Processed: bug 1027921 is forwarded to https://bugzilla.kernel.org/show_bug.cgi?id=204769 https://lore.kernel.org/linux-scsi/bug-204769-11...@https.bugzilla.kernel.org%2F/

2023-01-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> forwarded 1027921 https://bugzilla.kernel.org/show_bug.cgi?id=204769 
> https://lore.kernel.org/linux-scsi/bug-204769-11...@https.bugzilla.kernel.org%2F/
Bug #1027921 [src:linux] linux-image-5.10.0-20-amd64: aacraid's 
expose_physicals=-1 is not functional
Set Bug forwarded-to-address to 
'https://bugzilla.kernel.org/show_bug.cgi?id=204769 
https://lore.kernel.org/linux-scsi/bug-204769-11...@https.bugzilla.kernel.org%2F/'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1027921: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027921
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#996839: [PATCH v1] perf script flamegraph: Avoid d3-flame-graph package dependency

2023-01-04 Thread Ian Rogers
Currently flame graph generation requires a d3-flame-graph template to
be installed. Unfortunately this is hard to come by for things like
Debian [1]. If the template isn't installed warn and download it from
jsdelivr CDN. If downloading fails generate a minimal flame graph
again with the javascript coming from jsdelivr CDN.

[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996839

Signed-off-by: Ian Rogers 
---
 tools/perf/scripts/python/flamegraph.py | 63 ++---
 1 file changed, 45 insertions(+), 18 deletions(-)

diff --git a/tools/perf/scripts/python/flamegraph.py 
b/tools/perf/scripts/python/flamegraph.py
index b6af1dd5f816..808b0e1c9be5 100755
--- a/tools/perf/scripts/python/flamegraph.py
+++ b/tools/perf/scripts/python/flamegraph.py
@@ -25,6 +25,27 @@ import io
 import argparse
 import json
 import subprocess
+import urllib.request
+
+minimal_html = """
+  https://cdn.jsdelivr.net/npm/d3-flame-graph@4.1.3/dist/d3-flamegraph.css;>
+
+
+  
+  https://d3js.org/d3.v7.js";>
+  https://cdn.jsdelivr.net/npm/d3-flame-graph@4.1.3/dist/d3-flamegraph.min.js";>
+  
+  const stacks = [/** @flamegraph_json **/];
+  // Note, options is unused.
+  const options = [/** @options_json **/];
+
+  var chart = flamegraph();
+  d3.select("#chart")
+.datum(stacks[0])
+.call(chart);
+  
+
+"""
 
 # pylint: disable=too-few-public-methods
 class Node:
@@ -50,15 +71,18 @@ class FlameGraphCLI:
 self.args = args
 self.stack = Node("all", "root")
 
-if self.args.format == "html" and \
-not os.path.isfile(self.args.template):
-print("Flame Graph template {} does not exist. Please install "
-  "the js-d3-flame-graph (RPM) or libjs-d3-flame-graph (deb) "
-  "package, specify an existing flame graph template "
-  "(--template PATH) or another output format "
-  "(--format FORMAT).".format(self.args.template),
-  file=sys.stderr)
-sys.exit(1)
+if self.args.format == "html":
+if os.path.isfile(self.args.template):
+self.template = f"file://{self.args.template}"
+else:
+print(f"""
+Warning: Flame Graph template '{self.args.template}'
+does not exist, a template will be downloaded via http. To avoid this
+please install a package such as the js-d3-flame-graph or
+libjs-d3-flame-graph, specify an existing flame graph template
+(--template PATH) or another output format (--format FORMAT).
+""", file=sys.stderr)
+self.template = 
"https://cdn.jsdelivr.net/npm/d3-flame-graph@4.1.3/dist/templates/d3-flamegraph-base.html;
 
 @staticmethod
 def get_libtype_from_dso(dso):
@@ -129,15 +153,18 @@ class FlameGraphCLI:
 options_json = json.dumps(options)
 
 try:
-with io.open(self.args.template, encoding="utf-8") as template:
-output_str = (
-template.read()
-.replace("/** @options_json **/", options_json)
-.replace("/** @flamegraph_json **/", stacks_json)
-)
-except IOError as err:
-print("Error reading template file: {}".format(err), 
file=sys.stderr)
-sys.exit(1)
+with urllib.request.urlopen(self.template) as template:
+output_str = '\n'.join([
+l.decode('utf-8') for l in template.readlines()
+])
+except Exception as err:
+print(f"Error reading template {self.template}: {err}\n"
+  "a minimal flame graph will be generated", 
file=sys.stderr)
+output_str = minimal_html
+
+output_str = output_str.replace("/** @options_json **/", 
options_json)
+output_str = output_str.replace("/** @flamegraph_json **/", 
stacks_json)
+
 output_fn = self.args.output or "flamegraph.html"
 else:
 output_str = stacks_json
-- 
2.39.0.314.g84b9a713c41-goog



Bug#1027953: src:linux: Enable Intel VSEC, SDSI and PMT drivers

2023-01-04 Thread Miguel Bernal Marin
Source: linux
Severity: wishlist
Tags: patch
X-Debbugs-Cc: miguel.bernal.ma...@linux.intel.com, 
jair.de.jesus.gonzalez.plascen...@intel.com

Dear Maintainer,

Intel is planing to release the next-generation Xeon products [1] and some
of the features are not enabled on Debian. Some of those are described
below:

# Intel Vendor Specific Extended Capabilities Driver

  CONFIG_INTEL_VSEC=m

  This adds support for feature drivers exposed using Intel PCIe VSEC
  and DVSEC. This feature is used by the Intel PMT and Intel SDSi

# Intel Platform Monitoring Technology (PMT)

  CONFIG_INTEL_PMT_CLASS=m
  CONFIG_INTEL_PMT_TELEMETRY=m
  CONFIG_INTEL_PMT_CRASHLOG=m

  Intel PMT is an architecture for enumerating and accessing hardware
  monitoring capabilities on a device. With customers increasingly asking
  for hardware telemetry, engineers not only have to figure out how to
  measure and collect data, but also how to deliver it and make it
  discoverable. The latter may be through some device specific method
  requiring device specific tools to collect the data.

  PMT provides a solution for discovering and reading telemetry from a
  device through a hardware agnostic framework that allows for updates
  to systems without requiring patches to the kernel or software tools.

  The current capabilities defined by PMT are Telemetry, Watcher, and
  Crashlog.

  PMT defines several capabilities to support collecting monitoring data
  from hardware. All are discoverable as separate instances of the PCIE
  Designated Vendor extended capability (DVSEC) with the Intel vendor code.

# Intel Software Defined Silicon Driver (SDSi)

  CONFIG_INTEL_SDSI=m

  Intel Software Defined Silicon (SDSi) is a post manufacturing mechanism for
  activating additional silicon features. Features are enabled through a
  license activation process.  The SDSi driver provides a per socket, sysfs
  attribute interface for applications to perform 3 main provisioning
  functions:

  1. Provision an Authentication Key Certificate (AKC), a key written to
 internal NVRAM that is used to authenticate a capability specific
 activation payload.

  2. Provision a Capability Activation Payload (CAP), a token authenticated
 using the AKC and applied to the CPU configuration to activate a new
 feature.

  3. Read the SDSi State Certificate, containing the CPU configuration
 state.

  The operations perform function specific mailbox commands that forward the
  requests to SDSi hardware to perform authentication of the payloads and
  enable the silicon configuration (to be made available after power
  cycling).

  The SDSi device itself is enumerated as an auxiliary device from the
  intel_vsec driver and as such has a build dependency on CONFIG_INTEL_VSEC.

  Link: https://github.com/intel/intel-sdsi

A MR was created for this request:

MR: https://salsa.debian.org/kernel-team/linux/-/merge_requests/621

Please let me know if it needs any modification.

[1] 
https://www.intel.com/content/www/us/en/newsroom/news/intel-technology-roadmaps-milestones.html

-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 6.0.0-6-amd64 (SMP w/4 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



Processed: Re: linux-image-6.2.0-rc2: cannot connect via ethernet

2023-01-04 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 upstream
Bug #1027891 [src:linux] linux-image-6.2.0-rc2: cannot connect via ethernet
Added tag(s) upstream.
> severity -1 normal
Bug #1027891 [src:linux] linux-image-6.2.0-rc2: cannot connect via ethernet
Severity set to 'normal' from 'important'

-- 
1027891: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027891
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1027891: linux-image-6.2.0-rc2: cannot connect via ethernet

2023-01-04 Thread Diederik de Haas
Control: tag -1 upstream
Control: severity -1 normal

On Wed, 04 Jan 2023 12:04:52 +0100 xevilstar  wrote:
> Package: linux-image-6.2.0-rc2
> Version: 6.2.0-rc2-1
> 
> I am testing linux kernel 6.2-rc2

That is great, but you should report any issues you find to the relevant 
upstream maintainers.

signature.asc
Description: This is a digitally signed message part.


Processed: notfixed 1020899 in 0.1.3.0-1, tagging 1023443, tagging 985556, tagging 971640 ..., tagging 1027760 ...

2023-01-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> notfixed 1020899 0.1.3.0-1
Bug #1020899 {Done: Ilias Tsitsimpis } 
[src:haskell-byte-order] haskell-byte-order: BD-Uninstallable on armel, armhf, 
i386, mipsel
No longer marked as fixed in versions 0.1.3.0-1.
> tags 1023443 - sid
Bug #1023443 {Done: Vagrant Cascadian } [src:u-boot] 
u-boot: Add colibri_imx6 configuration
Removed tag(s) sid.
> tags 985556 + experimental
Bug #985556 {Done: Simon McVittie } [glib2.0] 
flatpak/1.2.5-0+deb10u4 FTBFS on IPv6-only buildds
Added tag(s) experimental.
> tags 971640 + experimental
Bug #971640 {Done: Reiner Herrmann } [firejail] firejail: 
Build profile command no longer works
Added tag(s) experimental.
> reassign 1027891 src:linux
Bug #1027891 [linux-image-6.2.0-rc2] linux-image-6.2.0-rc2: cannot connect via 
ethernet
Warning: Unknown package 'linux-image-6.2.0-rc2'
Bug reassigned from package 'linux-image-6.2.0-rc2' to 'src:linux'.
No longer marked as found in versions 6.2.0-rc2-1.
Ignoring request to alter fixed versions of bug #1027891 to the same values 
previously set
> reassign 794821 src:wxwidgets3.2 3.2.1+dfsg-1
Bug #794821 [libwxbase3.2-0] libwxbase3.0-0: segmentation fault (SIGSEGV) with 
gnuplot5
Warning: Unknown package 'libwxbase3.2-0'
Bug reassigned from package 'libwxbase3.2-0' to 'src:wxwidgets3.2'.
No longer marked as found in versions wxwidgets3.2/3.2.1+dfsg-1.
Ignoring request to alter fixed versions of bug #794821 to the same values 
previously set
Bug #794821 [src:wxwidgets3.2] libwxbase3.0-0: segmentation fault (SIGSEGV) 
with gnuplot5
Marked as found in versions wxwidgets3.2/3.2.1+dfsg-1.
> reassign 1024147 src:wxwidgets3.2 3.2.1+dfsg-1
Bug #1024147 {Done: Scott Talbert } [libwxgtk3.2-0] Please 
build with --disable-glcanvasegl
Warning: Unknown package 'libwxgtk3.2-0'
Bug reassigned from package 'libwxgtk3.2-0' to 'src:wxwidgets3.2'.
No longer marked as found in versions wxwidgets3.2/3.2.1+dfsg-1.
No longer marked as fixed in versions wxwidgets3.2/3.2.1+dfsg-2.
Bug #1024147 {Done: Scott Talbert } [src:wxwidgets3.2] Please 
build with --disable-glcanvasegl
Marked as found in versions wxwidgets3.2/3.2.1+dfsg-1.
> fixed 1024147 3.2.1+dfsg-2
Bug #1024147 {Done: Scott Talbert } [src:wxwidgets3.2] Please 
build with --disable-glcanvasegl
Marked as fixed in versions wxwidgets3.2/3.2.1+dfsg-2.
> found 1026781 1.8.0-7
Bug #1026781 [pkgconf] pkgconf: breaks adequate missing-pkgconfig-dependency 
check due to behaviour change in: pkg-config --exists --print-errors
There is no source info for the package 'pkgconf' at version '1.8.0-7' with 
architecture ''
Unable to make a source version for version '1.8.0-7'
Marked as found in versions 1.8.0-7.
> found 1027733 4.9.0-3
Bug #1027733 [screen] GNU Screen does not support Unicode 14
Marked as found in versions screen/4.9.0-3.
> tags 1027760 + sid bookworm
Bug #1027760 [src:gortr] gortr appears to be unmaintained
Added tag(s) bookworm and sid.
> tags 1027854 + sid bookworm
Bug #1027854 [kismet-plugins] kismet-plugins: uninstallable due to dependency 
on libssl1.1
Added tag(s) sid and bookworm.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1020899: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1020899
1023443: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023443
1024147: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024147
1026781: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026781
1027733: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027733
1027760: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027760
1027854: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027854
1027891: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027891
794821: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=794821
971640: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971640
985556: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985556
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Fwd: Job opportunity for Financial Crimes Data Science Sr. Manager

2023-01-04 Thread aditya pratap
Hello,

Job Title: Financial Crimes Data Science Sr. Manager
Position Type: Full Time Remote
Client : Key Bank

Job description

*ABOUT THE JOB (JOB BRIEF)*

Reporting to the Director of Financial Crimes Modeling & Analytics that
reports to the Chief Modeling and Analytics Officer, the Data Science
Senior Manager is primarily responsible for leading a quantitative team in
support of financial crime modeling and analytics. This role must establish
priorities for the team, assign and define the work to the right resources,
and understand the strengths and opportunities of the team to ensure the
team meets and exceeds expectations. This role is responsible for owning
modeling practices, methods, and techniques as well as for influencing data
strategy with a focus on leveraging both current and emerging technologies
and applications. The Data Science Senior Manager acts as a leader,
strategic advisor and credible thought partner to senior / executive level
business partners. This position is also responsible for managing the
integration of activities within and across teams as well as effectively
manage, coach, develop, and guide a team of professionals to anticipate
business needs, recommend solutions that are both effective and efficient,
and communicate the right message.

*ESSENTIAL JOB FUNCTIONS*

   - Oversee a small quantitative team (2-4 direct reports) in developing
   models and conducting analytics to address financial crime compliance needs
   in AML/BSA/OFAC
   - Research, compile and evaluate large sets of data to assess quality
   and determine suitability for model building
   - Develop/maintain internal models and test/configure vendor solutions
   to ensure conceptually sound design, proper implementation, and acceptable
   model performance
   - Employ innovative techniques to drive continuous improvements in model
   effectiveness and efficiency, e.g. reducing false positives
   - Proactively coach and develop the team on building technical skills
   and business knowledge; promote the team and their capabilities to
   stakeholders
   - Effectively collaborate with compliance, technology, and risk
   partners; guides, advises, challenges, and influences to drive
   organizational impact
   - Provide strategic consultation and thought leadership to senior /
   executive level business partners

*REQUIRED QUALIFICATIONS*


   - Master's degree (or its equivalent) in statistics, mathematics,
   economics, computer science, data sciences, predictive modeling, or other
   quantitative disciplines and at least 6 years of relevant experience,
   preferred in AML/BSA, OFAC, or fraud modeling/analytics
   - Solid expertise with both traditional and Machine Learning
   (Client)/Artificial Intelligence (AI) modeling practice and solutions
   - Hands-on work experience with statistical coding in SAS and/or Python
   - Knowledge of and ability to leverage traditional databases,
   cloud-based computing, and distribution computing
   - In-depth understanding of financial crime regulatory requirements,
   technology, and data analysis best practices
   - Demonstrated direct management experience
   - Excellent verbal, written and visual communication skills; ability to
   define and communicate key risk metrics, dashboards and analytics for
   senior management and executive reporting; translate technical observations
   to a non-technical audience
   - A credible thought leader that can guide, advise, challenge, and
   influence at all levels of the organization and drive organizational impact
   - *What are the 3-4 non-negotiable requirements of this position?*
   1. Master's or PhD in statistics, mathematics, economics, computer
   science, data sciences, predictive modeling, or other quantitative
   disciplines 2. Minimum 4-6 years of related experience 3. Expertise with
   both traditional and Machine Learning (Client)/Artificial Intelligence (AI)
   modeling practice and solutions 4. Hands on coding experience in Python
   and/or SAS (willing to take weaker SAS experience) 5. Cloud experience (we
   utilize GCP)

If you are qualified, available, interested, planning to make a change, or
know of a friend who might have the required qualifications and interest,
please call me ASAP at (763) 363-5654, even if we have spoken recently
about a different position. If you do respond via e-mail please include a
daytime phone number so I can reach you. In considering candidates, time is
of the essence, so please respond ASAP.

Thank you.

Sincerely yours
Aditya Pratap Singh
Talent Acquisition Specialist
___
Inspiron Systems
5145 Jewel ln North, Plymouth MN 55446
Phone : 1-(855) 722-1029   Direct : 763-373-8285
adi...@inspironsys.com   : http://www.inspironsys.com


Bug#1027915: systemd requires /run to be mounted with a minimum size of 20MB

2023-01-04 Thread Helge Deller

Hi Helmut,

On 1/4/23 14:26, Helmut Grohne wrote:

On Wed, Jan 04, 2023 at 02:08:00PM +0100, Helge Deller wrote:

My suggestion:
Please check that the /run mountpoint is mounted with at least 20MB, independend
of the installed RAM memory in the machine...


Your suggestion makes sense in principle. However, it is
/usr/share/initramfs-tools/init that performs the mount, so that's what
would need changing.


Ah, ok. Thanks Helmut!


As a workaround for your situation, I suggest adding a kernel parameter
initramfs.runsize=20M.


Yes, that should work.


Would you be able to provide a patch here? I think that if a runsize is
given, it should be honoured, so it would probably work like:

if test -z "$RUNSIZE"; then
if system_has_at_least_200mb_ram; then
RUNSIZE=10%
else
RUNSIZE=20M
fi
fi


Yes, I'll try to send a patch.
I just wonder, what's the best way to get the amount of physical memory?
Something like this should work which gives size in kB:
mem_kb=$(grep MemTotal /proc/meminfo | (read txt mem txt2; echo $mem)) && echo 
$mem_kb

Is there a better way? I think glibc isn't running in initramfs, so "getconf 
_PHYS_PAGES" will probably not work?

Helge



Bug#1027921: linux-image-5.10.0-20-amd64: aacraid's expose_physicals=-1 is not functional

2023-01-04 Thread Diederik de Haas
On Wednesday, 4 January 2023 15:38:32 CET Tim Düsterhus wrote:
> Unfortunately the setting `1` allows direct write access to the devices,
> whereas the previous and to my understanding the default setting of `-1`
> only allows read access, making this a safer option.
> 
> It appears that aacraid's `expose_physicals=-1` option got broken
> somewhere between Linux 4.19 and 5.10.

https://git.kernel.org/linus/e3cc268fe4a0ad1cbefbc53cee35c80281e609b8 seems 
relevant, although I do not fully understand it.
One thing that stood out for me is the check `expose_physicals > 0` instead of 
`expose_physicals != 0`. But that commit exists since 2.6.35 ...

This very much looks like an upstream kernel issue and therefor it's better to 
bring it to the attention of those maintainers.

Those are:
$ scripts/get_maintainer.pl drivers/scsi/aacraid/aachba.c 
Adaptec OEM Raid Solutions  (supporter:AACRAID SCSI 
RAID DRIVER)
"James E.J. Bottomley"  (maintainer:SCSI SUBSYSTEM)
"Martin K. Petersen"  (maintainer:SCSI SUBSYSTEM)
linux-s...@vger.kernel.org (open list:AACRAID SCSI RAID DRIVER)
linux-ker...@vger.kernel.org (open list)

When you do forward your question, please inform this bug report of the URL.

HTH

signature.asc
Description: This is a digitally signed message part.


Bug#1027921: linux-image-5.10.0-20-amd64: aacraid's expose_physicals=-1 is not functional

2023-01-04 Thread Tim

Hi Renato

On 1/4/23 16:39, Renato Gallo wrote:

5.10 should be EOL by now


According to https://www.kernel.org/category/releases.html, Linux 5.10 
is supported until 2026.


Whether a fix for this bug qualifies as an "important bugfix" acceptable 
for a LTS kernel I can't tell.


In any case, 5.10 is the stock kernel for Debian Bullseye and thus I 
wanted to report the issue, if only to ensure it is tracked, even if 
the/a fix doesn't make the cut for Bullseye.


Best regards
Tim Düsterhus
Developer WoltLab GmbH

--

WoltLab GmbH
Nedlitzer Str. 27B
14469 Potsdam

Tel.: +49 331 96784338

duester...@woltlab.com
www.woltlab.com

Managing director:
Marcel Werk

AG Potsdam HRB 26795 P



Bug#1027921: linux-image-5.10.0-20-amd64: aacraid's expose_physicals=-1 is not functional

2023-01-04 Thread Diederik de Haas
On Wednesday, 4 January 2023 16:39:33 CET Renato Gallo wrote:
> 5.10 should be EOL by now

Please refrain from comments like that.
It doesn't help at all and is also plain false.

signature.asc
Description: This is a digitally signed message part.


Bug#1027921: linux-image-5.10.0-20-amd64: aacraid's expose_physicals=-1 is not functional

2023-01-04 Thread Renato Gallo
5.10 should be EOL by now

On Wed, Jan 4, 2023 at 3:51 PM Tim Düsterhus  wrote:

> Package: src:linux
> Version: 5.10.158-2
> Severity: normal
> X-Debbugs-Cc: duester...@woltlab.com
>
> Dear Maintainer,
>
> after upgrading my server from Debian Buster to Debian Bullseye, I
> noticed that the underlying devices attached to the Adaptec 6405E raid
> controller were no longer exposed via the /dev/sgX devices and thus
> reading the SMART values was no longer possible:
>
> $ lsscsi
> [0:0:0:0]diskAdaptec  *redacted*   V1.0  /dev/sda
> [0:3:0:0]enclosu ADAPTEC  Virtual SGPIO  -
>
> Booting into the Linux 4.19 kernel from Debian Buster correctly exposed
> the devices with the new userland, indicating a Kernel issue.
>
> I was able to work around the issue by adding the following
> configuration to /etc/modprobe.d/:
>
> options aacraid expose_physicals=1
>
> After setting this configuration and rebooting the server the devices
> are properly visible as they were before:
>
> $ lsscsi
> [0:0:0:0]diskAdaptec  *redacted*   V1.0  /dev/sda
> [0:1:0:0]diskATA  *redacted*     /dev/sdb
> [0:1:1:0]diskATA  *redacted*     /dev/sdc
> [0:3:0:0]enclosu ADAPTEC  Virtual SGPIO  -
>
> Unfortunately the setting `1` allows direct write access to the devices,
> whereas the previous and to my understanding the default setting of `-1`
> only allows read access, making this a safer option.
>
> It appears that aacraid's `expose_physicals=-1` option got broken
> somewhere between Linux 4.19 and 5.10.
>
> Best regards
>
>
> -- Package-specific info:
> ** Version:
> Linux version 5.10.0-20-amd64 (debian-kernel@lists.debian.org) (gcc-10
> (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2)
> #1 SMP Debian 5.10.158-2 (2022-12-13)
>
> ** Command line:
> BOOT_IMAGE=/vmlinuz-5.10.0-20-amd64 root=ZFS=rpool/ROOT/debian ro boot=zfs
> swapaccount=1 quiet
>
> ** Tainted: POE (12289)
>  * proprietary module was loaded
>  * externally-built ("out-of-tree") module was loaded
>  * unsigned module was loaded
>
> ** Kernel log:
> Unable to read kernel log; any relevant messages should be attached
>
> ** Model information
> sys_vendor: Supermicro
> product_name: X10SLH-F/X10SLM+-F
> product_version: 0123456789
> chassis_vendor: Supermicro
> chassis_version: 0123456789
> bios_vendor: American Megatrends Inc.
> bios_version: 3.2a
> board_vendor: Supermicro
> board_name: X10SLH-F/X10SLM+-F
> board_version: 1.02
>
> ** Loaded modules:
> nft_reject_inet
> nf_reject_ipv4
> nf_reject_ipv6
> nft_reject
> nft_counter
> intel_rapl_msr
> intel_rapl_common
> ipmi_ssif
> nft_ct
> nf_conntrack
> nf_defrag_ipv6
> nf_defrag_ipv4
> x86_pkg_temp_thermal
> intel_powerclamp
> coretemp
> kvm_intel
> kvm
> ext4
> irqbypass
> ghash_clmulni_intel
> crc16
> mbcache
> jbd2
> aesni_intel
> libaes
> crypto_simd
> cryptd
> ast
> glue_helper
> drm_vram_helper
> drm_ttm_helper
> rapl
> ttm
> intel_cstate
> intel_uncore
> drm_kms_helper
> pcspkr
> joydev
> at24
> intel_pch_thermal
> evdev
> mei_me
> cec
> iTCO_wdt
> mei
> intel_pmc_bxt
> sg
> iTCO_vendor_support
> watchdog
> ie31200_edac
> acpi_ipmi
> ipmi_si
> ipmi_devintf
> ipmi_msghandler
> acpi_pad
> button
> nf_tables
> libcrc32c
> crc32c_generic
> nfnetlink
> drm
> fuse
> configfs
> ip_tables
> x_tables
> autofs4
> hid_generic
> usbhid
> hid
> zfs(POE)
> zunicode(POE)
> zzstd(OE)
> zlua(OE)
> zavl(POE)
> icp(POE)
> zcommon(POE)
> znvpair(POE)
> spl(OE)
> ses
> enclosure
> sd_mod
> scsi_transport_sas
> t10_pi
> crc_t10dif
> crct10dif_generic
> ahci
> libahci
> xhci_pci
> libata
> xhci_hcd
> ehci_pci
> crct10dif_pclmul
> crct10dif_common
> ehci_hcd
> aacraid
> crc32_pclmul
> lpc_ich
> igb
> i2c_i801
> usbcore
> i2c_smbus
> scsi_mod
> crc32c_intel
> i2c_algo_bit
> dca
> ptp
> pps_core
> usb_common
> fan
> video
>
> ** PCI devices:
> 00:00.0 Host bridge [0600]: Intel Corporation Xeon E3-1200 v3 Processor
> DRAM Controller [8086:0c08] (rev 06)
> Subsystem: Super Micro Computer Inc Xeon E3-1200 v3 Processor DRAM
> Controller [15d9:0803]
> Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop-
> ParErr- Stepping- SERR- FastB2B- DisINTx-
> Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort-
> SERR-  Latency: 0
> IOMMU group: 0
> Capabilities: [e0] Vendor Specific Information: Len=0c 
> Kernel driver in use: ie31200_edac
> Kernel modules: ie31200_edac
>
> 00:01.0 PCI bridge [0604]: Intel Corporation Xeon E3-1200 v3/4th Gen Core
> Processor PCI Express x16 Controller [8086:0c01] (rev 06) (prog-if 00
> [Normal decode])
> Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop-
> ParErr- Stepping- SERR- FastB2B- DisINTx+
> Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort-
> SERR-  Latency: 0, Cache Line Size: 64 bytes
> Interrupt: pin A routed to IRQ 25
> IOMMU 

Bug#1027921: linux-image-5.10.0-20-amd64: aacraid's expose_physicals=-1 is not functional

2023-01-04 Thread Tim

Dear Maintainer,

Forgot to include in my initial report that I found the workaround using 
this (German) thread in the Proxmox Support Forum:


https://forum.proxmox.com/threads/adaptec-aacraid-expose_physicals-kernelbug.63256/

The thread is fairly light on details, but it appears to indicate the 
the issue already existed with Linux 5.3.


Best regards
Tim Düsterhus
Developer WoltLab GmbH

--

WoltLab GmbH
Nedlitzer Str. 27B
14469 Potsdam

Tel.: +49 331 96784338

duester...@woltlab.com
www.woltlab.com

Managing director:
Marcel Werk

AG Potsdam HRB 26795 P



Bug#1027921: linux-image-5.10.0-20-amd64: aacraid's expose_physicals=-1 is not functional

2023-01-04 Thread Tim Düsterhus
Package: src:linux
Version: 5.10.158-2
Severity: normal
X-Debbugs-Cc: duester...@woltlab.com

Dear Maintainer,

after upgrading my server from Debian Buster to Debian Bullseye, I
noticed that the underlying devices attached to the Adaptec 6405E raid
controller were no longer exposed via the /dev/sgX devices and thus
reading the SMART values was no longer possible:

$ lsscsi
[0:0:0:0]diskAdaptec  *redacted*   V1.0  /dev/sda
[0:3:0:0]enclosu ADAPTEC  Virtual SGPIO  -

Booting into the Linux 4.19 kernel from Debian Buster correctly exposed
the devices with the new userland, indicating a Kernel issue.

I was able to work around the issue by adding the following
configuration to /etc/modprobe.d/:

options aacraid expose_physicals=1

After setting this configuration and rebooting the server the devices
are properly visible as they were before:

$ lsscsi
[0:0:0:0]diskAdaptec  *redacted*   V1.0  /dev/sda 
[0:1:0:0]diskATA  *redacted*     /dev/sdb 
[0:1:1:0]diskATA  *redacted*     /dev/sdc 
[0:3:0:0]enclosu ADAPTEC  Virtual SGPIO  -

Unfortunately the setting `1` allows direct write access to the devices,
whereas the previous and to my understanding the default setting of `-1`
only allows read access, making this a safer option.

It appears that aacraid's `expose_physicals=-1` option got broken
somewhere between Linux 4.19 and 5.10.

Best regards


-- Package-specific info:
** Version:
Linux version 5.10.0-20-amd64 (debian-kernel@lists.debian.org) (gcc-10 (Debian 
10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2) #1 SMP 
Debian 5.10.158-2 (2022-12-13)

** Command line:
BOOT_IMAGE=/vmlinuz-5.10.0-20-amd64 root=ZFS=rpool/ROOT/debian ro boot=zfs 
swapaccount=1 quiet

** Tainted: POE (12289)
 * proprietary module was loaded
 * externally-built ("out-of-tree") module was loaded
 * unsigned module was loaded

** Kernel log:
Unable to read kernel log; any relevant messages should be attached

** Model information
sys_vendor: Supermicro
product_name: X10SLH-F/X10SLM+-F
product_version: 0123456789
chassis_vendor: Supermicro
chassis_version: 0123456789
bios_vendor: American Megatrends Inc.
bios_version: 3.2a
board_vendor: Supermicro
board_name: X10SLH-F/X10SLM+-F
board_version: 1.02 

** Loaded modules:
nft_reject_inet
nf_reject_ipv4
nf_reject_ipv6
nft_reject
nft_counter
intel_rapl_msr
intel_rapl_common
ipmi_ssif
nft_ct
nf_conntrack
nf_defrag_ipv6
nf_defrag_ipv4
x86_pkg_temp_thermal
intel_powerclamp
coretemp
kvm_intel
kvm
ext4
irqbypass
ghash_clmulni_intel
crc16
mbcache
jbd2
aesni_intel
libaes
crypto_simd
cryptd
ast
glue_helper
drm_vram_helper
drm_ttm_helper
rapl
ttm
intel_cstate
intel_uncore
drm_kms_helper
pcspkr
joydev
at24
intel_pch_thermal
evdev
mei_me
cec
iTCO_wdt
mei
intel_pmc_bxt
sg
iTCO_vendor_support
watchdog
ie31200_edac
acpi_ipmi
ipmi_si
ipmi_devintf
ipmi_msghandler
acpi_pad
button
nf_tables
libcrc32c
crc32c_generic
nfnetlink
drm
fuse
configfs
ip_tables
x_tables
autofs4
hid_generic
usbhid
hid
zfs(POE)
zunicode(POE)
zzstd(OE)
zlua(OE)
zavl(POE)
icp(POE)
zcommon(POE)
znvpair(POE)
spl(OE)
ses
enclosure
sd_mod
scsi_transport_sas
t10_pi
crc_t10dif
crct10dif_generic
ahci
libahci
xhci_pci
libata
xhci_hcd
ehci_pci
crct10dif_pclmul
crct10dif_common
ehci_hcd
aacraid
crc32_pclmul
lpc_ich
igb
i2c_i801
usbcore
i2c_smbus
scsi_mod
crc32c_intel
i2c_algo_bit
dca
ptp
pps_core
usb_common
fan
video

** PCI devices:
00:00.0 Host bridge [0600]: Intel Corporation Xeon E3-1200 v3 Processor DRAM 
Controller [8086:0c08] (rev 06)
Subsystem: Super Micro Computer Inc Xeon E3-1200 v3 Processor DRAM 
Controller [15d9:0803]
Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- 
Kernel driver in use: ie31200_edac
Kernel modules: ie31200_edac

00:01.0 PCI bridge [0604]: Intel Corporation Xeon E3-1200 v3/4th Gen Core 
Processor PCI Express x16 Controller [8086:0c01] (rev 06) (prog-if 00 [Normal 
decode])
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx+
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- TAbort- Reset- FastB2B-
PriDiscTmr- SecDiscTmr- DiscTmrStat- DiscTmrSERREn-
Capabilities: [88] Subsystem: Super Micro Computer Inc Xeon E3-1200 
v3/4th Gen Core Processor PCI Express x16 Controller [15d9:0803]
Capabilities: [80] Power Management version 3
Flags: PMEClk- DSI- D1- D2- AuxCurrent=0mA 
PME(D0+,D1-,D2-,D3hot+,D3cold+)
Status: D0 NoSoftRst+ PME-Enable- DSel=0 DScale=0 PME-
Capabilities: [90] MSI: Enable+ Count=1/1 Maskable- 64bit-
Address: fee00218  Data: 
Capabilities: [a0] Express (v2) Root Port (Slot+), MSI 00
DevCap: MaxPayload 256 

Processed: Re: Bug#1027915: systemd requires /run to be mounted with a minimum size of 20MB

2023-01-04 Thread Debian Bug Tracking System
Processing control commands:

> reassign -1 initramfs-tools-core
Bug #1027915 [systemd] systemd requires /run to be mounted with a minimum size 
of 20MB
Bug reassigned from package 'systemd' to 'initramfs-tools-core'.
No longer marked as found in versions systemd/252.4-1.
Ignoring request to alter fixed versions of bug #1027915 to the same values 
previously set

-- 
1027915: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027915
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1022126: mpt3sas broken with xen dom0

2023-01-04 Thread Salvatore Bonaccorso
Hi Taavi,

On Mon, Jan 02, 2023 at 03:54:16PM +0200, Taavi Ansper wrote:
> Are there any news regarding when the fix would be implemented for bullseye?

See
https://lore.kernel.org/linux-scsi/181536c494aa39ca78b190396a97072448739411.ca...@suse.com/
for an upstream status. Once the patches land in mainline, they can be
picked up for the stable series.

Then it will be included as well for bullseye as we follow the stable
series and try to rebase at least on each point release.

So I would expect we can see the fix in the next update.

Regards,
Salvatore



Bug#1027861: linux: consider enabling CONFIG_IPV6_RPL_LWTUNNEL

2023-01-04 Thread Jérôme Pouiller
Source: linux
Severity: wishlist
Tags: ipv6
X-Debbugs-Cc: jerome.pouil...@gmail.com

Hi folks,

"RPL Source Routing Header" (CONFIG_IPV6_RPL_LWTUNNEL) is currently
disabled. It seems it is only an oversight since this option is not
explicitly mentioned in debian kernel config file (and features like
"Segment Routing Header encapsulation" are enabled while they are very
close of "RPL Source Routing Header").

We consider to use RPL Source Routing Header in our implementation of
border router for Low-Power and Lossy Networks[1]. So, I would be very
glad to see this option enabled on Debian.

FYI, I have build a custom kernel with this option enabled without any
pain. I could send a patch if you need.

Thank you,

[1]: https://github.com/SiliconLabs/wisun-br-linux

-- System Information:
Debian Release: bookworm/sid
  APT prefers testing
  APT policy: (500, 'testing'), (300, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.0.10-custom (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN
Locale: LANG=en_IE.utf8, LC_CTYPE=en_IE.utf8 (charmap=UTF-8), LANGUAGE=en_IE:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled