linux-signed-arm64_6.1.66+1_source.changes is NEW

2023-12-09 Thread Debian FTP Masters
Mapping bookworm-proposed-updates to proposed-updates.
binary:ata-modules-6.1.0-15-arm64-di is NEW.
binary:btrfs-modules-6.1.0-15-arm64-di is NEW.
binary:cdrom-core-modules-6.1.0-15-arm64-di is NEW.
binary:crc-modules-6.1.0-15-arm64-di is NEW.
binary:crypto-dm-modules-6.1.0-15-arm64-di is NEW.
binary:crypto-modules-6.1.0-15-arm64-di is NEW.
binary:efi-modules-6.1.0-15-arm64-di is NEW.
binary:event-modules-6.1.0-15-arm64-di is NEW.
binary:ext4-modules-6.1.0-15-arm64-di is NEW.
binary:f2fs-modules-6.1.0-15-arm64-di is NEW.
binary:fat-modules-6.1.0-15-arm64-di is NEW.
binary:fb-modules-6.1.0-15-arm64-di is NEW.
binary:fuse-modules-6.1.0-15-arm64-di is NEW.
binary:i2c-modules-6.1.0-15-arm64-di is NEW.
binary:input-modules-6.1.0-15-arm64-di is NEW.
binary:isofs-modules-6.1.0-15-arm64-di is NEW.
binary:jfs-modules-6.1.0-15-arm64-di is NEW.
binary:kernel-image-6.1.0-15-arm64-di is NEW.
binary:leds-modules-6.1.0-15-arm64-di is NEW.
binary:linux-image-6.1.0-15-arm64 is NEW.
binary:linux-image-6.1.0-15-cloud-arm64 is NEW.
binary:linux-image-6.1.0-15-rt-arm64 is NEW.
binary:loop-modules-6.1.0-15-arm64-di is NEW.
binary:md-modules-6.1.0-15-arm64-di is NEW.
binary:mmc-modules-6.1.0-15-arm64-di is NEW.
binary:mtd-core-modules-6.1.0-15-arm64-di is NEW.
binary:multipath-modules-6.1.0-15-arm64-di is NEW.
binary:nbd-modules-6.1.0-15-arm64-di is NEW.
binary:nic-modules-6.1.0-15-arm64-di is NEW.
binary:nic-shared-modules-6.1.0-15-arm64-di is NEW.
binary:nic-usb-modules-6.1.0-15-arm64-di is NEW.
binary:nic-wireless-modules-6.1.0-15-arm64-di is NEW.
binary:ppp-modules-6.1.0-15-arm64-di is NEW.
binary:sata-modules-6.1.0-15-arm64-di is NEW.
binary:scsi-core-modules-6.1.0-15-arm64-di is NEW.
binary:scsi-modules-6.1.0-15-arm64-di is NEW.
binary:scsi-nic-modules-6.1.0-15-arm64-di is NEW.
binary:sound-modules-6.1.0-15-arm64-di is NEW.
binary:speakup-modules-6.1.0-15-arm64-di is NEW.
binary:squashfs-modules-6.1.0-15-arm64-di is NEW.
binary:udf-modules-6.1.0-15-arm64-di is NEW.
binary:uinput-modules-6.1.0-15-arm64-di is NEW.
binary:usb-modules-6.1.0-15-arm64-di is NEW.
binary:usb-serial-modules-6.1.0-15-arm64-di is NEW.
binary:usb-storage-modules-6.1.0-15-arm64-di is NEW.
binary:xfs-modules-6.1.0-15-arm64-di is NEW.

Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file hashes are valid), so please be patient.

Packages are routinely processed through to the archive, and do feel
free to browse the NEW queue[1].

If there is an issue with the upload, you will receive an email from a
member of the ftpteam.

If you have any questions, you may reply to this email.

[1]: https://ftp-master.debian.org/new.html
 or https://ftp-master.debian.org/backports-new.html for *-backports



Processing of linux-signed-arm64_6.1.66+1_source.changes

2023-12-09 Thread Debian FTP Masters
linux-signed-arm64_6.1.66+1_source.changes uploaded successfully to localhost
along with the files:
  linux-signed-arm64_6.1.66+1.dsc
  linux-signed-arm64_6.1.66+1.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



linux-signed-amd64_6.1.66+1_source.changes is NEW

2023-12-09 Thread Debian FTP Masters
Mapping bookworm-proposed-updates to proposed-updates.
binary:acpi-modules-6.1.0-15-amd64-di is NEW.
binary:ata-modules-6.1.0-15-amd64-di is NEW.
binary:btrfs-modules-6.1.0-15-amd64-di is NEW.
binary:cdrom-core-modules-6.1.0-15-amd64-di is NEW.
binary:crc-modules-6.1.0-15-amd64-di is NEW.
binary:crypto-dm-modules-6.1.0-15-amd64-di is NEW.
binary:crypto-modules-6.1.0-15-amd64-di is NEW.
binary:efi-modules-6.1.0-15-amd64-di is NEW.
binary:event-modules-6.1.0-15-amd64-di is NEW.
binary:ext4-modules-6.1.0-15-amd64-di is NEW.
binary:f2fs-modules-6.1.0-15-amd64-di is NEW.
binary:fat-modules-6.1.0-15-amd64-di is NEW.
binary:fb-modules-6.1.0-15-amd64-di is NEW.
binary:firewire-core-modules-6.1.0-15-amd64-di is NEW.
binary:fuse-modules-6.1.0-15-amd64-di is NEW.
binary:i2c-modules-6.1.0-15-amd64-di is NEW.
binary:input-modules-6.1.0-15-amd64-di is NEW.
binary:isofs-modules-6.1.0-15-amd64-di is NEW.
binary:jfs-modules-6.1.0-15-amd64-di is NEW.
binary:kernel-image-6.1.0-15-amd64-di is NEW.
binary:linux-image-6.1.0-15-amd64 is NEW.
binary:linux-image-6.1.0-15-cloud-amd64 is NEW.
binary:linux-image-6.1.0-15-rt-amd64 is NEW.
binary:loop-modules-6.1.0-15-amd64-di is NEW.
binary:md-modules-6.1.0-15-amd64-di is NEW.
binary:mmc-core-modules-6.1.0-15-amd64-di is NEW.
binary:mmc-modules-6.1.0-15-amd64-di is NEW.
binary:mouse-modules-6.1.0-15-amd64-di is NEW.
binary:mtd-core-modules-6.1.0-15-amd64-di is NEW.
binary:multipath-modules-6.1.0-15-amd64-di is NEW.
binary:nbd-modules-6.1.0-15-amd64-di is NEW.
binary:nic-modules-6.1.0-15-amd64-di is NEW.
binary:nic-pcmcia-modules-6.1.0-15-amd64-di is NEW.
binary:nic-shared-modules-6.1.0-15-amd64-di is NEW.
binary:nic-usb-modules-6.1.0-15-amd64-di is NEW.
binary:nic-wireless-modules-6.1.0-15-amd64-di is NEW.
binary:pata-modules-6.1.0-15-amd64-di is NEW.
binary:pcmcia-modules-6.1.0-15-amd64-di is NEW.
binary:pcmcia-storage-modules-6.1.0-15-amd64-di is NEW.
binary:ppp-modules-6.1.0-15-amd64-di is NEW.
binary:rfkill-modules-6.1.0-15-amd64-di is NEW.
binary:sata-modules-6.1.0-15-amd64-di is NEW.
binary:scsi-core-modules-6.1.0-15-amd64-di is NEW.
binary:scsi-modules-6.1.0-15-amd64-di is NEW.
binary:scsi-nic-modules-6.1.0-15-amd64-di is NEW.
binary:serial-modules-6.1.0-15-amd64-di is NEW.
binary:sound-modules-6.1.0-15-amd64-di is NEW.
binary:speakup-modules-6.1.0-15-amd64-di is NEW.
binary:squashfs-modules-6.1.0-15-amd64-di is NEW.
binary:udf-modules-6.1.0-15-amd64-di is NEW.
binary:uinput-modules-6.1.0-15-amd64-di is NEW.
binary:usb-modules-6.1.0-15-amd64-di is NEW.
binary:usb-serial-modules-6.1.0-15-amd64-di is NEW.
binary:usb-storage-modules-6.1.0-15-amd64-di is NEW.
binary:xfs-modules-6.1.0-15-amd64-di is NEW.

Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file hashes are valid), so please be patient.

Packages are routinely processed through to the archive, and do feel
free to browse the NEW queue[1].

If there is an issue with the upload, you will receive an email from a
member of the ftpteam.

If you have any questions, you may reply to this email.

[1]: https://ftp-master.debian.org/new.html
 or https://ftp-master.debian.org/backports-new.html for *-backports



Processing of linux-signed-amd64_6.1.66+1_source.changes

2023-12-09 Thread Debian FTP Masters
linux-signed-amd64_6.1.66+1_source.changes uploaded successfully to localhost
along with the files:
  linux-signed-amd64_6.1.66+1.dsc
  linux-signed-amd64_6.1.66+1.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Re: No longer sign i386 kernels

2023-12-09 Thread Bastian Blank
On Wed, Dec 06, 2023 at 09:09:01PM +, Steve McIntyre wrote:
> We should publicise this for users and be consistent for all the EFI
> signed binaries - there's no point in signing i386 grub and fwupd or
> having a signed shim if we don't have a signed kernel.
> Agreed?

Signing of i386 kernels is gone.
https://salsa.debian.org/kernel-team/linux/-/merge_requests/944

Bastian

-- 
Suffocating together ... would create heroic camaraderie.
-- Khan Noonian Singh, "Space Seed", stardate 3142.8



linux_6.1.66-1_source.changes ACCEPTED into proposed-updates

2023-12-09 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 09 Dec 2023 16:48:39 +0100
Source: linux
Architecture: source
Version: 6.1.66-1
Distribution: bookworm
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Closes: 1032104 1057790 1057843
Changes:
 linux (6.1.66-1) bookworm; urgency=medium
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.65
 - afs: Fix afs_server_list to be cleaned up with RCU
 - afs: Make error on cell lookup failure consistent with OpenAFS
 - [arm64,armhf] drm/panel: simple: Fix Innolux G101ICE-L01 bus flags
 - [arm64,armhf] drm/panel: simple: Fix Innolux G101ICE-L01 timings
 - wireguard: use DEV_STATS_INC()
 - ata: pata_isapnp: Add missing error check for devm_ioport_map()
 - [x86] drm/i915: do not clean GT table on error path
 - [arm64,armhf] drm/rockchip: vop: Fix color for RGB888/BGR888 format on 
VOP
   full
 - HID: fix HID device resource race between HID core and debugging support
 - ipv4: Correct/silence an endian warning in __ip_do_redirect
 - net: usb: ax88179_178a: fix failed operations during ax88179_reset
 - net/smc: avoid data corruption caused by decline
 - [armhf] arm/xen: fix xen_vcpu_info allocation alignment
 - [amd64,arm64] amd-xgbe: handle corner-case during sfp hotplug
 - [amd64,arm64] amd-xgbe: handle the corner-case during tx completion
 - [amd64,arm64] amd-xgbe: propagate the correct speed and duplex status
 - afs: Return ENOENT if no cell DNS record can be found
 - afs: Fix file locking on R/O volumes to operate in local mode
 - mm,kfence: decouple kfence from page granularity mapping judgement
 - i40e: use ERR_PTR error print in i40e messages
 - i40e: Fix adding unsupported cloud filters
 - [arm64] USB: dwc3: qcom: fix resource leaks on probe deferral
 - [arm64] USB: dwc3: qcom: fix ACPI platform device leak
 - lockdep: Fix block chain corruption
 - cifs: minor cleanup of some headers
 - smb3: allow dumping session and tcon id to improve stats analysis and
   debugging
 - cifs: print last update time for interface list
 - cifs: distribute channels across interfaces based on speed
 - cifs: account for primary channel in the interface list
 - cifs: fix leak of iface for primary channel
 - ext4: add a new helper to check if es must be kept
 - ext4: factor out __es_alloc_extent() and __es_free_extent()
 - ext4: use pre-allocated es in __es_insert_extent()
 - ext4: use pre-allocated es in __es_remove_extent()
 - ext4: using nofail preallocation in ext4_es_remove_extent()
 - ext4: using nofail preallocation in ext4_es_insert_delayed_block()
 - ext4: using nofail preallocation in ext4_es_insert_extent()
 - ext4: fix slab-use-after-free in ext4_es_insert_extent()
 - ext4: make sure allocate pending entry not fail
 - NFSD: Fix "start of NFS reply" pointer passed to nfsd_cache_update()
 - NFSD: Fix checksum mismatches in the duplicate reply cache
 - ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA
 - swiotlb-xen: provide the "max_mapping_size" method
 - bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in
   btree_gc_coalesce()
 - md: fix bi_status reporting in md_end_clone_io
 - bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race
 - io_uring/fs: consider link->flags when getting path for LINKAT
 - [s390x] dasd: protect device queue against concurrent access
 - USB: serial: option: add Luat Air72*U series products
 - hv_netvsc: fix race of netvsc and VF register_netdevice
 - hv_netvsc: Fix race of register_netdevice_notifier and VF register
 - hv_netvsc: Mark VF as slave before exposing it to user-mode
 - dm-delay: fix a race between delay_presuspend and delay_bio
 - bcache: check return value from btree_node_alloc_replacement()
 - bcache: prevent potential division by zero error
 - bcache: fixup init dirty data errors
 - bcache: fixup lock c->root error
 - USB: serial: option: add Fibocom L7xx modules
 - USB: serial: option: fix FM101R-GL defines
 - USB: serial: option: don't claim interface 4 for ZTE MF290
 - usb: typec: tcpm: Skip hard reset when in error recovery
 - [arm64,armhf] USB: dwc2: write HCINT with INTMASK applied
 - [arm64,armhf] usb: dwc3: Fix default mode initialization
 - [arm64,armhf] usb: dwc3: set the dma max_seg_size
 - [arm64] USB: dwc3: qcom: fix software node leak on probe errors
 - [arm64] USB: dwc3: qcom: fix wakeup after probe deferral
 - io_uring: fix off-by one bvec index
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.66
 - cifs: Fix FALLOC_FL_ZERO_RANGE by setting i_size if EOF moved
 - cifs: Fix FALLOC_FL_INSERT_RANGE by setting i_size after EOF moved
 

Bug#1057843: marked as done (linux: ext4 data corruption in 6.1.64-1)

2023-12-09 Thread Debian Bug Tracking System
Your message dated Sat, 09 Dec 2023 17:56:32 +
with message-id 
and subject line Bug#1057843: fixed in linux 6.1.66-1
has caused the Debian Bug report #1057843,
regarding linux: ext4 data corruption in 6.1.64-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1057843: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: linux
Version: 6.1.64-1
Severity: grave
Tags: upstream
Justification: causes non-serious data loss
X-Debbugs-Cc: debian-rele...@lists.debian.org, car...@debian.org, 
a...@debian.org

Hi

I'm filling this for visibility.

There might be a ext4 data corruption issue with the kernel released
in the 12.3 bookworm point release (which is addressed in 6.1.66
upstream already).

The report about the regression and some details:

https://lore.kernel.org/stable/20231205122122.dfhhoaswsfscuhc3@quack3/

Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.1.66-1
Done: Salvatore Bonaccorso 

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1057...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso  (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 09 Dec 2023 16:48:39 +0100
Source: linux
Architecture: source
Version: 6.1.66-1
Distribution: bookworm
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Closes: 1032104 1057790 1057843
Changes:
 linux (6.1.66-1) bookworm; urgency=medium
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.65
 - afs: Fix afs_server_list to be cleaned up with RCU
 - afs: Make error on cell lookup failure consistent with OpenAFS
 - [arm64,armhf] drm/panel: simple: Fix Innolux G101ICE-L01 bus flags
 - [arm64,armhf] drm/panel: simple: Fix Innolux G101ICE-L01 timings
 - wireguard: use DEV_STATS_INC()
 - ata: pata_isapnp: Add missing error check for devm_ioport_map()
 - [x86] drm/i915: do not clean GT table on error path
 - [arm64,armhf] drm/rockchip: vop: Fix color for RGB888/BGR888 format on 
VOP
   full
 - HID: fix HID device resource race between HID core and debugging support
 - ipv4: Correct/silence an endian warning in __ip_do_redirect
 - net: usb: ax88179_178a: fix failed operations during ax88179_reset
 - net/smc: avoid data corruption caused by decline
 - [armhf] arm/xen: fix xen_vcpu_info allocation alignment
 - [amd64,arm64] amd-xgbe: handle corner-case during sfp hotplug
 - [amd64,arm64] amd-xgbe: handle the corner-case during tx completion
 - [amd64,arm64] amd-xgbe: propagate the correct speed and duplex status
 - afs: Return ENOENT if no cell DNS record can be found
 - afs: Fix file locking on R/O volumes to operate in local mode
 - mm,kfence: decouple kfence from page granularity mapping judgement
 - i40e: use ERR_PTR error print in i40e messages
 - i40e: Fix adding unsupported cloud filters
 - [arm64] USB: dwc3: qcom: fix resource leaks on probe deferral
 - [arm64] USB: dwc3: qcom: fix ACPI platform device leak
 - lockdep: Fix block chain corruption
 - cifs: minor cleanup of some headers
 - smb3: allow dumping session and tcon id to improve stats analysis and
   debugging
 - cifs: print last update time for interface list
 - cifs: distribute channels across interfaces based on speed
 - cifs: account for primary channel in the interface list
 - cifs: fix leak of iface for primary channel
 - ext4: add a new helper to check if es must be kept
 - ext4: factor out __es_alloc_extent() and __es_free_extent()
 - ext4: use pre-allocated es in __es_insert_extent()
 - ext4: use pre-allocated es in __es_remove_extent()
 - ext4: using nofail preallocation in ext4_es_remove_extent()
 - ext4: using nofail preallocation in ext4_es_insert_delayed_block()
 - ext4: using nofail preallocation in 

Bug#1057790: marked as done (linux-image-6.5.0-5-amd64: deadlock on RTL8125 in jumbo mtu mode)

2023-12-09 Thread Debian Bug Tracking System
Your message dated Sat, 09 Dec 2023 17:56:32 +
with message-id 
and subject line Bug#1057790: fixed in linux 6.1.66-1
has caused the Debian Bug report #1057790,
regarding linux-image-6.5.0-5-amd64: deadlock on RTL8125 in jumbo mtu mode
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1057790: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057790
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-6.5.0-5-amd64
Version: linux-image-6.5.0-5-amd64
Severity: important

Dear Maintainer,

My RTL8125 NIC stoped working after upgrading the kernel (linux-image-amd64) 
from version 6.5.10+1 to 6.5.13+1.

More specifically, the previous kernel that this meta package depends on 
(package linux-image-6.5.0-4-amd64) worked fine; but the new dependency 
(linux-image-6.5.0-5-amd64) causes my NIC to stop working.

I found this upstream bug report: 
https://bugzilla.kernel.org/show_bug.cgi?id=218187

And I can confirm that I'm also using a jumbo MTU (9000 bytes).

The issue has been fixed in kernel 6.6.5:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/drivers/net/ethernet/realtek?h=v6.6.5=a9ef897677f957401842e45f2006167cdf757ee4

But I'm not sure if kernel 6.5.x will still receive a fix, as it's EOL.

I added below two snippets from the syslog, illustrating the issue.

Cheers, Timo

---

NIC working correctly with kernel version 6.5.10 (Debian 
linux-image-6.5.0-4-amd64):


kernel: [0.00] Linux version 6.5.0-4-amd64 
(debian-kernel@lists.debian.org) (gcc-13 (Debian 13.2.0-6) 13.2.0, GNU ld (GNU 
Binutils for Debian) 2.41) #1 SMP PREEMPT_DYNAMIC Debian 6.5.10-1 (2023-11-03)
(...)
kernel: [0.664766] r8169 :01:00.0: enabling device ( -> 0003)
kernel: [0.664885] r8169 :01:00.0: can't disable ASPM; OS doesn't have 
ASPM control
kernel: [0.684835] r8169 :01:00.0 eth0: RTL8125A, 00:8e:25:70:01:42, 
XID 609, IRQ 126
kernel: [0.684838] r8169 :01:00.0 eth0: jumbo features [frames: 9194 
bytes, tx checksumming: ko]
kernel: [0.687592] r8169 :01:00.0 lan1: renamed from eth0
kernel: [7.581712] r8169 :01:00.0: firmware: direct-loading firmware 
rtl_nic/rtl8125a-3.fw
kernel: [7.607571] RTL8226 2.5Gbps PHY r8169-0-100:00: attached PHY driver 
(mii_bus:phy_addr=r8169-0-100:00, irq=MAC)
kernel: [7.767905] r8169 :01:00.0 lan1: Link is Down
kernel: [   10.175613] r8169 :01:00.0 lan1: Link is Up - 2.5Gbps/Full - 
flow control off

NIC stops working with kernel version 6.5.13 (Debian linux-image-6.5.0-5-amd64):


kernel: [0.00] Linux version 6.5.0-5-amd64 
(debian-kernel@lists.debian.org) (gcc-13 (Debian 13.2.0-7) 13.2.0, GNU ld (GNU 
Binutils for Debian) 2.41) #1 SMP PREEMPT_DYNAMIC Debian 6.5.13-1 (2023-11-29)
(...)
kernel: [0.683111] r8169 :01:00.0: enabling device ( -> 0003)
kernel: [0.683212] r8169 :01:00.0: can't disable ASPM; OS doesn't have 
ASPM control
kernel: [0.701390] r8169 :01:00.0 eth0: RTL8125A, 00:8e:25:70:01:42, 
XID 609, IRQ 125
kernel: [0.701392] r8169 :01:00.0 eth0: jumbo features [frames: 9194 
bytes, tx checksumming: ko]
kernel: [0.704404] r8169 :01:00.0 lan1: renamed from eth0
kernel: [7.473392] r8169 :01:00.0: firmware: direct-loading firmware 
rtl_nic/rtl8125a-3.fw
kernel: [7.499525] RTL8226 2.5Gbps PHY r8169-0-100:00: attached PHY driver 
(mii_bus:phy_addr=r8169-0-100:00, irq=MAC)
kernel: [  242.686979]  rtl_reset_work+0x1bd/0x3b0 [r8169]
kernel: [  242.687002]  r8169_phylink_handler+0x5b/0x240 [r8169]
kernel: [  363.528597]  rtl_reset_work+0x1bd/0x3b0 [r8169]
kernel: [  363.528620]  r8169_phylink_handler+0x5b/0x240 [r8169]
kernel: [  484.363011]  rtl_reset_work+0x1bd/0x3b0 [r8169]
kernel: [  484.363034]  r8169_phylink_handler+0x5b/0x240 [r8169]
kernel: [  605.190516]  rtl_reset_work+0x1bd/0x3b0 [r8169]
kernel: [  605.190538]  r8169_phylink_handler+0x5b/0x240 [r8169]
kernel: [  726.019534]  rtl_reset_work+0x1bd/0x3b0 [r8169]
kernel: [  726.019556]  r8169_phylink_handler+0x5b/0x240 [r8169]
kernel: [  846.848552]  rtl_reset_work+0x1bd/0x3b0 [r8169]
kernel: [  846.848576]  r8169_phylink_handler+0x5b/0x240 [r8169]
kernel: [  967.677539]  rtl_reset_work+0x1bd/0x3b0 [r8169]
kernel: [  967.677562]  r8169_phylink_handler+0x5b/0x240 [r8169]
kernel: [ 1088.506682]  rtl_reset_work+0x1bd/0x3b0 [r8169]
kernel: [ 1088.506705]  r8169_phylink_handler+0x5b/0x240 

