• Bug#1105164: linux-image-6.1.0-35-amd64: watchdog kernel module load er

    From Robert Shearman@1:229/2 to All on Mon May 12 17:50:01 2025
    XPost: linux.debian.bugs.dist
    From: robertshearman@gmail.com

    Package: src:linux
    Version: 6.1.137-1
    Severity: important
    X-Debbugs-Cc: rob@graphiant.com

    rob@graph-dev-bookworm:~$ sudo modprobe watchdog
    modprobe: ERROR: could not insert 'watchdog': Bad message

    Using extract-module-sig.pl from https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/plain/scripts/extract-module-sig.pl
    shows there is no signature present for the watchdog kernel object
    file:

    $ ~/Downloads/extract-module-sig.pl -s /lib/modules/6.1.0-35-amd64/kernel/drivers/watchdog/watchdog.ko
    Read 91616 bytes from module file
    Found magic number at 91616
    Found PKCS#7/CMS encapsulation

    Compared to 6.1.0-34-amd64 version:

    $ ~/Downloads/extract-module-sig.pl -s /lib/modules/6.1.0-34-amd64/kernel/drivers/watchdog/watchdog.ko
    Read 92027 bytes from module file
    Found magic number at 92027
    Found PKCS#7/CMS encapsulation
    Found 411 bytes of signature [3082019706092a864886f70d010702a0]
    ...

    -- Package-specific info:
    ** Version:
    Linux version 6.1.0-35-amd64 (debian-kernel@lists.debian.org) (gcc-12
    (Debian 12.2.0-14+deb12u1) 12.2.0, GNU ld (GNU Binutils for Debian)
    2.40) #1 SMP PREEMPT_DYNAMIC Debian 6.1.137-1 (2025-05-07)

    ** Command line:
    BOOT_IMAGE=/boot/vmlinuz-6.1.0-35-amd64 root=UUID=ba6875ab-7e05-4679-a066-fbb7c9850c17 ro quiet

    ** Not tainted

    ** Kernel log:
    [ 2.599474] systemd[1]: Mounted sys-kernel-tracing.mount - Kernel
    Trace File System.
    [ 2.599811] systemd[1]: Finished kmod-static-nodes.service - Create
    List of Static Device Nodes.
    [ 2.600262] systemd[1]: modprobe@configfs.service: Deactivated successfully. [ 2.600404] systemd[1]: Finished modprobe@configfs.service - Load
    Kernel Module configfs.
    [ 2.600609] systemd[1]: modprobe@drm.service: Deactivated successfully.
    [ 2.600724] systemd[1]: Finished modprobe@drm.service - Load Kernel
    Module drm.
    [ 2.600929] systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
    [ 2.601027] systemd[1]: Finished modprobe@efi_pstore.service - Load
    Kernel Module efi_pstore.
    [ 2.602513] device-mapper: ioctl: 4.47.0-ioctl (2022-07-28)
    initialised: dm-devel@redhat.com
    [ 2.606443] systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System...
    [ 2.610911] fuse: init (API version 7.38)
    [ 2.611978] systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
    [ 2.612214] systemd[1]: Finished modprobe@dm_mod.service - Load
    Kernel Module dm_mod.
    [ 2.613785] systemd[1]: modprobe@fuse.service: Deactivated successfully.
    [ 2.613893] systemd[1]: Finished modprobe@fuse.service - Load
    Kernel Module fuse.
    [ 2.617614] EXT4-fs (sda2): re-mounted. Quota mode: none.
    [ 2.623844] loop: module loaded
    [ 2.626751] systemd[1]: Mounting sys-fs-fuse-connections.mount -
    FUSE Control File System...
    [ 2.628579] systemd[1]: modprobe@loop.service: Deactivated successfully.
    [ 2.628786] systemd[1]: Finished modprobe@loop.service - Load
    Kernel Module loop.
    [ 2.629368] systemd[1]: Finished systemd-remount-fs.service -
    Remount Root and Kernel File Systems.
    [ 2.630276] lp: driver loaded but no devices found
    [ 2.630292] systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System.
    [ 2.630577] systemd[1]: systemd-firstboot.service - First Boot
    Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes).
    [ 2.630613] systemd[1]: systemd-pstore.service - Platform
    Persistent Storage Archival was skipped because of an unmet condition
    check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
    [ 2.631534] systemd[1]: Starting systemd-random-seed.service -
    Load/Save Random Seed...
    [ 2.631590] systemd[1]: systemd-repart.service - Repartition Root
    Disk was skipped because no trigger condition checks were met.
    [ 2.633365] systemd[1]: Starting systemd-sysusers.service - Create
    System Users...
    [ 2.636164] systemd[1]: Mounted sys-fs-fuse-connections.mount -
    FUSE Control File System.
    [ 2.641321] ppdev: user-space parallel port driver
    [ 2.642808] systemd[1]: Mounting run-vmblock\x2dfuse.mount - VMware
    vmblock fuse mount...
    [ 2.647377] systemd[1]: Finished systemd-random-seed.service -
    Load/Save Random Seed.
    [ 2.647649] systemd[1]: first-boot-complete.target - First Boot
    Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes).
    [ 2.661153] systemd[1]: Finished systemd-modules-load.service -
    Load Kernel Modules.
    [ 2.666345] usb 1-2.1: new full-speed USB device number 4 using uhci_hcd
    [ 2.670698] systemd[1]: Starting systemd-sysctl.service - Apply
    Kernel Variables...
    [ 2.679072] systemd[1]: Finished systemd-sysusers.service - Create
    System Users.
    [ 2.679949] systemd[1]: Starting systemd-tmpfiles-setup-dev.service
    - Create Static Device Nodes in /dev...
    [ 2.689352] systemd[1]: Finished systemd-sysctl.service - Apply
    Kernel Variables.
    [ 2.715816] systemd[1]: Mounted run-vmblock\x2dfuse.mount - VMware
    vmblock fuse mount.
    [ 2.725494] systemd[1]: Finished systemd-tmpfiles-setup-dev.service
    - Create Static Device Nodes in /dev.
    [ 2.743412] systemd[1]: Starting systemd-udevd.service - Rule-based
    Manager for Device Events and Files...
    [ 2.743711] systemd[1]: Finished keyboard-setup.service - Set the
    console keyboard layout.

    [continued in next message]

    --- SoupGate-Win32 v1.05
    * Origin: you cannot sedate... all the things you hate (1:229/2)
  • From Salvatore Bonaccorso@1:229/2 to Robert Shearman on Mon May 12 22:40:01 2025
    XPost: linux.debian.bugs.dist, linux.debian.devel.release, linux.debian.maint.boot
    From: carnil@debian.org

    Control: severity -1 serious

    Hi Robert,

    On Mon, May 12, 2025 at 04:38:19PM +0100, Robert Shearman wrote:
    Package: src:linux
    Version: 6.1.137-1
    Severity: important
    X-Debbugs-Cc: rob@graphiant.com

    rob@graph-dev-bookworm:~$ sudo modprobe watchdog
    modprobe: ERROR: could not insert 'watchdog': Bad message

    Using extract-module-sig.pl from https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/plain/scripts/extract-module-sig.pl
    shows there is no signature present for the watchdog kernel object
    file:

    $ ~/Downloads/extract-module-sig.pl -s /lib/modules/6.1.0-35-amd64/kernel/drivers/watchdog/watchdog.ko
    Read 91616 bytes from module file
    Found magic number at 91616
    Found PKCS#7/CMS encapsulation

    Compared to 6.1.0-34-amd64 version:

    $ ~/Downloads/extract-module-sig.pl -s /lib/modules/6.1.0-34-amd64/kernel/drivers/watchdog/watchdog.ko
    Read 92027 bytes from module file
    Found magic number at 92027
    Found PKCS#7/CMS encapsulation
    Found 411 bytes of signature [3082019706092a864886f70d010702a0]
    ...

    So indeed there was likely a temporary problem when doing the signing
    of the modules for linux-signed-amd64. There is the watchdog module
    and w83977f_wdt one which have zero size signature:

    ./linux-signed-amd64-6.1.137+1/debian/signatures/linux-image-6.1.0-35-amd64-unsigned/lib/modules/6.1.0-35-amd64/kernel/drivers/watchdog/watchdog.ko.sig
    ./linux-signed-amd64-6.1.137+1/debian/signatures/linux-image-6.1.0-35-amd64-unsigned/lib/modules/6.1.0-35-amd64/kernel/drivers/watchdog/w83977f_wdt.ko.sig

    I checked as well linux-signed-i386 and linux-signed-arm64 but there I
    found none with a problem.

    Ansgar, assuming at this point we cannot do something anymore for the
    point release.

    Cyril, Adam, so skip the kernel update for the upcoming point release?

    Regards,
    Salvatore

    --- SoupGate-Win32 v1.05
    * Origin: you cannot sedate... all the things you hate (1:229/2)
  • From Salvatore Bonaccorso@1:229/2 to Salvatore Bonaccorso on Mon May 12 23:10:01 2025
    XPost: linux.debian.bugs.dist, linux.debian.devel.release, linux.debian.maint.boot
    From: carnil@debian.org

    On Mon, May 12, 2025 at 10:34:51PM +0200, Salvatore Bonaccorso wrote:
    Control: severity -1 serious

    Hi Robert,

    On Mon, May 12, 2025 at 04:38:19PM +0100, Robert Shearman wrote:
    Package: src:linux
    Version: 6.1.137-1
    Severity: important
    X-Debbugs-Cc: rob@graphiant.com

    rob@graph-dev-bookworm:~$ sudo modprobe watchdog
    modprobe: ERROR: could not insert 'watchdog': Bad message

    Using extract-module-sig.pl from https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/plain/scripts/extract-module-sig.pl
    shows there is no signature present for the watchdog kernel object
    file:

    $ ~/Downloads/extract-module-sig.pl -s /lib/modules/6.1.0-35-amd64/kernel/drivers/watchdog/watchdog.ko
    Read 91616 bytes from module file
    Found magic number at 91616
    Found PKCS#7/CMS encapsulation

    Compared to 6.1.0-34-amd64 version:

    $ ~/Downloads/extract-module-sig.pl -s /lib/modules/6.1.0-34-amd64/kernel/drivers/watchdog/watchdog.ko
    Read 92027 bytes from module file
    Found magic number at 92027
    Found PKCS#7/CMS encapsulation
    Found 411 bytes of signature [3082019706092a864886f70d010702a0]
    ...

    So indeed there was likely a temporary problem when doing the signing
    of the modules for linux-signed-amd64. There is the watchdog module
    and w83977f_wdt one which have zero size signature:

    ./linux-signed-amd64-6.1.137+1/debian/signatures/linux-image-6.1.0-35-amd64-unsigned/lib/modules/6.1.0-35-amd64/kernel/drivers/watchdog/watchdog.ko.sig
    ./linux-signed-amd64-6.1.137+1/debian/signatures/linux-image-6.1.0-35-amd64-unsigned/lib/modules/6.1.0-35-amd64/kernel/drivers/watchdog/w83977f_wdt.ko.sig

    I checked as well linux-signed-i386 and linux-signed-arm64 but there I
    found none with a problem.

    Ansgar, assuming at this point we cannot do something anymore for the
    point release.

    Cyril, Adam, so skip the kernel update for the upcoming point release?

    The alternative would be given that the "only" two modules affected
    are watchdog and w83977f_wdt to proceed as planned with the point
    release (testing, Cyril?) and make a nearby src:linux DSA release
    including further security fixes.

    6.14.7, 6.12.29 and 6.1.139 are currently beeing reviewed upstream in particular including the ITS variant of the "Training Solo" issue
    (side note, to be effective the fixes will need as well a
    intel-microcode update, cf. #1105172).

    Regards,
    Salvatore

    --- SoupGate-Win32 v1.05
    * Origin: you cannot sedate... all the things you hate (1:229/2)
  • From Jonathan Wiltshire@1:229/2 to Salvatore Bonaccorso on Mon May 12 23:30:01 2025
    XPost: linux.debian.bugs.dist, linux.debian.devel.release, linux.debian.maint.boot
    From: jmw@debian.org

    On Mon, May 12, 2025 at 11:02:56PM +0200, Salvatore Bonaccorso wrote:
    On Mon, May 12, 2025 at 10:34:51PM +0200, Salvatore Bonaccorso wrote:
    Control: severity -1 serious

    Hi Robert,

    On Mon, May 12, 2025 at 04:38:19PM +0100, Robert Shearman wrote:
    Package: src:linux
    Version: 6.1.137-1
    Severity: important
    X-Debbugs-Cc: rob@graphiant.com

    rob@graph-dev-bookworm:~$ sudo modprobe watchdog
    modprobe: ERROR: could not insert 'watchdog': Bad message

    Using extract-module-sig.pl from https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/plain/scripts/extract-module-sig.pl
    shows there is no signature present for the watchdog kernel object
    file:

    $ ~/Downloads/extract-module-sig.pl -s /lib/modules/6.1.0-35-amd64/kernel/drivers/watchdog/watchdog.ko
    Read 91616 bytes from module file
    Found magic number at 91616
    Found PKCS#7/CMS encapsulation

    Compared to 6.1.0-34-amd64 version:

    $ ~/Downloads/extract-module-sig.pl -s /lib/modules/6.1.0-34-amd64/kernel/drivers/watchdog/watchdog.ko
    Read 92027 bytes from module file
    Found magic number at 92027
    Found PKCS#7/CMS encapsulation
    Found 411 bytes of signature [3082019706092a864886f70d010702a0]
    ...

    So indeed there was likely a temporary problem when doing the signing
    of the modules for linux-signed-amd64. There is the watchdog module
    and w83977f_wdt one which have zero size signature:

    ./linux-signed-amd64-6.1.137+1/debian/signatures/linux-image-6.1.0-35-amd64-unsigned/lib/modules/6.1.0-35-amd64/kernel/drivers/watchdog/watchdog.ko.sig
    ./linux-signed-amd64-6.1.137+1/debian/signatures/linux-image-6.1.0-35-amd64-unsigned/lib/modules/6.1.0-35-amd64/kernel/drivers/watchdog/w83977f_wdt.ko.sig

    I checked as well linux-signed-i386 and linux-signed-arm64 but there I found none with a problem.

    Ansgar, assuming at this point we cannot do something anymore for the
    point release.

    Cyril, Adam, so skip the kernel update for the upcoming point release?

    The alternative would be given that the "only" two modules affected
    are watchdog and w83977f_wdt to proceed as planned with the point
    release (testing, Cyril?) and make a nearby src:linux DSA release
    including further security fixes.

    6.14.7, 6.12.29 and 6.1.139 are currently beeing reviewed upstream in particular including the ITS variant of the "Training Solo" issue
    (side note, to be effective the fixes will need as well a
    intel-microcode update, cf. #1105172).

    Hola,

    We discussed briefly just now and decided that:

    - as it's "just" amd64 watchdog and w83977f_wdt modules, and
    - a kernel DSA is imminent anyway, and
    - deferring the point release and skipping the kernel are both major
    upheavals,

    we intend to continue as planned and include a warning in the announcement
    on release, that affected users should disable their watchdogs or not
    reboot until an updated kernel is released very soon after the point
    release will be.

    If there are other issues we have not considered please speak up urgently.

    --
    Jonathan Wiltshire jmw@debian.org
    Debian Developer http://people.debian.org/~jmw

    4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC 74C3 5394 479D D352 4C51 ed25519/0x196418AAEB74C8A1: CA619D65A72A7BADFC96D280196418AAEB74C8A1


    -----BEGIN PGP SIGNATURE-----

    iHUEABYKAB0WIQTdFzjfLGn8URFmteMDXuYJgEtROQUCaCJlIwAKCRADXuYJgEtR OVhJAQCjh2l+nLQnRnSkoX9MXgVhQU1I+ISL+TLTztIlFm1XKQD/V/02lonJa5jy HOSkMwZ+N7lXvtcUFbY5dUO7/zQ+xAA=
    =++yC
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: you cannot sedate... all the things you hate (1:229/2)
  • From Cyril Brulebois@1:229/2 to All on Tue May 13 00:00:01 2025
    XPost: linux.debian.bugs.dist, linux.debian.devel.release, linux.debian.maint.boot
    From: kibi@debian.org

    Hi,

    Jonathan Wiltshire <jmw@debian.org> (2025-05-12):
    We discussed briefly just now and decided that:

    - as it's "just" amd64 watchdog and w83977f_wdt modules, and

    It's been a while since I last toyed with watchdogs (and those needed
    explicit actions to be enabled anyway), but I'd expect those not to be
    shipped or used within d-i, so probable ACK on the installer front.

    A quick look through Contents-udeb-* through a reconfigured apt-file
    seems to suggest they're not shipped in any udeb. Definitive ACK then.

    - a kernel DSA is imminent anyway, and
    - deferring the point release and skipping the kernel are both major
    upheavals,

    we intend to continue as planned and include a warning in the
    announcement on release, that affected users should disable their
    watchdogs or not reboot until an updated kernel is released very soon
    after the point release will be.

    If there are other issues we have not considered please speak up
    urgently.

    Unless you tell me otherwise I'll stick to testing then uploading d-i
    with the ABI bumped to 35. (And it can still be rejected from pu-NEW
    anyway?)


    Cheers,
    --
    Cyril Brulebois (kibi@debian.org) <https://debamax.com/>
    D-I release manager -- Release team member -- Freelance Consultant

    -----BEGIN PGP SIGNATURE-----

    iQIzBAABCgAdFiEEtg6/KYRFPHDXTPR4/5FK8MKzVSAFAmgibckACgkQ/5FK8MKz VSDrvw/+MdV8S2/LuXsjIkIoNWI3t+0pPs3fTQMhCn1HlBq055ymrIzEC+89sbKh Wn1t147xzJ9BMEo6eHSlPSXRXfQd3bEaTKU3E3V2ksNki8sB9Nl81N2urXOReP8n 3q3w0DXe7FYPI0Mk9Hz/0WZ8AsImJCFhQuNXww7R/RJvtvTQZ2+NtKdakqvpw5mR ej8J+MhU8puN1fRbgdEfIMLJLX90WHLwSGY+hYhcxZKpdMKQ0KiWj9KWGxyeKn85 0MpAcwbT5Jhjs0lRtmvZUDHHYh4y4RRRC0Y7wX1Dt6jFOUU1+bM5CyyLB4izdt08 NAgb4CpGGe3uA7SN7KdKc6lKo8PoTt9m8ZSb4mv07kBBNo081uwKxTam568CZ1Nn 7LiBYEuxfAirgpJ/055gECaLFULrgoIAO25Mc9WDUfHSPWBnZ328E9q0omGJb44o 6IUIfVwrHV/+MIJlrvq8e+bCQSGo1+BJv5R1wVTnuttRmHtz+JYCTp/d04TeBVHq juw1nVsxVaxxGT5ITjY94XchFbTtn6zBW7LO6qS/hJ4XLcuRS4RI1QBpKaWW6koY vVqtSWKHM53ObOxQGL5a/GQIXKpI2h5eAkz1Vd/jpIkJqHkKsxnfEYXSRPWr6pfu V6thxTLBDkmDk6FvnrrjjpdjdFcwvP+qbvQGPN/u1rDh6oZhhek=
    =37RH
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    *