Bug#790694: PPC64: 64kb kernel pagesizes and nouveau

2016-04-04 Thread Mathieu Malaterre
Bastian,

On Wed, Mar 30, 2016 at 11:18 PM, Aurelien Jarno  wrote:
> On 2016-03-30 16:45, Ben Hutchings wrote:
>> On Wed, 2016-03-30 at 16:49 +0200, Mathieu Malaterre wrote:
>> > Ben,
>> >
>> > >
>> > > I saw that bug report as well.  I'm not sure what to do about it -
>> > > other distributions were also using 64K pages for 64-bit PowerPC the
>> > > last time I looked, and there may be good reasons to do that.
>> > Would it be possible for you to dig that for us ? It appears that
>> > making nouveau work with 64K page is non-trivial:
>> >
>> > https://bugs.freedesktop.org/show_bug.cgi?id=94757#c3
>> >
>> > Which in turns means most of the userbase with PPC64 (G5 PowerMac)
>> > wont be able to use X.
>>
>> I am not a powerpc porter; Aurelien Jarno is the kernel maintainer
>> responsible for it.
>
> That's correct for ppc64el, but I never signed up for the powerpc port.
>
>> I don't know about the user base, but I think most of the *development*
>> effort and sponsorship of the powerpc ports now comes from IBM, and
>> unfortunately they don't care about PowerMacs.
>
> IBM doesn't really care about the powerpc port either, they do about the
> ppc64el port. That said I have tracked the change to 64kB pages to the
> following commit:
>
> | commit aed63a56b189d771116f2d4b8fe10bbec528e6a2
> | Author: Bastian Blank 
> | Date:   Sat Aug 9 19:42:11 2014 +
> |
> | * debian/changelog: Update
> | * debian/config/kernelarch-powerpc/config-arch-64: Set PPC_64K_PAGES.
> | * debian/config/kernelarch-powerpc/config-arch-64-le: Remove overriden 
> option.
> |
> | svn path=/dists/trunk/linux/; revision=21721
>
> I don't really know what it has been done, so I have Cced Bastian so
> that he can comment on that. It's something that can be reverted if
> needed I guess.

Could you please share the rational to set PPC64 to 64K pages ?

Ref: 
https://anonscm.debian.org/cgit/kernel/linux.git/commit/?id=aed63a56b189d771116f2d4b8fe10bbec528e6a2

Thanks much.



Processing of linux_3.16.7-ckt25-1~bpo70+1_multi.changes

2016-04-04 Thread Debian FTP Masters
linux_3.16.7-ckt25-1~bpo70+1_multi.changes uploaded successfully to localhost
along with the files:
  linux_3.16.7-ckt25-1~bpo70+1.dsc
  linux_3.16.7-ckt25-1~bpo70+1.debian.tar.xz
  linux-support-3.16.0-0.bpo.4_3.16.7-ckt25-1~bpo70+1_all.deb
  linux-doc-3.16_3.16.7-ckt25-1~bpo70+1_all.deb
  linux-manual-3.16_3.16.7-ckt25-1~bpo70+1_all.deb
  linux-source-3.16_3.16.7-ckt25-1~bpo70+1_all.deb

Greetings,

Your Debian queue daemon (running on host franck.debian.org)



linux_3.16.7-ckt25-1~bpo70+1_multi.changes ACCEPTED into wheezy-backports->backports-policy

2016-04-04 Thread Debian FTP Masters


Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sat, 02 Apr 2016 14:44:46 +0100
Source: linux
Binary: linux-source-3.16 linux-doc-3.16 linux-manual-3.16 
linux-support-3.16.0-0.bpo.4 linux-libc-dev linux-headers-3.16.0-0.bpo.4-all 
linux-headers-3.16.0-0.bpo.4-all-amd64 kernel-image-3.16.0-0.bpo.4-amd64-di 
nic-modules-3.16.0-0.bpo.4-amd64-di 
nic-wireless-modules-3.16.0-0.bpo.4-amd64-di 
nic-shared-modules-3.16.0-0.bpo.4-amd64-di 
serial-modules-3.16.0-0.bpo.4-amd64-di 
usb-serial-modules-3.16.0-0.bpo.4-amd64-di ppp-modules-3.16.0-0.bpo.4-amd64-di 
pata-modules-3.16.0-0.bpo.4-amd64-di cdrom-core-modules-3.16.0-0.bpo.4-amd64-di 
firewire-core-modules-3.16.0-0.bpo.4-amd64-di 
scsi-core-modules-3.16.0-0.bpo.4-amd64-di scsi-modules-3.16.0-0.bpo.4-amd64-di 
scsi-common-modules-3.16.0-0.bpo.4-amd64-di 
scsi-extra-modules-3.16.0-0.bpo.4-amd64-di loop-modules-3.16.0-0.bpo.4-amd64-di 
btrfs-modules-3.16.0-0.bpo.4-amd64-di ext4-modules-3.16.0-0.bpo.4-amd64-di 
isofs-modules-3.16.0-0.bpo.4-amd64-di jfs-modules-3.16.0-0.bpo.4-amd64-di 
ntfs-modules-3.16.0-0.bpo.4-amd64-di
 xfs-modules-3.16.0-0.bpo.4-amd64-di fat-modules-3.16.0-0.bpo.4-amd64-di 
md-modules-3.16.0-0.bpo.4-amd64-di multipath-modules-3.16.0-0.bpo.4-amd64-di 
usb-modules-3.16.0-0.bpo.4-amd64-di usb-storage-modules-3.16.0-0.bpo.4-amd64-di 
pcmcia-storage-modules-3.16.0-0.bpo.4-amd64-di 
fb-modules-3.16.0-0.bpo.4-amd64-di input-modules-3.16.0-0.bpo.4-amd64-di 
event-modules-3.16.0-0.bpo.4-amd64-di mouse-modules-3.16.0-0.bpo.4-amd64-di 
nic-pcmcia-modules-3.16.0-0.bpo.4-amd64-di 
pcmcia-modules-3.16.0-0.bpo.4-amd64-di nic-usb-modules-3.16.0-0.bpo.4-amd64-di 
sata-modules-3.16.0-0.bpo.4-amd64-di core-modules-3.16.0-0.bpo.4-amd64-di 
acpi-modules-3.16.0-0.bpo.4-amd64-di i2c-modules-3.16.0-0.bpo.4-amd64-di 
crc-modules-3.16.0-0.bpo.4-amd64-di crypto-modules-3.16.0-0.bpo.4-amd64-di 
crypto-dm-modules-3.16.0-0.bpo.4-amd64-di efi-modules-3.16.0-0.bpo.4-amd64-di 
ata-modules-3.16.0-0.bpo.4-amd64-di mmc-core-modules-3.16.0-0.bpo.4-amd64-di 
mmc-modules-3.16.0-0.bpo.4-amd64-di
 nbd-modules-3.16.0-0.bpo.4-amd64-di squashfs-modules-3.16.0-0.bpo.4-amd64-di 
speakup-modules-3.16.0-0.bpo.4-amd64-di virtio-modules-3.16.0-0.bpo.4-amd64-di 
uinput-modules-3.16.0-0.bpo.4-amd64-di sound-modules-3.16.0-0.bpo.4-amd64-di 
hyperv-modules-3.16.0-0.bpo.4-amd64-di udf-modules-3.16.0-0.bpo.4-amd64-di 
fuse-modules-3.16.0-0.bpo.4-amd64-di linux-headers-3.16.0-0.bpo.4-common 
linux-image-3.16.0-0.bpo.4-amd64 linux-headers-3.16.0-0.bpo.4-amd64 
linux-image-3.16.0-0.bpo.4-amd64-dbg xen-linux-system-3.16.0-0.bpo.4-amd64 
linux-headers-3.16.0-0.bpo.4-all-armel kernel-image-3.16.0-0.bpo.4-kirkwood-di 
nic-modules-3.16.0-0.bpo.4-kirkwood-di 
nic-shared-modules-3.16.0-0.bpo.4-kirkwood-di 
usb-serial-modules-3.16.0-0.bpo.4-kirkwood-di 
ppp-modules-3.16.0-0.bpo.4-kirkwood-di 
cdrom-core-modules-3.16.0-0.bpo.4-kirkwood-di 
scsi-core-modules-3.16.0-0.bpo.4-kirkwood-di 
loop-modules-3.16.0-0.bpo.4-kirkwood-di btrfs-modules-3.16.0-0.bpo.4-kirkwood-di
 ext4-modules-3.16.0-0.bpo.4-kirkwood-di 
isofs-modules-3.16.0-0.bpo.4-kirkwood-di jfs-modules-3.16.0-0.bpo.4-kirkwood-di 
fat-modules-3.16.0-0.bpo.4-kirkwood-di minix-modules-3.16.0-0.bpo.4-kirkwood-di 
md-modules-3.16.0-0.bpo.4-kirkwood-di 
multipath-modules-3.16.0-0.bpo.4-kirkwood-di 
usb-modules-3.16.0-0.bpo.4-kirkwood-di 
usb-storage-modules-3.16.0-0.bpo.4-kirkwood-di 
fb-modules-3.16.0-0.bpo.4-kirkwood-di input-modules-3.16.0-0.bpo.4-kirkwood-di 
event-modules-3.16.0-0.bpo.4-kirkwood-di 
mouse-modules-3.16.0-0.bpo.4-kirkwood-di 
nic-usb-modules-3.16.0-0.bpo.4-kirkwood-di 
sata-modules-3.16.0-0.bpo.4-kirkwood-di core-modules-3.16.0-0.bpo.4-kirkwood-di 
crc-modules-3.16.0-0.bpo.4-kirkwood-di 
crypto-modules-3.16.0-0.bpo.4-kirkwood-di 
crypto-dm-modules-3.16.0-0.bpo.4-kirkwood-di 
mmc-modules-3.16.0-0.bpo.4-kirkwood-di nbd-modules-3.16.0-0.bpo.4-kirkwood-di 
squashfs-modules-3.16.0-0.bpo.4-kirkwood-di 
uinput-modules-3.16.0-0.bpo.4-kirkwood-di
 leds-modules-3.16.0-0.bpo.4-kirkwood-di udf-modules-3.16.0-0.bpo.4-kirkwood-di 
fuse-modules-3.16.0-0.bpo.4-kirkwood-di kernel-image-3.16.0-0.bpo.4-orion5x-di 
nic-modules-3.16.0-0.bpo.4-orion5x-di 
nic-shared-modules-3.16.0-0.bpo.4-orion5x-di 
usb-serial-modules-3.16.0-0.bpo.4-orion5x-di 
ppp-modules-3.16.0-0.bpo.4-orion5x-di 
cdrom-core-modules-3.16.0-0.bpo.4-orion5x-di 
scsi-core-modules-3.16.0-0.bpo.4-orion5x-di 
loop-modules-3.16.0-0.bpo.4-orion5x-di ipv6-modules-3.16.0-0.bpo.4-orion5x-di 
btrfs-modules-3.16.0-0.bpo.4-orion5x-di ext4-modules-3.16.0-0.bpo.4-orion5x-di 
isofs-modules-3.16.0-0.bpo.4-orion5x-di jffs2-modules-3.16.0-0.bpo.4-orion5x-di 
jfs-modules-3.16.0-0.bpo.4-orion5x-di fat-modules-3.16.0-0.bpo.4-orion5x-di 
minix-modules-3.16.0-0.bpo.4-orion5x-di md-modules-3.16.0-0.bpo.4-orion5x-di 
multipath-modules-3.16.0-0.bpo.4-orion5x-di 
usb-modules-3.16.0-0.bpo.4-orion5x-di 
usb-storage-modules-3.16.0-0.bpo.4-orion5x-di 
event-modules-3.16.0-0.bpo.4-orion5x-di
 nic-u

Processed: the patch can be applied

2016-04-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 818502 patch
Bug #818502 [src:linux] linux-image-3.16.0-4-amd64: data corruption in KVM VM & 
hypervisor with Intel CPU with early IntelVT
Added tag(s) patch.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
818502: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818502
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Package: firmware-linux (0.43) [non-free]

2016-04-04 Thread Jamie Nunnery
This particular package seems to break Debian/Openbox functionality in that
it causes a complete system freeze when launching a terminal or other
application from the openbox right-click menu.  It happened on my Intel
Core 2 Quad.  Without installing firmware-linux, the system runs great.

Previously, I was running an older version of firmware-linux and I only
discovered this by doing sudo apt-get upgrade.  I then rebuilt the PC from
scratch, adding and testing packages one-by-one.  It failed on
firmware-linux.

Jamie


Processed: tag patch

2016-04-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 796637 + patch
Bug #796637 [nfs-common] nfs-common: Has init script in runlevel S but no 
matching service file
Added tag(s) patch.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
796637: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796637
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#819881: radeon_fence_ref BUG: unable to handle kernel NULL pointer dereference

2016-04-04 Thread Serhii Horeskyi

Hi all,
 I have the same bug,
Debian 8.3 works fine, but after upgrading to 8.4 a have got freeze



--
Regards,
Serhii Horelskyi!

