Your message dated Sun, 09 Mar 2025 18:43:43 +0000
with message-id <e1trlcl-00cydk...@fasolo.debian.org>
and subject line Bug#1088682: fixed in linux 6.13.6-1~exp1
has caused the Debian Bug report #1088682,
regarding linux-image-6.11.9-amd64: Abnormal delay at boot time (related to 
unstable tsc), also on installer image
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1088682: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088682
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-6.11.9-amd64
Version: 6.11.9-1
Severity: normal

Dear Maintainer,

Since bookworm which runs kernel 6.1 I have an extended boot delay which can
last for a few minutes. Dmesg showed that the issue is with the clock source.
Setting the kernel parameter 'tsc=unstable' at boot time fixes the issue. I
have the same problem with Trixie which now has kernel 6.11 and of course the
issue is also with the Debian installer media. (Bookworm and Trixie)

The issue is that it is difficult to find out what is really making the boot 
be
stuck for a long time and when booting the installation medium one would
believe that the system is completely frozen since that can last for a few
minutes. The system doesn't react to any user input when in that state.

Moreover if I remove the 'quiet' parameter from the kernel it seems stuck on
detecting USB. This is misleading. It is only by looking at the kernel logs
that I found it was suggested to use tsc=unstable.

How could we prevent users to be stuck at boot time for such a long time
without having a clue on what is happening? Here are a few ideas:

- run the installer by default with tsc=unstable, but maybe this would pass 
the
value to the installed system, even when not appropriate? And if it doesn't
pass it to the installed system, that would just move the problem to 1st boot
time and reveal the delay at that time which isn't ideal either.
- build the kernel for the installer medium with
CONFIG_HAVE_UNSTABLE_SCHED_CLOCK ?
- write a notice in the installation guide?

In the meantime I sent a report to the kernel mailing list.

<https://lore.kernel.org/all/10cf96aa-1276-4bd4-8966-c89037703...@yahoo.fr/>

Regards


-- System Information:
Debian Release: 12.8
  APT prefers stable-updates
  APT policy: (991, 'stable-updates'), (991, 'stable-security'), (991, 
'stable'), (990, 'proposed-updates'), (390, 'oldstable-security'), (390, 
'oldstable'), (389, 'oldstable-updates'), (380, 'oldoldstable'), (379, 
'oldoldstable-updates'), (370, 'oldoldstable'), (95, 'testing'), (94, 
'unstable'), (93, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.1.0-27-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), 
LANGUAGE=fr:en_US
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages linux-image-6.11.9-amd64 depends on:
ii  initramfs-tools [linux-initramfs-tool]  0.142+deb12u1
ii  kmod                                    30+20221128-1
ii  linux-base                              4.9

Versions of packages linux-image-6.11.9-amd64 recommends:
ii  apparmor  3.0.8-3

Versions of packages linux-image-6.11.9-amd64 suggests:
pn  debian-kernel-handbook  <none>
ii  firmware-linux-free     20200122-1
ii  grub-efi-amd64          2.06-13+deb12u1
pn  linux-doc-6.11          <none>

--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.13.6-1~exp1
Done: Salvatore Bonaccorso <car...@debian.org>

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1088...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <car...@debian.org> (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 09 Mar 2025 19:14:58 +0100
Source: linux
Architecture: source
Version: 6.13.6-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <car...@debian.org>
Closes: 1088682 1096006 1099143 1099144 1099145 1099146 1099158
Changes:
 linux (6.13.6-1~exp1) experimental; urgency=medium
 .
   * New upstream stable update:
     https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.13.6
     - [amd64] intel_idle: Handle older CPUs, which stop the TSC in deeper C
       states, correctly (Closes: #1088682)
 .
   [ Salvatore Bonaccorso ]
   * [amd64,arm64] drivers/net/ethernet/intel/idpf: Enable IDPF as module
     (Closes: #1099143, #1099144, #1099145, #1099146)
   * [amd64,arm64] drivers/iommu: Enable VIRTIO_IOMMU as module
     (Closes: #1099158)
 .
   [ Matt Mower ]
   * [amd64] sound/soc/amd/acp: Enable SND_AMD_ASOC_ACP70, SND_SOC_AMD_ACP_PCI
     and SND_SOC_AMD_LEGACY_MACH as modules (Closes: #1096006)
 .
   [ Uwe Kleine-König ]
   * Enable IIO HRTIMER and SYSFS trigger. These are useful to do high-speed
     continuous and manual (or scripted) sensor reading respectively.
 .
   [ Dmytro Sinina ]
   * sound/pci/hda: Enable SND_HDA_SCODEC_CS35L56_I2C,
     SND_HDA_SCODEC_CS35L56_SPI, SND_SOC_CS35L56_I2C, SND_SOC_CS35L56_SPI,
     SND_SOC_CS35L56_SDW as modules
 .
   [ Bastian Blank ]
   * Store build time signing key encrypted.
Checksums-Sha1:
 066f2db3b70a68c9ed9065fc3d8016709997d267 200434 linux_6.13.6-1~exp1.dsc
 cd0994fc3db95ac66f84593ed44779252f71eb9e 151528288 linux_6.13.6.orig.tar.xz
 c548ceeb3a776388e07b7df760c67f365c2764ef 1543776 
linux_6.13.6-1~exp1.debian.tar.xz
 9a438813751f6ddb46cccad52c1e806a8f1df512 7093 
linux_6.13.6-1~exp1_source.buildinfo
Checksums-Sha256:
 9302bc8ac135d563e9cd97bf766476a63b0681f0428243cbdac748e2aca5e358 200434 
linux_6.13.6-1~exp1.dsc
 7769e7adf14124ccc2dd9f044aaeab51462600ea0a2d85b58a32f8220d9fe9c0 151528288 
linux_6.13.6.orig.tar.xz
 4e0b9e035089eb78205771b106156062f9118d8a9f3bb2a51c13507db7ad43b6 1543776 
linux_6.13.6-1~exp1.debian.tar.xz
 0a55c70148508a79f817f6b968f8b4ed6de37253e64073ebf96c3fd16e3a567e 7093 
linux_6.13.6-1~exp1_source.buildinfo
Files:
 4dc5c70f2d5983be687cb9cb29629930 200434 kernel optional linux_6.13.6-1~exp1.dsc
 fea52230fdda7a8c17c5783a65c56ea6 151528288 kernel optional 
linux_6.13.6.orig.tar.xz
 048941ca091bc977746d2e12bfaab2c2 1543776 kernel optional 
linux_6.13.6-1~exp1.debian.tar.xz
 d5e2b58d4f245a94ae226888129c4a71 7093 kernel optional 
linux_6.13.6-1~exp1_source.buildinfo


-----BEGIN PGP SIGNATURE-----
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=L6BL
-----END PGP SIGNATURE-----

Attachment: pgpmVKFycgvp9.pgp
Description: PGP signature


--- End Message ---

Reply via email to