Bug#1015167: CPU stall while running fwupdmgr

2022-08-13 Thread Marco d'Itri
On Aug 13, Salvatore Bonaccorso  wrote:

> Do you still experience this problem with the latest kernel in
> unstable or experimental?
No, but IIRC the bug was not deterministic and a later update with the 
same kernel did not actually trigger it.

-- 
ciao,
Marco


signature.asc
Description: PGP signature


Upcoming oldstable point release (10.13)

2022-08-13 Thread Adam D. Barratt
Hi,

The next - and final - point release for "buster" (10.13) is scheduled
for Saturday, September 10th. Processing of new uploads into buster-
proposed-updates will be frozen during the weekend of August 27th.

Regards,

Adam



Upcoming stable point release (11.5)

2022-08-13 Thread Adam D. Barratt
Hi,

The next point release for "bullseye" (11.5) is scheduled for Saturday,
September 10th. Processing of new uploads into bullseye-proposed-
updates will be frozen during the preceding weekend.

Regards,

Adam



Processed: Re: Bug#1016317: linux-image-5.10.0-16-armmp: insecure W+X mapping

2022-08-13 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + moreinfo
Bug #1016317 [src:linux] linux-image-5.10.0-16-armmp: insecure W+X mapping
Added tag(s) moreinfo.

-- 
1016317: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016317
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1016317: linux-image-5.10.0-16-armmp: insecure W+X mapping

2022-08-13 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo

On Fri, Jul 29, 2022 at 08:04:56PM +0200, Rainer Dorsch wrote:
> Package: src:linux
> Version: 5.10.127-2
> Severity: normal
> 
> Dear Maintainer,
> 
> I just noticed after booting into the kernel 5.10.0-16-armmp #1 SMP Debian 
> 5.10.127-2 (2022-07-23) armv7l GNU/Linux (on a SolidRun Cubox-i with an NXP 
> iMX6) that I get an 
> 
> insecure W+X mapping  at address 0xf0879000
> 
> on a serial console and a backtrace during the boot process:
> 
> [5.377591] Registering SWP/SWPB emulation handler
> [5.382640] registered taskstats version 1
> [5.386784] Loading compiled-in X.509 certificates
> [5.787454] Loaded X.509 cert 'Debian Secure Boot CA: 
> 6ccece7e4c6c0d1f6149f3dd27dfcc5cbb419ea1'
> [5.796311] Loaded X.509 cert 'Debian Secure Boot Signer 2021 - linux: 
> 4b6ef5abca669825178e052c84667ccbc0531f8c'
> [5.806849] zswap: loaded using pool lzo/zbud
> [5.812253] Key type ._fscrypt registered
> [5.816352] Key type .fscrypt registered
> [5.820314] Key type fscrypt-provisioning registered
> [5.825722] AppArmor: AppArmor sha1 policy hashing enabled
> [5.865627] vcc_3v3: supplied by v_5v0
> [5.895845] Freeing unused kernel memory: 2048K
> [5.913843] [ cut here ]
> [5.918527] WARNING: CPU: 0 PID: 1 at arch/arm/mm/dump.c:248 
> note_page+0x3d0/0x3dc
> [5.926143] arm/mm: Found insecure W+X mapping at address 0xf0879000
> [5.932529] Modules linked in:
> [5.935629] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.10.0-16-armmp #1 
> Debian 5.10.127-2
> [5.943912] Hardware name: Freescale i.MX6 Quad/DualLite (Device Tree)
> [5.950457] Backtrace: 
> [5.952938] [] (dump_backtrace) from [] 
> (show_stack+0x20/0x24)
> [5.960532]  r7:00f8 r6:6013 r5: r4:c14cdda8
> [5.966215] [] (show_stack) from [] 
> (dump_stack+0xc8/0xdc)
> [5.973469] [] (dump_stack) from [] (__warn+0xfc/0x158)
> [5.980449]  r7:00f8 r6:0009 r5:c031fa38 r4:c0fbe5c8
> [5.986130] [] (__warn) from [] 
> (warn_slowpath_fmt+0xa4/0xe4)
> [5.993633]  r7:c031fa38 r6:00f8 r5:c0fbe5c8 r4:c0fbe594
> [5.999311] [] (warn_slowpath_fmt) from [] 
> (note_page+0x3d0/0x3dc)
> [6.007251]  r8: r7: r6:0005 r5:c140c4e0 r4:c197ff28
> [6.013971] [] (note_page) from [] 
> (walk_pmd+0xe8/0x1a4)
> [6.021042]  r10:c197ff28 r9:c0207c20 r8:c1900800 r7: r6:c0fbe610 
> r5:f087b000
> [6.02]  r4:c19001ec
> [6.031437] [] (walk_pmd) from [] 
> (ptdump_check_wx+0x88/0x104)
> [6.039030]  r10: r9: r8: r7: r6:c0208000 
> r5:f080
> [6.046878]  r4:c0207c28
> [6.049435] [] (ptdump_check_wx) from [] 
> (mark_rodata_ro+0x3c/0x40)
> [6.057459]  r6: r5:c0d092cc r4:
> [6.062103] [] (mark_rodata_ro) from [] 
> (kernel_init+0x44/0x130)
> [6.069873] [] (kernel_init) from [] 
> (ret_from_fork+0x14/0x2c)
> [6.077459] Exception stack(0xc197ffb0 to 0xc197fff8)
> [6.082528] ffa0:   
>  
> [6.090726] ffc0:       
>  
> [6.098924] ffe0:     0013 
> [6.105553]  r5:c0d092cc r4:
> [6.109187] ---[ end trace 36d095f56a800b3c ]---
> [6.114076] Checked W+X mappings: FAILED, 1 W+X pages found
> [6.119751] Run /init as init process
> [6.847313] gpio_mxc: module verification failed: signature and/or 
> required 
> key missing - tainting kernel
> [6.859257] vdd1p1: supplied by regulator-dummy
> [6.871900] v_usb2: supplied by v_5v0
> [6.876972] vdd3p0: supplied by regulator-dummy
> [6.882630] vdd2p5: supplied by regulator-dummy
> [6.887949] vddarm: supplied by regulator-dummy
> [6.893661] vddpu: supplied by regulator-dummy
> [6.898847] vddsoc: supplied by regulator-dummy
> 
> I do not observe any functional issue so far though.
> 
> Since I have not checked the output of the serial console for a while, I 
> cannot tell when 
> the issue started to appear.
> 
> There is a similar report for the same hardware platform, but is reported on 
> a 5.13 kernel:
> https://lore.kernel.org/all/yun2qpc5ibaiv...@shell.armlinux.org.uk/T/
> 
> I am not sure if it was already present in 5.10, if it got backported or if 
> it is 
> entirely unrelated.
> 
> Many thanks for the great support of many hardware platforms

Would it be possible that you try to cherry-pick upstream 4aede550f104
("ARM: imx6: mark OCRAM mapping read-only") to see if it solves the
issue?

Can you alternatively test the package from bullseye-backports which
would have the fix included and see if the issue goes away?

Regards,
Salvatore



Processed: reassign 1015167 to src:linux

2022-08-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 1015167 src:linux 5.18.5-1
Bug #1015167 [src:linux] CPU stall while running fwupdmgr
Ignoring request to reassign bug #1015167 to the same package
Bug #1015167 [src:linux] CPU stall while running fwupdmgr
Marked as found in versions linux/5.18.5-1; no longer marked as found in 
versions linux/5.10.127-1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1015167: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015167
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: reassign 1015004 to src:linux

2022-08-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 1015004 src:linux 5.18.5-1
Bug #1015004 [linux-source] No "beep" after a reboot (system restart)
Bug reassigned from package 'linux-source' to 'src:linux'.
No longer marked as found in versions linux/5.18.5-1.
Ignoring request to alter fixed versions of bug #1015004 to the same values 
previously set
Bug #1015004 [src:linux] No "beep" after a reboot (system restart)
Marked as found in versions linux/5.18.5-1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1015004: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015004
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#1015295: linux-image-5.10.0-16-arm64: Unbootable system due to F2FS sanity_check_inode errors after upgrading kernel

2022-08-13 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + moreinfo
Bug #1015295 [src:linux] linux-image-5.10.0-16-arm64: Unbootable system due to 
F2FS sanity_check_inode errors after upgrading kernel
Added tag(s) moreinfo.

-- 
1015295: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015295
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1015295: linux-image-5.10.0-16-arm64: Unbootable system due to F2FS sanity_check_inode errors after upgrading kernel

2022-08-13 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo

On Tue, Jul 19, 2022 at 05:50:13AM +0200, Lukasz K. wrote:
> Package: linux-image-5.10.0-16-arm64
> Severity: critical
> Justification: breaks the whole system
> X-Debbugs-Cc: mov...@cryptolab.net
> 
> Dear Maintainer,
> 
> After upgrading kernel from linux-image-5.10.0-14-arm64 to
> linux-image-5.10.0-16-arm64 my system became unbootable due to F2FS
> sanity_check_inode errors.
> 
> Going back to previous kernel fixed the issue.
> 
> This does not appear to be limited only to Debian, as could be seen in this
> thread:
> https://github.com/raspberrypi/linux/issues/5068
> 
> Error messages are (aside from different device) the same as in the linked
> thread above:
> [   10.395372] F2FS-fs (mmcblk0p2): sanity_check_inode: inode (ino=85f5, 
> mode=33188) should not have inline_data, run fsck to fix
> [...]
> 
> I am using F2FS for my root partition with zstd compression enabled.
> 
> Partition was created with:
> mkfs.f2fs -f -O 
> extra_attr,inode_checksum,sb_checksum,compression,quota,encrypt DEVICE
> 
> And is mounted with:
> flush_merge,data_flush,compress_algorithm=zstd
> 
> Compression was explicitly enabled for entire root partition during 
> installation
> with:
> mount -t f2fs -o flush_merge,data_flush,compress_algorithm=zstd DEVICE /target
> chattr -R -V +c /target
> 
> Linked thread also mentions that this was fixed upstream.

The referenced commit seems to have actually landed in 5.10.127
upstream. So this probably needs more investigation. Can you for your
device test upstrema kernels and test if 5.10.136 upstream fixes the
issue? Can you bisect the breaking commit upstream between the two
versions working in Debian and breaking?

Regards,
Salvatore



Processed: Re: Bug#1015167: CPU stall while running fwupdmgr

2022-08-13 Thread Debian Bug Tracking System
Processing control commands:

> tags -1 + moreinfo
Bug #1015167 [src:linux] CPU stall while running fwupdmgr
Added tag(s) moreinfo.

-- 
1015167: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015167
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1015167: CPU stall while running fwupdmgr

2022-08-13 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo

Hi Marco,

On Sun, Jul 17, 2022 at 01:49:12AM +0200, Marco d'Itri wrote:
> On Jul 17, Diederik de Haas  wrote:
> 
> > On Sunday, 17 July 2022 01:34:08 CEST Marco d'Itri wrote:
> > > Source: linux
> > > Version: 5.10.127-1
> > > Severity: normal
> ...
> > > Kernel: Linux 5.18.0-2-amd64 (SMP w/4 CPU threads; PREEMPT)
> > 
> > Why is this bug filed against kernel version 5.10.127-1 and not 5.18.5-1?
> I wondered myself, but I do not know why reportbug choose the version of 
> the stable package.
> 
> ii  linux-image-5.18.0-2-amd64 5.18.5-1 amd64Linux 5.18 for 
> 64-bit >
> 
> 5.18.0-2-amd64 #1 SMP PREEMPT_DYNAMIC Debian 5.18.5-1 (2022-06-16) x86_64 
> GNU/Linux

Do you still experience this problem with the latest kernel in
unstable or experimental?

Regards,
Salvatore



Processed: closing 983818

2022-08-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> close 983818 5.18.14-1
Bug #983818 [src:linux] linux-image-5.10.0-3-arm64: often fails to bring up 
ethernet / dwmac_rk module on rockpro64
Marked as fixed in versions linux/5.18.14-1.
Bug #983818 [src:linux] linux-image-5.10.0-3-arm64: often fails to bring up 
ethernet / dwmac_rk module on rockpro64
Marked Bug as done
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
983818: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983818
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1014793: linux-image-5.10.0-16-amd64: Kernel crashes while serving NFS

2022-08-13 Thread Salvatore Bonaccorso
Hi Arne,

On Fri, Jul 22, 2022 at 10:18:56AM +0200, Arne Nordmark wrote:
> Den 2022-07-15 kl. 21:58, skrev Salvatore Bonaccorso:
> > I would be interested to either pinpoint the regressing commit
> > upstream beween 5.10.120 and 5.10.127 or conversely the fixing commit
> > beween 5.10.127 upstream and 5.10.130 where you are not able anymore
> > to reproduce the error. What I can say, I have already imported
> > 5.10.130 for furture upload (cf.
> > https://salsa.debian.org/kernel-team/linux/-/merge_requests/506).
> 
> Bisection for the regression proved too hard.
> 
> Bisection for the fix went better, I can get a crash with 5.10.128-00010 but
> not yet with 5.10.128-00011. This indicates that the fixing commit was
> probably:
> 
> commit 6a0b9512a6aa7b7835d8138f5ffdcb4789c093d4
> Author: Chuck Lever 
> Date:   Thu Jun 30 16:48:18 2022 -0400
> 
> SUNRPC: Fix READ_PLUS crasher
> 
> which indeed seems to touch code involved in NFS service.
> 
> Consequently, the breaking commit was probably:
> 
> 6c254bf3b637 ("SUNRPC: Fix the calculation of xdr->end in
> xdr_get_next_encode_buffer()")

Thank you and apologies for the delay! The next upload for
bullseye(-security) will contain that fix and will close the bug with
that upload.

Thanks a lot for your investigtive work and bisection to the fix!

Regards,
Salvatore