Apr  4 19:13:22 Lizarra kernel: [0.00] Initializing cgroup subsys cpuset
Apr  4 19:13:22 Lizarra kernel: [0.00] Initializing cgroup subsys cpu
Apr  4 19:13:22 Lizarra kernel: [0.00] Initializing cgroup subsys cpuacct
Apr  4 19:13:22 Lizarra kernel: [0.00] Linux version 3.16.0-4-amd64 (debian-kernel@lists.debian.org) (gcc version 4.8.4 (Debian 4.8.4-1) ) #1 SMP Debian 3.16.7-ckt25-1 (2016-03-06)
Apr  4 19:13:22 Lizarra kernel: [0.00] Command line: BOOT_IMAGE=/vmlinuz-3.16.0-4-amd64 root=UUID=32b10bd8-760e-4121-8a54-441220200383 ro quiet splash radeon.audio=1
Apr  4 19:13:22 Lizarra kernel: [0.00] e820: BIOS-provided physical RAM map:
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0x-0x0009e7ff] usable
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0x0009e800-0x0009] reserved
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0x000e-0x000f] reserved
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0x0010-0xba866fff] usable
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0xba867000-0xbab42fff] reserved
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0xbab43000-0xbab52fff] ACPI data
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0xbab53000-0xbb956fff] ACPI NVS
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0xbb957000-0xbca33fff] reserved
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0xbca34000-0xbca34fff] usable
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0xbca35000-0xbcc3afff] ACPI NVS
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0xbcc3b000-0xbd082fff] usable
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0xbd083000-0xbd7f3fff] reserved
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0xbd7f4000-0xbd7f] usable
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0xf800-0xfbff] reserved
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0xfec0-0xfec00fff] reserved
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0xfec1-0xfec10fff] reserved
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0xfec2-0xfec20fff] reserved
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0xfed0-0xfed00fff] reserved
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0xfed61000-0xfed70fff] reserved
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0xfed8-0xfed8] reserved
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0xfef0-0x] reserved
Apr  4 19:13:22 Lizarra kernel: [0.00] BIOS-e820: [mem 0x00011000-0x00043eff] usable
Apr  4 19:13:22 Lizarra kernel: [0.00] NX (Execute Disable) protection: active
Apr  4 19:13:22 Lizarra kernel: [0.00] SMBIOS 0.7 present.
Apr  4 19:13:22 Lizarra kernel: [0.00] DMI: To be filled by O.E.M. To be filled by O.E.M./M5A97 R2.0, BIOS 2603 06/26/2015
Apr  4 19:13:22 Lizarra kernel: [0.00] e820: update [mem 0x-0x0fff] usable ==> reserved
Apr  4 19:13:22 Lizarra kernel: [0.00] e820: remove [mem 0x000a-0x000f] usable
Apr  4 19:13:22 Lizarra kernel: [0.00] AGP: No AGP bridge found
Apr  4 19:13:22 Lizarra kernel: [0.00] e820: last_pfn = 0x43f000 max_arch_pfn = 0x4
Apr  4 19:13:22 Lizarra kernel: [0.00] MTRR default type: uncachable
Apr  4 19:13:22 Lizarra kernel: [0.00] MTRR fixed ranges enabled:
Apr  4 19:13:22 Lizarra kernel: [0.00]   0-9 write-back
Apr  4 19:13:22 Lizarra kernel: [0.00]   A-B write-through
Apr  4 19:13:22 Lizarra kernel: [0.00]   C-D0FFF write-protect
Apr  4 19:13:22 Lizarra kernel: [0.00]   D1000-EBFFF uncachable
Apr  4 19:13:22 Lizarra kernel: [0.00]   EC000-F write-protect
Apr  4 19:13:22 Lizarra kernel: [0.00] MTRR variable ranges enabled:
Apr  4 19:13:22 Lizarra kernel: [0.00]   0 base  mask 8000 write-back
Apr  4 19:13:22 Lizarra kernel: [0.00]   1 base 8000 mask C000 write-back
Apr  4 19:13:22 Lizarra kernel: [0.00]   2 base BD80 mask FF80 uncachable
Apr  4 19:13:22 Lizarra kernel: [0.00]   3 base BE00 mask FE00 uncachable
Apr  4 19:13:22 Lizarra kernel: [0.00]   4 disabled
Apr  4 19:13:22 Lizarra kernel: [

Bug#820008: Support for securelevel and Secure Boot

2016-04-04 Thread Ben Hutchings
Package: src:linux
Version: 4.5-1~exp1
Severity: important
Tags: security

To ensure the integrity of the kernel, we should support a securelevel
where all modules must be signed by a trusted key and all APIs
allowing arbitrary memory writes are disabled.

To meet Secure Boot requirements, we need to turn this on whenever
booted with SB enabled.

Ben.

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.4.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)



Bug#820022: linux-image-4.4.0-1-arm64: Network is not working in Debian Testing arm64 for Gigabyte MP30-AR0 (APM X-Gene 1)

2016-04-04 Thread Ronald Maas
Package: src:linux
Version: 4.4.6-1
Severity: important
Tags: d-i

Network is not working in Debian Testing arm64 for Gigabyte MP30-AR0 (APM 
X-Gene 1)
---
When I start the Debian Testing Installer, the network adapter was not able to 
obtain an IP address. The installer was started from UEFI Shell using the 
command:

FS1:\EFI\BOOT\BOOTAA64.EFI

Also after successful installation and reboot, the network adapter was not able 
to obtain an IP address or otherwise connect to the network.

The root cause is that xgene_enet ethernet driver does not work properly when 
compiled as module in kernel 4.4 and 4.5 (and possibly other kernel versions). 
I contacted Phong Vo from AppliedMicro and he confirmed this to be a known 
issue. Some more detail can be found in a post on the Debian EFI mailing list 
https://lists.debian.org/debian-efi/2016/03/msg00020.html

Expected to happen
-
DHCP server is able to assign an IP address to the network after which I am 
able to ping another system.

What actually happened
--
Network adapter failed to obtain an IP address. No network connection is 
possible with other systems.

Hardware

Gigabyte MP30-AR0 motherboard with APM X-Gene 1 processor flashed with 
TianoCore UEFI
Kingston KVR16LE11S8/4HB 16 GB ECC DDR3 DRAM
HGST Deskstar NAS 6 TB drive
Logitech USB keyboard

Software

Debian Installer ISO was downloaded from 
http://cdimage.debian.org/cdimage/weekly-builds/arm64/iso-dvd/debian-testing-arm64-DVD-1.iso
 (dated 28-Mar-2016)

UBoot has been replaced by TianoCore UEFI using the steps described in: 
https://rwmj.wordpress.com/2016/03/08/gigabyte-mp30-ar0-flashing-uefi/

-- Package-specific info:
** Kernel log: boot messages should be attached

** Model information
Device Tree model: APM X-Gene Mustang board

** Network interface configuration:
# This file describes the network interfaces available on your system
# and how to activate them. For more information, see interfaces(5).

source /etc/network/interfaces.d/*

# The loopback network interface
auto lo
iface lo inet loopback

** PCI devices:
:00:00.0 PCI bridge [0604]: Applied Micro Circuits Corp. X-Gene PCIe bridge 
[10e8:e004] (rev 04) (prog-if 00 [Normal decode])
Control: I/O- Mem- BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- TAbort- Reset- FastB2B-
PriDiscTmr- SecDiscTmr- DiscTmrStat- DiscTmrSERREn-
Capabilities: 
Kernel driver in use: pcieport

0002:00:00.0 PCI bridge [0604]: Applied Micro Circuits Corp. X-Gene PCIe bridge 
[10e8:e004] (rev 04) (prog-if 00 [Normal decode])
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- TAbort- Reset- FastB2B-
PriDiscTmr- SecDiscTmr- DiscTmrStat- DiscTmrSERREn-
Capabilities: 
Kernel driver in use: pcieport

0002:01:00.0 PCI bridge [0604]: ASPEED Technology, Inc. AST1150 PCI-to-PCI 
Bridge [1a03:1150] (rev 03) (prog-if 00 [Normal decode])
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- TAbort- 
Reset- FastB2B-
PriDiscTmr- SecDiscTmr- DiscTmrStat- DiscTmrSERREn-
Capabilities: 

0002:02:00.0 VGA compatible controller [0300]: ASPEED Technology, Inc. ASPEED 
Graphics Family [1a03:2000] (rev 30) (prog-if 00 [VGA controller])
Subsystem: ASPEED Technology, Inc. ASPEED Graphics Family [1a03:2000]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=medium >TAbort- 
SERR- 
Kernel driver in use: ast

0003:00:00.0 PCI bridge [0604]: Applied Micro Circuits Corp. X-Gene PCIe bridge 
[10e8:e004] (rev 04) (prog-if 00 [Normal decode])
Control: I/O- Mem- BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- TAbort- Reset- FastB2B-
PriDiscTmr- SecDiscTmr- DiscTmrStat- DiscTmrSERREn-
Capabilities: 
Kernel driver in use: pcieport


** USB devices:
Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 003 Device 003: ID 046d:c31c Logitech, Inc. Keyboard K120
Bus 003 Device 002: ID 0bda:5401 Realtek Semiconductor Corp. RTL 8153 USB 3.0 
hub with gigabit ethernet
Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 001 Device 003: ID 0624:0249 Avocent Corp. Virtual Keyboard/Mouse
Bus 001 Device 002: ID 0624:0248 Avocent Corp. Virtual Hub
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

Processed: block 820036 with 820008, block 820036 with 820006, block 820006 with 820010 ...

2016-04-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> block 820036 with 820008
Bug #820036 [general] Debian does not run on systems with Secure Boot enabled
820036 was not blocked by any bugs.
820036 was not blocking any bugs.
Added blocking bug(s) of 820036: 820008
> block 820036 with 820006
Bug #820036 [general] Debian does not run on systems with Secure Boot enabled
820036 was blocked by: 820008
820036 was not blocking any bugs.
Added blocking bug(s) of 820036: 820006
> block 820006 with 820010
Bug #820006 [wnpp] ITP: linux-signed -- Signatures for Linux kernel and modules
820006 was not blocked by any bugs.
820006 was blocking: 820036
Added blocking bug(s) of 820006: 820010
> block 820036 with 820010
Bug #820036 [general] Debian does not run on systems with Secure Boot enabled
820036 was blocked by: 820006 820008
820036 was not blocking any bugs.
Added blocking bug(s) of 820036: 820010
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
820006: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820006
820036: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820036
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#820037: Copy detached module signatures into the initramfs

2016-04-04 Thread Ben Hutchings
Package: src:initramfs-tools
Version: 0.123
Severity: normal

We will probably implement module signing using detached signatures
which kmod will concatenate to the modules at load time (see #820010).
mkinitramfs will need to copy the detached signatures along with all
the modules it includes in the initramfs.

Ben.

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.4.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)



Processed: tagging 820022

2016-04-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 820022 + upstream
Bug #820022 [src:linux] linux-image-4.4.0-1-arm64: Network is not working in 
Debian Testing arm64 for Gigabyte MP30-AR0 (APM X-Gene 1)
Added tag(s) upstream.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
820022: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820022
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: block 820036 with 820037, block 820036 with 820038

2016-04-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> block 820036 with 820037
Bug #820036 [general] Debian does not run on systems with Secure Boot enabled
820036 was blocked by: 820006 820010 820008
820036 was not blocking any bugs.
Added blocking bug(s) of 820036: 820037
> block 820036 with 820038
Bug #820036 [general] Debian does not run on systems with Secure Boot enabled
820036 was blocked by: 820010 820006 820008 820037
820036 was not blocking any bugs.
Added blocking bug(s) of 820036: 820038
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
820036: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820036
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: cloning 820037, reassign -1 to src:dracut

2016-04-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> clone 820037 -1
Bug #820037 [src:initramfs-tools] Copy detached module signatures into the 
initramfs
Bug 820037 cloned as bug 820041
820036 was blocked by: 820037 820008 820038 820010 820006
820036 was not blocking any bugs.
Added blocking bug(s) of 820036: 820041; removed blocking bug(s) of 820036: 
820006, 820038, 820037, 820010, and 820008
> reassign -1 src:dracut
Bug #820041 [src:initramfs-tools] Copy detached module signatures into the 
initramfs
Bug reassigned from package 'src:initramfs-tools' to 'src:dracut'.
No longer marked as found in versions initramfs-tools/0.123.
Ignoring request to alter fixed versions of bug #820041 to the same values 
previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
820036: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820036
820037: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820037
820041: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820041
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: retitle 820037 to initramfs-tools: Copy detached module signatures into the initramfs ...

2016-04-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> retitle 820037 initramfs-tools: Copy detached module signatures into the 
> initramfs
Bug #820037 [src:initramfs-tools] Copy detached module signatures into the 
initramfs
Changed Bug title to 'initramfs-tools: Copy detached module signatures into the 
initramfs' from 'Copy detached module signatures into the initramfs'.
> retitle 820008 linux: Support for securelevel and Secure Boot
Bug #820008 [src:linux] Support for securelevel and Secure Boot
Changed Bug title to 'linux: Support for securelevel and Secure Boot' from 
'Support for securelevel and Secure Boot'.
> retitle 820038 kernel-wedge: Copy signatures into udebs
Bug #820038 [kernel-wedge] Copy signatures into udebs
Changed Bug title to 'kernel-wedge: Copy signatures into udebs' from 'Copy 
signatures into udebs'.
> retitle 820010 kmod: Add support for detached module signatures (.sig 
> extension)
Bug #820010 [src:kmod] Add support for detached module signatures (.sig 
extension)
Changed Bug title to 'kmod: Add support for detached module signatures (.sig 
extension)' from 'Add support for detached module signatures (.sig extension)'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
820008: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820008
820010: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820010
820037: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820037
820038: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820038
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: block 820036 with 820008, block 820036 with 820006, block 820006 with 820010 ...

2016-04-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> block 820036 with 820008
Bug #820036 [general] Debian does not run on systems with Secure Boot enabled
820036 was blocked by: 820041
820036 was not blocking any bugs.
Added blocking bug(s) of 820036: 820008
> block 820036 with 820006
Bug #820036 [general] Debian does not run on systems with Secure Boot enabled
820036 was blocked by: 820041 820008
820036 was not blocking any bugs.
Added blocking bug(s) of 820036: 820006
> block 820006 with 820010
Bug #820006 [wnpp] ITP: linux-signed -- Signatures for Linux kernel and modules
820006 was blocked by: 820010
820006 was blocking: 820036
Ignoring request to alter blocking bugs of bug #820006 to the same blocks 
previously set
> block 820036 with 820010
Bug #820036 [general] Debian does not run on systems with Secure Boot enabled
820036 was blocked by: 820006 820041 820008
820036 was not blocking any bugs.
Added blocking bug(s) of 820036: 820010
> block 820036 with 820037
Bug #820036 [general] Debian does not run on systems with Secure Boot enabled
820036 was blocked by: 820041 820008 820006 820010
820036 was not blocking any bugs.
Added blocking bug(s) of 820036: 820037
> block 820036 with 820038
Bug #820036 [general] Debian does not run on systems with Secure Boot enabled
820036 was blocked by: 820010 820006 820008 820037 820041
820036 was not blocking any bugs.
Added blocking bug(s) of 820036: 820038
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
820006: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820006
820036: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820036
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: block 820006 with 820037

2016-04-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> block 820006 with 820037
Bug #820006 [wnpp] ITP: linux-signed -- Signatures for Linux kernel and modules
820006 was blocked by: 820010
820006 was blocking: 820036
Added blocking bug(s) of 820006: 820037
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
820006: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820006
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: tagging 820037

2016-04-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 820037 + pending
Bug #820037 [src:initramfs-tools] initramfs-tools: Copy detached module 
signatures into the initramfs
Added tag(s) pending.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
820037: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=820037
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



powerpc: backport AST graphic driver updates for OpenPower

2016-04-04 Thread yu
Dear Maintainers,

When Using the newest Jessie kernel in TYAN TN71-BP012 server, we
found that the AST graphic driver can't work properly(no output from
vga).

There are bug reports already in Ubuntu:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1420627

and they provide patches here: we have test these patches, it can work.
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1420627/+attachment/4318303/+files/ast-backports.tar.gz

But the Ubuntu Kernel Team only backport these patches  in 3.19.y,
not in 3.16.y, so should Debian Jessie do these?

regards,

Eric

--
machine: TYAN TN71-BP012

Graphic:  Connector typeD-Sub 15-pin
ResolutionUp to 1920x1200Chipset
Aspeed AST2400

---

0001-drm-ast-switch-to-using-CACHED-by-default-for-sysram.patch
0002-drm-ast-Add-missing-entry-to-dclk_table.patch
0003-drm-ast-Add-reduced-blanking-modes-for-wide-screen-m.patch
0004-drm-ast-Try-to-use-MMIO-registers-when-PIO-isn-t-sup.patch
0005-drm-ast-POST-chip-at-probe-time-if-VGA-not-enabled.patch
0006-drm-ast-Properly-initialize-P2A-base-before-using-it.patch
0007-drm-ast-Don-t-assume-DVO-enabled-means-SIL164-on-uni.patch
0008-drm-ast-Cleanup-analog-init-code-path.patch



Bug#820061: linux-image-amd64: kernel hangs since debian 8.4

2016-04-04 Thread BenoƮt Tonnerre
Package: linux-image-amd64
Version: 3.16.7-ckt25-1
Severity: normal

Hi,

Since yesterday (update to debian 8.4) some PC at work, hangs randomly.

All the machines freeze when reading e-mails, searching things online, reading
PDF, lauching PHP Storm, etc ...

All the machines are from Dell (tested on Dell 990 and Dell 9010).

They are all equiped with a SSD disk.

Updating to linux-image-4.4.0-0.bpo.1-amd64 seems to resolve the issue.

I found this in /var/log/syslog :


Apr  4 18:52:55 pci003-01 kernel: [   79.316412] BUG: unable to handle kernel
NULL pointer dereference at 0008
Apr  4 18:52:55 pci003-01 kernel: [   79.317910] IP: []
radeon_fence_ref+0xd/0x50 [radeon]
Apr  4 18:52:55 pci003-01 kernel: [   79.318687] PGD 0
Apr  4 18:52:55 pci003-01 kernel: [   79.319445] Oops: 0002 [#1] SMP
Apr  4 18:52:55 pci003-01 kernel: [   79.320209] Modules linked in: md4 hmac
nls_utf8 cifs dns_resolver pci_stub vboxpci(O) vboxnetadp(O) vboxnetflt(O)
vboxdrv(O) cpufreq_stats cpufreq_userspace cpufreq_conservative
cpufreq_powersave nfsd auth_rpcgss oid_registry nfs_acl nfs lockd fscache
sunrpc snd_pcm_oss snd_mixer_oss fuse joydev x86_pkg_temp_thermal
intel_powerclamp intel_rapl coretemp kvm_intel kvm iTCO_wdt iTCO_vendor_support
crc32_pclmul evdev snd_hda_codec_realtek snd_hda_codec_generic aesni_intel
aes_x86_64 radeon lrw gf128mul glue_helper dcdbas ablk_helper cryptd ttm
drm_kms_helper pcspkr serio_raw drm i2c_i801 i2c_algo_bit i2c_core lpc_ich
snd_hda_intel mfd_core snd_hda_controller snd_hda_codec snd_hwdep snd_pcm
snd_timer tpm_tis snd tpm soundcore mei_me mei button shpchp video processor
thermal_sys parport_pc ppdev lp parport autofs4 hid_generic usbhid hid ext4
crc16 mbcache jbd2 raid1 md_mod sg sr_mod sd_mod cdrom crc_t10dif
crct10dif_generic crct10dif_pclmul crct10dif_common crc32c_intel psmouse ahci
libahci ehci_pci ehci_hcd libata scsi_mod e1000e usbcore ptp usb_common
pps_core
Apr  4 18:52:55 pci003-01 kernel: [   79.326413] CPU: 3 PID: 1604 Comm: Xorg
Tainted: G   O  3.16.0-4-amd64 #1 Debian 3.16.7-ckt25-1
Apr  4 18:52:55 pci003-01 kernel: [   79.327346] Hardware name: Dell Inc.
OptiPlex 990/06D7TR, BIOS A19 08/26/2015
Apr  4 18:52:55 pci003-01 kernel: [   79.328278] task: 8802216c0a20 ti:
88003639c000 task.ti: 88003639c000
Apr  4 18:52:55 pci003-01 kernel: [   79.329223] RIP: 0010:[]
[] radeon_fence_ref+0xd/0x50 [radeon]
Apr  4 18:52:55 pci003-01 kernel: [   79.330192] RSP: 0018:88003639fb18
EFLAGS: 00010292
Apr  4 18:52:55 pci003-01 kernel: [   79.331154] RAX:  RBX:
8802218f55f8 RCX: 8802218f4d08
Apr  4 18:52:55 pci003-01 kernel: [   79.332125] RDX: 0001 RSI:
 RDI: 
Apr  4 18:52:55 pci003-01 kernel: [   79.333110] RBP: 8802218f5550 R08:
8802218f4000 R09: 
Apr  4 18:52:55 pci003-01 kernel: [   79.334119] R10: 0002 R11:
88003639fe08 R12: 0020
Apr  4 18:52:55 pci003-01 kernel: [   79.335117] R13: 88003639fbe0 R14:
88003639fbb0 R15: 8802218f55f8
Apr  4 18:52:55 pci003-01 kernel: [   79.336120] FS:  7fd8f5323980()
GS:88022dc6() knlGS:
Apr  4 18:52:55 pci003-01 kernel: [   79.337143] CS:  0010 DS:  ES: 
CR0: 80050033
Apr  4 18:52:55 pci003-01 kernel: [   79.338142] CR2: 0008 CR3:
000223b3e000 CR4: 000407e0
Apr  4 18:52:55 pci003-01 kernel: [   79.339125] Stack:
Apr  4 18:52:55 pci003-01 kernel: [   79.340065]  a04900bc
0020 eea00100 88003639fcd0
Apr  4 18:52:55 pci003-01 kernel: [   79.341006]  8802218f4000
8802216c0a20 8802216c0a20 0001
Apr  4 18:52:55 pci003-01 kernel: [   79.341952]  
  
Apr  4 18:52:55 pci003-01 kernel: [   79.342899] Call Trace:
Apr  4 18:52:55 pci003-01 kernel: [   79.343854]  [] ?
radeon_sa_bo_new+0x25c/0x460 [radeon]
Apr  4 18:52:55 pci003-01 kernel: [   79.344808]  [] ?
radeon_ib_get+0x2e/0xd0 [radeon]
Apr  4 18:52:55 pci003-01 kernel: [   79.345758]  [] ?
radeon_cs_ioctl+0x13c/0x730 [radeon]
Apr  4 18:52:55 pci003-01 kernel: [   79.346702]  [] ?
drm_ioctl+0x1c7/0x5b0 [drm]
Apr  4 18:52:55 pci003-01 kernel: [   79.347637]  [] ?
__do_page_fault+0x1d1/0x4f0
Apr  4 18:52:55 pci003-01 kernel: [   79.348572]  [] ?
radeon_drm_ioctl+0x46/0x80 [radeon]
Apr  4 18:52:55 pci003-01 kernel: [   79.349500]  [] ?
do_vfs_ioctl+0x2cf/0x4b0
Apr  4 18:52:55 pci003-01 kernel: [   79.350437]  [] ?
__sys_recvmsg+0x65/0x80
Apr  4 18:52:55 pci003-01 kernel: [   79.351355]  [] ?
SyS_ioctl+0x81/0xa0
Apr  4 18:52:55 pci003-01 kernel: [   79.352265]  [] ?
system_call_fast_compare_end+0x10/0x15
Apr  4 18:52:55 pci003-01 kernel: [   79.353167] Code: e4 48 8b 3b 89 c1 89 ea
48 c7 c6 80 f6 51 a0 31 c0 e8 68 17 f7 e0 eb cb 66 0f 1f 44 00 00 66 66 66 66
90 48 89 f8 ba 01 00 00 00  0f c1 57 08 83 c2 01 83 fa 01 7e 01 c3 80 3d 0e
43 11 00 00
Apr  4 18:52:55 p