Bug#1050622: marked as done (linux-source-6.4: regression found upstream making AVX instructions unusable)

2023-09-29 Thread Debian Bug Tracking System
Your message dated Fri, 29 Sep 2023 08:50:56 +
with message-id 
and subject line Bug#1050622: fixed in linux 5.10.197-1
has caused the Debian Bug report #1050622,
regarding linux-source-6.4: regression found upstream making AVX instructions 
unusable
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1050622: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050622
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: linux-source-6.4
Version: 6.4.4-3~bpo12+1
Severity: normal

Dear Maintainer,

a certain patch leads to a significant regression making AVX instructions
unusable in the CPUs having them:
https://lore.kernel.org/lkml/202307192135.203ac24e-oliver.s...@intel.com/

a fix is available upstream:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/arch/x86/kernel/fpu/xstate.c?id=2c66ca3949dc701da7f4c9407f2140ae425683a5

Of course, this fix will be included in the upstream kernel eventually, but
knowing Debian's long release cycle, I think including it as a distribution
patch would make sense.


-- System Information:
Debian Release: 12.1
  APT prefers stable-updates
  APT policy: (991, 'stable-updates'), (991, 'stable-security'), (991, 
'stable'), (99, 'testing'), (90, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.4.4-bootes2-p-1000 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_DK.UTF-8, LC_CTYPE=en_DK.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en_US
Shell: /bin/sh linked to /usr/bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled

Versions of packages linux-source-6.4 depends on:
ii  binutils  2.40-2
ii  xz-utils  5.4.1-0.2

Versions of packages linux-source-6.4 recommends:
ii  bc1.07.1-3+b1
ii  bison 2:3.8.2+dfsg-1+b1
ii  build-essential   12.9
ii  cpio  2.13+dfsg-7.1
ii  flex  2.6.4-8.2
ii  kmod  30+20221128-1
ii  libelf-dev0.188-2.1
ii  libssl-dev3.0.9-1
ii  linux-config-6.4  6.4.4-3~bpo12+1
ii  rsync 3.2.7-1

Versions of packages linux-source-6.4 suggests:
ii  libncurses-dev [ncurses-dev]  6.4-4
ii  pkgconf [pkg-config]  1.8.1-1
ii  qtbase5-dev   5.15.8+dfsg-11

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 5.10.197-1
Done: Salvatore Bonaccorso 

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1050...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso  (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Fri, 29 Sep 2023 06:25:15 +0200
Source: linux
Architecture: source
Version: 5.10.197-1
Distribution: bullseye
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Closes: 1050622
Changes:
 linux (5.10.197-1) bullseye; urgency=medium
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.192
 - [arm64] mmc: sdhci-f-sdh30: Replace with sdhci_pltfm
 - macsec: Fix traffic counters/statistics
 - macsec: use DEV_STATS_INC()
 - net/mlx5: Refactor init clock function
 - net/mlx5: Move all internal timer metadata into a dedicated struct
 - net/mlx5: Skip clock update work when device is in error state
 - drm/radeon: Fix integer overflow in radeon_cs_parser_init
 - ALSA: emu10k1: roll up loops in DSP setup code for Audigy
 - [x86] ASoC: Intel: sof_sdw: add quirk for MTL RVP
 - [x86] ASoC: Intel: sof_sdw: add quirk for LNL RVP
 - [armhf] dts: imx6dl: prtrvt, prtvt7, prti6q, prtwd2: fix USB related
   warnings
 - [x86] ASoC: Intel: sof_sdw: Add support for Rex soundwire
 - iopoll: Call cpu_relax() in busy loops
 - quota: Properly disable quotas when add_dquot_ref() fails
 - quota: fix warning in dqgrab()
 - dma-remap: use kvmalloc_array/kvfree for larger dma memory remap
 - drm/amdgpu: install stub fence into 

Bug#1050622: marked as done (linux-source-6.4: regression found upstream making AVX instructions unusable)

2023-09-29 Thread Debian Bug Tracking System
Your message dated Fri, 29 Sep 2023 08:47:10 +
with message-id 
and subject line Bug#1050622: fixed in linux 6.1.52-1
has caused the Debian Bug report #1050622,
regarding linux-source-6.4: regression found upstream making AVX instructions 
unusable
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1050622: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050622
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: linux-source-6.4
Version: 6.4.4-3~bpo12+1
Severity: normal

Dear Maintainer,

a certain patch leads to a significant regression making AVX instructions
unusable in the CPUs having them:
https://lore.kernel.org/lkml/202307192135.203ac24e-oliver.s...@intel.com/

a fix is available upstream:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/arch/x86/kernel/fpu/xstate.c?id=2c66ca3949dc701da7f4c9407f2140ae425683a5

Of course, this fix will be included in the upstream kernel eventually, but
knowing Debian's long release cycle, I think including it as a distribution
patch would make sense.


-- System Information:
Debian Release: 12.1
  APT prefers stable-updates
  APT policy: (991, 'stable-updates'), (991, 'stable-security'), (991, 
'stable'), (99, 'testing'), (90, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.4.4-bootes2-p-1000 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_DK.UTF-8, LC_CTYPE=en_DK.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en_US
Shell: /bin/sh linked to /usr/bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled

Versions of packages linux-source-6.4 depends on:
ii  binutils  2.40-2
ii  xz-utils  5.4.1-0.2

Versions of packages linux-source-6.4 recommends:
ii  bc1.07.1-3+b1
ii  bison 2:3.8.2+dfsg-1+b1
ii  build-essential   12.9
ii  cpio  2.13+dfsg-7.1
ii  flex  2.6.4-8.2
ii  kmod  30+20221128-1
ii  libelf-dev0.188-2.1
ii  libssl-dev3.0.9-1
ii  linux-config-6.4  6.4.4-3~bpo12+1
ii  rsync 3.2.7-1

Versions of packages linux-source-6.4 suggests:
ii  libncurses-dev [ncurses-dev]  6.4-4
ii  pkgconf [pkg-config]  1.8.1-1
ii  qtbase5-dev   5.15.8+dfsg-11

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.1.52-1
Done: Salvatore Bonaccorso 

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1050...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso  (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 07 Sep 2023 09:39:52 +0200
Source: linux
Architecture: source
Version: 6.1.52-1
Distribution: bookworm-security
Urgency: high
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Closes: 1036744 1042753 1043564 1043585 1050622 1051163
Changes:
 linux (6.1.52-1) bookworm-security; urgency=high
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.39
 - fs: pipe: reveal missing function protoypes
 - block: Fix the type of the second bdev_op_is_zoned_write() argument
 - erofs: clean up cached I/O strategies
 - erofs: avoid tagged pointers to mark sync decompression
 - erofs: remove tagged pointer helpers
 - erofs: move zdata.h into zdata.c
 - erofs: kill hooked chains to avoid loops on deduplicated compressed 
images
 - [x86] resctrl: Only show tasks' pid in current pid namespace
 - blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost
 - [x86] sev: Fix calculation of end address based on number of pages
 - virt: sevguest: Add CONFIG_CRYPTO dependency
 - blk-mq: fix potential io hang by wrong 'wake_batch'
 - lockd: drop inappropriate svc_get() from locked_get()
 - nvme-core: fix memory leak in dhchap_secret_store
 - nvme-core: fix memory leak in dhchap_ctrl_secret
 - nvme-core: add missing fault-injection cleanup

Bug#1050622: marked as done (linux-source-6.4: regression found upstream making AVX instructions unusable)

2023-09-01 Thread Debian Bug Tracking System
Your message dated Fri, 01 Sep 2023 06:00:10 +
with message-id 
and subject line Bug#1050622: fixed in linux 6.4.13-1
has caused the Debian Bug report #1050622,
regarding linux-source-6.4: regression found upstream making AVX instructions 
unusable
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1050622: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050622
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: linux-source-6.4
Version: 6.4.4-3~bpo12+1
Severity: normal

Dear Maintainer,

a certain patch leads to a significant regression making AVX instructions
unusable in the CPUs having them:
https://lore.kernel.org/lkml/202307192135.203ac24e-oliver.s...@intel.com/

a fix is available upstream:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/arch/x86/kernel/fpu/xstate.c?id=2c66ca3949dc701da7f4c9407f2140ae425683a5

Of course, this fix will be included in the upstream kernel eventually, but
knowing Debian's long release cycle, I think including it as a distribution
patch would make sense.


-- System Information:
Debian Release: 12.1
  APT prefers stable-updates
  APT policy: (991, 'stable-updates'), (991, 'stable-security'), (991, 
'stable'), (99, 'testing'), (90, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.4.4-bootes2-p-1000 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_DK.UTF-8, LC_CTYPE=en_DK.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en_US
Shell: /bin/sh linked to /usr/bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled

Versions of packages linux-source-6.4 depends on:
ii  binutils  2.40-2
ii  xz-utils  5.4.1-0.2

Versions of packages linux-source-6.4 recommends:
ii  bc1.07.1-3+b1
ii  bison 2:3.8.2+dfsg-1+b1
ii  build-essential   12.9
ii  cpio  2.13+dfsg-7.1
ii  flex  2.6.4-8.2
ii  kmod  30+20221128-1
ii  libelf-dev0.188-2.1
ii  libssl-dev3.0.9-1
ii  linux-config-6.4  6.4.4-3~bpo12+1
ii  rsync 3.2.7-1

Versions of packages linux-source-6.4 suggests:
ii  libncurses-dev [ncurses-dev]  6.4-4
ii  pkgconf [pkg-config]  1.8.1-1
ii  qtbase5-dev   5.15.8+dfsg-11

-- no debconf information
--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.4.13-1
Done: Salvatore Bonaccorso 

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1050...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso  (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Thu, 31 Aug 2023 22:24:51 +0200
Source: linux
Architecture: source
Version: 6.4.13-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Salvatore Bonaccorso 
Closes: 1042543 1049346 1050622
Changes:
 linux (6.4.13-1) unstable; urgency=medium
 .
   * New upstream stable update:
 https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12
 - crypto, cifs: fix error handling in extract_iter_to_sg()
 - net: phy: at803x: Use devm_regulator_get_enable_optional()
 - net: phy: at803x: fix the wol setting functions
 - drm/amd/display: Update DTBCLK for DCN32
 - drm/scheduler: set entity to NULL in drm_sched_entity_pop_job()
 - drm/amdgpu: fix calltrace warning in amddrm_buddy_fini
 - drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1
 - drm/amdgpu: fix memory leak in mes self test
 - Revert "drm/amd/display: disable SubVP + DRR to prevent underflow"
 - [x86] ASoC: Intel: sof_sdw: add quirk for MTL RVP
 - [x86] ASoC: Intel: sof_sdw: add quirk for LNL RVP
 - ASoC: SOF: amd: Add pci revision id check
 - drm/stm: ltdc: fix late dereference check
 - [arm64] dts: qcom: ipq5332: add QFPROM node
 - ASoC: amd: vangogh: Add check for acp config flags in vangogh platform
 - RDMA/mana_ib: Use v2 version of cfg_rx_steer_req to enable RX coalescing
 - ARM: dts: