936dc91bc9100 does by deferring the generation
of default security flavors as long as possible.

I have patched version 1:1.2.8-9 with upstream commit
7004991526be90ec2647d28c503936dc91bc9100 and it works as expected:

exportfs -v output from version 1:1.2.8-9.1:
/srv/nfs4   
10.0.0.2(ro,async,wdelay,insecure,root_squash,all_squash,no_subtree_check,fsid=0,sec=sys,ro,root_squash,all_squash)
/srv/nfs4   
10.0.0.3(rw,async,wdelay,no_root_squash,no_subtree_check,fsid=0,sec=sys,rw,no_root_squash,no_all_squash)

/var/lib/nfs/etab after exportfs -r (version 1:1.2.8-9.1):
/srv/nfs4   
10.0.0.2(ro,async,wdelay,hide,nocrossmnt,insecure,root_squash,all_squash,no_subtree_check,secure_locks,acl,fsid=0,anonuid=65534,anongid=65534,sec=sys,ro,root_squash,all_squash)
/srv/nfs4   
10.0.0.3(rw,async,wdelay,hide,nocrossmnt,secure,no_root_squash,no_all_squash,no_subtree_check,secure_locks,acl,fsid=0,anonuid=65534,anongid=65534,sec=sy

Bug#709403: marked as done (nfs-kernel-server: exportfs fails to set rw, ro, no_root_squash, root_squash, no_all_squash and all_squash flags in some cases)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 19:59:51 +0100
with message-id 
and subject line Re: nfs-kernel-server: all exports are read only
has caused the Debian Bug report #709403,
regarding nfs-kernel-server: exportfs fails to set rw, ro, no_root_squash, 
root_squash, no_all_squash and all_squash flags in some cases
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
709403: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=709403
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-kernel-server
Version: 1:1.2.8-2
Severity: important

Upgrade of nfs-kernel-server from 1:1.2.6-3 to 1:1.2.8-2 turned all my
NFS exports to read-only.

Before upgrade `sudo exportfs -v` show something like

/root.nfs/r3
192.168.0.0/24(rw,root_squash,all_squash,no_subtree_check,mountpoint,anonuid=1000,anongid=1000)

but after upgrade it is 

/root.nfs/r3
192.168.0.0/24(ro,root_squash,all_squash,no_subtree_check,mountpoint,anonuid=1000,anongid=1000)

even though there were no changes to /etc/exports.
I can't make any of my NFS exports writable without downgrading
"nfs-kernel-server" and corresponding "nfs-common".

Please advise. Thanks.

Cheers,
 Dmitry Smirnov
 GPG key : 4096R/53968D1B


--- System information. ---
Architecture: amd64
Kernel:   Linux 3.8-2-amd64
--- End Message ---
--- Begin Message ---
Version: 1:1.3.4-1

This was reported to be fixed in the above version.

Ben.

-- 
Ben Hutchings
Beware of programmers who carry screwdrivers. - Leonard Brandwein


signature.asc
Description: This is a digitally signed message part
--- End Message ---


Processed: retitle 679274 to init script does not start nfsd when /etc/exports is empty, tagging 679274

2022-03-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> retitle 679274 init script does not start nfsd when /etc/exports is empty
Bug #679274 [nfs-kernel-server] nfs-kernel-server: upgrading to 1:1.2.6-2 fails 
to start the kernel server
Changed Bug title to 'init script does not start nfsd when /etc/exports is 
empty' from 'nfs-kernel-server: upgrading to 1:1.2.6-2 fails to start the 
kernel server'.
> tags 679274 + wontfix
Bug #679274 [nfs-kernel-server] init script does not start nfsd when 
/etc/exports is empty
Added tag(s) wontfix.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
679274: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=679274
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



linux-signed-arm64_4.19.235+1_source.changes is NEW

2022-03-19 Thread Debian FTP Masters
Mapping buster-proposed-updates to oldstable-proposed-updates.
binary:ata-modules-4.19.0-20-arm64-di is NEW.
binary:btrfs-modules-4.19.0-20-arm64-di is NEW.
binary:cdrom-core-modules-4.19.0-20-arm64-di is NEW.
binary:compress-modules-4.19.0-20-arm64-di is NEW.
binary:crc-modules-4.19.0-20-arm64-di is NEW.
binary:crypto-dm-modules-4.19.0-20-arm64-di is NEW.
binary:crypto-modules-4.19.0-20-arm64-di is NEW.
binary:efi-modules-4.19.0-20-arm64-di is NEW.
binary:event-modules-4.19.0-20-arm64-di is NEW.
binary:ext4-modules-4.19.0-20-arm64-di is NEW.
binary:fat-modules-4.19.0-20-arm64-di is NEW.
binary:fb-modules-4.19.0-20-arm64-di is NEW.
binary:fuse-modules-4.19.0-20-arm64-di is NEW.
binary:i2c-modules-4.19.0-20-arm64-di is NEW.
binary:input-modules-4.19.0-20-arm64-di is NEW.
binary:isofs-modules-4.19.0-20-arm64-di is NEW.
binary:jfs-modules-4.19.0-20-arm64-di is NEW.
binary:kernel-image-4.19.0-20-arm64-di is NEW.
binary:leds-modules-4.19.0-20-arm64-di is NEW.
binary:linux-image-4.19.0-20-arm64 is NEW.
binary:linux-image-4.19.0-20-rt-arm64 is NEW.
binary:loop-modules-4.19.0-20-arm64-di is NEW.
binary:md-modules-4.19.0-20-arm64-di is NEW.
binary:mmc-modules-4.19.0-20-arm64-di is NEW.
binary:mtd-core-modules-4.19.0-20-arm64-di is NEW.
binary:multipath-modules-4.19.0-20-arm64-di is NEW.
binary:nbd-modules-4.19.0-20-arm64-di is NEW.
binary:nic-modules-4.19.0-20-arm64-di is NEW.
binary:nic-shared-modules-4.19.0-20-arm64-di is NEW.
binary:nic-usb-modules-4.19.0-20-arm64-di is NEW.
binary:nic-wireless-modules-4.19.0-20-arm64-di is NEW.
binary:ppp-modules-4.19.0-20-arm64-di is NEW.
binary:sata-modules-4.19.0-20-arm64-di is NEW.
binary:scsi-core-modules-4.19.0-20-arm64-di is NEW.
binary:scsi-modules-4.19.0-20-arm64-di is NEW.
binary:scsi-nic-modules-4.19.0-20-arm64-di is NEW.
binary:squashfs-modules-4.19.0-20-arm64-di is NEW.
binary:udf-modules-4.19.0-20-arm64-di is NEW.
binary:uinput-modules-4.19.0-20-arm64-di is NEW.
binary:usb-modules-4.19.0-20-arm64-di is NEW.
binary:usb-serial-modules-4.19.0-20-arm64-di is NEW.
binary:usb-storage-modules-4.19.0-20-arm64-di is NEW.
binary:xfs-modules-4.19.0-20-arm64-di is NEW.

Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file hashes are valid), so please be patient.

Packages are routinely processed through to the archive, and do feel
free to browse the NEW queue[1].

If there is an issue with the upload, you will receive an email from a
member of the ftpteam.

If you have any questions, you may reply to this email.

[1]: https://ftp-master.debian.org/new.html
 or https://ftp-master.debian.org/backports-new.html for *-backports



Processing of linux-signed-arm64_4.19.235+1_source.changes

2022-03-19 Thread Debian FTP Masters
linux-signed-arm64_4.19.235+1_source.changes uploaded successfully to localhost
along with the files:
  linux-signed-arm64_4.19.235+1.dsc
  linux-signed-arm64_4.19.235+1.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



linux-signed-arm64_5.10.103+1~bpo10+1_source.changes is NEW

2022-03-19 Thread Debian FTP Masters
binary:ata-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:btrfs-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:cdrom-core-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:crc-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:crypto-dm-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:crypto-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:efi-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:event-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:ext4-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:f2fs-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:fat-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:fb-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:fuse-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:i2c-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:input-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:isofs-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:jfs-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:kernel-image-5.10.0-0.bpo.12-arm64-di is NEW.
binary:leds-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:linux-image-5.10.0-0.bpo.12-arm64 is NEW.
binary:linux-image-5.10.0-0.bpo.12-cloud-arm64 is NEW.
binary:linux-image-5.10.0-0.bpo.12-rt-arm64 is NEW.
binary:loop-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:md-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:mmc-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:mtd-core-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:multipath-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:nbd-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:nic-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:nic-shared-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:nic-usb-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:nic-wireless-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:ppp-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:sata-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:scsi-core-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:scsi-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:scsi-nic-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:squashfs-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:udf-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:uinput-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:usb-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:usb-serial-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:usb-storage-modules-5.10.0-0.bpo.12-arm64-di is NEW.
binary:xfs-modules-5.10.0-0.bpo.12-arm64-di is NEW.

Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file hashes are valid), so please be patient.

Packages are routinely processed through to the archive, and do feel
free to browse the NEW queue[1].

If there is an issue with the upload, you will receive an email from a
member of the ftpteam.

If you have any questions, you may reply to this email.

[1]: https://ftp-master.debian.org/new.html
 or https://ftp-master.debian.org/backports-new.html for *-backports



Bug#659465: marked as done (nfs-common: need to restart nfs-common at the end of init on the NFS server)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 18:33:26 +0100
with message-id <5f9a545642e7b462e922ff46e9a8bad3dc71fa75.ca...@decadent.org.uk>
and subject line Re: nfs-common: need to restart nfs-common at the end of init 
on the NFS server
has caused the Debian Bug report #659465,
regarding nfs-common: need to restart nfs-common at the end of init on the NFS 
server
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
659465: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659465
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-common
Version: 1:1.2.5-4
Severity: important

Dear Maintainer,

However some people reported bugs that look like this one, I can't determine 
whether this is exactly the same issue.

The issue is that the NFS clients fail to map user ids from NFS server, 
complaining about wrong domain name (localdomain instead of the true domain 
name).
I use NFSv4 with MIT Kerberos authentication and openldap to store user 
information.
Everything is working fine (auth, nss, nfs mounting, etc) except NFS id mapping.
Domain is provided by DHCP, and setting domain in idmapd.conf as well does not 
solve the problem.
Both client and server are Debian testing.

Restarting nfs-common on the server after init actually solves the problem, and 
I added this to rc.local script as a workaround.

So I guess that there is something wrong in the init running order.

-- Package-specific info:
-- rpcinfo --
   program vers proto   port
104   tcp111  portmapper
103   tcp111  portmapper
102   tcp111  portmapper
104   udp111  portmapper
103   udp111  portmapper
102   udp111  portmapper
132   tcp   2049  nfs
133   tcp   2049  nfs
134   tcp   2049  nfs
1002272   tcp   2049
1002273   tcp   2049
132   udp   2049  nfs
133   udp   2049  nfs
134   udp   2049  nfs
1002272   udp   2049
1002273   udp   2049
1000211   udp  33790  nlockmgr
1000213   udp  33790  nlockmgr
1000214   udp  33790  nlockmgr
1000211   tcp  49108  nlockmgr
1000213   tcp  49108  nlockmgr
1000214   tcp  49108  nlockmgr
151   udp  42771  mountd
151   tcp  55095  mountd
152   udp  56799  mountd
152   tcp  41919  mountd
153   udp  58820  mountd
153   tcp  34937  mountd
1000241   udp  58559  status
1000241   tcp  41350  status
-- /etc/default/nfs-common --
NEED_STATD=
STATDOPTS=
NEED_IDMAPD=
NEED_GSSD=yes
-- /etc/idmapd.conf --
[General]
Verbosity = 0
Pipefs-Directory = /var/lib/nfs/rpc_pipefs
[Mapping]
Nobody-User = nobody
Nobody-Group = nogroup
-- /etc/fstab --

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-1-686-pae (SMP w/1 CPU core)
Locale: LANG=fr_FR@euro, LC_CTYPE=fr_FR@euro (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/dash

Versions of packages nfs-common depends on:
ii  adduser 3.113+nmu1
ii  initscripts 2.88dsf-22
ii  libc6   2.13-26
ii  libcap2 1:2.22-1
ii  libcomerr2  1.42-1
ii  libdevmapper1.02.1  2:1.02.67-2
ii  libevent-2.0-5  2.0.16-stable-1
ii  libgssapi-krb5-21.10+dfsg~beta1-2
ii  libgssglue1 0.3-4
ii  libk5crypto31.10+dfsg~beta1-2
ii  libkeyutils11.5.2-2
ii  libkrb5-3   1.10+dfsg~beta1-2
ii  libmount1   2.20.1-1.2
ii  libnfsidmap20.25-1
ii  libtirpc1   0.2.2-5
ii  libwrap07.6.q-22
ii  lsb-base3.2-28.1
ii  rpcbind 0.2.0-7
ii  ucf 3.0025+nmu2

Versions of packages nfs-common recommends:
ii  python  2.7.2-10

nfs-common suggests no packages.

Versions of packages nfs-kernel-server depends on:
ii  libblkid1 2.20.1-1.2
ii  libc6 2.13-26
ii  libnfsidmap2  0.25-1
ii  libtirpc1 0.2.2-5
ii  libwrap0  7.6.q-22
ii  lsb-base  3.2-28.1
ii  ucf   3.0025+nmu2

-- Configuration Files:
/etc/default/nfs-common changed:
NEED_STATD=
STATDOPTS=
NEED_IDMAPD=
NEED_GSSD=yes

/etc/idmapd.conf changed:
[General]
Verbosity = 0
Pipefs-Directory = /var/lib/nfs/rpc_pipefs
[Mapping]
Nobody-User = nobody
Nobody-Group = nogroup


-- no debconf information


--- End Message ---
--- Begin Message ---
Closing this due to lack of response.

Ben.

-- 
Ben Hutchings
Beware of programmers who carry screwdrivers. - Leonard Br

Processed: submitter 848306

2022-03-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> submitter 848306 debian-kernel@lists.debian.org
Bug #848306 [nfs-common] should stop distributing rpc.svcgssd
Changed Bug submitter to 'debian-kernel@lists.debian.org' from 'Daniel Pocock 
'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
848306: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848306
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#649052: marked as done (nfs-kernel-server: svcgssd can't open /usr/lib/libgssapi_krb5.so.2: /usr/lib/libgssapi_krb5.so.2: cannot open shared object file)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 18:30:22 +0100
with message-id 
and subject line Re: nfs-kernel-server: svcgssd can't open 
/usr/lib/libgssapi_krb5.so.2:  /usr/lib/libgssapi_krb5.so.2: cannot open shared 
object file
has caused the Debian Bug report #649052,
regarding nfs-kernel-server: svcgssd can't open /usr/lib/libgssapi_krb5.so.2: 
/usr/lib/libgssapi_krb5.so.2: cannot open shared object file
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
649052: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649052
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-kernel-server
Version: 1:1.2.4-1~bpo60+1
Severity: important
Tags: upstream


When a repository of backports update the nfs-kernel-server, and then 
krb5-user, then the nfs-kernel-server not run with the error:
=
Starting NFS kernel daemon: nfsd svcgssdcan't open 
/usr/lib/libgssapi_krb5.so.2: /usr/lib/libgssapi_krb5.so.2: cannot open shared 
object file: No suchfile or directory
rpc.svcgssd: Unable to obtain list of supported mechanisms. Check that gss 
library is properly configured.

rpc.svcgssd: ERROR: Problem with gssapi library

 failed!
=
When I update the package libgssglue1, then everything becomes good:
=
ARCHIV ~ # dpkg --search /etc/gssapi_mech.conf
libgssglue1: /etc/gssapi_mech.conf
ARCHIV ~ #  apt-get -t squeeze-backports install libgssglue1
Чтение списков пакетов... Готово
Построение дерева зависимостей
Чтение информации о состоянии... Готово
Следующие пакеты устанавливались автоматически и больше не требуются:
  libpth20 libkadm5clnt-mit7 libgpgme11
Для их удаления используйте 'apt-get autoremove'.
Пакеты, которые будут обновлены:
  libgssglue1
обновлено 1, установлено 0 новых пакетов, для удаления отмечено 0 пакетов, и 
230 пакетов не обновлено.
Необходимо скачать 23,3 kБ архивов.
После данной операции, объём занятого дискового пространства уменьшится на 22,5 
kB.
Получено:1 http://ftp.de.debian.org/debian/ wheezy/main libgssglue1 i386 
0.3-3.1 [23,3 kB]
Получено 23,3 kБ за 0с (33,7 kБ/c)
Чтение журнала изменений... Выполнено
(Чтение базы данных ... на данный момент установлено 37052 файла и каталога.)
Подготовка к замене пакета libgssglue1 0.1-4 (используется файл 
.../libgssglue1_0.3-3.1_i386.deb) ...
Распаковывается замена для пакета libgssglue1 ...
Настраивается пакет libgssglue1 (0.3-3.1) ...
Устанавливается новая версия файла настройки /etc/gssapi_mech.conf ...
ARCHIV ~ # service nfs-kernel-server restart
Stopping NFS kernel daemon: mountd svcgssd nfsd.
Unexporting directories for NFS kernel daemon
Exporting directories for NFS kernel daemon...exportfs: scandir /etc/exports.d: 
No such file or directory

..
Starting NFS kernel daemon: nfsd svcgssd mountd.
==
perhaps it should be noted as a dependency package libgssglue1 ...


-- Package-specific info:
-- rpcinfo --
   program vers proto   port  service
104   tcp111  portmapper
103   tcp111  portmapper
102   tcp111  portmapper
104   udp111  portmapper
103   udp111  portmapper
102   udp111  portmapper
1000241   udp  52124  status
1000241   tcp  44262  status
132   tcp   2049  nfs
133   tcp   2049  nfs
134   tcp   2049  nfs
1002272   tcp   2049
1002273   tcp   2049
132   udp   2049  nfs
133   udp   2049  nfs
134   udp   2049  nfs
1002272   udp   2049
1002273   udp   2049
1000211   udp  41525  nlockmgr
1000213   udp  41525  nlockmgr
1000214   udp  41525  nlockmgr
1000211   tcp  41766  nlockmgr
1000213   tcp  41766  nlockmgr
1000214   tcp  41766  nlockmgr
151   udp  52008  mountd
151   tcp  57750  mountd
152   udp  37176  mountd
152   tcp  38245  mountd
153   udp  34956  mountd
153   tcp  53819  mountd
-- /etc/default/nfs-kernel-server --
RPCNFSDCOUNT=8
RPCNFSDPRIORITY=0
RPCMOUNTDOPTS=--manage-gids
NEED_SVCGSSD=yes
RPCSVCGSSDOPTS=yes
-- /etc/exports --
/nfsgss/krb5(rw,sync,no_subtree_check)
/archiv-big files(rw,sync,no_subtree_check)
/archiv-small   files(rw,sync,no_subtree_check)
-- /proc/fs/nfs/exports --
# Version 1.1
# Path Client(Flags) # IPs

-- System Information:
Debian Release: 6.0.3
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'stable-updates'), (500, 'testing')
Architec

Bug#644948: marked as done (nfs-common: Wrong uid/gid with latest version using NFSv4)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 18:29:02 +0100
with message-id <4b512fde181875e8800a4526d149362b46101e43.ca...@decadent.org.uk>
and subject line Re: nfs-common: Wrong uid/gid with latest version using NFSv4
has caused the Debian Bug report #644948,
regarding nfs-common: Wrong uid/gid with latest version using NFSv4
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
644948: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644948
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-common
Version: 1:1.2.5-2
Severity: important

After upgrade to nfs-common 1:1.2.5-2 I noticed that uid/gid's are displayed as
'nobody' and 'nogroup' respectively. This is the case checking with both
Nautilus and terminal.

Downgrading to 1:1.2.4-1 from Testing fixes the problem.

I am using Squeeze with nfs-kernel-server version 1:1.2.2-4 on the server side.



-- Package-specific info:
-- rpcinfo --
   program vers proto   port
104   tcp111  portmapper
103   tcp111  portmapper
102   tcp111  portmapper
104   udp111  portmapper
103   udp111  portmapper
102   udp111  portmapper
1000241   udp  45260  status
1000241   tcp  50813  status
-- /etc/default/nfs-common --
NEED_STATD=
STATDOPTS=
NEED_IDMAPD=yes
NEED_GSSD=
-- /etc/idmapd.conf --
[General]
Verbosity = 0
Pipefs-Directory = /var/lib/nfs/rpc_pipefs
[Mapping]
Nobody-User = nobody
Nobody-Group = nogroup
-- /etc/fstab --

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.0.0-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages nfs-common depends on:
ii  adduser 3.113
ii  initscripts 2.88dsf-13.11
ii  libc6   2.13-21  
ii  libcap2 1:2.22-1 
ii  libcomerr2  1.42~WIP-2011-10-05-2
ii  libdevmapper1.02.1  2:1.02.65-1  
ii  libevent-1.4-2  1.4.14b-stable-1 
ii  libgssapi-krb5-21.9.1+dfsg-3 
ii  libgssglue1 0.3-3.1  
ii  libk5crypto31.9.1+dfsg-3 
ii  libkeyutils11.5.2-2  
ii  libkrb5-3   1.9.1+dfsg-3 
ii  libnfsidmap20.24-1   
ii  libtirpc1   0.2.2-5  
ii  libwrap07.6.q-21 
ii  lsb-base3.2-28   
ii  rpcbind 0.2.0-6  
ii  ucf 3.0025+nmu2  

Versions of packages nfs-common recommends:
ii  python  2.7.2-9

nfs-common suggests no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Closing this, as the problem appears to have been a misconfiguration
rather than a bug.

Ben.

-- 
Ben Hutchings
Beware of programmers who carry screwdrivers. - Leonard Brandwein


signature.asc
Description: This is a digitally signed message part
--- End Message ---


Bug#644236: marked as done (installation fails when rpcbind is disabled, although nfs-common is disabled there too)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 18:26:23 +0100
with message-id 
and subject line Re: installation fails when rpcbind is disabled,  although 
nfs-common is disabled there too
has caused the Debian Bug report #644236,
regarding installation fails when rpcbind is disabled, although nfs-common is 
disabled there too
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
644236: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644236
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-common
Version: 1:1.2.5-2
Severity: important

Dear Maintainer,

I have found a bug on upgrading nfs-common that might be nfs-common
init script header or insserv related:


   * What led up to the situation?

Upgrading nfs-common when nfs-common and (!) rpcbind is disabled in
insserv.

merkaba:~> LANG=C apt-get upgrade
Reading package lists... Done
Building dependency tree   
Reading state information... Done
The following packages have been kept back:
  kmymoney kmymoney-common tryton-client
0 upgraded, 0 newly installed, 0 to remove and 3 not upgraded.
1 not fully installed or removed.
After this operation, 0 B of additional disk space will be used.
Do you want to continue [Y/n]? 
Setting up nfs-common (1:1.2.5-2) ...
insserv: Service rpcbind has to be enabled to start service nfs-common
insserv: exiting now!
update-rc.d: error: insserv rejected the script header
dpkg: error processing nfs-common (--configure):
 subprocess installed post-installation script returned error exit status 1
configured to not write apport reports
  Errors were encountered while processing:
 nfs-common
E: Sub-process /usr/bin/dpkg returned an error code (1)


   * What exactly did you do (or not do) that was effective (or
 ineffective)?

Explicetely disabling nfs-common again does not help:

merkaba:~> insserv -r nfs-common
merkaba:~> LANG=C apt-get upgrade  
Reading package lists... Done
Building dependency tree   
Reading state information... Done
The following packages have been kept back:
  kmymoney kmymoney-common tryton-client
0 upgraded, 0 newly installed, 0 to remove and 3 not upgraded.
1 not fully installed or removed.
After this operation, 0 B of additional disk space will be used.
Do you want to continue [Y/n]? 
Setting up nfs-common (1:1.2.5-2) ...
insserv: Service rpcbind has to be enabled to start service nfs-common
insserv: exiting now!
update-rc.d: error: insserv rejected the script header
dpkg: error processing nfs-common (--configure):
 subprocess installed post-installation script returned error exit status 1
configured to not write apport reports
  Errors were encountered while processing:
 nfs-common
E: Sub-process /usr/bin/dpkg returned an error code (1)


   * What was the outcome of this action?

The installation failed.


   * What outcome did you expect instead?

It should have succeeded. This is on a laptop where I only use NFS
on demand. I do not want to have it running when I do not use it.

I think this is a valid usage scenario.

Thus when nfs-common *and* rpcbind are disabled in insserv installation
should still succeed.

This might be a bug in insserv. If so please reassign.


   * Workaround to have apt upgrade nfs-common

Temporarily enabling both nfs-common and rpcbind lets nfs-common upgrade
smoothly:

merkaba:~#100> insserv rpcbind 
merkaba:~> insserv nfs-common
merkaba:~> LANG=C apt-get upgrade
Reading package lists... Done
Building dependency tree   
Reading state information... Done
The following packages have been kept back:
  kmymoney kmymoney-common tryton-client
0 upgraded, 0 newly installed, 0 to remove and 3 not upgraded.
1 not fully installed or removed.
After this operation, 0 B of additional disk space will be used.
Do you want to continue [Y/n]? 
Setting up nfs-common (1:1.2.5-2) ...
Stopping NFS common utilities: idmapd statd.
Starting NFS common utilities: statd
Not starting: portmapper is not running ... (warning).
merkaba:~> insserv -r nfs-common
merkaba:~> insserv -r rpcbind   
merkaba:~>

Bug script failed due to rpcbind not running, but I do not think
it matters for this bugreport. If you want to have output of it,
please tell.

