[Kernel-packages] [Bug 1959542] Re: [22.10 FEAT] [IO2201] Independent Usage of Secondary Physical Function

2022-09-14 Thread Frank Heimes
Patch request submitted:
https://lists.ubuntu.com/archives/kernel-team/2022-September/thread.html#133176
Updating status to 'In Progress'.

In addition test builds in PPA were done for all major architectures
with a kinetic master-next kernel that incl. the patches mentioned
above.

** Changed in: linux (Ubuntu)
 Assignee: Skipper Bug Screeners (skipper-screen-team) => Canonical Kernel 
Team (canonical-kernel-team)

** Changed in: linux (Ubuntu)
   Status: New => In Progress

** Changed in: ubuntu-z-systems
   Status: New => In Progress

** Information type changed from Private to Public

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959542

Title:
  [22.10 FEAT] [IO2201] Independent Usage of Secondary Physical Function

Status in Ubuntu on IBM z Systems:
  In Progress
Status in linux package in Ubuntu:
  In Progress

Bug description:
  Title: Independent Usage of Secondary Physical Function"

  Description:
  "This feature adds the ability for a Linux running in LPAR to use the 
Physical Function (PF) associated with the second port of a ConnectX-5/6 card 
independent of that of the first port.
  Prior to this feature, if the secondary PF was attached to an LPAR without 
also attaching the primary PF, no PCI function would be visible in Linux. The 
function would instead remain
  in a hidden and disabled state. Conversely it has always been possible to use 
the primary PF without attaching the secondary PF. This existing behavior is 
confusing and needlessly
  restricts flexible usage of these powerful network cards. The new behavior of 
allowing independent usage is also in accordance with the PCI SR-IOV 
specification which explicitly
  defines the dependencies between PCI functions in the Dependency Link field 
which is still honored and for ConnectX-5/6 cards allows this independent 
usage."

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959542/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1239459] Re: 1814:3290 [Asus X200CA] wifi doesn't connect or disconnects after few seconds

2022-09-14 Thread Waqas Ahmad
Your skills are top notch Admin!
https://crackstuff.org/nexus-vst-crack-torrent/
https://pcsoftkeys.com/2022/09/13/mcafee-antivirus-crack-for-mac/
https://clevercracks.com/beyond-compare-4-4-3-crack-with-license-key-2022-latest-free-download/
http://wincrackz.com/2022/09/04/quicktime-pro-crack-serial-key/
https://premiumcracksoft.com/wise-care-365-pro-build-crack-with-serial-key/
https://mycracksoft.net/du-meter-crack-with-license-free-download-2022/

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1239459

Title:
  1814:3290 [Asus X200CA] wifi doesn't connect or disconnects after few
  seconds

Status in Linux:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released

Bug description:
  With the new 3.11.0-12-generic kernel, wifi has problems to connect with many 
errors like these:
  Oct 13 23:50:03 ubuntotto kernel: [ 1186.580726] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 0 failed to flush
  Oct 13 23:50:03 ubuntotto kernel: [ 1186.740659] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 2 failed to flush
  Oct 13 23:50:04 ubuntotto kernel: [ 1186.900544] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 0 failed to flush
  Oct 13 23:50:04 ubuntotto kernel: [ 1187.060571] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 2 failed to flush
  Oct 13 23:50:04 ubuntotto kernel: [ 1187.096576] ieee80211 phy0: 
rt2x00queue_write_tx_frame: Error - Dropping frame due to full tx queue 0
  Oct 13 23:50:05 ubuntotto kernel: [ 1188.280106] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 0 failed to flush
  Oct 13 23:50:05 ubuntotto kernel: [ 1188.440128] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 2 failed to flush
  Oct 13 23:51:06 ubuntotto kernel: [ 1249.560697] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 0 failed to flush
  Oct 13 23:51:06 ubuntotto kernel: [ 1249.720644] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 2 failed to flush
  Oct 13 23:51:07 ubuntotto kernel: [ 1249.880590] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 0 failed to flush
  Oct 13 23:51:07 ubuntotto kernel: [ 1250.040543] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 2 failed to flush

  ProblemType: Bug
  DistroRelease: Ubuntu 13.10
  Package: linux-image-3.11.0-12-generic 3.11.0-12.19
  ProcVersionSignature: Ubuntu 3.11.0-12.19-generic 3.11.3
  Uname: Linux 3.11.0-12-generic x86_64
  ApportVersion: 2.12.5-0ubuntu2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  andrea 1791 F pulseaudio
  Date: Sun Oct 13 23:45:04 2013
  HibernationDevice: RESUME=UUID=297ef090-5420-41f6-8439-f1254f3e9e15
  InstallationDate: Installed on 2013-10-12 (1 days ago)
  InstallationMedia: Ubuntu 13.04 "Raring Ringtail" - Release amd64 (20130424)
  MachineType: ASUSTeK COMPUTER INC. X200CA
  MarkForUpload: True
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.11.0-12-generic 
root=UUID=088f2a7d-b78f-4bdd-a184-754b70a3184a ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.11.0-12-generic N/A
   linux-backports-modules-3.11.0-12-generic  N/A
   linux-firmware 1.116
  SourcePackage: linux
  UpgradeStatus: Upgraded to saucy on 2013-10-13 (0 days ago)
  dmi.bios.date: 09/18/2013
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: X200CA.208
  dmi.board.asset.tag: ATN12345678901234567
  dmi.board.name: X200CA
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: 1.0
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: ASUSTeK COMPUTER INC.
  dmi.chassis.version: 1.0
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrX200CA.208:bd09/18/2013:svnASUSTeKCOMPUTERINC.:pnX200CA:pvr1.0:rvnASUSTeKCOMPUTERINC.:rnX200CA:rvr1.0:cvnASUSTeKCOMPUTERINC.:ct10:cvr1.0:
  dmi.product.name: X200CA
  dmi.product.version: 1.0
  dmi.sys.vendor: ASUSTeK COMPUTER INC.

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/1239459/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989495] Re: mlxbf_gige: need to clear MDIO gateway lock after read

2022-09-14 Thread Stefan Bader
** Also affects: linux-bluefield (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: linux-bluefield (Ubuntu Focal)
   Importance: Undecided => Medium

** Changed in: linux-bluefield (Ubuntu Focal)
   Status: New => In Progress

** Changed in: linux-bluefield (Ubuntu Focal)
 Assignee: (unassigned) => David Thompson (dthompso-98)

** Changed in: linux-bluefield (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/1989495

Title:
  mlxbf_gige: need to clear MDIO gateway lock after read

Status in linux-bluefield package in Ubuntu:
  Invalid
Status in linux-bluefield source package in Focal:
  In Progress

Bug description:
  SRU Justification:

  [Impact]
  The BlueField-2 GIGE logic accesses the MDIO device via reads/writes
  to a gateway (GW) register. The MDIO GW lock is set after read. Make
  sure to always clear to indicate that the GW register is not being used.
  If the lock is mistakenly interpreted as ACTIVE, then subsequent MDIO
  accesses will be blocked and PHY device will be inaccessible.

  [Fix]
  For each MDIO read and write transaction, the last step should
  be to clear the MDIO GW lock.

  [Test Case]
  Boot the BlueField-2 platform
  Bring up the "oob_net0" interface via DHCP or static IP
  Ping and file transfer over "oob_net0" should work properly
  Bounce the "oob_net0" interface a few times and repeat tests

  [Regression Potential]
  * Low risk for causing a regression, tested well in our lab.

  [Other]
  * None

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/1989495/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989558] [NEW] [UBUNTU 22.10] opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with CEX7 and CEX8 crypto cards

2022-09-14 Thread Launchpad Bug Tracker
You have been subscribed to a public bug:

---Problem Description---
opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with 
CEX7 crypto cards

Running a program that generates RSA keys and tests
encyrption/decryption on Crypto cards, is failing after about 500
iterations. The program makes the following opencryptoki calls in a
loop:

C_GenerateKeyPair()
C_EncryptInit()
C_Encrypt()
C_DecryptInit()
C_Decrypt()
C_SignInit()
C_Sign()   (RSA Sign)
C_VerifyInit()
C_Verify() (RSA Verify)
C_SignInit()
C_SignUpdate() (RSA Multipart sign)
C_VerifyInit()
C_VerifyUpdate() (RSA multi-part verify)
C_VerifyFinal()
C_DestroyObject() (Destroy RSA public key)
C_DestroyObject() (Destroy RSA private key)

When running single-threaded, it fails consistently on loop 504. When
running multi-threaded it fails on about the 506th iteration across all
threads (ie with 5 threads, each thread fails after about 100 loops).

On the 504th loop, the C_GenerateKeyPair() call fails with return code
6. Looking at the /var/log/opencryptoki/trace.* logfile, I found these
error messages which seem to correspond to the failure:

```
09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:1106 api] DEVEL: 
fcn->ST_DestroyObject returned:0x0
09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:1996 api] INFO: 
C_GenerateKeyPair
09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:2019 api] INFO: Valid 
Session handle id: 2
09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/ep11_specific.c:5977 ep11tok] 
INFO: rsa_ec_generate_keypair m_GenerateKeyPair rc=0x0 spki_len=0x1a6 
privkey_blob_len=0x970 mech='CKM_RSA_PKCS_KEY_PAIR_GEN'
09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/ep11_specific.c:6612 ep11tok] 
INFO: ep11tok_generate_key_pair rc=0x0 hpubkey=0x1 hprivkey=0x2 pub_name='' 
priv_name='' pub_obj=0x3ff7001d210 priv_obj=0x3ff70068460
09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:149 ep11tok] DEVEL: Unable 
to set permissions on file.
09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:149 ep11tok] DEVEL: Unable 
to set permissions on file.
09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:149 ep11tok] DEVEL: Unable 
to set permissions on file.
09/06/2022 15:37:09 6099 [usr/lib/common/obj_mgr.c:613 ep11tok] DEVEL: Object 
created: handle: 2
09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:2409 ep11tok] ERROR: 
fopen(/var/lib/opencryptoki/ep11tok/TOK_OBJ/OBxIH3zb): Too many open files
09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/ep11_specific.c:6749 ep11tok] 
DEVEL: ep11tok_generate_key_pair Object mgr create final failed
09/06/2022 15:37:09 6099 [usr/lib/common/obj_mgr.c:991 ep11tok] DEVEL: Object 
found: handle: 2
09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:224 ep11tok] ERROR: fopen 
failed
09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/new_host.c:3837 ep11tok] DEVEL: 
ep11tok_generate_key_pair() failed.
09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/new_host.c:3840 ep11tok] INFO: 
C_GenerateKeyPair: rc = 0x0006, sess = 2, mech = 0x0
09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:2041 api] DEVEL: 
fcn->ST_GenerateKeyPair returned:0x6
09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:1653 api] INFO: C_Finalize
```

I tested it on both z15 and z16 (with different crypto cards) and got
the same failure.  In all cases, I am running on a KVM guest and using
CEX7 crypto cards. I have not tested yet on CEX8 crypto cards.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Assignee: Skipper Bug Screeners (skipper-screen-team)
 Status: New


** Tags: architecture-s39064 bugnameltc-199964 severity-high 
targetmilestone-inin---
-- 
[UBUNTU 22.10] opencryptoki C_GenerateKeyPair() fails after generating > 500 
RSA keys with CEX7 and CEX8 crypto cards
https://bugs.launchpad.net/bugs/1989558
You received this bug notification because you are a member of Kernel Packages, 
which is subscribed to linux in Ubuntu.

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989558] [NEW] [UBUNTU 22.10] opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with CEX7 and CEX8 crypto cards

2022-09-14 Thread bugproxy
Public bug reported:

---Problem Description---
opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with 
CEX7 crypto cards

Running a program that generates RSA keys and tests
encyrption/decryption on Crypto cards, is failing after about 500
iterations. The program makes the following opencryptoki calls in a
loop:

C_GenerateKeyPair()
C_EncryptInit()
C_Encrypt()
C_DecryptInit()
C_Decrypt()
C_SignInit()
C_Sign()   (RSA Sign)
C_VerifyInit()
C_Verify() (RSA Verify)
C_SignInit()
C_SignUpdate() (RSA Multipart sign)
C_VerifyInit()
C_VerifyUpdate() (RSA multi-part verify)
C_VerifyFinal()
C_DestroyObject() (Destroy RSA public key)
C_DestroyObject() (Destroy RSA private key)

When running single-threaded, it fails consistently on loop 504. When
running multi-threaded it fails on about the 506th iteration across all
threads (ie with 5 threads, each thread fails after about 100 loops).

On the 504th loop, the C_GenerateKeyPair() call fails with return code
6. Looking at the /var/log/opencryptoki/trace.* logfile, I found these
error messages which seem to correspond to the failure:

```
09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:1106 api] DEVEL: 
fcn->ST_DestroyObject returned:0x0
09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:1996 api] INFO: 
C_GenerateKeyPair
09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:2019 api] INFO: Valid 
Session handle id: 2
09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/ep11_specific.c:5977 ep11tok] 
INFO: rsa_ec_generate_keypair m_GenerateKeyPair rc=0x0 spki_len=0x1a6 
privkey_blob_len=0x970 mech='CKM_RSA_PKCS_KEY_PAIR_GEN'
09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/ep11_specific.c:6612 ep11tok] 
INFO: ep11tok_generate_key_pair rc=0x0 hpubkey=0x1 hprivkey=0x2 pub_name='' 
priv_name='' pub_obj=0x3ff7001d210 priv_obj=0x3ff70068460
09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:149 ep11tok] DEVEL: Unable 
to set permissions on file.
09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:149 ep11tok] DEVEL: Unable 
to set permissions on file.
09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:149 ep11tok] DEVEL: Unable 
to set permissions on file.
09/06/2022 15:37:09 6099 [usr/lib/common/obj_mgr.c:613 ep11tok] DEVEL: Object 
created: handle: 2
09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:2409 ep11tok] ERROR: 
fopen(/var/lib/opencryptoki/ep11tok/TOK_OBJ/OBxIH3zb): Too many open files
09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/ep11_specific.c:6749 ep11tok] 
DEVEL: ep11tok_generate_key_pair Object mgr create final failed
09/06/2022 15:37:09 6099 [usr/lib/common/obj_mgr.c:991 ep11tok] DEVEL: Object 
found: handle: 2
09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:224 ep11tok] ERROR: fopen 
failed
09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/new_host.c:3837 ep11tok] DEVEL: 
ep11tok_generate_key_pair() failed.
09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/new_host.c:3840 ep11tok] INFO: 
C_GenerateKeyPair: rc = 0x0006, sess = 2, mech = 0x0
09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:2041 api] DEVEL: 
fcn->ST_GenerateKeyPair returned:0x6
09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:1653 api] INFO: C_Finalize
```

I tested it on both z15 and z16 (with different crypto cards) and got
the same failure.  In all cases, I am running on a KVM guest and using
CEX7 crypto cards. I have not tested yet on CEX8 crypto cards.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Assignee: Skipper Bug Screeners (skipper-screen-team)
 Status: New


** Tags: architecture-s39064 bugnameltc-199964 severity-high 
targetmilestone-inin---

** Tags added: architecture-s39064 bugnameltc-199964 severity-high
targetmilestone-inin---

** Changed in: ubuntu
 Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

** Package changed: ubuntu => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989558

Title:
  [UBUNTU 22.10] opencryptoki C_GenerateKeyPair() fails after generating
  > 500 RSA keys with CEX7 and CEX8 crypto cards

Status in linux package in Ubuntu:
  New

Bug description:
  ---Problem Description---
  opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with 
CEX7 crypto cards

  Running a program that generates RSA keys and tests
  encyrption/decryption on Crypto cards, is failing after about 500
  iterations. The program makes the following opencryptoki calls in a
  loop:

  C_GenerateKeyPair()
  C_EncryptInit()
  C_Encrypt()
  C_DecryptInit()
  C_Decrypt()
  C_SignInit()
  C_Sign()   (RSA Sign)
  C_VerifyInit()
  C_Verify() (RSA Verify)
  C_SignInit()
  C_SignUpdate() (RSA Multipart sign)
  C_VerifyInit()
  C_VerifyUpdate() (RSA multi-part verify)
  C_VerifyFinal()
  C_DestroyObject() (Destroy RSA public key)
  C_DestroyObject() (Destroy RSA private key)

  When running single-threaded, it fails consistently on loop 504. When
  running multi-thr

[Kernel-packages] [Bug 1989556] [NEW] Add support for Raptor Lake S CPUs

2022-09-14 Thread koba
Public bug reported:

[Impact]

 * Support thermald on Raptor Lake S CPU.

[Test Plan]

 * Use a machine with a Raptor Lake S cpu.

 * systemctl status thermald

 * Status of thermald should be `running`

[Where problems could occur]

 * This change is to add support for Raptor Lake S in thermald, which
won't impact other hardware.

** Affects: thermald (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: thermald (Ubuntu Jammy)
 Importance: Undecided
 Assignee: koba (kobako)
 Status: In Progress

** Also affects: thermald (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Changed in: thermald (Ubuntu Jammy)
 Assignee: (unassigned) => koba (kobako)

** Changed in: thermald (Ubuntu Jammy)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to thermald in Ubuntu.
https://bugs.launchpad.net/bugs/1989556

Title:
  Add support for Raptor Lake S CPUs

Status in thermald package in Ubuntu:
  New
Status in thermald source package in Jammy:
  In Progress

Bug description:
  [Impact]

   * Support thermald on Raptor Lake S CPU.

  [Test Plan]

   * Use a machine with a Raptor Lake S cpu.

   * systemctl status thermald

   * Status of thermald should be `running`

  [Where problems could occur]

   * This change is to add support for Raptor Lake S in thermald, which
  won't impact other hardware.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/thermald/+bug/1989556/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1987451] Re: Jammy update: v5.15.54 upstream stable release

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1987451

Title:
  Jammy update: v5.15.54 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.15.54 upstream stable release
     from git://git.kernel.org/

  mm/slub: add missing TID updates on slab deactivation
  mm/filemap: fix UAF in find_lock_entries
  Revert "selftests/bpf: Add test for bpf_timer overwriting crash"
  ALSA: usb-audio: Workarounds for Behringer UMC 204/404 HD
  ALSA: hda/realtek: Add quirk for Clevo L140PU
  ALSA: cs46xx: Fix missing snd_card_free() call at probe error
  can: bcm: use call_rcu() instead of costly synchronize_rcu()
  can: grcan: grcan_probe(): remove extra of_node_get()
  can: gs_usb: gs_usb_open/close(): fix memory leak
  can: m_can: m_can_chip_config(): actually enable internal timestamping
  can: m_can: m_can_{read_fifo,echo_tx_event}(): shift timestamp to full 32 bits
  can: mcp251xfd: mcp251xfd_regmap_crc_read(): improve workaround handling for 
mcp2517fd
  can: mcp251xfd: mcp251xfd_regmap_crc_read(): update workaround broken CRC on 
TBC register
  bpf: Fix incorrect verifier simulation around jmp32's jeq/jne
  bpf: Fix insufficient bounds propagation from adjust_scalar_min_max_vals
  usbnet: fix memory leak in error case
  net: rose: fix UAF bug caused by rose_t0timer_expiry
  netfilter: nft_set_pipapo: release elements in clone from abort path
  btrfs: rename btrfs_alloc_chunk to btrfs_create_chunk
  btrfs: add additional parameters to btrfs_init_tree_ref/btrfs_init_data_ref
  btrfs: fix invalid delayed ref after subvolume creation failure
  btrfs: fix warning when freeing leaf after subvolume creation failure
  Input: cpcap-pwrbutton - handle errors from platform_get_irq()
  Input: goodix - change goodix_i2c_write() len parameter type to int
  Input: goodix - add a goodix.h header file
  Input: goodix - refactor reset handling
  Input: goodix - try not to touch the reset-pin on x86/ACPI devices
  dma-buf/poll: Get a file reference for outstanding fence callbacks
  btrfs: fix deadlock between chunk allocation and chunk btree modifications
  drm/i915: Disable bonding on gen12+ platforms
  drm/i915/gt: Register the migrate contexts with their engines
  drm/i915: Replace the unconditional clflush with drm_clflush_virt_range()
  media: ir_toy: prevent device from hanging during transmit
  memory: renesas-rpc-if: Avoid unaligned bus access for HyperFlash
  ath11k: add hw_param for wakeup_mhi
  qed: Improve the stack space of filter_config()
  platform/x86: wmi: introduce helper to convert driver to WMI driver
  platform/x86: wmi: Replace read_takes_no_args with a flags field
  platform/x86: wmi: Fix driver->notify() vs ->probe() race
  mt76: mt7921: get rid of mt7921_mac_set_beacon_filter
  mt76: mt7921: introduce mt7921_mcu_set_beacon_filter utility routine
  mt76: mt7921: fix a possible race enabling/disabling runtime-pm
  bpf: Stop caching subprog index in the bpf_pseudo_func insn
  bpf, arm64: Use emit_addr_mov_i64() for BPF_PSEUDO_FUNC
  riscv: defconfig: enable DRM_NOUVEAU
  RISC-V: defconfigs: Set CONFIG_FB=y, for FB console
  net/mlx5e: Check action fwd/drop flag exists also for nic flows
  net/mlx5e: Split actions_match_supported() into a sub function
  net/mlx5e: TC, Reject rules with drop and modify hdr action
  net/mlx5e: TC, Reject rules with forward and drop actions
  ASoC: rt5682: Avoid the unexpected IRQ event during going to suspend
  ASoC: rt5682: Re-detect the combo jack after resuming
  ASoC: rt5682: Fix deadlock on resume
  netfilter: nf_tables: convert pktinfo->tprot_set to flags field
  netfilter: nft_payload: support for inner header matching / mangling
  netfilter: nft_payload: don't allow th access for fragments
  s390/boot: allocate amode31 section in decompressor
  s390/setup: use physical pointers for memblock_reserve()
  s390/setup: preserve memory at OLDMEM_BASE and OLDMEM_SIZE
  ibmvnic: init init_done_rc earlier
  ibmvnic: clear fop when retrying probe
  ibmvnic: Allow queueing resets during probe
  virtio-blk: avoid preallocating big SGL for data
  io_uring: ensure that fsnotify is always called
  block: use bdev_get_queue() in bio.c
  block: only mark bio as tracked if it really is tracked
  block: fix rq-qos breakage from skipping rq_qos_do

[Kernel-packages] [Bug 1989561] [NEW] Sometimes Linux kernel OOPS occurs while reloading the psmouse module -> hang

2022-09-14 Thread Michael
Public bug reported:

On my laptop, I need to unload/reload the psmouse module after resuming
from standby. This is fine for me. (The cause is probably that the EC
with its connected internal trackpoint/touchpad is not fast enough)

But sometimes (5%) I get a kernel oops:

ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: linux-image-5.15.0-46-generic 5.15.0-46.49~20.04.1
ProcVersionSignature: Ubuntu 5.15.0-46.49~20.04.1-generic 5.15.39
Uname: Linux 5.15.0-46-generic x86_64
NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
ApportVersion: 2.20.11-0ubuntu27.24
Architecture: amd64
CasperMD5CheckResult: skip
Date: Wed Sep 14 10:47:57 2022
SourcePackage: linux-signed-hwe-5.15
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: linux-signed-hwe-5.15 (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug focal

** Attachment added: "Oops"
   https://bugs.launchpad.net/bugs/1989561/+attachment/5615745/+files/oops.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-hwe-5.15 in Ubuntu.
https://bugs.launchpad.net/bugs/1989561

Title:
  Sometimes Linux kernel OOPS occurs while reloading the psmouse module
  -> hang

Status in linux-signed-hwe-5.15 package in Ubuntu:
  New

Bug description:
  On my laptop, I need to unload/reload the psmouse module after
  resuming from standby. This is fine for me. (The cause is probably
  that the EC with its connected internal trackpoint/touchpad is not
  fast enough)

  But sometimes (5%) I get a kernel oops:

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.15.0-46-generic 5.15.0-46.49~20.04.1
  ProcVersionSignature: Ubuntu 5.15.0-46.49~20.04.1-generic 5.15.39
  Uname: Linux 5.15.0-46-generic x86_64
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
  ApportVersion: 2.20.11-0ubuntu27.24
  Architecture: amd64
  CasperMD5CheckResult: skip
  Date: Wed Sep 14 10:47:57 2022
  SourcePackage: linux-signed-hwe-5.15
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed-hwe-5.15/+bug/1989561/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988338] Re: Jammy update: v5.15.55 upstream stable release

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988338

Title:
  Jammy update: v5.15.55 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.15.55 upstream stable release
     from git://git.kernel.org/

  NOTE
  This patch set (v5.15.55) is empty; it contained only one revert:
  Revert "mtd: rawnand: gpmi: Fix setting busy timeout setting"
  which was never applied to Jammy.

  Linux 5.15.55
  UBUNTU: Upstream stable to v5.15.55

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988338/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1983741] Re: kernel crash and hung up while umounting xfs

2022-09-14 Thread hyz
-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1983741

Title:
  kernel crash and hung up while umounting xfs

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  OS: Ubuntu 18.04.1
  Using XFS with Ceph rdb and mount by OverlayFS, sometimes system hung up with 
kernel crash like below:

  2022-07-27 16:17
  Jul 27 15:21:43 k8s-node-b01-17-05 kernel: [25666453.856553] VFS: Busy inodes 
after unmount of overlay. Self-destruct in 5 seconds.  Have a nice day...
  Jul 27 15:22:01 k8s-node-b01-17-05 kernel: [25666471.122435] XFS (rbd59): 
Unmounting Filesystem
  Jul 27 15:22:25 k8s-node-b01-17-05 kernel: [25666495.392431] BUG: Dentry 
d683c981{i=38c31f07,n=README_zh.md}  still in use (1) [unmount of xfs 
rbd23]

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1983741/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1986921] Re: lttng-modules/2.13.1-1 ADT test failure with linux/5.15.0-47.51

2022-09-14 Thread Stefan Bader
** Changed in: lttng-modules (Ubuntu Bionic)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1986921

Title:
  lttng-modules/2.13.1-1 ADT test failure with linux/5.15.0-47.51

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Won't Fix
Status in lttng-modules package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  Won't Fix
Status in lttng-modules source package in Bionic:
  In Progress
Status in linux source package in Focal:
  Won't Fix
Status in lttng-modules source package in Focal:
  Fix Released
Status in linux source package in Jammy:
  Won't Fix
Status in lttng-modules source package in Jammy:
  Fix Released

Bug description:
  SRU Justification:

  Impact: The kernel upstream changed in v5.18 and dropped tracepoints
  for random. This change was backported to 5.15/jammy in upstream
  stable 5.15.44. With that the build of lttng-modules-dkms fails.

  Fix: Backport of an upstream change which checks for the kernel header file 
which got removed in the process. Additionally the DKMS spec file has to do the 
same check to
  be aware of the missing probe module.

  Testcase: Installing lttng-modules-dkms for a kernel < 5.15.0-47 and
  -47 or later. Currently -47 and later will fail. With the change both
  should complete.

  Regression Potential: This changes whether lttng-probe-random.ko is
  available or not (if it is available the code is unchanged). User-
  space might be affected if this module is always expected.

  ---

  This is a scripted bug report about ADT failures while running lttng-
  modules tests for linux/5.15.0-47.51 on jammy. Whether this is caused
  by the dep8 tests of the tested source or the kernel has yet to be
  determined.

  Testing failed on:
  amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy/jammy/amd64/l/lttng-modules/20220817_074711_55044@/log.gz
  arm64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy/jammy/arm64/l/lttng-modules/20220817_075639_1a4d1@/log.gz
  ppc64el: 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy/jammy/ppc64el/l/lttng-modules/20220817_074544_d2849@/log.gz
  s390x: 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy/jammy/s390x/l/lttng-modules/20220817_075106_d2849@/log.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1986921/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989561] Re: Sometimes Linux kernel OOPS occurs while reloading the psmouse module -> hang

2022-09-14 Thread Michael
** Description changed:

  On my laptop, I need to unload/reload the psmouse module after resuming
  from standby. This is fine for me. (The cause is probably that the EC
  with its connected internal trackpoint/touchpad is not fast enough)
  
- But sometimes (5%) I get a kernel oops:
+ But sometimes (5%) I get a kernel oops (see attached oops File).
+ 
+ Then the GUI (X-Server) stopps completely, Strg-Alt+Fx does not work as
+ well. But I can use ssh to connect to the machine (this way I got the
+ oops).
+ 
+ I have this problem since "ever" (starting with stock 20.04 without
+ hwe).
  
  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.15.0-46-generic 5.15.0-46.49~20.04.1
  ProcVersionSignature: Ubuntu 5.15.0-46.49~20.04.1-generic 5.15.39
  Uname: Linux 5.15.0-46-generic x86_64
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
  ApportVersion: 2.20.11-0ubuntu27.24
  Architecture: amd64
  CasperMD5CheckResult: skip
  Date: Wed Sep 14 10:47:57 2022
  SourcePackage: linux-signed-hwe-5.15
  UpgradeStatus: No upgrade log present (probably fresh install)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-hwe-5.15 in Ubuntu.
https://bugs.launchpad.net/bugs/1989561

Title:
  Sometimes Linux kernel OOPS occurs while reloading the psmouse module
  -> hang

Status in linux-signed-hwe-5.15 package in Ubuntu:
  New

Bug description:
  On my laptop, I need to unload/reload the psmouse module after
  resuming from standby. This is fine for me. (The cause is probably
  that the EC with its connected internal trackpoint/touchpad is not
  fast enough)

  But sometimes (5%) I get a kernel oops (see attached oops File).

  Then the GUI (X-Server) stopps completely, Strg-Alt+Fx does not work
  as well. But I can use ssh to connect to the machine (this way I got
  the oops).

  I have this problem since "ever" (starting with stock 20.04 without
  hwe).

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.15.0-46-generic 5.15.0-46.49~20.04.1
  ProcVersionSignature: Ubuntu 5.15.0-46.49~20.04.1-generic 5.15.39
  Uname: Linux 5.15.0-46-generic x86_64
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
  ApportVersion: 2.20.11-0ubuntu27.24
  Architecture: amd64
  CasperMD5CheckResult: skip
  Date: Wed Sep 14 10:47:57 2022
  SourcePackage: linux-signed-hwe-5.15
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed-hwe-5.15/+bug/1989561/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989566] [NEW] PolarFire Icicle Kit: enable PCIe support

2022-09-14 Thread Heinrich Schuchardt
Public bug reported:

The PolarFire Icicle Kit provides a PCIe slot. With our 5.19 kernel it
is not usable. Please, add the following patches:

# 
https://lore.kernel.org/linux-riscv/20220901133403.3392291-5-conor.doo...@microchip.com/
riscv: dts: microchip: add pci dma ranges for the icicle
# 
https://lore.kernel.org/linux-riscv/20220901133403.3392291-6-conor.doo...@microchip.com/
riscv: dts: microchip: move the mpfs' pci node to
# 
https://lore.kernel.org/linux-riscv/20220901133403.3392291-6-conor.doo...@microchip.com/
riscv: dts: microchip: icicle: update pci address
# 
https://lore.kernel.org/linux-riscv/20220901133403.3392291-8-conor.doo...@microchip.com/
riscv: dts: microchip: icicle: re-jig fabric peripheral
# 
https://lore.kernel.org/linux-riscv/20220902142202.2437658-3-daire.mcnam...@microchip.com/
 
riscv: dts: microchip: add fabric address translation
# 
https://lore.kernel.org/linux-riscv/20220902142202.2437658-4-daire.mcnam...@microchip.com/
PCI: microchip: add fabric address translation properties

All patches are strictly restricted to the PolarFire Icicle Kit and have
no impact on any other RISC-V boards that we support.

Best regards

Heinrich

** Affects: linux-riscv (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-riscv in Ubuntu.
https://bugs.launchpad.net/bugs/1989566

Title:
  PolarFire Icicle Kit: enable PCIe support

Status in linux-riscv package in Ubuntu:
  New

Bug description:
  The PolarFire Icicle Kit provides a PCIe slot. With our 5.19 kernel it
  is not usable. Please, add the following patches:

  # 
https://lore.kernel.org/linux-riscv/20220901133403.3392291-5-conor.doo...@microchip.com/
  riscv: dts: microchip: add pci dma ranges for the icicle
  # 
https://lore.kernel.org/linux-riscv/20220901133403.3392291-6-conor.doo...@microchip.com/
  riscv: dts: microchip: move the mpfs' pci node to
  # 
https://lore.kernel.org/linux-riscv/20220901133403.3392291-6-conor.doo...@microchip.com/
  riscv: dts: microchip: icicle: update pci address
  # 
https://lore.kernel.org/linux-riscv/20220901133403.3392291-8-conor.doo...@microchip.com/
  riscv: dts: microchip: icicle: re-jig fabric peripheral
  # 
https://lore.kernel.org/linux-riscv/20220902142202.2437658-3-daire.mcnam...@microchip.com/
 
  riscv: dts: microchip: add fabric address translation
  # 
https://lore.kernel.org/linux-riscv/20220902142202.2437658-4-daire.mcnam...@microchip.com/
  PCI: microchip: add fabric address translation properties

  All patches are strictly restricted to the PolarFire Icicle Kit and
  have no impact on any other RISC-V boards that we support.

  Best regards

  Heinrich

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-riscv/+bug/1989566/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1986921] Re: lttng-modules/2.13.1-1 ADT test failure with linux/5.15.0-47.51

2022-09-14 Thread Stefan Bader
** Changed in: lttng-modules (Ubuntu)
   Status: Invalid => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1986921

Title:
  lttng-modules/2.13.1-1 ADT test failure with linux/5.15.0-47.51

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Won't Fix
Status in lttng-modules package in Ubuntu:
  Fix Released
Status in linux source package in Bionic:
  Won't Fix
Status in lttng-modules source package in Bionic:
  In Progress
Status in linux source package in Focal:
  Won't Fix
Status in lttng-modules source package in Focal:
  Fix Released
Status in linux source package in Jammy:
  Won't Fix
Status in lttng-modules source package in Jammy:
  Fix Released

Bug description:
  SRU Justification:

  Impact: The kernel upstream changed in v5.18 and dropped tracepoints
  for random. This change was backported to 5.15/jammy in upstream
  stable 5.15.44. With that the build of lttng-modules-dkms fails.

  Fix: Backport of an upstream change which checks for the kernel header file 
which got removed in the process. Additionally the DKMS spec file has to do the 
same check to
  be aware of the missing probe module.

  Testcase: Installing lttng-modules-dkms for a kernel < 5.15.0-47 and
  -47 or later. Currently -47 and later will fail. With the change both
  should complete.

  Regression Potential: This changes whether lttng-probe-random.ko is
  available or not (if it is available the code is unchanged). User-
  space might be affected if this module is always expected.

  ---

  This is a scripted bug report about ADT failures while running lttng-
  modules tests for linux/5.15.0-47.51 on jammy. Whether this is caused
  by the dep8 tests of the tested source or the kernel has yet to be
  determined.

  Testing failed on:
  amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy/jammy/amd64/l/lttng-modules/20220817_074711_55044@/log.gz
  arm64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy/jammy/arm64/l/lttng-modules/20220817_075639_1a4d1@/log.gz
  ppc64el: 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy/jammy/ppc64el/l/lttng-modules/20220817_074544_d2849@/log.gz
  s390x: 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy/jammy/s390x/l/lttng-modules/20220817_075106_d2849@/log.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1986921/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988351] Re: Jammy update: v5.15.56 upstream stable release

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988351

Title:
  Jammy update: v5.15.56 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.15.56 upstream stable release
     from git://git.kernel.org/

  ALSA: hda - Add fixup for Dell Latitidue E5430
  ALSA: hda/conexant: Apply quirk for another HP ProDesk 600 G3 model
  ALSA: hda/realtek: Fix headset mic for Acer SF313-51
  ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc671
  ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc221
  ALSA: hda/realtek - Enable the headset-mic on a Xiaomi's laptop
  xen/netback: avoid entering xenvif_rx_next_skb() with an empty rx queue
  fix race between exit_itimers() and /proc/pid/timers
  mm: userfaultfd: fix UFFDIO_CONTINUE on fallocated shmem pages
  mm: split huge PUD on wp_huge_pud fallback
  tracing/histograms: Fix memory leak problem
  net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer
  ip: fix dflt addr selection for connected nexthop
  ARM: 9213/1: Print message about disabled Spectre workarounds only once
  ARM: 9214/1: alignment: advance IT state after emulating Thumb instruction
  wifi: mac80211: fix queue selection for mesh/OCB interfaces
  cgroup: Use separate src/dst nodes when preloading css_sets for migration
  btrfs: return -EAGAIN for NOWAIT dio reads/writes on compressed and inline 
extents
  drm/panfrost: Put mapping instead of shmem obj on 
panfrost_mmu_map_fault_addr() error
  drm/panfrost: Fix shrinker list corruption by madvise IOCTL
  fs/remap: constrain dedupe of EOF blocks
  nilfs2: fix incorrect masking of permission flags for symlinks
  sh: convert nommu io{re,un}map() to static inline functions
  Revert "evm: Fix memleak in init_desc"
  xfs: only run COW extent recovery when there are no live extents
  xfs: don't include bnobt blocks when reserving free block pool
  xfs: run callbacks before waking waiters in xlog_state_shutdown_callbacks
  xfs: drop async cache flushes from CIL commits.
  reset: Fix devm bulk optional exclusive control getter
  ARM: dts: imx6qdl-ts7970: Fix ngpio typo and count
  spi: amd: Limit max transfer and message size
  ARM: 9209/1: Spectre-BHB: avoid pr_info() every time a CPU comes out of idle
  ARM: 9210/1: Mark the FDT_FIXED sections as shareable
  net/mlx5e: kTLS, Fix build time constant test in TX
  net/mlx5e: kTLS, Fix build time constant test in RX
  net/mlx5e: Fix enabling sriov while tc nic rules are offloaded
  net/mlx5e: Fix capability check for updating vnic env counters
  net/mlx5e: Ring the TX doorbell on DMA errors
  drm/i915: fix a possible refcount leak in intel_dp_add_mst_connector()
  ima: Fix a potential integer overflow in ima_appraise_measurement
  ASoC: sgtl5000: Fix noise on shutdown/remove
  ASoC: tas2764: Add post reset delays
  ASoC: tas2764: Fix and extend FSYNC polarity handling
  ASoC: tas2764: Correct playback volume range
  ASoC: tas2764: Fix amp gain register offset & default
  ASoC: Intel: Skylake: Correct the ssp rate discovery in skl_get_ssp_clks()
  ASoC: Intel: Skylake: Correct the handling of fmt_config flexible array
  net: stmmac: dwc-qos: Disable split header for Tegra194
  net: ethernet: ti: am65-cpsw: Fix devlink port register sequence
  sysctl: Fix data races in proc_dointvec().
  sysctl: Fix data races in proc_douintvec().
  sysctl: Fix data races in proc_dointvec_minmax().
  sysctl: Fix data races in proc_douintvec_minmax().
  sysctl: Fix data races in proc_doulongvec_minmax().
  sysctl: Fix data races in proc_dointvec_jiffies().
  tcp: Fix a data-race around sysctl_tcp_max_orphans.
  inetpeer: Fix data-races around sysctl.
  net: Fix data-races around sysctl_mem.
  cipso: Fix data-races around sysctl.
  icmp: Fix data-races around sysctl.
  ipv4: Fix a data-race around sysctl_fib_sync_mem.
  ARM: dts: at91: sama5d2: Fix typo in i2s1 node
  ARM: dts: sunxi: Fix SPI NOR campatible on Orange Pi Zero
  arm64: dts: broadcom: bcm4908: Fix timer node for BCM4906 SoC
  arm64: dts: broadcom: bcm4908: Fix cpu node for smp boot
  netfilter: nf_log: incorrect offset to network header
  netfilter: nf_tables: replace BUG_ON by element length check
  drm/i915/gvt: IS_ERR() vs NULL bug in intel_gvt_update_reg_whitelist

[Kernel-packages] [Bug 1988353] Re: Jammy update: v5.15.57 upstream stable release

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988353

Title:
  Jammy update: v5.15.57 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.15.57 upstream stable release
     from git://git.kernel.org/

  x86/xen: Fix initialisation in hypercall_page after rethunk
  tools arch x86: Sync the msr-index.h copy with the kernel sources
  tools headers cpufeatures: Sync with the kernel sources
  um: Add missing apply_returns()
  x86: Use -mindirect-branch-cs-prefix for RETPOLINE builds
  Linux 5.15.57
  UBUNTU: Upstream stable to v5.15.57

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988353/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988479] Re: Jammy update: v5.15.58 upstream stable release

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988479

Title:
  Jammy update: v5.15.58 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.15.58 upstream stable release
     from git://git.kernel.org/

  pinctrl: stm32: fix optional IRQ support to gpios
  riscv: add as-options for modules with assembly compontents
  mlxsw: spectrum_router: Fix IPv4 nexthop gateway indication
  lockdown: Fix kexec lockdown bypass with ima policy
  drm/ttm: fix locking in vmap/vunmap TTM GEM helpers
  bus: mhi: host: pci_generic: add Telit FN980 v1 hardware revision
  bus: mhi: host: pci_generic: add Telit FN990
  Revert "selftest/vm: verify remap destination address in mremap_test"
  Revert "selftest/vm: verify mmap addr in mremap_test"
  PCI: hv: Fix multi-MSI to allow more than one MSI vector
  PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI
  PCI: hv: Reuse existing IRTE allocation in compose_msi_msg()
  PCI: hv: Fix interrupt mapping for multi-MSI
  serial: mvebu-uart: correctly report configured baudrate value
  batman-adv: Use netif_rx_any_context() any.
  xfs: fix maxlevels comparisons in the btree staging code
  xfs: fold perag loop iteration logic into helper function
  xfs: rename the next_agno perag iteration variable
  xfs: terminate perag iteration reliably on agcount
  xfs: fix perag reference leak on iteration race with growfs
  xfs: prevent a WARN_ONCE() in xfs_ioc_attr_list()
  r8152: fix a WOL issue
  ip: Fix data-races around sysctl_ip_default_ttl.
  xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in 
xfrm_bundle_lookup()
  power/reset: arm-versatile: Fix refcount leak in versatile_reboot_probe
  RDMA/irdma: Do not advertise 1GB page size for x722
  RDMA/irdma: Fix sleep from invalid context BUG
  pinctrl: ralink: rename MT7628(an) functions to MT76X8
  pinctrl: ralink: rename pinctrl-rt2880 to pinctrl-ralink
  pinctrl: ralink: Check for null return of devm_kcalloc
  perf/core: Fix data race between perf_event_set_output() and perf_mmap_close()
  ipv4/tcp: do not use per netns ctl sockets
  net: tun: split run_ebpf_filter() and pskb_trim() into different "if 
statement"
  mm/pagealloc: sysctl: change watermark_scale_factor max limit to 30%
  sysctl: move some boundary constants from sysctl.c to sysctl_vals
  tcp: Fix data-races around sysctl_tcp_ecn.
  drm/amd/display: Add option to defer works of hpd_rx_irq
  drm/amd/display: Fork thread to offload work of hpd_rx_irq
  drm/amdgpu/display: add quirk handling for stutter mode
  drm/amd/display: Ignore First MST Sideband Message Return Error
  scsi: megaraid: Clear READ queue map's nr_queues
  scsi: ufs: core: Drop loglevel of WriteBoost message
  nvme: check for duplicate identifiers earlier
  nvme: fix block device naming collision
  igc: Reinstate IGC_REMOVED logic and implement it properly
  ip: Fix data-races around sysctl_ip_no_pmtu_disc.
  ip: Fix data-races around sysctl_ip_fwd_use_pmtu.
  ip: Fix data-races around sysctl_ip_fwd_update_priority.
  ip: Fix data-races around sysctl_ip_nonlocal_bind.
  ip: Fix a data-race around sysctl_ip_autobind_reuse.
  ip: Fix a data-race around sysctl_fwmark_reflect.
  tcp/dccp: Fix a data-race around sysctl_tcp_fwmark_accept.
  tcp: sk->sk_bound_dev_if once in inet_request_bound_dev_if()
  tcp: Fix data-races around sysctl_tcp_l3mdev_accept.
  tcp: Fix data-races around sysctl_tcp_mtu_probing.
  tcp: Fix data-races around sysctl_tcp_base_mss.
  tcp: Fix data-races around sysctl_tcp_min_snd_mss.
  tcp: Fix a data-race around sysctl_tcp_mtu_probe_floor.
  tcp: Fix a data-race around sysctl_tcp_probe_threshold.
  tcp: Fix a data-race around sysctl_tcp_probe_interval.
  net: stmmac: fix pm runtime issue in stmmac_dvr_remove()
  net: stmmac: fix unbalanced ptp clock issue in suspend/resume flow
  mtd: rawnand: gpmi: validate controller clock rate
  mtd: rawnand: gpmi: Set WAIT_FOR_READY timeout based on program/erase times
  net: dsa: microchip: ksz_common: Fix refcount leak bug
  net: skb: introduce kfree_skb_reason()
  net: skb: use kfree_skb_reason() in tcp_v4_rcv()
  net: skb: use kfree_skb_reason() in __udp4_lib_rcv()
  net: socket: rename SKB_DROP_REASON_SOCKET_FILTER
  net: skb_drop_reason: add document for drop reasons
  net: netfilter: use kfree_drop_r

[Kernel-packages] [Bug 1986921] Re: lttng-modules/2.13.1-1 ADT test failure with linux/5.15.0-47.51

2022-09-14 Thread Łukasz Zemczak
Hello Stefan, or anyone else affected,

Accepted lttng-modules into bionic-proposed. The package will build now
and be available at https://launchpad.net/ubuntu/+source/lttng-
modules/2.10.8-1ubuntu2~18.04.4 in a few hours, and then in the
-proposed repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how
to enable and use -proposed.  Your feedback will aid us getting this
update out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested, what testing has been
performed on the package and change the tag from verification-needed-
bionic to verification-done-bionic. If it does not fix the bug for you,
please add a comment stating that, and change the tag to verification-
failed-bionic. In either case, without details of your testing we will
not be able to proceed.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance for helping!

N.B. The updated package will be released to -updates after the bug(s)
fixed by this package have been verified and the package has been in
-proposed for a minimum of 7 days.

** Changed in: lttng-modules (Ubuntu Bionic)
   Status: In Progress => Fix Committed

** Tags added: verification-needed-bionic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1986921

Title:
  lttng-modules/2.13.1-1 ADT test failure with linux/5.15.0-47.51

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Won't Fix
Status in lttng-modules package in Ubuntu:
  Fix Released
Status in linux source package in Bionic:
  Won't Fix
Status in lttng-modules source package in Bionic:
  Fix Committed
Status in linux source package in Focal:
  Won't Fix
Status in lttng-modules source package in Focal:
  Fix Released
Status in linux source package in Jammy:
  Won't Fix
Status in lttng-modules source package in Jammy:
  Fix Released

Bug description:
  SRU Justification:

  Impact: The kernel upstream changed in v5.18 and dropped tracepoints
  for random. This change was backported to 5.15/jammy in upstream
  stable 5.15.44. With that the build of lttng-modules-dkms fails.

  Fix: Backport of an upstream change which checks for the kernel header file 
which got removed in the process. Additionally the DKMS spec file has to do the 
same check to
  be aware of the missing probe module.

  Testcase: Installing lttng-modules-dkms for a kernel < 5.15.0-47 and
  -47 or later. Currently -47 and later will fail. With the change both
  should complete.

  Regression Potential: This changes whether lttng-probe-random.ko is
  available or not (if it is available the code is unchanged). User-
  space might be affected if this module is always expected.

  ---

  This is a scripted bug report about ADT failures while running lttng-
  modules tests for linux/5.15.0-47.51 on jammy. Whether this is caused
  by the dep8 tests of the tested source or the kernel has yet to be
  determined.

  Testing failed on:
  amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy/jammy/amd64/l/lttng-modules/20220817_074711_55044@/log.gz
  arm64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy/jammy/arm64/l/lttng-modules/20220817_075639_1a4d1@/log.gz
  ppc64el: 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy/jammy/ppc64el/l/lttng-modules/20220817_074544_d2849@/log.gz
  s390x: 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy/jammy/s390x/l/lttng-modules/20220817_075106_d2849@/log.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1986921/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989218] Re: Jammy update: v5.15.59 upstream stable release

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989218

Title:
  Jammy update: v5.15.59 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.15.59 upstream stable release
     from git://git.kernel.org/

  Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put
  Revert "ocfs2: mount shared volume without ha stack"
  ntfs: fix use-after-free in ntfs_ucsncmp()
  fs: sendfile handles O_NONBLOCK of out_fd
  secretmem: fix unhandled fault in truncate
  mm: fix page leak with multiple threads mapping the same page
  hugetlb: fix memoryleak in hugetlb_mcopy_atomic_pte
  asm-generic: remove a broken and needless ifdef conditional
  s390/archrandom: prevent CPACF trng invocations in interrupt context
  nouveau/svm: Fix to migrate all requested pages
  drm/simpledrm: Fix return type of simpledrm_simple_display_pipe_mode_valid()
  watch_queue: Fix missing rcu annotation
  watch_queue: Fix missing locking in add_watch_to_object()
  tcp: Fix data-races around sysctl_tcp_dsack.
  tcp: Fix a data-race around sysctl_tcp_app_win.
  tcp: Fix a data-race around sysctl_tcp_adv_win_scale.
  tcp: Fix a data-race around sysctl_tcp_frto.
  tcp: Fix a data-race around sysctl_tcp_nometrics_save.
  tcp: Fix data-races around sysctl_tcp_no_ssthresh_metrics_save.
  ice: check (DD | EOF) bits on Rx descriptor rather than (EOP | RS)
  ice: do not setup vlan for loopback VSI
  scsi: ufs: host: Hold reference returned by of_parse_phandle()
  Revert "tcp: change pingpong threshold to 3"
  octeontx2-pf: Fix UDP/TCP src and dst port tc filters
  tcp: Fix data-races around sysctl_tcp_moderate_rcvbuf.
  tcp: Fix a data-race around sysctl_tcp_limit_output_bytes.
  tcp: Fix a data-race around sysctl_tcp_challenge_ack_limit.
  scsi: core: Fix warning in scsi_alloc_sgtables()
  scsi: mpt3sas: Stop fw fault watchdog work item during system shutdown
  net: ping6: Fix memleak in ipv6_renew_options().
  ipv6/addrconf: fix a null-ptr-deref bug for ip6_ptr
  net/tls: Remove the context from the list in tls_device_down
  igmp: Fix data-races around sysctl_igmp_qrv.
  net: pcs: xpcs: propagate xpcs_read error to xpcs_get_state_c37_sgmii
  net: sungem_phy: Add of_node_put() for reference returned by of_get_parent()
  tcp: Fix a data-race around sysctl_tcp_min_tso_segs.
  tcp: Fix a data-race around sysctl_tcp_min_rtt_wlen.
  tcp: Fix a data-race around sysctl_tcp_autocorking.
  tcp: Fix a data-race around sysctl_tcp_invalid_ratelimit.
  Documentation: fix sctp_wmem in ip-sysctl.rst
  macsec: fix NULL deref in macsec_add_rxsa
  macsec: fix error message in macsec_add_rxsa and _txsa
  macsec: limit replay window size with XPN
  macsec: always read MACSEC_SA_ATTR_PN as a u64
  net: macsec: fix potential resource leak in macsec_add_rxsa() and 
macsec_add_txsa()
  net: mld: fix reference count leak in mld_{query | report}_work()
  tcp: Fix data-races around sk_pacing_rate.
  net: Fix data-races around sysctl_[rw]mem(_offset)?.
  tcp: Fix a data-race around sysctl_tcp_comp_sack_delay_ns.
  tcp: Fix a data-race around sysctl_tcp_comp_sack_slack_ns.
  tcp: Fix a data-race around sysctl_tcp_comp_sack_nr.
  tcp: Fix data-races around sysctl_tcp_reflect_tos.
  ipv4: Fix data-races around sysctl_fib_notify_on_flag_change.
  i40e: Fix interface init with MSI interrupts (no MSI-X)
  sctp: fix sleep in atomic context bug in timer handlers
  octeontx2-pf: cn10k: Fix egress ratelimit configuration
  virtio-net: fix the race between refill work and close
  perf symbol: Correct address for bss symbols
  sfc: disable softirqs for ptp TX
  sctp: leave the err path free in sctp_stream_init to sctp_stream_free
  ARM: crypto: comment out gcc warning that breaks clang builds
  mm/hmm: fault non-owner device private entries
  page_alloc: fix invalid watermark check on a negative value
  ARM: 9216/1: Fix MAX_DMA_ADDRESS overflow
  EDAC/ghes: Set the DIMM label unconditionally
  docs/kernel-parameters: Update descriptions for "mitigations=" param with 
retbleed
  locking/rwsem: Allow slowpath writer to ignore handoff bit if not set by 
first waiter
  x86/bugs: Do not enable IBPB at firmware entry when IBPB is not available
  Linux 5.15.59
  UBUNTU: Upstream stable to v5.15.59

To manage notifications about this bug go to:
https://

[Kernel-packages] [Bug 1989221] Re: Jammy update: v5.15.60 upstream stable release

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989221

Title:
  Jammy update: v5.15.60 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.15.60 upstream stable release
     from git://git.kernel.org/

  x86/speculation: Make all RETbleed mitigations 64-bit only
  selftests/bpf: Extend verifier and bpf_sock tests for dst_port loads
  selftests/bpf: Check dst_port only on the client socket
  block: fix default IO priority handling again
  tools/vm/slabinfo: Handle files in debugfs
  ACPI: video: Force backlight native for some TongFang devices
  ACPI: video: Shortening quirk list by identifying Clevo by board_name only
  ACPI: APEI: Better fix to avoid spamming the console with old error logs
  crypto: arm64/poly1305 - fix a read out-of-bound
  KVM: x86: do not report a vCPU as preempted outside instruction boundaries
  KVM: x86: do not set st->preempted when going back to user space
  KVM: selftests: Make hyperv_clock selftest more stable
  tools/kvm_stat: fix display of error when multiple processes are found
  selftests: KVM: Handle compiler optimizations in ucall
  KVM: x86/svm: add __GFP_ACCOUNT to __sev_dbg_{en,de}crypt_user()
  arm64: set UXN on swapper page tables
  btrfs: zoned: prevent allocation from previous data relocation BG
  btrfs: zoned: fix critical section of relocation inode writeback
  Bluetooth: hci_bcm: Add BCM4349B1 variant
  Bluetooth: hci_bcm: Add DT compatible for CYW55572
  dt-bindings: bluetooth: broadcom: Add BCM4349B1 DT binding
  Bluetooth: btusb: Add support of IMC Networks PID 0x3568
  Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04CA:0x4007
  Bluetooth: btusb: Add Realtek RTL8852C support ID 0x04C5:0x1675
  Bluetooth: btusb: Add Realtek RTL8852C support ID 0x0CB8:0xC558
  Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3587
  Bluetooth: btusb: Add Realtek RTL8852C support ID 0x13D3:0x3586
  macintosh/adb: fix oob read in do_adb_query() function
  x86/speculation: Add RSB VM Exit protections
  x86/speculation: Add LFENCE to RSB fill sequence
  Linux 5.15.60
  UBUNTU: Upstream stable to v5.15.60

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1989221/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1951055] Re: Reinstate ACPI S5 for reboot

2022-09-14 Thread Timo Aaltonen
this was apparently fixed by iwlwifi

** Changed in: linux (Ubuntu)
   Status: Confirmed => Won't Fix

** Changed in: linux (Ubuntu Jammy)
   Status: New => Won't Fix

** Changed in: hwe-next
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.14 in Ubuntu.
https://bugs.launchpad.net/bugs/1951055

Title:
  Reinstate ACPI S5 for reboot

Status in HWE Next:
  Won't Fix
Status in linux package in Ubuntu:
  Won't Fix
Status in linux-oem-5.14 package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Won't Fix
Status in linux-oem-5.14 source package in Focal:
  Fix Released
Status in linux source package in Jammy:
  Won't Fix
Status in linux-oem-5.14 source package in Jammy:
  Invalid

Bug description:
  [Impact]
  On some systems, Intel WiFi device may stop working after reboot.

  [Fix]
  Use ACPI S5 for reboot.

  [Test]
  2000 times of reboot stress, and Intel WiFi continues work on affected
  system.

  [Where problems could occur]
  There was a bug introduced by this patch, but the user didn't want to
  find the root cause. Since we have more control on Ubuntu kernel, we'll
  fix the root cause properly this time.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1951055/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989578] [NEW] Add HDMI codec ID for Intel Raptor Lake

2022-09-14 Thread Chris Chiu
Public bug reported:

[SRU Justification]

[Impact]
The HDAudio is not functional on some RaptorLake machines. The audio codec is 
failed to be probed so no PCM stream available for audio functions.

[Fix]
Backport the patch from upstream which adds the support for the HDMI codec ID 
on RaptorLake.

[Test]
Power on the machine and check if the audio function's working with alsa 
utilities.

[Where problems could occur]
The change only applies to the new RaptorLake Intel HDA controller and HDMI 
codec.

** Affects: hwe-next
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Incomplete

** Affects: linux-oem-5.17 (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu Jammy)
 Importance: Undecided
 Status: In Progress

** Affects: linux-oem-5.17 (Ubuntu Jammy)
 Importance: Undecided
 Status: In Progress


** Tags: oem-priority originate-from-1988947 somerville

** Also affects: linux-oem-5.17 (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: linux-oem-5.17 (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Changed in: linux-oem-5.17 (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: linux (Ubuntu Jammy)
   Status: New => In Progress

** Summary changed:

- Add HDMI codec VID on Intel Raptor Lake
+ Add HDMI codec ID on Intel Raptor Lake

** Summary changed:

- Add HDMI codec ID on Intel Raptor Lake
+ Add HDMI codec ID for Intel Raptor Lake

** Tags added: oem-priority originate-from-1988947 somerville

** Description changed:

  [SRU Justification]
  
  [Impact]
  The HDAudio is not functional on Raptor Lake machines. The audio codec is 
failed to be probed so no PCM stream available for audio functions.
  
  [Fix]
- Backport the patch from upstream which adds the support for the HDMI code ID 
on RaptorLake.
+ Backport the patch from upstream which adds the support for the HDMI codec ID 
on RaptorLake.
  
  [Test]
  Power on the machine and check if the audio function's working with alsa 
utilities.
  
  [Where problems could occur]
  The change only applies to the new RaptorLake Intel HDA controller and HDMI 
codec.

** Description changed:

  [SRU Justification]
  
  [Impact]
- The HDAudio is not functional on Raptor Lake machines. The audio codec is 
failed to be probed so no PCM stream available for audio functions.
+ The HDAudio is not functional on some Raptor Lake machines. The audio codec 
is failed to be probed so no PCM stream available for audio functions.
  
  [Fix]
  Backport the patch from upstream which adds the support for the HDMI codec ID 
on RaptorLake.
  
  [Test]
  Power on the machine and check if the audio function's working with alsa 
utilities.
  
  [Where problems could occur]
  The change only applies to the new RaptorLake Intel HDA controller and HDMI 
codec.

** Description changed:

  [SRU Justification]
  
  [Impact]
- The HDAudio is not functional on some Raptor Lake machines. The audio codec 
is failed to be probed so no PCM stream available for audio functions.
+ The HDAudio is not functional on some RaptorLake machines. The audio codec is 
failed to be probed so no PCM stream available for audio functions.
  
  [Fix]
  Backport the patch from upstream which adds the support for the HDMI codec ID 
on RaptorLake.
  
  [Test]
  Power on the machine and check if the audio function's working with alsa 
utilities.
  
  [Where problems could occur]
  The change only applies to the new RaptorLake Intel HDA controller and HDMI 
codec.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989578

Title:
  Add HDMI codec ID for Intel Raptor Lake

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in linux-oem-5.17 package in Ubuntu:
  New
Status in linux source package in Jammy:
  In Progress
Status in linux-oem-5.17 source package in Jammy:
  In Progress

Bug description:
  [SRU Justification]

  [Impact]
  The HDAudio is not functional on some RaptorLake machines. The audio codec is 
failed to be probed so no PCM stream available for audio functions.

  [Fix]
  Backport the patch from upstream which adds the support for the HDMI codec ID 
on RaptorLake.

  [Test]
  Power on the machine and check if the audio function's working with alsa 
utilities.

  [Where problems could occur]
  The change only applies to the new RaptorLake Intel HDA controller and HDMI 
codec.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1989578/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988461] Re: intel_pmc_core not load on Raptor Lake

2022-09-14 Thread Timo Aaltonen
needs at least 552f3b801de6eb, then probably ea902bcc1943f7539 and a
commit for pmc_core that uses adl_reg_map for RAPTORLAKE_S?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988461

Title:
  intel_pmc_core not load on Raptor Lake

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Incomplete

Bug description:
  [Summary]
  intel_pmc_core not load on Raptor Lake

  [Reproduce Steps]
  1. Boot into Ubuntu desktop
  2. Check if /sys/kernel/debug/pmc_core folder exist

  [Results]
  Expected: folder /sys/kernel/debug/pmc_core folder been created
  Actual: /sys/kernel/debug/pmc_core not exist

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1988461/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989578] Missing required logs.

2022-09-14 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1989578

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.17 in Ubuntu.
https://bugs.launchpad.net/bugs/1989578

Title:
  Add HDMI codec ID for Intel Raptor Lake

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in linux-oem-5.17 package in Ubuntu:
  New
Status in linux source package in Jammy:
  In Progress
Status in linux-oem-5.17 source package in Jammy:
  In Progress

Bug description:
  [SRU Justification]

  [Impact]
  The HDAudio is not functional on some RaptorLake machines. The audio codec is 
failed to be probed so no PCM stream available for audio functions.

  [Fix]
  Backport the patch from upstream which adds the support for the HDMI codec ID 
on RaptorLake.

  [Test]
  Power on the machine and check if the audio function's working with alsa 
utilities.

  [Where problems could occur]
  The change only applies to the new RaptorLake Intel HDA controller and HDMI 
codec.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1989578/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1987711] Re: [i915] Ubuntu display get shifted after some time.

2022-09-14 Thread Ivan Krasicenko
Anyway, 
can you pinpoint me library that probably contains bug, maybe it will not be 
hard to fix it.
Or at least what to do to downgrade driver from Version: 22.0.5 to 22.0.1?
Or maybe some article describing how this entire graphic thing works.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1987711

Title:
  [i915] Ubuntu display get shifted after some time.

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  It is continuation of this bug:
  
https://bugs.launchpad.net/ubuntu/+source/xserver-xorg-video-intel/+bug/1986583
  where advised fix was applied. 

  Summay: After ubuntu is turned on, after some time screen gets shifted
  to side. (and starts to overlap)

  I setup webcamera to record screen, and video below shows what it looked 
like. 
  after fix were applied.
  www.ms.mff.cuni.cz/~krasicei/capture-0231.bug.crop.slow.mp4
  (video was cropped, and slowed down 2x)

  before fix was applied shift looked somehow like this:
  www.ms.mff.cuni.cz/~krasicei/bug17-50-18-8-2022.c.mp4
  (video is also cropped, and slowed down 2x)

  During shift no one was present on computer.

  Is there any idea how to enable some more detailed log or something? I 
probably can pinpoint exact moment in time when shift happened. 
  i tried to read log journalctl, but I found nothing interesting.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: xorg 1:7.7+23ubuntu2
  ProcVersionSignature: Ubuntu 5.15.0-46.49-generic 5.15.39
  Uname: Linux 5.15.0-46-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  BootLog:
   
  CasperMD5CheckResult: unknown
  Date: Fri Aug 26 02:31:10 2022
  DistUpgraded: 2022-08-02 14:36:41,704 DEBUG Running PostInstallScript: 
'/usr/lib/ubuntu-advantage/upgrade_lts_contract.py'
  DistroCodename: jammy
  DistroVariant: ubuntu
  ExtraDebuggingInterest: Yes, including running git bisection searches
  GraphicsCard:
   Intel Corporation Skylake GT2 [HD Graphics 520] [8086:1916] (rev 07) 
(prog-if 00 [VGA controller])
 Subsystem: Intel Corporation Skylake GT2 [HD Graphics 520] [8086:2015]
  InstallationDate: Installed on 2022-02-17 (189 days ago)
  InstallationMedia: Ubuntu 20.04.3 LTS "Focal Fossa" - Release amd64 (20210819)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 003: ID 222a:0001 ILI Technology Corp. Multi-Touch Screen
   Bus 001 Device 002: ID 1a2c:2d23 China Resource Semico Co., Ltd Keyboard
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: Default string Default string
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-46-generic 
root=UUID=582fb3cc-8ef6-460b-b9ae-a16f81c604a7 ro quiet splash vt.handoff=7
  SourcePackage: xorg
  UpgradeStatus: Upgraded to jammy on 2022-08-02 (23 days ago)
  dmi.bios.date: 10/07/2021
  dmi.bios.release: 5.12
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: GSKU0504.V54
  dmi.board.asset.tag: Default string
  dmi.board.name: SKYBAY
  dmi.board.vendor: Default string
  dmi.board.version: Default string
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrGSKU0504.V54:bd10/07/2021:br5.12:svnDefaultstring:pnDefaultstring:pvrDefaultstring:rvnDefaultstring:rnSKYBAY:rvrDefaultstring:cvnDefaultstring:ct3:cvrDefaultstring:skuDefaultstring:
  dmi.product.family: Default string
  dmi.product.name: Default string
  dmi.product.sku: Default string
  dmi.product.version: Default string
  dmi.sys.vendor: Default string
  version.compiz: compiz N/A
  version.libdrm2: libdrm2 2.4.110-1ubuntu1
  version.libgl1-mesa-dri: libgl1-mesa-dri 22.0.5-0ubuntu0.1
  version.libgl1-mesa-glx: libgl1-mesa-glx N/A
  version.xserver-xorg-core: xserver-xorg-core 2:21.1.3-2ubuntu2.1
  version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
  version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:19.1.0-2ubuntu1
  version.xserver-xorg-video-intel: xserver-xorg-video-intel N/A
  version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 
1:1.0.17-2build1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1987711/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989558] Comment bridged from LTC Bugzilla

2022-09-14 Thread bugproxy
--- Comment From boris.m...@de.ibm.com 2022-09-14 07:52 EDT---
== Comment by Ingo: 
For the record, this bug was introduced with the following commit
https://github.com/opencryptoki/opencryptoki/commit/5d0d588e391ab2f69bc6218b921bca092055606e
which went into OCK 3.18.0. So only Distros with 3.18.0 are affected by this 
problem.

--- Comment From boris.m...@de.ibm.com 2022-09-14 07:53 EDT---
== Comment:  ==
I would assume that this is fixed by the following commit:
https://github.com/opencryptoki/opencryptoki/commit/d5ccb00e52f5b0c66533f085cda36f63f7583d44

Without this fix, any creation of a new token object will leak one open
file. So after so many new token objects, the limit of open files is
reached, and it starts to fail.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989558

Title:
  [UBUNTU 22.10] opencryptoki C_GenerateKeyPair() fails after generating
  > 500 RSA keys with CEX7 and CEX8 crypto cards

Status in linux package in Ubuntu:
  New

Bug description:
  ---Problem Description---
  opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with 
CEX7 crypto cards

  Running a program that generates RSA keys and tests
  encyrption/decryption on Crypto cards, is failing after about 500
  iterations. The program makes the following opencryptoki calls in a
  loop:

  C_GenerateKeyPair()
  C_EncryptInit()
  C_Encrypt()
  C_DecryptInit()
  C_Decrypt()
  C_SignInit()
  C_Sign()   (RSA Sign)
  C_VerifyInit()
  C_Verify() (RSA Verify)
  C_SignInit()
  C_SignUpdate() (RSA Multipart sign)
  C_VerifyInit()
  C_VerifyUpdate() (RSA multi-part verify)
  C_VerifyFinal()
  C_DestroyObject() (Destroy RSA public key)
  C_DestroyObject() (Destroy RSA private key)

  When running single-threaded, it fails consistently on loop 504. When
  running multi-threaded it fails on about the 506th iteration across
  all threads (ie with 5 threads, each thread fails after about 100
  loops).

  On the 504th loop, the C_GenerateKeyPair() call fails with return code
  6. Looking at the /var/log/opencryptoki/trace.* logfile, I found these
  error messages which seem to correspond to the failure:

  ```
  09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:1106 api] DEVEL: 
fcn->ST_DestroyObject returned:0x0
  09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:1996 api] INFO: 
C_GenerateKeyPair
  09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:2019 api] INFO: Valid 
Session handle id: 2
  09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/ep11_specific.c:5977 ep11tok] 
INFO: rsa_ec_generate_keypair m_GenerateKeyPair rc=0x0 spki_len=0x1a6 
privkey_blob_len=0x970 mech='CKM_RSA_PKCS_KEY_PAIR_GEN'
  09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/ep11_specific.c:6612 ep11tok] 
INFO: ep11tok_generate_key_pair rc=0x0 hpubkey=0x1 hprivkey=0x2 pub_name='' 
priv_name='' pub_obj=0x3ff7001d210 priv_obj=0x3ff70068460
  09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:149 ep11tok] DEVEL: 
Unable to set permissions on file.
  09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:149 ep11tok] DEVEL: 
Unable to set permissions on file.
  09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:149 ep11tok] DEVEL: 
Unable to set permissions on file.
  09/06/2022 15:37:09 6099 [usr/lib/common/obj_mgr.c:613 ep11tok] DEVEL: Object 
created: handle: 2
  09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:2409 ep11tok] ERROR: 
fopen(/var/lib/opencryptoki/ep11tok/TOK_OBJ/OBxIH3zb): Too many open files
  09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/ep11_specific.c:6749 ep11tok] 
DEVEL: ep11tok_generate_key_pair Object mgr create final failed
  09/06/2022 15:37:09 6099 [usr/lib/common/obj_mgr.c:991 ep11tok] DEVEL: Object 
found: handle: 2
  09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:224 ep11tok] ERROR: fopen 
failed
  09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/new_host.c:3837 ep11tok] DEVEL: 
ep11tok_generate_key_pair() failed.
  09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/new_host.c:3840 ep11tok] INFO: 
C_GenerateKeyPair: rc = 0x0006, sess = 2, mech = 0x0
  09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:2041 api] DEVEL: 
fcn->ST_GenerateKeyPair returned:0x6
  09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:1653 api] INFO: 
C_Finalize
  ```

  I tested it on both z15 and z16 (with different crypto cards) and got
  the same failure.  In all cases, I am running on a KVM guest and using
  CEX7 crypto cards. I have not tested yet on CEX8 crypto cards.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1989558/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1971656] Re: rtw89_pci failure on Lenovo P14s with Ubuntu 22.04

2022-09-14 Thread Dhaval L
I am also facing the same issue with my laptop. It happens sometimes and
things start behaving differently and the only way is to force shutdown
to get rid of issue at the moment.

Laptop Details:
HP 255 G8 Notebook PC (AMD Ryzen 5 5500U with Radeon Graphics)
OS: Ubuntu 22.04.1 LTS

$ sudo lshw -C network
*-network
 description: Wireless interface
 product: RTL8852AE 802.11ax PCIe Wireless Network Adapter
 vendor: Realtek Semiconductor Co., Ltd.

$ uname -r
5.15.0-47-generic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1971656

Title:
  rtw89_pci failure on Lenovo P14s with Ubuntu 22.04

Status in linux-firmware package in Ubuntu:
  Confirmed

Bug description:
  On a Lenovo P14s (RTL8111/8168/8411), the WiFi connection gets stuck
  at times. When this happens, there is no way to use `sudo`, the WiFi
  GNOME UI says NetworkManager is not running (which it is), and `dmesg
  -w` continuously outputs:

  ```
  [90296.470925] rtw89_pci :03:00.0: failed to get available addr cam
  [90296.470935] rtw89_pci :03:00.0: failed to init addr cam
  [90296.586817] rtw89_pci :03:00.0: failed to get available addr cam
  [90296.586828] rtw89_pci :03:00.0: failed to init addr cam
  [90296.698790] rtw89_pci :03:00.0: failed to get available addr cam
  [90296.698797] rtw89_pci :03:00.0: failed to init addr cam
  [90296.810783] rtw89_pci :03:00.0: failed to get available addr cam
  [90296.810790] rtw89_pci :03:00.0: failed to init addr cam
  ```

  
  The only solution I've found is to reboot the machine. However, turning off 
needs to be forced (magic keys still work for rebooting).

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: linux-firmware 20220329.git681281e4-0ubuntu1
  ProcVersionSignature: Ubuntu 5.15.0-27.28-generic 5.15.30
  Uname: Linux 5.15.0-27-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Thu May  5 07:49:18 2022
  Dependencies: firmware-sof-signed 2.0-1ubuntu2
  InstallationDate: Installed on 2022-02-25 (68 days ago)
  InstallationMedia: Ubuntu 21.10 "Impish Indri" - Release amd64 (20211012)
  MachineType: LENOVO 21A3MZ
  PackageArchitecture: all
  ProcFB: 0 amdgpudrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.15.0-27-generic 
root=/dev/mapper/vgubuntu-root ro quiet splash vt.handoff=7
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.15.0-27-generic N/A
   linux-backports-modules-5.15.0-27-generic  N/A
   linux-firmware 20220329.git681281e4-0ubuntu1
  SourcePackage: linux-firmware
  UpgradeStatus: Upgraded to jammy on 2022-04-21 (13 days ago)
  dmi.bios.date: 11/05/2021
  dmi.bios.release: 1.13
  dmi.bios.vendor: LENOVO
  dmi.bios.version: R1MET43W (1.13 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 21A3MZ
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0J40697 WIN
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: None
  dmi.ec.firmware.release: 1.13
  dmi.modalias: 
dmi:bvnLENOVO:bvrR1MET43W(1.13):bd11/05/2021:br1.13:efr1.13:svnLENOVO:pn21A3MZ:pvrThinkPadP14sGen2a:rvnLENOVO:rn21A3MZ:rvrSDK0J40697WIN:cvnLENOVO:ct10:cvrNone:skuLENOVO_MT_21A0_BU_Think_FM_ThinkPadP14sGen2a:
  dmi.product.family: ThinkPad P14s Gen 2a
  dmi.product.name: 21A3MZ
  dmi.product.sku: LENOVO_MT_21A0_BU_Think_FM_ThinkPad P14s Gen 2a
  dmi.product.version: ThinkPad P14s Gen 2a
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/1971656/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988212] Re: Focal update: v5.4.204 upstream stable release

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988212

Title:
  Focal update: v5.4.204 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.4.204 upstream stable release
     from git://git.kernel.org/

  ipv6: take care of disable_policy when restoring routes
  nvdimm: Fix badblocks clear off-by-one error
  powerpc/prom_init: Fix kernel config grep
  powerpc/bpf: Fix use of user_pt_regs in uapi
  dm raid: fix accesses beyond end of raid member array
  dm raid: fix KASAN warning in raid5_add_disks
  s390/archrandom: simplify back to earlier design and initialize earlier
  SUNRPC: Fix READ_PLUS crasher
  net: rose: fix UAF bugs caused by timer handler
  net: usb: ax88179_178a: Fix packet receiving
  virtio-net: fix race between ndo_open() and virtio_device_ready()
  selftests/net: pass ipv6_args to udpgso_bench's IPv6 TCP test
  net: tun: unlink NAPI from device on destruction
  net: tun: stop NAPI when detaching queues
  RDMA/qedr: Fix reporting QP timeout attribute
  linux/dim: Fix divide by 0 in RDMA DIM
  usbnet: fix memory allocation in helpers
  net: ipv6: unexport __init-annotated seg6_hmac_net_init()
  caif_virtio: fix race between virtio_device_ready() and ndo_open()
  PM / devfreq: exynos-ppmu: Fix refcount leak in of_get_devfreq_events
  s390: remove unneeded 'select BUILD_BIN2C'
  netfilter: nft_dynset: restore set element counter when failing to update
  net/sched: act_api: Notify user space if any actions were flushed before error
  net: bonding: fix possible NULL deref in rlb code
  net: bonding: fix use-after-free after 802.3ad slave unbind
  nfc: nfcmrvl: Fix irq_of_parse_and_map() return value
  NFC: nxp-nci: Don't issue a zero length i2c_master_read()
  net: tun: avoid disabling NAPI twice
  xen/gntdev: Avoid blocking in unmap_grant_pages()
  hwmon: (ibmaem) don't call platform_device_del() if platform_device_add() 
fails
  net: dsa: bcm_sf2: force pause link settings
  sit: use min
  ipv6/sit: fix ipip6_tunnel_get_prl return value
  rseq/selftests,x86_64: Add rseq_offset_deref_addv()
  selftests/rseq: remove ARRAY_SIZE define from individual tests
  selftests/rseq: introduce own copy of rseq uapi header
  selftests/rseq: Remove useless assignment to cpu variable
  selftests/rseq: Remove volatile from __rseq_abi
  selftests/rseq: Introduce rseq_get_abi() helper
  selftests/rseq: Introduce thread pointer getters
  selftests/rseq: Uplift rseq selftests for compatibility with glibc-2.35
  selftests/rseq: Fix ppc32: wrong rseq_cs 32-bit field pointer on big endian
  selftests/rseq: Fix ppc32 missing instruction selection "u" and "x" for 
load/store
  selftests/rseq: Fix ppc32 offsets by using long rather than off_t
  selftests/rseq: Fix warnings about #if checks of undefined tokens
  selftests/rseq: Remove arm/mips asm goto compiler work-around
  selftests/rseq: Fix: work-around asm goto compiler bugs
  selftests/rseq: x86-64: use %fs segment selector for accessing rseq thread 
area
  selftests/rseq: x86-32: use %gs segment selector for accessing rseq thread 
area
  selftests/rseq: Change type of rseq_offset to ptrdiff_t
  xen/blkfront: fix leaking data in shared pages
  xen/netfront: fix leaking data in shared pages
  xen/netfront: force data bouncing when backend is untrusted
  xen/blkfront: force data bouncing when backend is untrusted
  xen/arm: Fix race in RB-tree based P2M accounting
  net: usb: qmi_wwan: add Telit 0x1060 composition
  net: usb: qmi_wwan: add Telit 0x1070 composition
  clocksource/drivers/ixp4xx: remove EXPORT_SYMBOL_GPL from ixp4xx_timer_setup()
  Linux 5.4.204
  UBUNTU: Upstream stable to v5.4.204

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988212/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988214] Re: Focal update: v5.4.205 upstream stable release

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988214

Title:
  Focal update: v5.4.205 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.4.205 upstream stable release
     from git://git.kernel.org/

  esp: limit skb_page_frag_refill use to a single page
  mm/slub: add missing TID updates on slab deactivation
  can: bcm: use call_rcu() instead of costly synchronize_rcu()
  can: grcan: grcan_probe(): remove extra of_node_get()
  can: gs_usb: gs_usb_open/close(): fix memory leak
  usbnet: fix memory leak in error case
  net: rose: fix UAF bug caused by rose_t0timer_expiry
  iommu/vt-d: Fix PCI bus rescan device hot add
  fbdev: fbmem: Fix logo center image dx issue
  video: of_display_timing.h: include errno.h
  powerpc/powernv: delay rng platform device creation until later in boot
  can: kvaser_usb: replace run-time checks with struct kvaser_usb_driver_info
  can: kvaser_usb: kvaser_usb_leaf: fix CAN clock frequency regression
  can: kvaser_usb: kvaser_usb_leaf: fix bittiming limits
  xfs: remove incorrect ASSERT in xfs_rename
  ARM: meson: Fix refcount leak in meson_smp_prepare_cpus
  pinctrl: sunxi: a83t: Fix NAND function name for some pins
  pinctrl: sunxi: sunxi_pconf_set: use correct offset
  ARM: at91: pm: use proper compatible for sama5d2's rtc
  ARM: at91: pm: use proper compatibles for sam9x60's rtc and rtt
  ibmvnic: Properly dispose of all skbs during a failover.
  selftests: forwarding: fix flood_unicast_test when h2 supports IFF_UNICAST_FLT
  selftests: forwarding: fix learning_test when h1 supports IFF_UNICAST_FLT
  selftests: forwarding: fix error message in learning_test
  i2c: cadence: Unregister the clk notifier in error path
  dmaengine: imx-sdma: Allow imx8m for imx7 FW revs
  misc: rtsx_usb: fix use of dma mapped buffer for usb bulk transfer
  misc: rtsx_usb: use separate command and response buffers
  misc: rtsx_usb: set return value in rsp_buf alloc err path
  dt-bindings: dma: allwinner,sun50i-a64-dma: Fix min/max typo
  ida: don't use BUG_ON() for debugging
  dmaengine: pl330: Fix lockdep warning about non-static key
  dmaengine: at_xdma: handle errors of at_xdmac_alloc_desc() correctly
  dmaengine: ti: Fix refcount leak in ti_dra7_xbar_route_allocate
  dmaengine: ti: Add missing put_device in ti_dra7_xbar_route_allocate
  Linux 5.4.205
  UBUNTU: Upstream stable to v5.4.205

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988214/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988219] Re: Focal update: v5.4.207 upstream stable release

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988219

Title:
  Focal update: v5.4.207 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.4.207 upstream stable release
     from git://git.kernel.org/

  ALSA: hda - Add fixup for Dell Latitidue E5430
  ALSA: hda/conexant: Apply quirk for another HP ProDesk 600 G3 model
  ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc671
  ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc221
  ALSA: hda/realtek - Enable the headset-mic on a Xiaomi's laptop
  xen/netback: avoid entering xenvif_rx_next_skb() with an empty rx queue
  tracing/histograms: Fix memory leak problem
  net: sock: tracing: Fix sock_exceed_buf_limit not to dereference stale pointer
  ip: fix dflt addr selection for connected nexthop
  ARM: 9213/1: Print message about disabled Spectre workarounds only once
  ARM: 9214/1: alignment: advance IT state after emulating Thumb instruction
  wifi: mac80211: fix queue selection for mesh/OCB interfaces
  cgroup: Use separate src/dst nodes when preloading css_sets for migration
  drm/panfrost: Fix shrinker list corruption by madvise IOCTL
  nilfs2: fix incorrect masking of permission flags for symlinks
  Revert "evm: Fix memleak in init_desc"
  sched/rt: Disable RT_RUNTIME_SHARE by default
  ext4: fix race condition between ext4_write and ext4_convert_inline_data
  ARM: dts: imx6qdl-ts7970: Fix ngpio typo and count
  ARM: 9209/1: Spectre-BHB: avoid pr_info() every time a CPU comes out of idle
  ARM: 9210/1: Mark the FDT_FIXED sections as shareable
  drm/i915: fix a possible refcount leak in intel_dp_add_mst_connector()
  ima: Fix a potential integer overflow in ima_appraise_measurement
  ASoC: sgtl5000: Fix noise on shutdown/remove
  net: stmmac: dwc-qos: Disable split header for Tegra194
  inetpeer: Fix data-races around sysctl.
  net: Fix data-races around sysctl_mem.
  cipso: Fix data-races around sysctl.
  icmp: Fix data-races around sysctl.
  ipv4: Fix a data-race around sysctl_fib_sync_mem.
  ARM: dts: at91: sama5d2: Fix typo in i2s1 node
  ARM: dts: sunxi: Fix SPI NOR campatible on Orange Pi Zero
  drm/i915/gt: Serialize TLB invalidates with GT resets
  icmp: Fix a data-race around sysctl_icmp_ratelimit.
  icmp: Fix a data-race around sysctl_icmp_ratemask.
  raw: Fix a data-race around sysctl_raw_l3mdev_accept.
  ipv4: Fix data-races around sysctl_ip_dynaddr.
  net: ftgmac100: Hold reference returned by of_get_child_by_name()
  sfc: fix use after free when disabling sriov
  seg6: fix skb checksum evaluation in SRH encapsulation/insertion
  seg6: fix skb checksum in SRv6 End.B6 and End.B6.Encaps behaviors
  seg6: bpf: fix skb checksum in bpf_push_seg6_encap()
  sfc: fix kernel panic when creating VF
  mm: sysctl: fix missing numa_stat when !CONFIG_HUGETLB_PAGE
  virtio_mmio: Add missing PM calls to freeze/restore
  virtio_mmio: Restore guest page size on resume
  netfilter: br_netfilter: do not skip all hooks with 0 priority
  cpufreq: pmac32-cpufreq: Fix refcount leak bug
  platform/x86: hp-wmi: Ignore Sanitization Mode event
  net: tipc: fix possible refcount leak in tipc_sk_create()
  NFC: nxp-nci: don't print header length mismatch on i2c error
  nvme: fix regression when disconnect a recovering ctrl
  net: sfp: fix memory leak in sfp_probe()
  ASoC: ops: Fix off by one in range control validation
  ASoC: wm5110: Fix DRE control
  ASoC: cs47l15: Fix event generation for low power mux control
  ASoC: madera: Fix event generation for OUT1 demux
  ASoC: madera: Fix event generation for rate controls
  irqchip: or1k-pic: Undefine mask_ack for level triggered hardware
  x86: Clear .brk area at early boot
  soc: ixp4xx/npe: Fix unused match warning
  ARM: dts: stm32: use the correct clock source for CEC on stm32mp151
  signal handling: don't use BUG_ON() for debugging
  USB: serial: ftdi_sio: add Belimo device ids
  usb: typec: add missing uevent when partner support PD
  usb: dwc3: gadget: Fix event pending check
  tty: serial: samsung_tty: set dma burst_size to 1
  serial: 8250: fix return error code in serial8250_request_std_resource()
  serial: stm32: Clear prev values before setting RTS delays
  serial: pl011: UPSTAT_AUTORTS requires .throttle/unthrottle
  can: m_c

[Kernel-packages] [Bug 1988215] Re: Focal update: v5.4.206 upstream stable release

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988215

Title:
  Focal update: v5.4.206 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.4.206 upstream stable release
     from git://git.kernel.org/

  NOTE: This patch set (v5.4.206) is empty; it contained only one revert:
  Revert "mtd: rawnand: gpmi: Fix setting busy timeout setting"
  which was never applied to Focal.

  
  Linux 5.4.206
  UBUNTU: Upstream stable to v5.4.206

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988215/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989228] Re: Focal update: v5.4.209 upstream stable release

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989228

Title:
  Focal update: v5.4.209 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.4.209 upstream stable release
     from git://git.kernel.org/

  Bluetooth: L2CAP: Fix use-after-free caused by l2cap_chan_put
  ntfs: fix use-after-free in ntfs_ucsncmp()
  s390/archrandom: prevent CPACF trng invocations in interrupt context
  tcp: Fix data-races around sysctl_tcp_dsack.
  tcp: Fix a data-race around sysctl_tcp_app_win.
  tcp: Fix a data-race around sysctl_tcp_adv_win_scale.
  tcp: Fix a data-race around sysctl_tcp_frto.
  tcp: Fix a data-race around sysctl_tcp_nometrics_save.
  ice: check (DD | EOF) bits on Rx descriptor rather than (EOP | RS)
  ice: do not setup vlan for loopback VSI
  scsi: ufs: host: Hold reference returned by of_parse_phandle()
  tcp: Fix a data-race around sysctl_tcp_limit_output_bytes.
  tcp: Fix a data-race around sysctl_tcp_challenge_ack_limit.
  net: ping6: Fix memleak in ipv6_renew_options().
  ipv6/addrconf: fix a null-ptr-deref bug for ip6_ptr
  igmp: Fix data-races around sysctl_igmp_qrv.
  net: sungem_phy: Add of_node_put() for reference returned by of_get_parent()
  tcp: Fix a data-race around sysctl_tcp_min_tso_segs.
  tcp: Fix a data-race around sysctl_tcp_min_rtt_wlen.
  tcp: Fix a data-race around sysctl_tcp_autocorking.
  tcp: Fix a data-race around sysctl_tcp_invalid_ratelimit.
  Documentation: fix sctp_wmem in ip-sysctl.rst
  tcp: Fix a data-race around sysctl_tcp_comp_sack_delay_ns.
  tcp: Fix a data-race around sysctl_tcp_comp_sack_nr.
  i40e: Fix interface init with MSI interrupts (no MSI-X)
  sctp: fix sleep in atomic context bug in timer handlers
  virtio-net: fix the race between refill work and close
  perf symbol: Correct address for bss symbols
  sfc: disable softirqs for ptp TX
  sctp: leave the err path free in sctp_stream_init to sctp_stream_free
  ARM: crypto: comment out gcc warning that breaks clang builds
  mt7601u: add USB device ID for some versions of XiaoDu WiFi Dongle.
  scsi: core: Fix race between handling STS_RESOURCE and completion
  Linux 5.4.209
  UBUNTU: Upstream stable to v5.4.209

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1989228/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988225] Re: Focal update: v5.4.208 upstream stable release

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988225

Title:
  Focal update: v5.4.208 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.4.208 upstream stable release
     from git://git.kernel.org/

  pinctrl: stm32: fix optional IRQ support to gpios
  riscv: add as-options for modules with assembly compontents
  mlxsw: spectrum_router: Fix IPv4 nexthop gateway indication
  lockdown: Fix kexec lockdown bypass with ima policy
  xen/gntdev: Ignore failure to unmap INVALID_GRANT_HANDLE
  PCI: hv: Fix multi-MSI to allow more than one MSI vector
  PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI
  PCI: hv: Reuse existing IRTE allocation in compose_msi_msg()
  PCI: hv: Fix interrupt mapping for multi-MSI
  serial: mvebu-uart: correctly report configured baudrate value
  xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in 
xfrm_bundle_lookup()
  power/reset: arm-versatile: Fix refcount leak in versatile_reboot_probe
  pinctrl: ralink: Check for null return of devm_kcalloc
  perf/core: Fix data race between perf_event_set_output() and perf_mmap_close()
  igc: Reinstate IGC_REMOVED logic and implement it properly
  ip: Fix data-races around sysctl_ip_no_pmtu_disc.
  ip: Fix data-races around sysctl_ip_fwd_use_pmtu.
  ip: Fix data-races around sysctl_ip_nonlocal_bind.
  ip: Fix a data-race around sysctl_fwmark_reflect.
  tcp/dccp: Fix a data-race around sysctl_tcp_fwmark_accept.
  tcp: Fix data-races around sysctl_tcp_mtu_probing.
  tcp: Fix data-races around sysctl_tcp_base_mss.
  tcp: Fix data-races around sysctl_tcp_min_snd_mss.
  tcp: Fix a data-race around sysctl_tcp_mtu_probe_floor.
  tcp: Fix a data-race around sysctl_tcp_probe_threshold.
  tcp: Fix a data-race around sysctl_tcp_probe_interval.
  i2c: cadence: Change large transfer count reset logic to be unconditional
  net: stmmac: fix dma queue left shift overflow issue
  net/tls: Fix race in TLS device down flow
  igmp: Fix data-races around sysctl_igmp_llm_reports.
  igmp: Fix a data-race around sysctl_igmp_max_memberships.
  tcp: Fix data-races around sysctl_tcp_syncookies.
  tcp: Fix data-races around sysctl_tcp_reordering.
  tcp: Fix data-races around some timeout sysctl knobs.
  tcp: Fix a data-race around sysctl_tcp_notsent_lowat.
  tcp: Fix a data-race around sysctl_tcp_tw_reuse.
  tcp: Fix data-races around sysctl_max_syn_backlog.
  tcp: Fix data-races around sysctl_tcp_fastopen.
  iavf: Fix handling of dummy receive descriptors
  i40e: Fix erroneous adapter reinitialization during recovery process
  ixgbe: Add locking to prevent panic when setting sriov_numvfs to zero
  gpio: pca953x: only use single read/write for No AI mode
  be2net: Fix buffer overflow in be_get_module_eeprom
  ipv4: Fix a data-race around sysctl_fib_multipath_use_neigh.
  udp: Fix a data-race around sysctl_udp_l3mdev_accept.
  tcp: Fix data-races around sysctl knobs related to SYN option.
  tcp: Fix a data-race around sysctl_tcp_early_retrans.
  tcp: Fix data-races around sysctl_tcp_recovery.
  tcp: Fix a data-race around sysctl_tcp_thin_linear_timeouts.
  tcp: Fix data-races around sysctl_tcp_slow_start_after_idle.
  tcp: Fix a data-race around sysctl_tcp_retrans_collapse.
  tcp: Fix a data-race around sysctl_tcp_stdurg.
  tcp: Fix a data-race around sysctl_tcp_rfc1337.
  tcp: Fix data-races around sysctl_tcp_max_reordering.
  spi: bcm2835: bcm2835_spi_handle_err(): fix NULL pointer deref for non DMA 
transfers
  mm/mempolicy: fix uninit-value in mpol_rebind_policy()
  bpf: Make sure mac_header was set before using it
  dlm: fix pending remove if msg allocation fails
  ima: remove the IMA_TEMPLATE Kconfig option
  UBUNTU: [Config] updateconfigs for IMA_TEMPLATE
  locking/refcount: Define constants for saturation and max refcount values
  locking/refcount: Ensure integer operands are treated as signed
  locking/refcount: Remove unused refcount_*_checked() variants
  locking/refcount: Move the bulk of the REFCOUNT_FULL implementation into the 
 header
  locking/refcount: Improve performance of generic REFCOUNT_FULL code
  locking/refcount: Move saturation warnings out of line
  locking/refcount: Consolidate REFCOUNT_{MAX,SATURATED} definitions
  locking/refcount: Consolidate implementations of refcount_t
  UBUNTU: [Con

[Kernel-packages] [Bug 1989230] Re: Focal update: v5.4.210 upstream stable release

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989230

Title:
  Focal update: v5.4.210 upstream stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     v5.4.210 upstream stable release
     from git://git.kernel.org/

  thermal: Fix NULL pointer dereferences in of_thermal_ functions
  ACPI: video: Force backlight native for some TongFang devices
  ACPI: video: Shortening quirk list by identifying Clevo by board_name only
  ACPI: APEI: Better fix to avoid spamming the console with old error logs
  bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds()
  selftests/bpf: Extend verifier and bpf_sock tests for dst_port loads
  bpf: Test_verifier, #70 error message updates for 32-bit right shift
  KVM: Don't null dereference ops->destroy
  selftests: KVM: Handle compiler optimizations in ucall
  media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls
  macintosh/adb: fix oob read in do_adb_query() function
  x86/speculation: Add RSB VM Exit protections
  x86/speculation: Add LFENCE to RSB fill sequence
  Linux 5.4.210
  UBUNTU: Upstream stable to v5.4.210

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1989230/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989374] Re: Bionic update: upstream stable patchset 2022-09-12

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Bionic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989374

Title:
  Bionic update: upstream stable patchset 2022-09-12

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     upstream stable patchset 2022-09-12

  Ported from the following upstream stable releases:
  v4.14.285, v4.19.249

     from git://git.kernel.org/

  UBUNTU: [Config] dkms-versions -- force wireguard-dkms update
  Revert "random: Make getrandom() ready earlier"
  9p: missing chunk of "fs/9p: Don't update file type when updating file 
attributes"
  crypto: chacha20 - Fix keystream alignment for chacha20_block()
  random: always fill buffer in get_random_bytes_wait
  random: optimize add_interrupt_randomness
  drivers/char/random.c: remove unused dont_count_entropy
  random: Fix whitespace pre random-bytes work
  random: Return nbytes filled from hw RNG
  UBUNTU: [Config] updateconfigs for RANDOM_TRUST_CPU, RANDOM_TRUST_BOOTLOADER
  random: add a config option to trust the CPU's hwrng
  random: remove preempt disabled region
  random: Make crng state queryable
  random: make CPU trust a boot parameter
  drivers/char/random.c: constify poolinfo_table
  drivers/char/random.c: remove unused stuct poolinfo::poolbits
  drivers/char/random.c: make primary_crng static
  random: only read from /dev/random after its pool has received 128 bits
  random: move rand_initialize() earlier
  random: document get_random_int() family
  latent_entropy: avoid build error when plugin cflags are not set
  random: fix soft lockup when trying to read from an uninitialized blocking 
pool
  random: Support freezable kthreads in add_hwgenerator_randomness()
  fdt: add support for rng-seed
  random: Use wait_event_freezable() in add_hwgenerator_randomness()
  char/random: Add a newline at the end of the file
  Revert "hwrng: core - Freeze khwrng thread during suspend"
  crypto: Deduplicate le32_to_cpu_array() and cpu_to_le32_array()
  crypto: blake2s - generic C library implementation and selftest
  lib/crypto: blake2s: move hmac construction into wireguard
  lib/crypto: sha1: re-roll loops to reduce code size
  random: Don't wake crng_init_wait when crng_init == 1
  random: Add a urandom_read_nowait() for random APIs that don't warn
  random: add GRND_INSECURE to return best-effort non-cryptographic bytes
  random: ignore GRND_RANDOM in getentropy(2)
  random: make /dev/random be almost like /dev/urandom
  random: fix crash on multiple early calls to add_bootloader_randomness()
  random: remove the blocking pool
  random: delete code to pull data into pools
  random: remove kernel.random.read_wakeup_threshold
  random: remove unnecessary unlikely()
  random: convert to ENTROPY_BITS for better code readability
  random: Add and use pr_fmt()
  random: fix typo in add_timer_randomness()
  random: remove some dead code of poolinfo
  random: split primary/secondary crng init paths
  random: avoid warnings for !CONFIG_NUMA builds
  x86: Remove arch_has_random, arch_has_random_seed
  powerpc: Remove arch_has_random, arch_has_random_seed
  s390: Remove arch_has_random, arch_has_random_seed
  linux/random.h: Remove arch_has_random, arch_has_random_seed
  linux/random.h: Use false with bool
  linux/random.h: Mark CONFIG_ARCH_RANDOM functions __must_check
  powerpc: Use bool in archrandom.h
  random: add arch_get_random_*long_early()
  random: avoid arch_get_random_seed_long() when collecting IRQ randomness
  random: remove dead code left over from blocking pool
  MAINTAINERS: co-maintain random.c
  crypto: blake2s - include  instead of 
  crypto: blake2s - adjust include guard naming
  random: document add_hwgenerator_randomness() with other input functions
  random: remove unused irq_flags argument from add_interrupt_randomness()
  random: use BLAKE2s instead of SHA1 in extraction
  random: do not sign extend bytes for rotation when mixing
  random: do not re-init if crng_reseed completes before primary init
  random: mix bootloader randomness into pool
  random: harmonize "crng init done" messages
  random: use IS_ENABLED(CONFIG_NUMA) instead of ifdefs
  random: initialize ChaCha20 constants with correct endianness
  random: early initialization of ChaCha constants
  random: avoid superfluous call to RDRAND in CRNG 

[Kernel-packages] [Bug 1989566] Re: PolarFire Icicle Kit: enable PCIe support

2022-09-14 Thread Heinrich Schuchardt
With Kinetic we are trying to bring support for the PolarFire Icicle Kit which 
was missing in Jammy. 
Without PCI this support would be incomplete.

The patches don't touch any code relevant for other boards. As the board
has not been previously supported there is not risk of regression.

Please, grant a feature freeze exception to add the missing
functionality in the kernel.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-riscv in Ubuntu.
https://bugs.launchpad.net/bugs/1989566

Title:
  PolarFire Icicle Kit: enable PCIe support

Status in linux-riscv package in Ubuntu:
  New

Bug description:
  The PolarFire Icicle Kit provides a PCIe slot. With our 5.19 kernel it
  is not usable. Please, add the following patches:

  # 
https://lore.kernel.org/linux-riscv/20220901133403.3392291-5-conor.doo...@microchip.com/
  riscv: dts: microchip: add pci dma ranges for the icicle
  # 
https://lore.kernel.org/linux-riscv/20220901133403.3392291-6-conor.doo...@microchip.com/
  riscv: dts: microchip: move the mpfs' pci node to
  # 
https://lore.kernel.org/linux-riscv/20220901133403.3392291-6-conor.doo...@microchip.com/
  riscv: dts: microchip: icicle: update pci address
  # 
https://lore.kernel.org/linux-riscv/20220901133403.3392291-8-conor.doo...@microchip.com/
  riscv: dts: microchip: icicle: re-jig fabric peripheral
  # 
https://lore.kernel.org/linux-riscv/20220902142202.2437658-3-daire.mcnam...@microchip.com/
 
  riscv: dts: microchip: add fabric address translation
  # 
https://lore.kernel.org/linux-riscv/20220902142202.2437658-4-daire.mcnam...@microchip.com/
  PCI: microchip: add fabric address translation properties

  All patches are strictly restricted to the PolarFire Icicle Kit and
  have no impact on any other RISC-V boards that we support.

  Best regards

  Heinrich

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-riscv/+bug/1989566/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989558] Re: [UBUNTU 22.10] opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with CEX7 and CEX8 crypto cards

2022-09-14 Thread Frank Heimes
Hello and thx for reporting this.

There is a snapshot version in jammy/22.04:
3.17.0+dfsg+20220202.b40982e-0ubuntu1.1
This is obviously based on 3.17, BUT has a lot of commits on top (until date 
20220202 and commit b40982e).
So I looked up both commits manually (that's why I don't like packages based on 
snapshots) and both commits are NOT in - hence jammy is not affected.

For kinetic/22.10 things are much clearer.
Commit 5d0d588 is in, thus d5ccb00 is needed.

So I worked on an updated package for kinetic that is currently building here:
https://launchpad.net/~fheimes/+archive/ubuntu/lp1989558

** Package changed: linux (Ubuntu) => opencryptoki (Ubuntu)

** Also affects: ubuntu-z-systems
   Importance: Undecided
   Status: New

** Changed in: ubuntu-z-systems
 Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

** Changed in: opencryptoki (Ubuntu)
   Importance: Undecided => High

** Changed in: ubuntu-z-systems
   Importance: Undecided => High

** Changed in: opencryptoki (Ubuntu)
   Status: New => In Progress

** Changed in: ubuntu-z-systems
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989558

Title:
  [UBUNTU 22.10] opencryptoki C_GenerateKeyPair() fails after generating
  > 500 RSA keys with CEX7 and CEX8 crypto cards

Status in Ubuntu on IBM z Systems:
  In Progress
Status in opencryptoki package in Ubuntu:
  In Progress

Bug description:
  ---Problem Description---
  opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with 
CEX7 crypto cards

  Running a program that generates RSA keys and tests
  encyrption/decryption on Crypto cards, is failing after about 500
  iterations. The program makes the following opencryptoki calls in a
  loop:

  C_GenerateKeyPair()
  C_EncryptInit()
  C_Encrypt()
  C_DecryptInit()
  C_Decrypt()
  C_SignInit()
  C_Sign()   (RSA Sign)
  C_VerifyInit()
  C_Verify() (RSA Verify)
  C_SignInit()
  C_SignUpdate() (RSA Multipart sign)
  C_VerifyInit()
  C_VerifyUpdate() (RSA multi-part verify)
  C_VerifyFinal()
  C_DestroyObject() (Destroy RSA public key)
  C_DestroyObject() (Destroy RSA private key)

  When running single-threaded, it fails consistently on loop 504. When
  running multi-threaded it fails on about the 506th iteration across
  all threads (ie with 5 threads, each thread fails after about 100
  loops).

  On the 504th loop, the C_GenerateKeyPair() call fails with return code
  6. Looking at the /var/log/opencryptoki/trace.* logfile, I found these
  error messages which seem to correspond to the failure:

  ```
  09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:1106 api] DEVEL: 
fcn->ST_DestroyObject returned:0x0
  09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:1996 api] INFO: 
C_GenerateKeyPair
  09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:2019 api] INFO: Valid 
Session handle id: 2
  09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/ep11_specific.c:5977 ep11tok] 
INFO: rsa_ec_generate_keypair m_GenerateKeyPair rc=0x0 spki_len=0x1a6 
privkey_blob_len=0x970 mech='CKM_RSA_PKCS_KEY_PAIR_GEN'
  09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/ep11_specific.c:6612 ep11tok] 
INFO: ep11tok_generate_key_pair rc=0x0 hpubkey=0x1 hprivkey=0x2 pub_name='' 
priv_name='' pub_obj=0x3ff7001d210 priv_obj=0x3ff70068460
  09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:149 ep11tok] DEVEL: 
Unable to set permissions on file.
  09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:149 ep11tok] DEVEL: 
Unable to set permissions on file.
  09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:149 ep11tok] DEVEL: 
Unable to set permissions on file.
  09/06/2022 15:37:09 6099 [usr/lib/common/obj_mgr.c:613 ep11tok] DEVEL: Object 
created: handle: 2
  09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:2409 ep11tok] ERROR: 
fopen(/var/lib/opencryptoki/ep11tok/TOK_OBJ/OBxIH3zb): Too many open files
  09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/ep11_specific.c:6749 ep11tok] 
DEVEL: ep11tok_generate_key_pair Object mgr create final failed
  09/06/2022 15:37:09 6099 [usr/lib/common/obj_mgr.c:991 ep11tok] DEVEL: Object 
found: handle: 2
  09/06/2022 15:37:09 6099 [usr/lib/common/loadsave.c:224 ep11tok] ERROR: fopen 
failed
  09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/new_host.c:3837 ep11tok] DEVEL: 
ep11tok_generate_key_pair() failed.
  09/06/2022 15:37:09 6099 [usr/lib/ep11_stdll/new_host.c:3840 ep11tok] INFO: 
C_GenerateKeyPair: rc = 0x0006, sess = 2, mech = 0x0
  09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:2041 api] DEVEL: 
fcn->ST_GenerateKeyPair returned:0x6
  09/06/2022 15:37:09 6099 [usr/lib/api/api_interface.c:1653 api] INFO: 
C_Finalize
  ```

  I tested it on both z15 and z16 (with different crypto cards) and got
  the same failure.  In all cases, I am running on a KVM guest and using
  CEX7 crypto cards. I have not tested yet on CEX8 crypto cards.

T

[Kernel-packages] [Bug 1987232] Re: WARN in trace_event_dyn_put_ref

2022-09-14 Thread Stefan Bader
@Krister, no the affected series is related to where the primarily
affected kernel version sits. For 5.15 kernels this is 22.04/Jammy. On
AWS the custom kernels used, roll. So it is a 5.15 based kernel. 5.4
would be the native Focal kernel. But that is not affected. So this
overall is not tracked against Focal.

** Description changed:

+ [SRU Justification]
+ 
+ Impact: Some imbalanced ref-counting produces kernel warnings regularly.
+ Since it is a warning level, this triggers system monitoring on servers
+ which in turn causes unnecessary work for inspecting the logs.
+ 
+ Fix: There is a fix upstream and also backported to the upstream stable
+ branch. However we are still a bit behind catching up with the latest
+ versions. Since this is having quite an impact and the fix is rather
+ straight forward, we pull this in from upstream stable ahead of time.
+ 
+ Test case: tbd
+ 
+ Regression potential: Regressions would manifest as different errors
+ related to ref-counting.
+ 
+ ---
+ 
  I have systems that are regularly hitting a WARN in
  trace_event_dyn_put_ref.
  
  The exact message is:
  
  WARNING: CPU: 1 PID: 30309 at kernel/trace/trace_dynevent.c:46
  +trace_event_dyn_put_ref+0x15/0x20
  
  With the following stacktrace:
  
-  perf_trace_init+0x8f/0xd0
-  perf_tp_event_init+0x1f/0x40
-  perf_try_init_event+0x4a/0x130
-  perf_event_alloc+0x497/0xf40
-  __do_sys_perf_event_open+0x1d4/0xf70
-  __x64_sys_perf_event_open+0x20/0x30
-  do_syscall_64+0x5c/0xc0
-  entry_SYSCALL_64_after_hwframe+0x44/0xae
+  perf_trace_init+0x8f/0xd0
+  perf_tp_event_init+0x1f/0x40
+  perf_try_init_event+0x4a/0x130
+  perf_event_alloc+0x497/0xf40
+  __do_sys_perf_event_open+0x1d4/0xf70
+  __x64_sys_perf_event_open+0x20/0x30
+  do_syscall_64+0x5c/0xc0
+  entry_SYSCALL_64_after_hwframe+0x44/0xae
  
  I've debugged this and worked with upstream to get a fix into Linux.  It
  was recently merged in 6.0-rc2.  See here:
  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v6.0-rc2&id=7249921d94ff64f67b733eca0b68853a62032b3d
  
  The problem started appearing as soon as our systems picked up the 
linux-aws-5.15 branch for Focal.  (That was 5.15.0-1015-aws, if memory serves). 
 Could you please cherry pick this fix and pull it back to the the linux and 
linux-aws kernels for Focal?  There's test here: 
https://lore.kernel.org/all/cover.1660347763.git.k...@templeofstupid.com/ that 
reproduces the problem very reliably for me.  With the patch applied, I no 
longer get the WARNs.
- --- 
+ ---
  ProblemType: Bug
  AlsaDevices:
-  total 0
-  crw-rw 1 root audio 116,  1 Aug 22 17:32 seq
-  crw-rw 1 root audio 116, 33 Aug 22 17:32 timer
+  total 0
+  crw-rw 1 root audio 116,  1 Aug 22 17:32 seq
+  crw-rw 1 root audio 116, 33 Aug 22 17:32 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay'
  ApportVersion: 2.20.11-0ubuntu27.24
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CRDA: N/A
  CasperMD5CheckResult: skip
  DistroRelease: Ubuntu 20.04
  IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig'
  Lsusb: Error: command ['lsusb'] failed with exit code 1:
  Lsusb-t:
-  
+ 
  Lsusb-v: Error: command ['lsusb', '-v'] failed with exit code 1:
  MachineType: Amazon EC2 c5d.12xlarge
  Package: linux (not installed)
  PciMultimedia:
-  
+ 
  ProcEnviron:
-  TERM=xterm-256color
-  PATH=(custom, no user)
-  LANG=C.UTF-8
-  SHELL=/bin/bash
+  TERM=xterm-256color
+  PATH=(custom, no user)
+  LANG=C.UTF-8
+  SHELL=/bin/bash
  ProcFB:
-  
+ 
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-1015-aws 
root=PARTUUID=4986e35b-1bd5-45d3-b528-fa2edb861a38 ro console=tty1 
console=ttyS0 nvme_core.io_timeout=4294967295 panic=-1
  ProcVersionSignature: Ubuntu 5.15.0-1015.19~20.04.1-aws 5.15.39
  RelatedPackageVersions:
-  linux-restricted-modules-5.15.0-1015-aws N/A
-  linux-backports-modules-5.15.0-1015-aws  N/A
-  linux-firmware   N/A
+  linux-restricted-modules-5.15.0-1015-aws N/A
+  linux-backports-modules-5.15.0-1015-aws  N/A
+  linux-firmware   N/A
  RfKill: Error: [Errno 2] No such file or directory: 'rfkill'
  Tags:  focal uec-images
  Uname: Linux 5.15.0-1015-aws x86_64
  UnreportableReason: This report is about a package that is not installed.
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: False
  dmi.bios.date: 10/16/2017
  dmi.bios.release: 1.0
  dmi.bios.vendor: Amazon EC2
  dmi.bios.version: 1.0
  dmi.board.asset.tag: i-03f5d8581c7ad94aa
  dmi.board.vendor: Amazon EC2
  dmi.chassis.asset.tag: Amazon EC2
  dmi.chassis.type: 1
  dmi.chassis.vendor: Amazon EC2
  dmi.modalias: 
dmi:bvnAmazonEC2:bvr1.0:bd10/16/2017:br1.0:svnAmazonEC2:pnc5d.12xlarge:pvr:rvnAmazonEC2:rn:rvr:cvnAmazonEC2:ct1:cvr:sku:
  dmi.product.name

[Kernel-packages] [Bug 1810998] Re: CPU hard lockup with rigorous writes to NVMe drive

2022-09-14 Thread Mauricio Faria de Oliveira
** Changed in: linux (Ubuntu)
   Status: Confirmed => Fix Released

** Changed in: linux (Ubuntu)
   Status: Fix Released => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1810998

Title:
  CPU hard lockup with rigorous writes to NVMe drive

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  Fix Released
Status in linux source package in Cosmic:
  Fix Released

Bug description:
  [Impact]

   * Users may experience cpu hard lockups when performing
     rigorous writes to NVMe drives.

   * The fix addresses an scheduling issue in the original
     implementation of wbt/writeback throttling

   * The fix is commit 2887e41b910b ("blk-wbt: Avoid lock
     contention and thundering herd issue in wbt_wait"),
     plus its fix commit 38cfb5a45ee0 ("blk-wbt: improve
     waking of tasks").

   * Plus a few dependency commits for each fix.

   * Backports are trivial: mainly replace rq_wait_inc_below()
     with the equivalent atomic_inc_below(), and maintain the
     __wbt_done() signature, both due to the lack of commit
     a79050434b45 ("blk-rq-qos: refactor out common elements
     of blk-wbt"), that changes lots of other/unrelated code.

  [Test Case]

   * This command has been reported to reproduce the problem:

     $ sudo iozone -R -s 5G -r 1m -S 2048 -i 0 -G -c -o -l 128 -u 128 -t
  128

   * It generates stack traces as below in the original kernel,
     and does not generate them in the modified/patched kernel.

   * The user/reporter verified the test kernel with these patches
     resolved the problem.

   * The developer verified in 2 systems (4-core and 24-core but
     no NVMe) for regressions, and no error messages were logged
     to dmesg.

  [Regression Potential]

   * The regression potential is contained within writeback
     throttling mechanism (block/blk-wbt.*).

   * The commits have been verified for fixes in later commits in
     linux-next as of 2019-01-08 and all known fix commits are in.

  [Other Info]

   * The problem has been introduced with the blk-wbt mechanism,
     in v4.10-rc1, and the fix commits in v4.19-rc1 and -rc2,
     so only Bionic and Cosmic needs this.

  [Stack Traces]

  [ 393.628647] NMI watchdog: Watchdog detected hard LOCKUP on cpu 30
  ...
  [ 393.628704] CPU: 30 PID: 0 Comm: swapper/30 Tainted: P OE 4.15.0-20-generic 
#21-Ubuntu
  ...
  [ 393.628720] Call Trace:
  [ 393.628721] 
  [ 393.628724] enqueue_task_fair+0x6c/0x7f0
  [ 393.628726] ? __update_load_avg_blocked_se.isra.37+0xd1/0x150
  [ 393.628728] ? __update_load_avg_blocked_se.isra.37+0xd1/0x150
  [ 393.628731] activate_task+0x57/0xc0
  [ 393.628735] ? sched_clock+0x9/0x10
  [ 393.628736] ? sched_clock+0x9/0x10
  [ 393.628738] ttwu_do_activate+0x49/0x90
  [ 393.628739] try_to_wake_up+0x1df/0x490
  [ 393.628741] default_wake_function+0x12/0x20
  [ 393.628743] autoremove_wake_function+0x12/0x40
  [ 393.628744] __wake_up_common+0x73/0x130
  [ 393.628745] __wake_up_common_lock+0x80/0xc0
  [ 393.628746] __wake_up+0x13/0x20
  [ 393.628749] __wbt_done.part.21+0xa4/0xb0
  [ 393.628749] wbt_done+0x72/0xa0
  [ 393.628753] blk_mq_free_request+0xca/0x1a0
  [ 393.628755] blk_mq_end_request+0x48/0x90
  [ 393.628760] nvme_complete_rq+0x23/0x120 [nvme_core]
  [ 393.628763] nvme_pci_complete_rq+0x7a/0x130 [nvme]
  [ 393.628764] __blk_mq_complete_request+0xd2/0x140
  [ 393.628766] blk_mq_complete_request+0x18/0x20
  [ 393.628767] nvme_process_cq+0xe1/0x1b0 [nvme]
  [ 393.628768] nvme_irq+0x23/0x50 [nvme]
  [ 393.628772] __handle_irq_event_percpu+0x44/0x1a0
  [ 393.628773] handle_irq_event_percpu+0x32/0x80
  [ 393.628774] handle_irq_event+0x3b/0x60
  [ 393.628778] handle_edge_irq+0x7c/0x190
  [ 393.628779] handle_irq+0x20/0x30
  [ 393.628783] do_IRQ+0x46/0xd0
  [ 393.628784] common_interrupt+0x84/0x84
  [ 393.628785] 
  ...
  [ 393.628794] ? cpuidle_enter_state+0x97/0x2f0
  [ 393.628796] cpuidle_enter+0x17/0x20
  [ 393.628797] call_cpuidle+0x23/0x40
  [ 393.628798] do_idle+0x18c/0x1f0
  [ 393.628799] cpu_startup_entry+0x73/0x80
  [ 393.628802] start_secondary+0x1a6/0x200
  [ 393.628804] secondary_startup_64+0xa5/0xb0
  [ 393.628805] Code: ...

  [ 405.981597] nvme nvme1: I/O 393 QID 6 timeout, completion polled

  [ 435.597209] INFO: rcu_sched detected stalls on CPUs/tasks:
  [ 435.602858] 30-...0: (1 GPs behind) idle=e26/1/0 softirq=6834/6834 fqs=4485
  [ 435.610203] (detected by 8, t=15005 jiffies, g=6396, c=6395, q=146818)
  [ 435.617025] Sending NMI from CPU 8 to CPUs 30:
  [ 435.617029] NMI backtrace for cpu 30
  [ 435.617031] CPU: 30 PID: 0 Comm: swapper/30 Tainted: P OE 4.15.0-20-generic 
#21-Ubuntu
  ...
  [ 435.617047] Call Trace:
  [ 435.617048] 
  [ 435.617051] enqueue_entity+0x9f/0x6b0
  [ 435.617053] enqueue_task_fair+0x6c/0x7f0
  [ 435.617056] activate_task+0x57/0xc0
  [ 435.617059] ? sched_clock+0x9/0x10
  [ 435.617060] ? sched_clock+0x9/0x1

[Kernel-packages] [Bug 1984103] Re: [UBUNTU 22.04] s390/qeth: cache link_info for ethtool

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Kinetic)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1984103

Title:
  [UBUNTU 22.04] s390/qeth: cache link_info for ethtool

Status in Ubuntu on IBM z Systems:
  In Progress
Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  Fix Committed

Bug description:
  == SRU Justification ==
  Since commit e6e771b3d897 ("s390/qeth: detach netdevice while card is 
offline") there was a timing window during recovery, that qeth_query_card_info 
could be   sent to the card, even before it was ready for it, leading to a 
failing cardrecovery. There is evidence that this window was hit, as not 
all callers of get_link_ksettings() check for netif_device_present.

  This patch (Mainline commit 7a07a29e4f67) fixes the regression caused
  by commit e6e771b3d897.

  Commit 7a07a29e4f67 is in mainline as of v6.0-rc1.

  This patch is being requested in Jammy 5.15 and Kinetic 5.19.

  == Fix ==
  7a07a29e4f67 ("s390/qeth: cache link_info for ethtool")

  == Regression Potential ==
  Low.  This patch has been accepted in upstream stable and is limited to
  the s390/qeth card.

  == Test Case ==
  A test kernel was built with this patch and tested by the original bug 
reporter.
  The bug reporter states the test kernel resolved the bug.

  == Comment: #0 - J?rn Siglen  - 2022-08-09 07:38:27 ==
  +++ This bug was initially created as a clone of Bug #199319 +++

  Description:   s390/qeth: cache link_info for ethtool
  Symptom:   lost of IP connection and log entries in journalctl:
    kernel: qeth 0.0.0365: The qeth device driver failed to
    recover an error on the device
  Problem:   Since commit e6e771b3d897
   ("s390/qeth: detach netdevice while card is offline")
     there was a timing window during recovery, that
     qeth_query_card_info could be sent to the card, even before it
     was ready for it, leading to a failing card recovery. There is
     evidence that this window was hit, as not all callers of
     get_link_ksettings() check for netif_device_present.
  Solution:  Use cached values in qeth_get_link_ksettings(), instead of
     calling qeth_query_card_info() and falling back to default
     values in case it fails. Link info is already updated when the
     card goes online, e.g. after STARTLAN (physical link up). Set
     the link info to default values, when the card goes offline or
     at STOPLAN (physical link down). A follow-on patch will improve
     values reported for link down.
     Fixes: e6e771b3d897
     ("s390/qeth: detach netdevice while card is offline")
  Reproduction:  enforce a eth device recvoery, while running ethtool multiple
     times in parallel and using iperf to get load on the interface.
  Upstream-ID:   7a07a29e4f6713b224f3bcde5f835e777301bdb8

  
https://lore.kernel.org/all/20220805184504.7f6f2...@kernel.org/T/#m2e3799a38d1d4630822db50f9a5d9b2ca018252f

  applicable for most kernel > 3.14

  == Comment: #3 - J?rn Siglen  - 2022-08-09 07:54:41 ==
  the inital update came in with kernel 5.1 upstream, but we found it 
backported in many older kernel versions

  == Comment: #4 - J?rn Siglen  - 2022-08-09 08:03:09 ==
  the acceptance info of the patch can be found here:
  
https://lore.kernel.org/all/20220805184504.7f6f2...@kernel.org/T/#m2e3799a38d1d4630822db50f9a5d9b2ca018252f

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1984103/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1982070] Re: scsi: hisi_sas: Increase debugfs_dump_index after dump is  completed

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Jammy)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Kinetic)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1982070

Title:
  scsi: hisi_sas: Increase debugfs_dump_index after dump is  completed

Status in kunpeng920:
  In Progress
Status in kunpeng920 ubuntu-20.04-hwe series:
  In Progress
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  Fix Released

Bug description:
  [Impact]
  Trigger dump on hisi_sas in debugfs will cause kernel oops.

  [Test Plan]
  1) modprobe hisi_sas_main with "debugfs_enable=1"
  2) echo 1 | sudo tee /sys/kernel/debug/hisi_sas/\:74\:02.0/trigger_dump
  3) dmesg | grep Oops

  [Regression Risk]
  Only touch code in hisi_sas. Need to run full test on hisi_sas. Other 
drivers/platforms are not affected.

  
  [Bug Description]
   When the hisi_sas_main driver is loaded, the DFX function is enabled. When 
the dump is triggered or the SAS controller is reset, call_trace is displayed. 
In addition, the hisi_sas_v3_hw driver is occupied and cannot be uninstalled.

  [Steps to Reproduce]
  1)dmesg -C
  2)dmesg
  3)lsblk
  4)lsscsi -p
  5)lsmod | grep hisi_sas_v3
  6)rmmod hisi_sas_v3_hw
  7)rmmod hisi_sas_main
  8)modprobe hisi_sas_main debugfs_enable=1
  9)modprobe hisi_sas_v3_hw
  10)cd /sys/kernel/debug/hisi_sas/\:74\:02.0/
  11)ll
  12)echo 1 > trigger_dump
  13)echo 1 > trigger_dump
  14)dmesg

  [Actual Results]
  [ 1005.899976] sas: broadcast received: 0
  [ 1005.87] sas: REVALIDATING DOMAIN on port 0, pid:8
  [ 1005.901775] sas: ex 570fd45f9d17b01f phys DID NOT change
  [ 1005.901777] sas: done REVALIDATING DOMAIN on port 0, pid:8, res 0x0
  [ 1005.901793] sas: broadcast received: 0
  [ 1005.901820] sas: REVALIDATING DOMAIN on port 0, pid:8
  [ 1005.903563] sas: ex 570fd45f9d17b01f phys DID NOT change
  [ 1005.903570] sas: done REVALIDATING DOMAIN on port 0, pid:8, res 0x0
  [ 1005.903586] sas: broadcast received: 0
  [ 1005.903611] sas: REVALIDATING DOMAIN on port 0, pid:8
  [ 1005.905387] sas: ex 570fd45f9d17b01f phys DID NOT change
  [ 1005.905388] sas: done REVALIDATING DOMAIN on port 0, pid:8, res 0x0
  [ 1005.905404] sas: broadcast received: 0
  [ 1005.905429] sas: REVALIDATING DOMAIN on port 0, pid:8
  [ 1005.907161] sas: ex 570fd45f9d17b01f phys DID NOT change
  [ 1005.907168] sas: done REVALIDATING DOMAIN on port 0, pid:8, res 0x0
  [ 1005.907182] sas: broadcast received: 0
  [ 1005.907207] sas: REVALIDATING DOMAIN on port 0, pid:8
  [ 1005.908944] sas: ex 570fd45f9d17b01f phys DID NOT change
  [ 1005.908946] sas: done REVALIDATING DOMAIN on port 0, pid:8, res 0x0
  [ 1005.909025] sas: broadcast received: 0
  [ 1005.909062] sas: REVALIDATING DOMAIN on port 0, pid:8
  [ 1005.910912] sas: ex 570fd45f9d17b01f phys DID NOT change
  [ 1005.910919] sas: done REVALIDATING DOMAIN on port 0, pid:8, res 0x0
  [ 1005.910947] sas: broadcast received: 0
  [ 1005.910985] sas: REVALIDATING DOMAIN on port 0, pid:8
  [ 1005.912843] sas: ex 570fd45f9d17b01f phys DID NOT change
  [ 1005.912847] sas: done REVALIDATING DOMAIN on port 0, pid:8, res 0x0
  [ 1005.912877] sas: broadcast received: 0
  [ 1005.912911] sas: REVALIDATING DOMAIN on port 0, pid:8
  [ 1005.915191] sas: ex 570fd45f9d17b01f phys DID NOT change
  [ 1005.915198] sas: done REVALIDATING DOMAIN on port 0, pid:8, res 0x0
  [ 1005.915221] sas: broadcast received: 0
  [ 1005.915259] sas: REVALIDATING DOMAIN on port 0, pid:1170
  [ 1005.917957] sas: ex 570fd45f9d17b01f phys DID NOT change
  [ 1005.917965] sas: done REVALIDATING DOMAIN on port 0, pid:1170, res 0x0
  [ 1005.920337] sd 4:0:11:0: [sdl] Attached SCSI disk
  [ 1005.921692] sd 4:0:4:0: [sde] Attached SCSI disk
  [ 1008.107610] hisi_sas_v3_hw :b4:02.0: 16 hw queues
  [ 1008.112712] scsi host6: hisi_sas_v3_hw
  [ 1010.428061] hisi_sas_v3_hw :b4:04.0: 16 hw queues
  [ 1010.433120] scsi host7: hisi_sas_v3_hw
  root@ubuntu:/sys/kernel/debug/hisi_sas/:74:02.0#

  [Expected Results]
  Recurrence Logs:
  [ 360.441633] SET = 0, FnV = 0
  [ 360.444689] EA = 0, S1PTW = 0
  [ 360.447863] Data abort info:
  [ 360.450783] ISV = 0, ISS = 0x0044
  [ 360.454663] CM = 0, WnR = 1
  [ 360.457673] user pgtable: 4k pages, 48-bit VAs, pgdp=00211b7ae000
  [ 360.464140] [] pgd=, p4d=
  [ 360.470969] Internal error: Oops: 9644 [#2] SMP
  [ 360.475844] Modules linked in: hisi_sas_v3_hw hisi_sas_main nls_iso8859_1 
dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua ipmi_ssif joydev input_leds 
efi_pstore arm_spe_pmu hisi_hpre ecdh_generic libcurve25519_generic 
hns_roce_hw_v2 ecc hisi_zip uio_pdrv_genirq uio hisi_sec2 hisi_qm uacce authenc 
acpi_ipmi ipmi_si ipmi_devintf ipmi_msghandler h

[Kernel-packages] [Bug 1883962] Re: apparmor reference leak causes refcount_t overflow with af_alg_accept()

2022-09-14 Thread Mauricio Faria de Oliveira
** Changed in: linux (Ubuntu)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1883962

Title:
  apparmor reference leak causes refcount_t overflow with
  af_alg_accept()

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Bionic:
  Fix Released
Status in linux source package in Eoan:
  Fix Released
Status in linux source package in Focal:
  Fix Released
Status in linux source package in Groovy:
  Invalid

Bug description:
  [Impact]

   * Users of the Crypto (user-space) API (i.e., AF_ALG)
     can trigger refcount errors in AppArmor under high
     load (might lead to memory leak or use after free.)

   * There is a reference leak in AppArmor when af_alg_accept()
     calls security_sock_graft() and then security_sk_clone().

   * Both acquire a reference to a label, to assign it to the
     same pointer, but the latter does not release the former's
     acquired reference (before overwriting the pointer value.)

   * This reference leak builds up over time, and under high
     load can eventually overflow/underflow/saturate refcount,
     depending on which value it has when a program hits that.

   * The fix just checks if the pointer has an assigned label,
     then releases its acquired reference.

  [Test Case]

   * See comment #1 for the test-case 'aa-refcnt-af_alg.c'.

   * Exercise that code path indefinitely until it hits
     the refcount_t overflow/underflow/saturate message
     (or not, with the patch.) (see comment #4)

   * It's possible to monitor refcount values with kprobes,
     to confirm whether or not the problem is happening.
     (see comments #2 and #3)

  [Other Info]

   * Patch applied upstream on v5.8-rc1 [1]
   * Applied on Unstable (tag Ubuntu-5.8-5.8.0-0.1)
   * Not required on Groovy (still 5.4; should sync from Unstable)
   * Not required on Eoan (EOL date before SRU cycle release date)
   * Required on Bionic and Focal.

  [1]
  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=3b646abc5bc6c0df649daea4c2c976bd4d47e4c8

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1883962/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1884766] Re: use-after-free in af_alg_accept() due to bh_lock_sock()

2022-09-14 Thread Mauricio Faria de Oliveira
** Changed in: linux (Ubuntu)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1884766

Title:
  use-after-free in af_alg_accept() due to bh_lock_sock()

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Released
Status in linux source package in Bionic:
  Fix Released
Status in linux source package in Eoan:
  Won't Fix
Status in linux source package in Focal:
  Fix Released
Status in linux source package in Groovy:
  Fix Released

Bug description:
  [Impact]

   * Users of the Linux kernel's crypto userspace API
     reported BUG() / kernel NULL pointer dereference
     errors after kernel upgrades.

   * The stack trace signature is an accept() syscall
     going through af_alg_accept() and hitting errors
     usually in one of:
     - apparmor_sk_clone_security()
     - apparmor_sock_graft()
     - release_sock()

  [Fix]

   * This is a regression introduced by upstream commit
     37f96694cf73 ("crypto: af_alg - Use bh_lock_sock
     in sk_destruct") which made its way through stable.

   * The offending patch allows the critical regions
     of af_alg_accept() and af_alg_release_parent() to
     run concurrently; now with the "right" events on 2
     CPUs it might drop the non-atomic reference counter
     of the alg_sock then the sock, thus release a sock
     that is still in use.

   * The fix is upstream commit 34c86f4c4a7b ("crypto:
     af_alg - fix use-after-free in af_alg_accept() due
     to bh_lock_sock()") [1]. It changes alg_sock's ref
     counter to atomic, which addresses the root cause.

  [Test Case]

   * There is a synthetic test case available, which
     uses a kprobes kernel module to synchronize the
     concurrent CPUs on the instructions responsible
     for the problem; and a userspace part to run it.

   * The organic reproducer is the Varnish Cache Plus
     software with the Crypto vmod (which uses kernel
     crypto userspace API) under long, very high load.

   * The patch has been verified on both reproducers
     with the 4.15 and 5.7 kernels.

   * More tests performed with 'stress-ng --af-alg'
     with 11 CPUs on Xenial/Bionic/Disco/Eoan/Focal
     (all on same version of stress-ng, V0.11.14)

     No regressions observed from original kernel.
     (the af-alg stressor can exercise almost all
     kernel crypto modules shipped with the kernel;
     so it checks more paths/crypto alg interfaces.)

  [Regression Potential]

   * The fix patch does a fundamental change in how
     alg_sock reference counters work, plus another
     change to the 'nokey' counting. This of course
     *has* a risk of regression.

   * Regressions theoretically could manifest as use
     after free errors (in case of undercounting) in
     the af_alg functions or silent memory leaks (in
     case of overcounting), but also other behaviors
     since reference counting is key to many things.

   * FWIW, this patch has been written by the crypto
     subsystem maintainer, who certainly knows a lot
     of the normal and corner cases, thus giving the
     patch more credit.

   * Testing with the organic reproducer ran as long
     as 5 days, without issues, so it does look good.

  [Other Info]

   * Not sending for Groovy (should get via Unstable).

   * [1] Patch:
  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34c86f4c4a7be3b3e35aa48bd18299d4c756064d

  [Stack Trace Examples]

  Examples:

  BUG: unable to handle kernel NULL pointer dereference at 
  ...
  RIP: 0010:apparmor_sk_clone_security+0x26/0x70
  ...
  Call Trace:
   security_sk_clone+0x33/0x50
   af_alg_accept+0x81/0x1c0 [af_alg]
   alg_accept+0x15/0x20 [af_alg]
   SYSC_accept4+0xff/0x210
   SyS_accept+0x10/0x20
   do_syscall_64+0x73/0x130
   entry_SYSCALL_64_after_hwframe+0x3d/0xa2

  general protection fault:  [#1] SMP PTI
  ...
  RIP: 0010:__release_sock+0x54/0xe0
  ...
  Call Trace:
   release_sock+0x30/0xa0
   af_alg_accept+0x122/0x1c0 [af_alg]
   alg_accept+0x15/0x20 [af_alg]
   SYSC_accept4+0xff/0x210
   SyS_accept+0x10/0x20
   do_syscall_64+0x73/0x130
   entry_SYSCALL_64_after_hwframe+0x3d/0xa2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1884766/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1873074] Re: kernel panic hit by kube-proxy iptables-save/restore caused by aufs

2022-09-14 Thread Mauricio Faria de Oliveira
** Changed in: linux (Ubuntu)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1873074

Title:
  kernel panic hit by kube-proxy iptables-save/restore caused by aufs

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Released
Status in linux source package in Bionic:
  Fix Released
Status in linux source package in Eoan:
  Won't Fix
Status in linux source package in Focal:
  Fix Released
Status in linux source package in Groovy:
  Won't Fix

Bug description:
  [Impact]

   * Systems with aufs mounts are vulnerable to a kernel BUG(),
     which can turn into a panic/crash if panic_on_oops is set.

   * It is exploitable by unprivileged local users; and also
     remote access operations (e.g., web server) potentially.

   * This issue has also manifested in Kubernetes deployments
     with a kernel panic in iptables-save or iptables-restore
     after a few weeks of uptime, without user interaction.

   * Usually all Kubernetes worker nodes hit the issue around
     the same time.

  [Fix]

   * The issue is fixed with 2 patches in aufs4-linux.git:
   - 515a586eeef3 aufs: do not call i_readcount_inc()
   - f10aea57d39d aufs: bugfix, IMA i_readcount

   * The first addresses the issue, and the second addresses a
     regression in the aufs feature to change RW branches to RO.

   * The kernel v5.3 aufs patches had an equivalent fix to the
     second patch, which is present in the Focal aufs patchset
     (and on ubuntu-unstable/master & /master-5.8 on 20200629)

   - 1d26f910c53f aufs: for v5.3-rc1, maintain i_readcount
 (in aufs5-linux.git)

  [Test Case]

   * Repeatedly open/close the same file in read-only mode in
     aufs (UINT_MAX times, to overflow a signed int back to 0.)

   * Alternatively, monitor the underlying filesystems's file
     inode.i_readcount over several open/close system calls.
     (should not monotonically increase; rather, return to 0.)

  [Regression Potential]

   * This changes the core path that aufs opens files, so there
     is a risk of regression; however, the fix changes aufs for
     how other filesystems work, so this generally is OK to do.
     In any case, most regressions would manifest in open() or
     close() (where the VFS handles/checks inode.i_readcount.)

   * The aufs maintainer has access to an internal test-suite
     used to validate aufs changes, used to identify the first
     regression (in the branch RW/RO mode change), and then to
     validate/publish the patches upstream; should be good now.

   * This has also been tested with 'stress-ng --class filesystem'
     and with 'xfstests -overlay' (patch to use aufs vs overlayfs)
     on Xenial/Bionic/Focal (-proposed vs. -proposed + patches).
     No regressions observed in stress-ng/xfstests log or dmesg.

  [Other Info]

   * Applied on Unstable (branches master and master-5.8)
   * Not required on Groovy (still 5.4; should sync from Unstable)
   * Required on LTS releases: Bionic and Focal and Xenial.
   * Required on other releases: Disco and Eoan (for custom kernels)

  [Original Bug Description]

  Problem Report:
  --

  An user reported several nodes in their Kubernetes clusters
  hit a kernel panic at about the same time, and periodically
  (usually 35 days of uptime, and in same order nodes booted.)

  The kernel panics message/stack trace are consistent across
  nodes, in __fput() by iptables-save/restore from kube-proxy.

  Example:

  """
  [3016161.866702] kernel BUG at .../include/linux/fs.h:2583!
  [3016161.866704] invalid opcode:  [#1] SMP
  ...
  [3016161.866780] CPU: 40 PID: 33068 Comm: iptables-restor Tainted: P OE 
4.4.0-133-generic #159-Ubuntu
  ...
  [3016161.866786] RIP: 0010:[...] [...] __fput+0x223/0x230
  ...
  [3016161.866818] Call Trace:
  [3016161.866823] [...] fput+0xe/0x10
  [3016161.866827] [...] task_work_run+0x86/0xb0
  [3016161.866831] [...] exit_to_usermode_loop+0xc2/0xd0
  [3016161.866833] [...] syscall_return_slowpath+0x4e/0x60
  [3016161.866839] [...] int_ret_from_sys_call+0x25/0x9f
  """

  (uptime: 3016161 seconds / (24*60*60) = 34.90 days)

  They have provided a crashdump (privately available) used
  for analysis later in this bug report.

  Note: the root cause turns out to be independent of K8s,
  as explained in the Root Cause section.

  Related Report:
  --

  This behavior matches this public bug of another user:
  https://github.com/kubernetes/kubernetes/issues/70229

  """
  I have several machines happen kernel panic,and these
  machine have same dump trace like below:

  KERNEL: /usr/lib/debug/boot/vmlinux-4.4.0-104-generic
  ...
  PANIC: "kernel BUG at .../include/linux/fs.h:2582!"
  ...
  COMMAND: "iptables-restor"
  ...
  crash> bt
  ...
  [exception RIP: __fput+541]
  ...
  #8 [880199f33e60] __fput at 812

[Kernel-packages] [Bug 1863044] Re: qla2xxx no longer detects LUNs with 4.15.0-74+ on IBM BladeCenter

2022-09-14 Thread Mauricio Faria de Oliveira
** Changed in: linux (Ubuntu)
 Assignee: Mauricio Faria de Oliveira (mfo) => (unassigned)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1863044

Title:
  qla2xxx no longer detects LUNs with 4.15.0-74+ on IBM BladeCenter

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  We have an IBM BladeCentre Hx5 with a number of blades running Ubuntu
  18.04.3. Storage is attached over Fiber Channel.

  They all boot fine with 4.15.0-72 - the qla2xxx detects all the LUNs.
  On 4.15.0-74 and 4.15.0-76, the qla2xxx driver loads but the LUNs are
  not detected. This breaks the boot. rescan-scsi-bus.sh is also unable
  to find the LUNs. Reverting to the 4.15.0-72 kernel works.

  lspci reports:

  06:00.0 Fibre Channel: QLogic Corp. ISP2532-based 8Gb Fibre Channel to PCI 
Express HBA (rev 02)
Subsystem: QLogic Corp. ISP2532-based 8Gb Fibre Channel to PCI Express 
HBA
Flags: bus master, fast devsel, latency 0, IRQ 24, NUMA node 0
I/O ports at 2c00 [size=256]
Memory at 903fc000 (64-bit, non-prefetchable) [size=16K]
Expansion ROM at 9030 [disabled] [size=256K]
Capabilities: [44] Power Management version 3
Capabilities: [4c] Express Endpoint, MSI 00
Capabilities: [88] MSI: Enable- Count=1/32 Maskable- 64bit+
Capabilities: [98] Vital Product Data
Capabilities: [a0] MSI-X: Enable+ Count=2 Masked-
Capabilities: [100] Advanced Error Reporting
Capabilities: [138] Power Budgeting 
Kernel driver in use: qla2xxx
Kernel modules: qla2xxx

  Let me know if you need any more details. I attach a version.log and
  lspci-vnvn.log from a working -72 boot.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1863044/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1984103] Re: [UBUNTU 22.04] s390/qeth: cache link_info for ethtool

2022-09-14 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1984103

Title:
  [UBUNTU 22.04] s390/qeth: cache link_info for ethtool

Status in Ubuntu on IBM z Systems:
  Fix Committed
Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  Fix Committed

Bug description:
  == SRU Justification ==
  Since commit e6e771b3d897 ("s390/qeth: detach netdevice while card is 
offline") there was a timing window during recovery, that qeth_query_card_info 
could be   sent to the card, even before it was ready for it, leading to a 
failing cardrecovery. There is evidence that this window was hit, as not 
all callers of get_link_ksettings() check for netif_device_present.

  This patch (Mainline commit 7a07a29e4f67) fixes the regression caused
  by commit e6e771b3d897.

  Commit 7a07a29e4f67 is in mainline as of v6.0-rc1.

  This patch is being requested in Jammy 5.15 and Kinetic 5.19.

  == Fix ==
  7a07a29e4f67 ("s390/qeth: cache link_info for ethtool")

  == Regression Potential ==
  Low.  This patch has been accepted in upstream stable and is limited to
  the s390/qeth card.

  == Test Case ==
  A test kernel was built with this patch and tested by the original bug 
reporter.
  The bug reporter states the test kernel resolved the bug.

  == Comment: #0 - J?rn Siglen  - 2022-08-09 07:38:27 ==
  +++ This bug was initially created as a clone of Bug #199319 +++

  Description:   s390/qeth: cache link_info for ethtool
  Symptom:   lost of IP connection and log entries in journalctl:
    kernel: qeth 0.0.0365: The qeth device driver failed to
    recover an error on the device
  Problem:   Since commit e6e771b3d897
   ("s390/qeth: detach netdevice while card is offline")
     there was a timing window during recovery, that
     qeth_query_card_info could be sent to the card, even before it
     was ready for it, leading to a failing card recovery. There is
     evidence that this window was hit, as not all callers of
     get_link_ksettings() check for netif_device_present.
  Solution:  Use cached values in qeth_get_link_ksettings(), instead of
     calling qeth_query_card_info() and falling back to default
     values in case it fails. Link info is already updated when the
     card goes online, e.g. after STARTLAN (physical link up). Set
     the link info to default values, when the card goes offline or
     at STOPLAN (physical link down). A follow-on patch will improve
     values reported for link down.
     Fixes: e6e771b3d897
     ("s390/qeth: detach netdevice while card is offline")
  Reproduction:  enforce a eth device recvoery, while running ethtool multiple
     times in parallel and using iperf to get load on the interface.
  Upstream-ID:   7a07a29e4f6713b224f3bcde5f835e777301bdb8

  
https://lore.kernel.org/all/20220805184504.7f6f2...@kernel.org/T/#m2e3799a38d1d4630822db50f9a5d9b2ca018252f

  applicable for most kernel > 3.14

  == Comment: #3 - J?rn Siglen  - 2022-08-09 07:54:41 ==
  the inital update came in with kernel 5.1 upstream, but we found it 
backported in many older kernel versions

  == Comment: #4 - J?rn Siglen  - 2022-08-09 08:03:09 ==
  the acceptance info of the patch can be found here:
  
https://lore.kernel.org/all/20220805184504.7f6f2...@kernel.org/T/#m2e3799a38d1d4630822db50f9a5d9b2ca018252f

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1984103/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1987287] Re: [UBUNTU 20.04] mlx5 driver crashes on accessing device attributes during recovery

2022-09-14 Thread Stefan Bader
** Changed in: linux (Ubuntu Focal)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1987287

Title:
  [UBUNTU 20.04] mlx5 driver crashes on accessing device attributes
  during recovery

Status in Ubuntu on IBM z Systems:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Committed

Bug description:
  SRU Justification:
  --

  [Impact]

   * If the mlx5 driver is reloading while the recovery flow is happening,
     and if it receives new commands before the command interface is up
     again, this can lead to null pointer that tries to access non-
     initialized command structures.

   * So it's required to avoid processing commands before the command
     interface is up again.

   * This is accomplished by a new cmdif state that helps to avoid
     processing commands while cmdif is not ready.

  [Fix]

   * backport of f7936ddd35d8 f7936ddd35d8b849daf0372770c7c9dbe7910fca
  "net/mlx5: Avoid processing commands before cmdif is ready"

  [Test Plan]

   * An Ubuntu Server for s390x 18.04 or 20.04 LPAR or z/VM installation
     is needed that has Mellanox cards (RoCE Express 2.1) assigned,
     configured and enabled and that runs a 5.4 kernel (on bionic hwe-5.4).

   * Now trigger a recovery (guess that can be done at the Support Element)
     and reload the driver at the same time.

   * Make sure the module/driver mlx5 is loaded and in use
     (otherwise it can't be removed/unloaded).

   * Now remove/unload the module with:
     sudo modprobe -r mlx5
     and (re-)load it again with:
     sudo modprobe mlx5

   * Due to the lack of RoCE Express 2.1 hardware,
     IBM needs to do the verification.

  [Where problems could occur]

   * In case there is an issue with 'cmdif' it might not have the correct
     interface state, which:
     - either might lead to the fact that commands are not properly blocked
   and the situation is similar like before
     - or the commands may get always blocked,
   which render the hardware useless
     - or might block in wrong situation,
   which will cause unexpected issues and broken behavior.

   * Since the patch got upstream accepted with v5.7-rc7 it's
     not new to the kernel, was already part of groovy (and above)
     and is therefor already in use by newer Ubuntu releases.

  [Other Info]

   * Since the patch is upstream since v5.7-rc7,
     it's already included in jammy and kinetic.

   * Since the upstream patch incl. the line:
     Fixes: e126ba97dba9 ("mlx5: Add driver for Mellanox
     Connect-IB adapters") it looks to me that it was forgotten
     to mark the patch for upstream stable updates.

   * Such SRUs for focal's 5.4 will automatically land in bionic's
 hwe-5.4, too. But since this was especially requested for
 bionic's hwe-5.4, I wanted to mention this here.
  __

  We recently got a bug report for systems running Ubuntu 20.04 that were
  crashing with backtraces pointing at the mlx5 driver's handling of 
mlx5_ethtool_get_link_ksettings()
  when this is called through the sysfs (going through ethtool might have 
different checks).
  I managed to find a reliable way to reproduce the issue that I believe isn't 
tied to IBM Z at all.

  The procedure to reproduce is as follows. I created a script to read
  the sysfs attributes for the link's speed and duplex mode in a loop:

  #!/usr/bin/env bash

  if [ $# -lt 1 ]; then
  echo "Usage: $0 "
  exit 1
  fi

  while true; do
  cat /sys/class/net/$1/duplex > /dev/null
  cat /sys/class/net/$1/speed > /dev/null
  done

  Executed with:

  # ./script.sh enP10p0s0

  I ran this in one bash session and then in another one I triggered a PCI 
reset with
  the follwoing command where one needs to replace  with the PCI address 
of the NIC:

  echo 1 > /sys/bus/pci/devices//reset

  Then first I got a lot of the following messages:

   mlx5_core 0010:00:00.0 enP16p0s0: mlx5e_ethtool_get_link_ksettings:
  query port ptys failed: -5

  And then as the mlx5 driver's recovery kicks in the oops as below:

  [  659.103947] mlx5_core 0010:00:00.0: wait vital counter value 0x7b399f 
after 1 iterations
  [  659.103947] mlx5_core 0010:00:00.0: mlx5_pci_resume was called
  [  659.103966] mlx5_core 0010:00:00.0: firmware version: 14.32.1010
  [  659.104169] Unable to handle kernel pointer dereference in virtual kernel 
address space
  [  659.104171] Failing address:  TEID: 0483
  [  659.104172] Fault in home space mode while using kernel ASCE.
  [  659.104173] AS:3d29c007 R3:fffd0007 S:fffd5800 
P:003d
  [  659.104200] Oops: 0004 ilc:2 [#1] SMP
  [  659.104202] Modules linked in: s390_trng ism smc pnet c

[Kernel-packages] [Bug 1988461] Re: intel_pmc_core not load on Raptor Lake

2022-09-14 Thread Timo Aaltonen
6.0 has those commits but not the last bit, and does not load
intel_pmc_core on RPL-S at least.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988461

Title:
  intel_pmc_core not load on Raptor Lake

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Incomplete

Bug description:
  [Summary]
  intel_pmc_core not load on Raptor Lake

  [Reproduce Steps]
  1. Boot into Ubuntu desktop
  2. Check if /sys/kernel/debug/pmc_core folder exist

  [Results]
  Expected: folder /sys/kernel/debug/pmc_core folder been created
  Actual: /sys/kernel/debug/pmc_core not exist

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1988461/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1987287] Re: [UBUNTU 20.04] mlx5 driver crashes on accessing device attributes during recovery

2022-09-14 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1987287

Title:
  [UBUNTU 20.04] mlx5 driver crashes on accessing device attributes
  during recovery

Status in Ubuntu on IBM z Systems:
  Fix Committed
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Committed

Bug description:
  SRU Justification:
  --

  [Impact]

   * If the mlx5 driver is reloading while the recovery flow is happening,
     and if it receives new commands before the command interface is up
     again, this can lead to null pointer that tries to access non-
     initialized command structures.

   * So it's required to avoid processing commands before the command
     interface is up again.

   * This is accomplished by a new cmdif state that helps to avoid
     processing commands while cmdif is not ready.

  [Fix]

   * backport of f7936ddd35d8 f7936ddd35d8b849daf0372770c7c9dbe7910fca
  "net/mlx5: Avoid processing commands before cmdif is ready"

  [Test Plan]

   * An Ubuntu Server for s390x 18.04 or 20.04 LPAR or z/VM installation
     is needed that has Mellanox cards (RoCE Express 2.1) assigned,
     configured and enabled and that runs a 5.4 kernel (on bionic hwe-5.4).

   * Now trigger a recovery (guess that can be done at the Support Element)
     and reload the driver at the same time.

   * Make sure the module/driver mlx5 is loaded and in use
     (otherwise it can't be removed/unloaded).

   * Now remove/unload the module with:
     sudo modprobe -r mlx5
     and (re-)load it again with:
     sudo modprobe mlx5

   * Due to the lack of RoCE Express 2.1 hardware,
     IBM needs to do the verification.

  [Where problems could occur]

   * In case there is an issue with 'cmdif' it might not have the correct
     interface state, which:
     - either might lead to the fact that commands are not properly blocked
   and the situation is similar like before
     - or the commands may get always blocked,
   which render the hardware useless
     - or might block in wrong situation,
   which will cause unexpected issues and broken behavior.

   * Since the patch got upstream accepted with v5.7-rc7 it's
     not new to the kernel, was already part of groovy (and above)
     and is therefor already in use by newer Ubuntu releases.

  [Other Info]

   * Since the patch is upstream since v5.7-rc7,
     it's already included in jammy and kinetic.

   * Since the upstream patch incl. the line:
     Fixes: e126ba97dba9 ("mlx5: Add driver for Mellanox
     Connect-IB adapters") it looks to me that it was forgotten
     to mark the patch for upstream stable updates.

   * Such SRUs for focal's 5.4 will automatically land in bionic's
 hwe-5.4, too. But since this was especially requested for
 bionic's hwe-5.4, I wanted to mention this here.
  __

  We recently got a bug report for systems running Ubuntu 20.04 that were
  crashing with backtraces pointing at the mlx5 driver's handling of 
mlx5_ethtool_get_link_ksettings()
  when this is called through the sysfs (going through ethtool might have 
different checks).
  I managed to find a reliable way to reproduce the issue that I believe isn't 
tied to IBM Z at all.

  The procedure to reproduce is as follows. I created a script to read
  the sysfs attributes for the link's speed and duplex mode in a loop:

  #!/usr/bin/env bash

  if [ $# -lt 1 ]; then
  echo "Usage: $0 "
  exit 1
  fi

  while true; do
  cat /sys/class/net/$1/duplex > /dev/null
  cat /sys/class/net/$1/speed > /dev/null
  done

  Executed with:

  # ./script.sh enP10p0s0

  I ran this in one bash session and then in another one I triggered a PCI 
reset with
  the follwoing command where one needs to replace  with the PCI address 
of the NIC:

  echo 1 > /sys/bus/pci/devices//reset

  Then first I got a lot of the following messages:

   mlx5_core 0010:00:00.0 enP16p0s0: mlx5e_ethtool_get_link_ksettings:
  query port ptys failed: -5

  And then as the mlx5 driver's recovery kicks in the oops as below:

  [  659.103947] mlx5_core 0010:00:00.0: wait vital counter value 0x7b399f 
after 1 iterations
  [  659.103947] mlx5_core 0010:00:00.0: mlx5_pci_resume was called
  [  659.103966] mlx5_core 0010:00:00.0: firmware version: 14.32.1010
  [  659.104169] Unable to handle kernel pointer dereference in virtual kernel 
address space
  [  659.104171] Failing address:  TEID: 0483
  [  659.104172] Fault in home space mode while using kernel ASCE.
  [  659.104173] AS:3d29c007 R3:fffd0007 S:fffd5800 
P:003d
  [  659.104200] Oops: 0004 ilc:2 [#1] SMP
  [  659.104202] Modules linked in: s390_trng ism smc pnet chsc_sch eadm_sch 
vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio sch_fq_cod

[Kernel-packages] [Bug 1903969] Re: failed to boot to GUI: i915 0000:00:02.0: [drm] *ERROR* Link Training Unsuccessful

2022-09-14 Thread Frédéric Grosshans
I seem to have the same problem in Jammy with the kernel
5.15.0-47-generic and with the latest firmware updates. The only
difference is dmesg speak of pipe B instead of pipe A:

[  509.965244] i915 :00:02.0: [drm] *ERROR* Link Training Unsuccessful
[  509.990694] i915 :00:02.0: [drm] *ERROR* CPU pipe B FIFO underrun
[  510.270856] i915 :00:02.0: [drm] *ERROR* Link Training Unsuccessful
[ ] 

Is that actually the same bug, or should I open a new one ?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1903969

Title:
  failed to boot to GUI: i915 :00:02.0: [drm] *ERROR* Link Training
  Unsuccessful

Status in HWE Next:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released
Status in linux-oem-5.10 package in Ubuntu:
  Invalid
Status in linux-oem-5.6 package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Invalid
Status in linux-oem-5.10 source package in Focal:
  Fix Released
Status in linux-oem-5.6 source package in Focal:
  Won't Fix
Status in linux source package in Groovy:
  Won't Fix
Status in linux-oem-5.10 source package in Groovy:
  Invalid
Status in linux-oem-5.6 source package in Groovy:
  Invalid
Status in linux source package in Hirsute:
  Fix Released
Status in linux-oem-5.10 source package in Hirsute:
  Invalid
Status in linux-oem-5.6 source package in Hirsute:
  Invalid

Bug description:
  [SRU Justification]

  [Impact]

  On platforms supported DP tunneling over USB 3.2 or so, a Retimer is
  required on the host side to cover insertion loss. On such platforms the
  rtimer firmware maybe configured to use LTTPR (Link Training Tunable PHY
  Repeater) non-transparent mode only, which is only supported in drm-tip
  currently. Without LTTPR support, link training may fail with following
  error messages depending on the data path configuration:

    i915 :00:02.0: [drm] *ERROR* Link Training Unsuccessful
    i915 :00:02.0: [drm] *ERROR* CPU pipe A FIFO underrun

  [Fix]

  Patchset https://www.spinics.net/lists/intel-gfx/msg248700.html
  ("drm/i915: Add support for LTTPR non-transparent link training mode")
  is required to fix this issue. It has been landed to drm-tip and will
  only be merged to mainline in v5.11.

  Patchset https://patchwork.freedesktop.org/series/76993/ ("Plumb crtc
  state to link training code") is included for link training functions
  prototype changes.

  [Test Case]

  On Dell OptiPlex and WD19 docking station, use following steps to verify:
  1. disconnect WD19 from OptiPlex, disconnect OptiPlex's power
  2. attach OptiPlex's power cord
  3. attach WD19's power cord
  4. attach DP to WD19
  5. attach WD19 to OptiPlex
  6. boot up and check if boot to GUI directly
  7. `dmesg` and check if aforementioned DRM link training error appears

  [Where problems could occur]

  The second patchset pulled for dependency doesn't have too much
  effective changes but refactoring some translation functions, so very
  unlikely to have regressions.

  For the major part, LTTPR support, when LTTPR is either not detected or
  not supported, it will fall back to use transparent mode as it was.
  Otherwise, DP Standard recommends to use LTTPR non-transparent mode for
  link training, so this should be the right way to have best hardware
  support.

  == original bug description ==

  [Summary]
  When the monitor ONLY is connected to the WD19 (DP port) and WD19 is 
connected to the type c port than boot the machine, the monitor shows no video 
output after loaded i915.

  [Reproduce Steps]
  1. connect power cable of WD19
  2. connect DP cable from monitor to WD19
  3. connect power cable to target system.
  4. connect type c cable from WD19 to target system
  5. boot up

  [Results]
  Expected: video output as there is only one monitor connected.
  Actual: No video output.

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.6.0-1033-oem 5.6.0-1033.35
  ProcVersionSignature: Ubuntu 5.6.0-1033.35-oem 5.6.19
  Uname: Linux 5.6.0-1033-oem x86_64
  ApportVersion: 2.20.11-0ubuntu27.11
  Architecture: amd64
  CasperMD5CheckResult: skip
  Date: Thu Nov 12 05:11:11 2020
  DistributionChannelDescriptor:
   # This is the distribution channel descriptor for the OEM CDs
   # For more information see 
http://wiki.ubuntu.com/DistributionChannelDescriptor
   canonical-oem-somerville-focal-amd64-20200502-85+fossa-metapod+X40
  InstallationDate: Installed on 2020-11-03 (9 days ago)
  InstallationMedia: Ubuntu 20.04 "Focal" - Build amd64 LIVE Binary 
20200502-05:58
  SourcePackage: linux-signed-oem-5.6
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1903969/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https

[Kernel-packages] [Bug 1955353] Re: Installing linux-modules-extra-raspi in chroot triggers flash-kernel which fails

2022-09-14 Thread William Wilson
** Also affects: flash-kernel (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: linux-raspi (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Changed in: linux-raspi (Ubuntu Jammy)
   Status: New => Invalid

** Changed in: flash-kernel (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: flash-kernel (Ubuntu Jammy)
   Importance: Undecided => Medium

** Tags added: foundations-todo

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-raspi in Ubuntu.
https://bugs.launchpad.net/bugs/1955353

Title:
  Installing linux-modules-extra-raspi in chroot triggers flash-kernel
  which fails

Status in flash-kernel package in Ubuntu:
  Fix Released
Status in linux-raspi package in Ubuntu:
  Invalid
Status in flash-kernel source package in Jammy:
  In Progress
Status in linux-raspi source package in Jammy:
  Invalid

Bug description:
  Hey, following up on: https://bugs.launchpad.net/ubuntu/+source/linux-
  raspi/+bug/1947601?comments=all

  Its not possible install linux-modules-extra-raspi in chroot, because it 
activates flash-kernel which fails.
  I also tried to bypass flash-kernel by moving /sbin/flash-kernel aside before 
installing, but then the issue of docker failing does not get fixed.

  This means that a number of distros I maintain can't have docker
  running correctly.

  Related: https://github.com/guysoft/CustomPiOS/issues/149

  Output:
  12:36:15 I: /boot/initrd.img is now a symlink to initrd.img-5.13.0-1011-raspi
  12:36:16 Setting up linux-modules-extra-5.13.0-1011-raspi (5.13.0-1011.13) ...
  12:36:20 Setting up linux-modules-5.13.0-1011-raspi (5.13.0-1011.13) ...
  12:36:25 Setting up linux-modules-extra-raspi (5.13.0.1011.17) ...
  12:36:25 Processing triggers for linux-image-5.13.0-1011-raspi 
(5.13.0-1011.13) ...
  12:36:25 /etc/kernel/postinst.d/initramfs-tools:
  12:36:25 update-initramfs: Generating /boot/initrd.img-5.13.0-1011-raspi
  12:36:45 cryptsetup: ERROR: Couldn't find sysfs directory for 7:0
  12:36:47 Label writable not found in /dev/disk/by-label
  12:36:48 Warning: root device LABEL=writable does not exist
  12:37:07 W: mkconf: MD subsystem is not loaded, thus I cannot scan for arrays.
  12:37:07 W: mdadm: failed to auto-generate temporary mdadm.conf file.
  12:38:59 flash-kernel: deferring update (trigger activated)
  12:38:59 /etc/kernel/postinst.d/zz-flash-kernel:
  12:38:59 flash-kernel: deferring update (trigger activated)
  12:38:59 Processing triggers for flash-kernel (3.104ubuntu5) ...
  12:39:00 Unsupported platform 'BCM2835'.
  12:39:00 dpkg: error processing package flash-kernel (--configure):
  12:39:00  installed flash-kernel package post-installation script subprocess 
returned error exit status 1
  12:39:00 Errors were encountered while processing:
  12:39:00  flash-kernel
  12:39:01 needrestart is being skipped since dpkg has failed
  12:39:09 E: Sub-process /usr/bin/dpkg returned an error code (1)
  12:39:09  echo_red 'build failed, unmounting image...'

  Things I tried:

  Patching as describe here: 
https://forums.raspberrypi.com/viewtopic.php?t=258056
  Then moving before install /sbin/flash-kernel to /sbin/flash-kernel.bak

  Results in the following output:

  13:14:27
  13:14:27 Pending kernel upgrade!
  13:14:27
  13:14:27 Running kernel version:
  13:14:27   5.10.81-v8+
  13:14:27
  13:14:27 Diagnostics:
  13:14:27   The currently running kernel version is not the expected kernel 
version 5.13.0-1011-raspi.
  13:14:27
  13:14:27 Restarting the system to load the new kernel will not be handled 
automatically, so you should consider rebooting. [Return]
  13:14:27
  13:14:27 Failed to check for processor microcode upgrades.
  13:14:27
  13:14:27 No services need to be restarted.
  13:14:27
  13:14:27 No containers need to be restarted.
  13:14:27
  13:14:27 No user sessions are running outdated binaries.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/flash-kernel/+bug/1955353/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1971151] Re: [Ubuntu 22.04.1] mpi3mr: Add management application interface(BSG) support

2022-09-14 Thread Michael Reed
Hi Sumit

Here is the source.

https://code.launchpad.net/~mreed8855/ubuntu/+source/linux/+git/jammy/+ref/mpi3mr_bsg_support

Is the code not there?  or is there a config variable I need to enable?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1971151

Title:
  [Ubuntu 22.04.1] mpi3mr: Add management application interface(BSG)
  support

Status in linux package in Ubuntu:
  In Progress

Bug description:
  Request to include below mpi3mr driver bug fix patches in Ubuntu
  22.04.1(5.15 kernel). These patches got accepted by the upstream and
  please find the corresponding commit IDs as below:

  ed567615f7ec scsi: mpi3mr: Fix build errors in uapi header scsi_bsg_mpi3mr.h
  dde822e21700 scsi: mpi3mr: Update driver version to 8.0.0.69.0
  04dfa01e77ea scsi: mpi3mr: Add support for NVMe passthrough
  937a6f2c4f2e scsi: mpi3mr: Expose adapter state to sysfs
  83959ce5204a scsi: mpi3mr: Add support for PEL commands
  eb8a3217cd7d scsi: mpi3mr: Add support for MPT commands
  455aac4f7a13 scsi: mpi3mr: Move data structures/definitions from MPI headers 
to uapi header
  a212ebe7d4b1 scsi: mpi3mr: Add support for driver commands
  7fbaf8b0d8b8 scsi: mpi3mr: Add bsg device support

  
  Thanks,
  Sumit

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971151/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989625] [NEW] Bionic update: upstream stable patchset 2022-09-14

2022-09-14 Thread Kamal Mostafa
Public bug reported:

SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   upstream stable patchset 2022-09-14

Ported from the following upstream stable releases:
v4.14.286, v4.19.250
v4.14.287, v4.19.251
v4.14.288, v4.19.252
v4.14.289, v4.19.253

   from git://git.kernel.org/

random: schedule mix_interrupt_randomness() less often
ata: libata: add qc->flags in ata_qc_complete_template tracepoint
dm era: commit metadata in postsuspend after worker stops
random: quiet urandom warning ratelimit suppression message
USB: serial: option: add Telit LE910Cx 0x1250 composition
USB: serial: option: add Quectel EM05-G modem
USB: serial: option: add Quectel RM500K module support
bonding: ARP monitor spams NETDEV_NOTIFY_PEERS notifiers
x86/xen: Remove undefined behavior in setup_features()
MIPS: Remove repetitive increase irq_err_count
igb: Make DMA faster when CPU is active on the PCIe link
iio: adc: vf610: fix conversion mode sysfs node name
usb: chipidea: udc: check request status before setting device address
iio:accel:bma180: rearrange iio trigger get and register
iio: accel: mma8452: ignore the return value of reset operation
iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up()
iio: trigger: sysfs: fix use-after-free on remove
iio: adc: axp288: Override TS pin bias current for some models
xtensa: xtfpga: Fix refcount leak bug in setup
xtensa: Fix refcount leak bug in time.c
powerpc: Enable execve syscall exit tracepoint
powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address
powerpc/powernv: wire up rng during setup_arch
ARM: dts: imx6qdl: correct PU regulator ramp delay
ARM: exynos: Fix refcount leak in exynos_map_pmu
ARM: Fix refcount leak in axxia_boot_secondary
ARM: cns3xxx: Fix refcount leak in cns3xxx_init
modpost: fix section mismatch check for exported init/exit sections
powerpc/pseries: wire up rng during setup_arch()
drm: remove drm_fb_helper_modinit
xen: unexport __init-annotated xen_xlate_map_ballooned_pages()
fdt: Update CRC check for rng-seed
kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add]
swiotlb: skip swiotlb_bounce when orig_addr is zero
net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms
afs: Fix dynamic root getattr
iio:chemical:ccs811: rearrange iio trigger get and register
soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe
UBUNTU: Upstream stable to v4.14.286, v4.19.250
nvdimm: Fix badblocks clear off-by-one error
dm raid: fix accesses beyond end of raid member array
dm raid: fix KASAN warning in raid5_add_disks
s390/archrandom: simplify back to earlier design and initialize earlier
SUNRPC: Fix READ_PLUS crasher
net: rose: fix UAF bugs caused by timer handler
net: usb: ax88179_178a: Fix packet receiving
RDMA/qedr: Fix reporting QP timeout attribute
usbnet: fix memory allocation in helpers
net: ipv6: unexport __init-annotated seg6_hmac_net_init()
caif_virtio: fix race between virtio_device_ready() and ndo_open()
netfilter: nft_dynset: restore set element counter when failing to update
net: bonding: fix possible NULL deref in rlb code
net: bonding: fix use-after-free after 802.3ad slave unbind
nfc: nfcmrvl: Fix irq_of_parse_and_map() return value
NFC: nxp-nci: Don't issue a zero length i2c_master_read()
xen/gntdev: Avoid blocking in unmap_grant_pages()
hwmon: (ibmaem) don't call platform_device_del() if platform_device_add() fails
sit: use min
ipv6/sit: fix ipip6_tunnel_get_prl return value
net: Rename and export copy_skb_header
xen/blkfront: fix leaking data in shared pages
xen/netfront: fix leaking data in shared pages
xen/netfront: force data bouncing when backend is untrusted
xen/blkfront: force data bouncing when backend is untrusted
xen/arm: Fix race in RB-tree based P2M accounting
net: usb: qmi_wwan: add Telit 0x1060 composition
net: usb: qmi_wwan: add Telit 0x1070 composition
virtio-net: fix race between ndo_open() and virtio_device_ready()
net: tun: unlink NAPI from device on destruction
net: tun: stop NAPI when detaching queues
UBUNTU: Upstream stable to v4.14.287, v4.19.251
esp: limit skb_page_frag_refill use to a single page
mm/slub: add missing TID updates on slab deactivation
can: grcan: grcan_probe(): remove extra of_node_get()
can: gs_usb: gs_usb_open/close(): fix memory leak
usbnet: fix memory leak in error case
net: rose: fix UAF bug caused by rose_t0timer_expiry
iommu/vt-d: Fix PCI bus rescan device hot add
video: of_display_timing.h: include errno.h
powerpc/powernv: delay rn

[Kernel-packages] [Bug 1989521] [NEW] Ubuntu 22.04.1 CPU soft lockup occurs repeatedly

2022-09-14 Thread Launchpad Bug Tracker
You have been subscribed to a public bug:

Hi all,

Ubuntu server 22.04.1 is having issues freezing repeatedly with CPU
softlocking. The issue seems to have started in the last week, all
packages are up to date. I've updated to hwe kernel, rebooted several
times, and it still happens. Hw info: 32G RAM, AMD 3600x CPU, Quadro RTX
4000 GPU.

I caught the following in syslog :


Sep 13 04:17:55 marcus-server kernel: [33687.436241] watchdog: BUG: soft lockup 
- CPU#2 stuck for 26s! [kworker/u64:17:154214]
Sep 13 04:17:55 marcus-server kernel: [33687.436243] Modules linked in: tls 
xt_nat veth nf_conntrack_netlink xfrm_user xfrm_algo xt_addrtype br_netfilter 
xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp 
nft_compat nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 
nft_counter nf_tables nfnetlink overlay bridge stp llc nvidia_drm(PO) 
snd_hda_codec_realtek intel_rapl_msr intel_rapl_common nvidia_modeset(PO) 
snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi snd_hda_intel 
snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep 
snd_pcm snd_seq_midi snd_seq_midi_event zfs(PO) edac_mce_amd nls_iso8859_1 
snd_rawmidi kvm_amd zunicode(PO) nvidia(PO) snd_seq kvm zzstd(O) zlua(O) 
zavl(PO) snd_seq_device icp(PO) rapl wmi_bmof snd_timer zcommon(PO) k10temp ccp 
ucsi_ccg znvpair(PO) snd typec_ucsi typec spl(O) soundcore apex(OE) gasket(OE) 
mac_hid sch_fq_codel dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua nct6775 
hwmon_vid ipmi_devintf ipmi_msghandler msr parport_pc ppdev lp
Sep 13 04:17:55 marcus-server kernel: [33687.436279]  parport ramoops 
reed_solomon pstore_blk pstore_zone mtd efi_pstore ip_tables x_tables autofs4 
btrfs blake2b_generic zstd_compress raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear nouveau mxm_wmi drm_ttm_helper ttm drm_kms_helper syscopyarea 
sysfillrect sysimgblt fb_sys_fops cec rc_core crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel drm aesni_intel video crypto_simd igb cryptd xhci_pci ahci 
dca i2c_piix4 i2c_nvidia_gpu arcmsr libahci xhci_pci_renesas i2c_algo_bit wmi
Sep 13 04:17:55 marcus-server kernel: [33687.436302] CPU: 2 PID: 154214 Comm: 
kworker/u64:17 Tainted: P   OE 5.15.0-47-generic #51-Ubuntu
Sep 13 04:17:55 marcus-server kernel: [33687.436303] Hardware name: To Be 
Filled By O.E.M. To Be Filled By O.E.M./X570 Phantom Gaming 4, BIOS P4.20 
08/02/2021
Sep 13 04:17:55 marcus-server kernel: [33687.436305] Workqueue: events_unbound 
async_run_entry_fn
Sep 13 04:17:55 marcus-server kernel: [33687.436308] RIP: 
0010:arcmsr_wait_firmware_ready+0xc1/0x140 [arcmsr]
Sep 13 04:17:55 marcus-server kernel: [33687.436312] Code: e3 49 8b 94 24 48 08 
00 00 b8 10 00 00 00 89 02 5b 41 5c 5d e9 b0 7b db e8 48 8b 47 50 4c 8d a0 bc 
00 00 00 eb 0c 41 8b 04 24 <85> c0 0f 88 64 ff ff ff f6 83 81 00 00 00 01 75 eb 
bf 14 00 00 00
Sep 13 04:17:55 marcus-server kernel: [33687.436313] RSP: 0018:ade8d136fd10 
EFLAGS: 0202
Sep 13 04:17:55 marcus-server kernel: [33687.436314] RAX:  RBX: 
96720a460870 RCX: ade8c12b0034
Sep 13 04:17:55 marcus-server kernel: [33687.436315] RDX: 000d RSI: 
96721b53ef80 RDI: 96720a460870
Sep 13 04:17:55 marcus-server kernel: [33687.436315] RBP: ade8d136fd20 R08: 
 R09: 
Sep 13 04:17:55 marcus-server kernel: [33687.436316] R10: 0284 R11: 
 R12: ade8c12b00bc
Sep 13 04:17:55 marcus-server kernel: [33687.436317] R13: 000d R14: 
96720a46 R15: 96720a460870
Sep 13 04:17:55 marcus-server kernel: [33687.436318] FS:  
() GS:96791ea8() knlGS:
Sep 13 04:17:55 marcus-server kernel: [33687.436319] CS:  0010 DS:  ES: 
 CR0: 80050033
Sep 13 04:17:55 marcus-server kernel: [33687.436320] CR2:  CR3: 
0007c8c1 CR4: 00350ee0


It happens pretty often too, but the system isn't overloaded, so I'm not sure 
what is causing it. 

Message from syslogd@marcus-server at Sep 14 02:16:11 ...
 kernel:[ 1276.914096] watchdog: BUG: soft lockup - CPU#8 stuck for 26s! 
[kworker/u64:28:252938]

Message from syslogd@marcus-server at Sep 14 02:16:11 ...
 kernel:[ 1304.913956] watchdog: BUG: soft lockup - CPU#8 stuck for 52s! 
[kworker/u64:28:252938]

Message from syslogd@marcus-server at Sep 14 02:37:47 ...
 kernel:[ 2569.382397] watchdog: BUG: soft lockup - CPU#3 stuck for 26s! 
[kworker/u64:27:743931]

Message from syslogd@marcus-server at Sep 14 02:37:47 ...
 kernel:[ 2597.382461] watchdog: BUG: soft lockup - CPU#3 stuck for 53s! 
[kworker/u64:27:743931]


I've also uploaded apport file to this bug. Please lmk if anything else is 
needed to troubleshoot this issue.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: bot-comment
-- 
Ubuntu 22.04.1 CPU soft lockup occurs repeatedly 
h

[Kernel-packages] [Bug 1989521] Re: Ubuntu 22.04.1 CPU soft lockup occurs repeatedly

2022-09-14 Thread Brian Murray
If you run 'apport-collect 1989521' from the affected system the log
files will be uploaded in a fashion which will be much more usable.
Thanks!

** Package changed: ubuntu => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989521

Title:
  Ubuntu 22.04.1 CPU soft lockup occurs repeatedly

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Hi all,

  Ubuntu server 22.04.1 is having issues freezing repeatedly with CPU
  softlocking. The issue seems to have started in the last week, all
  packages are up to date. I've updated to hwe kernel, rebooted several
  times, and it still happens. Hw info: 32G RAM, AMD 3600x CPU, Quadro
  RTX 4000 GPU.

  I caught the following in syslog :

  
  Sep 13 04:17:55 marcus-server kernel: [33687.436241] watchdog: BUG: soft 
lockup - CPU#2 stuck for 26s! [kworker/u64:17:154214]
  Sep 13 04:17:55 marcus-server kernel: [33687.436243] Modules linked in: tls 
xt_nat veth nf_conntrack_netlink xfrm_user xfrm_algo xt_addrtype br_netfilter 
xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp 
nft_compat nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 
nft_counter nf_tables nfnetlink overlay bridge stp llc nvidia_drm(PO) 
snd_hda_codec_realtek intel_rapl_msr intel_rapl_common nvidia_modeset(PO) 
snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi snd_hda_intel 
snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep 
snd_pcm snd_seq_midi snd_seq_midi_event zfs(PO) edac_mce_amd nls_iso8859_1 
snd_rawmidi kvm_amd zunicode(PO) nvidia(PO) snd_seq kvm zzstd(O) zlua(O) 
zavl(PO) snd_seq_device icp(PO) rapl wmi_bmof snd_timer zcommon(PO) k10temp ccp 
ucsi_ccg znvpair(PO) snd typec_ucsi typec spl(O) soundcore apex(OE) gasket(OE) 
mac_hid sch_fq_codel dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua nct6775 
hwmon_vid ipmi_devintf ipmi_msghandler msr parport_pc ppdev lp
  Sep 13 04:17:55 marcus-server kernel: [33687.436279]  parport ramoops 
reed_solomon pstore_blk pstore_zone mtd efi_pstore ip_tables x_tables autofs4 
btrfs blake2b_generic zstd_compress raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear nouveau mxm_wmi drm_ttm_helper ttm drm_kms_helper syscopyarea 
sysfillrect sysimgblt fb_sys_fops cec rc_core crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel drm aesni_intel video crypto_simd igb cryptd xhci_pci ahci 
dca i2c_piix4 i2c_nvidia_gpu arcmsr libahci xhci_pci_renesas i2c_algo_bit wmi
  Sep 13 04:17:55 marcus-server kernel: [33687.436302] CPU: 2 PID: 154214 Comm: 
kworker/u64:17 Tainted: P   OE 5.15.0-47-generic #51-Ubuntu
  Sep 13 04:17:55 marcus-server kernel: [33687.436303] Hardware name: To Be 
Filled By O.E.M. To Be Filled By O.E.M./X570 Phantom Gaming 4, BIOS P4.20 
08/02/2021
  Sep 13 04:17:55 marcus-server kernel: [33687.436305] Workqueue: 
events_unbound async_run_entry_fn
  Sep 13 04:17:55 marcus-server kernel: [33687.436308] RIP: 
0010:arcmsr_wait_firmware_ready+0xc1/0x140 [arcmsr]
  Sep 13 04:17:55 marcus-server kernel: [33687.436312] Code: e3 49 8b 94 24 48 
08 00 00 b8 10 00 00 00 89 02 5b 41 5c 5d e9 b0 7b db e8 48 8b 47 50 4c 8d a0 
bc 00 00 00 eb 0c 41 8b 04 24 <85> c0 0f 88 64 ff ff ff f6 83 81 00 00 00 01 75 
eb bf 14 00 00 00
  Sep 13 04:17:55 marcus-server kernel: [33687.436313] RSP: 
0018:ade8d136fd10 EFLAGS: 0202
  Sep 13 04:17:55 marcus-server kernel: [33687.436314] RAX:  
RBX: 96720a460870 RCX: ade8c12b0034
  Sep 13 04:17:55 marcus-server kernel: [33687.436315] RDX: 000d 
RSI: 96721b53ef80 RDI: 96720a460870
  Sep 13 04:17:55 marcus-server kernel: [33687.436315] RBP: ade8d136fd20 
R08:  R09: 
  Sep 13 04:17:55 marcus-server kernel: [33687.436316] R10: 0284 
R11:  R12: ade8c12b00bc
  Sep 13 04:17:55 marcus-server kernel: [33687.436317] R13: 000d 
R14: 96720a46 R15: 96720a460870
  Sep 13 04:17:55 marcus-server kernel: [33687.436318] FS:  
() GS:96791ea8() knlGS:
  Sep 13 04:17:55 marcus-server kernel: [33687.436319] CS:  0010 DS:  ES: 
 CR0: 80050033
  Sep 13 04:17:55 marcus-server kernel: [33687.436320] CR2:  
CR3: 0007c8c1 CR4: 00350ee0

  
  It happens pretty often too, but the system isn't overloaded, so I'm not sure 
what is causing it. 

  Message from syslogd@marcus-server at Sep 14 02:16:11 ...
   kernel:[ 1276.914096] watchdog: BUG: soft lockup - CPU#8 stuck for 26s! 
[kworker/u64:28:252938]

  Message from syslogd@marcus-server at Sep 14 02:16:11 ...
   kernel:[ 1304.913956] watchdog: BUG: soft lockup - CPU#8 stuck for 52s! 
[kworker/u64:28:252938]

  Message from syslogd@marcus-server at Sep 14 02:37:47 ...
   kernel:[ 2569.38

[Kernel-packages] [Bug 1989521] Missing required logs.

2022-09-14 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1989521

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989521

Title:
  Ubuntu 22.04.1 CPU soft lockup occurs repeatedly

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Hi all,

  Ubuntu server 22.04.1 is having issues freezing repeatedly with CPU
  softlocking. The issue seems to have started in the last week, all
  packages are up to date. I've updated to hwe kernel, rebooted several
  times, and it still happens. Hw info: 32G RAM, AMD 3600x CPU, Quadro
  RTX 4000 GPU.

  I caught the following in syslog :

  
  Sep 13 04:17:55 marcus-server kernel: [33687.436241] watchdog: BUG: soft 
lockup - CPU#2 stuck for 26s! [kworker/u64:17:154214]
  Sep 13 04:17:55 marcus-server kernel: [33687.436243] Modules linked in: tls 
xt_nat veth nf_conntrack_netlink xfrm_user xfrm_algo xt_addrtype br_netfilter 
xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp 
nft_compat nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 
nft_counter nf_tables nfnetlink overlay bridge stp llc nvidia_drm(PO) 
snd_hda_codec_realtek intel_rapl_msr intel_rapl_common nvidia_modeset(PO) 
snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi snd_hda_intel 
snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep 
snd_pcm snd_seq_midi snd_seq_midi_event zfs(PO) edac_mce_amd nls_iso8859_1 
snd_rawmidi kvm_amd zunicode(PO) nvidia(PO) snd_seq kvm zzstd(O) zlua(O) 
zavl(PO) snd_seq_device icp(PO) rapl wmi_bmof snd_timer zcommon(PO) k10temp ccp 
ucsi_ccg znvpair(PO) snd typec_ucsi typec spl(O) soundcore apex(OE) gasket(OE) 
mac_hid sch_fq_codel dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua nct6775 
hwmon_vid ipmi_devintf ipmi_msghandler msr parport_pc ppdev lp
  Sep 13 04:17:55 marcus-server kernel: [33687.436279]  parport ramoops 
reed_solomon pstore_blk pstore_zone mtd efi_pstore ip_tables x_tables autofs4 
btrfs blake2b_generic zstd_compress raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear nouveau mxm_wmi drm_ttm_helper ttm drm_kms_helper syscopyarea 
sysfillrect sysimgblt fb_sys_fops cec rc_core crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel drm aesni_intel video crypto_simd igb cryptd xhci_pci ahci 
dca i2c_piix4 i2c_nvidia_gpu arcmsr libahci xhci_pci_renesas i2c_algo_bit wmi
  Sep 13 04:17:55 marcus-server kernel: [33687.436302] CPU: 2 PID: 154214 Comm: 
kworker/u64:17 Tainted: P   OE 5.15.0-47-generic #51-Ubuntu
  Sep 13 04:17:55 marcus-server kernel: [33687.436303] Hardware name: To Be 
Filled By O.E.M. To Be Filled By O.E.M./X570 Phantom Gaming 4, BIOS P4.20 
08/02/2021
  Sep 13 04:17:55 marcus-server kernel: [33687.436305] Workqueue: 
events_unbound async_run_entry_fn
  Sep 13 04:17:55 marcus-server kernel: [33687.436308] RIP: 
0010:arcmsr_wait_firmware_ready+0xc1/0x140 [arcmsr]
  Sep 13 04:17:55 marcus-server kernel: [33687.436312] Code: e3 49 8b 94 24 48 
08 00 00 b8 10 00 00 00 89 02 5b 41 5c 5d e9 b0 7b db e8 48 8b 47 50 4c 8d a0 
bc 00 00 00 eb 0c 41 8b 04 24 <85> c0 0f 88 64 ff ff ff f6 83 81 00 00 00 01 75 
eb bf 14 00 00 00
  Sep 13 04:17:55 marcus-server kernel: [33687.436313] RSP: 
0018:ade8d136fd10 EFLAGS: 0202
  Sep 13 04:17:55 marcus-server kernel: [33687.436314] RAX:  
RBX: 96720a460870 RCX: ade8c12b0034
  Sep 13 04:17:55 marcus-server kernel: [33687.436315] RDX: 000d 
RSI: 96721b53ef80 RDI: 96720a460870
  Sep 13 04:17:55 marcus-server kernel: [33687.436315] RBP: ade8d136fd20 
R08:  R09: 
  Sep 13 04:17:55 marcus-server kernel: [33687.436316] R10: 0284 
R11:  R12: ade8c12b00bc
  Sep 13 04:17:55 marcus-server kernel: [33687.436317] R13: 000d 
R14: 96720a46 R15: 96720a460870
  Sep 13 04:17:55 marcus-server kernel: [33687.436318] FS:  
() GS:96791ea8() knlGS:
  Sep 13 04:17:55 marcus-server kernel: [33687.436319] CS:  0010 DS:  ES: 
 CR0: 80050033
  Sep 13 04:17:55 marcus-server kernel: [33687.436320] CR2:  
CR3: 0007c8c1 CR4: 00350ee0

  
  It happens pretty often too, but the system isn't overloaded, so I'm not sure 
what is c

[Kernel-packages] [Bug 1989258] Re: multiple kernel oops regarding hung tasks delaying boot

2022-09-14 Thread Brian Murray
I was booting a test system this afternoon and encountered the OOPS
regularly so installed the test kernel on the system and rebooted the
system multiple times and did not encounter the OOPS once.

Sep 15 00:01:48 bdmurray-test-virtio-rng kernel: [0.00] Linux version 
5.19.0-16-generic (ubuntu@ip-10-0-228-190) (x86_64-linux-gnu-gcc (Ubuntu 
12.2.0-1ubuntu1) 12.2.0, GNU ld (GNU Binutils for Ubuntu) 2.39) #16+arighi SMP 
PREEMPT_DYNAMIC Mon Sep 12 15:18:26 UTC 2022 (Ubuntu 
5.19.0-16.16+arighi-generic 5.19.7)
Sep 15 00:01:48 bdmurray-test-virtio-rng kernel: [0.00] Command line: 
BOOT_IMAGE=/boot/vmlinuz-5.19.0-16-generic 
root=UUID=63a35cf8-4d22-4a79-a93d-eb178abc8c07 ro console=ttyS0

ubuntu@bdmurray-test-virtio-rng:~$ grep "Call Trace" /var/log/syslog
Sep 14 23:09:05 bdmurray-test-virtio-rng kernel: [  242.903669] Call Trace:
Sep 14 23:09:05 bdmurray-test-virtio-rng kernel: [  363.735838] Call Trace:
Sep 14 23:09:05 bdmurray-test-virtio-rng kernel: [  484.568986] Call Trace:
Sep 14 23:42:50 bdmurray-test-virtio-rng kernel: [  242.911193] Call Trace:
Sep 14 23:42:50 bdmurray-test-virtio-rng kernel: [  363.736184] Call Trace:
Sep 14 23:42:50 bdmurray-test-virtio-rng kernel: [  484.567867] Call Trace:
Sep 14 23:42:50 bdmurray-test-virtio-rng kernel: [  605.399430] Call Trace:
Sep 14 23:42:50 bdmurray-test-virtio-rng kernel: [  726.231456] Call Trace:
Sep 14 23:42:50 bdmurray-test-virtio-rng kernel: [  847.063944] Call Trace:
Sep 14 23:42:50 bdmurray-test-virtio-rng kernel: [  967.895641] Call Trace:

ubuntu@bdmurray-test-virtio-rng:~$ lsmod | grep rng
virtio_rng 16384  0
ubuntu@bdmurray-test-virtio-rng:~$ uname -a
Linux bdmurray-test-virtio-rng 5.19.0-16-generic #16+arighi SMP PREEMPT_DYNAMIC 
Mon Sep 12 15:18:26 UTC 2022 x86_64 x86_64 x86_64 GNU/Linu
x

So I think this is good to go.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989258

Title:
  multiple kernel oops regarding hung tasks delaying boot

Status in Auto Package Testing:
  New
Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Kinetic amd64 instances in the autopkgtest environment are regularly
  experiencing a slow boot process due to a hung task timeout which
  happens multiple times.  The oops appears below:

  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.485373] INFO: task 
systemd-udevd:140 blocked for more than 1208 seconds.
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.487120]   Not 
tainted 5.19.0-15-generic #15-Ubuntu
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.490936] "echo 0 > 
/proc/sys/kernel/hung_task_timeout_secs" disables this message.
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.492717] 
task:systemd-udevd   state:D stack:0 pid:  140 ppid:   137 flags:0x4006
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.494612] Call Trace:
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.495202]  
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.495727]  
__schedule+0x23b/0x5c0
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.496559]  ? 
sched_clock_cpu+0x12/0xf0
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.497482]  
schedule+0x50/0xc0
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.498237]  
schedule_preempt_disabled+0x15/0x30
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.499306]  
__mutex_lock.constprop.0+0x4e7/0x760
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.500409]  
__mutex_lock_slowpath+0x13/0x20
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.501420]  
mutex_lock+0x36/0x40
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.502211]  
add_early_randomness+0x1b/0xc0
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.503178]  
hwrng_register+0x13e/0x1c0
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.504068]  
virtrng_scan+0x19/0x30 [virtio_rng]
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.505152]  
virtio_dev_probe+0x1f9/0x2c0
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.506096]  
really_probe+0x1d1/0x3a0
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.506958]  
__driver_probe_device+0x11b/0x190
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.507993]  
driver_probe_device+0x24/0xd0
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.508955]  
__driver_attach+0xd8/0x200
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.509859]  ? 
__device_attach_driver+0x120/0x120
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.510952]  
bus_for_each_dev+0x7c/0xc0
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.511846]  
driver_attach+0x1e/0x30
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.512692]  
bus_add_driver+0x178/0x220
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.513597]  
driver_register+0x8f/0xf0
  Sep  9 22:31:32 bdmurray-test-systemd kernel: [ 1330.514474]  ? 
0xc0282000
  Sep  9

[Kernel-packages] [Bug 1989047] Re: ADL: Fix System hang up when run Prime95 with i9-12900K CPU

2022-09-14 Thread koba
update debdiff

** Patch added: "thermald_2.5.0-1.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/thermald/+bug/1989047/+attachment/5615912/+files/thermald_2.5.0-1.debdiff

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to thermald in Ubuntu.
https://bugs.launchpad.net/bugs/1989047

Title:
  ADL: Fix System hang up when run Prime95 with i9-12900K CPU

Status in thermald package in Ubuntu:
  New

Bug description:
  [Impact]
   * System hang up when run Prime95 10~15 minutes
  [Test Plan]
  1. Find a unit with i9-12900k CPU and liquid cooling
  2. Connect to Internet and install below tools
  >sudo apt update
  >sudo apt install stress-ng
  >sudo apt install s-tui
  >sudo systemctl stop thermald
  >sudo thermald --no-daemon --loglevel=debug --adaptive --ignore-cpuid-check > 
thermald_log.txt &
  download prime95 linux version: p95v308b15.linux64.tar.gz and decompress
  4. Stress test: (you may need to open multiple terminals for the test)
  >./mprime #decompressed from p95*.tar.gz
  >sudo stress-ng -a 0 --class cpu,cpu-cache --ignite-cpu -v
  5. monitor cpu temperature for 6 hours if you didn’t hit overheat and 
shutdown issue.
  >sudo s-tui -c

  [Where problems could occur]
   * it install Passive Policy as default and use PL1 max/min from PPCC, there 
may be some edge cases that don't handle well.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/thermald/+bug/1989047/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1986921] Re: lttng-modules/2.13.1-1 ADT test failure with linux/5.15.0-47.51

2022-09-14 Thread Po-Hsu Lin
Verified on B-aws-5.4, DKMS can be installed without any issue and test works 
just fine.
Thanks!

** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1986921

Title:
  lttng-modules/2.13.1-1 ADT test failure with linux/5.15.0-47.51

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Won't Fix
Status in lttng-modules package in Ubuntu:
  Fix Released
Status in linux source package in Bionic:
  Won't Fix
Status in lttng-modules source package in Bionic:
  Fix Committed
Status in linux source package in Focal:
  Won't Fix
Status in lttng-modules source package in Focal:
  Fix Released
Status in linux source package in Jammy:
  Won't Fix
Status in lttng-modules source package in Jammy:
  Fix Released

Bug description:
  SRU Justification:

  Impact: The kernel upstream changed in v5.18 and dropped tracepoints
  for random. This change was backported to 5.15/jammy in upstream
  stable 5.15.44. With that the build of lttng-modules-dkms fails.

  Fix: Backport of an upstream change which checks for the kernel header file 
which got removed in the process. Additionally the DKMS spec file has to do the 
same check to
  be aware of the missing probe module.

  Testcase: Installing lttng-modules-dkms for a kernel < 5.15.0-47 and
  -47 or later. Currently -47 and later will fail. With the change both
  should complete.

  Regression Potential: This changes whether lttng-probe-random.ko is
  available or not (if it is available the code is unchanged). User-
  space might be affected if this module is always expected.

  ---

  This is a scripted bug report about ADT failures while running lttng-
  modules tests for linux/5.15.0-47.51 on jammy. Whether this is caused
  by the dep8 tests of the tested source or the kernel has yet to be
  determined.

  Testing failed on:
  amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy/jammy/amd64/l/lttng-modules/20220817_074711_55044@/log.gz
  arm64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy/jammy/arm64/l/lttng-modules/20220817_075639_1a4d1@/log.gz
  ppc64el: 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy/jammy/ppc64el/l/lttng-modules/20220817_074544_d2849@/log.gz
  s390x: 
https://autopkgtest.ubuntu.com/results/autopkgtest-jammy/jammy/s390x/l/lttng-modules/20220817_075106_d2849@/log.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1986921/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1987711] Re: [i915] Ubuntu display get shifted after some time.

2022-09-14 Thread Daniel van Vugt
If this isn't a hardware fault in the screen itself then it seems like a
bug in the kernel graphics driver for Intel GPUs, which you can find
here:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/drivers/gpu/drm/i915

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1987711

Title:
  [i915] Ubuntu display get shifted after some time.

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  It is continuation of this bug:
  
https://bugs.launchpad.net/ubuntu/+source/xserver-xorg-video-intel/+bug/1986583
  where advised fix was applied. 

  Summay: After ubuntu is turned on, after some time screen gets shifted
  to side. (and starts to overlap)

  I setup webcamera to record screen, and video below shows what it looked 
like. 
  after fix were applied.
  www.ms.mff.cuni.cz/~krasicei/capture-0231.bug.crop.slow.mp4
  (video was cropped, and slowed down 2x)

  before fix was applied shift looked somehow like this:
  www.ms.mff.cuni.cz/~krasicei/bug17-50-18-8-2022.c.mp4
  (video is also cropped, and slowed down 2x)

  During shift no one was present on computer.

  Is there any idea how to enable some more detailed log or something? I 
probably can pinpoint exact moment in time when shift happened. 
  i tried to read log journalctl, but I found nothing interesting.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: xorg 1:7.7+23ubuntu2
  ProcVersionSignature: Ubuntu 5.15.0-46.49-generic 5.15.39
  Uname: Linux 5.15.0-46-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  BootLog:
   
  CasperMD5CheckResult: unknown
  Date: Fri Aug 26 02:31:10 2022
  DistUpgraded: 2022-08-02 14:36:41,704 DEBUG Running PostInstallScript: 
'/usr/lib/ubuntu-advantage/upgrade_lts_contract.py'
  DistroCodename: jammy
  DistroVariant: ubuntu
  ExtraDebuggingInterest: Yes, including running git bisection searches
  GraphicsCard:
   Intel Corporation Skylake GT2 [HD Graphics 520] [8086:1916] (rev 07) 
(prog-if 00 [VGA controller])
 Subsystem: Intel Corporation Skylake GT2 [HD Graphics 520] [8086:2015]
  InstallationDate: Installed on 2022-02-17 (189 days ago)
  InstallationMedia: Ubuntu 20.04.3 LTS "Focal Fossa" - Release amd64 (20210819)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 003: ID 222a:0001 ILI Technology Corp. Multi-Touch Screen
   Bus 001 Device 002: ID 1a2c:2d23 China Resource Semico Co., Ltd Keyboard
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: Default string Default string
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-46-generic 
root=UUID=582fb3cc-8ef6-460b-b9ae-a16f81c604a7 ro quiet splash vt.handoff=7
  SourcePackage: xorg
  UpgradeStatus: Upgraded to jammy on 2022-08-02 (23 days ago)
  dmi.bios.date: 10/07/2021
  dmi.bios.release: 5.12
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: GSKU0504.V54
  dmi.board.asset.tag: Default string
  dmi.board.name: SKYBAY
  dmi.board.vendor: Default string
  dmi.board.version: Default string
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrGSKU0504.V54:bd10/07/2021:br5.12:svnDefaultstring:pnDefaultstring:pvrDefaultstring:rvnDefaultstring:rnSKYBAY:rvrDefaultstring:cvnDefaultstring:ct3:cvrDefaultstring:skuDefaultstring:
  dmi.product.family: Default string
  dmi.product.name: Default string
  dmi.product.sku: Default string
  dmi.product.version: Default string
  dmi.sys.vendor: Default string
  version.compiz: compiz N/A
  version.libdrm2: libdrm2 2.4.110-1ubuntu1
  version.libgl1-mesa-dri: libgl1-mesa-dri 22.0.5-0ubuntu0.1
  version.libgl1-mesa-glx: libgl1-mesa-glx N/A
  version.xserver-xorg-core: xserver-xorg-core 2:21.1.3-2ubuntu2.1
  version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
  version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:19.1.0-2ubuntu1
  version.xserver-xorg-video-intel: xserver-xorg-video-intel N/A
  version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 
1:1.0.17-2build1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1987711/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989647] [NEW] Fix AMDGPU: No video output and system hangs with two monitor (dGPU: W6400)

2022-09-14 Thread koba
Public bug reported:

[Impact]
There's possibility that system will hang and no video output of two external 
monitor with dGPU W6400

Monitor 1: ASUS ProArt PA238Q (FHD)
Monitor 2: Dell P2415Q (4K)

[Fix]
Introduce the dmi quirk in amdgpu,
and add dmi quirks to bypass the affected machine.

[Test Case]
Two ways to verify

Method 1:
1. Cold boot with ASUS
2. Attach Dell monitor. ASUS is primary.
3. Switch display mode to single ASUS
4. Switch disaply mode back to Joing Displays. ASUS is primary

Method 2:
1. Cold boot with two monitors. ASUS is primary
2. Unplug the DP cable of Dell monitor from DUT and wait for few seconds
3. Plug it back to DUT

[Where problems could occur]
Low, add a dmi quirk to bypass the target machine.

** Affects: ubuntu
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989647

Title:
  Fix AMDGPU: No video output and system hangs with two monitor (dGPU:
  W6400)

Status in Ubuntu:
  New
Status in linux package in Ubuntu:
  New

Bug description:
  [Impact]
  There's possibility that system will hang and no video output of two external 
monitor with dGPU W6400

  Monitor 1: ASUS ProArt PA238Q (FHD)
  Monitor 2: Dell P2415Q (4K)

  [Fix]
  Introduce the dmi quirk in amdgpu,
  and add dmi quirks to bypass the affected machine.

  [Test Case]
  Two ways to verify

  Method 1:
  1. Cold boot with ASUS
  2. Attach Dell monitor. ASUS is primary.
  3. Switch display mode to single ASUS
  4. Switch disaply mode back to Joing Displays. ASUS is primary

  Method 2:
  1. Cold boot with two monitors. ASUS is primary
  2. Unplug the DP cable of Dell monitor from DUT and wait for few seconds
  3. Plug it back to DUT

  [Where problems could occur]
  Low, add a dmi quirk to bypass the target machine.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1989647/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989647] Missing required logs.

2022-09-14 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1989647

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989647

Title:
  Fix AMDGPU: No video output and system hangs with two monitor (dGPU:
  W6400)

Status in Ubuntu:
  New
Status in linux package in Ubuntu:
  Incomplete

Bug description:
  [Impact]
  There's possibility that system will hang and no video output of two external 
monitor with dGPU W6400

  Monitor 1: ASUS ProArt PA238Q (FHD)
  Monitor 2: Dell P2415Q (4K)

  [Fix]
  Introduce the dmi quirk in amdgpu,
  and add dmi quirks to bypass the affected machine.

  [Test Case]
  Two ways to verify

  Method 1:
  1. Cold boot with ASUS
  2. Attach Dell monitor. ASUS is primary.
  3. Switch display mode to single ASUS
  4. Switch disaply mode back to Joing Displays. ASUS is primary

  Method 2:
  1. Cold boot with two monitors. ASUS is primary
  2. Unplug the DP cable of Dell monitor from DUT and wait for few seconds
  3. Plug it back to DUT

  [Where problems could occur]
  Low, add a dmi quirk to bypass the target machine.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1989647/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989649] [NEW] [Hyper-V] Login screen does not appear

2022-09-14 Thread Launchpad Bug Tracker
You have been subscribed to a public bug:

Below are the packages were updated. After reboot, the GDM login screen
did not appear.

Start-Date: 2022-09-14  15:57:04
Commandline: packagekit role='update-packages'
Upgrade: python3-distupgrade:amd64 (1:22.04.13, 1:22.04.14), 
gnome-control-center-faces:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), xserver-xorg-video-amdgpu:amd64 (22.0.0-1build1, 
22.0.0-1ubuntu0.1), ubuntu-release-upgrader-gtk:amd64 (1:22.04.13, 1:22.04.14), 
gir1.2-javascriptcoregtk-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), gir1.2-webkit2-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), libjavascriptcoregtk-4.0-18:amd64 
(2.36.6-0ubuntu0.22.04.1, 2.36.7-0ubuntu0.22.04.1), 
gnome-control-center-data:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), gnome-control-center:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), libwebkit2gtk-4.0-37:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), ubuntu-release-upgrader-core:amd64 (1:22.04.13, 
1:22.04.14), intel-microcode:amd64 (3.20220510.0ubuntu0.22.04.1, 
3.20220809.0ubuntu0.22.04.1)
End-Date: 2022-09-14  15:57:25

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: gdm3 42.0-1ubuntu7
ProcVersionSignature: Ubuntu 5.15.0-47.51-generic 5.15.46
Uname: Linux 5.15.0-47-generic x86_64
ApportVersion: 2.20.11-0ubuntu82.1
Architecture: amd64
CasperMD5CheckResult: pass
CurrentDesktop: ubuntu:GNOME
Date: Wed Sep 14 21:49:27 2022
InstallationDate: Installed on 2022-09-13 (1 days ago)
InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809.1)
SourcePackage: gdm3
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug hyperv jammy
-- 
[Hyper-V] Login screen does not appear
https://bugs.launchpad.net/bugs/1989649
You received this bug notification because you are a member of Kernel Packages, 
which is subscribed to linux in Ubuntu.

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989649] Re: GDM doesn't start after package updates

2022-09-14 Thread Daniel van Vugt
Thanks.

The reason you're not getting a login screen is because Xorg cannot
start ("no screens found(EE)").

It looks like that is occurring because the kernel interface has
changed/gone missing. Sounds related to bug 1986713.

** Tags added: hyperv

** Summary changed:

- GDM doesn't start after package updates
+ [Hyper-V] Login screen does not appear

** Package changed: ubuntu => linux (Ubuntu)

** Changed in: linux (Ubuntu)
   Status: Incomplete => New

** Tags added: regression-update

** Changed in: linux (Ubuntu)
   Importance: Undecided => Critical

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989649

Title:
  [Hyper-V] Login screen does not appear

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Below are the packages were updated. After reboot, the GDM login
  screen did not appear.

  Start-Date: 2022-09-14  15:57:04
  Commandline: packagekit role='update-packages'
  Upgrade: python3-distupgrade:amd64 (1:22.04.13, 1:22.04.14), 
gnome-control-center-faces:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), xserver-xorg-video-amdgpu:amd64 (22.0.0-1build1, 
22.0.0-1ubuntu0.1), ubuntu-release-upgrader-gtk:amd64 (1:22.04.13, 1:22.04.14), 
gir1.2-javascriptcoregtk-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), gir1.2-webkit2-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), libjavascriptcoregtk-4.0-18:amd64 
(2.36.6-0ubuntu0.22.04.1, 2.36.7-0ubuntu0.22.04.1), 
gnome-control-center-data:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), gnome-control-center:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), libwebkit2gtk-4.0-37:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), ubuntu-release-upgrader-core:amd64 (1:22.04.13, 
1:22.04.14), intel-microcode:amd64 (3.20220510.0ubuntu0.22.04.1, 
3.20220809.0ubuntu0.22.04.1)
  End-Date: 2022-09-14  15:57:25

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: gdm3 42.0-1ubuntu7
  ProcVersionSignature: Ubuntu 5.15.0-47.51-generic 5.15.46
  Uname: Linux 5.15.0-47-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 14 21:49:27 2022
  InstallationDate: Installed on 2022-09-13 (1 days ago)
  InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809.1)
  SourcePackage: gdm3
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1989649/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1986713] Re: azure: Replace hyperv_fb with hyperv_drm

2022-09-14 Thread Daniel van Vugt
** Tags added: hyperv

** Tags added: jammy kinetic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1986713

Title:
  azure: Replace hyperv_fb with hyperv_drm

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Jammy:
  In Progress
Status in linux source package in Kinetic:
  In Progress

Bug description:
  SRU Justification

  [Impact]

  Microsoft has asked to replace hyperv_fb with hyperv_drm in linux-
  modules-azure.

  [Test Plan]

  Extract linux-modules and ensure hyperv_drm.ko exists and hyperv_fb.ko
  does not.

  [Where things could go wrong]

  According to Microsoft, hyperv_drm is a direct replacement for
  hyperv_fb, yet there could be cases where hyperv_fb is being
  explicitly installed by customized images.

  [Other Info]

  SF: #00342707

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1986713/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989649] Re: [Hyper-V] Login screen does not appear

2022-09-14 Thread Daniel van Vugt
Seems neither hyperv_drm nor hyperv_fb are usable:

  (EE) open /dev/dri/card0: No such file or directory

  (EE) open /dev/fb0: Permission denied

The main issue seems to be that "Permission denied". So maybe the kernel
isn't to blame and it's just that the Xorg process hasn't been given
sufficient privileges for /dev/fb0

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989649

Title:
  [Hyper-V] Login screen does not appear

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Below are the packages were updated. After reboot, the GDM login
  screen did not appear.

  Start-Date: 2022-09-14  15:57:04
  Commandline: packagekit role='update-packages'
  Upgrade: python3-distupgrade:amd64 (1:22.04.13, 1:22.04.14), 
gnome-control-center-faces:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), xserver-xorg-video-amdgpu:amd64 (22.0.0-1build1, 
22.0.0-1ubuntu0.1), ubuntu-release-upgrader-gtk:amd64 (1:22.04.13, 1:22.04.14), 
gir1.2-javascriptcoregtk-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), gir1.2-webkit2-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), libjavascriptcoregtk-4.0-18:amd64 
(2.36.6-0ubuntu0.22.04.1, 2.36.7-0ubuntu0.22.04.1), 
gnome-control-center-data:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), gnome-control-center:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), libwebkit2gtk-4.0-37:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), ubuntu-release-upgrader-core:amd64 (1:22.04.13, 
1:22.04.14), intel-microcode:amd64 (3.20220510.0ubuntu0.22.04.1, 
3.20220809.0ubuntu0.22.04.1)
  End-Date: 2022-09-14  15:57:25

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: gdm3 42.0-1ubuntu7
  ProcVersionSignature: Ubuntu 5.15.0-47.51-generic 5.15.46
  Uname: Linux 5.15.0-47-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 14 21:49:27 2022
  InstallationDate: Installed on 2022-09-13 (1 days ago)
  InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809.1)
  SourcePackage: gdm3
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1989649/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989649] Missing required logs.

2022-09-14 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1989649

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989649

Title:
  [Hyper-V] Login screen does not appear

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Below are the packages were updated. After reboot, the GDM login
  screen did not appear.

  Start-Date: 2022-09-14  15:57:04
  Commandline: packagekit role='update-packages'
  Upgrade: python3-distupgrade:amd64 (1:22.04.13, 1:22.04.14), 
gnome-control-center-faces:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), xserver-xorg-video-amdgpu:amd64 (22.0.0-1build1, 
22.0.0-1ubuntu0.1), ubuntu-release-upgrader-gtk:amd64 (1:22.04.13, 1:22.04.14), 
gir1.2-javascriptcoregtk-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), gir1.2-webkit2-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), libjavascriptcoregtk-4.0-18:amd64 
(2.36.6-0ubuntu0.22.04.1, 2.36.7-0ubuntu0.22.04.1), 
gnome-control-center-data:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), gnome-control-center:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), libwebkit2gtk-4.0-37:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), ubuntu-release-upgrader-core:amd64 (1:22.04.13, 
1:22.04.14), intel-microcode:amd64 (3.20220510.0ubuntu0.22.04.1, 
3.20220809.0ubuntu0.22.04.1)
  End-Date: 2022-09-14  15:57:25

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: gdm3 42.0-1ubuntu7
  ProcVersionSignature: Ubuntu 5.15.0-47.51-generic 5.15.46
  Uname: Linux 5.15.0-47-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 14 21:49:27 2022
  InstallationDate: Installed on 2022-09-13 (1 days ago)
  InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809.1)
  SourcePackage: gdm3
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1989649/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989649] Re: [Hyper-V] Login screen does not appear

2022-09-14 Thread Daniel van Vugt
If the OS was only installed 1 day ago, was it working on the first
boot?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989649

Title:
  [Hyper-V] Login screen does not appear

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Below are the packages were updated. After reboot, the GDM login
  screen did not appear.

  Start-Date: 2022-09-14  15:57:04
  Commandline: packagekit role='update-packages'
  Upgrade: python3-distupgrade:amd64 (1:22.04.13, 1:22.04.14), 
gnome-control-center-faces:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), xserver-xorg-video-amdgpu:amd64 (22.0.0-1build1, 
22.0.0-1ubuntu0.1), ubuntu-release-upgrader-gtk:amd64 (1:22.04.13, 1:22.04.14), 
gir1.2-javascriptcoregtk-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), gir1.2-webkit2-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), libjavascriptcoregtk-4.0-18:amd64 
(2.36.6-0ubuntu0.22.04.1, 2.36.7-0ubuntu0.22.04.1), 
gnome-control-center-data:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), gnome-control-center:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), libwebkit2gtk-4.0-37:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), ubuntu-release-upgrader-core:amd64 (1:22.04.13, 
1:22.04.14), intel-microcode:amd64 (3.20220510.0ubuntu0.22.04.1, 
3.20220809.0ubuntu0.22.04.1)
  End-Date: 2022-09-14  15:57:25

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: gdm3 42.0-1ubuntu7
  ProcVersionSignature: Ubuntu 5.15.0-47.51-generic 5.15.46
  Uname: Linux 5.15.0-47-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 14 21:49:27 2022
  InstallationDate: Installed on 2022-09-13 (1 days ago)
  InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809.1)
  SourcePackage: gdm3
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1989649/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989649] Re: [Hyper-V] Login screen does not appear

2022-09-14 Thread Noorez
It was working just fine on first boot. The login screen appeared as it
should have.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989649

Title:
  [Hyper-V] Login screen does not appear

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Below are the packages were updated. After reboot, the GDM login
  screen did not appear.

  Start-Date: 2022-09-14  15:57:04
  Commandline: packagekit role='update-packages'
  Upgrade: python3-distupgrade:amd64 (1:22.04.13, 1:22.04.14), 
gnome-control-center-faces:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), xserver-xorg-video-amdgpu:amd64 (22.0.0-1build1, 
22.0.0-1ubuntu0.1), ubuntu-release-upgrader-gtk:amd64 (1:22.04.13, 1:22.04.14), 
gir1.2-javascriptcoregtk-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), gir1.2-webkit2-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), libjavascriptcoregtk-4.0-18:amd64 
(2.36.6-0ubuntu0.22.04.1, 2.36.7-0ubuntu0.22.04.1), 
gnome-control-center-data:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), gnome-control-center:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), libwebkit2gtk-4.0-37:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), ubuntu-release-upgrader-core:amd64 (1:22.04.13, 
1:22.04.14), intel-microcode:amd64 (3.20220510.0ubuntu0.22.04.1, 
3.20220809.0ubuntu0.22.04.1)
  End-Date: 2022-09-14  15:57:25

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: gdm3 42.0-1ubuntu7
  ProcVersionSignature: Ubuntu 5.15.0-47.51-generic 5.15.46
  Uname: Linux 5.15.0-47-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 14 21:49:27 2022
  InstallationDate: Installed on 2022-09-13 (1 days ago)
  InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809.1)
  SourcePackage: gdm3
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1989649/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989649] Re: [Hyper-V] Login screen does not appear

2022-09-14 Thread Daniel van Vugt
Have you tried rebooting a few more times?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989649

Title:
  [Hyper-V] Login screen does not appear

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Below are the packages were updated. After reboot, the GDM login
  screen did not appear.

  Start-Date: 2022-09-14  15:57:04
  Commandline: packagekit role='update-packages'
  Upgrade: python3-distupgrade:amd64 (1:22.04.13, 1:22.04.14), 
gnome-control-center-faces:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), xserver-xorg-video-amdgpu:amd64 (22.0.0-1build1, 
22.0.0-1ubuntu0.1), ubuntu-release-upgrader-gtk:amd64 (1:22.04.13, 1:22.04.14), 
gir1.2-javascriptcoregtk-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), gir1.2-webkit2-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), libjavascriptcoregtk-4.0-18:amd64 
(2.36.6-0ubuntu0.22.04.1, 2.36.7-0ubuntu0.22.04.1), 
gnome-control-center-data:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), gnome-control-center:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), libwebkit2gtk-4.0-37:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), ubuntu-release-upgrader-core:amd64 (1:22.04.13, 
1:22.04.14), intel-microcode:amd64 (3.20220510.0ubuntu0.22.04.1, 
3.20220809.0ubuntu0.22.04.1)
  End-Date: 2022-09-14  15:57:25

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: gdm3 42.0-1ubuntu7
  ProcVersionSignature: Ubuntu 5.15.0-47.51-generic 5.15.46
  Uname: Linux 5.15.0-47-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 14 21:49:27 2022
  InstallationDate: Installed on 2022-09-13 (1 days ago)
  InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809.1)
  SourcePackage: gdm3
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1989649/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989649] Re: [Hyper-V] Login screen does not appear

2022-09-14 Thread Noorez
Taking a look at the linked bug (I forgot to mention that plymouth
failed to start as well):

I blacklisted hyperv_fb and explicitly load hyperv_drm in /etc/modules

I also added hyperv_drm into /etc/initramfs-tools/modules.

This fixed both plymouth and the login screen came back as well.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989649

Title:
  [Hyper-V] Login screen does not appear

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Below are the packages were updated. After reboot, the GDM login
  screen did not appear.

  Start-Date: 2022-09-14  15:57:04
  Commandline: packagekit role='update-packages'
  Upgrade: python3-distupgrade:amd64 (1:22.04.13, 1:22.04.14), 
gnome-control-center-faces:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), xserver-xorg-video-amdgpu:amd64 (22.0.0-1build1, 
22.0.0-1ubuntu0.1), ubuntu-release-upgrader-gtk:amd64 (1:22.04.13, 1:22.04.14), 
gir1.2-javascriptcoregtk-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), gir1.2-webkit2-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), libjavascriptcoregtk-4.0-18:amd64 
(2.36.6-0ubuntu0.22.04.1, 2.36.7-0ubuntu0.22.04.1), 
gnome-control-center-data:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), gnome-control-center:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), libwebkit2gtk-4.0-37:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), ubuntu-release-upgrader-core:amd64 (1:22.04.13, 
1:22.04.14), intel-microcode:amd64 (3.20220510.0ubuntu0.22.04.1, 
3.20220809.0ubuntu0.22.04.1)
  End-Date: 2022-09-14  15:57:25

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: gdm3 42.0-1ubuntu7
  ProcVersionSignature: Ubuntu 5.15.0-47.51-generic 5.15.46
  Uname: Linux 5.15.0-47-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 14 21:49:27 2022
  InstallationDate: Installed on 2022-09-13 (1 days ago)
  InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809.1)
  SourcePackage: gdm3
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1989649/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989649] Re: [Hyper-V] Login screen does not appear

2022-09-14 Thread Noorez
I had tried quite a few reboots but the problem didn't (appear to) go
away until I did above. I'm not familiar with the hyper-v modules so I
can't say what I tried will continue to work (or if it was just a
fluke...)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989649

Title:
  [Hyper-V] Login screen does not appear

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Below are the packages were updated. After reboot, the GDM login
  screen did not appear.

  Start-Date: 2022-09-14  15:57:04
  Commandline: packagekit role='update-packages'
  Upgrade: python3-distupgrade:amd64 (1:22.04.13, 1:22.04.14), 
gnome-control-center-faces:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), xserver-xorg-video-amdgpu:amd64 (22.0.0-1build1, 
22.0.0-1ubuntu0.1), ubuntu-release-upgrader-gtk:amd64 (1:22.04.13, 1:22.04.14), 
gir1.2-javascriptcoregtk-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), gir1.2-webkit2-4.0:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), libjavascriptcoregtk-4.0-18:amd64 
(2.36.6-0ubuntu0.22.04.1, 2.36.7-0ubuntu0.22.04.1), 
gnome-control-center-data:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), gnome-control-center:amd64 (1:41.7-0ubuntu0.22.04.1, 
1:41.7-0ubuntu0.22.04.5), libwebkit2gtk-4.0-37:amd64 (2.36.6-0ubuntu0.22.04.1, 
2.36.7-0ubuntu0.22.04.1), ubuntu-release-upgrader-core:amd64 (1:22.04.13, 
1:22.04.14), intel-microcode:amd64 (3.20220510.0ubuntu0.22.04.1, 
3.20220809.0ubuntu0.22.04.1)
  End-Date: 2022-09-14  15:57:25

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: gdm3 42.0-1ubuntu7
  ProcVersionSignature: Ubuntu 5.15.0-47.51-generic 5.15.46
  Uname: Linux 5.15.0-47-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Sep 14 21:49:27 2022
  InstallationDate: Installed on 2022-09-13 (1 days ago)
  InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809.1)
  SourcePackage: gdm3
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1989649/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989647] Re: Fix AMDGPU: No video output and system hangs with two monitor (dGPU: W6400)

2022-09-14 Thread koba
** No longer affects: ubuntu

** Also affects: linux (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: linux-oem-5.17 (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989647

Title:
  Fix AMDGPU: No video output and system hangs with two monitor (dGPU:
  W6400)

Status in linux package in Ubuntu:
  Incomplete
Status in linux-oem-5.17 package in Ubuntu:
  New
Status in linux source package in Jammy:
  New
Status in linux-oem-5.17 source package in Jammy:
  New

Bug description:
  [Impact]
  There's possibility that system will hang and no video output of two external 
monitor with dGPU W6400

  Monitor 1: ASUS ProArt PA238Q (FHD)
  Monitor 2: Dell P2415Q (4K)

  [Fix]
  Introduce the dmi quirk in amdgpu,
  and add dmi quirks to bypass the affected machine.

  [Test Case]
  Two ways to verify

  Method 1:
  1. Cold boot with ASUS
  2. Attach Dell monitor. ASUS is primary.
  3. Switch display mode to single ASUS
  4. Switch disaply mode back to Joing Displays. ASUS is primary

  Method 2:
  1. Cold boot with two monitors. ASUS is primary
  2. Unplug the DP cable of Dell monitor from DUT and wait for few seconds
  3. Plug it back to DUT

  [Where problems could occur]
  Low, add a dmi quirk to bypass the target machine.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1989647/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp