Bug#1042753: nouveau: Screen remains black.

2023-08-01 Thread Diederik de Haas
On Wednesday, 2 August 2023 00:23:16 CEST Olaf Skibbe wrote: > Finally I managed to compile the kernel via > > debian/bin/test-patches > ../0001-Revert-drm-nouveau-add-nv_encoder-pointer-check-for-.patch > ../0002-Revert-drm-nouveau-dp-check-for-NULL-nv_connector-na.patch > ../0003-Revert-drm-nouv

Bug#1042753: nouveau: Screen remains black.

2023-08-01 Thread Olaf Skibbe
Finally I managed to compile the kernel via debian/bin/test-patches ../0001-Revert-drm-nouveau-add-nv_encoder-pointer-check-for-.patch ../0002-Revert-drm-nouveau-dp-check-for-NULL-nv_connector-na.patch ../0003-Revert-drm-nouveau-don-t-detect-DSM-for-non-NVIDIA-d.patch ../0004-Revert-nouveau-f

Bug#1041142: closed by Diederik de Haas (Re: Debian's BTS is not for regular user questions)

2023-08-01 Thread AlMa
On 01.08.23 21:08, AlMa wrote: This is a rather naive understanding of how logging is done in practice.  The reality is that developers often don't know (and maybe can't know) just how severe an odd condition may be in practice. Unfortunately, neither do I.  Though seemingly unrelated journa

Bug#1041142: closed by Diederik de Haas (Re: Debian's BTS is not for regular user questions)

2023-08-01 Thread AlMa
This is a rather naive understanding of how logging is done in practice. The reality is that developers often don't know (and maybe can't know) just how severe an odd condition may be in practice. Unfortunately, neither do I. Though seemingly unrelated journal-visible issues are quite often i

linux-signed-i386_6.4.4+2_source.changes ACCEPTED into unstable

2023-08-01 Thread Debian FTP Masters
Thank you for your contribution to Debian. Mapping sid to unstable. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 30 Jul 2023 06:50:27 +0200 Source: linux-signed-i386 Architecture: source Version: 6.4.4+2 Distribution: sid Urgency: high Maintainer: Debian Kern

Processing of linux-signed-i386_6.4.4+2_source.changes

2023-08-01 Thread Debian FTP Masters
linux-signed-i386_6.4.4+2_source.changes uploaded successfully to localhost along with the files: linux-signed-i386_6.4.4+2.dsc linux-signed-i386_6.4.4+2.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)

Bug#1041142: closed by Diederik de Haas (Re: Debian's BTS is not for regular user questions)

2023-08-01 Thread Ben Hutchings
On Tue, 2023-08-01 at 02:49 +0200, AlMa wrote: > On 01.08.23 01:12, Debian Bug Tracking System wrote: > > You filed *8* different 'bugs' which (almost?) all are about a Dell Mobile > > Precision M6700 ... and not once did you say what actual problem you > > experienced?!? > > That's wrong. > Befor

Re: New upstream stable update for next point release for bullseye?

2023-08-01 Thread Ben Hutchings
On Tue, 2023-08-01 at 12:16 +0200, Andrew Lee wrote: > Dear Debian kernel team, > > Thank you for your contribution to Debian. > > I recently saw the Zenbleed issue fixed in `bullseye-security` version > `5.10.179+3` update, which is also included in upstream stable version > `5.10.187`. I saw th

Bug#1041141: kernel: pmd_set_huge: Cannot satisfy [mem 0x…-0x…] with a huge-page mapping due to MTRR override.

2023-08-01 Thread AlMa
On 01.08.23 10:50, Diederik de Haas wrote: On Tuesday, 1 August 2023 02:53:19 CEST AlMa wrote: and my own educated guess: Disable the ASPEED device and see what happens Any hint on how to do it on the linux command line in grub? Please read http://www.catb.org/esr/faqs/smart-questions.html

linux-signed-arm64_6.4.4+2_source.changes ACCEPTED into unstable

2023-08-01 Thread Debian FTP Masters
Thank you for your contribution to Debian. Mapping sid to unstable. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 30 Jul 2023 06:50:27 +0200 Source: linux-signed-arm64 Architecture: source Version: 6.4.4+2 Distribution: sid Urgency: high Maintainer: Debian Ker

Bug#1038981: capping maximum frequency no longer works in kernel 6.1

2023-08-01 Thread AlMa
So it wasn't based on some inside/expert knowledge of the problem domain, I just put what you said in a search engine. I just tried searching for "powersave governor" and the arch wiki page was even higher in the result list ... You seem to have domain knowledge without even realizing this. The

Processing of linux-signed-arm64_6.4.4+2_source.changes

2023-08-01 Thread Debian FTP Masters
linux-signed-arm64_6.4.4+2_source.changes uploaded successfully to localhost along with the files: linux-signed-arm64_6.4.4+2.dsc linux-signed-arm64_6.4.4+2.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)

Bug#1035840: marked as done (nfs-utils: nfs-idmapd startup race condition due to missing systemd dependency)

2023-08-01 Thread Debian Bug Tracking System
Your message dated Tue, 01 Aug 2023 13:19:48 + with message-id and subject line Bug#1035840: fixed in nfs-utils 1:2.6.3-3 has caused the Debian Bug report #1035840, regarding nfs-utils: nfs-idmapd startup race condition due to missing systemd dependency to be marked as done. This means that

nfs-utils_2.6.3-3_sourceonly.changes ACCEPTED into unstable

2023-08-01 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 01 Aug 2023 15:10:41 +0200 Source: nfs-utils Architecture: source Version: 1:2.6.3-3 Distribution: unstable Urgency: medium Maintainer: Debian kernel team Changed-By: Sa

Processing of nfs-utils_2.6.3-3_sourceonly.changes

2023-08-01 Thread Debian FTP Masters
nfs-utils_2.6.3-3_sourceonly.changes uploaded successfully to localhost along with the files: nfs-utils_2.6.3-3.dsc nfs-utils_2.6.3-3.debian.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)

Processed: limit source to nfs-utils, tagging 1035840

2023-08-01 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > limit source nfs-utils Limiting to bugs with field 'source' containing at least one of 'nfs-utils' Limit currently set to 'source':'nfs-utils' > tags 1035840 + pending Bug #1035840 [nfs-common] nfs-utils: nfs-idmapd startup race condition due to

Processed: tagging 1035840

2023-08-01 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1035840 + fixed-upstream Bug #1035840 [nfs-common] nfs-utils: nfs-idmapd startup race condition due to missing systemd dependency Added tag(s) fixed-upstream. > thanks Stopping processing here. Please contact me if you need assistance. --

Processed: tagging 1042815

2023-08-01 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 1042815 - moreinfo Bug #1042815 [src:linux] linux-image-6.1.0-10-amd64: Fails to load kernel modules due to bpf/btf issue Removed tag(s) moreinfo. > thanks Stopping processing here. Please contact me if you need assistance. -- 1042815: htt

Bug#1042815: linux-image-6.1.0-10-amd64: Fails to load kernel modules due to bpf/btf issue

2023-08-01 Thread AP
On Tue, Aug 01, 2023 at 01:44:26PM +0200, Salvatore Bonaccorso wrote: > > [37404.063872] BPF: [99720] ENUM STROY > > [37404.064350] BPF: size=4 vlen=14 > > [37404.064699] BPF: > > [37404.065000] BPF: Invalid name > > [37404.065287] BPF: > > [37404.065463] failed to validate module [nf_conntrack

linux-signed-amd64_6.4.4+2_source.changes ACCEPTED into unstable

2023-08-01 Thread Debian FTP Masters
Thank you for your contribution to Debian. Mapping sid to unstable. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 30 Jul 2023 06:50:27 +0200 Source: linux-signed-amd64 Architecture: source Version: 6.4.4+2 Distribution: sid Urgency: high Maintainer: Debian Ker

Bug#1042815: linux-image-6.1.0-10-amd64: Fails to load kernel modules due to bpf/btf issue

2023-08-01 Thread Salvatore Bonaccorso
Control: tags -1 + moreinfo Hi, On Tue, Aug 01, 2023 at 07:22:17PM +1000, AP wrote: > Package: linux-image-6.1.0-10-amd64 > Severity: important > Tags: patch > > Dear Maintainer, > > Current kernel failed to load modules for MASQUERADE nat rules giving the > following > in dmesg: > > [37404.0

Processed: Re: Bug#1042815: linux-image-6.1.0-10-amd64: Fails to load kernel modules due to bpf/btf issue

2023-08-01 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + moreinfo Bug #1042815 [src:linux] linux-image-6.1.0-10-amd64: Fails to load kernel modules due to bpf/btf issue Added tag(s) moreinfo. -- 1042815: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042815 Debian Bug Tracking System Contact ow...@bugs.deb

Processing of linux-signed-amd64_6.4.4+2_source.changes

2023-08-01 Thread Debian FTP Masters
linux-signed-amd64_6.4.4+2_source.changes uploaded successfully to localhost along with the files: linux-signed-amd64_6.4.4+2.dsc linux-signed-amd64_6.4.4+2.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)

Processed: Re: Bug#1042815: linux-image-6.1.0-10-amd64: Fails to load kernel modules due to bpf/btf issue

2023-08-01 Thread Debian Bug Tracking System
Processing control commands: > reassign -1 src:linux 6.1.37-1 Bug #1042815 [linux-image-6.1.0-10-amd64] linux-image-6.1.0-10-amd64: Fails to load kernel modules due to bpf/btf issue Bug reassigned from package 'linux-image-6.1.0-10-amd64' to 'src:linux'. Ignoring request to alter found versions o

Bug#1042815: linux-image-6.1.0-10-amd64: Fails to load kernel modules due to bpf/btf issue

2023-08-01 Thread Diederik de Haas
Control: reassign -1 src:linux 6.1.37-1 Control: tag -1 upstream fixed-upstream On Tuesday, 1 August 2023 11:22:17 CEST AP wrote: > Package: linux-image-6.1.0-10-amd64 > Severity: important > Tags: patch > > Current kernel failed to load modules for MASQUERADE nat rules giving the > following in

Bug#1042818: firmware-amd-graphics: Random display freezes on certain AMD GPUs due to "Error waiting for DMUB idle: status=3"

2023-08-01 Thread Gregor Riepl
Package: firmware-amd-graphics Version: 20230515-3 Severity: important Tags: upstream Forwarded: https://gitlab.freedesktop.org/drm/amd/-/issues/1887 X-Debbugs-Cc: onit...@gmail.com Dear Maintainer, The current AMDGPU firmware in Debian has compatibility issues with 6.3+ kernels. These errors man

New upstream stable update for next point release for bullseye?

2023-08-01 Thread Andrew Lee
Dear Debian kernel team, Thank you for your contribution to Debian. I recently saw the Zenbleed issue fixed in `bullseye-security` version `5.10.179+3` update, which is also included in upstream stable version `5.10.187`. I saw that we have done several updates from the new upstream stable versio

Bug#1042815: linux-image-6.1.0-10-amd64: Fails to load kernel modules due to bpf/btf issue

2023-08-01 Thread AP
Package: linux-image-6.1.0-10-amd64 Severity: important Tags: patch Dear Maintainer, Current kernel failed to load modules for MASQUERADE nat rules giving the following in dmesg: [37404.063872] BPF: [99720] ENUM STROY [37404.064350] BPF: size=4 vlen=14 [37404.064699] BPF: [37404.065000] BPF:

Bug#1041141: kernel: pmd_set_huge: Cannot satisfy [mem 0x…-0x…] with a huge-page mapping due to MTRR override.

2023-08-01 Thread Diederik de Haas
On Tuesday, 1 August 2023 02:53:19 CEST AlMa wrote: > > and my own educated guess: Disable the ASPEED device and see what happens > Any hint on how to do it on the linux command line in grub? Please read http://www.catb.org/esr/faqs/smart-questions.html The "Before You Ask" section lists (among o

Bug#1038981: capping maximum frequency no longer works in kernel 6.1

2023-08-01 Thread Diederik de Haas
On Tuesday, 1 August 2023 01:39:50 CEST AlMa wrote: > > I don't want to be an ass, but why didn't you do such elementary research > > before filing a bug report? > > the fact that you searched for exactly "powersave frequency governor" From your initial message: "The governor is powersave everywh