Bug#1064976: linux-headers-6.6.13 bpo-amd64 incorrectly depends on the corresponding linux-image-amd64 package

2024-04-02 Thread Colm Buckley
On the other hand, though - creating this dependency *will* break workflows
and cause many unexpected side-effects, as it broke mine last month: I have
linux-headers-cloud-amd64 installed; when this package hit BPO, it brought
in linux-image-cloud-amd64, which grub then tracked as the most recent
kernel and booted into, causing (ironically) many drivers to be missing and
the system failed to boot correctly as a result (it is not a cloud server,
but it does build modules *for* cloud servers). It also brought my /boot to
98% full, fortunately this did not cause problems by itself, but obviously
came close to doing so.

It has been consistently asserted that installing superfluous image files
is harmless; I want to point out that this is anything but true, even aside
from the more philosophical issues around having "source" packages depend
on "binary" ones, and the precise meaning of "significant functionality" in
the Debian policy.

Colm


On Tue, 2 Apr 2024 at 17:57, Colm Buckley  wrote:

> Please explain. I am really sorry to be dragging this discussion out, but
> I honestly think there is some information I'm missing. Please tell me what
> I am missing here? ** PLEASE ** read it before replying; I am honestly not
> trying to undermine you, just point out a serious problem with the apparent
> logic.
>
> Your proposal is to have linux-headers-X depend on linux-image-X.
>
> But:
>
> * User installs linux-image-X and linux-headers-X
> * User builds modules for this image using DKMS or whatever
> * User then does "apt install linux-image-Y" - this is the exact scenario
> you hope to guard against?
> ... nothing brings in linux-headers-Y; the user is *still* left without
> their new modules.
>
> Your proposal will only work if the user remembers to upgrade -headers...
> which will fix the problem even without the dependency!
>
> I fully understand that there is a desire for users to keep linux-image-*
> and linux-headers-* in synch; my proposal is that a *further* package be
> created - linux-complete-VERSION - which depends on both of them. Users who
> have that package installed would always have the right thing happen. To
> encourage adoption, it could be in "Suggests" from each, and maybe even in
> DKMS?
>
> Colm
>
>
> On Tue, 2 Apr 2024 at 17:51, Bastian Blank  wrote:
>
>> On Tue, Apr 02, 2024 at 05:38:01PM +0100, Colm Buckley wrote:
>> > ... but the proposed dependency wouldn't address that, right?
>>
>> Actually it does.  It ties all packages together with = dependencies.
>> For an upgrade, all packages need to be unpacked first and only then the
>> maintainer scripts can run.
>>
>> There are cases where this can be broken, but working most of the time
>> is better then working never.
>>
>> Bastian
>>
>> --
>> Prepare for tomorrow -- get ready.
>> -- Edith Keeler, "The City On the Edge of Forever",
>>stardate unknown
>>
>
>
> --
> Colm Buckley | c...@tuatha.org
>
>

-- 
Colm Buckley | c...@tuatha.org


Bug#1064976: Having headers depend on image - bad idea I think

2024-04-02 Thread Colm Buckley
I wrote:

[...] From the maintainer's most recent comments, I believe that the
> problem is something like:
>
> * user has installed linux-headers and linux-image for kernel version X
> * user has built additional modules using DKMS which are installed into
> the running system
> * user upgrades linux-headers to version Y, new modules get rebuilt
> * user does not upgrade linux-image from X to Y, confusion results
>
> Having linux-image-Y be a dependency of linux-headers-Y does indeed
> address this problem, but [...]
>

The most recent comment (
https://lists.debian.org/debian-kernel/2024/04/msg00020.html) from the
maintainer indicates that he has a slightly different problem in mind:

* user has installed linux-headers and linux-image for version X
* user has built additional modules using DKMS, installed into the running
system
* user upgrades the *kernel image* to version Y but forgets to upgrade the
headers
* as a result, new kernel is missing important modules, confusion reigns

This is a real problem - however I think it is *not* one which the change
in dependency addresses; even if -headers-Y depends on -image-Y, step 3
above will proceed without any conflicts (because the reverse dependency is
not true). I think the only realistic way to address this (assuming we
don't want to make -image depend on -headers) would be to have a
linux-complete (not sold on the name) package series which depends on
corresponding versions of both image and headers packages. Users who
regularly build new modules should be encouraged to install this package
and have it pull in suitable versions of both headers and image.

Is this correct, Bastian? I'm sorry for taking so long to understand what
problem was being addressed here.

Colm


-- 
Colm Buckley | c...@tuatha.org


Bug#1064976: Having headers depend on image - bad idea I think

2024-04-02 Thread Colm Buckley
Control: reopen 1064976

My apologies for the ping-pong; I do want to keep this open until the
discussion has completed. I will set out my thoughts below. I'm afraid this
is fairly long.

A brief history of this issue: in December 2023, the control file for
linux-headers-* was altered to include a dependency on linux-image-* (
https://salsa.debian.org/kernel-team/linux/-/merge_requests/903). As far as
I can tell, no bugreport was linked as a problem being addressed with this
change; the maintainer's comment was "A lot of problems arise if users use
headers of a different version then the associated image. The easiest
solution is to make them depend." Note that this dependency did not exist
in any previous version of linux-headers as far as I can determine; the
problems seem to be largely theoretical.

This change worked its way through the release pipeline and eventually
arrived in bookworm-backports around the end of February 2024, with the
promotion of the package linux-headers-6.6.13+bpo-amd64 (and others) to
backports. I immediately noticed the impact on my build server, and
submitted a bug report (
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064976) requesting that
it be reverted.

The maintainer defended the change, indicating that it was necessary for
people using dkms; when pressed on exactly what failed, he mentioned the
BTF warnings [1] but as far as I can tell, no specific user problem was
presented. Several attempts by myself and Luca Boccassi to determine what
problem was being addressed were not answered.

The bug was closed as WONTFIX a few days ago, but still there has been no
real explanation as to why the change was introduced in the first place. I
would like to go on the record here as saying (especially with the xz-utils
exploit still in everyone's memory), that we should be *extremely careful*
with changing things like dependency trees without very well-documented
reasons, *especially* for something as critical as the kernel packages. I
ordinarily try to be very respectful of maintainers' latitude and
discretion in packaging decisions, but here I am trying to ensure that a
serious problem is addressed in BPO before it gets promoted to stable. The
change is significant enough that I feel it deserves more discussion  and
attention than it has so far received.

Having re-read the thread a few times today, I feel that the BTF warnings
(which were originally presented as the main reason for this change) are a
red herring and not relevant. The new packaging of vmlinux.h does address
the issue of BPF builds for pretty much all users (it's true that build
pipelines will have to be adjusted, but the new system is a significant
improvement on the old). The discussion about BPF kernel modules does not
seem to be based on any real user activity, and to be honest it seems
somewhat self-contradictory - why would a kernel module need BPF in the
first place?

Let's consider the possible reasons for having the header package depend on
the image package:

>From Debian's policy documentation; "The Depends field should be used if
the depended-on package is required for the depending package to provide a
significant amount of functionality." So what functionality is provided by
linux-headers-*? I would posit initially that their main function is
unspecified apart from "having the header files for the specific kernel
exist under /usr/src", which clearly does not require the image package.

However, a major use case for the header files is to build kernel modules,
whether using DKMS or some other mechanism. But this use case *also* does
not require the image package; in fact this is the main reason the header
files were packaged as they are. Hundreds of thousands (at least) of Debian
users have been happily building kernel modules using linux-headers
packages without the corresponding image files for decades, and there are
no recent kernel changes which break this ability. The recent introduction
of vmlinux.h additionally addresses an edge case (building BPF programs)
which formerly *did* require a built image for its symbol table. So the
important piece of functionality also does not require the kernel image
package.

Now, given the maintainer's comments on the original PR and in this bug, I
suspect I understand the real reason for the change: in order to *run*
modules built using DKMS etc., obviously the corresponding kernel image
file needs to be present. From the maintainer's most recent comments, I
believe that the problem is something like:

* user has installed linux-headers and linux-image for kernel version X
* user has built additional modules using DKMS which are installed into the
running system
* user upgrades linux-headers to version Y, new modules get rebuilt
* user does not upgrade linux-image from X to Y, confusion results

Having linux-image-Y be a dependency of linux-headers-Y does indeed address
this problem, but I feel that it is fairly substantial overkill. There are
several 

Bug#1064976: linux-headers-amd64: linux-headers-* incorrectly depends on linux-image-*

2024-03-19 Thread Colm Buckley
Package: linux-headers-amd64
Version: 6.6.13-1~bpo12+1
Followup-For: Bug #1064976
X-Debbugs-Cc: c...@tuatha.org

Can I suggest in the interim that Depends: be replaced with Recommends:
or Suggests: given that most installations won't actually need the image
package?

Colm



Bug#1064976:

2024-03-14 Thread Colm Buckley
Hey folks -

I see that linux-headers-* has been promoted to 6.6 in the BPO channel, but
this dependency is still in place.
Is it really the case that we want to drag in the image binaries and other
machinery as a dependency for a source package like linux-headers.
I feel that the BPF use case should really be addressed using vmlinux.h
(the "skipping BTF generation" message should be ignored as all of this
information *should* be included in vmlinux.h).
Any further thoughts?

Colm


Bug#1064976: linux-headers-6.6.13+bpo-amd64 incorrectly depends on the corresponding linux-image-amd64 package

2024-03-04 Thread Colm Buckley
As per the discussion in
https://salsa.debian.org/kernel-team/linux/-/merge_requests/1005 - once
vmlinux.h is included with linux-headers, the warning about cmd_btf_ko etc.
should be harmless, as that file should already be available (ie: there's
no need to generate it again as part of kernel build). Am I missing
something else? I confess I have only a very small amount of experience
with BPF code; I played with building a few modules, but I don't use it
regularly.

Colm


Bug#1064976: linux-headers-6.6.13+bpo-amd64 incorrectly depends on the corresponding linux-image-amd64 package

2024-02-29 Thread Colm Buckley
On Thu, 29 Feb 2024 13:38:12 +0100 Bastian Blank  wrote:
> On Thu, Feb 29, 2024 at 12:12:21PM +, Luca Boccassi wrote:
> > With the new vmlinux.h shipped in the headers package, the BTF case
> > should be covered.
>
> The relevant code in Linux is:
>
> | quiet_cmd_btf_ko = BTF [M] $@
> |   cmd_btf_ko =
 \
> | if [ ! -f vmlinux ]; then
\
> | printf "Skipping BTF generation for %s due to
unavailability of vmlinux\n" $@ 1>&2; \
> | else
 \
> | LLVM_OBJCOPY="$(OBJCOPY)" $(PAHOLE) -J $(PAHOLE_FLAGS)
--btf_base vmlinux $@; \
> | $(RESOLVE_BTFIDS) -b vmlinux $@;
 \
> | fi;
>
> Which change is needed here to use vmlinux.h instead?

My understanding is that you don't need this command at all; the included
vmlinux.h already contains the necessary type definitions for libbpf, for
the kernel source version in question - ie: instead of needing to run
pahole or bpftool to extract these definitions from a specific vmlinux
image, this file is distributed with them already included.


Colm


Bug#1064976: linux-headers-6.6.13+bpo-amd64 incorrectly depends on the corresponding linux-image-amd64 package

2024-02-29 Thread Colm Buckley
> The build wants the image available (it does not really fail without, but
lacks stuff) and we need some dependency to keep image and headers in sync
for people using dkms.

To be honest, "it does not really fail without, but lacks stuff" seems like
the use case that "Recommends:" (or even "Suggests:") was designed for,
rather than "Depends:", don't you agree?

I'm not sure, of course, what problem is being addressed here; it's
possible that there's a more elegant solution available. Is there a
previous bug describing the problem?

My concern is that I have a specific build server which builds kernels and
modules for other machines in a farm. It needs to have the header files for
specific target kernel versions installed, but it is not sensible to have
the corresponding image packages installed (in many cases, those images
wouldn't even run on this build server).

    Colm


On Thu 29 Feb 2024, 11:03 Colm Buckley,  wrote:

> Why was this never the case before? And can you be more precise about what
> "stuff" is missing? Is there a previous bug report I can reference?
>
> DKMS should handle its own dependencies, I'd have thought - I see a clear
> use case for installing header files without the corresponding images.
>
> Colm
>
>
> On Thu 29 Feb 2024, 10:31 Bastian Blank,  wrote:
>
>> Control: tags -1 wontfix
>>
>> On Wed, Feb 28, 2024 at 05:19:39PM +, Colm Buckley wrote:
>> > The linux-headers packages for kernel version 6.6 seem to depend on the
>> corresponding
>> > linux-image packages, but I believe that this should not be the case
>> (and was not the
>> > case in previous versions).
>>
>> It should.  The build wants the image available (it does not really fail
>> without, but lacks stuff) and we need some dependency to keep image and
>> headers in sync for people using dkms.
>>
>> Bastian
>>
>> --
>> Vulcans never bluff.
>> -- Spock, "The Doomsday Machine", stardate 4202.1
>>
>


Bug#1064976: linux-headers-6.6.13+bpo-amd64 incorrectly depends on the corresponding linux-image-amd64 package

2024-02-29 Thread Colm Buckley
Why was this never the case before? And can you be more precise about what
"stuff" is missing? Is there a previous bug report I can reference?

DKMS should handle its own dependencies, I'd have thought - I see a clear
use case for installing header files without the corresponding images.

Colm


On Thu 29 Feb 2024, 10:31 Bastian Blank,  wrote:

> Control: tags -1 wontfix
>
> On Wed, Feb 28, 2024 at 05:19:39PM +, Colm Buckley wrote:
> > The linux-headers packages for kernel version 6.6 seem to depend on the
> corresponding
> > linux-image packages, but I believe that this should not be the case
> (and was not the
> > case in previous versions).
>
> It should.  The build wants the image available (it does not really fail
> without, but lacks stuff) and we need some dependency to keep image and
> headers in sync for people using dkms.
>
> Bastian
>
> --
> Vulcans never bluff.
> -- Spock, "The Doomsday Machine", stardate 4202.1
>


Bug#1064976: linux-headers-6.6.13+bpo-amd64 incorrectly depends on the corresponding linux-image-amd64 package

2024-02-28 Thread Colm Buckley
Some previous versions, for contrast:

% apt-cache depends linux-headers-6.5.0-0.deb12.4-amd64
linux-headers-6.5.0-0.deb12.4-amd64
  Depends: linux-headers-6.5.0-0.deb12.4-common
  Depends: linux-kbuild-6.5.0-0.deb12.4
  Depends: linux-compiler-gcc-12-x86

% apt-cache depends linux-headers-6.1.0-18-amd64
linux-headers-6.1.0-18-amd64
  Depends: linux-headers-6.1.0-18-common
  Depends: linux-kbuild-6.1
  Depends: linux-compiler-gcc-12-x86


Bug#1064976: linux-headers-6.6.13+bpo-amd64 incorrectly depends on the corresponding linux-image-amd64 package

2024-02-28 Thread Colm Buckley
Package: linux-headers-6.6.13+bpo-amd64
Severity: normal
X-Debbugs-Cc: c...@tuatha.org

Dear Maintainer,

The linux-headers packages for kernel version 6.6 seem to depend on the 
corresponding
linux-image packages, but I believe that this should not be the case (and was 
not the
case in previous versions). It should be possible to install the header files 
for
a particular kernel version (eg: to allow for modules to be built for that 
version,
which is my use case) without requiring the kernel image to be installed.

I think the headers packages should depend on a suitable version of 
linux-kbuild and
any necessary glibc headers or other build artifacts, but not on linux-image-*

Many thanks,

Colm

-- System Information:
Debian Release: 12.5
  APT prefers stable-updates
  APT policy: (900, 'stable-updates'), (900, 'stable-security'), (900, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.5.0-0.deb12.4-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages linux-headers-6.6.13+bpo-amd64 depends on:
ii  gcc-1212.2.0-14
pn  linux-headers-6.6.13+bpo-common   
pn  linux-image-6.6.13+bpo-amd64 | linux-image-6.6.13+bpo-amd64-unsi  
gned
pn  linux-kbuild-6.6.13+bpo   

linux-headers-6.6.13+bpo-amd64 recommends no packages.

linux-headers-6.6.13+bpo-amd64 suggests no packages.



Bug#1038155: [Pkg-zfsonlinux-devel] Bug#1038155: Bug#1038155: zfs-linux: Provide a package based on OpenZFS master branch (a.k.a. 2.1.99)

2023-08-08 Thread Colm Buckley
I *really* don't think we should be pushing RC versions of ZFS (or any
other project) to the mainline Debian distributions. Using a kernel from
"unstable" has always been risky, and in this case one of the risks is that
ZFS will not work.

Maintainer bandwidth is a limited resource, and I would vastly prefer that
time be spent on ensuring the stability and reliability of the "stable"
release, with the second priority being a reasonable set of updates being
available in "backports".

Zhou and the gang do a great job in keeping things up to date; I wouldn't
view it as their responsibility to deal with breakages in unstable, unless
there's some other compelling reason.

My personal preference, assuming maintainer time is available, would be to
continue to offer 2.1.X in stable, and 2.2.X in backports when 2.2.0 is
released (as opposed to being RC).

Colm


On Tue, 8 Aug 2023 at 12:09, Peter Samuelson  wrote:

>
> [M. Zhou]
> > I'd personally not prefer to upload zfs-X.Y.99 anytime in the future.
> > Since debian is volunteer-based, we don't seem to have more bandwidth
> > than Ubuntu for dealing with regressions and serious bugs in a
> > snapshot version.
>
> That's fair - but now that Linux 6.4 is in unstable, zfs-dkms is no
> longer supported and will not build.  For that reason, could you update
> to 2.2.0-rc3?
>
> Peter
>
> ___
> Pkg-zfsonlinux-devel mailing list
> pkg-zfsonlinux-de...@alioth-lists.debian.net
>
> https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-zfsonlinux-devel
>


-- 
Colm Buckley | c...@tuatha.org


Bug#989046: libcurl3-gnutls: Please consider packaging 7.76.1

2021-05-24 Thread Colm Buckley
Package: libcurl3-gnutls
Version: 7.74.0-1.2~bpo10+1
Severity: important

Dear Maintainer,

This bug - https://github.com/curl/curl/issues/6825 - is possibly the
underlying cause of #831756 and #987187. Given the importance of
the git workflow in particular, I'd like to request that you consider
packaging 7.76.1 (which fixes this issue) for buster-bpo.

The stable version does not seem to suffer from this problem.

Thanks,

Colm

-- System Information:
Debian Release: 10.9
  APT prefers stable-updates
  APT policy: (900, 'stable-updates'), (900, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.10.0-0.bpo.5-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_IE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages libcurl3-gnutls depends on:
ii  libbrotli11.0.7-2+deb10u1
ii  libc6 2.28-10
ii  libcom-err2   1.46.2-1~bpo10+2
ii  libgnutls30   3.6.7-4+deb10u6
ii  libgssapi-krb5-2  1.17-3+deb10u1
ii  libidn2-0 2.0.5-1+deb10u1
ii  libk5crypto3  1.17-3+deb10u1
ii  libkrb5-3 1.17-3+deb10u1
ii  libldap-2.4-2 2.4.57+dfsg-2~bpo10+1
ii  libnettle63.4.1-1
ii  libnghttp2-14 1.36.0-2+deb10u1
ii  libpsl5   0.20.2-2
ii  librtmp1  2.4+20151223.gitfa8646d.1-2
ii  libssh2-1 1.8.0-2.1
ii  zlib1g1:1.2.11.dfsg-1

Versions of packages libcurl3-gnutls recommends:
ii  ca-certificates  20200601~deb10u2

libcurl3-gnutls suggests no packages.

-- no debconf information



Bug#983409: raspi-firmware: /etc/kernel/postinst.d/z50-raspi-firmware fails to ignore old-dkms initrds

2021-02-23 Thread Colm Buckley
Package: raspi-firmware
Version: 1.20200601-3~bpo10+1
Severity: normal
Tags: patch

Dear Maintainer,

The /etc/kernel/postinst.d/z50-raspi-firmware script which copies the kernel
and initrd to /boot/firmware, fails to ignore any old initrds which were renamed
by DKMS (usually of the form initrd.img-version-arch.old-dkms). These usually 
compare
as "newer" than the correct initrd, so lead to incorrect config.txt contents and
possible boot failure.

I'd suggest modifying this script as below; summarized as:

  # move this line to earlier in the script
  arch=$(dpkg --print-architecture)

  latest_kernel=$(ls -1 /boot/vmlinuz-*$arch | sort -V -r | head -1)
  [...]
  latest_initrd=$(ls -1 /boot/initrd.img-*$arch | sort -V -r | head -1)

- ie: looking specifically for kernels and initrds which end in the current
architecture name.

Not sure if this needs to go upstream. I suspect that the kernel and initrd
detection in this script could use a real reworking, see also bug #966503.

Thanks,

Colm


-- System Information:
Debian Release: 10.8
  APT prefers stable-updates
  APT policy: (900, 'stable-updates'), (900, 'stable')
Architecture: arm64 (aarch64)

Kernel: Linux 5.9.0-0.bpo.5-arm64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_CRAP, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_IE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages raspi-firmware depends on:
ii  dosfstools  4.1-2
ii  dpkg1.19.7

raspi-firmware recommends no packages.

raspi-firmware suggests no packages.

-- Configuration Files:
/etc/kernel/postinst.d/z50-raspi-firmware changed:
set -e
exec &2
eval set -- "$DEB_MAINT_PARAMS"
case "$1" in
  configure|remove)
;;
  *)
exit 0
;;
esac
if ischroot ; then
  true # chroot detected - skip mount point check
elif test -e /usr/bin/systemd-detect-virt && systemd-detect-virt -q ; then
  true # virtualization detected - skip mount point check
elif ! mountpoint -q /boot/firmware; then
  echo "raspi-firmware: missing /boot/firmware, did you forget to mount it?" >&2
  exit 1
fi
mkdir -p /boot/firmware
arch=$(dpkg --print-architecture)
latest_kernel=$(ls -1 /boot/vmlinuz-*$arch | sort -V -r | head -1)
if [ -z "$latest_kernel" ]; then
  echo "raspi-firmware: no kernel found in /boot/vmlinuz-*$arch, cannot 
populate /boot/firmware"
  exit 0
fi
latest_initrd=$(ls -1 /boot/initrd.img-*$arch | sort -V -r | head -1)
if [ -z "$latest_initrd" ]; then
  echo "raspi-firmware: no initrd found in /boot/initrd.img-*$arch, cannot 
populate /boot/firmware"
  exit 0
fi
CMA=64M
ROOTPART=$(findmnt -n --output=source /) || true
if [ -z "$ROOTPART" ]; then ROOTPART=/dev/mmcblk0p2;fi
KERNEL="auto"
INITRAMFS="auto"
CONSOLES="auto"
if [ -r /etc/default/raspi-firmware ]; then
. /etc/default/raspi-firmware
fi
if [ "arm64" = "$arch" ]; then
  dtb_path="/usr/lib/linux-image-${latest_kernel#/boot/vmlinuz-}/broadcom"
else
  # there is no vendor subdirectory for armhf
  dtb_path="/usr/lib/linux-image-${latest_kernel#/boot/vmlinuz-}"
fi
if [ "$KERNEL" = "auto" ]; then
  for dtb in ${dtb_path}/bcm*.dtb; do
[ -e "${dtb}" ] && cp "${dtb}" /boot/firmware/
  done
  latest_kernel_basename=$(basename "$latest_kernel")
  latest_initrd_basename=$(basename "$latest_initrd")
  KERNEL=${latest_kernel_basename}
  cp "$latest_kernel" /boot/firmware/
  cp "$latest_initrd" /boot/firmware/
  if [ "$CONSOLES" = "auto" ]; then
  serial="ttyS1,115200"
  fi
fi
: >/boot/firmware/config.txt
if [ "$arch" = "arm64" ]; then
  cat >/boot/firmware/config.txt <>/boot/firmware/config.txt <>/boot/firmware/config.txt <>/boot/firmware/config.txt 

Bug#982505: [Pkg-zfsonlinux-devel] Bug#982505: Bug#982505: zfsutils-linux: trim cronjob triggers "cannot trim" e-mails on spinning rust

2021-02-11 Thread Colm Buckley
I did have a quick look in the zpool trim code and it's a bit difficult to
achieve what is being suggested; that error is generated deep in libzfs not
in the mainline of the zpool command, so capturing it or declaring it
not-an-error with a flag would not be super clean. It's possible, but it
might not be quick.

Short-term fix; parse the output of 'zpool status -t' to figure out if any
devices support trim and only trim when there's at least one which does;
something like:

zpool status -tLP "$pool" | fgrep /dev/ | fgrep -qv 'trim unsupported' &&
zpool trim "$pool"

... but there might be corner cases which this doesn't catch.

Colm



On Thu, 11 Feb 2021 at 17:45, Christoph Biedl <
debian.a...@manchmal.in-ulm.de> wrote:

> Petter Reinholdtsen wrote...
>
> > Any idea how to figure out if trimming is possible/useful?
>
> Haven't checked, but in the meantime I figured a sane solution was
> something like Colm suggested: Have upstream modifiy the zpool command
> so - at least when providing an option like "--cron-mode" - it is silent
> as long as there is no error, and it considers that particular situation
> not an error. Then you could also remove the "|| true" again which has
> potential of hiding errors where it should not.
>
> Christoph
> ___
> Pkg-zfsonlinux-devel mailing list
> pkg-zfsonlinux-de...@alioth-lists.debian.net
>
> https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-zfsonlinux-devel



-- 
Colm Buckley | c...@tuatha.org


Bug#982505: [Pkg-zfsonlinux-devel] Bug#982505: Bug#982505: zfsutils-linux: trim cronjob triggers "cannot trim" e-mails on spinning rust

2021-02-11 Thread Colm Buckley
To be honest, I'd rather this was addressed upstream with a suitable
modification of the "zpool trim" command; either by ignoring this case by
default (I believe this was the behavior in ZoL <2.0) or by adding a
"--quiet" flag or similar.

'zpool status -t pool' does report whether TRIM is supported for each vdev,
but the effort of parsing that in the cron script seems excessive. Grepping
out that specific error message would probably be okay as an interim
workaround.

Colm


On Thu, 11 Feb 2021 at 10:03, Petter Reinholdtsen  wrote:

> [Christoph Biedl]
> > Please find a solution for this - preferably by checking beforehand
> > whether trimming is possible. Or if all else fails, by muting stderr
> > from the "zpool trim" command. Although that might hide serious errors
> > as well.
>
> Good point.  This can fill up the disk on a server where no-one check
> the email.
>
> Any idea how to figure out if trimming is possible/useful?
>
> --
> Happy hacking
> Petter Reinholdtsen
>
> ___
> Pkg-zfsonlinux-devel mailing list
> pkg-zfsonlinux-de...@alioth-lists.debian.net
>
> https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-zfsonlinux-devel



-- 
Colm Buckley | c...@tuatha.org


Bug#969599: systemd: Valid IPv6 addresses and routes discarded erroneously under certain conditions.

2020-09-07 Thread Colm Buckley
Package: systemd
Version: 246.4-1~bpo10+1
Followup-For: Bug #969599

Hey folks -

I had a productive conversation with one of the upstream authors at 
https://github.com/systemd/systemd/issues/16719;
we think we have found the root cause of this issue. A new version of the 
upstream PR is being merged and (we hope)
will be backported to 246-stable. Hopefully Debian can then integrate it.

If it is causing significant issues in the meantime, the commits badd492, 
99a2878, 501b09d and 5055072 referenced at
https://github.com/systemd/systemd/pull/16725 patch cleanly against the current 
debian-bpo source and result in a
corrected package.

Thanks for your help!

Colm



Bug#969599: Info received (Bug#969599: systemd: Valid IPv6 addresses and routes discarded erroneously under certain conditions.)

2020-09-05 Thread Colm Buckley
The PR referenced earlier does ameliorate the issue; however I don't think
it's a complete fix, as there are worrying messages in the debug log, and
there is still nonzero packet loss. I will follow up with upstream.

I would encourage Debian users to remain with systemd 245, and not to
migrate this version to stable, until this issue is resolved.

Colm


Bug#969599: systemd: Valid IPv6 addresses and routes discarded erroneously under certain conditions.

2020-09-05 Thread Colm Buckley
That PR patches cleanly against the Debian source; so I'm building a local
package version now to test.

Will follow up here and with upstream.

Colm


On Sat, 5 Sep 2020 at 20:48, Michael Biebl  wrote:

> Am 05.09.20 um 21:31 schrieb Colm Buckley:
> > Package: systemd
> > Version: 246.4-1~bpo10+1
> > Severity: important
> > Tags: ipv6
> >
> > Dear Maintainer,
>
>
>
> >
>
>
>
> > The current BPO release of systemd includes a serious regression; valid
> SLAAC v6 addresses and routes
>
>
> > are discarded under certain circumstances. I believe this to be an
> instance of
>
>
> > https://github.com/systemd/systemd/issues/16719 which is possibly fixed
> by https://github.com/systemd/systemd/pull/16725
>
>
> >
>
>
>
> > The user-visible symptom is that the systems stop responding on their
> SLAAC-configured v6 addresses until the link
>
>
> > is next reconfigured; some time later they drop these addresses again.
>
>
>
> >
>
>
>
> > An extract from the debug log from systemd-networkd follows: note in
> particular the "Removing address" and "Forgetting address"
>
>
> > lines in the log.
>
>
>
> >
>
>
>
> > I think that pull/16725 should be cherry-picked into Debian as soon as
> possible.
>
>
>
> Thanks for the bug report.
> Could you test the pull request and verify that this fixes your issue
> (and ideally also report back to the upstream bug report).
> Once the PR is merged upstream, we can consider cherry-picking it.
>
> Michael
>
>

-- 
Colm Buckley | c...@tuatha.org


Bug#969599: systemd: Valid IPv6 addresses and routes discarded erroneously under certain conditions.

2020-09-05 Thread Colm Buckley
Package: systemd
Version: 246.4-1~bpo10+1
Severity: important
Tags: ipv6

Dear Maintainer,

  


  
The current BPO release of systemd includes a serious regression; valid SLAAC 
v6 addresses and routes 

are discarded under certain circumstances. I believe this to be an instance of  

  
https://github.com/systemd/systemd/issues/16719 which is possibly fixed by 
https://github.com/systemd/systemd/pull/16725   
   


  
The user-visible symptom is that the systems stop responding on their 
SLAAC-configured v6 addresses until the link

is next reconfigured; some time later they drop these addresses again.  

  


  
An extract from the debug log from systemd-networkd follows: note in particular 
the "Removing address" and "Forgetting address" 
  
lines in the log.   

  


  
I think that pull/16725 should be cherry-picked into Debian as soon as 
possible.   
   


  
Thanks, 

  


  
 Colm   

  


  


  
Sep 05 20:23:13 lugh systemd-networkd[1148]: NDISC: Received Router 
Advertisement: flags none preference medium lifetime 0 sec  
  
Sep 05 20:23:13 lugh systemd-networkd[1148]: NDISC: Invoking callback for 
'router' event. 

Sep 05 20:23:13 lugh systemd-networkd[1148]: int0: Configuring route: dst: 
fd79:b3fc:4a5b:1::/64, src: n/a, gw: 

Bug#940646: [Pkg-utopia-maintainers] Bug#940646: Bug#940646: firewalld: Please consider shipping 0.7.1+ in buster-backports.

2020-01-24 Thread Colm Buckley
I see 0.8.1 in buster-bpo now. Thank you!


Bug#940646: [Pkg-utopia-maintainers] Bug#940646: Bug#940646: firewalld: Please consider shipping 0.7.1+ in buster-backports.

2019-11-20 Thread Colm Buckley
Oh, and to be clear, the process is rarely any more complex than "apt-get
source firewalld/testing" and "dpkg-buildpackage". firewalld's dependencies
are small and slow-changing, at the moment stable-bpo contains all
necessary versions for firewalld/testing.

Colm


On Wed, Nov 20, 2019 at 8:05 PM Colm Buckley  wrote:

> I configure it using the command line; I have found some of the new
> features and bugfixes in 0.7 to be useful for my setup, so I've been
> building a samizdat 0.7.2 package myself, which "seems to work". However, I
> only install firewalld_xxx.deb, not firewall-applet_xxx nor
> firewall-config_xxx
>
> Colm
>
>
> On Wed, Nov 20, 2019 at 8:00 PM Michael Biebl  wrote:
>
>> Am 20.11.19 um 20:57 schrieb Colm Buckley:
>> > Hum. I can validate the operations of firewalld itself, but I don't use
>> > either the applet or the config package.
>>
>> How exactly do you intend to use the bpo package then?
>>
>>
>> --
>> Why is it that all of the instruments seeking intelligent life in the
>> universe are pointed away from Earth?
>>
>>
>
> --
> Colm Buckley / c...@tuatha.org / +353 87 2469146
>


-- 
Colm Buckley / c...@tuatha.org / +353 87 2469146


Bug#940646: [Pkg-utopia-maintainers] Bug#940646: Bug#940646: firewalld: Please consider shipping 0.7.1+ in buster-backports.

2019-11-20 Thread Colm Buckley
I configure it using the command line; I have found some of the new
features and bugfixes in 0.7 to be useful for my setup, so I've been
building a samizdat 0.7.2 package myself, which "seems to work". However, I
only install firewalld_xxx.deb, not firewall-applet_xxx nor
firewall-config_xxx

Colm


On Wed, Nov 20, 2019 at 8:00 PM Michael Biebl  wrote:

> Am 20.11.19 um 20:57 schrieb Colm Buckley:
> > Hum. I can validate the operations of firewalld itself, but I don't use
> > either the applet or the config package.
>
> How exactly do you intend to use the bpo package then?
>
>
> --
> Why is it that all of the instruments seeking intelligent life in the
> universe are pointed away from Earth?
>
>

-- 
Colm Buckley / c...@tuatha.org / +353 87 2469146


Bug#940646: [Pkg-utopia-maintainers] Bug#940646: Bug#940646: firewalld: Please consider shipping 0.7.1+ in buster-backports.

2019-11-20 Thread Colm Buckley
Hum. I can validate the operations of firewalld itself, but I don't use
either the applet or the config package.

Colm


On Wed, Nov 20, 2019 at 6:55 PM Michael Biebl  wrote:

> Am 20.11.19 um 19:45 schrieb Colm Buckley:
> > I feel that the answer is both yes and no. The *packaging* is trivial in
> > my experience - the dependencies of firewalld are fairly
> > small/manageable, and 0.7.2 *seems* to work fine with everything in
> > stable-bpo. However, I have no experience with running Debian test
> > suites and ensuring that all the details are taken care of.
>
> I have added autopkgtest support which does some very basic testing.
> What I probably won't do is "real-world" testing, say installing the bpo
> package in GNOME, check the UI, basic functionality etc.
>
>
> --
> Why is it that all of the instruments seeking intelligent life in the
> universe are pointed away from Earth?
>
>

-- 
Colm Buckley / c...@tuatha.org / +353 87 2469146


Bug#940646: [Pkg-utopia-maintainers] Bug#940646: firewalld: Please consider shipping 0.7.1+ in buster-backports.

2019-11-20 Thread Colm Buckley
I feel that the answer is both yes and no. The *packaging* is trivial in my
experience - the dependencies of firewalld are fairly small/manageable, and
0.7.2 *seems* to work fine with everything in stable-bpo. However, I have
no experience with running Debian test suites and ensuring that all the
details are taken care of.

Colm


On Wed, Nov 20, 2019 at 6:36 PM Michael Biebl  wrote:

> Am 20.11.19 um 19:24 schrieb Colm Buckley:
> > @biebl - looks as though stable-bpo's nftables package tracks upstream
> > pretty closely; if https://github.com/firewalld/firewalld/issues/540 is
> > resolved, would you consider looking at packaging 0.8.0 for backports?
>
> I'm not really sure if I can commit to that. I would need help with
> packaging and testing.
>
> Would you be willing to help here?
>
>
> --
> Why is it that all of the instruments seeking intelligent life in the
> universe are pointed away from Earth?
>
>

-- 
Colm Buckley / c...@tuatha.org / +353 87 2469146


Bug#940646: firewalld: Please consider shipping 0.7.1+ in buster-backports.

2019-11-20 Thread Colm Buckley
@biebl - looks as though stable-bpo's nftables package tracks upstream
pretty closely; if https://github.com/firewalld/firewalld/issues/540 is
resolved, would you consider looking at packaging 0.8.0 for backports?


Bug#695885: Fixed in upstream

2019-10-23 Thread Colm Buckley
Gerhard tells me that this is fixed in the latest upstream version -
1.7.3.3.

Can this be packaged for Debian shortly? I can look into an NMU if
necessary.

Colm


-- 
Colm Buckley / c...@tuatha.org / +353 87 2469146


Bug#940646: firewalld: Please consider shipping 0.7.1+ in buster-backports.

2019-09-18 Thread Colm Buckley
Package: firewalld
Version: 0.7.1-1
Severity: wishlist

Dear Maintainer,

firewalld 0.7 introduces sufficient new capabilities that it would be great to 
see
it more widely available in the stable distribution. I would like to suggest
that it be added to buster-backports.

It does not appear to have any version conflicts with the dependencies shipped 
in
buster; hopefully there is no significant work involved here.

Let me know what you think.

Thanks.



Bug#939200: linux-image-5.2.0-2-amd64: M.2 I210 Ethernet adapter (igb) suddenly very high latency with kernel 5.2

2019-09-02 Thread Colm Buckley
Package: src:linux
Version: 5.2.9-2
Severity: normal

Dear Maintainer,

This system is an Intel NUC with an onboard Intel I219-LM
Ethernet adapter (e1000e) and an additional dual Intel I210
Ethernet adapter (igb) connected via the onboard M.2 interface
(M.2 Dual Ethernet supplied by G2 Digital; I suspect but cannot
confirm that this is an Innodisk EGPL-G201 card.) The only
out-of-tree kernel modules are from the ZFSonLinux subsystem.

As configured on this system, the e1000e interface is eno1, and
the two igb interfaces are dmz0 (renamed from enp3s0) and enp4s0.

Under kernel 4.19.0-5, the latency experienced from the
igb interfaces to the local LAN was what one would expect -
generally in the 0.1 to 0.5ms range.

Under kernel 5.2.0-2, the latency on these interfaces has jumped
to the 60-600ms range (variable, but consistently very high).
The I219 (e1000e) interface's latency seems unaffected.

Flood-pinging this system from a third system seems to reduce
the average latency by about half.

The only change was installing the 5.2.0-2 kernel and rebooting.
The former latency is recoverable by rebooting into 4.19.0.

Can I supply any additional system information?

-- Package-specific info:
** Version:
Linux version 5.2.0-2-amd64 (debian-ker...@lists.debian.org) (gcc version 8.3.0 
(Debian 8.3.0-21)) #1 SMP Debian 5.2.9-2 (2019-08-21)

** Command line:
BOOT_IMAGE=/rootfs@/boot/vmlinuz-5.2.0-2-amd64 root=ZFS=bootdisk/rootfs ro

** Tainted: POE (12289)
 * Proprietary module has been loaded.
 * Out-of-tree module has been loaded.
 * Unsigned module has been loaded.

** Kernel log:
[3.665372] usb 1-5: SerialNumber: G114J52310
[3.671046] hidraw: raw HID events driver (C) Jiri Kosina
[3.797133] usb 1-7: new low-speed USB device number 4 using xhci_hcd
[3.956891] usb 1-7: New USB device found, idVendor=258a, idProduct=0001, 
bcdDevice= 1.00
[3.958061] usb 1-7: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[3.959226] usb 1-7: Product: USB KEYBOARD
[3.960390] usb 1-7: Manufacturer: SINO WEALTH
[4.774833] ZFS: Loaded module v0.8.1-4, ZFS pool version 5000, ZFS 
filesystem version 5
[5.568481] usbcore: registered new interface driver usbhid
[5.571097] usbhid: USB HID core driver
[5.593534] Not activating Mandatory Access Control as /sbin/tomoyo-init 
does not exist.
[5.743963] systemd[1]: Inserted module 'autofs4'
[5.831962] systemd[1]: systemd 242 running in system mode. (+PAM +AUDIT 
+SELINUX +IMA +APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS 
+ACL +XZ +LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD +IDN2 -IDN +PCRE2 
default-hierarchy=hybrid)
[5.853427] systemd[1]: Detected architecture x86-64.
[5.860395] systemd[1]: Set hostname to .
[5.862534] systemd[1]: Failed to bump fs.file-max, ignoring: Invalid 
argument
[6.103727] systemd-crontab-generator[485]: ignoring /etc/cron.d/certbot 
because native timer is present
[6.187978] systemd[1]: /lib/systemd/system/nut-monitor.service:6: PIDFile= 
references a path below legacy directory /var/run/, updating 
/var/run/nut/upsmon.pid \xe2\x86\x92 /run/nut/upsmon.pid; please update the 
unit file accordingly.
[6.208892] systemd[1]: /lib/systemd/system/dbus.socket:4: ListenStream= 
references a path below legacy directory /var/run/, updating 
/var/run/dbus/system_bus_socket \xe2\x86\x92 /run/dbus/system_bus_socket; 
please update the unit file accordingly.
[6.211950] systemd[1]: Listening on udev Control Socket.
[6.213843] systemd[1]: Listening on Journal Audit Socket.
[6.216240] systemd[1]: Created slice User and Session Slice.
[6.218313] systemd[1]: 
Listening on Network Service Netlink Socket.
[6.241553] Ethernet Channel Bonding Driver: v3.7.1 (April 27, 2011)
[6.376795] input: Sleep Button as 
/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input0
[6.380006] ACPI: Sleep Button [SLPB]
[6.381971] input: Power Button as 
/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input1
[6.381979] ACPI: Power Button [PWRB]
[6.382022] input: Power Button as 
/devices/LNXSYSTM:00/LNXPWRBN:00/input/input2
[6.382030] ACPI: Power Button [PWRF]
[6.403896] systemd-journald[509]: Received request to flush runtime journal 
from PID 1
[6.423680] EFI Variables Facility v0.08 2004-May-17
[6.428676] tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1A, rev-id 16)
[6.466288] input: PC Speaker as /devices/platform/pcspkr/input/input3
[6.469151] input: SINO WEALTH USB KEYBOARD as 
/devices/pci:00/:00:14.0/usb1/1-7/1-7:1.0/0003:258A:0001.0001/input/input4
[6.469924] sd 0:0:0:0: Attached scsi generic sg0 type 0
[6.472942] RAPL PMU: API unit is 2^-32 Joules, 5 fixed counters, 655360 ms 
ovfl timer
[6.474316] RAPL PMU: hw unit of domain pp0-core 2^-14 Joules
[6.475715] RAPL PMU: hw unit of domain package 2^-14 Joules
[6.477044] RAPL PMU: hw unit of domain dram 2^-14 Joules
[6.478423] RAPL PMU: hw unit of domain pp1-gpu 2^-14 

Bug#914526: linux-image-4.18.0-0.bpo.1-amd64: Invalidating filesystems can corrupt dentry table leading to busy loop in kernel.

2018-11-24 Thread Colm Buckley
Package: src:linux
Version: 4.18.6-1~bpo9+1
Severity: important
Tags: upstream patch

Please see 
https://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace.git/commit/?h=for-linus
 - invalidating
filesystems can cause dentry table corruption leading to busy loop in kernel. 
Easily triggered from userspace (observed
triggers using NFS, XFS and ZFS).

Patch supplied upstream; please consider cherrypicking this to BPO kernel.

Thanks.


-- Package-specific info:
** Version:
Linux version 4.18.0-0.bpo.1-amd64 (debian-ker...@lists.debian.org) (gcc 
version 6.3.0 20170516 (Debian 6.3.0-18+deb9u1)) #1 SMP Debian 4.18.6-1~bpo9+1 
(2018-09-13)

** Command line:
BOOT_IMAGE=/boot@/boot/vmlinuz-4.18.0-0.bpo.1-amd64 root=ZFS=rpool/boot ro

** Tainted: PO (4097)
 * Proprietary module has been loaded.
 * Out-of-tree module has been loaded.

** Kernel log:
Unable to read kernel log; any relevant messages should be attached

** Model information
sys_vendor: 
product_name: 
product_version: 
chassis_vendor: 
chassis_version: 
bios_vendor: Intel Corporation
bios_version: MYBDWi30.86A.0038.2016.0913.1446
board_vendor: Intel Corporation
board_name: NUC5i3MYBE
board_version: H47781-206

** Loaded modules:
xt_nat
cfg80211
xt_tcpmss
ipt_MASQUERADE
xt_limit
xt_recent
ip6table_nat
nf_nat_ipv6
ip6t_REJECT
nf_reject_ipv6
ip6table_mangle
ip6table_raw
nf_conntrack_ipv6
nf_defrag_ipv6
nf_log_ipv6
ip6table_filter
ip6_tables
xt_comment
iptable_nat
nf_nat_ipv4
ipt_REJECT
nf_reject_ipv4
xt_addrtype
bridge
xt_mark
iptable_mangle
xt_TCPMSS
xt_tcpudp
xt_CT
iptable_raw
xt_multiport
nf_conntrack_ipv4
nf_defrag_ipv4
xt_conntrack
xt_NFLOG
xt_LOG
nf_log_ipv4
nf_log_common
nf_nat_tftp
nf_nat_snmp_basic
nf_conntrack_snmp
nf_nat_sip
nf_nat_pptp
nf_nat_proto_gre
nf_nat_irc
nf_nat_h323
nf_nat_ftp
nf_nat_amanda
ts_kmp
nf_conntrack_amanda
nf_nat
nf_conntrack_sane
nf_conntrack_tftp
nf_conntrack_sip
nf_conntrack_pptp
nf_conntrack_proto_gre
nf_conntrack_netlink
nf_conntrack_netbios_ns
nf_conntrack_broadcast
nf_conntrack_irc
nf_conntrack_h323
nf_conntrack_ftp
nf_conntrack
libcrc32c
crc32c_generic
iptable_filter
nfnetlink_queue
nfnetlink_log
nfnetlink
bluetooth
drbg
ansi_cprng
ecdh_generic
rfkill
crc16
pppoe
pppox
ppp_generic
slhc
binfmt_misc
nls_ascii
nls_cp437
vfat
fat
intel_rapl
x86_pkg_temp_thermal
intel_powerclamp
coretemp
kvm_intel
iTCO_wdt
iTCO_vendor_support
evdev
kvm
i915
irqbypass
crct10dif_pclmul
crc32_pclmul
pl2303
drm_kms_helper
usbserial
ghash_clmulni_intel
sg
drm
intel_cstate
mei_me
mei
intel_uncore
lpc_ich
pcspkr
efi_pstore
intel_rapl_perf
efivars
video
button
acpi_pad
pcc_cpufreq
bonding
8021q
garp
mrp
stp
llc
efivarfs
ip_tables
x_tables
autofs4
zfs(PO)
zunicode(PO)
zavl(PO)
icp(PO)
zcommon(PO)
znvpair(PO)
spl(O)
sd_mod
crc32c_intel
ahci
libahci
libata
igb
i2c_algo_bit
scsi_mod
dca
aesni_intel
xhci_pci
ehci_pci
xhci_hcd
ehci_hcd
aes_x86_64
crypto_simd
i2c_i801
cryptd
glue_helper
usbcore
e1000e
usb_common
fan
thermal

** PCI devices:
not available

** USB devices:
Bus 001 Device 002: ID 8087:8001 Intel Corp. 
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 003 Device 002: ID 2109:0813 VIA Labs, Inc. 
Bus 003 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 002 Device 004: ID 0557:2008 ATEN International Co., Ltd UC-232A Serial 
Port [pl2303]
Bus 002 Device 003: ID 067b:2303 Prolific Technology, Inc. PL2303 Serial Port
Bus 002 Device 002: ID 2109:2813 VIA Labs, Inc. 
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub


-- System Information:
Debian Release: 9.6
  APT prefers stable
  APT policy: (700, 'stable'), (500, 'stable-updates')
Architecture: amd64 (x86_64)

Kernel: Linux 4.18.0-0.bpo.1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_IE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages linux-image-4.18.0-0.bpo.1-amd64 depends on:
ii  initramfs-tools [linux-initramfs-tool]  0.130
ii  kmod23-2
ii  linux-base  4.5

Versions of packages linux-image-4.18.0-0.bpo.1-amd64 recommends:
ii  apparmor 2.11.0-3+deb9u2
ii  firmware-linux-free  3.4
ii  irqbalance   1.1.0-2.3

Versions of packages linux-image-4.18.0-0.bpo.1-amd64 suggests:
pn  debian-kernel-handbook  
ii  grub-efi-amd64  2.02~beta3-5+deb9u1
pn  linux-doc-4.18  

Versions of packages linux-image-4.18.0-0.bpo.1-amd64 is related to:
ii  firmware-amd-graphics 20180825+dfsg-1~bpo9+1
pn  firmware-atheros  
pn  firmware-bnx2 
pn  firmware-bnx2x
pn  firmware-brcm80211
pn  firmware-cavium   
pn  firmware-intel-sound  
pn  firmware-intelwimax   
pn  firmware-ipw2x00  
pn  firmware-ivtv 
pn  firmware-iwlwifi  
pn  firmware-libertas 
ii  firmware-linux-nonfree20180825+dfsg-1~bpo9+1
ii  firmware-misc-nonfree 

Bug#910607:

2018-11-24 Thread Colm Buckley
Per upstream; this seems to be a kernel bug which is fixed in 4.18.20.
Unclear whether the fix (1e9c75fb9c47a75a9aec0cd17db5f6dc36b58e00) can be
cherrypicked back to current stable / bpo kernels; investigating.


Bug#887743:

2018-11-02 Thread Colm Buckley
This is fixed by https://github.com/att/ast/pull/63/ - should be ok to pull
from upstream.

Colm


-- 
Colm Buckley / c...@tuatha.org / +353 87 2469146


Bug#826994: [Pkg-zfsonlinux-devel] Bug#826994: #826994: Bug#826994: Missing init-script(s)?

2018-10-19 Thread Colm Buckley
... which is exactly what the patch does.

On Fri 19 Oct 2018, 18:45 Petter Reinholdtsen 
>
> [Richard Laager]
> > The sysvinit scripts are already in the upstream tree and the released
> > tarballs. You can see them in the package's .orig.tar.gz in the
> > etc/init.d directory. The patch simply calls dh_installinit in
> > debian/rules as appropriate.
>
> Right, then I had misunderstood, at least.  If the script is already
> upstream, it is Debians responsibility to add code to install it at the
> correct location.
>
> --
> Vennlig hilsen
> Petter Reinholdtsen
>
> ___
> Pkg-zfsonlinux-devel mailing list
> pkg-zfsonlinux-de...@alioth-lists.debian.net
>
> https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-zfsonlinux-devel


Bug#910607: zfs-linux: 'zfs receive' can apparently corrupt system mount table.

2018-10-08 Thread Colm Buckley
Source: zfs-linux
Version: v0.7.11-1
Severity: important
Tags: upstream

Descendent filesystems which have out-of-tree mount points are not
correctly recovered on 'zfs send | zfs receive', leading to apparent
corruption of the mount table. With kernel 4.18, processes accessing
problematic parts of the filesystem can become wedged.

See full report in upstream at https://github.com/zfsonlinux/zfs/issues/7970

-- System Information:
Debian Release: 9.5
  APT prefers stable
  APT policy: (700, 'stable'), (500, 'stable-updates')
Architecture: amd64 (x86_64)

Kernel: Linux 4.18.0-0.bpo.1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_IE.UTF-8, LC_CTYPE=en_IE.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_IE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)



Bug#897568: Stretch with backports kernel is also affected

2018-05-09 Thread Colm Buckley
In an ideal world, this need not be a problem; we typically see ZoL
releases supporting new kernels well before those kernels hit Debian
backports. Unfortunately, however, there is a chicken-and-egg problem; the
Debian package maintainers need to be confident that the zfs-linux packages
will work with both new and existing kernels (on all supported
architectures) before a release can be made, and the BPO kernel maintainers
occasionally include forward patches from other kernel trees. It's not
impossible to make this work, but it is labor-intensive and has an
unpredictable schedule.

Colm


Bug#893578: [zfs-linux] Please package 0.7.8

2018-05-09 Thread Colm Buckley
I don't wish to be rude - but there has been an unusually long period with
no developer activity regarding this package; and the developers' mailing
list seems to have been removed or reconfigured. Is everything in order?
Are more maintainers needed?

Colm


Bug#880647: Suggest symlinks to binaries from /usr/bin

2017-11-03 Thread Colm Buckley
Package: zfsutils-linux
Version: 0.7.3-1

As 'zfs allow' now allows certain functions to be executed by any user, I
suggest a symbolic link from /usr/bin/zfs to /usr/sbin/{zfs, zpool} be
included.


Bug#822431: Set PYTHONHASHSEED=0 when calling systemd-crontab-generator

2016-06-07 Thread Colm Buckley
Given that the Python bug discussion is inclining against changing the
Python runtime behavior, a workaround would be to arrange for the
environment variable PYTHONHASHSEED to be set to the value "0" when calling
systemd-crontab-generator. This could be done dumbly by a shell script
which in turn calls the current crontab generator, but it strikes me that
there might be a more elegant way.

Any takers?

Colm


-- 
Colm Buckley / c...@tuatha.org / +353 87 2469146