Bug#990165: perf: allow using other versions than the running kernel

2021-06-21 Thread Steinar H. Gunderson
Package: linux-base
Version: 4.6
Severity: normal
Tags: patch

Hi,

The perf wrapper script in Debian requires the perf binary of the running
kernel. However, there's not really a good reason for this; perf has a stable
ABI, and even though it's distributed and built with the kernel, you can freely
mix and match versions (I've done so, a lot).

There may still be reasons why people prefer to keep the versions matched,
but perf shouldn't just give up and die if it can't find the right version.
I've made a patch that makes this a bit more flexible; it first tries to
find a matching version, and if it doesn't exist, it simply picks the newest
one it can find. (If that's older than the kernel, it gives a warning,
since there may be new features the user would want to upgrade for, but it
doesn't die.)

Hopefully this should be safe, while being a lot less annoying when running
a newer or self-compiled kernel. :-)

--- linux-base-4.6.orig/bin/perf2018-07-20 03:35:21.0 +0200
+++ linux-base-4.6/bin/perf 2021-06-22 00:15:59.618443368 +0200
@@ -10,9 +10,11 @@
;;
 esac
 shopt -s execfail
-exec "perf_$version" "$@"
+if [ -x "/usr/bin/perf_$version" ]; then
+exec "perf_$version" "$@"
+fi
 
-# Not found? Tell the user which package to install.
+# Not found? Find out which version to install.
 case "$version" in
 3.* | 4.0 | 4.0.*)
package=linux-tools-$version
@@ -21,5 +23,16 @@
package=linux-perf-$version
;;
 esac
+
+# See if we have a usable alternative available.
+perfversion="$( linux-version sort --reverse $( echo /usr/bin/perf_* | sed 
"s,/usr/bin/perf_,,g" ) | head -n 1 )"
+if [ -x "/usr/bin/perf_$perfversion" ]; then
+if linux-version compare "$perfversion" lt "$version"; then
+echo >&2 "W: perf_$perfversion is older than the running kernel, 
consider installing $package."
+fi
+exec "perf_$perfversion" "$@"
+fi
+
+# Still nothing? Tell the user.
 echo >&2 "E: $package is not installed."
 exit 1

-- System Information:
Debian Release: 11.0
  APT prefers stable-debug
  APT policy: (500, 'stable-debug'), (500, 'testing'), (500, 'oldstable'), (1, 
'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.12.8 (SMP w/40 CPU threads)
Locale: LANG=en_DK.UTF-8, LC_CTYPE=en_DK.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_NO:en_US:en_GB:en
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages linux-base depends on:
ii  debconf [debconf-2.0]  1.5.75

linux-base recommends no packages.

linux-base suggests no packages.

-- debconf-show failed



Processed: your mail

2021-06-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> found 983818 5.10.40-1
Bug #983818 [src:linux] linux-image-5.10.0-3-arm64: often fails to bring up 
eth0 / dwmac_rk module
Marked as found in versions linux/5.10.40-1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
983818: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983818
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#990106:

2021-06-21 Thread Davide Beatrici
Thanks!

I installed linux-image-5.9.0-0.bpo.5-amd64 and instantly reproduced the issue.

For reference: the amplifier is a Denon AVR-X500. I just purchased a Denon 
AVR-X1000 as replacement, I will confirm whether the issue is fixed as soon as 
I receive it.

At this point I'm 99% sure it's the amplifier though.

Bug#990123: [buster regression] iptables-netflow-dkms: No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream kernel API regression in 4.19.191?)

2021-06-21 Thread Axel Beckert
Control: reassign -1 iptables-netflow-dkms
Control: found -1 2.3-5
Control: notfound -1 2.5.1-2

Hi Salvatore,

Salvatore Bonaccorso wrote:
> On Mon, Jun 21, 2021 at 01:33:01PM +0200, Axel Beckert wrote:
> > Since kernel packages linux-{image,headers}-4.19.0-17-*, at least with
> > -amd64 and -i686-pae, iptables-netflow-dkms no more compiles its kernel
> > module upon kernel installation:
> > 
> > In file included from /var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c:75:
> > /var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c: In function 
> > ‘register_ct_events’:
> > /var/lib/dkms/ipt-netflow/2.3/build/compat.h:173:21: error: implicit 
> > declaration of function ‘ref_module’; did you mean ‘use_module’? 
> > [-Werror=implicit-function-declaration]
> >  # define use_module ref_module
> >  ^~
> > /var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c:5399:3: note: in 
> > expansion of macro ‘use_module’
> >use_module(THIS_MODULE, netlink_m);
> >^~
> > 
> > Reading the kernel changelog, there are a few very suspicious entries
> > listed under upstream version 4.19.191:
> > 
> > - modules: mark ref_module static
> > - modules: mark find_symbol static
> > - modules: mark each_symbol_section static
> > 
> > One of the commits above (8745aa4e resp. 7ef5264d) states:
> > 
> >   ref_module isn't used anywhere outside of module.c.
> > 
> > Which is only seems true if you ignore any third-party kernel modules
> > out there.
[…]
> 7ef5264de773 ("modules: mark ref_module static") indeed is likely to
> cause the issue, or basically the patchset around that.

Thanks for that confirmation.

> That initially landed in 5.9-rc1,

Right, I saw that the list of tags including that change on Github. I
though wondered why 2.5.1-2 works in Sid/Bullseye but not on Buster —
but probably because the current #ifdefs just don't expect that fix
being needed for any kernel before 5.9.

> There is some background here:
> 
> https://lore.kernel.org/lkml/20200730061027.29472-1-...@lst.de/
> https://lore.kernel.org/stable/ymxnxqzcp0g1f...@kroah.com/

Thanks for that! I didn't really expected license enforcing to be the
background. With that background I do understand that change much
more. :-)

> That said, upstream won't really revert those changes.

Understandable. I'm though surprised that this got backported. But I
guess the pain without it is bigger than this one precise cut.

> So in my biased view, what would be needed for buster indeed would be
> an equivalent approach in buster for iptables-netflow unbreaking this
> regression similar as done in 2.5.1-1 wit the
> 
> cherry-pick-adfc6318-fix-compilation-for-5.9-workaround-ref_module-unexport.patch

Thanks for pointing out that this patch is already in 2.5.1-1.

I actually forgot that I had to solve this already once in the past
(probably because the solution was submitted as pull request upstream
against 2.5.1) and since 2.5.1-2 didn't work on buster either, I
didn't expect it to be more or less fixed already. But in the end it's
hopefully just replacing

#if LINUX_VERSION_CODE < KERNEL_VERSION(5,9,0)

with a bit more complex condition including further constraints.

> I had no time to check if the patch applies and what changes need to
> be done,

No need to worry. That's not your job but mine. :-)

> but basically what was added there fo fix compilation with Linux 5.9
> (which introduced the above changes initially) would need as well
> for the 4.19.y stable series.

Ack.

Thanks again.

Regards, Axel
-- 
 ,''`.  |  Axel Beckert , https://people.debian.org/~abe/
: :' :  |  Debian Developer, ftp.ch.debian.org Admin
`. `'   |  4096R: 2517 B724 C5F6 CA99 5329  6E61 2FF9 CD59 6126 16B5
  `-|  1024D: F067 EA27 26B9 C3FC 1486  202E C09E 1D89 9593 0EDE


signature.asc
Description: PGP signature


Processed: Re: Bug#990123: [buster regression] iptables-netflow-dkms: No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream kernel API regression in 4.1

2021-06-21 Thread Debian Bug Tracking System
Processing control commands:

> reassign -1 iptables-netflow-dkms
Bug #990123 
[iptables-netflow-dkms,linux-headers-4.19.0-17-amd64,linux-headers-4.19.0-17-i686-pae]
 [buster regression] iptables-netflow-dkms: No more compiles since 
linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream 
kernel API regression in 4.19.191?)
Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae'
Bug reassigned from package 
'iptables-netflow-dkms,linux-headers-4.19.0-17-amd64,linux-headers-4.19.0-17-i686-pae'
 to 'iptables-netflow-dkms'.
No longer marked as found in versions linux/4.19.194-1, iptables-netflow/2.3-5, 
and iptables-netflow/2.5.1-2.
Ignoring request to alter fixed versions of bug #990123 to the same values 
previously set
> found -1 2.3-5
Bug #990123 [iptables-netflow-dkms] [buster regression] iptables-netflow-dkms: 
No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function 
‘ref_module’" (Upstream kernel API regression in 4.19.191?)
Marked as found in versions iptables-netflow/2.3-5.
> notfound -1 2.5.1-2
Bug #990123 [iptables-netflow-dkms] [buster regression] iptables-netflow-dkms: 
No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function 
‘ref_module’" (Upstream kernel API regression in 4.19.191?)
Ignoring request to alter found versions of bug #990123 to the same values 
previously set

-- 
990123: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990123
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: reassign 990162 to src:linux

2021-06-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 990162 src:linux 5.10.28-1
Bug #990162 [linux-image-5.10.0-6-amd64] power consumption regression
Warning: Unknown package 'linux-image-5.10.0-6-amd64'
Bug reassigned from package 'linux-image-5.10.0-6-amd64' to 'src:linux'.
No longer marked as found in versions linux-signed-amd64/5.10.28+1.
Ignoring request to alter fixed versions of bug #990162 to the same values 
previously set
Bug #990162 [src:linux] power consumption regression
Marked as found in versions linux/5.10.28-1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
990162: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990162
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#990123: [buster regression] iptables-netflow-dkms: No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream kernel API regression in 4.19.191?)

2021-06-21 Thread Salvatore Bonaccorso
Control: affects -1 + release.debian.org

Hi Axel,

On Mon, Jun 21, 2021 at 01:33:01PM +0200, Axel Beckert wrote:
> Package: 
> iptables-netflow-dkms,linux-headers-4.19.0-17-amd64,linux-headers-4.19.0-17-i686-pae
> Severity: serious
> Version: iptables-netflow/2.3-5
> Version: iptables-netflow/2.5.1-2
> Version: linux/4.19.194-1
> Tags: buster
> Forwarded: https://github.com/aabc/ipt-netflow/issues/177
> 
> Since kernel packages linux-{image,headers}-4.19.0-17-*, at least with
> -amd64 and -i686-pae, iptables-netflow-dkms no more compiles its kernel
> module upon kernel installation:
> 
> In file included from /var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c:75:
> /var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c: In function 
> ‘register_ct_events’:
> /var/lib/dkms/ipt-netflow/2.3/build/compat.h:173:21: error: implicit 
> declaration of function ‘ref_module’; did you mean ‘use_module’? 
> [-Werror=implicit-function-declaration]
>  # define use_module ref_module
>  ^~
> /var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c:5399:3: note: in expansion 
> of macro ‘use_module’
>use_module(THIS_MODULE, netlink_m);
>^~
> 
> Reading the kernel changelog, there are a few very suspicious entries
> listed under upstream version 4.19.191:
> 
> - modules: mark ref_module static
> - modules: mark find_symbol static
> - modules: mark each_symbol_section static
> 
> One of the commits above (8745aa4e resp. 7ef5264d) states:
> 
>   ref_module isn't used anywhere outside of module.c.
> 
> Which is only seems true if you ignore any third-party kernel modules
> out there.
> 
> So why is the kernel API suddenly removing API-code used by third-party
> modules inmidst a stable update? This looks like a regression to me.  I
> thought that stable updates only change the ABI, but not the API. (Well,
> at least upstream and in Debian. :-)
> 
> I also tried the iptables-netflow-dkms 2.5.1-2 from Bullseye on Buster,
> but it fails to build the kernel module for 4.19.0-17-* when as well.
> 
> 2.5.1-2 though still works fine on Sid/Bullseye, hence marked as found
> in the version in Sid, but tagged buster. In case this causes issues in
> the BTS or the release team scripts, please rather remove 2.5.1-2 from
> the "found" versions instead of removing the buster tag — unless the
> same regression gets introduced into Sid and Bullseye as well.
> 
> Debian kernel maintainers: If this 3rd-party-module-breaking regression
> was really intended and won't be fixed, please reassign the bug to
> iptables-netflow-dkms only.
> 
> I also reported this issue to iptables-netflow upstream at
> https://github.com/aabc/ipt-netflow/issues/177 as I think it at least
> should update the version based ifdef checks in something which looks
> like a similar issue in kernel 5.13, see
> https://github.com/aabc/ipt-netflow/commit/5aae3791922bd3df878605b15e83ea48a4bd096c
> which is part of iptables-netflow upstream's 2.6 release, not yet
> packaged due to the freeze for bullseye.
> 
> I'll try and see if I can get that fix backported to the package in
> buster (and if needed, later to the one in bullseye as well) and will
> see if it actually helps in this case, too.
> 
> JFTR: dkms from buster-backports (as reported below) is only installed
> as I needed it for the iptables-netflow-dkms package from bullseye. It
> happened with dkms from buster before as well.

7ef5264de773 ("modules: mark ref_module static") indeed is likely to
cause the issue, or basically the patchset around that. That initially
landed in 5.9-rc1, and recently got backported upstream to 4.19.191.

There is some background here:

https://lore.kernel.org/lkml/20200730061027.29472-1-...@lst.de/

and

https://lore.kernel.org/stable/ymxnxqzcp0g1f...@kroah.com/

That said, upstream won't really revert those changes. 

So in my biased view, what would be needed for buster indeed would be
an equivalent approach in buster for iptables-netflow unbreaking this
regression similar as done in 2.5.1-1 wit the

cherry-pick-adfc6318-fix-compilation-for-5.9-workaround-ref_module-unexport.patch

patch.

I had no time to check if the patch applies and what changes need to
be done, but basically what was added there fo fix compilation with
Linux 5.9 (which introduced the above changes initially) would need as
well for the 4.19.y stable series.

Regards,
Salvatore



Processed: Re: Bug#990123: [buster regression] iptables-netflow-dkms: No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream kernel API regression in 4.1

2021-06-21 Thread Debian Bug Tracking System
Processing control commands:

> affects -1 + release.debian.org
Bug #990123 
[iptables-netflow-dkms,linux-headers-4.19.0-17-amd64,linux-headers-4.19.0-17-i686-pae]
 [buster regression] iptables-netflow-dkms: No more compiles since 
linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream 
kernel API regression in 4.19.191?)
Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae'
Added indication that 990123 affects release.debian.org
Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae'

-- 
990123: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990123
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#990140: upgrade-reports: lxc-attach does not start with apparmor problem after ugrade to 10.10

2021-06-21 Thread Bernd Breuer

Hi Paul,

thanks for your immediate response.

Your assumption is right, booting into kernel 4.19.0-16 causes
lxc-attach to behave as expected, no more apparmor related errors.

Cheers Bernd


Am 21.06.21 um 19:06 schrieb Paul Gevers:

Hi Bernd,

Thanks for your report.

On 21-06-2021 18:04, Bernd Breuer wrote:

after the recent upgrade to Buster 10.10 (including a kernel upgrade) the 
command 'lxc-attach' (out of the Linux Container (lxc) set of commands), typed 
in like

"sudo lxc-attach "

stopped working with the error message

"lxc-attach: : lsm/lsm.c: lsm_process_label_set_at: 174 Operation not 
permitted - Failed to set AppArmor label "unconfined"

The conainer itself is starting, but apparmor related config lines like

"lxc.apparmor.profile = unconfined"

produce the above mentioned error, also on another machine after the
same packages upgrade.

I expect lxc-attach to provide me a root shell in the running lxc-container 
like  it was the case before the recent upgrade.

As we didn't upgrade lxc during the point release, this *may* be caused
by the updated Linux kernel. What happens if you reboot using the
previous kernel?

Paul





Processed: duplicate

2021-06-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> # try two
> forcemerge 990072 990140
Bug #990072 {Done: Salvatore Bonaccorso } [src:linux] 
lxc-attach fails after debian 10.10 update
Bug #990075 {Done: Salvatore Bonaccorso } [src:linux] 
lxc-attach fails after debian 10.10 update
Bug #990089 {Done: Salvatore Bonaccorso } [src:linux] 
linux-image-4.19.0-17-amd64: lxc-attach fails with Failed to set AppArmor label 
unconfined
Bug #990107 {Done: Salvatore Bonaccorso } [src:linux] 
linux-image-4.19.0-17-amd64: lxc-attach Operation not permitted - Failed to set 
AppArmor label
Bug #990140 [src:linux] upgrade-reports: lxc-attach does not start with 
apparmor problem after ugrade to 10.10
Severity set to 'serious' from 'normal'
Marked Bug as done
Added indication that 990140 affects release.debian.org,lxc
Marked as fixed in versions linux/4.19.194-2.
Marked as found in versions linux/4.19.194-1.
Added tag(s) upstream, buster, moreinfo, fixed-upstream, and confirmed.
Bug #990075 {Done: Salvatore Bonaccorso } [src:linux] 
lxc-attach fails after debian 10.10 update
Bug #990089 {Done: Salvatore Bonaccorso } [src:linux] 
linux-image-4.19.0-17-amd64: lxc-attach fails with Failed to set AppArmor label 
unconfined
Bug #990107 {Done: Salvatore Bonaccorso } [src:linux] 
linux-image-4.19.0-17-amd64: lxc-attach Operation not permitted - Failed to set 
AppArmor label
Merged 990072 990075 990089 990107 990140
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
990072: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990072
990075: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990075
990089: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990089
990107: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990107
990140: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990140
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed (with 1 error): duplicate

2021-06-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 990140 src:linux
Bug #990140 [upgrade-reports] upgrade-reports: lxc-attach does not start with 
apparmor problem after ugrade to 10.10
Bug reassigned from package 'upgrade-reports' to 'src:linux'.
Ignoring request to alter found versions of bug #990140 to the same values 
previously set
Ignoring request to alter fixed versions of bug #990140 to the same values 
previously set
> force-merge 990072 990140
Unknown command or malformed arguments to command.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
990140: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990140
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Re: Bug#990140: upgrade-reports: lxc-attach does not start with apparmor problem after ugrade to 10.10

2021-06-21 Thread Paul Gevers
Hi Bernd,

Thanks for your report.

On 21-06-2021 18:04, Bernd Breuer wrote:
> after the recent upgrade to Buster 10.10 (including a kernel upgrade) the 
> command 'lxc-attach' (out of the Linux Container (lxc) set of commands), 
> typed in like
> 
> "sudo lxc-attach "
> 
> stopped working with the error message
> 
> "lxc-attach: : lsm/lsm.c: lsm_process_label_set_at: 174 
> Operation not permitted - Failed to set AppArmor label "unconfined"
> 
> The conainer itself is starting, but apparmor related config lines like
> 
> "lxc.apparmor.profile = unconfined"
> 
> produce the above mentioned error, also on another machine after the
> same packages upgrade.
> 
> I expect lxc-attach to provide me a root shell in the running lxc-container 
> like  it was the case before the recent upgrade.

As we didn't upgrade lxc during the point release, this *may* be caused
by the updated Linux kernel. What happens if you reboot using the
previous kernel?

Paul



OpenPGP_signature
Description: OpenPGP digital signature


Any interest in a patch porting Ubuntu's VLAN= cmdline option for Debian initramfs-tools?

2021-06-21 Thread Matthew Swabey
Good morning,



[I have searched the list archives and the debian bugzilla, but not got any
hits on this being discussed already. If it has, apologies, I missed it.]


I make extensive use of Debian on single board computers, and have a use
case to run them diskless over a VLAN using nbd-server & dnsmasq to provide
DHCP, TFTP and NBD. (SDCARDs are impractical due to the maintenance costs
due to poor reliability over time in harsh environments.)



Unfortunately, the Debian initramfs-tools does not support configuring a
VLAN from the kernel command line. I have patched it to add the flag,
"vlan=eth0.775:eth0", as Ubuntu (
https://manpages.ubuntu.com/manpages/impish/man7/initramfs-tools.7.html),
without some of its ugly s390 compatibility bits.



The patch would be small, maybe 10 lines, just to init and scripts/function
(+more lines for the documentation).


Would this be of interest? If so I'll follow the instructions here:
https://salsa.debian.org/kernel-team/initramfs-tools/blob/master/docs/maintainer-notes.md
and send you a proper patch.


Thanks


Matthew



Dr. Matthew A. Swabey – Director

Bechtel Innovation Design Center, Purdue University, USA

Room BIDC 225 | (765) 494-8655 | maswa...@purdue.edu


Processed: found 990123 in iptables-netflow/2.3-5, found 990123 in iptables-netflow/2.5.1-2 ...

2021-06-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> # Version tracking seems to not have worked properly in the initial bug 
> submission
> found 990123 iptables-netflow/2.3-5
Bug #990123 
[iptables-netflow-dkms,linux-headers-4.19.0-17-amd64,linux-headers-4.19.0-17-i686-pae]
 [buster regression] iptables-netflow-dkms: No more compiles since 
linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream 
kernel API regression in 4.19.191?)
Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae'
Marked as found in versions iptables-netflow/2.3-5.
Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae'
> found 990123 iptables-netflow/2.5.1-2
Bug #990123 
[iptables-netflow-dkms,linux-headers-4.19.0-17-amd64,linux-headers-4.19.0-17-i686-pae]
 [buster regression] iptables-netflow-dkms: No more compiles since 
linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream 
kernel API regression in 4.19.191?)
Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae'
Marked as found in versions iptables-netflow/2.5.1-2.
Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae'
> found 990123 linux/4.19.194-1
Bug #990123 
[iptables-netflow-dkms,linux-headers-4.19.0-17-amd64,linux-headers-4.19.0-17-i686-pae]
 [buster regression] iptables-netflow-dkms: No more compiles since 
linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream 
kernel API regression in 4.19.191?)
Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae'
Marked as found in versions linux/4.19.194-1.
Warning: Unknown package 'linux-headers-4.19.0-17-i686-pae'
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
990123: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990123
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#990127: mt76x0 crashes repeatedly

2021-06-21 Thread Hypatia

Package: firmware-misc-nonfree
Version: 20190114-2
kernel module: mt76x0
Severity: serious


Following an update recently, this driver stopped working correctly.  I 
can now only get a working WiFi connection for a few seconds after 
reboot, or after waiting several minutes, making anything that requires 
the internet almost impossible. This was working fine until the update.


Once the interface is up, the driver crashes almost immediately.  It 
does not matter whether I use NetworkManager or do things manually with 
/etc/network/interfaces and then ifup.


The same trace is seen in the logs and dmesg repeatedly.  I have ruled 
out hardware issues.


uname -a :
Linux hope 4.19.0-16-amd64 #1 SMP Debian 4.19.181-1 (2021-03-19) x86_64 
GNU/Linux


# modinfo mt76x0
filename: 
/lib/modules/4.19.0-16-amd64/kernel/drivers/net/wireless/mediatek/mt76/mt76x0/mt76x0.ko

license:GPL
firmware:   mediatek/mt7610u.bin
alias:  usb:v0E8Dp7650d*dc*dsc*dp*icFFisc02ipFFin*
alias:  usb:v0E8Dp7630d*dc*dsc*dp*icFFisc02ipFFin*
alias:  usb:v2357p0105d*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v0DF6p0079d*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v7392pC711d*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v20F4p806Bd*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v293Cp5702d*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v057Cp8502d*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v04BBp0951d*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v07B8p7610d*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v0586p3425d*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v2001p3D02d*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v2019pAB31d*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v0DF6p0075d*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v0B05p17DBd*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v0B05p17D1d*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v148Fp760Ad*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v148Fp761Ad*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v7392pB711d*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v7392pA711d*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v0E8Dp7610d*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v13B1p003Ed*dc*dsc*dp*ic*isc*ip*in*
alias:  usb:v148Fp7610d*dc*dsc*dp*ic*isc*ip*in*
depends:mac80211,mt76,cfg80211,usbcore
retpoline:  Y
intree: Y
name:   mt76x0
vermagic:   4.19.0-16-amd64 SMP mod_unload modversions
sig_id: PKCS#7
signer: Debian Secure Boot CA
sig_key:4B:6E:F5:AB:CA:66:98:25:17:8E:05:2C:84:66:7C:CB:C0:53:1F:8C
sig_hashalgo:   sha256
signature:  58:62:E3:A8:7F:B6:04:24:F1:68:8E:F0:B1:AF:0B:34:8A:66:2D:A1:
59:54:49:75:B2:52:7F:FF:5D:6B:34:C5:D6:9F:5E:51:33:C3:57:BE:
38:8C:24:36:D7:C4:BE:1C:2F:62:FC:9C:A1:37:5C:04:17:59:57:0B:
35:A5:6A:9A:2B:1B:3F:D1:E3:78:CD:50:72:8E:8B:2B:3B:FF:DE:2A:
FC:8A:F6:A1:BF:FE:2B:52:8D:F8:6D:4D:73:2E:D6:09:5D:4A:EB:11:
D4:26:89:78:77:D9:BB:04:E6:C4:9A:5A:35:8E:1A:14:BA:84:D7:BF:
97:AB:0F:5F:A7:3E:D0:DF:DD:E2:75:F1:9E:2C:2A:48:09:AD:FF:D1:
9C:9E:61:45:44:D2:2E:DD:CE:7E:C8:96:D5:F7:A1:82:CA:33:F9:87:
5A:C8:FB:30:2B:36:45:12:2C:21:E4:23:CD:02:C5:69:93:B4:7E:A9:
FD:BF:A0:CA:A2:A7:FD:B5:F1:CC:C8:F2:44:A1:23:33:C0:32:3A:B6:
2E:6A:27:B8:C7:86:91:30:4A:E5:AC:14:51:50:B0:89:09:BC:31:EB:
E4:F3:27:51:63:10:29:A0:BB:3C:94:21:33:BE:0C:C7:47:56:08:BC:
4F:A2:FF:38:FF:D5:4C:DF:2C:A8:64:94:3D:6E:F3:6D
#


Relevant extract from dmesg:

[  996.874969] mt76x0 1-5:1.0: Error: send MCU cmd failed:-71
[  996.875010] mt76x0 1-5:1.0: Error: MCU response pre-completed!
[  996.885414] mt76x0 1-5:1.0: Error: send MCU cmd failed:-71
[  997.007009] mt76x0 1-5:1.0: Vendor request req:07 off:1798 failed:-71
[  997.275141] mt76x0 1-5:1.0: Vendor request req:07 off:1718 failed:-71
[  997.275154] [ cut here ]
[  997.275202] WARNING: CPU: 1 PID: 147 at 
drivers/net/wireless/mediatek/mt76/mt76x0/mac.c:55 
mt76_mac_fill_tx_status.isra.2+0x29e/0x2e0 [mt76x0]
[  997.275203] Modules linked in: arc4 mt76x0 mt76 mac80211 cfg80211 
bnep nfnetlink_queue nfnetlink_log bluetooth drbg ansi_cprng 
ecdh_generic cpufreq_powersave cpufreq_conservative cpufreq_userspace 
zram zsmalloc nf_log_ipv6 nf_log_ipv4 nf_log_common nft_limit 
nft_counter xt_LOG xt_limit ipt_REJECT nf_reject_ipv4 xt_tcpudp 
xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_multiport 
nft_compat nf_tables nfnetlink binfmt_misc edac_mce_amd 
snd_hda_codec_realtek kvm_amd snd_hda_codec_generic snd_hda_codec_hdmi 
snd_hda_intel snd_hda_codec ccp snd_hda_core rng_core snd_hwdep kvm 
eeepc_wmi joydev asus_wmi snd_pcm snd_timer sparse_keymap sg snd rfkill 
irqbypass soundcore wmi_bmof pcspkr sp5100_tco k10temp evdev pcc_cpufreq 
acpi_cpufreq cuse fuse it87 hwmon_vid parport_pc ppdev lp parport ip_tables
[  997.275240]  x_tables autofs4 ext4 crc16 mbcache jbd2 fscrypto ecb

linux_4.19.194-2_source.changes ACCEPTED into proposed-updates->stable-new, proposed-updates

2021-06-21 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 21 Jun 2021 10:46:20 +0200
Source: linux
Architecture: source
Version: 4.19.194-2
Distribution: buster
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Closes: 990072
Changes:
 linux (4.19.194-2) buster; urgency=medium
 .
   * proc: Track /proc/$pid/attr/ opener mm_struct (Closes: #990072)
Checksums-Sha1:
 197a08de95c8661cdb7c14713b0a4fc165a41fb5 191615 linux_4.19.194-2.dsc
 eb08a00d3ed97ef32d59a46aa3c1224133764a6d 3377504 linux_4.19.194-2.debian.tar.xz
 1f61d4c822b5f77c75425eec1a786d9f864871e4 6228 linux_4.19.194-2_source.buildinfo
Checksums-Sha256:
 e759f51d7cc10c866bf795d051971bbbea7c2a886cc93c49a58ed1c1af0e5d69 191615 
linux_4.19.194-2.dsc
 770c22a92b290c2e8a890ac601f3e5c4315c82caea23df1b8f52ddfba6a81d22 3377504 
linux_4.19.194-2.debian.tar.xz
 f12f2297dc47c399b77df462cc1d15e4e5df63aed2aa6e0a92ddccba5ec10439 6228 
linux_4.19.194-2_source.buildinfo
Files:
 61bf3b824d9a8bcffac3fb89dca7a9ae 191615 kernel optional linux_4.19.194-2.dsc
 f5b16a9030ba3519efd4b6f515cb1cef 3377504 kernel optional 
linux_4.19.194-2.debian.tar.xz
 4615001c65912a634283b5bfae1b872d 6228 kernel optional 
linux_4.19.194-2_source.buildinfo

-BEGIN PGP SIGNATURE-
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=PBMw
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Bug#990107: marked as done (linux-image-4.19.0-17-amd64: lxc-attach Operation not permitted - Failed to set AppArmor label)

2021-06-21 Thread Debian Bug Tracking System
Your message dated Mon, 21 Jun 2021 12:02:07 +
with message-id 
and subject line Bug#990072: fixed in linux 4.19.194-2
has caused the Debian Bug report #990072,
regarding linux-image-4.19.0-17-amd64: lxc-attach Operation not permitted - 
Failed to set AppArmor label
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
990072: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990072
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: src:linux
Version: 4.19.194-1
Severity: normal

Since upgrading to linux-image-4.19.0-17-amd64 from 
linux-image-4.19.0-16-amd64, I can no longer enter my lxc container with 
the command 'lxc-attach'. It fails with the message:


lxc-attach: shire: lsm/lsm.c: lsm_process_label_set_at: 174 Operation 
not permitted - Failed to set AppArmor label 
"lxc-shire_//&:lxc-shire_<-var-lib-lxc>:

unconfined"

Reverting to linux-image-4.19.0-16-amd64 version 4.19.181-1 (the 
previous kernel) fixes the issue.


The lxc config for this container is the following:

lxc.include = /usr/share/lxc/config/common.conf
lxc.include = /usr/share/lxc/config/userns.conf
lxc.arch = linux64
lxc.apparmor.profile = generated
lxc.apparmor.allow_nesting = 1
lxc.idmap = u 0 10 90
lxc.idmap = g 0 10 90
lxc.rootfs.path = dir:/var/lib/lxc/shire/rootfs
lxc.uts.name = shire
lxc.net.0.type = empty
lxc.mount.entry=/data/home home none bind 0 0
lxc.mount.entry=/data/mail var/mail none bind 0 0

And the auto-generated AppArmor profile:

#include 
profile "lxc-shire_" 
flags=(attach_disconnected,mediate_deleted) {

  ### Base profile
  capability,
  dbus,
  file,
  network,
  umount,

  # Allow us to receive signals from anywhere.
  signal (receive),

  # Allow us to send signals to ourselves
  signal peer=@{profile_name},

  # Allow other processes to read our /proc entries, futexes, perf 
tracing and
  # kcmp for now (they will need 'read' in the first place). 
Administrators can

  # override with:
  #   deny ptrace (readby) ...
  ptrace (readby),

  # Allow other processes to trace us by default (they will need 'trace' in
  # the first place). Administrators can override with:
  #   deny ptrace (tracedby) ...
  ptrace (tracedby),

  # Allow us to ptrace ourselves
  ptrace peer=@{profile_name},

  # ignore DENIED message on / remount
  deny mount options=(ro, remount) -> /,
  deny mount options=(ro, remount, silent) -> /,

  # allow tmpfs mounts everywhere
  mount fstype=tmpfs,

  # allow hugetlbfs mounts everywhere
  mount fstype=hugetlbfs,

  # allow mqueue mounts everywhere
  mount fstype=mqueue,

  # allow fuse mounts everywhere
  mount fstype=fuse,
  mount fstype=fuse.*,

  # deny access under /proc/bus to avoid e.g. messing with pci devices 
directly

  deny @{PROC}/bus/** wklx,

  # deny writes in /proc/sys/fs but allow binfmt_misc to be mounted
  mount fstype=binfmt_misc -> /proc/sys/fs/binfmt_misc/,
  deny @{PROC}/sys/fs/** wklx,

  # allow efivars to be mounted, writing to it will be blocked though
  mount fstype=efivarfs -> /sys/firmware/efi/efivars/,

  # block some other dangerous paths
  deny @{PROC}/kcore rwklx,
  deny @{PROC}/sysrq-trigger rwklx,

  # deny writes in /sys except for /sys/fs/cgroup, also allow
  # fusectl, securityfs and debugfs to be mounted there (read-only)
  mount fstype=fusectl -> /sys/fs/fuse/connections/,
  mount fstype=securityfs -> /sys/kernel/security/,
  mount fstype=debugfs -> /sys/kernel/debug/,
  deny mount fstype=debugfs -> /var/lib/ureadahead/debugfs/,
  mount fstype=proc -> /proc/,
  mount fstype=sysfs -> /sys/,
  mount options=(rw, nosuid, nodev, noexec, remount) -> /sys/,
  deny /sys/firmware/efi/efivars/** rwklx,
  # note, /sys/kernel/security/** handled below
  mount options=(ro, nosuid, nodev, noexec, remount, strictatime) -> 
/sys/fs/cgroup/,


  # deny reads from debugfs
  deny /sys/kernel/debug/{,**} rwklx,

  # allow paths to be made slave, shared, private or unbindable
  # FIXME: This currently doesn't work due to the apparmor parser 
treating those as allowing all mounts.

