Processed: severity of 1041437 is important

2023-09-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 1041437 important
Bug #1041437 [src:linux] [debian bookworm] [kernel 6.1.0-9-rt-armmp] Kernel 
panic - not syncing: Attempted to kill init! exitcode=0x000b
Severity set to 'important' from 'serious'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1041437: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041437
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: bug 1051088 is forwarded to https://lore.kernel.org/linux-nfs/20230904085047.1053192-1-ja...@youngman.org/ ...

2023-09-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> forwarded 1051088 
> https://lore.kernel.org/linux-nfs/20230904085047.1053192-1-ja...@youngman.org/
Bug #1051088 [nfs-common] nfs-common: Spurious additional words left behind in 
EXAMPLES section of nfs(5).
Set Bug forwarded-to-address to 
'https://lore.kernel.org/linux-nfs/20230904085047.1053192-1-ja...@youngman.org/'.
> tags 1051088 + upstream
Bug #1051088 [nfs-common] nfs-common: Spurious additional words left behind in 
EXAMPLES section of nfs(5).
Ignoring request to alter tags of bug #1051088 to the same tags previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1051088: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051088
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1051249: linux: s390x: FTBFS: kernel-wedge install-files: missing modules mptfc, mptsas and mptspi

2023-09-04 Thread Salvatore Bonaccorso
Source: linux
Version: 6.5~rc4-1~exp1
Severity: serious
Tags: ftbfs
Justification: FTBFS
X-Debbugs-Cc: car...@debian.org

linux/6.5~rc4-1~exp1 onwards in experimental FTBFS for s390x:

https://buildd.debian.org/status/fetch.php?pkg=linux=s390x=6.5%7Erc4-1%7Eexp1=1691173177=0

Regards,
Salvatore



linux-signed-i386_6.5.1+1~exp1_source.changes ACCEPTED into experimental

2023-09-04 Thread Debian FTP Masters
Thank you for your contribution to Debian.

Mapping rc-buggy to experimental.

Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 03 Sep 2023 13:04:38 +0200
Source: linux-signed-i386
Architecture: source
Version: 6.5.1+1~exp1
Distribution: rc-buggy
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux-signed-i386 (6.5.1+1~exp1) experimental; urgency=medium
 .
   * Sign kernel from linux 6.5.1-1~exp1
 .
   * New upstream release: https://kernelnewbies.org/Linux_6.5
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.1
 .
   [ Diederik de Haas ]
   * [rt] Update to 6.5-rc7-rt4
   * [rt] Update to 6.5-rt6
 .
   [ Salvatore Bonaccorso ]
   * [rt] Update to 6.5-rt5
 .
   [ Aurelien Jarno ]
   * [riscv64] enable cpufreq support for Starfive JH7110: enable CPUFREQ_DT,
 MFD_AXP20X_I2C and REGULATOR_AXP20X as modules, and CPUFREQ_DT_PLATDEV as
 built-in.
   * [armel/rpi,armhf,arm64] enable CPUFREQ_DT_PLATDEV as built-in, as it does
 not get autoloaded as a module (Closes: #1050587)
 .
   [ Bastian Blank ]
   * Use pytest to test some of the code.
   * Re-add /usr/include/drm and /usr/include/scsi to linux-libc-dev; they
 don't longer conflict with other packages. (closes: #1050368)
   * Properly split host and build flags. (closes: #1050991)
 .
   [ Miguel Bernal Marin ]
   * [x86] drivers/hwtracing/intel_th: Enable INTEL_TH_ACPI Intel Trace Hub
 ACPI controller as module (Closes: #1050342)
   * [amd64] arch/x86/ras: Enable RAS_CEC (Correctable Errors Collector)
 (Closes: #1050940)
 .
   [ Antonio Terceiro ]
   * [arm64] sound/pci: Enable SND_CMIPCI as a module
Checksums-Sha1:
 1b2c7e23d2e76958b50b1f5891a70ec5a3310660 13848 
linux-signed-i386_6.5.1+1~exp1.dsc
 140468b9ff981c7eead14090d68d2e7630d3fa9b 3943576 
linux-signed-i386_6.5.1+1~exp1.tar.xz
Checksums-Sha256:
 5fc2e7343f5f31ddd5098885b38c7a489a5bc5cfe221ebc4c07f04cd1bd95f5e 13848 
linux-signed-i386_6.5.1+1~exp1.dsc
 32527d1c2d33c5493f4061c0f15adb7504c0f6051b84b31b16daf383469d8f0d 3943576 
linux-signed-i386_6.5.1+1~exp1.tar.xz
Files:
 22c4a68e204b51ac5801fecd9fb14c2f 13848 kernel optional 
linux-signed-i386_6.5.1+1~exp1.dsc
 dc94f7d61c2680c513dddf9bdde57119 3943576 kernel optional 
linux-signed-i386_6.5.1+1~exp1.tar.xz

-BEGIN PGP SIGNATURE-
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=H+Iw
-END PGP SIGNATURE-



Processing of linux-signed-i386_6.5.1+1~exp1_source.changes

2023-09-04 Thread Debian FTP Masters
linux-signed-i386_6.5.1+1~exp1_source.changes uploaded successfully to localhost
along with the files:
  linux-signed-i386_6.5.1+1~exp1.dsc
  linux-signed-i386_6.5.1+1~exp1.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



linux-signed-arm64_6.5.1+1~exp1_source.changes ACCEPTED into experimental

2023-09-04 Thread Debian FTP Masters
Thank you for your contribution to Debian.

Mapping rc-buggy to experimental.

Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 03 Sep 2023 13:04:38 +0200
Source: linux-signed-arm64
Architecture: source
Version: 6.5.1+1~exp1
Distribution: rc-buggy
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux-signed-arm64 (6.5.1+1~exp1) experimental; urgency=medium
 .
   * Sign kernel from linux 6.5.1-1~exp1
 .
   * New upstream release: https://kernelnewbies.org/Linux_6.5
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.1
 .
   [ Diederik de Haas ]
   * [rt] Update to 6.5-rc7-rt4
   * [rt] Update to 6.5-rt6
 .
   [ Salvatore Bonaccorso ]
   * [rt] Update to 6.5-rt5
 .
   [ Aurelien Jarno ]
   * [riscv64] enable cpufreq support for Starfive JH7110: enable CPUFREQ_DT,
 MFD_AXP20X_I2C and REGULATOR_AXP20X as modules, and CPUFREQ_DT_PLATDEV as
 built-in.
   * [armel/rpi,armhf,arm64] enable CPUFREQ_DT_PLATDEV as built-in, as it does
 not get autoloaded as a module (Closes: #1050587)
 .
   [ Bastian Blank ]
   * Use pytest to test some of the code.
   * Re-add /usr/include/drm and /usr/include/scsi to linux-libc-dev; they
 don't longer conflict with other packages. (closes: #1050368)
   * Properly split host and build flags. (closes: #1050991)
 .
   [ Miguel Bernal Marin ]
   * [x86] drivers/hwtracing/intel_th: Enable INTEL_TH_ACPI Intel Trace Hub
 ACPI controller as module (Closes: #1050342)
   * [amd64] arch/x86/ras: Enable RAS_CEC (Correctable Errors Collector)
 (Closes: #1050940)
 .
   [ Antonio Terceiro ]
   * [arm64] sound/pci: Enable SND_CMIPCI as a module
Checksums-Sha1:
 5bd97bdd5020faaeaa10c06cc187c8d83056a663 7391 
linux-signed-arm64_6.5.1+1~exp1.dsc
 13b645337fae93ec00eae7be81f515982d1c91e4 2867096 
linux-signed-arm64_6.5.1+1~exp1.tar.xz
Checksums-Sha256:
 37a1b16a0bd413f4fd7567447264abee02b1dc393d4ac62f563a9826e4885f5d 7391 
linux-signed-arm64_6.5.1+1~exp1.dsc
 a8136f9656a733753796497369a070a82e509a543a60805135b2fa715d225e1b 2867096 
linux-signed-arm64_6.5.1+1~exp1.tar.xz
Files:
 1114b227473cae635213d8f9ad6f320f 7391 kernel optional 
linux-signed-arm64_6.5.1+1~exp1.dsc
 8d197a4b001454496f12b3cc0d09588d 2867096 kernel optional 
linux-signed-arm64_6.5.1+1~exp1.tar.xz

-BEGIN PGP SIGNATURE-
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=FtlK
-END PGP SIGNATURE-



Processing of linux-signed-arm64_6.5.1+1~exp1_source.changes

2023-09-04 Thread Debian FTP Masters
linux-signed-arm64_6.5.1+1~exp1_source.changes uploaded successfully to 
localhost
along with the files:
  linux-signed-arm64_6.5.1+1~exp1.dsc
  linux-signed-arm64_6.5.1+1~exp1.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



linux-signed-amd64_6.5.1+1~exp1_source.changes ACCEPTED into experimental

2023-09-04 Thread Debian FTP Masters
Thank you for your contribution to Debian.

Mapping rc-buggy to experimental.

Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 03 Sep 2023 13:04:38 +0200
Source: linux-signed-amd64
Architecture: source
Version: 6.5.1+1~exp1
Distribution: rc-buggy
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux-signed-amd64 (6.5.1+1~exp1) experimental; urgency=medium
 .
   * Sign kernel from linux 6.5.1-1~exp1
 .
   * New upstream release: https://kernelnewbies.org/Linux_6.5
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.1
 .
   [ Diederik de Haas ]
   * [rt] Update to 6.5-rc7-rt4
   * [rt] Update to 6.5-rt6
 .
   [ Salvatore Bonaccorso ]
   * [rt] Update to 6.5-rt5
 .
   [ Aurelien Jarno ]
   * [riscv64] enable cpufreq support for Starfive JH7110: enable CPUFREQ_DT,
 MFD_AXP20X_I2C and REGULATOR_AXP20X as modules, and CPUFREQ_DT_PLATDEV as
 built-in.
   * [armel/rpi,armhf,arm64] enable CPUFREQ_DT_PLATDEV as built-in, as it does
 not get autoloaded as a module (Closes: #1050587)
 .
   [ Bastian Blank ]
   * Use pytest to test some of the code.
   * Re-add /usr/include/drm and /usr/include/scsi to linux-libc-dev; they
 don't longer conflict with other packages. (closes: #1050368)
   * Properly split host and build flags. (closes: #1050991)
 .
   [ Miguel Bernal Marin ]
   * [x86] drivers/hwtracing/intel_th: Enable INTEL_TH_ACPI Intel Trace Hub
 ACPI controller as module (Closes: #1050342)
   * [amd64] arch/x86/ras: Enable RAS_CEC (Correctable Errors Collector)
 (Closes: #1050940)
 .
   [ Antonio Terceiro ]
   * [arm64] sound/pci: Enable SND_CMIPCI as a module
Checksums-Sha1:
 c52dee39fddb3dcf06deb73529b079e6667c 8399 
linux-signed-amd64_6.5.1+1~exp1.dsc
 f5dc68f088c1fa6ea25af6f95f551aa31f446be6 3045524 
linux-signed-amd64_6.5.1+1~exp1.tar.xz
Checksums-Sha256:
 e3fa9fdbd7f6d6329b4b224c90a65732ab0b21558bf1ff7eada88334d9441379 8399 
linux-signed-amd64_6.5.1+1~exp1.dsc
 172cdb49a16c400ca277294d74d726c8dadb5f75a78fa7202dc88341dd70b6be 3045524 
linux-signed-amd64_6.5.1+1~exp1.tar.xz
Files:
 490daacfb5da2b4eea6d4ac5d89c9a6f 8399 kernel optional 
linux-signed-amd64_6.5.1+1~exp1.dsc
 aad1c4be637e3f387a9bc794bb267705 3045524 kernel optional 
linux-signed-amd64_6.5.1+1~exp1.tar.xz