Thanks,
Martin

*** End of the template - remove these lines ***


-- Package-specific info:
-- rpcinfo --

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (120, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.0.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=de_DE.UTF-8, 

Processed: tagging 644236

2022-03-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 644236 + stretch
Bug #644236 [nfs-common] installation fails when rpcbind is disabled, although 
nfs-common is disabled there too
Added tag(s) stretch.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
644236: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644236
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processing of linux-signed-arm64_5.10.103+1~bpo10+1_source.changes

2022-03-19 Thread Debian FTP Masters
linux-signed-arm64_5.10.103+1~bpo10+1_source.changes uploaded successfully to 
localhost
along with the files:
  linux-signed-arm64_5.10.103+1~bpo10+1.dsc
  linux-signed-arm64_5.10.103+1~bpo10+1.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#1006346: cloud.debian.org: bullseye AMIs don't boot on Amazon EC2 Xen instances with Enhanced Networking

2022-03-19 Thread Noah Meyerhans
On Sat, Mar 19, 2022 at 10:41:39AM +0100, Salvatore Bonaccorso wrote:
> > >From the upstream discussion on the linux-pci mailing list [*]:
> > 
> > > Yes. My understanding is that the issue is because AWS is using older
> > > versions of Xen. They are in the process of updating their fleet to a
> > > newer version of Xen so the change introduced with Stefan's commit
> > > isn't an issue any longer.
> > > 
> > > I think the changes are scheduled to be completed in the next 10-12
> > > weeks. For now we are carrying a revert in the Fedora Kernel.
> > > 
> > > You can follow this Fedora CoreOS issue if you'd like to know more
> > > about when the change lands in their backend. We work closely with one
> > > of their partner engineers and he keeps us updated.
> > > https://github.com/coreos/fedora-coreos-tracker/issues/1066
> > 
> > Ideally we can revert the upstream commit from the stable kernels, since
> > otherwise Debian users on AWS Xen instance types may be stuck using
> > older, unsafe kernels.  Especially if we have time to include the change
> > in the upcoming bullseye and buster point releases.  If the kernel
> > updates for those stable updates have already been built, though, it
> > might be too late to matter.  By the time we publish our next kernel
> > builds, the AWS Xen update may be complete.
> 
> Wehere one can track the update status for their Xen version directly
> or is following the above the only reference?

It's just for reference; the deployment timeline isn't published.  As
far as I know, it's also subject to change in the event that unexpected
issues arise or it's preempted by some high severity issue.

> How frequent is this particular combination of hardware/software? We
> have the change already applied for a while in bullseye, buster would
> be impacted new since the last update done for security fixes

The impacted instance types aren't the most common, as they're not the
latest generation.  So I expect that the majority of the impact is felt
by people or organizations that haven't yet been able to make time to
switch to newer instance types.  The implication here, of course, is
that many of these deployments may be production environment where
stability is prioritized over migration to the new thing.

We get a little bit of data about what instance types are used with
Debian on AWS, but it's incomplete as it only reflects usage by AWS
customers who use access Debian via the AWS Marketplace.  Consider it
something like popcon data; it's essentially opt-in.  If the data we get
from the Marketplace covering the past 3 days worth of activity is
representative of the Debian usage in general, then it looks like
roughly 1% of Debian users on AWS are trying to use the impacted
instance types.

> Are there workarounds for the affected users of this combination? I
> see some options listed in 
> https://wiki.debian.org/Cloud/AmazonEC2Image/Bullseye 

People can use newer generation instance types, which are not impacted.
Depending on the use case, that could be a trivial change, but it could
also be disruptive.  Newer instance types aren't based on Xen at all and
expose a different hardware device model to the instance.  Debian
supports the newer instance types, but the end user workload may still
need additional nontrivial qualification.

> If we revert the commit it reverts a fix for a bug with Marvell NVME
> devices.
> 
> But we cannot just revert the commit for the cloud images.

Understood.

> If we know something about the release schedule from Amazon to update
> their Xen instances (which is the way to move forward, since upstream
> won't revert the commit) then we should leave the status as it is for
> bullseye (and now for buster). For bullseye there is there is
> CVE-2022-0847 fixes they would need to pick up.

Yes, the problem will go away when the Xen fleet is updated.  It sounds
like we're looking at roughly a 3 month timeline, after which point the
patch won't be a problem.  However, until then, people who need to use
Xen instances will be stuck either running an unsafe kernel or building
their own.

noah



Bug#637461: marked as done (nfs-common: On stations, does not mount at boot of server NFS share)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 17:41:43 +0100
with message-id <1de20de75275d8975d0b22f51169186ce64baa83.ca...@decadent.org.uk>
and subject line Re: nfs-common: On stations, does not mount at boot of server 
NFS share
has caused the Debian Bug report #637461,
regarding nfs-common: On stations, does not mount at boot of server NFS share
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
637461: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=637461
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-common
Version: 1:1.2.2-4
Severity: important

Dear Sir

the server seems fine and working.

Everyboots do not mount tbhe /home/freevonfs

so I gotta do manually with root eaach time :(
server side is fine

/etc/fstab is like on client:

# /etc/fstab: static file system information.
#
# Use 'blkid' to print the universally unique identifier for a
# device; this may be used with UUID= as a more robust way to name devices
# that works even if disks are added and removed. See fstab(5).
#
#
proc/proc   procdefaults0   0
# / was on /dev/sda1 during installation
UUID=70101d91-72a6-4ce9-a482-6e508b9ef9ef /   ext4
errors=remount-ro 0   1
# /home was on /dev/sda6 during installation
UUID=686693f7-7878-425f-8490-8e7b784a86ef /home   ext3defaults  
  0   2
# swap was on /dev/sda5 during installation
UUID=a1f64a19-2ce8-49ed-98b9-595ff4d2cb5e noneswapsw
  0   0
#/dev/scd0   /media/cdrom0   udf,iso9660 user,noauto 0   0
#/dev/sdb1   /media/usb0 autorw,user,noauto  0   0


192.168.1.2:/music  /home/freevonfs nfs auto,defaults   0   0




-- System Information:
Debian Release: 6.0.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages nfs-common depends on:
ii  adduser 3.112+nmu2   add and remove users and groups
ii  initscripts 2.88dsf-13.1 scripts for initializing and shutt
ii  libc6   2.11.2-10Embedded GNU C Library: Shared lib
ii  libcap2 1:2.19-3 support for getting/setting POSIX.
ii  libcomerr2  1.41.12-4stable1 common error description library
ii  libevent-1.4-2  1.4.13-stable-1  An asynchronous event notification
ii  libgssapi-krb5-21.8.3+dfsg-4squeeze1 MIT Kerberos runtime libraries - k
ii  libgssglue1 0.1-4mechanism-switch gssapi library
ii  libk5crypto31.8.3+dfsg-4squeeze1 MIT Kerberos runtime libraries - C
ii  libkrb5-3   1.8.3+dfsg-4squeeze1 MIT Kerberos runtime libraries
ii  libnfsidmap20.23-2   An nfs idmapping library
ii  librpcsecgss3   0.19-2   allows secure rpc communication us
ii  libwrap07.6.q-19 Wietse Venema's TCP wrappers libra
ii  lsb-base3.2-23.2squeeze1 Linux Standard Base 3.2 init scrip
ii  netbase 4.45 Basic TCP/IP networking system
ii  portmap 6.0.0-2  RPC port mapper
ii  ucf 3.0025+nmu1  Update Configuration File: preserv

nfs-common recommends no packages.

nfs-common suggests no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Closing due to lack of response.

Ben.

-- 
Ben Hutchings
Beware of programmers who carry screwdrivers. - Leonard Brandwein


signature.asc
Description: This is a digitally signed message part
--- End Message ---


Bug#637874: marked as done (nfs-kernel-server: need to restart daily the server to let users mount the exports)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 17:41:43 +0100
with message-id <1de20de75275d8975d0b22f51169186ce64baa83.ca...@decadent.org.uk>
and subject line Re: nfs-common: On stations, does not mount at boot of server 
NFS share
has caused the Debian Bug report #637461,
regarding nfs-kernel-server: need to restart daily the server to let users 
mount the exports
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
637461: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=637461
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-kernel-server
Version: last one of debian stable , up to date
Severity: important

Hi, 

Since 1-2 years, the bug has not been fixed yet. Now debian testing is now 
stable, and bugs remains.

OK. I will post you the content of my /etc//exports soon. it is however very 
basic and normal.

The server debian is very well installed and the bug surely exists.

To let stations to mount the /home, 

1 - /etc/init.d/nfs-kernel-server restart
must be performed frequently

2-on stations.
you must create a script into rc2.d 
to say to mount /home via

mount /home

with a well prior configured /etc/fstab

hank s alot 

love debian



-- System Information:
Debian Release: 6.0.2
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


--- End Message ---
--- Begin Message ---
Closing due to lack of response.

Ben.

-- 
Ben Hutchings
Beware of programmers who carry screwdrivers. - Leonard Brandwein


signature.asc
Description: This is a digitally signed message part
--- End Message ---


Bug#625601: marked as done (mount.nfs complains about statd is not running while it is running)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 17:39:17 +0100
with message-id <51e496c44bb03e3fcdfd48946bc6907a80bab1b1.ca...@decadent.org.uk>
and subject line Re: mount.nfs complains about statd is not running while it is 
running
has caused the Debian Bug report #625601,
regarding mount.nfs complains about statd is not running while it is running
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
625601: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625601
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-common
Version: 1:1.2.3-2
Severity: important

rpcinfo: can't contact portmapper: rpcinfo: RPC: Authentication error; why = 
Client credential too weak
The package bug script /usr/share/bug/nfs-common/script exited with an error 
status (return code = 256). Do you still want to file a report? [y|N|q|?]?

reporting nevertheless.

I start nfs client services:

shambhala:~> /etc/init.d/nfs-common stop
Stopping NFS common utilities: idmapd statd.
shambhala:~> /etc/init.d/rpcbind stop
Stopping rpcbind daemon
shambhala:~> /etc/init.d/rpcbind start
Starting rpcbind daemon
shambhala:~> rpcinfo -p
   program vers proto   port  service
104   tcp111  portmapper
103   tcp111  portmapper
102   tcp111  portmapper
104   udp111  portmapper
103   udp111  portmapper
102   udp111  portmapper
shambhala:~> /etc/init.d/nfs-common start
Starting NFS common utilities: statd idmapd.
shambhala:~> rpcinfo -p
   program vers proto   port  service
104   tcp111  portmapper
103   tcp111  portmapper
102   tcp111  portmapper
104   udp111  portmapper
103   udp111  portmapper
102   udp111  portmapper
1000241   udp  37575  status
1000241   tcp  54562  status
shambhala:~> ps aux | grep statd | grep -v grep
statd13555  0.0  0.0   2268  1012 ?Ss   15:37   0:00 /sbin/rpc.statd


I mount an export:

shambhala:~> mount -t nfs -o vers=3 172.21.101.9:/vol/nfstest /mnt/zeit
/bin/sh: Illegal option -p
mount.nfs: rpc.statd is not running but is required for remote locking.
mount.nfs: Either use '-o nolock' to keep locks local, or start statd.
mount.nfs: an incorrect mount option was specified

(I reported the bashism in /usr/sbin/start-statd separately.)


I have in daemon.log:

shambhala:~> tail -3 /var/log/daemon.log
May  4 15:37:35 localhost rpc.statd[13555]: Version 1.2.3 starting
May  4 15:37:35 localhost sm-notify[13556]: Version 1.2.3 starting
May  4 15:37:35 localhost sm-notify[13556]: Already notifying clients; Exiting!

sm-notify does not appear to be running:

shambhala:~> ps aux | egrep "(rpc|sm-notify)" | grep -v grep
root  1906  0.0  0.0  0 0 ?S<   13:55   0:00 [rpciod]
root 13544  0.0  0.0   2204   932 ?Ss   15:37   0:00 /sbin/rpcbind 
-w
statd13555  0.0  0.0   2268  1012 ?Ss   15:37   0:00 /sbin/rpc.statd
root 13568  0.0  0.0   2492   536 ?Ss   15:37   0:00 
/usr/sbin/rpc.idmapd

Thanks.

-- Package-specific info:
-- rpcinfo --

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (450, 'testing'), (400, 'unstable'), (110, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.38.5-tp42-snapshot-resv-size-dirty (PREEMPT)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages nfs-common depends on:
ii  adduser  3.112+nmu2  add and remove users and groups
ii  initscripts  2.88dsf-13.5scripts for initializing and shutt
ii  libc62.11.2-11   Embedded GNU C Library: Shared lib
ii  libcap2  1:2.20-1support for getting/setting POSIX.
ii  libcomerr2   1.41.12-2   common error description library
ii  libevent-1.4-2   1.4.13-stable-1 An asynchronous event notification
ii  libgssapi-krb5-2 1.9+dfsg-1+b1   MIT Kerberos runtime libraries - k
ii  libgssglue1  0.2-2   mechanism-switch gssapi library
ii  libk5crypto3 1.9+dfsg-1+b1   MIT Kerberos runtime libraries - C
ii  libkrb5-31.9+dfsg-1+b1   MIT Kerberos runtime libraries
ii  libnfsidmap2 0.24-1  An nfs idmapping library
ii  libtirpc10.2.1-1 transport-independent RPC library
ii  libwrap0 7.6.q-19Wietse Venema's TCP wrappers libra
ii  lsb-base 

Bug#620299: marked as done (nfs-kernel-server: nfs stop working after some time - rpc.mountd and rpciod in D state)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 17:37:13 +0100
with message-id 
and subject line Re: nfs-kernel-server: nfs stop working after some time - 
rpc.mountd and rpciod  in D state
has caused the Debian Bug report #620299,
regarding nfs-kernel-server: nfs stop working after some time - rpc.mountd and 
rpciod in D state
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
620299: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=620299
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-kernel-server
Version: 1:1.2.2-4
Severity: important
Tags: squeeze

Hi,

I've got a strange behavior with my nfs server since I use nfsv4.
I'm using nfsv3 and nfsv4 with libpam-ldap, libnss-ldap, and unscd.
The server, after some times (it can be few days or some weeks), stop 
responding, and the clients cannot mount shares anymore.

Once the server has hung, the first rpciod process is in D state, as the 
rpc.mountd process.
I can kill -9 the rpc.mountd process and restart it, but it get back in D state 
as soon as a mount request occurs.
I'm unable to get nfs working again, unless rebooting the server.

Here is my configuration. 'nas' and 'dev' are two nfs servers, mounted on each 
other.
The problems occurs on the server 'dev'.

root@dev:/# cat /etc/fstab
#
proc/proc   procdefaults0   0
cgroup  /cgroup cgroup  defaults0   0
/dev/sda3/boot  ext2defaults0   2
/dev/mapper/dev-swap none   swapsw  0   0
/dev/mapper/dev-root /  ext4errors=remount-ro 0 1
/dev/mapper/dev-home /home  ext4defaults0   2
/dev/mapper/dev-tmp /tmpext4defaults0   2
/dev/mapper/dev-usr /usrext4defaults0   2
/dev/mapper/dev-var /varext4defaults0   2
/dev/mapper/dev-log /var/logext4defaults0   2
/dev/mapper/dev-dns /var/dns-devext4defaults0   2
/dev/mapper/dev-dns /dns-devext4defaults0   2
nas:/dns-nas/dns-nasnfs4_netdev,rw,soft,tcp 0   0
nas:/sav/var/savnfs4_netdev,rw,soft 0   0

root@dev:/# cat /etc/exports
# nfsv3
/dns-dev192.168.151.0/24(rw,sync,subtree_check,no_root_squash)
# nfsv4
/var/   192.168.151.0/24(fsid=0,rw,sync,crossmnt,no_subtree_check)
/var/dns-dev
192.168.151.0/24(rw,sync,crossmnt,no_subtree_check,no_root_squash)

root@dev:/# showmount -a
rpc mount dump: RPC: Timed out

root@dev:/# showmount -e
rpc mount dump: RPC: Timed out

root@dev:/# rpcinfo -p
   program no_version protocole  no_port
102   tcp111  portmapper
1000241   udp  47486  status
1000241   tcp  33830  status
102   udp111  portmapper
1000211   udp  49373  nlockmgr
1000213   udp  49373  nlockmgr
1000214   udp  49373  nlockmgr
1000211   tcp  36200  nlockmgr
1000213   tcp  36200  nlockmgr
1000214   tcp  36200  nlockmgr
132   tcp   2049  nfs
133   tcp   2049  nfs
134   tcp   2049  nfs
132   udp   2049  nfs
133   udp   2049  nfs
134   udp   2049  nfs
151   udp  41885  mountd
151   tcp  54023  mountd
152   udp  41885  mountd
152   tcp  54023  mountd
153   udp  41885  mountd
153   tcp  54023  mountd

root@dev:/# cat /proc/fs/nfsd/exports 
# Version 1.1
# Path Client(Flags) # IPs

root@nas:/# cat /etc/fstab
#
proc/proc   procdefaults0   0
/dev/hda2   noneswapsw  0   0
/dev/hda1   /   ext3errors=remount-ro 0   1
/dev/mapper/nas-tmp /tmpext3defaults0   2
/dev/mapper/nas-usr /usrext3defaults0   2
/dev/mapper/nas-var /varext3defaults0   2
/dev/mapper/nas-cache   /var/cache  ext3defaults0   2
/dev/mapper/nas-log /var/logext3defaults0   2
/dev/mapper/nas-dns /dnsext4defaults0   2
/dev/mapper/nas-dns /dns-nasext4defaults0   2
/dev/mapper/nas-dns /var/dns-nasext4defaults0   2
/dev/mapper/nas-sav /var/savext4defaults0   2
dev:/dns-dev   

Bug#602642: marked as done (nfs-kernel-server: Crossmnt stopped working after upgrade from Lenny to Squeeze)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 17:33:00 +0100
with message-id <5bbed3a214fc8631cdf3c68e4f18d4f378b35f75.ca...@decadent.org.uk>
and subject line Re: nfs-kernel-server: Crossmnt stopped working after upgrade 
from Lenny to  Squeeze
has caused the Debian Bug report #602642,
regarding nfs-kernel-server: Crossmnt stopped working after upgrade from Lenny 
to Squeeze
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
602642: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602642
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-kernel-server
Version: 1:1.1.2-6lenny2
Severity: important

Upgraded file server from Lenny to Squeeze. After upgrade NFS clients failed to
access bind mounted subdirectories on NFS server, error message about stale NFS
handle.

Basic setup on "fileserver":

/dev/md0 is mounted at /mnt/md0 in fstab
/mnt/md0/raid is bind mounted at /data/raid in fstab

/etc/exports looks like this:
/data   192.168.0.0/255.255.255.0(ro,no_subtree_check,crossmnt)

NFS clients mount fileserver:/data.

This setup has been used for about a year. After "fileserver" was upgraded to
Squeeze the clients could mount fileserver:/data but not access the raid
subfolder, got an error message about stale NFS handle.

Downgrading nfs-kernel-server and nfs-common to Lenny versions
(1:1.1.2-6lenny2) restored functionality.



-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32-5-amd64 (SMP w/1 CPU core)
Locale: LANG=sv_SE.UTF-8, LC_CTYPE=sv_SE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages nfs-kernel-server depends on:
ii  libblkid12.17.2-3.3  block device id library
ii  libc62.11.2-7Embedded GNU C Library: Shared lib
ii  libcomerr2   1.41.12-2   common error description library
ii  libgssglue1  0.1-4   mechanism-switch gssapi library
ii  libkrb53 1.8.3+dfsg-2transitional package for MIT Kerbe
ii  libnfsidmap2 0.23-2  An nfs idmapping library
ii  librpcsecgss30.19-2  allows secure rpc communication us
ii  libwrap0 7.6.q-19Wietse Venema's TCP wrappers libra
ii  lsb-base 3.2-23.1Linux Standard Base 3.2 init scrip
ii  nfs-common   1:1.1.2-6lenny2 NFS support files common to client
ii  ucf  3.0025+nmu1 Update Configuration File: preserv

nfs-kernel-server recommends no packages.

nfs-kernel-server suggests no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Closing this due to lack of response.

Ben.

-- 
Ben Hutchings
Beware of programmers who carry screwdrivers. - Leonard Brandwein


signature.asc
Description: This is a digitally signed message part
--- End Message ---


Bug#600871: marked as done (nfs-common: Very slow and unreliable performance of GUI(KDE) when /home nfs mounted)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 17:29:36 +0100
with message-id <603a22361d52220a985b6c9c5297a2288126bcb8.ca...@decadent.org.uk>
and subject line Re: nfs-common: Very slow and unreliable performance of 
GUI(KDE) when /home nfs  mounted
has caused the Debian Bug report #600871,
regarding nfs-common: Very slow and unreliable performance of GUI(KDE) when 
/home nfs mounted
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
600871: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600871
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-common
Version: 1:1.1.2-6lenny2
Severity: important



-- System Information:
Debian Release: Lenny
  APT prefers stable
  APT policy: (900, 'stable'), (700, 'stable'), (650, 'testing'), (500, 
'proposed-updates')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-2-686 (SMP w/2 CPU cores)
Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages nfs-common depends on:
ii  adduser 3.110add and remove users and groups
ii  initscripts 2.86.ds1-61  Scripts for initializing and shutt
ii  libc6   2.10.2-2 GNU C Library: Shared libraries
ii  libcomerr2  1.41.3-1 common error description library
ii  libevent1   1.3e-3   An asynchronous event notification
ii  libgssglue1 0.1-2mechanism-switch gssapi library
ii  libkrb531.6.dfsg.4~beta1-5lenny4 MIT Kerberos runtime libraries
ii  libnfsidmap20.20-1   An nfs idmapping library
ii  librpcsecgss3   0.18-1   allows secure rpc communication us
ii  libwrap07.6.q-16 Wietse Venema's TCP wrappers libra
ii  lsb-base3.2-20   Linux Standard Base 3.2 init scrip
ii  netbase 4.34 Basic TCP/IP networking system
ii  portmap 6.0-9RPC port mapper
ii  ucf 3.0016   Update Configuration File: preserv

nfs-common recommends no packages.

nfs-common suggests no packages.

-- no debconf information

The problem has occurred, when update was performed from BPO. 
nfs-common 1:1.1.2-6lenny2 -> 1:1.2.2-1~bpo50+1
As users /home mounted from centralized location with nfs, it become impossible 
to start GUI, particularly KDE. It is not a KDE 
problem, as when I fall-back to 1:1.1.2-6 everything was back to normal. I feel 
bad that I cannot introduce more logs as there is 
none generated by nfs IMHO.


--- End Message ---
--- Begin Message ---
Closing this due to lack of response.

Ben.

-- 
Ben Hutchings
Beware of programmers who carry screwdrivers. - Leonard Brandwein


signature.asc
Description: This is a digitally signed message part
--- End Message ---


Bug#562821: marked as done (nfs-common: Fails to map user id's via idmapd)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 17:27:00 +0100
with message-id 
and subject line Re: nfs-common: Fails to map user id's via idmapd
has caused the Debian Bug report #562821,
regarding nfs-common: Fails to map user id's via idmapd
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
562821: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=562821
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-common
Version: 1:1.2.0-4.1
Severity: important

It seems this version have problem with starting statd which should only
be used on a NFS server. An unexpected side effect is that this seems to break 
id mapping on NFSv4 also. The directories /var/lib/nfs/rpc_pipefs/nfs/clnt0
/var/lib/nfs/rpc_pipefs/nfs/clnt1 are not created.

Have reverted to Version: 1:1.2.0-4.1 which is working properly.

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (990, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.31-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/bash

Versions of packages nfs-common depends on:
ii  adduser  3.112   add and remove users and groups
ii  initscripts  2.87dsf-8   scripts for initializing and shutt
ii  libc62.10.2-2GNU C Library: Shared libraries
ii  libcomerr2   1.41.9-1common error description library
ii  libevent-1.4-2   1.4.13-stable-1 An asynchronous event notification
ii  libgssapi-krb5-2 1.7+dfsg-3  MIT Kerberos runtime libraries - k
ii  libgssglue1  0.1-4   mechanism-switch gssapi library
ii  libk5crypto3 1.7+dfsg-3  MIT Kerberos runtime libraries - C
ii  libkrb5-31.7+dfsg-3  MIT Kerberos runtime libraries
ii  libnfsidmap2 0.23-2  An nfs idmapping library
ii  librpcsecgss30.19-2  allows secure rpc communication us
ii  libwrap0 7.6.q-18Wietse Venema's TCP wrappers libra
ii  lsb-base 3.2-23  Linux Standard Base 3.2 init scrip
ii  netbase  4.40Basic TCP/IP networking system
ii  portmap  6.0.0-1 RPC port mapper
ii  ucf  3.0025  Update Configuration File: preserv

nfs-common recommends no packages.

nfs-common suggests no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Closing this due to lack of response.

Ben.

-- 
Ben Hutchings
Beware of programmers who carry screwdrivers. - Leonard Brandwein


signature.asc
Description: This is a digitally signed message part
--- End Message ---


Bug#568856: marked as done (heartbeat is unable to stop nfs-kernel-server)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 17:28:14 +0100
with message-id <32e049785983ef00676c6227b2643ecf04813378.ca...@decadent.org.uk>
and subject line Re: heartbeat is unable to stop nfs-kernel-server
has caused the Debian Bug report #568856,
regarding heartbeat is unable to stop nfs-kernel-server
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
568856: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=568856
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: heartbeat
Version: 2.1.3-6lenny4
Severity: important

heartbeat is unable to stop nfs-kernel-server. The script returns 0 so 
heartbeat think that nfs is stopped, but when trying to unmount
a shared disk (drbd) with /var/lib/nfs symlinked into heartbeat gives up and 
reboots the server, it fails since nfsd is still locking files in that folder.

Has been discussed in 2004 here:
http://lists.linbit.com/pipermail/drbd-user/2004-June/001107.html

and on the HA website: http://www.linux-ha.org/DRBD/NFS (under 5.c and 5.d)

Current workaround is calling a script that kills nfsd with haresources as 
suggested in linux-ha.org

(If i start nfs-kernel-server manually, i am also able to stop it manually)

ha.cf:
###
# HA config
autojoin none
debugfile /var/log/ha-debug
logfile /var/log/ha-log
logfacility local0
keepalive 200ms
#warntime 1
deadtime 2
#initdead 30
udpport 694
bcast drbdeth0
mcast drbdeth0 239.0.0.1 694 1 0
udp drbdeth0
auto_failback off
node nfs-ha-01
node nfs-ha-02

apiauth default uid=nobody gid=haclient
apiauth ipfail uid=hacluster
apiauth ping gid=nogroup uid=nobody,hacluster
respawn hacluster /usr/lib/heartbeat/ipfail
ping x.x.x.x
deadping 3
###

haresources:
###
nfs-ha-01 x.x.x.x/24 drbddisk LVM::drbdtest 
Filesystem::/dev/drbd0::/cluster-metadata::ext3::defaults,noatime 
Filesystem::/dev/drbdtest/test::/mnt/test::xfs nfs-kernel-server nfs-common


-- System Information:
Debian Release: 5.0.4
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-2-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages heartbeat depends on:
ii  adduser 3.110add and remove users and groups
ii  gawk1:3.1.5.dfsg-4.1 GNU awk, a pattern scanning and pr
ii  iproute 20080725-2   networking and traffic control too
ii  iputils-ping3:20071127-1 Tools to test the reachability of 
ii  libbz2-1.0  1.0.5-1  high-quality block-sorting file co
ii  libc6   2.7-18lenny2 GNU C Library: Shared libraries
ii  libcurl37.18.2-8lenny3   Multi-protocol file transfer libra
ii  libglib2.0-02.16.6-3 The GLib library of C routines
ii  libgnutls26 2.4.2-6+lenny2   the GNU TLS library - runtime libr
ii  libltdl31.5.26-4+lenny1  A system independent dlopen wrappe
ii  libncurses5 5.7+20081213-1   shared libraries for terminal hand
ii  libnet1 1.1.2.1-2library for the construction and h
ii  libopenhpi2 2.12.0-1 OpenHPI libraries (runtime and sup
ii  libpam-runtime  1.0.1-5+lenny1   Runtime support for the PAM librar
ii  libpam0g1.0.1-5+lenny1   Pluggable Authentication Modules l
ii  libsnmp15   5.4.1~dfsg-12SNMP (Simple Network Management Pr
ii  libssl0.9.8 0.9.8g-15+lenny6 SSL shared libraries
ii  libuuid11.41.3-1 universally unique id library
ii  libwrap07.6.q-16 Wietse Venema's TCP wrappers libra
ii  libxml2 2.6.32.dfsg-5+lenny1 GNOME XML library
ii  libxml2-utils   2.6.32.dfsg-5+lenny1 XML utilities
ii  mawk1.3.3-11.1   a pattern scanning and text proces
ii  psmisc  22.6-1   Utilities that use the proc filesy
ii  python  2.5.2-3  An interactive high-level object-o
ii  python-central  0.6.8register and build utility for Pyt
ii  zlib1g  1:1.2.3.3.dfsg-12compression library - runtime

Versions of packages heartbeat recommends:
ii  iptables  1.4.2-6administration tools for packet fi
ii  logrotate 3.7.1-5Log rotation utility
ii  rsyslog [system-log-daemon]   3.18.6-4   enhanced multi-threaded syslogd

heartbeat suggests no packages.

-- no debconf informatio

Bug#522926: marked as done (client cannot write to new files on server, only edit/delete/create)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 17:26:02 +0100
with message-id <2ecbfeced15a8c9b7f2c24dc722bf14339aa8936.ca...@decadent.org.uk>
and subject line Re: client cannot write to new files on server, only 
edit/delete/create
has caused the Debian Bug report #522926,
regarding client cannot write to new files on server, only edit/delete/create
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
522926: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=522926
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-common
Version: 1:1.1.4-1
Severity: grave

I've had a great morning with NFS. First, the server had to be
restarted, which caused all clients (at least one was using each of
1.1.4-1 and 1.1.5-[12]) to require a restart, since all processes
just hung hard.

New mounts would also not work, even though trying to mount exported
filesystems without permission on the server yielded an "access
denied" error on the client.

After I rebooted the clients, they could mount and browse the
filesystem, and read files without problems.

They could edit files too.

However, they could not write to new files. They could create them,
but trying to write to them causes:

  open("testfile", O_WRONLY|O_CREAT|O_TRUNC, 0666) = -1 EINVAL (Invalid 
argument)

The file is created, but it cannot be written to.

I can delete files just fine.

This happens with 1.1.4-1 through 1.1.5-2, talking to
a 1:1.1.2-6lenny1 kernel server.

The NFS infrastructure here has been working for years and also
after the lenny upgrade, and I have tried restarting the kernel
server daemon many times. The only thing that has changed between
when it was working and now was today's OpenSSL upgrade.

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.29-1-amd64 (SMP w/1 CPU core)
Locale: LANG=en_GB, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages nfs-common depends on:
ii  adduser  3.110   add and remove users and groups
ii  initscripts  2.86.ds1-61 Scripts for initializing and shutt
ii  libc62.9-6   GNU C Library: Shared libraries
ii  libcomerr2   1.41.3-1common error description library
ii  libevent11.3e-3  An asynchronous event notification
ii  libgssglue1  0.1-2   mechanism-switch gssapi library
ii  libkrb53 1.6.dfsg.4~beta1-12 Transitional library package/krb4 
ii  libnfsidmap2 0.21-2  An nfs idmapping library
ii  librpcsecgss30.18-1  allows secure rpc communication us
ii  libwrap0 7.6.q-16Wietse Venema's TCP wrappers libra
ii  lsb-base 3.2-22  Linux Standard Base 3.2 init scrip
ii  netbase  4.34Basic TCP/IP networking system
ii  portmap  6.0-9   RPC port mapper
ii  ucf  3.0018  Update Configuration File: preserv

nfs-common recommends no packages.

nfs-common suggests no packages.

-- debconf-show failed


-- 
 .''`.   martin f. krafft   Related projects:
: :'  :  proud Debian developer   http://debiansystem.info
`. `'`   http://people.debian.org/~madduckhttp://vcs-pkg.org
  `-  Debian - when you have better things to do than fixing systems


digital_signature_gpg.asc
Description: Digital signature (see http://martin-krafft.net/gpg/)
--- End Message ---
--- Begin Message ---
Closing this due to lack of response.

Ben.

-- 
Ben Hutchings
Beware of programmers who carry screwdrivers. - Leonard Brandwein


signature.asc
Description: This is a digitally signed message part
--- End Message ---


Bug#521878: marked as done (nfs-kernel-server: nfs4 mount with sec=krb5 not working cause bad uid mapping)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 17:24:42 +0100
with message-id <93ee5784bd1d011076afb131ce217f334acf2344.ca...@decadent.org.uk>
and subject line Re: nfs-kernel-server: nfs4 mount with sec=krb5 not working 
cause bad uid mapping
has caused the Debian Bug report #521878,
regarding nfs-kernel-server: nfs4 mount with sec=krb5 not working cause bad uid 
mapping
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
521878: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521878
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-kernel-server
Version: 1:1.1.4-1
Severity: important

it's impossible to mount a nfs4 share with kerberos5 security on current sid 
systems.
the problem looks like from here:(full log below)
Mar 30 19:26:55 gythtv rpc.svcgssd[g379]: WARNING: get_ids: failed to map name 
'root/mythtv.mydomain.local@MYREALM.LOCAL' to uid/gid: Invalid argument 

i have found some hints that this problem comes from libnfsidmap2 with google. 
(http://linux-nfs.org/pipermail/nfsv4/2008-October/009399.html). But the sid 
version seems to be really old.
i hope this will help to find the bug.

test setup:
krb5-kdc, nfs-server and client on same machine (for first testing
purpose)

MYREALM.LOCAL and mydomain.local are equal in my test setup.

/etc/krb5.conf 
##>%
[libdefaults]
          default_realm = MYREALM.LOCAL
#       dns_lookup_realm = true
#       dns_lookup_kdc = false
[realms]
          MYREALM.LOCAL = {
                kdc = mythtv.mydomain.local
                  admin_server = mythtv.mydomain.local
                  default_domain = mydomain.local
          }
[domain_realm]
     .mydomain.local = MYREALM.LOCAL
%<#

mythtv:~# klist -e -k /etc/krb5.keytab 
Keytab name: FILE:/etc/krb5.keytab
KVNO Principal
 --
   3 nfs/mythtv.19.ros.03046@19.ros.03046.com (DES cbc mode with CRC-32) 
   3 root/mythtv.19.ros.03046@19.ros.03046.com (DES cbc mode with CRC-32) 

/etc/exports:
/data       gss/krb5p(rw,async,no_subtree_check,nohide,crossmnt)
/           gss/krb5p(fsid=0,rw,async,no_subtree_check,nohide,crossmnt) 


mythtv:~# egrep -v "^#|^$" /etc/default/nfs-* 
/etc/default/nfs-common:NEED_STATD=
/etc/default/nfs-common:STATDOPTS=
/etc/default/nfs-common:NEED_IDMAPD=yes
/etc/default/nfs-common:NEED_GSSD=yes
/etc/default/nfs-common:RPCGSSDOPTS="-vvv -rrr"
/etc/default/nfs-kernel-server:RPCNFSDCOUNT=8
/etc/default/nfs-kernel-server:RPCNFSDPRIORITY=0
/etc/default/nfs-kernel-server:RPCMOUNTDOPTS=--manage-gids
/etc/default/nfs-kernel-server:NEED_SVCGSSD=yes
/etc/default/nfs-kernel-server:RPCSVCGSSDOPTS="-vvv -rrr"


mythtv:~# mount -t nfs4 -o sec=krb5 mythtv:/data /mnt/
mount.nfs4: access denied by server while mounting mythtv:/data


log messages from daemon.log...

Mar 30 19:26:55 mythtv rpc.idmapd[2424]: New client: 52
Mar 30 19:26:55 mythtv rpc.idmapd[2424]: Opened 
/var/lib/nfs/rpc_pipefs/nfs/clnt52/idmap
Mar 30 19:26:55 mythtv rpc.gssd[2428]: handling krb5 upcall 
Mar 30 19:26:55 mythtv rpc.gssd[2428]: Full hostname for 
'mythtv.mydomain.local' is 'mythtv.mydomain.local' 
Mar 30 19:26:55 mythtv rpc.gssd[2428]: Full hostname for 
'mythtv.mydomain.local' is 'mythtv.mydomain.local' 
Mar 30 19:26:55 mythtv rpc.gssd[2428]: Success getting keytab entry for 
'root/mythtv.mydomain.local@' 
Mar 30 19:26:55 mythtv rpc.gssd[2428]: INFO: Credentials in CC 
'FILE:/tmp/krb5cc_machine_MYREALM.LOCAL' are good until 1238469941 
Mar 30 19:26:55 mythtv rpc.gssd[2428]: INFO: Credentials in CC 
'FILE:/tmp/krb5cc_machine_MYREALM.LOCAL' are good until 1238469941 
Mar 30 19:26:55 mythtv rpc.gssd[2428]: using 
FILE:/tmp/krb5cc_machine_MYREALM.LOCAL as credentials cache for machine creds 
Mar 30 19:26:55 mythtv rpc.gssd[2428]: using environment variable to select 
krb5 ccache FILE:/tmp/krb5cc_machine_MYREALM.LOCAL 
Mar 30 19:26:55 mythtv rpc.gssd[2428]: creating context using fsuid 0 (save_uid 
0) 
Mar 30 19:26:55 mythtv rpc.gssd[2428]: creating tcp client for server 
mythtv.mydomain.local 
Mar 30 19:26:55 mythtv rpc.gssd[2428]: creating context with server 
nfs@mythtv.mydomain.local 
Mar 30 19:26:55 mythtv rpc.gssd[2428]: in authgss_create_default()
Mar 30 19:26:55 mythtv rpc.gssd[2428]: in authgss_create()
Mar 30 19:26:55 mythtv rpc.gssd[2428]: authgss_create: name is 0x9691488
Mar 30 19:26:55 mythtv rpc.gssd[2428]: authgss_create: gd->name is 0x96937a8
Mar 30 19:26:55 mythtv rpc.gssd[2428]: in authgss_refresh()
Mar 30 19:26:55 myth

Processed: tagging 446238 ...

2022-03-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 446238 + upstream
Bug #446238 {Done: Ben Hutchings } [nfs-common] 
nfs-common: Locks when using nfs4 sec=krb5 and user ticket expires
Added tag(s) upstream.
> forwarded 446238 
> https://lore.kernel.org/linux-nfs/08967499-6b9d-4dbb-8118-5e6e1e3ef06f@mail/
Bug #446238 {Done: Ben Hutchings } [nfs-common] 
nfs-common: Locks when using nfs4 sec=krb5 and user ticket expires
Set Bug forwarded-to-address to 
'https://lore.kernel.org/linux-nfs/08967499-6b9d-4dbb-8118-5e6e1e3ef06f@mail/'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
446238: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446238
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#446238: marked as done (nfs-common: Locks when using nfs4 sec=krb5 and user ticket expires)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 17:21:17 +0100
with message-id <655212549a6125b02fa4162c5d6cc49085f2d4c5.ca...@decadent.org.uk>
and subject line Re: nfs-utils updated to 1.3.4-1, please check your bug #446238
has caused the Debian Bug report #446238,
regarding nfs-common: Locks when using nfs4 sec=krb5 and user ticket expires
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
446238: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446238
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-common
Version: 1:1.0.10-6+etch.1
Severity: important

The problem can be reproduced in the following conditions

Automounted homes over nfs4 with sec=krb5
Start a session on the nfs client and let the user ticked (used to grant the 
nfs access) expire

After this the user can not access is home (as should be expected)
However, it also appens that, for example, any trial to start a new session of 
some other user will sucessfully mount the respective home but the login 
process will stay
forever trying to read a file (.bash_profile for example).
The client syslog presents messages like these

Oct 11 07:44:46 directivo rpc.gssd[30786]: ERROR: GSS-API: error in 
gss_acquire_cred(): The referenced credentials have expired - No error
Oct 11 07:44:46 directivo rpc.gssd[30786]: WARNING: Failed to create krb5 
context for user with uid 726 for server essa.essa.pt
Oct 11 07:44:46 directivo rpc.gssd[30786]: ERROR: GSS-API: error in 
gss_acquire_cred(): The referenced credentials have expired - No error
Oct 11 07:44:46 directivo rpc.gssd[30786]: WARNING: Failed to create krb5 
context for user with uid 726 for server essa.essa.pt
Oct 11 07:44:46 directivo kernel: Error: state recovery failed on NFSv4 server 
192.168.0.99 with error 13
Oct 11 07:44:46 directivo rpc.gssd[30786]: ERROR: GSS-API: error in 
gss_acquire_cred(): The referenced credentials have expired - No error
Oct 11 07:44:46 directivo rpc.gssd[30786]: WARNING: Failed to create krb5 
context for user with uid 726 for server essa.essa.pt
Oct 11 07:44:46 directivo rpc.gssd[30786]: ERROR: GSS-API: error in 
gss_acquire_cred(): The referenced credentials have expired - No error
Oct 11 07:44:46 directivo rpc.gssd[30786]: WARNING: Failed to create krb5 
context for user with uid 726 for server essa.essa.pt
Oct 11 07:44:46 directivo kernel: Error: state recovery failed on NFSv4 server 
192.168.0.99 with error 13

where 726 is the owner of the expired ticket in the present case

Refreshing the expired ticket for this user grants him access to his home again 
and, additionaly, unlocks access to the other user homes

In a single user nfs client machine this is pretty harmless, but in a multiuser 
one or if it is an X or thin terminal server, as it is the case here, this is a 
show stopper

On client
autofs   4.1.4-13
libpam-krb5  2.6-1

On server

nfs-kernel-server1.0.10-6+etch.1
krb5-kdc 1.4.4-7etch4
libkrb53 1.4.4-7etch4


If more details or log contents are needed please let me know

Thanks in advance for any help

Pedro Rodrigues

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-5-686
Locale: LANG=pt_PT.UTF-8, LC_CTYPE=pt_PT.UTF-8 (charmap=UTF-8)

Versions of packages nfs-common depends on:
ii  adduser  3.102   Add and remove users and groups
ii  libc62.3.6.ds1-13etch2   GNU C Library: Shared libraries
ii  libcomer 1.39+1.40-WIP-2006.11.14+dfsg-2 common error description library
ii  libevent 1.1a-1  An asynchronous event notification
ii  libgssap 0.10-4  A mechanism-switch gssapi library
ii  libkrb53 1.4.4-7etch4MIT Kerberos runtime libraries
ii  libnfsid 0.18-0  An nfs idmapping library
ii  librpcse 0.14-2etch1 allows secure rpc communication us
ii  libwrap0 7.6.dbs-13  Wietse Venema's TCP wrappers libra
ii  lsb-base 3.1-23.2etch1   Linux Standard Base 3.1 init scrip
ii  netbase  4.29Basic TCP/IP networking system
ii  portmap  5-26The RPC portmapper
ii  ucf  2.0020  Update Configuration File: preserv

nfs-common recommends no packages.

-- no debconf information

-- 
_
Pedro Celestino 

Processed: Re: nfs-common: Systemd does not correctly read /etc/default/nfs-common

2022-03-19 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 moreinfo
Bug #913310 [nfs-common] nfs-common: Systemd does not correctly read 
/etc/default/nfs-common
Added tag(s) moreinfo.

-- 
913310: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913310
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: tagging 883890

2022-03-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 883890 - moreinfo
Bug #883890 [nfs-common] nfs-common: Fully Qualified DNS Name mounts in fstab 
fail to be mounted
Removed tag(s) moreinfo.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
883890: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883890
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#913310: nfs-common: Systemd does not correctly read /etc/default/nfs-common

2022-03-19 Thread Ben Hutchings
Control: tag -1 moreinfo

On Fri, 09 Nov 2018 14:35:59 +0100 Marco Gaiarin 
wrote:
> Package: nfs-common
> Version: 1:1.3.4-2.1
> Severity: important
> 
> Dear Maintainer,
> 
> I'm trying to play with NFSv4 with my just-installed or just-upgraded
stretch system.
> 
> I've found that:
> 
> a) is impossible to set daemons flags in /etc/default/nfs-common,
because systemd does not read it.
>
> b) it is not possible to restart nfs common daemon,

There is no nfs-common daemon.

> because nfs-common is disabled (and this seems intended)
>  and nfs-client is a target, so seems can be run only at boot.
>  [probably this is a consequence of a)]
> 
> For a), seems that the 'nfs-config' systemd stanza correctly build up
'/run/sysconfig/nfs-utils' environment files, but
> then, there's no 'EnvironmentFile=' row in 'nfs-client' and 'nfs-
server' so environment varialbles are not read.

They don't need it.  Each daemon has its own unit that (in this
version) does use EnvironmentFile.

What is the actual problem you are trying to solve?

Ben.

-- 
Ben Hutchings
Beware of programmers who carry screwdrivers. - Leonard Brandwein


signature.asc
Description: This is a digitally signed message part


Bug#609344: marked as done (nfs-kernel-server: Serious problem with NFS server, not working under testing)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 17:16:27 +0100
with message-id <496c166e661e6a3ae429c4445bbc6a4c03c6fb1a.ca...@decadent.org.uk>
and subject line Re: nfs-kernel-server: Serious problem with NFS server, not 
working under testing
has caused the Debian Bug report #609344,
regarding nfs-kernel-server: Serious problem with NFS server, not working under 
testing
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
609344: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609344
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-kernel-server
Version: 1:1.2.2-4
Severity: important

Dear Sir,


My clients hangs on mounting their home at boot

# mount /home/
^C


Now I do this on the server NFS:
 /etc/init.d/nfs-kernel-server restart

And I try again on the client:

root@toshiba:/# mount /home/
root@toshiba:/# 

Here it is now.

The server has something wrong in NFS exporting and shareing.

Please a fix would be great because it is not yet stable.


Best regards
(I gonna try an upgrade, I fear the upgrade that will break my box... let's 
pray it works)

All the best
Linux rocks
Y.


-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages nfs-kernel-server depends on:
ii  libblkid1   2.17.2-3.3   block device id library
ii  libc6   2.11.2-7 Embedded GNU C Library: Shared lib
ii  libcomerr2  1.41.12-2common error description library
ii  libgssapi-krb5-21.8.3+dfsg-2 MIT Kerberos runtime libraries - k
ii  libgssglue1 0.1-4mechanism-switch gssapi library
ii  libk5crypto31.8.3+dfsg-2 MIT Kerberos runtime libraries - C
ii  libkrb5-3   1.8.3+dfsg-2 MIT Kerberos runtime libraries
ii  libnfsidmap20.23-2   An nfs idmapping library
ii  librpcsecgss3   0.19-2   allows secure rpc communication us
ii  libwrap07.6.q-19 Wietse Venema's TCP wrappers libra
ii  lsb-base3.2-23.1 Linux Standard Base 3.2 init scrip
ii  nfs-common  1:1.2.2-4NFS support files common to client
ii  ucf 3.0025+nmu1  Update Configuration File: preserv

nfs-kernel-server recommends no packages.

nfs-kernel-server suggests no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Closing this due to lack of response.

Ben.

-- 
Ben Hutchings
Beware of programmers who carry screwdrivers. - Leonard Brandwein


signature.asc
Description: This is a digitally signed message part
--- End Message ---


Processed: tagging 832513

2022-03-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 832513 + upstream
Bug #832513 [nfs-common] [nfs-common] nfs-idmapd.service fails unless package 
is installed nfs-kernel-server
Bug #832514 [nfs-common] [nfs-common] nfs-idmapd.service fails unless package 
is installed nfs-kernel-server
Added tag(s) upstream.
Added tag(s) upstream.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
832513: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832513
832514: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832514
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#847557: marked as done (/usr/sbin/exportfs: exportfs cannot handle IPv6 addresses)

2022-03-19 Thread Debian Bug Tracking System
Your message dated Sat, 19 Mar 2022 17:12:54 +0100
with message-id 
and subject line Re: Bug#847557: nfs-utils updated to 1.3.4-1, please check 
your bug  #847557
has caused the Debian Bug report #847557,
regarding /usr/sbin/exportfs: exportfs cannot handle IPv6 addresses
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
847557: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847557
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-kernel-server
Version: 1:1.2.8-9.2
Severity: important
File: /usr/sbin/exportfs
Tags: ipv6

Dear Maintainer,

 when trying to export/unexport a path i cannot give IPv6 addresses to
 exportfs.

# showmount -e 
Export list for testhost:
/path/sub fe80::%eth0/10

# exportfs -u [fe80::%eth0]/10:/path/sub
exportfs: Invalid exporting option: [fe80

When removing the [] i get the same error (without [)
When using something like 2001:0db8:1234::/64 the same error occurs.

-- Package-specific info:
-- rpcinfo --
   program vers proto   port  service
104   tcp111  portmapper
103   tcp111  portmapper
102   tcp111  portmapper
104   udp111  portmapper
103   udp111  portmapper
102   udp111  portmapper
151   udp  59414  mountd
151   tcp  55223  mountd
152   udp  44480  mountd
152   tcp  53745  mountd
153   udp  41426  mountd
153   tcp  55737  mountd
132   tcp   2049  nfs
133   tcp   2049  nfs
134   tcp   2049  nfs
1002272   tcp   2049
1002273   tcp   2049
132   udp   2049  nfs
133   udp   2049  nfs
134   udp   2049  nfs
1002272   udp   2049
1002273   udp   2049
1000211   udp  37459  nlockmgr
1000213   udp  37459  nlockmgr
1000214   udp  37459  nlockmgr
1000211   tcp  34145  nlockmgr
1000213   tcp  34145  nlockmgr
1000214   tcp  34145  nlockmgr
-- /etc/default/nfs-kernel-server --
RPCNFSDCOUNT=8
RPCNFSDPRIORITY=0
RPCMOUNTDOPTS="--manage-gids"
NEED_SVCGSSD=""
RPCSVCGSSDOPTS=""
-- /etc/exports --
/path/sub   
fe80::%eth0/10(rw,no_subtree_check,no_root_squash)

-- System Information:
Debian Release: stretch/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable-debug'), (500, 
'testing-debug'), (500, 'stable-updates'), (500, 'unstable'), (500, 'stable'), 
(500, 'oldstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.7.0-1-amd64 (SMP w/24 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages nfs-kernel-server depends on:
ii  init-system-helpers  1.46
ii  keyutils 1.5.9-9
ii  libblkid12.29-1
ii  libc62.24-7
ii  libcap2  1:2.25-1
ii  libsqlite3-0 3.15.2-1
ii  libtirpc10.2.5-1
ii  libwrap0 7.6.q-25
ii  lsb-base 9.20161125
ii  netbase  5.3
ii  nfs-common   1:1.2.8-9.2
ii  ucf  3.0036

nfs-kernel-server recommends no packages.

nfs-kernel-server suggests no packages.

-- no debconf information
--- End Message ---
--- Begin Message ---
Version: 1:1.3.4-1

On Thu, 15 Dec 2016 14:45:04 +0100 Bjoern Laessig
 wrote:
> On Do, 2016-12-15 at 14:15 +0100, Daniel Pocock wrote:
> > Thanks for providing a bug report for nfs-utils.
> > https://bugs.debian.org/847557
> > - if you have time to test the new package, […]
> 
> Trying the package from sid (1:1.3.4-1):
> 
> # exportfs [2001:0db8:1234::]/64:/path/sub 
> # showmount -e localhost
> Export list for localhost:
> /path/sub 2001:0db8:1234::/64
> # exportfs -u [2001:0db8:1234::]/64:/path/sub
> 
> 
> The bug is fixed in nfs-kernel-server version 1:1.3.4-1

Thank you for checking; I'm now closing the bug report.

Ben.

-- 
Ben Hutchings
Beware of programmers who carry screwdrivers. - Leonard Brandwein


signature.asc
Description: This is a digitally signed message part
--- End Message ---


Processed: closing 847681

2022-03-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> close 847681
Bug #847681 [nfs-utils] packaging repository and sid diverging? Various fixes 
needed.
Marked Bug as done
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
847681: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847681
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: reassign 884284 to src:linux

2022-03-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 884284 src:linux 4.9.65-3
Bug #884284 [nfs-kernel-server] nfs4_reclaim_open_state: Lock reclaim failed
Bug reassigned from package 'nfs-kernel-server' to 'src:linux'.
No longer marked as found in versions nfs-utils/1:1.3.4-2.1.
Ignoring request to alter fixed versions of bug #884284 to the same values 
previously set
Bug #884284 [src:linux] nfs4_reclaim_open_state: Lock reclaim failed
Marked as found in versions linux/4.9.65-3.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
884284: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884284
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: nfs-kernel-server: svcgssd starts anyways when "disabled" in /etc/default/nfs-kernel-server

2022-03-19 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 wontfix
Bug #884871 [nfs-kernel-server] nfs-kernel-server: svcgssd starts anyways when 
"disabled" in /etc/default/nfs-kernel-server
Added tag(s) wontfix.

-- 
884871: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884871
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#884871: nfs-kernel-server: svcgssd starts anyways when "disabled" in /etc/default/nfs-kernel-server

2022-03-19 Thread Ben Hutchings
Control: tag -1 wontfix

On Wed, 20 Dec 2017 11:51:22 -0800 Matt Weatherford  wrote:
> Package: nfs-kernel-server
> Version: 1:1.3.4-2.1
> Severity: important
> 
> Dear Maintainer,
> 
> First of all, thank you for all you do to support Debian
> 
> 
> Heres my /etc/default/nfs-kernel-server  config file, it clearly
"disables svcgssd" :
[...]

These flags only affect the init scripts, not systemd.  Use systemctl
to disable or enable daemons under systemd.

Ben.

-- 
Ben Hutchings
Beware of programmers who carry screwdrivers. - Leonard Brandwein


signature.asc
Description: This is a digitally signed message part


linux-signed-amd64_4.19.235+1_source.changes is NEW

2022-03-19 Thread Debian FTP Masters
Mapping buster-proposed-updates to oldstable-proposed-updates.
binary:acpi-modules-4.19.0-20-amd64-di is NEW.
binary:ata-modules-4.19.0-20-amd64-di is NEW.
binary:btrfs-modules-4.19.0-20-amd64-di is NEW.
binary:cdrom-core-modules-4.19.0-20-amd64-di is NEW.
binary:compress-modules-4.19.0-20-amd64-di is NEW.
binary:crc-modules-4.19.0-20-amd64-di is NEW.
binary:crypto-dm-modules-4.19.0-20-amd64-di is NEW.
binary:crypto-modules-4.19.0-20-amd64-di is NEW.
binary:efi-modules-4.19.0-20-amd64-di is NEW.
binary:event-modules-4.19.0-20-amd64-di is NEW.
binary:ext4-modules-4.19.0-20-amd64-di is NEW.
binary:fat-modules-4.19.0-20-amd64-di is NEW.
binary:fb-modules-4.19.0-20-amd64-di is NEW.
binary:firewire-core-modules-4.19.0-20-amd64-di is NEW.
binary:fuse-modules-4.19.0-20-amd64-di is NEW.
binary:i2c-modules-4.19.0-20-amd64-di is NEW.
binary:input-modules-4.19.0-20-amd64-di is NEW.
binary:isofs-modules-4.19.0-20-amd64-di is NEW.
binary:jfs-modules-4.19.0-20-amd64-di is NEW.
binary:kernel-image-4.19.0-20-amd64-di is NEW.
binary:linux-image-4.19.0-20-amd64 is NEW.
binary:linux-image-4.19.0-20-cloud-amd64 is NEW.
binary:linux-image-4.19.0-20-rt-amd64 is NEW.
binary:loop-modules-4.19.0-20-amd64-di is NEW.
binary:md-modules-4.19.0-20-amd64-di is NEW.
binary:mmc-core-modules-4.19.0-20-amd64-di is NEW.
binary:mmc-modules-4.19.0-20-amd64-di is NEW.
binary:mouse-modules-4.19.0-20-amd64-di is NEW.
binary:mtd-core-modules-4.19.0-20-amd64-di is NEW.
binary:multipath-modules-4.19.0-20-amd64-di is NEW.
binary:nbd-modules-4.19.0-20-amd64-di is NEW.
binary:nic-modules-4.19.0-20-amd64-di is NEW.
binary:nic-pcmcia-modules-4.19.0-20-amd64-di is NEW.
binary:nic-shared-modules-4.19.0-20-amd64-di is NEW.
binary:nic-usb-modules-4.19.0-20-amd64-di is NEW.
binary:nic-wireless-modules-4.19.0-20-amd64-di is NEW.
binary:pata-modules-4.19.0-20-amd64-di is NEW.
binary:pcmcia-modules-4.19.0-20-amd64-di is NEW.
binary:pcmcia-storage-modules-4.19.0-20-amd64-di is NEW.
binary:ppp-modules-4.19.0-20-amd64-di is NEW.
binary:sata-modules-4.19.0-20-amd64-di is NEW.
binary:scsi-core-modules-4.19.0-20-amd64-di is NEW.
binary:scsi-modules-4.19.0-20-amd64-di is NEW.
binary:scsi-nic-modules-4.19.0-20-amd64-di is NEW.
binary:serial-modules-4.19.0-20-amd64-di is NEW.
binary:sound-modules-4.19.0-20-amd64-di is NEW.
binary:speakup-modules-4.19.0-20-amd64-di is NEW.
binary:squashfs-modules-4.19.0-20-amd64-di is NEW.
binary:udf-modules-4.19.0-20-amd64-di is NEW.
binary:uinput-modules-4.19.0-20-amd64-di is NEW.
binary:usb-modules-4.19.0-20-amd64-di is NEW.
binary:usb-serial-modules-4.19.0-20-amd64-di is NEW.
binary:usb-storage-modules-4.19.0-20-amd64-di is NEW.
binary:xfs-modules-4.19.0-20-amd64-di is NEW.

Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file hashes are valid), so please be patient.

Packages are routinely processed through to the archive, and do feel
free to browse the NEW queue[1].

If there is an issue with the upload, you will receive an email from a
member of the ftpteam.

If you have any questions, you may reply to this email.

[1]: https://ftp-master.debian.org/new.html
 or https://ftp-master.debian.org/backports-new.html for *-backports



Processing of linux-signed-amd64_4.19.235+1_source.changes

2022-03-19 Thread Debian FTP Masters
linux-signed-amd64_4.19.235+1_source.changes uploaded successfully to localhost
along with the files:
  linux-signed-amd64_4.19.235+1.dsc
  linux-signed-amd64_4.19.235+1.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



linux-signed-amd64_5.10.103+1~bpo10+1_source.changes is NEW

2022-03-19 Thread Debian FTP Masters
binary:acpi-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:ata-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:btrfs-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:cdrom-core-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:crc-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:crypto-dm-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:crypto-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:efi-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:event-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:ext4-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:f2fs-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:fat-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:fb-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:firewire-core-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:fuse-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:i2c-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:input-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:isofs-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:jfs-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:kernel-image-5.10.0-0.bpo.12-amd64-di is NEW.
binary:linux-image-5.10.0-0.bpo.12-amd64 is NEW.
binary:linux-image-5.10.0-0.bpo.12-cloud-amd64 is NEW.
binary:linux-image-5.10.0-0.bpo.12-rt-amd64 is NEW.
binary:loop-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:md-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:mmc-core-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:mmc-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:mouse-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:mtd-core-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:multipath-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:nbd-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:nic-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:nic-pcmcia-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:nic-shared-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:nic-usb-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:nic-wireless-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:pata-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:pcmcia-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:pcmcia-storage-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:ppp-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:rfkill-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:sata-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:scsi-core-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:scsi-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:scsi-nic-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:serial-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:sound-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:speakup-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:squashfs-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:udf-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:uinput-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:usb-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:usb-serial-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:usb-storage-modules-5.10.0-0.bpo.12-amd64-di is NEW.
binary:xfs-modules-5.10.0-0.bpo.12-amd64-di is NEW.

Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file hashes are valid), so please be patient.

Packages are routinely processed through to the archive, and do feel
free to browse the NEW queue[1].

If there is an issue with the upload, you will receive an email from a
member of the ftpteam.

If you have any questions, you may reply to this email.

[1]: https://ftp-master.debian.org/new.html
 or https://ftp-master.debian.org/backports-new.html for *-backports



Processing of linux-signed-amd64_5.10.103+1~bpo10+1_source.changes

2022-03-19 Thread Debian FTP Masters
linux-signed-amd64_5.10.103+1~bpo10+1_source.changes uploaded successfully to 
localhost
along with the files:
  linux-signed-amd64_5.10.103+1~bpo10+1.dsc
  linux-signed-amd64_5.10.103+1~bpo10+1.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



linux-signed-i386_5.10.106+1_source.changes ACCEPTED into proposed-updates->stable-new, proposed-updates

2022-03-19 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 17 Mar 2022 16:40:47 +0100
Source: linux-signed-i386
Architecture: source
Version: 5.10.106+1
Distribution: bullseye-proposed-updates
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux-signed-i386 (5.10.106+1) bullseye; urgency=medium
 .
   * Sign kernel from linux 5.10.106-1
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.104
 - mac80211_hwsim: report NOACK frames in tx_status
 - mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
 - [arm*] i2c: bcm2835: Avoid clock stretching timeouts
 - ASoC: rt5682: do not block workqueue if card is unbound
 - regulator: core: fix false positive in regulator_late_cleanup()
 - Input: clear BTN_RIGHT/MIDDLE on buttonpads
 - [arm64] KVM: arm64: vgic: Read HW interrupt pending state from the HW
 - tipc: fix a bit overflow in tipc_crypto_key_rcv()
 - cifs: fix double free race when mount fails in cifs_get_root()
 - net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990
 - usb: gadget: don't release an existing dev->buf (CVE-2022-24958)
 - usb: gadget: clear related members when goto fail (CVE-2022-24958)
 - exfat: reuse exfat_inode_info variable instead of calling EXFAT_I()
 - exfat: fix i_blocks for files truncated over 4 GiB
 - tracing: Add test for user space strings when filtering on string 
pointers
 - [armhf] serial: stm32: prevent TDR register overwrite when sending x_char
 - ata: pata_hpt37x: fix PCI clock detection
 - drm/amdgpu: check vm ready by amdgpu_vm->evicting flag
 - tracing: Add ustring operation to filtering string pointers
 - [x86] ALSA: intel_hdmi: Fix reference to PCM buffer address
 - ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
 - [amd64] iommu/amd: Recover from event log overflow
 - [x86] drm/i915: s/JSP2/ICP2/ PCH
 - xen/netfront: destroy queues before real_num_tx_queues is zeroed
 - mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls
 - xfrm: fix MTU regression
 - netfilter: fix use-after-free in __nf_register_net_hook()
 - bpf, sockmap: Do not ignore orig_len parameter
 - xfrm: fix the if_id check in changelink
 - xfrm: enforce validity of offload input flags
 - e1000e: Correct NVM checksum verification flow
 - net: fix up skbs delta_truesize in UDP GRO frag_list
 - netfilter: nf_queue: don't assume sk is full socket
 - netfilter: nf_queue: fix possible use-after-free
 - netfilter: nf_queue: handle socket prefetch
 - batman-adv: Request iflink once in batadv-on-batadv check
 - batman-adv: Request iflink once in batadv_get_real_netdevice
 - batman-adv: Don't expect inter-netns unique iflink indices
 - net: ipv6: ensure we call ipv6_mc_down() at most once
 - net: dcb: flush lingering app table entries for unregistered devices
 - net/smc: fix connection leak
 - net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error generated by client
 - net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server
 - rcu/nocb: Fix missed nocb_timer requeue
 - ice: Fix race conditions between virtchnl handling and VF ndo ops
 - ice: fix concurrent reset and removal of VFs
 - sched/topology: Make sched_init_numa() use a set for the deduplicating
   sort
 - sched/topology: Fix sched_domain_topology_level alloc in 
sched_init_numa()
 - mac80211: fix forwarded mesh frames AC & queue selection
 - net: stmmac: fix return value of __setup handler
 - mac80211: treat some SAE auth steps as final
 - iavf: Fix missing check for running netdev
 - net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
 - ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc()
 - efivars: Respect "block" flag in efivar_entry_set_safe()
 - can: gs_usb: change active_channels's type from atomic_t to u8
 - igc: igc_read_phy_reg_gpy: drop premature return
 - [armel,armhf] 9182/1: mmu: fix returns from early_param() and __setup()
   functions
 - [arm64,armhf] pinctrl: sunxi: Use unique lockdep classes for IRQs
 - igc: igc_write_phy_reg_gpy: drop premature return
 - memfd: fix F_SEAL_WRITE after shmem huge page allocated
 - [armhf] dts: switch timer config to common devkit8000 devicetree
 - [armhf] dts: Use 32KiHz oscillator on devkit8000
 - [arm64] soc: fsl: guts: Revert commit 3c0d64e867ed
 - [arm64] soc: fsl: guts: Add a missing memory allocation failure check
 - [armhf] tegra: Move panels to AUX bus
 - net: chelsio: cxgb3: check the return value of pci_find_capability()
 - iavf: Refactor iavf state machine tracking
 - nl80211: Handle nla_memdup failures in handle_nan_filter
 - drm/amdgpu: fix suspend/resume hang regression
 - net: dcb: disable softirqs in dcbn

linux-signed-arm64_5.10.106+1_source.changes ACCEPTED into proposed-updates->stable-new, proposed-updates