#  mount options=(rw,make-slave) -> **,
#  mount options=(rw,make-rslave) -> **,
#  mount options=(rw,make-shared) -> **,
#  mount options=(rw,make-rshared) -> **,
#  mount options=(rw,make-private) -> **,
#  mount options=(rw,make-rprivate) -> **,
#  mount options=(rw,make-unbindable) -> **,
#  mount options=(rw,make-runbindable) -> **,

  # allow bind-mounts of anything except /proc, /sys and /dev
  mount options=(rw,bind) /[^spd]*{,/**},
  mount options=(rw,bind) /d[^e]*{,/**},
  mount options=(rw,bind) /de[^v]*{,/**},
  mount options=(rw,bin

Bug#990089: marked as done (linux-image-4.19.0-17-amd64: lxc-attach fails with Failed to set AppArmor label unconfined)

2021-06-21 Thread Debian Bug Tracking System
Your message dated Mon, 21 Jun 2021 12:02:07 +
with message-id 
and subject line Bug#990072: fixed in linux 4.19.194-2
has caused the Debian Bug report #990072,
regarding linux-image-4.19.0-17-amd64: lxc-attach fails with Failed to set 
AppArmor label unconfined
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
990072: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990072
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: src:linux
Version: 4.19.194-1
Severity: normal

Dear Maintainer,

After upgrading from linux-image-4.19.0-16-amd64 to linux-image-4.19.0-17-amd64
attaching an unprivileged linux container fails with the message:
lxc-attach: debian-buster-amd64-basic: lsm/lsm.c: lsm_process_label_set_at: 174
Operation not permitted - Failed to set AppArmor label "unconfined"
Rebooting into linux-image-4.19.0-16-amd64 with no other changes, the lxc
system works as expected.

Regrads,
Mark Grant



-- Package-specific info:
** Version:
Linux version 4.19.0-17-amd64 (debian-kernel@lists.debian.org) (gcc version 
8.3.0 (Debian 8.3.0-6)) #1 SMP Debian 4.19.194-1 (2021-06-10)

** Command line:
BOOT_IMAGE=/vmlinuz-4.19.0-17-amd64 root=/dev/mapper/priam--vg-root ro

** Not tainted

** Kernel log:
[   14.211487] snd_hda_codec_realtek hdaudioC0D0:  Rear Mic=0x18
[   14.211554] snd_hda_codec_realtek hdaudioC0D0:  Line=0x1a
[   14.351839] input: HDA Intel PCH Front Mic as 
/devices/pci:00/:00:1f.3/sound/card0/input10
[   14.351896] input: HDA Intel PCH Rear Mic as 
/devices/pci:00/:00:1f.3/sound/card0/input11
[   14.351941] input: HDA Intel PCH Line as 
/devices/pci:00/:00:1f.3/sound/card0/input12
[   14.351981] input: HDA Intel PCH Line Out as 
/devices/pci:00/:00:1f.3/sound/card0/input13
[   14.352023] input: HDA Intel PCH Front Headphone as 
/devices/pci:00/:00:1f.3/sound/card0/input14
[   14.352071] input: HDA Intel PCH HDMI/DP,pcm=3 as 
/devices/pci:00/:00:1f.3/sound/card0/input15
[   14.352116] input: HDA Intel PCH HDMI/DP,pcm=7 as 
/devices/pci:00/:00:1f.3/sound/card0/input16
[   14.352164] input: HDA Intel PCH HDMI/DP,pcm=8 as 
/devices/pci:00/:00:1f.3/sound/card0/input17
[   14.352214] input: HDA Intel PCH HDMI/DP,pcm=9 as 
/devices/pci:00/:00:1f.3/sound/card0/input18
[   14.352257] input: HDA Intel PCH HDMI/DP,pcm=10 as 
/devices/pci:00/:00:1f.3/sound/card0/input19
[   14.562406] EXT4-fs (dm-2): mounted filesystem with ordered data mode. Opts: 
errors=remount-ro
[   14.743100] EXT4-fs (sda1): mounting ext2 file system using the ext4 
subsystem
[   14.815334] EXT4-fs (sda1): mounted filesystem without journal. Opts: (null)
[   15.862180] audit: type=1400 audit(1624175633.583:2): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=651 
comm="apparmor_parser"
[   15.864947] audit: type=1400 audit(1624175633.583:3): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" 
pid=651 comm="apparmor_parser"
[   15.876271] audit: type=1400 audit(1624175633.595:4): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=650 
comm="apparmor_parser"
[   15.879040] audit: type=1400 audit(1624175633.595:5): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="man_filter" pid=650 
comm="apparmor_parser"
[   15.881633] audit: type=1400 audit(1624175633.595:6): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="man_groff" pid=650 
comm="apparmor_parser"
[   15.916140] audit: type=1400 audit(1624175633.635:7): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="/usr/bin/lxc-start" pid=654 
comm="apparmor_parser"
[   15.920983] audit: type=1400 audit(1624175633.639:8): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="virt-aa-helper" pid=649 
comm="apparmor_parser"
[   15.972116] audit: type=1400 audit(1624175633.691:9): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="lxc-container-default" 
pid=659 comm="apparmor_parser"
[   15.975071] audit: type=1400 audit(1624175633.691:10): apparmor="STATUS" 
operation="profile_load" profile="unconfined" name="lxc-container-default-cgns" 
pid=659 comm="apparmor_parser"
[   15.977826] audit: type=1400 audit(1624175633.691:11): apparmor="STATUS" 
operation="profile_load" profile="unconfined" 
name="lxc-container-default-with-mounting" pid=659 comm="apparmor_parser"
[   16.845248] usb 1-8: reset high-speed USB device number 3 using xhci_hcd
[   17.604508] new mount o

Bug#990072: marked as done (lxc-attach fails after debian 10.10 update)

2021-06-21 Thread Debian Bug Tracking System
Your message dated Mon, 21 Jun 2021 12:02:07 +
with message-id 
and subject line Bug#990072: fixed in linux 4.19.194-2
has caused the Debian Bug report #990072,
regarding lxc-attach fails after debian 10.10 update
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
990072: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990072
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: lxc
Version: 1:3.1.0+really3.0.3-8
Severity: grave
Justification: renders package unusable

Dear Maintainer,

Applied latest apt updates (debian 10.10) and rebooted.  After reboot, 
lxc-attach doesn't work.

from /var/log/apt/history.log:

Start-Date: 2021-06-19  12:27:42
Commandline: apt-get dist-upgrade
Requested-By: matthew (1011)
Install: linux-headers-4.19.0-17-common:amd64 (4.19.194-1, automatic), 
linux-headers-4.19.0-17-amd64:amd64 (4.19.194-1, automatic), 
linux-image-4.19.0-17-amd64:amd64 (4.19.194-1, automatic)
Upgrade: libapt-inst2.0:amd64 (1.8.2.2, 1.8.2.3), apt:amd64 (1.8.2.2, 1.8.2.3), 
mariadb-common:amd64 (1:10.3.27-0+deb10u1, 1:10.3.29-0+deb10u1), 
linux-compiler-gcc-8-x86:amd64 (4.19.181-1, 4.19.194-1), libklibc:amd64 
(2.0.6-1, 2.0.6-1+deb10u1), libcpupower1:amd64 (4.19.181-1, 4.19.194-1), 
libapt-pkg5.0:amd64 (1.8.2.2, 1.8.2.3), shim-helpers-amd64-signed:amd64 
(1+15+1533136590.3beb971+7+deb10u1, 1+15.4+5~deb10u1), linux-image-amd64:amd64 
(4.19+105+deb10u11, 4.19+105+deb10u12), libgcrypt20:amd64 (1.8.4-5, 
1.8.4-5+deb10u1), linux-headers-amd64:amd64 (4.19+105+deb10u11, 
4.19+105+deb10u12), libhogweed4:amd64 (3.4.1-1, 3.4.1-1+deb10u1), 
apt-utils:amd64 (1.8.2.2, 1.8.2.3), shim-unsigned:amd64 
(15+1533136590.3beb971-7+deb10u1, 15.4-5~deb10u1), shim-signed:amd64 
(1.33+15+1533136590.3beb971-7, 1.36~1+deb10u1+15.4-5~deb10u1), libnettle6:amd64 
(3.4.1-1, 3.4.1-1+deb10u1), libxml2:amd64 (2.9.4+dfsg1-7+deb10u1, 
2.9.4+dfsg1-7+deb10u2), libmariadb3:amd64 (1:10.3.27-0+deb10u1, 
1:10.3.29-0+deb10u1), libgnutls30:amd64 (3.6.7-4+deb10u6, 3.6.7-4+deb10u7), 
linux-kbuild-4.19:amd64 (4.19.181-1, 4.19.194-1), klibc-utils:amd64 (2.0.6-1, 
2.0.6-1+deb10u1), libglib2.0-0:amd64 (2.58.3-2+deb10u2, 2.58.3-2+deb10u3), 
shim-signed-common:amd64 (1.33+15+1533136590.3beb971-7, 
1.36~1+deb10u1+15.4-5~deb10u1), linux-cpupower:amd64 (4.19.181-1, 4.19.194-1), 
base-files:amd64 (10.3+deb10u9, 10.3+deb10u10)
End-Date: 2021-06-19  12:29:41


$ lxc-attach mar-mon1
lxc-attach: mar-mon1: lsm/lsm.c: lsm_process_label_set_at: 174 Operation not 
permitted - Failed to set AppArmor label 
"lxc-mar-mon1_//&:lxc-mar-mon1_<-var-lib-lxc>:unconfined"

The lxc-config file contains

lxc.apparmor.profile = generated
lxc.apparmor.allow_nesting = 1

The generated apparmor seems unchanged when I compare it to containers on a 
server I didn't reboot. 
I did reboot 2 servers after this debian update, and both have this problem.


-- System Information:
Debian Release: 10.10
  APT prefers stable
  APT policy: (500, 'stable'), (90, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-17-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages lxc depends on:
ii  debconf [debconf-2.0]  1.5.71
ii  libc6  2.28-10
ii  libcap21:2.25-2
ii  libgnutls303.6.7-4+deb10u7
ii  liblxc11:3.1.0+really3.0.3-8
ii  libseccomp22.3.3-4
ii  libselinux12.8-1+b1
ii  lsb-base   10.2019051400

Versions of packages lxc recommends:
ii  apparmor   2.13.2-10
ii  bridge-utils   1.6-2
pn  debootstrap
ii  dirmngr2.2.12-1+deb10u1
pn  dnsmasq-base   
ii  gnupg  2.2.12-1+deb10u1
ii  iproute2   4.20.0-2+deb10u1
ii  iptables   1.8.2-4
pn  libpam-cgfs
pn  lxc-templates  
ii  lxcfs  3.0.3-2
ii  openssl1.1.1d-0+deb10u6
pn  rsync  
pn  uidmap 

Versions of packages lxc suggests:
pn  btrfs-progs  
pn  lvm2 
pn  python3-lxc  

-- debconf information excluded
--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 4.19.194-2
Done: Salvatore Bonaccorso 

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments ple

Bug#990075: marked as done (lxc-attach fails after debian 10.10 update)

2021-06-21 Thread Debian Bug Tracking System
Your message dated Mon, 21 Jun 2021 12:02:07 +
with message-id 
and subject line Bug#990072: fixed in linux 4.19.194-2
has caused the Debian Bug report #990072,
regarding lxc-attach fails after debian 10.10 update
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
990072: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990072
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: lxc
Version: 1:3.1.0+really3.0.3-8
Severity: grave
Justification: renders package unusable

Dear Maintainer,

Applied latest apt updates (debian 10.10) and rebooted.  After reboot, 
lxc-attach doesn't work.

from /var/log/apt/history.log:

Start-Date: 2021-06-19  12:27:42
Commandline: apt-get dist-upgrade
Requested-By: matthew (1011)
Install: linux-headers-4.19.0-17-common:amd64 (4.19.194-1, automatic), 
linux-headers-4.19.0-17-amd64:amd64 (4.19.194-1, automatic), 
linux-image-4.19.0-17-amd64:amd64 (4.19.194-1, automatic)
Upgrade: libapt-inst2.0:amd64 (1.8.2.2, 1.8.2.3),apt:amd64  (1.8.2.2, 1.8.2.3), 
mariadb-common:amd64 (1:10.3.27-0+deb10u1, 1:10.3.29-0+deb10u1), 
linux-compiler-gcc-8-x86:amd64 (4.19.181-1, 4.19.194-1), libklibc:amd64 
(2.0.6-1, 2.0.6-1+deb10u1), libcpupower1:amd64 (4.19.181-1, 4.19.194-1), 
libapt-pkg5.0:amd64 (1.8.2.2, 1.8.2.3), shim-helpers-amd64-signed:amd64 
(1+15+1533136590.3beb971+7+deb10u1, 1+15.4+5~deb10u1), linux-image-amd64:amd64 
(4.19+105+deb10u11, 4.19+105+deb10u12), libgcrypt20:amd64 (1.8.4-5, 
1.8.4-5+deb10u1), linux-headers-amd64:amd64 (4.19+105+deb10u11, 
4.19+105+deb10u12), libhogweed4:amd64 (3.4.1-1, 3.4.1-1+deb10u1), 
apt-utils:amd64 (1.8.2.2, 1.8.2.3), shim-unsigned:amd64 
(15+1533136590.3beb971-7+deb10u1, 15.4-5~deb10u1), shim-signed:amd64 
(1.33+15+1533136590.3beb971-7, 1.36~1+deb10u1+15.4-5~deb10u1), libnettle6:amd64 
(3.4.1-1, 3.4.1-1+deb10u1), libxml2:amd64 (2.9.4+dfsg1-7+deb10u1, 
2.9.4+dfsg1-7+deb10u2), libmariadb3:amd64 (1:10.3.27-0+deb10u1, 
1:10.3.29-0+deb10u1), libgnutls30:amd64 (3.6.7-4+deb10u6, 3.6.7-4+deb10u7), 
linux-kbuild-4.19:amd64 (4.19.181-1, 4.19.194-1), klibc-utils:amd64 (2.0.6-1, 
2.0.6-1+deb10u1), libglib2.0-0:amd64 (2.58.3-2+deb10u2, 2.58.3-2+deb10u3), 
shim-signed-common:amd64 (1.33+15+1533136590.3beb971-7, 
1.36~1+deb10u1+15.4-5~deb10u1), linux-cpupower:amd64 (4.19.181-1, 4.19.194-1), 
base-files:amd64 (10.3+deb10u9, 10.3+deb10u10)
End-Date: 2021-06-19  12:29:41


$ lxc-attach mar-mon1
lxc-attach: mar-mon1: lsm/lsm.c: lsm_process_label_set_at: 174 Operation not permitted - Failed to set 
AppArmor label 
"lxc-mar-mon1_//&:lxc-mar-mon1_<-var-lib-lxc>:unconfined"

The lxc-config file contains

lxc.apparmor.profile = generated
lxc.apparmor.allow_nesting = 1

The generated apparmor seems unchanged when I compare it to containers on a 
server I didn't reboot.
I did reboot 2 servers after this debian update, and both have this problem.


-- System Information:
Debian Release: 10.10
  APT prefers stable
  APT policy: (500, 'stable'), (90, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-17-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages lxc depends on:
ii  debconf [debconf-2.0]  1.5.71
ii  libc6  2.28-10
ii  libcap21:2.25-2
ii  libgnutls303.6.7-4+deb10u7
ii  liblxc11:3.1.0+really3.0.3-8
ii  libseccomp22.3.3-4
ii  libselinux12.8-1+b1
ii  lsb-base   10.2019051400

Versions of packages lxc recommends:
ii  apparmor   2.13.2-10
ii  bridge-utils   1.6-2
pn  debootstrap
ii  dirmngr2.2.12-1+deb10u1
pn  dnsmasq-base   
ii  gnupg  2.2.12-1+deb10u1
ii  iproute2   4.20.0-2+deb10u1
ii  iptables   1.8.2-4
pn  libpam-cgfs
pn  lxc-templates  
ii  lxcfs  3.0.3-2
ii  openssl1.1.1d-0+deb10u6
pn  rsync  
pn  uidmap 

Versions of packages lxc suggests:
pn  btrfs-progs  
pn  lvm2 
pn  python3-lxc  
--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 4.19.194-2
Done: Salvatore Bonaccorso 

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 990...@bugs.d

Bug#982270: Re Bug#982270 (installer can not find an ehternet driver for CuBox-i4Pro)

2021-06-21 Thread Rick Thomas
> Pushed a fix to git:
> 
> https://salsa.debian.org/kernel-team/linux/-/commit/f952b94621847732b3ed96a74babb89b6a1862f6

Wow!  Thanks!  At least I now know I'm not crazy...  Any idea how long it will 
be before the fix is in something I can download and install with?

Enjoy!
Rick



Bug#883194: please convert mountstats and nfsiostat scripts to Python3

2021-06-21 Thread Diederik de Haas
On maandag 21 juni 2021 13:20:46 CEST Drew Parsons wrote:
> I was surprised to see python2 pulled in on a new bullseye
> installation using nfs.
> 
> It's a trivial patch of course to update the hashbangs for mountstats
> and nfsiostat in nfs-common 1:1.3.4-5 to python3.

https://salsa.debian.org/kernel-team/nfs-utils/-/merge_requests/4 has been 
submitted 9 months ago, which does exactly that.


signature.asc
Description: This is a digitally signed message part.


Bug#990123: [buster regression] iptables-netflow-dkms: No more compiles since linux-*-4.19.0-17-*: "implicit declaration of function ‘ref_module’" (Upstream kernel API regression in 4.19.191?)

2021-06-21 Thread Axel Beckert
Package: 
iptables-netflow-dkms,linux-headers-4.19.0-17-amd64,linux-headers-4.19.0-17-i686-pae
Severity: serious
Version: iptables-netflow/2.3-5
Version: iptables-netflow/2.5.1-2
Version: linux/4.19.194-1
Tags: buster
Forwarded: https://github.com/aabc/ipt-netflow/issues/177

Since kernel packages linux-{image,headers}-4.19.0-17-*, at least with
-amd64 and -i686-pae, iptables-netflow-dkms no more compiles its kernel
module upon kernel installation:

In file included from /var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c:75:
/var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c: In function 
‘register_ct_events’:
/var/lib/dkms/ipt-netflow/2.3/build/compat.h:173:21: error: implicit 
declaration of function ‘ref_module’; did you mean ‘use_module’? 
[-Werror=implicit-function-declaration]
 # define use_module ref_module
 ^~
/var/lib/dkms/ipt-netflow/2.3/build/ipt_NETFLOW.c:5399:3: note: in expansion of 
macro ‘use_module’
   use_module(THIS_MODULE, netlink_m);
   ^~

Reading the kernel changelog, there are a few very suspicious entries
listed under upstream version 4.19.191:

- modules: mark ref_module static
- modules: mark find_symbol static
- modules: mark each_symbol_section static

One of the commits above (8745aa4e resp. 7ef5264d) states:

  ref_module isn't used anywhere outside of module.c.

Which is only seems true if you ignore any third-party kernel modules
out there.

So why is the kernel API suddenly removing API-code used by third-party
modules inmidst a stable update? This looks like a regression to me.  I
thought that stable updates only change the ABI, but not the API. (Well,
at least upstream and in Debian. :-)

I also tried the iptables-netflow-dkms 2.5.1-2 from Bullseye on Buster,
but it fails to build the kernel module for 4.19.0-17-* when as well.

2.5.1-2 though still works fine on Sid/Bullseye, hence marked as found
in the version in Sid, but tagged buster. In case this causes issues in
the BTS or the release team scripts, please rather remove 2.5.1-2 from
the "found" versions instead of removing the buster tag — unless the
same regression gets introduced into Sid and Bullseye as well.

Debian kernel maintainers: If this 3rd-party-module-breaking regression
was really intended and won't be fixed, please reassign the bug to
iptables-netflow-dkms only.

I also reported this issue to iptables-netflow upstream at
https://github.com/aabc/ipt-netflow/issues/177 as I think it at least
should update the version based ifdef checks in something which looks
like a similar issue in kernel 5.13, see
https://github.com/aabc/ipt-netflow/commit/5aae3791922bd3df878605b15e83ea48a4bd096c
which is part of iptables-netflow upstream's 2.6 release, not yet
packaged due to the freeze for bullseye.

I'll try and see if I can get that fix backported to the package in
buster (and if needed, later to the one in bullseye as well) and will
see if it actually helps in this case, too.

JFTR: dkms from buster-backports (as reported below) is only installed
as I needed it for the iptables-netflow-dkms package from bullseye. It
happened with dkms from buster before as well.

-- System Information:
Debian Release: 10.10
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-debug'), (500, 'stable'), 
(400, 'proposed-updates-debug'), (400, 'proposed-updates')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-12-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled

Versions of packages iptables-netflow-dkms depends on:
ii  dkms2.8.4-3~bpo10+1
ii  libc6   2.28-10
ii  libc6-dev   2.28-10
ii  libxtables-dev  1.8.2-4
ii  pkg-config  0.29-6

Versions of packages iptables-netflow-dkms recommends:
ii  iptables  1.8.2-4

Versions of packages iptables-netflow-dkms suggests:
ii  irqtop  2.3-5
ii  nfdump  1.6.17-1

-- no debconf information



Bug#883194: please convert mountstats and nfsiostat scripts to Python3

2021-06-21 Thread Drew Parsons
Package: nfs-common
Followup-For: Bug #883194
X-Debbugs-Cc: debian-rele...@lists.debian.org

I was surprised to see python2 pulled in on a new bullseye
installation using nfs.

It's a trivial patch of course to update the hashbangs for mountstats
and nfsiostat in nfs-common 1:1.3.4-5 to python3.

As far as I can see the scripts are python3 compatible.  Upstream
history at
  
http://git.linux-nfs.org/?p=steved/nfs-utils.git;a=history;f=tools/mountstats/mountstats.py;hb=d1683f356bd920d93f2db007902b2c46f97a2e49
  
http://git.linux-nfs.org/?p=steved/nfs-utils.git;a=history;f=tools/nfs-iostat/nfs-iostat.py;hb=d1683f356bd920d93f2db007902b2c46f97a2e49
indicates the scripts were patched in July 2014 to work with python3

Should Bug#883194 be considered RC and the patch applied now?



Bug#990089: linux-image-4.19.0-17-amd64: lxc-attach fails with Failed to set AppArmor label unconfined

2021-06-21 Thread Salvatore Bonaccorso
Hi,

On Mon, Jun 21, 2021 at 10:24:31AM +0100, Gmail wrote:
> Salvatore,
> 
> On Sun, 2021-06-20 at 20:39 +0200, Salvatore Bonaccorso wrote:
> > Hi Mark,
> > 
> > On Sun, Jun 20, 2021 at 10:44:29AM +0100, Mark Grant wrote:
> > > Package: src:linux
> > > Version: 4.19.194-1
> > > Severity: normal
> > > 
> > > Dear Maintainer,
> > > 
> > > After upgrading from linux-image-4.19.0-16-amd64 to linux-image-
> > > 4.19.0-17-amd64
> > > attaching an unprivileged linux container fails with the message:
> > > lxc-attach: debian-buster-amd64-basic: lsm/lsm.c:
> > > lsm_process_label_set_at: 174
> > > Operation not permitted - Failed to set AppArmor label "unconfined"
> > > Rebooting into linux-image-4.19.0-16-amd64 with no other changes,
> > > the lxc
> > > system works as expected.
> > 
> > I think this is the same issue as in #990072, would you be able to
> > test the patch as commited
> > https://salsa.debian.org/kernel-team/linux/-/commit/d3fc7c8514bed949d8797cfd3a50a1bed95629c0
> > ?
> > 
> I can confirm that the patch fixed the problem. Many thanks.

Again, thanks. An update is pending and will be released once we have
the builds.

Regards,
Salvatore



Bug#986822: BUG#986822 Broadwell SST CATPT Sound module

2021-06-21 Thread Dekks Herton
problem resolved, i think.

new sof firmware update came out, not sure its arrival was more than a
coincidence

1 - disabling all intel vitrualisation options in the helix bios was enough
to allow the fw to load thus  pavucontrol was now seeing input bars moving
but no sound output.

2 - ran alsactl -U init after i noticed ucm errors when running alsactl
init.

3 - aplay -l now sees all 3 cards when docked and 2 when tablet only.

4 - alsamixer still showed the correct hw but a lot of outputs were muted,
by enabling and disabling them all in sequence enabling the front dac
enabled sount from the rt256 card and headphone socket.

I'm doing basic checks like detaching and reattaching to see if that
affects the sound, so far ok Only noticeable thing is the fw gets reloaded
3 or 4 times a session, but doesn't seem to affect anything . If i have not
commented more  in a week feel free to close the bug.

On Tue, 15 Jun 2021 at 11:43, Dekks Herton  wrote:

> Hi Vincent
>
> I'll kill the pipewire server, i would uninstall the packages but they are
> hard deps for gnome now.
>
> Is the fw file catpt is trying to load the correct one? Is there new fw
> files that come with catpt that have been forgotten?
> Is there a listiing for the error codes -110 and -2, are they missing
> files or read permission issues?
>
> Regards.
>
>
>
>
> On Sun, 13 Jun 2021 at 18:08, Vincent Blut  wrote:
>
>> Hi,
>>
>> Le 2021-06-05 08:31, Dekks Herton a écrit :
>> > Hi
>> >
>> > Additional alsa-info script output
>>
>> From a quick look, alsa-info reports that you're running both PipeWire and
>> PulseAudio sound servers. While it may not be the root cause of your
>> issue,
>> if you want to stick with the former, please disable the latter:
>> $ sudo systemctl --user disable --now pulseaudio.service pulseaudio.socket
>>
>> Note though that using PipeWire as a substitute to PulseAudio/JACK/ALSA in
>> Debian 11 is considered experimental.
>>
>> Cheers,
>> Vincent
>>
>


Bug#990089: linux-image-4.19.0-17-amd64: lxc-attach fails with Failed to set AppArmor label unconfined

2021-06-21 Thread Gmail
Salvatore,

On Sun, 2021-06-20 at 20:39 +0200, Salvatore Bonaccorso wrote:
> Hi Mark,
> 
> On Sun, Jun 20, 2021 at 10:44:29AM +0100, Mark Grant wrote:
> > Package: src:linux
> > Version: 4.19.194-1
> > Severity: normal
> > 
> > Dear Maintainer,
> > 
> > After upgrading from linux-image-4.19.0-16-amd64 to linux-image-
> > 4.19.0-17-amd64
> > attaching an unprivileged linux container fails with the message:
> > lxc-attach: debian-buster-amd64-basic: lsm/lsm.c:
> > lsm_process_label_set_at: 174
> > Operation not permitted - Failed to set AppArmor label "unconfined"
> > Rebooting into linux-image-4.19.0-16-amd64 with no other changes,
> > the lxc
> > system works as expected.
> 
> I think this is the same issue as in #990072, would you be able to
> test the patch as commited
> https://salsa.debian.org/kernel-team/linux/-/commit/d3fc7c8514bed949d8797cfd3a50a1bed95629c0
> ?
> 
I can confirm that the patch fixed the problem. Many thanks.

Regards,
Mark

> Regards,
> Salvatore



linux_4.19.194-2_source.changes ACCEPTED into proposed-updates->stable-new

2021-06-21 Thread Debian FTP Masters
Mapping buster to stable.
Mapping stable to proposed-updates.

Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 21 Jun 2021 10:46:20 +0200
Source: linux
Architecture: source
Version: 4.19.194-2
Distribution: buster
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Closes: 990072
Changes:
 linux (4.19.194-2) buster; urgency=medium
 .
   * proc: Track /proc/$pid/attr/ opener mm_struct (Closes: #990072)
Checksums-Sha1:
 197a08de95c8661cdb7c14713b0a4fc165a41fb5 191615 linux_4.19.194-2.dsc
 eb08a00d3ed97ef32d59a46aa3c1224133764a6d 3377504 linux_4.19.194-2.debian.tar.xz
 1f61d4c822b5f77c75425eec1a786d9f864871e4 6228 linux_4.19.194-2_source.buildinfo
Checksums-Sha256:
 e759f51d7cc10c866bf795d051971bbbea7c2a886cc93c49a58ed1c1af0e5d69 191615 
linux_4.19.194-2.dsc
 770c22a92b290c2e8a890ac601f3e5c4315c82caea23df1b8f52ddfba6a81d22 3377504 
linux_4.19.194-2.debian.tar.xz
 f12f2297dc47c399b77df462cc1d15e4e5df63aed2aa6e0a92ddccba5ec10439 6228 
linux_4.19.194-2_source.buildinfo
Files:
 61bf3b824d9a8bcffac3fb89dca7a9ae 191615 kernel optional linux_4.19.194-2.dsc
 f5b16a9030ba3519efd4b6f515cb1cef 3377504 kernel optional 
linux_4.19.194-2.debian.tar.xz
 4615001c65912a634283b5bfae1b872d 6228 kernel optional 
linux_4.19.194-2_source.buildinfo

-BEGIN PGP SIGNATURE-
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=PBMw
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Processing of linux_4.19.194-2_source.changes

2021-06-21 Thread Debian FTP Masters
linux_4.19.194-2_source.changes uploaded successfully to localhost
along with the files:
  linux_4.19.194-2.dsc
  linux_4.19.194-2.debian.tar.xz
  linux_4.19.194-2_source.buildinfo

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#990106:

2021-06-21 Thread Diederik de Haas
On maandag 21 juni 2021 03:14:47 CEST Davide Beatrici wrote:
> I reproduced the problem on 5.10.0-6 as well
> I believe the relay in the amplifier is going bad

It maybe useful to try a 5.9.x kernel as well, to properly rule out the kernel 
as the source of the issues. Difference between -6 and -7 aren't that big.
You should be able to find that on https://snapshot.debian.org/

signature.asc
Description: This is a digitally signed message part.


Bug#990072: Update

2021-06-21 Thread Salvatore Bonaccorso
Hi Matthew,

On Sun, Jun 20, 2021 at 11:14:57PM -0400, Matthew Darwin wrote:
> kernel 4.19.194-1a~test resolved the issue
> 
> Applied
> https://lore.kernel.org/stable/20210614102643.875096...@linuxfoundation.org/
> using the process described at
> https://kernel-team.pages.debian.net/kernel-handbook/ch-common-tasks.html

Many thanks for confirming.

Regards,
Salvatore



Processed: bug 990008 is forwarded to https://bugzilla.kernel.org/show_bug.cgi?id=213481

2021-06-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> forwarded 990008 https://bugzilla.kernel.org/show_bug.cgi?id=213481
Bug #990008 [src:linux] linux-image-5.10.0-7-amd64: e1000e driver fails to load 
after upgrade to bullseye from buster
Set Bug forwarded-to-address to 
'https://bugzilla.kernel.org/show_bug.cgi?id=213481'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
990008: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990008
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: bug 990008 is forwarded to https://bugzilla.kernel.org/show_bug.cgi?id=213481, tagging 990008

2021-06-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> forwarded 990008 https://bugzilla.kernel.org/show_bug.cgi?id=213481
Bug #990008 [src:linux] linux-image-5.10.0-7-amd64: e1000e driver fails to load 
after upgrade to bullseye from buster
Ignoring request to change the forwarded-to-address of bug#990008 to the same 
value
> tags 990008 + upstream
Bug #990008 [src:linux] linux-image-5.10.0-7-amd64: e1000e driver fails to load 
after upgrade to bullseye from buster
Added tag(s) upstream.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
990008: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990008
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



linux-image-4.19.0-17-amd64: bug in ath10k driver for QCA6174 wifi card

2021-06-21 Thread Francesco Magliocca
Hi all, starting from Debian Buster (on older kernels it works, on
newer kernels it fails), I have a problem with the Wi-Fi connection of
my PC:
When I connect a Huawei P Smart smartphone to the same wireless
network my PC is on,
my Wi-Fi card hangs indefinitely, thus causing a disconnection, and I
have to force restart it.

I performed a git bisect on the linux kernel git repo finding the
commit that caused the problem, and it is the commit:

e3def6f7ddf88636febb12e1e3e86387a4ce5452

If I revert the changes introduced by this commit, my bug does not
happen anymore.

I also filed a bug to the ath10k driver mailing list, which contains a
little bit more details:
http://lists.infradead.org/pipermail/ath10k/2021-June/012693.html

Note that in this bug I use a newer kernel, to show that the problem
was not fixed by newer versions of the driver. I am afraid this may be
related to a bug in the firmware,
because after that commit, the size of the htt_rx_desc structure
changes, but the driver tells
the device about the memory layout of htt_rx_desc at runtime,
therefore it could be that in the firmware there is some hardcoded
value that makes things fail.

But really this is only handwaving, I tried sniffing the network with
wireshark but I could not find anything strange, even if there must be
something because this bug is only triggered by a specific model of
smartphone, I tried with two different Huawei P Smart 2019 and both
trigger the bug.

Thanks in advance.
Sincerely,
Francesco Magliocca