Bug#928923: linux-image-4.19.0-4-cloud-amd64: reports different NIC name than linux-image-amd64 on virtio-net

2019-05-12 Thread Xinyue Lu
Package: src:linux
Version: 4.19.28-2
Severity: normal


Environment:

Proxmox VE host, 5.4-1
KVM guest, Debian 10 testing
virtio_net NIC

With linux-image-4.19.0-4-cloud-amd64:

# udevadm test-builtin net_id /sys/class/net/en*
Load module index
Parsed configuration file /usr/lib/systemd/network/99-default.link
Created link configuration context.
Using default interface naming scheme 'v240'.
ID_NET_NAMING_SCHEME=v240
ID_NET_NAME_MAC=enxbe57fa7f6fb0
ID_NET_NAME_PATH=enp6s18
Unload module index
Unloaded link configuration context.

enp6s18 is used for NIC.

With linux-image-4.19.0-4-amd64:

+ID_NET_NAME_SLOT=ens18

ens18 is used for NIC.

Changing NIC name on switching between kernel varient, IMHO, is not
expected.


-- Package-specific info:
** Version:
Linux version 4.19.0-4-cloud-amd64 (debian-kernel@lists.debian.org) (gcc 
version 8.3.0 (Debian 8.3.0-2)) #1 SMP Debian 4.19.28-2 (2019-03-15)

** Command line:
BOOT_IMAGE=/boot/vmlinuz-4.19.0-4-cloud-amd64 
root=UUID=8782a6fc-9622-4d76-8ba0-a7c51dfc9b19 ro quiet

** Not tainted

** Kernel log:

** Model information
[0.620425] pcieport :00:1c.0: Signaling PME with IRQ 24
[0.620484] pcieport :00:1c.1: Signaling PME with IRQ 25
[0.620542] pcieport :00:1c.2: Signaling PME with IRQ 26
[0.620599] pcieport :00:1c.3: Signaling PME with IRQ 27
[0.620659] pciehp :00:1c.0:pcie004: Slot #0 AttnBtn+ PwrCtrl+ MRL- 
AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- LLActRep- (with Cmd 
Compl erratum)
[0.620816] pciehp :00:1c.1:pcie004: Slot #0 AttnBtn+ PwrCtrl+ MRL- 
AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- LLActRep- (with Cmd 
Compl erratum)
[0.620949] pciehp :00:1c.2:pcie004: Slot #0 AttnBtn+ PwrCtrl+ MRL- 
AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- LLActRep- (with Cmd 
Compl erratum)
[0.621082] pciehp :00:1c.3:pcie004: Slot #0 AttnBtn+ PwrCtrl+ MRL- 
AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- LLActRep- (with Cmd 
Compl erratum)
[0.621261] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
[0.621694] i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 
0x60,0x64 irq 1,12
[0.622440] serio: i8042 KBD port at 0x60,0x64 irq 1
[0.622447] serio: i8042 AUX port at 0x60,0x64 irq 12
[0.622514] mousedev: PS/2 mouse device common for all mice
[0.622763] input: AT Translated Set 2 keyboard as 
/devices/platform/i8042/serio0/input/input0
[0.623105] NET: Registered protocol family 10
[0.627774] Segment Routing with IPv6
[0.627790] mip6: Mobile IPv6
[0.627794] NET: Registered protocol family 17
[0.627820] mpls_gso: MPLS GSO support
[0.627848] sched_clock: Marking stable (609989229, 14091148)->(634303071, 
-10222694)
[0.627952] registered taskstats version 1
[0.627952] Loading compiled-in X.509 certificates
[0.659562] Loaded X.509 cert 'Debian Secure Boot CA: 
6ccece7e4c6c0d1f6149f3dd27dfcc5cbb419ea1'
[0.659575] Loaded X.509 cert 'Debian Secure Boot Signer: 00a7468def'
[0.659584] AppArmor: AppArmor sha1 policy hashing enabled
[0.661077] Freeing unused kernel image memory: 1456K
[0.672181] Write protecting the kernel read-only data: 16384k
[0.673093] Freeing unused kernel image memory: 2028K
[0.673655] Freeing unused kernel image memory: 1420K
[0.673763] x86/mm: Checked W+X mappings: passed, no W+X pages found.
[0.673764] x86/mm: Checking user space page tables
[0.673781] x86/mm: Checked W+X mappings: passed, no W+X pages found.
[0.673784] Run /init as init process
[0.734305] PCI Interrupt Link [GSIF] enabled at IRQ 21
[0.734939] PCI Interrupt Link [GSIG] enabled at IRQ 22
[0.739958] cryptd: max_cpu_qlen set to 1000
[0.746752] AVX version of gcm_enc/dec engaged.
[0.746752] AES CTR mode by8 optimization enabled
[0.751777] PCI Interrupt Link [GSIH] enabled at IRQ 23
[0.772002] virtio_net virtio1 enp6s18: renamed from eth0
[0.772457] SCSI subsystem initialized
[0.775114] scsi host0: Virtio SCSI HBA
[0.776243] scsi 0:0:0:0: Direct-Access QEMU QEMU HARDDISK2.5+ 
PQ: 0 ANSI: 5
[0.776500] scsi 0:0:0:1: Direct-Access QEMU QEMU HARDDISK2.5+ 
PQ: 0 ANSI: 5
[0.787717] random: fast init done
[0.792775] sd 0:0:0:0: Power-on or device reset occurred
[0.793199] sd 0:0:0:0: [sda] 1073741824 512-byte logical blocks: (550 
GB/512 GiB)
[0.793223] sd 0:0:0:0: [sda] Write Protect is off
[0.793228] sd 0:0:0:0: [sda] Mode Sense: 63 00 00 08
[0.793271] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, 
doesn't support DPO or FUA
[0.794211] sd 0:0:0:0: [sda] Attached SCSI disk
[0.794229] sd 0:0:0:1: Power-on or device reset occurred
[0.794433] sd 0:0:0:1: [sdb] 31457280 512-byte logical blocks: (16.1 
GB/15.0 GiB)
[0.794462] sd 0:0:0:1: [sdb] Write Protect is off
[0.794464] sd 0:0:0:1: [sdb] Mode Sense: 63 00 00 08
[0.794515] sd 0:0:0:1: [sdb] Write cache: enabled, 

Processed: reassign 928891 to src:linux

2019-05-12 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 928891 src:linux 4.19.28-2
Bug #928891 [linux-image-amd64] linux-image-amd64: Kernel crash when using any 
disk that uses reiserfs
Bug reassigned from package 'linux-image-amd64' to 'src:linux'.
No longer marked as found in versions linux-latest/104.
Ignoring request to alter fixed versions of bug #928891 to the same values 
previously set
Bug #928891 [src:linux] linux-image-amd64: Kernel crash when using any disk 
that uses reiserfs
Marked as found in versions linux/4.19.28-2.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
928891: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928891
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#928891: linux-image-amd64: Kernel crash when using any disk that uses reiserfs

2019-05-12 Thread Ben Hutchings
On Sun, 2019-05-12 at 18:34 +0200, Thanatermesis wrote:
> Package: linux-image-amd64
> Version: 4.19+104
> Severity: important
> 
> Dear Maintainer,
> 
> When using any partition which uses reiserfs, the kernel crashes
> 
> This happens very easily by just using the reiser (v3) filesystem, some
> of my external hard disks uses it (so I cannot make use of them), or
> partition mountpoints with reiserfs becomes totally unusable and
> dangerous
> 
> This bug is easily reproducible by creating a new reiserfs partition
> (image file probably too) and start using it, so it looks like it
> specially affects in RW operations
> 
> I suggest to mark this bug as a serious one since there's so many people
> using this filesystem, in desktops or servers.
> 
> The package is the last one available on the buster branch

reiserfs v3 is *not* widely used, and is barely maintained upstream. 
Debian hasn't supported installing to reiserfs for a while.

It is quite possible that we will "fix" this by disabling reiserfs
altogether.  In any case, I strongly recommend that you switch to a
better supported filesystem like ext4 or xfs.

Ben.

-- 
Ben Hutchings
It is a miracle that curiosity survives formal education.
  - Albert Einstein




signature.asc
Description: This is a digitally signed message part


Bug#928891: linux-image-amd64: Kernel crash when using any disk that uses reiserfs

2019-05-12 Thread Thanatermesis
Package: linux-image-amd64
Version: 4.19+104
Severity: important

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Dear Maintainer,

When using any partition which uses reiserfs, the kernel crashes

This happens very easily by just using the reiser (v3) filesystem, some
of my external hard disks uses it (so I cannot make use of them), or
partition mountpoints with reiserfs becomes totally unusable and
dangerous

This bug is easily reproducible by creating a new reiserfs partition
(image file probably too) and start using it, so it looks like it
specially affects in RW operations

I suggest to mark this bug as a serious one since there's so many people
using this filesystem, in desktops or servers.

The package is the last one available on the buster branch


Thank you


- -- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-4-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8),
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages linux-image-amd64 depends on:
ii  linux-image-4.19.0-4-amd64  4.19.28-2

linux-image-amd64 recommends no packages.

linux-image-amd64 suggests no packages.

- -- no debconf information

-BEGIN PGP SIGNATURE-
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=kmLp
-END PGP SIGNATURE-


Bug#928855: marked as done (CPU usage/freq periodically raises on amd64 (Kaby Lake))

2019-05-12 Thread Debian Bug Tracking System
Your message dated Sun, 12 May 2019 15:58:36 +0100
with message-id 
and subject line Re: Bug#928855: CPU usage/freq periodically raises on amd64 
(Kaby Lake)
has caused the Debian Bug report #928855,
regarding CPU usage/freq periodically raises on amd64 (Kaby Lake)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
928855: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928855
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: linux-image-4.19.0-4-amd64
To: mainto...@bugs.debian.org
Subject: CPU usage/freq periodically raises on amd64 (Kaby Lake)
Package: linux-image-4.19.0-4-amd64
Version: 4.19.28-2 amd64

Dear maintainers,

In my amd64 Kaby Lake GNOME machine,
CPU usage/freq periodically raises.

Watching top as root with CPU time sort,
I doubt kworker/0:2-events_power_efficient.

It periodically wakes and has relatively
a large number of CPU time usage.
(It means, not power efficient)

That is happening even in rescue.target.

FYI: chkrootkit shows nothing interesting.

Regards.
--- End Message ---
--- Begin Message ---
This is a somewhat interesting observation, but I fail to see a bug.

Ben.

On Sun, 2019-05-12 at 17:11 +0900, hoxp18 wrote:
> Package: linux-image-4.19.0-4-amd64
> To: mainto...@bugs.debian.org
> Subject: CPU usage/freq periodically raises on amd64 (Kaby Lake)
> Package: linux-image-4.19.0-4-amd64
> Version: 4.19.28-2 amd64
> 
> Dear maintainers,
> 
> In my amd64 Kaby Lake GNOME machine,
> CPU usage/freq periodically raises.
> 
> Watching top as root with CPU time sort,
> I doubt kworker/0:2-events_power_efficient.
> 
> It periodically wakes and has relatively
> a large number of CPU time usage.
> (It means, not power efficient)
> 
> That is happening even in rescue.target.
> 
> FYI: chkrootkit shows nothing interesting.
> 
> Regards.
> 
-- 
Ben Hutchings
It is a miracle that curiosity survives formal education.
  - Albert Einstein




signature.asc
Description: This is a digitally signed message part
--- End Message ---


Bug#928855: CPU usage/freq periodically raises on amd64 (Kaby Lake)

2019-05-12 Thread hoxp18

Package: linux-image-4.19.0-4-amd64
To: mainto...@bugs.debian.org
Subject: CPU usage/freq periodically raises on amd64 (Kaby Lake)
Package: linux-image-4.19.0-4-amd64
Version: 4.19.28-2 amd64

Dear maintainers,

In my amd64 Kaby Lake GNOME machine,
CPU usage/freq periodically raises.

Watching top as root with CPU time sort,
I doubt kworker/0:2-events_power_efficient.

It periodically wakes and has relatively
a large number of CPU time usage.
(It means, not power efficient)

That is happening even in rescue.target.

FYI: chkrootkit shows nothing interesting.

Regards.