Bug#1021905: linux-image-6.0.0-trunk-amd64: fails to return from suspend

2022-10-17 Thread Gabriel Francisco
Hi, thanks for your quick reply,

I installed linux-image-6.0.0-1-amd64@6.0.2-1 from unstable and tested a
couple of times
closing the lid while having bluetooth headset connected and it seems ok so
far.

Thanks again and have a good evening,
Gabriel Francisco

*Gabriel Francisco*
Linux User #507840
email: frc.gabriel[at]gmail.com 


On Mon, Oct 17, 2022 at 6:50 PM Diederik de Haas 
wrote:

> On maandag 17 oktober 2022 05:31:05 CEST Gabriel Francisco wrote:
> > Version: 6.0-1~exp1
> >
> > when using linux-image-6.0.0-trunk-amd64 I noticed that my computer does
> > not return from suspend and checking the logs I found these lines:
> >
> >
> > Oct 15 15:30:20 computer kernel: [  209.936495] BUG: unable to handle
> page
> > fault for address: 110e1680 Oct 15 15:30:20 computer kernel: [
> > 209.936507] #PF: supervisor read access in kernel mode Oct 15 15:30:20
> > computer kernel: [  209.936513] #PF: error_code(0x) - not-present
> page
> > Oct 15 15:30:20 computer kernel: [  209.936517] PGD 0 P4D 0
> > Oct 15 15:30:20 computer kernel: [  209.936521] Oops:  [#1] PREEMPT
> SMP
> > NOPTI
>
> Kernel version 6.0.2 has been uploaded to unstable today.
> Can you check whether the issue is still present in that version?


Processed: Bug#1021927

2022-10-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 1021927 src:linux 5.19.6-1
Bug #1021927 [linux-image-5.19.0-2-amd64] Kernel 5.19 reports corrupted f2fs 
without corruption
Bug reassigned from package 'linux-image-5.19.0-2-amd64' to 'src:linux'.
Ignoring request to alter found versions of bug #1021927 to the same values 
previously set
Ignoring request to alter fixed versions of bug #1021927 to the same values 
previously set
Bug #1021927 [src:linux] Kernel 5.19 reports corrupted f2fs without corruption
Marked as found in versions linux/5.19.6-1.
>
End of message, stopping processing here.

Please contact me if you need assistance.
-- 
1021927: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021927
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#1021912: linux-headers-6.0.0-1-amd64: failed to build broadcom module , error on cfg80211, with linux kernel 6

2022-10-17 Thread Debian Bug Tracking System
Processing control commands:

> reassign -1 broadcom-sta-dkms
Bug #1021912 [linux-headers-6.0.0-1-amd64] linux-headers-6.0.0-1-amd64: failed 
to build broadcom module , error on cfg80211, with linux kernel 6
Bug reassigned from package 'linux-headers-6.0.0-1-amd64' to 
'broadcom-sta-dkms'.
No longer marked as found in versions linux/6.0.2-1.
Ignoring request to alter fixed versions of bug #1021912 to the same values 
previously set
> retitle -1 "broadcom-sta-dkms: Fails to build with kernel 6.0"
Bug #1021912 [broadcom-sta-dkms] linux-headers-6.0.0-1-amd64: failed to build 
broadcom module , error on cfg80211, with linux kernel 6
Changed Bug title to '"broadcom-sta-dkms: Fails to build with kernel 6.0"' from 
'linux-headers-6.0.0-1-amd64: failed to build broadcom module , error on 
cfg80211, with linux kernel 6'.

-- 
1021912: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021912
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1021912: linux-headers-6.0.0-1-amd64: failed to build broadcom module , error on cfg80211, with linux kernel 6

2022-10-17 Thread Diederik de Haas
Control: reassign -1 broadcom-sta-dkms
Control: retitle -1 "broadcom-sta-dkms: Fails to build with kernel 6.0"

On maandag 17 oktober 2022 11:41:41 CEST GT wrote:
> Package: linux-headers-6.0.0-1-amd64
> Version: 6.0.2-1
> Severity: important
> 
>* What led up to the situation?
> Try to install linux kernel 6 on my Debian 12 Bookworm aka testing Pc
>* What exactly did you do (or not do) that was effective (or
>  ineffective)?
> sudo apt install linux-image-6.0.0-1-amd64-unsigned
> linux-headers-6.0.0-1-amd64 [sudo] Mot de passe de guy :
> Lecture des listes de paquets... Fait

FTR: if you prepend the command with "LANG=C" (iirc), then the output would be 
in English, which (far) more people will be able to understand.

> Paramétrage de linux-headers-6.0.0-1-amd64 (6.0.2-1) ...
> /etc/kernel/header_postinst.d/dkms:
> dkms: running auto installation service for kernel 6.0.0-1-amd64:Sign
> command: /usr/lib/linux-kbuild-6.0/scripts/sign-file
> Signing key: /var/lib/dkms/mok.key
> Public certificate (MOK): /var/lib/dkms/mok.pub
> 
> Building module:
> Cleaning build area...
> make -j2 KERNELRELEASE=6.0.0-1-amd64 KVER=6.0.0-1-amd64...(bad exit
> status: 2)
> Error! Bad return status for module build on kernel: 6.0.0-1-amd64 (x86_64)
> Consult /var/lib/dkms/broadcom-sta/6.30.223.271/build/make.log for more
> information.
> 
> cat /var/lib/dkms/broadcom-sta/6.30.223.271/build/make.log

DKMS sources often need to be updated to support a new kernel version.
So the problem you encountered isn't with the linux-headers package, but with 
the broadcom-sta-dkms package, thus reassigning accordingly.

signature.asc
Description: This is a digitally signed message part.


Bug#1021905: linux-image-6.0.0-trunk-amd64: fails to return from suspend

2022-10-17 Thread Diederik de Haas
On maandag 17 oktober 2022 05:31:05 CEST Gabriel Francisco wrote:
> Version: 6.0-1~exp1
> 
> when using linux-image-6.0.0-trunk-amd64 I noticed that my computer does
> not return from suspend and checking the logs I found these lines:
> 
> 
> Oct 15 15:30:20 computer kernel: [  209.936495] BUG: unable to handle page
> fault for address: 110e1680 Oct 15 15:30:20 computer kernel: [ 
> 209.936507] #PF: supervisor read access in kernel mode Oct 15 15:30:20
> computer kernel: [  209.936513] #PF: error_code(0x) - not-present page
> Oct 15 15:30:20 computer kernel: [  209.936517] PGD 0 P4D 0
> Oct 15 15:30:20 computer kernel: [  209.936521] Oops:  [#1] PREEMPT SMP
> NOPTI

Kernel version 6.0.2 has been uploaded to unstable today.
Can you check whether the issue is still present in that version?

signature.asc
Description: This is a digitally signed message part.


linux-signed-amd64_6.0.2+1_source.changes ACCEPTED into unstable

2022-10-17 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 16 Oct 2022 18:25:05 +0200
Source: linux-signed-amd64
Architecture: source
Version: 6.0.2+1
Distribution: sid
Urgency: high
Maintainer: Debian Kernel Team 
Changed-By: Bastian Blank 
Changes:
 linux-signed-amd64 (6.0.2+1) unstable; urgency=high
 .
   * Sign kernel from linux 6.0.2-1
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.1
 - xsk: Inherit need_wakeup flag for shared sockets
 - fs: fix UAF/GPF bug in nilfs_mdt_destroy
 - fix coredump breakage
 - sparc: Unbreak the build
 - Makefile.extrawarn: Move -Wcast-function-type-strict to W=1
 - hardening: Remove Clang's enable flag for -ftrivial-auto-var-init=zero
 - docs: update mediator information in CoC docs
 - hwmon: (aquacomputer_d5next) Fix Quadro fan speed offsets
 - usb: mon: make mmapped memory read only
 - USB: serial: ftdi_sio: fix 300 bps rate for SIO
 - gpiolib: acpi: Add support to ignore programming an interrupt
 - gpiolib: acpi: Add a quirk for Asus UM325UAZ
 - RISC-V: Print SSTC in canonical order
 - bpf: Gate dynptr API behind CAP_BPF
 - net: ethernet: mtk_eth_soc: fix state in __mtk_foe_entry_clear
 - bpf: Fix resetting logic for unreferenced kptrs
 - Bluetooth: use hdev->workqueue when queuing hdev->{cmd,ncmd}_timer works
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.2
 - nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()
 - nilfs2: fix use-after-free bug of struct nilfs_root
 - nilfs2: fix leak of nilfs_root in case of writer thread creation failure
 - nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition 
failure
 - nvme-pci: set min_align_mask before calculating max_hw_sectors
 - random: restore O_NONBLOCK support
 - random: clamp credited irq bits to maximum mixed
 - ALSA: hda: Fix position reporting on Poulsbo
 - ALSA: hda/realtek: Add quirk for HP Zbook Firefly 14 G9 model
 - efi: Correct Macmini DMI match in uefi cert quirk
 - scsi: qla2xxx: Revert "scsi: qla2xxx: Fix response queue handler reading 
stale packets"
 - scsi: qla2xxx: Fix response queue handler reading stale packets
 - scsi: stex: Properly zero out the passthrough command structure
 - USB: serial: qcserial: add new usb-id for Dell branded EM7455
 - Revert "USB: fixup for merge issue with "usb: dwc3: Don't switch OTG -> 
peripheral if extcon is present""
 - Revert "usb: dwc3: Don't switch OTG -> peripheral if extcon is present"
 - Revert "powerpc/rtas: Implement reentrant rtas call"
 - Revert "crypto: qat - reduce size of mapped region"
 - random: avoid reading two cache lines on irq randomness
 - random: use expired timer rather than wq for mixing fast pool
 - wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()
   CVE-2022-41674
 - wifi: cfg80211/mac80211: reject bad MBSSID elements
 - wifi: mac80211: fix MBSSID parsing use-after-free
   CVE-2022-42719
 - wifi: cfg80211: ensure length byte is present before access
 - wifi: cfg80211: fix BSS refcounting bugs
   CVE-2022-42720
 - wifi: cfg80211: avoid nontransmitted BSS list corruption
   CVE-2022-42721
 - wifi: mac80211_hwsim: avoid mac80211 warning on bad rate
 - wifi: mac80211: fix crash in beacon protection for P2P-device
   CVE-2022-42722
 - wifi: cfg80211: update hidden BSSes to avoid WARN_ON
 - mctp: prevent double key removal and unref
 - Input: xpad - add supported devices as contributed on github
 - Input: xpad - fix wireless 360 controller breaking after suspend
 - misc: pci_endpoint_test: Aggregate params checking for xfer
 - misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic
 .
   [ Bastian Blank]
   * [cloud] Enable INTEGRITY.
Checksums-Sha1:
 5e04dfd9c2e25083c96a9886e203a87b72053bb0 8359 linux-signed-amd64_6.0.2+1.dsc
 5bb575ca59e30250f8dc0173f6f6993b3a837345 2918052 
linux-signed-amd64_6.0.2+1.tar.xz
Checksums-Sha256:
 37bb5561c6c334afefdf2351d5af3117f134eb03a72330298c90a0954de5a6ee 8359 
linux-signed-amd64_6.0.2+1.dsc
 c2e3cb7fe4d84806c91368f4291a3917ac79f5b9514164952c6bcbded2ba8e82 2918052 
linux-signed-amd64_6.0.2+1.tar.xz
Files:
 c0b5fdd0ac264c62b9a0a120d44a8552 8359 kernel optional 
linux-signed-amd64_6.0.2+1.dsc
 41d7e6595be4bb967caf876a9a75968f 2918052 kernel optional 
linux-signed-amd64_6.0.2+1.tar.xz

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmNNIA8ACgkQi0FRiLdO
NzZqOg/9GzEHFxfCIjQmiVA9R6U/BUtqobe1LMJrFnD2O7uA7JsNnyrAPLPuoHZM
4gYShFpgTiTGwu/7GQKUYCQxjKpjhcB8ZuR7ilhHcybMAFUKnT3eciWXeFUZVuNQ
1l2z0RqFRXtt2BgPOtSpSr8LOiiel7nHu9Wcz7s6W9SLozC0AnnnmSE2C+fXRqeS
j3t9wCuzLGYI6AwiV1RTan9l2/BO4ruOXHODeJrdD5YVJ6GXQ3mvaNhAntHjVmqO
CVUVwhUgHJQeWLmLMq0+M/L5Gp8eVtl84dzSQ80E95I8842y2sqRRsprPT5kwObM
En7zggPFJNnjA1XMvZ0ciCzn9lt0Jc+C+80O

linux-signed-i386_6.0.2+1_source.changes ACCEPTED into unstable

2022-10-17 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 16 Oct 2022 18:25:05 +0200
Source: linux-signed-i386
Architecture: source
Version: 6.0.2+1
Distribution: sid
Urgency: high
Maintainer: Debian Kernel Team 
Changed-By: Bastian Blank 
Changes:
 linux-signed-i386 (6.0.2+1) unstable; urgency=high
 .
   * Sign kernel from linux 6.0.2-1
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.1
 - xsk: Inherit need_wakeup flag for shared sockets
 - fs: fix UAF/GPF bug in nilfs_mdt_destroy
 - fix coredump breakage
 - sparc: Unbreak the build
 - Makefile.extrawarn: Move -Wcast-function-type-strict to W=1
 - hardening: Remove Clang's enable flag for -ftrivial-auto-var-init=zero
 - docs: update mediator information in CoC docs
 - hwmon: (aquacomputer_d5next) Fix Quadro fan speed offsets
 - usb: mon: make mmapped memory read only
 - USB: serial: ftdi_sio: fix 300 bps rate for SIO
 - gpiolib: acpi: Add support to ignore programming an interrupt
 - gpiolib: acpi: Add a quirk for Asus UM325UAZ
 - RISC-V: Print SSTC in canonical order
 - bpf: Gate dynptr API behind CAP_BPF
 - net: ethernet: mtk_eth_soc: fix state in __mtk_foe_entry_clear
 - bpf: Fix resetting logic for unreferenced kptrs
 - Bluetooth: use hdev->workqueue when queuing hdev->{cmd,ncmd}_timer works
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.2
 - nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()
 - nilfs2: fix use-after-free bug of struct nilfs_root
 - nilfs2: fix leak of nilfs_root in case of writer thread creation failure
 - nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition 
failure
 - nvme-pci: set min_align_mask before calculating max_hw_sectors
 - random: restore O_NONBLOCK support
 - random: clamp credited irq bits to maximum mixed
 - ALSA: hda: Fix position reporting on Poulsbo
 - ALSA: hda/realtek: Add quirk for HP Zbook Firefly 14 G9 model
 - efi: Correct Macmini DMI match in uefi cert quirk
 - scsi: qla2xxx: Revert "scsi: qla2xxx: Fix response queue handler reading 
stale packets"
 - scsi: qla2xxx: Fix response queue handler reading stale packets
 - scsi: stex: Properly zero out the passthrough command structure
 - USB: serial: qcserial: add new usb-id for Dell branded EM7455
 - Revert "USB: fixup for merge issue with "usb: dwc3: Don't switch OTG -> 
peripheral if extcon is present""
 - Revert "usb: dwc3: Don't switch OTG -> peripheral if extcon is present"
 - Revert "powerpc/rtas: Implement reentrant rtas call"
 - Revert "crypto: qat - reduce size of mapped region"
 - random: avoid reading two cache lines on irq randomness
 - random: use expired timer rather than wq for mixing fast pool
 - wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()
   CVE-2022-41674
 - wifi: cfg80211/mac80211: reject bad MBSSID elements
 - wifi: mac80211: fix MBSSID parsing use-after-free
   CVE-2022-42719
 - wifi: cfg80211: ensure length byte is present before access
 - wifi: cfg80211: fix BSS refcounting bugs
   CVE-2022-42720
 - wifi: cfg80211: avoid nontransmitted BSS list corruption
   CVE-2022-42721
 - wifi: mac80211_hwsim: avoid mac80211 warning on bad rate
 - wifi: mac80211: fix crash in beacon protection for P2P-device
   CVE-2022-42722
 - wifi: cfg80211: update hidden BSSes to avoid WARN_ON
 - mctp: prevent double key removal and unref
 - Input: xpad - add supported devices as contributed on github
 - Input: xpad - fix wireless 360 controller breaking after suspend
 - misc: pci_endpoint_test: Aggregate params checking for xfer
 - misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic
 .
   [ Bastian Blank]
   * [cloud] Enable INTEGRITY.
Checksums-Sha1:
 a4fec388f6f9a53be2f3f64288b902fccb8d097f 13808 linux-signed-i386_6.0.2+1.dsc
 644143afc7ddf99c3e4f1eb1ce96d0c75299ccbe 3830892 
linux-signed-i386_6.0.2+1.tar.xz
Checksums-Sha256:
 292ae601552f34afc9f26d5ffafb6d5d88f791edb9afdc9b78c4e23500578088 13808 
linux-signed-i386_6.0.2+1.dsc
 10b00f820a126991debe3b3718035a7a6a2d363f86cf8966c75499e24c503a95 3830892 
linux-signed-i386_6.0.2+1.tar.xz
Files:
 6489f2401b97f70f826ad685b02ea561 13808 kernel optional 
linux-signed-i386_6.0.2+1.dsc
 4bd5057932b6b62b53b590655609d880 3830892 kernel optional 
linux-signed-i386_6.0.2+1.tar.xz

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmNNdTgACgkQi0FRiLdO
Nzb2HA//WiqgdUV6DfOZwOkjUvBDatpgq9pPaWyIRQIymXlgfna3rhory6o/Uw2h
ruSV3GF+xxRG+8lcg03W72LvmgRuX0ZPuLMCyYZKK8+2kLKqfeYQO+rncrTMCnEo
JWpfbB4J9L6B66dNuziifUcr2+lkWEcRsaUtVVz6cRNCf0qfWwwU3pMGib47YC9I
1EOPZeEpzZ3yLrSUHcB5V5YpbbBBsdKBs3hS29f152umSqSra5fN2Qt39MXGjxWg
+4cJs0BbJdywWm4g8CqkKE9E2ptojLC0NzkZ9JkFO6fzKkOHLqm2CQ3ct+bcMkiz
jZpThsE7htggwevg0g+IcxCeqAXcgCfLptmRhYaRT

linux-signed-arm64_6.0.2+1_source.changes ACCEPTED into unstable

2022-10-17 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 16 Oct 2022 18:25:05 +0200
Source: linux-signed-arm64
Architecture: source
Version: 6.0.2+1
Distribution: sid
Urgency: high
Maintainer: Debian Kernel Team 
Changed-By: Bastian Blank 
Changes:
 linux-signed-arm64 (6.0.2+1) unstable; urgency=high
 .
   * Sign kernel from linux 6.0.2-1
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.1
 - xsk: Inherit need_wakeup flag for shared sockets
 - fs: fix UAF/GPF bug in nilfs_mdt_destroy
 - fix coredump breakage
 - sparc: Unbreak the build
 - Makefile.extrawarn: Move -Wcast-function-type-strict to W=1
 - hardening: Remove Clang's enable flag for -ftrivial-auto-var-init=zero
 - docs: update mediator information in CoC docs
 - hwmon: (aquacomputer_d5next) Fix Quadro fan speed offsets
 - usb: mon: make mmapped memory read only
 - USB: serial: ftdi_sio: fix 300 bps rate for SIO
 - gpiolib: acpi: Add support to ignore programming an interrupt
 - gpiolib: acpi: Add a quirk for Asus UM325UAZ
 - RISC-V: Print SSTC in canonical order
 - bpf: Gate dynptr API behind CAP_BPF
 - net: ethernet: mtk_eth_soc: fix state in __mtk_foe_entry_clear
 - bpf: Fix resetting logic for unreferenced kptrs
 - Bluetooth: use hdev->workqueue when queuing hdev->{cmd,ncmd}_timer works
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.2
 - nilfs2: fix NULL pointer dereference at nilfs_bmap_lookup_at_level()
 - nilfs2: fix use-after-free bug of struct nilfs_root
 - nilfs2: fix leak of nilfs_root in case of writer thread creation failure
 - nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition 
failure
 - nvme-pci: set min_align_mask before calculating max_hw_sectors
 - random: restore O_NONBLOCK support
 - random: clamp credited irq bits to maximum mixed
 - ALSA: hda: Fix position reporting on Poulsbo
 - ALSA: hda/realtek: Add quirk for HP Zbook Firefly 14 G9 model
 - efi: Correct Macmini DMI match in uefi cert quirk
 - scsi: qla2xxx: Revert "scsi: qla2xxx: Fix response queue handler reading 
stale packets"
 - scsi: qla2xxx: Fix response queue handler reading stale packets
 - scsi: stex: Properly zero out the passthrough command structure
 - USB: serial: qcserial: add new usb-id for Dell branded EM7455
 - Revert "USB: fixup for merge issue with "usb: dwc3: Don't switch OTG -> 
peripheral if extcon is present""
 - Revert "usb: dwc3: Don't switch OTG -> peripheral if extcon is present"
 - Revert "powerpc/rtas: Implement reentrant rtas call"
 - Revert "crypto: qat - reduce size of mapped region"
 - random: avoid reading two cache lines on irq randomness
 - random: use expired timer rather than wq for mixing fast pool
 - wifi: cfg80211: fix u8 overflow in cfg80211_update_notlisted_nontrans()
   CVE-2022-41674
 - wifi: cfg80211/mac80211: reject bad MBSSID elements
 - wifi: mac80211: fix MBSSID parsing use-after-free
   CVE-2022-42719
 - wifi: cfg80211: ensure length byte is present before access
 - wifi: cfg80211: fix BSS refcounting bugs
   CVE-2022-42720
 - wifi: cfg80211: avoid nontransmitted BSS list corruption
   CVE-2022-42721
 - wifi: mac80211_hwsim: avoid mac80211 warning on bad rate
 - wifi: mac80211: fix crash in beacon protection for P2P-device
   CVE-2022-42722
 - wifi: cfg80211: update hidden BSSes to avoid WARN_ON
 - mctp: prevent double key removal and unref
 - Input: xpad - add supported devices as contributed on github
 - Input: xpad - fix wireless 360 controller breaking after suspend
 - misc: pci_endpoint_test: Aggregate params checking for xfer
 - misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic
 .
   [ Bastian Blank]
   * [cloud] Enable INTEGRITY.
Checksums-Sha1:
 2469026c743d61e646e91f2534be15c44eb64e0e 7135 linux-signed-arm64_6.0.2+1.dsc
 bf2e8e0decd4b598e4f180543facae28362349d8 2675704 
linux-signed-arm64_6.0.2+1.tar.xz
Checksums-Sha256:
 c857a8fded04338e207faf6184614b4b7bb536a8e46d8a2f5ad1a8ee63f23289 7135 
linux-signed-arm64_6.0.2+1.dsc
 b2eb785309bdb0d1ded956be48044e75db5a4647d8ba1b540a871cd1bdf79b2f 2675704 
linux-signed-arm64_6.0.2+1.tar.xz
Files:
 0be55946f350fea15b2e1094fde28f87 7135 kernel optional 
linux-signed-arm64_6.0.2+1.dsc
 67036630d537097d9e5c3c8902852e0b 2675704 kernel optional 
linux-signed-arm64_6.0.2+1.tar.xz

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmNNQiUACgkQi0FRiLdO
NzaOnhAAoIAc4dHM4kgCw9YIMXgl53ktI2OWzjLgOrnbXylfnSVtXciUMiee2Sg3
vbLv/50ZFTuvKx+kwMblCqwNgMBqFRTHMyRqbD/koNsgpiyK8OzvojhhZgFUx/RB
wmpLpwOshkO2pSaV3OpeX6ExPXyAuHP+9WLD14RCiqKt6RCbONY47ztpzVvgYEOw
3s6hHwVK4sc5kB/nxvysNyxT5yVaasQeG0EEkhzgLM865D0ms7x32OPQ9EKi3a4W
6QEvkUCGG2PuvIZ5vWz2/2A7gC12lUk8hu1cOrrWFgoSYPb1blseGLz/c5OXvN2S
9kdvoECkAmNRDeLf5I+voWKhO1sUQ8ChnFdB

linux-signed-i386_6.0.2+1_source.changes is NEW

2022-10-17 Thread Debian FTP Masters
Mapping sid to unstable.
binary:acpi-modules-6.0.0-1-686-di is NEW.
binary:acpi-modules-6.0.0-1-686-pae-di is NEW.
binary:ata-modules-6.0.0-1-686-di is NEW.
binary:ata-modules-6.0.0-1-686-pae-di is NEW.
binary:btrfs-modules-6.0.0-1-686-di is NEW.
binary:btrfs-modules-6.0.0-1-686-pae-di is NEW.
binary:cdrom-core-modules-6.0.0-1-686-di is NEW.
binary:cdrom-core-modules-6.0.0-1-686-pae-di is NEW.
binary:crc-modules-6.0.0-1-686-di is NEW.
binary:crc-modules-6.0.0-1-686-pae-di is NEW.
binary:crypto-dm-modules-6.0.0-1-686-di is NEW.
binary:crypto-dm-modules-6.0.0-1-686-pae-di is NEW.
binary:crypto-modules-6.0.0-1-686-di is NEW.
binary:crypto-modules-6.0.0-1-686-pae-di is NEW.
binary:efi-modules-6.0.0-1-686-di is NEW.
binary:efi-modules-6.0.0-1-686-pae-di is NEW.
binary:event-modules-6.0.0-1-686-di is NEW.
binary:event-modules-6.0.0-1-686-pae-di is NEW.
binary:ext4-modules-6.0.0-1-686-di is NEW.
binary:ext4-modules-6.0.0-1-686-pae-di is NEW.
binary:f2fs-modules-6.0.0-1-686-di is NEW.
binary:f2fs-modules-6.0.0-1-686-pae-di is NEW.
binary:fat-modules-6.0.0-1-686-di is NEW.
binary:fat-modules-6.0.0-1-686-pae-di is NEW.
binary:fb-modules-6.0.0-1-686-di is NEW.
binary:fb-modules-6.0.0-1-686-pae-di is NEW.
binary:firewire-core-modules-6.0.0-1-686-di is NEW.
binary:firewire-core-modules-6.0.0-1-686-pae-di is NEW.
binary:fuse-modules-6.0.0-1-686-di is NEW.
binary:fuse-modules-6.0.0-1-686-pae-di is NEW.
binary:i2c-modules-6.0.0-1-686-di is NEW.
binary:i2c-modules-6.0.0-1-686-pae-di is NEW.
binary:input-modules-6.0.0-1-686-di is NEW.
binary:input-modules-6.0.0-1-686-pae-di is NEW.
binary:isofs-modules-6.0.0-1-686-di is NEW.
binary:isofs-modules-6.0.0-1-686-pae-di is NEW.
binary:jfs-modules-6.0.0-1-686-di is NEW.
binary:jfs-modules-6.0.0-1-686-pae-di is NEW.
binary:kernel-image-6.0.0-1-686-di is NEW.
binary:kernel-image-6.0.0-1-686-pae-di is NEW.
binary:linux-image-6.0.0-1-686 is NEW.
binary:linux-image-6.0.0-1-686-pae is NEW.
binary:linux-image-6.0.0-1-rt-686-pae is NEW.
binary:loop-modules-6.0.0-1-686-di is NEW.
binary:loop-modules-6.0.0-1-686-pae-di is NEW.
binary:md-modules-6.0.0-1-686-di is NEW.
binary:md-modules-6.0.0-1-686-pae-di is NEW.
binary:mmc-core-modules-6.0.0-1-686-di is NEW.
binary:mmc-core-modules-6.0.0-1-686-pae-di is NEW.
binary:mmc-modules-6.0.0-1-686-di is NEW.
binary:mmc-modules-6.0.0-1-686-pae-di is NEW.
binary:mouse-modules-6.0.0-1-686-di is NEW.
binary:mouse-modules-6.0.0-1-686-pae-di is NEW.
binary:mtd-core-modules-6.0.0-1-686-di is NEW.
binary:mtd-core-modules-6.0.0-1-686-pae-di is NEW.
binary:multipath-modules-6.0.0-1-686-di is NEW.
binary:multipath-modules-6.0.0-1-686-pae-di is NEW.
binary:nbd-modules-6.0.0-1-686-di is NEW.
binary:nbd-modules-6.0.0-1-686-pae-di is NEW.
binary:nic-modules-6.0.0-1-686-di is NEW.
binary:nic-modules-6.0.0-1-686-pae-di is NEW.
binary:nic-pcmcia-modules-6.0.0-1-686-di is NEW.
binary:nic-pcmcia-modules-6.0.0-1-686-pae-di is NEW.
binary:nic-shared-modules-6.0.0-1-686-di is NEW.
binary:nic-shared-modules-6.0.0-1-686-pae-di is NEW.
binary:nic-usb-modules-6.0.0-1-686-di is NEW.
binary:nic-usb-modules-6.0.0-1-686-pae-di is NEW.
binary:nic-wireless-modules-6.0.0-1-686-di is NEW.
binary:nic-wireless-modules-6.0.0-1-686-pae-di is NEW.
binary:pata-modules-6.0.0-1-686-di is NEW.
binary:pata-modules-6.0.0-1-686-pae-di is NEW.
binary:pcmcia-modules-6.0.0-1-686-di is NEW.
binary:pcmcia-modules-6.0.0-1-686-pae-di is NEW.
binary:pcmcia-storage-modules-6.0.0-1-686-di is NEW.
binary:pcmcia-storage-modules-6.0.0-1-686-pae-di is NEW.
binary:ppp-modules-6.0.0-1-686-di is NEW.
binary:ppp-modules-6.0.0-1-686-pae-di is NEW.
binary:rfkill-modules-6.0.0-1-686-di is NEW.
binary:rfkill-modules-6.0.0-1-686-pae-di is NEW.
binary:sata-modules-6.0.0-1-686-di is NEW.
binary:sata-modules-6.0.0-1-686-pae-di is NEW.
binary:scsi-core-modules-6.0.0-1-686-di is NEW.
binary:scsi-core-modules-6.0.0-1-686-pae-di is NEW.
binary:scsi-modules-6.0.0-1-686-di is NEW.
binary:scsi-modules-6.0.0-1-686-pae-di is NEW.
binary:scsi-nic-modules-6.0.0-1-686-di is NEW.
binary:scsi-nic-modules-6.0.0-1-686-pae-di is NEW.
binary:serial-modules-6.0.0-1-686-di is NEW.
binary:serial-modules-6.0.0-1-686-pae-di is NEW.
binary:sound-modules-6.0.0-1-686-di is NEW.
binary:sound-modules-6.0.0-1-686-pae-di is NEW.
binary:speakup-modules-6.0.0-1-686-di is NEW.
binary:speakup-modules-6.0.0-1-686-pae-di is NEW.
binary:squashfs-modules-6.0.0-1-686-di is NEW.
binary:squashfs-modules-6.0.0-1-686-pae-di is NEW.
binary:udf-modules-6.0.0-1-686-di is NEW.
binary:udf-modules-6.0.0-1-686-pae-di is NEW.
binary:uinput-modules-6.0.0-1-686-di is NEW.
binary:uinput-modules-6.0.0-1-686-pae-di is NEW.
binary:usb-modules-6.0.0-1-686-di is NEW.
binary:usb-modules-6.0.0-1-686-pae-di is NEW.
binary:usb-serial-modules-6.0.0-1-686-di is NEW.
binary:usb-serial-modules-6.0.0-1-686-pae-di is NEW.
binary:usb-storage-modules-6.0.0-1-686-di is NEW.
binary:usb-storage-modules-6.0.0-1-686-pae-di is NEW.
binary:xfs-modules-6.0.0-1-686-di is NEW.
binary:xfs-modules-6.0.0

Processing of linux-signed-i386_6.0.2+1_source.changes

2022-10-17 Thread Debian FTP Masters
linux-signed-i386_6.0.2+1_source.changes uploaded successfully to localhost
along with the files:
  linux-signed-i386_6.0.2+1.dsc
  linux-signed-i386_6.0.2+1.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#1021927: Kernel 5.19 reports corrupted f2fs without corruption

2022-10-17 Thread Heinz Repp

Package: linux-image-5.19.0-1-amd64
Package: linux-image-5.19.0-2-amd64

Version: 5.19.6-1
Version: 5.19.11-1

Since 5.19, the kernel shows this error screen on every boot:

Info: Fix the reported corruption.
Info: [/dev/sdb4] Disk Model: SanDisk SDSSDHII
Info: Segments per section = 1
Info: Sections per zone = 1
Info: sector size = 512
Info: total sectors = 233906176 (114212 MB)
Info: MKFS version
  "Linux version 4.3.0-1-amd64 (debian-kernel@lists.debian.org) (gcc version 
5.3.1 20160101 (Debian 5.3.1-5) ) #1 SMP Debian 4.3
.3-5 (2016-01-04)"
Info: FSCK version
  from "Linux version 4.3.0-1-amd64 (debian-kernel@lists.debian.org) (gcc 
version 5.3.1 20160121 (Debian 5.3.1-7) ) #1 SMP Debia
n 4.3.5-1 (2016-02-06)"
to "Linux version 5.19.0-2-amd64 (debian-kernel@lists.debian.org) (gcc-11 
(Debian 11.3.0-6) 11.3.0, GNU ld (GNU Binutils for
 Debian) 2.38.90.20220713) #1 SMP PREEMPT_DYNAMIC Debian 5.19.11-1 (2022-09-24)"
Info: superblock features = 0 : 
Info: superblock encrypt level = 0, salt = 

Info: total FS sectors = 233906176 (114212 MB)
Info: CKPT version = 34a199
Info: checkpoint state = 45 :  crc compacted_summary unmount
Info: No error was reported
[5.548001]


/dev/sdb4 is my root F2FS partition. The boot screen resembles the 
dump.f2fs screen in the live system. I already ran fsck.f2fs /dev/sdb4 
-a and -f from a GRML64 Debian testing based system (with kernel 
5.19.0-2) booted from an usb stick, but both reported no error (as does 
the kernel, see above). I am using a fully updated Debian testing system.


The bug is merely annoying, as the system boots normally, but it is 
annoying.




linux-signed-arm64_6.0.2+1_source.changes is NEW

2022-10-17 Thread Debian FTP Masters
Mapping sid to unstable.
binary:ata-modules-6.0.0-1-arm64-di is NEW.
binary:btrfs-modules-6.0.0-1-arm64-di is NEW.
binary:cdrom-core-modules-6.0.0-1-arm64-di is NEW.
binary:crc-modules-6.0.0-1-arm64-di is NEW.
binary:crypto-dm-modules-6.0.0-1-arm64-di is NEW.
binary:crypto-modules-6.0.0-1-arm64-di is NEW.
binary:efi-modules-6.0.0-1-arm64-di is NEW.
binary:event-modules-6.0.0-1-arm64-di is NEW.
binary:ext4-modules-6.0.0-1-arm64-di is NEW.
binary:f2fs-modules-6.0.0-1-arm64-di is NEW.
binary:fat-modules-6.0.0-1-arm64-di is NEW.
binary:fb-modules-6.0.0-1-arm64-di is NEW.
binary:fuse-modules-6.0.0-1-arm64-di is NEW.
binary:i2c-modules-6.0.0-1-arm64-di is NEW.
binary:input-modules-6.0.0-1-arm64-di is NEW.
binary:isofs-modules-6.0.0-1-arm64-di is NEW.
binary:jfs-modules-6.0.0-1-arm64-di is NEW.
binary:kernel-image-6.0.0-1-arm64-di is NEW.
binary:leds-modules-6.0.0-1-arm64-di is NEW.
binary:linux-image-6.0.0-1-arm64 is NEW.
binary:linux-image-6.0.0-1-cloud-arm64 is NEW.
binary:linux-image-6.0.0-1-rt-arm64 is NEW.
binary:loop-modules-6.0.0-1-arm64-di is NEW.
binary:md-modules-6.0.0-1-arm64-di is NEW.
binary:mmc-modules-6.0.0-1-arm64-di is NEW.
binary:mtd-core-modules-6.0.0-1-arm64-di is NEW.
binary:multipath-modules-6.0.0-1-arm64-di is NEW.
binary:nbd-modules-6.0.0-1-arm64-di is NEW.
binary:nic-modules-6.0.0-1-arm64-di is NEW.
binary:nic-shared-modules-6.0.0-1-arm64-di is NEW.
binary:nic-usb-modules-6.0.0-1-arm64-di is NEW.
binary:nic-wireless-modules-6.0.0-1-arm64-di is NEW.
binary:ppp-modules-6.0.0-1-arm64-di is NEW.
binary:sata-modules-6.0.0-1-arm64-di is NEW.
binary:scsi-core-modules-6.0.0-1-arm64-di is NEW.
binary:scsi-modules-6.0.0-1-arm64-di is NEW.
binary:scsi-nic-modules-6.0.0-1-arm64-di is NEW.
binary:squashfs-modules-6.0.0-1-arm64-di is NEW.
binary:udf-modules-6.0.0-1-arm64-di is NEW.
binary:uinput-modules-6.0.0-1-arm64-di is NEW.
binary:usb-modules-6.0.0-1-arm64-di is NEW.
binary:usb-serial-modules-6.0.0-1-arm64-di is NEW.
binary:usb-storage-modules-6.0.0-1-arm64-di is NEW.
binary:xfs-modules-6.0.0-1-arm64-di is NEW.

Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file hashes are valid), so please be patient.

Packages are routinely processed through to the archive, and do feel
free to browse the NEW queue[1].

If there is an issue with the upload, you will receive an email from a
member of the ftpteam.

If you have any questions, you may reply to this email.

[1]: https://ftp-master.debian.org/new.html
 or https://ftp-master.debian.org/backports-new.html for *-backports



Processing of linux-signed-arm64_6.0.2+1_source.changes

2022-10-17 Thread Debian FTP Masters
linux-signed-arm64_6.0.2+1_source.changes uploaded successfully to localhost
along with the files:
  linux-signed-arm64_6.0.2+1.dsc
  linux-signed-arm64_6.0.2+1.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Re: Bug#1021919: virtionet device not found in debian testing netinst ISO 20221017

2022-10-17 Thread Cyril Brulebois
Hi Laurent,

Laurent GUERBY  (2022-10-17):
> Trying to install the testing netinst ISO in a VM (in proxmox):
> 
> https://cdimage.debian.org/cdimage/weekly-builds/amd64/iso-cd/debian-te
> sting-amd64-netinst.iso
> 
> The issue is that the installer fails to find an ethernet card which is
> there in lspci (virtio ethernet from proxmox).
> 
> Note : same VM under proxmox (just changing the ISO) finds the ethernet
> card with officiel debian 11 netinst ISO.

I'm seeing BFP issues, similar to those reported here:
  https://bugs.debian.org/1003210

except for the virtio_net module. Checking /var/lib/dpkg/status, it
looks like we have kernel-image from 5.19.11-1 and nic-modules from
5.19.11-1+b1, which would mean kernel and modules from a different
build, which was flagged in #1003210 as possibly problematic.

Looping in kernel maintainers to get some input, and debian-cd for
information given the way testing images are built…


Cheers,
-- 
Cyril Brulebois (k...@debian.org)
D-I release manager -- Release team member -- Freelance Consultant


signature.asc
Description: PGP signature


linux-signed-amd64_6.0.2+1_source.changes is NEW

2022-10-17 Thread Debian FTP Masters
Mapping sid to unstable.
binary:acpi-modules-6.0.0-1-amd64-di is NEW.
binary:ata-modules-6.0.0-1-amd64-di is NEW.
binary:btrfs-modules-6.0.0-1-amd64-di is NEW.
binary:cdrom-core-modules-6.0.0-1-amd64-di is NEW.
binary:crc-modules-6.0.0-1-amd64-di is NEW.
binary:crypto-dm-modules-6.0.0-1-amd64-di is NEW.
binary:crypto-modules-6.0.0-1-amd64-di is NEW.
binary:efi-modules-6.0.0-1-amd64-di is NEW.
binary:event-modules-6.0.0-1-amd64-di is NEW.
binary:ext4-modules-6.0.0-1-amd64-di is NEW.
binary:f2fs-modules-6.0.0-1-amd64-di is NEW.
binary:fat-modules-6.0.0-1-amd64-di is NEW.
binary:fb-modules-6.0.0-1-amd64-di is NEW.
binary:firewire-core-modules-6.0.0-1-amd64-di is NEW.
binary:fuse-modules-6.0.0-1-amd64-di is NEW.
binary:i2c-modules-6.0.0-1-amd64-di is NEW.
binary:input-modules-6.0.0-1-amd64-di is NEW.
binary:isofs-modules-6.0.0-1-amd64-di is NEW.
binary:jfs-modules-6.0.0-1-amd64-di is NEW.
binary:kernel-image-6.0.0-1-amd64-di is NEW.
binary:linux-image-6.0.0-1-amd64 is NEW.
binary:linux-image-6.0.0-1-cloud-amd64 is NEW.
binary:linux-image-6.0.0-1-rt-amd64 is NEW.
binary:loop-modules-6.0.0-1-amd64-di is NEW.
binary:md-modules-6.0.0-1-amd64-di is NEW.
binary:mmc-core-modules-6.0.0-1-amd64-di is NEW.
binary:mmc-modules-6.0.0-1-amd64-di is NEW.
binary:mouse-modules-6.0.0-1-amd64-di is NEW.
binary:mtd-core-modules-6.0.0-1-amd64-di is NEW.
binary:multipath-modules-6.0.0-1-amd64-di is NEW.
binary:nbd-modules-6.0.0-1-amd64-di is NEW.
binary:nic-modules-6.0.0-1-amd64-di is NEW.
binary:nic-pcmcia-modules-6.0.0-1-amd64-di is NEW.
binary:nic-shared-modules-6.0.0-1-amd64-di is NEW.
binary:nic-usb-modules-6.0.0-1-amd64-di is NEW.
binary:nic-wireless-modules-6.0.0-1-amd64-di is NEW.
binary:pata-modules-6.0.0-1-amd64-di is NEW.
binary:pcmcia-modules-6.0.0-1-amd64-di is NEW.
binary:pcmcia-storage-modules-6.0.0-1-amd64-di is NEW.
binary:ppp-modules-6.0.0-1-amd64-di is NEW.
binary:rfkill-modules-6.0.0-1-amd64-di is NEW.
binary:sata-modules-6.0.0-1-amd64-di is NEW.
binary:scsi-core-modules-6.0.0-1-amd64-di is NEW.
binary:scsi-modules-6.0.0-1-amd64-di is NEW.
binary:scsi-nic-modules-6.0.0-1-amd64-di is NEW.
binary:serial-modules-6.0.0-1-amd64-di is NEW.
binary:sound-modules-6.0.0-1-amd64-di is NEW.
binary:speakup-modules-6.0.0-1-amd64-di is NEW.
binary:squashfs-modules-6.0.0-1-amd64-di is NEW.
binary:udf-modules-6.0.0-1-amd64-di is NEW.
binary:uinput-modules-6.0.0-1-amd64-di is NEW.
binary:usb-modules-6.0.0-1-amd64-di is NEW.
binary:usb-serial-modules-6.0.0-1-amd64-di is NEW.
binary:usb-storage-modules-6.0.0-1-amd64-di is NEW.
binary:xfs-modules-6.0.0-1-amd64-di is NEW.

Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file hashes are valid), so please be patient.

Packages are routinely processed through to the archive, and do feel
free to browse the NEW queue[1].

If there is an issue with the upload, you will receive an email from a
member of the ftpteam.

If you have any questions, you may reply to this email.

[1]: https://ftp-master.debian.org/new.html
 or https://ftp-master.debian.org/backports-new.html for *-backports



Bug#1021913: linux-image-5.10.0-17-amd64: High CPU load due to lots of processes "kworker/X:X+delete_workqueue" in D state when using pcs-cluster with GFS2

2022-10-17 Thread Philipp Kussmaul
Package: src:linux
Version: 5.10.136-1
Severity: important

Dear Maintainer,

we're running a 5 node pcs cluster with shared GFS2 filesystem and a 
proftpd-cluster accessing the shared filesystem.
The CPU load rises permanently on all the nodes with heavy I/O to the GFS2 
filesystem due to processes "kworker/X:X+delete_workqueue" in D state.

Reboot the system is the only way to get the load back to normal.

Here is the stacktrace of one of the processes:
4065392
[<0>] gfs2_glock_wait+0x3e/0x80 [gfs2]
[<0>] gfs2_inode_lookup+0x285/0x3f0 [gfs2]
[<0>] gfs2_lookup_by_inum+0x1c/0x50 [gfs2]
[<0>] delete_work_func+0x8b/0x230 [gfs2]
[<0>] process_one_work+0x1b3/0x350
[<0>] worker_thread+0x53/0x3e0
[<0>] kthread+0x118/0x140
[<0>] ret_from_fork+0x1f/0x30


There is a similar bug in RHEL8 (fixed):
https://access.redhat.com/solutions/5844041





-- Package-specific info:
** Version:
Linux version 5.10.0-17-amd64 (debian-kernel@lists.debian.org) (gcc-10 (Debian 
10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2) #1 SMP 
Debian 5.10.136-1 (2022-08-13)

** Command line:
BOOT_IMAGE=/vmlinuz-5.10.0-17-amd64 root=/dev/mapper/system-lv_root ro 
net.ifnames=0 biosdevname=0 quiet

** Not tainted

** Kernel log:
Unable to read kernel log; any relevant messages should be attached

** Model information
sys_vendor: VMware, Inc.
product_name: VMware Virtual Platform
product_version: None
chassis_vendor: No Enclosure
chassis_version: N/A
bios_vendor: Phoenix Technologies LTD
bios_version: 6.00
board_vendor: Intel Corporation
board_name: 440BX Desktop Reference Platform
board_version: None

** Loaded modules:
binfmt_misc
xt_multiport
nft_compat
rpcsec_gss_krb5
nfsv4
dns_resolver
nfs
nfs_ssc
fscache
gfs2
dlm
nft_counter
nf_tables
nfnetlink
sctp
libcrc32c
vsock_loopback
vmw_vsock_virtio_transport_common
intel_rapl_msr
intel_rapl_common
vmw_vsock_vmci_transport
nfit
vsock
libnvdimm
ghash_clmulni_intel
aesni_intel
libaes
crypto_simd
cryptd
glue_helper
rapl
vmwgfx
ttm
drm_kms_helper
vmw_balloon
joydev
evdev
serio_raw
cec
vmw_vmci
pcspkr
sg
ac
button
nfsd
auth_rpcgss
nfs_acl
lockd
grace
drm
sunrpc
fuse
configfs
ip_tables
x_tables
autofs4
ext4
crc16
mbcache
jbd2
crc32c_generic
dm_mod
sd_mod
sr_mod
cdrom
t10_pi
crc_t10dif
crct10dif_generic
crct10dif_pclmul
ata_generic
crct10dif_common
ata_piix
mptspi
mptscsih
libata
mptbase
crc32_pclmul
scsi_transport_spi
crc32c_intel
psmouse
vmw_pvscsi
scsi_mod
vmxnet3
i2c_piix4

** Network interface configuration:
*** /etc/network/interfaces:
iface lo inet loopback
auto lo
iface lo inet loopback
up ip addr add 10.10.10.104/32 dev lo label lo:VIP-SFTP
down ip addr del 10.10.10.104/32 dev lo label lo:VIP-SFTP

auto eth0
iface eth0 inet static
address 10.10.10.245
netmask 255.255.255.0
gateway 10.10.10.1
up ip addr add 10.10.10.148/24 dev eth0
metric 0

auto eth1
iface eth1 inet static
address 192.168.1.245/24


** Network status:
*** IP interfaces and addresses:
1: lo:  mtu 65536 qdisc noqueue state UNKNOWN group 
default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
   valid_lft forever preferred_lft forever
inet 10.10.10.104/32 scope global lo:VIP-SFTP
   valid_lft forever preferred_lft forever
inet6 ::1/128 scope host 
   valid_lft forever preferred_lft forever
2: eth0:  mtu 1500 qdisc mq state UP group 
default qlen 1000
link/ether 00:50:56:b3:2a:8f brd ff:ff:ff:ff:ff:ff
altname enp11s0
altname ens192
inet 10.10.10.245/24 brd 10.127.201.255 scope global eth0
   valid_lft forever preferred_lft forever
inet 10.10.10.148/24 scope global secondary eth0
   valid_lft forever preferred_lft forever
inet6 fe80::250:56ff:feb3:2a8f/64 scope link 
   valid_lft forever preferred_lft forever
3: eth1:  mtu 1500 qdisc mq state UP group 
default qlen 1000
link/ether 00:50:56:b3:6e:a0 brd ff:ff:ff:ff:ff:ff
altname enp19s0
altname ens224
inet 192.168.1.245/24 brd 192.168.98.255 scope global eth1
   valid_lft forever preferred_lft forever
inet6 fe80::250:56ff:feb3:6ea0/64 scope link 
   valid_lft forever preferred_lft forever

*** Device statistics:
Inter-|   Receive|  Transmit
 face |bytespackets errs drop fifo frame compressed multicast|bytes
packets errs drop fifo colls carrier compressed
lo: 112394946  487259000 0  0 0 112394946  
487259000 0   0  0
  eth0: 5908056696764 39962155390 100330 0  0 19538 
619432688031 619282191000 0   0  0
  eth1: 3276463735 213705600 90260 0  0 0 
2908651590 18599452000 0   0  0

*** Protocol statistics:
Ip:
Forwarding: 2
371309113 total packets received
0 forwarded
12 with unknown protocol
0 incoming packets discarded
371306357 incoming packets delivered
24

Processing of linux-signed-amd64_6.0.2+1_source.changes

2022-10-17 Thread Debian FTP Masters
linux-signed-amd64_6.0.2+1_source.changes uploaded successfully to localhost
along with the files:
  linux-signed-amd64_6.0.2+1.dsc
  linux-signed-amd64_6.0.2+1.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#1021912: linux-headers-6.0.0-1-amd64: failed to build broadcom module , error on cfg80211, with linux kernel 6

2022-10-17 Thread GT
Package: linux-headers-6.0.0-1-amd64
Version: 6.0.2-1
Severity: important

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
Try to install linux kernel 6 on my Debian 12 Bookworm aka testing Pc
   * What exactly did you do (or not do) that was effective (or
 ineffective)?
sudo apt install linux-image-6.0.0-1-amd64-unsigned linux-headers-6.0.0-1-amd64
[sudo] Mot de passe de guy :
Lecture des listes de paquets... Fait
Construction de l'arbre des dépendances... Fait
Lecture des informations d'état... Fait
Les paquets supplémentaires suivants seront installés :
  linux-compiler-gcc-12-x86 linux-headers-6.0.0-1-common linux-kbuild-6.0
Paquets suggérés :
  linux-doc-6.0 debian-kernel-handbook
Paquets recommandés :
  apparmor
Les NOUVEAUX paquets suivants seront installés :
  linux-compiler-gcc-12-x86 linux-headers-6.0.0-1-amd64 linux-
headers-6.0.0-1-common linux-image-6.0.0-1-amd64-unsigned
  linux-kbuild-6.0
0 mis à jour, 5 nouvellement installés, 0 à enlever et 0 non mis à jour.
Il est nécessaire de prendre 82,1 Mo dans les archives.
Après cette opération, 538 Mo d'espace disque supplémentaires seront utilisés.
Souhaitez-vous continuer ? [O/n]
Réception de :1 https://cdn-aws.deb.debian.org/debian sid/main amd64 linux-
compiler-gcc-12-x86 amd64 6.0.2-1 [513 kB]
Réception de :2 https://cdn-aws.deb.debian.org/debian sid/main amd64 linux-
headers-6.0.0-1-common all 6.0.2-1 [9 609 kB]
Réception de :3 https://cdn-aws.deb.debian.org/debian sid/main amd64 linux-
kbuild-6.0 amd64 6.0.2-1 [769 kB]
Réception de :4 https://cdn-aws.deb.debian.org/debian sid/main amd64 linux-
headers-6.0.0-1-amd64 amd64 6.0.2-1 [1 000 kB]
Réception de :5 https://cdn-aws.deb.debian.org/debian sid/main amd64 linux-
image-6.0.0-1-amd64-unsigned amd64 6.0.2-1 [70,3 MB]
82,1 Mo réceptionnés en 52s (1 575 ko/s)
Sélection du paquet linux-compiler-gcc-12-x86 précédemment désélectionné.
(Lecture de la base de données... 192972 fichiers et répertoires déjà
installés.)
Préparation du dépaquetage de .../linux-compiler-gcc-12-x86_6.0.2-1_amd64.deb
...
Dépaquetage de linux-compiler-gcc-12-x86 (6.0.2-1) ...
Sélection du paquet linux-headers-6.0.0-1-common précédemment désélectionné.
Préparation du dépaquetage de .../linux-headers-6.0.0-1-common_6.0.2-1_all.deb
...
Dépaquetage de linux-headers-6.0.0-1-common (6.0.2-1) ...
Sélection du paquet linux-kbuild-6.0 précédemment désélectionné.
Préparation du dépaquetage de .../linux-kbuild-6.0_6.0.2-1_amd64.deb ...
Dépaquetage de linux-kbuild-6.0 (6.0.2-1) ...
Sélection du paquet linux-headers-6.0.0-1-amd64 précédemment désélectionné.
Préparation du dépaquetage de .../linux-headers-6.0.0-1-amd64_6.0.2-1_amd64.deb
...
Dépaquetage de linux-headers-6.0.0-1-amd64 (6.0.2-1) ...
Sélection du paquet linux-image-6.0.0-1-amd64-unsigned précédemment
désélectionné.
Préparation du dépaquetage de .../linux-
image-6.0.0-1-amd64-unsigned_6.0.2-1_amd64.deb ...
Dépaquetage de linux-image-6.0.0-1-amd64-unsigned (6.0.2-1) ...
Paramétrage de linux-compiler-gcc-12-x86 (6.0.2-1) ...
Paramétrage de linux-headers-6.0.0-1-common (6.0.2-1) ...
Paramétrage de linux-kbuild-6.0 (6.0.2-1) ...
Paramétrage de linux-headers-6.0.0-1-amd64 (6.0.2-1) ...
/etc/kernel/header_postinst.d/dkms:
dkms: running auto installation service for kernel 6.0.0-1-amd64:Sign command:
/usr/lib/linux-kbuild-6.0/scripts/sign-file
Signing key: /var/lib/dkms/mok.key
Public certificate (MOK): /var/lib/dkms/mok.pub

Building module:
Cleaning build area...
make -j2 KERNELRELEASE=6.0.0-1-amd64 KVER=6.0.0-1-amd64...(bad exit status:
2)
Error! Bad return status for module build on kernel: 6.0.0-1-amd64 (x86_64)
Consult /var/lib/dkms/broadcom-sta/6.30.223.271/build/make.log for more
information.


   * What was the outcome of this action?
Wifi unavailable

cat /var/lib/dkms/broadcom-sta/6.30.223.271/build/make.log
DKMS make.log for broadcom-sta-6.30.223.271 for kernel 6.0.0-1-amd64 (x86_64)
lun. 17 oct. 2022 11:19:21 CEST
CFG80211 API is prefered for this kernel version
Makefile:89: Neither CFG80211 nor Wireless Extension is enabled in kernel
KBUILD_NOPEDANTIC=1 make -C /lib/modules/6.0.0-1-amd64/build M=`pwd`
make[1]: avertissement : jobserver n'est pas disponible : utilisation de -j1.
Ajouter « + » à la règle parent du make.
make[1] : on entre dans le répertoire « /usr/src/linux-headers-6.0.0-1-amd64 »
CFG80211 API is prefered for this kernel version
Using CFG80211 API
Kernel architecture is X86_64
  CC [M]  /var/lib/dkms/broadcom-sta/6.30.223.271/build/src/shared/linux_osl.o
  CC [M]  /var/lib/dkms/broadcom-sta/6.30.223.271/build/src/wl/sys/wl_linux.o
In file included from /var/lib/dkms/broadcom-
sta/6.30.223.271/build/src/wl/sys/wl_linux.c:81:
/var/lib/dkms/broadcom-sta/6.30.223.271/build/src/wl/sys/wl_iw.h:73: warning:
"isprint" redefined
   73 | #define isprint(c) bcm_isprint(c)
  |
In file included from /usr/src/linux-
headers-6.0.0-1-common/include/linux/string_helpers.h:6,