Any updates on this one?
I am still seeing the main.index_merge_innodb failure in
https://buildd.debian.org/status/fetch.php?pkg=mariadb&arch=ppc64el&ver=1%3A10.11.2-2%7Eexp1&stamp=1678728871&raw=0
and rebuild
https://buildd.debian.org/status/fetch.php?pkg=mariadb&arch=ppc64el&ver=1%3A10.11.2-2%7
The following initrd info may or may not be pertinent to this bug in
respect to how initrds may be created in future versions of Debian...
> To: debian-de...@lists.debian.org
> Cc: debian-de...@lists.debian.org
> Subject: Re: Unlock LUKS with login/password
> From: Marco d'Itri
>
Source: linux
Version: Future Android/Waydroid support
Severity: wishlist
Forwarded: https://github.com/waydroid/waydroid/issues/811
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
In https://salsa.debian.org/kernel-team/linux/-/merge_requests/651 I had
initially removed the 2 Android related pat
On Saturday, 18 March 2023 21:33:10 CET Salvatore Bonaccorso wrote:
> > The following looks similar, though it is reported to happen on dock
> > unplug. I assume your issue is independent on that?
I guess that is https://bugzilla.kernel.org/show_bug.cgi?id=217106 ?
> And if you do some bisection/
On Saturday, 18 March 2023 22:42:15 CET Salvatore Bonaccorso wrote:
> "early", i.e. it can be in one of the first uploads to experimental we
> will do. But I will prefer to have it separate from the rebase to new
> upstream version, i.e. as own dedicated change/mr.
>
> So please keep the default i
Hi,
On Sat, Mar 18, 2023 at 10:26:08PM +0100, Diederik de Haas wrote:
> On Saturday, 18 March 2023 21:17:52 CET Salvatore Bonaccorso wrote:
> > > https://www.openwall.com/lists/oss-security/2023/03/14/2
> > >
> > > Filing a bug (for trixie (added in 6.2), can be applied early to notice
> > > pote
On Saturday, 18 March 2023 21:17:52 CET Salvatore Bonaccorso wrote:
> > https://www.openwall.com/lists/oss-security/2023/03/14/2
> >
> > Filing a bug (for trixie (added in 6.2), can be applied early to notice
> > potentially affected applications early on)
>
> Just for reference in the bug, this
On Sat, Mar 18, 2023 at 09:13:01PM +0100, Salvatore Bonaccorso wrote:
> On Thu, Mar 16, 2023 at 08:39:51PM +0100, Diederik de Haas wrote:
> > On Thursday, 16 March 2023 18:11:27 CET Julien Cristau wrote:
> > > > I rebooted on 6.1.15-1 last night and things are still looking good so
> > > > I'll cal
Hi
I would like to upload another Linux upload, version 6.1.20-1 to
unstable (aimed to move to bookworm).
It consists of importing as usual the new stable series, 6.1.16 up to
6.1.20, including CVE fixes for CVE-2023-1032, CVE-2023-1076,
CVE-2023-1077, CVE-2023-1079, CVE-2023-1118, CVE-2023-25012
Processing control commands:
> tags -1 + confirmed
Bug #1033095 [src:linux] Disable TIOCSTI for trixie
Added tag(s) confirmed.
--
1033095: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033095
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
Hi,
On Fri, Mar 17, 2023 at 09:54:33AM +0100, Moritz Muehlenhoff wrote:
> Source: linux
> Severity: wishlist
>
> https://www.openwall.com/lists/oss-security/2023/03/14/2
>
> Filing a bug (for trixie (added in 6.2), can be applied early to notice
> potentially affect
On Thu, Mar 16, 2023 at 08:39:51PM +0100, Diederik de Haas wrote:
> On Thursday, 16 March 2023 18:11:27 CET Julien Cristau wrote:
> > > I rebooted on 6.1.15-1 last night and things are still looking good so
> > > I'll call this fixed. Thanks.
> >
> > Spoke too soon:
> > > [84564.498495] BUG: kern
Processing commands for cont...@bugs.debian.org:
> tags 970819 + moreinfo
Bug #970819 [src:linux] linux-image-4.19.0-10-amd64: Suspend and hibernate fail
to work
Added tag(s) moreinfo.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
970819: https://bugs.debian.or
Processing commands for cont...@bugs.debian.org:
> # invalid version
> notfound 1032104 5.10.0-21-powerpc64le
Bug #1032104 [src:linux] linux: ppc64el iouring corrupted read
The source 'linux' and version '5.10.0-21-powerpc64le' do not appear to match
any binary packages
No longer marked as found
On Mon, 6 Mar 2023 13:25:36 +1100 Daniel Black wrote:
Since revering to linux-image-5.10.0-20 we've been free of the same errors.
On ci.debian.net I upgraded all ppc64el hosts to bookworm on 2023-03-09.
debian@ci-worker-ppc64el-04:~$ uname -a
Linux ci-worker-ppc64el-04 6.1.0-5-powerpc64le #1
binary:affs-modules-6.1.0-0.deb11.6-4kc-malta-di is NEW.
binary:affs-modules-6.1.0-0.deb11.6-5kc-malta-di is NEW.
binary:affs-modules-6.1.0-0.deb11.6-loongson-3-di is NEW.
binary:affs-modules-6.1.0-0.deb11.6-mips32r2el-di is NEW.
binary:affs-modules-6.1.0-0.deb11.6-mips64r2el-di is NEW.
binary:affs
linux_6.1.15-1~bpo11+1_source.changes uploaded successfully to localhost
along with the files:
linux_6.1.15-1~bpo11+1.dsc
linux_6.1.15-1~bpo11+1.debian.tar.xz
linux_6.1.15-1~bpo11+1_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Hi,
The next point release for "bullseye" (11.7) is scheduled for Saturday,
April 29th. Processing of new uploads into bullseye-proposed-updates
will be frozen during the preceding weekend.
Regards,
Adam
Your message dated Sat, 18 Mar 2023 13:24:17 +0100 (CET)
with message-id
and subject line Re: Hibernate bug still occuring?
has caused the Debian Bug report #929077,
regarding linux-image-4.19.0-4-amd64: cannot successfully resume from hibernate
with nouveau driver unless I pass 'nomodeset'
to be
Processing commands for cont...@bugs.debian.org:
> reassign 1033149 src:linux
Bug #1033149 [linux] general: debian 11 fails to hibernate when RAM usage above
7GB
Bug reassigned from package 'linux' to 'src:linux'.
Ignoring request to alter found versions of bug #1033149 to the same values
previo
Processing commands for cont...@bugs.debian.org:
> reassign 1033149 linux
Bug #1033149 [general] general: debian 11 fails to hibernate when RAM usage
above 7GB
Bug reassigned from package 'general' to 'linux'.
Ignoring request to alter found versions of bug #1033149 to the same values
previously
Hi Cameron,
does the bug you described in https://bugs.debian.org/970819 still occur?
I.e.:
* do you still have that system?
* did you maybe upgrade it from Debian buster to bullseye?
Greetings,
*t
Hi Thorsten,
does the bug you described in https://bugs.debian.org/941966 still occur?
I.e.:
* do you still have that system?
* did you maybe upgrade it to a more recent bullseye kernel?
Greetings,
*t
Hi Chris,
does the bug you described in https://bugs.debian.org/929077 still occur?
I.e.:
* do you still have that system?
* did you maybe upgrade it from Debian buster to bullseye?
Greetings,
*t
Hi Tomas,
Unfortunately the motherboard of this system has long since failed, before
bullseye was released.
Fine by me if you want to close this bug :)
On Sat, Mar 18, 2023 at 7:08 AM Tomas Pospisek wrote:
> Hi Chris,
>
> does the bug you described in https://bugs.debian.org/929077 still occur
25 matches
Mail list logo