-BEGIN PGP SIGNATURE-
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=wks2
-END PGP SIGNATURE-



Processing of linux-signed-amd64_6.5.1+1~exp1_source.changes

2023-09-04 Thread Debian FTP Masters
linux-signed-amd64_6.5.1+1~exp1_source.changes uploaded successfully to 
localhost
along with the files:
  linux-signed-amd64_6.5.1+1~exp1.dsc
  linux-signed-amd64_6.5.1+1~exp1.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#1051208: marked as done (linux-headers-amd64 6.1.27-1~bpo11+1 depends on a package that is not in the repos)

2023-09-04 Thread Debian Bug Tracking System
Your message dated Mon, 04 Sep 2023 21:03:24 +0200
with message-id <06eaa15988c246bfff8f18e6d45648af37834825.ca...@decadent.org.uk>
and subject line Re: Bug#1051208: linux-headers-amd64 6.1.27-1~bpo11+1 depends 
on a package that is not in the repos
has caused the Debian Bug report #1051208,
regarding linux-headers-amd64 6.1.27-1~bpo11+1 depends on a package that is not 
in the repos
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051208: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051208
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: linux-headers-amd64
Version: 6.1.27-1~bpo11+1
Severity: important

Dear Maintainer,

When installing linux-headers-amd64 from the Backports repo, it depends
on the linux-headers-6.1.0-0.deb11.9-amd64 (= 6.1.27-1~bpo11+1) package,
which is not found in the mirrors, thus fails. 

Please update the linux-headers-amd64 package in the backports
repository to depend on other kenel, or upload the kernel headers
package to the mirrors (the linux-image package for that version is
available, just the headers are missing).


-- System Information:
Debian Release: 11.7
  APT prefers oldstable-updates
  APT policy: (500, 'oldstable-updates'), (500, 'oldstable-security'), (500, 
'oldstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.2.16-3-pve (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages linux-headers-amd64 depends on:
pn  linux-headers-5.10.0-22-amd64
pn  linux-headers-5.10.0-25-amd64
pn  linux-headers-6.1.0-0.deb11.9-amd64  

linux-headers-amd64 recommends no packages.

linux-headers-amd64 suggests no packages.
--- End Message ---
--- Begin Message ---
Version: 6.1.38-4~bpo11+1

This is already (automatically) fixed but the new version is waiting
for backports admins to approve it.

Ben.

-- 
Ben Hutchings
Always try to do things in chronological order;
it's less confusing that way.



signature.asc
Description: This is a digitally signed message part
--- End Message ---


Bug#1042543: Known upstream regression in 6.4: audio distortion on ThinkPad X1 Gen 11

2023-09-04 Thread David Heidelberg
Patch is included in recent stable release, available in unstable. Until 
it gets into testing, this should help:


 $ apt install -t unstable linux-image-amd64

I assume the bug can be closed.

David

On 18/08/2023 04:42, David wrote:

Version: 6.4.4-3

Hello,

1. the bug is still present

2. Dell XPS 9310 is also affected.

It's still not included in stable series, but got merged into for-next 
branch already [1].


Please apply.

Thank you

David

[1] https://www.spinics.net/lists/alsa-devel/msg163701.html

On Sat, 29 Jul 2023 19:58:50 -0700 Josh Triplett 
 wrote:

> Package: src:linux
> Version: 6.4.4-1
> Severity: important
> Tags: upstream
> X-Debbugs-Cc: j...@joshtriplett.org
>
> See https://github.com/thesofproject/linux/issues/4482 and
> https://bugzilla.kernel.org/show_bug.cgi?id=217673 for the bug, and
> https://github.com/thesofproject/linux/pull/4484 for the fix.
>
> I can confirm that 6.4 has intermittent audio distortion on my system,
> and 6.3 does not.
>
> Please consider applying the fix.


--
David Heidelberg
Certified Linux Magician



[bts-link] source package src:linux

2023-09-04 Thread debian-bts-link
#
# bts-link upstream status pull for source package src:linux
# see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
# https://bts-link-team.pages.debian.net/bts-link/
#

user debian-bts-l...@lists.debian.org

# remote status report for #1050602 (http://bugs.debian.org/1050602)
# Bug title: linux: kernel 6.4.11-1 does not recognize TPM on lenovo 14IAU7 
(Flex 7i)
#  * http://bugzilla.kernel.org/show_bug.cgi?id=217804
#  * remote status changed: (?) -> NEW
usertags 1050602 + status-NEW

thanks



Bug#1025537: marked as done (nfsd: Kernel Oops while serving NFS)

2023-09-04 Thread Debian Bug Tracking System
Your message dated Mon, 4 Sep 2023 19:02:53 +0200
with message-id 
and subject line Re: Bug#1025537: nfsd: Kernel Oops while serving NFS
has caused the Debian Bug report #1025537,
regarding nfsd: Kernel Oops while serving NFS
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1025537: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025537
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:linux
Version: 6.0.10-1
Severity: important
File: nfsd

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?

On testing/bookworm, since booting on a 6-versioned linux-image, I have 
noticed frequent hang ups of the nfs server, rendering it mostly 
unusable. This is accompanied with Kernel Oops in the dmesg.

This sounds similar to previous bugs #1014793 and #1020548, both RESOLVED by
later patches.

   * What exactly did you do (or not do) that was effective (or
 ineffective)?

Upgrade from a 5.19 series kernel to a 6-series

   * What was the outcome of this action?

The issue started happening.

Nov 22 19:08:04 hostname kernel: [0.00] Linux version 5.19.0-2-amd64 
(debian-kernel@lists.debian.org) (gcc-11 (Debian 11.3.0-6) 11.3.0, GNU ld (GNU 
Binutils for Debian) 2.38.90.20220713) #1 SMP PREEMPT_DYNAMIC Debian 5.19.11-1 
(2022-09-24)
2022-11-24T11:09:43.398458+11:00 hostname kernel: [0.00] Linux version 
6.0.0-4-amd64 (debian-kernel@lists.debian.org) (gcc-12 (Debian 12.2.0-9) 
12.2.0, GNU ld (GNU Binutils for Debian) 2.39) #1 SMP PREEMPT_DYNAMIC Debian 
6.0.8-1 (2022-11-11)
2022-11-24T22:09:32.716084+11:00 hostname kernel: [0.00] Linux version 
6.0.0-4-amd64 (debian-kernel@lists.debian.org) (gcc-12 (Debian 12.2.0-9) 
12.2.0, GNU ld (GNU Binutils for Debian) 2.39) #1 SMP PREEMPT_DYNAMIC Debian 
6.0.8-1 (2022-11-11)
2022-11-24T22:14:29.941494+11:00 hostname kernel: [  346.670278] Oops:  
[#4] PREEMPT SMP NOPTI
2022-11-24T22:14:30.124617+11:00 hostname kernel: [  346.853344] Oops:  
[#6] PREEMPT SMP NOPTI
2022-11-24T22:14:30.216160+11:00 hostname kernel: [  346.943972] Oops:  
[#7] PREEMPT SMP NOPTI
2022-11-24T22:14:30.306235+11:00 hostname kernel: [  347.034549] Oops:  
[#8] PREEMPT SMP NOPTI
2022-11-25T22:23:26.062768+11:00 hostname kernel: [87286.216732] Oops: 0002 
[#9] PREEMPT SMP NOPTI
2022-11-25T22:33:29.075088+11:00 hostname kernel: [0.00] Linux version 
6.0.0-4-amd64 (debian-kernel@lists.debian.org) (gcc-12 (Debian 12.2.0-9) 
12.2.0, GNU ld (GNU Binutils for Debian) 2.39) #1 SMP PREEMPT_DYNAMIC Debian 
6.0.8-1 (2022-11-11)
2022-11-25T22:41:20.923037+11:00 hostname kernel: [  520.000568] Oops:  
[#2] PREEMPT SMP NOPTI
2022-11-26T10:52:02.907042+11:00 hostname kernel: [0.00] Linux version 
6.0.0-4-amd64 (debian-kernel@lists.debian.org) (gcc-12 (Debian 12.2.0-9) 
12.2.0, GNU ld (GNU Binutils for Debian) 2.39) #1 SMP PREEMPT_DYNAMIC Debian 
6.0.8-1 (2022-11-11)
2022-11-26T23:33:41.683961+11:00 hostname kernel: [0.00] Linux version 
6.0.0-4-amd64 (debian-kernel@lists.debian.org) (gcc-12 (Debian 12.2.0-9) 
12.2.0, GNU ld (GNU Binutils for Debian) 2.39) #1 SMP PREEMPT_DYNAMIC Debian 
6.0.8-1 (2022-11-11)

   * What outcome did you expect instead?

NFS would still be accessible as before (:

*** End of the template - remove these template lines ***


-- Package-specific info:
** Version:
Linux version 6.0.0-5-amd64 (debian-kernel@lists.debian.org) (gcc-12 (Debian 
12.2.0-9) 12.2.0, GNU ld (GNU Binutils for Debian) 2.39) #1 SMP PREEMPT_DYNAMIC 
Debian 6.0.10-1 (2022-11-26)

** Command line:
BOOT_IMAGE=/boot/vmlinuz-6.0.0-5-amd64 
root=UUID=0c917590-acc7-464c-8961-64f79e1d1c69 ro init=/lib/systemd/systemd 
init=/lib/systemd/systemd

** Tainted: D (128)
 * kernel died recently, i.e. there was an OOPS or BUG

** Kernel log:
[  433.757651] Hardware name: HP ProLiant MicroServer, BIOS O41 10/01/2013
[  433.757702] RIP: 0010:release_pages+0xcd/0x500
[  433.757761] Code: 84 c0 74 1a 48 8b 04 24 48 8d 54 24 30 49 89 46 08 48 89 
44 24 30 4c 89 75 08 48 89 55 10 49 83 c7 08 4c 39 fb 74 75 49 8b 2f <48> 8b 45 
08 a8 01 0f 85 58 01 00 00 0f 1f 44 00 00 4d 85 ed 74 0e
[  433.757831] RSP: 0018:aea000e83e30 EFLAGS: 00010202
[  433.757884] RAX: 0007 RBX: 8e89a49fcb48 RCX: e5664199de48
[  433.757935] RDX: aea000e83e60 RSI: aea000e83e60 RDI: e5664199de48
[  433.757985] RBP: 000fc000 R08: e56641998e08 R09: 006a
[  433.758035] R10: 3890 R11:  R12: 
[  

Bug#1051208: linux-headers-amd64 6.1.27-1~bpo11+1 depends on a package that is not in the repos

2023-09-04 Thread Jonas
Package: linux-headers-amd64
Version: 6.1.27-1~bpo11+1
Severity: important

Dear Maintainer,

When installing linux-headers-amd64 from the Backports repo, it depends
on the linux-headers-6.1.0-0.deb11.9-amd64 (= 6.1.27-1~bpo11+1) package,
which is not found in the mirrors, thus fails. 

Please update the linux-headers-amd64 package in the backports
repository to depend on other kenel, or upload the kernel headers
package to the mirrors (the linux-image package for that version is
available, just the headers are missing).


-- System Information:
Debian Release: 11.7
  APT prefers oldstable-updates
  APT policy: (500, 'oldstable-updates'), (500, 'oldstable-security'), (500, 
'oldstable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.2.16-3-pve (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages linux-headers-amd64 depends on:
pn  linux-headers-5.10.0-22-amd64
pn  linux-headers-5.10.0-25-amd64
pn  linux-headers-6.1.0-0.deb11.9-amd64  

linux-headers-amd64 recommends no packages.

linux-headers-amd64 suggests no packages.



