[Kernel-packages] [Bug 1987618] Re: [jammy mlx5] Slow outbound N/S TCP connections for instances on gateways

2022-11-10 Thread Frode Nordahl
The patch highlighted in #5 does not fix this issue for me without other
patches from the refactor, so it may be we need to wait for the 5.19 hwe
kernel to arrive to fix this issue.

** Changed in: linux (Ubuntu)
   Status: Expired => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1987618

Title:
  [jammy mlx5] Slow outbound N/S TCP connections for instances on
  gateways

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Charmed OpenStack on Jammy.

  Hardware offloaded instances that reside on the hypervisor which is
  also the active OVN gateway for their network have degraded
  connectivity.

  $ time wget --debug -O /dev/null http://nova.clouds.archive.ubuntu.com/ubuntu/
  Setting --output-document (outputdocument) to /dev/null
  DEBUG output created by Wget 1.21.2 on linux-gnu.

  Reading HSTS entries from /home/ubuntu/.wget-hsts
  URI encoding = ‘UTF-8’
  --2022-08-25 07:16:54--  http://nova.clouds.archive.ubuntu.com/ubuntu/
  Resolving nova.clouds.archive.ubuntu.com (nova.clouds.archive.ubuntu.com)... 
91.189.91.121, 185.125.190.38, 185.125.190.41, ...
  Caching nova.clouds.archive.ubuntu.com => 91.189.91.121 185.125.190.38 
185.125.190.41 91.189.91.122 2001:67c:1562::29 2620:2d:4000:1::1b 
2620:2d:4000:1::18 2001:67c:1562::26
  Connecting to nova.clouds.archive.ubuntu.com 
(nova.clouds.archive.ubuntu.com)|91.189.91.121|:80... connected.
  Created socket 4.
  Releasing 0x55ef05654490 (new refcount 1).

  ---request begin---
  GET /ubuntu/ HTTP/1.1
  Host: nova.clouds.archive.ubuntu.com
  User-Agent: Wget/1.21.2
  Accept: */*
  Accept-Encoding: identity
  Connection: Keep-Alive

  ---request end---
  HTTP request sent, awaiting response... 
  ---response begin---
  HTTP/1.1 200 OK
  Date: Thu, 25 Aug 2022 07:16:54 GMT
  Server: Apache/2.4.29 (Ubuntu)
  Vary: Accept-Encoding
  Content-Length: 1779
  Keep-Alive: timeout=5, max=100
  Connection: Keep-Alive
  Content-Type: text/html;charset=UTF-8

  ---response end---
  200 OK
  Registered socket 4 for persistent reuse.
  URI content encoding = ‘UTF-8’
  Length: 1779 (1.7K) [text/html]
  Saving to: ‘/dev/null’

  /dev/null
  
100%[>]
  1.74K  --.-KB/sin 0.07s

  2022-08-25 07:16:59 (24.3 KB/s) - ‘/dev/null’ saved [1779/1779]

  
  real  0m5.591s
  user  0m0.000s
  sys   0m0.005s

  $ sudo tcpdump -nevi ens3 not port 22
  07:16:54.017265 fa:16:3e:6d:94:75 > fa:16:3e:47:3a:ad, ethertype IPv4 
(0x0800), length 74: (tos 0x0, ttl 64, id 50207, offset 0, flags [DF], proto 
TCP (6), length 60)
  10.42.1.8.43060 > 91.189.91.121.80: Flags [S], cksum 0xc296 (incorrect -> 
0x4190), seq 2905559525, win 62314, options [mss 8902,sackOK,TS val 4081686695 
ecr 0,nop,wscale 7], length 0
  07:16:54.091378 fa:16:3e:47:3a:ad > fa:16:3e:6d:94:75, ethertype IPv4 
(0x0800), length 74: (tos 0x0, ttl 58, id 0, offset 0, flags [DF], proto TCP 
(6), length 60)
  91.189.91.121.80 > 10.42.1.8.43060: Flags [S.], cksum 0x809d (correct), 
seq 3404088064, ack 2905559526, win 65160, options [mss 1460,sackOK,TS val 
932285789 ecr 4081686695,nop,wscale 7], length 0
  07:16:54.091402 fa:16:3e:6d:94:75 > fa:16:3e:47:3a:ad, ethertype IPv4 
(0x0800), length 66: (tos 0x0, ttl 64, id 50208, offset 0, flags [DF], proto 
TCP (6), length 52)
  10.42.1.8.43060 > 91.189.91.121.80: Flags [.], cksum 0xc28e (incorrect -> 
0xabc0), ack 1, win 487, options [nop,nop,TS val 4081686770 ecr 932285789], 
length 0
  07:16:54.091512 fa:16:3e:6d:94:75 > fa:16:3e:47:3a:ad, ethertype IPv4 
(0x0800), length 218: (tos 0x0, ttl 64, id 50209, offset 0, flags [DF], proto 
TCP (6), length 204)
  10.42.1.8.43060 > 91.189.91.121.80: Flags [P.], cksum 0xc326 (incorrect 
-> 0x7d0c), seq 1:153, ack 1, win 487, options [nop,nop,TS val 4081686770 ecr 
932285789], length 152: HTTP, length: 152
GET /ubuntu/ HTTP/1.1
Host: nova.clouds.archive.ubuntu.com
User-Agent: Wget/1.21.2
Accept: */*
Accept-Encoding: identity
Connection: Keep-Alive

  07:16:54.166170 fa:16:3e:47:3a:ad > fa:16:3e:6d:94:75, ethertype IPv4 
(0x0800), length 66: (tos 0x0, ttl 58, id 15660, offset 0, flags [DF], proto 
TCP (6), length 52)
  91.189.91.121.80 > 10.42.1.8.43060: Flags [.], cksum 0xaac7 (correct), 
ack 153, win 508, options [nop,nop,TS val 932285865 ecr 4081686770], length 0
  07:16:59.171924 fa:16:3e:47:3a:ad > fa:16:3e:6d:94:75, ethertype IPv4 
(0x0800), length 66: (tos 0x0, ttl 58, id 15669, offset 0, flags [DF], proto 
TCP (6), length 52)
  91.189.91.121.80 > 10.42.1.8.43060: Flags [F.], cksum 0x8f61 (correct), 
seq 2008, ack 153, win 508, options [nop,nop,TS val 932290871 ecr 4081686770], 
length 0
  07:16:59.171956 fa:16:3e:6d:94:75 > fa:16:3e:47:3a:ad, ethertype IPv4 
(0x0800), length 78

[Kernel-packages] [Bug 1987618] Re: [jammy mlx5] Slow outbound N/S TCP connections for instances on gateways

2022-11-10 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1987618

Title:
  [jammy mlx5] Slow outbound N/S TCP connections for instances on
  gateways

Status in linux package in Ubuntu:
  Expired

Bug description:
  Charmed OpenStack on Jammy.

  Hardware offloaded instances that reside on the hypervisor which is
  also the active OVN gateway for their network have degraded
  connectivity.

  $ time wget --debug -O /dev/null http://nova.clouds.archive.ubuntu.com/ubuntu/
  Setting --output-document (outputdocument) to /dev/null
  DEBUG output created by Wget 1.21.2 on linux-gnu.

  Reading HSTS entries from /home/ubuntu/.wget-hsts
  URI encoding = ‘UTF-8’
  --2022-08-25 07:16:54--  http://nova.clouds.archive.ubuntu.com/ubuntu/
  Resolving nova.clouds.archive.ubuntu.com (nova.clouds.archive.ubuntu.com)... 
91.189.91.121, 185.125.190.38, 185.125.190.41, ...
  Caching nova.clouds.archive.ubuntu.com => 91.189.91.121 185.125.190.38 
185.125.190.41 91.189.91.122 2001:67c:1562::29 2620:2d:4000:1::1b 
2620:2d:4000:1::18 2001:67c:1562::26
  Connecting to nova.clouds.archive.ubuntu.com 
(nova.clouds.archive.ubuntu.com)|91.189.91.121|:80... connected.
  Created socket 4.
  Releasing 0x55ef05654490 (new refcount 1).

  ---request begin---
  GET /ubuntu/ HTTP/1.1
  Host: nova.clouds.archive.ubuntu.com
  User-Agent: Wget/1.21.2
  Accept: */*
  Accept-Encoding: identity
  Connection: Keep-Alive

  ---request end---
  HTTP request sent, awaiting response... 
  ---response begin---
  HTTP/1.1 200 OK
  Date: Thu, 25 Aug 2022 07:16:54 GMT
  Server: Apache/2.4.29 (Ubuntu)
  Vary: Accept-Encoding
  Content-Length: 1779
  Keep-Alive: timeout=5, max=100
  Connection: Keep-Alive
  Content-Type: text/html;charset=UTF-8

  ---response end---
  200 OK
  Registered socket 4 for persistent reuse.
  URI content encoding = ‘UTF-8’
  Length: 1779 (1.7K) [text/html]
  Saving to: ‘/dev/null’

  /dev/null
  
100%[>]
  1.74K  --.-KB/sin 0.07s

  2022-08-25 07:16:59 (24.3 KB/s) - ‘/dev/null’ saved [1779/1779]

  
  real  0m5.591s
  user  0m0.000s
  sys   0m0.005s

  $ sudo tcpdump -nevi ens3 not port 22
  07:16:54.017265 fa:16:3e:6d:94:75 > fa:16:3e:47:3a:ad, ethertype IPv4 
(0x0800), length 74: (tos 0x0, ttl 64, id 50207, offset 0, flags [DF], proto 
TCP (6), length 60)
  10.42.1.8.43060 > 91.189.91.121.80: Flags [S], cksum 0xc296 (incorrect -> 
0x4190), seq 2905559525, win 62314, options [mss 8902,sackOK,TS val 4081686695 
ecr 0,nop,wscale 7], length 0
  07:16:54.091378 fa:16:3e:47:3a:ad > fa:16:3e:6d:94:75, ethertype IPv4 
(0x0800), length 74: (tos 0x0, ttl 58, id 0, offset 0, flags [DF], proto TCP 
(6), length 60)
  91.189.91.121.80 > 10.42.1.8.43060: Flags [S.], cksum 0x809d (correct), 
seq 3404088064, ack 2905559526, win 65160, options [mss 1460,sackOK,TS val 
932285789 ecr 4081686695,nop,wscale 7], length 0
  07:16:54.091402 fa:16:3e:6d:94:75 > fa:16:3e:47:3a:ad, ethertype IPv4 
(0x0800), length 66: (tos 0x0, ttl 64, id 50208, offset 0, flags [DF], proto 
TCP (6), length 52)
  10.42.1.8.43060 > 91.189.91.121.80: Flags [.], cksum 0xc28e (incorrect -> 
0xabc0), ack 1, win 487, options [nop,nop,TS val 4081686770 ecr 932285789], 
length 0
  07:16:54.091512 fa:16:3e:6d:94:75 > fa:16:3e:47:3a:ad, ethertype IPv4 
(0x0800), length 218: (tos 0x0, ttl 64, id 50209, offset 0, flags [DF], proto 
TCP (6), length 204)
  10.42.1.8.43060 > 91.189.91.121.80: Flags [P.], cksum 0xc326 (incorrect 
-> 0x7d0c), seq 1:153, ack 1, win 487, options [nop,nop,TS val 4081686770 ecr 
932285789], length 152: HTTP, length: 152
GET /ubuntu/ HTTP/1.1
Host: nova.clouds.archive.ubuntu.com
User-Agent: Wget/1.21.2
Accept: */*
Accept-Encoding: identity
Connection: Keep-Alive

  07:16:54.166170 fa:16:3e:47:3a:ad > fa:16:3e:6d:94:75, ethertype IPv4 
(0x0800), length 66: (tos 0x0, ttl 58, id 15660, offset 0, flags [DF], proto 
TCP (6), length 52)
  91.189.91.121.80 > 10.42.1.8.43060: Flags [.], cksum 0xaac7 (correct), 
ack 153, win 508, options [nop,nop,TS val 932285865 ecr 4081686770], length 0
  07:16:59.171924 fa:16:3e:47:3a:ad > fa:16:3e:6d:94:75, ethertype IPv4 
(0x0800), length 66: (tos 0x0, ttl 58, id 15669, offset 0, flags [DF], proto 
TCP (6), length 52)
  91.189.91.121.80 > 10.42.1.8.43060: Flags [F.], cksum 0x8f61 (correct), 
seq 2008, ack 153, win 508, options [nop,nop,TS val 932290871 ecr 4081686770], 
length 0
  07:16:59.171956 fa:16:3e:6d:94:75 > fa:16:3e:47:3a:ad, ethertype IPv4 
(0x0800), length 78: (tos 0x0, ttl 64, id 50210, offset 0, flags [DF], proto 
TCP (6), length 64)
  10.42.1.8.43060 > 91.18

[Kernel-packages] [Bug 1996250] [NEW] OEM machine can't install newer version of Nvidia-driver by ubuntu-drivers install

2022-11-10 Thread Kevin Yeh
Public bug reported:

During the SRU testing, I found a dependency issue when running "ubuntu-drivers 
install".
Although OEM image has preloaded nvidia driver already, but when user want to 
install newer version of nvidia driver will hit this issue.

Using 202002-27718 as an example, after installing oem image, I ran
"ubuntu-drivers install" then I saw following message.

This not only happens on 202002-27718, I checked few oem machines, all
have this issue.

ubuntu-drivers autoinstall
WARNING:root:_pkg_get_support nvidia-driver-515-server: package has invalid 
Support PBheader, cannot determine support level
WARNING:root:_pkg_get_support nvidia-driver-515: package has invalid Support 
PBheader, cannot determine support level
WARNING:root:_pkg_get_support nvidia-driver-510: package has invalid Support 
PBheader, cannot determine support level
WARNING:root:_pkg_get_support nvidia-driver-510-server: package has invalid 
Support PBheader, cannot determine support level

Reading package lists... 0%

Reading package lists... 100%

Reading package lists... Done


Building dependency tree... 0%

Building dependency tree... 0%

Building dependency tree... 50%

Building dependency tree... 50%

Building dependency tree


Reading state information... 0%

Reading state information... 0%

Reading state information... Done

Some packages could not be installed. This may mean that you have
requested an impossible situation or if you are using the unstable
distribution that some required packages have not yet been created
or been moved out of Incoming.
The following information may help to resolve the situation:

The following packages have unmet dependencies:
 nvidia-driver-520 : Depends: libnvidia-gl-520 (= 520.56.06-0ubuntu0.20.04.1) 
but it is not going to be installed
 Depends: libnvidia-compute-520 (= 
520.56.06-0ubuntu0.20.04.1) but it is not going to be installed
 Depends: libnvidia-extra-520 (= 
520.56.06-0ubuntu0.20.04.1) but it is not going to be installed
 Depends: nvidia-compute-utils-520 (= 
520.56.06-0ubuntu0.20.04.1) but it is not going to be installed
 Depends: libnvidia-decode-520 (= 
520.56.06-0ubuntu0.20.04.1) but it is not going to be installed
 Depends: libnvidia-encode-520 (= 
520.56.06-0ubuntu0.20.04.1) but it is not going to be installed
 Depends: nvidia-utils-520 (= 520.56.06-0ubuntu0.20.04.1) 
but it is not going to be installed
 Depends: xserver-xorg-video-nvidia-520 (= 
520.56.06-0ubuntu0.20.04.1) but it is not going to be installed
 Depends: libnvidia-cfg1-520 (= 520.56.06-0ubuntu0.20.04.1) 
but it is not going to be installed
 Depends: libnvidia-fbc1-520 (= 520.56.06-0ubuntu0.20.04.1) 
but it is not going to be installed
 Recommends: libnvidia-compute-520:i386 (= 
520.56.06-0ubuntu0.20.04.1)
 Recommends: libnvidia-decode-520:i386 (= 
520.56.06-0ubuntu0.20.04.1)
 Recommends: libnvidia-encode-520:i386 (= 
520.56.06-0ubuntu0.20.04.1)
 Recommends: libnvidia-fbc1-520:i386 (= 
520.56.06-0ubuntu0.20.04.1)
 Recommends: libnvidia-gl-520:i386 (= 
520.56.06-0ubuntu0.20.04.1)
E: Unable to correct problems, you have held broken packages.

** Affects: ubuntu-drivers-common (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: cert-sru oem-priority

** Also affects: ubuntu-drivers-common (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux (Ubuntu)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996250

Title:
  OEM machine can't install newer version of Nvidia-driver by ubuntu-
  drivers install

Status in ubuntu-drivers-common package in Ubuntu:
  New

Bug description:
  During the SRU testing, I found a dependency issue when running 
"ubuntu-drivers install".
  Although OEM image has preloaded nvidia driver already, but when user want to 
install newer version of nvidia driver will hit this issue.

  Using 202002-27718 as an example, after installing oem image, I ran
  "ubuntu-drivers install" then I saw following message.

  This not only happens on 202002-27718, I checked few oem machines, all
  have this issue.

  ubuntu-drivers autoinstall
  WARNING:root:_pkg_get_support nvidia-driver-515-server: package has invalid 
Support PBheader, cannot determine support level
  WARNING:root:_pkg_get_support nvidia-driver-515: package has invalid Support 
PBheader, cannot determine support level
  WARNING:root:_pkg_get_support nvidia-driver-510: package has invalid Support 
PBheader, cannot determine support level
  WARNING:root:_pkg_get_support nvidia-driver-510-server: package has invalid 
Support PBheader, cannot determine support level

  Reading package lists... 0%

  Reading pac

[Kernel-packages] [Bug 1995894] Missing required logs.

2022-11-10 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1995894

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1995894

Title:
  no HDMI sound output in 22.10 (works in 22.04.1 and kernel-6.1rc3)

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  There is no sound output via HDMI on 22.10.
  It worked in 22.04.1 and it works in 22.10 when I installed kernel 6.1rc3.
  I think it has to do with the snd_hda_intel driver not attaching to Device-1: 
AMD Kabini HDMI/DP.

  Doesn't work on 22.10:
  # inxi -SMA
  System:
Host: lubuntu Kernel: 5.19.0-21-generic arch: x86_64 bits: 64
  Desktop: LXQt v: 1.1.0 Distro: Ubuntu 22.10 (Kinetic Kudu)
  Machine:
Type: Desktop Mobo: Acer model: Aspire TC-281
  serial: DBE0E110018010680230A1 UEFI: American Megatrends v: R01-A2
  date: 07/18/2017
  Audio:
Device-1: AMD Kabini HDMI/DP Audio driver: N/A
Device-2: AMD Family 15h Audio driver: snd_hda_intel
Sound Server-1: ALSA v: k5.19.0-21-generic running: yes
Sound Server-2: PulseAudio v: 16.1 running: yes

  
  Works on 22.04.1:
  # inxi -SMA
  System:
Host: lubuntu Kernel: 5.15.0-43-generic x86_64 bits: 64
  Desktop: LXQt 0.17.1 Distro: Ubuntu 22.04.1 LTS (Jammy Jellyfish)
  Machine:
Type: Desktop Mobo: Acer model: Aspire TC-281
  serial: DBE0E110018010680230A1 UEFI: American Megatrends v: R01-A2
  date: 07/18/2017
  Audio:
Device-1: AMD Kabini HDMI/DP Audio driver: snd_hda_intel
Device-2: AMD Family 15h Audio driver: snd_hda_intel
Sound Server-1: ALSA v: k5.15.0-43-generic running: yes
Sound Server-2: PulseAudio v: 15.99.1 running: yes
Sound Server-3: PipeWire v: 0.3.48 running: yes

  
  Works on 22.10 with kernel-6.1rc3:
  # inxi -SMA
  System:
Host: me-aspiretc281 Kernel: 6.1.0-060100rc3-generic arch: x86_64
  bits: 64 Desktop: LXQt v: 1.1.0 Distro: Ubuntu 22.10 (Kinetic Kudu)
  Machine:
Type: Desktop Mobo: Acer model: Aspire TC-281
  serial: DBE0E110018010680230A1 UEFI: American Megatrends v: R01-A2
  date: 07/18/2017
  Audio:
Device-1: AMD Kabini HDMI/DP Audio driver: snd_hda_intel
Device-2: AMD Family 15h Audio driver: snd_hda_intel
Sound Server-1: ALSA v: k6.1.0-060100rc3-generic running: yes
Sound Server-2: PulseAudio v: 16.1 running: yes
Sound Server-3: PipeWire v: 0.3.58 running: yes


  ubuntu-bug thinks pulse-audio crashed but I don't know if that is
  correct.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1995894/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1992468] Re: segfault in ld-linux-x86-64.so

2022-11-10 Thread Michael Hudson-Doyle
The change to omit DT_HASH was only in 2.36 and so was only present in
kinetic/22.10, and then only briefly as we patched it before release. I
doubt it's that.

Have you reported this upstream at https://sourceware.org/bugzilla/ ?
Have you tried building glibc 2.35 from source? (would be interesting to
know if this is the fault of Ubuntu patches, although that seems
unlikely tbh).

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1992468

Title:
  segfault in ld-linux-x86-64.so

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My manually built elf x64 file has started crashing on load, within the last 
month or so.
  It worked fine on Ubuntu 20.04.x, but fails on 22.04 - same problem on Mint 
19.3 and Fedora 36.

  dmesg ... gives this:

  [ 107.121214] p[4370]: segfault at 0 ip 7f3d725b8350 sp 7ffea111fba0 
error 4 in ld-linux-x86-64.so.2[7f3d72598000+2a000]
  [ 107.121230] Code: ff ff 00 45 31 db 48 8d 15 c9 ac 00 00 4c 8d 05 46 8f 01 
00 4c 8d 2d 1f 8f 01 00 49 89 c2 48 8d 58 ff 48 89 f8 49 f7 da 66 90 <8b> 08 83 
f9 07 77 19 85 c9 74 45 83 f9 07 77 40 48 63 0c 8a 48 01

  You can download the offending file (a single plain 4MB ELF x64) from
  http://phix.x10.mx/p64

  It almost certainly contains older/rarer forms of relocations and suchlike, 
but 
  only about ten or so and meant to be as simple as possible.

  If I need to change the binary content of that file, I can, but might
  need a wee bit of help.

  Of course, if/once it gets through ld-linux-x86-64.so and complains
  about something else, ignore it, or should you be at all intrigued you
  can visit http://phix.x10.mx/download.php to get the full package.

  References, just in case you need them, or to ask a wider set than just me 
for more details direct:
  https://openeuphoria.org/forum/136972.wc?last_id=136973
  https://github.com/petelomax/Phix/issues/13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1992468/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1995894] Re: no HDMI sound output in 22.10 (works in 22.04.1 and kernel-6.1rc3)

2022-11-10 Thread Bjlockie
** Package changed: ubuntu => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1995894

Title:
  no HDMI sound output in 22.10 (works in 22.04.1 and kernel-6.1rc3)

Status in linux package in Ubuntu:
  New

Bug description:
  There is no sound output via HDMI on 22.10.
  It worked in 22.04.1 and it works in 22.10 when I installed kernel 6.1rc3.
  I think it has to do with the snd_hda_intel driver not attaching to Device-1: 
AMD Kabini HDMI/DP.

  Doesn't work on 22.10:
  # inxi -SMA
  System:
Host: lubuntu Kernel: 5.19.0-21-generic arch: x86_64 bits: 64
  Desktop: LXQt v: 1.1.0 Distro: Ubuntu 22.10 (Kinetic Kudu)
  Machine:
Type: Desktop Mobo: Acer model: Aspire TC-281
  serial: DBE0E110018010680230A1 UEFI: American Megatrends v: R01-A2
  date: 07/18/2017
  Audio:
Device-1: AMD Kabini HDMI/DP Audio driver: N/A
Device-2: AMD Family 15h Audio driver: snd_hda_intel
Sound Server-1: ALSA v: k5.19.0-21-generic running: yes
Sound Server-2: PulseAudio v: 16.1 running: yes

  
  Works on 22.04.1:
  # inxi -SMA
  System:
Host: lubuntu Kernel: 5.15.0-43-generic x86_64 bits: 64
  Desktop: LXQt 0.17.1 Distro: Ubuntu 22.04.1 LTS (Jammy Jellyfish)
  Machine:
Type: Desktop Mobo: Acer model: Aspire TC-281
  serial: DBE0E110018010680230A1 UEFI: American Megatrends v: R01-A2
  date: 07/18/2017
  Audio:
Device-1: AMD Kabini HDMI/DP Audio driver: snd_hda_intel
Device-2: AMD Family 15h Audio driver: snd_hda_intel
Sound Server-1: ALSA v: k5.15.0-43-generic running: yes
Sound Server-2: PulseAudio v: 15.99.1 running: yes
Sound Server-3: PipeWire v: 0.3.48 running: yes

  
  Works on 22.10 with kernel-6.1rc3:
  # inxi -SMA
  System:
Host: me-aspiretc281 Kernel: 6.1.0-060100rc3-generic arch: x86_64
  bits: 64 Desktop: LXQt v: 1.1.0 Distro: Ubuntu 22.10 (Kinetic Kudu)
  Machine:
Type: Desktop Mobo: Acer model: Aspire TC-281
  serial: DBE0E110018010680230A1 UEFI: American Megatrends v: R01-A2
  date: 07/18/2017
  Audio:
Device-1: AMD Kabini HDMI/DP Audio driver: snd_hda_intel
Device-2: AMD Family 15h Audio driver: snd_hda_intel
Sound Server-1: ALSA v: k6.1.0-060100rc3-generic running: yes
Sound Server-2: PulseAudio v: 16.1 running: yes
Sound Server-3: PipeWire v: 0.3.58 running: yes


  ubuntu-bug thinks pulse-audio crashed but I don't know if that is
  correct.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1995894/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1995894] [NEW] no HDMI sound output in 22.10 (works in 22.04.1 and kernel-6.1rc3)

2022-11-10 Thread Launchpad Bug Tracker
You have been subscribed to a public bug:

There is no sound output via HDMI on 22.10.
It worked in 22.04.1 and it works in 22.10 when I installed kernel 6.1rc3.
I think it has to do with the snd_hda_intel driver not attaching to Device-1: 
AMD Kabini HDMI/DP.

Doesn't work on 22.10:
# inxi -SMA
System:
  Host: lubuntu Kernel: 5.19.0-21-generic arch: x86_64 bits: 64
Desktop: LXQt v: 1.1.0 Distro: Ubuntu 22.10 (Kinetic Kudu)
Machine:
  Type: Desktop Mobo: Acer model: Aspire TC-281
serial: DBE0E110018010680230A1 UEFI: American Megatrends v: R01-A2
date: 07/18/2017
Audio:
  Device-1: AMD Kabini HDMI/DP Audio driver: N/A
  Device-2: AMD Family 15h Audio driver: snd_hda_intel
  Sound Server-1: ALSA v: k5.19.0-21-generic running: yes
  Sound Server-2: PulseAudio v: 16.1 running: yes


Works on 22.04.1:
# inxi -SMA
System:
  Host: lubuntu Kernel: 5.15.0-43-generic x86_64 bits: 64
Desktop: LXQt 0.17.1 Distro: Ubuntu 22.04.1 LTS (Jammy Jellyfish)
Machine:
  Type: Desktop Mobo: Acer model: Aspire TC-281
serial: DBE0E110018010680230A1 UEFI: American Megatrends v: R01-A2
date: 07/18/2017
Audio:
  Device-1: AMD Kabini HDMI/DP Audio driver: snd_hda_intel
  Device-2: AMD Family 15h Audio driver: snd_hda_intel
  Sound Server-1: ALSA v: k5.15.0-43-generic running: yes
  Sound Server-2: PulseAudio v: 15.99.1 running: yes
  Sound Server-3: PipeWire v: 0.3.48 running: yes


Works on 22.10 with kernel-6.1rc3:
# inxi -SMA
System:
  Host: me-aspiretc281 Kernel: 6.1.0-060100rc3-generic arch: x86_64
bits: 64 Desktop: LXQt v: 1.1.0 Distro: Ubuntu 22.10 (Kinetic Kudu)
Machine:
  Type: Desktop Mobo: Acer model: Aspire TC-281
serial: DBE0E110018010680230A1 UEFI: American Megatrends v: R01-A2
date: 07/18/2017
Audio:
  Device-1: AMD Kabini HDMI/DP Audio driver: snd_hda_intel
  Device-2: AMD Family 15h Audio driver: snd_hda_intel
  Sound Server-1: ALSA v: k6.1.0-060100rc3-generic running: yes
  Sound Server-2: PulseAudio v: 16.1 running: yes
  Sound Server-3: PipeWire v: 0.3.58 running: yes
  

ubuntu-bug thinks pulse-audio crashed but I don't know if that is
correct.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: bot-comment
-- 
no HDMI sound output in 22.10 (works in 22.04.1 and kernel-6.1rc3)
https://bugs.launchpad.net/bugs/1995894
You received this bug notification because you are a member of Kernel Packages, 
which is subscribed to linux in Ubuntu.

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1851518] Re: [950SBE/951SBE, Realtek ALC298, Speaker, Internal] No sound on internal speakers, very very quiet on headphones

2022-11-10 Thread Drew R.
Hi jhubuntu20,

First, hopefully I can do you a solid and tell you how I fixed my
brightness control at least (cause mine is a Galaxy Book2 Pro also, but
with the ARC graphics).  What worked for me was:

    -Created /etc/modprobe.d/i915.conf with
        options i915 enable_dpcd_backlight=3
    - Regenerated the initramfs:
        sudo update-initramfs -u -k all

Hope that helps, unless you already tried.

On my side, I am running kernel 6.0.0-1006-oem (which I got from the
linux-oem-22.04b package, as opposed to the mainline tool, which i may
try though). I tried that in hopes it would help, in addition to many
other things (disabling windows fast boot on my other drive, disabling
secure boot and fast bios, setting probe_mask=1, iommu=off, and others).
Also tried playing with hdajackretask, because I'd be happy with
retasking / giving up my working headphone jack for the speakers, but
haven't figured that out.

Also, when I tried your TO912.sh script (the first thing I tried actually), I 
was doing it following the instructions  here -- 
https://forum.manjaro.org/t/howto-set-up-the-audio-card-in-samsung-galaxy-book/37090
This includes also blacklisting snd-hda-intel, removing alsa-conf, plus more.  
Should I not be doing that?  (I've tried both ways though).

The problem is I just don't have the right mental model for what's going
on, so trying everything too blindly... but I'm trying to understand
more.  Most things have no effect (i.e., headphones work, speakers
don't).  However, the one tweak that has made the most effect is:

    options snd-intel-dspcfg dsp_driver=##

    - When I set this to "3", or leave the setting out (i.e., as it was on 
fresh install), alsamixer shows "sof-hda-dsp" for "Card" and "Realtek ALC298" 
for "Chip".  When I use hdajackretask, it hangs completely when applying the 
retasking (and I've stopped pulseaudio, etc.), and the machine will hang on 
next shutdown.  
    - But if I set it to "1", alsamixer then shows "HDA Intel PCH" for "Card", 
and still "Realtek..." for chip.  I can use hdajackretask without it hanging 
up.  And when I plug in headphones, I see a new "Headset or Headphone" GUI 
popup.  But my mic doesn't look like it's working. (Also, I need to not 
blacklist snd-hda-intel for this config to work, otherwise I only have "Dummy 
Output")

Do you happen to know which of those situations seems "more right"?  I
fear that there's more than one problem going on at once, and I wonder
which setting (3 vs 1) I should use as I experiment with the other
possibilities (your script, etc.)

Lastly, I notice if I look in alsa-info, its reporting "line_outs=1",
but "speaker_outs=0" in almost all configurations, and its not binding
either line_out or speaker to anything in "/devices" (though it is
binding the HDMIs, headphone, and sometimes the Mic).  I checked my
older laptop, however, which has speaker sound, and it reports the same
(though its running a 4.xx kernel and the ALC256).

I don't know if any of this gives any clues, and I apologize for my
posts length and poor formatting.. I'm just trying to make sense of all
this.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1851518

Title:
  [950SBE/951SBE, Realtek ALC298, Speaker, Internal] No sound on
  internal speakers, very very quiet on headphones

Status in Linux:
  New
Status in linux package in Ubuntu:
  Fix Released

Bug description:
  I've been googling this issue for 10's of hours and tried many things.

  Relase of Ubuntu: 19.10

  Expected outcome: Music plays on the internal speakers and headphones.

  Actual outcome: I can barely hear audio using headphones with volume
  turned up to 150%.  Absolutely nothing comes out of the speakers. (The
  speakers sound great under Windows 10.)

  Complete alsa-info output is attached, but here are some snippets:

  !!DMI Information
  !!---

  Manufacturer:  SAMSUNG ELECTRONICS CO., LTD.
  Product Name:  950SBE/951SBE
  Product Version:   P06RES
  Firmware Version:  P06RES.075.190529.SP
  Board Vendor:  SAMSUNG ELECTRONICS CO., LTD.
  Board Name:NP950SBE-K01US

  
  !!Kernel Information
  !!--

  Kernel release:5.3.0-19-generic
  Operating System:  GNU/Linux
  Architecture:  x86_64
  Processor: x86_64
  SMP Enabled:   Yes


  !!ALSA Version
  !!

  Driver version: k5.3.0-19-generic
  Library version:1.1.9
  Utilities version:  1.1.9

  
  !!Loaded ALSA modules
  !!---

  snd_hda_intel

  
  !!Sound Servers on this system
  !!

  Pulseaudio:
Installed - Yes (/usr/bin/pulseaudio)
Running - Yes

  
  !!Soundcards recognised by ALSA
  !!-

   0 [PCH]: HDA-Intel - HDA Intel PCH
HDA Intel PCH at 0x604b118000 irq 177

  
  !!PCI Soundcards installed in the system

[Kernel-packages] [Bug 1992468] Re: segfault in ld-linux-x86-64.so

2022-11-10 Thread Pete Lomax
Am now convinced, albeit without much in the way of concrete evidence,
this is the missing DT_HASH (in libc.so.6 and libdl.so.2) issue, not
that I've yet tried to create a DT_GNU_HASH replacment yet.

See (eg)
https://src.fedoraproject.org/rpms/glibc/c/1cd731cf293a236f70ed6d54ff711d6a1342a3d3?branch=rawhide

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1992468

Title:
  segfault in ld-linux-x86-64.so

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My manually built elf x64 file has started crashing on load, within the last 
month or so.
  It worked fine on Ubuntu 20.04.x, but fails on 22.04 - same problem on Mint 
19.3 and Fedora 36.

  dmesg ... gives this:

  [ 107.121214] p[4370]: segfault at 0 ip 7f3d725b8350 sp 7ffea111fba0 
error 4 in ld-linux-x86-64.so.2[7f3d72598000+2a000]
  [ 107.121230] Code: ff ff 00 45 31 db 48 8d 15 c9 ac 00 00 4c 8d 05 46 8f 01 
00 4c 8d 2d 1f 8f 01 00 49 89 c2 48 8d 58 ff 48 89 f8 49 f7 da 66 90 <8b> 08 83 
f9 07 77 19 85 c9 74 45 83 f9 07 77 40 48 63 0c 8a 48 01

  You can download the offending file (a single plain 4MB ELF x64) from
  http://phix.x10.mx/p64

  It almost certainly contains older/rarer forms of relocations and suchlike, 
but 
  only about ten or so and meant to be as simple as possible.

  If I need to change the binary content of that file, I can, but might
  need a wee bit of help.

  Of course, if/once it gets through ld-linux-x86-64.so and complains
  about something else, ignore it, or should you be at all intrigued you
  can visit http://phix.x10.mx/download.php to get the full package.

  References, just in case you need them, or to ask a wider set than just me 
for more details direct:
  https://openeuphoria.org/forum/136972.wc?last_id=136973
  https://github.com/petelomax/Phix/issues/13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1992468/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996208] Missing required logs.

2022-11-10 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1996208

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996208

Title:
  kernel: nvme nvme0: failed to set APST feature (2)

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  always my computer on show me this error: kernel: nvme nvme0: failed to set 
APST feature (2)
  this error start with update kernel 5.15.0-52
  well i check the logs and saw this:

  kernel: nvme nvme0: failed to set APST feature (2)
  [7.163360] kernel: nvme nvme0: allocated 64 MiB host memory buffer.
  [7.184123] kernel: nvme nvme0: 4/0/0 default/read/poll queues
  [7.201139] kernel:  nvme0n1: p1 p2
  [7.268310] kernel: usb 1-3: new full-speed USB device number 2 using 
xhci_h>
  [7.311210] kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
  [7.311225] kernel: ata5: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
  [7.311239] kernel: ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 300)
  [7.311251] kernel: ata4: SATA link down (SStatus 4 SControl 300)
  [7.311264] kernel: ata6: SATA link down (SStatus 4 SControl 300)
  [7.311278] kernel: ata3: SATA link down (SStatus 4 SControl 300)
  [7.312183] kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_SB.PC>
  [7.312217] kernel:
  [7.312218] kernel: No Local Variables are initialized for Method [_GTF]
  [7.312219] kernel:
  [7.312220] kernel: No Arguments are initialized for method [_GTF]
  [7.312221] kernel:
7.31] kernel: ACPI Error: Aborting method \_SB.PCI0.SAT0.PRT0._GTF due>
  [7.312325] kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_SB.PC>
  [7.312357] kernel:
  [7.312359] kernel: No Local Variables are initialized for Method [_GTF]
  [7.312359] kernel:
  [7.312360] kernel: No Arguments are initialized for method [_GTF]
  [7.312361] kernel:
  [7.312362] kernel: ACPI Error: Aborting method \_SB.PCI0.SAT0.PRT4._GTF 
due>
  [7.312399] kernel: ata5.00: ATA-10: CT240BX500SSD1, M6CR054, max UDMA/133
  [7.312420] kernel: ata1.00: ATA-8: Hitachi HTS542525K9SA00, BBFOC31P, max 
U>
  [7.312699] kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_SB.PC>
  [7.312731] kernel:
  [7.312732] kernel: No Local Variables are initialized for Method [_GTF]
  [7.312733] kernel:
  [7.312734] kernel: No Arguments are initialized for method [_GTF]
  7.312736] kernel: ACPI Error: Aborting method \_SB.PCI0.SAT0.PRT1._GTF due>
  [7.312768] kernel: ata2.00: ATA-9: HGST HTS541010A9E680, JA0OA710, max 
UDMA>
  [7.313013] kernel: ata2.00: 1953525168 sectors, multi 16: LBA48 NCQ 
(depth >
  [7.313420] kernel: ata5.00: 468862128 sectors, multi 1: LBA48 NCQ (depth 
32>
  [7.314598] kernel: ata1.00: ATA Identify Device Log not supported
  [7.314601] kernel: ata1.00: 488397168 sectors, multi 16: LBA48 NCQ (depth 
3>
  [7.314706] kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_SB.PC>
  [7.314738] kernel:
  [7.314740] kernel: No Local Variables are initialized for Method [_GTF]
  [7.314740] kernel:
  [7.314741] kernel: No Arguments are initialized for method [_GTF]
  [7.314742] kernel:
  [7.314743] kernel: ACPI Error: Aborting method \_SB.PCI0.SAT0.PRT1._GTF 
due>
  [7.315039] kernel: ata2.00: configured for UDMA/133
  [7.315707] kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_SB.PC>
  [7.315740] kernel:
  [7.315741] kernel: No Local Variables are initialized for Method [_GTF]
  [7.315742] kernel:
  [7.315742] kernel: No Arguments are initialized for method [_GTF]
  [7.315743] kernel:

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996208/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996208] Re: kernel: nvme nvme0: failed to set APST feature (2)

2022-11-10 Thread Paul White
** Package changed: ubuntu => linux (Ubuntu)

** Tags removed: 22.04 bug lts
** Tags added: jammy

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996208

Title:
  kernel: nvme nvme0: failed to set APST feature (2)

Status in linux package in Ubuntu:
  New

Bug description:
  always my computer on show me this error: kernel: nvme nvme0: failed to set 
APST feature (2)
  this error start with update kernel 5.15.0-52
  well i check the logs and saw this:

  kernel: nvme nvme0: failed to set APST feature (2)
  [7.163360] kernel: nvme nvme0: allocated 64 MiB host memory buffer.
  [7.184123] kernel: nvme nvme0: 4/0/0 default/read/poll queues
  [7.201139] kernel:  nvme0n1: p1 p2
  [7.268310] kernel: usb 1-3: new full-speed USB device number 2 using 
xhci_h>
  [7.311210] kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
  [7.311225] kernel: ata5: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
  [7.311239] kernel: ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 300)
  [7.311251] kernel: ata4: SATA link down (SStatus 4 SControl 300)
  [7.311264] kernel: ata6: SATA link down (SStatus 4 SControl 300)
  [7.311278] kernel: ata3: SATA link down (SStatus 4 SControl 300)
  [7.312183] kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_SB.PC>
  [7.312217] kernel:
  [7.312218] kernel: No Local Variables are initialized for Method [_GTF]
  [7.312219] kernel:
  [7.312220] kernel: No Arguments are initialized for method [_GTF]
  [7.312221] kernel:
7.31] kernel: ACPI Error: Aborting method \_SB.PCI0.SAT0.PRT0._GTF due>
  [7.312325] kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_SB.PC>
  [7.312357] kernel:
  [7.312359] kernel: No Local Variables are initialized for Method [_GTF]
  [7.312359] kernel:
  [7.312360] kernel: No Arguments are initialized for method [_GTF]
  [7.312361] kernel:
  [7.312362] kernel: ACPI Error: Aborting method \_SB.PCI0.SAT0.PRT4._GTF 
due>
  [7.312399] kernel: ata5.00: ATA-10: CT240BX500SSD1, M6CR054, max UDMA/133
  [7.312420] kernel: ata1.00: ATA-8: Hitachi HTS542525K9SA00, BBFOC31P, max 
U>
  [7.312699] kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_SB.PC>
  [7.312731] kernel:
  [7.312732] kernel: No Local Variables are initialized for Method [_GTF]
  [7.312733] kernel:
  [7.312734] kernel: No Arguments are initialized for method [_GTF]
  7.312736] kernel: ACPI Error: Aborting method \_SB.PCI0.SAT0.PRT1._GTF due>
  [7.312768] kernel: ata2.00: ATA-9: HGST HTS541010A9E680, JA0OA710, max 
UDMA>
  [7.313013] kernel: ata2.00: 1953525168 sectors, multi 16: LBA48 NCQ 
(depth >
  [7.313420] kernel: ata5.00: 468862128 sectors, multi 1: LBA48 NCQ (depth 
32>
  [7.314598] kernel: ata1.00: ATA Identify Device Log not supported
  [7.314601] kernel: ata1.00: 488397168 sectors, multi 16: LBA48 NCQ (depth 
3>
  [7.314706] kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_SB.PC>
  [7.314738] kernel:
  [7.314740] kernel: No Local Variables are initialized for Method [_GTF]
  [7.314740] kernel:
  [7.314741] kernel: No Arguments are initialized for method [_GTF]
  [7.314742] kernel:
  [7.314743] kernel: ACPI Error: Aborting method \_SB.PCI0.SAT0.PRT1._GTF 
due>
  [7.315039] kernel: ata2.00: configured for UDMA/133
  [7.315707] kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_SB.PC>
  [7.315740] kernel:
  [7.315741] kernel: No Local Variables are initialized for Method [_GTF]
  [7.315742] kernel:
  [7.315742] kernel: No Arguments are initialized for method [_GTF]
  [7.315743] kernel:

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996208/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996208] [NEW] kernel: nvme nvme0: failed to set APST feature (2)

2022-11-10 Thread Launchpad Bug Tracker
You have been subscribed to a public bug:

always my computer on show me this error: kernel: nvme nvme0: failed to set 
APST feature (2)
this error start with update kernel 5.15.0-52
well i check the logs and saw this:

kernel: nvme nvme0: failed to set APST feature (2)
[7.163360] kernel: nvme nvme0: allocated 64 MiB host memory buffer.
[7.184123] kernel: nvme nvme0: 4/0/0 default/read/poll queues
[7.201139] kernel:  nvme0n1: p1 p2
[7.268310] kernel: usb 1-3: new full-speed USB device number 2 using xhci_h>
[7.311210] kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
[7.311225] kernel: ata5: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
[7.311239] kernel: ata1: SATA link up 1.5 Gbps (SStatus 113 SControl 300)
[7.311251] kernel: ata4: SATA link down (SStatus 4 SControl 300)
[7.311264] kernel: ata6: SATA link down (SStatus 4 SControl 300)
[7.311278] kernel: ata3: SATA link down (SStatus 4 SControl 300)
[7.312183] kernel: ACPI BIOS Error (bug): Could not resolve symbol [\_SB.PC>
[7.312217] kernel:
[7.312218] kernel: No Local Variables are initialized for Method [_GTF]
[7.312219] kernel:
[7.312220] kernel: No Arguments are initialized for method [_GTF]
[7.312221] kernel:
  7.31] kernel: ACPI Error: Aborting method \_SB.PCI0.SAT0.PRT0._GTF due>
[7.312325] kernel: ACPI BIOS Error (bug): Could not resolve symbol [\_SB.PC>
[7.312357] kernel:
[7.312359] kernel: No Local Variables are initialized for Method [_GTF]
[7.312359] kernel:
[7.312360] kernel: No Arguments are initialized for method [_GTF]
[7.312361] kernel:
[7.312362] kernel: ACPI Error: Aborting method \_SB.PCI0.SAT0.PRT4._GTF due>
[7.312399] kernel: ata5.00: ATA-10: CT240BX500SSD1, M6CR054, max UDMA/133
[7.312420] kernel: ata1.00: ATA-8: Hitachi HTS542525K9SA00, BBFOC31P, max U>
[7.312699] kernel: ACPI BIOS Error (bug): Could not resolve symbol [\_SB.PC>
[7.312731] kernel:
[7.312732] kernel: No Local Variables are initialized for Method [_GTF]
[7.312733] kernel:
[7.312734] kernel: No Arguments are initialized for method [_GTF]
7.312736] kernel: ACPI Error: Aborting method \_SB.PCI0.SAT0.PRT1._GTF due>
[7.312768] kernel: ata2.00: ATA-9: HGST HTS541010A9E680, JA0OA710, max UDMA>
[7.313013] kernel: ata2.00: 1953525168 sectors, multi 16: LBA48 NCQ (depth >
[7.313420] kernel: ata5.00: 468862128 sectors, multi 1: LBA48 NCQ (depth 32>
[7.314598] kernel: ata1.00: ATA Identify Device Log not supported
[7.314601] kernel: ata1.00: 488397168 sectors, multi 16: LBA48 NCQ (depth 3>
[7.314706] kernel: ACPI BIOS Error (bug): Could not resolve symbol [\_SB.PC>
[7.314738] kernel:
[7.314740] kernel: No Local Variables are initialized for Method [_GTF]
[7.314740] kernel:
[7.314741] kernel: No Arguments are initialized for method [_GTF]
[7.314742] kernel:
[7.314743] kernel: ACPI Error: Aborting method \_SB.PCI0.SAT0.PRT1._GTF due>
[7.315039] kernel: ata2.00: configured for UDMA/133
[7.315707] kernel: ACPI BIOS Error (bug): Could not resolve symbol [\_SB.PC>
[7.315740] kernel:
[7.315741] kernel: No Local Variables are initialized for Method [_GTF]
[7.315742] kernel:
[7.315742] kernel: No Arguments are initialized for method [_GTF]
[7.315743] kernel:

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: 22.04 bot-comment bug lts nvme ubuntu
-- 
kernel: nvme nvme0: failed to set APST feature (2)
https://bugs.launchpad.net/bugs/1996208
You received this bug notification because you are a member of Kernel Packages, 
which is subscribed to linux in Ubuntu.

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1992468] Missing required logs.

2022-11-10 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1992468

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1992468

Title:
  segfault in ld-linux-x86-64.so

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My manually built elf x64 file has started crashing on load, within the last 
month or so.
  It worked fine on Ubuntu 20.04.x, but fails on 22.04 - same problem on Mint 
19.3 and Fedora 36.

  dmesg ... gives this:

  [ 107.121214] p[4370]: segfault at 0 ip 7f3d725b8350 sp 7ffea111fba0 
error 4 in ld-linux-x86-64.so.2[7f3d72598000+2a000]
  [ 107.121230] Code: ff ff 00 45 31 db 48 8d 15 c9 ac 00 00 4c 8d 05 46 8f 01 
00 4c 8d 2d 1f 8f 01 00 49 89 c2 48 8d 58 ff 48 89 f8 49 f7 da 66 90 <8b> 08 83 
f9 07 77 19 85 c9 74 45 83 f9 07 77 40 48 63 0c 8a 48 01

  You can download the offending file (a single plain 4MB ELF x64) from
  http://phix.x10.mx/p64

  It almost certainly contains older/rarer forms of relocations and suchlike, 
but 
  only about ten or so and meant to be as simple as possible.

  If I need to change the binary content of that file, I can, but might
  need a wee bit of help.

  Of course, if/once it gets through ld-linux-x86-64.so and complains
  about something else, ignore it, or should you be at all intrigued you
  can visit http://phix.x10.mx/download.php to get the full package.

  References, just in case you need them, or to ask a wider set than just me 
for more details direct:
  https://openeuphoria.org/forum/136972.wc?last_id=136973
  https://github.com/petelomax/Phix/issues/13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1992468/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1992468] Re: segfault in ld-linux-x86-64.so

2022-11-10 Thread Pete Lomax
Irv said:
I upgraded my Linux kernel to 5.4.0-131-generic, and that solved the segfault 
issue. But latest Ubuntu uses 5.15.x, so the problem is probably back again.

** Package changed: glibc (Ubuntu) => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1992468

Title:
  segfault in ld-linux-x86-64.so

Status in linux package in Ubuntu:
  New

Bug description:
  My manually built elf x64 file has started crashing on load, within the last 
month or so.
  It worked fine on Ubuntu 20.04.x, but fails on 22.04 - same problem on Mint 
19.3 and Fedora 36.

  dmesg ... gives this:

  [ 107.121214] p[4370]: segfault at 0 ip 7f3d725b8350 sp 7ffea111fba0 
error 4 in ld-linux-x86-64.so.2[7f3d72598000+2a000]
  [ 107.121230] Code: ff ff 00 45 31 db 48 8d 15 c9 ac 00 00 4c 8d 05 46 8f 01 
00 4c 8d 2d 1f 8f 01 00 49 89 c2 48 8d 58 ff 48 89 f8 49 f7 da 66 90 <8b> 08 83 
f9 07 77 19 85 c9 74 45 83 f9 07 77 40 48 63 0c 8a 48 01

  You can download the offending file (a single plain 4MB ELF x64) from
  http://phix.x10.mx/p64

  It almost certainly contains older/rarer forms of relocations and suchlike, 
but 
  only about ten or so and meant to be as simple as possible.

  If I need to change the binary content of that file, I can, but might
  need a wee bit of help.

  Of course, if/once it gets through ld-linux-x86-64.so and complains
  about something else, ignore it, or should you be at all intrigued you
  can visit http://phix.x10.mx/download.php to get the full package.

  References, just in case you need them, or to ask a wider set than just me 
for more details direct:
  https://openeuphoria.org/forum/136972.wc?last_id=136973
  https://github.com/petelomax/Phix/issues/13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1992468/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1992468] [NEW] segfault in ld-linux-x86-64.so

2022-11-10 Thread Launchpad Bug Tracker
You have been subscribed to a public bug:

My manually built elf x64 file has started crashing on load, within the last 
month or so.
It worked fine on Ubuntu 20.04.x, but fails on 22.04 - same problem on Mint 
19.3 and Fedora 36.

dmesg ... gives this:

[ 107.121214] p[4370]: segfault at 0 ip 7f3d725b8350 sp 7ffea111fba0 
error 4 in ld-linux-x86-64.so.2[7f3d72598000+2a000]
[ 107.121230] Code: ff ff 00 45 31 db 48 8d 15 c9 ac 00 00 4c 8d 05 46 8f 01 00 
4c 8d 2d 1f 8f 01 00 49 89 c2 48 8d 58 ff 48 89 f8 49 f7 da 66 90 <8b> 08 83 f9 
07 77 19 85 c9 74 45 83 f9 07 77 40 48 63 0c 8a 48 01

You can download the offending file (a single plain 4MB ELF x64) from
http://phix.x10.mx/p64

It almost certainly contains older/rarer forms of relocations and suchlike, but 
only about ten or so and meant to be as simple as possible.

If I need to change the binary content of that file, I can, but might
need a wee bit of help.

Of course, if/once it gets through ld-linux-x86-64.so and complains
about something else, ignore it, or should you be at all intrigued you
can visit http://phix.x10.mx/download.php to get the full package.

References, just in case you need them, or to ask a wider set than just me for 
more details direct:
https://openeuphoria.org/forum/136972.wc?last_id=136973
https://github.com/petelomax/Phix/issues/13

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: bot-comment
-- 
segfault in ld-linux-x86-64.so
https://bugs.launchpad.net/bugs/1992468
You received this bug notification because you are a member of Kernel Packages, 
which is subscribed to linux in Ubuntu.

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1970074] Re: UBSAN: array-index-out-of-bounds in /build/linux-9H675w/linux-5.15.0/drivers/ata/libahci.c:968:41

2022-11-10 Thread Chaim Eliyah
Update: Last night I tried as far back as 18.04 and it turns out this
has been backported everywhere. I've had these controllers since
2016-ish, have never had a problem before. Now I can't even work around
by installing older kernels (s/a 5.3 used for 18.04.5).

Finding other HWRAID controllers is not a solution for me.

Here's the good news:

https://github.com/torvalds/linux/commit/1e41e693f458eef2d5728207dbd327cd3b16580a

...has been merged into 6.1-rc4. So, help is on the way.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1970074

Title:
  UBSAN: array-index-out-of-bounds in
  /build/linux-9H675w/linux-5.15.0/drivers/ata/libahci.c:968:41

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Something wrong with ata driver in dmesg found:

  [1.980693] kernel: 

  [1.980699] kernel: fbcon: Taking over console
  [1.980703] kernel: UBSAN: array-index-out-of-bounds in 
/build/linux-9H675w/linux-5.15.0/drivers/ata/libahci.c:968:41
  [1.980709] kernel: index 15 is out of range for type 'ahci_em_priv [8]'
  [1.980713] kernel: CPU: 0 PID: 209 Comm: scsi_eh_8 Not tainted 
5.15.0-25-generic #25-Ubuntu
  [1.980716] kernel: Hardware name: System manufacturer System Product 
Name/P5Q3, BIOS 110206/11/2010
  [1.980718] kernel: Call Trace:
  [1.980721] kernel:  
  [1.980723] kernel:  show_stack+0x52/0x58
  [1.980729] kernel:  dump_stack_lvl+0x4a/0x5f
  [1.980734] kernel:  dump_stack+0x10/0x12
  [1.980736] kernel:  ubsan_epilogue+0x9/0x45
  [1.980739] kernel:  __ubsan_handle_out_of_bounds.cold+0x44/0x49
  [1.980742] kernel:  ahci_qc_issue+0x166/0x170 [libahci]
  [1.980748] kernel:  ata_qc_issue+0x135/0x240
  [1.980752] kernel:  ata_exec_internal_sg+0x2c4/0x580
  [1.980754] kernel:  ? vprintk_default+0x1d/0x20
  [1.980759] kernel:  ata_exec_internal+0x67/0xa0
  [1.980762] kernel:  sata_pmp_read+0x8d/0xc0
  [1.980765] kernel:  sata_pmp_read_gscr+0x3c/0x90
  [1.980768] kernel:  sata_pmp_attach+0x8b/0x310
  [1.980771] kernel:  ata_eh_revalidate_and_attach+0x28c/0x4b0
  [1.980775] kernel:  ata_eh_recover+0x6b6/0xb30
  [1.980778] kernel:  ? ahci_do_hardreset+0x180/0x180 [libahci]
  [1.980783] kernel:  ? ahci_stop_engine+0xb0/0xb0 [libahci]
  [1.980787] kernel:  ? ahci_do_softreset+0x290/0x290 [libahci]
  [1.980792] kernel:  ? 
trace_event_raw_event_ata_eh_link_autopsy_qc+0xe0/0xe0
  [1.980795] kernel:  sata_pmp_eh_recover.isra.0+0x214/0x560
  [1.980799] kernel:  sata_pmp_error_handler+0x23/0x40
  [1.980802] kernel:  ahci_error_handler+0x43/0x80 [libahci]
  [1.980806] kernel:  ata_scsi_port_error_handler+0x2b1/0x600
  [1.980810] kernel:  ata_scsi_error+0x9c/0xd0
  [1.980813] kernel:  scsi_error_handler+0xa1/0x180
  [1.980817] kernel:  ? scsi_unjam_host+0x1c0/0x1c0
  [1.980820] kernel:  kthread+0x12a/0x150
  [1.980823] kernel:  ? set_kthread_struct+0x50/0x50
  [1.980826] kernel:  ret_from_fork+0x22/0x30
  [1.980831] kernel:  

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: linux-image-5.15.0-25-generic 5.15.0-25.25
  ProcVersionSignature: Ubuntu 5.15.0-25.25-generic 5.15.30
  Uname: Linux 5.15.0-25-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  eugene16798 F pulseaudio
   /dev/snd/pcmC0D0p:   eugene16798 F...m pulseaudio
   /dev/snd/controlC1:  eugene16798 F pulseaudio
  CasperMD5CheckResult: unknown
  CurrentDesktop: KDE
  Date: Sun Apr 24 05:13:34 2022
  HibernationDevice: RESUME=UUID=7e115b53-56a4-444f-bd93-6ad4f15c4a61
  InstallationDate: Installed on 2019-04-13 (1106 days ago)
  InstallationMedia: Kubuntu 19.04 "Disco Dingo" - Alpha amd64 (20190326.1)
  IwConfig:
   lono wireless extensions.

   enp2s0no wireless extensions.

   virbr0no wireless extensions.
  MachineType: System manufacturer System Product Name
  ProcEnviron:
   LANGUAGE=
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=uk_UA.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 radeondrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/@/boot/vmlinuz-5.15.0-25-generic 
root=UUID=d87288b4-dbdd-4448-8088-4ebb6ed6cf33 ro rootflags=subvol=@ quiet 
splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-5.15.0-25-generic N/A
   linux-backports-modules-5.15.0-25-generic  N/A
   linux-firmware 20220329.git681281e4-0ubuntu1
  RfKill:

  SourcePackage: linux
  UpgradeStatus: Upgraded to jammy on 2022-04-22 (1 days ago)
  dmi.bios.date: 06/11/2010
  dmi.bios.release: 11.2
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 1102
  dmi.board.asset.tag: To Be Filled By O.E.M.
  dmi.board.name: P5Q3
  dmi.board.vendor: ASUSTeK Co

[Kernel-packages] [Bug 1995941] Re: [UBUNTU 20.04] KVM: PV: ext call delivered twice when receiver in PSW wait

2022-11-10 Thread Frank Heimes
A test kernel is currently being build at this PPA:
https://launchpad.net/~fheimes/+archive/ubuntu/lp1995941

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1995941

Title:
  [UBUNTU 20.04] KVM: PV: ext call delivered twice when receiver in PSW
  wait

Status in Ubuntu on IBM z Systems:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  In Progress

Bug description:
  SRU Justification:
  ==

  [Impact]

   * In a secure execution guest, the external interrupt for the SIGP
 external call order is delivered twice to a VCPU even though it was 
 only sent once.

   * Under PV (protected virtualization), external call interrupts are
     delivered by the SIGP interpretation facility, without KVM's
     involvement.
     But, if the receiving CPU is in enabled wait, KVM needs to wake the
     receiving CPU such that the interrupt can be delivered.
     Hence, in this case, the SIGP external call order causes
     an interception.

   * In response, KVM only needs to wake the receiving VCPU.
     Interrupt delivery is then handled by the SIGP interpretation facility.

   * KVM wrongly assumed it also needs to request injection for the
     external call interrupt after the respective intercept, causing the
     interrupt to be delivered twice:
     * once through the SIGP interpretation facility
     * and once through the interrupt injection control by KVM.

   * Solution is to add appropriate special handling for 108 external
     call intercepts.

  [Fix]

   * c3f0e5fd2d33 c3f0e5fd2d33d80c5a5a8b5e5d2bab2841709cc8
     "KVM: s390: pv: don't present the ecall interrupt twice"

  [Test Case]

   * Have an Secure Execution (PV) environment setup on an
     IBM z15 or LinuxONE III LPAR using Ubuntu Server 20.04 (latest).

   * Apply kvm-unit-test submitted upstream:
     "[kvm-unit-tests PATCH v1 0/4] s390x: add tests for SIGP call \
  orders in enabled wait"

   * Run the smp_PV kvm-unit-test: ./run_tests.sh smp_PV

   * Check logs/smp_PV.log.
     If system is affected, the following line can be found:
     "ABORT: smp: psw wait: ecall: Unexpected external call interrupt \
  (code 0x1202): on cpu 1 at 0x11958"

   * If the system is not affected, the line should look like this:
     "PASS: smp: psw wait: ecall: received"

  [Regression Potential / What can go wrong]

   * The handle_pv_notification can be wrong and misleading
     in case 'ret' is not handled correctly.

   * trace_kvm_s390_handle_sigp_pei might not be called correctly,
     now after the if condition.

   * In worst case the external interrupt could not be delivered
     at all or still too often.

  [Other]

   * The fix/patch c3f0e5fd2d33 got upstream accepted with kernel v6.0,
     so it not only needs to be applied to 20.04/5.4, but also to 22.04/5.15
     and 22.10/5.19.

   * But the patch got properly tagged for upstream stable:
     Cc:  # 5.7
     Fixes: da24a0cc58ed ("KVM: s390: protvirt: Instruction emulation")

   * And with that it got already picked up and is included in:
     22.04 with Ubuntu-5.15.0-53.59 (currently in jammy-proposed)
     22.10 with Ubuntu-5.19.0-16.16 means incl. in the release kernel.

   * So the only Ubuntu release that is affected is 20.04/focal.
  __

  Description:   KVM: PV: ext call delivered twice when receiver in PSW wait
  Symptom:   In a secure execution guest, the external interrupt for the
     SIGP external call order is delivered twice to a VCPU even
     though it was only sent once.
  Problem:   Under PV, external call interrupts are delivered by the SIGP
     interpretation facility, without KVM's involvement. But, if the
     receiving CPU is in enabled wait, KVM needs to wake the
     receiving CPU such that the interrupt can be delivered. Hence,
     in this case, the SIGP external call order causes an
     interception. In response, KVM only needs to wake the receiving
     VCPU. Interrupt delivery is then handled by the SIGP
     interpretation facility.

     KVM wrongfuly assumed it also needs to request injection for 
the
     external call interrupt after the respective intercept, causing
     the interrupt to be delivered twice: once through the SIGP
     interpretation facility and once through the interrupt 
injection
     control by KVM.
  Solution:  Add appropriate special handling for 108 external call
     intercepts.
  Reproduction:  0. Apply kvm-unit-test submitted upstream
    ("[kvm-unit-tests PATCH v1 0/4] s390x: add tests for SIGP
    call orders in enabled wait").
     1. Run the smp_PV kvm-unit-test:
  ./run_tests.sh sm

[Kernel-packages] [Bug 1995941] Re: [UBUNTU 20.04] KVM: PV: ext call delivered twice when receiver in PSW wait

2022-11-10 Thread Frank Heimes
SRU request submitted to the Ubuntu kernel team mailing list for focal:
https://lists.ubuntu.com/archives/kernel-team/2022-November/thread.html#134671
Changing status to 'In Progress' for focal.

** Changed in: linux (Ubuntu Focal)
 Assignee: Skipper Bug Screeners (skipper-screen-team) => Canonical Kernel 
Team (canonical-kernel-team)

** Changed in: linux (Ubuntu Focal)
   Status: Triaged => In Progress

** Changed in: ubuntu-z-systems
   Status: Triaged => In Progress

** Changed in: ubuntu-z-systems
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Focal)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1995941

Title:
  [UBUNTU 20.04] KVM: PV: ext call delivered twice when receiver in PSW
  wait

Status in Ubuntu on IBM z Systems:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  In Progress

Bug description:
  SRU Justification:
  ==

  [Impact]

   * In a secure execution guest, the external interrupt for the SIGP
 external call order is delivered twice to a VCPU even though it was 
 only sent once.

   * Under PV (protected virtualization), external call interrupts are
     delivered by the SIGP interpretation facility, without KVM's
     involvement.
     But, if the receiving CPU is in enabled wait, KVM needs to wake the
     receiving CPU such that the interrupt can be delivered.
     Hence, in this case, the SIGP external call order causes
     an interception.

   * In response, KVM only needs to wake the receiving VCPU.
     Interrupt delivery is then handled by the SIGP interpretation facility.

   * KVM wrongly assumed it also needs to request injection for the
     external call interrupt after the respective intercept, causing the
     interrupt to be delivered twice:
     * once through the SIGP interpretation facility
     * and once through the interrupt injection control by KVM.

   * Solution is to add appropriate special handling for 108 external
     call intercepts.

  [Fix]

   * c3f0e5fd2d33 c3f0e5fd2d33d80c5a5a8b5e5d2bab2841709cc8
     "KVM: s390: pv: don't present the ecall interrupt twice"

  [Test Case]

   * Have an Secure Execution (PV) environment setup on an
     IBM z15 or LinuxONE III LPAR using Ubuntu Server 20.04 (latest).

   * Apply kvm-unit-test submitted upstream:
     "[kvm-unit-tests PATCH v1 0/4] s390x: add tests for SIGP call \
  orders in enabled wait"

   * Run the smp_PV kvm-unit-test: ./run_tests.sh smp_PV

   * Check logs/smp_PV.log.
     If system is affected, the following line can be found:
     "ABORT: smp: psw wait: ecall: Unexpected external call interrupt \
  (code 0x1202): on cpu 1 at 0x11958"

   * If the system is not affected, the line should look like this:
     "PASS: smp: psw wait: ecall: received"

  [Regression Potential / What can go wrong]

   * The handle_pv_notification can be wrong and misleading
     in case 'ret' is not handled correctly.

   * trace_kvm_s390_handle_sigp_pei might not be called correctly,
     now after the if condition.

   * In worst case the external interrupt could not be delivered
     at all or still too often.

  [Other]

   * The fix/patch c3f0e5fd2d33 got upstream accepted with kernel v6.0,
     so it not only needs to be applied to 20.04/5.4, but also to 22.04/5.15
     and 22.10/5.19.

   * But the patch got properly tagged for upstream stable:
     Cc:  # 5.7
     Fixes: da24a0cc58ed ("KVM: s390: protvirt: Instruction emulation")

   * And with that it got already picked up and is included in:
     22.04 with Ubuntu-5.15.0-53.59 (currently in jammy-proposed)
     22.10 with Ubuntu-5.19.0-16.16 means incl. in the release kernel.

   * So the only Ubuntu release that is affected is 20.04/focal.
  __

  Description:   KVM: PV: ext call delivered twice when receiver in PSW wait
  Symptom:   In a secure execution guest, the external interrupt for the
     SIGP external call order is delivered twice to a VCPU even
     though it was only sent once.
  Problem:   Under PV, external call interrupts are delivered by the SIGP
     interpretation facility, without KVM's involvement. But, if the
     receiving CPU is in enabled wait, KVM needs to wake the
     receiving CPU such that the interrupt can be delivered. Hence,
     in this case, the SIGP external call order causes an
     interception. In response, KVM only needs to wake the receiving
     VCPU. Interrupt delivery is then handled by the SIGP
     interpretation facility.

     KVM wrongfuly assumed it also needs to request injection for 
the
     external call interrupt after the respective intercept, causing
     the interrupt to be delivered twice

[Kernel-packages] [Bug 1995941] Re: [UBUNTU 20.04] KVM: PV: ext call delivered twice when receiver in PSW wait

2022-11-10 Thread Frank Heimes
** Description changed:

+ SRU Justification:
+ ==
+ 
+ [Impact]
+ 
+  * In a secure execution guest, the external interrupt for the SIGP external
+call order is delivered twice to a VCPU even though it was only sent once.
+ 
+  * Under PV (protected virtualization), external call interrupts are
+delivered by the SIGP interpretation facility, without KVM's 
+involvement.
+But, if the receiving CPU is in enabled wait, KVM needs to wake the
+receiving CPU such that the interrupt can be delivered.
+Hence, in this case, the SIGP external call order causes
+an interception.
+ 
+  * In response, KVM only needs to wake the receiving VCPU.
+Interrupt delivery is then handled by the SIGP interpretation facility.
+ 
+  * KVM wrongly assumed it also needs to request injection for the 
+external call interrupt after the respective intercept, causing the 
+interrupt to be delivered twice:
+* once through the SIGP interpretation facility
+* and once through the interrupt injection control by KVM.
+ 
+  * Solution is to add appropriate special handling for 108 external
+call intercepts.
+ 
+ [Fix]
+ 
+  * c3f0e5fd2d33 c3f0e5fd2d33d80c5a5a8b5e5d2bab2841709cc8
+"KVM: s390: pv: don't present the ecall interrupt twice"
+ 
+ [Test Case]
+ 
+  * Have an Secure Execution (PV) environment setup on an
+IBM z15 or LinuxONE III LPAR using Ubuntu Server 20.04 (latest).
+ 
+  * Apply kvm-unit-test submitted upstream:
+"[kvm-unit-tests PATCH v1 0/4] s390x: add tests for SIGP call \
+ orders in enabled wait"
+ 
+  * Run the smp_PV kvm-unit-test: ./run_tests.sh smp_PV
+ 
+  * Check logs/smp_PV.log.
+If system is affected, the following line can be found:
+"ABORT: smp: psw wait: ecall: Unexpected external call interrupt \
+ (code 0x1202): on cpu 1 at 0x11958"
+ 
+  * If the system is not affected, the line should look like this:
+"PASS: smp: psw wait: ecall: received"
+ 
+ [Regression Potential / What can go wrong]
+ 
+  * The handle_pv_notification can be wrong and misleading
+in case 'ret' is not handled correctly.
+ 
+  * trace_kvm_s390_handle_sigp_pei might not be called correctly,
+now after the if condition.
+ 
+  * In worst case the external interrupt could not be delivered
+at all or still too often.
+ 
+ [Other]
+ 
+  * The fix/patch c3f0e5fd2d33 got upstream accepted with kernel v6.0,
+so it not only needs to be applied to 20.04/5.4, but also to 22.04/5.15
+and 22.10/5.19.
+ 
+  * But the patch got properly tagged for upstream stable:
+Cc:  # 5.7
+Fixes: da24a0cc58ed ("KVM: s390: protvirt: Instruction emulation")
+ 
+  * And with that it got already picked up and is included in:
+22.04 with Ubuntu-5.15.0-53.59 (currently in jammy-proposed)
+22.10 with Ubuntu-5.19.0-16.16 means incl. in the release kernel.
+ 
+  * So the only Ubuntu release that is affected is 20.04/focal.
+ __
+ 
  Description:   KVM: PV: ext call delivered twice when receiver in PSW wait
- Symptom:   In a secure execution guest, the external interrupt for the 
-SIGP external call order is delivered twice to a VCPU even
-though it was only sent once.
+ Symptom:   In a secure execution guest, the external interrupt for the
+    SIGP external call order is delivered twice to a VCPU even
+    though it was only sent once.
  Problem:   Under PV, external call interrupts are delivered by the SIGP
-interpretation facility, without KVM's involvement. But, if the
-receiving CPU is in enabled wait, KVM needs to wake the
-receiving CPU such that the interrupt can be delivered. Hence,
-in this case, the SIGP external call order causes an
-interception. In response, KVM only needs to wake the receiving
-VCPU. Interrupt delivery is then handled by the SIGP
-interpretation facility. 
+    interpretation facility, without KVM's involvement. But, if the
+    receiving CPU is in enabled wait, KVM needs to wake the
+    receiving CPU such that the interrupt can be delivered. Hence,
+    in this case, the SIGP external call order causes an
+    interception. In response, KVM only needs to wake the receiving
+    VCPU. Interrupt delivery is then handled by the SIGP
+    interpretation facility.
  
-KVM wrongfuly assumed it also needs to request injection for 
the
-external call interrupt after the respective intercept, causing
-the interrupt to be delivered twice: once through the SIGP
-interpretation facility and once through the interrupt 
injection
-control by KVM.
+    KVM wrongfuly assumed it also needs to request injection for 
the
+    external call interrupt after the re

[Kernel-packages] [Bug 1994974] Re: Azure: hv_netvsc: Fix race between VF offering and VF association message from host

2022-11-10 Thread Tim Gardner
** Changed in: linux-azure (Ubuntu Focal)
   Status: In Progress => Fix Committed

** Changed in: linux-azure (Ubuntu Jammy)
   Status: In Progress => Fix Committed

** Changed in: linux-azure (Ubuntu Kinetic)
   Status: In Progress => Fix Committed

** Changed in: linux-azure (Ubuntu)
   Status: In Progress => Fix Released

** Changed in: linux-azure (Ubuntu)
 Assignee: Tim Gardner (timg-tpi) => (unassigned)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1994974

Title:
  Azure: hv_netvsc: Fix race between VF offering and VF association
  message from host

Status in linux-azure package in Ubuntu:
  Fix Released
Status in linux-azure source package in Focal:
  Fix Committed
Status in linux-azure source package in Jammy:
  Fix Committed
Status in linux-azure source package in Kinetic:
  Fix Committed

Bug description:
  SRU Justification

  [Impact]

  During vm boot, there might be possibility that vf registration call
  comes before the vf association from host to vm.

  And this might break netvsc vf path, this is in order to prevent the
  same block vf registration until vf bind message comes from host.

  [Test Plan]

  Microsoft tested

  [Where things could go wrong]

  The 5.4 backport patch could hang waiting for a VF addition to
  complete.

  [Other Info]

  SF: #00347129

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1994974/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1973434] Re: massive performance issues since 22.04 upgrade

2022-11-10 Thread Andres Schwartz
I don't know if it is related with what is happening to me, but all my
drag actions becomes slow / frozen. It appears that the window is
updated internally for each the way the mouse taked (when I am
dragging).

It happens only when I have a lot of things opened. Specially if that
things uses 3D acceleration (it can be vulkan or OpenGL that does not
matter I already tested it).

I monitored the system usage and the CPU is very low usage and the GPU too (3% 
to 7% CPU and 20% to 33% GPU). But, the system load becomes high (more than 
1.0) when I try to drag some window.
When I stop of trying to drag the system load slowly lowers.

I recorded a video with OBS and the recording freezes too in the same
moments so It appears to be related with image drawing when using input
on a window manager.

It happens too on Budgie Desktop.

The action drains CPU usage (one core almost). I mean, when I drag a
window slowy (a terminal with htop running) I can view a very high CPU
usage in that moment (And I can ear the CPU fan running faster too).

So it is some function that stay on some loop of some kind related with
the drag action only draining CPU instead of waiting and let other tasks
to run.


My system information:
intel_iommu=off
Linux 5.15.0-52-generic
NVIDIA 520.56.06
Ubuntu 22.04.1 LTS

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1973434

Title:
  massive performance issues since 22.04 upgrade

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Hi,
  After upgrading to 22.04 i had to fight with massive performance issues.

  Browsers appeared to hang every other minute, youtube videos being
  laggy and hang in between, applications in a virtualbox VM where slow
  and also hanging every other minute to a level of not being useable.
  On a pretty recent and powerful system just 2 years old.

  I noticed CPU jumps in top, but also somehow thought it could be a graphics 
issue so invested some time installing nvidia drivers properly.
  Also I wondered if it might be the lowlatency kernel I normally use because I 
do audio stuff, and switched to generic. But nothing helped.

  ThenI had the idea it could be a kernel/scheduler issue because the
  system wasn't always slow, but it appeared certain things kept hanging
  when other processed had a lot of cpu for a few seconds.

  So I got a recent mainline kernel, configured it with my last running
  config from 21.10 before the update, made the debs and installed them,
  and now can tell that a mainline kernel 5.17.7 with all the dkms
  modules that i had before which got compiled automatically at
  installation brings back a "normal" performance.

  I can browse the web, run multiple youtube vids at once, even in
  another browser, have thunderbird running, and a virtualbox machine
  open with another browser for some web app testing and everything runs
  fine and smooth, no lagging.

  Not sure yet what the real reason is - either the kernel version, or a
  patch in the ubuntu version, or the 22.04 kernel config so far, or
  some configuration made in 21.10 that isn't good with 22.04 and it's
  kernel anymore.

  I will go ahead tomorrow and see if I can build a vanilla kernel with
  the config from the ubuntu 22.04 kernel and "make oldconfig", then I
  will be able to tell if only the config is making the difference.

  Please let me know of there is anything I should test to further
  analyze this issue, or any ideas I can try to solve it without having
  to run a mainline manually installed kernel.

  Thanks.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: linux-image-generic 5.15.0.30.33
  ProcVersionSignature: Ubuntu 5.15.0-30.31-generic 5.15.30
  Uname: Linux 5.15.0-30-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.20.11-0ubuntu82
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  henning6198 F pulseaudio
   /dev/snd/controlC1:  henning6198 F pulseaudio
  CasperMD5CheckResult: unknown
  CurrentDesktop: ubuntu:GNOME
  Date: Sat May 14 23:02:38 2022
  InstallationDate: Installed on 2020-04-12 (761 days ago)
  InstallationMedia: Ubuntu 19.10 "Eoan Ermine" - Release amd64 (20191017)
  MachineType: LENOVO 20QV00CEGE
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.15.0-30-generic 
root=/dev/mapper/vgubuntu-root ro
  RelatedPackageVersions:
   linux-restricted-modules-5.15.0-30-generic N/A
   linux-backports-modules-5.15.0-30-generic  N/A
   linux-firmware 20220329.git681281e4-0ubuntu3
  SourcePackage: linux
  UpgradeStatus: Upgraded to jammy on 2022-04-28 (15 days ago)
  dmi.bios.date: 12/06/2021
  dmi.bios.release: 1.42
  dmi.bios.vendor: LENOVO
  dmi.bios.version: N2OET55W (1.42 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 20QV00CEGE
  dmi.board.vendor: LENOVO
  dmi.board.ve

[Kernel-packages] [Bug 1996071] Re: [UBUNTU 20.04] boot: Add s390x secure boot trailer

2022-11-10 Thread Frank Heimes
Test packages were build for F, J and K and are available via this PPA:
https://launchpad.net/~fheimes/+archive/ubuntu/lp1996071

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996071

Title:
  [UBUNTU 20.04] boot: Add s390x secure boot trailer

Status in Ubuntu on IBM z Systems:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  New
Status in linux source package in Jammy:
  New
Status in linux source package in Kinetic:
  New

Bug description:
  SRU Justification:
  ==

  [Impact]

   * Secure boot of Linux on s390x will no longer be possible
 with an upcoming IBM zSystems firmware update.

  [Fix]

   * aa127a069ef3 aa127a069ef312aca02b730d5137e1778d0c3ba7 "s390/boot: add 
secure boot trailer"
 for kinetic and jammy

   * 
https://launchpadlibrarian.net/633020900/0001-s390-boot-add-secure-boot-trailer.patch
 backport for focal

  [Test Plan]

   * An IBM z15 or LinuxONE III LPAR with zFCP/SCSI disk storage is
  required.

   * Ensure that 'Enable Secure Boot for Linux' is marked in case
 'SCSI Load' is selected at the HMCs Load task and Activation Profile.

   * Perform an Ubuntu Server installation, either 20.04 or 22.04
 (latest ISO).
 It will be a secure boot installation by default in case 
 'Enable Secure Boot for Linux' was marked.

   * Check sysfs:
 /sys/firmware/ipl/has_secure
'1' indicates hw support for secure boot, otherwise '0'
 /sys/firmware/ipl/secure
'1' indicates that secure IPL was successful, otherwise '0'

   * Navigate to the HMC task 'System information'
 and check the active firmware release.

   * Ensure that Ubuntu is still bootable in secure-boot mode
 with the updated firmware active,
 by for example doing a reboot after the firmware upgrade.

  [Where problems could occur]

   * The 'trailer' might be broken, invalid or in a wrong format
 and can't be identified or read properly,
 or may cause issues while compressing/decompressing the kernel.

   * In worst case secure boot might become broken,
 even on systems that are still on the unpatched firmware level.

   * Or secure boot will become broken in general.

  [Other Info]

   * The above commit was upstream accepted with v6.1-rc3.

   * And it got tagged for upstream stable with:
 "Cc:  # 5.2+"

   * But since this bug is marked as critical, and the patch is relatively
 short, traceable and s390x-specific, I'll go ahead and submit this
 patch for Jammy and Focal ahead of upstream stable.

   * Since on focal file 'vmlinux.lds.S' is at a different location
 'arch/s390/boot/compressed/' instead of 'arch/s390/boot/'
 and the context is slightly different, the backport is needed.

   * It's planned to have kernel 6.2 in lunar (23.04), hence it will have
 the patch incl. when at the planned target level.

  __

  Description:   boot: Add secure boot trailer
  Symptom:   Secure boot of Linux will no longer be possible with an 
upcoming
     IBM Z firmware update.

  Problem:   New IBM Z firmware requires signed bootable images to contain a
     trailing data block with a specific format.

  Solution:  Add the trailing data block to the Linux kernel image.

  Reproduction:  Apply latest firmware, perform IPL with Secure Boot
  enabled.

  Fix:   available upstream with
  Upstream-ID:   aa127a069ef312aca02b730d5137e1778d0c3ba7

  Preventive:yes

  Date:  2022-10-27
  Author:Peter Oberparleiter 
  Component: kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1996071/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1993665] Re: Update the 470-server NVIDIA driver

2022-11-10 Thread Francis Ginther
Tested bionic, focal and jammy on VMs and a DGX2. All cuda tests passed.

There is no updated kinetic driver, so unable to test there.

** Tags added: verification-done-bionic verification-done-focal
verification-done-jammy verification-failed-kinetic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to nvidia-graphics-drivers-470-server in
Ubuntu.
https://bugs.launchpad.net/bugs/1993665

Title:
  Update the 470-server NVIDIA driver

Status in fabric-manager-470 package in Ubuntu:
  In Progress
Status in libnvidia-nscq-470 package in Ubuntu:
  In Progress
Status in nvidia-graphics-drivers-470-server package in Ubuntu:
  In Progress
Status in fabric-manager-470 source package in Bionic:
  In Progress
Status in libnvidia-nscq-470 source package in Bionic:
  In Progress
Status in nvidia-graphics-drivers-470-server source package in Bionic:
  In Progress
Status in fabric-manager-470 source package in Focal:
  In Progress
Status in libnvidia-nscq-470 source package in Focal:
  In Progress
Status in nvidia-graphics-drivers-470-server source package in Focal:
  In Progress
Status in fabric-manager-470 source package in Jammy:
  In Progress
Status in libnvidia-nscq-470 source package in Jammy:
  In Progress
Status in nvidia-graphics-drivers-470-server source package in Jammy:
  In Progress
Status in fabric-manager-470 source package in Kinetic:
  In Progress
Status in libnvidia-nscq-470 source package in Kinetic:
  In Progress
Status in nvidia-graphics-drivers-470-server source package in Kinetic:
  In Progress

Bug description:
  
  [Impact]
  These releases provide both bug fixes and new features, and we would like to
  make sure all of our users have access to these improvements.

  See the changelog entry below for a full list of changes and bugs.

  [Test Case]
  The following development and SRU process was followed:
  https://wiki.ubuntu.com/NVidiaUpdates

  Certification test suite must pass on a range of hardware:
  https://git.launchpad.net/plainbox-provider-sru/tree/units/sru.pxu

  The QA team that executed the tests will be in charge of attaching the
  artifacts and console output of the appropriate run to the bug. nVidia
  maintainers team members will not mark ‘verification-done’ until this
  has happened.

  [Regression Potential]
  In order to mitigate the regression potential, the results of the
  aforementioned system level tests are attached to this bug.

  [Discussion]

  [Changelog]

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/fabric-manager-470/+bug/1993665/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996217] Re: SIGTRAP on launch 109.0.5396.2-2184

2022-11-10 Thread Nathan Pratta Teodosio
** No longer affects: linux (Ubuntu)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2022-08-26 (76 days ago)
  Inst

[Kernel-packages] [Bug 1996217] acpidump.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "acpidump.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630407/+files/acpidump.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubun

[Kernel-packages] [Bug 1996071] Re: [UBUNTU 20.04] boot: Add s390x secure boot trailer

2022-11-10 Thread Frank Heimes
** Description changed:

+ SRU Justification:
+ ==
+ 
+ [Impact]
+ 
+  * Secure boot of Linux on s390x will no longer be possible
+with an upcoming IBM zSystems firmware update.
+ 
+ [Fix]
+ 
+  * aa127a069ef3 aa127a069ef312aca02b730d5137e1778d0c3ba7 "s390/boot: add 
secure boot trailer"
+for kinetic and jammy
+ 
+  * 
https://launchpadlibrarian.net/633020900/0001-s390-boot-add-secure-boot-trailer.patch
+backport for focal
+ 
+ [Test Plan]
+ 
+  * An IBM z15 or LinuxONE III LPAR with zFCP/SCSI disk storage is
+ required.
+ 
+  * Ensure that 'Enable Secure Boot for Linux' is marked in case
+'SCSI Load' is selected at the HMCs Load task and Activation Profile.
+ 
+  * Perform an Ubuntu Server installation, either 20.04 or 22.04
+(latest ISO).
+It will be a secure boot installation by default in case 
+'Enable Secure Boot for Linux' was marked.
+ 
+  * Check sysfs:
+/sys/firmware/ipl/has_secure
+   '1' indicates hw support for secure boot, otherwise '0'
+/sys/firmware/ipl/secure
+   '1' indicates that secure IPL was successful, otherwise '0'
+ 
+  * Navigate to the HMC task 'System information'
+and check the active firmware release.
+ 
+  * Ensure that Ubuntu is still bootable in secure-boot mode
+with the updated firmware active,
+by for example doing a reboot after the firmware upgrade.
+ 
+ [Where problems could occur]
+ 
+  * The 'trailer' might be broken, invalid or in a wrong format
+and can't be identified or read properly,
+or may cause issues while compressing/decompressing the kernel.
+ 
+  * In worst case secure boot might become broken,
+even on systems that are still on the unpatched firmware level.
+ 
+  * Or secure boot will become broken in general.
+ 
+ [Other Info]
+ 
+  * The above commit was upstream accepted with v6.1-rc3.
+ 
+  * And it got tagged for upstream stable with:
+"Cc:  # 5.2+"
+ 
+  * But since this bug is marked as critical, and the patch is relatively
+short, traceable and s390x-specific, I'll go ahead and submit this
+patch for Jammy and Focal ahead of upstream stable.
+ 
+  * Since on focal file 'vmlinux.lds.S' is at a different location
+'arch/s390/boot/compressed/' instead of 'arch/s390/boot/'
+and the context is slightly different, the backport is needed.
+ 
+  * It's planned to have kernel 6.2 in lunar (23.04), hence it will have
+the patch incl. when at the planned target level.
+ 
+ __
+ 
  Description:   boot: Add secure boot trailer
  Symptom:   Secure boot of Linux will no longer be possible with an 
upcoming
-IBM Z firmware update.
+    IBM Z firmware update.
  
  Problem:   New IBM Z firmware requires signed bootable images to contain a
-trailing data block with a specific format.
+    trailing data block with a specific format.
  
  Solution:  Add the trailing data block to the Linux kernel image.
  
  Reproduction:  Apply latest firmware, perform IPL with Secure Boot
  enabled.
  
  Fix:   available upstream with
  Upstream-ID:   aa127a069ef312aca02b730d5137e1778d0c3ba7
  
  Preventive:yes
  
  Date:  2022-10-27
  Author:Peter Oberparleiter 
  Component: kernel

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996071

Title:
  [UBUNTU 20.04] boot: Add s390x secure boot trailer

Status in Ubuntu on IBM z Systems:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  New
Status in linux source package in Jammy:
  New
Status in linux source package in Kinetic:
  New

Bug description:
  SRU Justification:
  ==

  [Impact]

   * Secure boot of Linux on s390x will no longer be possible
 with an upcoming IBM zSystems firmware update.

  [Fix]

   * aa127a069ef3 aa127a069ef312aca02b730d5137e1778d0c3ba7 "s390/boot: add 
secure boot trailer"
 for kinetic and jammy

   * 
https://launchpadlibrarian.net/633020900/0001-s390-boot-add-secure-boot-trailer.patch
 backport for focal

  [Test Plan]

   * An IBM z15 or LinuxONE III LPAR with zFCP/SCSI disk storage is
  required.

   * Ensure that 'Enable Secure Boot for Linux' is marked in case
 'SCSI Load' is selected at the HMCs Load task and Activation Profile.

   * Perform an Ubuntu Server installation, either 20.04 or 22.04
 (latest ISO).
 It will be a secure boot installation by default in case 
 'Enable Secure Boot for Linux' was marked.

   * Check sysfs:
 /sys/firmware/ipl/has_secure
'1' indicates hw support for secure boot, otherwise '0'
 /sys/firmware/ipl/secure
'1' indicates that secure IPL was successful, otherwise '0'

   * Navigate to the HMC task 'System information'
 and check the active firmware release.

   * Ensure that Ubuntu is still bootable in secure-boot mode
 with the up

[Kernel-packages] [Bug 1996217] ProcCpuinfo.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "ProcCpuinfo.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630400/+files/ProcCpuinfo.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop

[Kernel-packages] [Bug 1996217] ProcEnviron.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "ProcEnviron.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630402/+files/ProcEnviron.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop

[Kernel-packages] [Bug 1996217] Lsusb-v.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "Lsusb-v.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630399/+files/Lsusb-v.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu

[Kernel-packages] [Bug 1996217] Lsusb.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "Lsusb.txt"
   https://bugs.launchpad.net/bugs/1996217/+attachment/5630397/+files/Lsusb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOM

[Kernel-packages] [Bug 1996217] Lsusb-t.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "Lsusb-t.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630398/+files/Lsusb-t.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu

[Kernel-packages] [Bug 1996217] WifiSyslog.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "WifiSyslog.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630406/+files/WifiSyslog.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: 

[Kernel-packages] [Bug 1996217] ProcInterrupts.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "ProcInterrupts.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630403/+files/ProcInterrupts.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentD

[Kernel-packages] [Bug 1996217] ProcModules.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "ProcModules.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630404/+files/ProcModules.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop

[Kernel-packages] [Bug 1996217] UdevDb.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "UdevDb.txt"
   https://bugs.launchpad.net/bugs/1996217/+attachment/5630405/+files/UdevDb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GN

[Kernel-packages] [Bug 1996217] ProcCpuinfoMinimal.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "ProcCpuinfoMinimal.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630401/+files/ProcCpuinfoMinimal.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  

[Kernel-packages] [Bug 1996217] Lspci-vt.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "Lspci-vt.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630396/+files/Lspci-vt.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubun

[Kernel-packages] [Bug 1996217] Lspci.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "Lspci.txt"
   https://bugs.launchpad.net/bugs/1996217/+attachment/5630395/+files/Lspci.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOM

[Kernel-packages] [Bug 1996217] CurrentDmesg.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "CurrentDmesg.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630393/+files/CurrentDmesg.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDeskt

[Kernel-packages] [Bug 1996217] IwConfig.txt

2022-11-10 Thread Bram Stolk
apport information

** Attachment added: "IwConfig.txt"
   
https://bugs.launchpad.net/bugs/1996217/+attachment/5630394/+files/IwConfig.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  
  SNAPPY DEBUG
  

  $ snappy-debug
  INFO: Following '/var/log/syslog'. If have dropped messages, use:
  INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
  = Seccomp =
  Time: Nov 10 09:48:03
  Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
  Syscall: pkey_mprotect


  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  stolk  2044 F wireplumber
   /dev/snd/controlC1:  stolk  2044 F wireplumber
   /dev/snd/seq:stolk  2041 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubun

[Kernel-packages] [Bug 1996217] Re: SIGTRAP on launch 109.0.5396.2-2184

2022-11-10 Thread Bram Stolk
apport information

** Description changed:

  I installed chromium snap from edge channel:
  
  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)
  
  ==
  STRACE
  ==
- 
  
  When I run it through strace, the last system calls are:
  
  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap
  
- 
  ===
  JOURNAL
  ===
  
  And the journal entries during launch:
  
  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  
  
+ 
+ SNAPPY DEBUG
+ 
+ 
+ $ snappy-debug
+ INFO: Following '/var/log/syslog'. If have dropped messages, use:
+ INFO: $ sudo journalctl --output=short --follow --all | sudo snappy-debug
+ = Seccomp =
+ Time: Nov 10 09:48:03
+ Log: auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=60371 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e 329(pkey_mprotect) compat=0 ip=0x7f739326773d code=0x5
+ Syscall: pkey_mprotect
+ 
+ 
+ 
  =
  SPECS
  =
  
  OS: Ubuntu 22.10
  
  Kernel: 5.19.0-21-generic
  
  CPU: 12600k
  
  snap: 109.0.5396.2  2184   latest/edge  canonical✓

** Tags added: apport-collected kinetic wayland-session

** Description changed:

  I installed chromium snap from edge channel:
  
  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)
  
  ==
  STRACE
  ==
  
  When I run it through strace, the last system calls are:
  
  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_R

[Kernel-packages] [Bug 1991676] Re: Package grub-efi-arm64-signed 1.173.2~18.04.1+2.04-1ubuntu47.4 from bionic-proposed fails to install/upgrade (grub-install: error: efibootmgr: not found.)

2022-11-10 Thread Francis Ginther
@juliank, ah, I found another detail. This appears to only break when
the package is updated in the ADT testbed. My assumption is if the
latest package version is already in the base image, there is no package
update and therefore no breakage. For example:

[1] older image, fails: 
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/arm64/d/dpdk/20221027_190645_aae03@/log.gz
[2] newer image, passes: 
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/arm64/d/dpdk/20221028_185258_2a00f@/log.gz

The second run occurred about a day later. I can't tell if this is using
a new image, but when I inspected the artifacts from the run. I do see
`grub-efi-arm64-bin 2.04-1ubuntu47.4`, which is the latest and the
version that [1] tried to upgrade to.

So I guess we generally avoid this by refreshing the ADT base images.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-hwe-5.4 in Ubuntu.
https://bugs.launchpad.net/bugs/1991676

Title:
  Package grub-efi-arm64-signed 1.173.2~18.04.1+2.04-1ubuntu47.4 from
  bionic-proposed fails to install/upgrade (grub-install: error:
  efibootmgr: not found.)

Status in ubuntu-kernel-tests:
  New
Status in grub2-signed package in Ubuntu:
  Invalid
Status in linux-hwe-5.4 package in Ubuntu:
  Confirmed
Status in grub2-signed source package in Bionic:
  Triaged
Status in linux-hwe-5.4 source package in Bionic:
  Confirmed

Bug description:
  The ADT tests for arm64 kernels in Bionic are failing during the setup
  phase with the following errors:

  Setting up grub-efi-arm64-signed (1.173.2~18.04.1+2.04-1ubuntu47.4) ...
  Installing for arm64-efi platform.
  grub-install: error: efibootmgr: not found.
  dpkg: error processing package grub-efi-arm64-signed (--configure):
   installed grub-efi-arm64-signed package post-installation script subprocess 
returned error exit status 1
  Setting up libx11-6:arm64 (2:1.6.4-3ubuntu0.5) ...
  Processing triggers for man-db (2.8.3-2ubuntu0.1) ...
  Processing triggers for libc-bin (2.27-3ubuntu1.6) ...
  Errors were encountered while processing:
   grub-efi-arm64-signed
  E: Sub-process /usr/bin/dpkg returned an error code (1)
  blame: 
  badpkg: testbed setup commands failed with status 100
  autopkgtest [15:12:03]: ERROR: erroneous package: testbed setup commands 
failed with status 100

  ADT test log:
  
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/arm64/l/linux-hwe-5.4/20220930_151219_13ac3@/log.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1991676/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996217] Missing required logs.

2022-11-10 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1996217

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New
Status in linux package in Ubuntu:
  Incomplete

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  
  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  
  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1996217/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996071] Re: [UBUNTU 20.04] boot: Add s390x secure boot trailer

2022-11-10 Thread Frank Heimes
** Summary changed:

- [UBUNTU 20.04] boot: Add secure boot trailer
+ [UBUNTU 20.04] boot: Add s390x secure boot trailer

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996071

Title:
  [UBUNTU 20.04] boot: Add s390x secure boot trailer

Status in Ubuntu on IBM z Systems:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  New
Status in linux source package in Jammy:
  New
Status in linux source package in Kinetic:
  New

Bug description:
  Description:   boot: Add secure boot trailer
  Symptom:   Secure boot of Linux will no longer be possible with an 
upcoming
 IBM Z firmware update.

  Problem:   New IBM Z firmware requires signed bootable images to contain a
 trailing data block with a specific format.

  Solution:  Add the trailing data block to the Linux kernel image.

  Reproduction:  Apply latest firmware, perform IPL with Secure Boot
  enabled.

  Fix:   available upstream with
  Upstream-ID:   aa127a069ef312aca02b730d5137e1778d0c3ba7

  Preventive:yes

  Date:  2022-10-27
  Author:Peter Oberparleiter 
  Component: kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1996071/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989944] Re: [22.04/Jammy] Replace SAUCE AMD DP tunneling patch by upstream version

2022-11-10 Thread Stefan Bader
** Description changed:

- We applied a set of patches early as the upstreaming got delayed. The
- patch now is in linux-next on its way into upstream linux. When that
- happens we want to replace the SAUCE patch by its upstream version (for
- example to get security checks right).
+ [SRU Justification]
  
- “UBUNTU: SAUCE: thunderbolt: Add DP out resource when DP tunnel is
- discovered.”
+ == Impact ==
+ We applied a set of patches early as the upstreaming got delayed. The patch 
now is in upstream linux. Since it differs somewhat from the patch we carry and 
in order to get potential security and other updates right, we want to replace 
the SAUCE patch by its upstream counterpart.
  
-  to be replaced by:
+ == Fix ==
+ “UBUNTU: SAUCE: thunderbolt: Add DP out resource when DP tunnel is 
discovered.”
+  to be replaced by:
+ commit b60e31bf18a7064032dbcb73dcb5b58f8a00a110 linux-next
+  “thunderbolt: Add DP OUT resource when DP tunnel is discovered”
  
- commit b60e31bf18a7064032dbcb73dcb5b58f8a00a110 linux-next
-  “thunderbolt: Add DP OUT resource when DP tunnel is discovered”
+ == Testcase ==
+ Attach external Monitor via Thunderbolt port (AMD GPU) (Reference: bug 
1983143)
  
- By now it is confirmed that the patch in linux-next is somehow different
- from the one we carry. But to be on the safe side we should wait until
- it is really upstream and maybe give a little time to settle before
- actually changing things.
+ == Regression Potential ==
+ Previously working external connections might no longer work.

** Changed in: linux (Ubuntu Jammy)
   Status: Confirmed => In Progress

** Changed in: linux (Ubuntu Jammy)
 Assignee: (unassigned) => Stefan Bader (smb)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989944

Title:
  [22.04/Jammy] Replace SAUCE AMD DP tunneling patch by upstream version

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Jammy:
  In Progress

Bug description:
  [SRU Justification]

  == Impact ==
  We applied a set of patches early as the upstreaming got delayed. The patch 
now is in upstream linux. Since it differs somewhat from the patch we carry and 
in order to get potential security and other updates right, we want to replace 
the SAUCE patch by its upstream counterpart.

  == Fix ==
  “UBUNTU: SAUCE: thunderbolt: Add DP out resource when DP tunnel is 
discovered.”
   to be replaced by:
  commit b60e31bf18a7064032dbcb73dcb5b58f8a00a110 linux-next
   “thunderbolt: Add DP OUT resource when DP tunnel is discovered”

  == Testcase ==
  Attach external Monitor via Thunderbolt port (AMD GPU) (Reference: bug 
1983143)

  == Regression Potential ==
  Previously working external connections might no longer work.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1989944/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991676] Re: Package grub-efi-arm64-signed 1.173.2~18.04.1+2.04-1ubuntu47.4 from bionic-proposed fails to install/upgrade (grub-install: error: efibootmgr: not found.)

2022-11-10 Thread Julian Andres Klode
Well surely not more than the past year, this is not a new bug after
all, the regression was introduced with the initial boothole update when
we did the one grub split.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-hwe-5.4 in Ubuntu.
https://bugs.launchpad.net/bugs/1991676

Title:
  Package grub-efi-arm64-signed 1.173.2~18.04.1+2.04-1ubuntu47.4 from
  bionic-proposed fails to install/upgrade (grub-install: error:
  efibootmgr: not found.)

Status in ubuntu-kernel-tests:
  New
Status in grub2-signed package in Ubuntu:
  Invalid
Status in linux-hwe-5.4 package in Ubuntu:
  Confirmed
Status in grub2-signed source package in Bionic:
  Triaged
Status in linux-hwe-5.4 source package in Bionic:
  Confirmed

Bug description:
  The ADT tests for arm64 kernels in Bionic are failing during the setup
  phase with the following errors:

  Setting up grub-efi-arm64-signed (1.173.2~18.04.1+2.04-1ubuntu47.4) ...
  Installing for arm64-efi platform.
  grub-install: error: efibootmgr: not found.
  dpkg: error processing package grub-efi-arm64-signed (--configure):
   installed grub-efi-arm64-signed package post-installation script subprocess 
returned error exit status 1
  Setting up libx11-6:arm64 (2:1.6.4-3ubuntu0.5) ...
  Processing triggers for man-db (2.8.3-2ubuntu0.1) ...
  Processing triggers for libc-bin (2.27-3ubuntu1.6) ...
  Errors were encountered while processing:
   grub-efi-arm64-signed
  E: Sub-process /usr/bin/dpkg returned an error code (1)
  blame: 
  badpkg: testbed setup commands failed with status 100
  autopkgtest [15:12:03]: ERROR: erroneous package: testbed setup commands 
failed with status 100

  ADT test log:
  
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/arm64/l/linux-hwe-5.4/20220930_151219_13ac3@/log.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1991676/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996217] Re: SIGTRAP on launch 109.0.5396.2-2184

2022-11-10 Thread Nathan Pratta Teodosio
I'm targeting this to Linux too as I suspect it's kernel related. I may
be wrong.

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996217

Title:
  SIGTRAP on launch 109.0.5396.2-2184

Status in chromium-browser package in Ubuntu:
  New
Status in linux package in Ubuntu:
  New

Bug description:
  I installed chromium snap from edge channel:

  $ snap refresh --amend --channel edge chromium
  chromium (edge) 109.0.5396.2 from Canonical✓ refreshed
  $ chromium
  Trace/breakpoint trap (core dumped)

  ==
  STRACE
  ==

  
  When I run it through strace, the last system calls are:

  ...
  mprotect(0x560c91e2d000, 8187904, PROT_READ) = 0
  mprotect(0x7f9013377000, 4096, PROT_READ) = 0
  munmap(0x7f9012e3e000, 91649)   = 0
  set_tid_address(0x7f9010ae0110) = 55209
  set_robust_list(0x7f9010ae0120, 24) = 0
  rt_sigaction(SIGRTMIN, {sa_handler=0x7f9012e1bbf0, sa_mask=[], 
sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 8) = 0
  rt_sigaction(SIGRT_1, {sa_handler=0x7f9012e1bc90, sa_mask=[], 
sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f9012e29420}, NULL, 
8) = 0
  rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
  prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
  futex(0x7f9012e3d0c8, FUTEX_WAKE_PRIVATE, 2147483647) = 0
  getrandom("\x74\xd0\x85\x97\x19\x76\xcf\x4a", 8, 0) = 8
  getrandom("\x0b\x28\x11\x02\x4b\x2b\x50\xce", 8, 0) = 8
  mmap(0x27d4, 17179869184, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x27d4
  mmap(0x2e43f000, 17179873280, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 
0) = 0x2e43f000
  pkey_mprotect(0x27d400201000, 4096, PROT_READ|PROT_WRITE, 0) = -1 EPERM 
(Operation not permitted)
  --- SIGTRAP {si_signo=SIGTRAP, si_code=SI_KERNEL} ---
  +++ killed by SIGTRAP (core dumped) +++
  error: signal: trace/breakpoint trap

  
  ===
  JOURNAL
  ===

  And the journal entries during launch:

  Nov 10 08:24:02 workpc systemd[1949]: Started Application launched by 
gnome-shell.
  Nov 10 08:24:02 workpc systemd[1949]: Started VTE child process 54818 
launched by gnome-terminal-server process 40213.
  Nov 10 08:24:09 workpc systemd[1949]: Started 
snap.chromium.chromium.414af9f4-295b-44f0-976c-4abb39846b28.scope.
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:548): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=12  capname="net_admin"
  Nov 10 08:24:09 workpc kernel: audit: type=1400 audit(1668097449.379:549): 
apparmor="DENIED" operation="capable" class="cap" 
profile="/usr/lib/snapd/snap-confine" pid=54829 comm="snap-confine" 
capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: AVC apparmor="DENIED" 
operation="capable" class="cap" profile="/usr/lib/snapd/snap-confine" pid=54829 
comm="snap-confine" capability=38  capname="perfmon"
  Nov 10 08:24:09 workpc audit[54829]: SECCOMP auid=1000 uid=1000 gid=1000 
ses=2 subj=snap.chromium.chromium pid=54829 comm="chrome" 
exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 arch=c03e 
syscall=329 compat=0 ip=0x7f3259ae573d code=0x5
  Nov 10 08:24:09 workpc kernel: traps: chrome[54829] trap int3 ip:558e4009f96e 
sp:7fff421fe9f0 error:0 in chrome[558e3fecb000+a1b2000]
  Nov 10 08:24:09 workpc kernel: audit: type=1326 audit(1668097449.439:550): 
auid=1000 uid=1000 gid=1000 ses=2 subj=snap.chromium.chromium pid=54829 
comm="chrome" exe="/snap/chromium/2184/usr/lib/chromium-browser/chrome" sig=0 
arch=c03e syscall=329 compat=0 ip=0x7f3259ae573d code=0x5

  
  =
  SPECS
  =

  OS: Ubuntu 22.10

  Kernel: 5.19.0-21-generic

  CPU: 12600k

  snap: 109.0.5396.2  2184   latest/edge  canonical✓

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1996217/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991676] Re: Package grub-efi-arm64-signed 1.173.2~18.04.1+2.04-1ubuntu47.4 from bionic-proposed fails to install/upgrade (grub-install: error: efibootmgr: not found.)

2022-11-10 Thread Francis Ginther
@juliank Hello, I see that you picked up
https://bugs.launchpad.net/ubuntu/+source/linux-hwe-5.4/+bug/1991676. I
just want to mention so that you are aware, that this is blocking most,
if not all, kernel ADT testing on bionic arm64.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-hwe-5.4 in Ubuntu.
https://bugs.launchpad.net/bugs/1991676

Title:
  Package grub-efi-arm64-signed 1.173.2~18.04.1+2.04-1ubuntu47.4 from
  bionic-proposed fails to install/upgrade (grub-install: error:
  efibootmgr: not found.)

Status in ubuntu-kernel-tests:
  New
Status in grub2-signed package in Ubuntu:
  Invalid
Status in linux-hwe-5.4 package in Ubuntu:
  Confirmed
Status in grub2-signed source package in Bionic:
  Triaged
Status in linux-hwe-5.4 source package in Bionic:
  Confirmed

Bug description:
  The ADT tests for arm64 kernels in Bionic are failing during the setup
  phase with the following errors:

  Setting up grub-efi-arm64-signed (1.173.2~18.04.1+2.04-1ubuntu47.4) ...
  Installing for arm64-efi platform.
  grub-install: error: efibootmgr: not found.
  dpkg: error processing package grub-efi-arm64-signed (--configure):
   installed grub-efi-arm64-signed package post-installation script subprocess 
returned error exit status 1
  Setting up libx11-6:arm64 (2:1.6.4-3ubuntu0.5) ...
  Processing triggers for man-db (2.8.3-2ubuntu0.1) ...
  Processing triggers for libc-bin (2.27-3ubuntu1.6) ...
  Errors were encountered while processing:
   grub-efi-arm64-signed
  E: Sub-process /usr/bin/dpkg returned an error code (1)
  blame: 
  badpkg: testbed setup commands failed with status 100
  autopkgtest [15:12:03]: ERROR: erroneous package: testbed setup commands 
failed with status 100

  ADT test log:
  
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/arm64/l/linux-hwe-5.4/20220930_151219_13ac3@/log.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1991676/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996198] Re: Fix rfkill causing soft blocked wifi

2022-11-10 Thread Stefan Bader
** Changed in: linux (Ubuntu Kinetic)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Kinetic)
   Status: Confirmed => Fix Committed

** Changed in: linux (Ubuntu Jammy)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Jammy)
   Status: Confirmed => Fix Committed

** Changed in: linux (Ubuntu Focal)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Focal)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996198

Title:
  Fix rfkill causing soft blocked wifi

Status in linux package in Ubuntu:
  In Progress
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Fix Committed
Status in linux-oem-6.0 source package in Focal:
  Invalid
Status in linux source package in Jammy:
  Fix Committed
Status in linux-oem-6.0 source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  Fix Committed
Status in linux-oem-6.0 source package in Kinetic:
  Invalid

Bug description:
  [Impact]
  Need this patch in so a BIOS upgrade won't cause issues on HP laptops.

  commit 1598bfa8e1faa932de42e1ee7628a1c4c4263f0a
  Author: Jorge Lopez 
  Date:   Fri Oct 28 10:55:27 2022 -0500

   platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi

  After upgrading BIOS to U82 01.02.01 Rev.A, the console is flooded
  strange char "^@" which printed out every second and makes login
  nearly impossible. Also the below messages were shown both in console
  and journal/dmesg every second:

  usb 1-3: Device not responding to setup address.
  usb 1-3: device not accepting address 4, error -71
  usb 1-3: device descriptor read/all, error -71
  usb usb1-port3: unable to enumerate USB device

  Wifi is soft blocked by checking rfkill. When unblocked manually,
  after few seconds it would be soft blocked again. So I was suspecting
  something triggered rfkill to soft block wifi.  At the end it was
  fixed by removing hp_wmi module.

  The root cause is the way hp-wmi driver handles command 1B on
  post-2009 BIOS.  In pre-2009 BIOS, command 1Bh return 0x4 to indicate
  that BIOS no longer controls the power for the wireless devices.

  Signed-off-by: Jorge Lopez 
  Link: https://bugzilla.kernel.org/show_bug.cgi?id=216468
  Reviewed-by: Mario Limonciello 
  Link: https://lore.kernel.org/r/20221028155527.7724-1-jorge.lop...@hp.com
  Cc: sta...@vger.kernel.org
  Reviewed-by: Hans de Goede 
  Signed-off-by: Hans de Goede 

  [Test case]

  test on a HP laptop with the new BIOS

  [Where problems could occur]

  from the commit:
    * In pre-2009 BIOS, command 1Bh return 0x4 to indicate that
    * BIOS no longer controls the power for the wireless
    * devices. All features supported by this command will no
    * longer be supported.

  anyone running a laptop with obsolete pre-2009 BIOS probably won't
  notice the missing feature at this point.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996198/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988018] Re: [mlx5] Intermittent VF-LAG activation failure

2022-11-10 Thread Lukas Märdian
** Tags removed: foundations-triage-discuss

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988018

Title:
  [mlx5] Intermittent VF-LAG activation failure

Status in linux package in Ubuntu:
  Fix Committed
Status in netplan.io package in Ubuntu:
  Triaged
Status in linux source package in Jammy:
  New
Status in netplan.io source package in Jammy:
  New
Status in linux source package in Kinetic:
  Fix Committed
Status in netplan.io source package in Kinetic:
  Triaged

Bug description:
  During system initialization there is a specific sequence that must be
  followed to enable the use of hardware offload and VF-LAG.

  Intermittently one may see that VF-LAG initialization fails:
  [Thu Jul 21 10:54:58 2022] mlx5_core :08:00.0: lag map port 1:1 port 2:2 
shared_fdb:1
  [Thu Jul 21 10:54:58 2022] mlx5_core :08:00.0: mlx5_cmd_check:782:(pid 
9): CREATE_LAG(0x840) op_mod(0x0) failed, status bad parameter(0x3), syndrome 
(0x7d49cb)
  [Thu Jul 21 10:54:58 2022] mlx5_core :08:00.0: mlx5_create_lag:248:(pid 
9): Failed to create LAG (-22)
  [Thu Jul 21 10:54:58 2022] mlx5_core :08:00.0: mlx5_activate_lag:288:(pid 
9): Failed to activate VF LAG
 Make sure all VFs are unbound prior to VF LAG 
activation or deactivation

  This is caused by rebinding the driver prior to the VF lag being
  ready.

  A sysfs knob has recently been added to the driver [0] and we should
  monitor it before attempting to rebind the driver:

  $ cat /sys/kernel/debug/mlx5/\:08\:00.0/lag/state

  The kernel feature is available in the upcoming Kinetic 5.19 kernel
  and we should probably backport it to the Jammy 5.15 kernel.

  0:
  
https://github.com/torvalds/linux/commit/7f46a0b7327ae261f9981888708dbca22c283900

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988018/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1994601] Comment bridged from LTC Bugzilla

2022-11-10 Thread bugproxy
--- Comment From mihaj...@de.ibm.com 2022-11-10 11:26 EDT---
I re-ran the installation as described above and now I was able to boot the VM. 
Thanks!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1994601

Title:
  [UBUNTU 18.04] Ubuntu 18.04 kernel 4.15.0-194 crashes on IPL

Status in Ubuntu on IBM z Systems:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  Fix Released

Bug description:
  SRU Justification:
  ==

  [ Impact ]

   * Ubuntu 18.04 / bionic installations with latest kernel 4.15.0-194
 are no longer able to IPL (boot) on IBM z14 or newer hardware.

   * This issue got introduced by upstream commit e4f74400308c
 "s390/archrandom: simplify back to earlier design and initialize earlier"
 that was SRUed to 18.04/bionic based on LP#1989625,
 which made changes in the s390s IPL/boot area of kernel/arch/random.

   * The reason seems to be that the bad patch moves the decision about
 if arch randomness is available to setup.c function setup_randomness().
 This code uses a static_key s390_arch_random_available.
 But in the Canonical kernel the initialization function
 for the jump labels (where the static keys are based on)
 jump_label_init() is called in generic start_kernel()
 wheres in the upstream kernel the init function is
 called early in setup_arch().

   * Reverting this commit from bionic master-next makes bionic systems
 again bootable.
 (https://launchpad.net/~fheimes/+archive/ubuntu/test/)

  [ Test Plan ]

   * An IBM z14 or LinuxONE II or newer system is needed.

   * Now install latest bionic on that system - doesn't if it's on LPAR, 
 z/VM or KVM.

   * After the installation (an the trigger of the post install reboot),
 the system will not come up.

   * To test a patched kernel with e4f74400308c can be tested in the
 following way:

   * Install 18.04 GA and prevent it from doing any kernel updates.

   * Means, install in 'island' mode
 or select in d-i 'Advanced Installation'
 and explicitly choose '4.15.0-50 generic' to install.

   * That allows the system to come up and to update the kernel to
 a modified one.

   * Then reboot and verify if the system comes up properly.

  [ Where problems could occur ]

   * Problems could occur due to the fact that the commit
 was not cleanly reversible because of minor context changes.

   * Adjustments that were needed might break other things if not
 done carefully.

   * Further commits (applied after e4f74400308c) may still rely
 on the bad e4f74400308c commit - or even further patches
 (from upstream stable).

   * In worst case IPL / boot might get broken,
 even on hardware older than z14.

   * If the revert works fine can be easily tested and was tested based on
 https://launchpad.net/~fheimes/+archive/ubuntu/test/
 and the above test plan.

  [ Other Info ]
   
   * Ubuntu 20.04 (focal, using legacy image with virt-install)
 was tested as well, but is not affected by this issue.
  __

  ---Problem Description---
  Ubuntu 18.04 crashes during IPL with no output on the console.

  Contact Information = Viktor Mihajlovski 

  ---uname output---
  n/a

  Machine Type = 3096

  ---Debugger---
  A debugger is not configured

  ---Steps to Reproduce---
   Install Ubuntu 18.04 as a KVM guest using the following command:

  virt-install -n bionic --cdrom
  /var/lib/libvirt/images/ubuntu-18.04.5-server-s390x.iso --memory 2048
  --disk size=8

  then reboot.

  Stack trace output:
   no

  Oops output:
   no

  == Comment: #1 - Viktor Mihajlovski  - 2022-10-25 
10:48:30 ==
  Installing under z/VM leads to the same failure.

  == Comment: #2 - Viktor Mihajlovski  - 2022-10-25 
10:55:10 ==
  I have captured a dump using virsh dump --memory-only. The output of crash 
log is uploaded

  == Comment: #7 - Harald Freudenberger  - 2022-10-26 
07:33:52 ==
  Looks like all ubuntu 18.04 installations on s390 are not working any more.
  It is not an issue with z14 but z17 also fails to run a fresh installed 
ubuntu 18.04.

  == Comment: #8 - Harald Freudenberger  - 2022-10-26 
08:25:52 ==
  when I use the 'advanced installation' where I am able to choose the kernel 
package and then choose the 4.15.0-50 generic the installed Ubuntu 18.04 comes 
up fine. So this issue is somewhere between kernel 4.15.0-50 and 4.15.0-194.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1994601/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1995453] Re: Add some ACPI device IDs for Intel HID device

2022-11-10 Thread Timo Aaltonen
** Changed in: linux-oem-6.0 (Ubuntu Jammy)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.17 in Ubuntu.
https://bugs.launchpad.net/bugs/1995453

Title:
  Add some ACPI device IDs for Intel HID device

Status in HWE Next:
  New
Status in OEM Priority Project:
  New
Status in linux package in Ubuntu:
  Triaged
Status in linux-oem-5.17 package in Ubuntu:
  Invalid
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  New
Status in linux-oem-5.17 source package in Jammy:
  Fix Released
Status in linux-oem-6.0 source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  New
Status in linux-oem-5.17 source package in Kinetic:
  Invalid
Status in linux-oem-6.0 source package in Kinetic:
  Invalid

Bug description:
  [Impact]
  Add the ACPI devices IDs for Intel JasonLake, MeteorLake and RaptorLake

  [Fix]
  ACPI devices IDs are add the the related Intel HID devices on these platforms 
can work.

  [Test]
  Verified the Intel HID events can work such as power button for suspend and 
wake.
   
  [Where problems could occur]
  Add the ACPI device IDs for support Intel HID devices, so chance of problems 
should be low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1995453/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996198] Re: Fix rfkill causing soft blocked wifi

2022-11-10 Thread Timo Aaltonen
** Changed in: linux-oem-6.0 (Ubuntu Jammy)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996198

Title:
  Fix rfkill causing soft blocked wifi

Status in linux package in Ubuntu:
  In Progress
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Confirmed
Status in linux-oem-6.0 source package in Focal:
  Invalid
Status in linux source package in Jammy:
  Confirmed
Status in linux-oem-6.0 source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  Confirmed
Status in linux-oem-6.0 source package in Kinetic:
  Invalid

Bug description:
  [Impact]
  Need this patch in so a BIOS upgrade won't cause issues on HP laptops.

  commit 1598bfa8e1faa932de42e1ee7628a1c4c4263f0a
  Author: Jorge Lopez 
  Date:   Fri Oct 28 10:55:27 2022 -0500

   platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi

  After upgrading BIOS to U82 01.02.01 Rev.A, the console is flooded
  strange char "^@" which printed out every second and makes login
  nearly impossible. Also the below messages were shown both in console
  and journal/dmesg every second:

  usb 1-3: Device not responding to setup address.
  usb 1-3: device not accepting address 4, error -71
  usb 1-3: device descriptor read/all, error -71
  usb usb1-port3: unable to enumerate USB device

  Wifi is soft blocked by checking rfkill. When unblocked manually,
  after few seconds it would be soft blocked again. So I was suspecting
  something triggered rfkill to soft block wifi.  At the end it was
  fixed by removing hp_wmi module.

  The root cause is the way hp-wmi driver handles command 1B on
  post-2009 BIOS.  In pre-2009 BIOS, command 1Bh return 0x4 to indicate
  that BIOS no longer controls the power for the wireless devices.

  Signed-off-by: Jorge Lopez 
  Link: https://bugzilla.kernel.org/show_bug.cgi?id=216468
  Reviewed-by: Mario Limonciello 
  Link: https://lore.kernel.org/r/20221028155527.7724-1-jorge.lop...@hp.com
  Cc: sta...@vger.kernel.org
  Reviewed-by: Hans de Goede 
  Signed-off-by: Hans de Goede 

  [Test case]

  test on a HP laptop with the new BIOS

  [Where problems could occur]

  from the commit:
    * In pre-2009 BIOS, command 1Bh return 0x4 to indicate that
    * BIOS no longer controls the power for the wireless
    * devices. All features supported by this command will no
    * longer be supported.

  anyone running a laptop with obsolete pre-2009 BIOS probably won't
  notice the missing feature at this point.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996198/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1993240] Re: amd_sfh modprobe fails when no sensor reported from AMD MP2

2022-11-10 Thread Timo Aaltonen
** Changed in: linux-oem-6.0 (Ubuntu Jammy)
   Status: In Progress => Fix Committed

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Jammy)
   Status: New => Invalid

** Changed in: linux (Ubuntu Kinetic)
   Status: New => Invalid

** Changed in: linux (Ubuntu)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-6.0 in Ubuntu.
https://bugs.launchpad.net/bugs/1993240

Title:
  amd_sfh modprobe fails when no sensor reported from AMD MP2

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Fix Committed
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Invalid
Status in linux-oem-6.0 source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  Invalid
Status in linux-oem-6.0 source package in Kinetic:
  Invalid

Bug description:
  [SRU Justification]

  [Impact]

  Some AMD platforms might not have sensor reported from MP2 controller,
  and that fails device init.

  [Fix]

  Two commits targeting v6.1 release in mainline kernel.

  [Test Case]

  On such platforms, driver loading should be bailed out with:

$ sudo dmesg | grep amd_sfh1_1_hid_client_init
[ 1.204896] pcie_mp2_amd :62:00.7: amd_sfh1_1_hid_client_init failed

  [Where problems could occur]

  This skips driver loading against ineffective hardware only.

  [Other Info]

  While this targets oem-6.0 and above, and is already in mainline
  v6.1-rc1, only oem-6.0 is nominated for fix.

  == original bug report ==

  Fix amd_sfh to make each sensor with proper initialization & resource
  allocation during MP2 loaded.

  To be in v6.1

  https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-
  next.git/commit/drivers/hid/amd-sfh-
  hid?h=next-20221010&id=68266bdcceec10ea364e62c63732cd6fe5a256a8

  https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-
  next.git/commit/drivers/hid/amd-sfh-
  hid?h=next-20221010&id=beb18bb22cd4fb88648bb2925d56f36131c1ac21

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1993240/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1990700] Re: Fibocom WWAN FM350-GL suspend error (notebook not suspend)

2022-11-10 Thread Timo Aaltonen
** Changed in: linux-oem-6.0 (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-6.0 in Ubuntu.
https://bugs.launchpad.net/bugs/1990700

Title:
   Fibocom WWAN FM350-GL suspend error (notebook not suspend)

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  In Progress
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Invalid
Status in linux-oem-6.0 source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  In Progress
Status in linux-oem-6.0 source package in Kinetic:
  Invalid
Status in linux source package in Lunar:
  In Progress
Status in linux-oem-6.0 source package in Lunar:
  Invalid

Bug description:
  [SRU Justification]

  [Impact]

  Fibocom WWAN FM350-GL equipped platform fails to suspend.

  [Fix]

  Full t7xx driver is still under development and some of them have
  already accepted and merged in mainline kernel. The following commits
  are once in the mainline and are reverted in v6.0:

    d20ef656f994 net: wwan: t7xx: Add AP CLDMA
    007f26f0d68e net: wwan: t7xx: Infrastructure for early port configuration
    140424d90165 net: wwan: t7xx: PCIe reset rescan
    87dae9e70bf7 net: wwan: t7xx: Enable devlink based fw flashing and
     coredump collection

  The first patch implemented the other AP-CLDMA, and with that applied,
  platforms in question may suspend and resume normally as every bits are in 
position.

  However, while these patches had been reverted for another revision
  that is still being worked on by the hardware vendor, a minimum,
  sauced patch is created to work-around this first to meet project
  schedules, and will be reverted and superseded with a final, mainline
  landing revision.

  [Test Case]

  Trigger suspend and there should be no more suspend errors from t7xx:

    mtk_t7xx :58:00.0: [PM] SAP suspend error: -110
    mtk_t7xx :58:00.0: PM: pci_pm_suspend(): t7xx_pci_pm_suspend+0x0/0x20 
[mtk_t7xx] returns -110
    mtk_t7xx :58:00.0: PM: dpm_run_callback(): pci_pm_suspend+0x0/0x1a0 
returns -110
    mtk_t7xx :58:00.0: PM: failed to suspend async: error -110

  [Where problems could occur]

  The t7xx driver is still incomplete and we're staging aforementioned 4
  patches in internal experimental kernels for development use.

  [Other Info]

  This affects Kinetic and above, so only Unstable, Kinetic and OEM-6.0
  are nominated for fix.

  == original bug report ==

  Hi,
  I found a "little" problem with Fibocom WWAN FM350-GL 5G modem in module 
mtk_t7xx . Power management for this modem is bad. When the notebook goes to 
sleep/suspend, kernel module mtk_t7xx return an error:

  mtk_t7xx :58:00.0: [PM] SAP suspend error: -110
  mtk_t7xx :58:00.0: PM: pci_pm_suspend(): t7xx_pci_pm_suspend+0x0/0x20 
[mtk_t7xx] returns -110
  mtk_t7xx :58:00.0: PM: dpm_run_callback(): pci_pm_suspend+0x0/0x1a0 
returns -110
  mtk_t7xx :58:00.0: PM: failed to suspend async: error -110

  So power management failed to suspend:
  PM: Some devices failed to suspend, or early wake event detected

  And the notebook not suspend and wake up again.
  It must be this module, because if I remove the module first (modprobe -r), 
the laptop goes to sleep and wakes up normally.
  However, after reinserting the module, the modem no longer appears in the 
system.

  Expected state: sleep occurs when the device is put to sleep -
  including the modem. When you wake up, you will wake up, including
  activating the modem and logging into the operator's network.

  Description:Ubuntu 20.04.5 LTS
  Release:20.04

  lspci -v:
  58:00.0 Wireless controller [0d40]: MEDIATEK Corp. Device 4d75 (rev 01)
  Subsystem: Device 1cf8:3500
  Flags: bus master, fast devsel, latency 0, IRQ 17
  Memory at 601e80 (64-bit, prefetchable) [size=32K]
  Memory at 5e80 (64-bit, non-prefetchable) [size=8M]
  Memory at 601e00 (64-bit, prefetchable) [size=8M]
  Capabilities: [80] Express Endpoint, MSI 00
  Capabilities: [d0] MSI-X: Enable+ Count=34 Masked-
  Capabilities: [e0] MSI: Enable- Count=1/32 Maskable+ 64bit+
  Capabilities: [f8] Power Management version 3
  Capabilities: [100] Vendor Specific Information: ID=1556 Rev=1 
Len=008 
  Capabilities: [108] Latency Tolerance Reporting
  Capabilities: [110] L1 PM Substates
  Capabilities: [200] Advanced Error Reporting
  Capabilities: [300] Secondary PCI Express
  Kernel driver in use: mtk_t7xx
  Kernel modules: mtk_t7xx

  lshw:
  *-generic
  description: Wireless controller
  product: MEDIATEK Corp.
  vendor: MEDIATEK Corp.
  physical id: 0
  bus info: pci@:58:00.0
     

[Kernel-packages] [Bug 1993318] Re: ZFS + Encryption installations of Ubuntu Desktop do not come up correctly on first boot, systemd unmounts many of the zfs volumes

2022-11-10 Thread Nick Rosbrook
** Changed in: systemd (Ubuntu)
   Status: Confirmed => Invalid

** Tags removed: foundations-triage-discuss

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1993318

Title:
  ZFS + Encryption installations of Ubuntu Desktop do not come up
  correctly on first boot, systemd unmounts many of the zfs volumes

Status in Ubuntu Manual Tests:
  New
Status in Release Notes for Ubuntu:
  Fix Released
Status in snapd package in Ubuntu:
  Incomplete
Status in systemd package in Ubuntu:
  Invalid
Status in ubiquity package in Ubuntu:
  Fix Released
Status in zfs-linux package in Ubuntu:
  Confirmed
Status in zsys package in Ubuntu:
  Invalid

Bug description:
  This is *probably* the wrong package, but it's the best I can figure
  for this, so here goes.

  Hardware: Kubuntu Focus XE, 32 GB RAM, 1 TB SSD, 11th Gen Intel Core
  i5, UEFI, no secure boot. Testing done in GNOME Boxes, BIOS, 4 GB RAM,
  50 GB disk space . OS is Ubuntu Desktop, Kinetic Final ISO.

  Steps to reproduce:

  1. Boot the Ubuntu desktop ISO.
  2. Select "Install Ubuntu" and proceed with the installation process.
  3. When you get to the "Installation type" screen, select "Advanced Options", 
and enable ZFS + Encryption.
  4. Proceed with the rest of the installation as normal.
  5. Reboot into the newly installed system.
  6. Log in.
  7. Run "sudo apt update" in a terminal.

  Expected result: The package database should be updated normally.

  Actual result: You are presented with the following errors at the end
  of the apt output:

  Reading package lists... Error!
  E: flAbsPath on /var/lib/dpkg/status failed - realpath (2: No such file or 
directory)
  E: Could not open file  - open (2: No such file or directory)
  E: Problem opening 
  E: The package lists or status file could not be parsed or opened.

  
  Notes: Switching to a TTY will print a crash error message related to the 
same missing /var/lib/dpkg/status file. Running "sudo touch 
/var/lib/dpkg/status" will allow "sudo apt update" to function and fix the 
crashed process in the TTY.

  Once you log in, you'll notice that Firefox is missing (bug #1993279),
  and you will likely be presented with a ton of error messages and
  other scary junk. At least one of those error messages was related to
  update-manager in my experience, and another one was from "check-new-
  release-gtk".

  ProblemType: Bug
  DistroRelease: Ubuntu 22.10
  Package: zsys (not installed)
  ProcVersionSignature: Ubuntu 5.19.0-21.21-generic 5.19.7
  Uname: Linux 5.19.0-21-generic x86_64
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
  ApportVersion: 2.23.1-0ubuntu3
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Tue Oct 18 09:55:27 2022
  InstallationDate: Installed on 2022-10-18 (0 days ago)
  InstallationMedia: Ubuntu 22.10 "Kinetic Kudu" - Release amd64 (20221018)
  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no username)
   XDG_RUNTIME_DIR=
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  SourcePackage: zsys
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-manual-tests/+bug/1993318/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1995041] Re: Fix ath11k deadlock on WCN6855

2022-11-10 Thread Timo Aaltonen
** Changed in: linux-oem-6.0 (Ubuntu Jammy)
   Status: In Progress => Fix Committed

** Changed in: linux-oem-5.17 (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.17 in Ubuntu.
https://bugs.launchpad.net/bugs/1995041

Title:
  Fix ath11k deadlock on WCN6855

Status in HWE Next:
  In Progress
Status in linux package in Ubuntu:
  In Progress
Status in linux-oem-5.17 package in Ubuntu:
  Invalid
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  In Progress
Status in linux-oem-5.17 source package in Jammy:
  Fix Committed
Status in linux-oem-6.0 source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  In Progress
Status in linux-oem-5.17 source package in Kinetic:
  Invalid
Status in linux-oem-6.0 source package in Kinetic:
  Invalid

Bug description:
  [Impact]
  ath11k is in deadlock when stress reboot or suspend on WCN6855.
  sometimes kernel hang.

  Aug 19 01:29:28 Thor-P3-AMD-2 kernel: Call Trace:
  Aug 19 01:29:28 Thor-P3-AMD-2 kernel: 
  Aug 19 01:29:28 Thor-P3-AMD-2 kernel: __schedule+0x240/0x5a0
  Aug 19 01:29:28 Thor-P3-AMD-2 kernel: ? resched_curr+0x52/0xc0
  Aug 19 01:29:28 Thor-P3-AMD-2 kernel: schedule+0x55/0xd0
  Aug 19 01:29:28 Thor-P3-AMD-2 kernel: schedule_timeout+0x115/0x150
  Aug 19 01:29:28 Thor-P3-AMD-2 kernel: ? raw_spin_rq_unlock+0x10/0x30
  Aug 19 01:29:28 Thor-P3-AMD-2 kernel: ? try_to_wake_up+0x211/0x600
  Aug 19 01:29:28 Thor-P3-AMD-2 kernel: ? ath11k_ce_send+0x17a/0x2e0 [ath11k]
  Aug 19 01:29:28 Thor-P3-AMD-2 kernel: wait_for_completion+0x8b/0xf0
  Aug 19 01:29:28 Thor-P3-AMD-2 kernel: __flush_work.isra.0+0x171/0x270
  Aug 19 01:29:28 Thor-P3-AMD-2 kernel: ? flush_workqueue_prep_pwqs+0x140/0x140
  Aug 19 01:29:28 Thor-P3-AMD-2 kernel: __cancel_work_timer+0x11b/0x1a0
  Aug 19 01:29:28 Thor-P3-AMD-2 kernel: ? 
ath11k_mac_config_mon_status_default+0xcc/0x170 [ath11k]
  Aug 19 01:29:28 Thor-P3-AMD-2 kernel: cancel_work_sync+0x10/0x20
  Aug 19 01:29:28 Thor-P3-AMD-2 kernel: ath11k_mac_op_stop+0x9f/0x1e0 [ath11k]
  Aug 19 01:29:28 Thor-P3-AMD-2 kernel: drv_stop+0x45/0x110 [mac80211]

  [Fix]
  Fix this by switching from using regulatory_set_wiphy_regd_sync() to
  regulatory_set_wiphy_regd(). Now cfg80211 will schedule another workqueue 
which
  handles the locking on it's own. So the ath11k workqueue can simply exit 
without
  taking any locks, avoiding the deadlock.

  [Test]
  Verified on hardware, stress reboot and suspend 30 times OK.

  [Where problems could occur]
  It may break ath11k wifi driver.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1995041/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991366] Re: Fix Thunderbolt device hotplug fail when connect via thunderbolt dock

2022-11-10 Thread Stefan Bader
** Changed in: linux (Ubuntu Jammy)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.17 in Ubuntu.
https://bugs.launchpad.net/bugs/1991366

Title:
  Fix Thunderbolt device hotplug fail when connect via thunderbolt dock

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Triaged
Status in linux-oem-5.17 package in Ubuntu:
  Invalid
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Committed
Status in linux-oem-5.17 source package in Jammy:
  Fix Committed
Status in linux-oem-6.0 source package in Jammy:
  Fix Released

Bug description:
  [SRU Justification]

  [Impact]
  Some Dell laptops where booting with Thunderbolt/USB4 devices connected the 
BIOS leaves some of
  the PCIe devices unconfigured. The kernel message shows "No bus number 
available for hot-added bridge". The connected devices can't be found.

  [Fix]
  Current linux PCI distribute the "spare" resources between hotplug ports on 
hot-add but have not done that upon the initial scan. The patches make the 
initial root bus scan path to do the same. The additional patches are just a 
small cleanups that can be applied separately too.

  [Test]
  1. Power on the machine with Thunderbolt/USB4 devices connected.
  2. Check the kernel message to see if "No bus number available for hot-added 
bridge" shows up or not.
  3. Check if the Thunderbolt/USB4 devices works or not.

  [Where problems could occur]
  The patches only apply the same procedures on initial root bus scan which was 
not done. If the BIOS configures the PCI correctly, everything is OK. It only 
takes effect for the BIOS w/ unconfigured PCIe devices.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1991366/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1993315] Re: md: Replace snprintf with scnprintf

2022-11-10 Thread Stefan Bader
** Changed in: linux (Ubuntu Kinetic)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Jammy)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1993315

Title:
  md: Replace snprintf with scnprintf

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Focal:
  Fix Committed
Status in linux source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  Fix Committed

Bug description:
  SRU Justification

  [Impact]
  Current code produces a warning as shown below when total characters
  in the constituent block device names plus the slashes exceeds 200.
  snprintf() returns the number of characters generated from the given
  input, which could cause the expression “200 – len” to wrap around
  to a large positive number. Fix this by using scnprintf() instead,
  which returns the actual number of characters written into the buffer.

  [ 1513.267938] [ cut here ]
  [ 1513.267943] WARNING: CPU: 15 PID: 37247 at /lib/vsprintf.c:2509 
vsnprintf+0x2c8/0x510
  [ 1513.267944] Modules linked in:  
  [ 1513.267969] CPU: 15 PID: 37247 Comm: mdadm Not tainted 5.4.0-1085-azure 
#90~18.04.1-Ubuntu
  [ 1513.267969] Hardware name: Microsoft Corporation Virtual Machine/Virtual 
Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022
  [ 1513.267971] RIP: 0010:vsnprintf+0x2c8/0x510
  <-snip->
  [ 1513.267982] Call Trace:
  [ 1513.267986]  snprintf+0x45/0x70
  [ 1513.267990]  ? disk_name+0x71/0xa0
  [ 1513.267993]  dump_zones+0x114/0x240 [raid0]
  [ 1513.267996]  ? _cond_resched+0x19/0x40
  [ 1513.267998]  raid0_run+0x19e/0x270 [raid0]
  [ 1513.268000]  md_run+0x5e0/0xc50
  [ 1513.268003]  ? security_capable+0x3f/0x60
  [ 1513.268005]  do_md_run+0x19/0x110
  [ 1513.268006]  md_ioctl+0x195e/0x1f90
  [ 1513.268007]  blkdev_ioctl+0x91f/0x9f0
  [ 1513.268010]  block_ioctl+0x3d/0x50
  [ 1513.268012]  do_vfs_ioctl+0xa9/0x640
  [ 1513.268014]  ? __fput+0x162/0x260
  [ 1513.268016]  ksys_ioctl+0x75/0x80
  [ 1513.268017]  __x64_sys_ioctl+0x1a/0x20
  [ 1513.268019]  do_syscall_64+0x5e/0x200
  [ 1513.268021]  entry_SYSCALL_64_after_hwframe+0x44/0xa9

  [Fix]

  https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-
  next.git/commit/?id=1727fd5015d8f93474148f94e34cda5aa6ad4a43

  [Where things could go wrong]

  This seems unlikely to cause a regression

  [Other Info]

  SF: #00346036

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1993315/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991366] Re: Fix Thunderbolt device hotplug fail when connect via thunderbolt dock

2022-11-10 Thread Timo Aaltonen
** Changed in: linux-oem-5.17 (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.17 in Ubuntu.
https://bugs.launchpad.net/bugs/1991366

Title:
  Fix Thunderbolt device hotplug fail when connect via thunderbolt dock

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Triaged
Status in linux-oem-5.17 package in Ubuntu:
  Invalid
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Committed
Status in linux-oem-5.17 source package in Jammy:
  Fix Committed
Status in linux-oem-6.0 source package in Jammy:
  Fix Released

Bug description:
  [SRU Justification]

  [Impact]
  Some Dell laptops where booting with Thunderbolt/USB4 devices connected the 
BIOS leaves some of
  the PCIe devices unconfigured. The kernel message shows "No bus number 
available for hot-added bridge". The connected devices can't be found.

  [Fix]
  Current linux PCI distribute the "spare" resources between hotplug ports on 
hot-add but have not done that upon the initial scan. The patches make the 
initial root bus scan path to do the same. The additional patches are just a 
small cleanups that can be applied separately too.

  [Test]
  1. Power on the machine with Thunderbolt/USB4 devices connected.
  2. Check the kernel message to see if "No bus number available for hot-added 
bridge" shows up or not.
  3. Check if the Thunderbolt/USB4 devices works or not.

  [Where problems could occur]
  The patches only apply the same procedures on initial root bus scan which was 
not done. If the BIOS configures the PCI correctly, everything is OK. It only 
takes effect for the BIOS w/ unconfigured PCIe devices.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1991366/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996071] 0001-s390-boot-add-secure-boot-trailer.patch

2022-11-10 Thread bugproxy
Default Comment by Bridge

** Attachment added: "0001-s390-boot-add-secure-boot-trailer.patch"
   
https://bugs.launchpad.net/bugs/1996071/+attachment/5630390/+files/0001-s390-boot-add-secure-boot-trailer.patch

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996071

Title:
  [UBUNTU 20.04] boot: Add secure boot trailer

Status in Ubuntu on IBM z Systems:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  New
Status in linux source package in Jammy:
  New
Status in linux source package in Kinetic:
  New

Bug description:
  Description:   boot: Add secure boot trailer
  Symptom:   Secure boot of Linux will no longer be possible with an 
upcoming
 IBM Z firmware update.

  Problem:   New IBM Z firmware requires signed bootable images to contain a
 trailing data block with a specific format.

  Solution:  Add the trailing data block to the Linux kernel image.

  Reproduction:  Apply latest firmware, perform IPL with Secure Boot
  enabled.

  Fix:   available upstream with
  Upstream-ID:   aa127a069ef312aca02b730d5137e1778d0c3ba7

  Preventive:yes

  Date:  2022-10-27
  Author:Peter Oberparleiter 
  Component: kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1996071/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996071] Re: [UBUNTU 20.04] boot: Add secure boot trailer

2022-11-10 Thread Frank Heimes
Ok, so it's actually like this ... (for focal)

** Attachment removed: "0001-s390-boot-add-secure-boot-trailer.patch"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996071/+attachment/5630383/+files/0001-s390-boot-add-secure-boot-trailer.patch

** Patch added: "0001-s390-boot-add-secure-boot-trailer.patch"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996071/+attachment/5630388/+files/0001-s390-boot-add-secure-boot-trailer.patch

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996071

Title:
  [UBUNTU 20.04] boot: Add secure boot trailer

Status in Ubuntu on IBM z Systems:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  New
Status in linux source package in Jammy:
  New
Status in linux source package in Kinetic:
  New

Bug description:
  Description:   boot: Add secure boot trailer
  Symptom:   Secure boot of Linux will no longer be possible with an 
upcoming
 IBM Z firmware update.

  Problem:   New IBM Z firmware requires signed bootable images to contain a
 trailing data block with a specific format.

  Solution:  Add the trailing data block to the Linux kernel image.

  Reproduction:  Apply latest firmware, perform IPL with Secure Boot
  enabled.

  Fix:   available upstream with
  Upstream-ID:   aa127a069ef312aca02b730d5137e1778d0c3ba7

  Preventive:yes

  Date:  2022-10-27
  Author:Peter Oberparleiter 
  Component: kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1996071/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1992266] Re: input/keyboard: the keyboard on some Asus laptops can't work

2022-11-10 Thread Stefan Bader
** Changed in: linux (Ubuntu Focal)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1992266

Title:
  input/keyboard: the keyboard on some Asus laptops can't work

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Focal:
  Fix Committed
Status in linux source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  Fix Committed

Bug description:
  This is upstream tracking bug:
  https://bugzilla.kernel.org/show_bug.cgi?id=216158

  The bug originates from an upstream bug, and the ubuntu users request
  me to do a SRU to make the ubuntu linux work on their Asus laptops, so
  once the pathces are merge to mainline kernel, I start to prepare this
  SRU.

  [Impact]
  Some Asus laptops config the IRQ of keyboard in the BIOS, but kernel
  will override to a new configuration for that IRQ, this will make the
  keyboard not work anymore under linux.

  [Fix]
  Backport 2 patches from mainlie kernel to fix this problem.

  [Test]
  boot the patched kernel on the machine, test the keyboard, all
  regular keys could work.

  
  [Where problems could occur]
  The patches use the dmi table to match the machines, so only the
  matched Asus laptops will be impacted by the patches, if there is
  any regression, the regression only affects those matched Asus
  laptops, and the regression possibility is very low since ubuntu
  users already tested the patches on their own Asus laptops.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1992266/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1993148] Re: Support Icicle Kit reference design v2022.10

2022-11-10 Thread Stefan Bader
** Changed in: linux (Ubuntu)
   Status: Incomplete => Invalid

** Changed in: linux (Ubuntu Kinetic)
   Status: Incomplete => Fix Committed

** Changed in: linux (Ubuntu Kinetic)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1993148

Title:
  Support Icicle Kit reference design v2022.10

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Kinetic:
  Fix Committed

Bug description:
  [ Impact ]

   * The Michochip PolarFire SoC on the Icicle Kit is an FPGA with 4 + 1
     RISC-V cores. So the memory map and some peripherals depend on the
     FPGA design loaded.

   * Microchip releases reference designs and are upstreaming support for
     running Linux on it. Unfortunately the upcoming v2022.10 release
     changes the memory layout compared to earlier versions, but v6.1-rc1
     contains patches for it.

   * We'd like to support the v2022.10 release and hopefully future versions
     by backporting these changes.

  [ Test Plan ]

   * Update the Icicle Kit to the v2022.10 reference design and check that
     the generic riscv64 kernel boots.

  [ Where problems could occur ]

   * Users who are running v2022.9 or older versions of the reference design
     may have trouble booting, but the Icicle Kit was never officially
     supported by Ubuntu.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1993148/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1992266] Re: input/keyboard: the keyboard on some Asus laptops can't work

2022-11-10 Thread Stefan Bader
** Changed in: linux (Ubuntu Kinetic)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1992266

Title:
  input/keyboard: the keyboard on some Asus laptops can't work

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Focal:
  In Progress
Status in linux source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  Fix Committed

Bug description:
  This is upstream tracking bug:
  https://bugzilla.kernel.org/show_bug.cgi?id=216158

  The bug originates from an upstream bug, and the ubuntu users request
  me to do a SRU to make the ubuntu linux work on their Asus laptops, so
  once the pathces are merge to mainline kernel, I start to prepare this
  SRU.

  [Impact]
  Some Asus laptops config the IRQ of keyboard in the BIOS, but kernel
  will override to a new configuration for that IRQ, this will make the
  keyboard not work anymore under linux.

  [Fix]
  Backport 2 patches from mainlie kernel to fix this problem.

  [Test]
  boot the patched kernel on the machine, test the keyboard, all
  regular keys could work.

  
  [Where problems could occur]
  The patches use the dmi table to match the machines, so only the
  matched Asus laptops will be impacted by the patches, if there is
  any regression, the regression only affects those matched Asus
  laptops, and the regression possibility is very low since ubuntu
  users already tested the patches on their own Asus laptops.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1992266/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996198] Re: Fix rfkill causing soft blocked wifi

2022-11-10 Thread Timo Aaltonen
** Also affects: linux-oem-6.0 (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-oem-6.0 (Ubuntu)
   Status: New => Invalid

** Changed in: linux-oem-6.0 (Ubuntu Focal)
   Status: New => Invalid

** Changed in: linux-oem-6.0 (Ubuntu Kinetic)
   Status: New => Invalid

** Changed in: linux-oem-6.0 (Ubuntu Jammy)
   Status: New => Confirmed

** Changed in: linux (Ubuntu Focal)
   Status: New => Confirmed

** Changed in: linux (Ubuntu Jammy)
   Status: New => Confirmed

** Changed in: linux (Ubuntu Kinetic)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996198

Title:
  Fix rfkill causing soft blocked wifi

Status in linux package in Ubuntu:
  In Progress
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  Confirmed
Status in linux-oem-6.0 source package in Focal:
  Invalid
Status in linux source package in Jammy:
  Confirmed
Status in linux-oem-6.0 source package in Jammy:
  Confirmed
Status in linux source package in Kinetic:
  Confirmed
Status in linux-oem-6.0 source package in Kinetic:
  Invalid

Bug description:
  [Impact]
  Need this patch in so a BIOS upgrade won't cause issues on HP laptops.

  commit 1598bfa8e1faa932de42e1ee7628a1c4c4263f0a
  Author: Jorge Lopez 
  Date:   Fri Oct 28 10:55:27 2022 -0500

   platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi

  After upgrading BIOS to U82 01.02.01 Rev.A, the console is flooded
  strange char "^@" which printed out every second and makes login
  nearly impossible. Also the below messages were shown both in console
  and journal/dmesg every second:

  usb 1-3: Device not responding to setup address.
  usb 1-3: device not accepting address 4, error -71
  usb 1-3: device descriptor read/all, error -71
  usb usb1-port3: unable to enumerate USB device

  Wifi is soft blocked by checking rfkill. When unblocked manually,
  after few seconds it would be soft blocked again. So I was suspecting
  something triggered rfkill to soft block wifi.  At the end it was
  fixed by removing hp_wmi module.

  The root cause is the way hp-wmi driver handles command 1B on
  post-2009 BIOS.  In pre-2009 BIOS, command 1Bh return 0x4 to indicate
  that BIOS no longer controls the power for the wireless devices.

  Signed-off-by: Jorge Lopez 
  Link: https://bugzilla.kernel.org/show_bug.cgi?id=216468
  Reviewed-by: Mario Limonciello 
  Link: https://lore.kernel.org/r/20221028155527.7724-1-jorge.lop...@hp.com
  Cc: sta...@vger.kernel.org
  Reviewed-by: Hans de Goede 
  Signed-off-by: Hans de Goede 

  [Test case]

  test on a HP laptop with the new BIOS

  [Where problems could occur]

  from the commit:
    * In pre-2009 BIOS, command 1Bh return 0x4 to indicate that
    * BIOS no longer controls the power for the wireless
    * devices. All features supported by this command will no
    * longer be supported.

  anyone running a laptop with obsolete pre-2009 BIOS probably won't
  notice the missing feature at this point.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996198/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991704] Re: Kinetic kernels 5.19.0-18/19-generic won't boot on Intel 11th/12th gen

2022-11-10 Thread Alexandre Ghiti
> Without linux-image-5.19.0-21-generic i915-fix the USB Live will never
boot in an intel Tiger Lake/Alder Lake IGPU

Indeed the live desktop installer fails to boot on a 12th intel cpu: I
have lots of kernel backtraces in dmesg caused by nouveau driver. The
kernel from the installer is 5.19.0-21.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1991704

Title:
  Kinetic kernels 5.19.0-18/19-generic won't boot on Intel 11th/12th gen

Status in linux package in Ubuntu:
  Fix Released

Bug description:
  After today's Kinetic update my Framework laptop won't boot.

  The boot hangs after this output:

  [0.813802] pci :00:07.0: DPC: RP PIO log size 8 is invalid 0.814786] pci 
:00:07.1: DPC: RP PIO log size 8 is invalid
  [0.815754] pci :00:07.2: DPC: RP PIO log size 8 is invalid 0.816732] pci 
:00:07.3: DPC: RP PIO log size 0 is invalid
  [2.001649] tpm tpm0: [Firmware Bug]: TPM interrupt not working, polling inst
  ead

  Falling back to 5.19.0-15-generic works.

  My Thinkpad X1 Carbon 6th gen does not have this problem.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.10
  Package: linux-image-5.19.0-15-generic 5.19.0-15.15
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  Uname: Linux 5.19.0-15-generic x86_64
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jik4014 F wireplumber
   /dev/snd/seq:jik4009 F pipewire
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Tue Oct  4 13:55:09 2022
  InstallationDate: Installed on 2022-09-17 (16 days ago)
  InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809.1)
  MachineType: Framework Laptop (12th Gen Intel Core)
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/ubuntu--vg-root ro quiet splash
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  SourcePackage: linux
  UpgradeStatus: Upgraded to kinetic on 2022-10-02 (1 days ago)
  dmi.bios.date: 07/15/2022
  dmi.bios.release: 3.4
  dmi.bios.vendor: INSYDE Corp.
  dmi.bios.version: 03.04
  dmi.board.asset.tag: *
  dmi.board.name: FRANMACP04
  dmi.board.vendor: Framework
  dmi.board.version: A4
  dmi.chassis.asset.tag: FRANDACPA423350021
  dmi.chassis.type: 10
  dmi.chassis.vendor: Framework
  dmi.chassis.version: A4
  dmi.modalias: 
dmi:bvnINSYDECorp.:bvr03.04:bd07/15/2022:br3.4:svnFramework:pnLaptop(12thGenIntelCore):pvrA4:rvnFramework:rnFRANMACP04:rvrA4:cvnFramework:ct10:cvrA4:skuFRANDACP04:
  dmi.product.family: 13in Laptop
  dmi.product.name: Laptop (12th Gen Intel Core)
  dmi.product.sku: FRANDACP04
  dmi.product.version: A4
  dmi.sys.vendor: Framework

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1991704/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996071] Comment bridged from LTC Bugzilla

2022-11-10 Thread bugproxy
--- Comment From peter.oberparlei...@de.ibm.com 2022-11-10 10:24 EDT---
(In reply to comment #8)
> In the focal master-next tree file 'vmlinux.lds.S' is at a different
> location: 'arch/s390/boot/compressed/' instead of 'arch/s390/boot/'
> and the context is also slightly different.
>
> Would you please have a look at the attached backport for focal and confirm
> that it's correct?
> Since it has this add. block:
> "
> . = ALIGN(256);
> .bss : {
> _bss = . ;
> *(.bss)
> *(.bss.*)
> *(COMMON)
> . = ALIGN(8); /* For convenience during zeroing */
> _ebss = .;
> }
> "

The sb_trailer block needs to move to before the .bss definition, and
replaces the ALIGN(256) line. Otherwise kernel image sizes will be
unnecessarily increased by the size of the discarded bss section. It
should look something like this:

_compressed_start = .;
*(.vmlinux.bin.compressed)
_compressed_end = .;
-   FILL(0xff);
-   . = ALIGN(4096);
}
-   . = ALIGN(256);
+
+#define SB_TRAILER_SIZE 32
+   /* Trailer needed for Secure Boot */
+   . += SB_TRAILER_SIZE; /* make sure .sb.trailer does not overwrite the 
previous section */
+   . = ALIGN(4096) - SB_TRAILER_SIZE;
+   .sb.trailer : {
+   QUAD(0)
+   QUAD(0)
+   QUAD(0)
+   QUAD(0x00207a49504c)
+   }
+
.bss : {
_bss = . ;
*(.bss)

> Looks like we commented in parallel.
> Yes, backport will be helpful.

Ok, will try to work on that.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996071

Title:
  [UBUNTU 20.04] boot: Add secure boot trailer

Status in Ubuntu on IBM z Systems:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  New
Status in linux source package in Jammy:
  New
Status in linux source package in Kinetic:
  New

Bug description:
  Description:   boot: Add secure boot trailer
  Symptom:   Secure boot of Linux will no longer be possible with an 
upcoming
 IBM Z firmware update.

  Problem:   New IBM Z firmware requires signed bootable images to contain a
 trailing data block with a specific format.

  Solution:  Add the trailing data block to the Linux kernel image.

  Reproduction:  Apply latest firmware, perform IPL with Secure Boot
  enabled.

  Fix:   available upstream with
  Upstream-ID:   aa127a069ef312aca02b730d5137e1778d0c3ba7

  Preventive:yes

  Date:  2022-10-27
  Author:Peter Oberparleiter 
  Component: kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1996071/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1952823] Re: Screen blinks when entering suspend

2022-11-10 Thread jeremyszu
I've not aware of this since 510

** Changed in: oem-priority
 Assignee: jeremyszu (os369510) => (unassigned)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to nvidia-graphics-drivers-470 in Ubuntu.
https://bugs.launchpad.net/bugs/1952823

Title:
  Screen blinks when entering suspend

Status in OEM Priority Project:
  New
Status in nvidia-graphics-drivers-470 package in Ubuntu:
  New

Bug description:
  [Summary]
  The screen turns on for a moment when laptop is entering suspend.

  This issue happens on Dell Latitude 5421.

  [Steps to reproduce]
  1. Enter suspend via power menu
  2. Observe the display

  (Note that `rtcwake` may not able to reproduce this issue. `systemctl
  suspend` may reproduce this.)

  [Expected result]
  The screen should not turn back on if the system is going to suspend.

  [Actual result]
  When "Suspend" is clicked, screen turns off, then turns back on for a moment, 
then turns off before laptop entering suspend.

To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/1952823/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1995606] Re: Upgrade thermald to 2.5.1

2022-11-10 Thread koba
** Description changed:

  [Justification]
  The purpose of this bug is that prevent the regression in the future.
  The automatic test scripts are better for the future SRU and is still on the 
planning.
  
  [Test case]
- For each supported CPU series (RPL/ADL/TGL/CML/CFL/KBL) the following tests 
will be run on machines in the CI lab:
+ For these CPU series, RPL/ADL/TGL/CML/CFL/KBL, the following tests will be 
run on machines in the CI lab:
  
  1. Run stress-ng, and observe the temperature/frequency/power with s-tui
    - Temperatures should stay just below trip values
    - Power/performance profiles should stay roughly the same between old 
thermald and new thermald (unless specifically expected eg: to fix 
premature/insufficient throttling)
  2. check if thermald could read rules from /dev/acpi_thermal_rel and generate 
the xml file on /etc/thermald/ correctly.
    - this depends on if acpi_thermal_rel exist.
    - if the machine suppots acpi_thermal_rel, the "thermal-conf.xml.auto"
   could be landed in etc/thermald/.
    - if not, the user-defined xml could be created, then jump to (3).
    - run thermald with --loglevel=debug, and compare the log with xml.auto 
file. check if the configuration could be parsed correctly.
  3. check if theramd-conf.xml and thermal-cpu-cdev-order.xml can be loaded 
correctly.
    - run thermald with --loglevel=debug, and compare the log with xml files.
    - if parsed correctly, the configurations from XML files would appear in 
the log.
  
  4. Run unit tests, the scripts are under test folder, using emul_temp to 
simulate the High temperatue and check thermald would throttle CPU through the 
related cooling device.
    - rapl.sh
    - intel_pstate.sh
    - powerclamp.sh
    - processor.sh
  5. check if the power/frequency would be throttled once the temperature reach 
the trip-points of thermal zone.
  6. check if system would be throttled even the temperature is under the 
trip-points.
  
  [ Where problems could occur ]
- since the PL1 min/max is introduced, we may face the edge case in the future.
+ since the PL1 min/max is introduced, there may have some cases that don't 
check the minimum of PL1 then make PL1 to smaller and smaller and throttle the 
CPU. 
+ this may cause machines run like the old behavior that doesn't have PL1 
min/max.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to thermald in Ubuntu.
https://bugs.launchpad.net/bugs/1995606

Title:
  Upgrade thermald to 2.5.1

Status in thermald package in Ubuntu:
  Fix Released
Status in thermald source package in Jammy:
  Incomplete

Bug description:
  [Justification]
  The purpose of this bug is that prevent the regression in the future.
  The automatic test scripts are better for the future SRU and is still on the 
planning.

  [Test case]
  For these CPU series, RPL/ADL/TGL/CML/CFL/KBL, the following tests will be 
run on machines in the CI lab:

  1. Run stress-ng, and observe the temperature/frequency/power with s-tui
    - Temperatures should stay just below trip values
    - Power/performance profiles should stay roughly the same between old 
thermald and new thermald (unless specifically expected eg: to fix 
premature/insufficient throttling)
  2. check if thermald could read rules from /dev/acpi_thermal_rel and generate 
the xml file on /etc/thermald/ correctly.
    - this depends on if acpi_thermal_rel exist.
    - if the machine suppots acpi_thermal_rel, the "thermal-conf.xml.auto"
   could be landed in etc/thermald/.
    - if not, the user-defined xml could be created, then jump to (3).
    - run thermald with --loglevel=debug, and compare the log with xml.auto 
file. check if the configuration could be parsed correctly.
  3. check if theramd-conf.xml and thermal-cpu-cdev-order.xml can be loaded 
correctly.
    - run thermald with --loglevel=debug, and compare the log with xml files.
    - if parsed correctly, the configurations from XML files would appear in 
the log.

  4. Run unit tests, the scripts are under test folder, using emul_temp to 
simulate the High temperatue and check thermald would throttle CPU through the 
related cooling device.
    - rapl.sh
    - intel_pstate.sh
    - powerclamp.sh
    - processor.sh
  5. check if the power/frequency would be throttled once the temperature reach 
the trip-points of thermal zone.
  6. check if system would be throttled even the temperature is under the 
trip-points.

  [ Where problems could occur ]
  since the PL1 min/max is introduced, there may have some cases that don't 
check the minimum of PL1 then make PL1 to smaller and smaller and throttle the 
CPU. 
  this may cause machines run like the old behavior that doesn't have PL1 
min/max.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/thermald/+bug/1995606/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscr

[Kernel-packages] [Bug 1996198] Re: Fix rfkill causing soft blocked wifi

2022-11-10 Thread Timo Aaltonen
unstable will get this after rebase to 6.1-rc5

** Changed in: linux (Ubuntu)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996198

Title:
  Fix rfkill causing soft blocked wifi

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Focal:
  New
Status in linux source package in Jammy:
  New
Status in linux source package in Kinetic:
  New

Bug description:
  [Impact]
  Need this patch in so a BIOS upgrade won't cause issues on HP laptops.

  commit 1598bfa8e1faa932de42e1ee7628a1c4c4263f0a
  Author: Jorge Lopez 
  Date:   Fri Oct 28 10:55:27 2022 -0500

   platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi

  After upgrading BIOS to U82 01.02.01 Rev.A, the console is flooded
  strange char "^@" which printed out every second and makes login
  nearly impossible. Also the below messages were shown both in console
  and journal/dmesg every second:

  usb 1-3: Device not responding to setup address.
  usb 1-3: device not accepting address 4, error -71
  usb 1-3: device descriptor read/all, error -71
  usb usb1-port3: unable to enumerate USB device

  Wifi is soft blocked by checking rfkill. When unblocked manually,
  after few seconds it would be soft blocked again. So I was suspecting
  something triggered rfkill to soft block wifi.  At the end it was
  fixed by removing hp_wmi module.

  The root cause is the way hp-wmi driver handles command 1B on
  post-2009 BIOS.  In pre-2009 BIOS, command 1Bh return 0x4 to indicate
  that BIOS no longer controls the power for the wireless devices.

  Signed-off-by: Jorge Lopez 
  Link: https://bugzilla.kernel.org/show_bug.cgi?id=216468
  Reviewed-by: Mario Limonciello 
  Link: https://lore.kernel.org/r/20221028155527.7724-1-jorge.lop...@hp.com
  Cc: sta...@vger.kernel.org
  Reviewed-by: Hans de Goede 
  Signed-off-by: Hans de Goede 

  [Test case]

  test on a HP laptop with the new BIOS

  [Where problems could occur]

  from the commit:
    * In pre-2009 BIOS, command 1Bh return 0x4 to indicate that
    * BIOS no longer controls the power for the wireless
    * devices. All features supported by this command will no
    * longer be supported.

  anyone running a laptop with obsolete pre-2009 BIOS probably won't
  notice the missing feature at this point.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996198/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996198] [NEW] Fix rfkill causing soft blocked wifi

2022-11-10 Thread Timo Aaltonen
Public bug reported:

[Impact]
Need this patch in so a BIOS upgrade won't cause issues on HP laptops.

commit 1598bfa8e1faa932de42e1ee7628a1c4c4263f0a
Author: Jorge Lopez 
Date:   Fri Oct 28 10:55:27 2022 -0500

 platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi

After upgrading BIOS to U82 01.02.01 Rev.A, the console is flooded
strange char "^@" which printed out every second and makes login
nearly impossible. Also the below messages were shown both in console
and journal/dmesg every second:

usb 1-3: Device not responding to setup address.
usb 1-3: device not accepting address 4, error -71
usb 1-3: device descriptor read/all, error -71
usb usb1-port3: unable to enumerate USB device

Wifi is soft blocked by checking rfkill. When unblocked manually,
after few seconds it would be soft blocked again. So I was suspecting
something triggered rfkill to soft block wifi.  At the end it was
fixed by removing hp_wmi module.

The root cause is the way hp-wmi driver handles command 1B on
post-2009 BIOS.  In pre-2009 BIOS, command 1Bh return 0x4 to indicate
that BIOS no longer controls the power for the wireless devices.

Signed-off-by: Jorge Lopez 
Link: https://bugzilla.kernel.org/show_bug.cgi?id=216468
Reviewed-by: Mario Limonciello 
Link: https://lore.kernel.org/r/20221028155527.7724-1-jorge.lop...@hp.com
Cc: sta...@vger.kernel.org
Reviewed-by: Hans de Goede 
Signed-off-by: Hans de Goede 

[Test case]

test on a HP laptop with the new BIOS

[Where problems could occur]

from the commit:
  * In pre-2009 BIOS, command 1Bh return 0x4 to indicate that
  * BIOS no longer controls the power for the wireless
  * devices. All features supported by this command will no
  * longer be supported.

anyone running a laptop with obsolete pre-2009 BIOS probably won't
notice the missing feature at this point.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: In Progress

** Affects: linux (Ubuntu Focal)
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu Jammy)
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu Kinetic)
 Importance: Undecided
 Status: New

** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Kinetic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Description changed:

  [Impact]
  Need this patch in so a BIOS upgrade won't cause issues on HP laptops.
  
-  platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi
+ commit 1598bfa8e1faa932de42e1ee7628a1c4c4263f0a
+ Author: Jorge Lopez 
+ Date:   Fri Oct 28 10:55:27 2022 -0500
+ 
+  platform/x86: hp_wmi: Fix rfkill causing soft blocked wifi
  
  After upgrading BIOS to U82 01.02.01 Rev.A, the console is flooded
  strange char "^@" which printed out every second and makes login
  nearly impossible. Also the below messages were shown both in console
  and journal/dmesg every second:
  
  usb 1-3: Device not responding to setup address.
  usb 1-3: device not accepting address 4, error -71
  usb 1-3: device descriptor read/all, error -71
  usb usb1-port3: unable to enumerate USB device
  
  Wifi is soft blocked by checking rfkill. When unblocked manually,
  after few seconds it would be soft blocked again. So I was suspecting
  something triggered rfkill to soft block wifi.  At the end it was
  fixed by removing hp_wmi module.
  
  The root cause is the way hp-wmi driver handles command 1B on
  post-2009 BIOS.  In pre-2009 BIOS, command 1Bh return 0x4 to indicate
  that BIOS no longer controls the power for the wireless devices.
  
  Signed-off-by: Jorge Lopez 
  Link: https://bugzilla.kernel.org/show_bug.cgi?id=216468
  Reviewed-by: Mario Limonciello 
  Link: https://lore.kernel.org/r/20221028155527.7724-1-jorge.lop...@hp.com
  Cc: sta...@vger.kernel.org
  Reviewed-by: Hans de Goede 
  Signed-off-by: Hans de Goede 
  
  [Test case]
  
  test on a HP laptop with the new BIOS
  
  [Where problems could occur]
  
  from the commit:
-* In pre-2009 BIOS, command 1Bh return 0x4 to indicate that
-* BIOS no longer controls the power for the wireless
-* devices. All features supported by this command will no
-* longer be supported.
+   * In pre-2009 BIOS, command 1Bh return 0x4 to indicate that
+   * BIOS no longer controls the power for the wireless
+   * devices. All features supported by this command will no
+   * longer be supported.
  
  anyone running a laptop with obsolete pre-2009 BIOS probably won't
  notice the missing feature at this point.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996198

Title:
  Fix rfkill causing soft blocked wifi

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Focal:
  New
Status in linux source package in Jammy:
  New
Status in linu

[Kernel-packages] [Bug 1991365] Re: Fix Turbostat is not working for fam: 6 model: 191: stepping: 2 CPU

2022-11-10 Thread Stefan Bader
** Changed in: linux (Ubuntu Kinetic)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Kinetic)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Jammy)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.17 in Ubuntu.
https://bugs.launchpad.net/bugs/1991365

Title:
  Fix Turbostat is not working for fam: 6 model: 191: stepping: 2 CPU

Status in HWE Next:
  New
Status in OEM Priority Project:
  New
Status in linux package in Ubuntu:
  In Progress
Status in linux-oem-5.17 package in Ubuntu:
  Invalid
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Committed
Status in linux-oem-5.17 source package in Jammy:
  Fix Released
Status in linux-oem-6.0 source package in Jammy:
  Fix Released
Status in linux source package in Kinetic:
  Fix Committed
Status in linux-oem-5.17 source package in Kinetic:
  Invalid
Status in linux-oem-6.0 source package in Kinetic:
  Invalid

Bug description:
  [Impact]
  turbostat doesn't show the correct fields for RPL-S.
  This's a wrong column.
  
usec,Time_Of_Day_Seconds,Core,CPU,APIC,X2APIC,Avg_MHz,Busy%,Bzy_MHz,TSC_MHz,IPC,IRQ,POLL,C1ACPI,C2ACPI,C3ACPI,POLL%,C1ACPI%,C2ACPI%,C3ACPI%,CoreTmp,CoreThr,PkgTmp,GFX%rc6,GFXMHz,GFXAMHz,CPU%LPI,SYS%LPI

  [Fix]
  Add RPL-S support in turbostat

  [Test Case]
  1. run "turbostat --list"
  2. check the output, this is a correct column.
  
usec,Time_Of_Day_Seconds,Core,CPU,APIC,X2APIC,Avg_MHz,Busy%,Bzy_MHz,TSC_MHz,IPC,IRQ,SMI,POLL,C1ACPI,C2ACPI,C3ACPI,POLL%,C1ACPI%,C2ACPI%,C3ACPI%,CPU%c1,CPU%c6,CPU%c7,CoreTmp,CoreThr,PkgTmp,GFX%rc6,GFXMHz,GFXAMHz,Totl%C0,Any%C0,GFX%C0,CPUGFX%,Pkg%pc2,Pkg%pc3,Pkg%pc6,Pkg%pc7,Pkg%pc8,Pkg%pc9,Pk%pc10,CPU%LPI,SYS%LPI,PkgWatt,CorWatt,GFXWatt,RAMWatt,PKG_%,RAM_%

  [Where problems could occur]
  Low, just add a devcie id to support RPL-S.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1991365/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1851518] Re: [950SBE/951SBE, Realtek ALC298, Speaker, Internal] No sound on internal speakers, very very quiet on headphones

2022-11-10 Thread jhubuntu20
Hi Drew,

Since creating the TO912.sh script I have also upgraded to a GalaxyBook2
Pro (NP930XED) running 22.04 and the script was required (i.e. the
latest kernels don't automatically fix issue), but the script continues
to work fine for me on both headphones are speakers.  Personally I would
recommend upgrading from the 5.15 kernel because it doesn't work fully
with the intel grpahics (im running  6.0.6-060006-generic now), but that
is unrelated.  Here are the full steps I did again that work for me ...
I still have not figured out how to make the screen brightness control
functional on the book 2 pro, but also a different story...


- placed TO912.sh script and set as 777 +x
- Create daemon for boot
 
sudo gedit /etc/systemd/system/ionsound.service 

Add text in file
[Unit]
Description=Custom Sound

[Service]
Type=idle
ExecStart={enter your path to script}/TO912.sh

[Install]
WantedBy=multi-user.target

sudo chmod 664 /etc/systemd/system/ionsound.service


- Create daemon for sleep exit

sudo gedit /etc/systemd/system/ionsoundsleep.service

Add text in file 
[Unit]
Description=Custom Sound Sleep Fix

[Service]
Type=idle
ExecStart={enter your path to script}/TO912.sh

[Install]
WantedBy=suspend.target

sudo chmod 664 /etc/systemd/system/ionsoundsleep.service

- Activate daemons

sudo systemctl daemon-reload
sudo systemctl enable ionsound.service  
sudo systemctl enable ionsoundsleep.service 

Note, I left the names as Ion because I was too lazy to change, but
nothing in here is ion specific and this does work on your model.  You
can change naming if you like as long as you change it everywhere...


For the kernel part, if you haven't already discovered the mainline tool for 
kernel mgmt then I would highly recommend trying it

sudo add-apt-repository ppa:cappelikan/ppa -y
sudo apt install mainline -y
Launch mainline GUI and pick kernel to install

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1851518

Title:
  [950SBE/951SBE, Realtek ALC298, Speaker, Internal] No sound on
  internal speakers, very very quiet on headphones

Status in Linux:
  New
Status in linux package in Ubuntu:
  Fix Released

Bug description:
  I've been googling this issue for 10's of hours and tried many things.

  Relase of Ubuntu: 19.10

  Expected outcome: Music plays on the internal speakers and headphones.

  Actual outcome: I can barely hear audio using headphones with volume
  turned up to 150%.  Absolutely nothing comes out of the speakers. (The
  speakers sound great under Windows 10.)

  Complete alsa-info output is attached, but here are some snippets:

  !!DMI Information
  !!---

  Manufacturer:  SAMSUNG ELECTRONICS CO., LTD.
  Product Name:  950SBE/951SBE
  Product Version:   P06RES
  Firmware Version:  P06RES.075.190529.SP
  Board Vendor:  SAMSUNG ELECTRONICS CO., LTD.
  Board Name:NP950SBE-K01US

  
  !!Kernel Information
  !!--

  Kernel release:5.3.0-19-generic
  Operating System:  GNU/Linux
  Architecture:  x86_64
  Processor: x86_64
  SMP Enabled:   Yes


  !!ALSA Version
  !!

  Driver version: k5.3.0-19-generic
  Library version:1.1.9
  Utilities version:  1.1.9

  
  !!Loaded ALSA modules
  !!---

  snd_hda_intel

  
  !!Sound Servers on this system
  !!

  Pulseaudio:
Installed - Yes (/usr/bin/pulseaudio)
Running - Yes

  
  !!Soundcards recognised by ALSA
  !!-

   0 [PCH]: HDA-Intel - HDA Intel PCH
HDA Intel PCH at 0x604b118000 irq 177

  
  !!PCI Soundcards installed in the system
  !!--

  00:1f.3 Multimedia audio controller: Intel Corporation Cannon Point-LP
  High Definition Audio Controller (rev 11)

  
  !!Advanced information - PCI Vendor/Device/Subsystem ID's
  !!---

  00:1f.3 0401: 8086:9dc8 (rev 11)
  DeviceName: Onboard - Sound

  
  !!HDA-Intel Codec information
  !!---
  --startcollapse--

  Codec: Realtek ALC298
  Address: 0
  AFG Function Id: 0x1 (unsol 1)
  Vendor Id: 0x10ec0298
  Subsystem Id: 0x144dc812
  Revision Id: 0x100103
  No Modem Function Group found
  Default PCM:
  rates [0x60]: 44100 480

[Kernel-packages] [Bug 1996071] Re: [UBUNTU 20.04] boot: Add secure boot trailer

2022-11-10 Thread Frank Heimes
Looks like we commented in parallel.
Yes, backport will be helpful.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996071

Title:
  [UBUNTU 20.04] boot: Add secure boot trailer

Status in Ubuntu on IBM z Systems:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  New
Status in linux source package in Jammy:
  New
Status in linux source package in Kinetic:
  New

Bug description:
  Description:   boot: Add secure boot trailer
  Symptom:   Secure boot of Linux will no longer be possible with an 
upcoming
 IBM Z firmware update.

  Problem:   New IBM Z firmware requires signed bootable images to contain a
 trailing data block with a specific format.

  Solution:  Add the trailing data block to the Linux kernel image.

  Reproduction:  Apply latest firmware, perform IPL with Secure Boot
  enabled.

  Fix:   available upstream with
  Upstream-ID:   aa127a069ef312aca02b730d5137e1778d0c3ba7

  Preventive:yes

  Date:  2022-10-27
  Author:Peter Oberparleiter 
  Component: kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1996071/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996071] Re: [UBUNTU 20.04] boot: Add secure boot trailer

2022-11-10 Thread Frank Heimes
In the focal master-next tree file 'vmlinux.lds.S' is at a different location: 
'arch/s390/boot/compressed/' instead of 'arch/s390/boot/'
and the context is also slightly different.

Would you please have a look at the attached backport for focal and confirm 
that it's correct?
Since it has this add. block:
"
. = ALIGN(256);
.bss : {
_bss = . ;
*(.bss)
*(.bss.*)
*(COMMON)
. = ALIGN(8);   /* For convenience during zeroing */
_ebss = .;
}
"

Cherry-pick was fine for kinetic and jammy.

** Patch added: "0001-s390-boot-add-secure-boot-trailer.patch"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996071/+attachment/5630383/+files/0001-s390-boot-add-secure-boot-trailer.patch

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996071

Title:
  [UBUNTU 20.04] boot: Add secure boot trailer

Status in Ubuntu on IBM z Systems:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  New
Status in linux source package in Jammy:
  New
Status in linux source package in Kinetic:
  New

Bug description:
  Description:   boot: Add secure boot trailer
  Symptom:   Secure boot of Linux will no longer be possible with an 
upcoming
 IBM Z firmware update.

  Problem:   New IBM Z firmware requires signed bootable images to contain a
 trailing data block with a specific format.

  Solution:  Add the trailing data block to the Linux kernel image.

  Reproduction:  Apply latest firmware, perform IPL with Secure Boot
  enabled.

  Fix:   available upstream with
  Upstream-ID:   aa127a069ef312aca02b730d5137e1778d0c3ba7

  Preventive:yes

  Date:  2022-10-27
  Author:Peter Oberparleiter 
  Component: kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1996071/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1978986] Re: [SRU][J/OEM-5.17][PATCH 0/1] Fix oled brightness set above frame-average luminance

2022-11-10 Thread Timo Aaltonen
sigh, this will land in -1022

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.14 in Ubuntu.
https://bugs.launchpad.net/bugs/1978986

Title:
  [SRU][J/OEM-5.17][PATCH 0/1] Fix oled brightness set above frame-
  average luminance

Status in HWE Next:
  Fix Released
Status in linux package in Ubuntu:
  In Progress
Status in linux-oem-5.14 package in Ubuntu:
  Invalid
Status in linux-oem-5.17 package in Ubuntu:
  Invalid
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux-oem-5.14 source package in Focal:
  Fix Released
Status in linux source package in Jammy:
  Fix Released
Status in linux-oem-5.14 source package in Jammy:
  Invalid
Status in linux-oem-5.17 source package in Jammy:
  Fix Committed
Status in linux-oem-6.0 source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  In Progress
Status in linux-oem-5.14 source package in Kinetic:
  Invalid
Status in linux-oem-5.17 source package in Kinetic:
  Invalid
Status in linux-oem-6.0 source package in Kinetic:
  Invalid

Bug description:
  [Impact]
  The brightness is not changed obviously during 200 to 255 on AMD
  or 400 to 512 on Intel..

  [Fix]
  Read HDR meta to detect the max and min luminance.
  max_cll defines the content light luminance for individual pixel.
  max_fall defines frame-average level luminance.
  Use max_fall value instead of max_cll as a limit for brightness control.

  [Test]
  Verified on AMD Cezanne, Barcelo, Rembrandt and Intel ADL, also on LCD panel 
and OLED panel. The brightness is changed more obivously on OLED panel, and
  no affect on LCD panel.

  [Where problems could occur]
  Low risk, It may cause the max brightness can't be set.

  All 3 patches are in drm-misc tree.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1978986/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988797] Re: pcieport 0000:00:1b.0: PCIe Bus Error: severity=Uncorrected (Non-Fatal), type=Transaction Layer, (Requester ID)

2022-11-10 Thread Stefan Bader
This was at least committed already to Kinetic. Potentially released by
now...

** Changed in: linux (Ubuntu Kinetic)
   Status: Confirmed => Fix Committed

** Changed in: linux (Ubuntu Jammy)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.14 in Ubuntu.
https://bugs.launchpad.net/bugs/1988797

Title:
  pcieport :00:1b.0: PCIe Bus Error: severity=Uncorrected (Non-
  Fatal), type=Transaction Layer, (Requester ID)

Status in HWE Next:
  Confirmed
Status in OEM Priority Project:
  New
Status in linux package in Ubuntu:
  Confirmed
Status in linux-oem-5.14 package in Ubuntu:
  Invalid
Status in linux-oem-5.17 package in Ubuntu:
  Invalid
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Committed
Status in linux-oem-5.14 source package in Jammy:
  Invalid
Status in linux-oem-5.17 source package in Jammy:
  Fix Released
Status in linux-oem-6.0 source package in Jammy:
  Fix Released
Status in linux source package in Kinetic:
  Fix Committed
Status in linux-oem-5.14 source package in Kinetic:
  Invalid
Status in linux-oem-5.17 source package in Kinetic:
  Invalid
Status in linux-oem-6.0 source package in Kinetic:
  Invalid

Bug description:
  My kernel log periodically bursts with:

  [10405.588287] pcieport :00:1b.0: PCIe Bus Error: severity=Uncorrected 
(Non-Fatal), type=Transaction Layer, (Requester ID)
  [10405.593393] pcieport :00:1b.0:   device [8086:7ac4] error 
status/mask=0010/4000
  [10405.598564] pcieport :00:1b.0:[20] UnsupReq   (First)
  [10405.603829] pcieport :00:1b.0: AER:   TLP Header: 3400 0152 
 
  [10405.609563] pcieport :00:1b.0: PCIe Bus Error: severity=Uncorrected 
(Non-Fatal), type=Transaction Layer, (Requester ID)
  [10405.614959] pcieport :00:1b.0:   device [8086:7ac4] error 
status/mask=0010/4000
  [10405.620296] pcieport :00:1b.0:[20] UnsupReq   (First)
  [10405.625554] pcieport :00:1b.0: AER:   TLP Header: 3400 0152 
 
  [10405.631180] pcieport :00:1b.0: PCIe Bus Error: severity=Uncorrected 
(Non-Fatal), type=Transaction Layer, (Requester ID)
  [10405.636495] pcieport :00:1b.0:   device [8086:7ac4] error 
status/mask=0010/4000
  [10405.641867] pcieport :00:1b.0:[20] UnsupReq   (First)
  [10405.647169] pcieport :00:1b.0: AER:   TLP Header: 3400 0152 
 
  [10405.652919] pcieport :00:1b.0: PCIe Bus Error: severity=Uncorrected 
(Non-Fatal), type=Transaction Layer, (Requester ID)
  [10405.658369] pcieport :00:1b.0:   device [8086:7ac4] error 
status/mask=0010/4000
  [10405.663803] pcieport :00:1b.0:[20] UnsupReq   (First)
  [10405.669263] pcieport :00:1b.0: AER:   TLP Header: 3400 0152 
 
  [10405.675130] pcieport :00:1b.0: PCIe Bus Error: severity=Uncorrected 
(Non-Fatal), type=Transaction Layer, (Requester ID)
  [10405.680699] pcieport :00:1b.0:   device [8086:7ac4] error 
status/mask=0010/4000
  [10405.686267] pcieport :00:1b.0:[20] UnsupReq   (First)
  [10405.691759] pcieport :00:1b.0: AER:   TLP Header: 3400 0152 
 

  This has happened even since I got the machine. It also happened with
  5.15.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.10
  Package: linux-image-5.19.0-15-generic 5.19.0-15.15
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  Uname: Linux 5.19.0-15-generic x86_64
  ApportVersion: 2.23.0-0ubuntu1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  dan2477 F wireplumber
   /dev/snd/seq:dan2474 F pipewire
  CRDA: N/A
  CasperMD5CheckResult: pass
  Date: Tue Sep  6 13:52:35 2022
  InstallationDate: Installed on 2022-07-20 (47 days ago)
  InstallationMedia: Ubuntu 22.10 "Kinetic Kudu" - Alpha amd64 (20220718)
  MachineType: Intel(R) Client Systems NUC12DCMi7
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.19.0-15-generic 
root=UUID=a69020a6-a1dd-436c-b75a-be890a4063be ro quiet splash vt.handoff=7
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220831.gitd3c92280-0ubuntu1
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 12/20/2021
  dmi.bios.release: 5.24
  dmi.bios.vendor: Intel Corp.
  dmi.bios.version: EDADL579.0046.2021.1220.2351
  dmi.board.name: NUC12EDBi7
  dmi.board.vendor: Intel Corporation
  dmi.board.version: M27908-302
  dmi.chassis.type: 35
  dmi.cha

[Kernel-packages] [Bug 1995453] Re: Add some ACPI device IDs for Intel HID device

2022-11-10 Thread Timo Aaltonen
this is already in upstream master, so unstable will get it on rebase to
6.1-rc5

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.17 in Ubuntu.
https://bugs.launchpad.net/bugs/1995453

Title:
  Add some ACPI device IDs for Intel HID device

Status in HWE Next:
  New
Status in OEM Priority Project:
  New
Status in linux package in Ubuntu:
  Triaged
Status in linux-oem-5.17 package in Ubuntu:
  Invalid
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  New
Status in linux-oem-5.17 source package in Jammy:
  Fix Released
Status in linux-oem-6.0 source package in Jammy:
  New
Status in linux source package in Kinetic:
  New
Status in linux-oem-5.17 source package in Kinetic:
  Invalid
Status in linux-oem-6.0 source package in Kinetic:
  Invalid

Bug description:
  [Impact]
  Add the ACPI devices IDs for Intel JasonLake, MeteorLake and RaptorLake

  [Fix]
  ACPI devices IDs are add the the related Intel HID devices on these platforms 
can work.

  [Test]
  Verified the Intel HID events can work such as power button for suspend and 
wake.
   
  [Where problems could occur]
  Add the ACPI device IDs for support Intel HID devices, so chance of problems 
should be low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1995453/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996071] Comment bridged from LTC Bugzilla

2022-11-10 Thread bugproxy
--- Comment From peter.oberparlei...@de.ibm.com 2022-11-10 08:55 EDT---
(In reply to comment #6)
> So commit aa127a069ef312aca02b730d5137e1778d0c3ba7 "s390/boot: add secure
> boot trailer" was just upstream accepted with v6.1-rc3.
> And it got tagged for upstream stable with:
> "Cc:  # 5.2+"
> That means that it will ideally automatically land over time in all Ubuntu
> kernels, down to focal's 5.4.

Unfortunately the automated stable backport to v5.4, v5.10, and v5.14
failed because the source file that is modified by this patch was moved
around:

https://lore.kernel.org/stable/166719900013...@kroah.com/

> But since this bug is marked as critical, the patch is relatively short,
> traceable and s390x-specific, I'll go ahead and submit this patch for Jammy
> and Focal ahead of upstream stable.

In addition to the work you plan, I could provide an adjusted stable
backport for the upstream targets for which automatic backport failed.
Would this help get this patch into any more Ubuntu versions?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996071

Title:
  [UBUNTU 20.04] boot: Add secure boot trailer

Status in Ubuntu on IBM z Systems:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  New
Status in linux source package in Jammy:
  New
Status in linux source package in Kinetic:
  New

Bug description:
  Description:   boot: Add secure boot trailer
  Symptom:   Secure boot of Linux will no longer be possible with an 
upcoming
 IBM Z firmware update.

  Problem:   New IBM Z firmware requires signed bootable images to contain a
 trailing data block with a specific format.

  Solution:  Add the trailing data block to the Linux kernel image.

  Reproduction:  Apply latest firmware, perform IPL with Secure Boot
  enabled.

  Fix:   available upstream with
  Upstream-ID:   aa127a069ef312aca02b730d5137e1778d0c3ba7

  Preventive:yes

  Date:  2022-10-27
  Author:Peter Oberparleiter 
  Component: kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1996071/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1990161] Re: Fix RPL-S support on powercap/intel_rapl

2022-11-10 Thread Stefan Bader
** Changed in: linux (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.17 in Ubuntu.
https://bugs.launchpad.net/bugs/1990161

Title:
  Fix RPL-S support on powercap/intel_rapl

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  In Progress
Status in linux-oem-5.17 package in Ubuntu:
  Invalid
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Committed
Status in linux-oem-5.17 source package in Jammy:
  Fix Released
Status in linux-oem-6.0 source package in Jammy:
  Fix Released
Status in linux source package in Kinetic:
  In Progress
Status in linux-oem-5.17 source package in Kinetic:
  Invalid
Status in linux-oem-6.0 source package in Kinetic:
  Invalid

Bug description:
  [Impact]
  proc_thermal driver is not loaded

  [Fix]
  Add RPL-S id on device id table of powercap/intel_rapl.

  [Test Case]
  1. sudo checkbox-cli run com.canonical.certification::miscellanea/proc_thermal

  [Where problems could occur]
  Low, only add RPL-S id on powercap/intel_rap but may lack of RPL-S features.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1990161/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991974] Re: AMD Yellow Carp system hang on HDMI plug in/out over HP hook2 docking

2022-11-10 Thread Stefan Bader
** Changed in: linux (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.14 in Ubuntu.
https://bugs.launchpad.net/bugs/1991974

Title:
  AMD Yellow Carp system hang on HDMI plug in/out over HP hook2 docking

Status in HWE Next:
  In Progress
Status in linux package in Ubuntu:
  Fix Released
Status in linux-oem-5.14 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Committed
Status in linux-oem-5.14 source package in Jammy:
  Fix Released
Status in linux source package in Kinetic:
  Fix Released
Status in linux-oem-5.14 source package in Kinetic:
  Invalid

Bug description:
  [SRU Justification]

  [Impact]

  AMD Yellow Carp system hang on HDMI plug in/out over dock station.

  [Fix]

  5 patches from mainline kernel v5.16 to be backported.

  [Test Case]

  Plug and unplug HDMI cable connected external monitor on a docking
  station connected to HP Lockheed platform to try trigger system hang.

  [Where problems could occur]

  This series tries to address null state of MST link encoder, and no know
  fix commits for them ever since till current mainline HEAD.

  [Other Info]

  While this is already available in v5.16 kernel and on, only 5.15 and
  oem-5.14 are nominated for fix.

  == original bug description ==

  In order to resolve system hang during docking scenario with HDMI plug
  in/out, these patches are needed into hwe-5.15.

  v5.16
  43dc2ad5 drm/amd/display: Fix MST link encoder availability check
  e3ab29aa drm/amd/display: Fix for link encoder access for MST
  7fb52632 drm/amd/display: FEC configuration for dpia links
  ed0ffb5d drm/amd/display: FEC configuration for dpia links in MST mode
  c9beecc5 drm/amd/display: Add work around for tunneled MST

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1991974/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1990272] Re: PCIe Bus Error: Uncorrected, Transaction Layer, device [8086:51b0], AER UnsupReq

2022-11-10 Thread Frederick Zhang
I'm also experiencing this issue on a ThinkPad X1 Extreme Gen 5, and it
actually causes some problems more than just logs being spammed.

First of all, I noticed that this only happens after a reboot when I
have an external display connected via USB Type-C. The other end can be
HDMI 2.0 or DisplayPort 1.2/1.4 (also tested an LG that has a Type-C
port and the laptop doesn't detect it at all).

When this happens, my Lenovo Ethernet adapter [1] (Realtek 0bda:8156)
has to be reconnected to be detected. The same thing happens even if I
reboot into Windows. As a result, I have to do cold boots currently to
make sure I have Internet.

Another problem it causes is that after a shutdown in Linux, if I
connect a USB Type-C drive and boot up the laptop, it won't be detected
by BIOS. I have an Orico M2PAC3-G20 [2] and I have to connect it first
then reboot to see it in boot menu. It can always be detected after a
shutdown in Windows by the way.

I'm running Arch and I have this issue with both mainline 6.0.7 and LTS
5.15.77 kernels. I also tested nvidia-dkms, nvidia-open-dkms, and
nouveau but unfortunately it seemed unrelated. Things like pci=nommconf,
pcie_aspm=off, disabling Thunderbolt 4 in BIOS didn't make any
difference either.

PS: Not sure if [3] is the same issue.

[1] https://www.lenovo.com/us/en/p/4x91h17795
[2] https://www.orico.cc/us/product/detail/7207.html
[3] https://bugzilla.kernel.org/show_bug.cgi?id=215453


** Bug watch added: Linux Kernel Bug Tracker #215453
   https://bugzilla.kernel.org/show_bug.cgi?id=215453

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1990272

Title:
  PCIe Bus Error: Uncorrected, Transaction Layer, device [8086:51b0],AER
  UnsupReq

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  My dmesg is getting spammed by these AER errors. The laptop (Lenovo X1
  Extreme Gen 5, Intel Core i7-12700H) is otherwise working fine.

  The errors come in random waves of 60..160 back-to-back errors with an
  interval of 130..140 microseconds.

  Device [8086:51b0] is the PCI/thunderbolt bridge.

  [   20.086628] pcieport :00:1d.0: AER: Uncorrected (Non-Fatal) error 
received: :00:1d.0
  [   20.086671] pcieport :00:1d.0: PCIe Bus Error: severity=Uncorrected 
(Non-Fatal), type=Transaction Layer, (Requester ID)
  [   20.086680] pcieport :00:1d.0:   device [8086:51b0] error 
status/mask=0010/4000
  [   20.086688] pcieport :00:1d.0:[20] UnsupReq   (First)
  [   20.086694] pcieport :00:1d.0: AER:   TLP Header: 3400 2052 
 
  [   20.086810] thunderbolt :22:00.0: AER: can't recover (no 
error_detected callback)
  [   20.086846] xhci_hcd :56:00.0: AER: can't recover (no error_detected 
callback)
  [   20.086878] pcieport :00:1d.0: AER: device recovery failed
  [   20.106033] pcieport :00:1d.0: AER: Multiple Uncorrected (Non-Fatal) 
error received: :00:1d.0
  [   20.106082] pcieport :00:1d.0: PCIe Bus Error: severity=Uncorrected 
(Non-Fatal), type=Transaction Layer, (Requester ID)
  [   20.106093] pcieport :00:1d.0:   device [8086:51b0] error 
status/mask=0010/4000
  [   20.106101] pcieport :00:1d.0:[20] UnsupReq   (First)
  [   20.106108] pcieport :00:1d.0: AER:   TLP Header: 3400 2052 
 
  [   20.106219] thunderbolt :22:00.0: AER: can't recover (no 
error_detected callback)
  [   20.106257] xhci_hcd :56:00.0: AER: can't recover (no error_detected 
callback)
  [   20.106301] pcieport :00:1d.0: AER: device recovery failed

  Another wave was at 418s, 440s, 1168s, etc.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: linux-image-5.15.0-48-generic 5.15.0-48.54
  ProcVersionSignature: Ubuntu 5.15.0-48.54-generic 5.15.53
  Uname: Linux 5.15.0-48-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  me 1827 F pulseaudio
   /dev/snd/controlC0:  me 1827 F pulseaudio
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  Date: Tue Sep 20 13:34:43 2022
  InstallationDate: Installed on 2022-08-31 (19 days ago)
  InstallationMedia: Kubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809.1)
  MachineType: LENOVO 21DE001QMH
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-48-generic 
root=UUID=d4a7fdda-30e3-439b-b327-e87d7b2bc81e ro
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.15.0-48-generic N/A
   linux-backports-modules-5.15.0-48-generic  N/A
   linux-firmware 20220329.git681281e4-0ubuntu3.5
  SourcePackage: linux
  UpgradeStatus: No upgrade

[Kernel-packages] [Bug 1996069] Re: [UBUNTU 20.04] zipl: Add secure boot trailer (s390-tools part)

2022-11-10 Thread Frank Heimes
** Also affects: ubuntu-z-systems
   Importance: Undecided
   Status: New

** Changed in: ubuntu-z-systems
 Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

** Changed in: linux (Ubuntu)
 Assignee: Skipper Bug Screeners (skipper-screen-team) => (unassigned)

** Package changed: linux (Ubuntu) => s390-tools (Ubuntu)

** Also affects: s390-tools-signed (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: ubuntu-z-systems
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996069

Title:
  [UBUNTU 20.04] zipl: Add secure boot trailer  (s390-tools part)

Status in Ubuntu on IBM z Systems:
  New
Status in s390-tools package in Ubuntu:
  New
Status in s390-tools-signed package in Ubuntu:
  New

Bug description:
  Description:   zipl: Add secure boot trailer

  Symptom:   Secure boot of Linux will no longer be possible with an 
upcoming
 IBM Z firmware update.

  Problem:   New IBM Z firmware requires all signed boot images to contain a
 trailing data block with a specific format.

  Solution:  Add trailing data block to the zipl stage 3 boot loader image.
  Reproduction:  Apply latest firmware, perform IPL with Secure Boot enabled.

  Fix:   Available upstream with
  Upstream-ID:   5768d55a08e163f718bd87498b9e763687ae7137

  Upstream-Description:

zipl/boot: add secure boot trailer

This patch enhances the zipl stage3 loader image adding a 
trailer as
required for secure boot by future firmware versions.

Note: with the change in this patch the padding via objcopy 
command line
options is replaced by padding via linker script directives 
with the
same effect.

Signed-off-by: Peter Oberparleiter 
Signed-off-by: Jan Hoeppner 

  
  Signed-off-by: Peter Oberparleiter 

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1996069/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996092] Status changed to Confirmed

2022-11-10 Thread Ubuntu Kernel Bot
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996092

Title:
  Macbook boots with linux-image-4.15.0-192-generic (4.15.0-192.203) but
  freezes with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I have old MacBook with broken main Graphic Controller
  (a well-known hardware issue https://discussions.apple.com/thread/251049873 ).

  So I switch to use Integrated Graphics Controller.

  I am using Ubuntu 18.04.6 LTS and after an 'apt update' laptop doesn't boot 
(freeze during boot).
  I looked for latest updated packages and I found:
   
  linux-image-4.15.0-192-generic 4.15.0-192.203 amd64
  =>
  linux-image-4.15.0-193-generic 4.15.0-193.204 amd64

  So, MacBook boots linux-image-4.15.0-192-generic correctly, but it
  doesn't boot with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

  I could not find which change is included in newer kernels that did
  this issue.

  How could I support about this issue?

  
  PD:
  Added bellow some additional information and attached 'lspci-vnvn.log' file

  
  $ sudo lshw
  macbookpro  
  description: Notebook
  product: MacBookPro8,2 (System SKU#)
  vendor: Apple Inc.
  ...

  

  lspci-vnvn.log

  00:02.0 VGA compatible controller [0300]: Intel Corporation 2nd Generation 
Core Processor Family Integrated Graphics Controller [8086:0116] (rev 09) 
(prog-if 00 [VGA controller])
Subsystem: Apple Inc. 2nd Generation Core Processor Family Integrated 
Graphics Controller [106b:00dc]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996092/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996174] Re: CVE-2016-3672 in ubuntu_cve_kernel failed with J-oem-6.0

2022-11-10 Thread Po-Hsu Lin
This CVE is relatively old, we already got this commit in our tree:
$ git tag --contain 8b8addf891d
...
Ubuntu-oem-6.0-6.0.0-1005.5
Ubuntu-oem-6.0-6.0.0-1006.6
Ubuntu-oem-6.0-6.0.0-1007.7

It's unclear why this is still failing.

** Also affects: linux-oem-6.0 (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-6.0 in Ubuntu.
https://bugs.launchpad.net/bugs/1996174

Title:
  CVE-2016-3672 in ubuntu_cve_kernel failed with J-oem-6.0

Status in ubuntu-kernel-tests:
  New
Status in linux-oem-6.0 package in Ubuntu:
  New

Bug description:
  Issue found with J-oem-6.0.0-1007

  This is not a regression as this failure can be found with older
  kernel (6.0.0-1004.4) as well

  Test log:
   STARTubuntu_cve_kernel.CVE-2016-3672
ubuntu_cve_kernel.CVE-2016-3672timestamp=1666797878timeout=900
localtime=Oct 26 15:24:38   
   Persistent state client._record_indent now set to 2
   Persistent state client.unexpected_reboot now set to 
('ubuntu_cve_kernel.CVE-2016-3672', 'ubuntu_cve_kernel.CVE-2016-3672')
   Waiting for pid 55210 for 900 seconds
   System python is too old, crash handling disabled
   *** CVE-2016-3672 ***
   Running 'make -C 
/home/ubuntu/autotest/client/tests/ubuntu_cve_kernel/cves/CVE-2016-3672 check'
   [stdout] make: Entering directory 
'/home/ubuntu/autotest/client/tests/ubuntu_cve_kernel/cves/CVE-2016-3672'
   [stdout] gcc -o show_maps show_maps.c -m32
   [stdout] sudo -u ubuntu ./check.sh
   [stdout] make: Leaving directory 
'/home/ubuntu/autotest/client/tests/ubuntu_cve_kernel/cves/CVE-2016-3672'
   [stderr] make: *** [Makefile:11: check] Error 1

  A manual test shows this test case is a bit flaky for some reason:
  ubuntu@curly:~/autotest-client-tests/ubuntu_cve_kernel/cves/CVE-2016-3672$ 
for i in {1..10}; do make check; echo $?; make clean; done
  gcc -o show_maps show_maps.c -m32
  sudo -u ubuntu ./check.sh
  0
  rm -f show_maps
  gcc -o show_maps show_maps.c -m32
  sudo -u ubuntu ./check.sh
  0
  rm -f show_maps
  gcc -o show_maps show_maps.c -m32
  sudo -u ubuntu ./check.sh
  0
  rm -f show_maps
  gcc -o show_maps show_maps.c -m32
  sudo -u ubuntu ./check.sh
  make: *** [Makefile:11: check] Error 1
  2
  rm -f show_maps
  gcc -o show_maps show_maps.c -m32
  sudo -u ubuntu ./check.sh
  0
  rm -f show_maps
  gcc -o show_maps show_maps.c -m32
  sudo -u ubuntu ./check.sh
  make: *** [Makefile:11: check] Error 1
  2
  rm -f show_maps
  gcc -o show_maps show_maps.c -m32
  sudo -u ubuntu ./check.sh
  0
  rm -f show_maps
  gcc -o show_maps show_maps.c -m32
  sudo -u ubuntu ./check.sh
  0
  rm -f show_maps
  gcc -o show_maps show_maps.c -m32
  sudo -u ubuntu ./check.sh
  0
  rm -f show_maps
  gcc -o show_maps show_maps.c -m32
  sudo -u ubuntu ./check.sh
  0
  rm -f show_maps

  I don't recall we have this issue with other kernels.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1996174/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996071] Re: [UBUNTU 20.04] boot: Add secure boot trailer

2022-11-10 Thread Frank Heimes
** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996071

Title:
  [UBUNTU 20.04] boot: Add secure boot trailer

Status in Ubuntu on IBM z Systems:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  New
Status in linux source package in Jammy:
  New
Status in linux source package in Kinetic:
  New

Bug description:
  Description:   boot: Add secure boot trailer
  Symptom:   Secure boot of Linux will no longer be possible with an 
upcoming
 IBM Z firmware update.

  Problem:   New IBM Z firmware requires signed bootable images to contain a
 trailing data block with a specific format.

  Solution:  Add the trailing data block to the Linux kernel image.

  Reproduction:  Apply latest firmware, perform IPL with Secure Boot
  enabled.

  Fix:   available upstream with
  Upstream-ID:   aa127a069ef312aca02b730d5137e1778d0c3ba7

  Preventive:yes

  Date:  2022-10-27
  Author:Peter Oberparleiter 
  Component: kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1996071/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996092] Re: Macbook boots with linux-image-4.15.0-192-generic (4.15.0-192.203) but freezes with newer kernels (4.15.0-193.204, 4.15.0-194.205, 4.15.0-196.207)

2022-11-10 Thread Agusti Fontquerni
I did 'apport-collect 1996092' in correct linux-image-4.15.0-192-generic 
but I can not boot newer kernels (4.15.0-193.204,4.15.0-194.205, 
4.15.0-196.207)  

** Changed in: linux (Ubuntu)
   Status: Confirmed => New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996092

Title:
  Macbook boots with linux-image-4.15.0-192-generic (4.15.0-192.203) but
  freezes with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

Status in linux package in Ubuntu:
  New

Bug description:
  I have old MacBook with broken main Graphic Controller
  (a well-known hardware issue https://discussions.apple.com/thread/251049873 ).

  So I switch to use Integrated Graphics Controller.

  I am using Ubuntu 18.04.6 LTS and after an 'apt update' laptop doesn't boot 
(freeze during boot).
  I looked for latest updated packages and I found:
   
  linux-image-4.15.0-192-generic 4.15.0-192.203 amd64
  =>
  linux-image-4.15.0-193-generic 4.15.0-193.204 amd64

  So, MacBook boots linux-image-4.15.0-192-generic correctly, but it
  doesn't boot with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

  I could not find which change is included in newer kernels that did
  this issue.

  How could I support about this issue?

  
  PD:
  Added bellow some additional information and attached 'lspci-vnvn.log' file

  
  $ sudo lshw
  macbookpro  
  description: Notebook
  product: MacBookPro8,2 (System SKU#)
  vendor: Apple Inc.
  ...

  

  lspci-vnvn.log

  00:02.0 VGA compatible controller [0300]: Intel Corporation 2nd Generation 
Core Processor Family Integrated Graphics Controller [8086:0116] (rev 09) 
(prog-if 00 [VGA controller])
Subsystem: Apple Inc. 2nd Generation Core Processor Family Integrated 
Graphics Controller [106b:00dc]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996092/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996092] Status changed to Confirmed

2022-11-10 Thread Ubuntu Kernel Bot
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996092

Title:
  Macbook boots with linux-image-4.15.0-192-generic (4.15.0-192.203) but
  freezes with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

Status in linux package in Ubuntu:
  New

Bug description:
  I have old MacBook with broken main Graphic Controller
  (a well-known hardware issue https://discussions.apple.com/thread/251049873 ).

  So I switch to use Integrated Graphics Controller.

  I am using Ubuntu 18.04.6 LTS and after an 'apt update' laptop doesn't boot 
(freeze during boot).
  I looked for latest updated packages and I found:
   
  linux-image-4.15.0-192-generic 4.15.0-192.203 amd64
  =>
  linux-image-4.15.0-193-generic 4.15.0-193.204 amd64

  So, MacBook boots linux-image-4.15.0-192-generic correctly, but it
  doesn't boot with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

  I could not find which change is included in newer kernels that did
  this issue.

  How could I support about this issue?

  
  PD:
  Added bellow some additional information and attached 'lspci-vnvn.log' file

  
  $ sudo lshw
  macbookpro  
  description: Notebook
  product: MacBookPro8,2 (System SKU#)
  vendor: Apple Inc.
  ...

  

  lspci-vnvn.log

  00:02.0 VGA compatible controller [0300]: Intel Corporation 2nd Generation 
Core Processor Family Integrated Graphics Controller [8086:0116] (rev 09) 
(prog-if 00 [VGA controller])
Subsystem: Apple Inc. 2nd Generation Core Processor Family Integrated 
Graphics Controller [106b:00dc]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996092/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1961076] Re: linux-hwe-5.4 ADT test failure (ubuntu_stress_smoke_test) with linux-hwe-5.4/5.4.0-100.113~18.04.1

2022-11-10 Thread Colin Ian King
Fix committed to stress-ng: https://github.com/ColinIanKing/stress-
ng/commit/79b54d692ea8e422efa5dee72c7c397d18b237db

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-hwe-5.4 in Ubuntu.
https://bugs.launchpad.net/bugs/1961076

Title:
  linux-hwe-5.4 ADT test failure (ubuntu_stress_smoke_test) with linux-
  hwe-5.4/5.4.0-100.113~18.04.1

Status in Stress-ng:
  New
Status in ubuntu-kernel-tests:
  New
Status in linux-hwe-5.4 package in Ubuntu:
  New
Status in linux-hwe-5.4 source package in Bionic:
  New

Bug description:
  The 'dev-shm' stress-ng test is failing with bionic/linux-hwe-5.4
  5.4.0-100.113~18.04.1 on ADT, only on ppc64el.

  Testing failed on:
  ppc64el: 
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/ppc64el/l/linux-hwe-5.4/20220216_115416_c1d6c@/log.gz

  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] stress-ng 0.13.11 
g48be8ff4ffc4
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] system: Linux autopkgtest 
5.4.0-100-generic #113~18.04.1-Ubuntu SMP Mon Feb 7 15:02:55 UTC 2022 ppc64le
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] RAM total: 7.9G, RAM free: 
3.3G, swap free: 1023.9M
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] 4 processors online, 4 
processors configured
  11:35:08 DEBUG| [stdout] stress-ng: info:  [26897] setting to a 5 second run 
per stressor
  11:35:08 DEBUG| [stdout] stress-ng: info:  [26897] dispatching hogs: 4 dev-shm
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] cache allocate: using 
cache maximum level L1
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] cache allocate: shared 
cache buffer size: 32K
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] starting stressors
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26899] stress-ng-dev-shm: started 
[26899] (instance 0)
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26900] stress-ng-dev-shm: started 
[26900] (instance 1)
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26901] stress-ng-dev-shm: started 
[26901] (instance 2)
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26902] stress-ng-dev-shm: started 
[26902] (instance 3)
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] 4 stressors started
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26899] stress-ng-dev-shm: 
assuming killed by OOM killer, restarting again (instance 0)
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26902] stress-ng-dev-shm: 
assuming killed by OOM killer, restarting again (instance 3)
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26901] stress-ng-dev-shm: 
assuming killed by OOM killer, restarting again (instance 2)
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26900] stress-ng-dev-shm: 
assuming killed by OOM killer, restarting again (instance 1)
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] process [26899] 
(stress-ng-dev-shm) terminated on signal: 9 (Killed)
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] process [26899] 
(stress-ng-dev-shm) was killed by the OOM killer
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] process [26899] terminated
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] process [26900] 
(stress-ng-dev-shm) terminated on signal: 9 (Killed)
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] process [26900] 
(stress-ng-dev-shm) was possibly killed by the OOM killer
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] process [26900] terminated
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26901] stress-ng-dev-shm: exited 
[26901] (instance 2)
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] process [26901] terminated
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] process [26902] 
(stress-ng-dev-shm) terminated on signal: 9 (Killed)
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] process [26902] 
(stress-ng-dev-shm) was killed by the OOM killer
  11:35:08 DEBUG| [stdout] stress-ng: debug: [26897] process [26902] terminated
  11:35:08 DEBUG| [stdout] stress-ng: info:  [26897] successful run completed 
in 5.06s
  11:35:08 DEBUG| [stdout] stress-ng: fail:  [26897] dev_shm instance 0 
corrupted bogo-ops counter, 14 vs 0
  11:35:08 DEBUG| [stdout] stress-ng: fail:  [26897] dev_shm instance 0 hash 
error in bogo-ops counter and run flag, 2146579844 vs 0
  11:35:08 DEBUG| [stdout] stress-ng: fail:  [26897] dev_shm instance 1 
corrupted bogo-ops counter, 13 vs 0
  11:35:08 DEBUG| [stdout] stress-ng: fail:  [26897] dev_shm instance 1 hash 
error in bogo-ops counter and run flag, 1093487894 vs 0
  11:35:08 DEBUG| [stdout] stress-ng: fail:  [26897] dev_shm instance 3 
corrupted bogo-ops counter, 13 vs 0
  11:35:08 DEBUG| [stdout] info: 5 failures reached, aborting stress process
  11:35:08 DEBUG| [stdout] stress-ng: fail:  [26897] dev_shm instance 3 hash 
error in bogo-ops counter and run flag, 1093487894 vs 0
  11:35:08 DEBUG| [stdout] stress-ng: fail:  [26897] metrics-check: stressor 
metrics corrupted, data is compromised
  11:35:08 DEBUG| [stdout]
  11:35:08 DEBUG| [stdout] 

[Kernel-packages] [Bug 1996092] ProcEnviron.txt

2022-11-10 Thread Agusti Fontquerni
apport information

** Attachment added: "ProcEnviron.txt"
   
https://bugs.launchpad.net/bugs/1996092/+attachment/5630246/+files/ProcEnviron.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996092

Title:
  Macbook boots with linux-image-4.15.0-192-generic (4.15.0-192.203) but
  freezes with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

Status in linux package in Ubuntu:
  New

Bug description:
  I have old MacBook with broken main Graphic Controller
  (a well-known hardware issue https://discussions.apple.com/thread/251049873 ).

  So I switch to use Integrated Graphics Controller.

  I am using Ubuntu 18.04.6 LTS and after an 'apt update' laptop doesn't boot 
(freeze during boot).
  I looked for latest updated packages and I found:
   
  linux-image-4.15.0-192-generic 4.15.0-192.203 amd64
  =>
  linux-image-4.15.0-193-generic 4.15.0-193.204 amd64

  So, MacBook boots linux-image-4.15.0-192-generic correctly, but it
  doesn't boot with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

  I could not find which change is included in newer kernels that did
  this issue.

  How could I support about this issue?

  
  PD:
  Added bellow some additional information and attached 'lspci-vnvn.log' file

  
  $ sudo lshw
  macbookpro  
  description: Notebook
  product: MacBookPro8,2 (System SKU#)
  vendor: Apple Inc.
  ...

  

  lspci-vnvn.log

  00:02.0 VGA compatible controller [0300]: Intel Corporation 2nd Generation 
Core Processor Family Integrated Graphics Controller [8086:0116] (rev 09) 
(prog-if 00 [VGA controller])
Subsystem: Apple Inc. 2nd Generation Core Processor Family Integrated 
Graphics Controller [106b:00dc]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996092/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996092] UdevDb.txt

2022-11-10 Thread Agusti Fontquerni
apport information

** Attachment added: "UdevDb.txt"
   https://bugs.launchpad.net/bugs/1996092/+attachment/5630251/+files/UdevDb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996092

Title:
  Macbook boots with linux-image-4.15.0-192-generic (4.15.0-192.203) but
  freezes with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

Status in linux package in Ubuntu:
  New

Bug description:
  I have old MacBook with broken main Graphic Controller
  (a well-known hardware issue https://discussions.apple.com/thread/251049873 ).

  So I switch to use Integrated Graphics Controller.

  I am using Ubuntu 18.04.6 LTS and after an 'apt update' laptop doesn't boot 
(freeze during boot).
  I looked for latest updated packages and I found:
   
  linux-image-4.15.0-192-generic 4.15.0-192.203 amd64
  =>
  linux-image-4.15.0-193-generic 4.15.0-193.204 amd64

  So, MacBook boots linux-image-4.15.0-192-generic correctly, but it
  doesn't boot with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

  I could not find which change is included in newer kernels that did
  this issue.

  How could I support about this issue?

  
  PD:
  Added bellow some additional information and attached 'lspci-vnvn.log' file

  
  $ sudo lshw
  macbookpro  
  description: Notebook
  product: MacBookPro8,2 (System SKU#)
  vendor: Apple Inc.
  ...

  

  lspci-vnvn.log

  00:02.0 VGA compatible controller [0300]: Intel Corporation 2nd Generation 
Core Processor Family Integrated Graphics Controller [8086:0116] (rev 09) 
(prog-if 00 [VGA controller])
Subsystem: Apple Inc. 2nd Generation Core Processor Family Integrated 
Graphics Controller [106b:00dc]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996092/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996092] RfKill.txt

2022-11-10 Thread Agusti Fontquerni
apport information

** Attachment added: "RfKill.txt"
   https://bugs.launchpad.net/bugs/1996092/+attachment/5630250/+files/RfKill.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996092

Title:
  Macbook boots with linux-image-4.15.0-192-generic (4.15.0-192.203) but
  freezes with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

Status in linux package in Ubuntu:
  New

Bug description:
  I have old MacBook with broken main Graphic Controller
  (a well-known hardware issue https://discussions.apple.com/thread/251049873 ).

  So I switch to use Integrated Graphics Controller.

  I am using Ubuntu 18.04.6 LTS and after an 'apt update' laptop doesn't boot 
(freeze during boot).
  I looked for latest updated packages and I found:
   
  linux-image-4.15.0-192-generic 4.15.0-192.203 amd64
  =>
  linux-image-4.15.0-193-generic 4.15.0-193.204 amd64

  So, MacBook boots linux-image-4.15.0-192-generic correctly, but it
  doesn't boot with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

  I could not find which change is included in newer kernels that did
  this issue.

  How could I support about this issue?

  
  PD:
  Added bellow some additional information and attached 'lspci-vnvn.log' file

  
  $ sudo lshw
  macbookpro  
  description: Notebook
  product: MacBookPro8,2 (System SKU#)
  vendor: Apple Inc.
  ...

  

  lspci-vnvn.log

  00:02.0 VGA compatible controller [0300]: Intel Corporation 2nd Generation 
Core Processor Family Integrated Graphics Controller [8086:0116] (rev 09) 
(prog-if 00 [VGA controller])
Subsystem: Apple Inc. 2nd Generation Core Processor Family Integrated 
Graphics Controller [106b:00dc]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996092/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996092] PulseList.txt

2022-11-10 Thread Agusti Fontquerni
apport information

** Attachment added: "PulseList.txt"
   
https://bugs.launchpad.net/bugs/1996092/+attachment/5630249/+files/PulseList.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996092

Title:
  Macbook boots with linux-image-4.15.0-192-generic (4.15.0-192.203) but
  freezes with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

Status in linux package in Ubuntu:
  New

Bug description:
  I have old MacBook with broken main Graphic Controller
  (a well-known hardware issue https://discussions.apple.com/thread/251049873 ).

  So I switch to use Integrated Graphics Controller.

  I am using Ubuntu 18.04.6 LTS and after an 'apt update' laptop doesn't boot 
(freeze during boot).
  I looked for latest updated packages and I found:
   
  linux-image-4.15.0-192-generic 4.15.0-192.203 amd64
  =>
  linux-image-4.15.0-193-generic 4.15.0-193.204 amd64

  So, MacBook boots linux-image-4.15.0-192-generic correctly, but it
  doesn't boot with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

  I could not find which change is included in newer kernels that did
  this issue.

  How could I support about this issue?

  
  PD:
  Added bellow some additional information and attached 'lspci-vnvn.log' file

  
  $ sudo lshw
  macbookpro  
  description: Notebook
  product: MacBookPro8,2 (System SKU#)
  vendor: Apple Inc.
  ...

  

  lspci-vnvn.log

  00:02.0 VGA compatible controller [0300]: Intel Corporation 2nd Generation 
Core Processor Family Integrated Graphics Controller [8086:0116] (rev 09) 
(prog-if 00 [VGA controller])
Subsystem: Apple Inc. 2nd Generation Core Processor Family Integrated 
Graphics Controller [106b:00dc]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996092/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996092] WifiSyslog.txt

2022-11-10 Thread Agusti Fontquerni
apport information

** Attachment added: "WifiSyslog.txt"
   
https://bugs.launchpad.net/bugs/1996092/+attachment/5630252/+files/WifiSyslog.txt

** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

** Changed in: linux (Ubuntu)
   Status: Confirmed => New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996092

Title:
  Macbook boots with linux-image-4.15.0-192-generic (4.15.0-192.203) but
  freezes with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

Status in linux package in Ubuntu:
  New

Bug description:
  I have old MacBook with broken main Graphic Controller
  (a well-known hardware issue https://discussions.apple.com/thread/251049873 ).

  So I switch to use Integrated Graphics Controller.

  I am using Ubuntu 18.04.6 LTS and after an 'apt update' laptop doesn't boot 
(freeze during boot).
  I looked for latest updated packages and I found:
   
  linux-image-4.15.0-192-generic 4.15.0-192.203 amd64
  =>
  linux-image-4.15.0-193-generic 4.15.0-193.204 amd64

  So, MacBook boots linux-image-4.15.0-192-generic correctly, but it
  doesn't boot with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

  I could not find which change is included in newer kernels that did
  this issue.

  How could I support about this issue?

  
  PD:
  Added bellow some additional information and attached 'lspci-vnvn.log' file

  
  $ sudo lshw
  macbookpro  
  description: Notebook
  product: MacBookPro8,2 (System SKU#)
  vendor: Apple Inc.
  ...

  

  lspci-vnvn.log

  00:02.0 VGA compatible controller [0300]: Intel Corporation 2nd Generation 
Core Processor Family Integrated Graphics Controller [8086:0116] (rev 09) 
(prog-if 00 [VGA controller])
Subsystem: Apple Inc. 2nd Generation Core Processor Family Integrated 
Graphics Controller [106b:00dc]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996092/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996092] ProcModules.txt

2022-11-10 Thread Agusti Fontquerni
apport information

** Attachment added: "ProcModules.txt"
   
https://bugs.launchpad.net/bugs/1996092/+attachment/5630248/+files/ProcModules.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996092

Title:
  Macbook boots with linux-image-4.15.0-192-generic (4.15.0-192.203) but
  freezes with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

Status in linux package in Ubuntu:
  New

Bug description:
  I have old MacBook with broken main Graphic Controller
  (a well-known hardware issue https://discussions.apple.com/thread/251049873 ).

  So I switch to use Integrated Graphics Controller.

  I am using Ubuntu 18.04.6 LTS and after an 'apt update' laptop doesn't boot 
(freeze during boot).
  I looked for latest updated packages and I found:
   
  linux-image-4.15.0-192-generic 4.15.0-192.203 amd64
  =>
  linux-image-4.15.0-193-generic 4.15.0-193.204 amd64

  So, MacBook boots linux-image-4.15.0-192-generic correctly, but it
  doesn't boot with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

  I could not find which change is included in newer kernels that did
  this issue.

  How could I support about this issue?

  
  PD:
  Added bellow some additional information and attached 'lspci-vnvn.log' file

  
  $ sudo lshw
  macbookpro  
  description: Notebook
  product: MacBookPro8,2 (System SKU#)
  vendor: Apple Inc.
  ...

  

  lspci-vnvn.log

  00:02.0 VGA compatible controller [0300]: Intel Corporation 2nd Generation 
Core Processor Family Integrated Graphics Controller [8086:0116] (rev 09) 
(prog-if 00 [VGA controller])
Subsystem: Apple Inc. 2nd Generation Core Processor Family Integrated 
Graphics Controller [106b:00dc]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996092/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996092] ProcCpuinfo.txt

2022-11-10 Thread Agusti Fontquerni
apport information

** Attachment added: "ProcCpuinfo.txt"
   
https://bugs.launchpad.net/bugs/1996092/+attachment/5630244/+files/ProcCpuinfo.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996092

Title:
  Macbook boots with linux-image-4.15.0-192-generic (4.15.0-192.203) but
  freezes with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

Status in linux package in Ubuntu:
  New

Bug description:
  I have old MacBook with broken main Graphic Controller
  (a well-known hardware issue https://discussions.apple.com/thread/251049873 ).

  So I switch to use Integrated Graphics Controller.

  I am using Ubuntu 18.04.6 LTS and after an 'apt update' laptop doesn't boot 
(freeze during boot).
  I looked for latest updated packages and I found:
   
  linux-image-4.15.0-192-generic 4.15.0-192.203 amd64
  =>
  linux-image-4.15.0-193-generic 4.15.0-193.204 amd64

  So, MacBook boots linux-image-4.15.0-192-generic correctly, but it
  doesn't boot with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

  I could not find which change is included in newer kernels that did
  this issue.

  How could I support about this issue?

  
  PD:
  Added bellow some additional information and attached 'lspci-vnvn.log' file

  
  $ sudo lshw
  macbookpro  
  description: Notebook
  product: MacBookPro8,2 (System SKU#)
  vendor: Apple Inc.
  ...

  

  lspci-vnvn.log

  00:02.0 VGA compatible controller [0300]: Intel Corporation 2nd Generation 
Core Processor Family Integrated Graphics Controller [8086:0116] (rev 09) 
(prog-if 00 [VGA controller])
Subsystem: Apple Inc. 2nd Generation Core Processor Family Integrated 
Graphics Controller [106b:00dc]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996092/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996092] ProcCpuinfoMinimal.txt

2022-11-10 Thread Agusti Fontquerni
apport information

** Attachment added: "ProcCpuinfoMinimal.txt"
   
https://bugs.launchpad.net/bugs/1996092/+attachment/5630245/+files/ProcCpuinfoMinimal.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996092

Title:
  Macbook boots with linux-image-4.15.0-192-generic (4.15.0-192.203) but
  freezes with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

Status in linux package in Ubuntu:
  New

Bug description:
  I have old MacBook with broken main Graphic Controller
  (a well-known hardware issue https://discussions.apple.com/thread/251049873 ).

  So I switch to use Integrated Graphics Controller.

  I am using Ubuntu 18.04.6 LTS and after an 'apt update' laptop doesn't boot 
(freeze during boot).
  I looked for latest updated packages and I found:
   
  linux-image-4.15.0-192-generic 4.15.0-192.203 amd64
  =>
  linux-image-4.15.0-193-generic 4.15.0-193.204 amd64

  So, MacBook boots linux-image-4.15.0-192-generic correctly, but it
  doesn't boot with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

  I could not find which change is included in newer kernels that did
  this issue.

  How could I support about this issue?

  
  PD:
  Added bellow some additional information and attached 'lspci-vnvn.log' file

  
  $ sudo lshw
  macbookpro  
  description: Notebook
  product: MacBookPro8,2 (System SKU#)
  vendor: Apple Inc.
  ...

  

  lspci-vnvn.log

  00:02.0 VGA compatible controller [0300]: Intel Corporation 2nd Generation 
Core Processor Family Integrated Graphics Controller [8086:0116] (rev 09) 
(prog-if 00 [VGA controller])
Subsystem: Apple Inc. 2nd Generation Core Processor Family Integrated 
Graphics Controller [106b:00dc]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996092/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996092] ProcInterrupts.txt

2022-11-10 Thread Agusti Fontquerni
apport information

** Attachment added: "ProcInterrupts.txt"
   
https://bugs.launchpad.net/bugs/1996092/+attachment/5630247/+files/ProcInterrupts.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996092

Title:
  Macbook boots with linux-image-4.15.0-192-generic (4.15.0-192.203) but
  freezes with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

Status in linux package in Ubuntu:
  New

Bug description:
  I have old MacBook with broken main Graphic Controller
  (a well-known hardware issue https://discussions.apple.com/thread/251049873 ).

  So I switch to use Integrated Graphics Controller.

  I am using Ubuntu 18.04.6 LTS and after an 'apt update' laptop doesn't boot 
(freeze during boot).
  I looked for latest updated packages and I found:
   
  linux-image-4.15.0-192-generic 4.15.0-192.203 amd64
  =>
  linux-image-4.15.0-193-generic 4.15.0-193.204 amd64

  So, MacBook boots linux-image-4.15.0-192-generic correctly, but it
  doesn't boot with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

  I could not find which change is included in newer kernels that did
  this issue.

  How could I support about this issue?

  
  PD:
  Added bellow some additional information and attached 'lspci-vnvn.log' file

  
  $ sudo lshw
  macbookpro  
  description: Notebook
  product: MacBookPro8,2 (System SKU#)
  vendor: Apple Inc.
  ...

  

  lspci-vnvn.log

  00:02.0 VGA compatible controller [0300]: Intel Corporation 2nd Generation 
Core Processor Family Integrated Graphics Controller [8086:0116] (rev 09) 
(prog-if 00 [VGA controller])
Subsystem: Apple Inc. 2nd Generation Core Processor Family Integrated 
Graphics Controller [106b:00dc]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996092/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1996092] Lsusb.txt

2022-11-10 Thread Agusti Fontquerni
apport information

** Attachment added: "Lsusb.txt"
   https://bugs.launchpad.net/bugs/1996092/+attachment/5630243/+files/Lsusb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996092

Title:
  Macbook boots with linux-image-4.15.0-192-generic (4.15.0-192.203) but
  freezes with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

Status in linux package in Ubuntu:
  New

Bug description:
  I have old MacBook with broken main Graphic Controller
  (a well-known hardware issue https://discussions.apple.com/thread/251049873 ).

  So I switch to use Integrated Graphics Controller.

  I am using Ubuntu 18.04.6 LTS and after an 'apt update' laptop doesn't boot 
(freeze during boot).
  I looked for latest updated packages and I found:
   
  linux-image-4.15.0-192-generic 4.15.0-192.203 amd64
  =>
  linux-image-4.15.0-193-generic 4.15.0-193.204 amd64

  So, MacBook boots linux-image-4.15.0-192-generic correctly, but it
  doesn't boot with newer kernels (4.15.0-193.204,4.15.0-194.205,
  4.15.0-196.207)

  I could not find which change is included in newer kernels that did
  this issue.

  How could I support about this issue?

  
  PD:
  Added bellow some additional information and attached 'lspci-vnvn.log' file

  
  $ sudo lshw
  macbookpro  
  description: Notebook
  product: MacBookPro8,2 (System SKU#)
  vendor: Apple Inc.
  ...

  

  lspci-vnvn.log

  00:02.0 VGA compatible controller [0300]: Intel Corporation 2nd Generation 
Core Processor Family Integrated Graphics Controller [8086:0116] (rev 09) 
(prog-if 00 [VGA controller])
Subsystem: Apple Inc. 2nd Generation Core Processor Family Integrated 
Graphics Controller [106b:00dc]
Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR- FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B+ ParErr- DEVSEL=fast >TAbort- SERR- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996092/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


  1   2   >