Your message dated Sun, 12 Jan 2025 22:17:09 +0000 with message-id <E1tX6Gb-00AyNQ-6V@fasolo.debian.org> and subject line Bug#1092772: fixed in linux 6.1.124-1 has caused the Debian Bug report #1092772, regarding linux-image-6.1.0-29-arm64: Oops: Unable to handle kernel paging request at virtual address ffff0000e1fb238c to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1092772: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1092772 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: linux-image-6.1.0-29-arm64: Oops: Unable to handle kernel paging request at virtual address ffff0000e1fb238c
- From: Peter Gerber <peter@arbitrary.ch>
- Date: Sat, 11 Jan 2025 21:46:36 +0100
- Message-id: <[🔎] 3a6d1e1f-6f4c-4f52-8138-c796142840ad@arbitrary.ch>
- In-reply-to: <>
- References: <>
Package: src:linux Version: 6.1.123-1 Severity: critical Justification: breaks the whole system X-Debbugs-Cc: peter@arbitrary.ch Dear Maintainer, Ever since updating to linux-image-6.1.0-29-arm64 I've been seeing this oops: Jan 11 20:17:16 violet kernel: Unable to handle kernel paging request at virtual address ffff0000e1fb238c Jan 11 20:17:16 violet kernel: Mem abort info: Jan 11 20:17:16 violet kernel: ESR = 0x0000000096000021 Jan 11 20:17:16 violet kernel: EC = 0x25: DABT (current EL), IL = 32 bits Jan 11 20:17:16 violet kernel: SET = 0, FnV = 0 Jan 11 20:17:16 violet kernel: EA = 0, S1PTW = 0 Jan 11 20:17:16 violet kernel: FSC = 0x21: alignment fault Jan 11 20:17:16 violet kernel: Data abort info: Jan 11 20:17:16 violet kernel: ISV = 0, ISS = 0x00000021 Jan 11 20:17:16 violet kernel: CM = 0, WnR = 0 Jan 11 20:17:16 violet kernel: swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000be7fa000 Jan 11 20:17:16 violet kernel: [ffff0000e1fb238c] pgd=1800000139ff8003, p4d=1800000139ff8003, pud=18000001399ff003, pmd=18000001398ef003, pte=0068000121fb2f07 Jan 11 20:17:37 violet kernel: Internal error: Oops: 0000000096000021 [#1] SMP So far, only one machine used as Wireguard-based VPN is affected. There is other, identical, machines not used as VPN which have as of yet been unaffected. -- Package-specific info: ** Version: Linux version 6.1.0-29-arm64 (debian-kernel@lists.debian.org) (gcc-12 (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40) #1 SMP Debian 6.1.123-1 (2025-01-02) ** Command line: BOOT_IMAGE=/@rootfs/boot/vmlinuz-6.1.0-29-arm64 root=UUID=1111c685-9c54-4826-a942-a926fcf5cc08 ro rootflags=subvol=@rootfs consoleblank=0 systemd.show_status=true console=tty1 console=ttyS0 audit=1 slab_nomerge mds=full,nosmt nosmt=force pti=on vsyscall=none page_alloc.shuffle=1 oops=panic panic=-1 hardened_usercopy=1 iommu.passthrough=0 iommu.strict=1 init_mlocked_on_free=1 init_on_alloc=1 init_on_free=1 random.trust_cpu=off randomize_kstack_offset=on ** Not tainted ** Kernel log: [ 2.977788] systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. [ 2.979473] systemd[1]: Listening on dm-event.socket - Device-mapper event daemon FIFOs. [ 2.981849] systemd[1]: Listening on lvm2-lvmpolld.socket - LVM2 poll daemon socket. [ 2.983607] systemd[1]: Listening on systemd-fsckd.socket - fsck to fsckd communication Socket. [ 2.985584] systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe. [ 2.987703] systemd[1]: Listening on systemd-journald-audit.socket - Journal Audit Socket. [ 2.990118] systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). [ 2.992114] systemd[1]: Listening on systemd-journald.socket - Journal Socket. [ 2.994016] systemd[1]: Listening on systemd-networkd.socket - Network Service Netlink Socket. [ 2.996051] systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. [ 2.997906] systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. [ 3.019099] systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System... [ 3.022997] systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... [ 3.026019] systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... [ 3.029014] systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... [ 3.031221] systemd[1]: Finished blk-availability.service - Availability of block devices. [ 3.034827] systemd[1]: Starting keyboard-setup.service - Set the console keyboard layout... [ 3.037253] systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... [ 3.039467] systemd[1]: Starting lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... [ 3.042320] systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... [ 3.044915] systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... [ 3.047435] systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... [ 3.049934] systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... [ 3.052741] systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... [ 3.066012] systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... [ 3.076850] systemd[1]: systemd-fsck-root.service - File System Check on Root Device was skipped because of an unmet condition check (ConditionPathExists=!/run/initramfs/fsck-root). [ 3.083151] pstore: Using crash dump compression: deflate [ 3.085032] fuse: init (API version 7.38) [ 3.085907] systemd[1]: Starting systemd-journald.service - Journal Service... [ 3.087271] pstore: Registered efi as persistent store backend [ 3.090954] systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... [ 3.093917] loop: module loaded [ 3.097738] device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. [ 3.101923] ACPI: bus type drm_connector registered [ 3.107644] device-mapper: uevent: version 1.0.3 [ 3.108944] systemd[1]: Starting systemd-network-generator.service - Generate network units from Kernel command line... [ 3.111046] device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com [ 3.111467] systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... [ 3.114306] systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... [ 3.121247] systemd[1]: Mounted dev-hugepages.mount - Huge Pages File System. [ 3.128303] systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System. [ 3.129703] systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System. [ 3.131140] systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System. [ 3.143188] systemd[1]: Finished keyboard-setup.service - Set the console keyboard layout. [ 3.145123] systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. [ 3.146745] systemd[1]: Finished lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. [ 3.153799] systemd[1]: modprobe@configfs.service: Deactivated successfully. [ 3.154641] systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. [ 3.156647] systemd[1]: modprobe@dm_mod.service: Deactivated successfully. [ 3.157479] systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. [ 3.159407] systemd[1]: modprobe@drm.service: Deactivated successfully. [ 3.160184] systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. [ 3.163267] BTRFS info (device sda1: state M): turning on async discard [ 3.166036] systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. [ 3.167016] systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. [ 3.168644] systemd[1]: modprobe@fuse.service: Deactivated successfully. [ 3.169441] systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse. [ 3.170978] systemd[1]: modprobe@loop.service: Deactivated successfully. [ 3.171738] systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. [ 3.173292] systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. [ 3.174795] systemd[1]: Finished systemd-network-generator.service - Generate network units from Kernel command line. [ 3.177136] systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems. [ 3.191075] systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System... [ 3.193387] systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System... [ 3.197530] systemd[1]: Starting cloud-init-local.service - Initial cloud-init job (pre-networking)... [ 3.203949] systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). [ 3.206185] systemd[1]: Starting systemd-pstore.service - Platform Persistent Storage Archival... [ 3.208982] systemd[1]: Starting systemd-random-seed.service - Load/Save Random Seed... [ 3.210919] systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. [ 3.214318] systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... [ 3.222739] systemd[1]: Starting systemd-sysusers.service - Create System Users... [ 3.239632] systemd[1]: Started systemd-journald.service - Journal Service. [ 3.360570] systemd-journald[350]: Received client request to flush runtime journal. [ 3.370033] systemd-journald[350]: File /var/log/journal/534845c972ef4766995d8e7d018f9df3/system.journal corrupted or uncleanly shut down, renaming and replacing. [ 3.584870] sr 0:0:0:0: Attached scsi generic sg0 type 5 [ 3.592275] sd 0:0:0:1: Attached scsi generic sg1 type 0 [ 3.697839] [drm] pci: virtio-gpu-pci detected at 0000:00:01.0 [ 3.698553] [drm] features: -virgl +edid -resource_blob -host_visible [ 3.698555] [drm] features: -context_init [ 3.702787] [drm] number of scanouts: 1 [ 3.703597] [drm] number of cap sets: 0 [ 3.704930] [drm] Initialized virtio_gpu 0.1.0 0 for 0000:00:01.0 on minor 0 [ 3.715947] virtio-pci 0000:00:01.0: [drm] drm_plane_enable_fb_damage_clips() not called [ 3.715960] Console: switching to colour frame buffer device 160x50 [ 3.722605] virtio-pci 0000:00:01.0: [drm] fb0: virtio_gpudrmfb frame buffer device [ 4.765066] cfg80211: Loading compiled-in X.509 certificates for regulatory database [ 4.766246] cfg80211: Loaded X.509 cert 'benh@debian.org: 577e021cb980e0e820821ba7b54b4961b8b4fadf' [ 4.767969] cfg80211: Loaded X.509 cert 'romain.perier@gmail.com: 3abbc6ec146e09d1b6016ab9d6cf71dd233f0328' [ 4.769279] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' [ 4.771298] cfg80211: Loaded X.509 cert 'wens: 61c038651aabdcf94bd0ac7ff06c7248db18c600' [ 4.772878] platform regulatory.0: firmware: direct-loading firmware regul ** Model information atory.db [ 4.773682] platform regulatory.0: firmware: direct-loading firmware regulatory.db.p7s [ 4.797441] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. [ 4.798376] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. ** Loaded modules: wireguard libchacha20poly1305 chacha_neon poly1305_neon libcurve25519_generic libchacha ip6_udp_tunnel udp_tunnel cfg80211 rfkill nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nf_log_syslog nft_log nft_limit nft_masq nft_redir nft_ct nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 binfmt_misc nf_defrag_ipv4 nf_tables nfnetlink nls_ascii nls_cp437 vfat fat arm_smccc_trng virtio_gpu virtio_balloon virtio_dma_buf drm_shmem_helper virtio_console drm_kms_helper joydev sg evdev dm_mod loop fuse efi_pstore dax drm configfs qemu_fw_cfg virtio_rng ip_tables x_tables autofs4 xxhash_generic btrfs blake2b_generic zstd_compress efivarfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor xor_neon hid_generic usbhid hid raid6_pq libcrc32c crc32c_generic raid1 raid0 multipath linear md_mod sd_mod t10_pi crc64_rocksoft_generic sr_mod crc64_rocksoft crc_t10dif cdrom crct10dif_generic crc64 crct10dif_ce crct10dif_common virtio_scsi polyval_ce polyval_generic scsi_mod scsi_common ghash_ce gf128mul virtio_net net_failover failover xhci_pci xhci_hcd sha2_ce sha256_arm64 usbcore sha1_ce usb_common virtio_pci virtio_pci_legacy_dev virtio_pci_modern_dev virtio_mmio aes_neon_bs aes_neon_blk aes_ce_blk aes_ce_cipher ** Network interface configuration: ** Network status: *** IP interfaces and addresses: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host noprefixroute valid_lft forever preferred_lft forever 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether 96:00:02:7a:d3:a4 brd ff:ff:ff:ff:ff:ff altname enp1s0 inet xxxxxxxxxxxxx/32 brd 128.140.61.82 scope global dynamic eth0 valid_lft 86111sec preferred_lft 86111sec inet6 xxxxxxxxxxxxxxxxxxxxx/64 scope global valid_lft forever preferred_lft forever inet6 xxxxxxxxxxxxxxxxxxxxxxxx/64 scope link valid_lft forever preferred_lft forever 3: wg0: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1420 qdisc noqueue state UNKNOWN group default qlen 1000 link/none inet xxxxxxxxxxx/24 scope global wg0 valid_lft forever preferred_lft forever inet6 xxxxxxxxxxxxxxxxx/64 scope global valid_lft forever preferred_lft forever *** Device statistics: Inter-| Receive | Transmit face |bytes packets errs drop fifo frame compressed multicast|bytes packets errs drop fifo colls carrier compressed lo: 10578 134 0 0 0 0 0 0 10578 134 0 0 0 0 0 0 eth0: 2531753 5559 0 0 0 0 0 0 2788642 5527 0 0 0 0 0 0 wg0: 854136 2201 0 0 0 0 0 0 1016816 2429 0 0 0 0 0 0 *** Protocol statistics: Ip: Forwarding: 1 6890 total packets received 3925 forwarded 0 incoming packets discarded 2958 incoming packets delivered 7081 requests sent out 24 outgoing packets dropped Icmp: 45 ICMP messages received 0 input ICMP message failed ICMP input histogram: destination unreachable: 44 echo requests: 1 45 ICMP messages sent 0 ICMP messages failed ICMP output histogram: destination unreachable: 44 echo replies: 1 IcmpMsg: InType3: 44 InType8: 1 OutType0: 1 OutType3: 44 Tcp: 11 active connection openings 2 passive connection openings 0 failed connection attempts 0 connection resets received 4 connections established 1291 segments received 1345 segments sent out 9 segments retransmitted 0 bad segments received 23 resets sent Udp: 2258 packets received 40 packets to unknown port received 0 packet receive errors 99 packets sent 0 receive buffer errors 0 send buffer errors UdpLite: TcpExt: 41 delayed acks sent Quick ack mode was activated 5 times 112 packet headers predicted 251 acknowledgments not containing data payload received 387 predicted acknowledgments Detected reordering 26 times using SACK 4 congestion windows recovered without slow start after partial ack TCPSackFailures: 1 2 retransmits in slow start TCPTimeouts: 4 TCPLossProbes: 3 TCPBacklogCoalesce: 1 TCPDSACKOldSent: 5 TCPDSACKRecv: 5 8 connections reset due to unexpected data TCPDSACKIgnoredNoUndo: 3 TCPSackShiftFallback: 52 TCPRcvCoalesce: 53 TCPAutoCorking: 58 TCPOrigDataSent: 1014 TCPDelivered: 1019 TcpTimeoutRehash: 4 TcpDuplicateDataRehash: 1 TCPDSACKRecvSegs: 5 IpExt: InOctets: 2896083 OutOctets: 5137842 InNoECTPkts: 6965 MPTcpExt: ** PCI devices: not available ** USB devices: not available -- System Information: Debian Release: 12.9 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable') Architecture: arm64 (aarch64) Kernel: Linux 6.1.0-29-arm64 (SMP w/2 CPU threads) Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages linux-image-6.1.0-29-arm64 depends on: ii initramfs-tools [linux-initramfs-tool] 0.142+deb12u1 ii kmod 30+20221128-1 ii linux-base 4.9 Versions of packages linux-image-6.1.0-29-arm64 recommends: ii apparmor 3.0.8-3 pn firmware-linux-free <none> Versions of packages linux-image-6.1.0-29-arm64 suggests: pn debian-kernel-handbook <none> pn linux-doc-6.1 <none> Versions of packages linux-image-6.1.0-29-arm64 is related to: pn firmware-amd-graphics <none> pn firmware-atheros <none> pn firmware-bnx2 <none> pn firmware-bnx2x <none> pn firmware-brcm80211 <none> pn firmware-cavium <none> pn firmware-intel-sound <none> pn firmware-intelwimax <none> pn firmware-ipw2x00 <none> pn firmware-ivtv <none> pn firmware-iwlwifi <none> pn firmware-libertas <none> pn firmware-linux-nonfree <none> pn firmware-misc-nonfree <none> pn firmware-myricom <none> pn firmware-netxen <none> pn firmware-qlogic <none> pn firmware-realtek <none> pn firmware-samsung <none> pn firmware-siano <none> pn firmware-ti-connectivity <none> pn xen-hypervisor <none> -- no debconf information
--- End Message ---
--- Begin Message ---
- To: 1092772-close@bugs.debian.org
- Subject: Bug#1092772: fixed in linux 6.1.124-1
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sun, 12 Jan 2025 22:17:09 +0000
- Message-id: <E1tX6Gb-00AyNQ-6V@fasolo.debian.org>
- Reply-to: Salvatore Bonaccorso <carnil@debian.org>
Source: linux Source-Version: 6.1.124-1 Done: Salvatore Bonaccorso <carnil@debian.org> We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1092772@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso <carnil@debian.org> (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sun, 12 Jan 2025 20:58:02 +0100 Source: linux Architecture: source Version: 6.1.124-1 Distribution: bookworm Urgency: medium Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org> Changed-By: Salvatore Bonaccorso <carnil@debian.org> Closes: 1092772 Changes: linux (6.1.124-1) bookworm; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.124 - [x86] hyperv: Fix hv tsc page based sched_clock for hibernation - selinux: ignore unknown extended permissions - btrfs: fix use-after-free in btrfs_encoded_read_endio() (CVE-2024-56582) - tracing: Have process_string() also allow arrays - [x86] thunderbolt: Add support for Intel Lunar Lake - [x86] thunderbolt: Add support for Intel Panther Lake-M/P - [x86] thunderbolt: Don't display nvm_version unless upgrade supported - xhci: retry Stop Endpoint on buggy NEC controllers - usb: xhci: Limit Stop Endpoint retries - xhci: Turn NEC specific quirk for handling Stop Endpoint errors generic - net: mctp: handle skb cleanup on sock_queue failures - RDMA/mlx5: Enforce same type port association for multiport RoCE - [arm64] drm/bridge: adv7511_audio: Update Audio InfoFrame properly - [arm64] RDMA/hns: Refactor mtr find - [arm64] RDMA/hns: Remove unused parameters and variables - [arm64] RDMA/hns: Fix mapping error of zero-hop WQE buffer - [arm64] RDMA/hns: Fix warning storm caused by invalid input in IO path - [arm64] RDMA/hns: Fix missing flush CQE for DWQE - net: stmmac: platform: provide devm_stmmac_probe_config_dt() - net: stmmac: don't create a MDIO bus if unnecessary - net: stmmac: restructure the error path of stmmac_probe_config_dt() - net: fix memory leak in tcp_conn_request() - ipip,ip_tunnel,sit: Add FOU support for externally controlled ipip devices - ip_tunnel: annotate data-races around t->parms.link - ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_bind_dev() - ipv4: ip_tunnel: Unmask upper DSCP bits in ip_md_tunnel_xmit() - ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_xmit() - net: Fix netns for ip_tunnel_init_flow() - netrom: check buffer length before accessing it - [x86] drm/i915/dg1: Fix power gate sequence. - netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext (Closes: #1092772) - net: llc: reset skb->transport_header - ALSA: usb-audio: US16x08: Initialize array before use - [armel,armhf] net: mv643xx_eth: fix an OF node reference leak - net: wwan: t7xx: Fix FSM command timeout issue - net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets - net: restrict SO_REUSEPORT to inet sockets - net: wwan: iosm: Properly check for valid exec stage in ipc_mmio_init() - af_packet: fix vlan_get_tci() vs MSG_PEEK - af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK - ila: serialize calls to nf_register_net_hooks() - btrfs: rename and export __btrfs_cow_block() - btrfs: fix use-after-free when COWing tree bock and tracing is enabled (CVE-2024-56759) - wifi: mac80211: wake the queues in case of failure in resume - btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount - ALSA: hda/realtek: Add new alc2xx-fixup-headset-mic model - sound: usb: enable DSD output for ddHiFi TC44C - sound: usb: format: don't warn that raw DSD is unsupported - bpf: fix potential error return - ksmbd: retry iterate_dir in smb2_query_dir - net: usb: qmi_wwan: add Telit FE910C04 compositions - Bluetooth: hci_core: Fix sleeping function called from invalid context - irqchip/gic: Correct declaration of *percpu_base pointer in union gic_base - usb: xhci: Avoid queuing redundant Stop Endpoint commands - modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host - modpost: fix the missed iteration for the max bit in do_input() - ALSA hda/realtek: Add quirk for Framework F111:000C - ALSA: seq: oss: Fix races at processing SysEx messages - kcov: mark in_softirq_really() as __always_inline - RDMA/uverbs: Prevent integer overflow issue - [armhf] pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking - sky2: Add device ID 11ab:4373 for Marvell 88E8075 - net/sctp: Prevent autoclose integer overflow in sctp_association_init() - [arm64] drm: adv7511: Drop dsi single lane support - dt-bindings: display: adi,adv7533: Drop single lane support - mm/readahead: fix large folio support in async readahead - mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() - mptcp: fix TCP options overflow. - mptcp: fix recvbuffer adjust on sleeping rcvmsg - mptcp: don't always assume copied data in mptcp_cleanup_rbuf() - zram: check comp is non-NULL before calling comp_destroy . [ Salvatore Bonaccorso ] * Bump ABI to 30 Checksums-Sha1: 5c4c828e3c4cb2de53b7218ac8168e358db26632 290931 linux_6.1.124-1.dsc c369422d46695f98757c17181584f463091e65f2 137718868 linux_6.1.124.orig.tar.xz 125493b740d447dbdf0b1c2331669e0c47c5016f 1716348 linux_6.1.124-1.debian.tar.xz 12956f7866270f9b84b0c7cf810c807f174bc75d 7222 linux_6.1.124-1_source.buildinfo Checksums-Sha256: cb8131435a3ca6a26affe7ba421ee63df1c4d9da09c37b0259742bd58ae82068 290931 linux_6.1.124-1.dsc 0f908daf931ac8eb72423404c2e6c8d0a1fb51a2ceb19059fe903e4f72e3c54c 137718868 linux_6.1.124.orig.tar.xz 194ffc38770f3080dcbbcc16d92ede9b0f2c12eba675dca7f821bb1ceb3b5968 1716348 linux_6.1.124-1.debian.tar.xz 6eb588a35e50733ab5e7191445cba2cb0f788a50b06ca91f6f368c3adc257aa4 7222 linux_6.1.124-1_source.buildinfo Files: 9acaccac73dccdd9400fedaa577e0c26 290931 kernel optional linux_6.1.124-1.dsc 7839a8fc758a3a0e20220756df79d43c 137718868 kernel optional linux_6.1.124.orig.tar.xz b0acadacda998afec65b2b232d0739e5 1716348 kernel optional linux_6.1.124-1.debian.tar.xz f5ecf65973f31fa612f0e96c1db1ddc3 7222 kernel optional linux_6.1.124-1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmeEH+5fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89ET4IP/1Ot6O98WGdGzcTRBGlrBROlopvZlSmL tn46l7Kzqrd/N0+YOYqLNMceB05uzAdqfGrGGSU0DSDJcmNXQdCggpCYSju6b36I 2KqHbUQmqytS3XFi27rixjCoM7cf8Nfwg/x8ZI185yuJma01MS5xKkLREeo5rv8y bJD7rp0t6caxZ10D8N+NyJMC6/xoykTdWhW9fQX/5YrNSqBiwP2uvTdM4V8YsqQ4 WGY14JpzHMf7l/WWeRbQPsN8M3FmhUkgdkjCLTbTGxpzFGiq3NVPwHQ2WTEyhivX p09Y1/IORKVyKbHn/dfsgzAvKfT8v6JiJzg0AyqOHjfWf7kHR3WzQWGz3vtZB81i liC0FkeYSZVs1UCdHcBqWcTk5qBJX4r3XsDRU1lsYkFAnxIA/b4Qd8KZl1DyKw93 17oGWnERmV+CY4MsqjvmnbUhx4NbHWIkOAJN3jpVkI1A+XmBubxc4nKQ2LA4JWaw MZ3hmUzKHSUb+uLwqJnBkm3RBLhfUphAmNZJzg1qo6WnKA92s1OKUyX63Ce9KTaT K0NvjhfQAvW0txALSOaZiclcrxJo8WzbrNxGYuuaeHK/yMFLuKKlOiemgkLYY0D1 CGHe/MqBv8Yb8nDIJa5JjH9OJZjpCCUZ3UBUHVMJpkFIeTXlgUQau6axj8+UDACx bVXz79gOH1Yj =xSdQ -----END PGP SIGNATURE-----Attachment: pgpBeesadSdFd.pgp
Description: PGP signature
--- End Message ---