Bug#1025537: nfsd: Kernel Oops while serving NFS

2023-09-04 Thread Olivier Mehani
Package: src:linux
Followup-For: Bug #1025537

Dear Maintainer,

Just a heads up that, after some uptime and an utimely reboot, I am now 
on 6.4.0-3, which no longer seems to exhibit the issue from earlier 6.x 
series.

While we didn't get to the root cause, I think this bug can be 
tentatively closed.

-- Package-specific info:
** Version:
Linux version 6.4.0-3-amd64 (debian-kernel@lists.debian.org) (gcc-13 (Debian 
13.2.0-2) 13.2.0, GNU ld (GNU Binutils for Debian) 2.41) #1 SMP PREEMPT_DYNAMIC 
Debian 6.4.11-1 (2023-08-17)

** Command line:
BOOT_IMAGE=/boot/vmlinuz-6.4.0-3-amd64 
root=UUID=0c917590-acc7-464c-8961-64f79e1d1c69 ro init=/lib/systemd/systemd 
init=/lib/systemd/systemd

** Not tainted

** Kernel log:

** Model information
sys_vendor: [  513.266864] veth75b1ef3: entered allmulticast mode
[  513.278803] veth75b1ef3: entered promiscuous mode
[  513.318708] eth0: renamed from veth289468d
[  513.350910] IPv6: ADDRCONF(NETDEV_CHANGE): vethd452ab0: link becomes ready
[  513.354043] br-167ce2d5a745: port 1(vethd452ab0) entered blocking state
[  513.357003] br-167ce2d5a745: port 1(vethd452ab0) entered forwarding state
[  513.360079] IPv6: ADDRCONF(NETDEV_CHANGE): br-167ce2d5a745: link becomes 
ready
[  516.185425] br-8faf6cb95741: port 3(veth3348892) entered blocking state
[  516.189032] br-8faf6cb95741: port 3(veth3348892) entered disabled state
[  516.203888] veth3348892: entered allmulticast mode
[  516.210796] veth3348892: entered promiscuous mode
[  529.090856] eth0: renamed from vethd1244c6
[  529.111282] IPv6: ADDRCONF(NETDEV_CHANGE): veth20d9bda: link becomes ready
[  529.114664] br-410ffb6f054c: port 1(veth20d9bda) entered blocking state
[  529.117918] br-410ffb6f054c: port 1(veth20d9bda) entered forwarding state
[  529.121900] IPv6: ADDRCONF(NETDEV_CHANGE): br-410ffb6f054c: link becomes 
ready
[  550.583717] br-8faf6cb95741: port 4(vethabeb253) entered blocking state
[  550.587030] br-8faf6cb95741: port 4(vethabeb253) entered disabled state
[  550.593753] vethabeb253: entered allmulticast mode
[  550.597325] vethabeb253: entered promiscuous mode
[  566.713758] eth0: renamed from vetha110c01
[  566.736720] IPv6: ADDRCONF(NETDEV_CHANGE): veth6843607: link becomes ready
[  566.740228] br-167ce2d5a745: port 2(veth6843607) entered blocking state
[  566.743665] br-167ce2d5a745: port 2(veth6843607) entered forwarding state
[  566.982165] eth0: renamed from vethb129f19
[  567.004696] IPv6: ADDRCONF(NETDEV_CHANGE): veth7291cce: link becomes ready
[  567.008299] br-8faf6cb95741: port 1(veth7291cce) entered blocking state
[  567.011785] br-8faf6cb95741: port 1(veth7291cce) entered forwarding state
[  567.020597] IPv6: ADDRCONF(NETDEV_CHANGE): br-8faf6cb95741: link becomes 
ready
[  569.328071] eth0: renamed from veth0690f82
[  569.345031] IPv6: ADDRCONF(NETDEV_CHANGE): veth908ed4d: link becomes ready
[  569.348796] br-8fa0fed72bf0: port 2(veth908ed4d) entered blocking state
[  569.352495] br-8fa0fed72bf0: port 2(veth908ed4d) entered forwarding state
[  570.025027] eth0: renamed from veth8259256
[  570.045606] IPv6: ADDRCONF(NETDEV_CHANGE): vetha2c6a28: link becomes ready
[  570.050336] br-8fa0fed72bf0: port 3(vetha2c6a28) entered blocking state
[  570.054287] br-8fa0fed72bf0: port 3(vetha2c6a28) entered forwarding state
[  570.469070] eth0: renamed from veth452c69a
[  570.489637] IPv6: ADDRCONF(NETDEV_CHANGE): vethd58db50: link becomes ready
[  570.493575] br-410ffb6f054c: port 2(vethd58db50) entered blocking state
[  570.497349] br-410ffb6f054c: port 2(vethd58db50) entered forwarding state
[  570.841451] eth0: renamed from vethd61b822
[  570.865532] IPv6: ADDRCONF(NETDEV_CHANGE): veth3fcbeaa: link becomes ready
[  570.870006] br-8faf6cb95741: port 2(veth3fcbeaa) entered blocking state
[  570.874333] br-8faf6cb95741: port 2(veth3fcbeaa) entered forwarding state
[  572.555320] eth0: renamed from vethb7b0199
[  572.581041] IPv6: ADDRCONF(NETDEV_CHANGE): veth75b1ef3: link becomes ready
[  572.584993] br-8fa0fed72bf0: port 4(veth75b1ef3) entered blocking state
[  572.588752] br-8fa0fed72bf0: port 4(veth75b1ef3) entered forwarding state
[  575.757608] eth0: renamed from veth55404ed
[  575.777370] IPv6: ADDRCONF(NETDEV_CHANGE): veth3348892: link becomes ready
[  575.781477] br-8faf6cb95741: port 3(veth3348892) entered blocking state
[  575.785425] br-8faf6cb95741: port 3(veth3348892) entered forwarding state
[  579.384248] eth0: renamed from vethdd62334
[  579.406715] IPv6: ADDRCONF(NETDEV_CHANGE): vethabeb253: link becomes ready
[  579.411269] br-8faf6cb95741: port 4(vethabeb253) entered blocking state
[  579.415641] br-8faf6cb95741: port 4(vethabeb253) entered forwarding state
[  649.519156] kauditd_printk_skb: 8 callbacks suppressed
[  649.519163] audit: type=1400 audit(1693550398.502:20): apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/sbin/cupsd" pid=6365 comm="cupsd" 
capability=12  capname="net_admin"
[22570.680650] systemd-journald[328]: 

Bug#1051088: [PATCH] Remove extraneous words left behind by commit 522837f.

2023-09-04 Thread James Youngman
---
 utils/mount/nfs.man | 1 -
 1 file changed, 1 deletion(-)

diff --git a/utils/mount/nfs.man b/utils/mount/nfs.man
index 7a410422..c9850f29 100644
--- a/utils/mount/nfs.man
+++ b/utils/mount/nfs.man
@@ -986,7 +986,6 @@ file. See
 .BR nfsmount.conf(5)
 for details.
 .SH EXAMPLES
-mount option.
 To mount using NFS version 3,
 use the
 .B nfs
-- 
2.39.2



Bug#1051088: nfs-common: Spurious additional words left behind in EXAMPLES section of nfs(5).

2023-09-04 Thread Salvatore Bonaccorso
Control: tags -1 + upstream

On Sat, Sep 02, 2023 at 12:49:35PM +0100, James Youngman wrote:
> Package: nfs-common
> Version: 1:2.6.2-4
> Severity: minor
> Tags: patch
> 
> There is a spurious phrase "mount option" at the beginning of the
> EXAMPLES section.
> 
> This patch fixes it:

Can you please report it directly upstream at the linux-nfs list and
post it here once it reached the linux-nfs list, so we can set a
forwarded field accordingly.

Regards,
Salvatore



Processed: Re: Bug#1051088: nfs-common: Spurious additional words left behind in EXAMPLES section of nfs(5).

2023-09-04 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + upstream
Bug #1051088 [nfs-common] nfs-common: Spurious additional words left behind in 
EXAMPLES section of nfs(5).
Added tag(s) upstream.

-- 
1051088: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051088
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems