Bug#1067006: marked as done (rpc-statd.service: State 'stop-sigterm' timed out. Killing.)

2024-04-10 Thread Debian Bug Tracking System
Your message dated Wed, 10 Apr 2024 09:00:17 +0200 with message-id and subject line Re: Bug#1067006: rpc-statd.service: State 'stop-sigterm' timed out. Killing. has caused the Debian Bug report #1067006, regarding rpc-statd.service: State 'stop-sigterm' timed out. Killing. to be marked as done.

Processed: forcibly merging 1061521 1066803

2024-04-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > forcemerge 1061521 1066803 Bug #1061521 {Done: Salvatore Bonaccorso } [src:linux] linux-image-6.6.13-amd64: 6.6.13-1 no more keyboard resuming from suspend Bug #1064041 {Done: Salvatore Bonaccorso } [src:linux] linux-image-6.1.0-18-amd64:

Processed: closing 1067033

2024-04-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > close 1067033 Bug #1067033 [linux-image-amd64] linux-image-amd64: I want to chose capture yes or not in alsa Marked Bug as done > thanks Stopping processing here. Please contact me if you need assistance. -- 1067033:

Bug#1068675: linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2)

2024-04-10 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo Cyril, On Tue, Apr 09, 2024 at 03:33:09PM +0200, Diederik de Haas wrote: > Hi Cyril, > > On Tuesday, 9 April 2024 01:06:43 CEST Cyril Brulebois wrote: > > Upgrading from linux-image-6.1.0-18-amd64 to linux-image-6.1.0-19-amd64 > > leads to losing some SMART

Processed: Re: Bug#1068675: linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2)

2024-04-10 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + moreinfo Bug #1068675 [src:linux] linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2) Added tag(s) moreinfo. -- 1068675: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068675 Debian Bug Tracking System Contact

Re: Request to enable useful kernel configs by default in new kernel versions

2024-04-10 Thread Salvatore Bonaccorso
Hi, On Sun, Mar 31, 2024 at 04:13:40AM +0300, serhii.n wrote: > Hello, can I ask you to enable those configs for new kernels (also if it > possible in backports): > > CONFIG_FRAMEBUFFER_CONSOLE_DEFERRED_TAKEOVER - it should allow to load > kernel with vendor boot logo (in case while kernel

Processed: Re: Bug#1066883: alg: ecdh-nist-p256: test failed on vector 2, err=-14

2024-04-10 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + moreinfo Bug #1066883 [src:linux] alg: ecdh-nist-p256: test failed on vector 2, err=-14 Added tag(s) moreinfo. -- 1066883: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066883 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#1066883: alg: ecdh-nist-p256: test failed on vector 2, err=-14

2024-04-10 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo Hi, On Thu, Mar 14, 2024 at 09:41:18PM +, Tj wrote: > Source: linux > Severity: important > > Same as: Bug #1061262 > > I've been seeing this with builds since 6.7 cycle started. It seems to > show up mostly for hosts with bluetooth hardware since the bluetooth

Processed: reassign 1068020 to src:linux

2024-04-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 1068020 src:linux 6.6.15-2 Bug #1068020 [linux-image-amd64] Background process seemingly paused Bug reassigned from package 'linux-image-amd64' to 'src:linux'. No longer marked as found in versions linux-signed-amd64/6.6.15+2. Ignoring

Processed: tagging 1068020

2024-04-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1068020 + moreinfo Bug #1068020 [src:linux] Background process seemingly paused Added tag(s) moreinfo. > thanks Stopping processing here. Please contact me if you need assistance. -- 1068020:

Processed: reassign 1067858 to src:linux, found 1067858 in 6.1.82-1

2024-04-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 1067858 src:linux 6.7.9-2 Bug #1067858 [src:linux-signed-amd64] reset SuperSpeed USB device number 2 using xhci_hcd Bug reassigned from package 'src:linux-signed-amd64' to 'src:linux'. No longer marked as found in versions