2022-03-19 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 17 Mar 2022 16:40:47 +0100
Source: linux-signed-arm64
Architecture: source
Version: 5.10.106+1
Distribution: bullseye-proposed-updates
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux-signed-arm64 (5.10.106+1) bullseye; urgency=medium
 .
   * Sign kernel from linux 5.10.106-1
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.104
 - mac80211_hwsim: report NOACK frames in tx_status
 - mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
 - [arm*] i2c: bcm2835: Avoid clock stretching timeouts
 - ASoC: rt5682: do not block workqueue if card is unbound
 - regulator: core: fix false positive in regulator_late_cleanup()
 - Input: clear BTN_RIGHT/MIDDLE on buttonpads
 - [arm64] KVM: arm64: vgic: Read HW interrupt pending state from the HW
 - tipc: fix a bit overflow in tipc_crypto_key_rcv()
 - cifs: fix double free race when mount fails in cifs_get_root()
 - net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990
 - usb: gadget: don't release an existing dev->buf (CVE-2022-24958)
 - usb: gadget: clear related members when goto fail (CVE-2022-24958)
 - exfat: reuse exfat_inode_info variable instead of calling EXFAT_I()
 - exfat: fix i_blocks for files truncated over 4 GiB
 - tracing: Add test for user space strings when filtering on string 
pointers
 - [armhf] serial: stm32: prevent TDR register overwrite when sending x_char
 - ata: pata_hpt37x: fix PCI clock detection
 - drm/amdgpu: check vm ready by amdgpu_vm->evicting flag
 - tracing: Add ustring operation to filtering string pointers
 - [x86] ALSA: intel_hdmi: Fix reference to PCM buffer address
 - ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
 - [amd64] iommu/amd: Recover from event log overflow
 - [x86] drm/i915: s/JSP2/ICP2/ PCH
 - xen/netfront: destroy queues before real_num_tx_queues is zeroed
 - mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls
 - xfrm: fix MTU regression
 - netfilter: fix use-after-free in __nf_register_net_hook()
 - bpf, sockmap: Do not ignore orig_len parameter
 - xfrm: fix the if_id check in changelink
 - xfrm: enforce validity of offload input flags
 - e1000e: Correct NVM checksum verification flow
 - net: fix up skbs delta_truesize in UDP GRO frag_list
 - netfilter: nf_queue: don't assume sk is full socket
 - netfilter: nf_queue: fix possible use-after-free
 - netfilter: nf_queue: handle socket prefetch
 - batman-adv: Request iflink once in batadv-on-batadv check
 - batman-adv: Request iflink once in batadv_get_real_netdevice
 - batman-adv: Don't expect inter-netns unique iflink indices
 - net: ipv6: ensure we call ipv6_mc_down() at most once
 - net: dcb: flush lingering app table entries for unregistered devices
 - net/smc: fix connection leak
 - net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error generated by client
 - net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server
 - rcu/nocb: Fix missed nocb_timer requeue
 - ice: Fix race conditions between virtchnl handling and VF ndo ops
 - ice: fix concurrent reset and removal of VFs
 - sched/topology: Make sched_init_numa() use a set for the deduplicating
   sort
 - sched/topology: Fix sched_domain_topology_level alloc in 
sched_init_numa()
 - mac80211: fix forwarded mesh frames AC & queue selection
 - net: stmmac: fix return value of __setup handler
 - mac80211: treat some SAE auth steps as final
 - iavf: Fix missing check for running netdev
 - net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
 - ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc()
 - efivars: Respect "block" flag in efivar_entry_set_safe()
 - can: gs_usb: change active_channels's type from atomic_t to u8
 - igc: igc_read_phy_reg_gpy: drop premature return
 - [armel,armhf] 9182/1: mmu: fix returns from early_param() and __setup()
   functions
 - [arm64,armhf] pinctrl: sunxi: Use unique lockdep classes for IRQs
 - igc: igc_write_phy_reg_gpy: drop premature return
 - memfd: fix F_SEAL_WRITE after shmem huge page allocated
 - [armhf] dts: switch timer config to common devkit8000 devicetree
 - [armhf] dts: Use 32KiHz oscillator on devkit8000
 - [arm64] soc: fsl: guts: Revert commit 3c0d64e867ed
 - [arm64] soc: fsl: guts: Add a missing memory allocation failure check
 - [armhf] tegra: Move panels to AUX bus
 - net: chelsio: cxgb3: check the return value of pci_find_capability()
 - iavf: Refactor iavf state machine tracking
 - nl80211: Handle nla_memdup failures in handle_nan_filter
 - drm/amdgpu: fix suspend/resume hang regression
 - net: dcb: disable softirqs in dc

linux-signed-amd64_5.10.106+1_source.changes ACCEPTED into proposed-updates->stable-new, proposed-updates

2022-03-19 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 17 Mar 2022 16:40:47 +0100
Source: linux-signed-amd64
Architecture: source
Version: 5.10.106+1
Distribution: bullseye-proposed-updates
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux-signed-amd64 (5.10.106+1) bullseye; urgency=medium
 .
   * Sign kernel from linux 5.10.106-1
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.104
 - mac80211_hwsim: report NOACK frames in tx_status
 - mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
 - [arm*] i2c: bcm2835: Avoid clock stretching timeouts
 - ASoC: rt5682: do not block workqueue if card is unbound
 - regulator: core: fix false positive in regulator_late_cleanup()
 - Input: clear BTN_RIGHT/MIDDLE on buttonpads
 - [arm64] KVM: arm64: vgic: Read HW interrupt pending state from the HW
 - tipc: fix a bit overflow in tipc_crypto_key_rcv()
 - cifs: fix double free race when mount fails in cifs_get_root()
 - net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990
 - usb: gadget: don't release an existing dev->buf (CVE-2022-24958)
 - usb: gadget: clear related members when goto fail (CVE-2022-24958)
 - exfat: reuse exfat_inode_info variable instead of calling EXFAT_I()
 - exfat: fix i_blocks for files truncated over 4 GiB
 - tracing: Add test for user space strings when filtering on string 
pointers
 - [armhf] serial: stm32: prevent TDR register overwrite when sending x_char
 - ata: pata_hpt37x: fix PCI clock detection
 - drm/amdgpu: check vm ready by amdgpu_vm->evicting flag
 - tracing: Add ustring operation to filtering string pointers
 - [x86] ALSA: intel_hdmi: Fix reference to PCM buffer address
 - ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
 - [amd64] iommu/amd: Recover from event log overflow
 - [x86] drm/i915: s/JSP2/ICP2/ PCH
 - xen/netfront: destroy queues before real_num_tx_queues is zeroed
 - mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls
 - xfrm: fix MTU regression
 - netfilter: fix use-after-free in __nf_register_net_hook()
 - bpf, sockmap: Do not ignore orig_len parameter
 - xfrm: fix the if_id check in changelink
 - xfrm: enforce validity of offload input flags
 - e1000e: Correct NVM checksum verification flow
 - net: fix up skbs delta_truesize in UDP GRO frag_list
 - netfilter: nf_queue: don't assume sk is full socket
 - netfilter: nf_queue: fix possible use-after-free
 - netfilter: nf_queue: handle socket prefetch
 - batman-adv: Request iflink once in batadv-on-batadv check
 - batman-adv: Request iflink once in batadv_get_real_netdevice
 - batman-adv: Don't expect inter-netns unique iflink indices
 - net: ipv6: ensure we call ipv6_mc_down() at most once
 - net: dcb: flush lingering app table entries for unregistered devices
 - net/smc: fix connection leak
 - net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error generated by client
 - net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server
 - rcu/nocb: Fix missed nocb_timer requeue
 - ice: Fix race conditions between virtchnl handling and VF ndo ops
 - ice: fix concurrent reset and removal of VFs
 - sched/topology: Make sched_init_numa() use a set for the deduplicating
   sort
 - sched/topology: Fix sched_domain_topology_level alloc in 
sched_init_numa()
 - mac80211: fix forwarded mesh frames AC & queue selection
 - net: stmmac: fix return value of __setup handler
 - mac80211: treat some SAE auth steps as final
 - iavf: Fix missing check for running netdev
 - net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
 - ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc()
 - efivars: Respect "block" flag in efivar_entry_set_safe()
 - can: gs_usb: change active_channels's type from atomic_t to u8
 - igc: igc_read_phy_reg_gpy: drop premature return
 - [armel,armhf] 9182/1: mmu: fix returns from early_param() and __setup()
   functions
 - [arm64,armhf] pinctrl: sunxi: Use unique lockdep classes for IRQs
 - igc: igc_write_phy_reg_gpy: drop premature return
 - memfd: fix F_SEAL_WRITE after shmem huge page allocated
 - [armhf] dts: switch timer config to common devkit8000 devicetree
 - [armhf] dts: Use 32KiHz oscillator on devkit8000
 - [arm64] soc: fsl: guts: Revert commit 3c0d64e867ed
 - [arm64] soc: fsl: guts: Add a missing memory allocation failure check
 - [armhf] tegra: Move panels to AUX bus
 - net: chelsio: cxgb3: check the return value of pci_find_capability()
 - iavf: Refactor iavf state machine tracking
 - nl80211: Handle nla_memdup failures in handle_nan_filter
 - drm/amdgpu: fix suspend/resume hang regression
 - net: dcb: disable softirqs in dc

Bug#1006346: cloud.debian.org: bullseye AMIs don't boot on Amazon EC2 Xen instances with Enhanced Networking

2022-03-19 Thread Salvatore Bonaccorso
Hi Noah,

On Thu, Mar 17, 2022 at 09:54:30AM -0700, Noah Meyerhans wrote:
> >From the upstream discussion on the linux-pci mailing list [*]:
> 
> > Yes. My understanding is that the issue is because AWS is using older
> > versions of Xen. They are in the process of updating their fleet to a
> > newer version of Xen so the change introduced with Stefan's commit
> > isn't an issue any longer.
> > 
> > I think the changes are scheduled to be completed in the next 10-12
> > weeks. For now we are carrying a revert in the Fedora Kernel.
> > 
> > You can follow this Fedora CoreOS issue if you'd like to know more
> > about when the change lands in their backend. We work closely with one
> > of their partner engineers and he keeps us updated.
> > https://github.com/coreos/fedora-coreos-tracker/issues/1066
> 
> Ideally we can revert the upstream commit from the stable kernels, since
> otherwise Debian users on AWS Xen instance types may be stuck using
> older, unsafe kernels.  Especially if we have time to include the change
> in the upcoming bullseye and buster point releases.  If the kernel
> updates for those stable updates have already been built, though, it
> might be too late to matter.  By the time we publish our next kernel
> builds, the AWS Xen update may be complete.

Wehere one can track the update status for their Xen version directly
or is following the above the only reference?

How frequent is this particular combination of hardware/software? We
have the change already applied for a while in bullseye, buster would
be impacted new since the last update done for security fixes

Are there workarounds for the affected users of this combination? I
see some options listed in 
https://wiki.debian.org/Cloud/AmazonEC2Image/Bullseye 

If we revert the commit it reverts a fix for a bug with Marvell NVME
devices.

But we cannot just revert the commit for the cloud images.

If we know something about the release schedule from Amazon to update
their Xen instances (which is the way to move forward, since upstream
won't revert the commit) then we should leave the status as it is for
bullseye (and now for buster). For bullseye there is there is
CVE-2022-0847 fixes they would need to pick up.

Regards,
Salvatore



linux-latest_105+deb10u15_source.changes ACCEPTED into oldstable-proposed-updates->oldstable-new

2022-03-19 Thread Debian FTP Masters
Mapping buster to oldstable.
Mapping oldstable to oldstable-proposed-updates.

Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 19 Mar 2022 07:54:21 +0100
Source: linux-latest
Architecture: source
Version: 105+deb10u15
Distribution: buster
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux-latest (105+deb10u15) buster; urgency=medium
 .
   * Update to 4.19.0-20
Checksums-Sha1:
 ba54b93034a243e9030bf39a96a243d83faa228c 11743 linux-latest_105+deb10u15.dsc
 0eca5483e8610c98917ba99f7c56cea0bd2ab291 20808 linux-latest_105+deb10u15.tar.xz
 35d278d1bf830df7b2ab2113c3de0ea4cec61e9b 6309 
linux-latest_105+deb10u15_source.buildinfo
Checksums-Sha256:
 22349bf4af1af2abb05e1fe55ba27ea882670948bd15f922d80e0f20d4226c7d 11743 
linux-latest_105+deb10u15.dsc
 10e7ba0e101c5f8c69c1580e4fdd888ab2a9b44b5867ca7bcf08d340a94e6d8f 20808 
linux-latest_105+deb10u15.tar.xz
 d178463ae4c2909cb140c94dda3572d6d69db6bd2d90a6fe870b3d5a22fb282e 6309 
linux-latest_105+deb10u15_source.buildinfo
Files:
 1ceef865ca19be6f5109c81240711f8d 11743 kernel optional 
linux-latest_105+deb10u15.dsc
 e559a0e673fc1910696aab437ad01684 20808 kernel optional 
linux-latest_105+deb10u15.tar.xz
 211d7b9bc3acda4c37d3b9d5b8683ef5 6309 kernel optional 
linux-latest_105+deb10u15_source.buildinfo

-BEGIN PGP SIGNATURE-
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=DYhT
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Processing of linux-latest_105+deb10u15_source.changes

2022-03-19 Thread Debian FTP Masters
linux-latest_105+deb10u15_source.changes uploaded successfully to localhost
along with the files:
  linux-latest_105+deb10u15.dsc
  linux-latest_105+deb10u15.tar.xz
  linux-latest_105+deb10u15_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)