Your message dated Tue, 18 Feb 2025 12:30:35 +0000 with message-id <E1tkMkF-004lwa-O5@fasolo.debian.org> and subject line Bug#1091517: fixed in linux 6.13.3-1~exp1 has caused the Debian Bug report #1091517, regarding linux: xhci regression breaks fastboot usb communication with android bootloader to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1091517: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091517 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: linux: xhci regression breaks fastboot usb communication with android bootloader
- From: Forest <forestix@nom.one>
- Date: Fri, 27 Dec 2024 12:44:01 -0800
- Message-id: <173533224110.16347.9914372549240309814.reportbug@ink>
Source: linux Version: 6.12.6-1 Severity: normal X-Debbugs-Cc: forestix@nom.one Dear Maintainer, After upgrading from the 6.6.x kernel to the 6.11 series, fastboot (the tool for communicating with Android bootloaders) fails to perform various operations over USB. I use fastboot to install kernels on LineageOS phones. Without it, I am no longer able to apply security updates to these devices. The problem also manifests with simpler operations like reading a variable from the bootloader. For example: fastboot getvar kernel A typical error message when the failure occurs: getvar:kernel FAILED (remote: 'GetVar Variable Not found') I can reproduce this at will. It happens about 50% of the time when I run the above getvar command, and almost all the time when I try to push a new kernel to the device. This is an upstream bug. I have not yet reported it upstream, but I intend to once I figure out whom to include in the email. (If someone here knows the best upstream lists & individual contacts to include, please tell me.) Git bisect reveals this as the offending commit: 63a1f8454962a64746a59441687dc2401290326c xhci: stored cached port capability values in one place -- System Information: Debian Release: 12.8 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable'), (1, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 6.12.6-amd64 (SMP w/32 CPU threads; PREEMPT) Kernel taint flags: TAINT_WARN Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled
--- End Message ---
--- Begin Message ---
- To: 1091517-close@bugs.debian.org
- Subject: Bug#1091517: fixed in linux 6.13.3-1~exp1
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Tue, 18 Feb 2025 12:30:35 +0000
- Message-id: <E1tkMkF-004lwa-O5@fasolo.debian.org>
- Reply-to: Salvatore Bonaccorso <carnil@debian.org>
Source: linux Source-Version: 6.13.3-1~exp1 Done: Salvatore Bonaccorso <carnil@debian.org> We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1091517@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso <carnil@debian.org> (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Tue, 18 Feb 2025 12:49:42 +0100 Source: linux Architecture: source Version: 6.13.3-1~exp1 Distribution: experimental Urgency: medium Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org> Changed-By: Salvatore Bonaccorso <carnil@debian.org> Closes: 1087807 1088159 1091517 1091858 1093371 1093734 1095232 1095435 1095647 Changes: linux (6.13.3-1~exp1) experimental; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.13.3 - [x86] xen: fix xen_hypercall_hvm() to not clobber %rbx (Closes: #1095435) - mips/math-emu: fix emulation of the prefx instruction (Closes: #1091858) . [ John Paul Adrian Glaubitz ] * [alpha] Disable CONFIG_COMPACTION to avoid memory corruption . [ Yoann Congal ] * [arm64/rt] Re-enable KVM . [ Salvatore Bonaccorso ] * [mips*] Increase RELOCATION_TABLE_SIZE to 0x00280000 (fixes FTBFS) * nfsd: validate the nfsd_serv pointer before calling svc_wake_up (Closes: #1093734) * [x86] xen: allow larger contiguous memory regions in PV guests (Closes: #1093371, #1088159, #1087807) * xen/swiotlb: relax alignment requirements (Closes: #1093371, #1088159, #1087807) * USB: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone (Closes: #1091517) . [ Bastian Blank ] * [amd64, arm64] Enable NITRO_ENCLAVES, NSM. (closes: #1095647) * Enable DEVICE_PRIVATE, DRM_AMDGPU, HSA_AMD, HSA_AMD_SVM. (closes: #1095232) * Compress kernel with zstd where supported. * [arm64, riscv64] Enable EFI_ZBOOT. * Support zstd for firmware loader, enable FW_LOADER_COMPRESS_ZSTD. . [ Luca Boccassi ] * linux-bpf-dev: mark as MA: same Checksums-Sha1: b23f6b8e2b3e6fbfdfb8ec084391afb8fa3b301e 200433 linux_6.13.3-1~exp1.dsc 7e5ed6692f7592c209e845fbe7db84f9223c2290 151518868 linux_6.13.3.orig.tar.xz 53f8daeda01295a384f4849cc23b789bac362463 1545896 linux_6.13.3-1~exp1.debian.tar.xz 2b87a17f2daea6e1f9c16a9fe60c00f13956b821 7093 linux_6.13.3-1~exp1_source.buildinfo Checksums-Sha256: c938874612c3253fd3bea1773d3ed672e27fd4ee7be667ffc87f898ac22a5e33 200433 linux_6.13.3-1~exp1.dsc 04c2caa318adc0d7ff5a9071e11a35c6f4bc7ac0b40bc0c2c03e914f2bbc26c5 151518868 linux_6.13.3.orig.tar.xz a883ab7caa4825b427f6a5bb22a1b6b39cc276a550ed9796c7b9273f632521e8 1545896 linux_6.13.3-1~exp1.debian.tar.xz c42d7fd06397f78d27dad9a465c1801198f71924f9537ac24017d1221db3442c 7093 linux_6.13.3-1~exp1_source.buildinfo Files: db30cecd680b6ed552c2284b96de2db9 200433 kernel optional linux_6.13.3-1~exp1.dsc 0a95cdd823c4277a326688f025b8ed1b 151518868 kernel optional linux_6.13.3.orig.tar.xz 9a4f07b367c94e7cf1bd849eb00743bf 1545896 kernel optional linux_6.13.3-1~exp1.debian.tar.xz 37ed453a201ed10e3560a45810241fd4 7093 kernel optional linux_6.13.3-1~exp1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAme0d+tfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89E2ogP+weQttsdyyi5ex4INZijLqnmhCtXl7lL Td4qHfQ+UWC8WVvqbg3Ng6y5VLXqSIxwdBBfaErXOEqcLR3gpbJxgpDD4yka3tFK v9Q4CCAQN+c8FLYL0B5CzizxF9kn6dx5CRuiNHl/vWUGaRdU4EClmmtLjHEkGxat 5gKpHsullFTGBIU9onX/rBBbHPJNd2knGPQr43cu2YYclNQWUM8Mq7t5uPtxIp7e AiBaVruaZtgBKkub1uq1tJZoAS4Va3iZ4T97mB4yT3cL3BKitc6Ny1LDfnWG1wVM lDdox9DbPsFoi07+j65RCoRPyzTEIvx0ubmXA2scBIPubz7fHXeQko35zV/RrS9I +A3UsVZFuJRI/dN+U5iHgQ5WdSolfwOVIRL/Nhn5+z5YBEq/tp8B9KOqL+ZsmL+t b1xnjNl8st8qVt4eP3ck1TsRgycmMcJwYSQYKOh9DWzTByPbxWzGHJyk+5nYg8O4 ov0SO++FujWfgZ9yCeZxBDSa6ADtSk8ig+hDx3/xOGVkFNxXJ0ArW7v1OT+TVw2D nfZkVa7dr8Q0Z9RP3ftGhW56SvtbwJf7mlbNGRpgsz4C/yOoITF6Jp1eyh9Tvo88 7iaLTN1k4L5tP4OqqFRH12J6iVCnbARYWjFSx+j6fDkQP0FAZVipG/r6zz8aCc/+ KKM0VhwaFaTj =KfO8 -----END PGP SIGNATURE-----Attachment: pgp4FKRpeCDau.pgp
Description: PGP signature
--- End Message ---