Bug#1043585: marked as done (AMD64 Kernel update prevents an emulated TPM working correctly inside Windows 11 KVM guest OS)
Your message dated Fri, 29 Sep 2023 08:47:09 + with message-id and subject line Bug#1043585: fixed in linux 6.1.52-1 has caused the Debian Bug report #1043585, regarding AMD64 Kernel update prevents an emulated TPM working correctly inside Windows 11 KVM guest OS to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1043585: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043585 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: linux-image Version: 6.1.0-11-amd64 When latest Debian kernel is installed it is causing a problem with KVM virtual machine and the current version of QEMU on Bookworm. This is when swtpm is used to provide an emulated TPM for the guest OS. The guest OS is windows 11. swtpm does not receive commands from the host OS, something has been broken in KVM side I suspect this could be caused by recent CPU security patches or patches to KVM itself. The guest OS reports a code 10 on the TPM driver, and the TPM device is unusable. Trying a slightly older kernel the TPM is working as expected. I also noticed the same issue with vanilla kernels built from kernel.org for example kernel-6.1.44 and kernel-6.1.45 has this issue and kernel 6.1.42 does not. So its some recent patch is likely causing it. I have two AMD64 machines with Ryzen processors and both exhibit this issue, I hope that it should be easily reproducible with a Ryzen CPU. One Machine has this CPU: AMD Ryzen 9 3950X 16-Core Processor The other machine has this CPU: AMD Ryzen 7 1800X 8-Core Processor Kind Regards, Martin Johnson. --- End Message --- --- Begin Message --- Source: linux Source-Version: 6.1.52-1 Done: Salvatore Bonaccorso We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1043...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 07 Sep 2023 09:39:52 +0200 Source: linux Architecture: source Version: 6.1.52-1 Distribution: bookworm-security Urgency: high Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Closes: 1036744 1042753 1043564 1043585 1050622 1051163 Changes: linux (6.1.52-1) bookworm-security; urgency=high . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.39 - fs: pipe: reveal missing function protoypes - block: Fix the type of the second bdev_op_is_zoned_write() argument - erofs: clean up cached I/O strategies - erofs: avoid tagged pointers to mark sync decompression - erofs: remove tagged pointer helpers - erofs: move zdata.h into zdata.c - erofs: kill hooked chains to avoid loops on deduplicated compressed images - [x86] resctrl: Only show tasks' pid in current pid namespace - blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost - [x86] sev: Fix calculation of end address based on number of pages - virt: sevguest: Add CONFIG_CRYPTO dependency - blk-mq: fix potential io hang by wrong 'wake_batch' - lockd: drop inappropriate svc_get() from locked_get() - nvme-core: fix memory leak in dhchap_secret_store - nvme-core: fix memory leak in dhchap_ctrl_secret - nvme-core: add missing fault-injection cleanup - nvme-core: fix dev_pm_qos memleak - md/raid10: check slab-out-of-bounds in md_bitmap_get_counter - md/raid10: fix overflow of md/safe_mode_delay - md/raid10: fix wrong setting of max_corr_read_errors - md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request - md/raid10: fix io loss while replacement replace rdev - md/raid1-10: factor out a helper to add bio to plug - md/raid1-10: factor out a helper to submit normal write - md/raid1-10: submit write io directly if bitmap is not enabled - block: fix blktrace debugfs entries leakage - irqchip/stm32-exti: Fix warning on initialized field overwritten - irqchip/jcore-aic: Fix missing allocation of IRQ descriptors - sv
Bug#1043585: marked as done (AMD64 Kernel update prevents an emulated TPM working correctly inside Windows 11 KVM guest OS)
Your message dated Fri, 18 Aug 2023 05:00:11 + with message-id and subject line Bug#1043585: fixed in linux 6.4.11-1 has caused the Debian Bug report #1043585, regarding AMD64 Kernel update prevents an emulated TPM working correctly inside Windows 11 KVM guest OS to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1043585: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043585 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: linux-image Version: 6.1.0-11-amd64 When latest Debian kernel is installed it is causing a problem with KVM virtual machine and the current version of QEMU on Bookworm. This is when swtpm is used to provide an emulated TPM for the guest OS. The guest OS is windows 11. swtpm does not receive commands from the host OS, something has been broken in KVM side I suspect this could be caused by recent CPU security patches or patches to KVM itself. The guest OS reports a code 10 on the TPM driver, and the TPM device is unusable. Trying a slightly older kernel the TPM is working as expected. I also noticed the same issue with vanilla kernels built from kernel.org for example kernel-6.1.44 and kernel-6.1.45 has this issue and kernel 6.1.42 does not. So its some recent patch is likely causing it. I have two AMD64 machines with Ryzen processors and both exhibit this issue, I hope that it should be easily reproducible with a Ryzen CPU. One Machine has this CPU: AMD Ryzen 9 3950X 16-Core Processor The other machine has this CPU: AMD Ryzen 7 1800X 8-Core Processor Kind Regards, Martin Johnson. --- End Message --- --- Begin Message --- Source: linux Source-Version: 6.4.11-1 Done: Salvatore Bonaccorso We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1043...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 17 Aug 2023 21:46:04 +0200 Source: linux Architecture: source Version: 6.4.11-1 Distribution: unstable Urgency: medium Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Closes: 1038385 1039092 1042540 1043585 Changes: linux (6.4.11-1) unstable; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.5 - security/integrity: fix pointer to ESL data and its size on pseries - HID: input: fix mapping for camera access keys - [amd64] HID: amd_sfh: Rename the float32 variable - [amd64] HID: amd_sfh: Fix for shift-out-of-bounds - net: lan743x: Don't sleep in atomic context - net: lan743x: select FIXED_PHY - ksmbd: add missing compound request handing in some commands - ksmbd: fix out of bounds read in smb2_sess_setup - drm/panel: simple: Add connector_type for innolux_at043tn24 - drm: bridge: dw_hdmi: fix connector access for scdc - drm/bridge: ti-sn65dsi86: Fix auxiliary bus lifetime - swiotlb: always set the number of areas before allocating the pool - swiotlb: reduce the number of areas to match actual memory pool size - drm/panel: simple: Add Powertip PH800480T013 drm_display_mode flags - xen/virtio: Fix NULL deref when a bridge of PCI root bus has no parent - netfilter: nf_tables: report use refcount overflow - netfilter: conntrack: don't fold port numbers into addresses before hashing - ice: Fix max_rate check while configuring TX rate limits - ice: Fix tx queue rate limit when TCs are configured - igc: Add condition for qbv_config_change_errors counter - igc: Remove delay during TX ring configuration - igc: Add igc_xdp_buff wrapper for xdp_buff in driver - igc: Add XDP hints kfuncs for RX hash - igc: Fix TX Hang issue when QBV Gate is closed - net/mlx5e: fix double free in mlx5e_destroy_flow_table - net/mlx5e: fix memory leak in mlx5e_fs_tt_redirect_any_create - net/mlx5e: fix memory leak in mlx5e_ptp_open - net/mlx5e: RX, Fix flush and close release flow