Bug#1014793: linux-image-5.10.0-16-amd64: Kernel crashes while serving NFS

2022-07-11 Thread Arne Nordmark
Package: src:linux Version: 5.10.127-1 Severity: normal Dear Maintainer, The new kernel in Debian 11.4 seems unstable and crashes when serving NFS. On two different computers, these lockups happens within minutes, typically when a client runs firefox on an NFS-mounted home directory. Typica

linux-signed-i386_5.10.120+1~bpo10+1_source.changes ACCEPTED into buster-backports->backports-policy, buster-backports

2022-07-11 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 13 Jun 2022 22:46:49 +0200 Source: linux-signed-i386 Architecture: source Version: 5.10.120+1~bpo10+1 Distribution: buster-backports Urgency: high Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Changes

linux-signed-i386_4.19.249+2_source.changes ACCEPTED into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates

2022-07-11 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 30 Jun 2022 14:52:02 +0200 Source: linux-signed-i386 Architecture: source Version: 4.19.249+2 Distribution: buster-security Urgency: medium Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Changes: linu

linux-signed-arm64_4.19.249+2_source.changes ACCEPTED into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates

2022-07-11 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 30 Jun 2022 14:52:02 +0200 Source: linux-signed-arm64 Architecture: source Version: 4.19.249+2 Distribution: buster-security Urgency: medium Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Changes: lin

linux-signed-amd64_4.19.249+2_source.changes ACCEPTED into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates

2022-07-11 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 30 Jun 2022 14:52:02 +0200 Source: linux-signed-amd64 Architecture: source Version: 4.19.249+2 Distribution: buster-security Urgency: medium Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Changes: lin

linux-latest_105+deb10u16_source.changes ACCEPTED into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates

2022-07-11 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 30 Jun 2022 20:28:04 +0200 Source: linux-latest Architecture: source Version: 105+deb10u16 Distribution: buster-security Urgency: medium Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Changes: linux-l

linux_4.19.249-1_source.changes ACCEPTED into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates

2022-07-11 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Wed, 29 Jun 2022 21:24:38 +0200 Source: linux Architecture: source Version: 4.19.249-1 Distribution: buster-security Urgency: high Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Closes: 922204 1006346 10132

linux_4.19.249-2_source.changes ACCEPTED into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates

2022-07-11 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 30 Jun 2022 14:52:02 +0200 Source: linux Architecture: source Version: 4.19.249-2 Distribution: buster-security Urgency: medium Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Changes: linux (4.19.249-

Bug#1013299: marked as done (linux-image-4.19.0-20-amd64: NULL pointer deref in qdisc_put() due to missing backport)

2022-07-11 Thread Debian Bug Tracking System
Your message dated Mon, 11 Jul 2022 20:48:08 + with message-id and subject line Bug#1013299: fixed in linux 4.19.249-1 has caused the Debian Bug report #1013299, regarding linux-image-4.19.0-20-amd64: NULL pointer deref in qdisc_put() due to missing backport to be marked as done. This means

Bug#990662: nouveau 0000:01:00.0: firmware: failed to load nouveau/nvd9_fuc084 (-2)

2022-07-11 Thread Andreas Beckmann
On 11/07/2022 18.35, Mathieu Malaterre wrote: Since the nvidia* package do the heavy lifting of downloading locally binary, it would make sense to add yet-another package for firmware related within the group. Putting a downloader package in contrib under the Nvidia Team umbrella is fine, but

Bug#990662: nouveau 0000:01:00.0: firmware: failed to load nouveau/nvd9_fuc084 (-2)

2022-07-11 Thread Mathieu Malaterre
Dear Debian NVIDIA Maintainers, Is there any interest in maintaining a nvidia-firmware package within Debian NVIDIA group maintenance ? It seems some of the nvidia firmware blob cannot be maintained within firmware-misc-nonfree: * https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990662#12 Since

Bug#990662: Steps

2022-07-11 Thread Mathieu Malaterre
Local steps for me were: % wget https://raw.githubusercontent.com/envytools/firmware/master/extract_firmware.py % wget https://download.nvidia.com/XFree86/Linux-x86_64/340.108/NVIDIA-Linux-x86_64-340.108.run % sh NVIDIA-Linux-x86_64-340.108.run --extract-only % python3 extract_firmware.py % sudo

Bug#1013096: marked as done (linux-image-5.10.0-15-amd64: racoon reports AES missing)

2022-07-11 Thread Debian Bug Tracking System
Your message dated Mon, 11 Jul 2022 17:04:00 +0200 with message-id <5839313.lOV4Wx5bFT@bagend> and subject line Re: Bug#1013096: Acknowledgement (linux-image-5.10.0-15-amd64: racoon reports AES missing) has caused the Debian Bug report #1013096, regarding linux-image-5.10.0-15-amd64: racoon report

Bug#1014754: linux-image-5.10.0-13-amd64: ptrace does not substitute SIGSTOP correctly

2022-07-11 Thread Pavel Labath
Package: src:linux Version: 5.10.106-1 Severity: normal X-Debbugs-Cc: pa...@labath.sk, mgorny@moritz.systems Dear Maintainer, Using PTRACE_CONT with a signal number should immediately deliver that signal to the application. This is what happens whenever the applications is stopped due to some sig

Bug#1013096: Acknowledgement (linux-image-5.10.0-15-amd64: racoon reports AES missing)

2022-07-11 Thread Buck Huppmann
This can be closed (please). As expected, as of upgrading to linux-image-5.10.0-16-amd64 (= 5.10.127-1) racoon/setkey are fine again (supposing, because of > linux-signed-amd64 (5.10.127+1) bullseye; urgency=medium >- Revert "net: af_key: add check for pfkey_broadcast in function >

Bug#1014743: Please can CONFIG_CORESIGHT_TRBE be enabled in the arm64 kernel?

2022-07-11 Thread Steve Capper
Package: src:linux Version: 5.18.8-1 Hello, An Armv9 architectural feature, Trace Buffer Extension (FEAT_TRBE), is making its way into upcoming CPU cores. TRBE can be found described in [1] and [2]. Support for this is already in the kernel (with some erratum fixes landing in 5.18), I was go