[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1041855: marked as done (linux-image-6.4.0-1-amd64: IO wait regression)



Your message dated Tue, 08 Aug 2023 18:00:13 +0000
with message-id <E1qTR09-0049LF-Vx@fasolo.debian.org>
and subject line Bug#1041855: fixed in linux 6.4.4-3
has caused the Debian Bug report #1041855,
regarding linux-image-6.4.0-1-amd64: IO wait regression
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1041855: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041855
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: src:linux
Version: 6.4.4-1
Severity: serious

Dear Maintainer,

Kernel 6.4.4 is affected by a regression causing one core be report
high IO wait utilization.

See https://lore.kernel.org/lkml/12251678.O9o76ZdvQC@natalenko.name/

--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.4.4-3
Done: Salvatore Bonaccorso <carnil@debian.org>

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1041855@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 08 Aug 2023 19:08:55 +0200
Source: linux
Architecture: source
Version: 6.4.4-3
Distribution: unstable
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 1041855
Changes:
 linux (6.4.4-3) unstable; urgency=high
 .
   * io_uring: gate iowait schedule on having pending requests (Closes: #1041855)
   * [x86] Add mitigations for Gather Data Sampling (GDS) (CVE-2022-40982)
     - init: Provide arch_cpu_finalize_init()
     - x86/cpu: Switch to arch_cpu_finalize_init()
     - ARM: cpu: Switch to arch_cpu_finalize_init()
     - ia64/cpu: Switch to arch_cpu_finalize_init()
     - loongarch/cpu: Switch to arch_cpu_finalize_init()
     - m68k/cpu: Switch to arch_cpu_finalize_init()
     - mips/cpu: Switch to arch_cpu_finalize_init()
     - sh/cpu: Switch to arch_cpu_finalize_init()
     - sparc/cpu: Switch to arch_cpu_finalize_init()
     - um/cpu: Switch to arch_cpu_finalize_init()
     - init: Remove check_bugs() leftovers
     - init: Invoke arch_cpu_finalize_init() earlier
     - init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init()
     - x86/init: Initialize signal frame size late
     - x86/fpu: Remove cpuinfo argument from init functions
     - x86/fpu: Mark init functions __init
     - x86/fpu: Move FPU initialization into arch_cpu_finalize_init()
     - x86/speculation: Add Gather Data Sampling mitigation
     - x86/speculation: Add force option to GDS mitigation
     - x86/speculation: Add Kconfig option for GDS
     - KVM: Add GDS_NO support to KVM
     - x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build
     - x86/xen: Fix secondary processors' FPU initialization
     - Documentation/x86: Fix backwards on/off logic about YMM support
   * [x86] Add a Speculative RAS Overflow (SRSO) mitigation (CVE-2023-20569)
     - x86/bugs: Increase the x86 bugs vector size to two u32s
     - x86/srso: Add a Speculative RAS Overflow mitigation
     - x86/srso: Add IBPB_BRTYPE support
     - x86/srso: Add SRSO_NO support
     - x86/srso: Add IBPB
     - x86/srso: Add IBPB on VMEXIT
     - x86/srso: Fix return thunks in generated code
     - x86/srso: Add a forgotten NOENDBR annotation
     - x86/srso: Tie SBPB bit setting to microcode patch detection
   * Bump ABI to 2
Checksums-Sha1:
 52f4e3b61582b333218bd8672d051fe50050729c 288845 linux_6.4.4-3.dsc
 8d2f004752e3126fd8b31875a04689aacaf7fe28 1500912 linux_6.4.4-3.debian.tar.xz
 80ac78222b9e5b821da04b88dc2dd590a6565f04 6826 linux_6.4.4-3_source.buildinfo
Checksums-Sha256:
 d126d5a8bff09024d9f3e98cf135a98de4f00f52c5d3f91ea7735363f0259456 288845 linux_6.4.4-3.dsc
 85093c80bdfbda628965a7e5602079259c0f8fc405136d12f5a9e5c900110d0c 1500912 linux_6.4.4-3.debian.tar.xz
 3de3e3dbe50b04ab064a7050e12e4fe3cecd4e8eea0b89756b12d2bf14d4c56d 6826 linux_6.4.4-3_source.buildinfo
Files:
 6efb0e0505c47110822e584ed7765250 288845 kernel optional linux_6.4.4-3.dsc
 206fbf692ca8964aead10390cac4af7f 1500912 kernel optional linux_6.4.4-3.debian.tar.xz
 b1bc88564ec05478faa2d5436175ff4e 6826 kernel optional linux_6.4.4-3_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmTSe5pfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
ZWJpYW4ub3JnAAoJEAVMuPMTQ89Et5MQAJdnpzFoTWvP5Ki0BPIpkdcK/KhB/Qwr
G9vlM6Ts/aejdSEtb/graYZvPqUsKJx3IOzEdwyt/1nu6nRAtrX3y3yBDrVN5+8u
w8gr/Ldtpd9MS394sQEojvj5/3waxShanhW7XbwAKxWQ6DU1+V9UGPXES0hBiO70
cIToi7KEBLM+jWPv9L555kwoI/cpHtKp1x5qIarnU+m0t+/u77xqFrCc1LSPUrPN
JlE1nfRddFP0fhACijdkjhm0Mpb29MIRYM9m4M5gFn55pGODDItArvP9kTA6p0aK
M9PFE4vkBU5Pc4P+fhpvYeI77ugTuoXk2HPMguW97V7bJXC1TRKqbI0JglE6/xh/
wT5gDPCE1NcwFvgVNYYpWf3FyfwvFECGz7IFNKLhAPmBy8Bq6O8TMAa7q7N6rczZ
oXQpMsgkPBtJWwSsYGlXmZi6PXrsIIAYqFIqDzhkce6y2eEPfgKX7ySU771qZffN
0JxPOKbnHVUg8EbcbG1TZtcargdqWJ2n9Cqq07zOJMD17yaX9HPaFXN8IKnCkW3M
zNJsVpeu5JroVqm9BI90LRD8YuAtxY9B59QXNfIcSQN1Qwd6X4B5oUuMJHlfnN8w
tSu+LDvM848BNCMblOdaov2Q3nk+cNOA3CggUIPlB+oi9noUBgIz4KCkOVPm09G/
LjJtNGFm+Xg+
=j5+m
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: