Processed: reassign 1050654 to virtualbox-dkms

2023-08-27 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> reassign 1050654 virtualbox-dkms
Bug #1050654 [src:linux] linux-image-6.4.0-3-amd64: Virtualbox kernel modules 
fail to load on linux-image-6.4.0-3-amd64
Bug reassigned from package 'src:linux' to 'virtualbox-dkms'.
No longer marked as found in versions linux/6.4.11-1.
Ignoring request to alter fixed versions of bug #1050654 to the same values 
previously set
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
1050654: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050654
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1050654: linux-image-6.4.0-3-amd64: Virtualbox kernel modules fail to load on linux-image-6.4.0-3-amd64

2023-08-27 Thread Timothy M Dowd
Package: src:linux
Version: 6.4.11-1
Severity: important
X-Debbugs-Cc: mrdowdsouthmo...@gmail.com

Dear Maintainer,

Upon update to kernel 6.4.0-3-amd64, Virtualbox kernel modules no longer load. 
Virtualbox works normally when booting with kernel 6.4.0-2

-- Package-specific info:
** Version:
Linux version 6.4.0-3-amd64 (debian-kernel@lists.debian.org) (gcc-13 (Debian 
13.2.0-2) 13.2.0, GNU ld (GNU Binutils for Debian) 2.41) #1 SMP PREEMPT_DYNAMIC 
Debian 6.4.11-1 (2023-08-17)

** Command line:
BOOT_IMAGE=/boot/vmlinuz-6.4.0-3-amd64 
root=UUID=ad35bc11-3df5-42f2-b165-43cd90fb4c8d ro quiet

** Not tainted

** Kernel log:
Unable to read kernel log; any relevant messages should be attached

I looked at dmesg and didn't see anything related to Virtualbox

** Model information
sys_vendor: HP
product_name: HP Notebook
product_version: Type1ProductConfigId
chassis_vendor: Hewlett-Packard
chassis_version: Chassis Version
bios_vendor: Insyde
bios_version: F.14
board_vendor: HP
board_name: 81F1
board_version: 64.31

** Loaded modules:
rfcomm
ctr
ccm
qrtr
cmac
algif_hash
algif_skcipher
af_alg
bnep
binfmt_misc
nls_ascii
nls_cp437
vfat
fat
btusb
btrtl
btbcm
btintel
btmtk
bluetooth
uvcvideo
videobuf2_vmalloc
jitterentropy_rng
uvc
videobuf2_memops
videobuf2_v4l2
drbg
videodev
videobuf2_common
ansi_cprng
ecdh_generic
mc
ecc
intel_powerclamp
coretemp
snd_hda_codec_hdmi
snd_ctl_led
kvm_intel
snd_hda_codec_realtek
rtl8723be
snd_hda_codec_generic
kvm
ledtrig_audio
btcoexist
rtl8723_common
rtl_pci
irqbypass
snd_hda_intel
rtlwifi
snd_intel_dspcfg
snd_intel_sdw_acpi
mac80211
snd_hda_codec
snd_hda_core
ghash_clmulni_intel
sha512_ssse3
libarc4
snd_hwdep
sha512_generic
cfg80211
snd_pcm
processor_thermal_device_pci_legacy
aesni_intel
mei_hdcp
mei_pxp
processor_thermal_device
snd_timer
joydev
hp_wmi
snd
crypto_simd
cryptd
iTCO_wdt
mei_txe
rmi_smbus
sparse_keymap
soundcore
rmi_core
intel_rapl_msr
intel_pmc_bxt
mei
processor_thermal_rfim
processor_thermal_mbox
processor_thermal_rapl
intel_cstate
pcspkr
intel_rapl_common
platform_profile
iTCO_vendor_support
at24
rfkill
watchdog
intel_xhci_usb_role_switch
wmi_bmof
roles
sg
ac
intel_int0002_vgpio
pwm_lpss_platform
intel_soc_dts_iosf
pwm_lpss
serio_raw
evdev
int3403_thermal
int3400_thermal
int340x_thermal_zone
acpi_thermal_rel
parport_pc
ppdev
lp
parport
dm_mod
fuse
loop
efi_pstore
configfs
efivarfs
ip_tables
x_tables
autofs4
ext4
crc16
mbcache
jbd2
crc32c_generic
sd_mod
t10_pi
crc64_rocksoft
crc64
sr_mod
crc_t10dif
cdrom
crct10dif_generic
i915
ahci
drm_buddy
i2c_algo_bit
libahci
xhci_pci
drm_display_helper
libata
cec
xhci_hcd
rc_core
ttm
drm_kms_helper
scsi_mod
usbcore
r8169
crct10dif_pclmul
crct10dif_common
realtek
i2c_i801
crc32_pclmul
mdio_devres
drm
psmouse
crc32c_intel
libphy
i2c_smbus
lpc_ich
usb_common
scsi_common
fan
battery
video
wmi
button

** Network interface configuration:
*** /etc/network/interfaces:

source /etc/network/interfaces.d/*

auto lo
iface lo inet loopback

allow-hotplug enp3s0
iface enp3s0 inet dhcp

** Network status:
*** IP interfaces and addresses:
1: lo:  mtu 65536 qdisc noqueue state UNKNOWN group 
default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
   valid_lft forever preferred_lft forever
inet6 ::1/128 scope host noprefixroute 
   valid_lft forever preferred_lft forever
2: enp3s0:  mtu 1500 qdisc fq_codel state 
DOWN group default qlen 1000
link/ether 98:e7:f4:88:c3:03 brd ff:ff:ff:ff:ff:ff
inet 169.254.12.68/16 brd 169.254.255.255 scope link enp3s0:avahi
   valid_lft forever preferred_lft forever
3: wlp2s0:  mtu 1500 qdisc noqueue state UP 
group default qlen 1000
link/ether cc:b0:da:63:f1:87 brd ff:ff:ff:ff:ff:ff
inet 192.168.254.20/24 brd 192.168.254.255 scope global dynamic 
noprefixroute wlp2s0
   valid_lft 13401sec preferred_lft 13401sec
inet6 fe80::404c:717d:d383:2b62/64 scope link noprefixroute 
   valid_lft forever preferred_lft forever

*** Device statistics:
Inter-|   Receive|  Transmit
 face |bytespackets errs drop fifo frame compressed multicast|bytes
packets errs drop fifo colls carrier compressed
lo:8786 100000 0  0 0 8786 
100000 0   0  0
enp3s0:   0   0000 0  0 00  
 0000 0   0  0
wlp2s0:  4288711327000 0  0 0   109879 
362000 0   0  0


** PCI devices:
00:00.0 Host bridge [0600]: Intel Corporation Atom/Celeron/Pentium Processor 
x5-E8000/J3xxx/N3xxx Series SoC Transaction Register [8086:2280] (rev 35)
Subsystem: Hewlett-Packard Company Atom/Celeron/Pentium Processor 
x5-E8000/J3xxx/N3xxx Series SoC Transaction Register [103c:81f1]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-

Bug#1043585: AMD64 Kernel update prevents an emulated TPM working correctly inside Windows 11 KVM guest OS

2023-08-27 Thread Salvatore Bonaccorso
Hi Martin,

On Sun, Aug 13, 2023 at 11:27:57AM +0100, Martin Johnson wrote:
> Package: linux-image
> 
> Version: 6.1.0-11-amd64
> 
> When latest Debian kernel is installed it is causing a problem with KVM
> virtual machine and the current version of QEMU on Bookworm. This is when
> swtpm is used to provide an emulated TPM for the guest OS. The guest OS is
> windows 11. swtpm does not receive commands from the host OS, something has
> been broken in KVM side I suspect this could be caused by recent CPU
> security patches or patches to KVM itself.
> 
> The guest OS reports a code 10 on the TPM driver, and the TPM device is
> unusable. Trying a slightly older kernel the TPM is working as expected.
> 
> I also noticed the same issue with vanilla kernels built from kernel.org for
> example kernel-6.1.44 and kernel-6.1.45 has this issue and kernel 6.1.42
> does not. So its some recent patch is likely causing it.
> 
> I have two AMD64 machines with Ryzen processors and both exhibit this issue,
> I hope that it should be easily reproducible with a Ryzen CPU.
> 
> One Machine has this CPU:
> 
> AMD Ryzen 9 3950X 16-Core Processor
> 
> The other machine has this CPU:
> 
> AMD Ryzen 7 1800X 8-Core Processor

After picking the fix from upstream into unstable, this is as well
pending for bookworm and will land latest on the 12.2 point release.

Regards,
Salvatore



Processed: Re: Bug#1050117: The patch has been applied to the Linux kernel repository.

2023-08-27 Thread Debian Bug Tracking System
Processing control commands:

> tag -1 fixed-upstream
Bug #1050117 [src:linux] poweroff (shutdown -h) / reboot (shutdown -r) does not 
work properly since 6.1.27-1
Added tag(s) fixed-upstream.

-- 
1050117: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050117
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1050117: The patch has been applied to the Linux kernel repository.

2023-08-27 Thread Diederik de Haas
Control: tag -1 fixed-upstream

On Sunday, 27 August 2023 03:29:08 CEST Takashi Yano wrote:
> I have been notified that the patch has been applied to
> 5.15-stable tree, 6.1-stable tree and 6.4-stable tree.
> http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summ
> ary
> 
> I hope it will be incorporated into the Debian kernel.
> Thanks in advance.

Excellent, thanks for reporting back.
Upstream commit ID: 1d0eb6143c1e85d3f9a3f5a616ee7e5dc351d33b

signature.asc
Description: This is a digitally signed message part.


Bug#1050622: linux-source-6.4: regression found upstream making AVX instructions unusable

2023-08-27 Thread Alex Volkov
Package: linux-source-6.4
Version: 6.4.4-3~bpo12+1
Severity: normal

Dear Maintainer,

a certain patch leads to a significant regression making AVX instructions
unusable in the CPUs having them:
https://lore.kernel.org/lkml/202307192135.203ac24e-oliver.s...@intel.com/

a fix is available upstream:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/arch/x86/kernel/fpu/xstate.c?id=2c66ca3949dc701da7f4c9407f2140ae425683a5

Of course, this fix will be included in the upstream kernel eventually, but
knowing Debian's long release cycle, I think including it as a distribution
patch would make sense.


-- System Information:
Debian Release: 12.1
  APT prefers stable-updates
  APT policy: (991, 'stable-updates'), (991, 'stable-security'), (991, 
'stable'), (99, 'testing'), (90, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.4.4-bootes2-p-1000 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_DK.UTF-8, LC_CTYPE=en_DK.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en_US
Shell: /bin/sh linked to /usr/bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled

Versions of packages linux-source-6.4 depends on:
ii  binutils  2.40-2
ii  xz-utils  5.4.1-0.2

Versions of packages linux-source-6.4 recommends:
ii  bc1.07.1-3+b1
ii  bison 2:3.8.2+dfsg-1+b1
ii  build-essential   12.9
ii  cpio  2.13+dfsg-7.1
ii  flex  2.6.4-8.2
ii  kmod  30+20221128-1
ii  libelf-dev0.188-2.1
ii  libssl-dev3.0.9-1
ii  linux-config-6.4  6.4.4-3~bpo12+1
ii  rsync 3.2.7-1

Versions of packages linux-source-6.4 suggests:
ii  libncurses-dev [ncurses-dev]  6.4-4
ii  pkgconf [pkg-config]  1.8.1-1
ii  qtbase5-dev   5.15.8+dfsg-11

-- no debconf information