Bug#1041363: nft BUG: kernel NULL pointer dereference, address: 0000000000000038

2023-07-17 Thread Daniel Gröber
Package: src:linux
Version: 6.1.27-1
Severity: normal

Dear Maintainer,

I got the following BUG on my router while working on my nftables
ruleset. After this happened network connectivity was broken quite severely
so some internal state might have gotten messed up too. An attempted reboot
never completed and a hard power cut was necessary.

kernel: BUG: kernel NULL pointer dereference, address: 0038
kernel: #PF: supervisor read access in kernel mode
kernel: #PF: error_code(0x) - not-present page
kernel: PGD 0 P4D 0 
kernel: Oops:  [#1] PREEMPT SMP NOPTI
kernel: CPU: 2 PID: 902522 Comm: kworker/2:3 Tainted: GW  
6.1.0-9-amd64 #1  Debian 6.1.27-1
kernel: Hardware name: PC Engines apu3/apu3, BIOS v4.11.0.3 01/29/2020
kernel: Workqueue: events nf_tables_trans_destroy_work [nf_tables]
kernel: RIP: 0010:nft_set_elem_expr_destroy+0x56/0xa0 [nf_tables]
kernel: Code: 6b 20 d9 48 8b 03 48 8b 40 78 48 8b 78 30 e8 f1 6e 54 d8 48 
8b 03 8b 40 10 01 c5 48 01 c3 41 0f b6 04 24 39 c5 73 2f 48 8b 13 <48> 8b 42 38 
48 85 c0 75 c5>
kernel: RSP: 0018:b4e1484cfd28 EFLAGS: 00010246
kernel: RAX:  RBX: 940746193d08 RCX: 940764e89200
kernel: RDX:  RSI: 940746193d00 RDI: b4e1484cfd58
kernel: RBP:  R08: 0003 R09: 8020001d
kernel: R10:  R11:  R12: 940746193d00
kernel: R13: b4e1484cfd58 R14: dead0122 R15: 940746c23e80
kernel: FS:  () GS:9407b5f0() 
knlGS:
kernel: CS:  0010 DS:  ES:  CR0: 80050033
kernel: CR2: 0038 CR3: 6eac2000 CR4: 000406e0
kernel: Call Trace:
kernel:  
kernel:  nft_set_elem_destroy+0xe5/0x100 [nf_tables]
kernel:  nft_set_pipapo_match_destroy+0x65/0x80 [nf_tables]
kernel:  nft_pipapo_destroy+0x2e/0x1b0 [nf_tables]
kernel:  nft_set_destroy+0x95/0x120 [nf_tables]
kernel:  nf_tables_trans_destroy_work+0x303/0x330 [nf_tables]
kernel:  process_one_work+0x1c7/0x380
kernel:  worker_thread+0x4d/0x380
kernel:  ? _raw_spin_lock_irqsave+0x23/0x50
kernel:  ? rescuer_thread+0x3a0/0x3a0
kernel:  kthread+0xe9/0x110
kernel:  ? kthread_complete_and_exit+0x20/0x20
kernel:  ret_from_fork+0x22/0x30
kernel:  
kernel: Modules linked in: mptcp_diag sctp_diag raw_diag unix_diag 
af_packet_diag netlink_diag nf_conntrack_netlink sctp udp_diag tcp_diag 
inet_diag ip_set_hash_ip ip_s>
kernel:  zstd_compress raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c crc32c_generic raid1 raid0 
multipath cdc_ether l>
kernel: CR2: 0038
kernel: ---[ end trace  ]---
kernel: RIP: 0010:nft_set_elem_expr_destroy+0x56/0xa0 [nf_tables]
kernel: Code: 6b 20 d9 48 8b 03 48 8b 40 78 48 8b 78 30 e8 f1 6e 54 d8 48 
8b 03 8b 40 10 01 c5 48 01 c3 41 0f b6 04 24 39 c5 73 2f 48 8b 13 <48> 8b 42 38 
48 85 c0 75 c5>
kernel: RSP: 0018:b4e1484cfd28 EFLAGS: 00010246
kernel: RAX:  RBX: 940746193d08 RCX: 940764e89200
kernel: RDX:  RSI: 940746193d00 RDI: b4e1484cfd58
kernel: RBP:  R08: 0003 R09: 8020001d
kernel: R10:  R11:  R12: 940746193d00
kernel: R13: b4e1484cfd58 R14: dead0122 R15: 940746c23e80
kernel: FS:  () GS:9407b5f0() 
knlGS:
kernel: CS:  0010 DS:  ES:  CR0: 80050033
kernel: CR2: 0038 CR3: 6eac2000 CR4: 000406e0
kernel: note: kworker/2:3[902522] exited with irqs disabled

Thanks,
--Daniel

-- System Information:
Debian Release: 12.0
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'stable-security'), (500, 'stable-debug'), 
(500, 'proposed-updates-debug')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.1.0-9-amd64 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled



linux_6.1.27-1~bpo11+1_source.changes ACCEPTED into bullseye-backports

2023-07-17 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Sun, 23 Apr 2023 16:34:02 +0200
Source: linux
Architecture: source
Version: 6.1.27-1~bpo11+1
Distribution: bullseye-backports
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Ben Hutchings 
Closes: 871216 1033058 1033232 1033329
Changes:
 linux (6.1.27-1~bpo11+1) bullseye-backports; urgency=medium
 .
   * Rebuild for bullseye-backports:
 - Set ABI to 0.deb11.9
 .
 linux (6.1.27-1) unstable; urgency=medium
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.26
 - [arm64] dts: qcom: ipq8074-hk01: enable QMP device, not the PHY node
 - netfilter: br_netfilter: fix recent physdev match breakage
 - netfilter: nf_tables: Modify nla_memdup's flag to GFP_KERNEL_ACCOUNT
 - [arm64,armhf] regulator: fan53555: Explicitly include bits header
 - [arm64,armhf] regulator: fan53555: Fix wrong TCS_SLEW_MASK
 - net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg
   (CVE-2023-31436)
 - virtio_net: bugfix overflow inside xdp_linearize_page()
 - sfc: Fix use-after-free due to selftest_work
 - netfilter: nf_tables: fix ifdef to also consider nf_tables=m
 - i40e: fix accessing vsi->active_filters without holding lock
 - i40e: fix i40e_setup_misc_vector() error handling
 - netfilter: nf_tables: validate catch-all set elements
 - netfilter: nf_tables: tighten netlink attribute requirements for 
catch-all
   elements
 - bnxt_en: Do not initialize PTP on older P3/P4 chips
 - mlxfw: fix null-ptr-deref in mlxfw_mfa2_tlv_next()
 - bonding: Fix memory leak when changing bond type to Ethernet
 - net: rpl: fix rpl header size calculation
 - [arm64] spi: spi-rockchip: Fix missing unwind goto in 
rockchip_sfc_probe()
 - bpf: Fix incorrect verifier pruning due to missing register precision
   taints
 - e1000e: Disable TSO on i219-LM card to increase speed
 - net: bridge: switchdev: don't notify FDB entries with "master dynamic"
 - f2fs: Fix f2fs_truncate_partial_nodes ftrace event
 - [x86] platform/x86/intel: vsec: Fix a memory leak in intel_vsec_add_aux
 - [x86] platform/x86 (gigabyte-wmi): Add support for A320M-S2H V2
 - scsi: megaraid_sas: Fix fw_crash_buffer_show()
 - scsi: core: Improve scsi_vpd_inquiry() checks
 - [x86] platform/x86: gigabyte-wmi: add support for B650 AORUS ELITE AX
 - [s390x] ptrace: fix PTRACE_GET_LAST_BREAK error handling
 - drm: buddy_allocator: Fix buddy allocator init on 32-bit systems
 - nvme-tcp: fix a possible UAF when failing to allocate an io queue
 - xen/netback: use same error messages for same errors
 - [x86] platform/x86: gigabyte-wmi: add support for X570S AORUS ELITE
 - [x86] platform/x86: asus-nb-wmi: Add quirk_asus_tablet_mode to other ROG
   Flow X13 models
 - mtd: spi-nor: fix memory leak when using debugfs_lookup()
 - Revert "userfaultfd: don't fail on unrecognized features"
 - drm/amdgpu/vcn: Disable indirect SRAM on Vangogh broken BIOSes
 - iio: dac: ad5755: Add missing fwnode_handle_put()
 - iio: light: tsl2772: fix reading proximity-diodes from device tree
 - ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook
 - btrfs: get the next extent map during fiemap/lseek more efficiently
 - maple_tree: make maple state reusable after mas_empty_area_rev()
 - maple_tree: fix mas_empty_area() search
 - maple_tree: fix a potential memory leak, OOB access, or other
   unpredictable bug
 - nilfs2: initialize unused bytes in segment summary blocks
 - memstick: fix memory leak if card device is never registered
 - kernel/sys.c: fix and improve control flow in __sys_setres[ug]id()
 - writeback, cgroup: fix null-ptr-deref write in bdi_split_work_to_wbs
 - [arm64] mmc: sdhci_am654: Set HIGH_SPEED_ENA for SDR12 and SDR25
 - [x86] drm/i915: Fix fast wake AUX sync len
 - drm/amdgpu: Fix desktop freezed after gpu-reset
 - drm/amd/display: set dcn315 lb bpp to 48
 - [arm64] drm/rockchip: vop2: fix suspend/resume
 - [arm64] drm/rockchip: vop2: Use regcache_sync() to fix suspend/resume
 - mm/userfaultfd: fix uffd-wp handling for THP migration entries
 - mm/khugepaged: check again on anon uffd-wp during isolation
 - mm/huge_memory.c: warn with pr_warn_ratelimited instead of
   VM_WARN_ON_ONCE_FOLIO
 - mm: kmsan: handle alloc failures in kmsan_ioremap_page_range()
 - mm: kmsan: handle alloc failures in kmsan_vmap_pages_range_noflush()
 - mm: page_alloc: skip regions with hugetlbfs pages when allocating 1G 
pages
 - mm/mmap: regression fix for unmapped_area{_topdown}
 - sched/fair: Detect capacity inversion
 - sched/fair: Consider capacity inversion in util_fits_cpu()
 - sched/fair: Fixes for capacity inversion detection
 - [arm64] KVM: 

firmware-nonfree_20230210-5~bpo11+1_source.changes ACCEPTED into bullseye-backports

2023-07-17 Thread Debian FTP Masters
Thank you for your contribution to Debian.



Accepted:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 21 Jun 2023 00:17:14 +0200
Source: firmware-nonfree
Architecture: source
Version: 20230210-5~bpo11+1
Distribution: bullseye-backports
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Ben Hutchings 
Closes: 1035282
Changes:
 firmware-nonfree (20230210-5~bpo11+1) bullseye-backports; urgency=medium
 .
   * Rebuild for bullseye-backports
   * Update to linux-support 5.10.0-23
 .
 firmware-nonfree (20230210-5) unstable; urgency=medium
 .
   * brcm80211: brcm: rename Rock960 NVRAM to AP6356S and link devices to it
 (Closes: #1035282)
   * Update to linux-support 6.1.0-8
Checksums-Sha1:
 2c4e4185fd8660ba577930191f81bbb1d931814f 3937 
firmware-nonfree_20230210-5~bpo11+1.dsc
 9c113f1b6df7d3c681e50ae9a26f47e21002845f 829052 
firmware-nonfree_20230210-5~bpo11+1.debian.tar.xz
 cff7110d3630d1441140e98551adbcd754d8c86f 5722 
firmware-nonfree_20230210-5~bpo11+1_source.buildinfo
Checksums-Sha256:
 b0991e7428221738b86b7c55f37fb39caf8b6b9519b3e1d135e3c1635f7cdac1 3937 
firmware-nonfree_20230210-5~bpo11+1.dsc
 6845d19bd8acd4466256cd29e12203ec6f2f63b8f7ca99a1ab8a91cf82822018 829052 
firmware-nonfree_20230210-5~bpo11+1.debian.tar.xz
 7145a7936dcfb010ae7b26d38ce387dca8c33d80a82ca1d931054ac886fcb5fd 5722 
firmware-nonfree_20230210-5~bpo11+1_source.buildinfo
Files:
 8849dafadeac870809aca83751a23d3f 3937 non-free/kernel optional 
firmware-nonfree_20230210-5~bpo11+1.dsc
 92939c6614d4b7147ef1c5715bb51b67 829052 non-free/kernel optional 
firmware-nonfree_20230210-5~bpo11+1.debian.tar.xz
 6b574b2d88157d4aba09a4c71ffb7ae1 5722 non-free/kernel optional 
firmware-nonfree_20230210-5~bpo11+1_source.buildinfo

-BEGIN PGP SIGNATURE-
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=f/ed
-END PGP SIGNATURE-



Bug#1040343: linux-image-5.10.0-9-amd64: Kernel silenty de-supported nfsv3 UDP mounts

2023-07-17 Thread Ben Hutchings
On Mon, 2023-07-17 at 09:05 +0200, Hauke Fath wrote:
> On Sun, 16 Jul 2023 20:14:20 +0200, Ben Hutchings wrote:
> > > 
> > > nfsv3 over tcp works, but is subobtimal , as described - when the router 
> > > goes down, the tcp mounts will hang, and the machine will have to be 
> > > rebooted.
> > [...]
> > 
> > Does this mean you are using the "soft" mount option?  Without that, I
> > would expect access to the mount to hang until the network connection
> > is restored, regardless of whether the TCP or UDP transport is used.
> 
> No, we use hard mounts.
> 
> But the router's package filter will have lost state after a reboot, 
> and reject packets from tcp connections that the clients assume to 
> exist. This is not a problem with udp, because connection-less.

Ah, I see.  You didn't mention that there was dynamic NAT involved
before.

If an NFS server is rebooted abruptly (so it doesn't properly close TCP
connections), once it's back up it will respond to any requests from
clients with a TCP RST, and they should reconnect.

If a NAT router between client and server is rebooted, I think that
something similar should happen, but the router would need to send the
TCP RST instead.

Is your router configured to send a TCP RST when receiving a packet for
an unknown connection, or does it just drop those packets?  (In
iptables this is the difference between REJECT and DROP policies.)

Ben.

-- 
Ben Hutchings
Never attribute to conspiracy what can adequately be explained
by stupidity.



signature.asc
Description: This is a digitally signed message part


[bts-link] source package src:linux

2023-07-17 Thread debian-bts-link
#
# bts-link upstream status pull for source package src:linux
# see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
# https://bts-link-team.pages.debian.net/bts-link/
#

user debian-bts-l...@lists.debian.org

# remote status report for #1036004 (http://bugs.debian.org/1036004)
# Bug title: Strange keyboard issues on ASUS TUF Gaming A16 Advantage Edition, 
model FA617XT
#  * http://bugzilla.kernel.org/show_bug.cgi?id=217336
#  * remote status changed: ASSIGNED -> RESOLVED
#  * remote resolution changed: (?) -> CODE-FIX
#  * closed upstream
tags 1036004 + fixed-upstream
usertags 1036004 - status-ASSIGNED
usertags 1036004 + status-RESOLVED resolution-CODE-FIX

thanks



Processed: [bts-link] source package src:linux

2023-07-17 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> #
> # bts-link upstream status pull for source package src:linux
> # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
> # https://bts-link-team.pages.debian.net/bts-link/
> #
> user debian-bts-l...@lists.debian.org
Setting user to debian-bts-l...@lists.debian.org (was 
debian-bts-l...@lists.debian.org).
> # remote status report for #1036004 (http://bugs.debian.org/1036004)
> # Bug title: Strange keyboard issues on ASUS TUF Gaming A16 Advantage 
> Edition, model FA617XT
> #  * http://bugzilla.kernel.org/show_bug.cgi?id=217336
> #  * remote status changed: ASSIGNED -> RESOLVED
> #  * remote resolution changed: (?) -> CODE-FIX
> #  * closed upstream
> tags 1036004 + fixed-upstream
Bug #1036004 [src:linux] Strange keyboard issues on ASUS TUF Gaming A16 
Advantage Edition, model FA617XT
Added tag(s) fixed-upstream.
> usertags 1036004 - status-ASSIGNED
Usertags were: status-ASSIGNED.
There are now no usertags set.
> usertags 1036004 + status-RESOLVED resolution-CODE-FIX
There were no usertags set.
Usertags are now: status-RESOLVED resolution-CODE-FIX.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1036004: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036004
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1041338: linux autopkg test blocks gcc-12 migration

2023-07-17 Thread Matthias Klose

Package: src:linux
Version: 6.3.7-1
Severity: serious
Tags: sid trixie

seen on amd64, the issue doesn't look related to gcc-12.

see
https://ci.debian.net/data/autopkgtest/testing/amd64/l/linux/35917919/log.gz

[...]
56sgcc-12 
-Wp,-MMD,/tmp/autopkgtest-lxc.f52ni744/downtmp/autopkgtest_tmp/foo/.foo.mod.o.d 
-nostdinc -I/usr/src/linux-headers-6.3.0-1-common/arch/x86/include 
-I./arch/x86/include/generated -I/usr/src/linux-headers-6.3.0-1-common/include 
-I./include -I/usr/src/linux-headers-6.3.0-1-common/arch/x86/include/uapi 
-I./arch/x86/include/generated/uapi 
-I/usr/src/linux-headers-6.3.0-1-common/include/uapi -I./include/generated/uapi 
-include /usr/src/linux-headers-6.3.0-1-common/include/linux/compiler-version.h 
-include /usr/src/linux-headers-6.3.0-1-common/include/linux/kconfig.h -include 
/usr/src/linux-headers-6.3.0-1-common/include/linux/compiler_types.h 
-D__KERNEL__ -fmacro-prefix-map=/usr/src/linux-headers-6.3.0-1-common/= -Wall 
-Wundef -Werror=strict-prototypes -Wno-trigraphs -fno-strict-aliasing 
-fno-common -fshort-wchar -fno-PIE -Werror=implicit-function-declaration 
-Werror=implicit-int -Werror=return-type -Wno-format-security -funsigned-char 
-std=gnu11 -mno-sse -mno-mmx -mno-sse2 -mno-3dnow -mno-avx 
-fcf-protection=branch -fno-jump-tables -m64 -falign-jumps=1 -falign-loops=1 
-mno-80387 -mno-fp-ret-in-387 -mpreferred-stack-boundary=3 -mskip-rax-setup 
-mtune=generic -mno-red-zone -mcmodel=kernel -Wno-sign-compare 
-fno-asynchronous-unwind-tables -mindirect-branch=thunk-extern 
-mindirect-branch-register -mindirect-branch-cs-prefix 
-mfunction-return=thunk-extern -fno-jump-tables -mharden-sls=all 
-fpatchable-function-entry=16,16 -fno-delete-null-pointer-checks 
-Wno-frame-address -Wno-format-truncation -Wno-format-overflow 
-Wno-address-of-packed-member -O2 -fno-allow-store-data-races 
-Wframe-larger-than=2048 -fstack-protector-strong -Wno-main 
-Wno-unused-but-set-variable -Wno-unused-const-variable -Wno-dangling-pointer 
-ftrivial-auto-var-init=zero -fno-stack-clash-protection -pg -mrecord-mcount 
-mfentry -DCC_USING_FENTRY -falign-functions=16 -Wdeclaration-after-statement 
-Wvla -Wno-pointer-sign -Wcast-function-type -Wno-stringop-truncation 
-Wno-stringop-overflow -Wno-restrict -Wno-maybe-uninitialized -Wno-array-bounds 
-Wno-alloc-size-larger-than -Wimplicit-fallthrough=5 -fno-strict-overflow 
-fno-stack-check -fconserve-stack -Werror=date-time 
-Werror=incompatible-pointer-types -Werror=designated-init 
-Wno-packed-not-aligned -g -DMODULE -DKBUILD_BASENAME='"foo.mod"' 
-DKBUILD_MODNAME='"foo"' -D__KBUILD_MODNAME=kmod_foo -c -o 
/tmp/autopkgtest-lxc.f52ni744/downtmp/autopkgtest_tmp/foo/foo.mod.o 
/tmp/autopkgtest-lxc.f52ni744/downtmp/autopkgtest_tmp/foo/foo.mod.c
 57s /tmp/autopkgtest-lxc.f52ni744/downtmp/autopkgtest_tmp/foo/foo.mod.c:10:10: 
fatal error: asm/orc_header.h: No such file or directory

 57s10 | #include 
 57s   |  ^~
 57s compilation terminated.
 57s make[1]: *** 
[/usr/src/linux-headers-6.3.0-1-common/scripts/Makefile.modfinal:29: 
/tmp/autopkgtest-lxc.f52ni744/downtmp/autopkgtest_tmp/foo/foo.mod.o] Error 1

 57s make: Leaving directory '/usr/src/linux-headers-6.3.0-1-cloud-amd64'
 57s make: *** [/usr/src/linux-headers-6.3.0-1-common/Makefile:1967: modules] 
Error 2

 57s I: Clean
 57s E: Unexpected warning/error messages
 57s make: Entering directory '/usr/src/linux-headers-6.3.0-1-cloud-amd64'
 57s make -f /usr/src/linux-headers-6.3.0-1-common/scripts/Makefile.clean 
obj=/tmp/autopkgtest-lxc.f52ni744/downtmp/autopkgtest_tmp/foo
 57s # CLEAN 
/tmp/autopkgtest-lxc.f52ni744/downtmp/autopkgtest_tmp/foo/Module.symvers
 57s   rm -rf 
/tmp/autopkgtest-lxc.f52ni744/downtmp/autopkgtest_tmp/foo/Module.symvers 
/tmp/autopkgtest-lxc.f52ni744/downtmp/autopkgtest_tmp/foo/modules.nsdeps 
/tmp/autopkgtest-lxc.f52ni744/downtmp/autopkgtest_tmp/foo/compile_commands.json 
/tmp/autopkgtest-lxc.f52ni744/downtmp/autopkgtest_tmp/foo/.thinlto-cache

 57s make: Leaving directory '/usr/src/linux-headers-6.3.0-1-cloud-amd64'
 57s autopkgtest [03:20:42]: test kbuild: ---]
 57s autopkgtest [03:20:42]: test kbuild:  - - - - - - - - - - results - - - - 
- - - - - -

 57s kbuild   FAIL stderr: E: Unexpected warning/error messages



Re: Debian Kernel version and ABI in respect of #1040901

2023-07-17 Thread Bastian Blank
On Fri, Jul 14, 2023 at 04:17:34PM +0200, Ben Hutchings wrote:
> On Thu, 2023-07-13 at 21:16 +0200, Bastian Blank wrote:
> [...]
> > ## Proposed behaviour
> > 
> > This tries to make sure everything apart from experimental gets new
> > names and ABI on every upload.
> > 
> > * experimental:
> > Keep version 6.1~rc2-3~exp4, 6.1.2-3~exp4
> > Keep ABI 6.1.0-0-arm64
> Why would that still be acceptable in experimental?

What do you mean?  We don't check for any ABI incompatibilities forever
in experimental builds.  And the signature check will refuse to load
modules not from the same build if lockdown is enabled.

So the ABI as listed in the image and the package just means it is
provided in the same package and can be upgraded directly.

We can also decide that we don't want to make it that explicit and do:

ABI/package name only includes upstream version (6.1.1) and multiple
Debian revisions of that will be incompable to each other on lockdown
systems, but may work (depending on symvers) on non-lockdown systems.

It does not happen often that we do multiple Debian revisions of most
upstream version anyway, so people will only feel that if they upgrade
directly from backports to a different release of the same version.

Bastian

-- 
Fascinating, a totally parochial attitude.
-- Spock, "Metamorphosis", stardate 3219.8



Re: Debian Kernel version and ABI in respect of #1040901

2023-07-17 Thread Bastian Blank
Hi

On Thu, Jul 13, 2023 at 11:28:31PM +0300, Adrian Bunk wrote:
> On Thu, Jul 13, 2023 at 09:16:15PM +0200, Bastian Blank wrote:
> > ### NMU
> > Can be easily added back by adding "bX" or so to the ABI.
> That would be confusing, bX is naming convention for binNMUs in Debian 
> revisions.

Right.

> > ### BinNMU
> > 
> > Is impossible to support.  The version change requires changes in the
> > names of the created packages.
> >...
> It should only be impossible to make them co-installable,
> or what other reason requires a rename?

The contents are incompatible.  We can of course completely remove the
ability to load modules after a kernel upgrade and then install
everything into "linux-image-amd64".

Bastian

-- 
Deflector shields just came on, Captain.



Bug#1040343: linux-image-5.10.0-9-amd64: Kernel silenty de-supported nfsv3 UDP mounts

2023-07-17 Thread Hauke Fath
On Sun, 16 Jul 2023 20:14:20 +0200, Ben Hutchings wrote:
>> 
>> nfsv3 over tcp works, but is subobtimal , as described - when the router 
>> goes down, the tcp mounts will hang, and the machine will have to be 
>> rebooted.
> [...]
> 
> Does this mean you are using the "soft" mount option?  Without that, I
> would expect access to the mount to hang until the network connection
> is restored, regardless of whether the TCP or UDP transport is used.

No, we use hard mounts.

But the router's package filter will have lost state after a reboot, 
and reject packets from tcp connections that the clients assume to 
exist. This is not a problem with udp, because connection-less.

Cheerio,
Hauke

-- 
 The ASCII Ribbon CampaignHauke Fath
() No HTML/RTF in emailInstitut für Nachrichtentechnik
/\ No Word docs in email TU Darmstadt
 Respect for open standards  Ruf +49-6151-16-21344