linux_4.9.168-1+deb9u2_multi.changes ACCEPTED into proposed-updates->stable-new

2019-05-14 Thread Debian FTP Masters
Mapping stable-security to proposed-updates.

Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 13 May 2019 21:59:18 +0100
Binary: linux-doc-4.9 linux-headers-4.9.0-9-common 
linux-headers-4.9.0-9-common-rt linux-manual-4.9 linux-source-4.9 
linux-support-4.9.0-9
Source: linux
Architecture: all source
Version: 4.9.168-1+deb9u2
Distribution: stretch-security
Urgency: high
Maintainer: Debian Kernel Team 
Changed-By: Ben Hutchings 
Closes: 928125
Description: 
 linux-doc-4.9 - Linux kernel specific documentation for version 4.9
 linux-headers-4.9.0-9-common - Common header files for Linux 4.9.0-9
 linux-headers-4.9.0-9-common-rt - Common header files for Linux 4.9.0-9-rt
 linux-manual-4.9 - Linux kernel API manual pages for version 4.9
 linux-source-4.9 - Linux kernel source for version 4.9 with Debian patches
 linux-support-4.9.0-9 - Support files for Linux 4.9
Changes:
 linux (4.9.168-1+deb9u2) stretch-security; urgency=high
 .
   [ Salvatore Bonaccorso ]
   * Revert "block/loop: Use global lock for ioctl() operation."
 (Closes: #928125)
 .
 linux (4.9.168-1+deb9u1) stretch-security; urgency=high
 .
   * [x86] Update speculation mitigations:
 - x86/MCE: Save microcode revision in machine check records
 - x86/cpufeatures: Hide AMD-specific speculation flags
 - x86/bugs: Add AMD's variant of SSB_NO
 - x86/bugs: Add AMD's SPEC_CTRL MSR usage
 - x86/bugs: Switch the selection of mitigation from CPU vendor to CPU
   features
 - x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR
 - x86/microcode/intel: Add a helper which gives the microcode revision
 - x86/microcode/intel: Check microcode revision before updating sibling
   threads
 - x86/microcode: Make sure boot_cpu_data.microcode is up-to-date
 - x86/microcode: Update the new microcode revision unconditionally
 - x86/mm: Use WRITE_ONCE() when setting PTEs
 - bitops: avoid integer overflow in GENMASK(_ULL)
 - x86/speculation: Simplify the CPU bug detection logic
 - locking/atomics, asm-generic: Move some macros from  to a
   new  file
 - x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation
 - x86/cpu: Sanitize FAM6_ATOM naming
 - Documentation/l1tf: Fix small spelling typo
 - x86/speculation: Apply IBPB more strictly to avoid cross-process data
   leak
 - x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation
 - x86/speculation: Propagate information about RSB filling mitigation to
   sysfs
 - x86/speculation/l1tf: Drop the swap storage limit restriction when
   l1tf=off
 - x86/speculation: Update the TIF_SSBD comment
 - x86/speculation: Clean up spectre_v2_parse_cmdline()
 - x86/speculation: Remove unnecessary ret variable in cpu_show_common()
 - x86/speculation: Move STIPB/IBPB string conditionals out of
   cpu_show_common()
 - x86/speculation: Disable STIBP when enhanced IBRS is in use
 - x86/speculation: Rename SSBD update functions
 - x86/speculation: Reorganize speculation control MSRs update
 - x86/Kconfig: Select SCHED_SMT if SMP enabled
 - sched: Add sched_smt_active()
 - x86/speculation: Rework SMT state change
 - x86/l1tf: Show actual SMT state
 - x86/speculation: Reorder the spec_v2 code
 - x86/speculation: Mark string arrays const correctly
 - x86/speculataion: Mark command line parser data __initdata
 - x86/speculation: Unify conditional spectre v2 print functions
 - x86/speculation: Add command line control for indirect branch speculation
 - x86/speculation: Prepare for per task indirect branch speculation control
 - x86/process: Consolidate and simplify switch_to_xtra() code
 - x86/speculation: Avoid __switch_to_xtra() calls
 - x86/speculation: Prepare for conditional IBPB in switch_mm()
 - x86/speculation: Split out TIF update
 - x86/speculation: Prepare arch_smt_update() for PRCTL mode
 - x86/speculation: Prevent stale SPEC_CTRL msr content
 - x86/speculation: Add prctl() control for indirect branch speculation
 - x86/speculation: Enable prctl mode for spectre_v2_user
 - x86/speculation: Add seccomp Spectre v2 user space protection mode
 - x86/speculation: Provide IBPB always command line options
 - kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
 - x86/msr-index: Cleanup bit defines
 - x86/speculation: Consolidate CPU whitelists
 - Documentation: Move L1TF to separate directory
 - cpu/speculation: Add 'mitigations=' cmdline option
 - x86/speculation: Support 'mitigations=' cmdline option
 - x86/speculation/mds: Add 'mitigations=' support for MDS
 - x86/cpu/bugs: Use __initconst for 'const' init data
   * [x86] Mitigate Microarchitectural Data Sampling (MDS) vulnerabilities
 (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091):
 - x86/speculation/mds: Add basic bug infrastructure for MDS
 - 

Processed: found 928989 in 4.9.168-1

2019-05-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> found 928989 4.9.168-1
Bug #928989 {Done: Salvatore Bonaccorso } [src:linux] 
linux-image-4.19.0-4-amd64: CVE-2019-11815
Marked as found in versions linux/4.9.168-1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
928989: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928989
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



linux_4.19.37-2_source.changes ACCEPTED into unstable

2019-05-14 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 14 May 2019 17:34:37 +0100
Source: linux
Architecture: source
Version: 4.19.37-2
Distribution: unstable
Urgency: high
Maintainer: Debian Kernel Team 
Changed-By: Ben Hutchings 
Closes: 928618
Changes:
 linux (4.19.37-2) unstable; urgency=high
 .
   * debian/bin: Fix Python static checker regressions (Closes: #928618)
   * Clean up speculation mitigations:
 - Documentation/l1tf: Fix small spelling typo
 - x86/cpu: Sanitize FAM6_ATOM naming
 - kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
 - x86/msr-index: Cleanup bit defines
 - x86/speculation: Consolidate CPU whitelists
 - Documentation: Move L1TF to separate directory
 - cpu/speculation: Add 'mitigations=' cmdline option
 - x86/speculation: Support 'mitigations=' cmdline option
 - powerpc/speculation: Support 'mitigations=' cmdline option
 - s390/speculation: Support 'mitigations=' cmdline option
 - x86/speculation/mds: Add 'mitigations=' support for MDS
   * [x86] Mitigate Microarchitectural Data Sampling (MDS) vulnerabilities
 (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091):
 - x86/speculation/mds: Add basic bug infrastructure for MDS
 - x86/speculation/mds: Add BUG_MSBDS_ONLY
 - x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
 - x86/speculation/mds: Add mds_clear_cpu_buffers()
 - x86/speculation/mds: Clear CPU buffers on exit to user
 - x86/kvm/vmx: Add MDS protection when L1D Flush is not active
 - x86/speculation/mds: Conditionally clear CPU buffers on idle entry
 - x86/speculation/mds: Add mitigation control for MDS
 - x86/speculation/mds: Add sysfs reporting for MDS
 - x86/speculation/mds: Add mitigation mode VMWERV
 - Documentation: Add MDS vulnerability documentation
 - x86/speculation/mds: Add mds=full,nosmt cmdline option
 - x86/speculation: Move arch_smt_update() call to after mitigation 
decisions
 - x86/speculation/mds: Add SMT warning message
 - x86/speculation/mds: Fix comment
 - x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
 - x86/mds: Add MDSUM variant to the MDS documentation
 - Documentation: Correct the possible MDS sysfs values
 - x86/speculation/mds: Fix documentation typo
   * [x86] linux-cpupower: Update CPPFLAGS for change in 
Checksums-Sha1:
 0f3898fb50eaf82ebcccffcea79b6af3ac83e58d 189124 linux_4.19.37-2.dsc
 e5d28f26074b82ba27ef5bf3ec470f52fae36224 1231028 linux_4.19.37-2.debian.tar.xz
 04d7e8722f9b410bc3d5b3f4b3b8ce9d5bb9745a 47334 linux_4.19.37-2_source.buildinfo
Checksums-Sha256:
 fa5e2bb6ecbfd13b0db17ace1e2b0edc8f860ad0c6e1c6054635f8bb93adaa46 189124 
linux_4.19.37-2.dsc
 758572eb0b6eaf20097cd3046e1ab35dfc01643db4c32669c5816489408ad12f 1231028 
linux_4.19.37-2.debian.tar.xz
 aa653914dfac9fedc580b6c5137525de46c53cb176a417d21971040554d7c07b 47334 
linux_4.19.37-2_source.buildinfo
Files:
 1acdf564916a6db0c9136dce0938afbc 189124 kernel optional linux_4.19.37-2.dsc
 2c2c39e74d5edbd524f445abec3afe96 1231028 kernel optional 
linux_4.19.37-2.debian.tar.xz
 7b9b8b9a0ddb1afa1a18f073880a4ccd 47334 kernel optional 
linux_4.19.37-2_source.buildinfo

-BEGIN PGP SIGNATURE-
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=H8IY
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Processed: closing 928989