Processed: closing 1068356

2024-04-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > close 1068356 Bug #1068356 [src:linux] linux-image-6.1.0-18-amd64: Debian 12.5 6.1.0-18-amd64 hibernate works the 1st time then "no space left on device" in journalctl Marked Bug as done > thanks Stopping processing here. Please contact me if

Bug#1068675: linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2)

2024-04-10 Thread Cyril Brulebois
Cyril Brulebois (2024-04-10): > Salvatore Bonaccorso (2024-04-10): > > On Tue, Apr 09, 2024 at 03:33:09PM +0200, Diederik de Haas wrote: > > > Does the problem go away if you revert the following commits on top of > > > -19? > > > > > > db6338f45971b4285ea368432a84033690eaf53c > > > scsi:

Bug#1068675: linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2)

2024-04-10 Thread Salvatore Bonaccorso
On Wed, Apr 10, 2024 at 03:42:44PM +0200, Salvatore Bonaccorso wrote: > Control: tags -1 - moreinfo > Control: tags -1 + confirmed > > hi Cyril, > > On Wed, Apr 10, 2024 at 03:32:02PM +0200, Cyril Brulebois wrote: > > Cyril Brulebois (2024-04-10): > > > Salvatore Bonaccorso (2024-04-10): > > >

Bug#1068675: linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2)

2024-04-10 Thread Cyril Brulebois
Hi Salvatore, Salvatore Bonaccorso (2024-04-10): > On Tue, Apr 09, 2024 at 03:33:09PM +0200, Diederik de Haas wrote: > > Hi Cyril, > > > > On Tuesday, 9 April 2024 01:06:43 CEST Cyril Brulebois wrote: > > > Upgrading from linux-image-6.1.0-18-amd64 to linux-image-6.1.0-19-amd64 > > > leads to

Bug#1068675: linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2)

2024-04-10 Thread Cyril Brulebois
Salvatore Bonaccorso (2024-04-10): > 6.7.9-2 in unstable does not exibit the issue. v6.1.84 with stable's .config & bindeb-pkg still does; next up for me: confirming good/bad and bisecting. Cheers, -- Cyril Brulebois (k...@debian.org) D-I release manager --

Bug#1068675: linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2)

2024-04-10 Thread Diederik de Haas
On Wednesday, 10 April 2024 15:32:02 CEST Cyril Brulebois wrote: > Cyril Brulebois (2024-04-10): > > Salvatore Bonaccorso (2024-04-10): > > > On Tue, Apr 09, 2024 at 03:33:09PM +0200, Diederik de Haas wrote: > > > > Does the problem go away if you revert the following commits on top of > > > >

Bug#1068675: linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2)

2024-04-10 Thread Salvatore Bonaccorso
Control: tags -1 - moreinfo Control: tags -1 + confirmed hi Cyril, On Wed, Apr 10, 2024 at 03:32:02PM +0200, Cyril Brulebois wrote: > Cyril Brulebois (2024-04-10): > > Salvatore Bonaccorso (2024-04-10): > > > On Tue, Apr 09, 2024 at 03:33:09PM +0200, Diederik de Haas wrote: > > > > Does the

Processed: Re: Bug#1068675: linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2)

2024-04-10 Thread Debian Bug Tracking System
Processing control commands: > tags -1 - moreinfo Bug #1068675 [src:linux] linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2) Removed tag(s) moreinfo. > tags -1 + confirmed Bug #1068675 [src:linux] linux-image-6.1.0-19-amd64: loss of SMART information:

Bug#1068675: linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2)

2024-04-10 Thread Cyril Brulebois
Cyril Brulebois (2024-04-10): > v6.1.84 with stable's .config & bindeb-pkg still does; next up for me: > confirming good/bad and bisecting. Intermediate results based on upstream stable releases: v6.1.80 is good, v6.1.81 is bad. Still ~200 commits to bisect. Cheers, -- Cyril Brulebois

Bug#1068675: linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2)

2024-04-10 Thread Cyril Brulebois
Cyril Brulebois (2024-04-10): > Of course, since there are companion changes afterwards, it cannot be > simply reverted on top of either v6.1.82 (Debian) or v6.1.84 (upstream). > > > I'd appreciate if someone could carry the ball through the appropriate > channels upstream. And of course I

Bug#1068675: linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2)

2024-04-10 Thread Cyril Brulebois
Control: forwarded -1 https://lore.kernel.org/stable/20240410193207.qnb75osxuk4ov...@mraw.org/ Salvatore Bonaccorso (2024-04-10): > Yes, if you prefer to not do the forwarding upstream (stable list, CC > to involved people + regression list), then I can try to take care of > it. Obviously the

Processed: Re: Bug#1068675: linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2)

2024-04-10 Thread Debian Bug Tracking System
Processing control commands: > forwarded -1 > https://lore.kernel.org/stable/20240410193207.qnb75osxuk4ov...@mraw.org/ Bug #1068675 [src:linux] linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2) Set Bug forwarded-to-address to

Bug#1068675: linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2)

2024-04-10 Thread Cyril Brulebois
Cyril Brulebois (2024-04-10): > Intermediate results based on upstream stable releases: v6.1.80 is good, > v6.1.81 is bad. Still ~200 commits to bisect. Final results: kibi@genova:~/hack/linux.git ((cf33e6ca12d81...)|BISECTING)$ git bisect bad cf33e6ca12d814e1be2263cb76960d0019d7fb94 is

Bug#1068770: linux-image-6.1.0-18-amd64: Local privilege escalation vulnerability in kernel n_gsm driver

2024-04-10 Thread Salvatore Bonaccorso
Control: tags -1 + confirmed pending Control: found -1 6.1.82-1 Hi, On Wed, Apr 10, 2024 at 12:16:21PM -0700, LW wrote: > Package: src:linux > Version: 6.1.76-1 > Severity: critical > Tags: upstream security > Justification: root security hole > X-Debbugs-Cc: lw-deb-...@greyskydesigns.com,

Processed: Re: Bug#1068770: linux-image-6.1.0-18-amd64: Local privilege escalation vulnerability in kernel n_gsm driver

2024-04-10 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed pending Bug #1068770 [src:linux] linux-image-6.1.0-18-amd64: Local privilege escalation vulnerability in kernel n_gsm driver Added tag(s) pending and confirmed. > found -1 6.1.82-1 Bug #1068770 [src:linux] linux-image-6.1.0-18-amd64: Local

Bug#1068675: linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2)

2024-04-10 Thread Salvatore Bonaccorso
Control: tags -1 + upstream Hi, On Wed, Apr 10, 2024 at 07:00:14PM +0200, Cyril Brulebois wrote: > Cyril Brulebois (2024-04-10): > > Intermediate results based on upstream stable releases: v6.1.80 is good, > > v6.1.81 is bad. Still ~200 commits to bisect. > > Final results: > >

Processed: Re: Bug#1068675: linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2)

2024-04-10 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + upstream Bug #1068675 [src:linux] linux-image-6.1.0-19-amd64: loss of SMART information: Device is in SLEEP mode, exit(2) Added tag(s) upstream. -- 1068675: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068675 Debian Bug Tracking System Contact

Bug#1068770: linux-image-6.1.0-18-amd64: Local privilege escalation vulnerability in kernel n_gsm driver

2024-04-10 Thread LW
Package: src:linux Version: 6.1.76-1 Severity: critical Tags: upstream security Justification: root security hole X-Debbugs-Cc: lw-deb-...@greyskydesigns.com, Debian Security Team Dear Maintainer, A Reddit thread[1] linked to a Github page[2] with a local root escalation exploit. This

Processed: severity of 1068770 is grave

2024-04-10 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > severity 1068770 grave Bug #1068770 [src:linux] linux-image-6.1.0-18-amd64: Local privilege escalation vulnerability in kernel n_gsm driver Severity set to 'grave' from 'critical' > thanks Stopping processing here. Please contact me if you need