[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1068365: marked as done (util-linux: FTBFS on mips64el in lsfd/mkfds-multiplexing-pselect6 test et al)



Your message dated Mon, 03 Jun 2024 19:02:41 +0000
with message-id <E1sECx7-009LGQ-0C@fasolo.debian.org>
and subject line Bug#1068365: fixed in linux 5.10.218-1
has caused the Debian Bug report #1068365,
regarding util-linux: FTBFS on mips64el in lsfd/mkfds-multiplexing-pselect6 test et al
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1068365: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068365
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: util-linux
Version: 2.40-1
Severity: important
Tags: upstream
X-Debbugs-Cc: debian-mips@lists.debian.org
Control: forwarded -1 https://github.com/util-linux/util-linux/issues/2867

Apparently on mips64el we have a kernel issue that make
mkfds-multiplexing-{pselect6,poll,ppoll} fail.
Upstream discussion here: https://github.com/util-linux/util-linux/issues/2867

FlyGoat commented last week:
> Thanks for reporting, will ask for stable backport after getting this merged.

MIPS porters, please also check the upstream discussion and if possible
see if we can get this into the Debian kernels.

Thanks,
Chris

--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 5.10.218-1
Done: Salvatore Bonaccorso <carnil@debian.org>

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1068365@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 01 Jun 2024 11:24:36 +0200
Source: linux
Architecture: source
Version: 5.10.218-1
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 1068365
Changes:
 linux (5.10.218-1) bullseye-security; urgency=high
 .
   * New upstream stable update:
     https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.217
     - [arm64,armhf] dmaengine: pl330: issue_pending waits until WFP state
     - dmaengine: Revert "dmaengine: pl330: issue_pending waits until WFP state"
     - wifi: nl80211: don't free NULL coalescing rule
     - eeprom: at24: Use dev_err_probe for nvmem register failure
     - eeprom: at24: Probe for DDR3 thermal sensor in the SPD case
     - eeprom: at24: fix memory corruption race condition (CVE-2024-35848)
     - [armhf] pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of
       GPIOR-T
     - [arm64] pinctrl/meson: fix typo in PDM's pin name
     - pinctrl: core: delete incorrect free in pinctrl_enable()
     - sunrpc: add a struct rpc_stats arg to rpc_create_args
     - nfs: expose /proc/net/sunrpc/nfs in net namespaces
     - nfs: make the rpc_stat per net namespace
     - nfs: Handle error of rpc_proc_register() in nfs_net_init().
     - pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()
     - [s390x] mm: Fix storage key clearing for guest huge pages
     - [s390x] mm: Fix clearing storage keys for huge pages
     - bna: ensure the copied buf is NUL terminated
     - nsh: Restore skb->{protocol,data,mac_header} for outer header in
       nsh_gso_segment().
     - net l2tp: drop flow hash on forward
     - [s390x] vdso: Add CFI for RA register to asm macro vdso_func
     - net: qede: sanitize 'rc' in qede_add_tc_flower_fltr()
     - net: qede: use return from qede_parse_flow_attr() for flower
     - net: qede: use return from qede_parse_flow_attr() for flow_spec
     - net: qede: use return from qede_parse_actions()
     - cxgb4: Properly lock TX queue for the selftest.
     - [arm64,armhf] net: dsa: mv88e6xxx: Fix number of databases for 88E6141 /
       88E6341
     - net: bridge: fix multicast-to-unicast with fraglist GSO
     - net: core: reject skb_copy(_expand) for fraglist GSO skbs
     - net: gro: add flush check in udp_gro_receive_segment
     - [arm64] clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change
     - [arm64] KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id
     - [arm64] KVM: arm64: vgic-v2: Check for non-NULL vCPU in
       vgic_v2_parse_attr()
     - scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic
     - gfs2: Fix invalid metadata access in punch_hole
     - wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc
     - wifi: cfg80211: fix rdev_dump_mpp() arguments order
     - net: mark racy access on sk->sk_rcvbuf
     - scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload
     - btrfs: return accurate error code on open failure in open_fs_devices()
     - ALSA: line6: Zero-initialize message buffers
     - net: bcmgenet: Reset RBUF on first open
     - ata: sata_gemini: Check clk_enable() result
     - firewire: ohci: mask bus reset interrupts between ISR and bottom half
     - btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve
     - btrfs: always clear PERTRANS metadata during commit
     - scsi: target: Fix SELinux error when systemd-modules loads the target
       module
     - blk-iocost: avoid out of bounds shift
     - [arm64,armhf] gpu: host1x: Do not setup DMA for virtual devices
     - [mips64el,mipsel]: scall: Save thread_info.syscall unconditionally on
       entry (Closes: #1068365)
     - fs/9p: only translate RWX permissions for plain 9P2000
     - fs/9p: translate O_TRUNC into OTRUNC
     - 9p: explicitly deny setlease attempts
     - gpio: wcove: Use -ENOTSUPP consistently
     - gpio: crystalcove: Use -ENOTSUPP consistently
     - clk: Don't hold prepare_lock when calling kref_put()
     - fs/9p: drop inodes immediately on non-.L too
     - drm/nouveau/dp: Don't probe eDP ports twice harder
     - net:usb:qmi_wwan: support Rolling modules
     - xfrm: Preserve vlan tags for transport mode software GRO
     - tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
     - tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().
     - Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout
       (CVE-2024-27398)
     - Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout
       (CVE-2024-27399)
     - rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation
     - [x86] hwmon: (corsair-cpro) Use a separate buffer for sending commands
     - [x86] hwmon: (corsair-cpro) Use complete_all() instead of complete() in
       ccp_raw_event()
     - [x86] hwmon: (corsair-cpro) Protect ccp->wait_input_report with a spinlock
     - phonet: fix rtm_phonet_notify() skb allocation
     - kcov: Remove kcov include from sched.h and move it to its users.
     - net: bridge: fix corrupted ethernet header on multicast-to-unicast
     - ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
     - [arm64] net: hns3: use appropriate barrier function after setting a bit
       value
     - btrfs: fix kvcalloc() arguments order in btrfs_ioctl_send()
     - firewire: nosy: ensure user_length is taken into account when fetching
       packet contents (CVE-2024-27401)
     - [arm64] dts: qcom: Fix 'interrupt-map' parent address cells
     - usb: typec: ucsi: Check for notifications after init
     - usb: typec: ucsi: Fix connector check on init
     - usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed
       device
     - usb: ohci: Prevent missed ohci interrupts
     - usb: gadget: composite: fix OS descriptors w_value logic
     - usb: gadget: f_fs: Fix a race condition when processing setup packets.
     - usb: xhci-plat: Don't include xhci.h
     - usb: dwc3: core: Prevent phy suspend during init
     - ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU
     - iio:imu: adis16475: Fix sync mode setting
     - iio: accel: mxc4005: Interrupt handling fixes
     - net: bcmgenet: synchronize use of bcmgenet_set_rx_mode()
     - dyndbg: fix old BUG_ON in >control parser
     - mei: me: add lunar lake point M DID
     - drm/vmwgfx: Fix invalid reads in fence signaled events
     - net: fix out-of-bounds access in ops_init
     - regulator: core: fix debugfs creation regression
     - keys: Fix overwrite of key expiration on instantiation
     - md: fix kmemleak of rdev->serial (CVE-2024-26900)
     https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.218
     - pinctrl: core: handle radix_tree_insert() errors in
       pinctrl_register_one_pin()
     - [x86] xen: Drop USERGS_SYSRET64 paravirt call
     - [arm64] net: bcmgenet: synchronize EXT_RGMII_OOB_CTRL access
     - [arm64] net: bcmgenet: synchronize UMAC_CMD access
     - ima: fix deadlock when traversing "ima_default_rules".
     - netlink: annotate lockless accesses to nlk->max_recvmsg_len
     - [x86] KVM: x86: Clear "has_error_code", not "error_code", for RM exception
       injection
     - firmware: arm_scmi: Harden accesses to the reset domains (CVE-2022-48655)
     - mptcp: ensure snd_nxt is properly initialized on connect
     - btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks()
     - drm/amdgpu: Fix possible NULL dereference in
       amdgpu_ras_query_error_status_helper() (CVE-2023-52585)
     - usb: typec: ucsi: displayport: Fix potential deadlock
     - serial: kgdboc: Fix NMI-safety problems from keyboard reset code
     - docs: kernel_include.py: Cope with docutils 0.21
 .
   [ Salvatore Bonaccorso ]
   * Bump ABI to 30
Checksums-Sha1:
 3d646b6226bb63236f4e14f16b01333d044a978d 205890 linux_5.10.218-1.dsc
 dc5f727fed17982e90cedcfe160c5ab3fe019206 121946232 linux_5.10.218.orig.tar.xz
 bd86a886948f858e69b17116b7bc6894dfbd4de6 1669672 linux_5.10.218-1.debian.tar.xz
 16249d386518106424c894b27e4977978dad1e56 6815 linux_5.10.218-1_source.buildinfo
Checksums-Sha256:
 fc0020c86209e345b13767cbb95be68760f821c4bac474b354ddbb52157e8a4b 205890 linux_5.10.218-1.dsc
 f04ed0fa9bbfb5602b1c2227b993ae104bcdabb6803b69178129ad77b5191f3f 121946232 linux_5.10.218.orig.tar.xz
 37e7dc1bd2c06052e23f7621e53d3f565f722b4f209bf01af71eacdc609cfbb5 1669672 linux_5.10.218-1.debian.tar.xz
 f0848ca0c822a0a43b740d03c79dbde7137bfa4d8dfd90620f3359fc5a83e220 6815 linux_5.10.218-1_source.buildinfo
Files:
 0dfd34533c9a9938d32e7db006dda8bc 205890 kernel optional linux_5.10.218-1.dsc
 2348f072dfeba490bc837f3fb16756f4 121946232 kernel optional linux_5.10.218.orig.tar.xz
 b316821467a1d1dd06b13b4e31ed384c 1669672 kernel optional linux_5.10.218-1.debian.tar.xz
 7a73b934e1a325b1ba7ab8d885f97d1d 6815 kernel optional linux_5.10.218-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=0dpp
-----END PGP SIGNATURE-----

Attachment: pgpmVnxvCXxto.pgp
Description: PGP signature


--- End Message ---

Reply to: