Groups
Groups
Sign in
Groups
Groups
linux.debian.kernel
Conversations
About
Send feedback
Help
Sort By Relevance
Sort By Date
1–23 of 23
Cédric Dufour
, …
Ben Hutchings
11
9/23/20
Bug#966846: Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb
On Tue, 2020-09-22 at 23:52 +0200, Michel Le Bihan wrote: > Hello, > > I'm a bit late but I also have this issue and it occurs every
unread,
Bug#966846: Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb
On Tue, 2020-09-22 at 23:52 +0200, Michel Le Bihan wrote: > Hello, > > I'm a bit late but I also have this issue and it occurs every
9/23/20
Debian FTP Masters
9/19/20
linux-signed-arm64_4.19.146+1_source.changes ACCEPTED into proposed-updates->stable-new, proposed-updates
: #
966846
) - cgroup: Fix sock_cgroup_data on big-endian. - sched: consistently handle layer3 header accesses in the presence of VLANs - vlan: consolidate VLAN parsing code and limit
unread,
linux-signed-arm64_4.19.146+1_source.changes ACCEPTED into proposed-updates->stable-new, proposed-updates
: #
966846
) - cgroup: Fix sock_cgroup_data on big-endian. - sched: consistently handle layer3 header accesses in the presence of VLANs - vlan: consolidate VLAN parsing code and limit
9/19/20
Debian FTP Masters
9/19/20
linux-signed-i386_4.19.146+1_source.changes ACCEPTED into proposed-updates->stable-new, proposed-updates
: #
966846
) - cgroup: Fix sock_cgroup_data on big-endian. - sched: consistently handle layer3 header accesses in the presence of VLANs - vlan: consolidate VLAN parsing code and limit
unread,
linux-signed-i386_4.19.146+1_source.changes ACCEPTED into proposed-updates->stable-new, proposed-updates
: #
966846
) - cgroup: Fix sock_cgroup_data on big-endian. - sched: consistently handle layer3 header accesses in the presence of VLANs - vlan: consolidate VLAN parsing code and limit
9/19/20
Debian FTP Masters
9/19/20
linux-signed-amd64_4.19.146+1_source.changes ACCEPTED into proposed-updates->stable-new, proposed-updates
: #
966846
) - cgroup: Fix sock_cgroup_data on big-endian. - sched: consistently handle layer3 header accesses in the presence of VLANs - vlan: consolidate VLAN parsing code and limit
unread,
linux-signed-amd64_4.19.146+1_source.changes ACCEPTED into proposed-updates->stable-new, proposed-updates
: #
966846
) - cgroup: Fix sock_cgroup_data on big-endian. - sched: consistently handle layer3 header accesses in the presence of VLANs - vlan: consolidate VLAN parsing code and limit
9/19/20
Debian FTP Masters
9/19/20
linux-signed-amd64_4.19.146+1_source.changes ACCEPTED into proposed-updates->stable-new
: #
966846
) - cgroup: Fix sock_cgroup_data on big-endian. - sched: consistently handle layer3 header accesses in the presence of VLANs - vlan: consolidate VLAN parsing code and limit
unread,
linux-signed-amd64_4.19.146+1_source.changes ACCEPTED into proposed-updates->stable-new
: #
966846
) - cgroup: Fix sock_cgroup_data on big-endian. - sched: consistently handle layer3 header accesses in the presence of VLANs - vlan: consolidate VLAN parsing code and limit
9/19/20
Debian FTP Masters
9/19/20
linux-signed-arm64_4.19.146+1_source.changes ACCEPTED into proposed-updates->stable-new
: #
966846
) - cgroup: Fix sock_cgroup_data on big-endian. - sched: consistently handle layer3 header accesses in the presence of VLANs - vlan: consolidate VLAN parsing code and limit
unread,
linux-signed-arm64_4.19.146+1_source.changes ACCEPTED into proposed-updates->stable-new
: #
966846
) - cgroup: Fix sock_cgroup_data on big-endian. - sched: consistently handle layer3 header accesses in the presence of VLANs - vlan: consolidate VLAN parsing code and limit
9/19/20
Debian FTP Masters
9/19/20
linux-signed-i386_4.19.146+1_source.changes ACCEPTED into proposed-updates->stable-new
: #
966846
) - cgroup: Fix sock_cgroup_data on big-endian. - sched: consistently handle layer3 header accesses in the presence of VLANs - vlan: consolidate VLAN parsing code and limit
unread,
linux-signed-i386_4.19.146+1_source.changes ACCEPTED into proposed-updates->stable-new
: #
966846
) - cgroup: Fix sock_cgroup_data on big-endian. - sched: consistently handle layer3 header accesses in the presence of VLANs - vlan: consolidate VLAN parsing code and limit
9/19/20
Debian FTP Masters
9/18/20
linux_4.19.146-1_source.changes ACCEPTED into proposed-updates->stable-new, proposed-updates
Closes:
966846
966917 968567 Changes: linux (4.19.146-1) buster; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog
unread,
linux_4.19.146-1_source.changes ACCEPTED into proposed-updates->stable-new, proposed-updates
Closes:
966846
966917 968567 Changes: linux (4.19.146-1) buster; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog
9/18/20
Debian Bug Tracking System
2
9/18/20
Bug#966917: marked as done (Regression: cannot replace files on cifs mounts anymore when running linux-image-4.19.0-10-amd64)
Your message dated Fri, 18 Sep 2020 10:47:08 +0000 with message-id and subject line Bug#966917: fixed in linux 4.19.146-1 has caused the Debian Bug
unread,
Bug#966917: marked as done (Regression: cannot replace files on cifs mounts anymore when running linux-image-4.19.0-10-amd64)
Your message dated Fri, 18 Sep 2020 10:47:08 +0000 with message-id and subject line Bug#966917: fixed in linux 4.19.146-1 has caused the Debian Bug
9/18/20
Debian FTP Masters
9/18/20
linux_4.19.146-1_source.changes ACCEPTED into proposed-updates->stable-new
Closes:
966846
966917 968567 Changes: linux (4.19.146-1) buster; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog
unread,
linux_4.19.146-1_source.changes ACCEPTED into proposed-updates->stable-new
Closes:
966846
966917 968567 Changes: linux (4.19.146-1) buster; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog
9/18/20
Salvatore Bonaccorso
,
Antoine Sirinelli
2
9/1/20
Bug#969350: linux-image-4.19.0-10-amd64: Kernel regularly crashes - general protection fault in the network stack
as #
966846
, which we have > pending fixed in the packaging repository. > > If you can expose the fixes for testing, then there are temporary and > inofficial 4.19.142-1
unread,
Bug#969350: linux-image-4.19.0-10-amd64: Kernel regularly crashes - general protection fault in the network stack
as #
966846
, which we have > pending fixed in the packaging repository. > > If you can expose the fixes for testing, then there are temporary and > inofficial 4.19.142-1
9/1/20
Debian Bug Tracking System
9/1/20
Processed: forcibly merging 966846 968509
> forcemerge
966846
968509 Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Bug #968625 [src:linux] Kernel null pointer deref in the TCP
unread,
Processed: forcibly merging 966846 968509
> forcemerge
966846
968509 Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Bug #968625 [src:linux] Kernel null pointer deref in the TCP
9/1/20
Debian Bug Tracking System
8/31/20
Processed: forcibly merging 966846 969350
> forcemerge
966846
969350 Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Bug #968625 [src:linux] Kernel null pointer deref in the TCP
unread,
Processed: forcibly merging 966846 969350
> forcemerge
966846
969350 Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Bug #968625 [src:linux] Kernel null pointer deref in the TCP
8/31/20
debian-...@lists.debian.org
12
10/5/20
[bts-link] source package src:linux
for #
966846
(http://bugs.debian.org/
966846
) # Bug title: Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb # * http://bugzilla.kernel.org/show_bug.cgi?id=208003
unread,
[bts-link] source package src:linux
for #
966846
(http://bugs.debian.org/
966846
) # Bug title: Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb # * http://bugzilla.kernel.org/show_bug.cgi?id=208003
10/5/20
Salvatore Bonaccorso
2
9/1/20
Bug#968509: Further crashes under linux-image-4.19.0-10-amd64
same as #
966846
. If so this was fixed in 4.19.134 upstream but followup commits were needed as up to commits in 4.19.140 upstream. Would you be able to test 4.19.142? Regards, Salvatore
unread,
Bug#968509: Further crashes under linux-image-4.19.0-10-amd64
same as #
966846
. If so this was fixed in 4.19.134 upstream but followup commits were needed as up to commits in 4.19.140 upstream. Would you be able to test 4.19.142? Regards, Salvatore
9/1/20
Debian Bug Tracking System
8/28/20
Processed: bug 966846 is forwarded to https://bugzilla.kernel.org/show_bug.cgi?id=208003
> forwarded
966846
https://bugzilla.kernel.org/show_bug.cgi?id=208003 Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Bug #968625
unread,
Processed: bug 966846 is forwarded to https://bugzilla.kernel.org/show_bug.cgi?id=208003
> forwarded
966846
https://bugzilla.kernel.org/show_bug.cgi?id=208003 Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Bug #968625
8/28/20
Debian Bug Tracking System
8/28/20
Processed: tagging 966846
> tags
966846
+ pending confirmed Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Bug #968625 [src:linux] Kernel null pointer deref in the
unread,
Processed: tagging 966846
> tags
966846
+ pending confirmed Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Bug #968625 [src:linux] Kernel null pointer deref in the
8/28/20
Debian Bug Tracking System
8/28/20
Processed: forcibly merging 966846 968625
> forcemerge
966846
968625 Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Bug #968625 [src:linux] Kernel null pointer deref in the TCP
unread,
Processed: forcibly merging 966846 968625
> forcemerge
966846
968625 Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Bug #968625 [src:linux] Kernel null pointer deref in the TCP
8/28/20
Debian Bug Tracking System
8/5/20
Processed: tagging 966846
> tags
966846
+ fixed-upstream Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Added tag(s) fixed-upstream. > thanks Stopping processing
unread,
Processed: tagging 966846
> tags
966846
+ fixed-upstream Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Added tag(s) fixed-upstream. > thanks Stopping processing
8/5/20
Debian Bug Tracking System
8/5/20
Processed: bug 966846 is forwarded to https://lore.kernel.org/netdev/20200702185256.17917-1-xiyou.wangcong@gmail.com/
> forwarded
966846
https://lore.kernel.org/netdev/20200702185256.17917-1-xiyou.wangcong@gmail.com/ Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb
unread,
Processed: bug 966846 is forwarded to https://lore.kernel.org/netdev/20200702185256.17917-1-xiyou.wangcong@gmail.com/
> forwarded
966846
https://lore.kernel.org/netdev/20200702185256.17917-1-xiyou.wangcong@gmail.com/ Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb
8/5/20
Debian Bug Tracking System
8/5/20
Processed: affects 966846
> affects
966846
+ release.debian.org Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Added indication that
966846
affects release.debian
unread,
Processed: affects 966846
> affects
966846
+ release.debian.org Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Added indication that
966846
affects release.debian
8/5/20
Debian Bug Tracking System
8/5/20
Processed: reassign 966846 to src:linux, bug 966846 is forwarded to https://lkml.org/lkml/2020/7/20/883 ...
> reassign
966846
src:linux 4.19.131-1 Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Ignoring request to reassign bug #
966846
to the
unread,
Processed: reassign 966846 to src:linux, bug 966846 is forwarded to https://lkml.org/lkml/2020/7/20/883 ...
> reassign
966846
src:linux 4.19.131-1 Bug #
966846
[src:linux] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Ignoring request to reassign bug #
966846
to the
8/5/20
Debian Bug Tracking System
8/5/20
Processed: reassign 966846 to src:linux
> reassign
966846
src:linux 4.19.131-1 Bug #
966846
[linux-source-4.19] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Bug reassigned from package 'linux
unread,
Processed: reassign 966846 to src:linux
> reassign
966846
src:linux 4.19.131-1 Bug #
966846
[linux-source-4.19] Kernel panic (4.19.0-10): RIP __cgroup_bpf_run_filter_skb Bug reassigned from package 'linux
8/5/20