• Bug#1049967: marked as done (regression: kernel WARNING at arch/x86/ker

    From Debian Bug Tracking System@21:1/5 to Salvatore Bonaccorso on Fri Aug 18 22:40:01 2023
    This is a multi-part message in MIME format...

    Your message dated Fri, 18 Aug 2023 21:29:25 +0100
    with message-id <2dadb28ca368809acbb9900196ab200e626ae565.camel@adam-barratt.org.uk>
    and subject line Re: Bug#1044518: linux: "RIP: 0010:get_xsave_addr+0x9b/0xb0" stacktrace in early boot with -24 bullseye kernel
    has caused the Debian Bug report #1044518,
    regarding regression: kernel WARNING at arch/x86/kernel/fpu/xstate.c:973 get_xsave_addr+0x9b/0xb0
    to be marked as done.

    This means that you claim that the problem has been dealt with.
    If this is not the case it is now your responsibility to reopen the
    Bug report if necessary, and/or fix the problem forthwith.

    (NB: If you are a system administrator and have no idea what this
    message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org
    immediately.)


    --
    1044518: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1044518
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems

    Received: (at submit) by bugs.debian.org; 17 Aug 2023 15:25:29 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.6-bugs.debian.org_2005_01_02
    (2021-04-09) on buxtehude.debian.org
    X-Spam-Level:
    X-Spam-Status: No, score=-7.7 required=4.0 tests=BAYES_00,FOURLA,FROMDEVELOPER,
    RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,
    SPF_NONE,XMAILER_REPORTBUG autolearn=ham autolearn_force=no
    version=3.4.6-bugs.debian.org_2005_01_02
    X-Spam-Bayes: score:0.0000 Tokens: new, 73; hammy, 150; neutral, 145; spammy,
    0. spammytokens: hammytokens:0.000-+--XDebbugsCc,
    0.000-+--X-Debbugs-Cc, 0.000-+--UD:kernel.org, 0.000-+--H*M:reportbug,
    0.000-+--H*MI:reportbug
    Return-path: <bzed@debian.org>
    Received: from relay02-mailcontrol.conova.com ([217.196.144.162]:53363)
    by buxtehude.debian.org with esmtps (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_G
  • From Debian Bug Tracking System@21:1/5 to All on Sat Aug 26 13:40:04 2023
    This is a multi-part message in MIME format...

    Your message dated Sat, 26 Aug 2023 11:33:01 +0000
    with message-id <E1qZrXJ-00EGjJ-9G@fasolo.debian.org>
    and subject line Bug#1044518: fixed in linux 5.10.191-1
    has caused the Debian Bug report #1044518,
    regarding regression: kernel WARNING at arch/x86/kernel/fpu/xstate.c:973 get_xsave_addr+0x9b/0xb0
    to be marked as done.

    This means that you claim that the problem has been dealt with.
    If this is not the case it is now your responsibility to reopen the
    Bug report if necessary, and/or fix the problem forthwith.

    (NB: If you are a system administrator and have no idea what this
    message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org
    immediately.)


    --
    1044518: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1044518
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems

    Received: (at submit) by bugs.debian.org; 17 Aug 2023 15:25:29 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.6-bugs.debian.org_2005_01_02
    (2021-04-09) on buxtehude.debian.org
    X-Spam-Level:
    X-Spam-Status: No, score=-7.7 required=4.0 tests=BAYES_00,FOURLA,FROMDEVELOPER,
    RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,
    SPF_NONE,XMAILER_REPORTBUG autolearn=ham autolearn_force=no
    version=3.4.6-bugs.debian.org_2005_01_02
    X-Spam-Bayes: score:0.0000 Tokens: new, 73; hammy, 150; neutral, 145; spammy,
    0. spammytokens: hammytokens:0.000-+--XDebbugsCc,
    0.000-+--X-Debbugs-Cc, 0.000-+--UD:kernel.org, 0.000-+--H*M:reportbug,
    0.000-+--H*MI:reportbug
    Return-path: <bzed@debian.org>
    Received: from relay02-mailcontrol.conova.com ([217.196.144.162]:53363)
    by buxtehude.debian.org with esmtps (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_G