[Kernel-packages] [Bug 1923670] Re: CIFS DFS entries not accessible with 5.4.0-71.74-generic

2021-04-27 Thread Kjell Braden
Will this be fixed for non-OEM kernels in focal? It's listed as Fix
Released, but I don't see a fixed version.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1923670

Title:
  CIFS DFS entries not accessible with 5.4.0-71.74-generic

Status in linux package in Ubuntu:
  Confirmed
Status in linux-oem-5.10 package in Ubuntu:
  Confirmed
Status in linux source package in Bionic:
  New
Status in linux source package in Focal:
  Fix Released
Status in linux-oem-5.10 source package in Focal:
  Fix Released

Bug description:
  When booting 5.4.0-71-generic I can not access DFS entries anymore,
  with 5.4.0-70-generic this still works. Some details:

  fstab entry:

  //example.com/public /home/user/remotecifs
  
noauto,vers=default,noserverino,users,_netdev,user=remote_user,domain=example.com
  00

  shell session
  ~$ mount /home/user/remote
  Password for remote_user@//example.com/public:
  ~$ ls /home/user/remote/dfs-folder
  dfs-subfolder dfs-entry
  ~$ ls /home/user/remote/dfs-folder/dfs-entry
  ls: cannot access '/home/user/remote/dfs-folder/dfs-entry': No such file or 
directory

  dmesg excerpt
  [ 1219.568778] CIFS: Attempting to mount 
//DC01.example.com/Public/dfs-folder/dfs-entry
  [ 1219.584975] FS-Cache: Duplicate cookie detected
  [ 1219.584986] FS-Cache: O-cookie c=6e995395 [p=f4725c61 
fl=222 nc=0 na=1]
  [ 1219.584990] FS-Cache: O-cookie d=a11c1428 n=71ab21ba
  [ 1219.584993] FS-Cache: O-key=[6] '5075626c6963'
  [ 1219.585001] FS-Cache: N-cookie c=a0608786 [p=f4725c61 fl=2 
nc=0 na=1]
  [ 1219.585004] FS-Cache: N-cookie d=a11c1428 n=901f6a53
  [ 1219.585007] FS-Cache: N-key=[6] '5075626c6963'
  [ 1219.725834] FS-Cache: Duplicate cookie detected
  [ 1219.725847] FS-Cache: O-cookie c=6e995395 [p=f4725c61 
fl=222 nc=0 na=1]
  [ 1219.725851] FS-Cache: O-cookie d=a11c1428 n=71ab21ba
  [ 1219.725854] FS-Cache: O-key=[6] '5075626c6963'
  [ 1219.725864] FS-Cache: N-cookie c=0509709f [p=f4725c61 fl=2 
nc=0 na=1]
  [ 1219.725868] FS-Cache: N-cookie d=a11c1428 n=556f158b
  [ 1219.725870] FS-Cache: N-key=[6] '5075626c6963'
  [ 1220.216524] CIFS VFS: cifs_read_super: get root inode failed

  The dmesg from 5.4.0-70-generic does not have the line
  CIFS VFS: cifs_read_super: get root inode failed

  
  ~$ lsb_release -rd
  Description:KDE neon User Edition 5.21
  Release:   ~$ lsb_release -rd
  Description:KDE neon User Edition 5.21
  Release:20.04
   20.04
  ~$ apt-cache policy linux-image-generic
  linux-image-generic:
Installed: 5.4.0.71.74
Candidate: 5.4.0.71.74
Version table:
   *** 5.4.0.71.74 500
  500 http://de.archive.ubuntu.com/ubuntu focal-updates/main amd64 
Packages
  500 http://security.ubuntu.com/ubuntu focal-security/main amd64 
Packages
  100 /var/lib/dpkg/status
   5.4.0.26.32 500
  500 http://de.archive.ubuntu.com/ubuntu focal/main amd64 Packages
  --- 
  ProblemType: Bug
  ApportVersion: 2.20.11-0ubuntu27.16
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC2:  dirk   2946 F pulseaudio
   /dev/snd/controlC1:  dirk   2946 F pulseaudio
   /dev/snd/controlC0:  dirk   2946 F pulseaudio
  CasperMD5CheckResult: skip
  CurrentDesktop: KDE
  DistroRelease: KDE neon 20.04
  InstallationDate: Installed on 2017-07-27 (1356 days ago)
  InstallationMedia: neon userlts "Xenial" - Build amd64 LIVE Binary 
20170614-00:52
  MachineType: LENOVO 20HMS00T00
  Package: linux (not installed)
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.4.0-71-generic 
root=/dev/mapper/vg00-lv_root ro intel_iommu=off
  ProcVersionSignature: Ubuntu 5.4.0-71.79-generic 5.4.101
  RelatedPackageVersions:
   linux-restricted-modules-5.4.0-71-generic N/A
   linux-backports-modules-5.4.0-71-generic  N/A
   linux-firmware1.187.10
  Tags:  focal
  Uname: Linux 5.4.0-71-generic x86_64
  UnreportableReason: In diesem Bericht geht es um ein Paket, welches nicht 
installiert ist.
  UpgradeStatus: Upgraded to focal on 2020-11-22 (142 days ago)
  UserGroups: adm cdrom davfs2 dialout dip kvm libvirt lpadmin plugdev roccat 
sambashare scanner sudo vboxusers
  _MarkForUpload: False
  dmi.bios.date: 04/20/2020
  dmi.bios.vendor: LENOVO
  dmi.bios.version: R0IET61W (1.39 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 20HMS00T00
  dmi.board.vendor: LENOVO
  dmi.board.version: Not Defined
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: None
  dmi.modalias: 
dmi:bvnLENOVO:bvrR0IET61W(1.39):bd04/20/2020:svnLENOVO:pn20HMS00T00:pvrThinkPadX270:rvnLENOVO:rn20HMS00T00:rvrNotDefined:cvnLENOVO:ct10:cvrNone:
  dmi.product.family: ThinkPad X270
  dmi.pro

[Kernel-packages] [Bug 1926257] [NEW] Keys not working on laptop

2021-04-27 Thread Shivanshu Gupta
Public bug reported:

Some keys are not working in this version

ProblemType: Bug
DistroRelease: Ubuntu 20.10
Package: linux-image-5.8.0-50-generic 5.8.0-50.56
ProcVersionSignature: Ubuntu 5.8.0-50.56-generic 5.8.18
Uname: Linux 5.8.0-50-generic x86_64
ApportVersion: 2.20.11-0ubuntu50.5
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC0:  shivanshu   1994 F pulseaudio
 /dev/snd/pcmC0D0c:   shivanshu   1994 F...m pulseaudio
 /dev/snd/pcmC0D0p:   shivanshu   1994 F...m pulseaudio
 /dev/snd/controlC1:  shivanshu   1994 F pulseaudio
CasperMD5CheckResult: skip
CurrentDesktop: ubuntu:GNOME
Date: Tue Apr 27 12:26:35 2021
InstallationDate: Installed on 2020-06-10 (320 days ago)
InstallationMedia: Ubuntu 20.04 LTS "Focal Fossa" - Release amd64 (20200423)
Lsusb:
 Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
 Bus 001 Device 004: ID 04f2:b61e Chicony Electronics Co., Ltd Integrated Camera
 Bus 001 Device 003: ID 0bda:b023 Realtek Semiconductor Corp. RTL8822BE 
Bluetooth 4.2 Adapter
 Bus 001 Device 002: ID 046d:c52b Logitech, Inc. Unifying Receiver
 Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
MachineType: LENOVO 81EU
ProcFB: 0 i915drmfb
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.8.0-50-generic 
root=UUID=86104863-1f3c-40e9-9432-c6edade6d000 ro quiet splash
RelatedPackageVersions:
 linux-restricted-modules-5.8.0-50-generic N/A
 linux-backports-modules-5.8.0-50-generic  N/A
 linux-firmware1.190.4
SourcePackage: linux
UpgradeStatus: Upgraded to groovy on 2020-10-27 (181 days ago)
dmi.bios.date: 11/26/2020
dmi.bios.release: 1.46
dmi.bios.vendor: LENOVO
dmi.bios.version: 7PCN46WW
dmi.board.asset.tag: NO Asset Tag
dmi.board.name: LNVNB161216
dmi.board.vendor: LENOVO
dmi.board.version: SDK0Q55722 WIN
dmi.chassis.asset.tag: NO Asset Tag
dmi.chassis.type: 10
dmi.chassis.vendor: LENOVO
dmi.chassis.version: Lenovo ideapad 530S-14IKB
dmi.ec.firmware.release: 1.46
dmi.modalias: 
dmi:bvnLENOVO:bvr7PCN46WW:bd11/26/2020:br1.46:efr1.46:svnLENOVO:pn81EU:pvrLenovoideapad530S-14IKB:rvnLENOVO:rnLNVNB161216:rvrSDK0Q55722WIN:cvnLENOVO:ct10:cvrLenovoideapad530S-14IKB:
dmi.product.family: ideapad 530S-14IKB
dmi.product.name: 81EU
dmi.product.sku: LENOVO_MT_81EU_BU_idea_FM_ideapad 530S-14IKB
dmi.product.version: Lenovo ideapad 530S-14IKB
dmi.sys.vendor: LENOVO

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug groovy

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926257

Title:
  Keys not working on laptop

Status in linux package in Ubuntu:
  New

Bug description:
  Some keys are not working in this version

  ProblemType: Bug
  DistroRelease: Ubuntu 20.10
  Package: linux-image-5.8.0-50-generic 5.8.0-50.56
  ProcVersionSignature: Ubuntu 5.8.0-50.56-generic 5.8.18
  Uname: Linux 5.8.0-50-generic x86_64
  ApportVersion: 2.20.11-0ubuntu50.5
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  shivanshu   1994 F pulseaudio
   /dev/snd/pcmC0D0c:   shivanshu   1994 F...m pulseaudio
   /dev/snd/pcmC0D0p:   shivanshu   1994 F...m pulseaudio
   /dev/snd/controlC1:  shivanshu   1994 F pulseaudio
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Tue Apr 27 12:26:35 2021
  InstallationDate: Installed on 2020-06-10 (320 days ago)
  InstallationMedia: Ubuntu 20.04 LTS "Focal Fossa" - Release amd64 (20200423)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 004: ID 04f2:b61e Chicony Electronics Co., Ltd Integrated 
Camera
   Bus 001 Device 003: ID 0bda:b023 Realtek Semiconductor Corp. RTL8822BE 
Bluetooth 4.2 Adapter
   Bus 001 Device 002: ID 046d:c52b Logitech, Inc. Unifying Receiver
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: LENOVO 81EU
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.8.0-50-generic 
root=UUID=86104863-1f3c-40e9-9432-c6edade6d000 ro quiet splash
  RelatedPackageVersions:
   linux-restricted-modules-5.8.0-50-generic N/A
   linux-backports-modules-5.8.0-50-generic  N/A
   linux-firmware1.190.4
  SourcePackage: linux
  UpgradeStatus: Upgraded to groovy on 2020-10-27 (181 days ago)
  dmi.bios.date: 11/26/2020
  dmi.bios.release: 1.46
  dmi.bios.vendor: LENOVO
  dmi.bios.version: 7PCN46WW
  dmi.board.asset.tag: NO Asset Tag
  dmi.board.name: LNVNB161216
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0Q55722 WIN
  dmi.chassis.asset.tag: NO Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Lenovo ideapad 530S-14IKB
  dmi.ec.firmware.release: 1.46
  dmi.modalias: 
dmi:bvnLENOVO:bvr7PCN46WW:bd11/26/2020:br1.46:efr1.46:svnLENOVO:pn81EU:pvrLenovoideapad530S-14IKB:rvnLENOVO:rnLNVNB161216:rvrSDK0Q55722WIN:cvnLENOVO:ct10:cvrLenovoideapad5

[Kernel-packages] [Bug 1925452] Re: [Ubuntu 21.04] net/mlx5: Fix HW spec violation configuring uplink

2021-04-27 Thread Frank Heimes
Kernel SRU request submitted for hirsute, groovy and focal:
https://lists.ubuntu.com/archives/kernel-team/2021-April/thread.html#119562
changing status to 'In Progress'.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1925452

Title:
  [Ubuntu 21.04] net/mlx5: Fix HW spec violation configuring uplink

Status in Ubuntu on IBM z Systems:
  Triaged
Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Focal:
  New
Status in linux source package in Groovy:
  New
Status in linux source package in Hirsute:
  In Progress

Bug description:
  SRU Justification:
  ==

  [Impact]

  * In addition to 9c9be85f6b59 "net/mlx5e: Add missing capability check
  for uplink follow" (handled in LP#1921104) another fix 1a73704c82ed
  "Fix HW spec violation configuring uplink" (handled in this bug,
  LP#1925452) is needed to fix issues that were introduced with commit
  7d0314b11cdd "net/mlx5e: Modify uplink state on interface up/down".

  * Commit 1a73704c82ed "Fix HW spec violation configuring uplink" fixes
  a regression for mlx5 adapters required to operate in switchdev mode.

  * This fix makes sure that the uplink port is modified to follow only
  if the uplink_follow capability if it's set as required by the hw
  specification.

  * Failure cause traffic to the uplink representer net device to cease
  after switching to switchdev mode.

  [Fix]

  * upstream fix (upstream with v5.12-rc7)
  1a73704c82ed4ee95532ac04645d02075bd1ce3d 1a73704c82ed "Fix HW spec violation 
configuring uplink"

  * can be cleanly cherry picked from hirsute master-next.

  * a backport for groovy:
  
https://launchpadlibrarian.net/534888680/groovy-0001-net-mlx5-Fix-HW-spec-violation-configuring-uplink.patch

  * a backport for focal:
  
https://launchpadlibrarian.net/534847308/focal-0001-net-mlx5-Fix-HW-spec-violation-configuring-uplink.patch

  [Test Case]

  * Two servers, installed with Ubuntu Server 20.04 or 20.10 are needed.

  * Each server needs to have a Mellanox ConnectX4/5 adapter, attached
  to the same switch

  * Adapters must be running adapter firmware level 16.29.1006 or
  earlier.

  * enable SRIOV and switchdev mode on one adapter:
    echo 0 > /sys/bus/pci/devices/0100\:00\:00.0/sriov_drivers_autoprobe
    echo 0 > /sys/bus/pci/devices/0100\:00\:00.1/sriov_drivers_autoprobe
    echo 64 > /sys/bus/pci/devices/0100\:00\:00.0/sriov_numvfs
    echo 64 > /sys/bus/pci/devices/0100\:00\:00.1/sriov_numvfs
    devlink dev eswitch set pci/0100:00:00.0 mode switchdev
    devlink dev eswitch set pci/0100:00:00.1 mode switchdev

  * Assign an IP address to the physical function device of the adapters
  on both systems

  * IP communication will fail

  * With the fix, IP communication can be established.

  [Regression Potential]

  * There is always at least some potential for regression. In this case
  the new code can go wrong (or might become worse than before) in case
  the new if statement is wrong.

  * It checks for the condition of "MLX5_CAP_GEN(mdev, uplink_follow)"
  and in case MLX5_CAP_GEN is calculated erroneous or mdev is other than
  expected, the mlx5_modify_vport_admin_state call might go wrong, too.

  * But since only the If clause was added, the changes are pretty
  minimal and therefore well traceable.

  [Other]

  * Since the patch/commit is upstream with 5.12-rc7, it will be in Impish.
  __

  With the 5.4.0-48 update for Ubuntu 20.04, the commit

  "net/mlx5e: Modify uplink state on interface up/down"

  was integrated which contains a regression for mlx5 adapters with
  older adapter firmware.

  This is the second bugfix to repair the regression, required to operate the 
adapter in switchdev mode.
  The first part was integrated via Bug 192185 - LP1921104.

  This is the upstream fix required to be backported to Ubuntu 20.04:
  
https://github.com/torvalds/linux/commit/1a73704c82ed4ee95532ac04645d02075bd1ce3d

  ---Additional Hardware Info---
  Mellanox ConnectX network adapter

  ---uname output---
  5.4.0-73-generic

  ---Steps to Reproduce---
   enable switchdev mode
  try to ping external host

  Backports need to be provide for 21.04, 20.10 and 20.04 (if not
  cleanly applyable)!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1925452/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1923515] Re: [Dell XPS 15 9500] New touchpad detected as "PS/2 Logitech Wheel Mouse"

2021-04-27 Thread Konstantin
@edholden I'm glad you pinned down the problem! I think you might want
to post this on the askubuntu thread as an answer, and to the kernel
bugzilla as well, and perhaps close the reports on both bugtrackers.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1923515

Title:
  [Dell XPS 15 9500] New touchpad detected as "PS/2 Logitech Wheel
  Mouse"

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  I've been using Ubuntu 20.04 on a Dell XPS 15 9550. The laptop's
  touchpad had a hardware defect common to the model (nicknamed
  "wobble") so Dell sent a tech to replace it. The new touchpad looks
  identical to the original but the kernel doesn't correctly detect it.
  The device does work, but appears to the kernel as a "PS/2 Logitech
  Wheel Mouse," which prevents the use of features like two-finger
  scrolling, disabling tap to click, and palm detection.

  A good summary of my troubleshooting steps are here:
  
https://askubuntu.com/questions/1330555/touchpad-detected-as-ps-2-logitech-wheel-mouse-dell-xps-15-ubuntu-20-04

  Importantly, I've tried a mainline kernel downloaded from Ubuntu
  (5.11.12 and a 5.12.0 release candidate, whereas the current version
  is a 5.8.0). I've also tried two bootable USB drives containing Ubuntu
  20.04 and 21.04 (release candidate). Nothing has changed the device
  detection or behavior. The issue is identical in the default Ubuntu
  desktop and in Plasma. There are no touchpad settings in the UEFI
  BIOS.

  Per the touchpad detection instructions, I've attached the output of 
/proc/bus/input/devices, Xorg.0.log, and the `xinput --list` command. My 
suspicion is that Dell has ordered a brand new touchpad model for which there 
is no kernel driver; looking at the logs, the previous model was an elantech, 
but I'm not sure if the new one is as well.
  --- 
  ProblemType: Bug
  ApportVersion: 2.20.11-0ubuntu27.16
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  edholden   1571 F pulseaudio
  CasperMD5CheckResult: skip
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 20.04
  InstallationDate: Installed on 2020-10-11 (183 days ago)
  InstallationMedia: Ubuntu 20.04.1 LTS "Focal Fossa" - Release amd64 (20200731)
  MachineType: Dell Inc. XPS 15 9500
  NonfreeKernelModules: nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.8.0-48-generic 
root=UUID=a8be5c03-8499-4474-932d-725877e9cc6c ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 5.8.0-48.54~20.04.1-generic 5.8.18
  RelatedPackageVersions:
   linux-restricted-modules-5.8.0-48-generic N/A
   linux-backports-modules-5.8.0-48-generic  N/A
   linux-firmware1.187.10
  Tags:  focal
  Uname: Linux 5.8.0-48-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin lxd plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 12/24/2020
  dmi.bios.release: 1.6
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: 1.6.1
  dmi.board.name: 0RDX6T
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 10
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvr1.6.1:bd12/24/2020:br1.6:svnDellInc.:pnXPS159500:pvr:rvnDellInc.:rn0RDX6T:rvrA00:cvnDellInc.:ct10:cvr:
  dmi.product.family: XPS
  dmi.product.name: XPS 15 9500
  dmi.product.sku: 097D
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1923515/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1925452] Re: [Ubuntu 21.04] net/mlx5: Fix HW spec violation configuring uplink

2021-04-27 Thread Frank Heimes
** Changed in: linux (Ubuntu Groovy)
   Status: New => In Progress

** Changed in: linux (Ubuntu Focal)
   Status: New => In Progress

** Changed in: ubuntu-z-systems
   Status: Triaged => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1925452

Title:
  [Ubuntu 21.04] net/mlx5: Fix HW spec violation configuring uplink

Status in Ubuntu on IBM z Systems:
  In Progress
Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Focal:
  In Progress
Status in linux source package in Groovy:
  In Progress
Status in linux source package in Hirsute:
  In Progress

Bug description:
  SRU Justification:
  ==

  [Impact]

  * In addition to 9c9be85f6b59 "net/mlx5e: Add missing capability check
  for uplink follow" (handled in LP#1921104) another fix 1a73704c82ed
  "Fix HW spec violation configuring uplink" (handled in this bug,
  LP#1925452) is needed to fix issues that were introduced with commit
  7d0314b11cdd "net/mlx5e: Modify uplink state on interface up/down".

  * Commit 1a73704c82ed "Fix HW spec violation configuring uplink" fixes
  a regression for mlx5 adapters required to operate in switchdev mode.

  * This fix makes sure that the uplink port is modified to follow only
  if the uplink_follow capability if it's set as required by the hw
  specification.

  * Failure cause traffic to the uplink representer net device to cease
  after switching to switchdev mode.

  [Fix]

  * upstream fix (upstream with v5.12-rc7)
  1a73704c82ed4ee95532ac04645d02075bd1ce3d 1a73704c82ed "Fix HW spec violation 
configuring uplink"

  * can be cleanly cherry picked from hirsute master-next.

  * a backport for groovy:
  
https://launchpadlibrarian.net/534888680/groovy-0001-net-mlx5-Fix-HW-spec-violation-configuring-uplink.patch

  * a backport for focal:
  
https://launchpadlibrarian.net/534847308/focal-0001-net-mlx5-Fix-HW-spec-violation-configuring-uplink.patch

  [Test Case]

  * Two servers, installed with Ubuntu Server 20.04 or 20.10 are needed.

  * Each server needs to have a Mellanox ConnectX4/5 adapter, attached
  to the same switch

  * Adapters must be running adapter firmware level 16.29.1006 or
  earlier.

  * enable SRIOV and switchdev mode on one adapter:
    echo 0 > /sys/bus/pci/devices/0100\:00\:00.0/sriov_drivers_autoprobe
    echo 0 > /sys/bus/pci/devices/0100\:00\:00.1/sriov_drivers_autoprobe
    echo 64 > /sys/bus/pci/devices/0100\:00\:00.0/sriov_numvfs
    echo 64 > /sys/bus/pci/devices/0100\:00\:00.1/sriov_numvfs
    devlink dev eswitch set pci/0100:00:00.0 mode switchdev
    devlink dev eswitch set pci/0100:00:00.1 mode switchdev

  * Assign an IP address to the physical function device of the adapters
  on both systems

  * IP communication will fail

  * With the fix, IP communication can be established.

  [Regression Potential]

  * There is always at least some potential for regression. In this case
  the new code can go wrong (or might become worse than before) in case
  the new if statement is wrong.

  * It checks for the condition of "MLX5_CAP_GEN(mdev, uplink_follow)"
  and in case MLX5_CAP_GEN is calculated erroneous or mdev is other than
  expected, the mlx5_modify_vport_admin_state call might go wrong, too.

  * But since only the If clause was added, the changes are pretty
  minimal and therefore well traceable.

  [Other]

  * Since the patch/commit is upstream with 5.12-rc7, it will be in Impish.
  __

  With the 5.4.0-48 update for Ubuntu 20.04, the commit

  "net/mlx5e: Modify uplink state on interface up/down"

  was integrated which contains a regression for mlx5 adapters with
  older adapter firmware.

  This is the second bugfix to repair the regression, required to operate the 
adapter in switchdev mode.
  The first part was integrated via Bug 192185 - LP1921104.

  This is the upstream fix required to be backported to Ubuntu 20.04:
  
https://github.com/torvalds/linux/commit/1a73704c82ed4ee95532ac04645d02075bd1ce3d

  ---Additional Hardware Info---
  Mellanox ConnectX network adapter

  ---uname output---
  5.4.0-73-generic

  ---Steps to Reproduce---
   enable switchdev mode
  try to ping external host

  Backports need to be provide for 21.04, 20.10 and 20.04 (if not
  cleanly applyable)!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1925452/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1926257] Status changed to Confirmed

2021-04-27 Thread Ubuntu Kernel Bot
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926257

Title:
  Keys not working on laptop

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Some keys are not working in this version

  ProblemType: Bug
  DistroRelease: Ubuntu 20.10
  Package: linux-image-5.8.0-50-generic 5.8.0-50.56
  ProcVersionSignature: Ubuntu 5.8.0-50.56-generic 5.8.18
  Uname: Linux 5.8.0-50-generic x86_64
  ApportVersion: 2.20.11-0ubuntu50.5
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  shivanshu   1994 F pulseaudio
   /dev/snd/pcmC0D0c:   shivanshu   1994 F...m pulseaudio
   /dev/snd/pcmC0D0p:   shivanshu   1994 F...m pulseaudio
   /dev/snd/controlC1:  shivanshu   1994 F pulseaudio
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Tue Apr 27 12:26:35 2021
  InstallationDate: Installed on 2020-06-10 (320 days ago)
  InstallationMedia: Ubuntu 20.04 LTS "Focal Fossa" - Release amd64 (20200423)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 004: ID 04f2:b61e Chicony Electronics Co., Ltd Integrated 
Camera
   Bus 001 Device 003: ID 0bda:b023 Realtek Semiconductor Corp. RTL8822BE 
Bluetooth 4.2 Adapter
   Bus 001 Device 002: ID 046d:c52b Logitech, Inc. Unifying Receiver
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: LENOVO 81EU
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.8.0-50-generic 
root=UUID=86104863-1f3c-40e9-9432-c6edade6d000 ro quiet splash
  RelatedPackageVersions:
   linux-restricted-modules-5.8.0-50-generic N/A
   linux-backports-modules-5.8.0-50-generic  N/A
   linux-firmware1.190.4
  SourcePackage: linux
  UpgradeStatus: Upgraded to groovy on 2020-10-27 (181 days ago)
  dmi.bios.date: 11/26/2020
  dmi.bios.release: 1.46
  dmi.bios.vendor: LENOVO
  dmi.bios.version: 7PCN46WW
  dmi.board.asset.tag: NO Asset Tag
  dmi.board.name: LNVNB161216
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0Q55722 WIN
  dmi.chassis.asset.tag: NO Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Lenovo ideapad 530S-14IKB
  dmi.ec.firmware.release: 1.46
  dmi.modalias: 
dmi:bvnLENOVO:bvr7PCN46WW:bd11/26/2020:br1.46:efr1.46:svnLENOVO:pn81EU:pvrLenovoideapad530S-14IKB:rvnLENOVO:rnLNVNB161216:rvrSDK0Q55722WIN:cvnLENOVO:ct10:cvrLenovoideapad530S-14IKB:
  dmi.product.family: ideapad 530S-14IKB
  dmi.product.name: 81EU
  dmi.product.sku: LENOVO_MT_81EU_BU_idea_FM_ideapad 530S-14IKB
  dmi.product.version: Lenovo ideapad 530S-14IKB
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1926257/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1925750] Re: Ubuntu 21.04 not loading correctly intel graphics driver

2021-04-27 Thread florin
Used to be Intel by default (not nvidia by default) until Ubuntu 21.04.
This time it changed and I did not know how to revert to intel drivers.
I uninstalled nvidia drivers, after restart it switched to nouveau
(still nvidia) and then I blacklisted the nouveau driver in the grub.
Probably there was some way to blacklist proprietary nvidia drivers,
too, but I got to that solution later :D

Proprietary nvidia drivers have this thing called Optimus where, if the
management app is installed, you can switch between nvidia and intel
graphics (unfortunately one has also to log out-log in, in Windows it
works without that), I did select Intel graphics but it does not use the
open source drivers from the kernel (or at least they work differently,
because I got the graphical glitches for Gnome Extensions window). Intel
open source drivers don't do that.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1925750

Title:
  Ubuntu 21.04 not loading correctly intel graphics driver

Status in gdm3 package in Ubuntu:
  New
Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I just installed Ubuntu 21.04 and have a problem: I cannot boot into
  Wayland to test it (should be default in 21.04) because, for some
  reason, my system does not correctly work with the graphics drivers. I
  have nvidia+intel graphics on the laptop, but in the Additional
  Drivers tab, I only have the Nvidia one showing. I installed mate-
  optimus to have access to the nvidia settings and be able to change
  graphics from there, that one seems to be working, but Wayland still
  does not show up in the log in screen, maybe because it detected the
  kind of driver and sees it is the nvidia one?

  See the screenshot.

  I have run some terminal commands, but I don't really understand them,
  maybe the outputs helps you (from nvidia drivers the Intel graphics is
  selected):

  sudo lshw -c video
  [sudo] password for florin: 
*-display UNCLAIMED   
 description: 3D controller
 product: GM107M [GeForce GTX 950M]
 vendor: NVIDIA Corporation
 physical id: 0
 bus info: pci@:01:00.0
 version: a2
 width: 64 bits
 clock: 33MHz
 capabilities: pm msi pciexpress cap_list
 configuration: latency=0
 resources: memory:9500-95ff memory:8000-8fff 
memory:9000-91ff ioport:5000(size=128)
*-display
 description: VGA compatible controller
 product: HD Graphics 530
 vendor: Intel Corporation
 physical id: 2
 bus info: pci@:00:02.0
 version: 06
 width: 64 bits
 clock: 33MHz
 capabilities: pciexpress msi pm vga_controller bus_master cap_list rom
 configuration: driver=i915 latency=0
 resources: irq:132 memory:9300-93ff memory:a000-afff 
ioport:6000(size=64) memory:c-d



  glxinfo -B
  name of display: :1
  display: :1  screen: 0
  direct rendering: Yes
  Extended renderer info (GLX_MESA_query_renderer):
  Vendor: Intel (0x8086)
  Device: Mesa Intel(R) HD Graphics 530 (SKL GT2) (0x191b)
  Version: 21.0.1
  Accelerated: yes
  Video memory: 3072MB
  Unified memory: yes
  Preferred profile: core (0x1)
  Max core profile version: 4.6
  Max compat profile version: 4.6
  Max GLES1 profile version: 1.1
  Max GLES[23] profile version: 3.2
  OpenGL vendor string: Intel
  OpenGL renderer string: Mesa Intel(R) HD Graphics 530 (SKL GT2)
  OpenGL core profile version string: 4.6 (Core Profile) Mesa 21.0.1
  OpenGL core profile shading language version string: 4.60
  OpenGL core profile context flags: (none)
  OpenGL core profile profile mask: core profile

  OpenGL version string: 4.6 (Compatibility Profile) Mesa 21.0.1
  OpenGL shading language version string: 4.60
  OpenGL context flags: (none)
  OpenGL profile mask: compatibility profile

  OpenGL ES profile version string: OpenGL ES 3.2 Mesa 21.0.1
  OpenGL ES profile shading language version string: OpenGL ES GLSL ES 3.20

  ProblemType: Bug
  DistroRelease: Ubuntu 21.04
  Package: linux-image-5.11.0-16-generic 5.11.0-16.17
  ProcVersionSignature: Ubuntu 5.11.0-16.17-generic 5.11.12
  Uname: Linux 5.11.0-16-generic x86_64
  ApportVersion: 2.20.11-0ubuntu65
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  florin15003 F pulseaudio
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Fri Apr 23 09:20:09 2021
  InstallationDate: Installed on 2021-04-22 (0 days ago)
  InstallationMedia: Ubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 002: ID 13d3:5652 IMC Networks TOSHIBA Web Camera - HD
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  Lsusb

[Kernel-packages] [Bug 1921452] Re: [SRU] alsa-lib: conf: USB - add "Cmedia Audio" to USB-Audio.pcm.iec958_device

2021-04-27 Thread Shengyao Xue
tested the alsa-lib in groovy-proposed, this issue was fixed. change
verification tag to done.

** Tags removed: verification-needed verification-needed-focal 
verification-needed-groovy
** Tags added: verification-done verification-done-focal 
verification-done-groovy

** Changed in: oem-priority
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to alsa-lib in Ubuntu.
https://bugs.launchpad.net/bugs/1921452

Title:
  [SRU] alsa-lib: conf: USB - add "Cmedia Audio" to USB-
  Audio.pcm.iec958_device

Status in OEM Priority Project:
  Fix Released
Status in alsa-lib package in Ubuntu:
  Fix Released
Status in alsa-lib source package in Focal:
  Fix Committed
Status in alsa-lib source package in Groovy:
  Fix Committed
Status in alsa-lib source package in Hirsute:
  Fix Released

Bug description:
  [Impact]
  On Cmedia Audio, unusable SPDIF can be selected as output from PulseAudio.

  [Fix]
  Disable IEC958 (SPDIF) through ALSA UCM.

  [Test]
  With the UCM applied, `pactl` and audio panel in gnome-control-center no 
longer have SPDIF option.

  [Where problems will occur]
  "Cmedia Audio" is the sound card name of this usb audio dongle, and this 
string is got from usb string descriptor, that is to say the "Cmedia Audio" is 
hard-coded in the firmware of that usb dongle.
  Not all Cmedia usb audio dongle use "Cmedia Audio", most of the dongles don't 
set string descriptor, then the audio driver sets a generic name "USB Audio 
Device" for them, if a dongle has string descriptor, it may have different 
string like "C-Media USB Headphone Set", and all dongles I met before don't 
have SPDIF interface.
  So If this SRU could introduce regression, it will happen on a Cmedia usb 
audio dongle which also hard-codes the "Cmedia Audio" in the string descriptor 
and it has SPDIF interface on it, after this SRU, users couldn't find the SPDIF 
playback device from the gnome-sound-setting. But this regression chance is 
very low since it is very rare a cmedia usb audio dongle uses "Cmedia Audio" in 
the string descriptor and it is very rare a usb audio dongle has SPDIF 
interface. So far we haven't met such a cmedia usb audio dongle.

To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/1921452/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1921452] Re: [SRU] alsa-lib: conf: USB - add "Cmedia Audio" to USB-Audio.pcm.iec958_device

2021-04-27 Thread Shengyao Xue
tested the alsa-lib in focal-proposed, this issue was fixed. change
verification tag to done.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to alsa-lib in Ubuntu.
https://bugs.launchpad.net/bugs/1921452

Title:
  [SRU] alsa-lib: conf: USB - add "Cmedia Audio" to USB-
  Audio.pcm.iec958_device

Status in OEM Priority Project:
  Fix Released
Status in alsa-lib package in Ubuntu:
  Fix Released
Status in alsa-lib source package in Focal:
  Fix Committed
Status in alsa-lib source package in Groovy:
  Fix Committed
Status in alsa-lib source package in Hirsute:
  Fix Released

Bug description:
  [Impact]
  On Cmedia Audio, unusable SPDIF can be selected as output from PulseAudio.

  [Fix]
  Disable IEC958 (SPDIF) through ALSA UCM.

  [Test]
  With the UCM applied, `pactl` and audio panel in gnome-control-center no 
longer have SPDIF option.

  [Where problems will occur]
  "Cmedia Audio" is the sound card name of this usb audio dongle, and this 
string is got from usb string descriptor, that is to say the "Cmedia Audio" is 
hard-coded in the firmware of that usb dongle.
  Not all Cmedia usb audio dongle use "Cmedia Audio", most of the dongles don't 
set string descriptor, then the audio driver sets a generic name "USB Audio 
Device" for them, if a dongle has string descriptor, it may have different 
string like "C-Media USB Headphone Set", and all dongles I met before don't 
have SPDIF interface.
  So If this SRU could introduce regression, it will happen on a Cmedia usb 
audio dongle which also hard-codes the "Cmedia Audio" in the string descriptor 
and it has SPDIF interface on it, after this SRU, users couldn't find the SPDIF 
playback device from the gnome-sound-setting. But this regression chance is 
very low since it is very rare a cmedia usb audio dongle uses "Cmedia Audio" in 
the string descriptor and it is very rare a usb audio dongle has SPDIF 
interface. So far we haven't met such a cmedia usb audio dongle.

To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/1921452/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1925452] Comment bridged from LTC Bugzilla

2021-04-27 Thread bugproxy
--- Comment From alexs...@de.ibm.com 2021-04-27 04:52 EDT---
Verified successfully on focal, ping works fine in switchdev mode.

root@pok1-qz1-sr1-rk011-s21:~# uname -a
Linux pok1-qz1-sr1-rk011-s21 5.4.0-73-generic #82~lp1925452-Ubuntu SMP Mon Apr 
26 15:44:18 UTC 2021 s390x s390x s390x GNU/Linux

root@pok1-qz1-sr1-rk011-s21:~# devlink dev eswitch show pci/0100:00:00.1
pci/0100:00:00.1: mode switchdev inline-mode none encap enable

root@pok1-qz1-sr1-rk011-s21:~# ping -c 5 172.31.22.42
PING 172.31.22.42 (172.31.22.42) 56(84) bytes of data.
64 bytes from 172.31.22.42: icmp_seq=1 ttl=0 time=0.085 ms
64 bytes from 172.31.22.42: icmp_seq=2 ttl=0 time=0.071 ms
64 bytes from 172.31.22.42: icmp_seq=3 ttl=0 time=0.066 ms
64 bytes from 172.31.22.42: icmp_seq=4 ttl=0 time=0.078 ms
64 bytes from 172.31.22.42: icmp_seq=5 ttl=0 time=0.078 ms

--- 172.31.22.42 ping statistics ---
5 packets transmitted, 5 received, 0% packet loss, time 4134ms
rtt min/avg/max/mdev = 0.066/0.075/0.085/0.006 ms

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1925452

Title:
  [Ubuntu 21.04] net/mlx5: Fix HW spec violation configuring uplink

Status in Ubuntu on IBM z Systems:
  In Progress
Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Focal:
  In Progress
Status in linux source package in Groovy:
  In Progress
Status in linux source package in Hirsute:
  In Progress

Bug description:
  SRU Justification:
  ==

  [Impact]

  * In addition to 9c9be85f6b59 "net/mlx5e: Add missing capability check
  for uplink follow" (handled in LP#1921104) another fix 1a73704c82ed
  "Fix HW spec violation configuring uplink" (handled in this bug,
  LP#1925452) is needed to fix issues that were introduced with commit
  7d0314b11cdd "net/mlx5e: Modify uplink state on interface up/down".

  * Commit 1a73704c82ed "Fix HW spec violation configuring uplink" fixes
  a regression for mlx5 adapters required to operate in switchdev mode.

  * This fix makes sure that the uplink port is modified to follow only
  if the uplink_follow capability if it's set as required by the hw
  specification.

  * Failure cause traffic to the uplink representer net device to cease
  after switching to switchdev mode.

  [Fix]

  * upstream fix (upstream with v5.12-rc7)
  1a73704c82ed4ee95532ac04645d02075bd1ce3d 1a73704c82ed "Fix HW spec violation 
configuring uplink"

  * can be cleanly cherry picked from hirsute master-next.

  * a backport for groovy:
  
https://launchpadlibrarian.net/534888680/groovy-0001-net-mlx5-Fix-HW-spec-violation-configuring-uplink.patch

  * a backport for focal:
  
https://launchpadlibrarian.net/534847308/focal-0001-net-mlx5-Fix-HW-spec-violation-configuring-uplink.patch

  [Test Case]

  * Two servers, installed with Ubuntu Server 20.04 or 20.10 are needed.

  * Each server needs to have a Mellanox ConnectX4/5 adapter, attached
  to the same switch

  * Adapters must be running adapter firmware level 16.29.1006 or
  earlier.

  * enable SRIOV and switchdev mode on one adapter:
    echo 0 > /sys/bus/pci/devices/0100\:00\:00.0/sriov_drivers_autoprobe
    echo 0 > /sys/bus/pci/devices/0100\:00\:00.1/sriov_drivers_autoprobe
    echo 64 > /sys/bus/pci/devices/0100\:00\:00.0/sriov_numvfs
    echo 64 > /sys/bus/pci/devices/0100\:00\:00.1/sriov_numvfs
    devlink dev eswitch set pci/0100:00:00.0 mode switchdev
    devlink dev eswitch set pci/0100:00:00.1 mode switchdev

  * Assign an IP address to the physical function device of the adapters
  on both systems

  * IP communication will fail

  * With the fix, IP communication can be established.

  [Regression Potential]

  * There is always at least some potential for regression. In this case
  the new code can go wrong (or might become worse than before) in case
  the new if statement is wrong.

  * It checks for the condition of "MLX5_CAP_GEN(mdev, uplink_follow)"
  and in case MLX5_CAP_GEN is calculated erroneous or mdev is other than
  expected, the mlx5_modify_vport_admin_state call might go wrong, too.

  * But since only the If clause was added, the changes are pretty
  minimal and therefore well traceable.

  [Other]

  * Since the patch/commit is upstream with 5.12-rc7, it will be in Impish.
  __

  With the 5.4.0-48 update for Ubuntu 20.04, the commit

  "net/mlx5e: Modify uplink state on interface up/down"

  was integrated which contains a regression for mlx5 adapters with
  older adapter firmware.

  This is the second bugfix to repair the regression, required to operate the 
adapter in switchdev mode.
  The first part was integrated via Bug 192185 - LP1921104.

  This is the upstream fix required to be backported to Ubuntu 20.04:
  
https://github.com/torvalds/linux/commit/1a73704c82ed4ee95532ac04645d02075bd1ce3d

  ---Additional Hardware Info---
  Mellanox ConnectX network adapter

  ---uname output---
  5.4.0-73-generic

  -

[Kernel-packages] [Bug 1900438] Re: Bcache bypasse writeback on caching device with fragmentation

2021-04-27 Thread dongdong tao
** Tags added: verification-done-bionic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1900438

Title:
  Bcache bypasse writeback on caching device with fragmentation

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Bionic:
  Fix Committed
Status in linux source package in Focal:
  Fix Committed
Status in linux source package in Groovy:
  Fix Committed
Status in linux source package in Hirsute:
  Fix Released

Bug description:
  SRU Justification:

  [Impact]
  This bug in bcache affects I/O performance on all versions of the kernel 
[correct versions affected]. It is particularly negative on ceph if used with 
bcache.

  Write I/O latency would suddenly go to around 1 second from around 10
  ms when hitting this issue and would easily be stuck there for hours
  or even days, especially bad for ceph on bcache architecture. This
  would make ceph extremely slow and make the entire cloud almost
  unusable.

  The root cause is that the dirty bucket had reached the 70 percent
  threshold, thus causing all writes to go direct to the backing HDD
  device. It might be fine if it actually had a lot of dirty data, but
  this happens when dirty data has not even reached over 10 percent, due
  to having high memory fragmentation. What makes it worse is that the
  writeback rate might be still at minimum value (8) due to the
  writeback percent not reached, so it takes ages for bcache to really
  reclaim enough dirty buckets to get itself out of this situation.

  [Fix]

  * 71dda2a5625f31bc3410cb69c3d31376a2b66f28 “bcache: consider the
  fragmentation when update the writeback rate”

  The current way to calculate the writeback rate only considered the dirty 
sectors.
  This usually works fine when memory fragmentation is not high, but it will 
give us an unreasonably low writeback rate when we are in the situation that a 
few dirty sectors have consumed a lot of dirty buckets. In some cases, the 
dirty buckets reached  CUTOFF_WRITEBACK_SYNC (i.e., stopped writeback)  while 
the dirty data (sectors) had not even reached the writeback_percent threshold 
(i.e., started writeback). In that situation, the writeback rate will still be 
the minimum value (8*512 = 4KB/s), thus it will cause all the writes to bestuck 
in a non-writeback mode because of the slow writeback.

  We accelerate the rate in 3 stages with different aggressiveness:
  the first stage starts when dirty buckets percent reach above 
BCH_WRITEBACK_FRAGMENT_THRESHOLD_LOW (50),
  the second is BCH_WRITEBACK_FRAGMENT_THRESHOLD_MID (57),
  the third is BCH_WRITEBACK_FRAGMENT_THRESHOLD_HIGH (64).

  By default the first stage tries to writeback the amount of dirty data
  in one bucket (on average) in (1 / (dirty_buckets_percent - 50)) seconds,
  the second stage tries to writeback the amount of dirty data in one bucket
  in (1 / (dirty_buckets_percent - 57)) * 100 milliseconds, the third
  stage tries to writeback the amount of dirty data in one bucket in
  (1 / (dirty_buckets_percent - 64)) milliseconds.

  The initial rate at each stage can be controlled by 3 configurable
  parameters:

  writeback_rate_fp_term_{low|mid|high}

  They are by default 1, 10, 1000, chosen based on testing and
  production data, detailed below.

  A. When it comes to the low stage, it is still far from the 70%
     threshold, so we only want to give it a little bit push by setting the
     term to 1, it means the initial rate will be 170 if the fragment is 6,
     it is calculated by bucket_size/fragment, this rate is very small,
     but still much more reasonable than the minimum 8.
     For a production bcache with non-heavy workload, if the cache device
     is bigger than 1 TB, it may take hours to consume 1% buckets,
     so it is very possible to reclaim enough dirty buckets in this stage,
     thus to avoid entering the next stage.

  B. If the dirty buckets ratio didn’t turn around during the first stage,
     it comes to the mid stage, then it is necessary for mid stage
     to be more aggressive than low stage, so the initial rate is chosen
     to be 10 times more than the low stage, which means 1700 as the initial
     rate if the fragment is 6. This is a normal rate
     we usually see for a normal workload when writeback happens
     because of writeback_percent.

  C. If the dirty buckets ratio didn't turn around during the low and mid
     stages, it comes to the third stage, and it is the last chance that
     we can turn around to avoid the horrible cutoff writeback sync issue,
     then we choose 100 times more aggressive than the mid stage, that
     means 17 as the initial rate if the fragment is 6. This is also
     inferred from a production bcache, I've got one week's writeback rate
     data from a production bcache which has quite heavy workloads,
     again, the writeback is triggered by the writeback pe

[Kernel-packages] [Bug 1926205] [NEW] graphic interface faulty

2021-04-27 Thread Launchpad Bug Tracker
You have been subscribed to a public bug:

hi,

first, after boot and log-in, the interface elements are slow to
display. the left-screen dock is empty and shows only after some time.
then, I must wait to have access to program (applications) menu
("Activities").

the graphic interface itself become buggy and faulty when using multi-
workspace (dynamic work-spaces displays).

when I launch a program on second workspace screen:
the mouse click stop to have any result (mouse and touchpad)
then, I can not change workspace.
then, programs freezes
I need to reboot the computer to regain any control.

I try 20.04.2.0 LTS on this computer, witch works fine. no any smallest
problem.

Description:Ubuntu 21.04
Release:21.04

ProblemType: Bug
DistroRelease: Ubuntu 21.04
Package: xorg 1:7.7+22ubuntu1
ProcVersionSignature: Ubuntu 5.11.0-16.17-generic 5.11.12
Uname: Linux 5.11.0-16-generic x86_64
ApportVersion: 2.20.11-0ubuntu65
Architecture: amd64
BootLog: Error: [Errno 13] Permission non accordée: '/var/log/boot.log'
CasperMD5CheckResult: pass
CompositorRunning: None
CurrentDesktop: ubuntu:GNOME
Date: Mon Apr 26 22:07:16 2021
DistUpgraded: Fresh install
DistroCodename: hirsute
DistroVariant: ubuntu
ExtraDebuggingInterest: Yes
GraphicsCard:
 Advanced Micro Devices, Inc. [AMD/ATI] Renoir [1002:1636] (rev c3) (prog-if 00 
[VGA controller])
   Subsystem: Hewlett-Packard Company Renoir [103c:876e]
InstallationDate: Installed on 2021-04-25 (1 days ago)
InstallationMedia: Ubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
MachineType: HP HP ENVY x360 Convertible 13-ay0xxx
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.11.0-16-generic 
root=UUID=d493468f-47f4-4515-898b-919d7fdf1949 ro quiet splash vt.handoff=7
SourcePackage: xorg
Symptom: display
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 12/10/2020
dmi.bios.release: 15.16
dmi.bios.vendor: Insyde
dmi.bios.version: F.16
dmi.board.asset.tag: Type2 - Board Asset Tag
dmi.board.name: 876E
dmi.board.vendor: HP
dmi.board.version: 12.43
dmi.chassis.asset.tag: Chassis Asset Tag
dmi.chassis.type: 31
dmi.chassis.vendor: HP
dmi.chassis.version: Chassis Version
dmi.ec.firmware.release: 12.43
dmi.modalias: 
dmi:bvnInsyde:bvrF.16:bd12/10/2020:br15.16:efr12.43:svnHP:pnHPENVYx360Convertible13-ay0xxx:pvrType1ProductConfigId:rvnHP:rn876E:rvr12.43:cvnHP:ct31:cvrChassisVersion:
dmi.product.family: 103C_5335KV HP Envy
dmi.product.name: HP ENVY x360 Convertible 13-ay0xxx
dmi.product.sku: 2U6C7EA#ABZ
dmi.product.version: Type1ProductConfigId
dmi.sys.vendor: HP
version.compiz: compiz N/A
version.libdrm2: libdrm2 2.4.104-1build1
version.libgl1-mesa-dri: libgl1-mesa-dri 21.0.1-2
version.libgl1-mesa-glx: libgl1-mesa-glx N/A
version.xserver-xorg-core: xserver-xorg-core 2:1.20.11-1ubuntu1
version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:19.1.0-2
version.xserver-xorg-video-intel: xserver-xorg-video-intel 
2:2.99.917+git20200714-1ubuntu1
version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 1:1.0.17-1

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug corruption hirsute ubuntu wayland-session
-- 
graphic interface faulty
https://bugs.launchpad.net/bugs/1926205
You received this bug notification because you are a member of Kernel Packages, 
which is subscribed to linux in Ubuntu.

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1926236] Re: Fix The sound has noise while audio volume is maximum

2021-04-27 Thread koba
** Tags added: oem-priority originate-from-1918414 somerville

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1926236

Title:
  Fix The sound has noise while audio volume is maximum

Status in HWE Next:
  New
Status in linux-firmware package in Ubuntu:
  New
Status in linux-firmware source package in Focal:
  In Progress

Bug description:
  [Impact]
  The sound has noise while turning the audio volume to maximum

  [Fix]
  For VEGA & Polaris, need two patches(landed on mainline kernel) to fix and a 
modprobe
  1.(50ceb1fe7a) drm/amd/pm: bug fix for pcie dpm, has landed on oem kernel.
  2.(9d03730ecb) drm/amd/pm: workaround for audio noise issue, has landed on 
oem kernel
  3. #modprobe amdgpu ppfeaturemask=0xfff7bffb.
  For Navi_1x, need smc firmware to fix.
  1. (4fe6e53b96 linux-firmware) amdgpu: update navi10 SMC firmware
  1. (8ab7abaf63 linux-firmware) amdgpu: update navi14 SMC firmware

  [Test]
  Verified on RKL platform with wx3200(Polaris series) and wx5500(Navi series).

  [Where problems could occur]
  Because disabling DPM, the power consumption would be slightly higher.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1926236/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1926205] Re: graphic interface faulty

2021-04-27 Thread Sebastien Bacher
The issue there is more likely due to the amd video driver or the kernel

** Package changed: xorg (Ubuntu) => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926205

Title:
  graphic interface faulty

Status in linux package in Ubuntu:
  New

Bug description:
  hi,

  first, after boot and log-in, the interface elements are slow to
  display. the left-screen dock is empty and shows only after some time.
  then, I must wait to have access to program (applications) menu
  ("Activities").

  the graphic interface itself become buggy and faulty when using multi-
  workspace (dynamic work-spaces displays).

  when I launch a program on second workspace screen:
  the mouse click stop to have any result (mouse and touchpad)
  then, I can not change workspace.
  then, programs freezes
  I need to reboot the computer to regain any control.

  I try 20.04.2.0 LTS on this computer, witch works fine. no any
  smallest problem.

  Description:  Ubuntu 21.04
  Release:  21.04

  ProblemType: Bug
  DistroRelease: Ubuntu 21.04
  Package: xorg 1:7.7+22ubuntu1
  ProcVersionSignature: Ubuntu 5.11.0-16.17-generic 5.11.12
  Uname: Linux 5.11.0-16-generic x86_64
  ApportVersion: 2.20.11-0ubuntu65
  Architecture: amd64
  BootLog: Error: [Errno 13] Permission non accordée: '/var/log/boot.log'
  CasperMD5CheckResult: pass
  CompositorRunning: None
  CurrentDesktop: ubuntu:GNOME
  Date: Mon Apr 26 22:07:16 2021
  DistUpgraded: Fresh install
  DistroCodename: hirsute
  DistroVariant: ubuntu
  ExtraDebuggingInterest: Yes
  GraphicsCard:
   Advanced Micro Devices, Inc. [AMD/ATI] Renoir [1002:1636] (rev c3) (prog-if 
00 [VGA controller])
 Subsystem: Hewlett-Packard Company Renoir [103c:876e]
  InstallationDate: Installed on 2021-04-25 (1 days ago)
  InstallationMedia: Ubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: HP HP ENVY x360 Convertible 13-ay0xxx
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.11.0-16-generic 
root=UUID=d493468f-47f4-4515-898b-919d7fdf1949 ro quiet splash vt.handoff=7
  SourcePackage: xorg
  Symptom: display
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 12/10/2020
  dmi.bios.release: 15.16
  dmi.bios.vendor: Insyde
  dmi.bios.version: F.16
  dmi.board.asset.tag: Type2 - Board Asset Tag
  dmi.board.name: 876E
  dmi.board.vendor: HP
  dmi.board.version: 12.43
  dmi.chassis.asset.tag: Chassis Asset Tag
  dmi.chassis.type: 31
  dmi.chassis.vendor: HP
  dmi.chassis.version: Chassis Version
  dmi.ec.firmware.release: 12.43
  dmi.modalias: 
dmi:bvnInsyde:bvrF.16:bd12/10/2020:br15.16:efr12.43:svnHP:pnHPENVYx360Convertible13-ay0xxx:pvrType1ProductConfigId:rvnHP:rn876E:rvr12.43:cvnHP:ct31:cvrChassisVersion:
  dmi.product.family: 103C_5335KV HP Envy
  dmi.product.name: HP ENVY x360 Convertible 13-ay0xxx
  dmi.product.sku: 2U6C7EA#ABZ
  dmi.product.version: Type1ProductConfigId
  dmi.sys.vendor: HP
  version.compiz: compiz N/A
  version.libdrm2: libdrm2 2.4.104-1build1
  version.libgl1-mesa-dri: libgl1-mesa-dri 21.0.1-2
  version.libgl1-mesa-glx: libgl1-mesa-glx N/A
  version.xserver-xorg-core: xserver-xorg-core 2:1.20.11-1ubuntu1
  version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
  version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:19.1.0-2
  version.xserver-xorg-video-intel: xserver-xorg-video-intel 
2:2.99.917+git20200714-1ubuntu1
  version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 1:1.0.17-1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1926205/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1926081] Re: nr_writeback memory leak in kernel 4.15.0-137+

2021-04-27 Thread Andrew Taylor
apport information

** Tags added: apport-collected

** Description changed:

  
  Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a 
memory leak due to the inclusion of patch from the upstream kernel, but not the 
fix for that patch which was released later.
  
  This issue manifests itself as an increasing amount of memory used by
  the writeback queue, which never returns to zero. This can been seen
  either as the value of `nr_writeback` in /proc/vmstat, or the value of
  `Writeback` in /proc/meminfo.
  
  Ordinarily these values should be at or around zero, but on our servers
  we observe the `nr_writeback` value increasing to over 8 million, (32GB
  of memory), at which point it isn't long before the system IO slows to a
  crawl (tens of Kb/s). Our servers have 256GB of memory, and are
  performing many CI related activities - this issue appears to be related
  to concurrent writing to disk, and can be demonstrated with a simple
  testcase (see later).
  
  On our heavily used systems this memory leak can result in an unstable
  server after 2-3 days, requiring a reboot to fix it.
  
  After much investigation the issue appears to be because the patch "mm:
  memcontrol: fix excessive complexity in memory.stat reporting" was
  brought in to the 4.15.0-137 Ubuntu kernel (see
  https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of "
  Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)",
  however in the mainline kernel there was a follow up patch because this
  initial patch introduced concurrency issues. The patch "mm: memcontrol:
  fix NR_WRITEBACK leak in memcg and system stats" is required, and should
  be brought into the Ubuntu packaged kernel to fix the issues reported.
  
  The required patch is here:
  
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
  and was committed a few weeks after the original (broken) patch:
  
https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da
  
  I have checked the release notes for Ubuntu versions -137 to -143, and
  none include this second patch that should fix the issue. (I checked
  https://people.canonical.com/~kernel/info/kernel-version-map.html for
  all the kernel versions, and then visited each changelog page in turn,
  e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking
  for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system stats").
  
  We do not observe this on the 5.4.0 kernel (supported HWE kernel on
  18.05.5), which includes this second patch. That kernel may also include
  other patches, so we do not know if any other fixes are also required,
  but the one we have linked above seems to definitely be needed, and
  seems to match our symptoms.
  
  Testcase:
  
  The following is enough to permanently increase the value of
  `nr_writeback` on our systems (by about 2000 during most executions):
  
  ```
  date
  grep nr_writeback /proc/vmstat
  mkdir -p /docker/testfiles/{1..5}
  
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/4/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/5/file.% bs=4k count=10 status=none' &
  
  wait $(jobs -p)
  grep nr_writeback /proc/vmstat
  date
  ```
  
  Subsequent iterations of the test raise it further, and on a system
  doing a lot of writing from a lot of different processes, it can rise
  quickly.
  
  System details:
  
  lsb_release -rd
  Description:  Ubuntu 18.04.5 LTS
  Release:  18.04
  
  Affected kernel: 4.15.0-137 onwards (current latest version tried was
  4.15.0-142)
  
  e.g.
  
  apt-cache policy linux-image-4.15.0-141-generic
  linux-image-4.15.0-141-generic:
Installed: 4.15.0-141.145
Candidate: 4.15.0-141.145
Version table:
   *** 4.15.0-141.145 500
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-updates/main amd64 Packages
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-security/main amd64 Packages
  100 /var/lib/dpkg/status
  
  According to https://wiki.ubuntu.com/KernelTeam/KernelTeamBugPolicies I
  should include additional information from the server, but at this stage
  we have upgraded all our affected systems to 5.4.0, and therefore the
  kernel versions do not match those with this issue.
  
  We likely have other servers used in other services that are not as
  heavily loaded that have not been as affected by this issue - and
  therefore and I may be able to get the equivalent diagnostics from there
  after confirming 

[Kernel-packages] [Bug 1926081] CurrentDmesg.txt

2021-04-27 Thread Andrew Taylor
apport information

** Attachment added: "CurrentDmesg.txt"
   
https://bugs.launchpad.net/bugs/1926081/+attachment/5492729/+files/CurrentDmesg.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926081

Title:
  nr_writeback memory leak in kernel 4.15.0-137+

Status in linux package in Ubuntu:
  In Progress

Bug description:
  
  Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a 
memory leak due to the inclusion of patch from the upstream kernel, but not the 
fix for that patch which was released later.

  This issue manifests itself as an increasing amount of memory used by
  the writeback queue, which never returns to zero. This can been seen
  either as the value of `nr_writeback` in /proc/vmstat, or the value of
  `Writeback` in /proc/meminfo.

  Ordinarily these values should be at or around zero, but on our
  servers we observe the `nr_writeback` value increasing to over 8
  million, (32GB of memory), at which point it isn't long before the
  system IO slows to a crawl (tens of Kb/s). Our servers have 256GB of
  memory, and are performing many CI related activities - this issue
  appears to be related to concurrent writing to disk, and can be
  demonstrated with a simple testcase (see later).

  On our heavily used systems this memory leak can result in an unstable
  server after 2-3 days, requiring a reboot to fix it.

  After much investigation the issue appears to be because the patch
  "mm: memcontrol: fix excessive complexity in memory.stat reporting"
  was brought in to the 4.15.0-137 Ubuntu kernel (see
  https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of
  " Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)",
  however in the mainline kernel there was a follow up patch because
  this initial patch introduced concurrency issues. The patch "mm:
  memcontrol: fix NR_WRITEBACK leak in memcg and system stats" is
  required, and should be brought into the Ubuntu packaged kernel to fix
  the issues reported.

  The required patch is here:
  
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
  and was committed a few weeks after the original (broken) patch:
  
https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da

  I have checked the release notes for Ubuntu versions -137 to -143, and
  none include this second patch that should fix the issue. (I checked
  https://people.canonical.com/~kernel/info/kernel-version-map.html for
  all the kernel versions, and then visited each changelog page in turn,
  e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking
  for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system
  stats").

  We do not observe this on the 5.4.0 kernel (supported HWE kernel on
  18.05.5), which includes this second patch. That kernel may also
  include other patches, so we do not know if any other fixes are also
  required, but the one we have linked above seems to definitely be
  needed, and seems to match our symptoms.

  Testcase:

  The following is enough to permanently increase the value of
  `nr_writeback` on our systems (by about 2000 during most executions):

  ```
  date
  grep nr_writeback /proc/vmstat
  mkdir -p /docker/testfiles/{1..5}

  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/4/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/5/file.% bs=4k count=10 status=none' &

  wait $(jobs -p)
  grep nr_writeback /proc/vmstat
  date
  ```

  Subsequent iterations of the test raise it further, and on a system
  doing a lot of writing from a lot of different processes, it can rise
  quickly.

  System details:

  lsb_release -rd
  Description:  Ubuntu 18.04.5 LTS
  Release:  18.04

  Affected kernel: 4.15.0-137 onwards (current latest version tried was
  4.15.0-142)

  e.g.

  apt-cache policy linux-image-4.15.0-141-generic
  linux-image-4.15.0-141-generic:
Installed: 4.15.0-141.145
Candidate: 4.15.0-141.145
Version table:
   *** 4.15.0-141.145 500
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-updates/main amd64 Packages
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-security/main amd64 Packages
  100 /var/lib/dpkg/status

  According to https://wiki.ubuntu.com/KernelTeam/KernelTeamBugPolicies
  I should include additional information from the server, but at this
  stage we have upgraded all our affected

[Kernel-packages] [Bug 1926081] Lspci.txt

2021-04-27 Thread Andrew Taylor
apport information

** Attachment added: "Lspci.txt"
   https://bugs.launchpad.net/bugs/1926081/+attachment/5492730/+files/Lspci.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926081

Title:
  nr_writeback memory leak in kernel 4.15.0-137+

Status in linux package in Ubuntu:
  In Progress

Bug description:
  
  Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a 
memory leak due to the inclusion of patch from the upstream kernel, but not the 
fix for that patch which was released later.

  This issue manifests itself as an increasing amount of memory used by
  the writeback queue, which never returns to zero. This can been seen
  either as the value of `nr_writeback` in /proc/vmstat, or the value of
  `Writeback` in /proc/meminfo.

  Ordinarily these values should be at or around zero, but on our
  servers we observe the `nr_writeback` value increasing to over 8
  million, (32GB of memory), at which point it isn't long before the
  system IO slows to a crawl (tens of Kb/s). Our servers have 256GB of
  memory, and are performing many CI related activities - this issue
  appears to be related to concurrent writing to disk, and can be
  demonstrated with a simple testcase (see later).

  On our heavily used systems this memory leak can result in an unstable
  server after 2-3 days, requiring a reboot to fix it.

  After much investigation the issue appears to be because the patch
  "mm: memcontrol: fix excessive complexity in memory.stat reporting"
  was brought in to the 4.15.0-137 Ubuntu kernel (see
  https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of
  " Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)",
  however in the mainline kernel there was a follow up patch because
  this initial patch introduced concurrency issues. The patch "mm:
  memcontrol: fix NR_WRITEBACK leak in memcg and system stats" is
  required, and should be brought into the Ubuntu packaged kernel to fix
  the issues reported.

  The required patch is here:
  
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
  and was committed a few weeks after the original (broken) patch:
  
https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da

  I have checked the release notes for Ubuntu versions -137 to -143, and
  none include this second patch that should fix the issue. (I checked
  https://people.canonical.com/~kernel/info/kernel-version-map.html for
  all the kernel versions, and then visited each changelog page in turn,
  e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking
  for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system
  stats").

  We do not observe this on the 5.4.0 kernel (supported HWE kernel on
  18.05.5), which includes this second patch. That kernel may also
  include other patches, so we do not know if any other fixes are also
  required, but the one we have linked above seems to definitely be
  needed, and seems to match our symptoms.

  Testcase:

  The following is enough to permanently increase the value of
  `nr_writeback` on our systems (by about 2000 during most executions):

  ```
  date
  grep nr_writeback /proc/vmstat
  mkdir -p /docker/testfiles/{1..5}

  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/4/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/5/file.% bs=4k count=10 status=none' &

  wait $(jobs -p)
  grep nr_writeback /proc/vmstat
  date
  ```

  Subsequent iterations of the test raise it further, and on a system
  doing a lot of writing from a lot of different processes, it can rise
  quickly.

  System details:

  lsb_release -rd
  Description:  Ubuntu 18.04.5 LTS
  Release:  18.04

  Affected kernel: 4.15.0-137 onwards (current latest version tried was
  4.15.0-142)

  e.g.

  apt-cache policy linux-image-4.15.0-141-generic
  linux-image-4.15.0-141-generic:
Installed: 4.15.0-141.145
Candidate: 4.15.0-141.145
Version table:
   *** 4.15.0-141.145 500
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-updates/main amd64 Packages
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-security/main amd64 Packages
  100 /var/lib/dpkg/status

  According to https://wiki.ubuntu.com/KernelTeam/KernelTeamBugPolicies
  I should include additional information from the server, but at this
  stage we have upgraded all our affected systems to 5.4

[Kernel-packages] [Bug 1926081] ProcCpuinfoMinimal.txt

2021-04-27 Thread Andrew Taylor
apport information

** Attachment added: "ProcCpuinfoMinimal.txt"
   
https://bugs.launchpad.net/bugs/1926081/+attachment/5492733/+files/ProcCpuinfoMinimal.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926081

Title:
  nr_writeback memory leak in kernel 4.15.0-137+

Status in linux package in Ubuntu:
  In Progress

Bug description:
  
  Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a 
memory leak due to the inclusion of patch from the upstream kernel, but not the 
fix for that patch which was released later.

  This issue manifests itself as an increasing amount of memory used by
  the writeback queue, which never returns to zero. This can been seen
  either as the value of `nr_writeback` in /proc/vmstat, or the value of
  `Writeback` in /proc/meminfo.

  Ordinarily these values should be at or around zero, but on our
  servers we observe the `nr_writeback` value increasing to over 8
  million, (32GB of memory), at which point it isn't long before the
  system IO slows to a crawl (tens of Kb/s). Our servers have 256GB of
  memory, and are performing many CI related activities - this issue
  appears to be related to concurrent writing to disk, and can be
  demonstrated with a simple testcase (see later).

  On our heavily used systems this memory leak can result in an unstable
  server after 2-3 days, requiring a reboot to fix it.

  After much investigation the issue appears to be because the patch
  "mm: memcontrol: fix excessive complexity in memory.stat reporting"
  was brought in to the 4.15.0-137 Ubuntu kernel (see
  https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of
  " Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)",
  however in the mainline kernel there was a follow up patch because
  this initial patch introduced concurrency issues. The patch "mm:
  memcontrol: fix NR_WRITEBACK leak in memcg and system stats" is
  required, and should be brought into the Ubuntu packaged kernel to fix
  the issues reported.

  The required patch is here:
  
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
  and was committed a few weeks after the original (broken) patch:
  
https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da

  I have checked the release notes for Ubuntu versions -137 to -143, and
  none include this second patch that should fix the issue. (I checked
  https://people.canonical.com/~kernel/info/kernel-version-map.html for
  all the kernel versions, and then visited each changelog page in turn,
  e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking
  for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system
  stats").

  We do not observe this on the 5.4.0 kernel (supported HWE kernel on
  18.05.5), which includes this second patch. That kernel may also
  include other patches, so we do not know if any other fixes are also
  required, but the one we have linked above seems to definitely be
  needed, and seems to match our symptoms.

  Testcase:

  The following is enough to permanently increase the value of
  `nr_writeback` on our systems (by about 2000 during most executions):

  ```
  date
  grep nr_writeback /proc/vmstat
  mkdir -p /docker/testfiles/{1..5}

  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/4/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/5/file.% bs=4k count=10 status=none' &

  wait $(jobs -p)
  grep nr_writeback /proc/vmstat
  date
  ```

  Subsequent iterations of the test raise it further, and on a system
  doing a lot of writing from a lot of different processes, it can rise
  quickly.

  System details:

  lsb_release -rd
  Description:  Ubuntu 18.04.5 LTS
  Release:  18.04

  Affected kernel: 4.15.0-137 onwards (current latest version tried was
  4.15.0-142)

  e.g.

  apt-cache policy linux-image-4.15.0-141-generic
  linux-image-4.15.0-141-generic:
Installed: 4.15.0-141.145
Candidate: 4.15.0-141.145
Version table:
   *** 4.15.0-141.145 500
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-updates/main amd64 Packages
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-security/main amd64 Packages
  100 /var/lib/dpkg/status

  According to https://wiki.ubuntu.com/KernelTeam/KernelTeamBugPolicies
  I should include additional information from the server, but at this
  stage we have upgraded all 

[Kernel-packages] [Bug 1926081] Lsusb.txt

2021-04-27 Thread Andrew Taylor
apport information

** Attachment added: "Lsusb.txt"
   https://bugs.launchpad.net/bugs/1926081/+attachment/5492731/+files/Lsusb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926081

Title:
  nr_writeback memory leak in kernel 4.15.0-137+

Status in linux package in Ubuntu:
  In Progress

Bug description:
  
  Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a 
memory leak due to the inclusion of patch from the upstream kernel, but not the 
fix for that patch which was released later.

  This issue manifests itself as an increasing amount of memory used by
  the writeback queue, which never returns to zero. This can been seen
  either as the value of `nr_writeback` in /proc/vmstat, or the value of
  `Writeback` in /proc/meminfo.

  Ordinarily these values should be at or around zero, but on our
  servers we observe the `nr_writeback` value increasing to over 8
  million, (32GB of memory), at which point it isn't long before the
  system IO slows to a crawl (tens of Kb/s). Our servers have 256GB of
  memory, and are performing many CI related activities - this issue
  appears to be related to concurrent writing to disk, and can be
  demonstrated with a simple testcase (see later).

  On our heavily used systems this memory leak can result in an unstable
  server after 2-3 days, requiring a reboot to fix it.

  After much investigation the issue appears to be because the patch
  "mm: memcontrol: fix excessive complexity in memory.stat reporting"
  was brought in to the 4.15.0-137 Ubuntu kernel (see
  https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of
  " Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)",
  however in the mainline kernel there was a follow up patch because
  this initial patch introduced concurrency issues. The patch "mm:
  memcontrol: fix NR_WRITEBACK leak in memcg and system stats" is
  required, and should be brought into the Ubuntu packaged kernel to fix
  the issues reported.

  The required patch is here:
  
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
  and was committed a few weeks after the original (broken) patch:
  
https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da

  I have checked the release notes for Ubuntu versions -137 to -143, and
  none include this second patch that should fix the issue. (I checked
  https://people.canonical.com/~kernel/info/kernel-version-map.html for
  all the kernel versions, and then visited each changelog page in turn,
  e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking
  for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system
  stats").

  We do not observe this on the 5.4.0 kernel (supported HWE kernel on
  18.05.5), which includes this second patch. That kernel may also
  include other patches, so we do not know if any other fixes are also
  required, but the one we have linked above seems to definitely be
  needed, and seems to match our symptoms.

  Testcase:

  The following is enough to permanently increase the value of
  `nr_writeback` on our systems (by about 2000 during most executions):

  ```
  date
  grep nr_writeback /proc/vmstat
  mkdir -p /docker/testfiles/{1..5}

  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/4/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/5/file.% bs=4k count=10 status=none' &

  wait $(jobs -p)
  grep nr_writeback /proc/vmstat
  date
  ```

  Subsequent iterations of the test raise it further, and on a system
  doing a lot of writing from a lot of different processes, it can rise
  quickly.

  System details:

  lsb_release -rd
  Description:  Ubuntu 18.04.5 LTS
  Release:  18.04

  Affected kernel: 4.15.0-137 onwards (current latest version tried was
  4.15.0-142)

  e.g.

  apt-cache policy linux-image-4.15.0-141-generic
  linux-image-4.15.0-141-generic:
Installed: 4.15.0-141.145
Candidate: 4.15.0-141.145
Version table:
   *** 4.15.0-141.145 500
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-updates/main amd64 Packages
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-security/main amd64 Packages
  100 /var/lib/dpkg/status

  According to https://wiki.ubuntu.com/KernelTeam/KernelTeamBugPolicies
  I should include additional information from the server, but at this
  stage we have upgraded all our affected systems to 5.4

[Kernel-packages] [Bug 1926081] ProcEnviron.txt

2021-04-27 Thread Andrew Taylor
apport information

** Attachment added: "ProcEnviron.txt"
   
https://bugs.launchpad.net/bugs/1926081/+attachment/5492734/+files/ProcEnviron.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926081

Title:
  nr_writeback memory leak in kernel 4.15.0-137+

Status in linux package in Ubuntu:
  In Progress

Bug description:
  
  Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a 
memory leak due to the inclusion of patch from the upstream kernel, but not the 
fix for that patch which was released later.

  This issue manifests itself as an increasing amount of memory used by
  the writeback queue, which never returns to zero. This can been seen
  either as the value of `nr_writeback` in /proc/vmstat, or the value of
  `Writeback` in /proc/meminfo.

  Ordinarily these values should be at or around zero, but on our
  servers we observe the `nr_writeback` value increasing to over 8
  million, (32GB of memory), at which point it isn't long before the
  system IO slows to a crawl (tens of Kb/s). Our servers have 256GB of
  memory, and are performing many CI related activities - this issue
  appears to be related to concurrent writing to disk, and can be
  demonstrated with a simple testcase (see later).

  On our heavily used systems this memory leak can result in an unstable
  server after 2-3 days, requiring a reboot to fix it.

  After much investigation the issue appears to be because the patch
  "mm: memcontrol: fix excessive complexity in memory.stat reporting"
  was brought in to the 4.15.0-137 Ubuntu kernel (see
  https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of
  " Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)",
  however in the mainline kernel there was a follow up patch because
  this initial patch introduced concurrency issues. The patch "mm:
  memcontrol: fix NR_WRITEBACK leak in memcg and system stats" is
  required, and should be brought into the Ubuntu packaged kernel to fix
  the issues reported.

  The required patch is here:
  
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
  and was committed a few weeks after the original (broken) patch:
  
https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da

  I have checked the release notes for Ubuntu versions -137 to -143, and
  none include this second patch that should fix the issue. (I checked
  https://people.canonical.com/~kernel/info/kernel-version-map.html for
  all the kernel versions, and then visited each changelog page in turn,
  e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking
  for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system
  stats").

  We do not observe this on the 5.4.0 kernel (supported HWE kernel on
  18.05.5), which includes this second patch. That kernel may also
  include other patches, so we do not know if any other fixes are also
  required, but the one we have linked above seems to definitely be
  needed, and seems to match our symptoms.

  Testcase:

  The following is enough to permanently increase the value of
  `nr_writeback` on our systems (by about 2000 during most executions):

  ```
  date
  grep nr_writeback /proc/vmstat
  mkdir -p /docker/testfiles/{1..5}

  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/4/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/5/file.% bs=4k count=10 status=none' &

  wait $(jobs -p)
  grep nr_writeback /proc/vmstat
  date
  ```

  Subsequent iterations of the test raise it further, and on a system
  doing a lot of writing from a lot of different processes, it can rise
  quickly.

  System details:

  lsb_release -rd
  Description:  Ubuntu 18.04.5 LTS
  Release:  18.04

  Affected kernel: 4.15.0-137 onwards (current latest version tried was
  4.15.0-142)

  e.g.

  apt-cache policy linux-image-4.15.0-141-generic
  linux-image-4.15.0-141-generic:
Installed: 4.15.0-141.145
Candidate: 4.15.0-141.145
Version table:
   *** 4.15.0-141.145 500
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-updates/main amd64 Packages
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-security/main amd64 Packages
  100 /var/lib/dpkg/status

  According to https://wiki.ubuntu.com/KernelTeam/KernelTeamBugPolicies
  I should include additional information from the server, but at this
  stage we have upgraded all our affected s

[Kernel-packages] [Bug 1926081] ProcInterrupts.txt

2021-04-27 Thread Andrew Taylor
apport information

** Attachment added: "ProcInterrupts.txt"
   
https://bugs.launchpad.net/bugs/1926081/+attachment/5492735/+files/ProcInterrupts.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926081

Title:
  nr_writeback memory leak in kernel 4.15.0-137+

Status in linux package in Ubuntu:
  In Progress

Bug description:
  
  Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a 
memory leak due to the inclusion of patch from the upstream kernel, but not the 
fix for that patch which was released later.

  This issue manifests itself as an increasing amount of memory used by
  the writeback queue, which never returns to zero. This can been seen
  either as the value of `nr_writeback` in /proc/vmstat, or the value of
  `Writeback` in /proc/meminfo.

  Ordinarily these values should be at or around zero, but on our
  servers we observe the `nr_writeback` value increasing to over 8
  million, (32GB of memory), at which point it isn't long before the
  system IO slows to a crawl (tens of Kb/s). Our servers have 256GB of
  memory, and are performing many CI related activities - this issue
  appears to be related to concurrent writing to disk, and can be
  demonstrated with a simple testcase (see later).

  On our heavily used systems this memory leak can result in an unstable
  server after 2-3 days, requiring a reboot to fix it.

  After much investigation the issue appears to be because the patch
  "mm: memcontrol: fix excessive complexity in memory.stat reporting"
  was brought in to the 4.15.0-137 Ubuntu kernel (see
  https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of
  " Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)",
  however in the mainline kernel there was a follow up patch because
  this initial patch introduced concurrency issues. The patch "mm:
  memcontrol: fix NR_WRITEBACK leak in memcg and system stats" is
  required, and should be brought into the Ubuntu packaged kernel to fix
  the issues reported.

  The required patch is here:
  
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
  and was committed a few weeks after the original (broken) patch:
  
https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da

  I have checked the release notes for Ubuntu versions -137 to -143, and
  none include this second patch that should fix the issue. (I checked
  https://people.canonical.com/~kernel/info/kernel-version-map.html for
  all the kernel versions, and then visited each changelog page in turn,
  e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking
  for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system
  stats").

  We do not observe this on the 5.4.0 kernel (supported HWE kernel on
  18.05.5), which includes this second patch. That kernel may also
  include other patches, so we do not know if any other fixes are also
  required, but the one we have linked above seems to definitely be
  needed, and seems to match our symptoms.

  Testcase:

  The following is enough to permanently increase the value of
  `nr_writeback` on our systems (by about 2000 during most executions):

  ```
  date
  grep nr_writeback /proc/vmstat
  mkdir -p /docker/testfiles/{1..5}

  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/4/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/5/file.% bs=4k count=10 status=none' &

  wait $(jobs -p)
  grep nr_writeback /proc/vmstat
  date
  ```

  Subsequent iterations of the test raise it further, and on a system
  doing a lot of writing from a lot of different processes, it can rise
  quickly.

  System details:

  lsb_release -rd
  Description:  Ubuntu 18.04.5 LTS
  Release:  18.04

  Affected kernel: 4.15.0-137 onwards (current latest version tried was
  4.15.0-142)

  e.g.

  apt-cache policy linux-image-4.15.0-141-generic
  linux-image-4.15.0-141-generic:
Installed: 4.15.0-141.145
Candidate: 4.15.0-141.145
Version table:
   *** 4.15.0-141.145 500
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-updates/main amd64 Packages
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-security/main amd64 Packages
  100 /var/lib/dpkg/status

  According to https://wiki.ubuntu.com/KernelTeam/KernelTeamBugPolicies
  I should include additional information from the server, but at this
  stage we have upgraded all our affe

[Kernel-packages] [Bug 1926081] UdevDb.txt

2021-04-27 Thread Andrew Taylor
apport information

** Attachment added: "UdevDb.txt"
   https://bugs.launchpad.net/bugs/1926081/+attachment/5492737/+files/UdevDb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926081

Title:
  nr_writeback memory leak in kernel 4.15.0-137+

Status in linux package in Ubuntu:
  In Progress

Bug description:
  
  Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a 
memory leak due to the inclusion of patch from the upstream kernel, but not the 
fix for that patch which was released later.

  This issue manifests itself as an increasing amount of memory used by
  the writeback queue, which never returns to zero. This can been seen
  either as the value of `nr_writeback` in /proc/vmstat, or the value of
  `Writeback` in /proc/meminfo.

  Ordinarily these values should be at or around zero, but on our
  servers we observe the `nr_writeback` value increasing to over 8
  million, (32GB of memory), at which point it isn't long before the
  system IO slows to a crawl (tens of Kb/s). Our servers have 256GB of
  memory, and are performing many CI related activities - this issue
  appears to be related to concurrent writing to disk, and can be
  demonstrated with a simple testcase (see later).

  On our heavily used systems this memory leak can result in an unstable
  server after 2-3 days, requiring a reboot to fix it.

  After much investigation the issue appears to be because the patch
  "mm: memcontrol: fix excessive complexity in memory.stat reporting"
  was brought in to the 4.15.0-137 Ubuntu kernel (see
  https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of
  " Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)",
  however in the mainline kernel there was a follow up patch because
  this initial patch introduced concurrency issues. The patch "mm:
  memcontrol: fix NR_WRITEBACK leak in memcg and system stats" is
  required, and should be brought into the Ubuntu packaged kernel to fix
  the issues reported.

  The required patch is here:
  
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
  and was committed a few weeks after the original (broken) patch:
  
https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da

  I have checked the release notes for Ubuntu versions -137 to -143, and
  none include this second patch that should fix the issue. (I checked
  https://people.canonical.com/~kernel/info/kernel-version-map.html for
  all the kernel versions, and then visited each changelog page in turn,
  e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking
  for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system
  stats").

  We do not observe this on the 5.4.0 kernel (supported HWE kernel on
  18.05.5), which includes this second patch. That kernel may also
  include other patches, so we do not know if any other fixes are also
  required, but the one we have linked above seems to definitely be
  needed, and seems to match our symptoms.

  Testcase:

  The following is enough to permanently increase the value of
  `nr_writeback` on our systems (by about 2000 during most executions):

  ```
  date
  grep nr_writeback /proc/vmstat
  mkdir -p /docker/testfiles/{1..5}

  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/4/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/5/file.% bs=4k count=10 status=none' &

  wait $(jobs -p)
  grep nr_writeback /proc/vmstat
  date
  ```

  Subsequent iterations of the test raise it further, and on a system
  doing a lot of writing from a lot of different processes, it can rise
  quickly.

  System details:

  lsb_release -rd
  Description:  Ubuntu 18.04.5 LTS
  Release:  18.04

  Affected kernel: 4.15.0-137 onwards (current latest version tried was
  4.15.0-142)

  e.g.

  apt-cache policy linux-image-4.15.0-141-generic
  linux-image-4.15.0-141-generic:
Installed: 4.15.0-141.145
Candidate: 4.15.0-141.145
Version table:
   *** 4.15.0-141.145 500
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-updates/main amd64 Packages
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-security/main amd64 Packages
  100 /var/lib/dpkg/status

  According to https://wiki.ubuntu.com/KernelTeam/KernelTeamBugPolicies
  I should include additional information from the server, but at this
  stage we have upgraded all our affected systems to 5

[Kernel-packages] [Bug 1926081] ProcModules.txt

2021-04-27 Thread Andrew Taylor
apport information

** Attachment added: "ProcModules.txt"
   
https://bugs.launchpad.net/bugs/1926081/+attachment/5492736/+files/ProcModules.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926081

Title:
  nr_writeback memory leak in kernel 4.15.0-137+

Status in linux package in Ubuntu:
  In Progress

Bug description:
  
  Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a 
memory leak due to the inclusion of patch from the upstream kernel, but not the 
fix for that patch which was released later.

  This issue manifests itself as an increasing amount of memory used by
  the writeback queue, which never returns to zero. This can been seen
  either as the value of `nr_writeback` in /proc/vmstat, or the value of
  `Writeback` in /proc/meminfo.

  Ordinarily these values should be at or around zero, but on our
  servers we observe the `nr_writeback` value increasing to over 8
  million, (32GB of memory), at which point it isn't long before the
  system IO slows to a crawl (tens of Kb/s). Our servers have 256GB of
  memory, and are performing many CI related activities - this issue
  appears to be related to concurrent writing to disk, and can be
  demonstrated with a simple testcase (see later).

  On our heavily used systems this memory leak can result in an unstable
  server after 2-3 days, requiring a reboot to fix it.

  After much investigation the issue appears to be because the patch
  "mm: memcontrol: fix excessive complexity in memory.stat reporting"
  was brought in to the 4.15.0-137 Ubuntu kernel (see
  https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of
  " Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)",
  however in the mainline kernel there was a follow up patch because
  this initial patch introduced concurrency issues. The patch "mm:
  memcontrol: fix NR_WRITEBACK leak in memcg and system stats" is
  required, and should be brought into the Ubuntu packaged kernel to fix
  the issues reported.

  The required patch is here:
  
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
  and was committed a few weeks after the original (broken) patch:
  
https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da

  I have checked the release notes for Ubuntu versions -137 to -143, and
  none include this second patch that should fix the issue. (I checked
  https://people.canonical.com/~kernel/info/kernel-version-map.html for
  all the kernel versions, and then visited each changelog page in turn,
  e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking
  for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system
  stats").

  We do not observe this on the 5.4.0 kernel (supported HWE kernel on
  18.05.5), which includes this second patch. That kernel may also
  include other patches, so we do not know if any other fixes are also
  required, but the one we have linked above seems to definitely be
  needed, and seems to match our symptoms.

  Testcase:

  The following is enough to permanently increase the value of
  `nr_writeback` on our systems (by about 2000 during most executions):

  ```
  date
  grep nr_writeback /proc/vmstat
  mkdir -p /docker/testfiles/{1..5}

  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/4/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/5/file.% bs=4k count=10 status=none' &

  wait $(jobs -p)
  grep nr_writeback /proc/vmstat
  date
  ```

  Subsequent iterations of the test raise it further, and on a system
  doing a lot of writing from a lot of different processes, it can rise
  quickly.

  System details:

  lsb_release -rd
  Description:  Ubuntu 18.04.5 LTS
  Release:  18.04

  Affected kernel: 4.15.0-137 onwards (current latest version tried was
  4.15.0-142)

  e.g.

  apt-cache policy linux-image-4.15.0-141-generic
  linux-image-4.15.0-141-generic:
Installed: 4.15.0-141.145
Candidate: 4.15.0-141.145
Version table:
   *** 4.15.0-141.145 500
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-updates/main amd64 Packages
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-security/main amd64 Packages
  100 /var/lib/dpkg/status

  According to https://wiki.ubuntu.com/KernelTeam/KernelTeamBugPolicies
  I should include additional information from the server, but at this
  stage we have upgraded all our affected s

[Kernel-packages] [Bug 1926081] Re: nr_writeback memory leak in kernel 4.15.0-137+

2021-04-27 Thread Andrew Taylor
Guilherme, thank you for your kind words :)

I have been trying to reproduce this bug on several other systems that I
have access to in our cloud account, but I have been unable to reproduce
it on a VM (either with SAN or local SSD storage). The main set of
servers where this has been seen by us are bare-metal servers with a
RAID card backed by SSDs - it's possible that a combination of the
resources available on the machine (CPU, RAM, disk IO) cause this bug to
be more reproducible with my basic testcase.

I have taken a server out of production and rebooted it into the 4.15
kernel (4.15.0-141-generic) where the issue is able to be seen.

I confirmed my testcase still reproduces the issue here, and it does -
nr_writeback is currently stuck at 2641 after one iteration.

I have supplied the apport collected information from that server, which
is now attached to this issue.


This is my first bug report on Launchpad, so I am as yet unfamiliar with the 
process of testing the potential patches I need. Are you suggesting that I 
follow the process to rebuild the kernel 
(https://wiki.ubuntu.com/Kernel/BuildYourOwnKernel) including the patches you 
have mentioned?

Assuming that is the correct course of action I'll attempt to follow the
instructions and do that, and report back.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926081

Title:
  nr_writeback memory leak in kernel 4.15.0-137+

Status in linux package in Ubuntu:
  In Progress

Bug description:
  
  Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a 
memory leak due to the inclusion of patch from the upstream kernel, but not the 
fix for that patch which was released later.

  This issue manifests itself as an increasing amount of memory used by
  the writeback queue, which never returns to zero. This can been seen
  either as the value of `nr_writeback` in /proc/vmstat, or the value of
  `Writeback` in /proc/meminfo.

  Ordinarily these values should be at or around zero, but on our
  servers we observe the `nr_writeback` value increasing to over 8
  million, (32GB of memory), at which point it isn't long before the
  system IO slows to a crawl (tens of Kb/s). Our servers have 256GB of
  memory, and are performing many CI related activities - this issue
  appears to be related to concurrent writing to disk, and can be
  demonstrated with a simple testcase (see later).

  On our heavily used systems this memory leak can result in an unstable
  server after 2-3 days, requiring a reboot to fix it.

  After much investigation the issue appears to be because the patch
  "mm: memcontrol: fix excessive complexity in memory.stat reporting"
  was brought in to the 4.15.0-137 Ubuntu kernel (see
  https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of
  " Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)",
  however in the mainline kernel there was a follow up patch because
  this initial patch introduced concurrency issues. The patch "mm:
  memcontrol: fix NR_WRITEBACK leak in memcg and system stats" is
  required, and should be brought into the Ubuntu packaged kernel to fix
  the issues reported.

  The required patch is here:
  
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
  and was committed a few weeks after the original (broken) patch:
  
https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da

  I have checked the release notes for Ubuntu versions -137 to -143, and
  none include this second patch that should fix the issue. (I checked
  https://people.canonical.com/~kernel/info/kernel-version-map.html for
  all the kernel versions, and then visited each changelog page in turn,
  e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking
  for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system
  stats").

  We do not observe this on the 5.4.0 kernel (supported HWE kernel on
  18.05.5), which includes this second patch. That kernel may also
  include other patches, so we do not know if any other fixes are also
  required, but the one we have linked above seems to definitely be
  needed, and seems to match our symptoms.

  Testcase:

  The following is enough to permanently increase the value of
  `nr_writeback` on our systems (by about 2000 during most executions):

  ```
  date
  grep nr_writeback /proc/vmstat
  mkdir -p /docker/testfiles/{1..5}

  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/4/file.% bs=4k count=10 sta

[Kernel-packages] [Bug 1925421] Re: arm64 support

2021-04-27 Thread Kleber Sacilotto de Souza
** Also affects: linux-oracle (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: linux-oracle (Ubuntu Focal)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oracle in Ubuntu.
https://bugs.launchpad.net/bugs/1925421

Title:
  arm64 support

Status in linux-oracle package in Ubuntu:
  In Progress
Status in linux-oracle source package in Focal:
  In Progress

Bug description:
  See
  https://canonical.lightning.force.com/lightning/r/Case/5003z2BzFG4AAN/view
  for more info

  
  [Impact]
  No support for arm64 currently

  
  [Fix]
  Add arm64 support, including hardware support patches

  [Test]
  Confirm that it boots on desired arm64 hardware, as well as VMs

  [Regression Potential]
  This was never working on arm64 so there should be no risk of regression.
  The requested changes included some refactorings of early memory 
initialization code (all arches) so this presents a small risk. The changes 
were tested on arm64 as well amd64.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oracle/+bug/1925421/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1926205] Status changed to Confirmed

2021-04-27 Thread Ubuntu Kernel Bot
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926205

Title:
  graphic interface faulty

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  hi,

  first, after boot and log-in, the interface elements are slow to
  display. the left-screen dock is empty and shows only after some time.
  then, I must wait to have access to program (applications) menu
  ("Activities").

  the graphic interface itself become buggy and faulty when using multi-
  workspace (dynamic work-spaces displays).

  when I launch a program on second workspace screen:
  the mouse click stop to have any result (mouse and touchpad)
  then, I can not change workspace.
  then, programs freezes
  I need to reboot the computer to regain any control.

  I try 20.04.2.0 LTS on this computer, witch works fine. no any
  smallest problem.

  Description:  Ubuntu 21.04
  Release:  21.04

  ProblemType: Bug
  DistroRelease: Ubuntu 21.04
  Package: xorg 1:7.7+22ubuntu1
  ProcVersionSignature: Ubuntu 5.11.0-16.17-generic 5.11.12
  Uname: Linux 5.11.0-16-generic x86_64
  ApportVersion: 2.20.11-0ubuntu65
  Architecture: amd64
  BootLog: Error: [Errno 13] Permission non accordée: '/var/log/boot.log'
  CasperMD5CheckResult: pass
  CompositorRunning: None
  CurrentDesktop: ubuntu:GNOME
  Date: Mon Apr 26 22:07:16 2021
  DistUpgraded: Fresh install
  DistroCodename: hirsute
  DistroVariant: ubuntu
  ExtraDebuggingInterest: Yes
  GraphicsCard:
   Advanced Micro Devices, Inc. [AMD/ATI] Renoir [1002:1636] (rev c3) (prog-if 
00 [VGA controller])
 Subsystem: Hewlett-Packard Company Renoir [103c:876e]
  InstallationDate: Installed on 2021-04-25 (1 days ago)
  InstallationMedia: Ubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: HP HP ENVY x360 Convertible 13-ay0xxx
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.11.0-16-generic 
root=UUID=d493468f-47f4-4515-898b-919d7fdf1949 ro quiet splash vt.handoff=7
  SourcePackage: xorg
  Symptom: display
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 12/10/2020
  dmi.bios.release: 15.16
  dmi.bios.vendor: Insyde
  dmi.bios.version: F.16
  dmi.board.asset.tag: Type2 - Board Asset Tag
  dmi.board.name: 876E
  dmi.board.vendor: HP
  dmi.board.version: 12.43
  dmi.chassis.asset.tag: Chassis Asset Tag
  dmi.chassis.type: 31
  dmi.chassis.vendor: HP
  dmi.chassis.version: Chassis Version
  dmi.ec.firmware.release: 12.43
  dmi.modalias: 
dmi:bvnInsyde:bvrF.16:bd12/10/2020:br15.16:efr12.43:svnHP:pnHPENVYx360Convertible13-ay0xxx:pvrType1ProductConfigId:rvnHP:rn876E:rvr12.43:cvnHP:ct31:cvrChassisVersion:
  dmi.product.family: 103C_5335KV HP Envy
  dmi.product.name: HP ENVY x360 Convertible 13-ay0xxx
  dmi.product.sku: 2U6C7EA#ABZ
  dmi.product.version: Type1ProductConfigId
  dmi.sys.vendor: HP
  version.compiz: compiz N/A
  version.libdrm2: libdrm2 2.4.104-1build1
  version.libgl1-mesa-dri: libgl1-mesa-dri 21.0.1-2
  version.libgl1-mesa-glx: libgl1-mesa-glx N/A
  version.xserver-xorg-core: xserver-xorg-core 2:1.20.11-1ubuntu1
  version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
  version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:19.1.0-2
  version.xserver-xorg-video-intel: xserver-xorg-video-intel 
2:2.99.917+git20200714-1ubuntu1
  version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 1:1.0.17-1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1926205/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1926284] [NEW] `zfs send`dry-run estimation (`-n`) (perhaps more) broken

2021-04-27 Thread Christopher J. Ruwe
Public bug reported:

Calling `zfs send -v` is used for size estimation, it is expected to
return (called on focal here)

```bash
[cjr@hoare:/home/cjr]
$ zfs send -n -v 
stank/backup/mccarthy/rpool/USERDATA/<...>@zrepl-20210426_094232_000 
full send of 
stank/backup/mccarthy/rpool/USERDATA/<...>@zrepl-20210426_094232_000 estimated 
size is 126G
total estimated size is 126G
```

On hirsute, this feature is broken and returns
```bash
[cjr@mccarthy:/home/cjr]
$ /usr/sbin/zfs send -n -v rpool/USERDATA/<...>@zrepl-20210427_103846_000
warning: cannot send 'rpool/USERDATA/<...>@zrepl-20210427_103846_000': Unknown 
error 103
```

which breaks my backup. Considering that it worked fine with focal and
groovy, I suspect the upgraded zfs packages to be at fault (although I
am not sure which of these).

Thanks for your consideration.

** Affects: zfs-linux (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926284

Title:
  `zfs send`dry-run estimation (`-n`) (perhaps more) broken

Status in zfs-linux package in Ubuntu:
  New

Bug description:
  Calling `zfs send -v` is used for size estimation, it is expected to
  return (called on focal here)

  ```bash
  [cjr@hoare:/home/cjr]
  $ zfs send -n -v 
stank/backup/mccarthy/rpool/USERDATA/<...>@zrepl-20210426_094232_000 
  full send of 
stank/backup/mccarthy/rpool/USERDATA/<...>@zrepl-20210426_094232_000 estimated 
size is 126G
  total estimated size is 126G
  ```

  On hirsute, this feature is broken and returns
  ```bash
  [cjr@mccarthy:/home/cjr]
  $ /usr/sbin/zfs send -n -v rpool/USERDATA/<...>@zrepl-20210427_103846_000
  warning: cannot send 'rpool/USERDATA/<...>@zrepl-20210427_103846_000': 
Unknown error 103
  ```

  which breaks my backup. Considering that it worked fine with focal and
  groovy, I suspect the upgraded zfs packages to be at fault (although I
  am not sure which of these).

  Thanks for your consideration.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1926284/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1925452] Re: [Ubuntu 21.04] net/mlx5: Fix HW spec violation configuring uplink

2021-04-27 Thread Frank Heimes
Great - thx Alexander.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1925452

Title:
  [Ubuntu 21.04] net/mlx5: Fix HW spec violation configuring uplink

Status in Ubuntu on IBM z Systems:
  In Progress
Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Focal:
  In Progress
Status in linux source package in Groovy:
  In Progress
Status in linux source package in Hirsute:
  In Progress

Bug description:
  SRU Justification:
  ==

  [Impact]

  * In addition to 9c9be85f6b59 "net/mlx5e: Add missing capability check
  for uplink follow" (handled in LP#1921104) another fix 1a73704c82ed
  "Fix HW spec violation configuring uplink" (handled in this bug,
  LP#1925452) is needed to fix issues that were introduced with commit
  7d0314b11cdd "net/mlx5e: Modify uplink state on interface up/down".

  * Commit 1a73704c82ed "Fix HW spec violation configuring uplink" fixes
  a regression for mlx5 adapters required to operate in switchdev mode.

  * This fix makes sure that the uplink port is modified to follow only
  if the uplink_follow capability if it's set as required by the hw
  specification.

  * Failure cause traffic to the uplink representer net device to cease
  after switching to switchdev mode.

  [Fix]

  * upstream fix (upstream with v5.12-rc7)
  1a73704c82ed4ee95532ac04645d02075bd1ce3d 1a73704c82ed "Fix HW spec violation 
configuring uplink"

  * can be cleanly cherry picked from hirsute master-next.

  * a backport for groovy:
  
https://launchpadlibrarian.net/534888680/groovy-0001-net-mlx5-Fix-HW-spec-violation-configuring-uplink.patch

  * a backport for focal:
  
https://launchpadlibrarian.net/534847308/focal-0001-net-mlx5-Fix-HW-spec-violation-configuring-uplink.patch

  [Test Case]

  * Two servers, installed with Ubuntu Server 20.04 or 20.10 are needed.

  * Each server needs to have a Mellanox ConnectX4/5 adapter, attached
  to the same switch

  * Adapters must be running adapter firmware level 16.29.1006 or
  earlier.

  * enable SRIOV and switchdev mode on one adapter:
    echo 0 > /sys/bus/pci/devices/0100\:00\:00.0/sriov_drivers_autoprobe
    echo 0 > /sys/bus/pci/devices/0100\:00\:00.1/sriov_drivers_autoprobe
    echo 64 > /sys/bus/pci/devices/0100\:00\:00.0/sriov_numvfs
    echo 64 > /sys/bus/pci/devices/0100\:00\:00.1/sriov_numvfs
    devlink dev eswitch set pci/0100:00:00.0 mode switchdev
    devlink dev eswitch set pci/0100:00:00.1 mode switchdev

  * Assign an IP address to the physical function device of the adapters
  on both systems

  * IP communication will fail

  * With the fix, IP communication can be established.

  [Regression Potential]

  * There is always at least some potential for regression. In this case
  the new code can go wrong (or might become worse than before) in case
  the new if statement is wrong.

  * It checks for the condition of "MLX5_CAP_GEN(mdev, uplink_follow)"
  and in case MLX5_CAP_GEN is calculated erroneous or mdev is other than
  expected, the mlx5_modify_vport_admin_state call might go wrong, too.

  * But since only the If clause was added, the changes are pretty
  minimal and therefore well traceable.

  [Other]

  * Since the patch/commit is upstream with 5.12-rc7, it will be in Impish.
  __

  With the 5.4.0-48 update for Ubuntu 20.04, the commit

  "net/mlx5e: Modify uplink state on interface up/down"

  was integrated which contains a regression for mlx5 adapters with
  older adapter firmware.

  This is the second bugfix to repair the regression, required to operate the 
adapter in switchdev mode.
  The first part was integrated via Bug 192185 - LP1921104.

  This is the upstream fix required to be backported to Ubuntu 20.04:
  
https://github.com/torvalds/linux/commit/1a73704c82ed4ee95532ac04645d02075bd1ce3d

  ---Additional Hardware Info---
  Mellanox ConnectX network adapter

  ---uname output---
  5.4.0-73-generic

  ---Steps to Reproduce---
   enable switchdev mode
  try to ping external host

  Backports need to be provide for 21.04, 20.10 and 20.04 (if not
  cleanly applyable)!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1925452/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1878389] Re: tpci from kernel_misc in ubuntu_ltp failed with Test-case '13'

2021-04-27 Thread Krzysztof Kozlowski
8.  04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 1 TPASS : PCI bus 
00 slot 09 : Test-case '1'
89. 04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 2 TPASS : PCI bus 
00 slot 09 : Test-case '2'
90. 04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 3 TPASS : PCI bus 
00 slot 09 : Test-case '3'
91. 04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 4 TPASS : PCI bus 
00 slot 09 : Test-case '4'
92. 04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 5 TPASS : PCI bus 
00 slot 09 : Test-case '5'
93. 04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 6 TPASS : PCI bus 
00 slot 09 : Test-case '6'
94. 04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 7 TPASS : PCI bus 
00 slot 09 : Test-case '7'
95. 04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 8 TPASS : PCI bus 
00 slot 09 : Test-case '8'
96. 04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 9 TPASS : PCI bus 
00 slot 09 : Test-case '9'
97. 04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 10 TPASS : PCI bus 
00 slot 09 : Test-case '10'
98. 04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 11 TPASS : PCI bus 
00 slot 09 : Test-case '11'
99. 04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 12 TPASS : PCI bus 
00 slot 09 : Test-case '12'
100.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 13 TPASS : PCI bus 
00 slot 09 : Test-case '13'
101.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 14 TPASS : PCI bus 
00 slot 09 : Test-case '14'
102.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 15 TPASS : PCI bus 
00 slot 09 : Test-case '15'
103.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 16 TCONF : 
tpci.c:73: PCI bus 00 slot 09 : Test-case '16'
104.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 17 TPASS : PCI bus 
00 slot 18 : Test-case '1'
105.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 18 TPASS : PCI bus 
00 slot 18 : Test-case '2'
106.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 19 TPASS : PCI bus 
00 slot 18 : Test-case '3'
107.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 20 TPASS : PCI bus 
00 slot 18 : Test-case '4'
108.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 21 TPASS : PCI bus 
00 slot 18 : Test-case '5'
109.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 22 TPASS : PCI bus 
00 slot 18 : Test-case '6'
110.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 23 TPASS : PCI bus 
00 slot 18 : Test-case '7'
111.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 24 TPASS : PCI bus 
00 slot 18 : Test-case '8'
112.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 25 TPASS : PCI bus 
00 slot 18 : Test-case '9'
113.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 26 TPASS : PCI bus 
00 slot 18 : Test-case '10'
114.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 27 TPASS : PCI bus 
00 slot 18 : Test-case '11'
115.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 28 TFAIL : 
tpci.c:73: PCI bus 00 slot 18 : Test-case '12'
116.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 29 TPASS : PCI bus 
00 slot 18 : Test-case '13'
117.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 30 TPASS : PCI bus 
00 slot 18 : Test-case '14'
118.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 31 TPASS : PCI bus 
00 slot 18 : Test-case '15'
119.04/24 01:05:45 DEBUG| utils:0153| [stdout] test_pci 32 TCONF : 
tpci.c:73: PCI bus 00 slot 18 : Test-case '16'
120.04/24 01:05:45 DEBUG| utils:0153| [stdout] tag=tpci stime=1619224849 
dur=1 exit=exited stat=33 core=no cu=16 cs=57

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1878389

Title:
  tpci from kernel_misc in ubuntu_ltp failed with Test-case '13'

Status in ubuntu-kernel-tests:
  Triaged
Status in linux package in Ubuntu:
  Confirmed

Bug description:
  With bug 1868707 fixed, the tpci test can finish now, and it's reporting 
another issue here:
     test_pci  489  TFAIL  :  tpci.c:73: PCI bus 01 slot 01 : Test-case '13'

  Please find attachment for dmesg log and the full test log.

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.4.0-29-generic 5.4.0-29.33
  ProcVersionSignature: User Name 5.4.0-29.33-generic 5.4.30
  Uname: Linux 5.4.0-29-generic x86_64
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 May 13 10:08 seq
   crw-rw 1 root audio 116, 33 May 13 10:08 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay'
  ApportVersion: 2.20.11-0ubuntu27
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CasperMD5CheckResult: skip
  Date: Wed May 13 10:19:01 2020
  IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig'
  MachineType: HP ProLiant DL360 Gen9
  PciMultimedia:

  Pr

[Kernel-packages] [Bug 1897764] Re: mem-on-off-test.sh from memory-hotplug in ubuntu_kernel_selftests failed on X-gcp-4.15 / F-5.4 zVM

2021-04-27 Thread Krzysztof Kozlowski
38. 02/25 16:08:02 DEBUG| utils:0153| [stdout] # Test with memory notifier 
error injection
39. 02/25 16:08:02 DEBUG| utils:0153| [stdout] # ./mem-on-off-test.sh: line 
267: echo: write error: Invalid argument
40. 02/25 16:08:02 DEBUG| utils:0153| [stdout] # ./mem-on-off-test.sh: line 
283: echo: write error: Invalid argument
41. 02/25 16:08:03 DEBUG| utils:0153| [stdout] # offline_memory_expect_fail 
13: unexpected success
42. 02/25 16:08:03 DEBUG| utils:0153| [stdout] # offline_memory_expect_fail 
14: unexpected success


groovy/aws 5.8.0-1031.33

** Tags added: sru-20210412

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1897764

Title:
  mem-on-off-test.sh from memory-hotplug in ubuntu_kernel_selftests
  failed on X-gcp-4.15 / F-5.4 zVM

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Bionic:
  Confirmed
Status in linux source package in Focal:
  Confirmed
Status in linux source package in Groovy:
  Confirmed

Bug description:
  Issue found on Focal 5.4.0-49.53 zVM kernel04

  Test failed with:
   # selftests: memory-hotplug: mem-on-off-test.sh
   # Test scope: 2% hotplug memory
   # online all hot-pluggable memory in offline state:
   # SKIPPED - no hot-pluggable memory in offline state
   # offline 2% hot-pluggable memory in online state
   # trying to offline 1 out of 16 memory block(s):
   # online->offline memory0
   # ./mem-on-off-test.sh: line 78: echo: write error: Device or resource busy
   # offline_memory_expect_success 0: unexpected fail
   # online->offline memory1
   # ./mem-on-off-test.sh: line 78: echo: write error: Device or resource busy
   # offline_memory_expect_success 1: unexpected fail
   # online->offline memory10
   # ./mem-on-off-test.sh: line 78: echo: write error: Device or resource busy
   # offline_memory_expect_success 10: unexpected fail
   # online->offline memory11
   # ./mem-on-off-test.sh: line 78: echo: write error: Device or resource busy
   # offline_memory_expect_success 11: unexpected fail
   # online->offline memory12
   # ./mem-on-off-test.sh: line 78: echo: write error: Device or resource busy
   # offline_memory_expect_success 12: unexpected fail
   # online->offline memory13
   # ./mem-on-off-test.sh: line 78: echo: write error: Device or resource busy
   # offline_memory_expect_success 13: unexpected fail
   # online->offline memory14
   # ./mem-on-off-test.sh: line 78: echo: write error: Device or resource busy
   # offline_memory_expect_success 14: unexpected fail
   # online->offline memory15
   # ./mem-on-off-test.sh: line 78: echo: write error: Device or resource busy
   # offline_memory_expect_success 15: unexpected fail
   # online->offline memory2
   # ./mem-on-off-test.sh: line 78: echo: write error: Device or resource busy
   # offline_memory_expect_success 2: unexpected fail
   # online->offline memory3
   # ./mem-on-off-test.sh: line 78: echo: write error: Device or resource busy
   # offline_memory_expect_success 3: unexpected fail
   # online->offline memory4
   # ./mem-on-off-test.sh: line 78: echo: write error: Device or resource busy
   # offline_memory_expect_success 4: unexpected fail
   # online->offline memory5
   # ./mem-on-off-test.sh: line 78: echo: write error: Device or resource busy
   # offline_memory_expect_success 5: unexpected fail
   # online->offline memory6
   # ./mem-on-off-test.sh: line 78: echo: write error: Device or resource busy
   # offline_memory_expect_success 6: unexpected fail
   # online->offline memory7
   # ./mem-on-off-test.sh: line 78: echo: write error: Device or resource busy
   # offline_memory_expect_success 7: unexpected fail
   # online->offline memory8
   # ./mem-on-off-test.sh: line 78: echo: write error: Device or resource busy
   # offline_memory_expect_success 8: unexpected fail
   # online->offline memory9
   # ./mem-on-off-test.sh: line 78: echo: write error: Device or resource busy
   # offline_memory_expect_success 9: unexpected fail
   # FAILED - unable to offline some memory blocks, device busy?
   # online all hot-pluggable memory in offline state:
   # SKIPPED - no hot-pluggable memory in offline state
   # Test with memory notifier error injection
   not ok 1 selftests: memory-hotplug: mem-on-off-test.sh # exit=1

  This issue can be found on 5.4.0-46.50, 5.4.0-45.49 zVM as well.
  Passed with 5.4.0-44.48
  Passed with 5.4.0-43.47
  Failed with 5.4.0-42.46

  Looks like it's not very stable.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1897764/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1805806] Re: test_maps in ubuntu_bpf failed with "Failed sockmap unexpected timeout" on D ARM64

2021-04-27 Thread Krzysztof Kozlowski
groovy/aws 5.8.0-1031.33

** Tags added: sru-20210412

** Tags added: amd64

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1805806

Title:
  test_maps in ubuntu_bpf failed with "Failed sockmap unexpected
  timeout" on D ARM64

Status in ubuntu-kernel-tests:
  Triaged
Status in linux package in Ubuntu:
  Invalid

Bug description:
  This issue can be found on 2 different ARM64 node, TunderX Cavium node
  "starmie" and Moonshot "ms10-34-mcdivittB0-kernel"

  Running test_maps bpf test..
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    Fork 100 tasks to 'test_hashmap_percpu'
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    Fork 100 tasks to 'test_hashmap_percpu'
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    Fork 100 tasks to 'test_hashmap_percpu'
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    Fork 100 tasks to 'test_hashmap_percpu'
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    Fork 100 tasks to 'test_hashmap_percpu'
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    Fork 100 tasks to 'test_hashmap_percpu'
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    Fork 100 tasks to 'test_hashmap_percpu'
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    Fork 100 tasks to 'test_hashmap_percpu'
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    Fork 100 tasks to 'test_hashmap_percpu'
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    Fork 100 tasks to 'test_hashmap_percpu'
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    Fork 100 tasks to 'test_hashmap_percpu'
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    Fork 100 tasks to 'test_hashmap_percpu'
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    
    Fork 100 tasks to 'test_hashmap_sizes'
    Fork 100 tasks to 'test_hashmap_walk'
    Fork 100 tasks to 'test_arraymap'
    Fork 100 tasks to 'test_arraymap_percpu'
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    Fork 100 tasks to 'test_hashmap_percpu'
    Fork 100 tasks to 'test_hashmap_sizes'
    Fork 100 tasks to 'test_hashmap_walk'
    Fork 100 tasks to 'test_arraymap'
    Fork 100 tasks to 'test_arraymap_percpu'
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    Fork 100 tasks to 'test_hashmap_percpu'
    Fork 100 tasks to 'test_hashmap_sizes'
    Fork 100 tasks to 'test_hashmap_walk'
    Fork 100 tasks to 'test_arraymap'
    Fork 100 tasks to 'test_arraymap_percpu'
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    Fork 100 tasks to 'test_hashmap_percpu'
    Fork 100 tasks to 'test_hashmap_sizes'
    Fork 100 tasks to 'test_hashmap_walk'
    Fork 100 tasks to 'test_arraymap'
    Fork 100 tasks to 'test_arraymap_percpu'
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    Fork 100 tasks to 'test_hashmap_percpu'
    Fork 100 tasks to 'test_hashmap_sizes'
    Fork 100 tasks to 'test_hashmap_walk'
    Fork 100 tasks to 'test_arraymap'
    Fork 100 tasks to 'test_arraymap_percpu'
    Fork 1024 tasks to 'test_update_delete'
    Fork 1024 tasks to 'test_update_delete'
    Fork 100 tasks to 'test_hashmap'
    Fork 100 tasks to 'test_hashmap_percpu'
    Fork 100 tasks to 'test_hashmap_sizes'
    Fork 100 tasks to 'test_hashmap_walk'
    Fork 100 tasks to 'test_arraymap'
    Fork 100 tasks to 'test_arraymap_percpu'
    Failed sockmap unexpected timeout

  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-11-generic 4.18.0-11.12
  ProcVersionSignature: User Name 4.18.0-11.12-generic 4.18.12
  Uname: Linux 4.18.0-11-generic aarch64
  AlsaDevices:
   total 0
   crw-rw 1 

[Kernel-packages] [Bug 1923670] Re: CIFS DFS entries not accessible with 5.4.0-71.74-generic

2021-04-27 Thread Tim Gardner
It will be released in Ubuntu-5.4.0-73.82 which is proposed.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1923670

Title:
  CIFS DFS entries not accessible with 5.4.0-71.74-generic

Status in linux package in Ubuntu:
  Confirmed
Status in linux-oem-5.10 package in Ubuntu:
  Confirmed
Status in linux source package in Bionic:
  New
Status in linux source package in Focal:
  Fix Released
Status in linux-oem-5.10 source package in Focal:
  Fix Released

Bug description:
  When booting 5.4.0-71-generic I can not access DFS entries anymore,
  with 5.4.0-70-generic this still works. Some details:

  fstab entry:

  //example.com/public /home/user/remotecifs
  
noauto,vers=default,noserverino,users,_netdev,user=remote_user,domain=example.com
  00

  shell session
  ~$ mount /home/user/remote
  Password for remote_user@//example.com/public:
  ~$ ls /home/user/remote/dfs-folder
  dfs-subfolder dfs-entry
  ~$ ls /home/user/remote/dfs-folder/dfs-entry
  ls: cannot access '/home/user/remote/dfs-folder/dfs-entry': No such file or 
directory

  dmesg excerpt
  [ 1219.568778] CIFS: Attempting to mount 
//DC01.example.com/Public/dfs-folder/dfs-entry
  [ 1219.584975] FS-Cache: Duplicate cookie detected
  [ 1219.584986] FS-Cache: O-cookie c=6e995395 [p=f4725c61 
fl=222 nc=0 na=1]
  [ 1219.584990] FS-Cache: O-cookie d=a11c1428 n=71ab21ba
  [ 1219.584993] FS-Cache: O-key=[6] '5075626c6963'
  [ 1219.585001] FS-Cache: N-cookie c=a0608786 [p=f4725c61 fl=2 
nc=0 na=1]
  [ 1219.585004] FS-Cache: N-cookie d=a11c1428 n=901f6a53
  [ 1219.585007] FS-Cache: N-key=[6] '5075626c6963'
  [ 1219.725834] FS-Cache: Duplicate cookie detected
  [ 1219.725847] FS-Cache: O-cookie c=6e995395 [p=f4725c61 
fl=222 nc=0 na=1]
  [ 1219.725851] FS-Cache: O-cookie d=a11c1428 n=71ab21ba
  [ 1219.725854] FS-Cache: O-key=[6] '5075626c6963'
  [ 1219.725864] FS-Cache: N-cookie c=0509709f [p=f4725c61 fl=2 
nc=0 na=1]
  [ 1219.725868] FS-Cache: N-cookie d=a11c1428 n=556f158b
  [ 1219.725870] FS-Cache: N-key=[6] '5075626c6963'
  [ 1220.216524] CIFS VFS: cifs_read_super: get root inode failed

  The dmesg from 5.4.0-70-generic does not have the line
  CIFS VFS: cifs_read_super: get root inode failed

  
  ~$ lsb_release -rd
  Description:KDE neon User Edition 5.21
  Release:   ~$ lsb_release -rd
  Description:KDE neon User Edition 5.21
  Release:20.04
   20.04
  ~$ apt-cache policy linux-image-generic
  linux-image-generic:
Installed: 5.4.0.71.74
Candidate: 5.4.0.71.74
Version table:
   *** 5.4.0.71.74 500
  500 http://de.archive.ubuntu.com/ubuntu focal-updates/main amd64 
Packages
  500 http://security.ubuntu.com/ubuntu focal-security/main amd64 
Packages
  100 /var/lib/dpkg/status
   5.4.0.26.32 500
  500 http://de.archive.ubuntu.com/ubuntu focal/main amd64 Packages
  --- 
  ProblemType: Bug
  ApportVersion: 2.20.11-0ubuntu27.16
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC2:  dirk   2946 F pulseaudio
   /dev/snd/controlC1:  dirk   2946 F pulseaudio
   /dev/snd/controlC0:  dirk   2946 F pulseaudio
  CasperMD5CheckResult: skip
  CurrentDesktop: KDE
  DistroRelease: KDE neon 20.04
  InstallationDate: Installed on 2017-07-27 (1356 days ago)
  InstallationMedia: neon userlts "Xenial" - Build amd64 LIVE Binary 
20170614-00:52
  MachineType: LENOVO 20HMS00T00
  Package: linux (not installed)
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.4.0-71-generic 
root=/dev/mapper/vg00-lv_root ro intel_iommu=off
  ProcVersionSignature: Ubuntu 5.4.0-71.79-generic 5.4.101
  RelatedPackageVersions:
   linux-restricted-modules-5.4.0-71-generic N/A
   linux-backports-modules-5.4.0-71-generic  N/A
   linux-firmware1.187.10
  Tags:  focal
  Uname: Linux 5.4.0-71-generic x86_64
  UnreportableReason: In diesem Bericht geht es um ein Paket, welches nicht 
installiert ist.
  UpgradeStatus: Upgraded to focal on 2020-11-22 (142 days ago)
  UserGroups: adm cdrom davfs2 dialout dip kvm libvirt lpadmin plugdev roccat 
sambashare scanner sudo vboxusers
  _MarkForUpload: False
  dmi.bios.date: 04/20/2020
  dmi.bios.vendor: LENOVO
  dmi.bios.version: R0IET61W (1.39 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 20HMS00T00
  dmi.board.vendor: LENOVO
  dmi.board.version: Not Defined
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: None
  dmi.modalias: 
dmi:bvnLENOVO:bvrR0IET61W(1.39):bd04/20/2020:svnLENOVO:pn20HMS00T00:pvrThinkPadX270:rvnLENOVO:rn20HMS00T00:rvrNotDefined:cvnLENOVO:ct10:cvrNone:
  dmi.product.family: ThinkPad X270
  dmi.product.name: 20HMS00T00
  dmi.product.sku: LENOVO_MT

[Kernel-packages] [Bug 1844493] Re: ubuntu_sysdig_smoke_test failed on 5.3 / 5.4 / 5.6 /5.8 / 5.10 kernels

2021-04-27 Thread Krzysztof Kozlowski
focal/aws-5.8 5.8.0-1031.33~20.04.1

** Tags added: 5.8 sru-20210412

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1844493

Title:
  ubuntu_sysdig_smoke_test failed on 5.3 / 5.4 / 5.6 /5.8 / 5.10 kernels

Status in ubuntu-kernel-tests:
  Triaged
Status in linux package in Ubuntu:
  Incomplete
Status in linux-aws package in Ubuntu:
  New
Status in linux-azure package in Ubuntu:
  New
Status in linux-gcp package in Ubuntu:
  New
Status in linux source package in Eoan:
  Incomplete
Status in linux-aws source package in Eoan:
  New
Status in linux-azure source package in Eoan:
  New
Status in linux-gcp source package in Eoan:
  New
Status in linux source package in Focal:
  New
Status in linux-aws source package in Focal:
  New
Status in linux-azure source package in Focal:
  New
Status in linux-gcp source package in Focal:
  New

Bug description:
  Test failed with:
FAILED (trace at least 25 reads of /dev/zero by dd)
FAILED (trace at least 25 writes to /dev/null by dd)

  Steps:
sudo apt-get install git python-minimal python-yaml gdb -y
git clone --depth=1 git://kernel.ubuntu.com/ubuntu/autotest-client-tests
git clone --depth=1 git://kernel.ubuntu.com/ubuntu/autotest
rm -fr autotest/client/tests
ln -sf ~/autotest-client-tests autotest/client/tests
AUTOTEST_PATH=/home/ubuntu/autotest sudo -E autotest/client/autotest-local 
--verbose autotest/client/tests/ubuntu_sysdig_smoke_test/control

  Test output:
== sysdig smoke test to trace dd, cat, read and writes ==
Limiting raw capture file to 16384 blocks
Try 1 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 18 Mbytes
Try 2 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 22 Mbytes
Try 3 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 4 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 5 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 6 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 7 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 8 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 9 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 10 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Found:
   279845 sysdig events
   29882 context switches
   0 reads from /dev/zero by dd
   0 writes to /dev/null by dd
PASSED (trace at least 25 context switches)
FAILED (trace at least 25 reads of /dev/zero by dd)
FAILED (trace at least 25 writes to /dev/null by dd)
 
Summary: 1 passed, 2 failed

  ProblemType: Bug
  DistroRelease: Ubuntu 19.10
  Package: linux-image-5.3.0-10-generic 5.3.0-10.11
  ProcVersionSignature: User Name 5.3.0-10.11-generic 5.3.0-rc8
  Uname: Linux 5.3.0-10-generic x86_64
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 Sep 18 08:10 seq
   crw-rw 1 root audio 116, 33 Sep 18 08:10 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay': 'aplay'
  ApportVersion: 2.20.11-0ubuntu7
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord': 
'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CurrentDmesg:
   
  Date: Wed Sep 18 08:18:54 2019
  IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig': 'iwconfig'
  MachineType: Intel Corporation S1200RP
  PciMultimedia:
   
  ProcFB: 0 mgag200drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.3.0-10-generic 
root=UUID=b0d2ae4e-12dd-423e-acea-272ee8b2a893 ro
  RelatedPackageVersions:
   linux-restricted-modules-5.3.0-10-generic N/A
   linux-backports-modules-5.3.0-10-generic  N/A
   linux-firmware1.182
  RfKill: Error: [Errno 2] No such file or directory: 'rfkill': 'rfkill'
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 07/01/2015
  dmi.bios.vendor: Intel Corp.
  dmi.bios.version: S1200RP.86B.03.02.0003.070120151022
  dmi.board.asset.tag: 
  dmi.board.name: S1200RP
  dmi.board.vendor: Intel Corporation
  dmi.board.version: G62254-407
  dmi.chassis.asset.ta

[Kernel-packages] [Bug 1894964] Re: Unable to build ubuntu_bpf test on Groovy 5.8 KVM kernel / F-5.8-hwe (blocking net test in ubuntu_kernel_selftests to build)

2021-04-27 Thread Krzysztof Kozlowski
focal/aws-5.8 5.8.0-1031.33~20.04.1


04/24 08:20:01 DEBUG| utils:0153| [stdout] make: Entering directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/testing/selftests'
5818.   04/24 08:20:01 DEBUG| utils:0153| [stdout] make[1]: Entering directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/testing/selftests/bpf'
5819.   04/24 08:20:01 DEBUG| utils:0153| [stdout] make[1]: Leaving directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/testing/selftests/bpf'
5820.   04/24 08:20:01 ERROR| utils:0153| [stderr] Makefile:148: *** Cannot 
find a vmlinux for VMLINUX_BTF at any of " ../../../../vmlinux 
/sys/kernel/btf/vmlinux /boot/vmlinux-5.8.0-1031-aws". Stop.
5821.   04/24 08:20:01 DEBUG| utils:0153| [stdout] make: Leaving directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/testing/selftests'
5822.   04/24 08:20:01 ERROR| utils:0153| [stderr] make: *** [Makefile:262: 
clean] Error 2

** Tags added: aws sru-20210412

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1894964

Title:
  Unable to build ubuntu_bpf test on Groovy 5.8 KVM kernel / F-5.8-hwe
  (blocking net test in ubuntu_kernel_selftests to build)

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Groovy:
  Confirmed

Bug description:
  Issue found on 5.8.0-1001.1 - kvm

  Test build failed with:
  Warning: Kernel ABI header at 'tools/include/uapi/linux/netlink.h' differs 
from latest version at 'include/uapi/linux/netlink.h'
  Warning: Kernel ABI header at 'tools/include/uapi/linux/if_link.h' differs 
from latest version at 'include/uapi/linux/if_link.h'
  In file included from 
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/include/linux/build_bug.h:5,
  from 
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/include/linux/kernel.h:8,
  from 
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/kernel/bpf/disasm.h:10,
  from 
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/kernel/bpf/disasm.c:8:
  /home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/kernel/bpf/disasm.c: In 
function ‘__func_get_name’:
  
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/include/linux/compiler.h:37:38:
 warning: nested extern declaration of ‘__compiletime_assert_0’ 
[-Wnested-externs]
  37 | _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
  | ^
  
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/include/linux/compiler.h:16:15:
 note: in definition of macro ‘__compiletime_assert’
  16 | extern void prefix ## suffix(void) __compiletime_error(msg); \
  | ^~
  
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/include/linux/compiler.h:37:2:
 note: in expansion of macro ‘_compiletime_assert’
  37 | _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
  | ^~~
  
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/include/linux/build_bug.h:39:37:
 note: in expansion of macro ‘compiletime_assert’
  39 | #define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
  | ^~
  
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/include/linux/build_bug.h:50:2:
 note: in expansion of macro ‘BUILD_BUG_ON_MSG’
  50 | BUILD_BUG_ON_MSG(condition, "BUILD_BUG_ON failed: " #condition)
  | ^~~~
  
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/kernel/bpf/disasm.c:20:2: 
note: in expansion of macro ‘BUILD_BUG_ON’
  20 | BUILD_BUG_ON(ARRAY_SIZE(func_id_str) != __BPF_FUNC_MAX_ID);
  | ^~~~
  libbpf: failed to open format: No such file or directory
  Error: failed to load BTF from format: No such file or directory
  make[1]: *** [Makefile:190: 
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/testing/selftests/bpf/tools/include/vmlinux.h]
 Error 2
  make[1]: *** Deleting file 
'/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/testing/selftests/bpf/tools/include/vmlinux.h'
  make: *** [Makefile:157: all] Error 2

  Please find attachment for the complete build log.

  As the ubuntu_kernel_selftests needs bpf to be built first, this will
  block the ubuntu_kernel_selftests/net to build as well.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1894964/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


Re: [Kernel-packages] [Bug 1925964] Re: HP NC364T NIC with 20.04.2 LTS Issues

2021-04-27 Thread Ted Hannock
To all,

I’m not a coder.  I’m an end user. I’m a network engineer.  The reason I
found the bug is that our team has about 20 servers all running ubuntu
server with multiple NICs in each deployed throughout our Data Centers
as tools boxes to test and troubleshoot various network issues.

Sent from my iPhone.

Ted Hannock
iPhone - 919-349-2528


> On Apr 27, 2021, at 12:44 AM, Kai-Heng Feng <1925...@bugs.launchpad.net> 
> wrote:
> 
> So kernel 5.4 works and 5.8 is broken?
> 
> -- 
> You received this bug notification because you are subscribed to the bug
> report.
> https://bugs.launchpad.net/bugs/1925964
> 
> Title:
>  HP NC364T NIC with 20.04.2 LTS Issues
> 
> Status in linux package in Ubuntu:
>  Incomplete
> 
> Bug description:
>  This NIC is a 4 Port Copper 1GB Intel 82571B/82571GB Gigabit Ethernet
>  Controller with a Dual Chipset where each Chipset controls 2 ports
>  each (ie (1 Chipset - 2 Ports) * 2).  In the latest 20.04.2 LTS, the
>  OS is mapping the ports incorrectly, causing only 2 of the 4 total
>  ports to be allocated via DMESG:
> 
>  thannock@nwtools04-usdc7:~$ lspci 
>  00:00.0 Host bridge: Intel Corporation 5000P Chipset Memory Controller Hub 
> (rev b1)
>  00:02.0 PCI bridge: Intel Corporation 5000 Series Chipset PCI Express x4 
> Port 2 (rev b1)
>  00:03.0 PCI bridge: Intel Corporation 5000 Series Chipset PCI Express x4 
> Port 3 (rev b1)
>  00:04.0 PCI bridge: Intel Corporation 5000 Series Chipset PCI Express x8 
> Port 4-5 (rev b1)
>  00:05.0 PCI bridge: Intel Corporation 5000 Series Chipset PCI Express x4 
> Port 5 (rev b1)
>  00:06.0 PCI bridge: Intel Corporation 5000 Series Chipset PCI Express x4 
> Port 6 (rev b1)
>  00:07.0 PCI bridge: Intel Corporation 5000 Series Chipset PCI Express x4 
> Port 7 (rev b1)
>  00:10.0 Host bridge: Intel Corporation 5000 Series Chipset FSB Registers 
> (rev b1)
>  00:10.1 Host bridge: Intel Corporation 5000 Series Chipset FSB Registers 
> (rev b1)
>  00:10.2 Host bridge: Intel Corporation 5000 Series Chipset FSB Registers 
> (rev b1)
>  00:11.0 Host bridge: Intel Corporation 5000 Series Chipset Reserved 
> Registers (rev b1)
>  00:13.0 Host bridge: Intel Corporation 5000 Series Chipset Reserved 
> Registers (rev b1)
>  00:15.0 Host bridge: Intel Corporation 5000 Series Chipset FBD Registers 
> (rev b1)
>  00:16.0 Host bridge: Intel Corporation 5000 Series Chipset FBD Registers 
> (rev b1)
>  00:1d.0 USB controller: Intel Corporation 631xESB/632xESB/3100 Chipset UHCI 
> USB Controller #1 (rev 09)
>  00:1d.1 USB controller: Intel Corporation 631xESB/632xESB/3100 Chipset UHCI 
> USB Controller #2 (rev 09)
>  00:1d.2 USB controller: Intel Corporation 631xESB/632xESB/3100 Chipset UHCI 
> USB Controller #3 (rev 09)
>  00:1d.3 USB controller: Intel Corporation 631xESB/632xESB/3100 Chipset UHCI 
> USB Controller #4 (rev 09)
>  00:1d.7 USB controller: Intel Corporation 631xESB/632xESB/3100 Chipset EHCI 
> USB2 Controller (rev 09)
>  00:1e.0 PCI bridge: Intel Corporation 82801 PCI Bridge (rev d9)
>  00:1f.0 ISA bridge: Intel Corporation 631xESB/632xESB/3100 Chipset LPC 
> Interface Controller (rev 09)
>  00:1f.1 IDE interface: Intel Corporation 631xESB/632xESB IDE Controller (rev 
> 09)
>  01:03.0 VGA compatible controller: Advanced Micro Devices, Inc. [AMD/ATI] 
> ES1000 (rev 02)
>  01:04.0 System peripheral: Compaq Computer Corporation Integrated Lights Out 
> Controller (rev 03)
>  01:04.2 System peripheral: Compaq Computer Corporation Integrated Lights Out 
>  Processor (rev 03)
>  01:04.4 USB controller: Hewlett-Packard Company Integrated Lights-Out 
> Standard Virtual USB Controller
>  01:04.6 IPMI Interface: Hewlett-Packard Company Integrated Lights-Out 
> Standard KCS Interface
>  02:00.0 PCI bridge: Broadcom EPB PCI-Express to PCI-X Bridge (rev c3)
>  03:00.0 Ethernet controller: Broadcom Inc. and subsidiaries NetXtreme II 
> BCM5708 Gigabit Ethernet (rev 12)
>  04:00.0 PCI bridge: Broadcom EPB PCI-Express to PCI-X Bridge (rev c3)
>  05:00.0 Ethernet controller: Broadcom Inc. and subsidiaries NetXtreme II 
> BCM5708 Gigabit Ethernet (rev 12)
>  06:00.0 PCI bridge: Broadcom EPB PCI-Express to PCI-X Bridge (rev b4)
>  07:04.0 PCI bridge: Broadcom BCM5785 [HT1000] PCI/PCI-X Bridge (rev b2)
>  07:08.0 RAID bus controller: Hewlett-Packard Company Smart Array E200i (SAS 
> Controller)
>  09:00.0 PCI bridge: Intel Corporation 6311ESB/6321ESB PCI Express Upstream 
> Port (rev 01)
>  09:00.3 PCI bridge: Intel Corporation 6311ESB/6321ESB PCI Express to PCI-X 
> Bridge (rev 01)
>  0a:00.0 PCI bridge: Intel Corporation 6311ESB/6321ESB PCI Express Downstream 
> Port E1 (rev 01)
>  0a:01.0 PCI bridge: Intel Corporation 6311ESB/6321ESB PCI Express Downstream 
> Port E2 (rev 01)
>  0a:02.0 PCI bridge: Intel Corporation 6311ESB/6321ESB PCI Express Downstream 
> Port E3 (rev 01)
>  0b:00.0 PCI bridge: Microsemi / PMC / IDT PES12N3A 12-lane 3-Port PCI 
> Express Switch (rev 0e)
>  0c:02.0 PCI bridge: Microsemi / PMC / IDT PES12N3A 12-lane 3-Port PCI 
> Express Switc

[Kernel-packages] [Bug 1925452] Comment bridged from LTC Bugzilla

2021-04-27 Thread bugproxy
--- Comment From alexs...@de.ibm.com 2021-04-27 07:51 EDT---
Also verified on the groovy build

root@pok1-qz1-sr1-rk011-s21:~# uname -a
Linux pok1-qz1-sr1-rk011-s21 5.8.0-51-generic #57~lp1925452-Ubuntu SMP Mon Apr 
26 15:27:41 UTC 2021 s390x s390x s390x GNU/Linux

root@pok1-qz1-sr1-rk011-s21:~# ping -c 5 172.31.22.42
PING 172.31.22.42 (172.31.22.42) 56(84) bytes of data.
64 bytes from 172.31.22.42: icmp_seq=2 ttl=0 time=0.117 ms
64 bytes from 172.31.22.42: icmp_seq=3 ttl=0 time=0.080 ms
64 bytes from 172.31.22.42: icmp_seq=4 ttl=0 time=0.066 ms

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1925452

Title:
  [Ubuntu 21.04] net/mlx5: Fix HW spec violation configuring uplink

Status in Ubuntu on IBM z Systems:
  In Progress
Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Focal:
  In Progress
Status in linux source package in Groovy:
  In Progress
Status in linux source package in Hirsute:
  In Progress

Bug description:
  SRU Justification:
  ==

  [Impact]

  * In addition to 9c9be85f6b59 "net/mlx5e: Add missing capability check
  for uplink follow" (handled in LP#1921104) another fix 1a73704c82ed
  "Fix HW spec violation configuring uplink" (handled in this bug,
  LP#1925452) is needed to fix issues that were introduced with commit
  7d0314b11cdd "net/mlx5e: Modify uplink state on interface up/down".

  * Commit 1a73704c82ed "Fix HW spec violation configuring uplink" fixes
  a regression for mlx5 adapters required to operate in switchdev mode.

  * This fix makes sure that the uplink port is modified to follow only
  if the uplink_follow capability if it's set as required by the hw
  specification.

  * Failure cause traffic to the uplink representer net device to cease
  after switching to switchdev mode.

  [Fix]

  * upstream fix (upstream with v5.12-rc7)
  1a73704c82ed4ee95532ac04645d02075bd1ce3d 1a73704c82ed "Fix HW spec violation 
configuring uplink"

  * can be cleanly cherry picked from hirsute master-next.

  * a backport for groovy:
  
https://launchpadlibrarian.net/534888680/groovy-0001-net-mlx5-Fix-HW-spec-violation-configuring-uplink.patch

  * a backport for focal:
  
https://launchpadlibrarian.net/534847308/focal-0001-net-mlx5-Fix-HW-spec-violation-configuring-uplink.patch

  [Test Case]

  * Two servers, installed with Ubuntu Server 20.04 or 20.10 are needed.

  * Each server needs to have a Mellanox ConnectX4/5 adapter, attached
  to the same switch

  * Adapters must be running adapter firmware level 16.29.1006 or
  earlier.

  * enable SRIOV and switchdev mode on one adapter:
    echo 0 > /sys/bus/pci/devices/0100\:00\:00.0/sriov_drivers_autoprobe
    echo 0 > /sys/bus/pci/devices/0100\:00\:00.1/sriov_drivers_autoprobe
    echo 64 > /sys/bus/pci/devices/0100\:00\:00.0/sriov_numvfs
    echo 64 > /sys/bus/pci/devices/0100\:00\:00.1/sriov_numvfs
    devlink dev eswitch set pci/0100:00:00.0 mode switchdev
    devlink dev eswitch set pci/0100:00:00.1 mode switchdev

  * Assign an IP address to the physical function device of the adapters
  on both systems

  * IP communication will fail

  * With the fix, IP communication can be established.

  [Regression Potential]

  * There is always at least some potential for regression. In this case
  the new code can go wrong (or might become worse than before) in case
  the new if statement is wrong.

  * It checks for the condition of "MLX5_CAP_GEN(mdev, uplink_follow)"
  and in case MLX5_CAP_GEN is calculated erroneous or mdev is other than
  expected, the mlx5_modify_vport_admin_state call might go wrong, too.

  * But since only the If clause was added, the changes are pretty
  minimal and therefore well traceable.

  [Other]

  * Since the patch/commit is upstream with 5.12-rc7, it will be in Impish.
  __

  With the 5.4.0-48 update for Ubuntu 20.04, the commit

  "net/mlx5e: Modify uplink state on interface up/down"

  was integrated which contains a regression for mlx5 adapters with
  older adapter firmware.

  This is the second bugfix to repair the regression, required to operate the 
adapter in switchdev mode.
  The first part was integrated via Bug 192185 - LP1921104.

  This is the upstream fix required to be backported to Ubuntu 20.04:
  
https://github.com/torvalds/linux/commit/1a73704c82ed4ee95532ac04645d02075bd1ce3d

  ---Additional Hardware Info---
  Mellanox ConnectX network adapter

  ---uname output---
  5.4.0-73-generic

  ---Steps to Reproduce---
   enable switchdev mode
  try to ping external host

  Backports need to be provide for 21.04, 20.10 and 20.04 (if not
  cleanly applyable)!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1925452/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-pa

[Kernel-packages] [Bug 1926081] Re: nr_writeback memory leak in kernel 4.15.0-137+

2021-04-27 Thread Andrew Taylor
So, good news.

I pulled in the ubuntu kernel sources and applied the main patch I had
previously identified
(https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe).
Looking at the other patch
(https://github.com/torvalds/linux/commit/e27be240df53), that seems to
be related to the accuracy of returned statistics which is not something
that my testcase is going to show up.

I built a version of the 4.15.0-142 kernel with patch, and booted back
into it, and with two iterations of my testcase my `nr_writeback` value
has ended up on zero - which is excellent news. From previous runs it
has never failed to leak, so this looks good to me. I will run it some
more, but it is safe to say I am pretty happy at this point.

To that end, I believe that
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
"mm: memcontrol: fix NR_WRITEBACK leak in memcg and system stats" does
indeed fix this issue and the symptoms I have reported above.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926081

Title:
  nr_writeback memory leak in kernel 4.15.0-137+

Status in linux package in Ubuntu:
  In Progress

Bug description:
  
  Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a 
memory leak due to the inclusion of patch from the upstream kernel, but not the 
fix for that patch which was released later.

  This issue manifests itself as an increasing amount of memory used by
  the writeback queue, which never returns to zero. This can been seen
  either as the value of `nr_writeback` in /proc/vmstat, or the value of
  `Writeback` in /proc/meminfo.

  Ordinarily these values should be at or around zero, but on our
  servers we observe the `nr_writeback` value increasing to over 8
  million, (32GB of memory), at which point it isn't long before the
  system IO slows to a crawl (tens of Kb/s). Our servers have 256GB of
  memory, and are performing many CI related activities - this issue
  appears to be related to concurrent writing to disk, and can be
  demonstrated with a simple testcase (see later).

  On our heavily used systems this memory leak can result in an unstable
  server after 2-3 days, requiring a reboot to fix it.

  After much investigation the issue appears to be because the patch
  "mm: memcontrol: fix excessive complexity in memory.stat reporting"
  was brought in to the 4.15.0-137 Ubuntu kernel (see
  https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of
  " Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)",
  however in the mainline kernel there was a follow up patch because
  this initial patch introduced concurrency issues. The patch "mm:
  memcontrol: fix NR_WRITEBACK leak in memcg and system stats" is
  required, and should be brought into the Ubuntu packaged kernel to fix
  the issues reported.

  The required patch is here:
  
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
  and was committed a few weeks after the original (broken) patch:
  
https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da

  I have checked the release notes for Ubuntu versions -137 to -143, and
  none include this second patch that should fix the issue. (I checked
  https://people.canonical.com/~kernel/info/kernel-version-map.html for
  all the kernel versions, and then visited each changelog page in turn,
  e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking
  for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system
  stats").

  We do not observe this on the 5.4.0 kernel (supported HWE kernel on
  18.05.5), which includes this second patch. That kernel may also
  include other patches, so we do not know if any other fixes are also
  required, but the one we have linked above seems to definitely be
  needed, and seems to match our symptoms.

  Testcase:

  The following is enough to permanently increase the value of
  `nr_writeback` on our systems (by about 2000 during most executions):

  ```
  date
  grep nr_writeback /proc/vmstat
  mkdir -p /docker/testfiles/{1..5}

  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/4/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/5/file.% bs=4k count=10 status=none' &

  wait $(jobs -p)
  grep nr_writeback /proc/vmstat
  date
  ```

  Subsequent iterations of the test raise it further, and on a system
  doing a lot of writing from a l

[Kernel-packages] [Bug 1925685] Re: [SRU] Patch for flicker and glitching on certain hardware, intel framebuffer,

2021-04-27 Thread Timo Aaltonen
** Changed in: linux (Ubuntu Bionic)
   Status: Confirmed => Won't Fix

** Changed in: linux (Ubuntu Focal)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1925685

Title:
  [SRU] Patch for flicker and glitching on certain hardware, intel
  framebuffer,

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Bionic:
  Won't Fix
Status in linux source package in Focal:
  Won't Fix
Status in linux source package in Groovy:
  Confirmed
Status in linux source package in Hirsute:
  Confirmed

Bug description:
  Filing this with my Kubuntu Focus (kfocus.org) OEM hat on:

  [Impact]

  We are having screen flickering and glitching issues with some of our
  hardware upon wake from suspend. We have worked with our ODM to figure
  out a fix for this. They had reported there were no issues when
  running Windows on the same hardware. As such, we tested, and found
  that this issue first began as a regression in kernel 5.0 (did not
  exist in kernel 4.18 per our tests).

  We identified a patch via
  https://gitlab.freedesktop.org/drm/intel/-/issues/272 in which this
  has been solved. Per our testing by recompiling the kernel, this
  completely fixes our hardware issue. As of 4-21, this fix has been
  merged into the Linux kernel per Timo Aaltonen, and will be included
  in the kernel in the 5.13 release.

  Our hardware ships with Kubuntu 20.04 LTS, which means the 5.13 kernel
  will not see these machines, at least in the forseeable future. As
  such, we request that this patch be added to the kernel. Per our
  testing, this patch is straightforward to add and works flawlessly.

  The patch that works best was created in collaboration with Kai-Heng
  Feng, is attached to this bug report, and can be found here:
  
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1925685/+attachment/5491421/+files
  /drm-intel-both.patch

  Until this is fixed, we have a whole batch of hardware we cannot sell,
  so, as an OEM, this is a high priority.

  [Test Plan]

   * Install Kubuntu on an affected Kubuntu Focus M2 computer (not in
  the hands of customers at this time)

   * Notice screen glitching/flickering after wake-from-suspend.

   * Install kernel compiled with the attached patch. Boot from patched
  kernel.

   * Suspend laptop, resume. No glitches.

  [Where problems could occur]

   * Although this solves the problem for us and has been confirmed to
  work with the Intel developers that developed this patch, it could
  cause another display type to have problems. This is unlikely as it
  has been vetted by Intel and by the mainline Linux kernel developers.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1925685/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1926081] Re: nr_writeback memory leak in kernel 4.15.0-137+

2021-04-27 Thread Tim Gardner
Andrew - please find a test kernel at
https://kernel.ubuntu.com/~rtg/LP%231926081.

wget 
https://kernel.ubuntu.com/~rtg/LP%231926081/amd64/linux-image-unsigned-4.15.0-144-generic_4.15.0-144.148~LP1926081.1_amd64.deb
wget 
https://kernel.ubuntu.com/~rtg/LP%231926081/amd64/linux-modules-4.15.0-144-generic_4.15.0-144.148~LP1926081.1_amd64.deb
sudo dpkg -i *.deb

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926081

Title:
  nr_writeback memory leak in kernel 4.15.0-137+

Status in linux package in Ubuntu:
  In Progress

Bug description:
  
  Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a 
memory leak due to the inclusion of patch from the upstream kernel, but not the 
fix for that patch which was released later.

  This issue manifests itself as an increasing amount of memory used by
  the writeback queue, which never returns to zero. This can been seen
  either as the value of `nr_writeback` in /proc/vmstat, or the value of
  `Writeback` in /proc/meminfo.

  Ordinarily these values should be at or around zero, but on our
  servers we observe the `nr_writeback` value increasing to over 8
  million, (32GB of memory), at which point it isn't long before the
  system IO slows to a crawl (tens of Kb/s). Our servers have 256GB of
  memory, and are performing many CI related activities - this issue
  appears to be related to concurrent writing to disk, and can be
  demonstrated with a simple testcase (see later).

  On our heavily used systems this memory leak can result in an unstable
  server after 2-3 days, requiring a reboot to fix it.

  After much investigation the issue appears to be because the patch
  "mm: memcontrol: fix excessive complexity in memory.stat reporting"
  was brought in to the 4.15.0-137 Ubuntu kernel (see
  https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of
  " Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)",
  however in the mainline kernel there was a follow up patch because
  this initial patch introduced concurrency issues. The patch "mm:
  memcontrol: fix NR_WRITEBACK leak in memcg and system stats" is
  required, and should be brought into the Ubuntu packaged kernel to fix
  the issues reported.

  The required patch is here:
  
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
  and was committed a few weeks after the original (broken) patch:
  
https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da

  I have checked the release notes for Ubuntu versions -137 to -143, and
  none include this second patch that should fix the issue. (I checked
  https://people.canonical.com/~kernel/info/kernel-version-map.html for
  all the kernel versions, and then visited each changelog page in turn,
  e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking
  for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system
  stats").

  We do not observe this on the 5.4.0 kernel (supported HWE kernel on
  18.05.5), which includes this second patch. That kernel may also
  include other patches, so we do not know if any other fixes are also
  required, but the one we have linked above seems to definitely be
  needed, and seems to match our symptoms.

  Testcase:

  The following is enough to permanently increase the value of
  `nr_writeback` on our systems (by about 2000 during most executions):

  ```
  date
  grep nr_writeback /proc/vmstat
  mkdir -p /docker/testfiles/{1..5}

  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/4/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/5/file.% bs=4k count=10 status=none' &

  wait $(jobs -p)
  grep nr_writeback /proc/vmstat
  date
  ```

  Subsequent iterations of the test raise it further, and on a system
  doing a lot of writing from a lot of different processes, it can rise
  quickly.

  System details:

  lsb_release -rd
  Description:  Ubuntu 18.04.5 LTS
  Release:  18.04

  Affected kernel: 4.15.0-137 onwards (current latest version tried was
  4.15.0-142)

  e.g.

  apt-cache policy linux-image-4.15.0-141-generic
  linux-image-4.15.0-141-generic:
Installed: 4.15.0-141.145
Candidate: 4.15.0-141.145
Version table:
   *** 4.15.0-141.145 500
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-updates/main amd64 Packages
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-security/main amd64 Packages
  

[Kernel-packages] [Bug 1926081] Re: nr_writeback memory leak in kernel 4.15.0-137+

2021-04-27 Thread Guilherme G. Piccoli
That's awesome Andrew, thanks for being so proactive in the issue. For
your first LP bug report, you're doing an amazing job!

Tim posted above a kernel with both fixes, if you can try it, that'd be good. 
And I want to apologize, I said a wrong information above - the fixes ARE in 
linux-stable upstream, I just missed them in a first look. My colleague 
Krzysztof pointed me that they reached stable in v4.14.229 - so eventually 
they'd reach Ubuntu kernels. But your LP hopefully speed-up things.
Cheers!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926081

Title:
  nr_writeback memory leak in kernel 4.15.0-137+

Status in linux package in Ubuntu:
  In Progress

Bug description:
  
  Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a 
memory leak due to the inclusion of patch from the upstream kernel, but not the 
fix for that patch which was released later.

  This issue manifests itself as an increasing amount of memory used by
  the writeback queue, which never returns to zero. This can been seen
  either as the value of `nr_writeback` in /proc/vmstat, or the value of
  `Writeback` in /proc/meminfo.

  Ordinarily these values should be at or around zero, but on our
  servers we observe the `nr_writeback` value increasing to over 8
  million, (32GB of memory), at which point it isn't long before the
  system IO slows to a crawl (tens of Kb/s). Our servers have 256GB of
  memory, and are performing many CI related activities - this issue
  appears to be related to concurrent writing to disk, and can be
  demonstrated with a simple testcase (see later).

  On our heavily used systems this memory leak can result in an unstable
  server after 2-3 days, requiring a reboot to fix it.

  After much investigation the issue appears to be because the patch
  "mm: memcontrol: fix excessive complexity in memory.stat reporting"
  was brought in to the 4.15.0-137 Ubuntu kernel (see
  https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of
  " Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)",
  however in the mainline kernel there was a follow up patch because
  this initial patch introduced concurrency issues. The patch "mm:
  memcontrol: fix NR_WRITEBACK leak in memcg and system stats" is
  required, and should be brought into the Ubuntu packaged kernel to fix
  the issues reported.

  The required patch is here:
  
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
  and was committed a few weeks after the original (broken) patch:
  
https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da

  I have checked the release notes for Ubuntu versions -137 to -143, and
  none include this second patch that should fix the issue. (I checked
  https://people.canonical.com/~kernel/info/kernel-version-map.html for
  all the kernel versions, and then visited each changelog page in turn,
  e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking
  for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system
  stats").

  We do not observe this on the 5.4.0 kernel (supported HWE kernel on
  18.05.5), which includes this second patch. That kernel may also
  include other patches, so we do not know if any other fixes are also
  required, but the one we have linked above seems to definitely be
  needed, and seems to match our symptoms.

  Testcase:

  The following is enough to permanently increase the value of
  `nr_writeback` on our systems (by about 2000 during most executions):

  ```
  date
  grep nr_writeback /proc/vmstat
  mkdir -p /docker/testfiles/{1..5}

  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/4/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/5/file.% bs=4k count=10 status=none' &

  wait $(jobs -p)
  grep nr_writeback /proc/vmstat
  date
  ```

  Subsequent iterations of the test raise it further, and on a system
  doing a lot of writing from a lot of different processes, it can rise
  quickly.

  System details:

  lsb_release -rd
  Description:  Ubuntu 18.04.5 LTS
  Release:  18.04

  Affected kernel: 4.15.0-137 onwards (current latest version tried was
  4.15.0-142)

  e.g.

  apt-cache policy linux-image-4.15.0-141-generic
  linux-image-4.15.0-141-generic:
Installed: 4.15.0-141.145
Candidate: 4.15.0-141.145
Version table:
   *** 4.15.0-141.145 500
  500 http://mirrors.service.networklayer.com/

[Kernel-packages] [Bug 1926081] Re: nr_writeback memory leak in kernel 4.15.0-137+

2021-04-27 Thread Andrew Taylor
Thank you both,

I'll give that kernel a go now.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926081

Title:
  nr_writeback memory leak in kernel 4.15.0-137+

Status in linux package in Ubuntu:
  In Progress

Bug description:
  
  Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a 
memory leak due to the inclusion of patch from the upstream kernel, but not the 
fix for that patch which was released later.

  This issue manifests itself as an increasing amount of memory used by
  the writeback queue, which never returns to zero. This can been seen
  either as the value of `nr_writeback` in /proc/vmstat, or the value of
  `Writeback` in /proc/meminfo.

  Ordinarily these values should be at or around zero, but on our
  servers we observe the `nr_writeback` value increasing to over 8
  million, (32GB of memory), at which point it isn't long before the
  system IO slows to a crawl (tens of Kb/s). Our servers have 256GB of
  memory, and are performing many CI related activities - this issue
  appears to be related to concurrent writing to disk, and can be
  demonstrated with a simple testcase (see later).

  On our heavily used systems this memory leak can result in an unstable
  server after 2-3 days, requiring a reboot to fix it.

  After much investigation the issue appears to be because the patch
  "mm: memcontrol: fix excessive complexity in memory.stat reporting"
  was brought in to the 4.15.0-137 Ubuntu kernel (see
  https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of
  " Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)",
  however in the mainline kernel there was a follow up patch because
  this initial patch introduced concurrency issues. The patch "mm:
  memcontrol: fix NR_WRITEBACK leak in memcg and system stats" is
  required, and should be brought into the Ubuntu packaged kernel to fix
  the issues reported.

  The required patch is here:
  
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
  and was committed a few weeks after the original (broken) patch:
  
https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da

  I have checked the release notes for Ubuntu versions -137 to -143, and
  none include this second patch that should fix the issue. (I checked
  https://people.canonical.com/~kernel/info/kernel-version-map.html for
  all the kernel versions, and then visited each changelog page in turn,
  e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking
  for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system
  stats").

  We do not observe this on the 5.4.0 kernel (supported HWE kernel on
  18.05.5), which includes this second patch. That kernel may also
  include other patches, so we do not know if any other fixes are also
  required, but the one we have linked above seems to definitely be
  needed, and seems to match our symptoms.

  Testcase:

  The following is enough to permanently increase the value of
  `nr_writeback` on our systems (by about 2000 during most executions):

  ```
  date
  grep nr_writeback /proc/vmstat
  mkdir -p /docker/testfiles/{1..5}

  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/4/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/5/file.% bs=4k count=10 status=none' &

  wait $(jobs -p)
  grep nr_writeback /proc/vmstat
  date
  ```

  Subsequent iterations of the test raise it further, and on a system
  doing a lot of writing from a lot of different processes, it can rise
  quickly.

  System details:

  lsb_release -rd
  Description:  Ubuntu 18.04.5 LTS
  Release:  18.04

  Affected kernel: 4.15.0-137 onwards (current latest version tried was
  4.15.0-142)

  e.g.

  apt-cache policy linux-image-4.15.0-141-generic
  linux-image-4.15.0-141-generic:
Installed: 4.15.0-141.145
Candidate: 4.15.0-141.145
Version table:
   *** 4.15.0-141.145 500
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-updates/main amd64 Packages
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-security/main amd64 Packages
  100 /var/lib/dpkg/status

  According to https://wiki.ubuntu.com/KernelTeam/KernelTeamBugPolicies
  I should include additional information from the server, but at this
  stage we have upgraded all our affected systems to 5.4.0, and
  therefore the kernel versions do not match those with this issue.

  We li

[Kernel-packages] [Bug 1877088] Comment bridged from LTC Bugzilla

2021-04-27 Thread bugproxy
--- Comment From niklas.schne...@ibm.com 2021-04-27 09:16 EDT---
I just tested the installkernel script on Ubuntu 20.04 + Focal Proposed
with linux-base 4.5ubuntu3.2.

I performed the following testing on a s390x z15 LPAR:

# 5.12.0-07600-g75079231a966.tar is a tar of the modules compiled on another 
system
% ls
5.12.0-07600-g75079231a966.tar  System.map  bzImage
% tar -xavf 5.12.0-07600-g75079231a966.tar -C /usr/
% installkernel 5.12.0-07600-g75079231a966 bzImage System.map /boot

After that with the previous linux-base version I see the following:
%  ls -la /boot
total 68556
drwxr-xr-x  2 root root 4096 Apr 27 12:56 .
drwxr-xr-x 20 root root 4096 Apr 27 08:33 ..
-rw-r--r--  1 root root  4475596 Apr 27 12:56 
System.map-5.12.0-07600-g75079231a966
-rw---  1 root root  3099673 Apr 12 15:12 System.map-5.4.0-72-generic
-rw---  1 root root45056 Apr 27 12:56 bootmap
-rw-r--r--  1 root root90468 Apr 12 15:12 config-5.4.0-72-generic
lrwxrwxrwx  1 root root   27 Apr 27 08:34 initrd.img -> 
initrd.img-5.4.0-72-generic
-rw-r--r--  1 root root 20356043 Apr 27 12:56 
initrd.img-5.12.0-07600-g75079231a966
-rw-r--r--  1 root root 24196892 Apr 27 12:46 initrd.img-5.4.0-72-generic
lrwxrwxrwx  1 root root   27 Apr 27 08:34 initrd.img.old -> 
initrd.img-5.4.0-72-generic
lrwxrwxrwx  1 root root   34 Apr 27 12:56 vmlinuz -> 
vmlinuz-5.12.0-07600-g75079231a966
-rw-r--r--  1 root root  9744384 Apr 27 12:56 vmlinuz-5.12.0-07600-g75079231a966
-rw---  1 root root  8172088 Apr 12 16:56 vmlinuz-5.4.0-72-generic
lrwxrwxrwx  1 root root   24 Apr 27 08:34 vmlinuz.old -> 
vmlinuz-5.4.0-72-generic

Note the wrong initrd.img symlink still pointing at
initrd.img-5.4.0-72-generic

After the upate and performing the same steps again I get:

%  ls -la /boot
total 117188
drwxr-xr-x  2 root root 4096 Apr 27 13:13 .
drwxr-xr-x 20 root root 4096 Apr 27 08:33 ..
-rw-r--r--  1 root root  4475596 Apr 27 13:13 
System.map-5.12.0-07600-g75079231a966
-rw-r--r--  1 root root  4475596 Apr 27 12:56 
System.map-5.12.0-07600-g75079231a966.old
-rw---  1 root root  3099673 Apr 12 15:12 System.map-5.4.0-72-generic
-rw---  1 root root  3100152 Apr 14 16:35 System.map-5.4.0-73-generic
-rw---  1 root root45056 Apr 27 13:13 bootmap
-rw-r--r--  1 root root90468 Apr 12 15:12 config-5.4.0-72-generic
-rw-r--r--  1 root root90468 Apr 14 16:35 config-5.4.0-73-generic
lrwxrwxrwx  1 root root   27 Apr 27 13:03 initrd.img -> 
initrd.img-5.4.0-73-generic
-rw-r--r--  1 root root 20355627 Apr 27 13:13 
initrd.img-5.12.0-07600-g75079231a966
-rw-r--r--  1 root root 24196892 Apr 27 12:46 initrd.img-5.4.0-72-generic
-rw-r--r--  1 root root 24204650 Apr 27 13:04 initrd.img-5.4.0-73-generic
lrwxrwxrwx  1 root root   37 Apr 27 13:03 initrd.img.old -> 
initrd.img-5.12.0-07600-g75079231a966
lrwxrwxrwx  1 root root   34 Apr 27 13:13 vmlinuz -> 
vmlinuz-5.12.0-07600-g75079231a966
-rw-r--r--  1 root root  9744384 Apr 27 13:13 vmlinuz-5.12.0-07600-g75079231a966
-rw-r--r--  1 root root  9744384 Apr 27 12:56 
vmlinuz-5.12.0-07600-g75079231a966.old
-rw---  1 root root  8172088 Apr 12 16:56 vmlinuz-5.4.0-72-generic
-rw---  1 root root  8172088 Apr 14 16:37 vmlinuz-5.4.0-73-generic
lrwxrwxrwx  1 root root   24 Apr 27 13:03 vmlinuz.old -> 
vmlinuz-5.4.0-73-generic

So this does NOT seem to be fixed. Do note that during the dpkg based
kernel install the symlink is updated correctly as can be seen by the
symlink after installing Proposed updates now pointing to
initrd.img-5.4.0-73-generic.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-base in Ubuntu.
https://bugs.launchpad.net/bugs/1877088

Title:
  [UBUNTU 20.04] installkernel script does not symlink /boot/initrd.img
  which is required with the default zipl.conf

Status in Ubuntu on IBM z Systems:
  Fix Committed
Status in linux-base package in Ubuntu:
  Fix Released
Status in linux-base source package in Bionic:
  Fix Committed
Status in linux-base source package in Focal:
  Fix Committed
Status in linux-base source package in Hirsute:
  Fix Released

Bug description:
  [Impact]

  * initrd link is not updated when using installkernel or "make
  install" from kernel sources. This leads to boot failure after
  installing a new kernel with mentioned methods because the kernel does
  not match initrd.

  * It's a regression because for Focal it was working before.

  * Issue was reproduced also on Bionic.

  * The proposed fixed by Stefan Bader adds a hook in
  /etc/kernel/postinst.d/ so installkernel will relink the initrd. The
  kernel DEB packages should not be affected.

  * The solution from Stefan (first patch) was tested by the bug
  reporter (niklas.schne...@ibm.com).

  [Test Plan]

  * Build a kernel
  * sudo installkernel 5.7.0-rc4-06500-gb67ea026badd bzImage System.map /boot
  * Check if /boot/initrd or /initrd symlink to the new initrd

  [Where problems could 

[Kernel-packages] [Bug 1926081] Re: nr_writeback memory leak in kernel 4.15.0-137+

2021-04-27 Thread Andrew Taylor
Good news on the custom -144 kernel you provided:

root@jenkins-lon02-02-general-swarm-node-03:~# uname -r
4.15.0-144-generic

root@jenkins-lon02-02-general-swarm-node-03:~# dpkg -l | grep 144
ii  linux-image-unsigned-4.15.0-144-generic 4.15.0-144.148~LP1926081.1  
amd64Linux kernel image for version 4.15.0 on 64 bit x86 SMP
ii  linux-modules-4.15.0-144-generic4.15.0-144.148~LP1926081.1  
amd64Linux kernel extra modules for version 4.15.0 on 64 
bit x86 SMP

root@jenkins-lon02-02-general-swarm-node-03:~# uptime
 08:53:37 up 48 min,  1 user,  load average: 1.22, 3.54, 3.05

root@jenkins-lon02-02-general-swarm-node-03:~# grep "writeback" /proc/vmstat
nr_writeback 0
nr_writeback_temp 0

I've run through my testcase 3 times on this new kernel and I've not
seen any permanent increase in the `nr_writeback` value, it always
returns to zero, which is great.

So from my end, this looks really good - is there anything else you'd
like me to do or test, or is this good enough to pull them in for the
-144 update?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926081

Title:
  nr_writeback memory leak in kernel 4.15.0-137+

Status in linux package in Ubuntu:
  In Progress

Bug description:
  
  Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a 
memory leak due to the inclusion of patch from the upstream kernel, but not the 
fix for that patch which was released later.

  This issue manifests itself as an increasing amount of memory used by
  the writeback queue, which never returns to zero. This can been seen
  either as the value of `nr_writeback` in /proc/vmstat, or the value of
  `Writeback` in /proc/meminfo.

  Ordinarily these values should be at or around zero, but on our
  servers we observe the `nr_writeback` value increasing to over 8
  million, (32GB of memory), at which point it isn't long before the
  system IO slows to a crawl (tens of Kb/s). Our servers have 256GB of
  memory, and are performing many CI related activities - this issue
  appears to be related to concurrent writing to disk, and can be
  demonstrated with a simple testcase (see later).

  On our heavily used systems this memory leak can result in an unstable
  server after 2-3 days, requiring a reboot to fix it.

  After much investigation the issue appears to be because the patch
  "mm: memcontrol: fix excessive complexity in memory.stat reporting"
  was brought in to the 4.15.0-137 Ubuntu kernel (see
  https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of
  " Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)",
  however in the mainline kernel there was a follow up patch because
  this initial patch introduced concurrency issues. The patch "mm:
  memcontrol: fix NR_WRITEBACK leak in memcg and system stats" is
  required, and should be brought into the Ubuntu packaged kernel to fix
  the issues reported.

  The required patch is here:
  
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
  and was committed a few weeks after the original (broken) patch:
  
https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da

  I have checked the release notes for Ubuntu versions -137 to -143, and
  none include this second patch that should fix the issue. (I checked
  https://people.canonical.com/~kernel/info/kernel-version-map.html for
  all the kernel versions, and then visited each changelog page in turn,
  e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking
  for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system
  stats").

  We do not observe this on the 5.4.0 kernel (supported HWE kernel on
  18.05.5), which includes this second patch. That kernel may also
  include other patches, so we do not know if any other fixes are also
  required, but the one we have linked above seems to definitely be
  needed, and seems to match our symptoms.

  Testcase:

  The following is enough to permanently increase the value of
  `nr_writeback` on our systems (by about 2000 during most executions):

  ```
  date
  grep nr_writeback /proc/vmstat
  mkdir -p /docker/testfiles/{1..5}

  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/4/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/5/file.% bs=4k count=10 status=none' &

  wait $(jobs -p)
  grep nr_writeback /proc/vmstat
  date
  ```

  Subsequent ite

[Kernel-packages] [Bug 1924238] Re: Fix no picture from HDMI when it's plugged after boot

2021-04-27 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
focal' to 'verification-done-focal'. If the problem still exists, change
the tag 'verification-needed-focal' to 'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1924238

Title:
  Fix no picture from HDMI when it's plugged after boot

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Confirmed
Status in linux-oem-5.10 package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Won't Fix
Status in linux-oem-5.10 source package in Focal:
  Fix Committed
Status in linux source package in Hirsute:
  Confirmed
Status in linux-oem-5.10 source package in Hirsute:
  Invalid

Bug description:
  [Impact]
  On Intel CML desktop, there's no HDMI output when the cable is not
  connected pre-boot.

  [Fix]
  Properly handle lane polarity so the driver can write different values
  to the register to enable the port.

  [Test]
  1. Boot with DP display.
  2. Connect HDMI under GNOME desktop.
  3. No picture on HDMI monitor.
  With the fix applied, the issue is resolved.

  [Where problems could occur]
  If the BIOS VBT table is not correct, which did happen in the pase, this
  fix may break those ports.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1924238/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1924207] Re: [SRU][F:OEM-5.10/G/H] add realtek 8852 bluetooth support

2021-04-27 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
focal' to 'verification-done-focal'. If the problem still exists, change
the tag 'verification-needed-focal' to 'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1924207

Title:
  [SRU][F:OEM-5.10/G/H] add realtek 8852 bluetooth support

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Fix Committed
Status in linux-oem-5.10 package in Ubuntu:
  New
Status in linux-oem-5.10 source package in Focal:
  Fix Committed
Status in linux source package in Groovy:
  Fix Committed
Status in linux source package in Hirsute:
  Fix Committed

Bug description:
  SRU justification:

  [Impact]
  Realtek 8852A bluetooth can not work because of no support in 5.10- kernel.

  [Fix]
  Add realtek 8852 bluetooth ID in driver.
  Chip firmware is in another SRU.

  [Test]
  Verified on hardware with bluetooth headset and file transfer, all good.

  [Where problems could occur]
  The bluetooth chip 8852A may fail to work.
  It should be low risk for adding ID for specfic hardware chip.
  Unstable kernel already got it, only for F/G/H.

  Backport for commit 0d484db60f ("Bluetooth: btusb: btrtl: Add support for 
RTL8852A")
  Because commit 6f9ff24645f ("Bluetooth: btrtl: Refine the ic_id_table for 
clearer and more regular") changes the macro of IC_INFO, use the old way to add 
the IDs for 8852A, no function changes.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1924207/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1922768] Re: Update - Fix no screen show on display after S3 on CML-R

2021-04-27 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
focal' to 'verification-done-focal'. If the problem still exists, change
the tag 'verification-needed-focal' to 'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1922768

Title:
  Update - Fix no screen show on display after S3 on CML-R

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Fix Released
Status in linux-oem-5.10 package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  New
Status in linux-oem-5.10 source package in Focal:
  Fix Committed
Status in linux source package in Hirsute:
  Fix Released
Status in linux-oem-5.10 source package in Hirsute:
  Invalid

Bug description:
  [Impact]
  On CML-R, after S3, No screen show on all three connector(3*DP).

  [Fix]
  Here's v4 patch and has been landed on drm-tip,
  
https://patchwork.freedesktop.org/patch/msgid/20210217180016.1937401-1-ly...@redhat.com,
  so revert the old and resend the v4 patch. 
  For Legacy S3 suspend/resume GEN9 BC needs to enable and setup TGP PCH.

  [Test Case]
  1. Connected the monitor on one of 3*DP on CML-R.
  2. Suspend&resume the machine.
  3. Check the monitor can output something.

  [Where problems could occur]
  Just Enable the hpd detection in IRQ installer and during suspend&resume.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1922768/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1922403] Re: hirsute beta desktop AMD64 ISO kernel panic on boot when booting using UEFI

2021-04-27 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
focal' to 'verification-done-focal'. If the problem still exists, change
the tag 'verification-needed-focal' to 'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1922403

Title:
  hirsute beta desktop AMD64 ISO kernel panic on boot when booting using
  UEFI

Status in linux package in Ubuntu:
  Fix Released
Status in linux-oem-5.10 package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Invalid
Status in linux-oem-5.10 source package in Focal:
  Confirmed
Status in linux source package in Hirsute:
  Fix Released
Status in linux-oem-5.10 source package in Hirsute:
  Invalid

Bug description:
  I've tried to boot the Ubuntu 21.04 desktop beta Live CD (AMD64;
  http://releases.ubuntu.com/21.04/ubuntu-21.04-beta-desktop-amd64.iso)
  inside a Hyper-V Gen 2 Virtual Machine with UEFI enabled.

  The GRUB boot menu loads, and I continue with the default option. I
  immediately get a kernel panic (screenshot attached).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1922403/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1922171] Re: Handle Intel Wifi firmware disconnection

2021-04-27 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
focal' to 'verification-done-focal'. If the problem still exists, change
the tag 'verification-needed-focal' to 'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1922171

Title:
  Handle Intel Wifi firmware disconnection

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Fix Released
Status in linux-oem-5.10 package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Won't Fix
Status in linux-oem-5.10 source package in Focal:
  Fix Committed
Status in linux source package in Hirsute:
  Fix Released
Status in linux-oem-5.10 source package in Hirsute:
  Won't Fix

Bug description:
  
  [Impact]
  Intel Wifi firmware may crash when it's connected to B/G wireless.

  [Fix]
  There's a new "feature" that when firmware thinks there are too much
  noise in the current frequency, it will automatically disconnect
  wifi and expect software/OS to change channel/frequency and reconnect.
  Otherwise, firmware crashes.

  [Test]
  [ 2651.943142] wlp0s20f3: associate with 00:24:a5:b5:f8:93 (try 1/3)
  [ 2651.951043] wlp0s20f3: RX AssocResp from 00:24:a5:b5:f8:93 (capab=0x421 
status=0 aid=1)
  [ 2651.962960] wlp0s20f3: associated
  [ 2651.966183] IPv6: ADDRCONF(NETDEV_CHANGE): wlp0s20f3: link becomes ready
  [ 2651.972582] wlp0s20f3: Driver requested disconnection from AP 
00:24:a5:b5:f8:93
  [ 2654.641627] wlp0s20f3: authenticate with 00:24:a5:b5:f8:93 

  Now it's "Driver requested disconnection" instead of firmware crash.

  [Where problems could occur]
  The first two patches on 80211 only provide new hook and don't bring any
  functional change.

  The third patch achieves the "feature" by removing cap
  IEEE80211_HE_PHY_CAP0_CHANNEL_WIDTH_SET_40MHZ_IN_2G. I am no expert on
  80211, but if there's any AP that doesn't support 20MHZ for 2.4G, the
  reconnecting may fail.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1922171/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1922372] Re: i915 doesn't support some high pixel clock 4k * 60Hz monitors

2021-04-27 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
focal' to 'verification-done-focal'. If the problem still exists, change
the tag 'verification-needed-focal' to 'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1922372

Title:
  i915 doesn't support some high pixel clock 4k * 60Hz monitors

Status in OEM Priority Project:
  Triaged
Status in linux package in Ubuntu:
  Fix Released
Status in linux-oem-5.10 package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Invalid
Status in linux-oem-5.10 source package in Focal:
  Fix Committed

Bug description:
  [Impact]

   * Some 4K monitors can not display as maximum resolution from i915
  graphic.

   * In some 4k monitors, it's support higher pixel clock

  The following is the case I have:

  Modeline"Mode 0" 533.25 3840 3888 3920 4000 2160 2163 2168
   +hsync -vsync

  Which will be dropped because the mode rate is greater than i915 maximum data 
rate.
  kernel: [drm:drm_mode_debug_printmodeline [drm]] Modeline "3840x2160": 60 
533250 3840 3888 3920 4000 2160 2163 2168  0x48 0x9
  kernel: [drm:drm_mode_prune_invalid [drm]] Not using 3840x2160 mode: 
CLOCK_HIGH

  The BDB version of Intel vBIOS is 237
  kernel: i915 :00:02.0: [drm:intel_bios_init [i915]] VBT signature "$VBT 
TIGERLAKE  ", BDB version 237

  In old i915 parsing rule (for greater than v216), the common rate is decoded 
as 16200
  kernel: i915 :00:02.0: [drm:intel_dp_print_rates [i915]] common rates: 
162000

  Since the Intel updated the parsing rule (for greater then 230). the common 
rate is up to 54
  kernel: i915 :00:02.0: [drm:intel_dp_print_rates [i915]] common rates: 
162000, 27,
   54

  There are 4 lanes support.
  i915 :00:02.0: [drm:intel_dp_link_train_phy [i915]] [CONNECTOR:184:DP-2] 
Link
  Training passed at link rate = 162000, lane count = 4, at DPRX

  In this monitor, the max rate (max_link_clock * max_lanes) is:
  162000 * 4 = 648000  # if using old parsing rule (> 210)
  54 * 4 = 216 # if using updated parsing rule (> 230)

  the maximum mode rate is
  DIV_ROUND_UP(pixel_clock * bpp, 8);

  the bpp here is minimum bpp, which is 6 * 3 = 18
  ...
   max bpc: 12
    range: (6, 12)
  ...
  thus:
  533250 * 18 + 8 - 1 / 8 = 1199813 # this is maximum mode rate of this monitor.

  [Fix]

   * It needs to use the updated parsing table (intel BDB table version
  > 230) for supporting high pixel clock monitors.

  [Test Plan]

   * Steps to reproduce
    1. Connect a high pixel clock monitor (533KHz in my case) to i915 graphic 
which vbios version is v237 (In my case:
   ModelName "U2879G6"
   VendorName "AOC"

    2. Check the display setting, expect a 3840*2160*60Hz option but
  there is not 3840*2160*60Hz option.

   * if upgrade drm debugging level then you will see the modeline be dropped 
because of high clock.
  kernel: [drm:drm_mode_prune_invalid [drm]] Not using 3840x2160 mode: 
CLOCK_HIGH

   * after applying the change, the resolution work good.

  [Where problems could occur]

   * This change considered the backward compatibility, which will check
  the BDB version before applying different parsing rule.

   * From software perspective, the monitor will show nothing if Intel
  vBIOS using BDB > 230 with undefined dp_max_link_rate field.

   * Otherwise, it looks quite ok.

To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/1922372/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1921345] Re: Support MIPI camera through Intel IPU6

2021-04-27 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
focal' to 'verification-done-focal'. If the problem still exists, change
the tag 'verification-needed-focal' to 'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1921345

Title:
  Support MIPI camera through Intel IPU6

Status in HWE Next:
  New
Status in linux-firmware package in Ubuntu:
  Invalid
Status in linux-oem-5.10 package in Ubuntu:
  Invalid
Status in linux-firmware source package in Focal:
  Fix Committed
Status in linux-oem-5.10 source package in Focal:
  Fix Committed
Status in linux-firmware source package in Hirsute:
  Invalid
Status in linux-oem-5.10 source package in Hirsute:
  Invalid

Bug description:
  [SRU Justification]

  [Impact]

  There are new platforms with MIPI camera based on Intel IPU6(Imaging
  Processing Unit version 6) currently unsupported in Ubuntu.

  [Fix]

  Intel IPU6 can be enabled by integration of following kernel driver,
  firmware, userspace HAL libraries as well as a GStreamer source element:

* https://github.com/intel/ipu6-drivers
* https://github.com/intel/ipu6-camera-bins
* https://github.com/intel/ipu6-camera-hal
* https://github.com/intel/icamerasrc

  This patchset took kernel patches from intel/ipu6-drivers.

  [Test Case]

  With kernel/firmware properly installed, the hardware should be ready for
  further development:

$ dmesg | grep ipu
intel-ipu6 intel-ipu: enabling device ( -> 0002)
intel-ipu6 intel-ipu: Device 0x9a19 (rev: 0x1)
intel-ipu6 intel-ipu: physical base address 0x605400
intel-ipu6 intel-ipu: mapped as: 0x97793328
intel-ipu6 intel-ipu: IPU in secure mode
intel-ipu6 intel-ipu: IPC reset done
intel-ipu6 intel-ipu: cpd file name: intel/ipu6_fw.bin
intel-ipu6 intel-ipu: FW version: 20201222
intel-ipu6 intel-ipu: Sending BOOT_LOAD to CSE
intel-ipu6 intel-ipu: Sending AUTHENTICATE_RUN to CSE
intel-ipu6 intel-ipu: CSE authenticate_run done
intel-ipu6 intel-ipu: IPU driver version 1.0
intel-ipu6-psys intel-ipu6-psys0: pkg_dir entry count:8
intel-ipu6-psys intel-ipu6-psys0: psys probe minor: 0
intel-ipu6-isys intel-ipu6-isys0: bind ov01a1s 20-0036 nlanes is 1
  port is 1
intel-ipu6-isys intel-ipu6-isys0: All sensor registration completed.
intel-ipu6-isys intel-ipu6-isys0: stream on ov01a1s 20-0036

  There should be nearly 24 video4linux devices created under /dev.

  [Where problems could occur]

  MIPI camera through Intel IPU6 takes also firmware blobs loaded in
  runtime from user space, addtional softwares are also required to
  fully enable it for oridinary use. The exposed video devices are hidden
  from general users and a relay daemon+v4l2loopback is used to enable
  use from existing applications.

  >From kernel's point of view, there is still a known issue that it takes
  root priviledge to access these devices.

  [Other Info]

  So far Intel has no plan to commit this driver to upstream yet, so it's
  only nominated for oem-5.10. It will only be nominated to generic
  kernels when the plan/requirements have changed.

  The original driver Kconfig would disable VIDEO_IPU3_CIO2, but that's
  reverted to avoid unnecessary changes to existing users.

  == original bug description ==

  The Intel imaging processing unit version 6, found in Intel SoCs and
  used for capturing images and video from a camera sensor is enabled by
  integration of following kernel driver, firmware, userspace HAL
  libraries as well as a GStreamer source element:

    * https://github.com/intel/ipu6-drivers
    * https://github.com/intel/ipu6-camera-bins
    * https://github.com/intel/ipu6-camera-hal
    * https://github.com/intel/icamerasrc

  With all components properly installed, the hardware should be ready
  for further development:

    intel-ipu6 intel-ipu: enabling device ( -> 0002)
    intel-ipu6 intel-ipu: Device 0x9a19 (rev: 0x1)
    intel-ipu6 intel-ipu: physical base address 0x605400
    intel-ipu6 intel-ipu: mapped as: 0x97793328
    intel-ipu6 intel-ipu: IPU in secure mode
    intel-ipu6 intel-ipu: IPC reset done
    intel-ipu6 intel-ipu: cpd file name: intel/ipu6_fw.bin
    intel-ipu6 intel-ipu: FW version: 20201222
    intel-ipu6 intel-ipu: Sending BOOT_LOAD to CSE
    intel-ipu6 intel-ipu: Sending AUTHENTICATE_RUN to CSE
    intel-ipu6 intel-ipu: CSE authenticate_run done
    

[Kernel-packages] [Bug 1909005] Re: Ubuntu does not resume (wake up) from suspend

2021-04-27 Thread motoroler
Same problem on Dell Latitude 5300. Latest BIOS installed - doesn't help.
Kernel: Linux laptop 5.4.0-72-generic #80-Ubuntu SMP Mon Apr 12 17:35:00 UTC 
2021 x86_64 x86_64 x86_64 GNU/Linux

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1909005

Title:
  Ubuntu does not resume (wake up) from suspend

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Whenever Ubuntu gets into suspend state, I cannot wake it up. 
  -Keystrokes start the fans but screen does not turn on and Ubuntu still seems 
to be suspended because in my teamviewer account the computer is still offline.
  -Power button clicks do not help
  -I always have to turn off computer by holding power button and then turn it 
on again.

  The only kernel that works is the following: "linux-image-5.0.0-1070
  -oem-osp1". But with this old kernel I run into different problems.

  I have the latest BIOS version from Dell (released 2020-11-27) and the
  latest updates in Ubuntu 20.04.

  I will post logs during suspend and important logs (found in Logs gui
  tool)

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.4.0-58-generic 5.4.0-58.64
  ProcVersionSignature: Ubuntu 5.4.0-58.64-generic 5.4.73
  Uname: Linux 5.4.0-58-generic x86_64
  ApportVersion: 2.20.11-0ubuntu27.14
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  philip 2340 F pulseaudio
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Tue Dec 22 13:59:14 2020
  DistributionChannelDescriptor:
   # This is the distribution channel descriptor for the OEM CDs
   # For more information see 
http://wiki.ubuntu.com/DistributionChannelDescriptor
   canonical-oem-somerville-bionic-amd64-20190418-59+beaver-osp1-loras+X18
  InstallationDate: Installed on 2019-12-04 (383 days ago)
  InstallationMedia: Ubuntu 18.04 "Bionic" - Build amd64 LIVE Binary 
20190418-12:10
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 002: ID 0c45:671e Microdia Integrated_Webcam_HD
   Bus 001 Device 003: ID 0cf3:e009 Qualcomm Atheros Communications 
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: Dell Inc. Inspiron 3593
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.4.0-58-generic 
root=UUID=26003f0f-3564-472f-984c-a9a00e480fd0 ro mem_sleep_default=deep 
tsc=reliable quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-5.4.0-58-generic N/A
   linux-backports-modules-5.4.0-58-generic  N/A
   linux-firmware1.187.6
  SourcePackage: linux
  UpgradeStatus: Upgraded to focal on 2020-11-04 (47 days ago)
  dmi.bios.date: 11/13/2020
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: 1.13.0
  dmi.board.name: 04N9HV
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 10
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvr1.13.0:bd11/13/2020:svnDellInc.:pnInspiron3593:pvr:rvnDellInc.:rn04N9HV:rvrA00:cvnDellInc.:ct10:cvr:
  dmi.product.family: Inspiron
  dmi.product.name: Inspiron 3593
  dmi.product.sku: 0979
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1909005/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1926081] Re: nr_writeback memory leak in kernel 4.15.0-137+

2021-04-27 Thread Tim Gardner
Andrew - thanks for the testing feedback. We'll get these patches
included in the next SRU cycle.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926081

Title:
  nr_writeback memory leak in kernel 4.15.0-137+

Status in linux package in Ubuntu:
  In Progress

Bug description:
  
  Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a 
memory leak due to the inclusion of patch from the upstream kernel, but not the 
fix for that patch which was released later.

  This issue manifests itself as an increasing amount of memory used by
  the writeback queue, which never returns to zero. This can been seen
  either as the value of `nr_writeback` in /proc/vmstat, or the value of
  `Writeback` in /proc/meminfo.

  Ordinarily these values should be at or around zero, but on our
  servers we observe the `nr_writeback` value increasing to over 8
  million, (32GB of memory), at which point it isn't long before the
  system IO slows to a crawl (tens of Kb/s). Our servers have 256GB of
  memory, and are performing many CI related activities - this issue
  appears to be related to concurrent writing to disk, and can be
  demonstrated with a simple testcase (see later).

  On our heavily used systems this memory leak can result in an unstable
  server after 2-3 days, requiring a reboot to fix it.

  After much investigation the issue appears to be because the patch
  "mm: memcontrol: fix excessive complexity in memory.stat reporting"
  was brought in to the 4.15.0-137 Ubuntu kernel (see
  https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of
  " Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)",
  however in the mainline kernel there was a follow up patch because
  this initial patch introduced concurrency issues. The patch "mm:
  memcontrol: fix NR_WRITEBACK leak in memcg and system stats" is
  required, and should be brought into the Ubuntu packaged kernel to fix
  the issues reported.

  The required patch is here:
  
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
  and was committed a few weeks after the original (broken) patch:
  
https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da

  I have checked the release notes for Ubuntu versions -137 to -143, and
  none include this second patch that should fix the issue. (I checked
  https://people.canonical.com/~kernel/info/kernel-version-map.html for
  all the kernel versions, and then visited each changelog page in turn,
  e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking
  for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system
  stats").

  We do not observe this on the 5.4.0 kernel (supported HWE kernel on
  18.05.5), which includes this second patch. That kernel may also
  include other patches, so we do not know if any other fixes are also
  required, but the one we have linked above seems to definitely be
  needed, and seems to match our symptoms.

  Testcase:

  The following is enough to permanently increase the value of
  `nr_writeback` on our systems (by about 2000 during most executions):

  ```
  date
  grep nr_writeback /proc/vmstat
  mkdir -p /docker/testfiles/{1..5}

  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/4/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/5/file.% bs=4k count=10 status=none' &

  wait $(jobs -p)
  grep nr_writeback /proc/vmstat
  date
  ```

  Subsequent iterations of the test raise it further, and on a system
  doing a lot of writing from a lot of different processes, it can rise
  quickly.

  System details:

  lsb_release -rd
  Description:  Ubuntu 18.04.5 LTS
  Release:  18.04

  Affected kernel: 4.15.0-137 onwards (current latest version tried was
  4.15.0-142)

  e.g.

  apt-cache policy linux-image-4.15.0-141-generic
  linux-image-4.15.0-141-generic:
Installed: 4.15.0-141.145
Candidate: 4.15.0-141.145
Version table:
   *** 4.15.0-141.145 500
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-updates/main amd64 Packages
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-security/main amd64 Packages
  100 /var/lib/dpkg/status

  According to https://wiki.ubuntu.com/KernelTeam/KernelTeamBugPolicies
  I should include additional information from the server, but at this
  stage we have upgraded all our affected systems to 5.4.0, and
  therefore the kernel vers

[Kernel-packages] [Bug 1926081] Re: nr_writeback memory leak in kernel 4.15.0-137+

2021-04-27 Thread Andrew Taylor
Awesome, thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926081

Title:
  nr_writeback memory leak in kernel 4.15.0-137+

Status in linux package in Ubuntu:
  In Progress

Bug description:
  
  Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a 
memory leak due to the inclusion of patch from the upstream kernel, but not the 
fix for that patch which was released later.

  This issue manifests itself as an increasing amount of memory used by
  the writeback queue, which never returns to zero. This can been seen
  either as the value of `nr_writeback` in /proc/vmstat, or the value of
  `Writeback` in /proc/meminfo.

  Ordinarily these values should be at or around zero, but on our
  servers we observe the `nr_writeback` value increasing to over 8
  million, (32GB of memory), at which point it isn't long before the
  system IO slows to a crawl (tens of Kb/s). Our servers have 256GB of
  memory, and are performing many CI related activities - this issue
  appears to be related to concurrent writing to disk, and can be
  demonstrated with a simple testcase (see later).

  On our heavily used systems this memory leak can result in an unstable
  server after 2-3 days, requiring a reboot to fix it.

  After much investigation the issue appears to be because the patch
  "mm: memcontrol: fix excessive complexity in memory.stat reporting"
  was brought in to the 4.15.0-137 Ubuntu kernel (see
  https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of
  " Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)",
  however in the mainline kernel there was a follow up patch because
  this initial patch introduced concurrency issues. The patch "mm:
  memcontrol: fix NR_WRITEBACK leak in memcg and system stats" is
  required, and should be brought into the Ubuntu packaged kernel to fix
  the issues reported.

  The required patch is here:
  
https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe
  and was committed a few weeks after the original (broken) patch:
  
https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da

  I have checked the release notes for Ubuntu versions -137 to -143, and
  none include this second patch that should fix the issue. (I checked
  https://people.canonical.com/~kernel/info/kernel-version-map.html for
  all the kernel versions, and then visited each changelog page in turn,
  e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking
  for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system
  stats").

  We do not observe this on the 5.4.0 kernel (supported HWE kernel on
  18.05.5), which includes this second patch. That kernel may also
  include other patches, so we do not know if any other fixes are also
  required, but the one we have linked above seems to definitely be
  needed, and seems to match our symptoms.

  Testcase:

  The following is enough to permanently increase the value of
  `nr_writeback` on our systems (by about 2000 during most executions):

  ```
  date
  grep nr_writeback /proc/vmstat
  mkdir -p /docker/testfiles/{1..5}

  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/4/file.% bs=4k count=10 status=none' &
  seq -w 1 10 | xargs -n1 -I% sh -c 'dd if=/dev/urandom 
of=/docker/testfiles/5/file.% bs=4k count=10 status=none' &

  wait $(jobs -p)
  grep nr_writeback /proc/vmstat
  date
  ```

  Subsequent iterations of the test raise it further, and on a system
  doing a lot of writing from a lot of different processes, it can rise
  quickly.

  System details:

  lsb_release -rd
  Description:  Ubuntu 18.04.5 LTS
  Release:  18.04

  Affected kernel: 4.15.0-137 onwards (current latest version tried was
  4.15.0-142)

  e.g.

  apt-cache policy linux-image-4.15.0-141-generic
  linux-image-4.15.0-141-generic:
Installed: 4.15.0-141.145
Candidate: 4.15.0-141.145
Version table:
   *** 4.15.0-141.145 500
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-updates/main amd64 Packages
  500 http://mirrors.service.networklayer.com/ubuntu 
bionic-security/main amd64 Packages
  100 /var/lib/dpkg/status

  According to https://wiki.ubuntu.com/KernelTeam/KernelTeamBugPolicies
  I should include additional information from the server, but at this
  stage we have upgraded all our affected systems to 5.4.0, and
  therefore the kernel versions do not match those with this issue.

  We likely have other servers used 

[Kernel-packages] [Bug 1924685] Re: No sound output/input available after installing 21.04

2021-04-27 Thread heytimc
Dell XPS-17 1900 has the same issue

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1924685

Title:
  No sound output/input available after installing 21.04

Status in OEM Priority Project:
  Won't Fix
Status in Release Notes for Ubuntu:
  New
Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Image: Hirsute 21.04 (20210415 daily build)

  Device: Dell Precision 5750

  After installing 21.04, the sound card is unavailable. In Sound
  Settings, there is only one choice: "Dummy Output" .

  The only way to hear sound is to connect a Bluetooth speaker.

  Note: this device was enabled with 20.04 and 5.6.0-1035-oem kernel:

  https://certification.ubuntu.com/hardware/202002-27726

  ProblemType: Bug
  DistroRelease: Ubuntu 21.04
  Package: linux-image-5.11.0-14-generic 5.11.0-14.15
  ProcVersionSignature: Ubuntu 5.11.0-14.15-generic 5.11.12
  Uname: Linux 5.11.0-14-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.20.11-0ubuntu62
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  u  1561 F pulseaudio
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Fri Apr 16 15:10:05 2021
  InstallationDate: Installed on 2021-04-16 (0 days ago)
  InstallationMedia: Ubuntu 21.04 "Hirsute Hippo" - Beta amd64 (20210415)
  MachineType: Dell Inc. Precision 5750
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.11.0-14-generic 
root=UUID=2562d52a-de88-45e9-9d0a-3a79e48b1638 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-5.11.0-14-generic N/A
   linux-backports-modules-5.11.0-14-generic  N/A
   linux-firmware 1.197
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 12/30/2020
  dmi.bios.release: 1.6
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: 1.6.3
  dmi.board.vendor: Dell Inc.
  dmi.chassis.type: 10
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvr1.6.3:bd12/30/2020:br1.6:svnDellInc.:pnPrecision5750:pvr:rvnDellInc.:rn:rvr:cvnDellInc.:ct10:cvr:
  dmi.product.family: Precision
  dmi.product.name: Precision 5750
  dmi.product.sku: 0990
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/1924685/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1926284] Re: `zfs send`dry-run estimation (`-n`) (perhaps more) broken

2021-04-27 Thread Christopher J. Ruwe
I have tried to reproduce the error on a vboxed fresh install of 21.04
and on a minimal install from 20.04, which I sequentially upgraded over
20.10 to 21.04. I could not reproduce the error on these minimal
installations.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926284

Title:
  `zfs send`dry-run estimation (`-n`) (perhaps more) broken

Status in zfs-linux package in Ubuntu:
  New

Bug description:
  Calling `zfs send -v` is used for size estimation, it is expected to
  return (called on focal here)

  ```bash
  [cjr@hoare:/home/cjr]
  $ zfs send -n -v 
stank/backup/mccarthy/rpool/USERDATA/<...>@zrepl-20210426_094232_000 
  full send of 
stank/backup/mccarthy/rpool/USERDATA/<...>@zrepl-20210426_094232_000 estimated 
size is 126G
  total estimated size is 126G
  ```

  On hirsute, this feature is broken and returns
  ```bash
  [cjr@mccarthy:/home/cjr]
  $ /usr/sbin/zfs send -n -v rpool/USERDATA/<...>@zrepl-20210427_103846_000
  warning: cannot send 'rpool/USERDATA/<...>@zrepl-20210427_103846_000': 
Unknown error 103
  ```

  which breaks my backup. Considering that it worked fine with focal and
  groovy, I suspect the upgraded zfs packages to be at fault (although I
  am not sure which of these).

  Thanks for your consideration.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1926284/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1821152] Re: lxc-test-no-new-privs failed with Temporary failure resolving 'archive.ubuntu.com'

2021-04-27 Thread Krzysztof Kozlowski
focal/azure-5.8 5.8.0-1030.32~20.04.1-azure

** Tags added: 5.8 sru-20210412

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1821152

Title:
  lxc-test-no-new-privs failed with Temporary failure resolving
  'archive.ubuntu.com'

Status in ubuntu-kernel-tests:
  Triaged
Status in linux-azure package in Ubuntu:
  New
Status in linux-kvm package in Ubuntu:
  New

Bug description:
  It seems this failure only exist in KVM instances.

FAIL: lxc-tests: lxc-test-no-new-privs (37s)
---
+ DONE=0
+ trap cleanup EXIT SIGHUP SIGINT SIGTERM
+ mkdir -p /etc/lxc/
+ cat
+ ARCH=i386
+ type dpkg
++ dpkg --print-architecture
+ ARCH=amd64
+ lxc-create -t download -n c1 -- -d ubuntu -r xenial -a amd64
Setting up the GPG keyring
Downloading the image index
Downloading the rootfs
Downloading the metadata
The image cache is now ready
Unpacking the rootfs

---
You just created an Ubuntu xenial amd64 (20190320_07:42) container.

To enable SSH, run: apt install openssh-server
No default root or user password are set by LXC.
+ echo 'lxc.no_new_privs = 1'
+ lxc-start -n c1
++ lxc-info -n c1 -p -H
+ p1=8818
+ '[' 8818 '!=' -1 ']'
+ sleep 5s
+ lxc-attach -n c1 --clear-env -- apt update -y

WARNING: apt does not have a stable CLI interface. Use with caution in 
scripts.

Err:1 http://archive.ubuntu.com/ubuntu xenial InRelease
  Temporary failure resolving 'archive.ubuntu.com'
Err:2 http://security.ubuntu.com/ubuntu xenial-security InRelease
  Temporary failure resolving 'security.ubuntu.com'
Err:3 http://archive.ubuntu.com/ubuntu xenial-updates InRelease
  Temporary failure resolving 'archive.ubuntu.com'
Reading package lists...
Building dependency tree...
Reading state information...
All packages are up to date.
W: Failed to fetch http://archive.ubuntu.com/ubuntu/dists/xenial/InRelease  
Temporary failure resolving 'archive.ubuntu.com'
W: Failed to fetch 
http://archive.ubuntu.com/ubuntu/dists/xenial-updates/InRelease  Temporary 
failure resolving 'archive.ubuntu.com'
W: Failed to fetch 
http://security.ubuntu.com/ubuntu/dists/xenial-security/InRelease  Temporary 
failure resolving 'security.ubuntu.com'
W: Some index files failed to download. They have been ignored, or old ones 
used instead.
+ lxc-attach -n c1 --clear-env -- apt install -y gcc make

WARNING: apt does not have a stable CLI interface. Use with caution in 
scripts.

Reading package lists...
Building dependency tree...
Reading state information...
The following additional packages will be installed:
  binutils cpp cpp-5 gcc-5 libasan2 libatomic1 libc-dev-bin libc6-dev 
libcc1-0
  libcilkrts5 libgcc-5-dev libgomp1 libisl15 libitm1 liblsan0 libmpc3 
libmpfr4
  libmpx0 libquadmath0 libtsan0 libubsan0 linux-libc-dev manpages 
manpages-dev
Suggested packages:
  binutils-doc cpp-doc gcc-5-locales gcc-multilib autoconf automake libtool
  flex bison gdb gcc-doc gcc-5-multilib gcc-5-doc libgcc1-dbg libgomp1-dbg
  libitm1-dbg libatomic1-dbg libasan2-dbg liblsan0-dbg libtsan0-dbg
  libubsan0-dbg libcilkrts5-dbg libmpx0-dbg libquadmath0-dbg glibc-doc
  make-doc man-browser
The following NEW packages will be installed:
  binutils cpp cpp-5 gcc gcc-5 libasan2 libatomic1 libc-dev-bin libc6-dev
  libcc1-0 libcilkrts5 libgcc-5-dev libgomp1 libisl15 libitm1 liblsan0 
libmpc3
  libmpfr4 libmpx0 libquadmath0 libtsan0 libubsan0 linux-libc-dev make
  manpages manpages-dev
0 upgraded, 26 newly installed, 0 to remove and 0 not upgraded.
Need to get 28.7 MB of archives.
After this operation, 102 MB of additional disk space will be used.
Err:1 http://archive.ubuntu.com/ubuntu xenial/main amd64 libmpfr4 amd64 
3.1.4-1
  Temporary failure resolving 'archive.ubuntu.com'
Err:2 http://archive.ubuntu.com/ubuntu xenial/main amd64 libmpc3 amd64 
1.0.3-1
  Temporary failure resolving 'archive.ubuntu.com'
Err:3 http://archive.ubuntu.com/ubuntu xenial/main amd64 manpages all 4.04-2
  Temporary failure resolving 'archive.ubuntu.com'
Err:4 http://security.ubuntu.com/ubuntu xenial-security/main amd64 binutils 
amd64 2.26.1-1ubuntu1~16.04.8
  Temporary failure resolving 'archive.ubuntu.com'
Err:5 http://archive.ubuntu.com/ubuntu xenial/main amd64 libisl15 amd64 
0.16.1-1
  Temporary failure resolving 'archive.ubuntu.com'

  
  It's a bit weird that if I run the command manually, it looks OK
  lxc-create -t download -n c1 -- -d ubuntu -r xenial -a amd64
  lxc-start -n c1
  lxc-attach -n c1 --clear-env -- apt update -y
  Hit:1 http://archive.ubuntu.com/ubuntu xenial InRelease
  Get:2 http://archive.ubuntu.com/ubuntu xenial-updates InRelease [109 kB]
  Get:3 http://archive.ubuntu.com

[Kernel-packages] [Bug 1847989] Re: ubuntu_lttng_smoke_test failed to build on Standard_B1ms with D-Azure

2021-04-27 Thread Krzysztof Kozlowski
Focal/azure-5.8 5.8.0-1030.32~20.04.1

** Tags added: 5.8 focal sru-20210412

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1847989

Title:
  ubuntu_lttng_smoke_test failed to build on Standard_B1ms with D-Azure

Status in ubuntu-kernel-tests:
  New
Status in linux-azure package in Ubuntu:
  New
Status in linux-azure source package in Disco:
  Won't Fix

Bug description:
  It looks like the module build has failed on D-Azure.

  Building for 5.0.0-1023-azure
  Building initial module for 5.0.0-1023-azure
  ERROR (dkms apport): kernel package linux-headers-5.0.0-1023-azure is 
not supported
  Error! Bad return status for module build on kernel: 5.0.0-1023-azure 
(x86_64)
  Consult /var/lib/dkms/lttng-modules/2.10.8/build/make.log for more 
information.
  dpkg: error processing package lttng-modules-dkms (--configure):
  installed lttng-modules-dkms package post-installation script 
subprocess returned error exit status 10
  Setting up uuid-dev:amd64 (2.33.1-0.1ubuntu3) ...
  Setting up g++-8 (8.3.0-6ubuntu1) ...
  Setting up libx32gcc-8-dev (8.3.0-6ubuntu1) ...
  Setting up lib32gcc-8-dev (8.3.0-6ubuntu1) ...
  Setting up liblttng-ust-dev:amd64 (2.10.3-1) ...
  Setting up gcc-8-multilib (8.3.0-6ubuntu1) ...
  Setting up g++ (4:8.3.0-1ubuntu3) ...
  update-alternatives: using /usr/bin/g++ to provide /usr/bin/c++ (c++) 
in auto mode
  Setting up build-essential (12.6ubuntu1) ...
  Setting up gcc-multilib (4:8.3.0-1ubuntu3) ...
  Processing triggers for systemd (240-6ubuntu5.7) ...
  Processing triggers for man-db (2.8.5-2) ...
  Processing triggers for libc-bin (2.29-0ubuntu2) ...
  Errors were encountered while processing:
  lttng-modules-dkms

  There once a fix to create swap partition to help the module build (bug 
1791032)
  This has to be checked manually.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1847989/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1925685] Re: [SRU] Patch for flicker and glitching on certain hardware, intel framebuffer,

2021-04-27 Thread Erich Eickmeyer 
Timo, can we get an explanation for the "Won't Fix" status as it relates
to Focal? This directly affects our business as we only use LTS,
therefore Focal in this case.

** Changed in: linux (Ubuntu Focal)
   Status: Won't Fix => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1925685

Title:
  [SRU] Patch for flicker and glitching on certain hardware, intel
  framebuffer,

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Bionic:
  Won't Fix
Status in linux source package in Focal:
  Confirmed
Status in linux source package in Groovy:
  Confirmed
Status in linux source package in Hirsute:
  Confirmed

Bug description:
  Filing this with my Kubuntu Focus (kfocus.org) OEM hat on:

  [Impact]

  We are having screen flickering and glitching issues with some of our
  hardware upon wake from suspend. We have worked with our ODM to figure
  out a fix for this. They had reported there were no issues when
  running Windows on the same hardware. As such, we tested, and found
  that this issue first began as a regression in kernel 5.0 (did not
  exist in kernel 4.18 per our tests).

  We identified a patch via
  https://gitlab.freedesktop.org/drm/intel/-/issues/272 in which this
  has been solved. Per our testing by recompiling the kernel, this
  completely fixes our hardware issue. As of 4-21, this fix has been
  merged into the Linux kernel per Timo Aaltonen, and will be included
  in the kernel in the 5.13 release.

  Our hardware ships with Kubuntu 20.04 LTS, which means the 5.13 kernel
  will not see these machines, at least in the forseeable future. As
  such, we request that this patch be added to the kernel. Per our
  testing, this patch is straightforward to add and works flawlessly.

  The patch that works best was created in collaboration with Kai-Heng
  Feng, is attached to this bug report, and can be found here:
  
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1925685/+attachment/5491421/+files
  /drm-intel-both.patch

  Until this is fixed, we have a whole batch of hardware we cannot sell,
  so, as an OEM, this is a high priority.

  [Test Plan]

   * Install Kubuntu on an affected Kubuntu Focus M2 computer (not in
  the hands of customers at this time)

   * Notice screen glitching/flickering after wake-from-suspend.

   * Install kernel compiled with the attached patch. Boot from patched
  kernel.

   * Suspend laptop, resume. No glitches.

  [Where problems could occur]

   * Although this solves the problem for us and has been confirmed to
  work with the Intel developers that developed this patch, it could
  cause another display type to have problems. This is unlikely as it
  has been vetted by Intel and by the mainline Linux kernel developers.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1925685/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1926284] Re: `zfs send`dry-run estimation (`-n`) (perhaps more) broken

2021-04-27 Thread Christopher J. Ruwe
For reasons I do not understand, the kernel was not upgraded with the
`dist-upgrade` meant to lift me from groovy to hirsute. Neither my
shell-history nor the apt-logs contain any hint of a removal of the
"versionless" `linux-image-generic` package.

With proper 5.11 in place, `zfs send`s work again. The issue is
definitely not with the zfs packages. I do not have any idea how to
trace the root-cause further and suggest to close the issue.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926284

Title:
  `zfs send`dry-run estimation (`-n`) (perhaps more) broken

Status in zfs-linux package in Ubuntu:
  New

Bug description:
  Calling `zfs send -v` is used for size estimation, it is expected to
  return (called on focal here)

  ```bash
  [cjr@hoare:/home/cjr]
  $ zfs send -n -v 
stank/backup/mccarthy/rpool/USERDATA/<...>@zrepl-20210426_094232_000 
  full send of 
stank/backup/mccarthy/rpool/USERDATA/<...>@zrepl-20210426_094232_000 estimated 
size is 126G
  total estimated size is 126G
  ```

  On hirsute, this feature is broken and returns
  ```bash
  [cjr@mccarthy:/home/cjr]
  $ /usr/sbin/zfs send -n -v rpool/USERDATA/<...>@zrepl-20210427_103846_000
  warning: cannot send 'rpool/USERDATA/<...>@zrepl-20210427_103846_000': 
Unknown error 103
  ```

  which breaks my backup. Considering that it worked fine with focal and
  groovy, I suspect the upgraded zfs packages to be at fault (although I
  am not sure which of these).

  Thanks for your consideration.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1926284/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1919177] Re: Azure: issues with accelerated networking on Hirsute

2021-04-27 Thread Brian Murray
** Changed in: cloud-init (Ubuntu)
Milestone: ubuntu-21.04 => hirsute-updates

** Changed in: linux-azure (Ubuntu)
Milestone: ubuntu-21.04 => hirsute-updates

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1919177

Title:
  Azure: issues with accelerated networking on Hirsute

Status in cloud-init:
  Incomplete
Status in cloud-init package in Ubuntu:
  Incomplete
Status in linux-azure package in Ubuntu:
  New
Status in systemd package in Ubuntu:
  New

Bug description:
  [General]

  On Azure, when provisioning a Hirsute VM with Accelerated Networking
  enabled, sometimes part of the cloud-init configuration is not
  applied.

  Especially, in those cases, the public SSH key is not setup properly.

  [how to reproduce]

  Start a VM with AN enabled:

  ```
  az vm create --name "$VM_NAME --resource-group "$GROUP" --location "UK South" 
 --image 
'Canonical:0001-com-ubuntu-server-hirsute-daily:21_04-daily-gen2:latest' --size 
Standard_F8s_v2 --admin-username ubuntu --ssh-key-value "$SSH_KEY" 
--accelerated-networking
  ```

  After a moment, try to SSH: if you succeed, delete and recreate a new
  VM.

  [troubleshooting]

  To be able to connect into the VM, run:

  az vm run-command invoke -g "$GROUP" -n "$VM_NAME" --command-id 
RunShellScript --scripts "sudo -u ubuntu ssh-import-id $LP_USERNAME"
  ```

  In "/run/cloud-init/instance-data.json", I can see:
  ```
   "publicKeys": [
    {
     "keyData": "",
     "path": "/home/ubuntu/.ssh/authorized_keys"
    }
   ],
  ```

  as expected.

  [workaround]

  As mentioned, Azure allows the user to run command into the VM without
  SSH connection. To do so, one can use the Azure CLI:

  az vm run-command invoke -g "$GROUP" -n "$VM_NAME" --command-id
  RunShellScript --scripts "sudo -u ubuntu ssh-import-id $LP_USERNAME"

  This example uses "ssh-import-id" but it's also possible to just echo
  a given public key into /home/ubuntu/.ssh/authorized_keys

  NOTE: this will only solves the SSH issue, I do not know if this bug
  affects other things. If so the user would have to apply those things
  manually.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1919177/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1909814] Re: Keyboard not working

2021-04-27 Thread George Dited
Same problem, my Medion Akoya S15449 keyboard doesn't work in any linux
distro i tried (Ubuntu 20.10,Pop os 20.10, Latest Arch Linux). It's not
been detected by lsusb or lspci. I think it's a driver issue.

I kindly ask to fix. Thank you.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1909814

Title:
  Keyboard not working

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Hello,
  Brand new laptop (Medion), keyboard is only working with the grub menu.
  Mouse is now working since 20.10 have been installed.
  Only the luminosity key are working on the keyboard.
  External usb keyboard works fine.
  I tried to install with usb keyboard disconnected but doesn't change anything.

  ProblemType: Bug
  DistroRelease: Ubuntu 20.10
  Package: linux-image-5.8.0-25-generic 5.8.0-25.26
  ProcVersionSignature: Ubuntu 5.8.0-25.26-generic 5.8.14
  Uname: Linux 5.8.0-25-generic x86_64
  ApportVersion: 2.20.11-0ubuntu50.3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  did4364 F pulseaudio
   /dev/snd/pcmC0D0p:   did4364 F...m pulseaudio
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Fri Jan  1 16:24:12 2021
  InstallationDate: Installed on 2021-01-01 (0 days ago)
  InstallationMedia: Ubuntu 20.10 "Groovy Gorilla" - Release amd64 (20201022)
  MachineType: MEDION S15450
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.8.0-25-generic 
root=UUID=da76ef9f-aca8-4bb0-94a9-03b7cc82a59a ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-5.8.0-25-generic N/A
   linux-backports-modules-5.8.0-25-generic  N/A
   linux-firmware1.190.2
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 11/24/2020
  dmi.bios.release: 5.19
  dmi.bios.vendor: American Megatrends International, LLC.
  dmi.bios.version: 209
  dmi.board.asset.tag: Default string
  dmi.board.name: M15T
  dmi.board.vendor: MEDION
  dmi.board.version: Default string
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 10
  dmi.chassis.vendor: MEDION
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInternational,LLC.:bvr209:bd11/24/2020:br5.19:svnMEDION:pnS15450:pvrDefaultstring:rvnMEDION:rnM15T:rvrDefaultstring:cvnMEDION:ct10:cvrDefaultstring:
  dmi.product.family: Akoya
  dmi.product.name: S15450
  dmi.product.sku: ML-230008 30030452
  dmi.product.version: Default string
  dmi.sys.vendor: MEDION

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1909814/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1926318] [NEW] After suspend the fan doesn't spin up to higher frequency anymore

2021-04-27 Thread Michael Arlt
Public bug reported:

Reproduction: Boot, login, suspend via gnome menu, reactivate and the
problem exists.

Before suspend: fan rotates at about ~ 3200-5900 rpm
After suspend: fan rotates at about ~ 3214-3260 rpm tested until cpu reached 
105 °C / 221 °F

All data according to psensor (lm-sensors) - thermal_zone does not
exist.

$ cd /proc/acpi/thermal_zone
bash: cd: /proc/acpi/thermal_zone: No such file or directory

I will append journalctl with a normal boot and after a line with many
'#' you can see the output after suspending. Hope this helps.

The problem is the same with Ubuntu 21.04.

Hardware: Gigabyte Brix GB-BRR7-4800 Barebone AMD Ryzen 7 4800U

ProblemType: Bug
DistroRelease: Ubuntu 20.10
Package: linux-image-5.8.0-50-generic 5.8.0-50.56
ProcVersionSignature: Ubuntu 5.8.0-50.56-generic 5.8.18
Uname: Linux 5.8.0-50-generic x86_64
ApportVersion: 2.20.11-0ubuntu50.5
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC3:  michael1588 F pulseaudio
 /dev/snd/controlC2:  michael1588 F pulseaudio
 /dev/snd/controlC0:  michael1588 F pulseaudio
 /dev/snd/controlC1:  michael1588 F pulseaudio
CasperMD5CheckResult: skip
CurrentDesktop: ubuntu:GNOME
Date: Tue Apr 27 18:09:05 2021
InstallationDate: Installed on 2021-04-12 (15 days ago)
InstallationMedia: Ubuntu 20.10 "Groovy Gorilla" - Release amd64 (20201022)
MachineType: GIGABYTE GB-BRR7H-4800
ProcFB: 0 amdgpudrmfb
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.8.0-50-generic 
root=UUID=0df56a67-b96b-43dd-8a59-da559fb319e3 ro quiet splash vt.handoff=7
RelatedPackageVersions:
 linux-restricted-modules-5.8.0-50-generic N/A
 linux-backports-modules-5.8.0-50-generic  N/A
 linux-firmware1.190.4
SourcePackage: linux
UpgradeStatus: Upgraded to groovy on 2021-04-22 (5 days ago)
dmi.bios.date: 11/16/2020
dmi.bios.release: 5.16
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: F2
dmi.board.asset.tag: Default string
dmi.board.name: GB-BRR7H-4800
dmi.board.vendor: GIGABYTE
dmi.board.version: 1.x
dmi.chassis.asset.tag: Default string
dmi.chassis.type: 3
dmi.chassis.vendor: Default string
dmi.chassis.version: Default string
dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrF2:bd11/16/2020:br5.16:svnGIGABYTE:pnGB-BRR7H-4800:pvr1.x:rvnGIGABYTE:rnGB-BRR7H-4800:rvr1.x:cvnDefaultstring:ct3:cvrDefaultstring:
dmi.product.family: BRIX
dmi.product.name: GB-BRR7H-4800
dmi.product.sku: 01
dmi.product.version: 1.x
dmi.sys.vendor: GIGABYTE

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed


** Tags: amd64 apport-bug groovy wayland-session

** Attachment added: "journalctl.log"
   
https://bugs.launchpad.net/bugs/1926318/+attachment/5492804/+files/journalctl.log

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926318

Title:
  After suspend the fan doesn't spin up to higher frequency anymore

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Reproduction: Boot, login, suspend via gnome menu, reactivate and the
  problem exists.

  Before suspend: fan rotates at about ~ 3200-5900 rpm
  After suspend: fan rotates at about ~ 3214-3260 rpm tested until cpu reached 
105 °C / 221 °F

  All data according to psensor (lm-sensors) - thermal_zone does not
  exist.

  $ cd /proc/acpi/thermal_zone
  bash: cd: /proc/acpi/thermal_zone: No such file or directory

  I will append journalctl with a normal boot and after a line with many
  '#' you can see the output after suspending. Hope this helps.

  The problem is the same with Ubuntu 21.04.

  Hardware: Gigabyte Brix GB-BRR7-4800 Barebone AMD Ryzen 7 4800U

  ProblemType: Bug
  DistroRelease: Ubuntu 20.10
  Package: linux-image-5.8.0-50-generic 5.8.0-50.56
  ProcVersionSignature: Ubuntu 5.8.0-50.56-generic 5.8.18
  Uname: Linux 5.8.0-50-generic x86_64
  ApportVersion: 2.20.11-0ubuntu50.5
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC3:  michael1588 F pulseaudio
   /dev/snd/controlC2:  michael1588 F pulseaudio
   /dev/snd/controlC0:  michael1588 F pulseaudio
   /dev/snd/controlC1:  michael1588 F pulseaudio
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Tue Apr 27 18:09:05 2021
  InstallationDate: Installed on 2021-04-12 (15 days ago)
  InstallationMedia: Ubuntu 20.10 "Groovy Gorilla" - Release amd64 (20201022)
  MachineType: GIGABYTE GB-BRR7H-4800
  ProcFB: 0 amdgpudrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.8.0-50-generic 
root=UUID=0df56a67-b96b-43dd-8a59-da559fb319e3 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-5.8.0-50-generic N/A
   linux-backports-modules-5.8.0-50-generic  N/A
   linux-firmware1.190.4
  SourcePackage: linux
  UpgradeStatus: Upgraded to groovy on 2021-04-22 (5 days ago)
  dmi.bios.date: 11/16

[Kernel-packages] [Bug 1926318] Status changed to Confirmed

2021-04-27 Thread Ubuntu Kernel Bot
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926318

Title:
  After suspend the fan doesn't spin up to higher frequency anymore

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Reproduction: Boot, login, suspend via gnome menu, reactivate and the
  problem exists.

  Before suspend: fan rotates at about ~ 3200-5900 rpm
  After suspend: fan rotates at about ~ 3214-3260 rpm tested until cpu reached 
105 °C / 221 °F

  All data according to psensor (lm-sensors) - thermal_zone does not
  exist.

  $ cd /proc/acpi/thermal_zone
  bash: cd: /proc/acpi/thermal_zone: No such file or directory

  I will append journalctl with a normal boot and after a line with many
  '#' you can see the output after suspending. Hope this helps.

  The problem is the same with Ubuntu 21.04.

  Hardware: Gigabyte Brix GB-BRR7-4800 Barebone AMD Ryzen 7 4800U

  ProblemType: Bug
  DistroRelease: Ubuntu 20.10
  Package: linux-image-5.8.0-50-generic 5.8.0-50.56
  ProcVersionSignature: Ubuntu 5.8.0-50.56-generic 5.8.18
  Uname: Linux 5.8.0-50-generic x86_64
  ApportVersion: 2.20.11-0ubuntu50.5
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC3:  michael1588 F pulseaudio
   /dev/snd/controlC2:  michael1588 F pulseaudio
   /dev/snd/controlC0:  michael1588 F pulseaudio
   /dev/snd/controlC1:  michael1588 F pulseaudio
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Tue Apr 27 18:09:05 2021
  InstallationDate: Installed on 2021-04-12 (15 days ago)
  InstallationMedia: Ubuntu 20.10 "Groovy Gorilla" - Release amd64 (20201022)
  MachineType: GIGABYTE GB-BRR7H-4800
  ProcFB: 0 amdgpudrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.8.0-50-generic 
root=UUID=0df56a67-b96b-43dd-8a59-da559fb319e3 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-5.8.0-50-generic N/A
   linux-backports-modules-5.8.0-50-generic  N/A
   linux-firmware1.190.4
  SourcePackage: linux
  UpgradeStatus: Upgraded to groovy on 2021-04-22 (5 days ago)
  dmi.bios.date: 11/16/2020
  dmi.bios.release: 5.16
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: F2
  dmi.board.asset.tag: Default string
  dmi.board.name: GB-BRR7H-4800
  dmi.board.vendor: GIGABYTE
  dmi.board.version: 1.x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrF2:bd11/16/2020:br5.16:svnGIGABYTE:pnGB-BRR7H-4800:pvr1.x:rvnGIGABYTE:rnGB-BRR7H-4800:rvr1.x:cvnDefaultstring:ct3:cvrDefaultstring:
  dmi.product.family: BRIX
  dmi.product.name: GB-BRR7H-4800
  dmi.product.sku: 01
  dmi.product.version: 1.x
  dmi.sys.vendor: GIGABYTE

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1926318/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1926318] Re: After suspend the fan doesn't spin up to higher frequency anymore

2021-04-27 Thread Michael Arlt
** Description changed:

  Reproduction: Boot, login, suspend via gnome menu, reactivate and the
  problem exists.
  
  Before suspend: fan rotates at about ~ 3200-5900 rpm
  After suspend: fan rotates at about ~ 3214-3260 rpm tested until cpu reached 
105 °C / 221 °F
  
  All data according to psensor (lm-sensors) - thermal_zone does not
  exist.
  
  $ cd /proc/acpi/thermal_zone
  bash: cd: /proc/acpi/thermal_zone: No such file or directory
  
  I will append journalctl with a normal boot and after a line with many
  '#' you can see the output after suspending. Hope this helps.
  
  The problem is the same with Ubuntu 21.04.
  
+ Hardware: Gigabyte Brix GB-BRR7-4800 Barebone AMD Ryzen 7 4800U
+ 
  ProblemType: Bug
  DistroRelease: Ubuntu 20.10
  Package: linux-image-5.8.0-50-generic 5.8.0-50.56
  ProcVersionSignature: Ubuntu 5.8.0-50.56-generic 5.8.18
  Uname: Linux 5.8.0-50-generic x86_64
  ApportVersion: 2.20.11-0ubuntu50.5
  Architecture: amd64
  AudioDevicesInUse:
-  USERPID ACCESS COMMAND
-  /dev/snd/controlC3:  michael1588 F pulseaudio
-  /dev/snd/controlC2:  michael1588 F pulseaudio
-  /dev/snd/controlC0:  michael1588 F pulseaudio
-  /dev/snd/controlC1:  michael1588 F pulseaudio
+  USERPID ACCESS COMMAND
+  /dev/snd/controlC3:  michael1588 F pulseaudio
+  /dev/snd/controlC2:  michael1588 F pulseaudio
+  /dev/snd/controlC0:  michael1588 F pulseaudio
+  /dev/snd/controlC1:  michael1588 F pulseaudio
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Tue Apr 27 18:09:05 2021
  InstallationDate: Installed on 2021-04-12 (15 days ago)
  InstallationMedia: Ubuntu 20.10 "Groovy Gorilla" - Release amd64 (20201022)
  MachineType: GIGABYTE GB-BRR7H-4800
  ProcFB: 0 amdgpudrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.8.0-50-generic 
root=UUID=0df56a67-b96b-43dd-8a59-da559fb319e3 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
-  linux-restricted-modules-5.8.0-50-generic N/A
-  linux-backports-modules-5.8.0-50-generic  N/A
-  linux-firmware1.190.4
+  linux-restricted-modules-5.8.0-50-generic N/A
+  linux-backports-modules-5.8.0-50-generic  N/A
+  linux-firmware1.190.4
  SourcePackage: linux
  UpgradeStatus: Upgraded to groovy on 2021-04-22 (5 days ago)
  dmi.bios.date: 11/16/2020
  dmi.bios.release: 5.16
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: F2
  dmi.board.asset.tag: Default string
  dmi.board.name: GB-BRR7H-4800
  dmi.board.vendor: GIGABYTE
  dmi.board.version: 1.x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrF2:bd11/16/2020:br5.16:svnGIGABYTE:pnGB-BRR7H-4800:pvr1.x:rvnGIGABYTE:rnGB-BRR7H-4800:rvr1.x:cvnDefaultstring:ct3:cvrDefaultstring:
  dmi.product.family: BRIX
  dmi.product.name: GB-BRR7H-4800
  dmi.product.sku: 01
  dmi.product.version: 1.x
  dmi.sys.vendor: GIGABYTE

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926318

Title:
  After suspend the fan doesn't spin up to higher frequency anymore

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Reproduction: Boot, login, suspend via gnome menu, reactivate and the
  problem exists.

  Before suspend: fan rotates at about ~ 3200-5900 rpm
  After suspend: fan rotates at about ~ 3214-3260 rpm tested until cpu reached 
105 °C / 221 °F

  All data according to psensor (lm-sensors) - thermal_zone does not
  exist.

  $ cd /proc/acpi/thermal_zone
  bash: cd: /proc/acpi/thermal_zone: No such file or directory

  I will append journalctl with a normal boot and after a line with many
  '#' you can see the output after suspending. Hope this helps.

  The problem is the same with Ubuntu 21.04.

  Hardware: Gigabyte Brix GB-BRR7-4800 Barebone AMD Ryzen 7 4800U

  ProblemType: Bug
  DistroRelease: Ubuntu 20.10
  Package: linux-image-5.8.0-50-generic 5.8.0-50.56
  ProcVersionSignature: Ubuntu 5.8.0-50.56-generic 5.8.18
  Uname: Linux 5.8.0-50-generic x86_64
  ApportVersion: 2.20.11-0ubuntu50.5
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC3:  michael1588 F pulseaudio
   /dev/snd/controlC2:  michael1588 F pulseaudio
   /dev/snd/controlC0:  michael1588 F pulseaudio
   /dev/snd/controlC1:  michael1588 F pulseaudio
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Tue Apr 27 18:09:05 2021
  InstallationDate: Installed on 2021-04-12 (15 days ago)
  InstallationMedia: Ubuntu 20.10 "Groovy Gorilla" - Release amd64 (20201022)
  MachineType: GIGABYTE GB-BRR7H-4800
  ProcFB: 0 amdgpudrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.8.0-50-generic 
root=UUID=0df56a67-b96b-43dd-8a59-da559fb319e3 ro quiet splash vt.handoff=7

[Kernel-packages] [Bug 1926318] Re: After suspend the fan doesn't spin up to higher frequency anymore

2021-04-27 Thread Michael Arlt
The attachements where collected after the suspend.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926318

Title:
  After suspend the fan doesn't spin up to higher frequency anymore

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Reproduction: Boot, login, suspend via gnome menu, reactivate and the
  problem exists.

  Before suspend: fan rotates at about ~ 3200-5900 rpm
  After suspend: fan rotates at about ~ 3214-3260 rpm tested until cpu reached 
105 °C / 221 °F

  All data according to psensor (lm-sensors) - thermal_zone does not
  exist.

  $ cd /proc/acpi/thermal_zone
  bash: cd: /proc/acpi/thermal_zone: No such file or directory

  I will append journalctl with a normal boot and after a line with many
  '#' you can see the output after suspending. Hope this helps.

  The problem is the same with Ubuntu 21.04.

  Hardware: Gigabyte Brix GB-BRR7-4800 Barebone AMD Ryzen 7 4800U

  ProblemType: Bug
  DistroRelease: Ubuntu 20.10
  Package: linux-image-5.8.0-50-generic 5.8.0-50.56
  ProcVersionSignature: Ubuntu 5.8.0-50.56-generic 5.8.18
  Uname: Linux 5.8.0-50-generic x86_64
  ApportVersion: 2.20.11-0ubuntu50.5
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC3:  michael1588 F pulseaudio
   /dev/snd/controlC2:  michael1588 F pulseaudio
   /dev/snd/controlC0:  michael1588 F pulseaudio
   /dev/snd/controlC1:  michael1588 F pulseaudio
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Tue Apr 27 18:09:05 2021
  InstallationDate: Installed on 2021-04-12 (15 days ago)
  InstallationMedia: Ubuntu 20.10 "Groovy Gorilla" - Release amd64 (20201022)
  MachineType: GIGABYTE GB-BRR7H-4800
  ProcFB: 0 amdgpudrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.8.0-50-generic 
root=UUID=0df56a67-b96b-43dd-8a59-da559fb319e3 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-5.8.0-50-generic N/A
   linux-backports-modules-5.8.0-50-generic  N/A
   linux-firmware1.190.4
  SourcePackage: linux
  UpgradeStatus: Upgraded to groovy on 2021-04-22 (5 days ago)
  dmi.bios.date: 11/16/2020
  dmi.bios.release: 5.16
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: F2
  dmi.board.asset.tag: Default string
  dmi.board.name: GB-BRR7H-4800
  dmi.board.vendor: GIGABYTE
  dmi.board.version: 1.x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrF2:bd11/16/2020:br5.16:svnGIGABYTE:pnGB-BRR7H-4800:pvr1.x:rvnGIGABYTE:rnGB-BRR7H-4800:rvr1.x:cvnDefaultstring:ct3:cvrDefaultstring:
  dmi.product.family: BRIX
  dmi.product.name: GB-BRR7H-4800
  dmi.product.sku: 01
  dmi.product.version: 1.x
  dmi.sys.vendor: GIGABYTE

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1926318/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1921870] Re: [UBUNTU 21.04] tools/kvm_stat: Add restart delay

2021-04-27 Thread Frank Heimes
** Also affects: linux (Ubuntu Impish)
   Importance: Undecided
 Assignee: Canonical Kernel Team (canonical-kernel-team)
   Status: New

** Also affects: linux (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Hirsute)
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: linux (Ubuntu Hirsute)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Impish)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1921870

Title:
  [UBUNTU 21.04] tools/kvm_stat: Add restart delay

Status in Ubuntu on IBM z Systems:
  Triaged
Status in linux package in Ubuntu:
  New
Status in linux source package in Hirsute:
  New
Status in linux source package in Impish:
  New

Bug description:
  Description:   tools/kvm_stat: Add restart delay
  Symptom:   If the kvm service is enabled and the system rebooted,
 Systemd's initial attempt to start the kvm unit file may
 fail in case the kvm module is not loaded. However, once the
 kvm module is loaded, the service is _not_ started.
  Problem:   Since the unit file does not specify a delay for the retries,
 Systemd restarts with a minimum delay a number of times
 before giving up and disabling the service. Which means a
 subsequent kvm module load will have kvm running without
 monitoring.
  Solution:  Add an appropriate delay in the unit file.
  Reproduction:  (1) Enable the kvm service via systemctl
 (2) Reboot
 (3) Verify that the kvm module is not loaded & kvm service
 not running
 (4) Load the kvm module via 'modprobe kvm'
 (5) Verify that the kvm service came up within the next
 minute.
  Preventive:yes

  Just use the attached patch and you're good!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1921870/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1926330] [NEW] HWE kernels should enable BTF support to enable eBPF RO.CE support

2021-04-27 Thread Rafael David Tinoco
Public bug reported:

I had recent discussion with kernel team regarding support or not BTF in
HWE kernels (Bionic and Focal). Having CONFIG_DEBUG_INFO_BTF option
enabled for HWE kernels (v4.4 and v.4.8) would allow eBPF based code
(powered by libbpf or not) to be RO.CE
(https://github.com/rafaeldtinoco/portablebpf for more information).

By allowing runtime relocations, using provided BTF, libbpf binaries
might end up running, without modifications, in different kernel
versions (from Bionic HWE v5.4 kernel to Hirsute v5.11).

A good example would be to support tools such as:
https://github.com/aquasecurity/tracee/discussions/713#discussioncomment-665641
An ebpf powered backend for a containers security solution.

Considering:

$ rmadisonb dwarves
 dwarves | 1.9-1  | precise/universe | amd64
 dwarves | 1.10-2 | trusty   | amd64
 dwarves | 1.10-2.1   | xenial/universe  | amd64
 dwarves | 1.10-2.1build1 | bionic/universe  | amd64
 dwarves | 1.15-2 | focal/universe   | amd64
 dwarves | 1.17-1 | groovy/universe  | amd64
 dwarves | 1.20-1 | hirsute/universe | amd64
 dwarves | 1.20-1 | impish/universe  | amd64

And the fact that the 'pahole' binary, from dwarves package, is the one
to blame, not to have CONFIG_DEBUG_INFO_BTF available, for this bug to
be solved we would have to provide a backport of dwarves (at least
1.17-1) to Bionic and Focal. It could have another name (not to mess
with original dwarves package and its dependencies) and it is unclear if
it needs to be in [main] or [universe].

Question: Would have dwarves backported in -backports be enough for
Bionic and Focal HWE kernels compilation to have CONFIG_DEBUG_INFO_BTF
enabled ?

** Affects: dwarves-dfsg (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Incomplete

** Affects: dwarves-dfsg (Ubuntu Bionic)
 Importance: Undecided
 Status: Confirmed

** Affects: linux (Ubuntu Bionic)
 Importance: Undecided
 Status: Confirmed

** Affects: dwarves-dfsg (Ubuntu Focal)
 Importance: Undecided
 Status: Confirmed

** Affects: linux (Ubuntu Focal)
 Importance: Undecided
 Status: Confirmed

** Affects: dwarves-dfsg (Ubuntu Groovy)
 Importance: Undecided
 Status: Fix Released

** Affects: linux (Ubuntu Groovy)
 Importance: Undecided
 Status: Fix Released

** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Groovy)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Groovy)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Focal)
   Status: New => Confirmed

** Changed in: linux (Ubuntu Bionic)
   Status: New => Confirmed

** Summary changed:

- HWE kernels should enable BTF support to enable new eBPF based code
+ HWE kernels should enable BTF support to enable eBPF RO.CE support

** Also affects: dwarves-dfsg (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: dwarves-dfsg (Ubuntu Groovy)
   Status: New => Fix Released

** Changed in: dwarves-dfsg (Ubuntu Focal)
   Status: New => Confirmed

** Changed in: dwarves-dfsg (Ubuntu Bionic)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926330

Title:
  HWE kernels should enable BTF support to enable eBPF RO.CE support

Status in dwarves-dfsg package in Ubuntu:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in dwarves-dfsg source package in Bionic:
  Confirmed
Status in linux source package in Bionic:
  Confirmed
Status in dwarves-dfsg source package in Focal:
  Confirmed
Status in linux source package in Focal:
  Confirmed
Status in dwarves-dfsg source package in Groovy:
  Fix Released
Status in linux source package in Groovy:
  Fix Released

Bug description:
  I had recent discussion with kernel team regarding support or not BTF
  in HWE kernels (Bionic and Focal). Having CONFIG_DEBUG_INFO_BTF option
  enabled for HWE kernels (v4.4 and v.4.8) would allow eBPF based code
  (powered by libbpf or not) to be RO.CE
  (https://github.com/rafaeldtinoco/portablebpf for more information).

  By allowing runtime relocations, using provided BTF, libbpf binaries
  might end up running, without modifications, in different kernel
  versions (from Bionic HWE v5.4 kernel to Hirsute v5.11).

  A good example would be to support tools such as:
  
https://github.com/aquasecurity/tracee/discussions/713#discussioncomment-665641
  An ebpf powered backend for a containers security solution.

  Considering:

  $ rmadisonb dwarves
   dwarves | 1.9-1  | precise/universe | amd64

[Kernel-packages] [Bug 1926330] Missing required logs.

2021-04-27 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1926330

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926330

Title:
  HWE kernels should enable BTF support to enable eBPF RO.CE support

Status in dwarves-dfsg package in Ubuntu:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in dwarves-dfsg source package in Bionic:
  Confirmed
Status in linux source package in Bionic:
  Confirmed
Status in dwarves-dfsg source package in Focal:
  Confirmed
Status in linux source package in Focal:
  Confirmed
Status in dwarves-dfsg source package in Groovy:
  Fix Released
Status in linux source package in Groovy:
  Fix Released

Bug description:
  I had recent discussion with kernel team regarding support or not BTF
  in HWE kernels (Bionic and Focal). Having CONFIG_DEBUG_INFO_BTF option
  enabled for HWE kernels (v4.4 and v.4.8) would allow eBPF based code
  (powered by libbpf or not) to be RO.CE
  (https://github.com/rafaeldtinoco/portablebpf for more information).

  By allowing runtime relocations, using provided BTF, libbpf binaries
  might end up running, without modifications, in different kernel
  versions (from Bionic HWE v5.4 kernel to Hirsute v5.11).

  A good example would be to support tools such as:
  
https://github.com/aquasecurity/tracee/discussions/713#discussioncomment-665641
  An ebpf powered backend for a containers security solution.

  Considering:

  $ rmadisonb dwarves
   dwarves | 1.9-1  | precise/universe | amd64
   dwarves | 1.10-2 | trusty   | amd64
   dwarves | 1.10-2.1   | xenial/universe  | amd64
   dwarves | 1.10-2.1build1 | bionic/universe  | amd64
   dwarves | 1.15-2 | focal/universe   | amd64
   dwarves | 1.17-1 | groovy/universe  | amd64
   dwarves | 1.20-1 | hirsute/universe | amd64
   dwarves | 1.20-1 | impish/universe  | amd64

  And the fact that the 'pahole' binary, from dwarves package, is the
  one to blame, not to have CONFIG_DEBUG_INFO_BTF available, for this
  bug to be solved we would have to provide a backport of dwarves (at
  least 1.17-1) to Bionic and Focal. It could have another name (not to
  mess with original dwarves package and its dependencies) and it is
  unclear if it needs to be in [main] or [universe].

  Question: Would have dwarves backported in -backports be enough for
  Bionic and Focal HWE kernels compilation to have CONFIG_DEBUG_INFO_BTF
  enabled ?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dwarves-dfsg/+bug/1926330/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1926184] Re: locking/qrwlock: Fix ordering in queued_write_lock_slowpath()

2021-04-27 Thread Kelsey Skunberg
** Changed in: linux-aws (Ubuntu Bionic)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926184

Title:
  locking/qrwlock: Fix ordering in queued_write_lock_slowpath()

Status in linux package in Ubuntu:
  In Progress
Status in linux-aws package in Ubuntu:
  In Progress
Status in linux source package in Bionic:
  New
Status in linux-aws source package in Bionic:
  Fix Committed
Status in linux source package in Focal:
  New
Status in linux-aws source package in Focal:
  New
Status in linux source package in Groovy:
  New
Status in linux-aws source package in Groovy:
  New
Status in linux source package in Hirsute:
  New
Status in linux-aws source package in Hirsute:
  New

Bug description:
  [Impact]
  * Out of order reads can fetch a NULL pointer causing a kernel crash. Affects 
kernels from v4.15 to v5.11.

  [Fix]
  * commit 84a24bf8c52e ("locking/qrwlock: Fix ordering in 
queued_write_lock_slowpath()")

  * For Bionic, we also require an additional patch: commit fcfdfe30e324
  ("locking/barriers: Introduce smp_cond_load_relaxed() and
  atomic_cond_read_relaxed()")

  [Where problems could occur]

  * This is quite a subtle bug. It is more prevalent on arm64. Regression
  possibility seems quite low. The worst impact could be a minor performance 
degradation.

  * Kernels 4.15 / 5.4 / 5.8 / 5.11 were successfully built and booted
  with this patch. Also, by using ftrace we could see that the changed
  function was executed with success multiple times.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1926184/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1925685] Re: [SRU] Patch for flicker and glitching on certain hardware, intel framebuffer,

2021-04-27 Thread Erich Eickmeyer 
Added linux-hwe-5.8 because that's really where the issues against Focal
appear. I now understand why Timo marked as "Won't fix" since that's for
the 5.4 kernel in Focal.

** Also affects: linux-hwe-5.8 (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Focal)
   Status: Confirmed => Won't Fix

** Changed in: linux-hwe-5.8 (Ubuntu Focal)
   Status: New => Confirmed

** Changed in: linux-hwe-5.8 (Ubuntu Bionic)
   Status: New => Confirmed

** Also affects: linux (Ubuntu Impish)
   Importance: High
 Assignee: Kai-Heng Feng (kaihengfeng)
   Status: Confirmed

** Also affects: linux-hwe-5.8 (Ubuntu Impish)
   Importance: Undecided
   Status: New

** Changed in: linux-hwe-5.8 (Ubuntu Focal)
   Importance: Undecided => Critical

** Changed in: linux (Ubuntu Bionic)
   Importance: Critical => Undecided

** Changed in: linux (Ubuntu Focal)
   Importance: Critical => Undecided

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1925685

Title:
  [SRU] Patch for flicker and glitching on certain hardware, intel
  framebuffer,

Status in linux package in Ubuntu:
  Confirmed
Status in linux-hwe-5.8 package in Ubuntu:
  New
Status in linux source package in Bionic:
  Won't Fix
Status in linux-hwe-5.8 source package in Bionic:
  Confirmed
Status in linux source package in Focal:
  Won't Fix
Status in linux-hwe-5.8 source package in Focal:
  Confirmed
Status in linux source package in Groovy:
  Confirmed
Status in linux-hwe-5.8 source package in Groovy:
  New
Status in linux source package in Hirsute:
  Confirmed
Status in linux-hwe-5.8 source package in Hirsute:
  New
Status in linux source package in Impish:
  Confirmed
Status in linux-hwe-5.8 source package in Impish:
  New

Bug description:
  Filing this with my Kubuntu Focus (kfocus.org) OEM hat on:

  [Impact]

  We are having screen flickering and glitching issues with some of our
  hardware upon wake from suspend. We have worked with our ODM to figure
  out a fix for this. They had reported there were no issues when
  running Windows on the same hardware. As such, we tested, and found
  that this issue first began as a regression in kernel 5.0 (did not
  exist in kernel 4.18 per our tests).

  We identified a patch via
  https://gitlab.freedesktop.org/drm/intel/-/issues/272 in which this
  has been solved. Per our testing by recompiling the kernel, this
  completely fixes our hardware issue. As of 4-21, this fix has been
  merged into the Linux kernel per Timo Aaltonen, and will be included
  in the kernel in the 5.13 release.

  Our hardware ships with Kubuntu 20.04 LTS, which means the 5.13 kernel
  will not see these machines, at least in the forseeable future. As
  such, we request that this patch be added to the kernel. Per our
  testing, this patch is straightforward to add and works flawlessly.

  The patch that works best was created in collaboration with Kai-Heng
  Feng, is attached to this bug report, and can be found here:
  
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1925685/+attachment/5491421/+files
  /drm-intel-both.patch

  Until this is fixed, we have a whole batch of hardware we cannot sell,
  so, as an OEM, this is a high priority.

  [Test Plan]

   * Install Kubuntu on an affected Kubuntu Focus M2 computer (not in
  the hands of customers at this time)

   * Notice screen glitching/flickering after wake-from-suspend.

   * Install kernel compiled with the attached patch. Boot from patched
  kernel.

   * Suspend laptop, resume. No glitches.

  [Where problems could occur]

   * Although this solves the problem for us and has been confirmed to
  work with the Intel developers that developed this patch, it could
  cause another display type to have problems. This is unlikely as it
  has been vetted by Intel and by the mainline Linux kernel developers.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1925685/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1926330] Re: HWE kernels should enable BTF support to enable eBPF RO.CE support

2021-04-27 Thread Rafael David Tinoco
** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

** Changed in: dwarves-dfsg (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926330

Title:
  HWE kernels should enable BTF support to enable eBPF RO.CE support

Status in dwarves-dfsg package in Ubuntu:
  Confirmed
Status in linux package in Ubuntu:
  Confirmed
Status in dwarves-dfsg source package in Bionic:
  Confirmed
Status in linux source package in Bionic:
  Confirmed
Status in dwarves-dfsg source package in Focal:
  Confirmed
Status in linux source package in Focal:
  Confirmed
Status in dwarves-dfsg source package in Groovy:
  Fix Released
Status in linux source package in Groovy:
  Fix Released

Bug description:
  I had recent discussion with kernel team regarding support or not BTF
  in HWE kernels (Bionic and Focal). Having CONFIG_DEBUG_INFO_BTF option
  enabled for HWE kernels (v4.4 and v.4.8) would allow eBPF based code
  (powered by libbpf or not) to be RO.CE
  (https://github.com/rafaeldtinoco/portablebpf for more information).

  By allowing runtime relocations, using provided BTF, libbpf binaries
  might end up running, without modifications, in different kernel
  versions (from Bionic HWE v5.4 kernel to Hirsute v5.11).

  A good example would be to support tools such as:
  
https://github.com/aquasecurity/tracee/discussions/713#discussioncomment-665641
  An ebpf powered backend for a containers security solution.

  Considering:

  $ rmadisonb dwarves
   dwarves | 1.9-1  | precise/universe | amd64
   dwarves | 1.10-2 | trusty   | amd64
   dwarves | 1.10-2.1   | xenial/universe  | amd64
   dwarves | 1.10-2.1build1 | bionic/universe  | amd64
   dwarves | 1.15-2 | focal/universe   | amd64
   dwarves | 1.17-1 | groovy/universe  | amd64
   dwarves | 1.20-1 | hirsute/universe | amd64
   dwarves | 1.20-1 | impish/universe  | amd64

  And the fact that the 'pahole' binary, from dwarves package, is the
  one to blame, not to have CONFIG_DEBUG_INFO_BTF available, for this
  bug to be solved we would have to provide a backport of dwarves (at
  least 1.17-1) to Bionic and Focal. It could have another name (not to
  mess with original dwarves package and its dependencies) and it is
  unclear if it needs to be in [main] or [universe].

  Question: Would have dwarves backported in -backports be enough for
  Bionic and Focal HWE kernels compilation to have CONFIG_DEBUG_INFO_BTF
  enabled ?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dwarves-dfsg/+bug/1926330/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1925685] Re: [SRU] Patch for flicker and glitching on certain hardware, intel framebuffer,

2021-04-27 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: linux-hwe-5.8 (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1925685

Title:
  [SRU] Patch for flicker and glitching on certain hardware, intel
  framebuffer,

Status in linux package in Ubuntu:
  Confirmed
Status in linux-hwe-5.8 package in Ubuntu:
  Confirmed
Status in linux source package in Bionic:
  Won't Fix
Status in linux-hwe-5.8 source package in Bionic:
  Confirmed
Status in linux source package in Focal:
  Won't Fix
Status in linux-hwe-5.8 source package in Focal:
  Confirmed
Status in linux source package in Groovy:
  Confirmed
Status in linux-hwe-5.8 source package in Groovy:
  Confirmed
Status in linux source package in Hirsute:
  Confirmed
Status in linux-hwe-5.8 source package in Hirsute:
  Confirmed
Status in linux source package in Impish:
  Confirmed
Status in linux-hwe-5.8 source package in Impish:
  Confirmed

Bug description:
  Filing this with my Kubuntu Focus (kfocus.org) OEM hat on:

  [Impact]

  We are having screen flickering and glitching issues with some of our
  hardware upon wake from suspend. We have worked with our ODM to figure
  out a fix for this. They had reported there were no issues when
  running Windows on the same hardware. As such, we tested, and found
  that this issue first began as a regression in kernel 5.0 (did not
  exist in kernel 4.18 per our tests).

  We identified a patch via
  https://gitlab.freedesktop.org/drm/intel/-/issues/272 in which this
  has been solved. Per our testing by recompiling the kernel, this
  completely fixes our hardware issue. As of 4-21, this fix has been
  merged into the Linux kernel per Timo Aaltonen, and will be included
  in the kernel in the 5.13 release.

  Our hardware ships with Kubuntu 20.04 LTS, which means the 5.13 kernel
  will not see these machines, at least in the forseeable future. As
  such, we request that this patch be added to the kernel. Per our
  testing, this patch is straightforward to add and works flawlessly.

  The patch that works best was created in collaboration with Kai-Heng
  Feng, is attached to this bug report, and can be found here:
  
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1925685/+attachment/5491421/+files
  /drm-intel-both.patch

  Until this is fixed, we have a whole batch of hardware we cannot sell,
  so, as an OEM, this is a high priority.

  [Test Plan]

   * Install Kubuntu on an affected Kubuntu Focus M2 computer (not in
  the hands of customers at this time)

   * Notice screen glitching/flickering after wake-from-suspend.

   * Install kernel compiled with the attached patch. Boot from patched
  kernel.

   * Suspend laptop, resume. No glitches.

  [Where problems could occur]

   * Although this solves the problem for us and has been confirmed to
  work with the Intel developers that developed this patch, it could
  cause another display type to have problems. This is unlikely as it
  has been vetted by Intel and by the mainline Linux kernel developers.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1925685/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1925685] Re: [SRU] Patch for flicker and glitching on certain hardware, intel framebuffer,

2021-04-27 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: linux-hwe-5.8 (Ubuntu Groovy)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1925685

Title:
  [SRU] Patch for flicker and glitching on certain hardware, intel
  framebuffer,

Status in linux package in Ubuntu:
  Confirmed
Status in linux-hwe-5.8 package in Ubuntu:
  Confirmed
Status in linux source package in Bionic:
  Won't Fix
Status in linux-hwe-5.8 source package in Bionic:
  Confirmed
Status in linux source package in Focal:
  Won't Fix
Status in linux-hwe-5.8 source package in Focal:
  Confirmed
Status in linux source package in Groovy:
  Confirmed
Status in linux-hwe-5.8 source package in Groovy:
  Confirmed
Status in linux source package in Hirsute:
  Confirmed
Status in linux-hwe-5.8 source package in Hirsute:
  Confirmed
Status in linux source package in Impish:
  Confirmed
Status in linux-hwe-5.8 source package in Impish:
  Confirmed

Bug description:
  Filing this with my Kubuntu Focus (kfocus.org) OEM hat on:

  [Impact]

  We are having screen flickering and glitching issues with some of our
  hardware upon wake from suspend. We have worked with our ODM to figure
  out a fix for this. They had reported there were no issues when
  running Windows on the same hardware. As such, we tested, and found
  that this issue first began as a regression in kernel 5.0 (did not
  exist in kernel 4.18 per our tests).

  We identified a patch via
  https://gitlab.freedesktop.org/drm/intel/-/issues/272 in which this
  has been solved. Per our testing by recompiling the kernel, this
  completely fixes our hardware issue. As of 4-21, this fix has been
  merged into the Linux kernel per Timo Aaltonen, and will be included
  in the kernel in the 5.13 release.

  Our hardware ships with Kubuntu 20.04 LTS, which means the 5.13 kernel
  will not see these machines, at least in the forseeable future. As
  such, we request that this patch be added to the kernel. Per our
  testing, this patch is straightforward to add and works flawlessly.

  The patch that works best was created in collaboration with Kai-Heng
  Feng, is attached to this bug report, and can be found here:
  
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1925685/+attachment/5491421/+files
  /drm-intel-both.patch

  Until this is fixed, we have a whole batch of hardware we cannot sell,
  so, as an OEM, this is a high priority.

  [Test Plan]

   * Install Kubuntu on an affected Kubuntu Focus M2 computer (not in
  the hands of customers at this time)

   * Notice screen glitching/flickering after wake-from-suspend.

   * Install kernel compiled with the attached patch. Boot from patched
  kernel.

   * Suspend laptop, resume. No glitches.

  [Where problems could occur]

   * Although this solves the problem for us and has been confirmed to
  work with the Intel developers that developed this patch, it could
  cause another display type to have problems. This is unlikely as it
  has been vetted by Intel and by the mainline Linux kernel developers.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1925685/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1925685] Re: [SRU] Patch for flicker and glitching on certain hardware, intel framebuffer,

2021-04-27 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: linux-hwe-5.8 (Ubuntu Hirsute)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1925685

Title:
  [SRU] Patch for flicker and glitching on certain hardware, intel
  framebuffer,

Status in linux package in Ubuntu:
  Confirmed
Status in linux-hwe-5.8 package in Ubuntu:
  Confirmed
Status in linux source package in Bionic:
  Won't Fix
Status in linux-hwe-5.8 source package in Bionic:
  Confirmed
Status in linux source package in Focal:
  Won't Fix
Status in linux-hwe-5.8 source package in Focal:
  Confirmed
Status in linux source package in Groovy:
  Confirmed
Status in linux-hwe-5.8 source package in Groovy:
  Confirmed
Status in linux source package in Hirsute:
  Confirmed
Status in linux-hwe-5.8 source package in Hirsute:
  Confirmed
Status in linux source package in Impish:
  Confirmed
Status in linux-hwe-5.8 source package in Impish:
  Confirmed

Bug description:
  Filing this with my Kubuntu Focus (kfocus.org) OEM hat on:

  [Impact]

  We are having screen flickering and glitching issues with some of our
  hardware upon wake from suspend. We have worked with our ODM to figure
  out a fix for this. They had reported there were no issues when
  running Windows on the same hardware. As such, we tested, and found
  that this issue first began as a regression in kernel 5.0 (did not
  exist in kernel 4.18 per our tests).

  We identified a patch via
  https://gitlab.freedesktop.org/drm/intel/-/issues/272 in which this
  has been solved. Per our testing by recompiling the kernel, this
  completely fixes our hardware issue. As of 4-21, this fix has been
  merged into the Linux kernel per Timo Aaltonen, and will be included
  in the kernel in the 5.13 release.

  Our hardware ships with Kubuntu 20.04 LTS, which means the 5.13 kernel
  will not see these machines, at least in the forseeable future. As
  such, we request that this patch be added to the kernel. Per our
  testing, this patch is straightforward to add and works flawlessly.

  The patch that works best was created in collaboration with Kai-Heng
  Feng, is attached to this bug report, and can be found here:
  
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1925685/+attachment/5491421/+files
  /drm-intel-both.patch

  Until this is fixed, we have a whole batch of hardware we cannot sell,
  so, as an OEM, this is a high priority.

  [Test Plan]

   * Install Kubuntu on an affected Kubuntu Focus M2 computer (not in
  the hands of customers at this time)

   * Notice screen glitching/flickering after wake-from-suspend.

   * Install kernel compiled with the attached patch. Boot from patched
  kernel.

   * Suspend laptop, resume. No glitches.

  [Where problems could occur]

   * Although this solves the problem for us and has been confirmed to
  work with the Intel developers that developed this patch, it could
  cause another display type to have problems. This is unlikely as it
  has been vetted by Intel and by the mainline Linux kernel developers.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1925685/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1730331] Re: ath10k_pci: firmware crashed!

2021-04-27 Thread Mohsen Ahmadi
Similar issue here:

https://bugzilla.kernel.org/show_bug.cgi?id=212861

** Bug watch added: Linux Kernel Bug Tracker #212861
   https://bugzilla.kernel.org/show_bug.cgi?id=212861

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1730331

Title:
  ath10k_pci: firmware crashed!

Status in linux package in Ubuntu:
  Confirmed
Status in linux-firmware package in Ubuntu:
  Confirmed
Status in linux-firmware package in Fedora:
  Fix Released

Bug description:
  ...
  Nov  4 18:35:50 akane kernel: [   10.216896] ath10k_pci :04:00.0: qca988x 
hw2.0 target 0x4100016c chip_id 0x043222ff sub :
  Nov  4 18:35:50 akane kernel: [   10.216908] ath10k_pci :04:00.0: kconfig 
debug 0 debugfs 1 tracing 1 dfs 0 testmode 0
  Nov  4 18:35:50 akane kernel: [   10.217641] ath10k_pci :04:00.0: 
firmware ver 10.2.4.70.63-2 api 5 features 
no-p2p,raw-mode,mfp,allows-mesh-bcast crc32 4ff9e14d
  Nov  4 18:35:50 akane kernel: [   10.228600] kvm: Nested Virtualization 
enabled
  Nov  4 18:35:50 akane kernel: [   10.228611] kvm: Nested Paging enabled
  Nov  4 18:35:50 akane kernel: [   10.258913] ath10k_pci :04:00.0: 
board_file api 1 bmi_id N/A crc32 bebc7c08
  Nov  4 18:35:50 akane kernel: [   10.263535] MCE: In-kernel MCE decoding 
enabled.
  Nov  4 18:35:50 akane kernel: [   10.271401] EDAC amd64: Node 0: DRAM ECC 
enabled.
  Nov  4 18:35:50 akane kernel: [   10.271416] EDAC amd64: F16h_M30h detected 
(node 0).
  Nov  4 18:35:50 akane kernel: [   10.271491] EDAC MC: DCT0 chip selects:
  Nov  4 18:35:50 akane kernel: [   10.271494] EDAC amd64: MC: 0:  4096MB 1:
 0MB
  Nov  4 18:35:50 akane kernel: [   10.271523] EDAC amd64: MC: 2: 0MB 3:
 0MB
  Nov  4 18:35:50 akane kernel: [   10.271526] EDAC amd64: MC: 4: 0MB 5:
 0MB
  Nov  4 18:35:50 akane kernel: [   10.271528] EDAC amd64: MC: 6: 0MB 7:
 0MB
  Nov  4 18:35:50 akane kernel: [   10.271530] EDAC MC: DCT1 chip selects:
  Nov  4 18:35:50 akane kernel: [   10.271532] EDAC amd64: MC: 0: 0MB 1:
 0MB
  Nov  4 18:35:50 akane kernel: [   10.271534] EDAC amd64: MC: 2: 0MB 3:
 0MB
  Nov  4 18:35:50 akane kernel: [   10.271537] EDAC amd64: MC: 4: 0MB 5:
 0MB
  Nov  4 18:35:50 akane kernel: [   10.271539] EDAC amd64: MC: 6: 0MB 7:
 0MB
  Nov  4 18:35:50 akane kernel: [   10.271541] EDAC amd64: using x4 syndromes.
  Nov  4 18:35:50 akane kernel: [   10.271542] EDAC amd64: MCT channel count: 1
  Nov  4 18:35:50 akane kernel: [   10.271829] EDAC MC0: Giving out device to 
module amd64_edac controller F16h_M30h: DEV :00:18.3 (INTERRUPT)
  Nov  4 18:35:50 akane kernel: [   10.271892] EDAC PCI0: Giving out device to 
module amd64_edac controller EDAC PCI controller: DEV :00:18.2 (POLLED)
  Nov  4 18:35:50 akane kernel: [   10.271894] AMD64 EDAC driver v3.5.0
  Nov  4 18:35:50 akane kernel: [   10.532131] EXT4-fs (sdc1): mounted 
filesystem with ordered data mode. Opts: errors=remount-ro
  Nov  4 18:35:50 akane kernel: [   10.575859] EXT4-fs (sda1): mounted 
filesystem with ordered data mode. Opts: errors=remount-ro
  Nov  4 18:35:50 akane kernel: [   11.397803] ath10k_pci :04:00.0: 
firmware crashed! (uuid f75dd562-d1bb-40a7-8454-fdc5f86cb8aa)
  Nov  4 18:35:50 akane kernel: [   11.407389] ath10k_pci :04:00.0: qca988x 
hw2.0 target 0x4100016c chip_id 0x043222ff sub :
  Nov  4 18:35:50 akane kernel: [   11.407395] ath10k_pci :04:00.0: kconfig 
debug 0 debugfs 1 tracing 1 dfs 0 testmode 0
  Nov  4 18:35:50 akane kernel: [   11.408085] ath10k_pci :04:00.0: 
firmware ver 10.2.4.70.63-2 api 5 features 
no-p2p,raw-mode,mfp,allows-mesh-bcast crc32 4ff9e14d
  Nov  4 18:35:50 akane kernel: [   11.408148] ath10k_pci :04:00.0: 
board_file api 1 bmi_id N/A crc32 bebc7c08
  Nov  4 18:35:50 akane kernel: [   11.408156] ath10k_pci :04:00.0: htt-ver 
0.0 wmi-op 5 htt-op 2 cal otp max-sta 128 raw 0 hwcrypto 1
  Nov  4 18:35:50 akane kernel: [   11.410197] ath10k_pci :04:00.0: 
firmware register dump:
  Nov  4 18:35:50 akane kernel: [   11.416213] ath10k_pci :04:00.0: [00]: 
0x4100016C 0x15B3 0x009BFF84 0x00955B31
  Nov  4 18:35:50 akane kernel: [   11.424559] ath10k_pci :04:00.0: [04]: 
0x009BFF84 0x00060130 0x0013 0x
  Nov  4 18:35:50 akane kernel: [   11.432767] ath10k_pci :04:00.0: [08]: 
0x009C8EA4 0x7170 0x0001 0x00435300
  Nov  4 18:35:50 akane kernel: [   11.441059] ath10k_pci :04:00.0: [12]: 
0x0009 0x 0x00958360 0x0095836B
  Nov  4 18:35:50 akane kernel: [   11.449397] ath10k_pci :04:00.0: [16]: 
0x00958080 0x0094078E 0x 0x
  Nov  4 18:35:50 akane kernel: [   11.457686] ath10k_pci :04:00.0: [20]: 
0x409BFF84 0x0040AB44 0x004101E0 0x000C
  Nov  4 18:35:50 akane kernel: [   11.466132] ath10k_pci :04:00.0: [24]: 
0x809BFE1C 0x0040ABA4 0x0006 0xC09BFF84
  Nov  4 18:35:50 akane kernel: [

[Kernel-packages] [Bug 1926360] [NEW] Groovy update: upstream stable patchset 2021-04-27

2021-04-27 Thread Kamal Mostafa
Public bug reported:

SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   upstream stable patchset 2021-04-27

Ported from the following upstream stable releases:
v5.4.107, v5.10.25
v5.4.108, v5.10.26

   from git://git.kernel.org/

crypto: aesni - Use TEST %reg,%reg instead of CMP $0,%reg
crypto: x86/aes-ni-xts - use direct calls to and 4-way stride
RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes
fuse: fix live lock in fuse_iget()
ALSA: usb-audio: Don't avoid stopping the stream at disconnection
net: dsa: b53: Support setting learning on port
KVM: arm64: nvhe: Save the SPE context early
drm/i915/gvt: Set SNOOP for PAT3 on BXT/APL to workaround GPU BB hang
drm/i915/gvt: Fix mmio handler break on BXT/APL.
drm/i915/gvt: Fix virtual display setup for BXT/APL
drm/i915/gvt: Fix vfio_edid issue for BXT/APL
UBUNTU: upstream stable to v5.4.107, v5.10.25
ASoC: ak4458: Add MODULE_DEVICE_TABLE
ASoC: ak5558: Add MODULE_DEVICE_TABLE
ALSA: dice: fix null pointer dereference when node is disconnected
ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro
ALSA: hda: generic: Fix the micmute led init state
ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air
s390/pci: refactor zpci_create_device()
s390/pci: remove superfluous zdev->zbus check
s390/pci: fix leak of PCI device structure
zonefs: Fix O_APPEND async write handling
zonefs: prevent use of seq files as swap file
btrfs: fix race when cloning extent buffer during rewind of an old root
btrfs: fix slab cache flags for free space tree bitmap
vhost-vdpa: set v->config_ctx to NULL if eventfd_ctx_fdget() fails
ASoC: fsl_ssi: Fix TDM slot setup for I2S mode
ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold
ASoC: SOF: Intel: unregister DMIC device on probe error
ASoC: SOF: intel: fix wrong poll bits in dsp power down
ASoC: qcom: sdm845: Fix array out of bounds access
ASoC: qcom: sdm845: Fix array out of range on rx slim channels
ASoC: codecs: wcd934x: add a sanity check in set channel map
ASoC: qcom: lpass-cpu: Fix lpass dai ids parse
ASoC: simple-card-utils: Do not handle device clock
afs: Fix accessing YFS xattrs on a non-YFS server
afs: Stop listxattr() from listing "afs.*" attributes
nvme: fix Write Zeroes limitations
nvme-tcp: fix misuse of __smp_processor_id with preemption enabled
nvme-tcp: fix possible hang when failing to set io queues
nvme-tcp: fix a NULL deref when receiving a 0-length r2t PDU
nvmet: don't check iosqes,iocqes for discovery controllers
nfsd: Don't keep looking up unhashed files in the nfsd file cache
nfsd: don't abort copies early
NFSD: Repair misuse of sv_lock in 5.10.16-rt30.
NFSD: fix dest to src mount in inter-server COPY
svcrdma: disable timeouts on rdma backchannel
vfio: IOMMU_API should be selected
sunrpc: fix refcount leak for rpc auth modules
i915/perf: Start hrtimer only if sampling the OA buffer
pstore: Fix warning in pstore_kill_sb()
net/qrtr: fix __netdev_alloc_skb call
kbuild: Fix  for empty SUBLEVEL or PATCHLEVEL again
cifs: fix allocation size on newly created files
riscv: Correct SPARSEMEM configuration
scsi: lpfc: Fix some error codes in debugfs
scsi: myrs: Fix a double free in myrs_cleanup()
RISC-V: correct enum sbi_ext_rfence_fid
counter: stm32-timer-cnt: Report count function when SLAVE_MODE_DISABLED
nvme-rdma: fix possible hang when failing to set io queues
ibmvnic: add some debugs
ibmvnic: serialize access to work queue on remove
tty: serial: stm32-usart: Remove set but unused 'cookie' variables
serial: stm32: fix DMA initialization error handling
bpf: Declare __bpf_free_used_maps() unconditionally
RDMA/rtrs: Remove unnecessary argument dir of rtrs_iu_free
RDMA/rtrs-srv: Jump to dereg_mr label if allocate iu fails
RDMA/rtrs: Introduce rtrs_post_send
RDMA/rtrs: Fix KASAN: stack-out-of-bounds bug
module: merge repetitive strings in module_sig_check()
module: avoid *goto*s in module_sig_check()
module: harden ELF info handling
scsi: pm80xx: Fix pm8001_mpi_get_nvmd_resp() race condition
RDMA/mlx5: Allow creating all QPs even when non RDMA profile is used
i40e: Fix endianness conversions
net: phy: micrel: set soft_reset callback to genphy_soft_reset for KSZ8081
MIPS: compressed: fix build with enabled UBSAN
media: cedrus: h264: Support profile controls
ibmvnic: remove excessive irqsave
s390/qeth: integrate RX refill worker with NAPI
s390/qeth: schedule TX NAPI on QAOB completion
drm/amd/pm: fulfill the Polaris implementation for 
get_clock_by_type_with_latency()
gfs2: Add common helper for holding and releas

[Kernel-packages] [Bug 1926368] [NEW] Hirsute update: v5.11.14 upstream stable release

2021-04-27 Thread Kamal Mostafa
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   v5.11.14 upstream stable release
   from git://git.kernel.org/

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed

** Affects: linux (Ubuntu Hirsute)
 Importance: Undecided
 Status: New


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926368

Title:
  Hirsute update: v5.11.14 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Hirsute:
  New

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 v5.11.14 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1926368/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1926368] Re: Hirsute update: v5.11.14 upstream stable release

2021-04-27 Thread Kamal Mostafa
** Changed in: linux (Ubuntu Hirsute)
   Status: New => In Progress

** Changed in: linux (Ubuntu Hirsute)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Hirsute)
 Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+    v5.11.14 upstream stable release
+    from git://git.kernel.org/
  
-v5.11.14 upstream stable release
-from git://git.kernel.org/
+ xfrm/compat: Cleanup WARN()s that can be user-triggered
+ ALSA: aloop: Fix initialization of controls
+ ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1
+ ALSA: hda/conexant: Apply quirk for another HP ZBook G5 model
+ file: fix close_range() for unshare+cloexec
+ ASoC: intel: atom: Stop advertising non working S24LE support
+ nfc: fix refcount leak in llcp_sock_bind()
+ nfc: fix refcount leak in llcp_sock_connect()
+ nfc: fix memory leak in llcp_sock_connect()
+ nfc: Avoid endless loops caused by repeated llcp_sock_connect()
+ selinux: make nslot handling in avtab more robust
+ selinux: fix cond_list corruption when changing booleans
+ selinux: fix race between old and new sidtab
+ xen/evtchn: Change irq_info lock to raw_spinlock_t
+ net: ipv6: check for validity before dereferencing cfg->fc_nlinfo.nlh
+ net: dsa: lantiq_gswip: Let GSWIP automatically set the xMII clock
+ net: dsa: lantiq_gswip: Don't use PHY auto polling
+ net: dsa: lantiq_gswip: Configure all remaining GSWIP_MII_CFG bits
+ drm/i915: Fix invalid access to ACPI _DSM objects
+ ACPI: processor: Fix build when CONFIG_ACPI_PROCESSOR=m
+ drm/radeon: Fix size overflow
+ drm/amdgpu: Fix size overflow
+ drm/amdgpu/smu7: fix CAC setting on TOPAZ
+ rfkill: revert back to old userspace API by default
+ cifs: escape spaces in share names
+ cifs: On cifs_reconnect, resolve the hostname again.
+ IB/hfi1: Fix probe time panic when AIP is enabled with a buggy BIOS
+ LOOKUP_MOUNTPOINT: we are cleaning "jumped" flag too late
+ gcov: re-fix clang-11+ support
+ ia64: fix user_stack_pointer() for ptrace()
+ nds32: flush_dcache_page: use page_mapping_file to avoid races with swapoff
+ ocfs2: fix deadlock between setattr and dio_end_io_write
+ fs: direct-io: fix missing sdio->boundary
+ ethtool: fix incorrect datatype in set_eee ops
+ of: property: fw_devlink: do not link ".*,nr-gpios"
+ parisc: parisc-agp requires SBA IOMMU driver
+ parisc: avoid a warning on u8 cast for cmpxchg on u8 pointers
+ ARM: dts: turris-omnia: configure LED[2]/INTn pin as interrupt pin
+ batman-adv: initialize "struct batadv_tvlv_tt_vlan_data"->reserved field
+ ice: Continue probe on link/PHY errors
+ ice: Increase control queue timeout
+ ice: prevent ice_open and ice_stop during reset
+ ice: fix memory allocation call
+ ice: remove DCBNL_DEVRESET bit from PF state
+ ice: Fix for dereference of NULL pointer
+ ice: Use port number instead of PF ID for WoL
+ ice: Cleanup fltr list in case of allocation issues
+ iwlwifi: pcie: properly set LTR workarounds on 22000 devices
+ ice: fix memory leak of aRFS after resuming from suspend
+ net: hso: fix null-ptr-deref during tty device unregistration
+ libbpf: Fix bail out from 'ringbuf_process_ring()' on error
+ bpf: Enforce that struct_ops programs be GPL-only
+ bpf: link: Refuse non-O_RDWR flags in BPF_OBJ_GET
+ ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx
+ libbpf: Ensure umem pointer is non-NULL before dereferencing
+ libbpf: Restore umem state after socket create failure
+ libbpf: Only create rx and tx XDP rings when necessary
+ bpf: Refcount task stack in bpf_get_task_stack
+ bpf, sockmap: Fix sk->prot unhash op reset
+ bpf, sockmap: Fix incorrect fwd_alloc accounting
+ net: ensure mac header is set in virtio_net_hdr_to_skb()
+ i40e: Fix sparse warning: missing error code 'err'
+ i40e: Fix sparse error: 'vsi->netdev' could be null
+ i40e: Fix sparse error: uninitialized symbol 'ring'
+ i40e: Fix sparse errors in i40e_txrx.c
+ vdpa/mlx5: Fix suspend/resume index restoration
+ net: sched: sch_teql: fix nu

[Kernel-packages] [Bug 1926205] Re: graphic interface faulty

2021-04-27 Thread arturpio
even running with only 1 workspace enabled, the things degrade slowly.

After some time of use, the program windows do not react to the mouse clicks 
(close, reduce..).
Then, no any mouse click give any effect.
One solution is to reboot using shell or, even worst - the off button.

I reverse to 20.04.2.0 LTS to check if the problems are coming from the
hardware, or OS version.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926205

Title:
  graphic interface faulty

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  hi,

  first, after boot and log-in, the interface elements are slow to
  display. the left-screen dock is empty and shows only after some time.
  then, I must wait to have access to program (applications) menu
  ("Activities").

  the graphic interface itself become buggy and faulty when using multi-
  workspace (dynamic work-spaces displays).

  when I launch a program on second workspace screen:
  the mouse click stop to have any result (mouse and touchpad)
  then, I can not change workspace.
  then, programs freezes
  I need to reboot the computer to regain any control.

  I try 20.04.2.0 LTS on this computer, witch works fine. no any
  smallest problem.

  Description:  Ubuntu 21.04
  Release:  21.04

  ProblemType: Bug
  DistroRelease: Ubuntu 21.04
  Package: xorg 1:7.7+22ubuntu1
  ProcVersionSignature: Ubuntu 5.11.0-16.17-generic 5.11.12
  Uname: Linux 5.11.0-16-generic x86_64
  ApportVersion: 2.20.11-0ubuntu65
  Architecture: amd64
  BootLog: Error: [Errno 13] Permission non accordée: '/var/log/boot.log'
  CasperMD5CheckResult: pass
  CompositorRunning: None
  CurrentDesktop: ubuntu:GNOME
  Date: Mon Apr 26 22:07:16 2021
  DistUpgraded: Fresh install
  DistroCodename: hirsute
  DistroVariant: ubuntu
  ExtraDebuggingInterest: Yes
  GraphicsCard:
   Advanced Micro Devices, Inc. [AMD/ATI] Renoir [1002:1636] (rev c3) (prog-if 
00 [VGA controller])
 Subsystem: Hewlett-Packard Company Renoir [103c:876e]
  InstallationDate: Installed on 2021-04-25 (1 days ago)
  InstallationMedia: Ubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: HP HP ENVY x360 Convertible 13-ay0xxx
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.11.0-16-generic 
root=UUID=d493468f-47f4-4515-898b-919d7fdf1949 ro quiet splash vt.handoff=7
  SourcePackage: xorg
  Symptom: display
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 12/10/2020
  dmi.bios.release: 15.16
  dmi.bios.vendor: Insyde
  dmi.bios.version: F.16
  dmi.board.asset.tag: Type2 - Board Asset Tag
  dmi.board.name: 876E
  dmi.board.vendor: HP
  dmi.board.version: 12.43
  dmi.chassis.asset.tag: Chassis Asset Tag
  dmi.chassis.type: 31
  dmi.chassis.vendor: HP
  dmi.chassis.version: Chassis Version
  dmi.ec.firmware.release: 12.43
  dmi.modalias: 
dmi:bvnInsyde:bvrF.16:bd12/10/2020:br15.16:efr12.43:svnHP:pnHPENVYx360Convertible13-ay0xxx:pvrType1ProductConfigId:rvnHP:rn876E:rvr12.43:cvnHP:ct31:cvrChassisVersion:
  dmi.product.family: 103C_5335KV HP Envy
  dmi.product.name: HP ENVY x360 Convertible 13-ay0xxx
  dmi.product.sku: 2U6C7EA#ABZ
  dmi.product.version: Type1ProductConfigId
  dmi.sys.vendor: HP
  version.compiz: compiz N/A
  version.libdrm2: libdrm2 2.4.104-1build1
  version.libgl1-mesa-dri: libgl1-mesa-dri 21.0.1-2
  version.libgl1-mesa-glx: libgl1-mesa-glx N/A
  version.xserver-xorg-core: xserver-xorg-core 2:1.20.11-1ubuntu1
  version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
  version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:19.1.0-2
  version.xserver-xorg-video-intel: xserver-xorg-video-intel 
2:2.99.917+git20200714-1ubuntu1
  version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 1:1.0.17-1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1926205/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1844493] Re: ubuntu_sysdig_smoke_test failed on 5.3 / 5.4 / 5.6 /5.8 / 5.10 kernels

2021-04-27 Thread Ian
ocal/linux-azure 5.4.0-1047.49 sru-20210412

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1844493

Title:
  ubuntu_sysdig_smoke_test failed on 5.3 / 5.4 / 5.6 /5.8 / 5.10 kernels

Status in ubuntu-kernel-tests:
  Triaged
Status in linux package in Ubuntu:
  Incomplete
Status in linux-aws package in Ubuntu:
  New
Status in linux-azure package in Ubuntu:
  New
Status in linux-gcp package in Ubuntu:
  New
Status in linux source package in Eoan:
  Incomplete
Status in linux-aws source package in Eoan:
  New
Status in linux-azure source package in Eoan:
  New
Status in linux-gcp source package in Eoan:
  New
Status in linux source package in Focal:
  New
Status in linux-aws source package in Focal:
  New
Status in linux-azure source package in Focal:
  New
Status in linux-gcp source package in Focal:
  New

Bug description:
  Test failed with:
FAILED (trace at least 25 reads of /dev/zero by dd)
FAILED (trace at least 25 writes to /dev/null by dd)

  Steps:
sudo apt-get install git python-minimal python-yaml gdb -y
git clone --depth=1 git://kernel.ubuntu.com/ubuntu/autotest-client-tests
git clone --depth=1 git://kernel.ubuntu.com/ubuntu/autotest
rm -fr autotest/client/tests
ln -sf ~/autotest-client-tests autotest/client/tests
AUTOTEST_PATH=/home/ubuntu/autotest sudo -E autotest/client/autotest-local 
--verbose autotest/client/tests/ubuntu_sysdig_smoke_test/control

  Test output:
== sysdig smoke test to trace dd, cat, read and writes ==
Limiting raw capture file to 16384 blocks
Try 1 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 18 Mbytes
Try 2 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 22 Mbytes
Try 3 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 4 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 5 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 6 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 7 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 8 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 9 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 10 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Found:
   279845 sysdig events
   29882 context switches
   0 reads from /dev/zero by dd
   0 writes to /dev/null by dd
PASSED (trace at least 25 context switches)
FAILED (trace at least 25 reads of /dev/zero by dd)
FAILED (trace at least 25 writes to /dev/null by dd)
 
Summary: 1 passed, 2 failed

  ProblemType: Bug
  DistroRelease: Ubuntu 19.10
  Package: linux-image-5.3.0-10-generic 5.3.0-10.11
  ProcVersionSignature: User Name 5.3.0-10.11-generic 5.3.0-rc8
  Uname: Linux 5.3.0-10-generic x86_64
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 Sep 18 08:10 seq
   crw-rw 1 root audio 116, 33 Sep 18 08:10 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay': 'aplay'
  ApportVersion: 2.20.11-0ubuntu7
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord': 
'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CurrentDmesg:
   
  Date: Wed Sep 18 08:18:54 2019
  IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig': 'iwconfig'
  MachineType: Intel Corporation S1200RP
  PciMultimedia:
   
  ProcFB: 0 mgag200drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.3.0-10-generic 
root=UUID=b0d2ae4e-12dd-423e-acea-272ee8b2a893 ro
  RelatedPackageVersions:
   linux-restricted-modules-5.3.0-10-generic N/A
   linux-backports-modules-5.3.0-10-generic  N/A
   linux-firmware1.182
  RfKill: Error: [Errno 2] No such file or directory: 'rfkill': 'rfkill'
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 07/01/2015
  dmi.bios.vendor: Intel Corp.
  dmi.bios.version: S1200RP.86B.03.02.0003.070120151022
  dmi.board.asset.tag: 
  dmi.board.name: S1200RP
  dmi.board.vendor: Intel Corporation
  dmi.board.version: G62254-407
  dmi.chassis.asset.tag: 
 

[Kernel-packages] [Bug 1844493] Re: ubuntu_sysdig_smoke_test failed on 5.3 / 5.4 / 5.6 /5.8 / 5.10 kernels

2021-04-27 Thread Ian
focal/linux-azure 5.4.0-1047.49~18.04.1 sru-20210412

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1844493

Title:
  ubuntu_sysdig_smoke_test failed on 5.3 / 5.4 / 5.6 /5.8 / 5.10 kernels

Status in ubuntu-kernel-tests:
  Triaged
Status in linux package in Ubuntu:
  Incomplete
Status in linux-aws package in Ubuntu:
  New
Status in linux-azure package in Ubuntu:
  New
Status in linux-gcp package in Ubuntu:
  New
Status in linux source package in Eoan:
  Incomplete
Status in linux-aws source package in Eoan:
  New
Status in linux-azure source package in Eoan:
  New
Status in linux-gcp source package in Eoan:
  New
Status in linux source package in Focal:
  New
Status in linux-aws source package in Focal:
  New
Status in linux-azure source package in Focal:
  New
Status in linux-gcp source package in Focal:
  New

Bug description:
  Test failed with:
FAILED (trace at least 25 reads of /dev/zero by dd)
FAILED (trace at least 25 writes to /dev/null by dd)

  Steps:
sudo apt-get install git python-minimal python-yaml gdb -y
git clone --depth=1 git://kernel.ubuntu.com/ubuntu/autotest-client-tests
git clone --depth=1 git://kernel.ubuntu.com/ubuntu/autotest
rm -fr autotest/client/tests
ln -sf ~/autotest-client-tests autotest/client/tests
AUTOTEST_PATH=/home/ubuntu/autotest sudo -E autotest/client/autotest-local 
--verbose autotest/client/tests/ubuntu_sysdig_smoke_test/control

  Test output:
== sysdig smoke test to trace dd, cat, read and writes ==
Limiting raw capture file to 16384 blocks
Try 1 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 18 Mbytes
Try 2 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 22 Mbytes
Try 3 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 4 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 5 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 6 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 7 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 8 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 9 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Try 10 of 10
Sysdig capture started after 1 seconds wait
Raw capture file is 16 Mbytes
Converted events file is 21 Mbytes
Found:
   279845 sysdig events
   29882 context switches
   0 reads from /dev/zero by dd
   0 writes to /dev/null by dd
PASSED (trace at least 25 context switches)
FAILED (trace at least 25 reads of /dev/zero by dd)
FAILED (trace at least 25 writes to /dev/null by dd)
 
Summary: 1 passed, 2 failed

  ProblemType: Bug
  DistroRelease: Ubuntu 19.10
  Package: linux-image-5.3.0-10-generic 5.3.0-10.11
  ProcVersionSignature: User Name 5.3.0-10.11-generic 5.3.0-rc8
  Uname: Linux 5.3.0-10-generic x86_64
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 Sep 18 08:10 seq
   crw-rw 1 root audio 116, 33 Sep 18 08:10 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay': 'aplay'
  ApportVersion: 2.20.11-0ubuntu7
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord': 
'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CurrentDmesg:
   
  Date: Wed Sep 18 08:18:54 2019
  IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig': 'iwconfig'
  MachineType: Intel Corporation S1200RP
  PciMultimedia:
   
  ProcFB: 0 mgag200drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.3.0-10-generic 
root=UUID=b0d2ae4e-12dd-423e-acea-272ee8b2a893 ro
  RelatedPackageVersions:
   linux-restricted-modules-5.3.0-10-generic N/A
   linux-backports-modules-5.3.0-10-generic  N/A
   linux-firmware1.182
  RfKill: Error: [Errno 2] No such file or directory: 'rfkill': 'rfkill'
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 07/01/2015
  dmi.bios.vendor: Intel Corp.
  dmi.bios.version: S1200RP.86B.03.02.0003.070120151022
  dmi.board.asset.tag: 
  dmi.board.name: S1200RP
  dmi.board.vendor: Intel Corporation
  dmi.board.version: G62254-407
  dmi.chassis.asset.tag: .

[Kernel-packages] [Bug 1881322] Re: Touchpad not detected in 'Lenovo V15-IIL model 82C5' after installing Ubuntu 20.04

2021-04-27 Thread Runar Ingebrigtsen
This workes for me on a Lenovo V15-II

Edit `/etc/default/grub` and change the line
"GRUB_CMDLINE_LINUX_DEFAULT" adding "i8042.nopnp=1" within the quotes.

Run `sudo update-grub`

Reboot.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1881322

Title:
  Touchpad not detected in 'Lenovo V15-IIL model 82C5' after installing
  Ubuntu 20.04

Status in linux package in Ubuntu:
  Expired

Bug description:
  Ubuntu 20.04 is installed in a brand new Lenovo V15-IIL alongside
  Windows 10. According to lenovo's support page, the driver for windows
  is Synaptics 19.5.10.149_Elan 22.4.18.1. In windows the touchpad works
  fine.

  This model has two options in BIOS regarding Fn Keys, a "Smart Fn key"
  that toogles the Fn key on/off each time you press it and a "Foolproof
  Fn Key" that maps the Fn key to Ctrl when you press a combinations of
  keys that does not have a Fn assigned. When I enable the "foolproof fn
  key" in the BIOS, the Fn + F1...F12 and the sound driver stop working
  (i dont have sound, i can't change the volume and the volume icon in
  the GUI does not show). Fn+F6 (to enable/disable touchpad) can't
  enable it.

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.4.0-33-generic 5.4.0-33.37
  ProcVersionSignature: Ubuntu 5.4.0-33.37-generic 5.4.34
  Uname: Linux 5.4.0-33-generic x86_64
  ApportVersion: 2.20.11-0ubuntu27
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  fdadam 1434 F pulseaudio
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Fri May 29 13:08:24 2020
  InstallationDate: Installed on 2020-05-28 (1 days ago)
  InstallationMedia: Ubuntu 20.04 LTS "Focal Fossa" - Release amd64 (20200423)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 003: ID 04f2:b624 Chicony Electronics Co., Ltd Integrated 
Camera
   Bus 001 Device 002: ID 0458:0186 KYE Systems Corp. (Mouse Systems) Genius 
DX-120 Mouse
   Bus 001 Device 004: ID 8087:0aaa Intel Corp. 
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: LENOVO 82C5
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.4.0-33-generic 
root=UUID=fd0c8ed1-6032-467c-9902-3094e6740be8 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-5.4.0-33-generic N/A
   linux-backports-modules-5.4.0-33-generic  N/A
   linux-firmware1.187
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 03/04/2020
  dmi.bios.vendor: LENOVO
  dmi.bios.version: DKCN26WW
  dmi.board.asset.tag: NO Asset Tag
  dmi.board.name: LNVNB161216
  dmi.board.vendor: LENOVO
  dmi.board.version: NO DPK
  dmi.chassis.asset.tag: NO Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Lenovo V15-IIL
  dmi.modalias: 
dmi:bvnLENOVO:bvrDKCN26WW:bd03/04/2020:svnLENOVO:pn82C5:pvrLenovoV15-IIL:rvnLENOVO:rnLNVNB161216:rvrNODPK:cvnLENOVO:ct10:cvrLenovoV15-IIL:
  dmi.product.family: V15-IIL
  dmi.product.name: 82C5
  dmi.product.sku: LENOVO_MT_82C5_BU_idea_FM_V15-IIL
  dmi.product.version: Lenovo V15-IIL
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1881322/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1891003] Re: mem-on-off-test.sh from memory-hotplug in ubuntu_kernel_selftests failed with script is not executable

2021-04-27 Thread Kelsey Skunberg
** Tags added: 5.8 groovy

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1891003

Title:
  mem-on-off-test.sh from memory-hotplug in ubuntu_kernel_selftests
  failed with script is not executable

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Bionic:
  Confirmed
Status in linux source package in Focal:
  Confirmed
Status in linux source package in Groovy:
  Confirmed

Bug description:
  Issue found on Bionic 5.3.0-1033.35-aws

  TAP version 13
   1..1
   # selftests: memory-hotplug: mem-on-off-test.sh
   # Warning: file mem-on-off-test.sh is not executable, correct this.
   not ok 1 selftests: memory-hotplug: mem-on-off-test.sh
   make[1]: Leaving directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/memory-hotplug'
   make: Leaving directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests'
  ubuntu_ker:0242| == Summary ===
  ubuntu_ker:0076| Sub test case: mem-on-off-test.sh failed.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1891003/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1892860] Re: af_alg07 in crypto / cve-2019-8912 in cve from ubuntu_ltp failed on B-arm64

2021-04-27 Thread Kelsey Skunberg
** Tags added: sru-20210412

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1892860

Title:
  af_alg07 in crypto / cve-2019-8912 in cve from ubuntu_ltp failed on
  B-arm64

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Issue found on 4.15.0-114.115-generic with ARM64 node appleton-kernel
  and wright-kernel.

  Looks like this is a new test case added 13 days ago:
  
https://github.com/linux-test-project/ltp/commit/fdff6139e43aa9b19f27907f6d7f2cb4765632a1#diff-8a83d6b2c6c7d74e750e3af47e3f4a79

  The test will fail with:
   startup='Fri Aug 14 10:13:27 2020'
   tst_test.c:1247: INFO: Timeout per run is 0h 05m 00s
   tst_taint.c:88: CONF: Ignoring already set kernel warning taint
   ../../../include/tst_fuzzy_sync.h:507: INFO: Minimum sampling period ended
   ../../../include/tst_fuzzy_sync.h:331: INFO: loop = 1024, delay_bias = 0
   ../../../include/tst_fuzzy_sync.h:320: INFO: start_a - start_b: { avg = 
-2259470ns, avg_dev = 13695382ns, dev_ratio = 6.06 }
   ../../../include/tst_fuzzy_sync.h:320: INFO: end_a - start_a : { avg = 
13968ns, avg_dev = 4310ns, dev_ratio = 0.31 } 
   ../../../include/tst_fuzzy_sync.h:320: INFO: end_b - start_b : { avg = 
15975ns, avg_dev = 50ns, dev_ratio = 0.00 } 
   ../../../include/tst_fuzzy_sync.h:320: INFO: end_a - end_b : { avg = 
-2261477ns, avg_dev = 13699742ns, dev_ratio = 6.06 }
   ../../../include/tst_fuzzy_sync.h:320: INFO: spins : { avg = 3575095 , 
avg_dev = 4553 , dev_ratio = 0.00 } 
   ../../../include/tst_fuzzy_sync.h:637: INFO: Exceeded execution time, 
requesting exit
   af_alg07.c:97: FAIL: fchownat() failed to fail, kernel may be vulnerable

   HINT: You _MAY_ be missing kernel fixes, see:

  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9060cb719e61

   HINT: You _MAY_ be vulnerable to CVE(s), see:

   https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8912

   Summary:
   passed 0
   failed 1
   skipped 1
   warnings 0
   tag=af_alg07 stime=159747 dur=150 exit=exited stat=33 core=no cu=15051 
cs=0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1892860/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1837035] Re: memcg_stat_rss from controllers in ubuntu_ltp failed

2021-04-27 Thread Kelsey Skunberg
** Tags added: sru-20210412

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1837035

Title:
  memcg_stat_rss from controllers in ubuntu_ltp failed

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Confirmed
Status in linux-aws package in Ubuntu:
  New

Bug description:
  This issue was spotted on an i386 node "pepe" with Disco kernel,
  it failed with:

  memcg_process: shmget() failed: Invalid argument
  /opt/ltp/testcases/bin/memcg_stat_rss.sh: 168: kill: No such process

  memcg_stat_rss 4 TFAIL: Process 1845 exited with 1 after warm up

  
  <<>>
  tag=memcg_stat_rss stime=1563448062
  cmdline="memcg_stat_rss.sh"
  contacts=""
  analysis=exit
  <<>>
  memcg_stat_rss 1 TINFO: Starting test 1
  /opt/ltp/testcases/bin/memcg_stat_rss.sh: 522: echo: echo: I/O error
  memcg_stat_rss 1 TINFO: set /dev/memcg/memory.use_hierarchy to 0 failed
  memcg_stat_rss 1 TINFO: Running memcg_process --mmap-anon -s 135168
  memcg_stat_rss 1 TINFO: Warming up pid: 1784
  memcg_stat_rss 1 TINFO: Process is still here after warm up: 1784
  memcg_stat_rss 1 TPASS: rss is 135168 as expected
  memcg_stat_rss 2 TINFO: Starting test 2
  /opt/ltp/testcases/bin/memcg_stat_rss.sh: 522: echo: echo: I/O error
  memcg_stat_rss 2 TINFO: set /dev/memcg/memory.use_hierarchy to 0 failed
  memcg_stat_rss 2 TINFO: Running memcg_process --mmap-file -s 4096
  memcg_stat_rss 2 TINFO: Warming up pid: 1804
  memcg_stat_rss 2 TINFO: Process is still here after warm up: 1804
  memcg_stat_rss 2 TPASS: rss is 0 as expected
  memcg_stat_rss 3 TINFO: Starting test 3
  /opt/ltp/testcases/bin/memcg_stat_rss.sh: 522: echo: echo: I/O error
  memcg_stat_rss 3 TINFO: set /dev/memcg/memory.use_hierarchy to 0 failed
  memcg_stat_rss 3 TINFO: Running memcg_process --shm -k 3 -s 4096
  memcg_stat_rss 3 TINFO: Warming up pid: 1825
  memcg_stat_rss 3 TINFO: Process is still here after warm up: 1825
  memcg_stat_rss 3 TPASS: rss is 0 as expected
  memcg_stat_rss 4 TINFO: Starting test 4
  /opt/ltp/testcases/bin/memcg_stat_rss.sh: 522: echo: echo: I/O error
  memcg_stat_rss 4 TINFO: set /dev/memcg/memory.use_hierarchy to 0 failed
  memcg_stat_rss 4 TINFO: Running memcg_process --mmap-anon --mmap-file --shm 
-s 135168
  memcg_stat_rss 4 TINFO: Warming up pid: 1845
  memcg_process: shmget() failed: Invalid argument
  /opt/ltp/testcases/bin/memcg_stat_rss.sh: 168: kill: No such process

  memcg_stat_rss 4 TFAIL: Process 1845 exited with 1 after warm up
  memcg_stat_rss 5 TINFO: Starting test 5
  /opt/ltp/testcases/bin/memcg_stat_rss.sh: 522: echo: echo: I/O error
  memcg_stat_rss 5 TINFO: set /dev/memcg/memory.use_hierarchy to 0 failed
  memcg_stat_rss 5 TINFO: Running memcg_process --mmap-lock1 -s 135168
  memcg_stat_rss 5 TINFO: Warming up pid: 1858
  memcg_stat_rss 5 TINFO: Process is still here after warm up: 1858
  memcg_stat_rss 5 TPASS: rss is 135168 as expected
  memcg_stat_rss 6 TINFO: Starting test 6
  /opt/ltp/testcases/bin/memcg_stat_rss.sh: 522: echo: echo: I/O error
  memcg_stat_rss 6 TINFO: set /dev/memcg/memory.use_hierarchy to 0 failed
  memcg_stat_rss 6 TINFO: Running memcg_process --mmap-anon -s 135168
  memcg_stat_rss 6 TINFO: Warming up pid: 1878
  memcg_stat_rss 6 TINFO: Process is still here after warm up: 1878
  memcg_stat_rss 6 TPASS: rss is 135168 as expected
  memcg_stat_rss 7 TPASS: rss is 0 as expected
  memcg_stat_rss 8 TINFO: Starting test 7
  /opt/ltp/testcases/bin/memcg_stat_rss.sh: 522: echo: echo: I/O error
  memcg_stat_rss 8 TINFO: set /dev/memcg/memory.use_hierarchy to 0 failed
  memcg_stat_rss 8 TINFO: Running memcg_process --mmap-file -s 4096
  memcg_stat_rss 8 TINFO: Warming up pid: 1901
  memcg_stat_rss 8 TINFO: Process is still here after warm up: 1901
  memcg_stat_rss 8 TPASS: rss is 0 as expected
  memcg_stat_rss 9 TPASS: rss is 0 as expected
  memcg_stat_rss 10 TINFO: Starting test 8
  /opt/ltp/testcases/bin/memcg_stat_rss.sh: 522: echo: echo: I/O error
  memcg_stat_rss 10 TINFO: set /dev/memcg/memory.use_hierarchy to 0 failed
  memcg_stat_rss 10 TINFO: Running memcg_process --shm -k 8 -s 4096
  memcg_stat_rss 10 TINFO: Warming up pid: 1925
  memcg_stat_rss 10 TINFO: Process is still here after warm up: 1925
  memcg_stat_rss 10 TPASS: rss is 0 as expected
  memcg_stat_rss 11 TPASS: rss is 0 as expected
  memcg_stat_rss 12 TINFO: Starting test 9
  /opt/ltp/testcases/bin/memcg_stat_rss.sh: 522: echo: echo: I/O error
  memcg_stat_rss 12 TINFO: set /dev/memcg/memory.use_hierarchy to 0 failed
  memcg_stat_rss 12 TINFO: Running memcg_process --mmap-anon --mmap-file --shm 
-s 135168
  memcg_stat_rss 12 TINFO: Warming up pid: 1948
  memcg_process: shmget() failed: Invalid argument
  /opt/ltp/testcases/bin/memcg_stat_rss.sh: 168: kill: No such process

  memcg_stat_rss 12 TFAIL: Process 1948 exited with 1 after warm up
  memcg_stat_rss 13 TINFO: Starting test 10
  /opt/ltp/testcases/bin/memcg_stat_r

[Kernel-packages] [Bug 1836167] Re: cpuhotplug03 in cpuhotplug from ubuntu_ltp failed on some testing nodes

2021-04-27 Thread Kelsey Skunberg
** Tags added: sru-20210412

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836167

Title:
  cpuhotplug03 in cpuhotplug from ubuntu_ltp failed on some testing
  nodes

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Confirmed

Bug description:
  <<>>
  incrementing stop
  Name:   cpuhotplug03
  Date:   Thu Jul 11 08:31:48 UTC 2019
  Desc:   Do tasks get scheduled to a newly on-lined CPU?

  CPU is 1
  sh: echo: I/O error
  cpuhotplug03 1 TBROK: CPU1 cannot be offlined
  USER   PID %CPU %MEMVSZ   RSS TTY  STAT START   TIME COMMAND
  root  4642  0.0  0.0   2020   488 pts/0R08:31   0:00 /bin/sh 
/opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
  root  4643  0.0  0.0   2020   480 pts/0R08:31   0:00 /bin/sh 
/opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
  root  4644  0.0  0.0   2020   468 pts/0R08:31   0:00 /bin/sh 
/opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
  root  4645  0.0  0.0   2020   488 pts/0R08:31   0:00 /bin/sh 
/opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
  root  4646  0.0  0.0   2020   472 pts/0R08:31   0:00 /bin/sh 
/opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
  root  4647  0.0  0.0   2020   480 pts/0R08:31   0:00 /bin/sh 
/opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
  root  4648  0.0  0.0   2020   456 pts/0R08:31   0:00 /bin/sh 
/opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
  root  4649  0.0  0.0   2020   508 pts/0R08:31   0:00 /bin/sh 
/opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
  root  4650  0.0  0.0   2020   488 pts/0R08:31   0:00 /bin/sh 
/opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
  root  4651  0.0  0.0   2020   472 pts/0R08:31   0:00 /bin/sh 
/opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
  root  4652  0.0  0.0   2020   484 pts/0R08:31   0:00 /bin/sh 
/opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
  root  4653  0.0  0.0   2020   496 pts/0R08:31   0:00 /bin/sh 
/opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
  root  4654  0.0  0.0   2020   464 pts/0R08:31   0:00 /bin/sh 
/opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
  root  4655  0.0  0.0   2020   492 pts/0R08:31   0:00 /bin/sh 
/opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
  root  4656  0.0  0.0   2020   448 pts/0R08:31   0:00 /bin/sh 
/opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
  root  4657  0.0  0.0   2020   472 pts/0R08:31   0:00 /bin/sh 
/opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
  root  4661  0.0  0.0   7540   648 pts/0S08:31   0:00 grep 
cpuhotplug_do_spin_loop
  cpuhotplug03 1 TINFO: Onlining CPU 1
7 /bin/sh /opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
1 /bin/sh /opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
4 /bin/sh /opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
0 /bin/sh /opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
3 /bin/sh /opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
6 /bin/sh /opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
1 /bin/sh /opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
5 /bin/sh /opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
3 /bin/sh /opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
7 /bin/sh /opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
6 /bin/sh /opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
2 /bin/sh /opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
4 /bin/sh /opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
2 /bin/sh /opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
0 /bin/sh /opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
5 /bin/sh /opt/ltp/testcases/bin/cpuhotplug_do_spin_loop
  cpuhotplug03 1 TPASS: 2 cpuhotplug_do_spin_loop processes found onCPU1
  <<>>
  initiation_status="ok"
  duration=1 termination_type=exited termination_id=2 corefile=no
  cutime=1060 cstime=9
  <<>>

  
  Test passed on ThunderX ARM64, probably a test case issue.

  
  Steps to run this test:
git clone --depth=1 https://github.com/linux-test-project/ltp.git
cd ltp; make autotools; ./configure; make; sudo make install
echo "cpuhotplug03 cpuhotplug03.sh -c 1 -l 1" > /tmp/jobs
sudo /opt/ltp/runltp -f /tmp/jobs

  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-25-generic 4.18.0-25.26
  ProcVersionSignature: User Name 4.18.0-25.26-generic 4.18.20
  Uname: Linux 4.18.0-25-generic aarch64
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 Jul 11 06:57 seq
   crw-rw 1 root audio 116, 33 Jul 11 06:57 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay': 'aplay'
  ApportVersion: 2.20.10-0ubuntu13.4
  Architecture: arm64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord': 
'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  Date: Thu Jul 11 08:22:51 

[Kernel-packages] [Bug 1905203] Re: selftests: net: fib_nexthops.sh in linux from Groovy/linux 5.8.0-30.32 ADT test failure

2021-04-27 Thread Kelsey Skunberg
** Tags added: sru-20210412

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1905203

Title:
  selftests: net: fib_nexthops.sh in linux from Groovy/linux 5.8.0-30.32
  ADT test failure

Status in ubuntu-kernel-tests:
  Confirmed
Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Groovy:
  Confirmed

Bug description:
  Testing failed on:
  amd64: 
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-groovy/groovy/amd64/l/linux/20201119_073627_7226f@/log.gz


  06:29:30 DEBUG| [stdout] # selftests: net: fib_nexthop_multiprefix.sh

  [...]

  06:29:37 DEBUG| [stdout] # 
  06:29:37 DEBUG| [stdout] # IPv4 nexthop api compat mode
  06:29:37 DEBUG| [stdout] # 
  06:29:37 DEBUG| [stdout] # TEST: IPv4 default nexthop compat mode check   
 [ OK ]
  06:29:37 DEBUG| [stdout] # TEST: IPv4 compat mode on - route add notification 
 [FAIL]
  06:29:37 DEBUG| [stdout] # TEST: IPv4 compat mode on - route dump 
 [ OK ]
  06:29:38 DEBUG| [stdout] # TEST: IPv4 compat mode on - nexthop change 
 [ OK ]
  06:29:38 DEBUG| [stdout] # TEST: IPv4 set compat mode - 0 
 [ OK ]
  06:29:38 DEBUG| [stdout] # TEST: IPv4 compat mode off - route add 
notification [ OK ]
  06:29:38 DEBUG| [stdout] # TEST: IPv4 compat mode off - route dump
 [ OK ]
  06:29:38 DEBUG| [stdout] # TEST: IPv4 compat mode off - nexthop change
 [ OK ]
  06:29:38 DEBUG| [stdout] # TEST: IPv4 compat mode off - nexthop delete
 [ OK ]
  06:29:38 DEBUG| [stdout] # TEST: IPv4 set compat mode - 1 
 [ OK ]

  [...]

  06:39:44 DEBUG| [stdout] # Tests passed: 127
  06:39:44 DEBUG| [stdout] # Tests failed:   1
  06:39:44 DEBUG| [stdout] not ok 35 selftests: net: fib_nexthops.sh # exit=1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1905203/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1878389] Re: tpci from kernel_misc in ubuntu_ltp failed with Test-case '13'

2021-04-27 Thread Kelsey Skunberg
** Tags removed: ibm-gt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1878389

Title:
  tpci from kernel_misc in ubuntu_ltp failed with Test-case '13'

Status in ubuntu-kernel-tests:
  Triaged
Status in linux package in Ubuntu:
  Confirmed

Bug description:
  With bug 1868707 fixed, the tpci test can finish now, and it's reporting 
another issue here:
     test_pci  489  TFAIL  :  tpci.c:73: PCI bus 01 slot 01 : Test-case '13'

  Please find attachment for dmesg log and the full test log.

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.4.0-29-generic 5.4.0-29.33
  ProcVersionSignature: User Name 5.4.0-29.33-generic 5.4.30
  Uname: Linux 5.4.0-29-generic x86_64
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 May 13 10:08 seq
   crw-rw 1 root audio 116, 33 May 13 10:08 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay'
  ApportVersion: 2.20.11-0ubuntu27
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CasperMD5CheckResult: skip
  Date: Wed May 13 10:19:01 2020
  IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig'
  MachineType: HP ProLiant DL360 Gen9
  PciMultimedia:

  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=C.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 mgag200drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.4.0-29-generic 
root=UUID=6422cfdd-2a69-4c0b-9784-6809a77ab980 ro
  RelatedPackageVersions:
   linux-restricted-modules-5.4.0-29-generic N/A
   linux-backports-modules-5.4.0-29-generic  N/A
   linux-firmware1.187
  RfKill: Error: [Errno 2] No such file or directory: 'rfkill'
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/25/2017
  dmi.bios.vendor: HP
  dmi.bios.version: P89
  dmi.board.name: ProLiant DL360 Gen9
  dmi.board.vendor: HP
  dmi.chassis.type: 23
  dmi.chassis.vendor: HP
  dmi.modalias: 
dmi:bvnHP:bvrP89:bd04/25/2017:svnHP:pnProLiantDL360Gen9:pvr:rvnHP:rnProLiantDL360Gen9:rvr:cvnHP:ct23:cvr:
  dmi.product.family: ProLiant
  dmi.product.name: ProLiant DL360 Gen9
  dmi.product.sku: 780020-S01
  dmi.sys.vendor: HP

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1878389/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1852976] Re: zram01 / zram02 / zram03 in kernel_misc from ubuntu_ltp failed on D-Oracle

2021-04-27 Thread Kelsey Skunberg
** Tags added: 5.8 groovy sru-20210412

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-oracle in Ubuntu.
https://bugs.launchpad.net/bugs/1852976

Title:
  zram01 / zram02 / zram03 in kernel_misc from ubuntu_ltp failed on
  D-Oracle

Status in ubuntu-kernel-tests:
  Fix Released
Status in linux-aws package in Ubuntu:
  New
Status in linux-signed-oracle package in Ubuntu:
  Invalid
Status in linux-aws source package in Bionic:
  New
Status in linux-signed-oracle source package in Bionic:
  New
Status in linux-aws source package in Disco:
  Won't Fix
Status in linux-signed-oracle source package in Disco:
  Invalid

Bug description:
  It looks like the failures in zram01 are causing zram02 and zram03 to
  fail as well.

  Seems that this is broken since commit 7cfac804 (zram: Rewrite shell
  tests into new API)

   tag=zram01 stime=1573887406 dur=300 exit=signaled stat=9 core=no cu=23757 
cs=7590
   startup='Sat Nov 16 06:56:46 2019'
   zram01 1 TINFO: timeout per run is 0h 5m 0s
   zram01 1 TINFO: create '4' zram device(s)
   zram01 1 TPASS: test succeeded
   zram01 1 TCONF: The device attribute max_comp_streams was introduced in 
kernel 3.15 and deprecated in 4.7
   zram01 2 TINFO: test that we can set compression algorithm
   zram01 2 TINFO: supported algs: [lzo] lz4 lz4hc 842 zstd
   zram01 2 TINFO: /sys/block/zram0/comp_algorithm = 'lzo' (1/4)
   zram01 2 TINFO: /sys/block/zram1/comp_algorithm = 'lzo' (2/4)
   zram01 2 TINFO: /sys/block/zram2/comp_algorithm = 'lzo' (3/4)
   zram01 2 TINFO: /sys/block/zram3/comp_algorithm = 'lzo' (4/4)
   zram01 2 TPASS: test succeeded
   zram01 3 TINFO: set disk size to zram device(s)
   zram01 3 TINFO: /sys/block/zram0/disksize = '26214400' (1/4)
   zram01 3 TINFO: /sys/block/zram1/disksize = '26214400' (2/4)
   zram01 3 TINFO: /sys/block/zram2/disksize = '26214400' (3/4)
   zram01 3 TINFO: /sys/block/zram3/disksize = '402653184' (4/4)
   zram01 3 TPASS: test succeeded
   zram01 4 TINFO: set memory limit to zram device(s)
   zram01 4 TINFO: /sys/block/zram0/mem_limit = '25M' (1/4)
   zram01 4 TINFO: /sys/block/zram1/mem_limit = '25M' (2/4)
   zram01 4 TINFO: /sys/block/zram2/mem_limit = '25M' (3/4)
   zram01 4 TINFO: /sys/block/zram3/mem_limit = '384M' (4/4)
   zram01 4 TPASS: test succeeded
   zram01 5 TINFO: make ext3 filesystem on /dev/zram0
   zram01 5 TINFO: make ext4 filesystem on /dev/zram1
   zram01 5 TINFO: make xfs filesystem on /dev/zram2
   zram01 5 TINFO: make btrfs filesystem on /dev/zram3
   zram01 5 TPASS: zram_makefs succeeded
   zram01 6 TINFO: mount /dev/zram0
   zram01 6 TINFO: mount /dev/zram1
   zram01 6 TINFO: mount /dev/zram2
   zram01 6 TINFO: mount /dev/zram3
   zram01 6 TPASS: mount of zram device(s) succeeded
   zram01 7 TINFO: filling zram0 (it can take long time)
   zram01 7 TPASS: zram0 was filled with '20628' KB
   zram01 7 TPASS: compression ratio: 732.90:1
   zram01 7 TINFO: filling zram1 (it can take long time)
   zram01 7 TPASS: zram1 was filled with '20140' KB
   zram01 7 TPASS: compression ratio: 5151.97:1
   zram01 7 TINFO: filling zram2 (it can take long time)
   zram01 7 TPASS: zram2 was filled with '17756' KB
   zram01 7 TPASS: compression ratio: 285.26:1
   zram01 7 TINFO: filling zram3 (it can take long time)
   zram01 1 TBROK: test killed, timeout! If you are running on slow machine, 
try exporting LTP_TIMEOUT_MUL > 1

   tag=zram02 stime=1573887712 dur=0 exit=exited stat=1 core=no cu=2 cs=0
   startup='Sat Nov 16 07:01:52 2019'
   zram02 1 TINFO: timeout per run is 0h 5m 0s
   zram02 1 TINFO: create '1' zram device(s)
   zram02 1 TFAIL: unexpected num of devices: 4
   /opt/ltp/testcases/bin/zram02.sh: 27: echo: echo: I/O error
   zram02 1 TINFO: AppArmor enabled, this may affect test results
   zram02 1 TINFO: it can be disabled with TST_DISABLE_APPARMOR=1 (requires 
super/root)
   zram02 1 TINFO: loaded AppArmor profiles: none

   Summary:
   passed 0
   failed 1
   skipped 0
   warnings 0

   tag=zram03 stime=1573887718 dur=0 exit=exited stat=2 core=no cu=0 cs=0
   startup='Sat Nov 16 07:01:58 2019'
   zram03 0 TINFO : create a zram device with 536870912 bytes in size.
   zram03 1 TBROK : safe_file_ops.c:301: Failed to close FILE 
'/sys/block/zram0/disksize' at zram03.c:87: errno=EBUSY(16): Device or resource 
busy
   zram03 2 TBROK : safe_file_ops.c:301: Remaining cases broken

  ProblemType: Bug
  DistroRelease: Ubuntu 19.04
  Package: linux-image-5.0.0-1005-oracle 5.0.0-1005.9
  ProcVersionSignature: User Name 5.0.0-1005.9-oracle 5.0.21
  Uname: Linux 5.0.0-1005-oracle x86_64
  ApportVersion: 2.20.10-0ubuntu27.1
  Architecture: amd64
  Date: Mon Nov 18 07:50:37 2019
  SourcePackage: linux-signed-oracle
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1852976/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post t

[Kernel-packages] [Bug 1829978] Re: cpuacct_100_100 from controllers test suite in LTP failed

2021-04-27 Thread Kelsey Skunberg
** Tags added: sru-20210412

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1829978

Title:
  cpuacct_100_100 from controllers test suite in LTP failed

Status in ubuntu-kernel-tests:
  Confirmed
Status in linux package in Ubuntu:
  Incomplete
Status in linux-aws package in Ubuntu:
  New
Status in linux source package in Bionic:
  Incomplete
Status in linux-aws source package in Bionic:
  New

Bug description:
   startup='Wed May 22 06:50:45 2019'
   cpuacct 1 TINFO: timeout per run is 0h 5m 0s
   cpuacct 1 TINFO: cpuacct: /sys/fs/cgroup/cpu,cpuacct
   cpuacct 1 TINFO: Creating 100 subgroups each with 100 processes
   /opt/ltp/testcases/bin/cpuacct.sh: -2110094999: 
/opt/ltp/testcases/bin/cpuacct.sh: Cannot fork
   tag=cpuacct_100_100 stime=1558507845 dur=9 exit=exited stat=2 core=no cu=30 
cs=53

  ProblemType: Bug
  DistroRelease: Ubuntu 18.04
  Package: linux-image-4.15.0-50-generic 4.15.0-50.54
  ProcVersionSignature: User Name 4.15.0-50.54-generic 4.15.18
  Uname: Linux 4.15.0-50-generic x86_64
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 May 22 02:57 seq
   crw-rw 1 root audio 116, 33 May 22 02:57 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay': 'aplay'
  ApportVersion: 2.20.9-0ubuntu7.6
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord': 
'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CurrentDmesg:
   
  Date: Wed May 22 06:59:27 2019
  IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig': 'iwconfig'
  Lsusb: Bus 001 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
  MachineType: QEMU Standard PC (i440FX + PIIX, 1996)
  PciMultimedia:
   
  ProcFB: 0 cirrusdrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.15.0-50-generic 
root=UUID=57e8-9e7f-40ee-934e-f1dce18323e5 ro
  RelatedPackageVersions:
   linux-restricted-modules-4.15.0-50-generic N/A
   linux-backports-modules-4.15.0-50-generic  N/A
   linux-firmware 1.173.6
  RfKill: Error: [Errno 2] No such file or directory: 'rfkill': 'rfkill'
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/01/2014
  dmi.bios.vendor: SeaBIOS
  dmi.bios.version: Ubuntu-1.8.2-1ubuntu1
  dmi.chassis.type: 1
  dmi.chassis.vendor: QEMU
  dmi.chassis.version: pc-i440fx-xenial
  dmi.modalias: 
dmi:bvnSeaBIOS:bvrUbuntu-1.8.2-1ubuntu1:bd04/01/2014:svnQEMU:pnStandardPC(i440FX+PIIX,1996):pvrpc-i440fx-xenial:cvnQEMU:ct1:cvrpc-i440fx-xenial:
  dmi.product.name: Standard PC (i440FX + PIIX, 1996)
  dmi.product.version: pc-i440fx-xenial
  dmi.sys.vendor: QEMU

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1829978/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1829849] Re: proc01 in fs from ubuntu_ltp failed

2021-04-27 Thread Kelsey Skunberg
** Tags added: sru-20210412

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1829849

Title:
  proc01 in fs from ubuntu_ltp failed

Status in ubuntu-kernel-tests:
  Triaged
Status in linux package in Ubuntu:
  Incomplete
Status in linux-aws package in Ubuntu:
  Triaged
Status in linux-azure package in Ubuntu:
  Triaged
Status in linux-oracle-5.0 package in Ubuntu:
  Confirmed

Bug description:
   proc01  0  TINFO  :  /proc/sys/fs/binfmt_misc/register: is write-only.
   proc01  0  TINFO  :  /proc/sys/net/ipv6/conf/all/stable_secret: known 
issue: errno=EIO(5): Input/output error
   proc01  0  TINFO  :  /proc/sys/net/ipv6/conf/default/stable_secret: 
known issue: errno=EIO(5): Input/output error
   proc01  0  TINFO  :  /proc/sys/net/ipv6/conf/ens6/stable_secret: known 
issue: errno=EIO(5): Input/output error
   proc01  0  TINFO  :  /proc/sys/net/ipv6/conf/lo/stable_secret: known 
issue: errno=EIO(5): Input/output error
   proc01  0  TINFO  :  /proc/kmsg: known issue: 
errno=EAGAIN/EWOULDBLOCK(11): Resource temporarily unavailable
   proc01  0  TINFO  :  /proc/sysrq-trigger: is write-only.
   proc01  0  TINFO  :  /proc/self/task/8782/mem: known issue: 
errno=EIO(5): Input/output error
   proc01  0  TINFO  :  /proc/self/task/8782/clear_refs: is write-only.
   proc01  0  TINFO  :  /proc/self/task/8782/pagemap: reached maxmbytes (-m)
   proc01  0  TINFO  :  /proc/self/task/8782/attr/prev: known issue: 
errno=EINVAL(22): Invalid argument
   proc01  0  TINFO  :  /proc/self/task/8782/attr/exec: known issue: 
errno=EINVAL(22): Invalid argument
   proc01  0  TINFO  :  /proc/self/task/8782/attr/fscreate: known issue: 
errno=EINVAL(22): Invalid argument
   proc01  0  TINFO  :  /proc/self/task/8782/attr/keycreate: known issue: 
errno=EINVAL(22): Invalid argument
   proc01  0  TINFO  :  /proc/self/task/8782/attr/sockcreate: known issue: 
errno=EINVAL(22): Invalid argument
   proc01  1  TFAIL  :  proc01.c:397: read failed: 
/proc/self/task/8782/attr/selinux/current: errno=EINVAL(22): Invalid argument
   proc01  2  TFAIL  :  proc01.c:397: read failed: 
/proc/self/task/8782/attr/selinux/prev: errno=EINVAL(22): Invalid argument
   proc01  3  TFAIL  :  proc01.c:397: read failed: 
/proc/self/task/8782/attr/selinux/exec: errno=EINVAL(22): Invalid argument
   proc01  4  TFAIL  :  proc01.c:397: read failed: 
/proc/self/task/8782/attr/selinux/fscreate: errno=EINVAL(22): Invalid argument
   proc01  5  TFAIL  :  proc01.c:397: read failed: 
/proc/self/task/8782/attr/selinux/keycreate: errno=EINVAL(22): Invalid argument
   proc01  6  TFAIL  :  proc01.c:397: read failed: 
/proc/self/task/8782/attr/selinux/sockcreate: errno=EINVAL(22): Invalid argument
   proc01  7  TFAIL  :  proc01.c:397: read failed: 
/proc/self/task/8782/attr/smack/current: errno=EINVAL(22): Invalid argument
   proc01  8  TFAIL  :  proc01.c:397: read failed: 
/proc/self/task/8782/attr/apparmor/prev: errno=EINVAL(22): Invalid argument
   proc01  9  TFAIL  :  proc01.c:397: read failed: 
/proc/self/task/8782/attr/apparmor/exec: errno=EINVAL(22): Invalid argument
   proc01  0  TINFO  :  /proc/self/mem: known issue: errno=EIO(5): 
Input/output error
   proc01  0  TINFO  :  /proc/self/clear_refs: is write-only.
   proc01  0  TINFO  :  /proc/self/pagemap: reached maxmbytes (-m)
   proc01  0  TINFO  :  /proc/self/attr/prev: known issue: 
errno=EINVAL(22): Invalid argument
   proc01  0  TINFO  :  /proc/self/attr/exec: known issue: 
errno=EINVAL(22): Invalid argument
   proc01  0  TINFO  :  /proc/self/attr/fscreate: known issue: 
errno=EINVAL(22): Invalid argument
   proc01  0  TINFO  :  /proc/self/attr/keycreate: known issue: 
errno=EINVAL(22): Invalid argument
   proc01  0  TINFO  :  /proc/self/attr/sockcreate: known issue: 
errno=EINVAL(22): Invalid argument
   proc01 10  TFAIL  :  proc01.c:397: read failed: 
/proc/self/attr/selinux/current: errno=EINVAL(22): Invalid argument
   proc01 11  TFAIL  :  proc01.c:397: read failed: 
/proc/self/attr/selinux/prev: errno=EINVAL(22): Invalid argument
   proc01 12  TFAIL  :  proc01.c:397: read failed: 
/proc/self/attr/selinux/exec: errno=EINVAL(22): Invalid argument
   proc01 13  TFAIL  :  proc01.c:397: read failed: 
/proc/self/attr/selinux/fscreate: errno=EINVAL(22): Invalid argument
   proc01 14  TFAIL  :  proc01.c:397: read failed: 
/proc/self/attr/selinux/keycreate: errno=EINVAL(22): Invalid argument
   proc01 15  TFAIL  :  proc01.c:397: read failed: 
/proc/self/attr/selinux/sockcreate: errno=EINVAL(22): Invalid argument
   proc01 16  TFAIL  :  proc01.c:397: read failed: 
/proc/self/attr/smack/current: errno=EINVAL(22): Invalid argument
   proc01 17  TFAIL  :  proc01.c:397: read failed: 
/proc/self/attr/apparmor/prev: errno=EINVAL(22): Invalid argument
   proc01

[Kernel-packages] [Bug 1900438] Re: Bcache bypasse writeback on caching device with fragmentation

2021-04-27 Thread dongdong tao
I used the same steps to verify it and can confirm it's succeeded in
bionic-proposed too

fio --name=test1 --filename /dev/bcache0 --direct 1 --rw=randrw
--bs=32k,4k --ioengine=libaio --iodepth=1

Then I monitoring the cache_available_percent and writeback rate.
I no longer see the cache_available_percent dropped to 30 and writeback rate 
stucked at 4k.
I can see the rate got accelerated while the dirty buckets hit the 
writeback_rate_*_fp_term, which is expected

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1900438

Title:
  Bcache bypasse writeback on caching device with fragmentation

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Bionic:
  Fix Committed
Status in linux source package in Focal:
  Fix Committed
Status in linux source package in Groovy:
  Fix Committed
Status in linux source package in Hirsute:
  Fix Released

Bug description:
  SRU Justification:

  [Impact]
  This bug in bcache affects I/O performance on all versions of the kernel 
[correct versions affected]. It is particularly negative on ceph if used with 
bcache.

  Write I/O latency would suddenly go to around 1 second from around 10
  ms when hitting this issue and would easily be stuck there for hours
  or even days, especially bad for ceph on bcache architecture. This
  would make ceph extremely slow and make the entire cloud almost
  unusable.

  The root cause is that the dirty bucket had reached the 70 percent
  threshold, thus causing all writes to go direct to the backing HDD
  device. It might be fine if it actually had a lot of dirty data, but
  this happens when dirty data has not even reached over 10 percent, due
  to having high memory fragmentation. What makes it worse is that the
  writeback rate might be still at minimum value (8) due to the
  writeback percent not reached, so it takes ages for bcache to really
  reclaim enough dirty buckets to get itself out of this situation.

  [Fix]

  * 71dda2a5625f31bc3410cb69c3d31376a2b66f28 “bcache: consider the
  fragmentation when update the writeback rate”

  The current way to calculate the writeback rate only considered the dirty 
sectors.
  This usually works fine when memory fragmentation is not high, but it will 
give us an unreasonably low writeback rate when we are in the situation that a 
few dirty sectors have consumed a lot of dirty buckets. In some cases, the 
dirty buckets reached  CUTOFF_WRITEBACK_SYNC (i.e., stopped writeback)  while 
the dirty data (sectors) had not even reached the writeback_percent threshold 
(i.e., started writeback). In that situation, the writeback rate will still be 
the minimum value (8*512 = 4KB/s), thus it will cause all the writes to bestuck 
in a non-writeback mode because of the slow writeback.

  We accelerate the rate in 3 stages with different aggressiveness:
  the first stage starts when dirty buckets percent reach above 
BCH_WRITEBACK_FRAGMENT_THRESHOLD_LOW (50),
  the second is BCH_WRITEBACK_FRAGMENT_THRESHOLD_MID (57),
  the third is BCH_WRITEBACK_FRAGMENT_THRESHOLD_HIGH (64).

  By default the first stage tries to writeback the amount of dirty data
  in one bucket (on average) in (1 / (dirty_buckets_percent - 50)) seconds,
  the second stage tries to writeback the amount of dirty data in one bucket
  in (1 / (dirty_buckets_percent - 57)) * 100 milliseconds, the third
  stage tries to writeback the amount of dirty data in one bucket in
  (1 / (dirty_buckets_percent - 64)) milliseconds.

  The initial rate at each stage can be controlled by 3 configurable
  parameters:

  writeback_rate_fp_term_{low|mid|high}

  They are by default 1, 10, 1000, chosen based on testing and
  production data, detailed below.

  A. When it comes to the low stage, it is still far from the 70%
     threshold, so we only want to give it a little bit push by setting the
     term to 1, it means the initial rate will be 170 if the fragment is 6,
     it is calculated by bucket_size/fragment, this rate is very small,
     but still much more reasonable than the minimum 8.
     For a production bcache with non-heavy workload, if the cache device
     is bigger than 1 TB, it may take hours to consume 1% buckets,
     so it is very possible to reclaim enough dirty buckets in this stage,
     thus to avoid entering the next stage.

  B. If the dirty buckets ratio didn’t turn around during the first stage,
     it comes to the mid stage, then it is necessary for mid stage
     to be more aggressive than low stage, so the initial rate is chosen
     to be 10 times more than the low stage, which means 1700 as the initial
     rate if the fragment is 6. This is a normal rate
     we usually see for a normal workload when writeback happens
     because of writeback_percent.

  C. If the dirty buckets ratio didn't turn around during the low and mid
     stages, it comes to the third stage, and it is the last chan

[Kernel-packages] [Bug 1926236] Re: Fix The sound has noise while audio volume is maximum

2021-04-27 Thread koba
** Description changed:

  [Impact]
  The sound has noise while turning the audio volume to maximum
  
  [Fix]
  For VEGA & Polaris, need two patches(landed on mainline kernel) to fix and a 
modprobe
  1.(50ceb1fe7a) drm/amd/pm: bug fix for pcie dpm, has landed on oem kernel.
  2.(9d03730ecb) drm/amd/pm: workaround for audio noise issue, has landed on 
oem kernel
  3. #modprobe amdgpu ppfeaturemask=0xfff7bffb.
  For Navi_1x, need smc firmware to fix.
  1. (4fe6e53b96 linux-firmware) amdgpu: update navi10 SMC firmware
  1. (8ab7abaf63 linux-firmware) amdgpu: update navi14 SMC firmware
  
  [Test]
- Verified on RKL platform with wx3200(Polaris series) and wx5500(Navi series).
+ Verified on RKL platform 
+ A. with wx3200(Polaris series) and the following configuration

+ 1. With these two patch,  

+ 1.1. (50ceb1fe7a) drm/amd/pm: bug fix for pcie dpm, has landed on oem kernel. 
  
+ 1.2. (9d03730ecb) drm/amd/pm: workaround for audio noise issue, has landed on 
oem kernel
+   
   
+ 2. doesn't append ppfeaturemask=0xfff7bffb
   
+   
   
+ Can't observe issue.  
   
+   
   
+ B. With wx5500(Navi series) and update the related firmware,  
  
+ Can't observe issue
  
  [Where problems could occur]
  Because disabling DPM, the power consumption would be slightly higher.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1926236

Title:
  Fix The sound has noise while audio volume is maximum

Status in HWE Next:
  New
Status in linux-firmware package in Ubuntu:
  New
Status in linux-firmware source package in Focal:
  In Progress

Bug description:
  [Impact]
  The sound has noise while turning the audio volume to maximum

  [Fix]
  For VEGA & Polaris, need two patches(landed on mainline kernel) to fix and a 
modprobe
  1.(50ceb1fe7a) drm/amd/pm: bug fix for pcie dpm, has landed on oem kernel.
  2.(9d03730ecb) drm/amd/pm: workaround for audio noise issue, has landed on 
oem kernel
  3. #modprobe amdgpu ppfeaturemask=0xfff7bffb.
  For Navi_1x, need smc firmware to fix.
  1. (4fe6e53b96 linux-firmware) amdgpu: update navi10 SMC firmware
  1. (8ab7abaf63 linux-firmware) amdgpu: update navi14 SMC firmware

  [Test]
  Verified on RKL platform 
  A. with wx3200(Polaris series) and the following configuration

  1. With these two patch,  

  1.1. (50ceb1fe7a) drm/amd/pm: bug fix for pcie dpm, has landed on oem kernel. 
  
  1.2. (9d03730ecb) drm/amd/pm: workaround for audio noise issue, has landed on 
oem kernel

   
  2. doesn't append ppfeaturemask=0xfff7bffb
   

   
  Can't observe issue.  
   

   
  B. With wx5500(Navi series) and update the related firmware,  
  
  Can't observe issue

  [Where problems could occur]
  Because disabling DPM, the power consumption would be slightly higher.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1926236/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1810183] Re: numpad on touchpad doesn't work in ASUS Zenbook 14

2021-04-27 Thread Lucas Santana Carlota
Works perfectly in Fedora 34! Thank you so much!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1810183

Title:
  numpad on touchpad doesn't work in ASUS Zenbook 14

Status in Linux:
  New
Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I have Asus Zenbook 14 UX433FA which I have installed Ubuntu 18.10 alongside 
windows 10. 
  The numeric keypads are within the touchpad and are supposed to be turned on 
by a button on the touchpad. This works well in Windows but doesn't work in 
Ubuntu. 
  I have tried to search for any related problems/solutions online but I 
haven't been able to.
  I will appreciate any suggestion or help.
  Thanks,
  --- 
  ProblemType: Bug
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  CurrentDesktop: ubuntu:GNOME
  DistroRelease: Ubuntu 18.10
  InstallationDate: Installed on 2018-12-30 (4 days ago)
  InstallationMedia: Ubuntu 18.10 "Cosmic Cuttlefish" - Release amd64 
(20181017.3)
  Package: linux (not installed)
  Tags:  cosmic
  Uname: Linux 4.19.11-041911-generic x86_64
  UnreportableReason: The running kernel is not an Ubuntu kernel
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  --- 
  ProblemType: Bug
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  CurrentDesktop: ubuntu:GNOME
  DistroRelease: Ubuntu 18.10
  InstallationDate: Installed on 2018-12-30 (4 days ago)
  InstallationMedia: Ubuntu 18.10 "Cosmic Cuttlefish" - Release amd64 
(20181017.3)
  Package: linux (not installed)
  Tags:  cosmic
  Uname: Linux 4.18.10-041810-generic x86_64
  UnreportableReason: The running kernel is not an Ubuntu kernel
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/1810183/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1878389] Re: tpci from kernel_misc in ubuntu_ltp failed with Test-case '13'

2021-04-27 Thread Kelsey Skunberg
** Tags added: hwe-5.8

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1878389

Title:
  tpci from kernel_misc in ubuntu_ltp failed with Test-case '13'

Status in ubuntu-kernel-tests:
  Triaged
Status in linux package in Ubuntu:
  Confirmed

Bug description:
  With bug 1868707 fixed, the tpci test can finish now, and it's reporting 
another issue here:
     test_pci  489  TFAIL  :  tpci.c:73: PCI bus 01 slot 01 : Test-case '13'

  Please find attachment for dmesg log and the full test log.

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.4.0-29-generic 5.4.0-29.33
  ProcVersionSignature: User Name 5.4.0-29.33-generic 5.4.30
  Uname: Linux 5.4.0-29-generic x86_64
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 May 13 10:08 seq
   crw-rw 1 root audio 116, 33 May 13 10:08 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay'
  ApportVersion: 2.20.11-0ubuntu27
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CasperMD5CheckResult: skip
  Date: Wed May 13 10:19:01 2020
  IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig'
  MachineType: HP ProLiant DL360 Gen9
  PciMultimedia:

  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=C.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 mgag200drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.4.0-29-generic 
root=UUID=6422cfdd-2a69-4c0b-9784-6809a77ab980 ro
  RelatedPackageVersions:
   linux-restricted-modules-5.4.0-29-generic N/A
   linux-backports-modules-5.4.0-29-generic  N/A
   linux-firmware1.187
  RfKill: Error: [Errno 2] No such file or directory: 'rfkill'
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/25/2017
  dmi.bios.vendor: HP
  dmi.bios.version: P89
  dmi.board.name: ProLiant DL360 Gen9
  dmi.board.vendor: HP
  dmi.chassis.type: 23
  dmi.chassis.vendor: HP
  dmi.modalias: 
dmi:bvnHP:bvrP89:bd04/25/2017:svnHP:pnProLiantDL360Gen9:pvr:rvnHP:rnProLiantDL360Gen9:rvr:cvnHP:ct23:cvr:
  dmi.product.family: ProLiant
  dmi.product.name: ProLiant DL360 Gen9
  dmi.product.sku: 780020-S01
  dmi.sys.vendor: HP

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1878389/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1891003] Re: mem-on-off-test.sh from memory-hotplug in ubuntu_kernel_selftests failed with script is not executable

2021-04-27 Thread Kelsey Skunberg
** Tags added: focal hwe-5.8

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1891003

Title:
  mem-on-off-test.sh from memory-hotplug in ubuntu_kernel_selftests
  failed with script is not executable

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Bionic:
  Confirmed
Status in linux source package in Focal:
  Confirmed
Status in linux source package in Groovy:
  Confirmed

Bug description:
  Issue found on Bionic 5.3.0-1033.35-aws

  TAP version 13
   1..1
   # selftests: memory-hotplug: mem-on-off-test.sh
   # Warning: file mem-on-off-test.sh is not executable, correct this.
   not ok 1 selftests: memory-hotplug: mem-on-off-test.sh
   make[1]: Leaving directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/memory-hotplug'
   make: Leaving directory 
'/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests'
  ubuntu_ker:0242| == Summary ===
  ubuntu_ker:0076| Sub test case: mem-on-off-test.sh failed.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1891003/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1834006] Re: cpuset_hotplug from controllers in ubuntu_ltp failed

2021-04-27 Thread Kelsey Skunberg
** Tags added: hwe-5.8

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1834006

Title:
  cpuset_hotplug from controllers in ubuntu_ltp failed

Status in ubuntu-kernel-tests:
  Triaged
Status in linux package in Ubuntu:
  Confirmed
Status in linux-aws package in Ubuntu:
  New
Status in linux-azure package in Ubuntu:
  New
Status in linux source package in Bionic:
  New
Status in linux-aws source package in Bionic:
  New
Status in linux-azure source package in Bionic:
  New
Status in linux source package in Focal:
  New
Status in linux-aws source package in Focal:
  New
Status in linux-azure source package in Focal:
  New

Bug description:
  Issue found on node amaura:
  <<>>
  tag=cpuset_hotplug stime=1561372131
  cmdline="cpuset_hotplug_test.sh"
  contacts=""
  analysis=exit
  <<>>
  incrementing stop
  cpuset_hotplug 1 TFAIL: task's allowed list isn't expected.(Result: 0-15, 
Expect: 0-7)
  cpuset_hotplug 3 TFAIL: task's allowed list isn't expected.(Result: 0-15, 
Expect: 0-7)
  cpuset_hotplug 5 TPASS: Cpuset vs CPU hotplug test succeeded.
  cpuset_hotplug 7 TFAIL: task's cpu allowed list isn't expected(Result: 0-15, 
Expect: 0-7).
  cpuset_hotplug 9 TPASS: Cpuset vs CPU hotplug test succeeded.
  cpuset_hotplug 11 TPASS: Cpuset vs CPU hotplug test succeeded.
  <<>>
  initiation_status="ok"
  duration=1 termination_type=exited termination_id=1 corefile=no
  cutime=19 cstime=81
  <<>>

  Test script:
  
https://github.com/linux-test-project/ltp/blob/master/testcases/kernel/controllers/cpuset/cpuset_hotplug_test/cpuset_hotplug_test.sh

  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-22-generic 4.18.0-22.23
  ProcVersionSignature: User Name 4.18.0-22.23-generic 4.18.20
  Uname: Linux 4.18.0-22-generic x86_64
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 Jun 24 10:25 seq
   crw-rw 1 root audio 116, 33 Jun 24 10:25 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay': 'aplay'
  ApportVersion: 2.20.10-0ubuntu13.3
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord': 
'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  Date: Mon Jun 24 10:30:59 2019
  IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig': 'iwconfig'
  MachineType: Intel Corporation S1200RP
  PciMultimedia:
   
  ProcFB: 0 mgadrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.18.0-22-generic 
root=UUID=b0d2ae4e-12dd-423e-acea-272ee8b2a893 ro
  RelatedPackageVersions:
   linux-restricted-modules-4.18.0-22-generic N/A
   linux-backports-modules-4.18.0-22-generic  N/A
   linux-firmware 1.175.4
  RfKill: Error: [Errno 2] No such file or directory: 'rfkill': 'rfkill'
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 07/01/2015
  dmi.bios.vendor: Intel Corp.
  dmi.bios.version: S1200RP.86B.03.02.0003.070120151022
  dmi.board.asset.tag: 
  dmi.board.name: S1200RP
  dmi.board.vendor: Intel Corporation
  dmi.board.version: G62254-407
  dmi.chassis.asset.tag: 
  dmi.chassis.type: 17
  dmi.chassis.vendor: ..
  dmi.chassis.version: ..
  dmi.modalias: 
dmi:bvnIntelCorp.:bvrS1200RP.86B.03.02.0003.070120151022:bd07/01/2015:svnIntelCorporation:pnS1200RP:pvr:rvnIntelCorporation:rnS1200RP:rvrG62254-407:cvn..:ct17:cvr..:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: S1200RP
  dmi.product.sku: To be filled by O.E.M.
  dmi.product.version: 
  dmi.sys.vendor: Intel Corporation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1834006/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1829984] Re: memcg_usage_in_bytes from controllers test suite in LTP failed

2021-04-27 Thread Kelsey Skunberg
** Tags added: hwe-5.8

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1829984

Title:
  memcg_usage_in_bytes from controllers test suite in LTP failed

Status in ubuntu-kernel-tests:
  Confirmed
Status in linux package in Ubuntu:
  Confirmed
Status in linux-aws package in Ubuntu:
  New
Status in linux source package in Xenial:
  New
Status in linux-aws source package in Xenial:
  New
Status in linux source package in Bionic:
  Confirmed
Status in linux-aws source package in Bionic:
  New
Status in linux source package in Cosmic:
  Confirmed
Status in linux-aws source package in Cosmic:
  New

Bug description:
   startup='Wed May 22 05:59:09 2019'
   memcg_usage_in_bytes_test 1 TINFO: Starting test 1
   sh: echo: I/O error
   memcg_usage_in_bytes_test 1 TINFO: set /dev/memcg/memory.use_hierarchy to 0 
failed
   memcg_usage_in_bytes_test 1 TINFO: Running memcg_process --mmap-anon -s 
4194304
   memcg_usage_in_bytes_test 1 TINFO: Warming up pid: 31689
   memcg_usage_in_bytes_test 1 TINFO: Process is still here after warm up: 31689
   memcg_usage_in_bytes_test 1 TFAIL: memory.usage_in_bytes is 4202496, 4194304 
expected
   memcg_usage_in_bytes_test 2 TINFO: Starting test 2
   sh: echo: I/O error
   memcg_usage_in_bytes_test 2 TINFO: set /dev/memcg/memory.use_hierarchy to 0 
failed
   memcg_usage_in_bytes_test 2 TCONF: mem+swap is not enabled
   tag=memcg_usage_in_bytes stime=1558504749 dur=1 exit=exited stat=33 core=no 
cu=5 cs=3

  ProblemType: Bug
  DistroRelease: Ubuntu 18.04
  Package: linux-image-4.15.0-50-generic 4.15.0-50.54
  ProcVersionSignature: User Name 4.15.0-50.54-generic 4.15.18
  Uname: Linux 4.15.0-50-generic x86_64
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 May 22 02:57 seq
   crw-rw 1 root audio 116, 33 May 22 02:57 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay': 'aplay'
  ApportVersion: 2.20.9-0ubuntu7.6
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord': 
'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CurrentDmesg:
   [14538.862950] cfg80211: Loading compiled-in X.509 certificates for 
regulatory database
   [14538.874559] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
  Date: Wed May 22 07:17:43 2019
  IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig': 'iwconfig'
  Lsusb: Bus 001 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
  MachineType: QEMU Standard PC (i440FX + PIIX, 1996)
  PciMultimedia:
   
  ProcFB: 0 cirrusdrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.15.0-50-generic 
root=UUID=57e8-9e7f-40ee-934e-f1dce18323e5 ro
  RelatedPackageVersions:
   linux-restricted-modules-4.15.0-50-generic N/A
   linux-backports-modules-4.15.0-50-generic  N/A
   linux-firmware 1.173.6
  RfKill: Error: [Errno 2] No such file or directory: 'rfkill': 'rfkill'
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/01/2014
  dmi.bios.vendor: SeaBIOS
  dmi.bios.version: Ubuntu-1.8.2-1ubuntu1
  dmi.chassis.type: 1
  dmi.chassis.vendor: QEMU
  dmi.chassis.version: pc-i440fx-xenial
  dmi.modalias: 
dmi:bvnSeaBIOS:bvrUbuntu-1.8.2-1ubuntu1:bd04/01/2014:svnQEMU:pnStandardPC(i440FX+PIIX,1996):pvrpc-i440fx-xenial:cvnQEMU:ct1:cvrpc-i440fx-xenial:
  dmi.product.name: Standard PC (i440FX + PIIX, 1996)
  dmi.product.version: pc-i440fx-xenial
  dmi.sys.vendor: QEMU

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1829984/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1926205] Re: graphic interface faulty

2021-04-27 Thread arturpio
Confirmation: with Ubuntu 20.04.2 LTS everything works just fine,
smooth, fast, sound and brilliant, as usual.

Boot is fast and left side dock loads instantly.
Touch screen + mouse - no problem.
Dynamic work-spaces - no any problem.

Even "contacts" Gnome application connect to Google account, which is
not done under 21.04

so, the problems are really somewhere in the 21.04 release; HP ENVY x360
hardware platform (AMD® Ryzen 5 4500u with Radeon graphics, AMD® Renoir)
is ok and compatible.

if I can do something to help debug this problem, please message me.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1926205

Title:
  graphic interface faulty

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  hi,

  first, after boot and log-in, the interface elements are slow to
  display. the left-screen dock is empty and shows only after some time.
  then, I must wait to have access to program (applications) menu
  ("Activities").

  the graphic interface itself become buggy and faulty when using multi-
  workspace (dynamic work-spaces displays).

  when I launch a program on second workspace screen:
  the mouse click stop to have any result (mouse and touchpad)
  then, I can not change workspace.
  then, programs freezes
  I need to reboot the computer to regain any control.

  I try 20.04.2.0 LTS on this computer, witch works fine. no any
  smallest problem.

  Description:  Ubuntu 21.04
  Release:  21.04

  ProblemType: Bug
  DistroRelease: Ubuntu 21.04
  Package: xorg 1:7.7+22ubuntu1
  ProcVersionSignature: Ubuntu 5.11.0-16.17-generic 5.11.12
  Uname: Linux 5.11.0-16-generic x86_64
  ApportVersion: 2.20.11-0ubuntu65
  Architecture: amd64
  BootLog: Error: [Errno 13] Permission non accordée: '/var/log/boot.log'
  CasperMD5CheckResult: pass
  CompositorRunning: None
  CurrentDesktop: ubuntu:GNOME
  Date: Mon Apr 26 22:07:16 2021
  DistUpgraded: Fresh install
  DistroCodename: hirsute
  DistroVariant: ubuntu
  ExtraDebuggingInterest: Yes
  GraphicsCard:
   Advanced Micro Devices, Inc. [AMD/ATI] Renoir [1002:1636] (rev c3) (prog-if 
00 [VGA controller])
 Subsystem: Hewlett-Packard Company Renoir [103c:876e]
  InstallationDate: Installed on 2021-04-25 (1 days ago)
  InstallationMedia: Ubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: HP HP ENVY x360 Convertible 13-ay0xxx
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.11.0-16-generic 
root=UUID=d493468f-47f4-4515-898b-919d7fdf1949 ro quiet splash vt.handoff=7
  SourcePackage: xorg
  Symptom: display
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 12/10/2020
  dmi.bios.release: 15.16
  dmi.bios.vendor: Insyde
  dmi.bios.version: F.16
  dmi.board.asset.tag: Type2 - Board Asset Tag
  dmi.board.name: 876E
  dmi.board.vendor: HP
  dmi.board.version: 12.43
  dmi.chassis.asset.tag: Chassis Asset Tag
  dmi.chassis.type: 31
  dmi.chassis.vendor: HP
  dmi.chassis.version: Chassis Version
  dmi.ec.firmware.release: 12.43
  dmi.modalias: 
dmi:bvnInsyde:bvrF.16:bd12/10/2020:br15.16:efr12.43:svnHP:pnHPENVYx360Convertible13-ay0xxx:pvrType1ProductConfigId:rvnHP:rn876E:rvr12.43:cvnHP:ct31:cvrChassisVersion:
  dmi.product.family: 103C_5335KV HP Envy
  dmi.product.name: HP ENVY x360 Convertible 13-ay0xxx
  dmi.product.sku: 2U6C7EA#ABZ
  dmi.product.version: Type1ProductConfigId
  dmi.sys.vendor: HP
  version.compiz: compiz N/A
  version.libdrm2: libdrm2 2.4.104-1build1
  version.libgl1-mesa-dri: libgl1-mesa-dri 21.0.1-2
  version.libgl1-mesa-glx: libgl1-mesa-glx N/A
  version.xserver-xorg-core: xserver-xorg-core 2:1.20.11-1ubuntu1
  version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
  version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:19.1.0-2
  version.xserver-xorg-video-intel: xserver-xorg-video-intel 
2:2.99.917+git20200714-1ubuntu1
  version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 1:1.0.17-1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1926205/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1894964] Re: Unable to build ubuntu_bpf test on Groovy 5.8 KVM kernel / F-5.8-hwe (blocking net test in ubuntu_kernel_selftests to build)

2021-04-27 Thread Kelsey Skunberg
** Tags added: hwe hwe-5.8

** Tags added: ubuntu-kernel-selftests

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1894964

Title:
  Unable to build ubuntu_bpf test on Groovy 5.8 KVM kernel / F-5.8-hwe
  (blocking net test in ubuntu_kernel_selftests to build)

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Groovy:
  Confirmed

Bug description:
  Issue found on 5.8.0-1001.1 - kvm

  Test build failed with:
  Warning: Kernel ABI header at 'tools/include/uapi/linux/netlink.h' differs 
from latest version at 'include/uapi/linux/netlink.h'
  Warning: Kernel ABI header at 'tools/include/uapi/linux/if_link.h' differs 
from latest version at 'include/uapi/linux/if_link.h'
  In file included from 
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/include/linux/build_bug.h:5,
  from 
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/include/linux/kernel.h:8,
  from 
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/kernel/bpf/disasm.h:10,
  from 
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/kernel/bpf/disasm.c:8:
  /home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/kernel/bpf/disasm.c: In 
function ‘__func_get_name’:
  
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/include/linux/compiler.h:37:38:
 warning: nested extern declaration of ‘__compiletime_assert_0’ 
[-Wnested-externs]
  37 | _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
  | ^
  
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/include/linux/compiler.h:16:15:
 note: in definition of macro ‘__compiletime_assert’
  16 | extern void prefix ## suffix(void) __compiletime_error(msg); \
  | ^~
  
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/include/linux/compiler.h:37:2:
 note: in expansion of macro ‘_compiletime_assert’
  37 | _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
  | ^~~
  
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/include/linux/build_bug.h:39:37:
 note: in expansion of macro ‘compiletime_assert’
  39 | #define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
  | ^~
  
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/include/linux/build_bug.h:50:2:
 note: in expansion of macro ‘BUILD_BUG_ON_MSG’
  50 | BUILD_BUG_ON_MSG(condition, "BUILD_BUG_ON failed: " #condition)
  | ^~~~
  
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/kernel/bpf/disasm.c:20:2: 
note: in expansion of macro ‘BUILD_BUG_ON’
  20 | BUILD_BUG_ON(ARRAY_SIZE(func_id_str) != __BPF_FUNC_MAX_ID);
  | ^~~~
  libbpf: failed to open format: No such file or directory
  Error: failed to load BTF from format: No such file or directory
  make[1]: *** [Makefile:190: 
/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/testing/selftests/bpf/tools/include/vmlinux.h]
 Error 2
  make[1]: *** Deleting file 
'/home/ubuntu/autotest/client/tmp/ubuntu_bpf/src/linux/tools/testing/selftests/bpf/tools/include/vmlinux.h'
  make: *** [Makefile:157: all] Error 2

  Please find attachment for the complete build log.

  As the ubuntu_kernel_selftests needs bpf to be built first, this will
  block the ubuntu_kernel_selftests/net to build as well.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1894964/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


  1   2   >