Bug#1002310: linux-base: Kernel panics I believe, several a day

2021-12-22 Thread Leandro Cunha
Hi,

It would be more interesting since Salvatore mentioned the use of the
reportbug kernel being necessary install the reportbug package.
As per wiki https://wiki.debian.org/DebianKernelReportingBugs

-- 
Cheers,
Leandro Cunha



Bug#1002460: linux-image-amd64: Missing kernel configuration for Microsoft Laptops and Surface devices

2021-12-22 Thread Vincent Blut
Le 2021-12-22 14:07, Matthias Brennwald a écrit :
> Full details (including a suggested fix) are available here:
> https://github.com/linux-surface/linux-surface/issues/683

I need a clarification about CONFIG_SURFACE_AGGREGATOR_CDEV. This options' 
help text mentions that it is intended for debugging and development only, 
and should not be used otherwise. Is it really needed?

Cheers,
Vincent


signature.asc
Description: PGP signature


linux-signed-i386_5.15.5+2_source.changes ACCEPTED into unstable

2021-12-22 Thread Debian FTP Masters
Mapping sid to unstable.

Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 19 Dec 2021 00:20:10 +0100
Source: linux-signed-i386
Architecture: source
Version: 5.15.5+2
Distribution: sid
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux-signed-i386 (5.15.5+2) unstable; urgency=medium
 .
   * Sign kernel from linux 5.15.5-2
 .
   * atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
 (CVE-2021-43975)
   * fget: check that the fd still exists after getting a ref to it
 (CVE-2021-4083)
   * USB: gadget: detect too-big endpoint 0 requests (CVE-2021-39685)
   * USB: gadget: zero allocate endpoint 0 buffers (CVE-2021-39685)
   * [x86] Revert "drm/i915: Implement Wa_1508744258" (Closes: #1001128)
   * nfsd: fix use-after-free due to delegation race (Closes: #988044)
   * bpf: Fix kernel address leakage in atomic fetch
   * bpf: Fix signed bounds propagation after mov32
   * bpf: Make 32->64 bounds propagation slightly more robust
   * bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg
Checksums-Sha1:
 1b25f0087f4ae7d9305197d85d98bc17405e2814 14031 linux-signed-i386_5.15.5+2.dsc
 8e5b8f897249b42b95f676cb0fe8f496d4a0d11e 3695628 
linux-signed-i386_5.15.5+2.tar.xz
Checksums-Sha256:
 db46f07d7db048efe47692da33d0b29559815acc5ec462fc6386709dad5b01fa 14031 
linux-signed-i386_5.15.5+2.dsc
 3105bf406c151ac218289f507295793903293dca2e5dc918b98dd2339484da51 3695628 
linux-signed-i386_5.15.5+2.tar.xz
Files:
 74fff491925d8e3a0f80dff9d438a26e 14031 kernel optional 
linux-signed-i386_5.15.5+2.dsc
 ba2bfcf70b9ce2b1f8ebf1e5a58970b0 3695628 kernel optional 
linux-signed-i386_5.15.5+2.tar.xz

-BEGIN PGP SIGNATURE-
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=ILwE
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Processing of linux-signed-i386_5.15.5+2_source.changes

2021-12-22 Thread Debian FTP Masters
linux-signed-i386_5.15.5+2_source.changes uploaded successfully to localhost
along with the files:
  linux-signed-i386_5.15.5+2.dsc
  linux-signed-i386_5.15.5+2.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



linux-signed-arm64_5.15.5+2_source.changes ACCEPTED into unstable

2021-12-22 Thread Debian FTP Masters
Mapping sid to unstable.

Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 19 Dec 2021 00:20:10 +0100
Source: linux-signed-arm64
Architecture: source
Version: 5.15.5+2
Distribution: sid
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux-signed-arm64 (5.15.5+2) unstable; urgency=medium
 .
   * Sign kernel from linux 5.15.5-2
 .
   * atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
 (CVE-2021-43975)
   * fget: check that the fd still exists after getting a ref to it
 (CVE-2021-4083)
   * USB: gadget: detect too-big endpoint 0 requests (CVE-2021-39685)
   * USB: gadget: zero allocate endpoint 0 buffers (CVE-2021-39685)
   * [x86] Revert "drm/i915: Implement Wa_1508744258" (Closes: #1001128)
   * nfsd: fix use-after-free due to delegation race (Closes: #988044)
   * bpf: Fix kernel address leakage in atomic fetch
   * bpf: Fix signed bounds propagation after mov32
   * bpf: Make 32->64 bounds propagation slightly more robust
   * bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg
Checksums-Sha1:
 a57e8028a87a4e78722e6b4cc7772a3b90c3200e 7232 linux-signed-arm64_5.15.5+2.dsc
 4078bb374a4e888ea65fcb162bddc42e874c2925 2508488 
linux-signed-arm64_5.15.5+2.tar.xz
Checksums-Sha256:
 3028fc0e92caf2eacc7833c58c19400b5843291bb8261752a96e61803901f3d6 7232 
linux-signed-arm64_5.15.5+2.dsc
 e338b94d828e0d50af885835c14f1cbef3bb069b8e4dc8f1c8edda5b87127172 2508488 
linux-signed-arm64_5.15.5+2.tar.xz
Files:
 a22b45804c9a6f27ce86d31306ac848c 7232 kernel optional 
linux-signed-arm64_5.15.5+2.dsc
 4e2b344954ae544ec7ec18fde2a72f10 2508488 kernel optional 
linux-signed-arm64_5.15.5+2.tar.xz

-BEGIN PGP SIGNATURE-
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=HGvZ
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Processing of linux-signed-arm64_5.15.5+2_source.changes

2021-12-22 Thread Debian FTP Masters
linux-signed-arm64_5.15.5+2_source.changes uploaded successfully to localhost
along with the files:
  linux-signed-arm64_5.15.5+2.dsc
  linux-signed-arm64_5.15.5+2.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



linux-signed-amd64_5.15.5+2_source.changes ACCEPTED into unstable

2021-12-22 Thread Debian FTP Masters
Mapping sid to unstable.

Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 19 Dec 2021 00:20:10 +0100
Source: linux-signed-amd64
Architecture: source
Version: 5.15.5+2
Distribution: sid
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux-signed-amd64 (5.15.5+2) unstable; urgency=medium
 .
   * Sign kernel from linux 5.15.5-2
 .
   * atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
 (CVE-2021-43975)
   * fget: check that the fd still exists after getting a ref to it
 (CVE-2021-4083)
   * USB: gadget: detect too-big endpoint 0 requests (CVE-2021-39685)
   * USB: gadget: zero allocate endpoint 0 buffers (CVE-2021-39685)
   * [x86] Revert "drm/i915: Implement Wa_1508744258" (Closes: #1001128)
   * nfsd: fix use-after-free due to delegation race (Closes: #988044)
   * bpf: Fix kernel address leakage in atomic fetch
   * bpf: Fix signed bounds propagation after mov32
   * bpf: Make 32->64 bounds propagation slightly more robust
   * bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg
Checksums-Sha1:
 04c7b8d2f6f3fd7c82f2c9c6c6967358e235 8479 linux-signed-amd64_5.15.5+2.dsc
 15a56352f0c2403a34515fb3e4062663ccc6b8e9 2757472 
linux-signed-amd64_5.15.5+2.tar.xz
Checksums-Sha256:
 695c7b9dbf0019b8ddc839aed2326a539d54720977301ee3692e73ec13ae5d83 8479 
linux-signed-amd64_5.15.5+2.dsc
 6b071e83f31dc24c9dbfd9b713b3f8a2e0782c81dc83b861617ad29f05affd38 2757472 
linux-signed-amd64_5.15.5+2.tar.xz
Files:
 d4a89818e6344df9ede63654d8bb1b78 8479 kernel optional 
linux-signed-amd64_5.15.5+2.dsc
 8033022d1c8d47c4e48baa5b1da8d700 2757472 kernel optional 
linux-signed-amd64_5.15.5+2.tar.xz

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmHDN9AACgkQi0FRiLdO
NzZZ1g/+PeKSm0QQ1U6acyNwdQKylOhR8+iDbyRYA502YIQxFFtCfZecGhA+TgdL
AFDpeLVv44qr0l3HmRPJXt2oYorjF5NJmN1J62zs/3srdqDIS6H7IkwHkvHuBxt0
DN734OSHV3EqgI/NUN2TqbiF9hA0SEhfhPf24riSHjta2/Q7gMNs1/8eCR/9Jgvc
lH8yb9MN0Yg672Q6WVz9heAXwEp9y6fYiOCM0jchzHm4cr358OXPVDI8Cq0G4t5+
u7g9uS+h+93gtnaSfn6uceygwoY4n3Xk/9117eDVddcl+KVxP1OtTyfGV5NossI+
GKinqGC00IOumatABeSqGqJ4oA5Ew1RlUxbZvAveWEBr7RgYoLNukIJKZEKWFlM9
c4utHkpet+GHw1wpk5wXRy4zueWI15FHVBJ5LkY84e0X6MecTvAXGGwMkRd7brRA
ADn2EhWhDobXe5lPTJiVzo4ToJ3BG7anpp78FbxUpZxWBi2g4SJmfAoJ0R8gxwr1
Dgg48dSpKM9baGXlm7M1AF0yJUl13jZguJxnjHycpo5GP/QM4RdTZW6orO+8Mhym
4NKgIk5z9S7PI2SPxZHfO0Q6geqmU26DMItd+PMc+vvohuttC2pgutWxXrm6xMf/
c8BOimDeBv123GTRGvCcp/pD11q4G2dvlM3qEBDcstIW6KBCMRw=
=9pc3
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Processing of linux-signed-amd64_5.15.5+2_source.changes

2021-12-22 Thread Debian FTP Masters
linux-signed-amd64_5.15.5+2_source.changes uploaded successfully to localhost
along with the files:
  linux-signed-amd64_5.15.5+2.dsc
  linux-signed-amd64_5.15.5+2.tar.xz

Greetings,

Your Debian queue daemon (running on host usper.debian.org)



Bug#1002465: /boot/vmlinuz-5.10.0-10-amd64: btusb: CSR clone fails with "debugfs: File 'dut_mode' in directory 'hci1' already present!"

2021-12-22 Thread Bjørn Mork
Package: src:linux
Version: 5.10.84-1
Severity: normal
File: /boot/vmlinuz-5.10.0-10-amd64

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Just got a couple of CSR clones of a type I haven't tried before.  Unfortunately
they fail with  the error message:

  "debugfs: File 'dut_mode' in directory 'hci1' already present!"

Kernel log after plugging in:

usb 1-1: new high-speed USB device number 7 using xhci_hcd
usb 1-1: New USB device found, idVendor=0fce, idProduct=31f4, bcdDevice= 4.04
usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
usb 1-1: Product: G8441
usb 1-1: Manufacturer: Sony
usb 1-1: SerialNumber: BH901MPJ9E
usb 1-1: USB disconnect, device number 7
usb 1-1: new high-speed USB device number 8 using xhci_hcd
usb 1-1: New USB device found, idVendor=0fce, idProduct=51f4, bcdDevice= 4.04
usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
usb 1-1: Product: G8441
usb 1-1: Manufacturer: Sony
usb 1-1: SerialNumber: BH901MPJ9E
usb 1-1: USB disconnect, device number 8
8021q: adding VLAN 0 to HW filter on device wwan0
input: WH-1000XM4 (AVRCP) as /devices/virtual/input/input29
usb 1-3: new full-speed USB device number 9 using xhci_hcd
usb 1-3: New USB device found, idVendor=0a12, idProduct=0001, bcdDevice=88.91
usb 1-3: New USB device strings: Mfr=0, Product=2, SerialNumber=0
usb 1-3: Product: BT DONGLE10
Bluetooth: hci1: CSR: Unbranded CSR clone detected; adding workarounds...

Controller shows up:

root@miraculix:/tmp# hciconfig hci1
hci1:   Type: Primary  Bus: USB
BD Address: 00:1A:7D:DA:71:13  ACL MTU: 679:8  SCO MTU: 48:16
DOWN 
RX bytes:734 acl:0 sco:0 events:24 errors:0
TX bytes:74 acl:0 sco:0 commands:24 errors:0

But trying to bring it up results in:

root@miraculix:/tmp# hciconfig hci1 up
Can't init device hci1: Invalid argument (22)


and the workaround messages is repeated in the kernel log along with the
new error message:

 Bluetooth: hci1: CSR: Unbranded CSR clone detected; adding workarounds...
 debugfs: File 'dut_mode' in directory 'hci1' already present!

The debugfs file *is* already present prior to this. Trying to trick the
system by unmounting debugfs does not help - as expected, I guess.  The
duplicate file registration is still running.

Looks like the adapter initialisation is running twice for some reason?

This is the full lsusb -v dump for this device:



Bus 001 Device 009: ID 0a12:0001 Cambridge Silicon Radio, Ltd Bluetooth Dongle 
(HCI mode)
Device Descriptor:
  bLength18
  bDescriptorType 1
  bcdUSB   2.00
  bDeviceClass  224 Wireless
  bDeviceSubClass 1 Radio Frequency
  bDeviceProtocol 1 Bluetooth
  bMaxPacketSize064
  idVendor   0x0a12 Cambridge Silicon Radio, Ltd
  idProduct  0x0001 Bluetooth Dongle (HCI mode)
  bcdDevice   88.91
  iManufacturer   0 
  iProduct2 BT DONGLE10
  iSerial 0 
  bNumConfigurations  1
  Configuration Descriptor:
bLength 9
bDescriptorType 2
wTotalLength   0x00b1
bNumInterfaces  2
bConfigurationValue 1
iConfiguration  0 
bmAttributes 0xe0
  Self Powered
  Remote Wakeup
MaxPower  100mA
Interface Descriptor:
  bLength 9
  bDescriptorType 4
  bInterfaceNumber0
  bAlternateSetting   0
  bNumEndpoints   3
  bInterfaceClass   224 Wireless
  bInterfaceSubClass  1 Radio Frequency
  bInterfaceProtocol  1 Bluetooth
  iInterface  0 
  Endpoint Descriptor:
bLength 7
bDescriptorType 5
bEndpointAddress 0x81  EP 1 IN
bmAttributes3
  Transfer TypeInterrupt
  Synch Type   None
  Usage Type   Data
wMaxPacketSize 0x0010  1x 16 bytes
bInterval   1
  Endpoint Descriptor:
bLength 7
bDescriptorType 5
bEndpointAddress 0x02  EP 2 OUT
bmAttributes2
  Transfer TypeBulk
  Synch Type   None
  Usage Type   Data
wMaxPacketSize 0x0040  1x 64 bytes
bInterval   1
  Endpoint Descriptor:
bLength 7
bDescriptorType 5
bEndpointAddress 0x82  EP 2 IN
bmAttributes2
  Transfer TypeBulk
  Synch Type   None
  Usage Type   Data
wMaxPacketSize 0x0040  1x 64 bytes
bInterval   1
Interface Descriptor:
  bLength 9
  bDescriptorType 4
  bInterfaceNumber1
  bAlternateSetting   0
  bNumEndpoints   2
  bInterfaceClass   224 

Processed: Re: Bug#1002460: linux-image-amd64: Missing kernel configuration for Microsoft Laptops and Surface devices

2021-12-22 Thread Debian Bug Tracking System
Processing control commands:

> reassign -1 src:linux
Bug #1002460 [src:linux] linux-image-amd64: Missing kernel configuration for 
Microsoft Laptops and Surface devices
Ignoring request to reassign bug #1002460 to the same package

-- 
1002460: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002460
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: reassign 1002460 to src:linux

2021-12-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 1002460 src:linux 5.15.5-1
Bug #1002460 [src:linux] linux-image-amd64: Missing kernel configuration for 
Microsoft Laptops and Surface devices
Ignoring request to reassign bug #1002460 to the same package
Bug #1002460 [src:linux] linux-image-amd64: Missing kernel configuration for 
Microsoft Laptops and Surface devices
Marked as found in versions linux/5.15.5-1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1002460: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002460
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1002460: linux-image-amd64: Missing kernel configuration for Microsoft Laptops and Surface devices

2021-12-22 Thread Vincent Blut
Control: reassign -1 src:linux

Hi Matthias,

Le 2021-12-22 14:07, Matthias Brennwald a écrit :
> Package: linux-image-amd64
> Version: 5.15.5-1
> Severity: normal
> X-Debbugs-Cc: mbren...@gmail.com
> 
> Dear Maintainer,
> 
> Some features for Linux on Microsoft Laptops and Surface devices that were
> implemented in the 5.13+ Linux kernel are not configured with the kernels
> provided by Debian.
> 
> Full details (including a suggested fix) are available here:
> https://github.com/linux-surface/linux-surface/issues/683

I'll work on this later today.

Cheers,
Vincent


signature.asc
Description: PGP signature


Processed: Re: Bug#1002460: linux-image-amd64: Missing kernel configuration for Microsoft Laptops and Surface devices

2021-12-22 Thread Debian Bug Tracking System
Processing control commands:

> reassign -1 src:linux
Bug #1002460 [linux-image-amd64] linux-image-amd64: Missing kernel 
configuration for Microsoft Laptops and Surface devices
Bug reassigned from package 'linux-image-amd64' to 'src:linux'.
No longer marked as found in versions linux-signed-amd64/5.15.5+1.
Ignoring request to alter fixed versions of bug #1002460 to the same values 
previously set

-- 
1002460: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002460
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



linux_5.16~rc6-1~exp1_source.changes ACCEPTED into experimental, experimental

2021-12-22 Thread Debian FTP Masters



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Mon, 20 Dec 2021 22:47:25 +0100
Source: linux
Architecture: source
Version: 5.16~rc6-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Changes:
 linux (5.16~rc6-1~exp1) experimental; urgency=medium
 .
   * New upstream release candidate
 .
   [ Aurelien Jarno ]
   * [riscv64] Improve HiFive Unmatched support: enable INPUT_DA9063_ONKEY,
 MFD_DA9063, REGULATOR_DA9063, RTC_DRV_DA9063, DA9063_WATCHDOG.
 .
   [ Salvatore Bonaccorso ]
   * xen/blkfront: harden blkfront against event channel storms (CVE-2021-28711)
   * xen/netfront: harden netfront against event channel storms (CVE-2021-28712)
   * xen/console: harden hvc_xen against event channel storms (CVE-2021-28713)
   * xen/netback: fix rx queue stall detection (CVE-2021-28714)
   * xen/netback: don't queue unlimited number of packages (CVE-2021-28715)
Checksums-Sha1:
 84e75c1f16b38d88d7b93a0d26f6e16337b05fbf 198878 linux_5.16~rc6-1~exp1.dsc
 da3f083f4082c0ca2c68ce20187e7cf3b7a569ca 129131140 linux_5.16~rc6.orig.tar.xz
 e1edb2a9f9e6a26675b576de13d99118079d63f4 1272480 
linux_5.16~rc6-1~exp1.debian.tar.xz
 d0209e66adf51702f54938a9567533791ee12b88 6384 
linux_5.16~rc6-1~exp1_source.buildinfo
Checksums-Sha256:
 cc3c8105597d97e8d4e49fa66f8fbd71577a59f13834ba16511b9b27f4d132c8 198878 
linux_5.16~rc6-1~exp1.dsc
 d4feeb2c34fef38e277268f9b1693ee42103ab40757d9c14060c40ebababe364 129131140 
linux_5.16~rc6.orig.tar.xz
 1abaae81586b0aa1c53fc7895d71ddea746b303aa766335b2dcc6af9928ce8a3 1272480 
linux_5.16~rc6-1~exp1.debian.tar.xz
 f4d38f7c9d7cde40058ff41bacf2203b7300ca49bedcd51e1a85c763353887d4 6384 
linux_5.16~rc6-1~exp1_source.buildinfo
Files:
 36832ece80f356226e4c976433a8db3e 198878 kernel optional 
linux_5.16~rc6-1~exp1.dsc
 c3ab873f50a10c53351c6187925e458d 129131140 kernel optional 
linux_5.16~rc6.orig.tar.xz
 49738ecabd698ced0b30e4ceeeda031e 1272480 kernel optional 
linux_5.16~rc6-1~exp1.debian.tar.xz
 8d48d1ab911974bb67187e7e5ba026db 6384 kernel optional 
linux_5.16~rc6-1~exp1_source.buildinfo

-BEGIN PGP SIGNATURE-
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=f0/x
-END PGP SIGNATURE-


Thank you for your contribution to Debian.



Bug#1002460: linux-image-amd64: Missing kernel configuration for Microsoft Laptops and Surface devices

2021-12-22 Thread Matthias Brennwald
Package: linux-image-amd64
Version: 5.15.5-1
Severity: normal
X-Debbugs-Cc: mbren...@gmail.com

Dear Maintainer,

Some features for Linux on Microsoft Laptops and Surface devices that were
implemented in the 5.13+ Linux kernel are not configured with the kernels
provided by Debian.

Full details (including a suggested fix) are available here:
https://github.com/linux-surface/linux-surface/issues/683


-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.15.0-2-amd64 (SMP w/8 CPU threads)
Kernel taint flags: TAINT_USER, TAINT_OOT_MODULE
Locale: LANG=en_CH.UTF-8, LC_CTYPE=en_CH.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages linux-image-amd64 depends on:
ii  linux-image-5.15.0-2-amd64  5.15.5-1

linux-image-amd64 recommends no packages.

linux-image-amd64 suggests no packages.

-- no debconf information



Bug#1000616: marked as done (Kernel list_del corruption. next->prev should be ...)

2021-12-22 Thread Debian Bug Tracking System
Your message dated Wed, 22 Dec 2021 10:33:44 +0100
with message-id 
and subject line Re: Bug#1000616: Kernel list_del corruption. next->prev should 
be ...
has caused the Debian Bug report #1000616,
regarding Kernel list_del corruption. next->prev should be ...
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1000616: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1000616
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---

Package: linux-image-5.15.0-1-amd64
Version: 5.15.3-1

I often hit this bug here, often shortly before others are hit which 
render the system unusable.

Here the dmesg log section from pstore:


<3>[  257.036085] list_del corruption. next->prev should be 
dfd4c8b732c8, but was 98adb59f5830

<4>[  257.036115] [ cut here ]
<2>[  257.036117] kernel BUG at lib/list_debug.c:54!
<4>[  257.036129] invalid opcode:  [#1] SMP NOPTI
<4>[  257.036137] CPU: 1 PID: 3955 Comm: xdg-document-po Tainted: 
G  I   5.15.0-1-amd64 #1  Debian 5.15.3-1
<4>[  257.036146] Hardware name: LENOVO 20CLS2LJ00/20CLS2LJ00, BIOS 
N10ET38W (1.17 ) 08/20/2015

<4>[  257.036150] RIP: 0010:__list_del_entry_valid.cold+0x1d/0x47
<4>[  257.036164] Code: c7 c7 d8 c5 d5 aa e8 32 f7 fe ff 0f 0b 48 89 fe 
48 c7 c7 68 c6 d5 aa e8 21 f7 fe ff 0f 0b 48 c7 c7 18 c7 d5 aa e8 13 f7 
fe ff <0f> 0b 48 89 f2 48 89 fe 48 c7 c7 d8 c6 d5 aa e8 ff f6 fe ff 0f 0b

<4>[  257.036170] RSP: 0018:a6ba0182b958 EFLAGS: 00010046
<4>[  257.036178] RAX: 0054 RBX: a6ba0182bab0 RCX: 


dmesg-efi-163787479303001:
Oops#1 Part3
<4>[  257.036183] RDX:  RSI: 98afc5c60880 RDI: 
98afc5c60880
<4>[  257.036188] RBP: dfd4c8b732c0 R08:  R09: 
a6ba0182b788
<4>[  257.036192] R10: a6ba0182b780 R11: ab2d21c8 R12: 
0002
<4>[  257.036197] R13: a6ba0182bae0 R14: a6ba0182b998 R15: 
dfd4c8b73248
<4>[  257.036202] FS:  7f3313ed5380() GS:98afc5c4() 
knlGS:

<4>[  257.036208] CS:  0010 DS:  ES:  CR0: 80050033
<4>[  257.036213] CR2: 7f5434002078 CR3: 35acc005 CR4: 
003706e0

<4>[  257.036219] Call Trace:
<4>[  257.036224]  
<4>[  257.036228]  release_pages+0x2eb/0x510
<4>[  257.036244]  __pagevec_release+0x1c/0x50
<4>[  257.036254]  truncate_inode_pages_range+0x157/0x520
<4>[  257.036264]  ? schedule+0x44/0xa0
<4>[  257.036271]  ? schedule_hrtimeout_range_clock+0x9d/0x120
<4>[  257.036281]  ? __inode_wait_for_writeback+0x7e/0xf0
<4>[  257.036294]  fuse_evict_inode+0x16/0xd0 [fuse]
<4>[  257.036320]  evict+0xce/0x180
<4>[  257.036330]  __dentry_kill+0xe1/0x180
<4>[  257.036337]  shrink_dentry_list+0x4e/0xc0
<4>[  257.036344]  shrink_dcache_parent+0xd1/0x120
<4>[  257.036352]  d_invalidate+0x66/0xe0
<4>[  257.036359]  ? dput+0x32/0x300
<4>[  257.036366]  fuse_reverse_inval_entry+0xbd/0x1e0 [fuse]
<4>[  257.036385]  fuse_dev_do_write+0x54b/0xee0 [fuse]
<4>[  257.036404]  ? __pollwait+0xd0/0xd0
<4>[  257.036416]  fuse_dev_write+0x4f/0x80 [fuse]
<4>[  257.036449]  do_iter_readv_writev+0x14f/0x1b0
<4>[  257.036462]  do_iter_write+0x7c/0x1c0
<4>[  257.036473]  vfs_writev+0xaa/0x140
<4>[  257.036485]  ? ktime_get_ts64+0x49/0xf0
<4>[  257.036494]  do_writev+0x6b/0x110
<4>[  257.036505]  do_syscall_64+0x38/0xc0
<4>[  257.036512]  entry_SYSCALL_64_after_hwframe+0x44/0xae
dmesg-efi-163787479302001:
Oops#1 Part2
<4>[  257.036523] RIP: 0033:0x7f3314351a6d
<4>[  257.036529] Code: 28 89 54 24 1c 48 89 74 24 10 89 7c 24 08 e8 6a 
f9 f8 ff 8b 54 24 1c 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 14 00 00 00 
0f 05 <48> 3d 00 f0 ff ff 77 33 44 89 c7 48 89 44 24 08 e8 be f9 f8 ff 48
<4>[  257.036535] RSP: 002b:7ffde2997830 EFLAGS: 0293 ORIG_RAX: 
0014
<4>[  257.036543] RAX: ffda RBX: 0003 RCX: 
7f3314351a6d
<4>[  257.036547] RDX: 0003 RSI: 7ffde29978a0 RDI: 
0007
<4>[  257.036552] RBP: 7ffde29978a0 R08:  R09: 
7f33145b82c0
<4>[  257.036556] R10: 7f3333a0 R11: 0293 R12: 
563a24a49690
<4>[  257.036560] R13: 0003 R14: 7f333440 R15: 
563a24a1f8c0

<4>[  257.036567]  
<4>[  257.036570] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer 
snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device 
xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 
xt_tcpudp nft_compat iscsi_target_mod target_core_mod nft_masq 
nft_counter nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 
nf_defrag_ipv4 

Bug#1000616: Kernel list_del corruption. next->prev should be ...

2021-12-22 Thread Kai Lüke
With 5.16~rc4-1~exp1 I couldn't reproduce it, the system is running for 
8 days now and I also filled my swap while doing some small tasks but 
nothing triggered it.