Bug#1032104: marked as done (linux: ppc64el iouring corrupted read)

2023-12-09 Thread Debian Bug Tracking System
Your message dated Sat, 09 Dec 2023 17:56:32 +
with message-id 
and subject line Bug#1032104: fixed in linux 6.1.66-1
has caused the Debian Bug report #1032104,
regarding linux: ppc64el iouring corrupted read
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1032104: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032104
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: linux
Version: 5.10.0-21-powerpc64le
Severity: grave
Justification: causes non-serious data loss
X-Debbugs-Cc: dan...@mariadb.org

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
 ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these template lines ***

>From https://jira.mariadb.org/browse/MDEV-30728

MariaDB's mtr tests on a number of specific tests depend on the correct
kernel operation.

As observed in these tests, there is a ~1/5 chance the
encryption.innodb_encryption test will read zeros on the later part of
the 16k pages that InnoDB uses by default.

This affects MariaDB-10.6+ packages where there is a liburing in the
distribution.

This has been observed in the CI of Debian
(https://ci.debian.net/packages/m/mariadb/testing/ppc64el/)
and upstreams https://buildbot.mariadb.org/#/builders/318.
The one ppc64le worker that has the Debian 5.10.0-21 kernel,
the same as the Debian CI, has the prefix ppc64le-db-bbw1-*.

Test faults occur on all MariaDB 10.6+ builds in containers on this kernel.
There a no faults on non-ppc64le or RHEL7/8 based ppc64le kernels.

To reproduce:

apt-get install mariadb-test
cd /usr/share/mysql/mysql-test
./mtr --mysqld=--innodb-flush-method=fsync --mysqld=--innodb-use-native-aio=1 
--vardir=/var/lib/mysql  --force encryption.innodb_encryption,innodb,undo0 
--repeat=12 

A test will frequenty fail.

2023-02-28  1:41:01 0 [ERROR] InnoDB: Database page corruption on disk or a 
failed read of file './ibdata1' page [page id: space=0, page number=282]. You 
may have to recover from a backup.

(the page number isn't predictable)

The complete mtr error log of mariadb server is $PWD/var/log/mysqld.1.err

I tested on tmpfs. This is a different fault from bug #1020831 as:
* there is no iouring error, just a bunch of zeros where data was
  expected.
* this is ppc64le only.

Note, more serious faults exist on overlayfs (MDEV-28751) and remote
filesystems so sticking to local xfs, ext4, btrfs is recommended.

-- System Information:
Debian Release: bullseye
  APT prefers jammy-updates
  APT policy: (500, 'jammy-updates'), (500, 'jammy-security'), (500, 'jammy'), 
(100, 'jammy-backports')
Architecture: ppc64el (ppc64le)

Kernel: Linux 5.10.0-21-powerpc64le (SMP w/128 CPU threads)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: unable to detect
--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.1.66-1
Done: Salvatore Bonaccorso 

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1032...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso  (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 09 Dec 2023 16:48:39 +0100
Source: linux
Architecture: source
Version: 6.1.66-1
Distribution: bookworm
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Closes: 1032104 1057790 1057843
Changes:
 linux (6.1.66-1) bookworm; urgency=medium
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.65
 - afs: Fix afs_server_list to be cleaned up with RCU
 - afs: Make error on cell lookup failure consistent with OpenAFS
 - [arm64,armhf] drm/panel: simple: Fix Innolux G101ICE-L01 bus flags
 - [arm64,armhf] drm/panel: simple: Fix Innolux G101ICE-L01 timings
 - wireguard: use 

Bug#1052304: Debian 6.1 Kernels suspect

2023-12-09 Thread Bill MacAllister

On 2023-12-08 15:59, Diederik de Haas wrote:

On Saturday, 9 December 2023 00:28:50 CET Jeffrey Altman wrote:
The bug is considered valid by upstream.  A proposed fix for this 
issue is

being reviewed.
http://lists.infradead.org/pipermail/linux-afs/2023-December/007408.html
Please leave this issue open until the fix has been back ported into 
the

kernels shipped by Debian.


https://kernel-team.pages.debian.net/kernel-handbook/ch-common-tasks.html#id-1.6.6.4
describes a simple procedure with which one can test patches.
I've attached the above referenced patch and verified that it applies
(cleanly) onto a 6.1 kernel.

Bill: can you test this patch and see if it resolved the issue?


Yes, I can test it.  Mostly likely I will not get to doing that until 
Sunday

night here in California.  For sure Monday morning at the latest.

Bill

--
My heart is warm with the friends I make,
  And better friends I'll not be knowing,
Yet there isn't a train I wouldn't take,
  No matter where it's going.

Edna St Vincent Millay



linux_6.1.66-1_source.changes is NEW

2023-12-09 Thread Debian FTP Masters
Mapping bookworm to stable.
Mapping stable to proposed-updates.
binary:affs-modules-6.1.0-15-4kc-malta-di is NEW.
binary:affs-modules-6.1.0-15-5kc-malta-di is NEW.
binary:affs-modules-6.1.0-15-loongson-3-di is NEW.
binary:affs-modules-6.1.0-15-mips32r2el-di is NEW.
binary:affs-modules-6.1.0-15-mips64r2el-di is NEW.
binary:affs-modules-6.1.0-15-octeon-di is NEW.
binary:ata-modules-6.1.0-15-4kc-malta-di is NEW.
binary:ata-modules-6.1.0-15-5kc-malta-di is NEW.
binary:ata-modules-6.1.0-15-armmp-di is NEW.
binary:ata-modules-6.1.0-15-loongson-3-di is NEW.
binary:ata-modules-6.1.0-15-mips32r2el-di is NEW.
binary:ata-modules-6.1.0-15-mips64r2el-di is NEW.
binary:ata-modules-6.1.0-15-octeon-di is NEW.
binary:ata-modules-6.1.0-15-powerpc64le-di is NEW.
binary:btrfs-modules-6.1.0-15-4kc-malta-di is NEW.
binary:btrfs-modules-6.1.0-15-5kc-malta-di is NEW.
binary:btrfs-modules-6.1.0-15-armmp-di is NEW.
binary:btrfs-modules-6.1.0-15-loongson-3-di is NEW.
binary:btrfs-modules-6.1.0-15-marvell-di is NEW.
binary:btrfs-modules-6.1.0-15-mips32r2el-di is NEW.
binary:btrfs-modules-6.1.0-15-mips64r2el-di is NEW.
binary:btrfs-modules-6.1.0-15-octeon-di is NEW.
binary:btrfs-modules-6.1.0-15-powerpc64le-di is NEW.
binary:btrfs-modules-6.1.0-15-s390x-di is NEW.
binary:cdrom-core-modules-6.1.0-15-4kc-malta-di is NEW.
binary:cdrom-core-modules-6.1.0-15-5kc-malta-di is NEW.
binary:cdrom-core-modules-6.1.0-15-armmp-di is NEW.
binary:cdrom-core-modules-6.1.0-15-loongson-3-di is NEW.
binary:cdrom-core-modules-6.1.0-15-marvell-di is NEW.
binary:cdrom-core-modules-6.1.0-15-mips32r2el-di is NEW.
binary:cdrom-core-modules-6.1.0-15-mips64r2el-di is NEW.
binary:cdrom-core-modules-6.1.0-15-octeon-di is NEW.
binary:cdrom-core-modules-6.1.0-15-powerpc64le-di is NEW.
binary:cdrom-core-modules-6.1.0-15-s390x-di is NEW.
binary:crc-modules-6.1.0-15-4kc-malta-di is NEW.
binary:crc-modules-6.1.0-15-5kc-malta-di is NEW.
binary:crc-modules-6.1.0-15-armmp-di is NEW.
binary:crc-modules-6.1.0-15-loongson-3-di is NEW.
binary:crc-modules-6.1.0-15-marvell-di is NEW.
binary:crc-modules-6.1.0-15-mips32r2el-di is NEW.
binary:crc-modules-6.1.0-15-mips64r2el-di is NEW.
binary:crc-modules-6.1.0-15-octeon-di is NEW.
binary:crc-modules-6.1.0-15-powerpc64le-di is NEW.
binary:crc-modules-6.1.0-15-s390x-di is NEW.
binary:crypto-dm-modules-6.1.0-15-4kc-malta-di is NEW.
binary:crypto-dm-modules-6.1.0-15-5kc-malta-di is NEW.
binary:crypto-dm-modules-6.1.0-15-armmp-di is NEW.
binary:crypto-dm-modules-6.1.0-15-loongson-3-di is NEW.
binary:crypto-dm-modules-6.1.0-15-marvell-di is NEW.
binary:crypto-dm-modules-6.1.0-15-mips32r2el-di is NEW.
binary:crypto-dm-modules-6.1.0-15-mips64r2el-di is NEW.
binary:crypto-dm-modules-6.1.0-15-octeon-di is NEW.
binary:crypto-dm-modules-6.1.0-15-powerpc64le-di is NEW.
binary:crypto-dm-modules-6.1.0-15-s390x-di is NEW.
binary:crypto-modules-6.1.0-15-4kc-malta-di is NEW.
binary:crypto-modules-6.1.0-15-5kc-malta-di is NEW.
binary:crypto-modules-6.1.0-15-armmp-di is NEW.
binary:crypto-modules-6.1.0-15-loongson-3-di is NEW.
binary:crypto-modules-6.1.0-15-marvell-di is NEW.
binary:crypto-modules-6.1.0-15-mips32r2el-di is NEW.
binary:crypto-modules-6.1.0-15-mips64r2el-di is NEW.
binary:crypto-modules-6.1.0-15-octeon-di is NEW.
binary:crypto-modules-6.1.0-15-powerpc64le-di is NEW.
binary:crypto-modules-6.1.0-15-s390x-di is NEW.
binary:dasd-extra-modules-6.1.0-15-s390x-di is NEW.
binary:dasd-modules-6.1.0-15-s390x-di is NEW.
binary:efi-modules-6.1.0-15-armmp-di is NEW.
binary:event-modules-6.1.0-15-4kc-malta-di is NEW.
binary:event-modules-6.1.0-15-5kc-malta-di is NEW.
binary:event-modules-6.1.0-15-armmp-di is NEW.
binary:event-modules-6.1.0-15-loongson-3-di is NEW.
binary:event-modules-6.1.0-15-marvell-di is NEW.
binary:event-modules-6.1.0-15-mips32r2el-di is NEW.
binary:event-modules-6.1.0-15-mips64r2el-di is NEW.
binary:event-modules-6.1.0-15-octeon-di is NEW.
binary:event-modules-6.1.0-15-powerpc64le-di is NEW.
binary:ext4-modules-6.1.0-15-4kc-malta-di is NEW.
binary:ext4-modules-6.1.0-15-5kc-malta-di is NEW.
binary:ext4-modules-6.1.0-15-armmp-di is NEW.
binary:ext4-modules-6.1.0-15-loongson-3-di is NEW.
binary:ext4-modules-6.1.0-15-marvell-di is NEW.
binary:ext4-modules-6.1.0-15-mips32r2el-di is NEW.
binary:ext4-modules-6.1.0-15-mips64r2el-di is NEW.
binary:ext4-modules-6.1.0-15-octeon-di is NEW.
binary:ext4-modules-6.1.0-15-powerpc64le-di is NEW.
binary:ext4-modules-6.1.0-15-s390x-di is NEW.
binary:f2fs-modules-6.1.0-15-4kc-malta-di is NEW.
binary:f2fs-modules-6.1.0-15-5kc-malta-di is NEW.
binary:f2fs-modules-6.1.0-15-armmp-di is NEW.
binary:f2fs-modules-6.1.0-15-loongson-3-di is NEW.
binary:f2fs-modules-6.1.0-15-marvell-di is NEW.
binary:f2fs-modules-6.1.0-15-mips32r2el-di is NEW.
binary:f2fs-modules-6.1.0-15-mips64r2el-di is NEW.
binary:f2fs-modules-6.1.0-15-octeon-di is NEW.
binary:f2fs-modules-6.1.0-15-powerpc64le-di is NEW.
binary:f2fs-modules-6.1.0-15-s390x-di is NEW.
binary:fancontrol-modules-6.1.0-15-powerpc64le-di is NEW.

Processing of linux_6.1.66-1_source.changes

2023-12-09 Thread Debian FTP Masters
linux_6.1.66-1_source.changes uploaded successfully to localhost
along with the files:
  linux_6.1.66-1.dsc
  linux_6.1.66.orig.tar.xz
  linux_6.1.66-1.debian.tar.xz
  linux_6.1.66-1_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Processed: tagging 1057843

2023-12-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 1057843 + pending
Bug #1057843 [src:linux] linux: ext4 data corruption in 6.1.64-1
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1057843: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1057843: linux: ext4 data corruption in 6.1.64-1

2023-12-09 Thread Salvatore Bonaccorso
Hi,

On Sat, Dec 09, 2023 at 03:07:37PM +0100, Salvatore Bonaccorso wrote:
> Source: linux
> Version: 6.1.64-1
> Severity: grave
> Tags: upstream
> Justification: causes non-serious data loss
> X-Debbugs-Cc: debian-rele...@lists.debian.org, car...@debian.org, 
> a...@debian.org
> 
> Hi
> 
> I'm filling this for visibility.
> 
> There might be a ext4 data corruption issue with the kernel released
> in the 12.3 bookworm point release (which is addressed in 6.1.66
> upstream already).
> 
> The report about the regression and some details:
> 
> https://lore.kernel.org/stable/20231205122122.dfhhoaswsfscuhc3@quack3/

6.1.66 upstream fixes the issue:

# uname -a
Linux bookworm-amd64 6.1.0-15-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.66-1 
(2023-12-06) x86_64 GNU/Linux
# LTP_SINGLE_FS_TYPE=ext4 LTP_DEV_FS_TYPE=ext4 ./preadv03_64
tst_device.c:96: TINFO: Found free device 0 '/dev/loop0'
tst_test.c:1690: TINFO: LTP version: 20230929-194-g5c096b2cf
tst_test.c:1574: TINFO: Timeout per run is 0h 00m 30s
tst_supported_fs_types.c:149: TINFO: WARNING: testing only ext4
tst_supported_fs_types.c:90: TINFO: Kernel supports ext4
tst_supported_fs_types.c:55: TINFO: mkfs.ext4 does exist
tst_test.c:1650: TINFO: === Testing on ext4 ===
tst_test.c:1105: TINFO: Formatting /dev/loop0 with ext4 opts='' extra opts=''
mke2fs 1.47.0 (5-Feb-2023)
tst_test.c:1119: TINFO: Mounting /dev/loop0 to /tmp/LTP_preGGYjTj/mntpoint 
fstyp=ext4 flags=0
preadv03.c:102: TINFO: Using block size 512
preadv03.c:87: TPASS: preadv(O_DIRECT) read 512 bytes successfully with content 
'a' expectedly
preadv03.c:87: TPASS: preadv(O_DIRECT) read 512 bytes successfully with content 
'a' expectedly
preadv03.c:87: TPASS: preadv(O_DIRECT) read 512 bytes successfully with content 
'b' expectedly

Summary:
passed   3
failed   0
broken   0
skipped  0
warnings 0

Regards,
Salvatore



Processed: tagging 1057843

2023-12-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 1057843 + fixed-upstream
Bug #1057843 [src:linux] linux: ext4 data corruption in 6.1.64-1
Added tag(s) fixed-upstream.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1057843: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1057843: linux: ext4 data corruption in 6.1.64-1

2023-12-09 Thread Salvatore Bonaccorso
Running the single test with ext4:

# LTP_SINGLE_FS_TYPE=ext4 LTP_DEV_FS_TYPE=ext4 ./preadv03_64
tst_device.c:96: TINFO: Found free device 0 '/dev/loop0'
tst_test.c:1690: TINFO: LTP version: 20230929-194-g5c096b2cf
tst_test.c:1574: TINFO: Timeout per run is 0h 00m 30s
tst_supported_fs_types.c:149: TINFO: WARNING: testing only ext4
tst_supported_fs_types.c:90: TINFO: Kernel supports ext4
tst_supported_fs_types.c:55: TINFO: mkfs.ext4 does exist
tst_test.c:1650: TINFO: === Testing on ext4 ===
tst_test.c:1105: TINFO: Formatting /dev/loop0 with ext4 opts='' extra opts=''
mke2fs 1.47.0 (5-Feb-2023)
tst_test.c:1119: TINFO: Mounting /dev/loop0 to /tmp/LTP_preWBHd7l/mntpoint 
fstyp=ext4 flags=0
preadv03.c:102: TINFO: Using block size 512
preadv03.c:77: TFAIL: Buffer wrong at 0 have 62 expected 61
preadv03.c:77: TFAIL: Buffer wrong at 0 have 62 expected 61
preadv03.c:66: TFAIL: preadv(O_DIRECT) read 0 bytes, expected 512

Summary:
passed   0
failed   3
broken   0
skipped  0
warnings 0



Processed: bug 1057843 is forwarded to https://lore.kernel.org/stable/20231205122122.dfhhoaswsfscuhc3@quack3/

2023-12-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> forwarded 1057843 
> https://lore.kernel.org/stable/20231205122122.dfhhoaswsfscuhc3@quack3/
Bug #1057843 [src:linux] linux: ext4 data corruption in 6.1.64-1
Set Bug forwarded-to-address to 
'https://lore.kernel.org/stable/20231205122122.dfhhoaswsfscuhc3@quack3/'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1057843: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: tagging 1057843

2023-12-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 1057843 + confirmed
Bug #1057843 [src:linux] linux: ext4 data corruption in 6.1.64-1
Added tag(s) confirmed.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1057843: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1057843: linux: ext4 data corruption in 6.1.64-1

2023-12-09 Thread Salvatore Bonaccorso
Source: linux
Version: 6.1.64-1
Severity: grave
Tags: upstream
Justification: causes non-serious data loss
X-Debbugs-Cc: debian-rele...@lists.debian.org, car...@debian.org, 
a...@debian.org

Hi

I'm filling this for visibility.

There might be a ext4 data corruption issue with the kernel released
in the 12.3 bookworm point release (which is addressed in 6.1.66
upstream already).

The report about the regression and some details:

https://lore.kernel.org/stable/20231205122122.dfhhoaswsfscuhc3@quack3/

Regards,
Salvatore



Processed: limit source to linux, tagging 1055649

2023-12-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> limit source linux
Limiting to bugs with field 'source' containing at least one of 'linux'
Limit currently set to 'source':'linux'

> tags 1055649 + pending
Bug #1055649 [linux] linux: Microphone does not work on ThinPad P14s AMD 
(Zen4/Phoenix), fixed by enabling 2 SOC DSP modules
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1055649: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055649
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: limit source to linux, tagging 1050353, tagging 1053187

2023-12-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> limit source linux
Limiting to bugs with field 'source' containing at least one of 'linux'
Limit currently set to 'source':'linux'

> tags 1050353 + pending
Bug #1050353 [src:linux] linux: Enable System Trace Modules and Intel_TH_STH
Added tag(s) pending.
> tags 1053187 + pending
Bug #1053187 [src:linux] linux: Enable Intel's Topology Aware Register and PM 
Capsule Interface (TPMI)
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1050353: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050353
1053187: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053187
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1052304: Debian 6.1 Kernels suspect

2023-12-09 Thread Salvatore Bonaccorso
Hi Jeffrey,

On Fri, Dec 08, 2023 at 06:28:50PM -0500, Jeffrey Altman wrote:
> On Wed, 29 Nov 2023 18:06:23 +0100 Salvatore Bonaccorso  
> wrote:
> > Control: tags -1 + moreinfo
> > 
> > Hi
> > 
> > On Sat, Oct 14, 2023 at 11:31:14PM -0700, Bill MacAllister wrote:
> > > After more testing Jeff Altman and Marc Dionne have reported that
> > > the problem accessing AFS files using kafs does not occur if the
> > > client has IPv6 configured.
> > 
> > Were you able to further track down the issue? I would suggest that
> > once you are able to identify reproduction steps and requirements to
> > have a look with upstream.
> > 
> > But if you were already in contact with Marc Dionne: is the bug
> > considered valid by upstream or should it be closed here?
> > 
> > Regards,
> > Salvatore
> 
> The bug is considered valid by upstream.  A proposed fix for this issue is 
> being reviewed.
> http://lists.infradead.org/pipermail/linux-afs/2023-December/007408.html
> Please leave this issue open until the fix has been back ported into the 
> kernels shipped by Debian.

Perfect thank you. Prequisite is that you make sure that the fix lands
in the currently supported upstream stable series, then we will pick
it up autoamtically up on the next rebases.

Regards,
Salvatore



Processed: found 1052304 in 5.0.1-1~exp1

2023-12-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> found 1052304 5.0.1-1~exp1
Bug #1052304 [src:linux] linux-image-6.1.0-12-amd64: Accessing /afs file system 
causes system hang or crash
Marked as found in versions linux/5.0.1-1~exp1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1052304: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052304
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: bug 1052304 is forwarded to http://lists.infradead.org/pipermail/linux-afs/2023-December/007408.html

2023-12-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> forwarded 1052304 
> http://lists.infradead.org/pipermail/linux-afs/2023-December/007408.html
Bug #1052304 [src:linux] linux-image-6.1.0-12-amd64: Accessing /afs file system 
causes system hang or crash
Set Bug forwarded-to-address to 
'http://lists.infradead.org/pipermail/linux-afs/2023-December/007408.html'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1052304: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052304
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: tagging 1052304, tagging 1052304

2023-12-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 1052304 - moreinfo
Bug #1052304 [src:linux] linux-image-6.1.0-12-amd64: Accessing /afs file system 
causes system hang or crash
Removed tag(s) moreinfo.
> tags 1052304 + upstream
Bug #1052304 [src:linux] linux-image-6.1.0-12-amd64: Accessing /afs file system 
causes system hang or crash
Added tag(s) upstream.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1052304: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052304
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems