Processed: closing 1005236

2022-02-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > close 1005236 1:2.5.4-1~exp1 Bug #1005236 [nfs-kernel-server] nfs-kernel-server 1.3.4 does not support security_label option for SELinux over NFS 4.2 Marked as fixed in versions nfs-utils/1:2.5.4-1~exp1. Bug #1005236 [nfs-kernel-server] nfs-kerne

Re: [PATCH v2] builddeb: Support signing kernels with the module signing key

2022-02-09 Thread Ben Hutchings
On Mon, 2022-02-07 at 22:22 +0900, Masahiro Yamada wrote: > On Sat, Feb 5, 2022 at 7:30 AM Matthew Wilcox wrote: > > > > On Wed, Jan 05, 2022 at 12:39:57AM +0900, Masahiro Yamada wrote: > > > +CC the maintainers of CERTIFICATE HANDLING > > > M: David Howells > > > M: David Woodhouse >

Re: [PATCH v2] builddeb: Support signing kernels with the module signing key

2022-02-09 Thread Masahiro Yamada
On Wed, Feb 9, 2022 at 10:21 PM James Bottomley wrote: > > On Tue, 2022-02-08 at 13:10 +, Matthew Wilcox wrote: > > On Tue, Feb 08, 2022 at 12:01:22PM +0100, Julian Andres Klode wrote: > > > It's worth pointing out that in Ubuntu, the generated MOK key > > > is for module signing only (extende

Re: [PATCH v2] builddeb: Support signing kernels with the module signing key

2022-02-09 Thread Masahiro Yamada
On Wed, Feb 9, 2022 at 1:13 AM Julian Andres Klode wrote: > > On Tue, Feb 08, 2022 at 01:10:34PM +, Matthew Wilcox wrote: > > On Tue, Feb 08, 2022 at 12:01:22PM +0100, Julian Andres Klode wrote: > > > It's worth pointing out that in Ubuntu, the generated MOK key > > > is for module signing onl

Bug#983357: Bug# 983357: Why is it not mentioned in bullseye release notes / installation guide?

2022-02-09 Thread Paul Gevers
Hi, Subject: 983357: Why is it not mentioned in bullseye release notes / installation guide? For at least the release notes, because nobody asked the editors to include it. On 09-02-2022 21:04, Chuck Zmudzinski wrote: However, this is a well-known problem, but neither the Bullseye release

Bug#990279: Status?

2022-02-09 Thread Timothy Pearson
- Original Message - > From: "Salvatore Bonaccorso" > To: "Timothy Pearson" , "990279" > <990...@bugs.debian.org> > Cc: "Christian König" , "Xi Ruoyao" > , "Alex Deucher" > > Sent: Wednesday, February 9, 2022 2:18:34 PM > Subject: Re: Bug#990279: Status? > Hi Timothy, > > On Wed, F

Bug#990279: Status?

2022-02-09 Thread Salvatore Bonaccorso
Hi Timothy, On Wed, Feb 09, 2022 at 01:20:40PM -0600, Timothy Pearson wrote: > - Original Message - > > From: "Christian König" > > To: "Timothy Pearson" , "Salvatore > > Bonaccorso" > >> > >> If you need me to generate / submit a patch just let me know. > > > > Please do, I don't have

Processed: Re: Bug#995877: linux-image-5.14.0-2-amd64: "pagealloc: memory corruption" during SCSI initialization

2022-02-09 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + moreinfo Bug #995877 [src:linux] linux-image-5.14.0-2-amd64: "pagealloc: memory corruption" during SCSI initialization Added tag(s) moreinfo. -- 995877: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=995877 Debian Bug Tracking System Contact ow...@bug

Bug#995877: linux-image-5.14.0-2-amd64: "pagealloc: memory corruption" during SCSI initialization

2022-02-09 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo Hi Laurent, On Wed, Feb 09, 2022 at 08:36:33PM +0100, Laurent Bonnaud wrote: > Hi, > > this bug still occurs with the 5.16.7-1 kernel: > > [3.860611] sdg: sdg1 > [3.861521] sd 10:0:0:0: [sdg] Attached SCSI disk > [3.873581] pagealloc: memory corruption >

Processed: found 995877 in 5.16.7-1

2022-02-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > found 995877 5.16.7-1 Bug #995877 [src:linux] linux-image-5.14.0-2-amd64: "pagealloc: memory corruption" during SCSI initialization Marked as found in versions linux/5.16.7-1. > thanks Stopping processing here. Please contact me if you need assi

Bug#1005241: linux-image-5.15.0-3-amd64: Failure to suspend/resume when cpu on high frequency

2022-02-09 Thread Quentin Lambotte
Package: src:linux Version: 5.15.15-2 Severity: important X-Debbugs-Cc: quentin.lambo...@hotmail.com Dear Maintainer, *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? * What exactly did you do (or not do) that was effective (or

[PATCH] Fix Debian bug #990279 on ppc64le systems

2022-02-09 Thread Timothy Pearson
Provided to fix stable Bullseye kernels Signed-off-by: Timothy Pearson --- .../debian/fix-ppc64-amdgpu-page-size.patch | 22 +++ debian/patches/series | 1 + 2 files changed, 23 insertions(+) create mode 100644 debian/patches/debian/fix-ppc64-amdgpu-pa

[PATCH] Fix Debian bug #990279 on ppc64le systems

2022-02-09 Thread Timothy Pearson
Provided to fix stable Bullseye kernels Signed-off-by: Timothy Pearson --- .../debian/fix-ppc64-amdgpu-page-size.patch | 22 +++ debian/patches/series | 1 + 2 files changed, 23 insertions(+) create mode 100644 debian/patches/debian/fix-ppc64-amdgpu-pa

Bug#1005236: nfs-kernel-server 1.3.4 does not support security_label option for SELinux over NFS 4.2

2022-02-09 Thread Tongliang Liao
Package: nfs-kernel-server Version: 1:1.3.4-6 Severity: important X-Debbugs-Cc: xksz...@gmail.com This is was initially handled by RHEL: - https://bugzilla.redhat.com/show_bug.cgi?id=1406885 To summarize: - SELinux label can be forwarded to client in NFS 4.2 - Kernel enabled that behavior by def

Processed: found 1005005 in 5.16.7-1

2022-02-09 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > found 1005005 5.16.7-1 Bug #1005005 [src:linux] linux-image-5.15.0-3-amd64: suspend failure with admgpu Marked as found in versions linux/5.16.7-1. > thanks Stopping processing here. Please contact me if you need assistance. -- 1005005: https://

Bug#1005005: linux-image-5.15.0-3-amd64: suspend failure with admgpu

2022-02-09 Thread Dominique Dumont
On Tuesday, 8 February 2022 08:11:46 CET Salvatore Bonaccorso wrote: > > > (5.16.7-1 should land soon as well). > > > I'll try it when it's available 5.16.7-1 is also broken > > > Any chance > > > you can bisect the commit introducing the issue? > Some help is here: > > https://wiki.debian.org/

Bug#1005228: linux-image-4.19.0-18-amd64: Short freeze on virtual machine with message: "rcu: INFO: rcu_sched self-detected stall on CPU"

2022-02-09 Thread root
Package: src:linux Version: 4.19.208-1 Severity: important Dear Maintainer, * What led up to the situation? Installing and running in production a fresh debian 10 with php/apache2 installed. This is a virtual machine with 8 virtual CPU / 4 physical CPU / 8 GB Ram, running on an Open

Re: [PATCH v2] builddeb: Support signing kernels with the module signing key

2022-02-09 Thread James Bottomley
On Tue, 2022-02-08 at 13:10 +, Matthew Wilcox wrote: > On Tue, Feb 08, 2022 at 12:01:22PM +0100, Julian Andres Klode wrote: > > It's worth pointing out that in Ubuntu, the generated MOK key > > is for module signing only (extended key usage > > 1.3.6.1.4.1.2312.16.1.2), kernels signed with it w

linux_5.16.7-2_source.changes ACCEPTED into unstable

2022-02-09 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 09 Feb 2022 09:35:55 +0100 Source: linux Architecture: source Version: 5.16.7-2 Distribution: unstable Urgency: medium Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Closes: 1005141 Changes: li

Bug#1005141: marked as done (linux-perf: Removes diversions on upgrade breaking it)

2022-02-09 Thread Debian Bug Tracking System
Your message dated Wed, 09 Feb 2022 09:04:51 + with message-id and subject line Bug#1005141: fixed in linux 5.16.7-2 has caused the Debian Bug report #1005141, regarding linux-perf: Removes diversions on upgrade breaking it to be marked as done. This means that you claim that the problem has

Processing of linux_5.16.7-2_source.changes

2022-02-09 Thread Debian FTP Masters
linux_5.16.7-2_source.changes uploaded successfully to localhost along with the files: linux_5.16.7-2.dsc linux_5.16.7-2.debian.tar.xz linux_5.16.7-2_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)