Processed: forcibly merging 974921 1057619

2023-12-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> forcemerge 974921 1057619
Bug #974921 [src:linux] Could you consider CONFIG_VDPA=m
Bug #974921 [src:linux] Could you consider CONFIG_VDPA=m
Marked as found in versions linux/6.6.4-1~exp1.
Bug #1057619 [src:linux] linux-image-6.6-amd64-unsigned: Enable VDUSE 
(vdpa-user) modules (vdpa, virtio-vdpa, vduse)
Marked as found in versions linux/5.9.6-1.
Merged 974921 1057619
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1057619: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057619
974921: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974921
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: retitle 974921 to Could you consider CONFIG_VDPA=m

2023-12-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> retitle 974921 Could you consider CONFIG_VDPA=m
Bug #974921 [src:linux] linux-image-5.9.0-2-arm64: Could you consider 
CONFIG_VDPA=m and CONFIG_VFIO_MDEV=m ?
Changed Bug title to 'Could you consider CONFIG_VDPA=m' from 
'linux-image-5.9.0-2-arm64: Could you consider CONFIG_VDPA=m and 
CONFIG_VFIO_MDEV=m ?'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
974921: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=974921
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: reassign 1057619 to src:linux

2023-12-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 1057619 src:linux 6.6.4-1~exp1
Bug #1057619 [linux-image-6.6-amd64-unsigned] linux-image-6.6-amd64-unsigned: 
Enable VDUSE (vdpa-user) modules (vdpa, virtio-vdpa, vduse)
Bug reassigned from package 'linux-image-6.6-amd64-unsigned' to 'src:linux'.
No longer marked as found in versions linux/6.6.4-1~exp1.
Ignoring request to alter fixed versions of bug #1057619 to the same values 
previously set
Bug #1057619 [src:linux] linux-image-6.6-amd64-unsigned: Enable VDUSE 
(vdpa-user) modules (vdpa, virtio-vdpa, vduse)
Marked as found in versions linux/6.6.4-1~exp1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1057619: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057619
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1057619: linux-image-6.6-amd64-unsigned: Enable VDUSE (vdpa-user) modules (vdpa, virtio-vdpa, vduse)

2023-12-05 Thread Vitaliy Filippov
Package: linux-image-6.6-amd64-unsigned
Version: 6.6.4-1~exp1
Severity: wishlist

Dear Maintainer,

Linux 5.15+ has a cool new userspace block device interface: VDUSE.

https://docs.kernel.org/userspace-api/vduse.html

https://www.phoronix.com/news/Linux-5.15-VDUSE-vDPA

My testing shows that it's a real breakthrough in the userspace block device 
area:

https://git.yourcmc.ru/vitalif/vitastor/src/branch/master/docs/usage/qemu.en.md#vduse

But all current Debian Linux kernels have CONFIG_VDPA, CONFIG_VDPA_USER, 
CONFIG_VIRTIO_VDPA disabled.

Ubuntu, Proxmox, Fedora, kernel-mainline for RHEL all have it enabled.

Please enable them in Debian too!

-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable-debug
  APT policy: (500, 'unstable-debug'), (500, 'testing-debug'), (500, 
'oldstable-debug'), (500, 'oldoldstable-debug'), (500, 'oldoldstable'), (500, 
'unstable'), (500, 'testing'), (500, 'oldstable'), (1, 'experimental')
merged-usr: no
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.1.34-060134-generic (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_USER, 
TAINT_FIRMWARE_WORKAROUND, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages linux-image-6.6-amd64-unsigned depends on:
ii  initramfs-tools [linux-initramfs-tool]  0.142
ii  kmod30+20221128-1
ii  linux-base  4.9

Versions of packages linux-image-6.6-amd64-unsigned recommends:
pn  apparmor 
ii  firmware-linux-free  20200122-1

Versions of packages linux-image-6.6-amd64-unsigned suggests:
pn  debian-kernel-handbook  
ii  grub-efi-amd64  2.06-7
pn  linux-doc-6.6   



Bug#1057040: firmware-qcom-soc: please add qcom/sc8280xp/LENOVO/21BX/audioreach-tplg.bin and symlink

2023-12-05 Thread Diederik de Haas
On Tuesday, 5 December 2023 18:30:39 CET Diederik de Haas wrote:
> > Link: qcom/sc8280xp/SC8280XP-LENOVO-X13S-tplg.bin ->
> > LENOVO/21BX/audioreach-tplg.bin
> 
> Added upstream in commit f9a35b3f0779844aa686b76506344db70a72820d and part
> of upstream's 20230804 release.

Link was added in 7d94e0fa84701f0c01877c21cf4857f94fd367ab, part of 20230919

signature.asc
Description: This is a digitally signed message part.


Bug#1057040: firmware-qcom-soc: please add qcom/sc8280xp/LENOVO/21BX/audioreach-tplg.bin and symlink

2023-12-05 Thread Diederik de Haas
On Tuesday, 28 November 2023 14:29:28 CET Emanuele Rocca wrote:
> Package: firmware-qcom-soc
> Version: 20230515-3
> 
> The file qcom/sc8280xp/LENOVO/21BX/audioreach-tplg.bin and its symlink
> qcom/sc8280xp/SC8280XP-LENOVO-X13S-tplg.bin are needed by the Lenovo
> Thinkpad X13s. Please consider adding them to firmware-qcom-soc.
> 
> File: qcom/sc8280xp/LENOVO/21BX/audioreach-tplg.bin
> Link: qcom/sc8280xp/SC8280XP-LENOVO-X13S-tplg.bin ->
> LENOVO/21BX/audioreach-tplg.bin

Added upstream in commit f9a35b3f0779844aa686b76506344db70a72820d and part of 
upstream's 20230804 release.

signature.asc
Description: This is a digitally signed message part.


Re: Bug#1057441: linux-image-6.6-amd64: Crypt does not longer work

2023-12-05 Thread Salvatore Bonaccorso
Hi,

On Tue, Dec 05, 2023 at 05:14:20PM +0100, Salvatore Bonaccorso wrote:
> Control: reassign -1 src:cryptsetup 2:2.6.1-5
> 
> Hi
> 
> On Tue, Dec 05, 2023 at 04:55:58PM +0100, Salvatore Bonaccorso wrote:
> > Hi,
> > 
> > On Tue, Dec 05, 2023 at 04:38:19PM +0100, Salvatore Bonaccorso wrote:
> > > Control: tags -1 + confirmed
> > > 
> > > On Tue, Dec 05, 2023 at 06:23:45AM +0100, Michael Ott wrote:
> > > > Package: src:linux
> > > > Version: 6.6.4-1~exp1
> > > > Severity: important
> > > > 
> > > > Dear Maintainer,
> > > > 
> > > > After updating to the 6.6 kernel the password for my encryption does 
> > > > not longer
> > > > work
> > > > 
> > > > Please unlock disk nvme0n1p3_crypt: **
> > > > device-mapper: table: 253:0: crypt: Error allocation crypto tfm 
> > > > (_ENOENT)
> > > > device-mapper: ioctl: error adding target to table
> > > > device-mapper: reload ioctl on nvme0n1p3_crypt (253:0) failed: No such 
> > > > file or
> > > > directory
> > > > cryptsetup: ERROR: nvme0n1p3_crypt: cryptsetup failed, bad password or 
> > > > options?
> > > > 
> > > > Everything works with 6.5. I also downgrade systemd and cryptosetup but 
> > > > no
> > > > changes
> > > 
> > > I suspect this is related to changes around
> > > https://git.kernel.org/linus/68cf01760bc0891074e813b9bb06d2696cac1c01
> > > (but not verified, nor tracked down).
> > 
> > Actually after a more closer look on what is in the initrd: Bastian
> > can be this due to switching to compressed modules? If this claim is
> > correct then likely initramfs-tools would not copy them to the initrd.
> 
> It looks that we only consider *.ko uncompressed in
> debian/initramfs/hooks/cryptroot:
> 
> add_modules() {
> local glob="$1" found=n
> shift
> for mod in $(find -H "$@" -name "$glob.ko" -type f -printf '%f\n'); do
> manual_add_modules "${mod%.ko}"
> found=y
> done
> [ "$found" = y ] && return 0 || return 1
> }
> 
> but various modules are now with 6.6.4-1~exp1 compressed:
> 
> a relatively quick woraround would be to change the function to:
> 
> add_modules() {
> local glob="$1" found=n
> shift
> for mod in $(find -H "$@" -name "$glob.ko*" -type f -printf '%f\n'); do
> manual_add_modules "${mod%.ko*}"
> found=y
> done
> [ "$found" = y ] && return 0 || return 1
> }
> 
> Is this the correct approach though? Which other hook functions might
> be affected by the change in linux by switching to compressed modules?

And in fact this is the solution proposed in #1036049.

Regards,
Salvatore



Processed: Re: Bug#1057441: linux-image-6.6-amd64: Crypt does not longer work

2023-12-05 Thread Debian Bug Tracking System
Processing control commands:

> reassign -1 src:cryptsetup 2:2.6.1-5
Bug #1057441 [src:linux] linux-image-6.6-amd64: Crypt does not longer work
Bug reassigned from package 'src:linux' to 'src:cryptsetup'.
No longer marked as found in versions linux/6.6.4-1~exp1.
Ignoring request to alter fixed versions of bug #1057441 to the same values 
previously set
Bug #1057441 [src:cryptsetup] linux-image-6.6-amd64: Crypt does not longer work
Marked as found in versions cryptsetup/2:2.6.1-5.

-- 
1057441: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057441
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Re: Bug#1057441: linux-image-6.6-amd64: Crypt does not longer work

2023-12-05 Thread Salvatore Bonaccorso
Control: reassign -1 src:cryptsetup 2:2.6.1-5

Hi

On Tue, Dec 05, 2023 at 04:55:58PM +0100, Salvatore Bonaccorso wrote:
> Hi,
> 
> On Tue, Dec 05, 2023 at 04:38:19PM +0100, Salvatore Bonaccorso wrote:
> > Control: tags -1 + confirmed
> > 
> > On Tue, Dec 05, 2023 at 06:23:45AM +0100, Michael Ott wrote:
> > > Package: src:linux
> > > Version: 6.6.4-1~exp1
> > > Severity: important
> > > 
> > > Dear Maintainer,
> > > 
> > > After updating to the 6.6 kernel the password for my encryption does not 
> > > longer
> > > work
> > > 
> > > Please unlock disk nvme0n1p3_crypt: **
> > > device-mapper: table: 253:0: crypt: Error allocation crypto tfm (_ENOENT)
> > > device-mapper: ioctl: error adding target to table
> > > device-mapper: reload ioctl on nvme0n1p3_crypt (253:0) failed: No such 
> > > file or
> > > directory
> > > cryptsetup: ERROR: nvme0n1p3_crypt: cryptsetup failed, bad password or 
> > > options?
> > > 
> > > Everything works with 6.5. I also downgrade systemd and cryptosetup but no
> > > changes
> > 
> > I suspect this is related to changes around
> > https://git.kernel.org/linus/68cf01760bc0891074e813b9bb06d2696cac1c01
> > (but not verified, nor tracked down).
> 
> Actually after a more closer look on what is in the initrd: Bastian
> can be this due to switching to compressed modules? If this claim is
> correct then likely initramfs-tools would not copy them to the initrd.

It looks that we only consider *.ko uncompressed in
debian/initramfs/hooks/cryptroot:

add_modules() {
local glob="$1" found=n
shift
for mod in $(find -H "$@" -name "$glob.ko" -type f -printf '%f\n'); do
manual_add_modules "${mod%.ko}"
found=y
done
[ "$found" = y ] && return 0 || return 1
}

but various modules are now with 6.6.4-1~exp1 compressed:

a relatively quick woraround would be to change the function to:

add_modules() {
local glob="$1" found=n
shift
for mod in $(find -H "$@" -name "$glob.ko*" -type f -printf '%f\n'); do
manual_add_modules "${mod%.ko*}"
found=y
done
[ "$found" = y ] && return 0 || return 1
}

Is this the correct approach though? Which other hook functions might
be affected by the change in linux by switching to compressed modules?

Regards,
Salvatore



Bug#1057441: linux-image-6.6-amd64: Crypt does not longer work

2023-12-05 Thread Salvatore Bonaccorso
Hi,

On Tue, Dec 05, 2023 at 04:38:19PM +0100, Salvatore Bonaccorso wrote:
> Control: tags -1 + confirmed
> 
> On Tue, Dec 05, 2023 at 06:23:45AM +0100, Michael Ott wrote:
> > Package: src:linux
> > Version: 6.6.4-1~exp1
> > Severity: important
> > 
> > Dear Maintainer,
> > 
> > After updating to the 6.6 kernel the password for my encryption does not 
> > longer
> > work
> > 
> > Please unlock disk nvme0n1p3_crypt: **
> > device-mapper: table: 253:0: crypt: Error allocation crypto tfm (_ENOENT)
> > device-mapper: ioctl: error adding target to table
> > device-mapper: reload ioctl on nvme0n1p3_crypt (253:0) failed: No such file 
> > or
> > directory
> > cryptsetup: ERROR: nvme0n1p3_crypt: cryptsetup failed, bad password or 
> > options?
> > 
> > Everything works with 6.5. I also downgrade systemd and cryptosetup but no
> > changes
> 
> I suspect this is related to changes around
> https://git.kernel.org/linus/68cf01760bc0891074e813b9bb06d2696cac1c01
> (but not verified, nor tracked down).

Actually after a more closer look on what is in the initrd: Bastian
can be this due to switching to compressed modules? If this claim is
correct then likely initramfs-tools would not copy them to the initrd.

Regards,
Salvatore



Bug#1057441: linux-image-6.6-amd64: Crypt does not longer work

2023-12-05 Thread Salvatore Bonaccorso
Control: tags -1 + confirmed

On Tue, Dec 05, 2023 at 06:23:45AM +0100, Michael Ott wrote:
> Package: src:linux
> Version: 6.6.4-1~exp1
> Severity: important
> 
> Dear Maintainer,
> 
> After updating to the 6.6 kernel the password for my encryption does not 
> longer
> work
> 
> Please unlock disk nvme0n1p3_crypt: **
> device-mapper: table: 253:0: crypt: Error allocation crypto tfm (_ENOENT)
> device-mapper: ioctl: error adding target to table
> device-mapper: reload ioctl on nvme0n1p3_crypt (253:0) failed: No such file or
> directory
> cryptsetup: ERROR: nvme0n1p3_crypt: cryptsetup failed, bad password or 
> options?
> 
> Everything works with 6.5. I also downgrade systemd and cryptosetup but no
> changes

I suspect this is related to changes around
https://git.kernel.org/linus/68cf01760bc0891074e813b9bb06d2696cac1c01
(but not verified, nor tracked down).

Regards,
Salvatore



Processed: Re: Bug#1057441: linux-image-6.6-amd64: Crypt does not longer work

2023-12-05 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + confirmed
Bug #1057441 [src:linux] linux-image-6.6-amd64: Crypt does not longer work
Added tag(s) confirmed.

-- 
1057441: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057441
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1053503: closed by Debian FTP Masters (reply to Bastian Blank ) (Bug#1053503: fixed in linux 6.6.3-1~exp1)

2023-12-05 Thread Emanuele Rocca
Hi John,

On 2023-12-04 09:48, John Vincent wrote:
> I tested today's daily installer (2023-12-04 10:14) but the changes
> are seeming to be not included in this installer.

Indeed, 6.6.3-1~exp1 is in experimental. The changes will be included in
the daily installer build once the relevant kernel version enters
testing. First it will have to be uploaded to unstable though, and there
is no fixed date for when that will happen. "Soonish", I think. :-)

You can check the kernel versions for unstable/testing and more on:
https://tracker.debian.org/pkg/linux

For details on when exactly packages are allowed to migrate into testing
after entering unstable, please see:
https://www.debian.org/devel/testing

  Emanuele



Processed: severity of 1057441 is serious

2023-12-05 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> # as to be considered a considereable regression
> severity 1057441 serious
Bug #1057441 [src:linux] linux-image-6.6-amd64: Crypt does not longer work
Severity set to 'serious' from 'important'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1057441: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057441
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems