Your message dated Mon, 12 May 2025 18:20:18 +0000
with message-id <e1uexlc-00617e...@fasolo.debian.org>
and subject line Bug#1104889: fixed in qemu 1:10.0.0+ds-2
has caused the Debian Bug report #1104889,
regarding qemu: NVME hotplugging regression with QEMU 10
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1104889: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104889
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:qemu
Version: 1:10.0.0+ds-1
Severity: important
Tags: fixed-upstream

  A regression in QEMU 10's handling of NVME hotplugging has been
identified[0], with a proposed fixed already submitted[1]. I've
verified that the patch fixes the issue in my test environment.

  I'm not sure what the plan is for any further updates before the
trixie release, but it would be nice to get this fixed before then,
since it renders the use of NVME virtual devices in Incus impossible.

Mathias

[0] -- https://gitlab.com/qemu-project/qemu/-/issues/2950
[1] -- https://lists.nongnu.org/archive/html/qemu-devel/2025-05/msg01537.html

Attachment: signature.asc
Description: This is a digitally signed message part


--- End Message ---
--- Begin Message ---
Source: qemu
Source-Version: 1:10.0.0+ds-2
Done: Michael Tokarev <m...@tls.msk.ru>

We believe that the bug you reported is fixed in the latest version of
qemu, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1104...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Tokarev <m...@tls.msk.ru> (supplier of updated qemu package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 12 May 2025 21:01:08 +0300
Source: qemu
Architecture: source
Version: 1:10.0.0+ds-2
Distribution: unstable
Urgency: medium
Maintainer: Debian QEMU Team <pkg-qemu-de...@lists.alioth.debian.org>
Changed-By: Michael Tokarev <m...@tls.msk.ru>
Closes: 1104889
Changes:
 qemu (1:10.0.0+ds-2) unstable; urgency=medium
 .
   * pick hw-nvme-fix-nvme-hotplugging.patch from qemu mailinglist
     Closes: #1104889
Checksums-Sha1:
 a49918cfd30a5138ade98d7699ba7ce6500be1a7 12452 qemu_10.0.0+ds-2.dsc
 2c91975daf601d6d9473171814370b00dbcf26e8 134668 qemu_10.0.0+ds-2.debian.tar.xz
 6ef971f92b3dcb602b8e3a6dda64bba0181d6351 6699 qemu_10.0.0+ds-2_source.buildinfo
Checksums-Sha256:
 920b86ecd985e7d4f590567b7ff2d78b41d3158196704a4ddc7e3c1733976d2d 12452 
qemu_10.0.0+ds-2.dsc
 db3dbecbc1b8988efd01ba8a996b0e89056fcaa538f8225bbe982a8a3fd79e0d 134668 
qemu_10.0.0+ds-2.debian.tar.xz
 1d50dd6db5325d87c46b93beb561397161283a7af268acfca929a84de5a1c691 6699 
qemu_10.0.0+ds-2_source.buildinfo
Files:
 e17ff689518773b5268c14bbd9d9884b 12452 otherosfs optional qemu_10.0.0+ds-2.dsc
 d671c9d07067e8813a62ff074f6f61d8 134668 otherosfs optional 
qemu_10.0.0+ds-2.debian.tar.xz
 e34e8adf8f012af7fe7d0a8db978be37 6699 otherosfs optional 
qemu_10.0.0+ds-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=OH7u
-----END PGP SIGNATURE-----

Attachment: pgpug6Q3lzJB8.pgp
Description: PGP signature


--- End Message ---

Reply via email to