Processed: your mail
Processing commands for cont...@bugs.debian.org: > tags 976054 +pending Bug #976054 [initramfs-tools] initramfs-tools: [RFC] Compress initramfs file with zstd Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 976054: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976054 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#990279: 9a89a721b41b (" drm/amdgpu: check alignment on CPU page for bo map") breaks amdgpu on ppc64 machines?
As of kernel 5.15.5 (bpo) I see that max_t() is still used. If this is blocking any merge into the stable kernel patch, I can test it with just PAGE_SIZE to confirm whether it is okay. As it stands, I currently need to manually build the stable kernel in order to have a functioning Blackbird workstation. On Fri, 28 Jan 2022 00:16:27 +0100 Salvatore Bonaccorso wrote: > Source: linux > Source-Version: 5.13.9-1~exp1 > > Hi, > > On Thu, Jan 27, 2022 at 11:02:58PM +, Nathaniel Filardo wrote: > > It looks like the missing patch made its way into > > 5.15.0-0.bpo.2-powerpc64le, as f4d3da72a76a9ce... I think. As a > > result, I think this bug is overcome by events and can be closed. > > Indeed, thanks for reminding and referencing the upstream commit. > > Regards, > Salvatore > >
Processed: Re: Bug#1004465: libklibc-dev: headers not installed
Processing commands for cont...@bugs.debian.org: > found 1004465 2.0.10-1 Bug #1004465 [libklibc-dev] libklibc-dev: headers not installed Marked as found in versions klibc/2.0.10-1. > thanks Stopping processing here. Please contact me if you need assistance. -- 1004465: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004465 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#1004465: libklibc-dev: headers not installed
found 1004465 2.0.10-1 thanks Dixi quod… >Quite some files are missing: […] >/usr/lib/klibc/include/alloca.h […] >/usr/lib/klibc/include/arpa/inet.h > /usr/lib/klibc/include/asm > /usr/lib/klibc/include/asm-generic >/usr/lib/klibc/include/assert.h […] From this pattern, commit 8f680c0688151ce4d50072783a5b6fad7beabc1f is suspect: Since debhelper 11, dh_install and dh_installman have automatically searched for the listed files/directories relative to debian/tmp/ as well as in the top directory. --- a/debian/libklibc-dev.install +++ b/debian/libklibc-dev.install @@ -1,1 +1,1 @@ -debian/tmp/usr/lib/klibc/include/* +usr/lib/klibc/include/* My suspiction here is that since usr/lib/klibc/include/* exist in the top-level directory, the alternative location is not attempted. I’d probably just rever that and not rely on such fragile automatism that reek of bad magic and make the packaging harder to understand… and easier to break (e.g. if upstream adds files…) bye, //mirabilos -- 22:20⎜ The crazy that persists in his craziness becomes a master 22:21⎜ And the distance between the craziness and geniality is only measured by the success 18:35⎜ "Psychotics are consistently inconsistent. The essence of sanity is to be inconsistently inconsistent
linux_5.16.3-1~exp1_source.changes ACCEPTED into experimental, experimental
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 27 Jan 2022 23:12:52 +0100 Source: linux Architecture: source Version: 5.16.3-1~exp1 Distribution: experimental Urgency: medium Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Closes: 983757 1002706 1004095 Changes: linux (5.16.3-1~exp1) experimental; urgency=medium . * New upstream release: https://kernelnewbies.org/Linux_5.16 * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.1 - bpf: Fix out of bounds access from invalid *_or_null type verification (CVE-2022-23222) https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.2 https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3 - netfilter: nft_payload: do not update layer 4 checksum when mangling fragments (Closes: #1002706) . [ Helmut Grohne ] * Multiarchify python build-depends. (Closes: #983757) . [ Ben Hutchings ] * linux-perf: Fix detection of libperl and libpython in cross-build * debian/README.source: Tag signatures are automatically verified * [rt] trace: Enable OSNOISE_TRACER, TIMERLAT_TRACER, HIST_TRIGGERS * d/bin/git-tag-gpg-wrapper, debian/upstream: Use ASCII-armored keyring * d/watch: Rewrite to find all upstream versions through Git * d/bin/genorig.py, d/README.source: Only support Git as upstream * d/bin/genorig.py, d/README.source: Add support for remote upstream repos * lintian: Refresh lintian-overrides * d/copyright: Fix license name with spaces in it * d/copyright: Update for removed and renamed source files * d/tests/selftests: Use $AUTOPKGTEST_TMP instead of $ADTTMP * Fix missing user-space hardening: - d/rules.real: Define KBUILD_HOST{C,LD}FLAGS for sub-make - linux-kbuild: Build modpost with standard CPPFLAGS - cpupower: Build with standard CPPFLAGS - usbip: Build with standard CPPFLAGS - objtool: Build with standard CFLAGS and CPPFLAGS - tools/perf: Define DEBUG=0 for sub-make so libapi doesn't use wrong flags - libapi: Define _FORTIFY_SOURCE as 2, not empty - tools/perf: Fix missing LDFLAGS for some programs * d/rules: Tell blhc to ignore missing flags for perf-read-vdso* helpers * d/rules: Tell blhc to ignore kernel compilation * d/rules: Filter out -s option so that Kbuild is not silent * d/bin/gencontrol.py, d/lib/python: Use classes for build restriction formulae * d/bin/gencontrol.py, d/rules.real: Replace DEBUG variable with if_package * Introduce pkg.linux.quick build profile for quicker CI builds * d/salsa-ci.yml: Add CI config using some of the common pipeline * d/salsa-ci.yml, d/tests/python: Only run static checks in CI * d/salsa-ci.yml: Run kconfigeditor2 as kconfig static check * d/rules, d/salsa-ci.yml: Enable blhc, ignoring terse output * bpftool, objtool, usbip: Always build with V=1 so blhc can check them * d/salsa-ci.yml: Use per-release cache of orig tarballs * linux-perf: Build a single unversioned package of perf, as it is no longer necessary to match the kernel version . [ Vincent Blut ] * drivers/net/wireless/realtek/rtw89: Enable RTW89 and RTW89_8852AE as modules (Closes: #1004095) . [ Aurelien Jarno ] * [riscv64] Add support for SBI SRST extension . [ YunQiang Su ] * [mips*/generic] Change zload address for QEMU compatibility. . [ Salvatore Bonaccorso ] * [rt] Update to 5.16.2-rt18 * [rt] Update to 5.16.2-rt19 * [x86] drm/i915: Flush TLBs before releasing backing store (CVE-2022-0330) * drm/vmwgfx: Fix stale file descriptors on failed usercopy (CVE-2022-22942) . [ Bastian Blank ] * Build-depend on pahole after rename from dwarves. * Remove remaining aufs patches for good. Checksums-Sha1: f1bad30f6ef401e0672641228c71b0a8a81b9619 260356 linux_5.16.3-1~exp1.dsc 4efc067bcd42fc396f52e8835ae1554511c13613 129172772 linux_5.16.3.orig.tar.xz 38871a7a7881581b3dcacb92d009e7260b91527c 1300396 linux_5.16.3-1~exp1.debian.tar.xz 936216a80ff2b3c63c398b4ab6e4ec36d6279e3e 6485 linux_5.16.3-1~exp1_source.buildinfo Checksums-Sha256: a469cf553b017489294e44311c1b56bd5168bbc2d6b5ea3b353ec51dc950e4bc 260356 linux_5.16.3-1~exp1.dsc 78aef8c5449d64b8ee7e48b62301f95f3f855565fcb56951192e37999b0d4c13 129172772 linux_5.16.3.orig.tar.xz 4ca893aa7bc54dc65b4fb1efe378adac506b2d39c328602a33e3cd00bc78d5c0 1300396 linux_5.16.3-1~exp1.debian.tar.xz 567df90edf84c2af7cfd7a7f812158529c4e9d4de63368b8aa628dbcaddd90f8 6485 linux_5.16.3-1~exp1_source.buildinfo Files: ee53491cc19b24a38b9bf11e840e171a 260356 kernel optional linux_5.16.3-1~exp1.dsc 085a5468a341d4d7fb6a4b92668f830d 129172772 kernel optional linux_5.16.3.orig.tar.xz d7bbbe33d1df75137d3e8fb73760b9da 1300396 kernel optional linux_5.16.3-1~exp1.debian.tar.xz 805e838fe3c9167d083656a39ad48caf 6485 kernel optional linux_5.16.3-1~exp1_source.buildinfo -BEGIN PGP SIGNATURE-
Bug#1004095: marked as done (linux-image-5.16.0-rc8-amd64: Please enable rtw89 Realtek WiFi driver)
Your message dated Fri, 28 Jan 2022 10:00:09 + with message-id and subject line Bug#1004095: fixed in linux 5.16.3-1~exp1 has caused the Debian Bug report #1004095, regarding linux-image-5.16.0-rc8-amd64: Please enable rtw89 Realtek WiFi driver to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1004095: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004095 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: src:linux Version: 5.16~rc8-1~exp1 Severity: wishlist Dear Maintainer, Recent Ryzen-based Lenovo laptops include the Realtek 8852 WiFi chip that requires the rtw89 driver. The rtw89 module is new in Linux 5.16, but not enabled by default. Please enable this module in future builds. Thanks. -- Package-specific info: ** Version: Linux version 5.16.0-rc8-amd64 (debian-kernel@lists.debian.org) (gcc-11 (Debian 11.2.0-13) 11.2.0, GNU ld (GNU Binutils for Debian) 2.37) #1 SMP PREEMPT Debian 5.16~rc8-1~exp1 (2022-01-03) ** Command line: BOOT_IMAGE=/vmlinuz-5.16.0-rc8-amd64 root=/dev/mapper/debian-root ro quiet ** Not tainted ** Kernel log: [81573.205460] amdgpu :07:00.0: amdgpu: RAP: optional rap ta ucode is not available [81573.205462] amdgpu :07:00.0: amdgpu: SECUREDISPLAY: securedisplay ta ucode is not available [81573.205465] amdgpu :07:00.0: amdgpu: SMU is resuming... [81573.205508] amdgpu :07:00.0: amdgpu: dpm has been disabled [81573.206502] amdgpu :07:00.0: amdgpu: SMU is resumed successfully! [81573.207066] [drm] DMUB hardware initialized: version=0x0101000A [81573.209673] [drm] REG_WAIT timeout 1us * 1000 tries - dcn20_dsc_pg_control line:366 [81573.211905] [drm] REG_WAIT timeout 1us * 1000 tries - dcn20_dsc_pg_control line:374 [81573.214171] [drm] REG_WAIT timeout 1us * 1000 tries - dcn20_dsc_pg_control line:382 [81573.256700] [drm] REG_WAIT timeout 1us * 1000 tries - dcn20_dpp_pg_control line:437 [81573.259019] [drm] REG_WAIT timeout 1us * 1000 tries - dcn20_hubp_pg_control line:511 [81573.261330] [drm] REG_WAIT timeout 1us * 1000 tries - dcn20_dpp_pg_control line:445 [81573.263559] [drm] REG_WAIT timeout 1us * 1000 tries - dcn20_hubp_pg_control line:519 [81573.265841] [drm] REG_WAIT timeout 1us * 1000 tries - dcn20_dpp_pg_control line:453 [81573.268070] [drm] REG_WAIT timeout 1us * 1000 tries - dcn20_hubp_pg_control line:527 [81573.270351] [drm] REG_WAIT timeout 1us * 1000 tries - dcn20_dpp_pg_control line:461 [81573.272617] [drm] REG_WAIT timeout 1us * 1000 tries - dcn20_hubp_pg_control line:535 [81573.405037] usb 5-4: reset full-speed USB device number 3 using xhci_hcd [81573.434096] [drm] kiq ring mec 2 pipe 1 q 0 [81573.436796] [drm] VCN decode and encode initialized successfully(under DPG Mode). [81573.436942] [drm] JPEG decode initialized successfully. [81573.436962] amdgpu :07:00.0: amdgpu: ring gfx uses VM inv eng 0 on hub 0 [81573.436964] amdgpu :07:00.0: amdgpu: ring comp_1.0.0 uses VM inv eng 1 on hub 0 [81573.436966] amdgpu :07:00.0: amdgpu: ring comp_1.1.0 uses VM inv eng 4 on hub 0 [81573.436967] amdgpu :07:00.0: amdgpu: ring comp_1.2.0 uses VM inv eng 5 on hub 0 [81573.436968] amdgpu :07:00.0: amdgpu: ring comp_1.3.0 uses VM inv eng 6 on hub 0 [81573.436969] amdgpu :07:00.0: amdgpu: ring comp_1.0.1 uses VM inv eng 7 on hub 0 [81573.436970] amdgpu :07:00.0: amdgpu: ring comp_1.1.1 uses VM inv eng 8 on hub 0 [81573.436971] amdgpu :07:00.0: amdgpu: ring comp_1.2.1 uses VM inv eng 9 on hub 0 [81573.436971] amdgpu :07:00.0: amdgpu: ring comp_1.3.1 uses VM inv eng 10 on hub 0 [81573.436972] amdgpu :07:00.0: amdgpu: ring kiq_2.1.0 uses VM inv eng 11 on hub 0 [81573.436973] amdgpu :07:00.0: amdgpu: ring sdma0 uses VM inv eng 0 on hub 1 [81573.436974] amdgpu :07:00.0: amdgpu: ring vcn_dec uses VM inv eng 1 on hub 1 [81573.436975] amdgpu :07:00.0: amdgpu: ring vcn_enc0 uses VM inv eng 4 on hub 1 [81573.436976] amdgpu :07:00.0: amdgpu: ring vcn_enc1 uses VM inv eng 5 on hub 1 [81573.436977] amdgpu :07:00.0: amdgpu: ring jpeg_dec uses VM inv eng 6 on hub 1 [81573.541392] usb 1-2: reset high-speed USB device number 2 using xhci_hcd [81573.696878] OOM killer enabled. [81573.696881] Restarting tasks ... [81573.700616] pci_bus :01: Allocating resources [81573.700913] pci_bus :02: Allocating resources [81573.700936] pci_bus :03: Allocating resources [81573.700947] pci_bus :04: Allocating resources [81573.704067] pci_bus :05: Allocating resources [81573.704077] pci_bus :06: Allocating resources [81573.706047] done.
Bug#1002706: marked as done (linux-image-5.10.0-10-amd64: nftables stateless NAT in raw table mangles fragmented UDP packets)
Your message dated Fri, 28 Jan 2022 10:00:09 + with message-id and subject line Bug#1002706: fixed in linux 5.16.3-1~exp1 has caused the Debian Bug report #1002706, regarding linux-image-5.10.0-10-amd64: nftables stateless NAT in raw table mangles fragmented UDP packets to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1002706: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002706 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: src:linux Version: 5.10.84-1 Severity: important Dear Maintainer, We have using kernel linux-image-5.10.0-10-amd64 and nftables(0.9.8-3.1) for a stateless NAT GW. We are using the nftables "raw" tables to replace statically source and destination addresses for pakets traversing the host with two nftables map. If fragmented UDP packets are traversing the gateway the second fragment gets modified at the location where in a non fragmented packet the UDP checksum would be located. On the Sample below the packet content at 0x1a-0x1b was changes from 0x61 0x61 to 0xba 0x9e nft list ruleset: table ip raw { map M_publicip_in { type ipv4_addr : ipv4_addr elements = { 100.64.1.1 : 10.1.2.3 } } map M_publicip_out { type ipv4_addr : ipv4_addr elements = { 10.1.2.3 : 100.64.1.1 } } chain PREROUTING { type filter hook prerouting priority -300; policy accept; jump publicip_out jump publicip_in } chain publicip_out { ip saddr set ip saddr map @M_publicip_out accept } chain publicip_in { ip daddr set ip daddr map @M_publicip_in accept } } Pre NAT sample: root@debian:~# tcpdump -l -i eth0 -nvvvx tcpdump: listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes 21:50:15.314671 IP (tos 0x0, ttl 64, id 3756, offset 0, flags [+], proto UDP (17), length 1500) 10.2.1.1.45866 > 100.64.1.1.: UDP, length 2013 0x: 4500 05dc 0eac 2000 4011 d621 0a02 0101 0x0010: 6440 0101 b32a 270f 07e5 0016 4865 6c6c 0x0020: 6f2c 2057 6f72 6c64 2161 6161 6161 6161 0x0030: 6161 6161 6161 6161 6161 6161 6161 6161 0x0040: 6161 6161 6161 6161 6161 6161 6161 6161 0x0050: 6161 6161 6161 6161 6161 6161 6161 6161 0x0060: 6161 6161 6161 6161 6161 6161 6161 6161 0x0070: 6161 6161 6161 6161 6161 6161 6161 6161 0x0080: 6161 6161 6161 6161 6161 6161 6161 6161 0x0090: 6161 6161 6161 6161 6161 6161 6161 6161 0x00a0: 6161 6161 6161 6161 6161 6161 6161 6161 0x00b0: 6161 6161 6161 6161 6161 6161 6161 6161 0x00c0: 6161 6161 6161 6161 6161 6161 6161 6161 0x00d0: 6161 6161 6161 6161 6161 6161 6161 6161 0x00e0: 6161 6161 6161 6161 6161 6161 6161 6161 0x00f0: 6161 6161 6161 6161 6161 6161 6161 6161 0x0100: 6161 6161 6161 6161 6161 6161 6161 6161 0x0110: 6161 6161 6161 6161 6161 6161 6161 6161 0x0120: 6161 6161 6161 6161 6161 6161 6161 6161 0x0130: 6161 6161 6161 6161 6161 6161 6161 6161 0x0140: 6161 6161 6161 6161 6161 6161 6161 6161 0x0150: 6161 6161 6161 6161 6161 6161 6161 6161 0x0160: 6161 6161 6161 6161 6161 6161 6161 6161 0x0170: 6161 6161 6161 6161 6161 6161 6161 6161 0x0180: 6161 6161 6161 6161 6161 6161 6161 6161 0x0190: 6161 6161 6161 6161 6161 6161 6161 6161 0x01a0: 6161 6161 6161 6161 6161 6161 6161 6161 0x01b0: 6161 6161 6161 6161 6161 6161 6161 6161 0x01c0: 6161 6161 6161 6161 6161 6161 6161 6161 0x01d0: 6161 6161 6161 6161 6161 6161 6161 6161 0x01e0: 6161 6161 6161 6161 6161 6161 6161 6161 0x01f0: 6161 6161 6161 6161 6161 6161 6161 6161 0x0200: 6161 6161 6161 6161 6161 6161 6161 6161 0x0210: 6161 6161 6161 6161 6161 6161 6161 6161 0x0220: 6161 6161 6161 6161 6161 6161 6161 6161 0x0230: 6161 6161 6161 6161 6161 6161 6161 6161 0x0240: 6161 6161 6161 6161 6161 6161 6161 6161 0x0250: 6161 6161 6161 6161 6161 6161 6161 6161 0x0260: 6161 6161 6161 6161 6161 6161 6161 6161 0x0270: 6161 6161 6161 6161 6161 6161 6161 6161 0x0280: 6161 6161 6161 6161 6161 6161 6161 6161 0x0290: 6161 6161 6161 6161 6161 6161 6161 6161 0x02a0: 6161 6161 6161 6161 6161 6161 6161 6161 0x02b0: 6161 6161 6161 6161 6161 6161 6161 6161 0x02c0: 6161 6161 6161 6161 6161 6161 6161 6161 0x02d0: 6161 6161 6161 6161 6161 6161 6161 6161 0x02e0: 6161 6161 6161 6161 6161 6161 6161 6161 0x02f0: 6161 6161 6161 6161 6161 6161 6161 6161 0x0300: 6161 6161 6161 6161 6161 6161 6161 6161 0x0310: 6161 6161 6161 6161 6161 6161 6161 6161
kernel 5.16.3
I have compiled the debs for amd64 are you interested?
Bug#1002706: Fwd: nftables stateless NAT in raw table mangles fragmented UDP packets
Hi all, The following Patch on top of a 4.19.208 is working in our test system since Jan 5. cheerio Steve Am 27.01.22 um 22:59 schrieb Florian Westphal: > Salvatore Bonaccorso wrote: >> Hi, >> >> On Thu, Jan 27, 2022 at 06:26:10PM +0100, Steffen Weinreich wrote: >>> Hi all, >>> >>> The patch made its way to mainline / latest >>> >>> Any chance to get it backported to 4.19? >> It would be need to have a backport sent sta...@vger.kernel.org . Once >> it lands in the older stable series, we can include it as well >> downstream in Debian. What does Pablo say on the backport for the >> older series? I see it has been applied to 5.15.17 and 5.16.3, but is >> not yet queued for older series. > Thats because the patch won't compile as-is on those older kernels, > it needs a minor change. I can try to do it tomorrow and send it to > stable. --- linux-source-4.19/net/netfilter/nft_payload.c.orig 2021-09-26 11:39:49.0 + +++ linux-source-4.19/net/netfilter/nft_payload.c 2022-01-04 18:53:04.888219213 + @@ -194,6 +194,9 @@ struct sk_buff *skb, unsigned int *l4csum_offset) { + if (pkt->xt.fragoff) + return -1; + switch (pkt->tprot) { case IPPROTO_TCP: *l4csum_offset = offsetof(struct tcphdr, check);