Bug#1002310: linux-base: Kernel panics I believe, several a day
Hi, It would be more interesting since Salvatore mentioned the use of the reportbug kernel being necessary install the reportbug package. As per wiki https://wiki.debian.org/DebianKernelReportingBugs -- Cheers, Leandro Cunha
Bug#1002460: linux-image-amd64: Missing kernel configuration for Microsoft Laptops and Surface devices
Le 2021-12-22 14:07, Matthias Brennwald a écrit : > Full details (including a suggested fix) are available here: > https://github.com/linux-surface/linux-surface/issues/683 I need a clarification about CONFIG_SURFACE_AGGREGATOR_CDEV. This options' help text mentions that it is intended for debugging and development only, and should not be used otherwise. Is it really needed? Cheers, Vincent signature.asc Description: PGP signature
linux-signed-i386_5.15.5+2_source.changes ACCEPTED into unstable
Mapping sid to unstable. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 19 Dec 2021 00:20:10 +0100 Source: linux-signed-i386 Architecture: source Version: 5.15.5+2 Distribution: sid Urgency: medium Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Changes: linux-signed-i386 (5.15.5+2) unstable; urgency=medium . * Sign kernel from linux 5.15.5-2 . * atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait (CVE-2021-43975) * fget: check that the fd still exists after getting a ref to it (CVE-2021-4083) * USB: gadget: detect too-big endpoint 0 requests (CVE-2021-39685) * USB: gadget: zero allocate endpoint 0 buffers (CVE-2021-39685) * [x86] Revert "drm/i915: Implement Wa_1508744258" (Closes: #1001128) * nfsd: fix use-after-free due to delegation race (Closes: #988044) * bpf: Fix kernel address leakage in atomic fetch * bpf: Fix signed bounds propagation after mov32 * bpf: Make 32->64 bounds propagation slightly more robust * bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg Checksums-Sha1: 1b25f0087f4ae7d9305197d85d98bc17405e2814 14031 linux-signed-i386_5.15.5+2.dsc 8e5b8f897249b42b95f676cb0fe8f496d4a0d11e 3695628 linux-signed-i386_5.15.5+2.tar.xz Checksums-Sha256: db46f07d7db048efe47692da33d0b29559815acc5ec462fc6386709dad5b01fa 14031 linux-signed-i386_5.15.5+2.dsc 3105bf406c151ac218289f507295793903293dca2e5dc918b98dd2339484da51 3695628 linux-signed-i386_5.15.5+2.tar.xz Files: 74fff491925d8e3a0f80dff9d438a26e 14031 kernel optional linux-signed-i386_5.15.5+2.dsc ba2bfcf70b9ce2b1f8ebf1e5a58970b0 3695628 kernel optional linux-signed-i386_5.15.5+2.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmHDexQACgkQi0FRiLdO NzbCQg//YDTXhhZnAW3LqK8rTg9q7Po+ZsdYyKvbc2IWVzCFGUzEhqEFke7oWtTV lygM464Xq7woqcjueiyx4aTKQGd3K31SUfkhx4907oe1kaz0EyuKLJI2AHtFsXaU PJvoqIbuPKdow9INNlawMsKImGjoQjVUki6tOWJAkeHRSibA+hUFBvzL20NpKSPV s74luJPo3clYogp/cE5MN/Qn9uNKtIcVkaR8iv+bI4Y9DpVan7FSZcT5qRYsav6j YaPWEeq5lZY6lRGFJnZVB2iNhucw52PSUuxATTuZe47bWeFFhddqCGfQkDKhr8dW 4Le8UiNrR7tGpqshu6mcEFrBIaSjYY3pAB4NFloTabAy4q9md2bcwOAXK+oG6neF cuaH32njdPDZZpPOoazOH6iTDJFEs5GxO3rjlJb22CLk1kEi8T4mNDd4CsoUzned 6z4mc5/u1sJOrP5goSVSmrTmBpTLHhpMIqKdnYk8pbyWhVVIinPOEasf67FBXv1W v8AP4ScuGXuO6m+5jWhm6qE40MkDjey62mnVzGCuAWHJJmjGR6w6T5cKU/pmG+iR rVfjrN3zH3tS7e/isIzFjLMQfcyfgAsnjCALMXa7ByfPKRXwgvGxxoZ05EqZTibp CmUedLJVd2OZXG+2vTJig+NTAYE86Ng+1wYdRBDiBanNLEk7Lqs= =ILwE -END PGP SIGNATURE- Thank you for your contribution to Debian.
Processing of linux-signed-i386_5.15.5+2_source.changes
linux-signed-i386_5.15.5+2_source.changes uploaded successfully to localhost along with the files: linux-signed-i386_5.15.5+2.dsc linux-signed-i386_5.15.5+2.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)
linux-signed-arm64_5.15.5+2_source.changes ACCEPTED into unstable
Mapping sid to unstable. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 19 Dec 2021 00:20:10 +0100 Source: linux-signed-arm64 Architecture: source Version: 5.15.5+2 Distribution: sid Urgency: medium Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Changes: linux-signed-arm64 (5.15.5+2) unstable; urgency=medium . * Sign kernel from linux 5.15.5-2 . * atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait (CVE-2021-43975) * fget: check that the fd still exists after getting a ref to it (CVE-2021-4083) * USB: gadget: detect too-big endpoint 0 requests (CVE-2021-39685) * USB: gadget: zero allocate endpoint 0 buffers (CVE-2021-39685) * [x86] Revert "drm/i915: Implement Wa_1508744258" (Closes: #1001128) * nfsd: fix use-after-free due to delegation race (Closes: #988044) * bpf: Fix kernel address leakage in atomic fetch * bpf: Fix signed bounds propagation after mov32 * bpf: Make 32->64 bounds propagation slightly more robust * bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg Checksums-Sha1: a57e8028a87a4e78722e6b4cc7772a3b90c3200e 7232 linux-signed-arm64_5.15.5+2.dsc 4078bb374a4e888ea65fcb162bddc42e874c2925 2508488 linux-signed-arm64_5.15.5+2.tar.xz Checksums-Sha256: 3028fc0e92caf2eacc7833c58c19400b5843291bb8261752a96e61803901f3d6 7232 linux-signed-arm64_5.15.5+2.dsc e338b94d828e0d50af885835c14f1cbef3bb069b8e4dc8f1c8edda5b87127172 2508488 linux-signed-arm64_5.15.5+2.tar.xz Files: a22b45804c9a6f27ce86d31306ac848c 7232 kernel optional linux-signed-arm64_5.15.5+2.dsc 4e2b344954ae544ec7ec18fde2a72f10 2508488 kernel optional linux-signed-arm64_5.15.5+2.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmHDUm0ACgkQi0FRiLdO NzYj0w//dxCLu5hdBCseWkmxf5XmHJ2XkYVM1Isc2AHLXOD/Qxsyx4lxqwR6P2O4 OtaHnKwSBkDp/d2r8Y+s6GSZQ7j6RIlLVH9nrhz33olZTn6dm0/pTFVcAjXICJGe EFf2g/FAHgdLROnobzA1zTpWMHqLoLynBNUMaVZym4y9gJ+d1/eMq3Iem/1qYqXh lAV2BRAJNROvncTXK5oQ7i461B378P9Fj+tEtLPbn1RJv3dsqg5TSWkwYMZ+Ch6J jxKoRm96UX3TqSigP6qt6kI/lToquGwv+64Hp9aC4IIEqPj1CaIcpf1b1YSCqHvq lOetd0C1Dry44JpejSjgnQ0tBlMjJreQN0IXubbUV2vB+ViJQV9eNp+rskuR815+ kamUxWnOu/WeP+x124rZG8b3k/gWNPyLkBoAx7Gn/OOnrgRNhMXW88gLBlwqe0ee gvAD7XG6Vid66f692k+5YOFSieHasoRlPsl0nm0H11sG2iqdIco8eoLV/IwIw4kc r0hPUb7aPkSP5h4auAWUdbt8Lf1QxXB1DnQJfAjvZiiYgS37fYBuc6XAYLXRLjsb P5944BcfujX0khpr44HWi+HXJViaXhV9RAxyG5thbE3sAUB+ib65nsKdgZF2mQi9 u2JZ35QjGuqasIex42ijaZ3t8jaJo+ftAhlN4JNppw1zBo6jZvo= =HGvZ -END PGP SIGNATURE- Thank you for your contribution to Debian.
Processing of linux-signed-arm64_5.15.5+2_source.changes
linux-signed-arm64_5.15.5+2_source.changes uploaded successfully to localhost along with the files: linux-signed-arm64_5.15.5+2.dsc linux-signed-arm64_5.15.5+2.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)
linux-signed-amd64_5.15.5+2_source.changes ACCEPTED into unstable
Mapping sid to unstable. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 19 Dec 2021 00:20:10 +0100 Source: linux-signed-amd64 Architecture: source Version: 5.15.5+2 Distribution: sid Urgency: medium Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Changes: linux-signed-amd64 (5.15.5+2) unstable; urgency=medium . * Sign kernel from linux 5.15.5-2 . * atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait (CVE-2021-43975) * fget: check that the fd still exists after getting a ref to it (CVE-2021-4083) * USB: gadget: detect too-big endpoint 0 requests (CVE-2021-39685) * USB: gadget: zero allocate endpoint 0 buffers (CVE-2021-39685) * [x86] Revert "drm/i915: Implement Wa_1508744258" (Closes: #1001128) * nfsd: fix use-after-free due to delegation race (Closes: #988044) * bpf: Fix kernel address leakage in atomic fetch * bpf: Fix signed bounds propagation after mov32 * bpf: Make 32->64 bounds propagation slightly more robust * bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg Checksums-Sha1: 04c7b8d2f6f3fd7c82f2c9c6c6967358e235 8479 linux-signed-amd64_5.15.5+2.dsc 15a56352f0c2403a34515fb3e4062663ccc6b8e9 2757472 linux-signed-amd64_5.15.5+2.tar.xz Checksums-Sha256: 695c7b9dbf0019b8ddc839aed2326a539d54720977301ee3692e73ec13ae5d83 8479 linux-signed-amd64_5.15.5+2.dsc 6b071e83f31dc24c9dbfd9b713b3f8a2e0782c81dc83b861617ad29f05affd38 2757472 linux-signed-amd64_5.15.5+2.tar.xz Files: d4a89818e6344df9ede63654d8bb1b78 8479 kernel optional linux-signed-amd64_5.15.5+2.dsc 8033022d1c8d47c4e48baa5b1da8d700 2757472 kernel optional linux-signed-amd64_5.15.5+2.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmHDN9AACgkQi0FRiLdO NzZZ1g/+PeKSm0QQ1U6acyNwdQKylOhR8+iDbyRYA502YIQxFFtCfZecGhA+TgdL AFDpeLVv44qr0l3HmRPJXt2oYorjF5NJmN1J62zs/3srdqDIS6H7IkwHkvHuBxt0 DN734OSHV3EqgI/NUN2TqbiF9hA0SEhfhPf24riSHjta2/Q7gMNs1/8eCR/9Jgvc lH8yb9MN0Yg672Q6WVz9heAXwEp9y6fYiOCM0jchzHm4cr358OXPVDI8Cq0G4t5+ u7g9uS+h+93gtnaSfn6uceygwoY4n3Xk/9117eDVddcl+KVxP1OtTyfGV5NossI+ GKinqGC00IOumatABeSqGqJ4oA5Ew1RlUxbZvAveWEBr7RgYoLNukIJKZEKWFlM9 c4utHkpet+GHw1wpk5wXRy4zueWI15FHVBJ5LkY84e0X6MecTvAXGGwMkRd7brRA ADn2EhWhDobXe5lPTJiVzo4ToJ3BG7anpp78FbxUpZxWBi2g4SJmfAoJ0R8gxwr1 Dgg48dSpKM9baGXlm7M1AF0yJUl13jZguJxnjHycpo5GP/QM4RdTZW6orO+8Mhym 4NKgIk5z9S7PI2SPxZHfO0Q6geqmU26DMItd+PMc+vvohuttC2pgutWxXrm6xMf/ c8BOimDeBv123GTRGvCcp/pD11q4G2dvlM3qEBDcstIW6KBCMRw= =9pc3 -END PGP SIGNATURE- Thank you for your contribution to Debian.
Processing of linux-signed-amd64_5.15.5+2_source.changes
linux-signed-amd64_5.15.5+2_source.changes uploaded successfully to localhost along with the files: linux-signed-amd64_5.15.5+2.dsc linux-signed-amd64_5.15.5+2.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)
Bug#1002465: /boot/vmlinuz-5.10.0-10-amd64: btusb: CSR clone fails with "debugfs: File 'dut_mode' in directory 'hci1' already present!"
Package: src:linux Version: 5.10.84-1 Severity: normal File: /boot/vmlinuz-5.10.0-10-amd64 -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Just got a couple of CSR clones of a type I haven't tried before. Unfortunately they fail with the error message: "debugfs: File 'dut_mode' in directory 'hci1' already present!" Kernel log after plugging in: usb 1-1: new high-speed USB device number 7 using xhci_hcd usb 1-1: New USB device found, idVendor=0fce, idProduct=31f4, bcdDevice= 4.04 usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 usb 1-1: Product: G8441 usb 1-1: Manufacturer: Sony usb 1-1: SerialNumber: BH901MPJ9E usb 1-1: USB disconnect, device number 7 usb 1-1: new high-speed USB device number 8 using xhci_hcd usb 1-1: New USB device found, idVendor=0fce, idProduct=51f4, bcdDevice= 4.04 usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 usb 1-1: Product: G8441 usb 1-1: Manufacturer: Sony usb 1-1: SerialNumber: BH901MPJ9E usb 1-1: USB disconnect, device number 8 8021q: adding VLAN 0 to HW filter on device wwan0 input: WH-1000XM4 (AVRCP) as /devices/virtual/input/input29 usb 1-3: new full-speed USB device number 9 using xhci_hcd usb 1-3: New USB device found, idVendor=0a12, idProduct=0001, bcdDevice=88.91 usb 1-3: New USB device strings: Mfr=0, Product=2, SerialNumber=0 usb 1-3: Product: BT DONGLE10 Bluetooth: hci1: CSR: Unbranded CSR clone detected; adding workarounds... Controller shows up: root@miraculix:/tmp# hciconfig hci1 hci1: Type: Primary Bus: USB BD Address: 00:1A:7D:DA:71:13 ACL MTU: 679:8 SCO MTU: 48:16 DOWN RX bytes:734 acl:0 sco:0 events:24 errors:0 TX bytes:74 acl:0 sco:0 commands:24 errors:0 But trying to bring it up results in: root@miraculix:/tmp# hciconfig hci1 up Can't init device hci1: Invalid argument (22) and the workaround messages is repeated in the kernel log along with the new error message: Bluetooth: hci1: CSR: Unbranded CSR clone detected; adding workarounds... debugfs: File 'dut_mode' in directory 'hci1' already present! The debugfs file *is* already present prior to this. Trying to trick the system by unmounting debugfs does not help - as expected, I guess. The duplicate file registration is still running. Looks like the adapter initialisation is running twice for some reason? This is the full lsusb -v dump for this device: Bus 001 Device 009: ID 0a12:0001 Cambridge Silicon Radio, Ltd Bluetooth Dongle (HCI mode) Device Descriptor: bLength18 bDescriptorType 1 bcdUSB 2.00 bDeviceClass 224 Wireless bDeviceSubClass 1 Radio Frequency bDeviceProtocol 1 Bluetooth bMaxPacketSize064 idVendor 0x0a12 Cambridge Silicon Radio, Ltd idProduct 0x0001 Bluetooth Dongle (HCI mode) bcdDevice 88.91 iManufacturer 0 iProduct2 BT DONGLE10 iSerial 0 bNumConfigurations 1 Configuration Descriptor: bLength 9 bDescriptorType 2 wTotalLength 0x00b1 bNumInterfaces 2 bConfigurationValue 1 iConfiguration 0 bmAttributes 0xe0 Self Powered Remote Wakeup MaxPower 100mA Interface Descriptor: bLength 9 bDescriptorType 4 bInterfaceNumber0 bAlternateSetting 0 bNumEndpoints 3 bInterfaceClass 224 Wireless bInterfaceSubClass 1 Radio Frequency bInterfaceProtocol 1 Bluetooth iInterface 0 Endpoint Descriptor: bLength 7 bDescriptorType 5 bEndpointAddress 0x81 EP 1 IN bmAttributes3 Transfer TypeInterrupt Synch Type None Usage Type Data wMaxPacketSize 0x0010 1x 16 bytes bInterval 1 Endpoint Descriptor: bLength 7 bDescriptorType 5 bEndpointAddress 0x02 EP 2 OUT bmAttributes2 Transfer TypeBulk Synch Type None Usage Type Data wMaxPacketSize 0x0040 1x 64 bytes bInterval 1 Endpoint Descriptor: bLength 7 bDescriptorType 5 bEndpointAddress 0x82 EP 2 IN bmAttributes2 Transfer TypeBulk Synch Type None Usage Type Data wMaxPacketSize 0x0040 1x 64 bytes bInterval 1 Interface Descriptor: bLength 9 bDescriptorType 4 bInterfaceNumber1 bAlternateSetting 0 bNumEndpoints 2 bInterfaceClass 224
Processed: Re: Bug#1002460: linux-image-amd64: Missing kernel configuration for Microsoft Laptops and Surface devices
Processing control commands: > reassign -1 src:linux Bug #1002460 [src:linux] linux-image-amd64: Missing kernel configuration for Microsoft Laptops and Surface devices Ignoring request to reassign bug #1002460 to the same package -- 1002460: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002460 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: reassign 1002460 to src:linux
Processing commands for cont...@bugs.debian.org: > reassign 1002460 src:linux 5.15.5-1 Bug #1002460 [src:linux] linux-image-amd64: Missing kernel configuration for Microsoft Laptops and Surface devices Ignoring request to reassign bug #1002460 to the same package Bug #1002460 [src:linux] linux-image-amd64: Missing kernel configuration for Microsoft Laptops and Surface devices Marked as found in versions linux/5.15.5-1. > thanks Stopping processing here. Please contact me if you need assistance. -- 1002460: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002460 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#1002460: linux-image-amd64: Missing kernel configuration for Microsoft Laptops and Surface devices
Control: reassign -1 src:linux Hi Matthias, Le 2021-12-22 14:07, Matthias Brennwald a écrit : > Package: linux-image-amd64 > Version: 5.15.5-1 > Severity: normal > X-Debbugs-Cc: mbren...@gmail.com > > Dear Maintainer, > > Some features for Linux on Microsoft Laptops and Surface devices that were > implemented in the 5.13+ Linux kernel are not configured with the kernels > provided by Debian. > > Full details (including a suggested fix) are available here: > https://github.com/linux-surface/linux-surface/issues/683 I'll work on this later today. Cheers, Vincent signature.asc Description: PGP signature
Processed: Re: Bug#1002460: linux-image-amd64: Missing kernel configuration for Microsoft Laptops and Surface devices
Processing control commands: > reassign -1 src:linux Bug #1002460 [linux-image-amd64] linux-image-amd64: Missing kernel configuration for Microsoft Laptops and Surface devices Bug reassigned from package 'linux-image-amd64' to 'src:linux'. No longer marked as found in versions linux-signed-amd64/5.15.5+1. Ignoring request to alter fixed versions of bug #1002460 to the same values previously set -- 1002460: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002460 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
linux_5.16~rc6-1~exp1_source.changes ACCEPTED into experimental, experimental
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Mon, 20 Dec 2021 22:47:25 +0100 Source: linux Architecture: source Version: 5.16~rc6-1~exp1 Distribution: experimental Urgency: medium Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Changes: linux (5.16~rc6-1~exp1) experimental; urgency=medium . * New upstream release candidate . [ Aurelien Jarno ] * [riscv64] Improve HiFive Unmatched support: enable INPUT_DA9063_ONKEY, MFD_DA9063, REGULATOR_DA9063, RTC_DRV_DA9063, DA9063_WATCHDOG. . [ Salvatore Bonaccorso ] * xen/blkfront: harden blkfront against event channel storms (CVE-2021-28711) * xen/netfront: harden netfront against event channel storms (CVE-2021-28712) * xen/console: harden hvc_xen against event channel storms (CVE-2021-28713) * xen/netback: fix rx queue stall detection (CVE-2021-28714) * xen/netback: don't queue unlimited number of packages (CVE-2021-28715) Checksums-Sha1: 84e75c1f16b38d88d7b93a0d26f6e16337b05fbf 198878 linux_5.16~rc6-1~exp1.dsc da3f083f4082c0ca2c68ce20187e7cf3b7a569ca 129131140 linux_5.16~rc6.orig.tar.xz e1edb2a9f9e6a26675b576de13d99118079d63f4 1272480 linux_5.16~rc6-1~exp1.debian.tar.xz d0209e66adf51702f54938a9567533791ee12b88 6384 linux_5.16~rc6-1~exp1_source.buildinfo Checksums-Sha256: cc3c8105597d97e8d4e49fa66f8fbd71577a59f13834ba16511b9b27f4d132c8 198878 linux_5.16~rc6-1~exp1.dsc d4feeb2c34fef38e277268f9b1693ee42103ab40757d9c14060c40ebababe364 129131140 linux_5.16~rc6.orig.tar.xz 1abaae81586b0aa1c53fc7895d71ddea746b303aa766335b2dcc6af9928ce8a3 1272480 linux_5.16~rc6-1~exp1.debian.tar.xz f4d38f7c9d7cde40058ff41bacf2203b7300ca49bedcd51e1a85c763353887d4 6384 linux_5.16~rc6-1~exp1_source.buildinfo Files: 36832ece80f356226e4c976433a8db3e 198878 kernel optional linux_5.16~rc6-1~exp1.dsc c3ab873f50a10c53351c6187925e458d 129131140 kernel optional linux_5.16~rc6.orig.tar.xz 49738ecabd698ced0b30e4ceeeda031e 1272480 kernel optional linux_5.16~rc6-1~exp1.debian.tar.xz 8d48d1ab911974bb67187e7e5ba026db 6384 kernel optional linux_5.16~rc6-1~exp1_source.buildinfo -BEGIN PGP SIGNATURE- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmHA+nlfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89E15IP/iMzzS3cg/pn0ZDxl1RL+JtoLLazhpzS JFKWXwVa24BR5eiMdYV5S7qs5Lw7fJ9G71QmZpn+iItNDx9550nHB0eiHuytsWKr WaBg+DhP9H1kwa8u53rTmdCEKWfZ8AKs41xZUCwGRmLg1hSQKTARZLw4mOuNQvjn kAjkyyzRaslbAhMlQAOw1gA4AiHrWf9G1yGMrT0cfkRuDSg2GX5CZmVWweZ1T3dV UFWLJpHA0Mc02xjC2uGoejiRWLTVx6Qs0yYIMT0KzKzK4nI4Usr8n36vYbqvu5OC 65DgxEmLXzhNZ8Ph6OtbgboZSMfE0UxWfvPOY2Uk4kXeCfT4qvpytoN/GbvetLwW HeG+XaLzMAgpCiRC3YeSIXjhYO9bNqrESCfo/YKzlfbLVj3QJczwS+LgewXoHeKP myN83kwdEcc5MiLfjZwlr6VdbKs6L9WWIsLdKS29mWQ+I6psKQKfaz8ITAdsKWJ9 cGqL/cZCeTc2tVXZ0+REb4j864SbH++ZdIlYJ1ZIgemgmEat06f8WdApfSqLbMg1 1i8cxkX6wfEF6jDSoLmRnzLbvmT2TKInaGc/mJfZsmweyUQniDdvnfzorxGIbCo3 p71dELkylYT0D3JSscJ9TnDbOWDbqlYmgsDA41Qf9pj64S3aolVIPmp4UQgjQ2dn mqm7umYBajPm =f0/x -END PGP SIGNATURE- Thank you for your contribution to Debian.
Bug#1002460: linux-image-amd64: Missing kernel configuration for Microsoft Laptops and Surface devices
Package: linux-image-amd64 Version: 5.15.5-1 Severity: normal X-Debbugs-Cc: mbren...@gmail.com Dear Maintainer, Some features for Linux on Microsoft Laptops and Surface devices that were implemented in the 5.13+ Linux kernel are not configured with the kernels provided by Debian. Full details (including a suggested fix) are available here: https://github.com/linux-surface/linux-surface/issues/683 -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 5.15.0-2-amd64 (SMP w/8 CPU threads) Kernel taint flags: TAINT_USER, TAINT_OOT_MODULE Locale: LANG=en_CH.UTF-8, LC_CTYPE=en_CH.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages linux-image-amd64 depends on: ii linux-image-5.15.0-2-amd64 5.15.5-1 linux-image-amd64 recommends no packages. linux-image-amd64 suggests no packages. -- no debconf information
Bug#1000616: marked as done (Kernel list_del corruption. next->prev should be ...)
Your message dated Wed, 22 Dec 2021 10:33:44 +0100 with message-id and subject line Re: Bug#1000616: Kernel list_del corruption. next->prev should be ... has caused the Debian Bug report #1000616, regarding Kernel list_del corruption. next->prev should be ... to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1000616: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1000616 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: linux-image-5.15.0-1-amd64 Version: 5.15.3-1 I often hit this bug here, often shortly before others are hit which render the system unusable. Here the dmesg log section from pstore: <3>[ 257.036085] list_del corruption. next->prev should be dfd4c8b732c8, but was 98adb59f5830 <4>[ 257.036115] [ cut here ] <2>[ 257.036117] kernel BUG at lib/list_debug.c:54! <4>[ 257.036129] invalid opcode: [#1] SMP NOPTI <4>[ 257.036137] CPU: 1 PID: 3955 Comm: xdg-document-po Tainted: G I 5.15.0-1-amd64 #1 Debian 5.15.3-1 <4>[ 257.036146] Hardware name: LENOVO 20CLS2LJ00/20CLS2LJ00, BIOS N10ET38W (1.17 ) 08/20/2015 <4>[ 257.036150] RIP: 0010:__list_del_entry_valid.cold+0x1d/0x47 <4>[ 257.036164] Code: c7 c7 d8 c5 d5 aa e8 32 f7 fe ff 0f 0b 48 89 fe 48 c7 c7 68 c6 d5 aa e8 21 f7 fe ff 0f 0b 48 c7 c7 18 c7 d5 aa e8 13 f7 fe ff <0f> 0b 48 89 f2 48 89 fe 48 c7 c7 d8 c6 d5 aa e8 ff f6 fe ff 0f 0b <4>[ 257.036170] RSP: 0018:a6ba0182b958 EFLAGS: 00010046 <4>[ 257.036178] RAX: 0054 RBX: a6ba0182bab0 RCX: dmesg-efi-163787479303001: Oops#1 Part3 <4>[ 257.036183] RDX: RSI: 98afc5c60880 RDI: 98afc5c60880 <4>[ 257.036188] RBP: dfd4c8b732c0 R08: R09: a6ba0182b788 <4>[ 257.036192] R10: a6ba0182b780 R11: ab2d21c8 R12: 0002 <4>[ 257.036197] R13: a6ba0182bae0 R14: a6ba0182b998 R15: dfd4c8b73248 <4>[ 257.036202] FS: 7f3313ed5380() GS:98afc5c4() knlGS: <4>[ 257.036208] CS: 0010 DS: ES: CR0: 80050033 <4>[ 257.036213] CR2: 7f5434002078 CR3: 35acc005 CR4: 003706e0 <4>[ 257.036219] Call Trace: <4>[ 257.036224] <4>[ 257.036228] release_pages+0x2eb/0x510 <4>[ 257.036244] __pagevec_release+0x1c/0x50 <4>[ 257.036254] truncate_inode_pages_range+0x157/0x520 <4>[ 257.036264] ? schedule+0x44/0xa0 <4>[ 257.036271] ? schedule_hrtimeout_range_clock+0x9d/0x120 <4>[ 257.036281] ? __inode_wait_for_writeback+0x7e/0xf0 <4>[ 257.036294] fuse_evict_inode+0x16/0xd0 [fuse] <4>[ 257.036320] evict+0xce/0x180 <4>[ 257.036330] __dentry_kill+0xe1/0x180 <4>[ 257.036337] shrink_dentry_list+0x4e/0xc0 <4>[ 257.036344] shrink_dcache_parent+0xd1/0x120 <4>[ 257.036352] d_invalidate+0x66/0xe0 <4>[ 257.036359] ? dput+0x32/0x300 <4>[ 257.036366] fuse_reverse_inval_entry+0xbd/0x1e0 [fuse] <4>[ 257.036385] fuse_dev_do_write+0x54b/0xee0 [fuse] <4>[ 257.036404] ? __pollwait+0xd0/0xd0 <4>[ 257.036416] fuse_dev_write+0x4f/0x80 [fuse] <4>[ 257.036449] do_iter_readv_writev+0x14f/0x1b0 <4>[ 257.036462] do_iter_write+0x7c/0x1c0 <4>[ 257.036473] vfs_writev+0xaa/0x140 <4>[ 257.036485] ? ktime_get_ts64+0x49/0xf0 <4>[ 257.036494] do_writev+0x6b/0x110 <4>[ 257.036505] do_syscall_64+0x38/0xc0 <4>[ 257.036512] entry_SYSCALL_64_after_hwframe+0x44/0xae dmesg-efi-163787479302001: Oops#1 Part2 <4>[ 257.036523] RIP: 0033:0x7f3314351a6d <4>[ 257.036529] Code: 28 89 54 24 1c 48 89 74 24 10 89 7c 24 08 e8 6a f9 f8 ff 8b 54 24 1c 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 14 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 33 44 89 c7 48 89 44 24 08 e8 be f9 f8 ff 48 <4>[ 257.036535] RSP: 002b:7ffde2997830 EFLAGS: 0293 ORIG_RAX: 0014 <4>[ 257.036543] RAX: ffda RBX: 0003 RCX: 7f3314351a6d <4>[ 257.036547] RDX: 0003 RSI: 7ffde29978a0 RDI: 0007 <4>[ 257.036552] RBP: 7ffde29978a0 R08: R09: 7f33145b82c0 <4>[ 257.036556] R10: 7f3333a0 R11: 0293 R12: 563a24a49690 <4>[ 257.036560] R13: 0003 R14: 7f333440 R15: 563a24a1f8c0 <4>[ 257.036567] <4>[ 257.036570] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp nft_compat iscsi_target_mod target_core_mod nft_masq nft_counter nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4
Bug#1000616: Kernel list_del corruption. next->prev should be ...
With 5.16~rc4-1~exp1 I couldn't reproduce it, the system is running for 8 days now and I also filled my swap while doing some small tasks but nothing triggered it.