[Aptitude-devel] Bug#842221: W: Can't drop privileges for downloading as file 'linux_4.8.4-1~exp1.dsc' couldn't be accessed by user '_apt'. - pkgAcquire::Run (13: Permission denied)

積丹尼 Dan Jacobson jidanni at jidanni.org
Thu Oct 27 04:20:48 UTC 2016


Package: aptitude
Version: 0.8.3-1+b1

# aptitude source linux
Executing 'apt source linux'

Reading package lists... Done
Selected version '4.8.4-1~exp1' (experimental) for linux
NOTICE: 'linux' packaging is maintained in the 'Git' version control system at:
https://anonscm.debian.org/git/kernel/linux.git
Please use:
git clone https://anonscm.debian.org/git/kernel/linux.git
to retrieve the latest (possibly unreleased) updates to the package.
Need to get 94.2 MB of source archives.
Get:1 http://free.nchc.org.tw/debian experimental/main linux 4.8.4-1~exp1 (dsc) [91.0 kB]
Get:2 http://free.nchc.org.tw/debian experimental/main linux 4.8.4-1~exp1 (tar) [93.3 MB]
Get:3 http://free.nchc.org.tw/debian experimental/main linux 4.8.4-1~exp1 (diff) [790 kB]
Fetched 94.2 MB in 7min 13s (217 kB/s)
gpgv: unknown type of key resource 'trustedkeys.kbx'
gpgv: keyblock resource '/root/.gnupg/trustedkeys.kbx': General error
gpgv: Signature made 2016年10月24日 (週一) 09時17分07秒 CST
gpgv:                using RSA key E7BFC8EC95861109
gpgv: Can't check signature: No public key
dpkg-source: warning: failed to verify signature on ./linux_4.8.4-1~exp1.dsc
dpkg-source: info: extracting linux in linux-4.8.4
dpkg-source: info: unpacking linux_4.8.4.orig.tar.xz
dpkg-source: info: unpacking linux_4.8.4-1~exp1.debian.tar.xz
dpkg-source: info: applying debian/version.patch
dpkg-source: info: applying debian/uname-version-timestamp.patch
dpkg-source: info: applying debian/kernelvariables.patch
dpkg-source: info: applying debian/gitignore.patch
dpkg-source: info: applying debian/mips-disable-werror.patch
dpkg-source: info: applying debian/arch-sh4-fix-uimage-build.patch
dpkg-source: info: applying debian/powerpcspe-omit-uimage.patch
dpkg-source: info: applying features/all/Kbuild-kconfig-Verbose-version-of-listnewconfig.patch
dpkg-source: info: applying debian/modpost-symbol-prefix.patch
dpkg-source: info: applying debian/tools-perf-version.patch
dpkg-source: info: applying debian/tools-perf-install.patch
dpkg-source: info: applying features/all/drivers-media-dvb-usb-af9005-request_firmware.patch
dpkg-source: info: applying debian/iwlwifi-do-not-request-unreleased-firmware.patch
dpkg-source: info: applying bugfix/all/firmware_class-log-every-success-and-failure.patch
dpkg-source: info: applying bugfix/all/firmware-remove-redundant-log-messages-from-drivers.patch
dpkg-source: info: applying bugfix/all/radeon-firmware-is-required-for-drm-and-kms-on-r600-onward.patch
dpkg-source: info: applying features/all/aufs4/aufs4-base.patch
dpkg-source: info: applying features/all/aufs4/aufs4-mmap.patch
dpkg-source: info: applying features/all/aufs4/aufs4-standalone.patch
dpkg-source: info: applying debian/af_802154-Disable-auto-loading-as-mitigation-against.patch
dpkg-source: info: applying debian/rds-Disable-auto-loading-as-mitigation-against-local.patch
dpkg-source: info: applying debian/decnet-Disable-auto-loading-as-mitigation-against-lo.patch
dpkg-source: info: applying debian/fs-enable-link-security-restrictions-by-default.patch
dpkg-source: info: applying debian/sched-autogroup-disabled.patch
dpkg-source: info: applying debian/yama-disable-by-default.patch
dpkg-source: info: applying debian/add-sysctl-to-disallow-unprivileged-CLONE_NEWUSER-by-default.patch
dpkg-source: info: applying features/all/security-perf-allow-further-restriction-of-perf_event_open.patch
dpkg-source: info: applying debian/cdc_ncm-cdc_mbim-use-ncm-by-default.patch
dpkg-source: info: applying debian/snd-pcsp-disable-autoload.patch
dpkg-source: info: applying bugfix/x86/viafb-autoload-on-olpc-xo1.5-only.patch
dpkg-source: info: applying debian/fanotify-taint-on-use-of-fanotify_access_permissions.patch
dpkg-source: info: applying bugfix/powerpc/powerpc-xmon-don-t-use-ld-on-32-bit.patch
dpkg-source: info: applying bugfix/arm64/arm64-mm-limit-task_size_64-for-compatibility.patch
dpkg-source: info: applying features/mips/MIPS-increase-MAX-PHYSMEM-BITS-on-Loongson-3-only.patch
dpkg-source: info: applying features/mips/MIPS-Loongson-3-Add-Loongson-LS3A-RS780E-1-way-machi.patch
dpkg-source: info: applying features/mips/MIPS-octeon-Add-support-for-the-UBNT-E200-board.patch
dpkg-source: info: applying features/x86/x86-memtest-WARN-if-bad-RAM-found.patch
dpkg-source: info: applying features/x86/x86-make-x32-syscall-support-conditional.patch
dpkg-source: info: applying bugfix/all/kbuild-use-nostdinc-in-compile-tests.patch
dpkg-source: info: applying bugfix/all/disable-some-marvell-phys.patch
dpkg-source: info: applying bugfix/all/fs-add-module_softdep-declarations-for-hard-coded-cr.patch
dpkg-source: info: applying bugfix/all/kbuild-do-not-use-hyphen-in-exported-variable-name.patch
dpkg-source: info: applying bugfix/all/ext4-fix-bug-838544.patch
dpkg-source: info: applying bugfix/all/mm-memcontrol-use-special-workqueue-for-creating-per-memcg-caches.patch
dpkg-source: info: applying features/all/securelevel/add-bsd-style-securelevel-support.patch
dpkg-source: info: applying features/all/securelevel/enforce-module-signatures-when-securelevel-is-greate.patch
dpkg-source: info: applying features/all/securelevel/pci-lock-down-bar-access-when-securelevel-is-enabled.patch
dpkg-source: info: applying features/all/securelevel/x86-lock-down-io-port-access-when-securelevel-is-ena.patch
dpkg-source: info: applying features/all/securelevel/restrict-dev-mem-and-dev-kmem-when-securelevel-is-se.patch
dpkg-source: info: applying features/all/securelevel/acpi-limit-access-to-custom_method-if-securelevel-is.patch
dpkg-source: info: applying features/all/securelevel/acpi-ignore-acpi_rsdp-kernel-parameter-when-securele.patch
dpkg-source: info: applying features/all/securelevel/kexec-disable-at-runtime-if-securelevel-has-been-set.patch
dpkg-source: info: applying features/all/securelevel/uswsusp-disable-when-securelevel-is-set.patch
dpkg-source: info: applying features/all/securelevel/x86-restrict-msr-access-when-securelevel-is-set.patch
dpkg-source: info: applying features/all/securelevel/asus-wmi-restrict-debugfs-interface-when-securelevel.patch
dpkg-source: info: applying features/all/securelevel/add-option-to-automatically-set-securelevel-when-in-.patch
dpkg-source: info: applying features/all/securelevel/efi-disable-secure-boot-if-shim-is-in-insecure-mode.patch
dpkg-source: info: applying features/all/securelevel/hibernate-disable-when-securelevel-is-set.patch
dpkg-source: info: applying features/all/securelevel/kexec-uefi-copy-secure_boot-flag-in-boot-params-acro.patch
dpkg-source: info: applying features/all/securelevel/acpi-disable-acpi-table-override-if-securelevel-is-s.patch
dpkg-source: info: applying features/all/securelevel/acpi-disable-apei-error-injection-if-securelevel-is-.patch
dpkg-source: info: applying features/all/securelevel/enable-cold-boot-attack-mitigation.patch
dpkg-source: info: applying features/all/securelevel/mtd-disable-slram-and-phram-when-securelevel-is-enabled.patch
dpkg-source: info: applying features/all/securelevel/arm64-efi-disable-secure-boot-if-shim-is-in-insecure.patch
dpkg-source: info: applying features/all/securelevel/arm64-add-kernel-config-option-to-set-securelevel-wh.patch
dpkg-source: info: applying bugfix/all/ptrace-being-capable-wrt-a-process-requires-mapped-uids-gids.patch
dpkg-source: info: applying debian/i386-686-pae-pci-set-pci-nobios-by-default.patch
dpkg-source: info: applying bugfix/all/net-add-recursion-limit-to-gro.patch
dpkg-source: info: applying bugfix/all/posix_acl-clear-sgid-bit-when-setting-file-permissio.patch
dpkg-source: info: applying bugfix/all/KEYS-Fix-short-sprintf-buffer-in-proc-keys-show-func.patch
dpkg-source: info: applying bugfix/all/usbip-document-tcp-wrappers.patch
dpkg-source: info: applying bugfix/all/kbuild-fix-recordmcount-dependency.patch
dpkg-source: info: applying bugfix/all/tools-perf-man-date.patch
dpkg-source: info: applying bugfix/all/lockdep-fix-oot-build.patch
dpkg-source: info: applying bugfix/all/lockdep-fix-soname.patch
dpkg-source: info: applying bugfix/all/tools-perf-remove-shebangs.patch
dpkg-source: info: applying bugfix/all/tools-lib-traceevent-use-ldflags.patch
dpkg-source: info: applying bugfix/all/tools-lib-lockdep-use-ldflags.patch
dpkg-source: info: applying bugfix/x86/tools-hv-fix-fortify-format-warning.patch
dpkg-source: info: applying bugfix/x86/revert-perf-build-fix-libunwind-feature-detection-on.patch
dpkg-source: info: applying bugfix/alpha/alpha-uapi-add-support-for-__sane_userspace_types__.patch
dpkg-source: info: applying bugfix/all/tools-build-remove-bpf-run-time-check-at-build-time.patch
dpkg-source: info: applying bugfix/all/tools-lib-traceevent-fix-use-of-uninitialized-variables.patch
dpkg-source: info: applying bugfix/all/cpupower-bump-soname-version.patch
dpkg-source: info: applying bugfix/all/liblockdep-fix-undefined-symbol-prandom_u32.patch
dpkg-source: info: applying bugfix/all/liblockdep-reduce-max_lock_depth-to-avoid-overflowin.patch
dpkg-source: info: applying bugfix/all/liblockdep-define-the-array_size-macro.patch
dpkg-source: info: applying bugfix/all/liblockdep-enable-wall-by-default.patch
dpkg-source: info: applying bugfix/all/liblockdep-fix-unused-value-warnings.patch
dpkg-source: info: applying bugfix/all/liblockdep-fix-set-but-not-used-warnings.patch
dpkg-source: info: applying bugfix/all/liblockdep-fix-defined-but-not-used-warning-for-init.patch
W: Can't drop privileges for downloading as file 'linux_4.8.4-1~exp1.dsc' couldn't be accessed by user '_apt'. - pkgAcquire::Run (13: Permission denied)



More information about the Aptitude-devel mailing list