linux_6.6.4-1~exp1_source.changes ACCEPTED into experimental

2023-12-03 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sun, 03 Dec 2023 20:57:56 +0100
Source: linux
Architecture: source
Version: 6.6.4-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Bastian Blank 
Closes: 1032104 1037938
Changes:
 linux (6.6.4-1~exp1) experimental; urgency=medium
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.4
 - nvmet: nul-terminate the NQNs passed in the connect command
   (CVE-2023-6121)
 .
   [ Bastian Blank ]
   * Fix build dependency on rsync.
   * Fix build dependency on kernel-wedge.
   * udeb: Make i2c-hid modules optional.
 .
   [ Timothy Pearson ]
   * [powerpc] Don't clobber f0/vs0 during fp|altivec register save
 (Closes: #1032104)
 .
   [ Johannes Schauer Marin Rodrigues ]
   * Fix FTCBFS: Pass _PYTHON_SYSCONFIGDATA_NAME to the perf build.
 (Closes: #1037938) Thanks to Helmut Grohne for the patch.
Checksums-Sha1:
 bbef175fb0e0acdf376b47ead3e0b501b536b7ba 233463 linux_6.6.4-1~exp1.dsc
 b38f79198036fde7abf99f60ffba545b91cdf82c 142637188 linux_6.6.4.orig.tar.xz
 c9c7ff3da91737365776a70f221de0ce95b4 1558788 
linux_6.6.4-1~exp1.debian.tar.xz
 1af076e46f3dc867fca2e895233423b4839007d0 5930 
linux_6.6.4-1~exp1_source.buildinfo
Checksums-Sha256:
 b4f661d17aa7c10ed351b18fae004844a40cc8ba592f12fa6fe89f73d861846d 233463 
linux_6.6.4-1~exp1.dsc
 13cc9a0a341c415acc759d642ae43c39645d00531b44725486f077747237301f 142637188 
linux_6.6.4.orig.tar.xz
 c2a55c3f2aa20e85c4e2f4e42f0ef30e4509bb372fa49d8d9e64cd9893c7c391 1558788 
linux_6.6.4-1~exp1.debian.tar.xz
 993b2f9fca42146cb58df83feb8d22cfccb8617a96e3b6e6d07d8f375154b1bc 5930 
linux_6.6.4-1~exp1_source.buildinfo
Files:
 7d79fb0706acad7ec6db8ba7c4facd38 233463 kernel optional linux_6.6.4-1~exp1.dsc
 0203020079fe29e6618095280e7e 142637188 kernel optional 
linux_6.6.4.orig.tar.xz
 408e780433e84019f962a1380f0a1f7b 1558788 kernel optional 
linux_6.6.4-1~exp1.debian.tar.xz
 f8bf11b8f04e3e6c5751a2b62111c644 5930 kernel optional 
linux_6.6.4-1~exp1_source.buildinfo

-BEGIN PGP SIGNATURE-

iHUEARYIAB0WIQQ8pEKDNIgQDAQDOBFji0aBW7swjwUCZWzfQwAKCRBji0aBW7sw
j/hWAQDzAKGYNrjDHiGdhJnuoRH35w9VE7K5sW4m+KvbBq0qhwEAydEdh34ZpQAB
izRCFMEFyNzZY2J4b0Wup8D2z9FOaQA=
=vYsM
-END PGP SIGNATURE-



Bug#1032104: marked as done (linux: ppc64el iouring corrupted read)

2023-12-03 Thread Debian Bug Tracking System
Your message dated Sun, 03 Dec 2023 20:48:02 +
with message-id 
and subject line Bug#1032104: fixed in linux 6.6.4-1~exp1
has caused the Debian Bug report #1032104,
regarding linux: ppc64el iouring corrupted read
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1032104: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032104
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: linux
Version: 5.10.0-21-powerpc64le
Severity: grave
Justification: causes non-serious data loss
X-Debbugs-Cc: dan...@mariadb.org

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
 ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these template lines ***

>From https://jira.mariadb.org/browse/MDEV-30728

MariaDB's mtr tests on a number of specific tests depend on the correct
kernel operation.

As observed in these tests, there is a ~1/5 chance the
encryption.innodb_encryption test will read zeros on the later part of
the 16k pages that InnoDB uses by default.

This affects MariaDB-10.6+ packages where there is a liburing in the
distribution.

This has been observed in the CI of Debian
(https://ci.debian.net/packages/m/mariadb/testing/ppc64el/)
and upstreams https://buildbot.mariadb.org/#/builders/318.
The one ppc64le worker that has the Debian 5.10.0-21 kernel,
the same as the Debian CI, has the prefix ppc64le-db-bbw1-*.

Test faults occur on all MariaDB 10.6+ builds in containers on this kernel.
There a no faults on non-ppc64le or RHEL7/8 based ppc64le kernels.

To reproduce:

apt-get install mariadb-test
cd /usr/share/mysql/mysql-test
./mtr --mysqld=--innodb-flush-method=fsync --mysqld=--innodb-use-native-aio=1 
--vardir=/var/lib/mysql  --force encryption.innodb_encryption,innodb,undo0 
--repeat=12 

A test will frequenty fail.

2023-02-28  1:41:01 0 [ERROR] InnoDB: Database page corruption on disk or a 
failed read of file './ibdata1' page [page id: space=0, page number=282]. You 
may have to recover from a backup.

(the page number isn't predictable)

The complete mtr error log of mariadb server is $PWD/var/log/mysqld.1.err

I tested on tmpfs. This is a different fault from bug #1020831 as:
* there is no iouring error, just a bunch of zeros where data was
  expected.
* this is ppc64le only.

Note, more serious faults exist on overlayfs (MDEV-28751) and remote
filesystems so sticking to local xfs, ext4, btrfs is recommended.

-- System Information:
Debian Release: bullseye
  APT prefers jammy-updates
  APT policy: (500, 'jammy-updates'), (500, 'jammy-security'), (500, 'jammy'), 
(100, 'jammy-backports')
Architecture: ppc64el (ppc64le)

Kernel: Linux 5.10.0-21-powerpc64le (SMP w/128 CPU threads)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: unable to detect
--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.6.4-1~exp1
Done: Bastian Blank 

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1032...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Blank  (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sun, 03 Dec 2023 20:57:56 +0100
Source: linux
Architecture: source
Version: 6.6.4-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Bastian Blank 
Closes: 1032104 1037938
Changes:
 linux (6.6.4-1~exp1) experimental; urgency=medium
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.4
 - nvmet: nul-terminate the NQNs passed in the connect command
   (CVE-2023-6121)
 .
   [ Bastian Blank ]
   * Fix build dependency on rsync.
   * Fix build dependency on kernel-wedge.
   * udeb: Make i2c-hid modules optional.
 .
   [ Timothy Pearson ]
   * [powerpc] Don't clobber f0/vs0 during fp|altivec 

Bug#1037938: marked as done (linux FTCBFS: perf builds a python extension for the build architecture)

2023-12-03 Thread Debian Bug Tracking System
Your message dated Sun, 03 Dec 2023 20:48:02 +
with message-id 
and subject line Bug#1037938: fixed in linux 6.6.4-1~exp1
has caused the Debian Bug report #1037938,
regarding linux FTCBFS: perf builds a python extension for the build 
architecture
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1037938: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037938
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: linux
Version: 6.3.7-1
Tags: patch
User: debian-cr...@lists.debian.org
Usertags: ftcbfs

linux fails to cross build from source again. It seems like the perf
build gained a python extension and that extension happens to be built
for the build architecture, which doesn't go well. Please export the
magic python cross building environment variable to make this work. I'm
attaching a patch for your convenience.

Helmut
--- linux-6.3.7/debian/changelog2023-06-12 08:25:26.0 +0200
+++ linux-6.3.7/debian/changelog2023-06-14 16:09:09.0 +0200
@@ -1,3 +1,11 @@
+linux (6.3.7-1.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Fix FTCBFS: Pass _PYTHON_SYSCONFIGDATA_NAME to the perf build.
+(Closes: #-1)
+
+ -- Helmut Grohne   Wed, 14 Jun 2023 16:09:09 +0200
+
 linux (6.3.7-1) unstable; urgency=medium
 
   * New upstream stable update:
--- linux-6.3.7/debian/rules.real   2023-06-12 08:25:16.0 +0200
+++ linux-6.3.7/debian/rules.real   2023-06-14 16:09:09.0 +0200
@@ -632,6 +632,10 @@
dh_md5sums
dh_builddeb -- $(BUILDDEB_ARGS)
 
+ifneq ($(DEB_BUILD_ARCH),$(DEB_HOST_ARCH))
+binary_perf build_perf: export 
_PYTHON_SYSCONFIGDATA_NAME=_sysconfigdata__$(DEB_HOST_MULTIARCH)
+endif
+
 build_perf: $(STAMPS_DIR)/build-tools-headers
$(call make-tools,tools/perf)
 
--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.6.4-1~exp1
Done: Bastian Blank 

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1037...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Blank  (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Format: 1.8
Date: Sun, 03 Dec 2023 20:57:56 +0100
Source: linux
Architecture: source
Version: 6.6.4-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Bastian Blank 
Closes: 1032104 1037938
Changes:
 linux (6.6.4-1~exp1) experimental; urgency=medium
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.4
 - nvmet: nul-terminate the NQNs passed in the connect command
   (CVE-2023-6121)
 .
   [ Bastian Blank ]
   * Fix build dependency on rsync.
   * Fix build dependency on kernel-wedge.
   * udeb: Make i2c-hid modules optional.
 .
   [ Timothy Pearson ]
   * [powerpc] Don't clobber f0/vs0 during fp|altivec register save
 (Closes: #1032104)
 .
   [ Johannes Schauer Marin Rodrigues ]
   * Fix FTCBFS: Pass _PYTHON_SYSCONFIGDATA_NAME to the perf build.
 (Closes: #1037938) Thanks to Helmut Grohne for the patch.
Checksums-Sha1:
 bbef175fb0e0acdf376b47ead3e0b501b536b7ba 233463 linux_6.6.4-1~exp1.dsc
 b38f79198036fde7abf99f60ffba545b91cdf82c 142637188 linux_6.6.4.orig.tar.xz
 c9c7ff3da91737365776a70f221de0ce95b4 1558788 
linux_6.6.4-1~exp1.debian.tar.xz
 1af076e46f3dc867fca2e895233423b4839007d0 5930 
linux_6.6.4-1~exp1_source.buildinfo
Checksums-Sha256:
 b4f661d17aa7c10ed351b18fae004844a40cc8ba592f12fa6fe89f73d861846d 233463 
linux_6.6.4-1~exp1.dsc
 13cc9a0a341c415acc759d642ae43c39645d00531b44725486f077747237301f 142637188 
linux_6.6.4.orig.tar.xz
 c2a55c3f2aa20e85c4e2f4e42f0ef30e4509bb372fa49d8d9e64cd9893c7c391 1558788 
linux_6.6.4-1~exp1.debian.tar.xz
 993b2f9fca42146cb58df83feb8d22cfccb8617a96e3b6e6d07d8f375154b1bc 5930 
linux_6.6.4-1~exp1_source.buildinfo
Files:
 7d79fb0706acad7ec6db8ba7c4facd38 233463 kernel optional linux_6.6.4-1~exp1.dsc
 0203020079fe29e6618095280e7e 142637188 kernel optional 
linux_6.6.4.orig.tar.xz
 408e780433e84019f962a1380f0a1f7b 1558788 kernel optional 

Bug#1057272: Enable SENSORS_IIO_HWMON support

2023-12-03 Thread Andrey Melnikov
сб, 2 дек. 2023 г. в 19:32, Vincent Blut :
>
> Control: tags -1 moreinfo
>
> Hi Andrey,
>
> Le 2023-12-02 16:40, Andrey Melnikov a écrit :
> > Package: src:linux
> > Version: 6.5.13-1
> > Severity: wishlist
> >
> > Please, enable SENSORS_IIO_HWMON support. Without it I'm unable to
> > fetch the AXP209 internal temperature sensor.
>
> The definition of the AXP209 PMU seems to confirm that the internal 
> temperature
> sensor is hooked to the iio-hwmon driver:
>
> pmic-temp {
> compatible = "iio-hwmon";
> io-channels = <_adc 4>; /* Internal temperature */
> };
>
> One thing, though. Does it make sense to enable SENSORS_IIO_HWMON outside of
> armhf?
Yes. IIO device may be connected via i2c, or integrated into the
baseboard.Some old intel atom chipset have IIO, and iio_hwmon.ko size
~ 13k - not a big deal for x86/arm/mips devices.



Processing of linux_6.6.4-1~exp1_source.changes

2023-12-03 Thread Debian FTP Masters
linux_6.6.4-1~exp1_source.changes uploaded successfully to localhost
along with the files:
  linux_6.6.4-1~exp1.dsc
  linux_6.6.4.orig.tar.xz
  linux_6.6.4-1~exp1.debian.tar.xz
  linux_6.6.4-1~exp1_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Processed: Re: Bug#1029968: And some patches

2023-12-03 Thread Debian Bug Tracking System
Processing control commands:

> forwarded -1 
> https://lore.kernel.org/linux-iommu/Y9qSwkLxeMpffZK%2F@gallifrey/ 
> https://lore.kernel.org/linux-media/cover.1701349092.git.hverkuil-ci...@xs4all.nl/
Bug #1029968 [src:linux] bttv/v4l: WARNING: CPU: 6 PID: 6164 at 
mm/vmalloc.c:487 __vmap_pages_range_noflush+0x3e0/0x4d0
Changed Bug forwarded-to-address to 
'https://lore.kernel.org/linux-iommu/Y9qSwkLxeMpffZK%2F@gallifrey/ 
https://lore.kernel.org/linux-media/cover.1701349092.git.hverkuil-ci...@xs4all.nl/'
 from 'https://lore.kernel.org/linux-iommu/Y9qSwkLxeMpffZK%2F@gallifrey/'.

-- 
1029968: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029968
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1029968: And some patches

2023-12-03 Thread Diederik de Haas
Control: forwarded -1 
https://lore.kernel.org/linux-iommu/Y9qSwkLxeMpffZK%2F@gallifrey/ 
https://lore.kernel.org/linux-media/cover.1701349092.git.hverkuil-ci...@xs4all.nl/

On Sunday, 3 December 2023 17:50:07 CET Dr. David Alan Gilbert wrote:
> As well as the fixes in 6.6,

A 6.6 kernel is now available in Experimental

> we also need this patchup series here:
> https://lore.kernel.org/linux-media/ZWibhE350L3BTRK8@gallifrey/T/#t
> 
> These seem to make it pretty nicely.

Excellent :) I saw they had "Fixes:" tags, which normally means they'll
get backported to older kernel series like 6.6.

signature.asc
Description: This is a digitally signed message part.


Bug#1029968: And some patches

2023-12-03 Thread Dr. David Alan Gilbert
As well as the fixes in 6.6, we also need this patchup series here:

https://lore.kernel.org/linux-media/ZWibhE350L3BTRK8@gallifrey/T/#t

These seem to make it pretty nicely.
-- 
 -Open up your eyes, open up your mind, open up your code ---   
/ Dr. David Alan Gilbert|   Running GNU/Linux   | Happy  \ 
\dave @ treblig.org |   | In Hex /
 \ _|_ http://www.treblig.org   |___/



Processed: limit source to linux, tagging 1032104

2023-12-03 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> limit source linux
Limiting to bugs with field 'source' containing at least one of 'linux'
Limit currently set to 'source':'linux'

> tags 1032104 + pending
Bug #1032104 [src:linux] linux: ppc64el iouring corrupted read
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1032104: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032104
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



nfs-utils_2.6.4-3_sourceonly.changes ACCEPTED into unstable

2023-12-03 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 03 Dec 2023 14:58:30 +0100
Source: nfs-utils
Architecture: source
Version: 1:2.6.4-3
Distribution: unstable
Urgency: medium
Maintainer: Debian kernel team 
Changed-By: Salvatore Bonaccorso 
Closes: 1051132
Changes:
 nfs-utils (1:2.6.4-3) unstable; urgency=medium
 .
   [ Salvatore Bonaccorso ]
   * fsidd: call anonymous sockets by their name only, don't fill with NULs to
 108 bytes (Closes: #1051132)
Checksums-Sha1: 
 ab89fbbc2ce5c42ecc450c5df5c05ce738151de3 2567 nfs-utils_2.6.4-3.dsc
 9341ba6196e3db07875ad53302ab845643a6fc60 48700 nfs-utils_2.6.4-3.debian.tar.xz
Checksums-Sha256: 
 9b4c0e07f1ac194c9f46832548568e1e53e7195d35d3b2b82443311323c1caeb 2567 
nfs-utils_2.6.4-3.dsc
 101fc535208578e64ef92a26cb581be8baf468abe223c8861412633d3497955c 48700 
nfs-utils_2.6.4-3.debian.tar.xz
Files: 
 ed1bae21180443a668d0f96c791fe87a 2567 net optional nfs-utils_2.6.4-3.dsc
 8c58d0c811e7c9b03caad09bc2d0ffc3 48700 net optional 
nfs-utils_2.6.4-3.debian.tar.xz

-BEGIN PGP SIGNATURE-

iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmVsir9fFIAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
ZWJpYW4ub3JnAAoJEAVMuPMTQ89EzD8P/18MSpyEyS8LZouUk7ZM2O9Pj1J5hw9H
HYjzK8aEnZPgaZLBiuF+evC7DeH528IvCBpkPgVuEpZEey0cNJsquFt3wqfTN6sV
fw9UtYiCyfX/ty8BuTFjyOk2SxC5whW7S5jrPBUZwbPsPMz6DLspIzdfHbNqnRmg
ucUu9FGNUheiBmL6iQU2yenJ6qJmLYXFe4i+4cGrDZTQGfdxxaZd0q3FTBhinmxs
kgz+gXv7Jj2+Ff8QQhcre8qXJm9Yjpc9ZGt4nHpZG/P+0VBn746Ftm0/jubfRJFA
Q0L/TjRkmbhw4KLfi2uxvlP4Ah60n2qnHvM2wOADTcNNh/EzyalXRqNC+n0hTdx0
kg3rdkpzyg+8RhPClxkH1sKiu6ZwcSEjsKX2VOJ3dlKuiZ+nmqbMTNSX5oX3Fmb+
2NJQLjn36XSNDwhHVfTE88hSS+ARjcHhIwL4BIYU1Emeqk3BlmDITbpgOZwpd03v
P9r8r3saGusn/wiA7f5CD+xf0vDXYVt0xSPj6ythSYy9l1COpJdvutDRLgemZcOb
68BKToWQNLkMOEd3A+Ut71jJwDPlFQFZYqBSNDW8AQyBHnPw9nahxqbQIjV8IcgK
pLiMyV13UvcVLW6CFP+mDK7zTE8tUWCq8nxZGZekMS6yIFFPIMrTzb82R0dqGWfI
GJUDSUjpmx1u
=8oZQ
-END PGP SIGNATURE-



Bug#1051132: marked as done (/usr/sbin/fsidd: bound to @/run/fsid.sock@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@)

2023-12-03 Thread Debian Bug Tracking System
Your message dated Sun, 03 Dec 2023 14:42:10 +
with message-id 
and subject line Bug#1051132: fixed in nfs-utils 1:2.6.4-3
has caused the Debian Bug report #1051132,
regarding /usr/sbin/fsidd: bound to 
@/run/fsid.sock@
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051132: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051132
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-kernel-server
Version: 1:2.6.3-3
Severity: normal
File: /usr/sbin/fsidd

Dear Maintainer,

This makes ss -l output super annoying without grep -v fsidd | column -t again.

I'm assuming it wants to bind to @/run/fsid.sock instead but someone forgor 

Best,
наб


-- Package-specific info:
-- rpcinfo --
   program vers proto   port  service
104   tcp111  portmapper
103   tcp111  portmapper
102   tcp111  portmapper
104   udp111  portmapper
103   udp111  portmapper
102   udp111  portmapper
1000241   udp  41527  status
1000241   tcp  33501  status
151   udp  35312  mountd
151   tcp  45513  mountd
152   udp  52719  mountd
152   tcp  58465  mountd
153   udp  35138  mountd
153   tcp  46079  mountd
133   tcp   2049  nfs
134   tcp   2049  nfs
1002273   tcp   2049  nfs_acl
1000211   udp  40985  nlockmgr
1000213   udp  40985  nlockmgr
1000214   udp  40985  nlockmgr
1000211   tcp  37537  nlockmgr
1000213   tcp  37537  nlockmgr
1000214   tcp  37537  nlockmgr
-- /etc/default/nfs-kernel-server --
RPCNFSDPRIORITY=0
NEED_SVCGSSD=""
-- /etc/nfs.conf --
[general]
pipefs-directory=/run/rpc_pipefs
[nfsrahead]
[exports]
[exportfs]
[gssd]
[lockd]
[exportd]
[mountd]
manage-gids=y
[nfsdcld]
[nfsdcltrack]
[nfsd]
[statd]
[sm-notify]
[svcgssd]
-- /etc/nfs.conf.d/*.conf --

-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: x32 (x86_64)
Foreign Architectures: amd64, i386

Kernel: Linux 6.3.0-2-amd64 (SMP w/2 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_WARN, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages nfs-kernel-server depends on:
ii  keyutils 1.6.1-2
ii  libblkid12.38.1-6
ii  libc62.37-6
ii  libcap2  1:2.66-4
ii  libevent-core-2.1-7  2.1.12-stable-8
ii  libsqlite3-0 3.42.0-1
ii  libtirpc31.3.3+ds-1
ii  libuuid1 2.38.1-6
ii  libwrap0 7.6.q-32
ii  netbase  6.4
ii  nfs-common   1:2.6.3-3
ii  ucf  3.0043+nmu1

Versions of packages nfs-kernel-server recommends:
ii  python3   3.11.4-5+b1
ii  python3-yaml  6.0-3+b2

Versions of packages nfs-kernel-server suggests:
ii  procps  2:4.0.3-1

-- no debconf information


signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---
Source: nfs-utils
Source-Version: 1:2.6.4-3
Done: Salvatore Bonaccorso 

We believe that the bug you reported is fixed in the latest version of
nfs-utils, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso  (supplier of updated nfs-utils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 03 Dec 2023 14:58:30 +0100
Source: nfs-utils
Architecture: source
Version: 1:2.6.4-3
Distribution: unstable
Urgency: medium
Maintainer: Debian kernel team 
Changed-By: Salvatore Bonaccorso 
Closes: 1051132
Changes:
 nfs-utils (1:2.6.4-3) unstable; urgency=medium
 .
   [ Salvatore Bonaccorso ]
   * fsidd: call anonymous sockets by their name only, don't fill with NULs to
 108 bytes (Closes: #1051132)

Processing of nfs-utils_2.6.4-3_sourceonly.changes

2023-12-03 Thread Debian FTP Masters
nfs-utils_2.6.4-3_sourceonly.changes uploaded successfully to localhost
along with the files:
  nfs-utils_2.6.4-3.dsc
  nfs-utils_2.6.4-3.debian.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Processed: limit source to nfs-utils, tagging 1051132

2023-12-03 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> limit source nfs-utils
Limiting to bugs with field 'source' containing at least one of 'nfs-utils'
Limit currently set to 'source':'nfs-utils'

> tags 1051132 + pending
Bug #1051132 [nfs-kernel-server] /usr/sbin/fsidd: bound to 
@/run/fsid.sock@
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1051132: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051132
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1057260: iwlwifi: `N' invalid for parameter `enable_ini'

2023-12-03 Thread Benjamin Eikel
Package: src:linux
Followup-For: Bug #1057260

I can confirm the problem. I see exactly the same log line with 6.5.0-5 and my
WLAN device does not work.

-- Package-specific info:
** Version:
Linux version 6.5.0-4-amd64 (debian-kernel@lists.debian.org) (gcc-13 (Debian 
13.2.0-6) 13.2.0, GNU ld (GNU Binutils for Debian) 2.41) #1 SMP PREEMPT_DYNAMIC 
Debian 6.5.10-1 (2023-11-03)

[…]

** PCI devices:
[…]

07:00.0 Network controller [0280]: Intel Corporation Wi-Fi 6 AX200 [8086:2723] 
(rev 1a)
Subsystem: Intel Corporation Wi-Fi 6 AX200NGW [8086:0084]
Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx+
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- 
Kernel driver in use: iwlwifi
Kernel modules: iwlwifi

[…]

** USB devices:
Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 001 Device 007: ID 5986:9102 Bison Electronics Inc. BisonCam,NB Pro
Bus 001 Device 004: ID 1395:0060 DSEA A/S SCx5 MS
Bus 001 Device 010: ID 1bcf:28c4 Sunplus Innovation Technology Inc. FHD Camera 
Microphone
Bus 001 Device 008: ID 046a:010d CHERRY MX-Board 3.0 Keyboard
Bus 001 Device 006: ID 046d:c069 Logitech, Inc. M-U0007 [Corded Mouse M500]
Bus 001 Device 005: ID 05e3:0723 Genesys Logic, Inc. GL827L SD/MMC/MS Flash 
Card Reader
Bus 001 Device 003: ID 1a40:0101 Terminus Technology Inc. Hub
Bus 001 Device 012: ID 8087:0029 Intel Corp. AX200 Bluetooth
Bus 001 Device 009: ID 06cb:00c7 Synaptics, Inc. TouchPad
Bus 001 Device 002: ID 1050:0407 Yubico.com Yubikey 4/5 OTP+U2F+CCID
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub


-- System Information:
Debian Release: trixie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (102, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 6.5.0-4-amd64 (SMP w/12 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages linux-image-6.5.0-4-amd64 depends on:
ii  initramfs-tools [linux-initramfs-tool]  0.142
ii  kmod30+20230601-2
ii  linux-base  4.9

Versions of packages linux-image-6.5.0-4-amd64 recommends:
ii  apparmor 3.0.12-1
ii  firmware-linux-free  20200122-2

Versions of packages linux-image-6.5.0-4-amd64 suggests:
pn  debian-kernel-handbook  
ii  extlinux3:6.04~git20190206.bf6db5b4+dfsg1-3+b1
ii  grub-efi-amd64  2.12~rc1-12
pn  linux-doc-6.5   

Versions of packages linux-image-6.5.0-4-amd64 is related to:
ii  firmware-amd-graphics 20230625-1
pn  firmware-atheros  
pn  firmware-bnx2 
pn  firmware-bnx2x
pn  firmware-brcm80211
pn  firmware-cavium   
ii  firmware-intel-sound  20230625-1
pn  firmware-intelwimax   
pn  firmware-ipw2x00  
pn  firmware-ivtv 
ii  firmware-iwlwifi  20230625-1
pn  firmware-libertas 
ii  firmware-linux-nonfree20230625-1
ii  firmware-misc-nonfree 20230625-1
pn  firmware-myricom  
pn  firmware-netxen   
pn  firmware-qlogic   
ii  firmware-realtek  20230625-1
pn  firmware-samsung  
pn  firmware-siano
pn  firmware-ti-connectivity  
pn  xen-hypervisor

-- no debconf information


Processed: tagging 1032104

2023-12-03 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 1032104 + fixed-upstream
Bug #1032104 [src:linux] linux: ppc64el iouring corrupted read
Added tag(s) fixed-upstream.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1032104: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032104
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1054642: Failing ARP relay from external -> Linux bridge -> veth port --> NS veth port

2023-12-03 Thread Daniel Gröber
Hi Peter,

> So now we move to VLAN level?

Yeah, but I'm still waiting for the answers to my questions from two emails
ago:

> I'd be happy to still track this bug down but I need you to investigate
> the behaviour in your environment. If you've torn down the lab already we
> can also just call it quits.
> 
> If you do want to continue some questions are still pending, see quoted below.
> 
> > On Mon, Oct 30, 2023 at 07:25:38PM +, peter.gasparo...@orange.com wrote:
> > > 1) As was reported, foreign external world MAC@ does not pass into 
> > > network namespace, just external border point "vlan199"
> > 
> > How did you check this?
> >
> > > 2) now collecting data for you, honestly I don’t see external mac 
> > > address on "inet-br" object, so my previous statement was incorrect..
> > > {ossibly I might mixed this up with another "labinet-br" (working in 
> > > its limited
> > > scope) which is IP-defined, while "inet-br" in question is not.
> > >
> > > 3) so question is, if the MACs learnt via vlan199 are supposed to be 
> > > paired (displayed) with "inet-br" object and all way up into NS
> > 
> > I want to make sure we're on the same page, how do you check if the MAC
> > is reaching into the NS? I assume using `ip neigh`? I'd have a look at
> > tcpdump this will tell you whether ARP is even reaching the NS or not.
> > 
> > Something simple like
> > 
> > $ tcpdump -enli $IFACE 'arp or icmp'
> > 
> > optionally you can filter by MAC (`ether host` in pcap-filter speak):
> > 
> > $ tcpdump -enli $IFACE ('arp or icmp) and ether host 
> > aa:00:00:00:00:01
> > 
> > Oh and one last thing: please double and tripple check that a firewall 
> > isn't interfering.

--Daniel


signature.asc
Description: PGP signature