Processed: Re: Bug#1049448: new kernel updating problem
Processing control commands: > reassign -1 linux-image-6.1.0-11-amd64 6.1.38-4 Bug #1049448 [upgrade-reports] new kernel updating problem Bug reassigned from package 'upgrade-reports' to 'linux-image-6.1.0-11-amd64'. Ignoring request to alter found versions of bug #1049448 to the same values previously set Ignoring request to alter fixed versions of bug #1049448 to the same values previously set Bug #1049448 [linux-image-6.1.0-11-amd64] new kernel updating problem Marked as found in versions linux-signed-amd64/6.1.38+4. -- 1049448: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1049448 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Re: Bug#1049448: new kernel updating problem
Control: reassign -1 linux-image-6.1.0-11-amd64 6.1.38-4 Hi slimshady, Given that it's linux-image-6.1.0-11-amd64 failing to install, I reassign this bug to that package. However, I wonder if you noticed this in your error log: raspi-firmware: missing /boot/firmware, did you forget to mount it? I'm not familiar with raspi-firmware nor run-parts, but isn't this likely pointing at a problem with your system that you need to fix first? Paul On 15-08-2023 23:02, slimshady wrote: Package: upgrade-reports Severity: important X-Debbugs-Cc: slimshad...@zohomail.eu (Please provide enough information to help the Debian maintainers evaluate the report efficiently - e.g., by filling in the sections below.) My previous release is: I am upgrading to: Archive date: Upgrade date: 15/08/2023 uname -a before upgrade: 6.1.0-9-amd64 uname -a after upgrade: 6.1.0-11-amd64 Method: discover Contents of /etc/apt/sources.list: - Were there any non-Debian packages installed before the upgrade? If so, what were they? no - Was the system pre-update a 'pure' system only containing packages from the previous release? If not, which packages were not from that release? - Did any packages fail to upgrade? - Were there any problems with the system after upgrading? Further Comments/Problems: Please attach the output of "COLUMNS=200 dpkg -l" (or "env COLUMNS ...", depending on your shell) from before and after the upgrade so that we know what packages were installed on your system. Setting up initramfs-tools (0.142) ... update-initramfs: deferring update (trigger activated) Setting up linux-image-6.1.0-11-amd64 (6.1.38-4) ... /etc/kernel/postinst.d/initramfs-tools: update-initramfs: Generating /boot/initrd.img-6.1.0-11-amd64 raspi-firmware: missing /boot/firmware, did you forget to mount it? run-parts: /etc/initramfs/post-update.d//z50-raspi-firmware exited with return code 1 run-parts: /etc/kernel/postinst.d/initramfs-tools exited with return code 1 dpkg: error processing package linux-image-6.1.0-11-amd64 (--configure): installed linux-image-6.1.0-11-amd64 package post-installation script subprocess returned error exit status 1 Setting up python3-charset-normalizer (3.0.1-2) ... dpkg: dependency problems prevent configuration of linux-image-amd64: linux-image-amd64 depends on linux-image-6.1.0-11-amd64 (= 6.1.38-4); however: Package linux-image-6.1.0-11-amd64 is not configured yet. dpkg: error processing package linux-image-amd64 (--configure): dependency problems - leaving unconfigured OpenPGP_signature.asc Description: OpenPGP digital signature
Re: Bug#1026335: Review of the initial packaging of the carl9170 firmware
On Sun, 2023-08-13 at 11:51 +, John Scott wrote: > Because carl9170 is largely under the GPL and we're obligated to > distribute complete sources for our binaries, I've set Static-Built- > Using on both gcc (because of libgcc) and Newlib. FYI, that wasn't the correct thing to do. Built-Using is for license compliance cases: https://www.debian.org/doc/debian-policy/ch-relationships.html#additional-source-packages-used-to-build-the-binary-built-using Static-Built-Using is for other static linking or embedding cases. The static linking wiki page needs updates for Static-Built-Using and the predecessors of it used by the Rust and Golang packages. https://wiki.debian.org/StaticLinking -- bye, pabs https://wiki.debian.org/PaulWise signature.asc Description: This is a digitally signed message part
linux-signed-i386_6.5~rc6+1~exp1_source.changes ACCEPTED into experimental
Thank you for your contribution to Debian. Mapping rc-buggy to experimental. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 15 Aug 2023 13:01:14 +0200 Source: linux-signed-i386 Architecture: source Version: 6.5~rc6+1~exp1 Distribution: rc-buggy Urgency: medium Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Changes: linux-signed-i386 (6.5~rc6+1~exp1) experimental; urgency=medium . * Sign kernel from linux 6.5~rc6-1~exp1 . * New upstream release candidate . [ Aurelien Jarno ] * [riscv64] enable CONFIG_ACPI * [riscv64] improve Starfive JH7110 support: enable CRYPTO_DEV_JH7110, SND_SOC, SND_SOC_STARFIVE and SND_SOC_JH7110_TDM as modules . [ Stuart Hayhurst ] * [x86] drivers/platform/x86/lenovo-ymc: Enable LENOVO_YMC as module . [ Diederik de Haas ] * [rt] Update to 6.5-rc4-rt2 Checksums-Sha1: 97fa3a1189594c7292e7a9681509d85e618a68ed 13864 linux-signed-i386_6.5~rc6+1~exp1.dsc bbe8910514556e85e54c027221055719b0b3e25d 3917504 linux-signed-i386_6.5~rc6+1~exp1.tar.xz Checksums-Sha256: a641b29f0c65417db11cff2f84513e5f271792a0837b77ae6dcdd051f29f6f8a 13864 linux-signed-i386_6.5~rc6+1~exp1.dsc 82f36760ba838c07b027f584e4ebf7f52fc30acefb6b670f56ea0907d9d52127 3917504 linux-signed-i386_6.5~rc6+1~exp1.tar.xz Files: e44c2c2d164e1ee53cd8d7e4dee0fad9 13864 kernel optional linux-signed-i386_6.5~rc6+1~exp1.dsc f2cbab9dc40cdb22d3acd16caee52a0a 3917504 kernel optional linux-signed-i386_6.5~rc6+1~exp1.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmTcE8kACgkQi0FRiLdO NzaaHhAAqZXuGbft0eaoOrP+Hfv+OvyGxL7LZ+S7CSkvqxa26nibsfZe16boM+BK 5N8kkK50aXCpkp924ht5pN6SSizpT03sary7FTVd3+YsBStfRQCBEJ4kioEvFMLM zHyc4yWT6NzShHCmFdWw/KO2sGkpdD55UGwAt+Hy1Zz4ijrxFfq7o3v1TgiAZdg2 uYHkIOUIujQK4w4p/32v1XKgt657znWjnQjttA1gT2gPsAn/58KiYm0B1cNKCelK IcGV6Q9w50GYf23V8yqCtGUz0HWr3WexIcOnDSYjdXuN9u9d5FI/3m+DIWA+tFfE /S4MGqgLvHTBhLtj3TClAnReb7bYXudkzM+UEXG8j/KS2dhuvl2ASCE0DALMYsoy s5q1+A6ZP1VB6K0sPRmYXJDBSaai0iklt03lmNSOtVdX2gZu9azg2wmDOJ4ovWl2 +W4+ITx7vVIKoCtrUaqkhOV1NGstmhpj28rpX4/8eJ7IqFrp9FKMuexE72a3aRsK WtKgacH+uZVSry/PzL8hxwwxA7MSCvIhuQeflQemhqeb+tXi9KtmZ7cCXUgKwjrS t1NtHI+Gh9RA3X9oiF6hWOTRK0MYUuubKA7ZZZ0wRxUH4avuKb+7E2gr604CEwv+ hPSRL3MNMiWFBQCFiym7cRM71qP9SxXhU4HI7wgzO2QdEiOL0pQ= =z2+L -END PGP SIGNATURE-
Processing of linux-signed-i386_6.5~rc6+1~exp1_source.changes
linux-signed-i386_6.5~rc6+1~exp1_source.changes uploaded successfully to localhost along with the files: linux-signed-i386_6.5~rc6+1~exp1.dsc linux-signed-i386_6.5~rc6+1~exp1.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)
Bug#1049450: New rpc.mountd rejects -N 2 option
Package: nfs-kernel-server Version: 1:2.6.2-4 Hopefully SSIA. `rpc.mountd` has a -N option to disable versions of NFS. I had been previously using "-N 2", but that is now broken. The error message was quite non-helpful ("nfsd2" if I recall correctly). Upon removing "-N 2", luckily NFSv2 didn't get enabled, but this was still annoying to deal with. At worst using a deprecated setting should merely generate a warning. -- (\___(\___(\__ --=> 8-) EHM <=-- __/)___/)___/) \BS (| ehem+sig...@m5p.com PGP 87145445 |) / \_CS\ | _ -O #include O- _ | / _/ 8A19\___\_|_/58D2 7E3D DDF4 7BA6 <-PGP-> 41D1 B375 37D0 8714\_|_/___/5445
linux-signed-amd64_6.5~rc6+1~exp1_source.changes ACCEPTED into experimental
Thank you for your contribution to Debian. Mapping rc-buggy to experimental. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 15 Aug 2023 13:01:14 +0200 Source: linux-signed-amd64 Architecture: source Version: 6.5~rc6+1~exp1 Distribution: rc-buggy Urgency: medium Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Changes: linux-signed-amd64 (6.5~rc6+1~exp1) experimental; urgency=medium . * Sign kernel from linux 6.5~rc6-1~exp1 . * New upstream release candidate . [ Aurelien Jarno ] * [riscv64] enable CONFIG_ACPI * [riscv64] improve Starfive JH7110 support: enable CRYPTO_DEV_JH7110, SND_SOC, SND_SOC_STARFIVE and SND_SOC_JH7110_TDM as modules . [ Stuart Hayhurst ] * [x86] drivers/platform/x86/lenovo-ymc: Enable LENOVO_YMC as module . [ Diederik de Haas ] * [rt] Update to 6.5-rc4-rt2 Checksums-Sha1: afd1a3977f36c9407a2de62923637988d687be30 8415 linux-signed-amd64_6.5~rc6+1~exp1.dsc 296064be9d3e5dccf4afdb6f7a2d1af319aa96bb 3020768 linux-signed-amd64_6.5~rc6+1~exp1.tar.xz Checksums-Sha256: 101ca7af086e15fef5a7c08b7131f38abc03b95d5dba44e306ff203959a37139 8415 linux-signed-amd64_6.5~rc6+1~exp1.dsc 53a7ed96bae3212e6ac2bd2201ab1f1b3f6568b99f1a7ea59d0c0647e7fda549 3020768 linux-signed-amd64_6.5~rc6+1~exp1.tar.xz Files: 03872c0a620a2ad2b93fea636eb650bd 8415 kernel optional linux-signed-amd64_6.5~rc6+1~exp1.dsc 8e4480a7c22ba9866dca235121164776 3020768 kernel optional linux-signed-amd64_6.5~rc6+1~exp1.tar.xz -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEEfKFfvHEI+gkU+E+di0FRiLdONzYFAmTb4IkACgkQi0FRiLdO NzYLjA//WwAe9SGO43EY8wfmofegGyBykXnRAediwa6gstuHvJXAWkeIp+6utR4/ pf1diuH3h1gCNcDDqGzsh6twraTCkgHZhJgQFL1tFgWgF8h/E6xNtKYseKa0Q+X9 dJ8uYwLtdrYQClF9MMu2lDc8/4kDlHKckxeoZppchNq5S13DdYAr0Qm0Q5W64ZnA UeTNI3NRjjWtIKPrc2d9zeY+grx5IunQigSiqWHPpm7eQmq5luAlLrUahgbPlSRF mXMPP1ybOb0zQCeDz96+RT5yy5dRUTT1pjuKLa2q/sMPAiLC+lMJ8kqudy5rBXGq 565MsV8hM1zJ71DhH6PAZk5zZ65BxIjn05r9AkNWQBQJga2Fc7j5Vo0ZopmXNzsi e3Z5f0Wn//ZPQTB2ajwq1d9w9qpitseamtFFiHxomfYr9OevvwFFoF33yEej0D1t 2mRzY/kFxSvvnmxghOkNk/wsmkLunDhhpgy4QEWbD8qra+Lz87nEarAkRkXJQlch K7nhgIwfYolu6Ju5wjfdKKfrKTzbVA0d4Y9oZ+8vFBItQz12iAtGICg+UaQXZiVK AXUWBSjQATMciU8IqxIVosNOmp6E26V8pSrswJCO2xBNbfmqYOvqDGT2O9WZWW4L Kg1sxB+yuqzrFIJgLwKlk+yK1VoBkeyRaB1GIZDSGUJ3nDgvNV8= =sVtt -END PGP SIGNATURE-
Bug#1044518: linux: "RIP: 0010:get_xsave_addr+0x9b/0xb0" stacktrace in early boot with -24 bullseye kernel
Hi Adam, On Tue, Aug 15, 2023 at 10:48:35PM +0200, Salvatore Bonaccorso wrote: > Control: tags -1 + upstream > > Hi Adam, > > On Tue, Aug 15, 2023 at 10:06:16PM +0200, Salvatore Bonaccorso wrote: > > Hi Adam, > > > > On Tue, Aug 15, 2023 at 09:37:36PM +0200, Salvatore Bonaccorso wrote: > > > Control: tags -1 + confirmed > > > > > > Hi Adam, > > > > > > On Tue, Aug 15, 2023 at 06:26:59PM +0100, Adam D. Barratt wrote: > > > > On Sun, 2023-08-13 at 18:21 +0100, Adam D. Barratt wrote: > > > > > Since the kernels on both the host and guests were upgraded to > > > > > 5.10.179-5 (from 5.10.179-3), the guests on one of our Ganeti > > > > > clusters > > > > > have been reporting as tainted. Looking at dmesg shows the following > > > > > trace early in boot: > > > > > > > > > > > > > I realised that a little bit more of the surrounding context from dmesg > > > > might help: > > > > > > > > [0.093383] kvm-guest: setup PV IPIs > > > > [0.094931] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 > > > > [0.094968] clocksource: tsc-early: mask: 0x > > > > max_cycles: 0x1e33052aadd, max_idle_ns: 440795310221 ns > > > > [0.094974] Calibrating delay loop (skipped) preset value.. 4190.15 > > > > BogoMIPS (lpj=8380304) > > > > [0.095097] x86/cpu: User Mode Instruction Prevention (UMIP) > > > > activated > > > > [0.095106] [ cut here ] > > > > [0.095107] get of unsupported state > > > > [0.095120] WARNING: CPU: 0 PID: 0 at > > > > arch/x86/kernel/fpu/xstate.c:973 get_xsave_addr+0x9b/0xb0 > > > > [0.095122] Modules linked in: > > > > [0.095126] CPU: 0 PID: 0 Comm: swapper/0 Not tainted > > > > 5.10.0-24-amd64 #1 Debian 5.10.179-5 > > > > [0.095128] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), > > > > BIOS 1.14.0-2 04/01/2014 > > > > [0.095131] RIP: 0010:get_xsave_addr+0x9b/0xb0 > > > > [0.095134] Code: 48 83 c4 08 5b e9 15 80 bc 00 80 3d 8d 7c 80 01 00 > > > > 75 a8 48 c7 c7 97 de eb 94 89 74 24 04 c6 05 79 7c 80 01 01 e8 f5 96 88 > > > > 00 <0f> 0b 8b 74 24 04 eb 89 31 c0 e9 e6 7f bc 00 66 0f 1f 44 00 00 89 > > > > [0.095136] RSP: :95403ec8 EFLAGS: 00010282 > > > > [0.095139] RAX: RBX: 9566a600 RCX: > > > > 954b3768 > > > > [0.095141] RDX: c000efff RSI: efff RDI: > > > > 0247 > > > > [0.095142] RBP: 9566a4a0 R08: R09: > > > > 95403ce8 > > > > [0.095144] R10: 95403ce0 R11: 954cb7a8 R12: > > > > 0246 > > > > [0.095145] R13: R14: R15: > > > > > > > > [0.095148] FS: () GS:911abec0() > > > > knlGS: > > > > [0.095149] CS: 0010 DS: ES: CR0: 80050033 > > > > [0.095151] CR2: 911a95801000 CR3: 13e0a001 CR4: > > > > 007308b0 > > > > [0.095155] DR0: DR1: DR2: > > > > > > > > [0.095156] DR3: DR6: fffe0ff0 DR7: > > > > 0400 > > > > [0.095158] Call Trace: > > > > [0.095166] identify_cpu+0x51f/0x540 > > > > [0.095171] identify_boot_cpu+0xc/0x94 > > > > [0.095174] arch_cpu_finalize_init+0x5/0x47 > > > > [0.095177] start_kernel+0x4ec/0x599 > > > > [0.095183] secondary_startup_64_no_verify+0xb0/0xbb > > > > [0.095188] ---[ end trace 438682bdad114415 ]--- > > > > [0.095288] Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 > > > > [0.095289] Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 > > > > [0.095296] Spectre V1 : Mitigation: usercopy/swapgs barriers and > > > > __user pointer sanitization > > > > > > Confirmed I can reproduce it. > > > > 5.10.191-rc1 does not exibit the problem. > > > > Will further investigate. > > Quick summary: v5.10.190 upstream exhibit the same problem, so not a > backporting problem, and v5.10.191-rc1 for the upcoming 5.10.191 seems > to fix the issue. This should be fixed by b3607269ff57 ("x86/pkeys: Revert a5eff7259790 ("x86/pkeys: Add PKRU value to init_fpstate")")[1] upstream, which is going to be a pplied in 5.10.191. [1] https://git.kernel.org/linus/b3607269ff57fd3c9690cb25962c5e4b91a0fd3b Regards, Salvatore
Processing of linux-signed-amd64_6.5~rc6+1~exp1_source.changes
linux-signed-amd64_6.5~rc6+1~exp1_source.changes uploaded successfully to localhost along with the files: linux-signed-amd64_6.5~rc6+1~exp1.dsc linux-signed-amd64_6.5~rc6+1~exp1.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)
Processed: Re: Bug#1044518: linux: "RIP: 0010:get_xsave_addr+0x9b/0xb0" stacktrace in early boot with -24 bullseye kernel
Processing control commands: > tags -1 + upstream Bug #1044518 [src:linux] linux: "RIP: 0010:get_xsave_addr+0x9b/0xb0" stacktrace in early boot with -24 bullseye kernel Added tag(s) upstream. -- 1044518: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1044518 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#1044518: linux: "RIP: 0010:get_xsave_addr+0x9b/0xb0" stacktrace in early boot with -24 bullseye kernel
Control: tags -1 + upstream Hi Adam, On Tue, Aug 15, 2023 at 10:06:16PM +0200, Salvatore Bonaccorso wrote: > Hi Adam, > > On Tue, Aug 15, 2023 at 09:37:36PM +0200, Salvatore Bonaccorso wrote: > > Control: tags -1 + confirmed > > > > Hi Adam, > > > > On Tue, Aug 15, 2023 at 06:26:59PM +0100, Adam D. Barratt wrote: > > > On Sun, 2023-08-13 at 18:21 +0100, Adam D. Barratt wrote: > > > > Since the kernels on both the host and guests were upgraded to > > > > 5.10.179-5 (from 5.10.179-3), the guests on one of our Ganeti > > > > clusters > > > > have been reporting as tainted. Looking at dmesg shows the following > > > > trace early in boot: > > > > > > > > > > I realised that a little bit more of the surrounding context from dmesg > > > might help: > > > > > > [0.093383] kvm-guest: setup PV IPIs > > > [0.094931] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 > > > [0.094968] clocksource: tsc-early: mask: 0x > > > max_cycles: 0x1e33052aadd, max_idle_ns: 440795310221 ns > > > [0.094974] Calibrating delay loop (skipped) preset value.. 4190.15 > > > BogoMIPS (lpj=8380304) > > > [0.095097] x86/cpu: User Mode Instruction Prevention (UMIP) activated > > > [0.095106] [ cut here ] > > > [0.095107] get of unsupported state > > > [0.095120] WARNING: CPU: 0 PID: 0 at arch/x86/kernel/fpu/xstate.c:973 > > > get_xsave_addr+0x9b/0xb0 > > > [0.095122] Modules linked in: > > > [0.095126] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.10.0-24-amd64 > > > #1 Debian 5.10.179-5 > > > [0.095128] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), > > > BIOS 1.14.0-2 04/01/2014 > > > [0.095131] RIP: 0010:get_xsave_addr+0x9b/0xb0 > > > [0.095134] Code: 48 83 c4 08 5b e9 15 80 bc 00 80 3d 8d 7c 80 01 00 > > > 75 a8 48 c7 c7 97 de eb 94 89 74 24 04 c6 05 79 7c 80 01 01 e8 f5 96 88 > > > 00 <0f> 0b 8b 74 24 04 eb 89 31 c0 e9 e6 7f bc 00 66 0f 1f 44 00 00 89 > > > [0.095136] RSP: :95403ec8 EFLAGS: 00010282 > > > [0.095139] RAX: RBX: 9566a600 RCX: > > > 954b3768 > > > [0.095141] RDX: c000efff RSI: efff RDI: > > > 0247 > > > [0.095142] RBP: 9566a4a0 R08: R09: > > > 95403ce8 > > > [0.095144] R10: 95403ce0 R11: 954cb7a8 R12: > > > 0246 > > > [0.095145] R13: R14: R15: > > > > > > [0.095148] FS: () GS:911abec0() > > > knlGS: > > > [0.095149] CS: 0010 DS: ES: CR0: 80050033 > > > [0.095151] CR2: 911a95801000 CR3: 13e0a001 CR4: > > > 007308b0 > > > [0.095155] DR0: DR1: DR2: > > > > > > [0.095156] DR3: DR6: fffe0ff0 DR7: > > > 0400 > > > [0.095158] Call Trace: > > > [0.095166] identify_cpu+0x51f/0x540 > > > [0.095171] identify_boot_cpu+0xc/0x94 > > > [0.095174] arch_cpu_finalize_init+0x5/0x47 > > > [0.095177] start_kernel+0x4ec/0x599 > > > [0.095183] secondary_startup_64_no_verify+0xb0/0xbb > > > [0.095188] ---[ end trace 438682bdad114415 ]--- > > > [0.095288] Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 > > > [0.095289] Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 > > > [0.095296] Spectre V1 : Mitigation: usercopy/swapgs barriers and > > > __user pointer sanitization > > > > Confirmed I can reproduce it. > > 5.10.191-rc1 does not exibit the problem. > > Will further investigate. Quick summary: v5.10.190 upstream exhibit the same problem, so not a backporting problem, and v5.10.191-rc1 for the upcoming 5.10.191 seems to fix the issue. Regards, Salvatore
linux_6.4.4-3~bpo12+1_source.changes ACCEPTED into stable-backports
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 08 Aug 2023 20:31:30 +0200 Source: linux Architecture: source Version: 6.4.4-3~bpo12+1 Distribution: bookworm-backports Urgency: high Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Closes: 1041855 Changes: linux (6.4.4-3~bpo12+1) bookworm-backports; urgency=medium . * Rebuild for bookworm-backports: - Set ABI to 0.deb12.2 . linux (6.4.4-3) unstable; urgency=high . * io_uring: gate iowait schedule on having pending requests (Closes: #1041855) * [x86] Add mitigations for Gather Data Sampling (GDS) (CVE-2022-40982) - init: Provide arch_cpu_finalize_init() - x86/cpu: Switch to arch_cpu_finalize_init() - ARM: cpu: Switch to arch_cpu_finalize_init() - ia64/cpu: Switch to arch_cpu_finalize_init() - loongarch/cpu: Switch to arch_cpu_finalize_init() - m68k/cpu: Switch to arch_cpu_finalize_init() - mips/cpu: Switch to arch_cpu_finalize_init() - sh/cpu: Switch to arch_cpu_finalize_init() - sparc/cpu: Switch to arch_cpu_finalize_init() - um/cpu: Switch to arch_cpu_finalize_init() - init: Remove check_bugs() leftovers - init: Invoke arch_cpu_finalize_init() earlier - init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init() - x86/init: Initialize signal frame size late - x86/fpu: Remove cpuinfo argument from init functions - x86/fpu: Mark init functions __init - x86/fpu: Move FPU initialization into arch_cpu_finalize_init() - x86/speculation: Add Gather Data Sampling mitigation - x86/speculation: Add force option to GDS mitigation - x86/speculation: Add Kconfig option for GDS - KVM: Add GDS_NO support to KVM - x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build - x86/xen: Fix secondary processors' FPU initialization - Documentation/x86: Fix backwards on/off logic about YMM support * [x86] Add a Speculative RAS Overflow (SRSO) mitigation (CVE-2023-20569) - x86/bugs: Increase the x86 bugs vector size to two u32s - x86/srso: Add a Speculative RAS Overflow mitigation - x86/srso: Add IBPB_BRTYPE support - x86/srso: Add SRSO_NO support - x86/srso: Add IBPB - x86/srso: Add IBPB on VMEXIT - x86/srso: Fix return thunks in generated code - x86/srso: Add a forgotten NOENDBR annotation - x86/srso: Tie SBPB bit setting to microcode patch detection * Bump ABI to 2 . linux (6.4.4-2) unstable; urgency=high . [ John Paul Adrian Glaubitz ] * [sh4] Add i2c-modules udeb for sh7785lcr flavor . [ Salvatore Bonaccorso ] * [x86] cpu/amd: Move the errata checking functionality up * [x86] cpu/amd: Add a Zenbleed fix (CVE-2023-20593) * net/sched: cls_fw: Fix improper refcount update leads to use-after-free (CVE-2023-3776) * net/sched: sch_qfq: account for stab overhead in qfq_enqueue (CVE-2023-3611) Checksums-Sha1: e87a08f996fcca2e1258d1e2fd8aa0ca3dd4c567 311678 linux_6.4.4-3~bpo12+1.dsc 0b75f1a64135e8730ec31260534b1ee51beccf7b 1502088 linux_6.4.4-3~bpo12+1.debian.tar.xz 99619209ea93acbfeaab5628cbafbe8777a6109d 6012 linux_6.4.4-3~bpo12+1_source.buildinfo Checksums-Sha256: 4505611d0d0567204caeaef74f36c3c4988858ab47ebaeebb4958488e47c9f9c 311678 linux_6.4.4-3~bpo12+1.dsc 1c355d53b40e2d5425c866e6581569cb952ba66a86c8edb24b64088c0606990c 1502088 linux_6.4.4-3~bpo12+1.debian.tar.xz 4559ce1b9b5929c75b9f5853aab9da10429db5b697469d72536139ca067d9929 6012 linux_6.4.4-3~bpo12+1_source.buildinfo Files: e8fb63bd553ac8d811877f73dc628bb5 311678 kernel optional linux_6.4.4-3~bpo12+1.dsc 4589679205f58d4d2f20911dd2d509e2 1502088 kernel optional linux_6.4.4-3~bpo12+1.debian.tar.xz 82db76b324fa78a1ba8a3025f7b6f2a9 6012 kernel optional linux_6.4.4-3~bpo12+1_source.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEErCspvTSmr92z9o8157/I7JWGEQkFAmTTzQsACgkQ57/I7JWG EQlFBhAAqQeRqVWeHCRxmOE+Zw8b1wvOpVk8mjytxYpyVkKF5r0ZMiZpbhAHAMSw pRAJSdyOq4ErA8TUAfIWJgNsGkbWt+YknhMO7WxlaAPeXfoBVaZoXhCjouSDCRfY cTxK+PPe1jywy5osMNnQlaOXqnGRtymTZvWpxei8NCLgIiNpA44C9A9t8yCHrXN9 SvRtcXEtFi4SEtqaXX2ryfh5QdUSDNOKl3/UGF+gY4udNH6Mm4QgUTqvygSKXV98 FRjZwUzMVXwM3WTLT/B2UO03yCJC1jyLag76FgF4PiGm8ciwHoxIlMqopCBnO3RK SzF0/bc1BDFZjem6mKUTPJdzM6dt7YHDHp/OKZUbuW2fB3QPEJNdHJxMMzuHGAps I/atLPaLsyWqJzbuyccbef4tpvVzz5MGoxk37YWPfQGSq8axvhN4W5Vq4cv/B6v/ w7y1W92fiOVu6CBkXAAIW6+JZPszCBuneWNuuViAgtEc4XSZ3EIU1h+GGxpOTG8R hDF5XW8AS6CSwnMkL3rdl7kU+dLwJ71aX8EIa59VQzZ7Ccy87kWXeL3VqJ4I52zZ MzyVTJCi+QwrQwx0GBerBDBlRHqvOja6wwW8ITzksVWEsZJOzgdX/ng2McPapbei 8GsfEOPk9miise68lWmB3jz75LLdL4Dd4pB8GABGxIMUQdluJqc= =9pK7 -END PGP SIGNATURE-
linux_6.4.4-1~bpo12+1_source.changes ACCEPTED into stable-backports
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 03 Aug 2023 17:37:23 +0200 Source: linux Architecture: source Version: 6.4.4-1~bpo12+1 Distribution: bookworm-backports Urgency: medium Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Closes: 871216 1030617 1033398 1035359 1038068 1038271 1038409 1038665 1038754 1038799 1040178 1040346 Changes: linux (6.4.4-1~bpo12+1) bookworm-backports; urgency=medium . * Rebuild for bookworm-backports: - Revert "Compile with gcc-13 on all architectures" . linux (6.4.4-1) unstable; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.2 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.3 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.4 - Revert "drm/amd/display: edp do not add non-edid timings" (Closes: #1040346) - netfilter: nf_tables: do not ignore genmask when looking up chain by id (CVE-2023-31248) - netfilter: nf_tables: prevent OOB access in nft_byteorder_eval (CVE-2023-35001) . [ Vincent Pelletier ] * [riscv64] enable CONFIG_SND_HDA_INTEL as module . [ Salvatore Bonaccorso ] * Compile with gcc-13 on all architectures * [rt] Refresh "serial: 8250: implement non-BKL console" * Set ABI to 1 . [ Benjamin Poirier ] * kernel/trace: Enable FPROBE . [ Ben Hutchings ] * d/rules.real: Fix CROSS_COMPILE definition for hppa native build (regression in 6.4~rc7-1~exp1) . [ Bastian Blank ] * Include kbuild package into ABI. (closes: #1040178) * [powerpc,riscv64,s390x] Enable DEBUG_INFO_BTF. . linux (6.4.1-1~exp1) experimental; urgency=medium . * New upstream release: https://kernelnewbies.org/Linux_6.4 * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.1 . [ Aurelien Jarno ] * [riscv64] Enable devices added in 6.4 for StarFive JH7110 RISC-V SoC: SENSORS_SFCTEMP, MMC_DW, MMC_DW_STARFIVE and STARFIVE_WATCHDOG. . [ Helge Deller ] * [hppa] Allow up to 16 CPUs with 32-bit kernel * [hppa] Build some more fbdev graphic card drivers as modules . [ Uwe Kleine-König ] * Enable all RTW88 variants (USB + SDIO). (Closes: #1038409) . [ Ben Hutchings ] * [rt] Update to 6.4-rt5 . [ Salvatore Bonaccorso ] * [rt] Update to 6.4-rt6 * [x86] drivers/platform/x86/hp: Enable X86_PLATFORM_DRIVERS_HP (Closes: #1038799) . linux (6.4~rc7-1~exp1) experimental; urgency=medium . * New upstream release candidate: - [hppa] Delete redundant register definitions in (fixes FTBFS) . [ Salvatore Bonaccorso ] * mm: Enable Multi-Gen LRU implementation (by default) (Closes: #1030617) . [ Ben Hutchings ] * linux-perf: Add libtraceevent-dev to Build-Depends (fixes FTBFS on several architectures) * linux-image: Define CROSS_COMPILE and CROSS_COMPILE_COMPAT more consistently * [hppa] linux-headers: Fix toolchain dependencies * [hppa] Make cross-builds work * [m68k] Fix invalid .section syntax (fixes FTBFS) . [ Diederik de Haas ] * d/rules.real: Also remove executable bit from dtbo files . [ Jiaxun Yang ] * [mips*]: Enable more drivers for boston * [mips*]: Install dtbs for mipsel and mips64el . linux (6.4~rc6-1~exp1) experimental; urgency=medium . * New upstream release candidate. . [ Diederik de Haas ] * Update for 6.4: - d/copyright: Remove vs6624.c; removed upstream * [rt] Update to 6.4-rc5-rt4 . [ Ben Hutchings ] * linux-perf: Update build rules and dependencies for change to demangling * linux-perf: Build C++ code with Debian standard compiler flags . linux (6.3.11-1) unstable; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.8 - [x86] platform/surface: aggregator: Allow completion work-items to be executed in parallel - [x86] platform/surface: aggregator_tabletsw: Add support for book mode in KIP subsystem - [arm64] spi: qup: Request DMA before enabling clocks - afs: Fix setting of mtime when creating a file/dir/symlink - wifi: mt76: mt7615: fix possible race in mt7615_mac_sta_poll - bpf, sockmap: Avoid potential NULL dereference in sk_psock_verdict_data_ready() - neighbour: fix unaligned access to pneigh_entry - net/ipv4: ping_group_range: allow GID from 2147483648 to 4294967294 - bpf: Fix UAF in task local storage - bpf: Fix elem_size not being set for inner maps - net/ipv6: fix bool/int mismatch for skip_notify_on_dev_down - net/smc: Avoid to access invalid RMBs' MRs in SMCRv1 ADD LINK CONT - [arm64] net: enetc: correct the statistics of rx bytes - [arm64] net: enetc: correct rx_bytes statistics of XDP - net/sched: fq_pie: ensure reasonable TCA_FQ_PIE_QUANTUM values -
linux_6.3.7-1~bpo12+1_source.changes ACCEPTED into stable-backports
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sun, 23 Jul 2023 01:22:45 +0200 Source: linux Architecture: source Version: 6.3.7-1~bpo12+1 Distribution: bookworm-backports Urgency: medium Maintainer: Debian Kernel Team Changed-By: Ben Hutchings Changes: linux (6.3.7-1~bpo12+1) bookworm-backports; urgency=medium . * Rebuild for bookworm-backports: - Set ABI to 0.deb12.1 - d/salsa-ci.yml: Set RELEASE to bookworm-backports Checksums-Sha1: ce897d748a2eeef4a51e55bb768cb350042a5d4a 310624 linux_6.3.7-1~bpo12+1.dsc f5b8c113d6f8df27dd450affad216846eb7ee3bd 1463720 linux_6.3.7-1~bpo12+1.debian.tar.xz ce665a488eb1d6d8071a098c96ce15c9655ade9a 6012 linux_6.3.7-1~bpo12+1_source.buildinfo Checksums-Sha256: 7ba0ba1e424c2b05b7f878858339b7f8c7ff5ac9226e83f089c64998a422166f 310624 linux_6.3.7-1~bpo12+1.dsc 63c363fb8b5275d178a91659b77f31de0bd547b0950409b2f4cd782378be4774 1463720 linux_6.3.7-1~bpo12+1.debian.tar.xz ca12a0ac15350bd687f0c7f235a4381cfdb5dbc154b1b56da4a51ba19599bf8a 6012 linux_6.3.7-1~bpo12+1_source.buildinfo Files: 9fb13432627787996f52f92816967570 310624 kernel optional linux_6.3.7-1~bpo12+1.dsc 7035776786f8a5a626e38c176172c698 1463720 kernel optional linux_6.3.7-1~bpo12+1.debian.tar.xz 116fd7ec9d6806fb4121c494e89e13c3 6012 kernel optional linux_6.3.7-1~bpo12+1_source.buildinfo -BEGIN PGP SIGNATURE- iQIzBAEBCgAdFiEErCspvTSmr92z9o8157/I7JWGEQkFAmS9wd8ACgkQ57/I7JWG EQlrQw//TalDS7TIV48XNUcBexwB/Rle5ruloWUC+CLvLH2YCoXf1VQygwbMbCL7 mYz/uM2rM+J+s0NSaVAKfgKfDDss6sYUvzXUNFmvD/CrU5gFgGw/gUyPnw+gAtbK 1SAMKXwZSAHBHucaLzwcC4Z4QewtPrrDVIiaeCUOOAlabCrtvqF7lIP2nFjJPGFb yC+r1O6Bua7s1C6KAGpPrxKV/b98t/eYSHvnt6C4qhJ5pXM149W2Yy6otOoow2C3 GiwunnCJQOo1IYiE7y31pt5xgcmwYklBBokZQRwS9rkzqz4Ji/02KMMdX37rOvXG ALsXzRQPv8iO6rXMHn0YjnhbRGpGXwkKEKhEPwH2JIwRiP6KmUNsyrT0BOIU+HUC dFa7GqPgObqOvVaQNB9ZFkFBkjnK820LLiRAgmSS7DJVbUy4gJSyLuFq6l77SwL/ lY//w661aVxNC5yxInRB+unboARd9AFvZqyVnbVtW947ITyrAbAdDKbMKbZ41Q46 a4DDHTfhnxvGzdnMQ0DkT6w/adH6cm3bIGbIFV07u4gFBxDKo0rr5EYmA1bS1eNw iYVI34OPIMSdoU276sQeRoEJZsC7wxVnI0vcQDta4k9r63XtVAlcz/9HYUQaw+Id j3UiVxWwMcOaN+ljHDe7uHFUHryf5sT6F4MxSgNQbWYJv8pZZYc= =Kv0e -END PGP SIGNATURE-
Bug#1044518: linux: "RIP: 0010:get_xsave_addr+0x9b/0xb0" stacktrace in early boot with -24 bullseye kernel
Hi Adam, On Tue, Aug 15, 2023 at 09:37:36PM +0200, Salvatore Bonaccorso wrote: > Control: tags -1 + confirmed > > Hi Adam, > > On Tue, Aug 15, 2023 at 06:26:59PM +0100, Adam D. Barratt wrote: > > On Sun, 2023-08-13 at 18:21 +0100, Adam D. Barratt wrote: > > > Since the kernels on both the host and guests were upgraded to > > > 5.10.179-5 (from 5.10.179-3), the guests on one of our Ganeti > > > clusters > > > have been reporting as tainted. Looking at dmesg shows the following > > > trace early in boot: > > > > > > > I realised that a little bit more of the surrounding context from dmesg > > might help: > > > > [0.093383] kvm-guest: setup PV IPIs > > [0.094931] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 > > [0.094968] clocksource: tsc-early: mask: 0x max_cycles: > > 0x1e33052aadd, max_idle_ns: 440795310221 ns > > [0.094974] Calibrating delay loop (skipped) preset value.. 4190.15 > > BogoMIPS (lpj=8380304) > > [0.095097] x86/cpu: User Mode Instruction Prevention (UMIP) activated > > [0.095106] [ cut here ] > > [0.095107] get of unsupported state > > [0.095120] WARNING: CPU: 0 PID: 0 at arch/x86/kernel/fpu/xstate.c:973 > > get_xsave_addr+0x9b/0xb0 > > [0.095122] Modules linked in: > > [0.095126] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.10.0-24-amd64 #1 > > Debian 5.10.179-5 > > [0.095128] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS > > 1.14.0-2 04/01/2014 > > [0.095131] RIP: 0010:get_xsave_addr+0x9b/0xb0 > > [0.095134] Code: 48 83 c4 08 5b e9 15 80 bc 00 80 3d 8d 7c 80 01 00 75 > > a8 48 c7 c7 97 de eb 94 89 74 24 04 c6 05 79 7c 80 01 01 e8 f5 96 88 00 > > <0f> 0b 8b 74 24 04 eb 89 31 c0 e9 e6 7f bc 00 66 0f 1f 44 00 00 89 > > [0.095136] RSP: :95403ec8 EFLAGS: 00010282 > > [0.095139] RAX: RBX: 9566a600 RCX: > > 954b3768 > > [0.095141] RDX: c000efff RSI: efff RDI: > > 0247 > > [0.095142] RBP: 9566a4a0 R08: R09: > > 95403ce8 > > [0.095144] R10: 95403ce0 R11: 954cb7a8 R12: > > 0246 > > [0.095145] R13: R14: R15: > > > > [0.095148] FS: () GS:911abec0() > > knlGS: > > [0.095149] CS: 0010 DS: ES: CR0: 80050033 > > [0.095151] CR2: 911a95801000 CR3: 13e0a001 CR4: > > 007308b0 > > [0.095155] DR0: DR1: DR2: > > > > [0.095156] DR3: DR6: fffe0ff0 DR7: > > 0400 > > [0.095158] Call Trace: > > [0.095166] identify_cpu+0x51f/0x540 > > [0.095171] identify_boot_cpu+0xc/0x94 > > [0.095174] arch_cpu_finalize_init+0x5/0x47 > > [0.095177] start_kernel+0x4ec/0x599 > > [0.095183] secondary_startup_64_no_verify+0xb0/0xbb > > [0.095188] ---[ end trace 438682bdad114415 ]--- > > [0.095288] Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 > > [0.095289] Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 > > [0.095296] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user > > pointer sanitization > > Confirmed I can reproduce it. 5.10.191-rc1 does not exibit the problem. Will further investigate. Regards, Salvatore
Bug#1044518: linux: "RIP: 0010:get_xsave_addr+0x9b/0xb0" stacktrace in early boot with -24 bullseye kernel
Control: tags -1 + confirmed Hi Adam, On Tue, Aug 15, 2023 at 06:26:59PM +0100, Adam D. Barratt wrote: > On Sun, 2023-08-13 at 18:21 +0100, Adam D. Barratt wrote: > > Since the kernels on both the host and guests were upgraded to > > 5.10.179-5 (from 5.10.179-3), the guests on one of our Ganeti > > clusters > > have been reporting as tainted. Looking at dmesg shows the following > > trace early in boot: > > > > I realised that a little bit more of the surrounding context from dmesg > might help: > > [0.093383] kvm-guest: setup PV IPIs > [0.094931] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 > [0.094968] clocksource: tsc-early: mask: 0x max_cycles: > 0x1e33052aadd, max_idle_ns: 440795310221 ns > [0.094974] Calibrating delay loop (skipped) preset value.. 4190.15 > BogoMIPS (lpj=8380304) > [0.095097] x86/cpu: User Mode Instruction Prevention (UMIP) activated > [0.095106] [ cut here ] > [0.095107] get of unsupported state > [0.095120] WARNING: CPU: 0 PID: 0 at arch/x86/kernel/fpu/xstate.c:973 > get_xsave_addr+0x9b/0xb0 > [0.095122] Modules linked in: > [0.095126] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.10.0-24-amd64 #1 > Debian 5.10.179-5 > [0.095128] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS > 1.14.0-2 04/01/2014 > [0.095131] RIP: 0010:get_xsave_addr+0x9b/0xb0 > [0.095134] Code: 48 83 c4 08 5b e9 15 80 bc 00 80 3d 8d 7c 80 01 00 75 a8 > 48 c7 c7 97 de eb 94 89 74 24 04 c6 05 79 7c 80 01 01 e8 f5 96 88 00 <0f> 0b > 8b 74 24 04 eb 89 31 c0 e9 e6 7f bc 00 66 0f 1f 44 00 00 89 > [0.095136] RSP: :95403ec8 EFLAGS: 00010282 > [0.095139] RAX: RBX: 9566a600 RCX: > 954b3768 > [0.095141] RDX: c000efff RSI: efff RDI: > 0247 > [0.095142] RBP: 9566a4a0 R08: R09: > 95403ce8 > [0.095144] R10: 95403ce0 R11: 954cb7a8 R12: > 0246 > [0.095145] R13: R14: R15: > > [0.095148] FS: () GS:911abec0() > knlGS: > [0.095149] CS: 0010 DS: ES: CR0: 80050033 > [0.095151] CR2: 911a95801000 CR3: 13e0a001 CR4: > 007308b0 > [0.095155] DR0: DR1: DR2: > > [0.095156] DR3: DR6: fffe0ff0 DR7: > 0400 > [0.095158] Call Trace: > [0.095166] identify_cpu+0x51f/0x540 > [0.095171] identify_boot_cpu+0xc/0x94 > [0.095174] arch_cpu_finalize_init+0x5/0x47 > [0.095177] start_kernel+0x4ec/0x599 > [0.095183] secondary_startup_64_no_verify+0xb0/0xbb > [0.095188] ---[ end trace 438682bdad114415 ]--- > [0.095288] Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 > [0.095289] Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 > [0.095296] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user > pointer sanitization Confirmed I can reproduce it. Regards, Salvatore
Processed: Re: Bug#1044518: linux: "RIP: 0010:get_xsave_addr+0x9b/0xb0" stacktrace in early boot with -24 bullseye kernel
Processing control commands: > tags -1 + confirmed Bug #1044518 [src:linux] linux: "RIP: 0010:get_xsave_addr+0x9b/0xb0" stacktrace in early boot with -24 bullseye kernel Added tag(s) confirmed. -- 1044518: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1044518 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Processed: Re: Bug#1042517:
Processing control commands: > tags -1 - moreinfo Bug #1042517 [src:linux] i915: oops for NULL pointer dereference on Intel HD Graphics P4000 Removed tag(s) moreinfo. -- 1042517: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1042517 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
Bug#1042517:
Control: tags -1 - moreinfo Hi, On Mon, Aug 14, 2023 at 09:18:02AM +0800, Mad Horse wrote: > > Control: tags -1 + moreinfo > > > > Hi > > > > On Wed, Aug 09, 2023 at 11:26:01AM +0800, Mad Horse wrote: > >> The bug has been reported to upstream ( > >> https://gitlab.freedesktop.org/drm/intel/-/issues/8991 ), and a fix > >> is available there, though it may need backport. > > Were you able to confirm that the upstream mentioned patch fixes the > > issue? > > > > Regards, > > Salvatore > > > Yes. After building and installing a linux 6.5~rc4-1~exp1a~test with > this patch applied to, the i915 does never shout oops on an IVB D > GT2 server any more. Perfect, thanks for the confirmation. Regards, Salvatore
Bug#1044518: linux: "RIP: 0010:get_xsave_addr+0x9b/0xb0" stacktrace in early boot with -24 bullseye kernel
On Sun, 2023-08-13 at 18:21 +0100, Adam D. Barratt wrote: > Since the kernels on both the host and guests were upgraded to > 5.10.179-5 (from 5.10.179-3), the guests on one of our Ganeti > clusters > have been reporting as tainted. Looking at dmesg shows the following > trace early in boot: > I realised that a little bit more of the surrounding context from dmesg might help: [0.093383] kvm-guest: setup PV IPIs [0.094931] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 [0.094968] clocksource: tsc-early: mask: 0x max_cycles: 0x1e33052aadd, max_idle_ns: 440795310221 ns [0.094974] Calibrating delay loop (skipped) preset value.. 4190.15 BogoMIPS (lpj=8380304) [0.095097] x86/cpu: User Mode Instruction Prevention (UMIP) activated [0.095106] [ cut here ] [0.095107] get of unsupported state [0.095120] WARNING: CPU: 0 PID: 0 at arch/x86/kernel/fpu/xstate.c:973 get_xsave_addr+0x9b/0xb0 [0.095122] Modules linked in: [0.095126] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.10.0-24-amd64 #1 Debian 5.10.179-5 [0.095128] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014 [0.095131] RIP: 0010:get_xsave_addr+0x9b/0xb0 [0.095134] Code: 48 83 c4 08 5b e9 15 80 bc 00 80 3d 8d 7c 80 01 00 75 a8 48 c7 c7 97 de eb 94 89 74 24 04 c6 05 79 7c 80 01 01 e8 f5 96 88 00 <0f> 0b 8b 74 24 04 eb 89 31 c0 e9 e6 7f bc 00 66 0f 1f 44 00 00 89 [0.095136] RSP: :95403ec8 EFLAGS: 00010282 [0.095139] RAX: RBX: 9566a600 RCX: 954b3768 [0.095141] RDX: c000efff RSI: efff RDI: 0247 [0.095142] RBP: 9566a4a0 R08: R09: 95403ce8 [0.095144] R10: 95403ce0 R11: 954cb7a8 R12: 0246 [0.095145] R13: R14: R15: [0.095148] FS: () GS:911abec0() knlGS: [0.095149] CS: 0010 DS: ES: CR0: 80050033 [0.095151] CR2: 911a95801000 CR3: 13e0a001 CR4: 007308b0 [0.095155] DR0: DR1: DR2: [0.095156] DR3: DR6: fffe0ff0 DR7: 0400 [0.095158] Call Trace: [0.095166] identify_cpu+0x51f/0x540 [0.095171] identify_boot_cpu+0xc/0x94 [0.095174] arch_cpu_finalize_init+0x5/0x47 [0.095177] start_kernel+0x4ec/0x599 [0.095183] secondary_startup_64_no_verify+0xb0/0xbb [0.095188] ---[ end trace 438682bdad114415 ]--- [0.095288] Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 [0.095289] Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 [0.095296] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Regards, Adam
linux_6.5~rc6-1~exp1_source.changes ACCEPTED into experimental
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 15 Aug 2023 13:01:14 +0200 Source: linux Architecture: source Version: 6.5~rc6-1~exp1 Distribution: experimental Urgency: medium Maintainer: Debian Kernel Team Changed-By: Salvatore Bonaccorso Changes: linux (6.5~rc6-1~exp1) experimental; urgency=medium . * New upstream release candidate . [ Aurelien Jarno ] * [riscv64] enable CONFIG_ACPI * [riscv64] improve Starfive JH7110 support: enable CRYPTO_DEV_JH7110, SND_SOC, SND_SOC_STARFIVE and SND_SOC_JH7110_TDM as modules . [ Stuart Hayhurst ] * [x86] drivers/platform/x86/lenovo-ymc: Enable LENOVO_YMC as module . [ Diederik de Haas ] * [rt] Update to 6.5-rc4-rt2 Checksums-Sha1: 9fc771ee512f0fa39ae71fb563a257dc033793e4 288879 linux_6.5~rc6-1~exp1.dsc fca2950461fb9c14452f9ee1e3edc8badbb81991 141411588 linux_6.5~rc6.orig.tar.xz d00e3fd2546a8754c8433674ab7d447686866be0 1467432 linux_6.5~rc6-1~exp1.debian.tar.xz 457fd3183b37a5531651b29f98747206c2943c5d 6858 linux_6.5~rc6-1~exp1_source.buildinfo Checksums-Sha256: faec1e809a14f7024f7191776ef54ec6b3df2799ced346d075b11bb5edb40e64 288879 linux_6.5~rc6-1~exp1.dsc f70b2594379ea3b745006f4ee668cb466d0480b2c0458b38665399c7c6bf7788 141411588 linux_6.5~rc6.orig.tar.xz c6b2e6d2b5f0ce1b0e7d52dc58f407dff3e11e3fcbcafe03b83cdb18d75ba542 1467432 linux_6.5~rc6-1~exp1.debian.tar.xz 8587db79f581b0f820fd4b4e7482a3fd2b35d52eca1c8267334b2475b78c63da 6858 linux_6.5~rc6-1~exp1_source.buildinfo Files: 2f51315b8882927587fce78624e4be6a 288879 kernel optional linux_6.5~rc6-1~exp1.dsc 41c02cb42c678ffb15e032f3c2e8e5e9 141411588 kernel optional linux_6.5~rc6.orig.tar.xz 03ec01fc1794a86d9535fb59c8922a35 1467432 kernel optional linux_6.5~rc6-1~exp1.debian.tar.xz 7bac41d6af6bae51ddcc958b2ba457fb 6858 kernel optional linux_6.5~rc6-1~exp1_source.buildinfo -BEGIN PGP SIGNATURE- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmTbYOFfFIAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89EuYcQAJ6uHhhq4umvTVUnG1NWurKqnWIp7U+8 w8xmYh7LU5Ss1lZjr6IMXZP0IKZb0zTHY/bK/U7lnWyAXMXVnVN3eCyPK6UiWnWJ ex1UJDoEyP80c5Ur9q6/VYHby8AUN0+21h5IHnOBo/jgLjJZpYireT5Fzia2GG+p 8TL5OAS9XokjHNP9J144KWbi/yEeQK5wKzRVEotvC9HSEjpntfQB540nFx8tT1BW hF87K2Mo9HIUTbqcQqJ2gt68pO7vT0/6MJNnXQDPFRDMA+xuhY8iX9WXdpRrzvEu bVqYGIAAtqZaWEd9kfo1u6J+Cg9JF6sXdNhW71lF0hv2/fxv3Ig0+fXPyuHjI33f qXA1K4GPLd6YWDctbvx8KnWZr7B+d/+5r5PdROZNxWDS1QphT+LonetJEyGszFg+ cxVt7JxdgBe+HljXXVbaCD8xhEpw46wKhxFimsKBHzut7oKgX/bqpanUDMIn/iLb W1Te5LtiYTYOTZV6/YsItQ+0DoPEnCBS8XxPKYqGT43hNi1LwRSpPDv7a8J8dyLk InFQArLkP3QpWkq9M85truV8+toyVfgQMIghj13WXfyDi2e2tyC1eE6kJQ73N6A3 9aP3UZPPf4RTSmhzY9isB3H2yF2KY5QJeE7UQFXSwuzBP/SEaGOIQVjGoHj1KmKB 4h2QXUwDr9j/ =sT0a -END PGP SIGNATURE-
Processing of linux_6.5~rc6-1~exp1_source.changes
linux_6.5~rc6-1~exp1_source.changes uploaded successfully to localhost along with the files: linux_6.5~rc6-1~exp1.dsc linux_6.5~rc6.orig.tar.xz linux_6.5~rc6-1~exp1.debian.tar.xz linux_6.5~rc6-1~exp1_source.buildinfo Greetings, Your Debian queue daemon (running on host usper.debian.org)
Bug#1049409: firmware-amd-graphics: Possible missing firmware for module amdgpu
Package: firmware-amd-graphics Version: 20230210-5 Severity: normal X-Debbugs-Cc: sm.snowstorm...@passinbox.com Dear Maintainer, When running update-initramfs I get the following warnings: --- Setting up linux-image-6.1.0-10-amd64 (6.1.38-2) ... /etc/kernel/postinst.d/initramfs-tools: update-initramfs: Generating /boot/initrd.img-6.1.0-10-amd64 W: Possible missing firmware /lib/firmware/amdgpu/ip_discovery.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/vega10_cap.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/sienna_cichlid_cap.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/navi12_cap.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/psp_13_0_11_ta.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/psp_13_0_11_toc.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/psp_13_0_10_ta.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/psp_13_0_10_sos.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/aldebaran_cap.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_3_imu.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_4_rlc.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_4_mec.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_4_me.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_4_pfp.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_3_rlc.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_3_mec.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_3_me.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_3_pfp.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_0_toc.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/sdma_6_0_3.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/sienna_cichlid_mes1.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/sienna_cichlid_mes.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/navi10_mes.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_4_mes1.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_4_mes_2.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_4_mes.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_3_mes1.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_3_mes_2.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_3_mes.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_2_mes_2.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_1_mes_2.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/gc_11_0_0_mes_2.bin for module amdgpu W: Possible missing firmware /lib/firmware/amdgpu/smu_13_0_10.bin for module amdgpu --- On checking the linux-firmware tree (https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tree/amdgpu) I found that some of the blobs are available there but are not in the Debian packages. The firmware that is *in* linux-firmware are: gc_11_0_0_mes_2.bin gc_11_0_1_mes_2.bin gc_11_0_2_mes_2.bin gc_11_0_3_imu.bin gc_11_0_3_me.bin gc_11_0_3_mec.bin gc_11_0_3_mes1.bin gc_11_0_3_mes_2.bin gc_11_0_3_pfp.bin gc_11_0_3_rlc.bin gc_11_0_4_me.bin gc_11_0_4_mec.bin gc_11_0_4_mes1.bin gc_11_0_4_mes_2.bin gc_11_0_4_mes.bin gc_11_0_4_pfp.bin gc_11_0_4_rlc.bin psp_13_0_10_sos.bin psp_13_0_10_ta.bin psp_13_0_11_ta.bin psp_13_0_11_toc.bin sdma_6_0_3.bin smu_13_0_10.bin The firmware that is *not* in linux-firmware are: ip_discovery.bin vega10_cap.bin sienna_cichlid_cap.bin navi12_cap.bin aldebaran_cap.bin gc_11_0_0_toc.bin sienna_cichlid_mes1.bin sienna_cichlid_mes.bin navi10_mes.bin gc_11_0_3_mes.bin Installing the firmware-linux-nonfree and firmware-misc-nonfree packages did not correct the issue. The firmware for amdgpu that is currently available on linux-firmware should also be in the firmware-amd-graphics package, also while it is outside of Debian's scope it should be investigated upstream why there is firmware referenced that apparently is not available on linux-firmware. I haven't noticed any functional issues caused by the missing firmware as of yet, only warnings. Note that I am running a custom kernel build, but this issue affects all kernel versions including the stock Debian kernel (hence mismatch between kernel versions in the report). If you need further information please let me know. Thanks! -- System Information: Debian Release: 12.1 APT prefers stable-updates APT policy: (500,