2019-05-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> close 928989 4.19.37-1
Bug #928989 [src:linux] linux-image-4.19.0-4-amd64: CVE-2019-11815
Ignoring request to alter fixed versions of bug #928989 to the same values 
previously set
Bug #928989 [src:linux] linux-image-4.19.0-4-amd64: CVE-2019-11815
Marked Bug as done
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
928989: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928989
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#928989: linux-image-4.19.0-4-amd64: CVE-2019-11815

2019-05-14 Thread Debian Bug Tracking System
Processing control commands:

> fixed -1 4.19.37-1
Bug #928989 [src:linux] linux-image-4.19.0-4-amd64: CVE-2019-11815
Marked as fixed in versions linux/4.19.37-1.
> found -1 4.9.168-2
Bug #928989 [src:linux] linux-image-4.19.0-4-amd64: CVE-2019-11815
The source 'linux' and version '4.9.168-2' do not appear to match any binary 
packages
Marked as found in versions linux/4.9.168-2.
> found -1 3.16.64-2
Bug #928989 [src:linux] linux-image-4.19.0-4-amd64: CVE-2019-11815
The source 'linux' and version '3.16.64-2' do not appear to match any binary 
packages
Marked as found in versions linux/3.16.64-2.
> severity -1 important
Bug #928989 [src:linux] linux-image-4.19.0-4-amd64: CVE-2019-11815
Ignoring request to change severity of Bug 928989 to the same value.

-- 
928989: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928989
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#928989: linux-image-4.19.0-4-amd64: CVE-2019-11815

2019-05-14 Thread Ben Hutchings
Control: fixed -1 4.19.37-1
Control: found -1 4.9.168-2
Control: found -1 3.16.64-2
Control: severity -1 important

On Tue, 2019-05-14 at 14:37 -0400, Jeff Cliff wrote:
> Package: src:linux
> Version: 4.19.28-2
> Severity: grave
> Tags: security
> Justification: user security hole
> 
> Dear Maintainer,
> 
> An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the
> Linux kernel before 5.0.8. 
> There is a race condition leading to a use-after-free, related to net
> namespace cleanup.
> 
> the security-tracker is tracking this issue but there does not seem
> to be a bug report for it
> 
> https://security-tracker.debian.org/tracker/CVE-2019-11815
> 
> Fixed by: 
> https://git.kernel.org/linus/cb66ddd156203daefb8d71158036b27b0e2caf63
> 
> currently affects: buster/testing, stable
> currently does not affect: sid
[...]

This was already mitigated in older suites, in that we disable auto-
loading of the rds module.  This is therefore only exploitable on
systems that actually use rds.  For that reason, I'm downgrading this
to "important".

Ben.

-- 
Ben Hutchings
I haven't lost my mind; it's backed up on tape somewhere.




signature.asc
Description: This is a digitally signed message part


Processing of linux_4.19.37-2_source.changes

2019-05-14 Thread Debian FTP Masters
linux_4.19.37-2_source.changes uploaded successfully to localhost
along with the files:
  linux_4.19.37-2.dsc
  linux_4.19.37-2.debian.tar.xz
  linux_4.19.37-2_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#928618: marked as done (linux: autopkgtest regression)

2019-05-14 Thread Debian Bug Tracking System
Your message dated Tue, 14 May 2019 18:51:16 +
with message-id 
and subject line Bug#928618: fixed in linux 4.19.37-2
has caused the Debian Bug report #928618,
regarding linux: autopkgtest regression
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
928618: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928618
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: linux
Version: 4.19.37-1
X-Debbugs-CC: debian...@lists.debian.org
User: debian...@lists.debian.org
Usertags: regression

Dear maintainers,

With a recent upload of linux the autopkgtest of linux fails in testing
when that autopkgtest is run with the binary packages of linux from
unstable. It passes when run with only packages from testing. In tabular
form:
   passfail
linux  from testing4.19.37-1
versioned deps [0] from testingfrom unstable
all others from testingfrom testing

I copied some of the output at the bottom of this report.

Currently this regression is a reason for blocking the migration to
testing [1]. Can you please investigate the situation and fix it?

More information about this bug and the reason for filing it can be found on
https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation

Paul

[0] You can see what packages were added from the second line of the log
file quoted below. The migration software adds source package from
unstable to the list if they are needed to install packages from
linux/4.19.37-1. I.e. due to versioned dependencies or breaks/conflicts.
[1] https://qa.debian.org/excuses.php?package=linux

https://ci.debian.net/data/autopkgtest/testing/amd64/l/linux/2340029/log.gz

autopkgtest [03:11:55]: test python: [---
I: Running pycodestyle...
debian/bin/gencontrol_signed.py:303:30: E131 continuation line unaligned
for hanging indent
debian/bin/gencontrol_signed.py:308:36: E202 whitespace before '}'
E: pycodestyle detected problems
I: Running pyflakes...
debian/bin/abiupdate.py:139: local variable 'e' is assigned to but never
used
E: pyflakes detected problems
I: Running debian_linux.debian unit tests...
.
--
Ran 21 tests in 0.002s

OK
autopkgtest [03:11:57]: test python: ---]



signature.asc
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 4.19.37-2

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 928...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ben Hutchings  (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 14 May 2019 17:34:37 +0100
Source: linux
Architecture: source
Version: 4.19.37-2
Distribution: unstable
Urgency: high
Maintainer: Debian Kernel Team 
Changed-By: Ben Hutchings 
Closes: 928618
Changes:
 linux (4.19.37-2) unstable; urgency=high
 .
   * debian/bin: Fix Python static checker regressions (Closes: #928618)
   * Clean up speculation mitigations:
 - Documentation/l1tf: Fix small spelling typo
 - x86/cpu: Sanitize FAM6_ATOM naming
 - kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
 - x86/msr-index: Cleanup bit defines
 - x86/speculation: Consolidate CPU whitelists
 - Documentation: Move L1TF to separate directory
 - cpu/speculation: Add 'mitigations=' cmdline option
 - x86/speculation: Support 'mitigations=' cmdline option
 - powerpc/speculation: Support 'mitigations=' cmdline option
 - s390/speculation: Support 'mitigations=' cmdline option
 - x86/speculation/mds: Add 'mitigations=' support for MDS
   * [x86] Mitigate Microarchitectural Data Sampling (MDS) vulnerabilities
 (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091):
 - x86/speculation/mds: Add basic bug infrastructure for MDS
 - x86/speculation/mds: Add BUG_MSBDS_ONLY
 - x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
 - x86/speculation/mds: Add 

Processed: Re: linux-image-4.19.0-4-amd64: CVE-2019-11815

2019-05-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 928989 important
Bug #928989 [src:linux] linux-image-4.19.0-4-amd64: CVE-2019-11815
Severity set to 'important' from 'grave'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
928989: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928989
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#928989: linux-image-4.19.0-4-amd64: CVE-2019-11815

2019-05-14 Thread Jeff Cliff
Package: src:linux
Version: 4.19.28-2
Severity: grave
Tags: security
Justification: user security hole

Dear Maintainer,

An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux 
kernel before 5.0.8. 
There is a race condition leading to a use-after-free, related to net namespace 
cleanup.

the security-tracker is tracking this issue but there does not seem to be a bug 
report for it

https://security-tracker.debian.org/tracker/CVE-2019-11815

Fixed by: https://git.kernel.org/linus/cb66ddd156203daefb8d71158036b27b0e2caf63

currently affects: buster/testing, stable
currently does not affect: sid


-- Package-specific info:
** Version:
Linux version 4.19.0-4-amd64 (debian-kernel@lists.debian.org) (gcc version 
8.3.0 (Debian 8.3.0-2)) #1 SMP Debian 4.19.28-2 (2019-03-15)

** Command line:
BOOT_IMAGE=/boot/vmlinuz-4.19.0-4-amd64 
root=UUID=6fa86bad-c261-44db-8fc0-f7bd76dc2be3 ro quiet

** Not tainted

** Kernel log:
Unable to read kernel log; any relevant messages should be attached

-- System Information:
Debian Release: buster/sid
  APT prefers testing-debug
  APT policy: (500, 'testing-debug'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_CA:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages linux-image-4.19.0-4-amd64 depends on:
ii  initramfs-tools [linux-initramfs-tool]  0.133
ii  kmod26-1
ii  linux-base  4.5

Versions of packages linux-image-4.19.0-4-amd64 recommends:
ii  apparmor 2.13.2-10
ii  firmware-linux-free  3.4
ii  irqbalance   1.5.0-3

Versions of packages linux-image-4.19.0-4-amd64 suggests:
ii  debian-kernel-handbook  1.0.19
ii  grub-pc 2.02+dfsg1-16
pn  linux-doc-4.19  

Versions of packages linux-image-4.19.0-4-amd64 is related to:
pn  firmware-amd-graphics 
pn  firmware-atheros  
pn  firmware-bnx2 
pn  firmware-bnx2x
pn  firmware-brcm80211
pn  firmware-cavium   
pn  firmware-intel-sound  
pn  firmware-intelwimax   
pn  firmware-ipw2x00  
pn  firmware-ivtv 
pn  firmware-iwlwifi  
pn  firmware-libertas 
pn  firmware-linux-nonfree
pn  firmware-misc-nonfree 
pn  firmware-myricom  
pn  firmware-netxen   
pn  firmware-qlogic   
pn  firmware-realtek  
pn  firmware-samsung  
pn  firmware-siano
pn  firmware-ti-connectivity  
pn  xen-hypervisor

-- debconf-show failed



Processed: reassign 901389 to src:linux

2019-05-14 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 901389 src:linux 4.19.37-1
Bug #901389 [src:linux] [firmware-iwlwifi] Crash when using as a hotspot with 
intense usage
Ignoring request to reassign bug #901389 to the same package
Bug #901389 [src:linux] [firmware-iwlwifi] Crash when using as a hotspot with 
intense usage
No longer marked as found in versions linux/4.16.12-1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
901389: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901389
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#901389: [firmware-iwlwifi] Crash when using as a hotspot with intense usage

2019-05-14 Thread nozzy123nozzy
Package: src:linux
Version: 4.19.37-1
Severity: important

Dear Maintainer,

 I use another version of linux in my debian box,but I also have
totally the same problem when I use my laptop as a hotspot.

 I attached crash log filename="crash.log" in this report.

 This problem is randomly and often happened. I think this problem is
more often happend when windows10 pc access to this hotspot via wifi.

 I hope someone will fix this problem.

Thank you in advance,
 --
Takahide Nojima

-- Package-specific info:
** Version:
Linux version 4.19.0-5-amd64 (debian-kernel@lists.debian.org) (gcc
version 8.3.0 (Debian 8.3.0-7)) #1 SMP Debian 4.19.37-1 (2019-05-05)

** Command line:
BOOT_IMAGE=/boot/vmlinuz-4.19.0-5-amd64 root=UUID=f8dd9a0a-8954-4faa-
afe8-ecda81deca67 ro quiet

** Not tainted

** Kernel log:
[5.342873] Bluetooth: hci0: API lock is enabled
[5.342873] Bluetooth: hci0: Debug lock is disabled
[5.342875] Bluetooth: hci0: Minimum firmware build 1 week 10 2014
[5.355324] bluetooth hci0: firmware: direct-loading firmware
intel/ibt-11-5.sfi
[5.355328] Bluetooth: hci0: Found device firmware: intel/ibt-11-
5.sfi
[5.355879] idma64 idma64.1: Found Intel integrated DMA 64-bit
[5.368464] sr 0:0:0:0: Attached scsi generic sg0 type 5
[5.387753] Adding 1952764k swap on /dev/nvme0n1p5.  Priority:-2
extents:1 across:1952764k SSFS
[5.396268] intel_rapl: Found RAPL domain package
[5.396270] intel_rapl: Found RAPL domain core
[5.396270] intel_rapl: Found RAPL domain uncore
[5.396271] intel_rapl: Found RAPL domain dram
[5.410355] usbcore: registered new interface driver uvcvideo
[5.410356] USB Video Class driver (1.1.1)
[5.410916] input: HDA Intel PCH Mic as
/devices/pci:00/:00:1f.3/sound/card0/input19
[5.410968] input: HDA Intel PCH Headphone as
/devices/pci:00/:00:1f.3/sound/card0/input20
[5.411321] input: HDA Intel PCH HDMI/DP,pcm=3 as
/devices/pci:00/:00:1f.3/sound/card0/input21
[5.411593] input: HDA Intel PCH HDMI/DP,pcm=7 as
/devices/pci:00/:00:1f.3/sound/card0/input22
[5.411639] input: HDA Intel PCH HDMI/DP,pcm=8 as
/devices/pci:00/:00:1f.3/sound/card0/input23
[5.411680] input: HDA Intel PCH HDMI/DP,pcm=9 as
/devices/pci:00/:00:1f.3/sound/card0/input24
[5.411722] input: HDA Intel PCH HDMI/DP,pcm=10 as
/devices/pci:00/:00:1f.3/sound/card0/input25
[5.448734] iwlwifi :05:00.0: base HW address: 28:16:ad:e9:10:c9
[5.498155] pktcdvd: pktcdvd0: writer mapped to sr0
[5.506507] pktcdvd: pktcdvd0: pkt_get_last_written failed
[5.528738] input: VAIO0002:00 04F3:3014 Touchpad as
/devices/pci:00/:00:15.0/i2c_designware.0/i2c-1/i2c-
VAIO0002:00/0018:04F3:3014.0001/input/input27
[5.528875] hid-multitouch 0018:04F3:3014.0001: input,hidraw0: I2C
HID v1.00 Mouse [VAIO0002:00 04F3:3014] on i2c-VAIO0002:00
[5.550162] ieee80211 phy0: Selected rate control algorithm 'iwl-
mvm-rs'
[5.550408] thermal thermal_zone4: failed to read out thermal zone
(-61)
[5.552550] iwlwifi :05:00.0 wlp5s0: renamed from wlan0
[5.556225] audit: type=1400 audit(1557846641.909:2):
apparmor="STATUS" operation="profile_load" profile="unconfined"
name="/usr/lib/unreal-*/System/*.bin" pid=568 comm="apparmor_parser"
[5.559893] audit: type=1400 audit(1557846641.913:3):
apparmor="STATUS" operation="profile_load" profile="unconfined"
name="/usr/lib/telepathy/mission-control-5" pid=567
comm="apparmor_parser"
[5.559897] audit: type=1400 audit(1557846641.913:4):
apparmor="STATUS" operation="profile_load" profile="unconfined"
name="/usr/lib/telepathy/telepathy-*" pid=567 comm="apparmor_parser"
[5.559899] audit: type=1400 audit(1557846641.913:5):
apparmor="STATUS" operation="profile_load" profile="unconfined"
name="/usr/lib/telepathy/telepathy-*//pxgsettings" pid=567
comm="apparmor_parser"
[5.559900] audit: type=1400 audit(1557846641.913:6):
apparmor="STATUS" operation="profile_load" profile="unconfined"
name="/usr/lib/telepathy/telepathy-*//sanitized_helper" pid=567
comm="apparmor_parser"
[5.559902] audit: type=1400 audit(1557846641.913:7):
apparmor="STATUS" operation="profile_load" profile="unconfined"
name="/usr/lib/telepathy/telepathy-ofono" pid=567
comm="apparmor_parser"
[5.560973] audit: type=1400 audit(1557846641.913:8):
apparmor="STATUS" operation="profile_load" profile="unconfined"
name="nvidia_modprobe" pid=574 comm="apparmor_parser"
[5.560976] audit: type=1400 audit(1557846641.913:9):
apparmor="STATUS" operation="profile_load" profile="unconfined"
name="nvidia_modprobe//kmod" pid=574 comm="apparmor_parser"
[5.563849] audit: type=1400 audit(1557846641.917:10):
apparmor="STATUS" operation="profile_load" profile="unconfined"
name="/usr/bin/man" pid=575 comm="apparmor_parser"
[5.563851] audit: type=1400 audit(1557846641.917:11):
apparmor="STATUS" operation="profile_load" profile="unconfined"
name="man_filter" pid=575 comm="apparmor_parser"
[

Re: Bug#928924: user-mode-linux: xterm functionality broken due to wrong path to port-helper

2019-05-14 Thread Paul Wise
On Tue, 2019-05-14 at 13:57 +0100, Ben Hutchings wrote:

> Does user-mode-linux need to be a separate source package at all?

I guess it is separate to not require building yet another variant.

Looks like merging it was discussed in 2016:

https://bugs.debian.org/837920

-- 
bye,
pabs

https://wiki.debian.org/PaulWise



signature.asc
Description: This is a digitally signed message part


Re: Bug#928924: user-mode-linux: xterm functionality broken due to wrong path to port-helper

2019-05-14 Thread Paul Wise
Control: notforwarded -1
 
On Tue, 2019-05-14 at 14:36 +0530, Ritesh Raj Sarraf wrote:

> I submitted this fix upstream to the kernel some time ago. I don't
> recollect if the 4.19 kernel is what had it included.
> 
> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9ca19a3a3e2482916c475b90f3d7fa2a03d8e5ed

That patch is already applied in the Debian user-mode-linux package:

debian/patches/fix-port-helper-path.patch

I noticed that the path embedded in the binary has an extra slash in it
compared to what the patch changes it to so I think the problem is that
the OS_LIB_PATH variable isn't defined correctly on amd64.

There seems to be some sort of confusion about the CONFIG_64BIT var but
it seems like the paths and variables in the sources are correct so I'm
not sure what is going on.

BTW, is it possible to do source-only uploads so that the build logs
are available on amd64, or do the versioned binaries mean no logs? If
so I think it would be good to only upload i386 binary packages so that
we get the build logs for the most used architecture.

~/linux-4.19.37 $ grep -rC1 OS_LIB_PATH 
arch/um/drivers/xterm.c-char *argv[] = { terminal_emulator, 
title_switch, title, exec_switch,
arch/um/drivers/xterm.c: OS_LIB_PATH 
"/uml/port-helper", "-uml-socket",
arch/um/drivers/xterm.c- file, NULL };
--
arch/um/include/shared/os.h-#ifdef CONFIG_64BIT
arch/um/include/shared/os.h:#define OS_LIB_PATH "/usr/lib64/"
arch/um/include/shared/os.h-#else
arch/um/include/shared/os.h:#define OS_LIB_PATH "/usr/lib/"
arch/um/include/shared/os.h-#endif
--
arch/um/os-Linux/main.c-
arch/um/os-Linux/main.c:#define UML_LIB_PATH":" OS_LIB_PATH "/uml"
arch/um/os-Linux/main.c-

~/user-mode-linux-4.19-1um $ grep -r CONFIG_64BIT
config.i386:# CONFIG_64BIT is not set
config.amd64:CONFIG_64BIT=y

-- 
bye,
pabs

https://wiki.debian.org/PaulWise



signature.asc
Description: This is a digitally signed message part


Re: Bug#928924: user-mode-linux: xterm functionality broken due to wrong path to port-helper

2019-05-14 Thread Ben Hutchings
On Tue, 2019-05-14 at 18:13 +0530, Ritesh Raj Sarraf wrote:
> On Tue, 2019-05-14 at 10:45 +0100, Ben Hutchings wrote:
> > > Irrespective, I think it is a fair candidate to be backported if
> > 4.19
> > > missed that window. For User-Mode-Linux, The sources are the same
> > that
> > > the Debian Linux kernel team maintains. So either they could pick
> > this
> > > commit as a patch  or else I'll try to look into it soon.
> > [...]
> > 
> > Can you please send this request to sta...@vger.kernel.org as well?
> 
> Thanks for the suggestion Ben.
> 
> The fix for this bug is now queued for the 4.19 stable tree. So soon,
> this fix will show up in the Debian Linux kernel package too. That is
> when we can trigger a rebuild of user-mode-linux package and then mark
> this bug fixed.
> 
> Debian Buster already has the dependency set correct to the 4.19
> kernel. Wishfully it would be much nicer if this whole process of the
> build could be automated to trigger periodically, or trigger on every
> upload of the linux-source package.

Does user-mode-linux need to be a separate source package at all?

It might be difficult to integrate it with the linux source package, as
we currently assume a strict separation between kernel and userland
binary packages, but it is probably possible to do.  Something to
consider for the bullseye release cycle.

Ben.

-- 
Ben Hutchings
I haven't lost my mind; it's backed up on tape somewhere.




signature.asc
Description: This is a digitally signed message part


Re: Bug#928924: user-mode-linux: xterm functionality broken due to wrong path to port-helper

2019-05-14 Thread Ritesh Raj Sarraf
On Tue, 2019-05-14 at 10:45 +0100, Ben Hutchings wrote:
> > Irrespective, I think it is a fair candidate to be backported if
> 4.19
> > missed that window. For User-Mode-Linux, The sources are the same
> that
> > the Debian Linux kernel team maintains. So either they could pick
> this
> > commit as a patch  or else I'll try to look into it soon.
> [...]
> 
> Can you please send this request to sta...@vger.kernel.org as well?

Thanks for the suggestion Ben.

The fix for this bug is now queued for the 4.19 stable tree. So soon,
this fix will show up in the Debian Linux kernel package too. That is
when we can trigger a rebuild of user-mode-linux package and then mark
this bug fixed.

Debian Buster already has the dependency set correct to the 4.19
kernel. Wishfully it would be much nicer if this whole process of the
build could be automated to trigger periodically, or trigger on every
upload of the linux-source package.


-- 
Ritesh Raj Sarraf | http://people.debian.org/~rrs
Debian - The Universal Operating System


signature.asc
Description: This is a digitally signed message part


Re: [PATCH] um: Don't hardcode path as it is architecture dependent

2019-05-14 Thread Greg KH
On Tue, May 14, 2019 at 04:36:38PM +0530, Ritesh Raj Sarraf wrote:
> Hello Greg,
> 
> On Tue, 2019-05-14 at 12:26 +0200, Greg KH wrote:
> > On Tue, May 14, 2019 at 03:46:57PM +0530, Ritesh Raj Sarraf wrote:
> > > The current code fails to run on amd64 because of hardcoded
> > > reference to
> > > i386
> > > 
> > > Signed-off-by: Ritesh Raj Sarraf 
> > > Signed-off-by: Richard Weinberger 
> > > ---
> > >   arch/um/drivers/port_user.c | 2 +-
> > >   1 file changed, 1 insertion(+), 1 deletion(-)
> > 
> > What is the git commit id of this patch in Linus's tree?
> 
> The git commit id should be: 9ca19a3a3e2482916c475b90f3d7fa2a03d8e5ed

Thanks, now queued up.

greg k-h



Re: [PATCH] um: Don't hardcode path as it is architecture dependent

2019-05-14 Thread Ritesh Raj Sarraf
Hello Greg,

On Tue, 2019-05-14 at 12:26 +0200, Greg KH wrote:
> On Tue, May 14, 2019 at 03:46:57PM +0530, Ritesh Raj Sarraf wrote:
> > The current code fails to run on amd64 because of hardcoded
> > reference to
> > i386
> > 
> > Signed-off-by: Ritesh Raj Sarraf 
> > Signed-off-by: Richard Weinberger 
> > ---
> >   arch/um/drivers/port_user.c | 2 +-
> >   1 file changed, 1 insertion(+), 1 deletion(-)
> 
> What is the git commit id of this patch in Linus's tree?

The git commit id should be: 9ca19a3a3e2482916c475b90f3d7fa2a03d8e5ed
The web url is: 
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9ca19a3a3e2482916c475b90f3d7fa2a03d8e5ed


-- 
Ritesh Raj Sarraf | http://people.debian.org/~rrs
Debian - The Universal Operating System


signature.asc
Description: This is a digitally signed message part


Re: [PATCH] um: Don't hardcode path as it is architecture dependent

2019-05-14 Thread Greg KH
On Tue, May 14, 2019 at 03:46:57PM +0530, Ritesh Raj Sarraf wrote:
> Dear Stable Team,
> Request for inclusion into the stable branches of Linux. This change
> went into 4.20 but 4.19 is the LTS release that many of the Linux
> Vendors are rebasing on. Hence, it'd be nice to see this part of the LTS
> releases, at least 4.19.
> 
> 
> The current code fails to run on amd64 because of hardcoded reference to
> i386
> 
> Signed-off-by: Ritesh Raj Sarraf 
> Signed-off-by: Richard Weinberger 
> ---
>  arch/um/drivers/port_user.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)

What is the git commit id of this patch in Linus's tree?

thanks,

greg k-h



[PATCH] um: Don't hardcode path as it is architecture dependent

2019-05-14 Thread Ritesh Raj Sarraf
Dear Stable Team,
Request for inclusion into the stable branches of Linux. This change
went into 4.20 but 4.19 is the LTS release that many of the Linux
Vendors are rebasing on. Hence, it'd be nice to see this part of the LTS
releases, at least 4.19.


The current code fails to run on amd64 because of hardcoded reference to
i386

Signed-off-by: Ritesh Raj Sarraf 
Signed-off-by: Richard Weinberger 
---
 arch/um/drivers/port_user.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/arch/um/drivers/port_user.c b/arch/um/drivers/port_user.c
index 9a8e1b64c22e..5f56d11b886f 100644
--- a/arch/um/drivers/port_user.c
+++ b/arch/um/drivers/port_user.c
@@ -168,7 +168,7 @@ int port_connection(int fd, int *socket, int *pid_out)
 {
int new, err;
char *argv[] = { "/usr/sbin/in.telnetd", "-L",
-"/usr/lib/uml/port-helper", NULL };
+OS_LIB_PATH "/uml/port-helper", NULL };
struct port_pre_exec_data data;
 
new = accept(fd, NULL, 0);
-- 
2.20.1



Re: Bug#928924: user-mode-linux: xterm functionality broken due to wrong path to port-helper

2019-05-14 Thread Ben Hutchings
On Tue, 2019-05-14 at 14:36 +0530, Ritesh Raj Sarraf wrote:
> Control: tag -1 +fixed-upstream
> 
> CC: Adding Debian Kernel Maintainers
> 
> 
> Hello Paul,
> 
> I submitted this fix upstream to the kernel some time ago. I don't
> recollect if the 4.19 kernel is what had it included.

It went into 4.20 and hasn't been applied to 4.19-stable.

> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9ca19a3a3e2482916c475b90f3d7fa2a03d8e5ed
> 
> Irrespective, I think it is a fair candidate to be backported if 4.19
> missed that window. For User-Mode-Linux, The sources are the same that
> the Debian Linux kernel team maintains. So either they could pick this
> commit as a patch  or else I'll try to look into it soon.
[...]

Can you please send this request to sta...@vger.kernel.org as well?

Ben.

-- 
Ben Hutchings
I haven't lost my mind; it's backed up on tape somewhere.




signature.asc
Description: This is a digitally signed message part


Re: Bug#928924: user-mode-linux: xterm functionality broken due to wrong path to port-helper

2019-05-14 Thread Ritesh Raj Sarraf
Control: tag -1 +fixed-upstream

CC: Adding Debian Kernel Maintainers


Hello Paul,

I submitted this fix upstream to the kernel some time ago. I don't
recollect if the 4.19 kernel is what had it included.

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9ca19a3a3e2482916c475b90f3d7fa2a03d8e5ed

Irrespective, I think it is a fair candidate to be backported if 4.19
missed that window. For User-Mode-Linux, The sources are the same that
the Debian Linux kernel team maintains. So either they could pick this
commit as a patch  or else I'll try to look into it soon.


Thanks,
Ritesh


On Mon, 2019-05-13 at 13:01 +0800, Paul Wise wrote:
> Package: user-mode-linux
> Version: 4.19-1um-1
> Severity: important
> File: /usr/bin/linux.uml
> 
> linux.uml in a GNOME terminal gives these errors in new tabs:
> 
> There was an error creating the child process for this terminal
> Failed to execute child process “port-helper” (No such file or
> directory)
> 
> The linux.uml binary references the wrong path for port-helper:
> 
> $ strings /usr/bin/linux.uml | grep port-helper
> /usr/lib//uml/port-helper
> 
> $ dpkg -L uml-utilities | grep port-helper
> /usr/lib64/uml/port-helper
> 
> Please fix this issue in Debian buster, it is an annoying bug.
-- 
Ritesh Raj Sarraf | http://people.debian.org/~rrs
Debian - The Universal Operating System


signature.asc
Description: This is a digitally signed message part