This bug was fixed in the package linux - 5.15.0-133.144

---------------
linux (5.15.0-133.144) jammy; urgency=medium

  * CVE-2025-0927
    - SAUCE: fs: hfs/hfsplus: add key_len boundary check to hfs_bnode_read_key

linux (5.15.0-132.143) jammy; urgency=medium

  * jammy/linux: 5.15.0-132.143 -proposed tracker (LP: #2093735)

  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/2025.01.13)

  * KVM: Cache CPUID at KVM.ko module init to reduce latency of VM-Enter and VM-
    Exit (LP: #2093146)
    - kvm: x86: Fix xstate_required_size() to follow XSTATE alignment rule
    - KVM: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init

  * Jammy update: v5.15.173 upstream stable release (LP: #2089541)
    - 9p: Avoid creating multiple slab caches with the same name
    - irqchip/ocelot: Fix trigger register address
    - block: Fix elevator_get_default() checking for NULL q->tag_set
    - HID: multitouch: Add support for B2402FVA track point
    - HID: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad
    - bpf: use kvzmalloc to allocate BPF verifier environment
    - crypto: marvell/cesa - Disable hash algorithms
    - sound: Make CONFIG_SND depend on INDIRECT_IOMEM instead of UML
    - drm/vmwgfx: Limit display layout ioctl array size to
      VMWGFX_NUM_DISPLAY_UNITS
    - powerpc/powernv: Free name on error in opal_event_init()
    - vDPA/ifcvf: Fix pci_read_config_byte() return code handling
    - fs: Fix uninitialized value issue in from_kuid and from_kgid
    - HID: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad
    - HID: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard
    - net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition
    - md/raid10: improve code of mrdev in raid10_sync_request
    - mm/memory: add non-anonymous page check in the copy_present_page()
    - udf: Allocate name buffer in directory iterator on heap
    - udf: Avoid directory type conversion failure due to ENOMEM
    - 9p: fix slab cache name creation for real
    - Linux 5.15.173

  * Jammy update: v5.15.173 upstream stable release (LP: #2089541) //
    CVE-2024-41080
    - io_uring: fix possible deadlock in io_register_iowq_max_workers()

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533)
    - arm64: dts: rockchip: Fix rt5651 compatible value on rk3399-sapphire-
      excavator
    - arm64: dts: rockchip: Remove hdmi's 2nd interrupt on rk3328
    - arm64: dts: rockchip: Fix bluetooth properties on Rock960 boards
    - arm64: dts: rockchip: Remove #cooling-cells from fan on Theobroma lion
    - arm64: dts: rockchip: Fix LED triggers on rk3308-roc-cc
    - arm64: dts: imx8mp: correct sdhc ipg clk
    - ARM: dts: rockchip: fix rk3036 acodec node
    - ARM: dts: rockchip: drop grf reference from rk3036 hdmi
    - ARM: dts: rockchip: Fix the spi controller on rk3036
    - ARM: dts: rockchip: Fix the realtek audio codec on rk3036-kylin
    - NFSv3: only use NFS timeout for MOUNT when protocols are compatible
    - NFS: Add a tracepoint to show the results of nfs_set_cache_invalid()
    - NFSv3: handle out-of-order write replies.
    - nfs: avoid i_lock contention in nfs_clear_invalid_mapping
    - net: enetc: set MAC address to the VF net_device
    - can: c_can: fix {rx,tx}_errors statistics
    - net: phy: ti: add PHY_RST_AFTER_CLK_EN flag
    - net: stmmac: Fix unbalanced IRQ wake disable warning on single irq case
    - Revert "ALSA: hda/conexant: Mute speakers at suspend / shutdown"
    - media: stb0899_algo: initialize cfr before using it
    - media: dvb_frontend: don't play tricks with underflow values
    - media: adv7604: prevent underflow condition when reporting colorspace
    - scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer
    - ALSA: firewire-lib: fix return value on fail in amdtp_tscm_init()
    - media: pulse8-cec: fix data timestamp at pulse8_setup()
    - media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl()
    - pwm: imx-tpm: Use correct MODULO value for EPWM mode
    - drm/amdgpu: Adjust debugfs eviction and IB access permissions
    - drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported
    - thermal/drivers/qcom/lmh: Remove false lockdep backtrace
    - dm cache: correct the number of origin blocks to match the target length
    - dm cache: optimize dirty bit checking with find_next_bit when resizing
    - dm-unstriped: cast an operand to sector_t to prevent potential uint32_t
      overflow
    - ALSA: usb-audio: Add quirk for HP 320 FHD Webcam
    - posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone
    - io_uring: rename kiocb_end_write() local helper
    - fs: create kiocb_{start,end}_write() helpers
    - io_uring: use kiocb_{start,end}_write() helpers
    - media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in
      uvc_parse_format
    - fs/proc: fix compile warning about variable 'vmcore_mmap_ops'
    - usb: dwc3: fix fault at system suspend if device was already runtime
      suspended
    - USB: serial: qcserial: add support for Sierra Wireless EM86xx
    - USB: serial: option: add Fibocom FG132 0x0112 composition
    - USB: serial: option: add Quectel RG650V
    - irqchip/gic-v3: Force propagation of the active state with a read-back
    - ucounts: fix counter leak in inc_rlimit_get_ucounts()
    - ALSA: usb-audio: Support jack detection on Dell dock
    - ALSA: usb-audio: Add quirks for Dell WD19 dock
    - ACPI: PRM: Clean up guid type in struct prm_handler_info
    - ALSA: usb-audio: Add endianness annotations
    - Linux 5.15.172

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-50265
    - ocfs2: remove entry once instead of null-ptr-dereference in
      ocfs2_xa_remove()

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-50267
    - USB: serial: io_edgeport: fix use after free in debug printk

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-50268
    - usb: typec: fix potential out of bounds in 
ucsi_ccg_update_set_new_cam_cmd()

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-50269
    - usb: musb: sunxi: Fix accessing an released usb phy

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-50036
    - net: do not delay dst_entries_add() in dst_release()

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-42291
    - ice: Add a per-VF limit on number of FDIR filters

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-50273
    - btrfs: reinitialize delayed ref list after deleting it from the list

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-53066
    - nfs: Fix KMSAN warning in decode_getfattr_attrs()

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-53052
    - io_uring/rw: fix missing NOWAIT check for O_DIRECT start write

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-50278
    - dm cache: fix potential out-of-bounds access on the first resume

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-50279
    - dm cache: fix out-of-bounds access to the dirty bitset when resizing

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-50282
    - drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-50287
    - media: v4l2-tpg: prevent the risk of a division by zero

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-50290
    - media: cx24116: prevent overflows on SNR calculus

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-53061
    - media: s5p-jpeg: prevent buffer overflows

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-50292
    - ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-53063
    - media: dvbdev: prevent the risk of out of memory access

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-50295
    - net: arc: fix the device for dma_map_single/dma_unmap_single

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-50296
    - net: hns3: fix kernel crash when uninstalling driver

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-53088
    - i40e: fix race condition by adding filter's intermediate sync state

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-50299
    - sctp: properly validate chunk size in sctp_sf_ootb()

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-50301
    - security/keys: fix slab-out-of-bounds in key_task_permission

  * Jammy update: v5.15.172 upstream stable release (LP: #2089533) //
    CVE-2024-50302
    - HID: core: zero-initialize the report buffer

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405)
    - selftests/mm: fix incorrect buffer->mirror size in hmm2 double_map test
    - ACPI: PRM: Remove unnecessary blank lines
    - ACPI: PRM: Change handler_addr type to void pointer
    - cgroup: Fix potential overflow issue when checking max_depth
    - mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING
    - wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys
    - wifi: brcm80211: BRCM_TRACING should depend on TRACING
    - RDMA/cxgb4: Dump vendor specific QP details
    - RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down
    - RDMA/bnxt_re: synchronize the qp-handle table array
    - mac80211: do drv_reconfig_complete() before restarting all
    - mac80211: Add support to trigger sta disconnect on hardware restart
    - wifi: iwlwifi: mvm: disconnect station vifs if recovery failed
    - ASoC: cs42l51: Fix some error handling paths in cs42l51_probe()
    - gtp: allow -1 to be specified as file description from userspace
    - net: skip offload for NETIF_F_IPV6_CSUM if ipv6 header contains extension
    - firmware: arm_sdei: Fix the input parameter of cpuhp_remove_state()
    - fs/ntfs3: Fix warning possible deadlock in ntfs_set_state
    - scsi: scsi_transport_fc: Allow setting rport state to current state
    - net: amd: mvme147: Fix probe banner message
    - NFS: remove revoked delegation from server's delegation list
    - misc: sgi-gru: Don't disable preemption in GRU driver
    - usbip: tools: Fix detach_port() invalid port error path
    - usb: phy: Fix API devm_usb_put_phy() can not release the phy
    - usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes()
    - xhci: Fix Link TRB DMA in command ring stopped completion event
    - xhci: Use pm_runtime_get to prevent RPM on unsupported systems
    - Revert "driver core: Fix uevent_show() vs driver detach race"
    - iio: light: veml6030: fix microlux value calculation
    - riscv: vdso: Prevent the compiler from inserting calls to memset()
    - riscv: efi: Set NX compat flag in PE/COFF header
    - riscv: Use '%u' to format the output of 'cpu'
    - riscv: Remove unused GENERATING_ASM_OFFSETS
    - riscv: Remove duplicated GET_RM
    - mm/page_alloc: call check_new_pages() while zone spinlock is not held
    - mm/page_alloc: fix tracepoint mm_page_alloc_zone_locked()
    - mm/page_alloc: split out buddy removal code from rmqueue into separate
      helper
    - mm/page_alloc: rename ALLOC_HIGH to ALLOC_MIN_RESERVE
    - mm/page_alloc: treat RT tasks similar to __GFP_HIGH
    - mm/page_alloc: explicitly record high-order atomic allocations in
      alloc_flags
    - mm/page_alloc: explicitly define what alloc flags deplete min reserves
    - mm/page_alloc: explicitly define how __GFP_HIGH non-blocking allocations
      accesses reserves
    - Revert "drm/mipi-dsi: Set the fwnode for mipi_dsi_device"
    - vt: prevent kernel-infoleak in con_font_get()
    - mac80211: always have ieee80211_sta_restart()
    - Linux 5.15.171

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2023-52913
    - drm/i915: Fix potential context UAFs

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50228
    - mm: shmem: fix data-race in shmem_getattr()

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-53055
    - wifi: iwlwifi: mvm: fix 6 GHz scan construction

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50230
    - nilfs2: fix kernel bug due to missing clearing of checked flag

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50072
    - x86/bugs: Use code segment selector for VERW operand

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50218
    - ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50219
    - mm/page_alloc: let GFP_ATOMIC order-0 allocs access highatomic reserves

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50229
    - nilfs2: fix potential deadlock with newly created symlinks

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50232
    - iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr()

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50233
    - staging: iio: frequency: ad9832: fix division by zero in
      ad9832_calc_freqreg()

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50234
    - wifi: iwlegacy: Clear stale interrupts before resuming device

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50236
    - wifi: ath10k: Fix memory leak in management tx

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50237
    - wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50244
    - fs/ntfs3: Additional check in ni_clear()

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50245
    - fs/ntfs3: Fix possible deadlock in mi_read

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50247
    - fs/ntfs3: Check if more than chunk-size bytes are written

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50249
    - ACPI: CPPC: Make rmw_lock a raw_spin_lock

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50251
    - netfilter: nft_payload: sanitize offset and length before calling
      skb_checksum()

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50257
    - netfilter: Fix use-after-free in get_info()

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50262
    - bpf: Fix out-of-bounds write in trie_get_next_key()

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50259
    - netdevsim: Add trailing zero to terminate the string in
      nsim_nexthop_bucket_activity_write()

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-53042
    - ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow()

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-53058
    - net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-53059
    - wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50141
    - ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context

  * Jammy update: v5.15.171 upstream stable release (LP: #2089405) //
    CVE-2024-50086
    - ksmbd: fix user-after-free from session log off

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272)
    - RDMA/bnxt_re: Fix incorrect AVID type in WQE structure
    - x86/resctrl: Avoid overflow in MB settings in bw_validate()
    - ARM: dts: bcm2837-rpi-cm3-io3: Fix HDMI hpd-gpio pin
    - RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP
    - RDMA/irdma: Fix misspelling of "accept*"
    - ipv4: give an IPv4 dev to blackhole_netdev
    - RDMA/bnxt_re: Return more meaningful error
    - drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation
    - drm/msm: Allocate memory for disp snapshot with kvzalloc()
    - net: usb: usbnet: fix race in probe failure
    - octeontx2-af: Fix potential integer overflows on integer shifts
    - macsec: don't increment counters for an unrelated SA
    - net: ethernet: aeroflex: fix potential memory leak in
      greth_start_xmit_gbit()
    - net/smc: Fix searching in list of known pnetids in smc_pnet_add_pnetid
    - net: xilinx: axienet: fix potential memory leak in axienet_start_xmit()
    - genetlink: hold RCU in genlmsg_mcast()
    - s390: Initialize psw mask in perf_arch_fetch_caller_regs()
    - arm64:uprobe fix the uprobe SWBP_INSN in big-endian
    - KVM: s390: gaccess: Check if guest address is in memslot
    - usb: gadget: Add function wakeup support
    - XHCI: Separate PORT and CAPs macros into dedicated file
    - usb: dwc3: core: Fix system suspend on TI AM62 platforms
    - block, bfq: fix procress reference leakage for bfqq in merge chain
    - ASoC: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to
      default regs values
    - ASoC: fsl_sai: Enable 'FIFO continue on error' FCONT bit
    - arm64: Force position-independent veneers
    - platform/x86: dell-wmi: Ignore suspend notifications
    - arm64/uprobes: change the uprobe_opcode_t typedef to fix the sparse 
warning
    - ASoC: qcom: sm8250: add qrb4210-rb2-sndcard compatible string
    - platform/x86: dell-sysman: add support for alienware products
    - jfs: Fix sanity check in dbMount
    - xfrm: extract dst lookup parameters into a struct
    - xfrm: respect ip protocols rules criteria when performing dst lookups
    - net: plip: fix break; causing plip to never transmit
    - net: dsa: mv88e6xxx: Fix error when setting port policy on mv88e6393x
    - net: usb: usbnet: fix name regression
    - r8169: avoid unsolicited interrupts
    - posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime()
    - bpf,perf: Fix perf_event_detach_bpf_prog error handling
    - ALSA: hda/realtek: Update default depop procedure
    - btrfs: zoned: fix zone unusable accounting for freed reserved extent
    - ACPI: resource: Add LG 16T90SP to irq1_level_low_skip_override[]
    - ACPI: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid
      detection issue
    - openat2: explicitly return -E2BIG for (usize > PAGE_SIZE)
    - ALSA: hda/realtek: Add subwoofer quirk for Acer Predator G9-593
    - hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event
    - selinux: improve error checking in sel_write_load()
    - net: phy: dp83822: Fix reset pin definitions
    - Linux 5.15.170

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50142
    - xfrm: validate new SA's prefixlen using SA family when sel.family is unset

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50103
    - ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50058
    - serial: protect uart_port_dtr_rts() in uart_shutdown() too

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50110
    - xfrm: fix one more kernel-infoleak in algo dumping

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50115
    - KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50116
    - nilfs2: fix kernel bug due to missing clearing of buffer delay flag

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50117
    - drm/amd: Guard against bad data for ATIF ACPI method

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50205
    - ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50127
    - net: sched: fix use-after-free in taprio_change()

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50128
    - net: wwan: fix global oob in wwan_rtnl_policy

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50167
    - be2net: fix potential memory leak in be_xmit()

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50168
    - net/sun3_82586: fix potential memory leak in sun3_82586_send_packet()

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50131
    - tracing: Consider the NULL character when validating the event length

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50143
    - udf: fix uninit-value use in udf_get_fileshortad

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50134
    - drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with 
real
      VLA

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50010
    - exec: don't WARN for racy path_noexec check

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50194
    - arm64: probes: Fix uprobes for big-endian kernels

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50148
    - Bluetooth: bnep: fix wild-memory-access in proto_unregister

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50150
    - usb: typec: altmode should keep reference to parent

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50151
    - smb: client: fix OOBs when building SMB2_IOCTL request

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50153
    - scsi: target: core: Fix null-ptr-deref in target_alloc_device()

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50154
    - tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50171
    - net: systemport: fix potential memory leak in bcm_sysport_xmit()

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50156
    - drm/msm: Avoid NULL dereference in msm_disp_state_print_regs()

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50208
    - RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50160
    - ALSA: hda/cs8409: Fix possible NULL dereference

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50209
    - RDMA/bnxt_re: Add a check for memory allocation

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50162
    - bpf: devmap: provide rxq after redirect

  * Jammy update: v5.15.170 upstream stable release (LP: #2089272) //
    CVE-2024-50163
    - bpf: Make sure internal and UAPI bpf_redirect flags don't overlap

  * kernel:nft "Could not process rule: Device or resource busy" on unreferenced
    chain (LP: #2089699)
    - SAUCE: netfilter: nf_tables: Fix EBUSY on deleting unreferenced chain

  * WARN in trc_wait_for_one_reader about failed IPIs (LP: #2089373)
    - SAUCE: rcu-tasks: fix mismerge in trc_inspect_reader
    - rcu-tasks: Idle tasks on offline CPUs are in quiescent states

  * CVE-2024-35887
    - ax25: fix use-after-free bugs caused by ax25_ds_del_timer

  * CVE-2024-40965
    - clk: Add a devm variant of clk_rate_exclusive_get()
    - clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get()
    - i2c: lpi2c: Avoid calling clk_get_rate during transfer

  * CVE-2024-40982
    - ssb: Fix potential NULL pointer dereference in ssb_device_uevent()

  * CVE-2024-41066
    - ibmvnic: Add tx check to prevent skb leak

  * CVE-2024-42252
    - closures: Change BUG_ON() to WARN_ON()

  * CVE-2024-53097
    - mm: krealloc: Fix MTE false alarm in __do_krealloc

  * Add list of source files to linux-buildinfo (LP: #2086606)
    - [Packaging] Sort build dependencies alphabetically
    - [Packaging] Add list of used source files to buildinfo package

  * UFS: uspi->s_3apb UBSAN: shift-out-of-bounds (LP: #2087853)
    - ufs: ufs_sb_private_info: remove unused s_{2, 3}apb fields

  * Jammy update: v5.15.169 upstream stable release (LP: #2088231)
    - ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2
    - udf: New directory iteration code
    - udf: Convert udf_expand_dir_adinicb() to new directory iteration
    - udf: Move udf_expand_dir_adinicb() to its callsite
    - udf: Implement searching for directory entry using new iteration code
    - udf: Provide function to mark entry as deleted using new directory 
iteration
      code
    - udf: Convert udf_rename() to new directory iteration code
    - udf: Convert udf_readdir() to new directory iteration
    - udf: Convert udf_lookup() to use new directory iteration code
    - udf: Convert udf_get_parent() to new directory iteration code
    - udf: Convert empty_dir() to new directory iteration code
    - udf: Convert udf_rmdir() to new directory iteration code
    - udf: Convert udf_unlink() to new directory iteration code
    - udf: Implement adding of dir entries using new iteration code
    - udf: Convert udf_add_nondir() to new directory iteration
    - udf: Convert udf_mkdir() to new directory iteration code
    - udf: Convert udf_link() to new directory iteration code
    - udf: Remove old directory iteration code
    - udf: Handle error when expanding directory
    - udf: Don't return bh from udf_expand_dir_adinicb()
    - udf: Fix bogus checksum computation in udf_rename()
    - net: enetc: remove xdp_drops statistic from enetc_xdp_drop()
    - net: enetc: add missing static descriptor and inline keyword
    - posix-clock: Fix missing timespec64 check in pc_clock_settime()
    - arm64: probes: Remove broken LDR (literal) uprobe support
    - arm64: probes: Fix simulate_ldr*_literal()
    - net: macb: Avoid 20s boot delay by skipping MDIO bus registration for 
fixed-
      link PHY
    - irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1
    - fat: fix uninitialized variable
    - mm/swapfile: skip HugeTLB pages for unuse_vma
    - secretmem: disable memfd_secret() if arch cannot set direct map
    - dm-crypt, dm-verity: disable tasklets
    - KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin()
    - drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE)
    - io_uring/sqpoll: do not allow pinning outside of cpuset
    - io_uring/sqpoll: retain test for whether the CPU is valid
    - io_uring/sqpoll: do not put cpumask on stack
    - iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices
    - s390/sclp_vt220: Convert newlines to CRLF instead of LFCR
    - KVM: s390: Change virtual to physical address access in diag 0x258 handler
    - x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET
    - x86/cpufeatures: Add a IBPB_NO_RET BUG flag
    - x86/entry: Have entry_ibpb() invalidate return predictions
    - x86/bugs: Skip RSB fill at VMEXIT
    - x86/bugs: Do not use UNTRAIN_RET with IBPB on entry
    - blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race
    - io_uring/sqpoll: close race on waiting for sqring entries
    - drm/radeon: Fix encoder->possible_clones
    - drm/vmwgfx: Handle surface check failure correctly
    - iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig
    - iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig
    - iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig
    - iio: adc: ti-ads8688: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig
    - iio: hid-sensors: Fix an error handling path in
      _hid_sensor_set_report_latency()
    - iio: light: veml6030: fix ALS sensor resolution
    - iio: light: veml6030: fix IIO device retrieval from embedded device
    - iio: light: opt3001: add missing full-scale range value
    - iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in 
Kconfig
    - iio: adc: ti-ads124s08: add missing select IIO_(TRIGGERED_)BUFFER in 
Kconfig
    - Bluetooth: Remove debugfs directory on module init failure
    - Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001
    - xhci: Fix incorrect stream context type macro
    - xhci: Mitigate failed set dequeue pointer commands
    - USB: serial: option: add support for Quectel EG916Q-GL
    - USB: serial: option: add Telit FN920C04 MBIM compositions
    - parport: Proper fix for array out-of-bounds access
    - x86/resctrl: Annotate get_mem_config() functions as __init
    - x86/apic: Always explicitly disarm TSC-deadline timer
    - x86/entry_32: Do not clobber user EFLAGS.ZF
    - x86/entry_32: Clear CPU buffers after register restore in NMI return
    - pinctrl: ocelot: fix system hang on level based interrupts
    - irqchip/gic-v4: Don't allow a VMOVP on a dying VPE
    - mptcp: track and update contiguous data status
    - mptcp: handle consistently DSS corruption
    - tcp: fix mptcp DSS corruption due to large pmtu xmit
    - mptcp: fallback when MPTCP opts are dropped after 1st data
    - mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow
    - mptcp: prevent MPC handshake on port-based signal endpoints
    - nilfs2: propagate directory read errors from nilfs_find_entry()
    - powerpc/mm: Always update max/min_low_pfn in mem_topology_setup()
    - ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne
      1000 G2
    - Linux 5.15.169

 -- Manuel Diewald <manuel.diew...@canonical.com>  Fri, 07 Feb 2025
18:44:33 +0100

** Changed in: linux (Ubuntu Jammy)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-52913

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-35887

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-40965

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-40982

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-41066

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-41080

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-42252

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-42291

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50010

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50036

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50058

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50072

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50086

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50103

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50110

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50115

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50116

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50117

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50127

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50128

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50131

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50134

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50141

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50142

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50143

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50148

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50150

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50151

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50153

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50154

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50156

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50160

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50162

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50163

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50167

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50168

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50171

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50194

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50205

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50208

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50209

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50218

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50219

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50228

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50229

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50230

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50232

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50233

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50234

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50236

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50237

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50244

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50245

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50247

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50249

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50251

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50257

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50259

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50262

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50265

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50267

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50268

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50269

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50273

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50278

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50279

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50282

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50287

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50290

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50292

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50295

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50296

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50299

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50301

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50302

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53042

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53052

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53055

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53058

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53059

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53061

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53063

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53066

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53088

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53097

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-0927

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2089373

Title:
  WARN in trc_wait_for_one_reader about failed IPIs

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Released

Bug description:
  [Impact]

  When ending bpf tracing, 5.15 kernels now report a warning in
  trc_wait_for_one_reader() on platforms that support hot-plugging CPUs,
  but that do not have all of their hotplug slots populated.  In this
  submitter's environment, it reproduces on Xen EC2 instances, but not
  Nitro ones.

  The warning looks like this:

  kernel: [ 6416.920266] ------------[ cut here ]------------
  kernel: [ 6416.920272] trc_wait_for_one_reader(): smp_call_function_single() 
failed for CPU: 64
  kernel: [ 6416.920289] WARNING: CPU: 0 PID: 13 at kernel/rcu/tasks.h:1044 
trc_wait_for_one_reader+0x2b8/0x300
  kernel: [ 6416.920299] Modules linked in: xt_state xt_connmark 
nf_conntrack_netlink nfnetlink xt_addrtype xt_statistic xt_nat xt_tcpudp 
ip_vs_sh ip_vs_wrr ip_vs_rr ip_vs nvidia_uvm(POE) nvidia_drm(POE) 
drm_kms_helper cec rc_core fb_sys_fops syscopyarea sysfillrect sysimgblt 
nvidia_modeset(POE) nvidia(POE) iptable_mangle ip6table_mangle ip6table_filter 
ip6table_nat ip6_tables xt_MASQUERADE xt_conntrack xt_comment iptable_filter 
xt_mark iptable_nat nf_nat bpfilter aufs overlay udp_diag tcp_diag inet_diag 
binfmt_misc nls_iso8859_1 dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel sha256_ssse3 sha1_ssse3 
aesni_intel input_leds psmouse crypto_simd cryptd serio_raw floppy sch_fq_codel 
nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c ena drm efi_pstore 
ip_tables x_tables autofs4
  kernel: [ 6416.920368] CPU: 0 PID: 13 Comm: rcu_tasks_trace Tainted: P OE 
5.15.0-1071-aws #77~20.04.1-Ubuntu
  kernel: [ 6416.920372] Hardware name: Xen HVM domU, BIOS 4.11.amazon 
08/24/2006
  kernel: [ 6416.920374] RIP: 0010:trc_wait_for_one_reader+0x2b8/0x300
  kernel: [ 6416.920376] Code: 00 00 00 4c 89 ef e8 37 ac 4e 00 eb 9f 44 89 fa 
48 c7 c6 00 63 e2 b8 48 c7 c7 a0 9a 1e b9 c6 05 2f 2e 09 02 01 e8 15 2e b9 00 
<0f> 0b e9 31 ff ff ff 4c 89 ee 48 c7 c7 20 df b7 b9 e8 a2 99 52 00
  kernel: [ 6416.920380] RSP: 0018:ffff9e048c4efe00 EFLAGS: 00010286
  kernel: [ 6416.920382] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 
0000000000000027
  kernel: [ 6416.920384] RDX: 0000000000000027 RSI: 0000000000000003 RDI: 
ffff93074ae20588
  kernel: [ 6416.920385] RBP: ffff9e048c4efe28 R08: ffff93074ae20580 R09: 
0000000000000001
  kernel: [ 6416.920387] R10: 0000000000ffff0a R11: ffff93463feb2c7f R12: 
ffff92cbc6a1e600
  kernel: [ 6416.920389] R13: 0000000000000040 R14: 00000000000205a4 R15: 
0000000000000040
  kernel: [ 6416.920390] FS: 0000000000000000(0000) GS:ffff93074ae00000(0000) 
knlGS:0000000000000000
  kernel: [ 6416.920393] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  kernel: [ 6416.920394] CR2: 00007f4a72b04098 CR3: 00000046c8964001 CR4: 
00000000001706f0
  kernel: [ 6416.920399] Call Trace:
  kernel: [ 6416.920401] <TASK>
  kernel: [ 6416.920404] ? show_regs.cold+0x1a/0x1f
  kernel: [ 6416.920410] ? trc_wait_for_one_reader+0x2b8/0x300
  kernel: [ 6416.920412] ? __warn+0x8b/0xe0
  kernel: [ 6416.920418] ? trc_wait_for_one_reader+0x2b8/0x300
  kernel: [ 6416.920421] ? report_bug+0xd5/0x110
  kernel: [ 6416.920427] ? handle_bug+0x39/0x90
  kernel: [ 6416.920431] ? exc_invalid_op+0x19/0x70
  kernel: [ 6416.920434] ? asm_exc_invalid_op+0x1b/0x20
  kernel: [ 6416.920442] ? trc_wait_for_one_reader+0x2b8/0x300
  kernel: [ 6416.920446] rcu_tasks_trace_postscan+0x47/0x80
  kernel: [ 6416.920449] rcu_tasks_wait_gp+0x108/0x210
  kernel: [ 6416.920453] rcu_tasks_kthread+0x10f/0x1c0
  kernel: [ 6416.920456] ? wait_woken+0x60/0x60
  kernel: [ 6416.920462] ? show_rcu_tasks_trace_gp_kthread+0x80/0x80
  kernel: [ 6416.920464] kthread+0x12a/0x150
  kernel: [ 6416.920471] ? set_kthread_struct+0x50/0x50
  kernel: [ 6416.920476] ret_from_fork+0x22/0x30
  kernel: [ 6416.920485] </TASK>
  kernel: [ 6416.920486] ---[ end trace 0500611ddaff33a7 ]---

  The problem appears when:

  - The system is performing a rcu_tasks_trace grace period wait
  - The system has more hot plug CPU slots available than are populated
  - The rcu tasks postscan detects a holdout

  The problem is actually caused by a mismerge of 9b3c4ab304("sched,rcu:
  Rework try_invoke_on_locked_down_task()").  When that patch was
  applied, a conflict around task nesting was improperly resolved and
  lead to quiescent tasks getting flagged as holdouts.  This in turn
  results in more IPIs than necessary to idle CPUs, as well as WARNs
  about failing to send IPIs to CPUs that aren't running.

  The fix is a twofer: 1) manually correct the mismerge in the same way
  that mainline resolved the conflict, and 2) backport an additional RCU
  patch that confines the rcu_tasks postscan to only CPUs that are
  running.

  [Backport]

  The upstream merge that shows the correct manual resolution of the
  merge conflicts is in this commit:

     commit 6fedc28076bbbb32edb722e80f9406a3d1d668a8
     Merge tag 'rcu.2021.11.01a' of 
git://git.kernel.org/pub/scm/linux/kernel/git/paulmck/linux-rcu

  specifically:

   > @@ -951,18 +942,18 @@ static int trc_inspect_reader(struct task_struct *t, 
void *arg)
   >            n_heavy_reader_updates++;
   >            if (ofl)
   >                    n_heavy_reader_ofl_updates++;
   > -          in_qs = true;
   > +          nesting = 0;
   >    } else {
   >            // The task is not running, so C-language access is safe.
   > -          in_qs = likely(!t->trc_reader_nesting);
   > +          nesting = t->trc_reader_nesting;
   >    }
   >  
   > -  // Mark as checked so that the grace-period kthread will
   > -  // remove it from the holdout list.
   > -  t->trc_reader_checked = true;
   > -
   > -  if (in_qs)
   > -          return 0;  // Already in quiescent state, done!!!
   > +  // If not exiting a read-side critical section, mark as checked
   > +  // so that the grace-period kthread will remove it from the
   > +  // holdout list.
   > +  t->trc_reader_checked = nesting >= 0;
   > +  if (nesting <= 0)
   > +          return nesting ? -EINVAL : 0;  // If in QS, done, otherwise try 
again later.

  The additional rcu_tasks patch for only running postscan on online
  cpus is:

     commit 5c9a9ca44fda41c5e82f50efced5297a9c19760d
     rcu-tasks: Idle tasks on offline CPUs are in quiescent

  I've additionally reached out to upstream about including this in
  stable:

  
https://lore.kernel.org/stable/c56243da5c8b4451097b39468166248790f9a1de.1732237776.git.k...@templeofstupid.com/T/#t

  [Test]

  A trivial reproducer for this problem is to use an up-to-date version
  of bpftrace to run a kfunc probe, which when destroyed uses the
  rcu_tasks_trace facility to cleanup:

     bpftrace -e 'kfunc:tcp_reset {@a = count();}'
     ^C

  Is all that's necessary to reproduce the problem on a Xen EC2 system.

  I've run with and without the patches applied and can confirm that one
  and both are sufficient to resolve the problem.  Correcting the
  nesting ensures that idling cpus don't get flagged as holdouts, and
  confining the scan to just online cpus ensures that even if we
  incorrectly flag a cpu as a holdout the warning won't trigger because
  sending the IPI won't fail.

  [Potential Regression]

  The regression potential is low.  The corrected commit has been
  present in mainline since 2021 and the fix to only run postscan on
  online CPUs has been present since 2022.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2089373/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to