nfs-utils_2.6.4-1_sourceonly.changes ACCEPTED into unstable

2023-11-21 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 22 Nov 2023 07:15:57 +0100
Source: nfs-utils
Architecture: source
Version: 1:2.6.4-1
Distribution: unstable
Urgency: medium
Maintainer: Debian kernel team 
Changed-By: Salvatore Bonaccorso 
Changes:
 nfs-utils (1:2.6.4-1) unstable; urgency=medium
 .
   * Upload to unstable
Checksums-Sha1: 
 803b55f3266e6ae48aa3a1ff20da3b351fbe7b6f 2554 nfs-utils_2.6.4-1.dsc
 18effd264a9adb7aa5ec5f88207b6d8dac111de4 47072 nfs-utils_2.6.4-1.debian.tar.xz
Checksums-Sha256: 
 1b0cd9ac7e3d2f81fbe01a5111cf08a31d35942d811c728f46ce670f02140721 2554 
nfs-utils_2.6.4-1.dsc
 4403f52a80a99bd13ae994a25a2c372a03b3ddc3701d229d922be073409be176 47072 
nfs-utils_2.6.4-1.debian.tar.xz
Files: 
 e44b0678b476488eba0ccc4055f94d0a 2554 net optional nfs-utils_2.6.4-1.dsc
 e79f2758f1f512d5afcb13cb4f13af9c 47072 net optional 
nfs-utils_2.6.4-1.debian.tar.xz

-BEGIN PGP SIGNATURE-
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=EAF1
-END PGP SIGNATURE-



Processing of nfs-utils_2.6.4-1_sourceonly.changes

2023-11-21 Thread Debian FTP Masters
nfs-utils_2.6.4-1_sourceonly.changes uploaded successfully to localhost
along with the files:
  nfs-utils_2.6.4-1.dsc
  nfs-utils_2.6.4-1.debian.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#1056356: apt-get update kernel BUG at mm/usercopy.c:101!

2023-11-21 Thread Jiann-Ming Su
Thanks for following up.  I think you are right, these two old
MacMinis gets into a weird state where apt is affected by the kernel
usercopy problem, i.e. apt is not causing the problem itself.  Both
behave the same with bookworm 6.1 kernel.  No problems on the bullseye
5.10 kernel.  Please close this case since it is not an apt issue.

$ /usr/lib/apt/methods/http < /tmp/testrequest
100 Capabilities
Send-URI-Encoded: true
Send-Config: true
Pipeline: true
Version: 1.2

102 Status
Message: Connecting to ftp-nyc.osuosl.org
URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease

102 Status
Message: Connecting to ftp-nyc.osuosl.org (64.50.233.100)
URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease

102 Status
Message: Connected to ftp-nyc.osuosl.org (64.50.233.100)
URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease

GET /debian/dists/bookworm/InRelease HTTP/1.1
Host: ftp.us.debian.org
Accept: text/*
User-Agent: Debian APT-HTTP/1.3 (2.6.1)


102 Status
Message: Waiting for headers
URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease

Answer for: http://ftp.us.debian.org/debian/dists/bookworm/InRelease
HTTP/1.1 200 OK
Date: Tue, 21 Nov 2023 21:54:35 GMT
Server: Apache
Last-Modified: Sat, 07 Oct 2023 09:49:42 GMT
ETag: "24dfd-6071d46c1efad"
Accept-Ranges: bytes
Content-Length: 151037

200 URI Start
Last-Modified: Sat, 07 Oct 2023 09:49:42 +
Size: 151037
URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease

201 URI Done
Checksum-FileSize-Hash: 151037
SHA512-Hash: 
10437f8f2ab4e1c45494d46096c753110b9b4b19a706087537ff77c951ccc30185a4e829456c926cae1d1a89052127f97aab5d4c828ef1f120fea8a5fb39badc
SHA256-Hash: f433d996ac53bab13e33631c6c250b8a7216692c56a2da61194bdd944bf7
SHA1-Hash: 1ff2370064bd97104a10a73578f6c75c6bebfc13
MD5Sum-Hash: bc85d0cdcc061129196e9caac8311995
MD5-Hash: bc85d0cdcc061129196e9caac8311995
Last-Modified: Sat, 07 Oct 2023 09:49:42 +
Size: 151037
Filename: /dev/null
URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease

On Tue, Nov 21, 2023 at 3:54 PM David Kalnischkies
 wrote:
>
> Control: reassign -1 src:linux 6.1.38-4
> Control: forcemerge 1051643 -1
> Control: affects -1 apt
>
> Hi,
>
> On Tue, Nov 21, 2023 at 11:04:18AM -0500, js1 wrote:
> > Running apt-get update causes kernel BUG as reported in 1051643.  apt-get 
> > update hangs:
>
> If that is as you describe, that the bug is in the kernel, we as apt
> maintainers can do nothing about it.
>
> We have also no other reports to that effect here or as far as I can see
> in Launchpad (= Ubuntu) against apt, so this might be highly dependent
> on your/specific hardware.
>
> So, keeping the bug open here seems to serve no purpose in my eyes and
> hence I am merging it with the existing one – but I tag it as affecting
> apt, so that it appears in its bug list should other users encounter
> this with apt (which I suppose was your intend).
>
>
> Beside you running apt I don't see any apt code in the trace, but from
> the apt output produced I suppose its triggering somewhere in the
> download step, so the following might help to simplify the reproducer
> a bit – if you can reproduce it that way of course as a lot of
> complexity is stripped away which might trigger it…
>
> $ cat > /tmp/testrequest < 601 Configuration
> Config-Item: Debug::Acquire::http=1
> Config-Item: Debug::Acquire::https=1
> Config-Item: Acquire::http::DependOnSTDIN=0
> Config-Item: Acquire::https::DependOnSTDIN=0
>
> 600 URI Acquire
> URI: http://ftp.us.debian.org/debian/dists/bookworm/InRelease
> Filename: /dev/null
>
> EOF
> $ /usr/lib/apt/methods/http < /tmp/testrequest
>
> (yes, you can and are encouraged to run this as non-root user.
>  While creating the testrequest file make sure copy everything between
>  the two EOF. Especially the ending empty line. A successful run ends
>  with a block starting with "201 URI Done". Your apt output suggests
>  it triggers somewhere between "102 Status" and "200 URI Start".)
>
> Before giving up on this try using a real Filename and/or different URI
> in the testrequest (if you want to use a https URI, make sure to call
> the https method!).
>
>
> Hope that helps & good luck finding the cause & solution.
>
> Best regards
>
> David Kalnischkies



-- 
Jiann-Ming Su



Processed: Re: Bug#1056356: apt-get update kernel BUG at mm/usercopy.c:101!

2023-11-21 Thread Debian Bug Tracking System
Processing control commands:

> reassign -1 src:linux 6.1.38-4
Bug #1056356 [apt] apt-get update kernel BUG at mm/usercopy.c:101!
Bug reassigned from package 'apt' to 'src:linux'.
No longer marked as found in versions apt/2.6.1.
Ignoring request to alter fixed versions of bug #1056356 to the same values 
previously set
Bug #1056356 [src:linux] apt-get update kernel BUG at mm/usercopy.c:101!
Marked as found in versions linux/6.1.38-4.
> forcemerge 1051643 -1
Bug #1051643 [src:linux] linux-image-6.1.0-11-686-pae: kernel BUG at 
mm/usercopy.c:101!
Bug #1056356 [src:linux] apt-get update kernel BUG at mm/usercopy.c:101!
Added tag(s) moreinfo.
Merged 1051643 1056356
> affects -1 apt
Bug #1056356 [src:linux] apt-get update kernel BUG at mm/usercopy.c:101!
Bug #1051643 [src:linux] linux-image-6.1.0-11-686-pae: kernel BUG at 
mm/usercopy.c:101!
Added indication that 1056356 affects apt
Added indication that 1051643 affects apt

-- 
1051643: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051643
1056356: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056356
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: tagging 1051132

2023-11-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tags 1051132 + upstream
Bug #1051132 [nfs-kernel-server] /usr/sbin/fsidd: bound to 
@/run/fsid.sock@
Added tag(s) upstream.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1051132: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051132
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1053503: Enable support for Renesas RZ/V2L, RZ/G2UL, and RZ/V2M

2023-11-21 Thread Diederik de Haas
On Tuesday, 21 November 2023 17:58:55 CET John Vincent wrote:
> Do you have any update on the Bug#1053503 please (Enable additional Renesas
> platform like RZ/V2L). Is this change already got merged and available in
> the daily Debian builds for testing?

https://salsa.debian.org/kernel-team/linux/-/merge_requests/867 is the MR for 
it and it is merged and will be part of the next 6.6 kernel upload.
It is not known when that will happen though.

signature.asc
Description: This is a digitally signed message part.


Bug#1053503: Enable support for Renesas RZ/V2L, RZ/G2UL, and RZ/V2M

2023-11-21 Thread John Vincent
Hi Emanuele

The grub 2.12 image loading is working ok with u-boot v2023.10. Thanks for your 
help earlier.

Do you have any update on the Bug#1053503 please (Enable additional Renesas 
platform like RZ/V2L). Is this change already got merged and available in the 
daily Debian builds for testing?

Best Regards
John

-Original Message-
From: Emanuele Rocca  On Behalf Of Emanuele Rocca
Sent: Sunday, November 5, 2023 10:16 AM
To: Salvatore Bonaccorso 
Cc: John Vincent ; 1053...@bugs.debian.org
Subject: Re: Bug#1053503: Enable support for Renesas RZ/V2L, RZ/G2UL, and RZ/V2M

Hi Salvatore,

On 2023-11-04 09:57, Salvatore Bonaccorso wrote:
> I'm not sure this is really that urgent, 6.5.10 will be EOL upstream
> at some point and in master branch Bastian et all are prearing the 6.6
> based once. After an extra round in experimental I would expect it
> will now not take too much longer to have a version including this
> change as well in unstable.

Ah yeah that sounds good. Thanks!

  Emanuele


Renesas Electronics Europe GmbH
Registered Office: Arcadiastrasse 10
DE-40472 Duesseldorf
Commercial Registry: Duesseldorf, HRB 3708
Managing Director: Carsten Jauch
VAT-No.: DE 14978647
Tax-ID-No: 105/5839/1793

Legal Disclaimer: This e-mail communication (and any attachment/s) is 
confidential and contains proprietary information, some or all of which may be 
legally privileged. It is intended solely for the use of the individual or 
entity to which it is addressed. Access to this email by anyone else is 
unauthorized. If you are not the intended recipient, any disclosure, copying, 
distribution or any action taken or omitted to be taken in reliance on it, is 
prohibited and may be unlawful.



Bug#1051643: Info received (Bug#1051643: Acknowledgement (linux-image-6.1.0-11-686-pae: kernel BUG at mm/usercopy.c:101!))

2023-11-21 Thread Jiann-Ming Su
Looks like it's unrelated to openvpn; running openvpn 2.6.3-1+deb12u2
and the mm/usercopy still happens.  I just reported 1056356 for apt
since this happens pretty reliably during apt-get update.


On Tue, Nov 21, 2023 at 9:53 AM Jiann-Ming Su  wrote:
>
> Could this issue be related to CVE-2023-46850 mentioned in bug
> 1055805?  OpenVPN is running on this particular box that suffers from
> this problem.
>
> On Mon, Nov 6, 2023 at 11:36 PM Jiann-Ming Su  wrote:
> >
> > and 6.1.0-13-686-pae:
> >
> > [348871.341900] usercopy: Kernel memory exposure attempt detected from
> > kmap (offset 1270, size 15114)!
> > [348871.342021] [ cut here ]
> > [348871.342024] kernel BUG at mm/usercopy.c:101!
> > [348871.342068] invalid opcode:  [#1] PREEMPT SMP PTI
> > [348871.342118] CPU: 0 PID: 12867 Comm: http Not tainted
> > 6.1.0-13-686-pae #1  Debian 6.1.55-1
> > [348871.342186] Hardware name: Apple Computer, Inc.
> > Macmini1,1/Mac-F4208EC8, BIOS MM11.88Z.0055.B0
> > 8.0610121326 10/12/06
> > [348871.342259] EIP: usercopy_abort+0x65/0x67
> > [348871.342302] Code: 44 cb bb b8 af b3 c6 89 4d f0 b9 b6 2a b2 c6 0f
> > 45 cb ff 75 0c ff 75 08 57 52 56
> > 50 ff 75 f0 51 68 58 af b3 c6 e8 40 8d ff ff <0f> 0b 56 31 d2 b8 02 b0
> > b3 c6 ff 75 ec 8b 4d f0 e8 86
> > ff ff ff 56
> > [348871.342423] EAX: 0056 EBX: c6b3afb8 ECX: 0001 EDX: 8001
> > [348871.342472] ESI: c6b51abc EDI: c6b51abc EBP: c4255c18 ESP: c4255be4
> > [348871.342520] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 
> > 00010286
> > [348871.342573] CR0: 80050033 CR2: b776ce90 CR3: 34fe8000 CR4: 06f0
> > [348871.342621] Call Trace:
> > [348871.342649]  ? __die_body.cold+0x14/0x1a
> > [348871.342687]  ? __die+0x21/0x26
> > [348871.342717]  ? die+0x28/0x50
> > [348871.342749]  ? do_trap+0xbb/0xe0
> > [348871.342780]  ? do_error_trap+0x4c/0x60
> > [348871.342814]  ? usercopy_abort+0x65/0x67
> > [348871.342851]  ? exc_overflow+0x40/0x40
> > [348871.342892]  ? exc_invalid_op+0x44/0x60
> > [348871.342929]  ? usercopy_abort+0x65/0x67
> > [348871.342966]  ? handle_exception+0x133/0x133
> > [348871.343009]  ? exc_overflow+0x40/0x40
> > [348871.343046]  ? usercopy_abort+0x65/0x67
> > [348871.343082]  ? exc_overflow+0x40/0x40
> > [348871.343117]  ? usercopy_abort+0x65/0x67
> > [348871.343156]  __check_object_size.cold+0xae/0xae
> > [348871.343199]  simple_copy_to_iter+0x1c/0x40
> > [348871.343237]  __skb_datagram_iter+0x163/0x320
> > [348871.343276]  skb_copy_datagram_iter+0x2d/0x80
> > [348871.343316]  ? skb_free_datagram+0x20/0x20
> > [348871.343353]  tcp_recvmsg_locked+0x30e/0x890
> > [348871.343400]  tcp_recvmsg+0x6f/0x1e0
> > [348871.343437]  ? tcp_recv_timestamp+0x240/0x240
> > [348871.343476]  inet_recvmsg+0x54/0x130
> > [348871.343509]  ? security_socket_recvmsg+0x41/0x60
> > [348871.343553]  sock_recvmsg+0x73/0x90
> > [348871.343589]  ? ipip_gso_segment+0x30/0x30
> > [348871.343625]  sock_read_iter+0x84/0xe0
> > [348871.343664]  vfs_read+0x288/0x2c0
> > [348871.343702]  ksys_read+0xab/0xe0
> > [348871.343734]  __ia32_sys_read+0x15/0x20
> > [348871.343768]  __do_fast_syscall_32+0x68/0xb0
> > [348871.343807]  ? fpregs_assert_state_consistent+0x25/0x50
> > [348871.345275]  ? exit_to_user_mode_prepare+0x41/0x1a0
> > [348871.346746]  ? syscall_exit_to_user_mode+0x29/0x40
> > [348871.348214]  ? __do_fast_syscall_32+0x72/0xb0
> > [348871.349630]  ? vfs_write+0x105/0x3c0
> > [348871.350996]  ? debug_smp_processor_id+0x12/0x20
> > [348871.352388]  ? fpregs_assert_state_consistent+0x25/0x50
> > [348871.353744]  ? exit_to_user_mode_prepare+0x41/0x1a0
> > [348871.355064]  ? syscall_exit_to_user_mode+0x29/0x40
> > [348871.356350]  ? __ia32_sys_write+0x15/0x20
> > [348871.357571]  ? __do_fast_syscall_32+0x72/0xb0
> > [348871.358715]  ? fpregs_assert_state_consistent+0x25/0x50
> > [348871.359832]  ? exit_to_user_mode_prepare+0x41/0x1a0
> > [348871.360933]  ? irqentry_exit_to_user_mode+0x16/0x20
> > [348871.362024]  do_fast_syscall_32+0x29/0x60
> > [348871.363100]  do_SYSENTER_32+0x15/0x20
> > [348871.364153]  entry_SYSENTER_32+0x98/0xf1
> > [348871.365213] EIP: 0xb7f25559
> > [348871.366273] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01
> > 10 07 03 74 b0 01 10 08 03 74 d8
> > 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90
> > 8d 76 00 58 b8 77 00 00 00 cd
> > 80 90 8d 76
> > [348871.368699] EAX: ffda EBX: 0003 ECX: 01a19d4f EDX: f9f1
> > [348871.369982] ESI: b721cff4 EDI:  EBP: 01a184e0 ESP: bf9f19c0
> > [348871.371287] DS: 007b ES: 007b FS:  GS: 0033 SS: 007b EFLAGS: 
> > 0246
> > [348871.372627] Modules linked in: tls tun xt_tcpudp xt_conntrack
> > snd_hda_codec_idt snd_hda_codec_gene
> > ric nf_conntrack ledtrig_audio nf_defrag_ipv6 snd_hda_intel
> > nf_defrag_ipv4 i915 snd_intel_dspcfg nft_c
> > ompat drm_buddy nf_tables snd_intel_sdw_acpi drm_display_helper
> > snd_hda_codec iTCO_wdt cec hid_appleir
> > intel_pmc_bxt rc_core iTCO_vendor_support coretemp ttm 

nfs-utils_2.6.4-1~exp1_sourceonly.changes ACCEPTED into experimental

2023-11-21 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Tue, 21 Nov 2023 16:02:51 +0100
Source: nfs-utils
Architecture: source
Version: 1:2.6.4-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian kernel team 
Changed-By: Salvatore Bonaccorso 
Changes:
 nfs-utils (1:2.6.4-1~exp1) experimental; urgency=medium
 .
   * New upstream version 2.6.4
Checksums-Sha1: 
 5c0555ef6d79922a6f0216402875944400c1cbf6 2574 nfs-utils_2.6.4-1~exp1.dsc
 9ba9e55e51890fe974b870b9af637cb29c553a5e 728280 nfs-utils_2.6.4.orig.tar.xz
 5e3ee1a1202cfbdf7c952d9fba394c48b99e20e5 47080 
nfs-utils_2.6.4-1~exp1.debian.tar.xz
Checksums-Sha256: 
 2bcb9edd0a7cf8039132ae5181a9fad3032e5e003a654549c1663e2f916d20e6 2574 
nfs-utils_2.6.4-1~exp1.dsc
 01b3b0fb9c7d0bbabf5114c736542030748c788ec2fd9734744201e9b0a1119d 728280 
nfs-utils_2.6.4.orig.tar.xz
 f4f51d5a239ed41c2ebfb8a0baad2f0816d072527c8d215d9df3c7325e2cfd16 47080 
nfs-utils_2.6.4-1~exp1.debian.tar.xz
Files: 
 6f06dc068342c0455d317262774ac7ee 2574 net optional nfs-utils_2.6.4-1~exp1.dsc
 907f95977ccf7a522ee32af1534f0e4c 728280 net optional 
nfs-utils_2.6.4.orig.tar.xz
 11298cf7cea3ddfd599c86f285f76a78 47080 net optional 
nfs-utils_2.6.4-1~exp1.debian.tar.xz

-BEGIN PGP SIGNATURE-

iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmVcx49fFIAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
ZWJpYW4ub3JnAAoJEAVMuPMTQ89ELokQAIr1Dr0+r8l4SYNiRKJdaYaQ8n5NPapT
lvjx/KYqnpGUp1tQ42U2XowuO1VQp1F/RdWx3lnuB2dytKqF1zLADhZ2GESGol74
C+ZbGRQPB1HHpcVwvqM2m2W4uKwWvf1olw7BZvrslm8PtzLo9vB9rHJYr1Tawe40
Lf11go5zdKtVCFVlikoWkQvHvBjAC30FHHlzJvkwpMTEmOz26GERY+M6MpZmwGR4
hyYIUINv4dfA1rRrixtqWs/CLAgfZv4k8jobWl8Yttu76NFgaGMeaHjcmEZcZrD6
XOjp4HVEAuGuizvFz9eNh7Hq3QXmMbJrOExy3w7udCdyx3uoc9j9h9hfiNnzLlPi
31W+ea2mu2e7lq1t3T0PF84ytd3nVCqlrxploUF/V2fztm0yw0oZPMg/KUGYkOBK
u4Z86ZDkkor/mMR3QDepAvV0Ed0SZee/sHwAEqj5o+mmYfhy0nLY1snAk/H1cPm5
pjz4bJI9kDT8G20a1UUL2gKJC3GPQwkavJh4oN23WmUm/OeYG4ySx6yq858Pvbsi
1pWzqxkAbqFw3Wsm4G1uXKBB4VDpYXJGB6YPIDupxZbj20ry3w4KEfBxw/xXzu/H
yWCFoIu60vuh5jPjc0Ecv+QHWk2POXGMmc30fdG9/OgcRox4TkLNO3zKA3gsr/97
SmVul41j7Ynb
=+I5A
-END PGP SIGNATURE-



Processing of nfs-utils_2.6.4-1~exp1_sourceonly.changes

2023-11-21 Thread Debian FTP Masters
nfs-utils_2.6.4-1~exp1_sourceonly.changes uploaded successfully to localhost
along with the files:
  nfs-utils_2.6.4-1~exp1.dsc
  nfs-utils_2.6.4.orig.tar.xz
  nfs-utils_2.6.4-1~exp1.debian.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#1051643: Info received (Bug#1051643: Acknowledgement (linux-image-6.1.0-11-686-pae: kernel BUG at mm/usercopy.c:101!))

2023-11-21 Thread Jiann-Ming Su
Could this issue be related to CVE-2023-46850 mentioned in bug
1055805?  OpenVPN is running on this particular box that suffers from
this problem.

On Mon, Nov 6, 2023 at 11:36 PM Jiann-Ming Su  wrote:
>
> and 6.1.0-13-686-pae:
>
> [348871.341900] usercopy: Kernel memory exposure attempt detected from
> kmap (offset 1270, size 15114)!
> [348871.342021] [ cut here ]
> [348871.342024] kernel BUG at mm/usercopy.c:101!
> [348871.342068] invalid opcode:  [#1] PREEMPT SMP PTI
> [348871.342118] CPU: 0 PID: 12867 Comm: http Not tainted
> 6.1.0-13-686-pae #1  Debian 6.1.55-1
> [348871.342186] Hardware name: Apple Computer, Inc.
> Macmini1,1/Mac-F4208EC8, BIOS MM11.88Z.0055.B0
> 8.0610121326 10/12/06
> [348871.342259] EIP: usercopy_abort+0x65/0x67
> [348871.342302] Code: 44 cb bb b8 af b3 c6 89 4d f0 b9 b6 2a b2 c6 0f
> 45 cb ff 75 0c ff 75 08 57 52 56
> 50 ff 75 f0 51 68 58 af b3 c6 e8 40 8d ff ff <0f> 0b 56 31 d2 b8 02 b0
> b3 c6 ff 75 ec 8b 4d f0 e8 86
> ff ff ff 56
> [348871.342423] EAX: 0056 EBX: c6b3afb8 ECX: 0001 EDX: 8001
> [348871.342472] ESI: c6b51abc EDI: c6b51abc EBP: c4255c18 ESP: c4255be4
> [348871.342520] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010286
> [348871.342573] CR0: 80050033 CR2: b776ce90 CR3: 34fe8000 CR4: 06f0
> [348871.342621] Call Trace:
> [348871.342649]  ? __die_body.cold+0x14/0x1a
> [348871.342687]  ? __die+0x21/0x26
> [348871.342717]  ? die+0x28/0x50
> [348871.342749]  ? do_trap+0xbb/0xe0
> [348871.342780]  ? do_error_trap+0x4c/0x60
> [348871.342814]  ? usercopy_abort+0x65/0x67
> [348871.342851]  ? exc_overflow+0x40/0x40
> [348871.342892]  ? exc_invalid_op+0x44/0x60
> [348871.342929]  ? usercopy_abort+0x65/0x67
> [348871.342966]  ? handle_exception+0x133/0x133
> [348871.343009]  ? exc_overflow+0x40/0x40
> [348871.343046]  ? usercopy_abort+0x65/0x67
> [348871.343082]  ? exc_overflow+0x40/0x40
> [348871.343117]  ? usercopy_abort+0x65/0x67
> [348871.343156]  __check_object_size.cold+0xae/0xae
> [348871.343199]  simple_copy_to_iter+0x1c/0x40
> [348871.343237]  __skb_datagram_iter+0x163/0x320
> [348871.343276]  skb_copy_datagram_iter+0x2d/0x80
> [348871.343316]  ? skb_free_datagram+0x20/0x20
> [348871.343353]  tcp_recvmsg_locked+0x30e/0x890
> [348871.343400]  tcp_recvmsg+0x6f/0x1e0
> [348871.343437]  ? tcp_recv_timestamp+0x240/0x240
> [348871.343476]  inet_recvmsg+0x54/0x130
> [348871.343509]  ? security_socket_recvmsg+0x41/0x60
> [348871.343553]  sock_recvmsg+0x73/0x90
> [348871.343589]  ? ipip_gso_segment+0x30/0x30
> [348871.343625]  sock_read_iter+0x84/0xe0
> [348871.343664]  vfs_read+0x288/0x2c0
> [348871.343702]  ksys_read+0xab/0xe0
> [348871.343734]  __ia32_sys_read+0x15/0x20
> [348871.343768]  __do_fast_syscall_32+0x68/0xb0
> [348871.343807]  ? fpregs_assert_state_consistent+0x25/0x50
> [348871.345275]  ? exit_to_user_mode_prepare+0x41/0x1a0
> [348871.346746]  ? syscall_exit_to_user_mode+0x29/0x40
> [348871.348214]  ? __do_fast_syscall_32+0x72/0xb0
> [348871.349630]  ? vfs_write+0x105/0x3c0
> [348871.350996]  ? debug_smp_processor_id+0x12/0x20
> [348871.352388]  ? fpregs_assert_state_consistent+0x25/0x50
> [348871.353744]  ? exit_to_user_mode_prepare+0x41/0x1a0
> [348871.355064]  ? syscall_exit_to_user_mode+0x29/0x40
> [348871.356350]  ? __ia32_sys_write+0x15/0x20
> [348871.357571]  ? __do_fast_syscall_32+0x72/0xb0
> [348871.358715]  ? fpregs_assert_state_consistent+0x25/0x50
> [348871.359832]  ? exit_to_user_mode_prepare+0x41/0x1a0
> [348871.360933]  ? irqentry_exit_to_user_mode+0x16/0x20
> [348871.362024]  do_fast_syscall_32+0x29/0x60
> [348871.363100]  do_SYSENTER_32+0x15/0x20
> [348871.364153]  entry_SYSENTER_32+0x98/0xf1
> [348871.365213] EIP: 0xb7f25559
> [348871.366273] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01
> 10 07 03 74 b0 01 10 08 03 74 d8
> 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90
> 8d 76 00 58 b8 77 00 00 00 cd
> 80 90 8d 76
> [348871.368699] EAX: ffda EBX: 0003 ECX: 01a19d4f EDX: f9f1
> [348871.369982] ESI: b721cff4 EDI:  EBP: 01a184e0 ESP: bf9f19c0
> [348871.371287] DS: 007b ES: 007b FS:  GS: 0033 SS: 007b EFLAGS: 0246
> [348871.372627] Modules linked in: tls tun xt_tcpudp xt_conntrack
> snd_hda_codec_idt snd_hda_codec_gene
> ric nf_conntrack ledtrig_audio nf_defrag_ipv6 snd_hda_intel
> nf_defrag_ipv4 i915 snd_intel_dspcfg nft_c
> ompat drm_buddy nf_tables snd_intel_sdw_acpi drm_display_helper
> snd_hda_codec iTCO_wdt cec hid_appleir
> intel_pmc_bxt rc_core iTCO_vendor_support coretemp ttm snd_hda_core
> kvm_intel snd_hwdep drm_kms_helpe
> r watchdog apple_mfi_fastcharge snd_pcm ath5k kvm i2c_algo_bit ath
> mac80211 snd_timer snd nfnetlink li
> barc4 applesmc soundcore cfg80211 irqbypass rfkill at24 tpm_infineon
> pcspkr button acpi_cpufreq sg evd
> ev binfmt_misc firewire_sbp2 dm_mod drm efi_pstore dax loop fuse
> configfs ip_tables x_tables autofs4 x
> fs libcrc32c crc32c_generic hid_generic usbhid hid sd_mod t10_pi
> crc64_rocksoft 

Re: Bug#1056056: Acknowledgement (linux-image-6.1.0-13-amd64: After a 'warm' reboot the disk is missing (not detected by the bios) on a HP t640)

2023-11-21 Thread Ben Mesman | Spark Narrowcasting
I tried the following:

  *
latest kernel from debian-testing (6.5.10+1)
  *   adding "reboot=(efi|cold|bios)" to the kernel command line

Can I try anything else? Are there any relevant module-parameters to try?



Processed: closing 1055676

2023-11-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> close 1055676
Bug #1055676 [nfs-common] exports(5) man page does not document refer=
Marked Bug as done
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1055676: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055676
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: severity of 1055676 is wishlist, tagging 1055676

2023-11-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> severity 1055676 wishlist
Bug #1055676 [nfs-common] exports(5) man page does not document refer=
Severity set to 'wishlist' from 'important'
> tags 1055676 + upstream
Bug #1055676 [nfs-common] exports(5) man page does not document refer=
Added tag(s) upstream.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1055676: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055676
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: closing 1036644

2023-11-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> # according to reporter fixed after updating to 6.4.y kernel
> close 1036644 6.4.13-1
Bug #1036644 [src:linux] Kernel panic - not syncing: Timeout: Not all CPUs 
entered broadcast exception handler
Marked as fixed in versions linux/6.4.13-1.
Bug #1036644 [src:linux] Kernel panic - not syncing: Timeout: Not all CPUs 
entered broadcast exception handler
Marked Bug as done
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1036644: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036644
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: closing 1033637

2023-11-21 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> close 1033637 6.5.3-1
Bug #1033637 [src:linux] linux-image-amd64: amdgpu - External displays 
connected through Thinkpad Ultra Dock not turn on after suspend
Marked as fixed in versions linux/6.5.3-1.
Bug #1033637 [src:linux] linux-image-amd64: amdgpu - External displays 
connected through Thinkpad Ultra Dock not turn on after suspend
Marked Bug as done
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1033637: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033637
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems