Bug#949863: [Vasudev Kamath] Re: Bug#949863: Info received (#949863: please enable CONFIG_NET_SWITCHDEV)

2020-07-01 Thread Vasudev Kamath
Sending it to BTS to track in bug log. --- Begin Message --- [Sending reply to bug so we can have a record of discussion] [Please keep Ashruth and my colleague in CC while replying] Tzafrir Cohen writes: [snip] >> >> I don't think we should make a config change that hurts users of stock >> D

Bug#964118: linux-image-5.7.0-1-amd64 : completely garbled USB sound on Dell Dock

2020-07-01 Thread Erwan David
Package: src:linux Version: 5.7.6-1 Severity: normal Dear Maintainer, *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? * What exactly did you do (or not do) that was effective (or ineffective)? * What was the outcome of

Processed: severity of 963746 is important, tagging 963746 ...

2020-07-01 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 963746 important Bug #963746 [nfs-common] nfs-common: Random Segmentation Violations of rpc.gssd Daemon Severity set to 'important' from 'critical' > tags 963746 + upstream Bug #963746 [nfs-common] nfs-common: Random Segmentation Violati

Support for Intel WiFi 6 AX201 160 MHz

2020-07-01 Thread Ralf Beyer
July 2, 2020 Hi, when can Debian support for Intel WiFi 6 AX201 160 MHz be expected? Kind regards Ralf Beyer -- beyer.braunschw...@freenet.de

nfs-utils_1.3.4-2.5+deb10u1_sourceonly.changes ACCEPTED into proposed-updates->stable-new

2020-07-01 Thread Debian FTP Masters
Mapping buster to stable. Mapping stable to proposed-updates. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 24 Jun 2020 09:54:47 +0200 Source: nfs-utils Architecture: source Version: 1:1.3.4-2.5+deb10u1 Distribution: buster Urgency: medium Maintainer: Debian ke

nfs-utils_1.3.4-2.1+deb9u1_source.changes ACCEPTED into oldstable-proposed-updates->oldstable-new

2020-07-01 Thread Debian FTP Masters
Mapping stretch to oldstable. Mapping oldstable to oldstable-proposed-updates. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 24 Jun 2020 10:20:47 +0200 Source: nfs-utils Architecture: source Version: 1:1.3.4-2.1+deb9u1 Distribution: stretch Urgency: medium Main

Processing of nfs-utils_1.3.4-2.5+deb10u1_sourceonly.changes

2020-07-01 Thread Debian FTP Masters
nfs-utils_1.3.4-2.5+deb10u1_sourceonly.changes uploaded successfully to localhost along with the files: nfs-utils_1.3.4-2.5+deb10u1.dsc nfs-utils_1.3.4-2.5+deb10u1.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)

Processing of nfs-utils_1.3.4-2.1+deb9u1_source.changes

2020-07-01 Thread Debian FTP Masters
nfs-utils_1.3.4-2.1+deb9u1_source.changes uploaded successfully to localhost along with the files: nfs-utils_1.3.4-2.1+deb9u1.dsc nfs-utils_1.3.4-2.1+deb9u1.debian.tar.bz2 nfs-utils_1.3.4-2.1+deb9u1_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.o

[bts-link] source package src:linux

2020-07-01 Thread debian-bts-link
# # bts-link upstream status pull for source package src:linux # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html # https://bts-link-team.pages.debian.net/bts-link/ # user debian-bts-l...@lists.debian.org # remote status report for #952821 (http://bugs.debian.org/952821

Bug#963689: How may I collect information for debugging this problem?

2020-07-01 Thread Giuseppe Sacco
Hello kernel developers, I wish to collect more information about this problem. How may I achieve it? I tried many boot parameters but no more messages have been printed. Is there anything I may do? Should I use specially crafted initrd images? Thank you, Giuseppe

Processed: Unarchiving the bug

2020-07-01 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > unarchive 949863 Bug #949863 {Done: Ben Hutchings } [src:linux] Please enable switchdev support Unarchived Bug 949863 > thanks Stopping processing here. Please contact me if you need assistance. -- 949863: https://bugs.debian.org/cgi-bin/bugrep