linux_6.6.4-1~exp1_source.changes ACCEPTED into experimental
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 03 Dec 2023 20:57:56 +0100 Source: linux Architecture: source Version: 6.6.4-1~exp1 Distribution: experimental Urgency: medium Maintainer: Debian Kernel Team Changed-By: Bastian Blank Closes: 1032104 1037938 Changes: linux (6.6.4-1~exp1) experimental; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.4 - nvmet: nul-terminate the NQNs passed in the connect command (CVE-2023-6121) . [ Bastian Blank ] * Fix build dependency on rsync. * Fix build dependency on kernel-wedge. * udeb: Make i2c-hid modules optional. . [ Timothy Pearson ] * [powerpc] Don't clobber f0/vs0 during fp|altivec register save (Closes: #1032104) . [ Johannes Schauer Marin Rodrigues ] * Fix FTCBFS: Pass _PYTHON_SYSCONFIGDATA_NAME to the perf build. (Closes: #1037938) Thanks to Helmut Grohne for the patch. Checksums-Sha1: bbef175fb0e0acdf376b47ead3e0b501b536b7ba 233463 linux_6.6.4-1~exp1.dsc b38f79198036fde7abf99f60ffba545b91cdf82c 142637188 linux_6.6.4.orig.tar.xz c9c7ff3da91737365776a70f221de0ce95b4 1558788 linux_6.6.4-1~exp1.debian.tar.xz 1af076e46f3dc867fca2e895233423b4839007d0 5930 linux_6.6.4-1~exp1_source.buildinfo Checksums-Sha256: b4f661d17aa7c10ed351b18fae004844a40cc8ba592f12fa6fe89f73d861846d 233463 linux_6.6.4-1~exp1.dsc 13cc9a0a341c415acc759d642ae43c39645d00531b44725486f077747237301f 142637188 linux_6.6.4.orig.tar.xz c2a55c3f2aa20e85c4e2f4e42f0ef30e4509bb372fa49d8d9e64cd9893c7c391 1558788 linux_6.6.4-1~exp1.debian.tar.xz 993b2f9fca42146cb58df83feb8d22cfccb8617a96e3b6e6d07d8f375154b1bc 5930 linux_6.6.4-1~exp1_source.buildinfo Files: 7d79fb0706acad7ec6db8ba7c4facd38 233463 kernel optional linux_6.6.4-1~exp1.dsc 0203020079fe29e6618095280e7e 142637188 kernel optional linux_6.6.4.orig.tar.xz 408e780433e84019f962a1380f0a1f7b 1558788 kernel optional linux_6.6.4-1~exp1.debian.tar.xz f8bf11b8f04e3e6c5751a2b62111c644 5930 kernel optional linux_6.6.4-1~exp1_source.buildinfo -BEGIN PGP SIGNATURE- iHUEARYIAB0WIQQ8pEKDNIgQDAQDOBFji0aBW7swjwUCZWzfQwAKCRBji0aBW7sw j/hWAQDzAKGYNrjDHiGdhJnuoRH35w9VE7K5sW4m+KvbBq0qhwEAydEdh34ZpQAB izRCFMEFyNzZY2J4b0Wup8D2z9FOaQA= =vYsM -END PGP SIGNATURE-
Bug#1032104: marked as done (linux: ppc64el iouring corrupted read)
Your message dated Sun, 03 Dec 2023 20:48:02 + with message-id and subject line Bug#1032104: fixed in linux 6.6.4-1~exp1 has caused the Debian Bug report #1032104, regarding linux: ppc64el iouring corrupted read to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1032104: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032104 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: linux Version: 5.10.0-21-powerpc64le Severity: grave Justification: causes non-serious data loss X-Debbugs-Cc: dan...@mariadb.org Dear Maintainer, *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? * What exactly did you do (or not do) that was effective (or ineffective)? * What was the outcome of this action? * What outcome did you expect instead? *** End of the template - remove these template lines *** >From https://jira.mariadb.org/browse/MDEV-30728 MariaDB's mtr tests on a number of specific tests depend on the correct kernel operation. As observed in these tests, there is a ~1/5 chance the encryption.innodb_encryption test will read zeros on the later part of the 16k pages that InnoDB uses by default. This affects MariaDB-10.6+ packages where there is a liburing in the distribution. This has been observed in the CI of Debian (https://ci.debian.net/packages/m/mariadb/testing/ppc64el/) and