Your message dated Tue, 27 Aug 2024 05:47:09 +0000 with message-id <e1sip2r-009n6d...@fasolo.debian.org> and subject line Bug#1079684: fixed in linux 6.1.106-3 has caused the Debian Bug report #1079684, regarding Network errors on VM to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1079684: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1079684 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: linux-image-6.1.0-24-cloud-amd64 Version: 6.1.106-2 Severity: serious Tags: upstream Forwarded: https://bugzilla.kernel.org/show_bug.cgi?id=219129 After the latest linux upgrade, the following message appear frequently in /var/log/syslog: ens3: bad gso: type: 4, size: 1460 It seems real network issues have been noticed in some VMs we rebooted on friday (they are now running the previous kernel). The forwarded upstream issue seems to match. Regards taffit
signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---Source: linux Source-Version: 6.1.106-3 Done: Salvatore Bonaccorso <car...@debian.org> We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1079...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso <car...@debian.org> (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Mon, 26 Aug 2024 21:47:39 +0200 Source: linux Architecture: source Version: 6.1.106-3 Distribution: bookworm Urgency: medium Maintainer: Debian Kernel Team <debian-ker...@lists.debian.org> Changed-By: Salvatore Bonaccorso <car...@debian.org> Closes: 1079684 Changes: linux (6.1.106-3) bookworm; urgency=medium . * udp: allow header check for dodgy GSO_UDP_L4 packets. * gso: fix dodgy bit handling for GSO_UDP_L4 * net: more strict VIRTIO_NET_HDR_GSO_UDP_L4 validation * net: drop bad gso csum_start and offset in virtio_net_hdr (Closes: #1079684) * Bump ABI to 25 Checksums-Sha1: 79b49bb91703928e69ae62af8bacf16e720d24cf 290930 linux_6.1.106-3.dsc a219546d455a652d00c94d9cbee0eae2a86e606b 1669432 linux_6.1.106-3.debian.tar.xz d4bbc2050b9c88048dc3d7af359d14e0fa84c6f7 7492 linux_6.1.106-3_source.buildinfo Checksums-Sha256: 991a5496320541a090dda8c6d97a34bd9f6f4bccfd6c42d4e0e7e6ba781f9641 290930 linux_6.1.106-3.dsc edd237e3c03d49b3c8e815c4fbeb8ac6ff32dc03cd13be4c8d9c1df7e6f1b141 1669432 linux_6.1.106-3.debian.tar.xz 2a7f6c23638861c31dae9733f0bbb3458fad08c9cbdfb5fe7055c1c76e02a258 7492 linux_6.1.106-3_source.buildinfo Files: cf0e5ed6f6c29bf94145d4d967d8e6ef 290930 kernel optional linux_6.1.106-3.dsc ec3f59dcbad73f4e9b105337e2db04c0 1669432 kernel optional linux_6.1.106-3.debian.tar.xz fe0ac618fbbbb2ef4af5e88c710d2b98 7492 kernel optional linux_6.1.106-3_source.buildinfo -----BEGIN PGP SIGNATURE----- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmbM3KBfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89EC1sP/AufDFJ/vl/KDNsRrC48i5DuX+O+DLjH Ut9DIgkxFKbGKxk2n/7XbuW775OXKAa0ZVsT+rEqFE6N4wDKoy50FT9GqVNmxFhT yXc5lk0WjHMvnT0bfmZwWMHWPDf+tOWqbobjWAIobvpOxIcIc6ZVhpqv28Rh88dJ IZNYALTXCl0pA0V2kmO/dPBA40xO1ZjPR3Q4h+MrqULJoBFZdy/AketVTYH7eMdx jRz9RPEEjpxfLrIyY+Q1uBWy+6tleUvsBX7HIIn09EXatFFAu84K+bVE8cJnQ7ZO L5DB+AbD+/mG9NJWSjDZtIPDUN5vJAFBD8TqkVa92x9yTAFM/LY/TCyF3Dpn7Dw/ efYk08qBKm6am3nDTE8SUkMtSoghKsSaVGyB2Pp82xgAVUMq75kBP7Ln34K93ei7 G0DUNFbd+7ANzaWUZ7P14qgEklsoouozqukinFRqRdtmzmJ0HwMiu+1M/jDwomej SLswGfjXkkz0pI8Pb4pIt/SDJjR0wa3kSYEpXy9BBVtO6D/TbcewXbXCE3F8TvZr lC41RFgkfRobzyINL4SyyBLdNvLIvlmLhjt9g9ZoVSVrMi+Z+FEgoKeZxRoOjq3B HxIGtUsAxSoGdWmkyS60nIRKK4ngjsKo3g2GP2Li82xxhriEm3jb06rMy0qptBkR Lnw1v0iGltvH =TX5/ -----END PGP SIGNATURE-----
pgpMSyhDnh44r.pgp
Description: PGP signature
--- End Message ---