Re: firmware-iwlwifi question

2022-08-30 Thread l0f4r0
Hi, 29 août 2022, 10:30 de rushil...@gmail.com: > Does the firmware iwflwifi contains only 8265-22.ucode and 8265-36.ucode or > 8265-22 to 8265.36 i.e , all the different firmwares like 23, 24 , 25 etc > Under Bullseye: $ apt-file list firmware-iwlwifi [...]firmware-iwlwifi:

Processed: reassign 1018779 to src:linux

2022-08-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 1018779 src:linux 5.10.136-1 Bug #1018779 [linux-image-amd64] nouveau DRM: Failure to read SCDC_TMDS_CONFIG: -6 error message Bug reassigned from package 'linux-image-amd64' to 'src:linux'. No longer marked as found in versions

Processed: forcibly merging 1017425 1018776

2022-08-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > forcemerge 1017425 1018776 Bug #1017425 [src:linux] [i386] Unconditional LFENCE instructions in FILL_RETURN_BUFFER Bug #1017494 [src:linux] [i386] Unconditional LFENCE instructions in FILL_RETURN_BUFFER Bug #1018060 [src:linux]

Bug#1018779: nouveau DRM: Failure to read SCDC_TMDS_CONFIG: -6 error message

2022-08-30 Thread Franco Martelli
Package: linux-image-amd64 Version: 5.10.136-1 I recently bought a new monitor the cheap HP M24f 2D9K0AA and connected via HDMI port to the NVIDIA GeForce GT 630 card. When I switch twice virtual terminal (CTRL-ALT-F2 - CTRL-ALT-F7) it happens that the kernel pollutes the VT screen with this

Bug#1018776: linux-image-5.18.0-4-686-pae Kernel panic on Pentium 3 and Athlon XP

2022-08-30 Thread Marco Moock
Package: src:linux Version: 5.18.16-1 Severity: important X-Debbugs-Cc: m...@posteo.de Dear Maintainer, * What led up to the situation? Booting Kernel linux-image-5.18.0-4-686-pae on a Pentium 3 600 (Coppermine) or an Athlon XP (I can find out the exact model number if you need).

Processed: limit source to linux, tagging 1018752

2022-08-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > limit source linux Limiting to bugs with field 'source' containing at least one of 'linux' Limit currently set to 'source':'linux' > tags 1018752 + pending Bug #1018752 [src:linux] src:linux: new certificate used for Secure Boot Added tag(s)

Processed: limit source to linux, tagging 1017894, tagging 1016807, tagging 1017425, tagging 1017972

2022-08-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > limit source linux Limiting to bugs with field 'source' containing at least one of 'linux' Limit currently set to 'source':'linux' > tags 1017894 + pending Bug #1017894 [src:linux] linux-image-5.18.0-4-arm64: Kernel oops triggered by heavy

Bug#1017425: [PATCH] x86/speculation: Avoid LFENCE in FILL_RETURN_BUFFER on CPUs that lack it

2022-08-30 Thread Salvatore Bonaccorso
Hi Martin, On Tue, Aug 30, 2022 at 03:18:51PM +0300, Martin-??ric Racine wrote: > On Tue, Aug 30, 2022 at 3:00 PM Peter Zijlstra wrote: > > On Tue, Aug 30, 2022 at 02:42:04PM +0300, Martin-??ric Racine wrote: > > > On Fri, Aug 19, 2022 at 3:15 PM Peter Zijlstra > > > wrote: > > > > > > > > On

Bug#1017425: [PATCH] x86/speculation: Avoid LFENCE in FILL_RETURN_BUFFER on CPUs that lack it

2022-08-30 Thread Martin-Éric Racine
On Tue, Aug 30, 2022 at 3:00 PM Peter Zijlstra wrote: > On Tue, Aug 30, 2022 at 02:42:04PM +0300, Martin-Éric Racine wrote: > > On Fri, Aug 19, 2022 at 3:15 PM Peter Zijlstra wrote: > > > > > > On Fri, Aug 19, 2022 at 01:38:27PM +0200, Ben Hutchings wrote: > > > > > > > So that puts the whole

Bug#1017425: [PATCH] x86/speculation: Avoid LFENCE in FILL_RETURN_BUFFER on CPUs that lack it

2022-08-30 Thread Peter Zijlstra
On Tue, Aug 30, 2022 at 02:42:04PM +0300, Martin-Éric Racine wrote: > Greetings, > > On Fri, Aug 19, 2022 at 3:15 PM Peter Zijlstra wrote: > > > > On Fri, Aug 19, 2022 at 01:38:27PM +0200, Ben Hutchings wrote: > > > > > So that puts the whole __FILL_RETURN_BUFFER inside an alternative, and > > >

Bug#1017425: [PATCH] x86/speculation: Avoid LFENCE in FILL_RETURN_BUFFER on CPUs that lack it

2022-08-30 Thread Martin-Éric Racine
Greetings, On Fri, Aug 19, 2022 at 3:15 PM Peter Zijlstra wrote: > > On Fri, Aug 19, 2022 at 01:38:27PM +0200, Ben Hutchings wrote: > > > So that puts the whole __FILL_RETURN_BUFFER inside an alternative, and > > we can't have nested alternatives. That's unfortunate. > > Well, both alternatives

Bug#1018760: i915: "Failed to get the SoC PWM chip", unable to adjust backlight on x7-Z8750 / GPD Pocket 1

2022-08-30 Thread Ivan Krylov
Package: src:linux Version: 5.10.136-1 Severity: normal X-Debbugs-Cc: krylov.r...@gmail.com Dear Maintainer, On my GPD Pocket 1, the backlight worked well with the 4.19 kernel from stretch-backports. After the upgrade to Bullseye, I cannot adjust the backlight intensity either using the keyboard

linux-signed-5.10-i386_5.10.136+1~deb10u2_source.changes REJECTED

2022-08-30 Thread Debian FTP Masters
ACL automatic-source-uploads: not allowed to upload source package 'linux-signed-5.10-i386' Mapping oldstable-security to oldstable-proposed-updates. binary:linux-headers-5.10-686 is NEW. binary:linux-headers-5.10-686-pae is NEW. binary:linux-headers-5.10-rt-686-pae is NEW.

linux-signed-5.10-arm64_5.10.136+1~deb10u2_source.changes REJECTED

2022-08-30 Thread Debian FTP Masters
ACL automatic-source-uploads: not allowed to upload source package 'linux-signed-5.10-arm64' Mapping oldstable-security to oldstable-proposed-updates. binary:linux-headers-5.10-arm64 is NEW. binary:linux-headers-5.10-cloud-arm64 is NEW. binary:linux-headers-5.10-rt-arm64 is NEW.

linux-signed-5.10-amd64_5.10.136+1~deb10u2_source.changes REJECTED

2022-08-30 Thread Debian FTP Masters
ACL automatic-source-uploads: not allowed to upload source package 'linux-signed-5.10-amd64' Mapping oldstable-security to oldstable-proposed-updates. binary:linux-headers-5.10-amd64 is NEW. binary:linux-headers-5.10-cloud-amd64 is NEW. binary:linux-headers-5.10-rt-amd64 is NEW.

Bug#989705: Suspend to RAM hangs computer with nouveau driver and kernel 5.10.0-7-amd64 / 5.10.0-8-amd64

2022-08-30 Thread rudu
On Mon, 15 Aug 2022 19:02:25 +0200 Computer Enthusiastic wrote: > Hello, > > To whom it may interests, I've successful tested the patch (see > previous message [0]) with Debian > kernels version 5.10.0-16-amd64 [1] from bullseye-security and, > 5.18.0-0 [2] from bullseye-backports > > [0]

Bug#1018752: src:linux: new certificate used for Secure Boot

2022-08-30 Thread Ansgar
Source: linux Version: 5.18.16-1 Control: found -1 5.10.127-1 Hi, there is a new certificate used to sign the kernel modules for Secure Boot. Its fingerprint (sha256) should be: # CN = Debian Secure Boot Signer 2022 - linux - 65378fdbd50b85960563bac3923b4cf6e43f60b7c969c1527ce2ca34f82f2dc5

Processed: src:linux: new certificate used for Secure Boot

2022-08-30 Thread Debian Bug Tracking System
Processing control commands: > found -1 5.10.127-1 Bug #1018752 [src:linux] src:linux: new certificate used for Secure Boot Marked as found in versions linux/5.10.127-1. -- 1018752: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018752 Debian Bug Tracking System Contact