Processed: Re: Bug#1038419: installation-reports: [arm64] Installation hangs on "Configuring grub-efi-arm64 (arm64)"

2023-06-25 Thread Debian Bug Tracking System
Processing control commands:

> reassign -1 src:linux 6.1.27-1
Bug #1038419 [installation-reports] installation-reports: [arm64] Installation 
hangs on "Configuring grub-efi-arm64 (arm64)"
Bug reassigned from package 'installation-reports' to 'src:linux'.
Ignoring request to alter found versions of bug #1038419 to the same values 
previously set
Ignoring request to alter fixed versions of bug #1038419 to the same values 
previously set
Bug #1038419 [src:linux] installation-reports: [arm64] Installation hangs on 
"Configuring grub-efi-arm64 (arm64)"
Marked as found in versions linux/6.1.27-1.
> affects -1 debian-installer installation-reports
Bug #1038419 [src:linux] installation-reports: [arm64] Installation hangs on 
"Configuring grub-efi-arm64 (arm64)"
Added indication that 1038419 affects debian-installer and installation-reports

-- 
1038419: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038419
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Re: Bug#1038419: installation-reports: [arm64] Installation hangs on "Configuring grub-efi-arm64 (arm64)"

2023-06-25 Thread Cyril Brulebois
Control: reassign -1 src:linux 6.1.27-1
Control: affects -1 debian-installer installation-reports

Hi Joel,

Joel May  (2023-06-25):
> This bug was fixed in kernel version 6.1.33 by commit
> e8631d84c01ece34670af0d300a6f88d86d12f70.  I compiled from source and
> confirm that the problem is indeed fixed in 6.1.33.
> 
> The root of the problem is that the "family" in the SMBIOS is "Lenovo
> ThinkSystem HR330A/HR350A" not "eMAG", so a workaround broken
> SetVirtualAddressMap() is not applied.

Oh wow, thanks for tracking this down.

> I now see that this bug applies to more than installer, that just
> happened to be where I first was blocked by it.  I'm not sure if I
> can/should reclassify this bug report to the kernel package.

Let's reassign so that it can be documented as fixed in a further
upload, to be included into stable via a point release, at which point
the installer will be rebuilt against it… while leaving some pointers
for others to find.


Cheers,
-- 
Cyril Brulebois (k...@debian.org)
D-I release manager -- Release team member -- Freelance Consultant


signature.asc
Description: PGP signature


Bug#1039100: linux-image-6.1.0-9-amd64: NVMe SSD drive not detected after rebooting Debian 12

2023-06-25 Thread Lukasz Kusior
Package: src:linux
Version: 6.1.27-1
Severity: normal
X-Debbugs-Cc: kusior.luk...@gmail.com

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation? When powering on the laptop everything works 
well, although when rebooting from Debian 12, the UEFI does not detect the NVMe 
drive. Powering laptop off and back on solves the problem.
   * What exactly did you do (or not do) that was effective (or
 ineffective)? While searchinng through the internet I have found it is a 
kernel issue to do with NVMe power saving. There are work-arounds but it must 
be a bug in the kernel as everything works fine with old-stable Debian 11
   * What was the outcome of this action? Don't have skills to fix it, but I 
suppose it could be fixed with next kernel update
   * What outcome did you expect instead?

*** End of the template - remove these template lines ***


-- Package-specific info:
** Version:
Linux version 6.1.0-9-amd64 (debian-kernel@lists.debian.org) (gcc-12 (Debian 
12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40) #1 SMP 
PREEMPT_DYNAMIC Debian 6.1.27-1 (2023-05-08)

** Command line:
BOOT_IMAGE=/boot/vmlinuz-6.1.0-9-amd64 
root=UUID=2ae8dcf9-f2e5-4eea-a9a4-2541930d30f2 ro quiet

** Not tainted

** Kernel log:
[4.848950] NET: Registered PF_BLUETOOTH protocol family
[4.848951] Bluetooth: HCI device and connection manager initialized
[4.848957] Bluetooth: HCI socket layer initialized
[4.848960] Bluetooth: L2CAP socket layer initialized
[4.848965] Bluetooth: SCO socket layer initialized
[4.869866] SVM: TSC scaling supported
[4.869871] kvm: Nested Virtualization enabled
[4.869872] SVM: kvm: Nested Paging enabled
[4.869874] SEV supported: 16 ASIDs
[4.869876] SEV-ES supported: 4294967295 ASIDs
[4.869890] SVM: Virtual VMLOAD VMSAVE supported
[4.869891] SVM: Virtual GIF supported
[4.869892] SVM: LBR virtualization supported
[4.886712] MCE: In-kernel MCE decoding enabled.
[4.894585] iwlwifi :04:00.0: base HW address: 08:71:90:c2:6c:2b, OTP 
minor version: 0x4
[4.903249] intel_rapl_common: Found RAPL domain package
[4.903254] intel_rapl_common: Found RAPL domain core
[4.964106] ieee80211 phy0: Selected rate control algorithm 'iwl-mvm-rs'
[4.967502] iwlwifi :04:00.0 wlp4s0: renamed from wlan0
[5.005123] usbcore: registered new interface driver btusb
[5.009854] Bluetooth: hci0: Bootloader revision 0.1 build 42 week 52 2015
[5.013876] Bluetooth: hci0: Device revision is 2
[5.013884] Bluetooth: hci0: Secure boot is enabled
[5.013887] Bluetooth: hci0: OTP lock is enabled
[5.013888] Bluetooth: hci0: API lock is enabled
[5.013890] Bluetooth: hci0: Debug lock is disabled
[5.013892] Bluetooth: hci0: Minimum firmware build 1 week 10 2014
[5.015856] bluetooth hci0: firmware: direct-loading firmware 
intel/ibt-18-16-1.sfi
[5.015872] Bluetooth: hci0: Found device firmware: intel/ibt-18-16-1.sfi
[5.015926] Bluetooth: hci0: Boot Address: 0x40800
[5.015929] Bluetooth: hci0: Firmware Version: 108-45.22
[5.088122] EXT4-fs (nvme0n1p6): mounted filesystem with ordered data mode. 
Quota mode: none.
[5.216371] audit: type=1400 audit(1687709109.810:4): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="libreoffice-senddoc" 
pid=690 comm="apparmor_parser"
[5.216382] audit: type=1400 audit(1687709109.810:5): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="libreoffice-oosplash" 
pid=689 comm="apparmor_parser"
[5.217189] audit: type=1400 audit(1687709109.810:6): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="lsb_release" pid=684 
comm="apparmor_parser"
[5.217484] audit: type=1400 audit(1687709109.810:7): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=685 
comm="apparmor_parser"
[5.217490] audit: type=1400 audit(1687709109.810:8): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" 
pid=685 comm="apparmor_parser"
[5.217662] audit: type=1400 audit(1687709109.810:9): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=688 
comm="apparmor_parser"
[5.217668] audit: type=1400 audit(1687709109.810:10): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="man_filter" pid=688 
comm="apparmor_parser"
[5.286656] kauditd_printk_skb: 10 callbacks suppressed
[5.286659] audit: type=1400 audit(1687709109.882:21): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="/usr/bin/evince" pid=687 
comm="apparmor_parser"
[5.286665] audit: type=1400 audit(1687709109.882:22): apparmor="STATUS" 
operation="profile_load" profile="unconfined" 
name="/usr/bin/evince//sanitized_helper" pid=687 comm="apparmor_parser"
[5.286669] audit: type=1400 audit(1687709109.882:23): apparmor="STATUS" 

Bug#1039092: linux: Braille keyboards broken with Linux 6.3 with disabled TIOCSTI

2023-06-25 Thread Samuel Thibault
Source: linux
Version: 6.3.7-1
Severity: important
Tags: a11y upstream
Forwarded: https://lkml.org/lkml/2022/12/27/719

Hello,

This is an upstream issue, but I am reporting it here so it gets
documented.

With version 6.3, Linux disabled TIOCSTI by default, for security
reasons. This basically broke Braille keyboards: brltty needs that
interface to properly simulate keypresses. I had proposed upstream on
https://lkml.org/lkml/2022/12/27/719 some solutions, without any answer.
Now that we actually have a regression and people start complaining
on debian-accessibility, perhaps they'll listen? We really need to do
something about it, anyway.

A workaround is to set dev.tty.legacy_tiocsti=1 in /etc/sysctl.conf, but
that basically re-exposes the security issues.

Samuel

-- System Information:
Debian Release: trixie/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable-debug'), (500, 
'testing-debug'), (500, 'stable-security'), (500, 'stable-debug'), (500, 
'oldstable-proposed-updates-debug'), (500, 'oldstable-proposed-updates'), (500, 
'oldoldstable-proposed-updates'), (500, 'oldoldstable'), (500, 
'buildd-unstable'), (500, 'unstable'), (500, 'stable'), (500, 'oldstable'), (1, 
'experimental-debug'), (1, 'buildd-experimental'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386, arm64

Kernel: Linux 6.3.0 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

-- 
Samuel
---
Pour une évaluation indépendante, transparente et rigoureuse !
Je soutiens la Commission d'Évaluation de l'Inria.



Bug#992131: R8169 CRASH! (rtl_rxtx_empty_cond == 0 (loop: 42, delay: 100))

2023-06-25 Thread Vincas Dargis

This is probably relevant upstream bug report:

https://bugzilla.kernel.org/show_bug.cgi?id=209839



firmware-nonfree_20230515-1_source.changes ACCEPTED into unstable

2023-06-25 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 25 Jun 2023 09:03:51 +0200
Source: firmware-nonfree
Architecture: source
Version: 20230515-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 firmware-nonfree (20230515-1) unstable; urgency=medium
 .
   * New upstream version:
 - atheros: ath10k: QCA4019 hw1.0: update board-2.bin
 - atheros: ath10k: QCA6174 hw3.0: update board-2.bin
 - atheros: ath10k: QCA9888 hw2.0: update board-2.bin
 - atheros: ath10k: QCA9984 hw1.0: update board-2.bin
 - atheros: ath10k: QCA99X0 hw2.0: update board-2.bin
 - atheros: ath11k: IPQ6018 hw1.0: update board-2.bin
 - atheros: ath11k: IPQ6018 hw1.0: update to
   WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
 - atheros: ath11k: IPQ8074 hw2.0: update board-2.bin
 - atheros: ath11k: IPQ8074 hw2.0: update to
   WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
 - atheros: ath11k: QCN9074 hw1.0: update to
   WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
 - atheros: ath11k: WCN6750 hw1.0: update to
   WLAN.MSL.1.0.1-01160-QCAMSLSWPLZ-1
 - atheros: ath11k: WCN6855 hw2.0: update board-2.bin
 - realtek: rtw89: 8852c: update fw to v0.27.56.13
 - realtek: rtw89: 8852b: update format-1 fw to v0.29.29.1
 - misc-nonfree: linux-firmware: update qat firmware
 - misc-nonfree: linux-firmware: update firmware for mediatek bluetooth chip
   (MT7921)
 - misc-nonfree: linux-firmware: update firmware for MT7921 WiFi device
 - misc-nonfree: mt76xx: Move the old Mediatek WiFi firmware to mediatek
 - atheros: qca: Update firmware files for BT chip WCN6750
 - iwlwifi: linux-firmware: Update firmware file for Intel Bluetooth AX210
 - iwlwifi: linux-firmware: Update firmware file for Intel Bluetooth AX211
 - iwlwifi: linux-firmware: Update firmware file for Intel Bluetooth AX203
 - iwlwifi: linux-firmware: Update firmware file for Intel Bluetooth AX201
 - iwlwifi: linux-firmware: Update firmware file for Intel Bluetooth AX200
 - realtek: rtl_nic: update firmware of USB devices
 - realtek: rtl_bt: Update RTL8761B BT UART firmware to 0x9DC6_D922
 - realtek: rtl_bt: Update RTL8761B BT USB firmware to 0xDFC6_D922
 - realtek: rtl_bt: Update RTL8852B BT USB firmware to 0xDBC6_B20F
 - amd-graphics: amdgpu: update DCN 3.1.6 DMCUB firmware
 - misc-nonfree: linux-firmware: update firmware for MT7922 WiFi device
 - misc-nonfree: linux-firmware: update firmware for mediatek bluetooth chip
   (MT7922)
 .
   [ Salvatore Bonaccorso ]
   * realtek: rtl_bt: Add firmware and config files for RTL8851B
Checksums-Sha1:
 55f85182ebd31883b95fa496f4706c9ba8f202ef 4276 firmware-nonfree_20230515-1.dsc
 589fad415b21d6f9f74a8af649b33f7ac10e865f 230910820 
firmware-nonfree_20230515.orig.tar.xz
 b84c1376f3d39d74138d13c8a1cf4da74d966aad 828672 
firmware-nonfree_20230515-1.debian.tar.xz
 b413ff006b3e388d32f9ece47f5d3d4ffd406a80 6097 
firmware-nonfree_20230515-1_source.buildinfo
Checksums-Sha256:
 2840c8be1e8d087aec4e60693fe965422cff351f287530c9dbf620db7a5db4e6 4276 
firmware-nonfree_20230515-1.dsc
 67ccc7fef1f9ec4ea80c89fa33bc58186c80556126136779c91f04835cb2f7bd 230910820 
firmware-nonfree_20230515.orig.tar.xz
 5eeb0aa58c09a642c030e6b6c06b76451aac932619219bd821caf28823ae93c4 828672 
firmware-nonfree_20230515-1.debian.tar.xz
 e61221f355bed874c7d43d57b131bd1df240dc34bae4b9927c90b12847c83195 6097 
firmware-nonfree_20230515-1_source.buildinfo
Files:
 768bcb8132f982e03fba5c7ed7c278e4 4276 non-free-firmware/kernel optional 
firmware-nonfree_20230515-1.dsc
 a7a49494dcbfc7f830d809aeec3340c4 230910820 non-free-firmware/kernel optional 
firmware-nonfree_20230515.orig.tar.xz
 3fa7f66927bf4c14df8440a7f18fd37d 828672 non-free-firmware/kernel optional 
firmware-nonfree_20230515-1.debian.tar.xz
 02278ffe843a1328c2cdefff8165febc 6097 non-free-firmware/kernel optional 
firmware-nonfree_20230515-1_source.buildinfo

-BEGIN PGP SIGNATURE-

iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmSX5xhfFIAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
ZWJpYW4ub3JnAAoJEAVMuPMTQ89EE2EQAJPr4jtf57x9T4MIpPIfz+itiXykg2p2
ePqYRmShoCUmvsgCJ9kb+ycHslAfWZM6GD84GzceQniic5KC2LAjDgO748oNd401
R7Zbh5lKebEVlDTwV2Etc6bgwTQi5Dg3MqhveBI2ckRyEyukInace/gJZGGEK1F7
a7cXXmFjlck/8HG/PrITj8ywzrUXWkeS96VzyFkB35PtevRcgL/9j5mgTLbcayun
3DULorXuyz9nBv/HaIgOKkZpAVo64JoySiQz5ZmQIqtd31fO1DNXIDIixLH/uR9h
+O3tmhTeVS89CYzHDYv/Lxoqhz4GEkR1Ifu23pRGAX5MQ+pCdR/9TA+S300sQvFd
xSPr86JTaHSO0r1TlXVgn9Ybro4QzZbIHoINHr9HpxfuaFw8myqZeR8ZfDqbZCVZ
92t10F69bo4EFJE0GhNFZOFlmhPCxk4HArTi6Jmf2kiFn9N/h0bwq5KGnh4JMGF3
IbsaVbYThlfUEwQD+g5AIUJ4a2YkK9FtPQn/Ynmn9LMhAQvRFbsedI+10a4ZO+77
vO3iH8GJE8dc7MvQpCShWf6Ys/3FpM+qGM/LudFk7579QVU53N0glQF6zo64aZgs

Processing of firmware-nonfree_20230515-1_source.changes

2023-06-25 Thread Debian FTP Masters
firmware-nonfree_20230515-1_source.changes uploaded successfully to localhost
along with the files:
  firmware-nonfree_20230515-1.dsc
  firmware-nonfree_20230515.orig.tar.xz
  firmware-nonfree_20230515-1.debian.tar.xz
  firmware-nonfree_20230515-1_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)