upstreams https://buildbot.mariadb.org/#/builders/318. The one ppc64le worker that has the Debian 5.10.0-21 kernel, the same as the Debian CI, has the prefix ppc64le-db-bbw1-*. Test faults occur on all MariaDB 10.6+ builds in containers on this kernel. There a no faults on non-ppc64le or RHEL7/8 based ppc64le kernels. To reproduce: apt-get install mariadb-test cd /usr/share/mysql/mysql-test ./mtr --mysqld=--innodb-flush-method=fsync --mysqld=--innodb-use-native-aio=1 --vardir=/var/lib/mysql --force encryption.innodb_encryption,innodb,undo0 --repeat=12 A test will frequenty fail. 2023-02-28 1:41:01 0 [ERROR] InnoDB: Database page corruption on disk or a failed read of file './ibdata1' page [page id: space=0, page number=282]. You may have to recover from a backup. (the page number isn't predictable) The complete mtr error log of mariadb server is $PWD/var/log/mysqld.1.err I tested on tmpfs. This is a different fault from bug #1020831 as: * there is no iouring error, just a bunch of zeros where data was expected. * this is ppc64le only. Note, more serious faults exist on overlayfs (MDEV-28751) and remote filesystems so sticking to local xfs, ext4, btrfs is recommended. -- System Information: Debian Release: bullseye APT prefers jammy-updates APT policy: (500, 'jammy-updates'), (500, 'jammy-security'), (500, 'jammy'), (100, 'jammy-backports') Architecture: ppc64el (ppc64le) Kernel: Linux 5.10.0-21-powerpc64le (SMP w/128 CPU threads) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: unable to detect --- End Message --- --- Begin Message --- Source: linux Source-Version: 6.6.4-1~exp1 Done: Bastian Blank We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1032...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Bastian Blank (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 03 Dec 2023 20:57:56 +0100 Source: linux Architecture: source Version: 6.6.4-1~exp1 Distribution: experimental Urgency: medium Maintainer: Debian Kernel Team Changed-By: Bastian Blank Closes: 1032104 1037938 Changes: linux (6.6.4-1~exp1) experimental; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.4 - nvmet: nul-terminate the NQNs passed in the connect command (CVE-2023-6121) . [ Bastian Blank ] * Fix build dependency on rsync. * Fix build dependency on kernel-wedge. * udeb: Make i2c-hid modules optional. . [ Timothy Pearson ] * [powerpc] Don't clobber f0/vs0 during fp|altivec r
Bug#1037938: marked as done (linux FTCBFS: perf builds a python extension for the build architecture)
Your message dated Sun, 03 Dec 2023 20:48:02 + with message-id and subject line Bug#1037938: fixed in linux 6.6.4-1~exp1 has caused the Debian Bug report #1037938, regarding linux FTCBFS: perf builds a python extension for the build architecture to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1037938: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1037938 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Source: linux Version: 6.3.7-1 Tags: patch User: debian-cr...@lists.debian.org Usertags: ftcbfs linux fails to cross build from source again. It seems like the perf build gained a python extension and that extension happens to be built for the build architecture, which doesn't go well. Please export the magic python cross building environment variable to make this work. I'm attaching a patch for your convenience. Helmut --- linux-6.3.7/debian/changelog2023-06-12 08:25:26.0 +0200 +++ linux-6.3.7/debian/changelog2023-06-14 16:09:09.0 +0200 @@ -1,3 +1,11 @@ +linux (6.3.7-1.1) UNRELEASED; urgency=medium + + * Non-maintainer upload. + * Fix FTCBFS: Pass _PYTHON_SYSCONFIGDATA_NAME to the perf build. +(Closes: #-1) + + -- Helmut Grohne Wed, 14 Jun 2023 16:09:09 +0200 + linux (6.3.7-1) unstable; urgency=medium * New upstream stable update: --- linux-6.3.7/debian/rules.real 2023-06-12 08:25:16.0 +0200 +++ linux-6.3.7/debian/rules.real 2023-06-14 16:09:09.0 +0200 @@ -632,6 +632,10 @@ dh_md5sums dh_builddeb -- $(BUILDDEB_ARGS) +ifneq ($(DEB_BUILD_ARCH),$(DEB_HOST_ARCH)) +binary_perf build_perf: export _PYTHON_SYSCONFIGDATA_NAME=_sysconfigdata__$(DEB_HOST_MULTIARCH) +endif + build_perf: $(STAMPS_DIR)/build-tools-headers $(call make-tools,tools/perf) --- End Message --- --- Begin Message --- Source: linux Source-Version: 6.6.4-1~exp1 Done: Bastian Blank We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1037...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Bastian Blank (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Sun, 03 Dec 2023 20:57:56 +0100 Source: linux Architecture: source Version: 6.6.4-1~exp1 Distribution: experimental Urgency: medium Maintainer: Debian Kernel Team Changed-By: Bastian Blank Closes: 1032104 1037938 Changes: linux (6.6.4-1~exp1) experimental; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.4 - nvmet: nul-terminate the NQNs passed in the connect command (CVE-2023-6121) . [ Bastian Blank ] * Fix build dependency on rsync. * Fix build dependency on kernel-wedge. * udeb: Make i2c-hid modules optional. . [ Timothy Pearson ] * [powerpc] Don't clobber f0/vs0 during fp|altivec register save (Closes: #1032104) . [ Johannes Schauer Marin Rodrigues ] * Fix FTCBFS: Pass _PYTHON_SYSCONFIGDATA_NAME to the perf build. (Closes: #1037938) Thanks to Helmut Grohne for the patch. Checksums-Sha1: bbef175fb0e0acdf376b47ead3e0b501b536b7ba 233463 linux_6.6.4-1~exp1.dsc b38f79198036fde7abf99f60ffba545b91cdf82c 142637188 linux_6.6.4.orig.tar.xz c9c7ff3da91737365776a70f221de0ce95b4 1558788 linux_6.6.4-1~exp1.debian.tar.xz 1af076e46f3dc867fca2e895233423b4839007d0 5930 linux_6.6.4-1~exp1_source.buildinfo Checksums-Sha256: b4f661d17aa7c10ed351b18fae004844a40cc8ba592f12fa6fe89f73d861846d 233463 linux_6.6.4-1~exp1.dsc 13cc9a0a341c415acc759d642ae43c39645d00531b44725486f077747237301f 142637188 linux_6.6.4.orig.tar.xz c2a55c3f2aa20e85c4e2f4e42f0ef30e4509bb372fa49d8d9e64cd9893c7c391 1558788 linux_6.6.4-1~exp1.debian.tar.xz 993b2f9fca42146cb58df83feb8d22cfccb8617a96e3b6e6d07d8f375154b1bc 5930 linux_6.6.4-1~exp1_source.buildinfo Files: 7d79fb0706acad7ec6db8ba7c4facd38 233463 kernel optional linux_6.6.4-1~exp1.dsc 0203020079fe29e6618095280e7e 142637188 kernel optional linux_6.6.4.orig.tar.xz 408e780433e84019f962a1380f0a1f7b 1558788 kernel optional linux_6.6.
Bug#1057272: Enable SENSORS_IIO_HWMON support
сб, 2 дек. 2023 г. в 19:32, Vincent Blut : > > Control: tags -1 moreinfo > > Hi Andrey, > > Le 2023-12-02 16:40, Andrey Melnikov a écrit : > > Package: src:linux > > Version: 6.5.13-1 > > Severity: wishlist > > > > Please, enable SENSORS_IIO_HWMON support. Without it I'm unable to > > fetch the AXP209 internal temperature sensor. > > The definition of the AXP209 PMU seems to confirm that the internal > temperature > sensor is hooked to the iio-hwmon driver: > > pmic-temp { > compatible = "iio-hwmon"; > io-channels = <&axp_adc 4>; /* Internal temperature */ > }; > > One thing, though. Does it make sense to enable SENSORS_IIO_HWMON outside of > armhf? Yes. IIO device may be connected via i2c, or integrated into the baseboard.Some old intel atom chipset have IIO, and iio_hwmon.ko size ~ 13k - not a big deal for x86/arm/mips devices.
Processing of linux_6.6.4-1~exp1_source.changes
linux_6.6.4-1~exp1_source.changes uploaded successfully to localhost along with the files: linux_6.6.4-1~exp1.dsc linux_6.6.4.orig.tar.xz linux_6.6.4-1~exp1.debian.tar.xz linux_6.6.4-1~exp1_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
Processed: Re: Bug#1029968: And some patches
Processing control commands: > forwarded -1 > https://lore.kernel.org/linux-iommu/Y9qSwkLxeMpffZK%2F@gallifrey/ > https://lore.kernel.org/linux-media/cover.1701349092.git.hverkuil-ci...@xs4all.nl/ Bug #1029968 [src:linux] bttv/v4l: WARNING: CPU: 6 PID: 6164 at mm/vmalloc.c:487 __vmap_pages_range_noflush+0x3e0/0x4d0 Changed Bug forwarded-to-address to 'https://lore.kernel.org/linux-iommu/Y9qSwkLxeMpffZK%2F@gallifrey/ https://lore.kernel.org/linux-media/cover.1701349092.git.hverkuil-ci...@xs4all.nl/' from 'https://lore.kernel.org/linux-iommu/Y9qSwkLxeMpffZK%2F@gallifrey/'. -- 1029968: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029968 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#1029968: And some patches
Control: forwarded -1 https://lore.kernel.org/linux-iommu/Y9qSwkLxeMpffZK%2F@gallifrey/ https://lore.kernel.org/linux-media/cover.1701349092.git.hverkuil-ci...@xs4all.nl/ On Sunday, 3 December 2023 17:50:07 CET Dr. David Alan Gilbert wrote: > As well as the fixes in 6.6, A 6.6 kernel is now available in Experimental > we also need this patchup series here: > https://lore.kernel.org/linux-media/ZWibhE350L3BTRK8@gallifrey/T/#t > > These seem to make it pretty nicely. Excellent :) I saw they had "Fixes:" tags, which normally means they'll get backported to older kernel series like 6.6. signature.asc Description: This is a digitally signed message part.
Bug#1029968: And some patches
As well as the fixes in 6.6, we also need this patchup series here: https://lore.kernel.org/linux-media/ZWibhE350L3BTRK8@gallifrey/T/#t These seem to make it pretty nicely. -- -Open up your eyes, open up your mind, open up your code --- / Dr. David Alan Gilbert| Running GNU/Linux | Happy \ \dave @ treblig.org | | In Hex / \ _|_ http://www.treblig.org |___/
Processed: limit source to linux, tagging 1032104
Processing commands for cont...@bugs.debian.org: > limit source linux Limiting to bugs with field 'source' containing at least one of 'linux' Limit currently set to 'source':'linux' > tags 1032104 + pending Bug #1032104 [src:linux] linux: ppc64el iouring corrupted read Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 1032104: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032104 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
nfs-utils_2.6.4-3_sourceonly.changes ACCEPTED into unstable
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 03 Dec 2023 14:58:30 +0100 Source: nfs-utils Architecture: source Version: 1:2.6.4-3 Distribution: unstable Urgency: medium Maintainer: Debian kernel team Changed-By: Salvatore Bonaccorso Closes: 1051132 Changes: nfs-utils (1:2.6.4-3) unstable; urgency=medium . [ Salvatore Bonaccorso ] * fsidd: call anonymous sockets by their name only, don't fill with NULs to 108 bytes (Closes: #1051132) Checksums-Sha1: ab89fbbc2ce5c42ecc450c5df5c05ce738151de3 2567 nfs-utils_2.6.4-3.dsc 9341ba6196e3db07875ad53302ab845643a6fc60 48700 nfs-utils_2.6.4-3.debian.tar.xz Checksums-Sha256: 9b4c0e07f1ac194c9f46832548568e1e53e7195d35d3b2b82443311323c1caeb 2567 nfs-utils_2.6.4-3.dsc 101fc535208578e64ef92a26cb581be8baf468abe223c8861412633d3497955c 48700 nfs-utils_2.6.4-3.debian.tar.xz Files: ed1bae21180443a668d0f96c791fe87a 2567 net optional nfs-utils_2.6.4-3.dsc 8c58d0c811e7c9b03caad09bc2d0ffc3 48700 net optional nfs-utils_2.6.4-3.debian.tar.xz -BEGIN PGP SIGNATURE- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmVsir9fFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89EzD8P/18MSpyEyS8LZouUk7ZM2O9Pj1J5hw9H HYjzK8aEnZPgaZLBiuF+evC7DeH528IvCBpkPgVuEpZEey0cNJsquFt3wqfTN6sV fw9UtYiCyfX/ty8BuTFjyOk2SxC5whW7S5jrPBUZwbPsPMz6DLspIzdfHbNqnRmg ucUu9FGNUheiBmL6iQU2yenJ6qJmLYXFe4i+4cGrDZTQGfdxxaZd0q3FTBhinmxs kgz+gXv7Jj2+Ff8QQhcre8qXJm9Yjpc9ZGt4nHpZG/P+0VBn746Ftm0/jubfRJFA Q0L/TjRkmbhw4KLfi2uxvlP4Ah60n2qnHvM2wOADTcNNh/EzyalXRqNC+n0hTdx0 kg3rdkpzyg+8RhPClxkH1sKiu6ZwcSEjsKX2VOJ3dlKuiZ+nmqbMTNSX5oX3Fmb+ 2NJQLjn36XSNDwhHVfTE88hSS+ARjcHhIwL4BIYU1Emeqk3BlmDITbpgOZwpd03v P9r8r3saGusn/wiA7f5CD+xf0vDXYVt0xSPj6ythSYy9l1COpJdvutDRLgemZcOb 68BKToWQNLkMOEd3A+Ut71jJwDPlFQFZYqBSNDW8AQyBHnPw9nahxqbQIjV8IcgK pLiMyV13UvcVLW6CFP+mDK7zTE8tUWCq8nxZGZekMS6yIFFPIMrTzb82R0dqGWfI GJUDSUjpmx1u =8oZQ -END PGP SIGNATURE-
Bug#1051132: marked as done (/usr/sbin/fsidd: bound to @/run/fsid.sock@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@)
Your message dated Sun, 03 Dec 2023 14:42:10 + with message-id and subject line Bug#1051132: fixed in nfs-utils 1:2.6.4-3 has caused the Debian Bug report #1051132, regarding /usr/sbin/fsidd: bound to @/run/fsid.sock@ to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1051132: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051132 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: nfs-kernel-server Version: 1:2.6.3-3 Severity: normal File: /usr/sbin/fsidd Dear Maintainer, This makes ss -l output super annoying without grep -v fsidd | column -t again. I'm assuming it wants to bind to @/run/fsid.sock instead but someone forgor 💀 Best, наб -- Package-specific info: -- rpcinfo -- program vers proto port service 104 tcp111 portmapper 103 tcp111 portmapper 102 tcp111 portmapper 104 udp111 portmapper 103 udp111 portmapper 102 udp111 portmapper 1000241 udp 41527 status 1000241 tcp 33501 status 151 udp 35312 mountd 151 tcp 45513 mountd 152 udp 52719 mountd 152 tcp 58465 mountd 153 udp 35138 mountd 153 tcp 46079 mountd 133 tcp 2049 nfs 134 tcp 2049 nfs 1002273 tcp 2049 nfs_acl 1000211 udp 40985 nlockmgr 1000213 udp 40985 nlockmgr 1000214 udp 40985 nlockmgr 1000211 tcp 37537 nlockmgr 1000213 tcp 37537 nlockmgr 1000214 tcp 37537 nlockmgr -- /etc/default/nfs-kernel-server -- RPCNFSDPRIORITY=0 NEED_SVCGSSD="" -- /etc/nfs.conf -- [general] pipefs-directory=/run/rpc_pipefs [nfsrahead] [exports] [exportfs] [gssd] [lockd] [exportd] [mountd] manage-gids=y [nfsdcld] [nfsdcltrack] [nfsd] [statd] [sm-notify] [svcgssd] -- /etc/nfs.conf.d/*.conf -- -- System Information: Debian Release: trixie/sid APT prefers unstable APT policy: (500, 'unstable') Architecture: x32 (x86_64) Foreign Architectures: amd64, i386 Kernel: Linux 6.3.0-2-amd64 (SMP w/2 CPU threads; PREEMPT) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages nfs-kernel-server depends on: ii keyutils 1.6.1-2 ii libblkid12.38.1-6 ii libc62.37-6 ii libcap2 1:2.66-4 ii libevent-core-2.1-7 2.1.12-stable-8 ii libsqlite3-0 3.42.0-1 ii libtirpc31.3.3+ds-1 ii libuuid1 2.38.1-6 ii libwrap0 7.6.q-32 ii netbase 6.4 ii nfs-common 1:2.6.3-3 ii ucf 3.0043+nmu1 Versions of packages nfs-kernel-server recommends: ii python3 3.11.4-5+b1 ii python3-yaml 6.0-3+b2 Versions of packages nfs-kernel-server suggests: ii procps 2:4.0.3-1 -- no debconf information signature.asc Description: PGP signature --- End Message --- --- Begin Message --- Source: nfs-utils Source-Version: 1:2.6.4-3 Done: Salvatore Bonaccorso We believe that the bug you reported is fixed in the latest version of nfs-utils, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1051...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso (supplier of updated nfs-utils package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 03 Dec 2023 14:58:30 +0100 Source: nfs-utils Architecture: source Version: 1:2.6.4-3 Distribution: unstable Urgency: medium Maintainer: Debian kernel team Changed-By: Salvatore Bonaccorso Closes: 1051132 Changes: nfs-utils (1:2.6.4-3) unstable; urgency=medium . [ Salvatore Bonaccorso ] * fsidd: call anonymous sockets by their name only, don't fill with NULs to 108 bytes (Closes: #1051132) Checksu
Processing of nfs-utils_2.6.4-3_sourceonly.changes
nfs-utils_2.6.4-3_sourceonly.changes uploaded successfully to localhost along with the files: nfs-utils_2.6.4-3.dsc nfs-utils_2.6.4-3.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)
Processed: limit source to nfs-utils, tagging 1051132
Processing commands for cont...@bugs.debian.org: > limit source nfs-utils Limiting to bugs with field 'source' containing at least one of 'nfs-utils' Limit currently set to 'source':'nfs-utils' > tags 1051132 + pending Bug #1051132 [nfs-kernel-server] /usr/sbin/fsidd: bound to @/run/fsid.sock@ Added tag(s) pending. > thanks Stopping processing here. Please contact me if you need assistance. -- 1051132: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051132 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#1057260: iwlwifi: `N' invalid for parameter `enable_ini'
Package: src:linux Followup-For: Bug #1057260 I can confirm the problem. I see exactly the same log line with 6.5.0-5 and my WLAN device does not work. -- Package-specific info: ** Version: Linux version 6.5.0-4-amd64 (debian-kernel@lists.debian.org) (gcc-13 (Debian 13.2.0-6) 13.2.0, GNU ld (GNU Binutils for Debian) 2.41) #1 SMP PREEMPT_DYNAMIC Debian 6.5.10-1 (2023-11-03) […] ** PCI devices: […] 07:00.0 Network controller [0280]: Intel Corporation Wi-Fi 6 AX200 [8086:2723] (rev 1a) Subsystem: Intel Corporation Wi-Fi 6 AX200NGW [8086:0084] Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx+ Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- Kernel driver in use: iwlwifi Kernel modules: iwlwifi […] ** USB devices: Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 001 Device 007: ID 5986:9102 Bison Electronics Inc. BisonCam,NB Pro Bus 001 Device 004: ID 1395:0060 DSEA A/S SCx5 MS Bus 001 Device 010: ID 1bcf:28c4 Sunplus Innovation Technology Inc. FHD Camera Microphone Bus 001 Device 008: ID 046a:010d CHERRY MX-Board 3.0 Keyboard Bus 001 Device 006: ID 046d:c069 Logitech, Inc. M-U0007 [Corded Mouse M500] Bus 001 Device 005: ID 05e3:0723 Genesys Logic, Inc. GL827L SD/MMC/MS Flash Card Reader Bus 001 Device 003: ID 1a40:0101 Terminus Technology Inc. Hub Bus 001 Device 012: ID 8087:0029 Intel Corp. AX200 Bluetooth Bus 001 Device 009: ID 06cb:00c7 Synaptics, Inc. TouchPad Bus 001 Device 002: ID 1050:0407 Yubico.com Yubikey 4/5 OTP+U2F+CCID Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub -- System Information: Debian Release: trixie/sid APT prefers unstable APT policy: (500, 'unstable'), (102, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 6.5.0-4-amd64 (SMP w/12 CPU threads; PREEMPT) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages linux-image-6.5.0-4-amd64 depends on: ii initramfs-tools [linux-initramfs-tool] 0.142 ii kmod30+20230601-2 ii linux-base 4.9 Versions of packages linux-image-6.5.0-4-amd64 recommends: ii apparmor 3.0.12-1 ii firmware-linux-free 20200122-2 Versions of packages linux-image-6.5.0-4-amd64 suggests: pn debian-kernel-handbook ii extlinux3:6.04~git20190206.bf6db5b4+dfsg1-3+b1 ii grub-efi-amd64 2.12~rc1-12 pn linux-doc-6.5 Versions of packages linux-image-6.5.0-4-amd64 is related to: ii firmware-amd-graphics 20230625-1 pn firmware-atheros pn firmware-bnx2 pn firmware-bnx2x pn firmware-brcm80211 pn firmware-cavium ii firmware-intel-sound 20230625-1 pn firmware-intelwimax pn firmware-ipw2x00 pn firmware-ivtv ii firmware-iwlwifi 20230625-1 pn firmware-libertas ii firmware-linux-nonfree20230625-1 ii firmware-misc-nonfree 20230625-1 pn firmware-myricom pn firmware-netxen pn firmware-qlogic ii firmware-realtek 20230625-1 pn firmware-samsung pn firmware-siano pn firmware-ti-connectivity pn xen-hypervisor -- no debconf information
Processed: tagging 1032104
Processing commands for cont...@bugs.debian.org: > tags 1032104 + fixed-upstream Bug #1032104 [src:linux] linux: ppc64el iouring corrupted read Added tag(s) fixed-upstream. > thanks Stopping processing here. Please contact me if you need assistance. -- 1032104: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032104 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#1054642: Failing ARP relay from external -> Linux bridge -> veth port --> NS veth port
Hi Peter, > So now we move to VLAN level? Yeah, but I'm still waiting for the answers to my questions from two emails ago: > I'd be happy to still track this bug down but I need you to investigate > the behaviour in your environment. If you've torn down the lab already we > can also just call it quits. > > If you do want to continue some questions are still pending, see quoted below. > > > On Mon, Oct 30, 2023 at 07:25:38PM +, peter.gasparo...@orange.com wrote: > > > 1) As was reported, foreign external world MAC@ does not pass into > > > network namespace, just external border point "vlan199" > > > > How did you check this? > > > > > 2) now collecting data for you, honestly I don’t see external mac > > > address on "inet-br" object, so my previous statement was incorrect.. > > > {ossibly I might mixed this up with another "labinet-br" (working in > > > its limited > > > scope) which is IP-defined, while "inet-br" in question is not. > > > > > > 3) so question is, if the MACs learnt via vlan199 are supposed to be > > > paired (displayed) with "inet-br" object and all way up into NS > > > > I want to make sure we're on the same page, how do you check if the MAC > > is reaching into the NS? I assume using `ip neigh`? I'd have a look at > > tcpdump this will tell you whether ARP is even reaching the NS or not. > > > > Something simple like > > > > $ tcpdump -enli $IFACE 'arp or icmp' > > > > optionally you can filter by MAC (`ether host` in pcap-filter speak): > > > > $ tcpdump -enli $IFACE ('arp or icmp) and ether host > > aa:00:00:00:00:01 > > > > Oh and one last thing: please double and tripple check that a firewall > > isn't interfering. --Daniel signature.asc Description: PGP signature