[Kernel-packages] [Bug 2020319] Re: Encountering an issue with memcpy_fromio causing failed boot of SEV-enabled guest
** Also affects: linux (Ubuntu Jammy) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Focal) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2020319 Title: Encountering an issue with memcpy_fromio causing failed boot of SEV- enabled guest Status in linux package in Ubuntu: Incomplete Status in linux source package in Bionic: New Status in linux source package in Focal: New Status in linux source package in Jammy: New Bug description: [Impact] When launching a SEV-enabled guest, the guest kernel panics with the following call trace, indicating a critical error in the system. == [1.090638] software IO TLB: Memory encryption is active and system is using DMA bounce buffers [1.092105] Linux agpgart interface v0.103 [1.092716] BUG: unable to handle page fault for address: 9b820003d068 [1.093445] #PF: supervisor read access in kernel mode [1.093966] #PF: error_code(0x) - not-present page [1.094481] PGD 80010067 P4D 80010067 PUD 8001001d7067 PMD 8001001da067 PTE 8000fed40173 [1.094629] Oops: [#1] SMP NOPTI [1.094629] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.15.0-46-generic #49-Ubuntu [1.094629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 [1.094629] RIP: 0010:memcpy_fromio+0x27/0x50 [1.094629] Code: cc cc cc 0f 1f 44 00 00 55 48 89 e5 48 85 d2 74 28 40 f6 c6 01 75 30 48 83 fa 01 76 06 40 f6 c6 02 75 1c 48 89 d1 48 c1 e9 02 a5 f6 c2 02 74 02 66 a5 f6 c2 01 74 01 a4 5d e9 14 b3 97 00 66 [1.094629] RSP: 0018:9b820001ba50 EFLAGS: 00010212 [1.094629] RAX: 9b820003d040 RBX: 9b820001bac0 RCX: 0002 [1.094629] RDX: 0008 RSI: 9b820003d068 RDI: 9b820001ba90 [1.094629] RBP: 9b820001ba50 R08: 0f80 R09: 0f80 [1.094629] R10: fed40080 R11: 9b820001bac0 R12: 8cc7068eca48 [1.094629] R13: 8cc700a64288 R14: R15: fed40080 [1.094629] FS: () GS:8cc77bd0() knlGS: [1.094629] CS: 0010 DS: ES: CR0: 80050033 [1.094629] CR2: 9b820003d068 CR3: 800174a1 CR4: 00350ee0 [1.094629] Call Trace: [1.094629] [1.094629] crb_map_io+0x315/0x870 [1.094629] ? radix_tree_iter_tag_clear+0x12/0x20 [1.094629] ? _raw_spin_unlock_irqrestore+0xe/0x30 [1.094629] crb_acpi_add+0xc2/0x140 [1.094629] acpi_device_probe+0x4c/0x170 [1.094629] really_probe+0x222/0x420 [1.094629] __driver_probe_device+0x119/0x190 [1.094629] driver_probe_device+0x23/0xc0 [1.094629] __driver_attach+0xbd/0x1e0 [1.094629] ? __device_attach_driver+0x120/0x120 [1.094629] bus_for_each_dev+0x7e/0xd0 [1.094629] driver_attach+0x1e/0x30 [1.094629] bus_add_driver+0x139/0x200 [1.094629] driver_register+0x95/0x100 [1.094629] ? init_tis+0xfd/0xfd [1.094629] acpi_bus_register_driver+0x39/0x50 [1.094629] crb_acpi_driver_init+0x15/0x1b [1.094629] do_one_initcall+0x48/0x1e0 [1.094629] do_initcalls+0x12f/0x159 [1.094629] kernel_init_freeable+0x162/0x1b5 [1.094629] ? rest_init+0x100/0x100 [1.094629] kernel_init+0x1b/0x150 [1.094629] ? rest_init+0x100/0x100 [1.094629] ret_from_fork+0x22/0x30 [1.094629] [1.094629] Modules linked in: [1.094629] CR2: 9b820003d068 [1.094629] ---[ end trace 3d6d81c42a3c2030 ]--- [1.094629] RIP: 0010:memcpy_fromio+0x27/0x50 [1.094629] Code: cc cc cc 0f 1f 44 00 00 55 48 89 e5 48 85 d2 74 28 40 f6 c6 01 75 30 48 83 fa 01 76 06 40 f6 c6 02 75 1c 48 89 d1 48 c1 e9 02 a5 f6 c2 02 74 02 66 a5 f6 c2 01 74 01 a4 5d e9 14 b3 97 00 66 [1.094629] RSP: 0018:9b820001ba50 EFLAGS: 00010212 [1.094629] RAX: 9b820003d040 RBX: 9b820001bac0 RCX: 0002 [1.094629] RDX: 0008 RSI: 9b820003d068 RDI: 9b820001ba90 [1.094629] RBP: 9b820001ba50 R08: 0f80 R09: 0f80 [1.094629] R10: fed40080 R11: 9b820001bac0 R12: 8cc7068eca48 [1.094629] R13: 8cc700a64288 R14: R15: fed40080 [1.094629] FS: () GS:8cc77bd0() knlGS: [1.094629] CS: 0010 DS: ES: CR0: 80050033 [1.094629] CR2: 9b820003d068 CR3: 800174a1 CR4: 00350ee0 [1.094629] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0009 [1.094629] Kernel Offset: 0x20 from 0xff
[Kernel-packages] [Bug 2020319] Missing required logs.
This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window: apport-collect 2020319 and then change the status of the bug to 'Confirmed'. If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'. This change has been made by an automated script, maintained by the Ubuntu Kernel Team. ** Changed in: linux (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2020319 Title: Encountering an issue with memcpy_fromio causing failed boot of SEV- enabled guest Status in linux package in Ubuntu: Incomplete Status in linux source package in Bionic: New Status in linux source package in Focal: New Status in linux source package in Jammy: New Bug description: [Impact] When launching a SEV-enabled guest, the guest kernel panics with the following call trace, indicating a critical error in the system. == [1.090638] software IO TLB: Memory encryption is active and system is using DMA bounce buffers [1.092105] Linux agpgart interface v0.103 [1.092716] BUG: unable to handle page fault for address: 9b820003d068 [1.093445] #PF: supervisor read access in kernel mode [1.093966] #PF: error_code(0x) - not-present page [1.094481] PGD 80010067 P4D 80010067 PUD 8001001d7067 PMD 8001001da067 PTE 8000fed40173 [1.094629] Oops: [#1] SMP NOPTI [1.094629] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.15.0-46-generic #49-Ubuntu [1.094629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 [1.094629] RIP: 0010:memcpy_fromio+0x27/0x50 [1.094629] Code: cc cc cc 0f 1f 44 00 00 55 48 89 e5 48 85 d2 74 28 40 f6 c6 01 75 30 48 83 fa 01 76 06 40 f6 c6 02 75 1c 48 89 d1 48 c1 e9 02 a5 f6 c2 02 74 02 66 a5 f6 c2 01 74 01 a4 5d e9 14 b3 97 00 66 [1.094629] RSP: 0018:9b820001ba50 EFLAGS: 00010212 [1.094629] RAX: 9b820003d040 RBX: 9b820001bac0 RCX: 0002 [1.094629] RDX: 0008 RSI: 9b820003d068 RDI: 9b820001ba90 [1.094629] RBP: 9b820001ba50 R08: 0f80 R09: 0f80 [1.094629] R10: fed40080 R11: 9b820001bac0 R12: 8cc7068eca48 [1.094629] R13: 8cc700a64288 R14: R15: fed40080 [1.094629] FS: () GS:8cc77bd0() knlGS: [1.094629] CS: 0010 DS: ES: CR0: 80050033 [1.094629] CR2: 9b820003d068 CR3: 800174a1 CR4: 00350ee0 [1.094629] Call Trace: [1.094629] [1.094629] crb_map_io+0x315/0x870 [1.094629] ? radix_tree_iter_tag_clear+0x12/0x20 [1.094629] ? _raw_spin_unlock_irqrestore+0xe/0x30 [1.094629] crb_acpi_add+0xc2/0x140 [1.094629] acpi_device_probe+0x4c/0x170 [1.094629] really_probe+0x222/0x420 [1.094629] __driver_probe_device+0x119/0x190 [1.094629] driver_probe_device+0x23/0xc0 [1.094629] __driver_attach+0xbd/0x1e0 [1.094629] ? __device_attach_driver+0x120/0x120 [1.094629] bus_for_each_dev+0x7e/0xd0 [1.094629] driver_attach+0x1e/0x30 [1.094629] bus_add_driver+0x139/0x200 [1.094629] driver_register+0x95/0x100 [1.094629] ? init_tis+0xfd/0xfd [1.094629] acpi_bus_register_driver+0x39/0x50 [1.094629] crb_acpi_driver_init+0x15/0x1b [1.094629] do_one_initcall+0x48/0x1e0 [1.094629] do_initcalls+0x12f/0x159 [1.094629] kernel_init_freeable+0x162/0x1b5 [1.094629] ? rest_init+0x100/0x100 [1.094629] kernel_init+0x1b/0x150 [1.094629] ? rest_init+0x100/0x100 [1.094629] ret_from_fork+0x22/0x30 [1.094629] [1.094629] Modules linked in: [1.094629] CR2: 9b820003d068 [1.094629] ---[ end trace 3d6d81c42a3c2030 ]--- [1.094629] RIP: 0010:memcpy_fromio+0x27/0x50 [1.094629] Code: cc cc cc 0f 1f 44 00 00 55 48 89 e5 48 85 d2 74 28 40 f6 c6 01 75 30 48 83 fa 01 76 06 40 f6 c6 02 75 1c 48 89 d1 48 c1 e9 02 a5 f6 c2 02 74 02 66 a5 f6 c2 01 74 01 a4 5d e9 14 b3 97 00 66 [1.094629] RSP: 0018:9b820001ba50 EFLAGS: 00010212 [1.094629] RAX: 9b820003d040 RBX: 9b820001bac0 RCX: 0002 [1.094629] RDX: 0008 RSI: 9b820003d068 RDI: 9b820001ba90 [1.094629] RBP: 9b820001ba50 R08: 0f80 R09: 0f80 [1.094629] R10: fed40080 R11: 9b820001bac0 R12: 8cc7068eca48 [1.094629] R13: 8cc700a64288 R14: R15: fed40080 [1.094629] FS:
[Kernel-packages] [Bug 2020319] [NEW] Encountering an issue with memcpy_fromio causing failed boot of SEV-enabled guest
Public bug reported: [Impact] When launching a SEV-enabled guest, the guest kernel panics with the following call trace, indicating a critical error in the system. == [1.090638] software IO TLB: Memory encryption is active and system is using DMA bounce buffers [1.092105] Linux agpgart interface v0.103 [1.092716] BUG: unable to handle page fault for address: 9b820003d068 [1.093445] #PF: supervisor read access in kernel mode [1.093966] #PF: error_code(0x) - not-present page [1.094481] PGD 80010067 P4D 80010067 PUD 8001001d7067 PMD 8001001da067 PTE 8000fed40173 [1.094629] Oops: [#1] SMP NOPTI [1.094629] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.15.0-46-generic #49-Ubuntu [1.094629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 [1.094629] RIP: 0010:memcpy_fromio+0x27/0x50 [1.094629] Code: cc cc cc 0f 1f 44 00 00 55 48 89 e5 48 85 d2 74 28 40 f6 c6 01 75 30 48 83 fa 01 76 06 40 f6 c6 02 75 1c 48 89 d1 48 c1 e9 02 a5 f6 c2 02 74 02 66 a5 f6 c2 01 74 01 a4 5d e9 14 b3 97 00 66 [1.094629] RSP: 0018:9b820001ba50 EFLAGS: 00010212 [1.094629] RAX: 9b820003d040 RBX: 9b820001bac0 RCX: 0002 [1.094629] RDX: 0008 RSI: 9b820003d068 RDI: 9b820001ba90 [1.094629] RBP: 9b820001ba50 R08: 0f80 R09: 0f80 [1.094629] R10: fed40080 R11: 9b820001bac0 R12: 8cc7068eca48 [1.094629] R13: 8cc700a64288 R14: R15: fed40080 [1.094629] FS: () GS:8cc77bd0() knlGS: [1.094629] CS: 0010 DS: ES: CR0: 80050033 [1.094629] CR2: 9b820003d068 CR3: 800174a1 CR4: 00350ee0 [1.094629] Call Trace: [1.094629] [1.094629] crb_map_io+0x315/0x870 [1.094629] ? radix_tree_iter_tag_clear+0x12/0x20 [1.094629] ? _raw_spin_unlock_irqrestore+0xe/0x30 [1.094629] crb_acpi_add+0xc2/0x140 [1.094629] acpi_device_probe+0x4c/0x170 [1.094629] really_probe+0x222/0x420 [1.094629] __driver_probe_device+0x119/0x190 [1.094629] driver_probe_device+0x23/0xc0 [1.094629] __driver_attach+0xbd/0x1e0 [1.094629] ? __device_attach_driver+0x120/0x120 [1.094629] bus_for_each_dev+0x7e/0xd0 [1.094629] driver_attach+0x1e/0x30 [1.094629] bus_add_driver+0x139/0x200 [1.094629] driver_register+0x95/0x100 [1.094629] ? init_tis+0xfd/0xfd [1.094629] acpi_bus_register_driver+0x39/0x50 [1.094629] crb_acpi_driver_init+0x15/0x1b [1.094629] do_one_initcall+0x48/0x1e0 [1.094629] do_initcalls+0x12f/0x159 [1.094629] kernel_init_freeable+0x162/0x1b5 [1.094629] ? rest_init+0x100/0x100 [1.094629] kernel_init+0x1b/0x150 [1.094629] ? rest_init+0x100/0x100 [1.094629] ret_from_fork+0x22/0x30 [1.094629] [1.094629] Modules linked in: [1.094629] CR2: 9b820003d068 [1.094629] ---[ end trace 3d6d81c42a3c2030 ]--- [1.094629] RIP: 0010:memcpy_fromio+0x27/0x50 [1.094629] Code: cc cc cc 0f 1f 44 00 00 55 48 89 e5 48 85 d2 74 28 40 f6 c6 01 75 30 48 83 fa 01 76 06 40 f6 c6 02 75 1c 48 89 d1 48 c1 e9 02 a5 f6 c2 02 74 02 66 a5 f6 c2 01 74 01 a4 5d e9 14 b3 97 00 66 [1.094629] RSP: 0018:9b820001ba50 EFLAGS: 00010212 [1.094629] RAX: 9b820003d040 RBX: 9b820001bac0 RCX: 0002 [1.094629] RDX: 0008 RSI: 9b820003d068 RDI: 9b820001ba90 [1.094629] RBP: 9b820001ba50 R08: 0f80 R09: 0f80 [1.094629] R10: fed40080 R11: 9b820001bac0 R12: 8cc7068eca48 [1.094629] R13: 8cc700a64288 R14: R15: fed40080 [1.094629] FS: () GS:8cc77bd0() knlGS: [1.094629] CS: 0010 DS: ES: CR0: 80050033 [1.094629] CR2: 9b820003d068 CR3: 800174a1 CR4: 00350ee0 [1.094629] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0009 [1.094629] Kernel Offset: 0x20 from 0x8100 (relocation range: 0x8000-0xbfff) [1.094629] ---[ end Kernel panic - not syncing: Attempted to kill init! exitcode=0x0009 ]--- == [Fix] The issue arises when launching kernels in libvirt-managed SEV virtual machines due to the addition of a tpm-crb device by virt-install. Upstream commit 4009a4ac82dd has fixed this issue. == Author: Joerg Roedel Date: Mon Mar 21 10:33:51 2022 +0100 x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO The io-specific memcpy/memset functions use string mmio accesses to do their work. Under SEV, the hypervisor can't emulate these instructions because they read/write directly from/to encrypted memory. == [Test Plan] 1. Use virt-install to create a SEV-enabled guest virt-install --name sev_guest --memory 16384 --vcpus
[Kernel-packages] [Bug 2018473] Re: Jammy update: v6.1.26 upstream stable release
** Changed in: oem-priority Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-oem-6.1 in Ubuntu. https://bugs.launchpad.net/bugs/2018473 Title: Jammy update: v6.1.26 upstream stable release Status in OEM Priority Project: Fix Released Status in linux-oem-6.1 package in Ubuntu: Confirmed Status in linux-oem-6.1 source package in Jammy: New Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: v6.1.26 upstream stable release from git://git.kernel.org/ Linux 6.1.26 ASN.1: Fix check for strdup() success ASoC: fsl_sai: Fix pins setting for i.MX8QM platform ASoC: fsl_asrc_dma: fix potential null-ptr-deref ASoC: SOF: pm: Tear down pipelines only if DSP was active mm/page_alloc: fix potential deadlock on zonelist_update_seq seqlock fpga: bridge: properly initialize bridge device before populating children iio: adc: at91-sama5d2_adc: fix an error code in at91_adc_allocate_trigger() Input: pegasus-notetaker - check pipe type when probing gcc: disable '-Warray-bounds' for gcc-13 too sctp: Call inet6_destroy_sock() via sk->sk_destruct(). dccp: Call inet6_destroy_sock() via sk->sk_destruct(). inet6: Remove inet6_destroy_sock() in sk->sk_prot->destroy(). purgatory: fix disabling debug info fuse: always revalidate rename target dentry MIPS: Define RUNTIME_DISCARD_EXIT in LD script KVM: arm64: Fix buffer overflow in kvm_arm_set_fw_reg() KVM: arm64: Make vcpu flag updates non-preemptible sched/fair: Fixes for capacity inversion detection sched/fair: Consider capacity inversion in util_fits_cpu() sched/fair: Detect capacity inversion mm/mmap: regression fix for unmapped_area{_topdown} mm: page_alloc: skip regions with hugetlbfs pages when allocating 1G pages mm: kmsan: handle alloc failures in kmsan_vmap_pages_range_noflush() mm: kmsan: handle alloc failures in kmsan_ioremap_page_range() mm/huge_memory.c: warn with pr_warn_ratelimited instead of VM_WARN_ON_ONCE_FOLIO mm/khugepaged: check again on anon uffd-wp during isolation mm/userfaultfd: fix uffd-wp handling for THP migration entries drm/rockchip: vop2: Use regcache_sync() to fix suspend/resume drm/rockchip: vop2: fix suspend/resume drm/amd/display: set dcn315 lb bpp to 48 drm/amdgpu: Fix desktop freezed after gpu-reset drm/i915: Fix fast wake AUX sync len mmc: sdhci_am654: Set HIGH_SPEED_ENA for SDR12 and SDR25 writeback, cgroup: fix null-ptr-deref write in bdi_split_work_to_wbs kernel/sys.c: fix and improve control flow in __sys_setres[ug]id() memstick: fix memory leak if card device is never registered tools/mm/page_owner_sort.c: fix TGID output when cull=tg is used nilfs2: initialize unused bytes in segment summary blocks maple_tree: fix a potential memory leak, OOB access, or other unpredictable bug maple_tree: fix mas_empty_area() search maple_tree: make maple state reusable after mas_empty_area_rev() LoongArch: Mark 3 symbol exports as non-GPL LoongArch: Fix probing of the CRC32 feature rust: kernel: Mark rust_fmt_argument as extern "C" btrfs: get the next extent map during fiemap/lseek more efficiently ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook iio: light: tsl2772: fix reading proximity-diodes from device tree iio: dac: ad5755: Add missing fwnode_handle_put() drm/amdgpu/vcn: Disable indirect SRAM on Vangogh broken BIOSes Revert "userfaultfd: don't fail on unrecognized features" mtd: spi-nor: fix memory leak when using debugfs_lookup() platform/x86: asus-nb-wmi: Add quirk_asus_tablet_mode to other ROG Flow X13 models platform/x86: gigabyte-wmi: add support for X570S AORUS ELITE xen/netback: use same error messages for same errors nvme-tcp: fix a possible UAF when failing to allocate an io queue drm: test: Fix 32-bit issue in drm_buddy_test drm: buddy_allocator: Fix buddy allocator init on 32-bit systems s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling platform/x86: gigabyte-wmi: add support for B650 AORUS ELITE AX net: dsa: b53: mmap: add phy ops scsi: core: Improve scsi_vpd_inquiry() checks scsi: megaraid_sas: Fix fw_crash_buffer_show() selftests: sigaltstack: fix -Wuninitialized platform/x86 (gigabyte-wmi): Add support for A320M-S2H V2 platform/x86/intel: vsec: Fix a memory leak in intel_vsec_add_aux f2fs: Fix f2fs_truncate_partial_nodes ftrace event net: bridge: switchdev: don't notify FDB entries with "master dynamic" e1000e: Dis
[Kernel-packages] [Bug 1937133] Re: devlink_port_split from ubuntu_kernel_selftests.net fails on hirsute (KeyError: 'flavour')
Test passed (skipped) with f-riscv-5.15 ** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1937133 Title: devlink_port_split from ubuntu_kernel_selftests.net fails on hirsute (KeyError: 'flavour') Status in ubuntu-kernel-tests: In Progress Status in linux package in Ubuntu: Fix Released Status in linux source package in Hirsute: Won't Fix Status in linux source package in Jammy: Fix Released Status in linux source package in Kinetic: Fix Released Status in linux source package in Lunar: Fix Released Bug description: [Impact] On s390x LPAR instances, this test will fail with: # File "linux/tools/testing/selftests/net/devlink_port_split.py", line 64, in get_if_names # if ports[port]['flavour'] == 'physical': # KeyError: 'flavour' not ok 1 selftests: net: devlink_port_split.py # exit=1 This is because the mlx4 driver in use on this instance does not set attributes, therefore `devlink -j port show` command output does not contain this "flavour" key. [Fix] * 3de66d08d3 selftests: net: devlink_port_split.py: skip test if no suitable device available This patch can be cherry-picked into our J/K/L kernels. [Test] Run the patched devlink_port_split.py on s390x LPAR, and it won't fail with # KeyError: 'flavour' but marked as SKIP instead. [Where problems could occur] If this change is incorrect, it may affect the test result, however it's limited to testing tools, no actual impact to kernel functions. [Original Bug Report] Failing on hirsute/linux 5.11.0-26.28 host s2lp4 Not a regression as this is also failing on 5.11.0-24.25 17:16:32 DEBUG| [stdout] # selftests: net: devlink_port_split.py 17:16:32 DEBUG| [stdout] # Traceback (most recent call last): 17:16:32 DEBUG| [stdout] # File "/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net/./devlink_port_split.py", line 283, in 17:16:32 DEBUG| [stdout] # main() 17:16:32 DEBUG| [stdout] # File "/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net/./devlink_port_split.py", line 256, in main 17:16:32 DEBUG| [stdout] # ports = devlink_ports(dev) 17:16:32 DEBUG| [stdout] # File "/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net/./devlink_port_split.py", line 70, in __init__ 17:16:32 DEBUG| [stdout] # self.if_names = devlink_ports.get_if_names(dev) 17:16:32 DEBUG| [stdout] # File "/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net/./devlink_port_split.py", line 64, in get_if_names 17:16:32 DEBUG| [stdout] # if ports[port]['flavour'] == 'physical': 17:16:32 DEBUG| [stdout] # KeyError: 'flavour' 17:16:32 DEBUG| [stdout] not ok 44 selftests: net: devlink_port_split.py # exit=1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1937133/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2020295] [NEW] Include the MAC address pass through function on RTL8153DD-CG
Public bug reported: [Impact] [Fix] Commit in v6.3-rc1 fixes the issue. ec51fbd1b8a2 r8152: add USB device driver for config selection [Test] [Where problems could occur] ** Affects: hwe-next Importance: Undecided Status: New ** Affects: linux (Ubuntu) Importance: Undecided Assignee: AceLan Kao (acelankao) Status: Fix Released ** Affects: linux-oem-6.1 (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Jammy) Importance: Undecided Assignee: AceLan Kao (acelankao) Status: In Progress ** Affects: linux-oem-6.1 (Ubuntu Jammy) Importance: Undecided Assignee: AceLan Kao (acelankao) Status: In Progress ** Affects: linux (Ubuntu Kinetic) Importance: Undecided Assignee: AceLan Kao (acelankao) Status: In Progress ** Affects: linux-oem-6.1 (Ubuntu Kinetic) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Lunar) Importance: Undecided Assignee: AceLan Kao (acelankao) Status: In Progress ** Affects: linux-oem-6.1 (Ubuntu Lunar) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Mantic) Importance: Undecided Assignee: AceLan Kao (acelankao) Status: Fix Released ** Affects: linux-oem-6.1 (Ubuntu Mantic) Importance: Undecided Status: Invalid ** Tags: oem-priority originate-from-1974429 somerville ** Also affects: linux (Ubuntu Jammy) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Kinetic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Lunar) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Mantic) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Mantic) Status: New => Fix Released ** Changed in: linux (Ubuntu Jammy) Assignee: (unassigned) => AceLan Kao (acelankao) ** Changed in: linux (Ubuntu Kinetic) Assignee: (unassigned) => AceLan Kao (acelankao) ** Changed in: linux (Ubuntu Lunar) Assignee: (unassigned) => AceLan Kao (acelankao) ** Changed in: linux (Ubuntu Mantic) Assignee: (unassigned) => AceLan Kao (acelankao) ** Changed in: linux (Ubuntu Jammy) Status: New => In Progress ** Changed in: linux (Ubuntu Kinetic) Status: New => In Progress ** Changed in: linux (Ubuntu Lunar) Status: New => In Progress ** Tags added: oem-priority originate-from-1974429 somerville ** Description changed: [Impact] [Fix] + Commit in v6.3-rc1 fixes the issue. + ec51fbd1b8a2 r8152: add USB device driver for config selection [Test] [Where problems could occur] ** Also affects: linux-oem-6.1 (Ubuntu) Importance: Undecided Status: New ** Changed in: linux-oem-6.1 (Ubuntu Kinetic) Status: New => Invalid ** Changed in: linux-oem-6.1 (Ubuntu Lunar) Status: New => Invalid ** Changed in: linux-oem-6.1 (Ubuntu Mantic) Status: New => Invalid ** Changed in: linux-oem-6.1 (Ubuntu Jammy) Status: New => In Progress ** Changed in: linux-oem-6.1 (Ubuntu Jammy) Assignee: (unassigned) => AceLan Kao (acelankao) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2020295 Title: Include the MAC address pass through function on RTL8153DD-CG Status in HWE Next: New Status in linux package in Ubuntu: Fix Released Status in linux-oem-6.1 package in Ubuntu: Invalid Status in linux source package in Jammy: In Progress Status in linux-oem-6.1 source package in Jammy: In Progress Status in linux source package in Kinetic: In Progress Status in linux-oem-6.1 source package in Kinetic: Invalid Status in linux source package in Lunar: In Progress Status in linux-oem-6.1 source package in Lunar: Invalid Status in linux source package in Mantic: Fix Released Status in linux-oem-6.1 source package in Mantic: Invalid Bug description: [Impact] [Fix] Commit in v6.3-rc1 fixes the issue. ec51fbd1b8a2 r8152: add USB device driver for config selection [Test] [Where problems could occur] To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/2020295/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
Re: [Kernel-packages] [Bug 2004534] Re: Lenovo IdeaPad 3 15ABA7 never wakes from sleep
the fact is that with Garuda linux or Slackware the bug is not there. so i use garuda. The bug is somewhere in Ubuntu. On Sun, May 21, 2023, 14:05 andreas <2004...@bugs.launchpad.net> wrote: > Exactly the same bug here with all Distros and up to Kernel 6.2.x > > I think it has to do with the internal ssd. It looks like the ssd won't > wake up after suspend and there are no BIOS settings to change the > behavior. > > I hope this will fixed sometimes. > > Cheers > > -- > You received this bug notification because you are subscribed to the bug > report. > https://bugs.launchpad.net/bugs/2004534 > > Title: > Lenovo IdeaPad 3 15ABA7 never wakes from sleep > > Status in linux package in Ubuntu: > Confirmed > > Bug description: >- on locked screen: the keyboard blocks after a while and I cannot > login anymore; >- on unlocked screen: >= apps do not start (failed to start); >= no icon pictures on desktop; >= no wallpaper anymore (black background); > > ProblemType: Bug > DistroRelease: Ubuntu 22.04 > Package: xorg 1:7.7+23ubuntu2 > ProcVersionSignature: Ubuntu 5.15.0-58.64-generic 5.15.74 > Uname: Linux 5.15.0-58-generic x86_64 > ApportVersion: 2.20.11-0ubuntu82.3 > Architecture: amd64 > BootLog: Error: [Errno 13] Permission denied: '/var/log/boot.log' > CasperMD5CheckResult: pass > CompositorRunning: None > CurrentDesktop: ubuntu:GNOME > Date: Thu Feb 2 07:15:13 2023 > DistUpgraded: Fresh install > DistroCodename: jammy > DistroVariant: ubuntu > ExtraDebuggingInterest: Yes, including running git bisection searches > GraphicsCard: >Advanced Micro Devices, Inc. [AMD/ATI] Barcelo [1002:15e7] (rev c2) > (prog-if 00 [VGA controller]) > Subsystem: Lenovo Device [17aa:3801] > InstallationDate: Installed on 2023-02-01 (1 days ago) > InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 > (20220809.1) > MachineType: LENOVO 82RN > ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-58-generic > root=UUID=b63af605-bd2f-4b16-8bb4-1cc9bb85554c ro quiet splash vt.handoff=7 > SourcePackage: xorg > Symptom: display > UpgradeStatus: No upgrade log present (probably fresh install) > dmi.bios.date: 08/04/2022 > dmi.bios.release: 1.38 > dmi.bios.vendor: LENOVO > dmi.bios.version: JTCN38WW > dmi.board.asset.tag: No Asset Tag > dmi.board.name: LNVNB161216 > dmi.board.vendor: LENOVO > dmi.board.version: NO DPK > dmi.chassis.asset.tag: No Asset Tag > dmi.chassis.type: 10 > dmi.chassis.vendor: LENOVO > dmi.chassis.version: IdeaPad 3 15ABA7 > dmi.ec.firmware.release: 1.38 > dmi.modalias: > dmi:bvnLENOVO:bvrJTCN38WW:bd08/04/2022:br1.38:efr1.38:svnLENOVO:pn82RN:pvrIdeaPad315ABA7:rvnLENOVO:rnLNVNB161216:rvrNODPK:cvnLENOVO:ct10:cvrIdeaPad315ABA7:skuLENOVO_MT_82RN_BU_idea_FM_IdeaPad315ABA7: > dmi.product.family: IdeaPad 3 15ABA7 > dmi.product.name: 82RN > dmi.product.sku: LENOVO_MT_82RN_BU_idea_FM_IdeaPad 3 15ABA7 > dmi.product.version: IdeaPad 3 15ABA7 > dmi.sys.vendor: LENOVO > version.compiz: compiz N/A > version.libdrm2: libdrm2 2.4.110-1ubuntu1 > version.libgl1-mesa-dri: libgl1-mesa-dri 22.0.5-0ubuntu0.1 > version.libgl1-mesa-glx: libgl1-mesa-glx N/A > version.xserver-xorg-core: xserver-xorg-core 2:21.1.3-2ubuntu2.5 > version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A > version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:19.1.0-2ubuntu1 > version.xserver-xorg-video-intel: xserver-xorg-video-intel > 2:2.99.917+git20210115-1 > version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau > 1:1.0.17-2build1 > > To manage notifications about this bug go to: > https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2004534/+subscriptions > > -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2004534 Title: Lenovo IdeaPad 3 15ABA7 never wakes from sleep Status in linux package in Ubuntu: Confirmed Bug description: - on locked screen: the keyboard blocks after a while and I cannot login anymore; - on unlocked screen: = apps do not start (failed to start); = no icon pictures on desktop; = no wallpaper anymore (black background); ProblemType: Bug DistroRelease: Ubuntu 22.04 Package: xorg 1:7.7+23ubuntu2 ProcVersionSignature: Ubuntu 5.15.0-58.64-generic 5.15.74 Uname: Linux 5.15.0-58-generic x86_64 ApportVersion: 2.20.11-0ubuntu82.3 Architecture: amd64 BootLog: Error: [Errno 13] Permission denied: '/var/log/boot.log' CasperMD5CheckResult: pass CompositorRunning: None CurrentDesktop: ubuntu:GNOME Date: Thu Feb 2 07:15:13 2023 DistUpgraded: Fresh install DistroCodename: jammy DistroVariant: ubuntu ExtraDebuggingInterest: Yes, including running git bisection searches GraphicsCard: Advanced Micro Devices, Inc. [AMD/ATI] Barcelo [1002:15e7] (rev c2) (prog-if 00 [VGA controller]) Subsyste
[Kernel-packages] [Bug 2020062] Re: No HDMI/DP audio output on dock(Nvidia GPU)
** Tags removed: verification-needed-jammy ** Tags added: verification-done-jammy -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-oem-6.0 in Ubuntu. https://bugs.launchpad.net/bugs/2020062 Title: No HDMI/DP audio output on dock(Nvidia GPU) Status in HWE Next: New Status in linux package in Ubuntu: In Progress Status in linux-oem-6.0 package in Ubuntu: Invalid Status in linux-oem-6.1 package in Ubuntu: Invalid Status in linux source package in Jammy: In Progress Status in linux-oem-6.0 source package in Jammy: In Progress Status in linux-oem-6.1 source package in Jammy: In Progress Status in linux source package in Lunar: In Progress Status in linux-oem-6.0 source package in Lunar: Invalid Status in linux-oem-6.1 source package in Lunar: Invalid Status in linux source package in Mantic: In Progress Status in linux-oem-6.0 source package in Mantic: Invalid Status in linux-oem-6.1 source package in Mantic: Invalid Bug description: [Impact] When the machine is docked with an external monitor, it is able to output display, but the HDMI/DP audio output option is lost in DGFF Hybrid Discrete/Discrete mode(Nvidia GPU). [Fix] Nvidia provides a patch to fix it https://patchwork.kernel.org/project/alsa-devel/patch/20230517090736.15088-1-nmah...@nvidia.com/ [Test] Verified on the target machine. {Where problems could occur] The patch just adds IDs, and won't lead to any regression. To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/2020062/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2020279] UdevDb.txt
apport information ** Attachment added: "UdevDb.txt" https://bugs.launchpad.net/bugs/2020279/+attachment/5674491/+files/UdevDb.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2020279 Title: Kernel warning after upgrade to 4.15.0.211.194 Status in linux package in Ubuntu: Confirmed Bug description: After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel started to produce the below warning. It did not seem to cause any major issue. Revering to 4.15.0.210 stopped the warning. The server is a Droplet at DigitalOcean with their monitoring/management agent installed. May 21 19:09:59 esolr kernel: [ 18.787737] [ cut here ] May 21 19:09:59 esolr kernel: [ 18.787803] WARNING: CPU: 0 PID: 1027 at /build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787804] Modules linked in: isofs xt_set nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net May 21 19:09:59 esolr kernel: [ 18.787835] CPU: 0 PID: 1027 Comm: unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu May 21 19:09:59 esolr kernel: [ 18.787836] Hardware name: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 May 21 19:09:59 esolr kernel: [ 18.787839] RIP: 0010:sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787840] RSP: :94bf7fc038c0 EFLAGS: 00010282 May 21 19:09:59 esolr kernel: [ 18.787841] RAX: 0024 RBX: 94bf79565500 RCX: 0006 May 21 19:09:59 esolr kernel: [ 18.787842] RDX: RSI: 94bf7fc1b4d8 RDI: 94bf7fc1b4d0 May 21 19:09:59 esolr kernel: [ 18.787842] RBP: 94bf7fc038d0 R08: 0222 R09: 0004 May 21 19:09:59 esolr kernel: [ 18.787843] R10: 94bf7fc03860 R11: 0001 R12: 94bf795655c8 May 21 19:09:59 esolr kernel: [ 18.787844] R13: 0006 R14: 003b R15: May 21 19:09:59 esolr kernel: [ 18.787845] FS: 7f04071d4740() GS:94bf7fc0() knlGS: May 21 19:09:59 esolr kernel: [ 18.787846] CS: 0010 DS: ES: CR0: 80050033 May 21 19:09:59 esolr kernel: [ 18.787846] CR2: 7f0401995e60 CR3: 67586002 CR4: 001606f0 May 21 19:09:59 esolr kernel: [ 18.787850] DR0: DR1: DR2: May 21 19:09:59 esolr kernel: [ 18.787851] DR3: DR6: fffe0ff0 DR7: 0400 May 21 19:09:59 esolr kernel: [ 18.787851] Call Trace: May 21 19:09:59 esolr kernel: [ 18.787853] May 21 19:09:59 esolr kernel: [ 18.787866] inet_csk_destroy_sock+0x59/0x150 May 21 19:09:59 esolr kernel: [ 18.787868] tcp_done+0x96/0xa0 May 21 19:09:59 esolr kernel: [ 18.787872] tcp_time_wait+0x1be/0x280 May 21 19:09:59 esolr kernel: [ 18.787874] tcp_fin+0x16b/0x180 May 21 19:09:59 esolr kernel: [ 18.787876] tcp_data_queue+0x594/0xc20 May 21 19:09:59 esolr kernel: [ 18.787881] tcp_rcv_state_process+0x5dd/0xe70 May 21 19:09:59 esolr kernel: [ 18.787887] ? __slab_alloc+0x20/0x40 May 21 19:09:59 esolr kernel: [ 18.787889] ? kmem_cache_alloc+0x161/0x1c0 May 21 19:09:59 esolr kernel: [ 18.787891] ? skb_clone+0x56/0xc0 May 21 19:09:59 esolr kernel: [ 18.787897] tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787898] ? tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787899] tcp_v6_rcv+0x9b6/0xa60 May 21 19:09:59 esolr kernel: [ 18.787907] ? update_load_avg+0x5f9/0x780 May 21 19:09:59 esolr kernel: [ 18.787909] ip6_input_finish+0xcc/0x470 May 21 19:09:59 esolr kernel: [ 18.787911] ip6_input+0x3f/0xb0 May 21 19:09:59 esolr kernel: [ 18.787914] ? ip6_dst_check+0xb1/0xf0 May 21 19:09:59 esolr kernel: [ 18.787915] ip6_rcv_finish+0xd8/0x120 May 21 19:09:59 esolr kernel: [ 18.787916] ipv6_rcv+0x347/0x510 May 21 19:09:59 esolr kernel: [ 18.787917] ? __pskb_pull_tail+0x7f/0x4b0 May 21 19:09:59 esolr kernel: [ 18.787918] ? skb_copy_bits+0x141/0x280 May 21 19:09:59 esolr kernel: [ 18.787920] ? __kmalloc_node_track_caller+0x216/0x2b0 May 21 19:09:59 esolr kernel: [ 18.787923] __netif_receive_skb_core+0x432/0xb80
[Kernel-packages] [Bug 2020279] ProcInterrupts.txt
apport information ** Attachment added: "ProcInterrupts.txt" https://bugs.launchpad.net/bugs/2020279/+attachment/5674489/+files/ProcInterrupts.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2020279 Title: Kernel warning after upgrade to 4.15.0.211.194 Status in linux package in Ubuntu: Confirmed Bug description: After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel started to produce the below warning. It did not seem to cause any major issue. Revering to 4.15.0.210 stopped the warning. The server is a Droplet at DigitalOcean with their monitoring/management agent installed. May 21 19:09:59 esolr kernel: [ 18.787737] [ cut here ] May 21 19:09:59 esolr kernel: [ 18.787803] WARNING: CPU: 0 PID: 1027 at /build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787804] Modules linked in: isofs xt_set nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net May 21 19:09:59 esolr kernel: [ 18.787835] CPU: 0 PID: 1027 Comm: unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu May 21 19:09:59 esolr kernel: [ 18.787836] Hardware name: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 May 21 19:09:59 esolr kernel: [ 18.787839] RIP: 0010:sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787840] RSP: :94bf7fc038c0 EFLAGS: 00010282 May 21 19:09:59 esolr kernel: [ 18.787841] RAX: 0024 RBX: 94bf79565500 RCX: 0006 May 21 19:09:59 esolr kernel: [ 18.787842] RDX: RSI: 94bf7fc1b4d8 RDI: 94bf7fc1b4d0 May 21 19:09:59 esolr kernel: [ 18.787842] RBP: 94bf7fc038d0 R08: 0222 R09: 0004 May 21 19:09:59 esolr kernel: [ 18.787843] R10: 94bf7fc03860 R11: 0001 R12: 94bf795655c8 May 21 19:09:59 esolr kernel: [ 18.787844] R13: 0006 R14: 003b R15: May 21 19:09:59 esolr kernel: [ 18.787845] FS: 7f04071d4740() GS:94bf7fc0() knlGS: May 21 19:09:59 esolr kernel: [ 18.787846] CS: 0010 DS: ES: CR0: 80050033 May 21 19:09:59 esolr kernel: [ 18.787846] CR2: 7f0401995e60 CR3: 67586002 CR4: 001606f0 May 21 19:09:59 esolr kernel: [ 18.787850] DR0: DR1: DR2: May 21 19:09:59 esolr kernel: [ 18.787851] DR3: DR6: fffe0ff0 DR7: 0400 May 21 19:09:59 esolr kernel: [ 18.787851] Call Trace: May 21 19:09:59 esolr kernel: [ 18.787853] May 21 19:09:59 esolr kernel: [ 18.787866] inet_csk_destroy_sock+0x59/0x150 May 21 19:09:59 esolr kernel: [ 18.787868] tcp_done+0x96/0xa0 May 21 19:09:59 esolr kernel: [ 18.787872] tcp_time_wait+0x1be/0x280 May 21 19:09:59 esolr kernel: [ 18.787874] tcp_fin+0x16b/0x180 May 21 19:09:59 esolr kernel: [ 18.787876] tcp_data_queue+0x594/0xc20 May 21 19:09:59 esolr kernel: [ 18.787881] tcp_rcv_state_process+0x5dd/0xe70 May 21 19:09:59 esolr kernel: [ 18.787887] ? __slab_alloc+0x20/0x40 May 21 19:09:59 esolr kernel: [ 18.787889] ? kmem_cache_alloc+0x161/0x1c0 May 21 19:09:59 esolr kernel: [ 18.787891] ? skb_clone+0x56/0xc0 May 21 19:09:59 esolr kernel: [ 18.787897] tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787898] ? tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787899] tcp_v6_rcv+0x9b6/0xa60 May 21 19:09:59 esolr kernel: [ 18.787907] ? update_load_avg+0x5f9/0x780 May 21 19:09:59 esolr kernel: [ 18.787909] ip6_input_finish+0xcc/0x470 May 21 19:09:59 esolr kernel: [ 18.787911] ip6_input+0x3f/0xb0 May 21 19:09:59 esolr kernel: [ 18.787914] ? ip6_dst_check+0xb1/0xf0 May 21 19:09:59 esolr kernel: [ 18.787915] ip6_rcv_finish+0xd8/0x120 May 21 19:09:59 esolr kernel: [ 18.787916] ipv6_rcv+0x347/0x510 May 21 19:09:59 esolr kernel: [ 18.787917] ? __pskb_pull_tail+0x7f/0x4b0 May 21 19:09:59 esolr kernel: [ 18.787918] ? skb_copy_bits+0x141/0x280 May 21 19:09:59 esolr kernel: [ 18.787920] ? __kmalloc_node_track_caller+0x216/0x2b0 May 21 19:09:59 esolr kernel: [ 18.787923] __netif_receive_skb_co
[Kernel-packages] [Bug 2020279] WifiSyslog.txt
apport information ** Attachment added: "WifiSyslog.txt" https://bugs.launchpad.net/bugs/2020279/+attachment/5674492/+files/WifiSyslog.txt ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2020279 Title: Kernel warning after upgrade to 4.15.0.211.194 Status in linux package in Ubuntu: Confirmed Bug description: After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel started to produce the below warning. It did not seem to cause any major issue. Revering to 4.15.0.210 stopped the warning. The server is a Droplet at DigitalOcean with their monitoring/management agent installed. May 21 19:09:59 esolr kernel: [ 18.787737] [ cut here ] May 21 19:09:59 esolr kernel: [ 18.787803] WARNING: CPU: 0 PID: 1027 at /build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787804] Modules linked in: isofs xt_set nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net May 21 19:09:59 esolr kernel: [ 18.787835] CPU: 0 PID: 1027 Comm: unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu May 21 19:09:59 esolr kernel: [ 18.787836] Hardware name: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 May 21 19:09:59 esolr kernel: [ 18.787839] RIP: 0010:sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787840] RSP: :94bf7fc038c0 EFLAGS: 00010282 May 21 19:09:59 esolr kernel: [ 18.787841] RAX: 0024 RBX: 94bf79565500 RCX: 0006 May 21 19:09:59 esolr kernel: [ 18.787842] RDX: RSI: 94bf7fc1b4d8 RDI: 94bf7fc1b4d0 May 21 19:09:59 esolr kernel: [ 18.787842] RBP: 94bf7fc038d0 R08: 0222 R09: 0004 May 21 19:09:59 esolr kernel: [ 18.787843] R10: 94bf7fc03860 R11: 0001 R12: 94bf795655c8 May 21 19:09:59 esolr kernel: [ 18.787844] R13: 0006 R14: 003b R15: May 21 19:09:59 esolr kernel: [ 18.787845] FS: 7f04071d4740() GS:94bf7fc0() knlGS: May 21 19:09:59 esolr kernel: [ 18.787846] CS: 0010 DS: ES: CR0: 80050033 May 21 19:09:59 esolr kernel: [ 18.787846] CR2: 7f0401995e60 CR3: 67586002 CR4: 001606f0 May 21 19:09:59 esolr kernel: [ 18.787850] DR0: DR1: DR2: May 21 19:09:59 esolr kernel: [ 18.787851] DR3: DR6: fffe0ff0 DR7: 0400 May 21 19:09:59 esolr kernel: [ 18.787851] Call Trace: May 21 19:09:59 esolr kernel: [ 18.787853] May 21 19:09:59 esolr kernel: [ 18.787866] inet_csk_destroy_sock+0x59/0x150 May 21 19:09:59 esolr kernel: [ 18.787868] tcp_done+0x96/0xa0 May 21 19:09:59 esolr kernel: [ 18.787872] tcp_time_wait+0x1be/0x280 May 21 19:09:59 esolr kernel: [ 18.787874] tcp_fin+0x16b/0x180 May 21 19:09:59 esolr kernel: [ 18.787876] tcp_data_queue+0x594/0xc20 May 21 19:09:59 esolr kernel: [ 18.787881] tcp_rcv_state_process+0x5dd/0xe70 May 21 19:09:59 esolr kernel: [ 18.787887] ? __slab_alloc+0x20/0x40 May 21 19:09:59 esolr kernel: [ 18.787889] ? kmem_cache_alloc+0x161/0x1c0 May 21 19:09:59 esolr kernel: [ 18.787891] ? skb_clone+0x56/0xc0 May 21 19:09:59 esolr kernel: [ 18.787897] tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787898] ? tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787899] tcp_v6_rcv+0x9b6/0xa60 May 21 19:09:59 esolr kernel: [ 18.787907] ? update_load_avg+0x5f9/0x780 May 21 19:09:59 esolr kernel: [ 18.787909] ip6_input_finish+0xcc/0x470 May 21 19:09:59 esolr kernel: [ 18.787911] ip6_input+0x3f/0xb0 May 21 19:09:59 esolr kernel: [ 18.787914] ? ip6_dst_check+0xb1/0xf0 May 21 19:09:59 esolr kernel: [ 18.787915] ip6_rcv_finish+0xd8/0x120 May 21 19:09:59 esolr kernel: [ 18.787916] ipv6_rcv+0x347/0x510 May 21 19:09:59 esolr kernel: [ 18.787917] ? __pskb_pull_tail+0x7f/0x4b0 May 21 19:09:59 esolr kernel: [ 18.787918] ? skb_copy_bits+0x141/0x280 May 21 19:09:59 esolr kernel: [ 18.787920] ? __kmalloc_node_track_caller+0x216/0x2b0 May 21
[Kernel-packages] [Bug 2020279] ProcModules.txt
apport information ** Attachment added: "ProcModules.txt" https://bugs.launchpad.net/bugs/2020279/+attachment/5674490/+files/ProcModules.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2020279 Title: Kernel warning after upgrade to 4.15.0.211.194 Status in linux package in Ubuntu: Confirmed Bug description: After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel started to produce the below warning. It did not seem to cause any major issue. Revering to 4.15.0.210 stopped the warning. The server is a Droplet at DigitalOcean with their monitoring/management agent installed. May 21 19:09:59 esolr kernel: [ 18.787737] [ cut here ] May 21 19:09:59 esolr kernel: [ 18.787803] WARNING: CPU: 0 PID: 1027 at /build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787804] Modules linked in: isofs xt_set nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net May 21 19:09:59 esolr kernel: [ 18.787835] CPU: 0 PID: 1027 Comm: unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu May 21 19:09:59 esolr kernel: [ 18.787836] Hardware name: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 May 21 19:09:59 esolr kernel: [ 18.787839] RIP: 0010:sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787840] RSP: :94bf7fc038c0 EFLAGS: 00010282 May 21 19:09:59 esolr kernel: [ 18.787841] RAX: 0024 RBX: 94bf79565500 RCX: 0006 May 21 19:09:59 esolr kernel: [ 18.787842] RDX: RSI: 94bf7fc1b4d8 RDI: 94bf7fc1b4d0 May 21 19:09:59 esolr kernel: [ 18.787842] RBP: 94bf7fc038d0 R08: 0222 R09: 0004 May 21 19:09:59 esolr kernel: [ 18.787843] R10: 94bf7fc03860 R11: 0001 R12: 94bf795655c8 May 21 19:09:59 esolr kernel: [ 18.787844] R13: 0006 R14: 003b R15: May 21 19:09:59 esolr kernel: [ 18.787845] FS: 7f04071d4740() GS:94bf7fc0() knlGS: May 21 19:09:59 esolr kernel: [ 18.787846] CS: 0010 DS: ES: CR0: 80050033 May 21 19:09:59 esolr kernel: [ 18.787846] CR2: 7f0401995e60 CR3: 67586002 CR4: 001606f0 May 21 19:09:59 esolr kernel: [ 18.787850] DR0: DR1: DR2: May 21 19:09:59 esolr kernel: [ 18.787851] DR3: DR6: fffe0ff0 DR7: 0400 May 21 19:09:59 esolr kernel: [ 18.787851] Call Trace: May 21 19:09:59 esolr kernel: [ 18.787853] May 21 19:09:59 esolr kernel: [ 18.787866] inet_csk_destroy_sock+0x59/0x150 May 21 19:09:59 esolr kernel: [ 18.787868] tcp_done+0x96/0xa0 May 21 19:09:59 esolr kernel: [ 18.787872] tcp_time_wait+0x1be/0x280 May 21 19:09:59 esolr kernel: [ 18.787874] tcp_fin+0x16b/0x180 May 21 19:09:59 esolr kernel: [ 18.787876] tcp_data_queue+0x594/0xc20 May 21 19:09:59 esolr kernel: [ 18.787881] tcp_rcv_state_process+0x5dd/0xe70 May 21 19:09:59 esolr kernel: [ 18.787887] ? __slab_alloc+0x20/0x40 May 21 19:09:59 esolr kernel: [ 18.787889] ? kmem_cache_alloc+0x161/0x1c0 May 21 19:09:59 esolr kernel: [ 18.787891] ? skb_clone+0x56/0xc0 May 21 19:09:59 esolr kernel: [ 18.787897] tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787898] ? tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787899] tcp_v6_rcv+0x9b6/0xa60 May 21 19:09:59 esolr kernel: [ 18.787907] ? update_load_avg+0x5f9/0x780 May 21 19:09:59 esolr kernel: [ 18.787909] ip6_input_finish+0xcc/0x470 May 21 19:09:59 esolr kernel: [ 18.787911] ip6_input+0x3f/0xb0 May 21 19:09:59 esolr kernel: [ 18.787914] ? ip6_dst_check+0xb1/0xf0 May 21 19:09:59 esolr kernel: [ 18.787915] ip6_rcv_finish+0xd8/0x120 May 21 19:09:59 esolr kernel: [ 18.787916] ipv6_rcv+0x347/0x510 May 21 19:09:59 esolr kernel: [ 18.787917] ? __pskb_pull_tail+0x7f/0x4b0 May 21 19:09:59 esolr kernel: [ 18.787918] ? skb_copy_bits+0x141/0x280 May 21 19:09:59 esolr kernel: [ 18.787920] ? __kmalloc_node_track_caller+0x216/0x2b0 May 21 19:09:59 esolr kernel: [ 18.787923] __netif_receive_skb_core+0x4
[Kernel-packages] [Bug 2020279] ProcCpuinfoMinimal.txt
apport information ** Attachment added: "ProcCpuinfoMinimal.txt" https://bugs.launchpad.net/bugs/2020279/+attachment/5674488/+files/ProcCpuinfoMinimal.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2020279 Title: Kernel warning after upgrade to 4.15.0.211.194 Status in linux package in Ubuntu: Confirmed Bug description: After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel started to produce the below warning. It did not seem to cause any major issue. Revering to 4.15.0.210 stopped the warning. The server is a Droplet at DigitalOcean with their monitoring/management agent installed. May 21 19:09:59 esolr kernel: [ 18.787737] [ cut here ] May 21 19:09:59 esolr kernel: [ 18.787803] WARNING: CPU: 0 PID: 1027 at /build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787804] Modules linked in: isofs xt_set nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net May 21 19:09:59 esolr kernel: [ 18.787835] CPU: 0 PID: 1027 Comm: unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu May 21 19:09:59 esolr kernel: [ 18.787836] Hardware name: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 May 21 19:09:59 esolr kernel: [ 18.787839] RIP: 0010:sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787840] RSP: :94bf7fc038c0 EFLAGS: 00010282 May 21 19:09:59 esolr kernel: [ 18.787841] RAX: 0024 RBX: 94bf79565500 RCX: 0006 May 21 19:09:59 esolr kernel: [ 18.787842] RDX: RSI: 94bf7fc1b4d8 RDI: 94bf7fc1b4d0 May 21 19:09:59 esolr kernel: [ 18.787842] RBP: 94bf7fc038d0 R08: 0222 R09: 0004 May 21 19:09:59 esolr kernel: [ 18.787843] R10: 94bf7fc03860 R11: 0001 R12: 94bf795655c8 May 21 19:09:59 esolr kernel: [ 18.787844] R13: 0006 R14: 003b R15: May 21 19:09:59 esolr kernel: [ 18.787845] FS: 7f04071d4740() GS:94bf7fc0() knlGS: May 21 19:09:59 esolr kernel: [ 18.787846] CS: 0010 DS: ES: CR0: 80050033 May 21 19:09:59 esolr kernel: [ 18.787846] CR2: 7f0401995e60 CR3: 67586002 CR4: 001606f0 May 21 19:09:59 esolr kernel: [ 18.787850] DR0: DR1: DR2: May 21 19:09:59 esolr kernel: [ 18.787851] DR3: DR6: fffe0ff0 DR7: 0400 May 21 19:09:59 esolr kernel: [ 18.787851] Call Trace: May 21 19:09:59 esolr kernel: [ 18.787853] May 21 19:09:59 esolr kernel: [ 18.787866] inet_csk_destroy_sock+0x59/0x150 May 21 19:09:59 esolr kernel: [ 18.787868] tcp_done+0x96/0xa0 May 21 19:09:59 esolr kernel: [ 18.787872] tcp_time_wait+0x1be/0x280 May 21 19:09:59 esolr kernel: [ 18.787874] tcp_fin+0x16b/0x180 May 21 19:09:59 esolr kernel: [ 18.787876] tcp_data_queue+0x594/0xc20 May 21 19:09:59 esolr kernel: [ 18.787881] tcp_rcv_state_process+0x5dd/0xe70 May 21 19:09:59 esolr kernel: [ 18.787887] ? __slab_alloc+0x20/0x40 May 21 19:09:59 esolr kernel: [ 18.787889] ? kmem_cache_alloc+0x161/0x1c0 May 21 19:09:59 esolr kernel: [ 18.787891] ? skb_clone+0x56/0xc0 May 21 19:09:59 esolr kernel: [ 18.787897] tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787898] ? tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787899] tcp_v6_rcv+0x9b6/0xa60 May 21 19:09:59 esolr kernel: [ 18.787907] ? update_load_avg+0x5f9/0x780 May 21 19:09:59 esolr kernel: [ 18.787909] ip6_input_finish+0xcc/0x470 May 21 19:09:59 esolr kernel: [ 18.787911] ip6_input+0x3f/0xb0 May 21 19:09:59 esolr kernel: [ 18.787914] ? ip6_dst_check+0xb1/0xf0 May 21 19:09:59 esolr kernel: [ 18.787915] ip6_rcv_finish+0xd8/0x120 May 21 19:09:59 esolr kernel: [ 18.787916] ipv6_rcv+0x347/0x510 May 21 19:09:59 esolr kernel: [ 18.787917] ? __pskb_pull_tail+0x7f/0x4b0 May 21 19:09:59 esolr kernel: [ 18.787918] ? skb_copy_bits+0x141/0x280 May 21 19:09:59 esolr kernel: [ 18.787920] ? __kmalloc_node_track_caller+0x216/0x2b0 May 21 19:09:59 esolr kernel: [ 18.787923] __netif_receiv
[Kernel-packages] [Bug 2020279] Lspci.txt
apport information ** Attachment added: "Lspci.txt" https://bugs.launchpad.net/bugs/2020279/+attachment/5674486/+files/Lspci.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2020279 Title: Kernel warning after upgrade to 4.15.0.211.194 Status in linux package in Ubuntu: Confirmed Bug description: After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel started to produce the below warning. It did not seem to cause any major issue. Revering to 4.15.0.210 stopped the warning. The server is a Droplet at DigitalOcean with their monitoring/management agent installed. May 21 19:09:59 esolr kernel: [ 18.787737] [ cut here ] May 21 19:09:59 esolr kernel: [ 18.787803] WARNING: CPU: 0 PID: 1027 at /build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787804] Modules linked in: isofs xt_set nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net May 21 19:09:59 esolr kernel: [ 18.787835] CPU: 0 PID: 1027 Comm: unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu May 21 19:09:59 esolr kernel: [ 18.787836] Hardware name: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 May 21 19:09:59 esolr kernel: [ 18.787839] RIP: 0010:sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787840] RSP: :94bf7fc038c0 EFLAGS: 00010282 May 21 19:09:59 esolr kernel: [ 18.787841] RAX: 0024 RBX: 94bf79565500 RCX: 0006 May 21 19:09:59 esolr kernel: [ 18.787842] RDX: RSI: 94bf7fc1b4d8 RDI: 94bf7fc1b4d0 May 21 19:09:59 esolr kernel: [ 18.787842] RBP: 94bf7fc038d0 R08: 0222 R09: 0004 May 21 19:09:59 esolr kernel: [ 18.787843] R10: 94bf7fc03860 R11: 0001 R12: 94bf795655c8 May 21 19:09:59 esolr kernel: [ 18.787844] R13: 0006 R14: 003b R15: May 21 19:09:59 esolr kernel: [ 18.787845] FS: 7f04071d4740() GS:94bf7fc0() knlGS: May 21 19:09:59 esolr kernel: [ 18.787846] CS: 0010 DS: ES: CR0: 80050033 May 21 19:09:59 esolr kernel: [ 18.787846] CR2: 7f0401995e60 CR3: 67586002 CR4: 001606f0 May 21 19:09:59 esolr kernel: [ 18.787850] DR0: DR1: DR2: May 21 19:09:59 esolr kernel: [ 18.787851] DR3: DR6: fffe0ff0 DR7: 0400 May 21 19:09:59 esolr kernel: [ 18.787851] Call Trace: May 21 19:09:59 esolr kernel: [ 18.787853] May 21 19:09:59 esolr kernel: [ 18.787866] inet_csk_destroy_sock+0x59/0x150 May 21 19:09:59 esolr kernel: [ 18.787868] tcp_done+0x96/0xa0 May 21 19:09:59 esolr kernel: [ 18.787872] tcp_time_wait+0x1be/0x280 May 21 19:09:59 esolr kernel: [ 18.787874] tcp_fin+0x16b/0x180 May 21 19:09:59 esolr kernel: [ 18.787876] tcp_data_queue+0x594/0xc20 May 21 19:09:59 esolr kernel: [ 18.787881] tcp_rcv_state_process+0x5dd/0xe70 May 21 19:09:59 esolr kernel: [ 18.787887] ? __slab_alloc+0x20/0x40 May 21 19:09:59 esolr kernel: [ 18.787889] ? kmem_cache_alloc+0x161/0x1c0 May 21 19:09:59 esolr kernel: [ 18.787891] ? skb_clone+0x56/0xc0 May 21 19:09:59 esolr kernel: [ 18.787897] tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787898] ? tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787899] tcp_v6_rcv+0x9b6/0xa60 May 21 19:09:59 esolr kernel: [ 18.787907] ? update_load_avg+0x5f9/0x780 May 21 19:09:59 esolr kernel: [ 18.787909] ip6_input_finish+0xcc/0x470 May 21 19:09:59 esolr kernel: [ 18.787911] ip6_input+0x3f/0xb0 May 21 19:09:59 esolr kernel: [ 18.787914] ? ip6_dst_check+0xb1/0xf0 May 21 19:09:59 esolr kernel: [ 18.787915] ip6_rcv_finish+0xd8/0x120 May 21 19:09:59 esolr kernel: [ 18.787916] ipv6_rcv+0x347/0x510 May 21 19:09:59 esolr kernel: [ 18.787917] ? __pskb_pull_tail+0x7f/0x4b0 May 21 19:09:59 esolr kernel: [ 18.787918] ? skb_copy_bits+0x141/0x280 May 21 19:09:59 esolr kernel: [ 18.787920] ? __kmalloc_node_track_caller+0x216/0x2b0 May 21 19:09:59 esolr kernel: [ 18.787923] __netif_receive_skb_core+0x432/0xb80 Ma
[Kernel-packages] [Bug 2020279] ProcCpuinfo.txt
apport information ** Attachment added: "ProcCpuinfo.txt" https://bugs.launchpad.net/bugs/2020279/+attachment/5674487/+files/ProcCpuinfo.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2020279 Title: Kernel warning after upgrade to 4.15.0.211.194 Status in linux package in Ubuntu: Confirmed Bug description: After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel started to produce the below warning. It did not seem to cause any major issue. Revering to 4.15.0.210 stopped the warning. The server is a Droplet at DigitalOcean with their monitoring/management agent installed. May 21 19:09:59 esolr kernel: [ 18.787737] [ cut here ] May 21 19:09:59 esolr kernel: [ 18.787803] WARNING: CPU: 0 PID: 1027 at /build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787804] Modules linked in: isofs xt_set nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net May 21 19:09:59 esolr kernel: [ 18.787835] CPU: 0 PID: 1027 Comm: unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu May 21 19:09:59 esolr kernel: [ 18.787836] Hardware name: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 May 21 19:09:59 esolr kernel: [ 18.787839] RIP: 0010:sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787840] RSP: :94bf7fc038c0 EFLAGS: 00010282 May 21 19:09:59 esolr kernel: [ 18.787841] RAX: 0024 RBX: 94bf79565500 RCX: 0006 May 21 19:09:59 esolr kernel: [ 18.787842] RDX: RSI: 94bf7fc1b4d8 RDI: 94bf7fc1b4d0 May 21 19:09:59 esolr kernel: [ 18.787842] RBP: 94bf7fc038d0 R08: 0222 R09: 0004 May 21 19:09:59 esolr kernel: [ 18.787843] R10: 94bf7fc03860 R11: 0001 R12: 94bf795655c8 May 21 19:09:59 esolr kernel: [ 18.787844] R13: 0006 R14: 003b R15: May 21 19:09:59 esolr kernel: [ 18.787845] FS: 7f04071d4740() GS:94bf7fc0() knlGS: May 21 19:09:59 esolr kernel: [ 18.787846] CS: 0010 DS: ES: CR0: 80050033 May 21 19:09:59 esolr kernel: [ 18.787846] CR2: 7f0401995e60 CR3: 67586002 CR4: 001606f0 May 21 19:09:59 esolr kernel: [ 18.787850] DR0: DR1: DR2: May 21 19:09:59 esolr kernel: [ 18.787851] DR3: DR6: fffe0ff0 DR7: 0400 May 21 19:09:59 esolr kernel: [ 18.787851] Call Trace: May 21 19:09:59 esolr kernel: [ 18.787853] May 21 19:09:59 esolr kernel: [ 18.787866] inet_csk_destroy_sock+0x59/0x150 May 21 19:09:59 esolr kernel: [ 18.787868] tcp_done+0x96/0xa0 May 21 19:09:59 esolr kernel: [ 18.787872] tcp_time_wait+0x1be/0x280 May 21 19:09:59 esolr kernel: [ 18.787874] tcp_fin+0x16b/0x180 May 21 19:09:59 esolr kernel: [ 18.787876] tcp_data_queue+0x594/0xc20 May 21 19:09:59 esolr kernel: [ 18.787881] tcp_rcv_state_process+0x5dd/0xe70 May 21 19:09:59 esolr kernel: [ 18.787887] ? __slab_alloc+0x20/0x40 May 21 19:09:59 esolr kernel: [ 18.787889] ? kmem_cache_alloc+0x161/0x1c0 May 21 19:09:59 esolr kernel: [ 18.787891] ? skb_clone+0x56/0xc0 May 21 19:09:59 esolr kernel: [ 18.787897] tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787898] ? tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787899] tcp_v6_rcv+0x9b6/0xa60 May 21 19:09:59 esolr kernel: [ 18.787907] ? update_load_avg+0x5f9/0x780 May 21 19:09:59 esolr kernel: [ 18.787909] ip6_input_finish+0xcc/0x470 May 21 19:09:59 esolr kernel: [ 18.787911] ip6_input+0x3f/0xb0 May 21 19:09:59 esolr kernel: [ 18.787914] ? ip6_dst_check+0xb1/0xf0 May 21 19:09:59 esolr kernel: [ 18.787915] ip6_rcv_finish+0xd8/0x120 May 21 19:09:59 esolr kernel: [ 18.787916] ipv6_rcv+0x347/0x510 May 21 19:09:59 esolr kernel: [ 18.787917] ? __pskb_pull_tail+0x7f/0x4b0 May 21 19:09:59 esolr kernel: [ 18.787918] ? skb_copy_bits+0x141/0x280 May 21 19:09:59 esolr kernel: [ 18.787920] ? __kmalloc_node_track_caller+0x216/0x2b0 May 21 19:09:59 esolr kernel: [ 18.787923] __netif_receive_skb_core+0x4
[Kernel-packages] [Bug 2020279] Re: Kernel warning after upgrade to 4.15.0.211.194
apport information ** Tags added: apport-collected bionic uec-images ** Description changed: After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel started to produce the below warning. It did not seem to cause any major issue. Revering to 4.15.0.210 stopped the warning. The server is a Droplet at DigitalOcean with their monitoring/management agent installed. May 21 19:09:59 esolr kernel: [ 18.787737] [ cut here ] May 21 19:09:59 esolr kernel: [ 18.787803] WARNING: CPU: 0 PID: 1027 at /build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787804] Modules linked in: isofs xt_set nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net May 21 19:09:59 esolr kernel: [ 18.787835] CPU: 0 PID: 1027 Comm: unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu May 21 19:09:59 esolr kernel: [ 18.787836] Hardware name: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 May 21 19:09:59 esolr kernel: [ 18.787839] RIP: 0010:sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787840] RSP: :94bf7fc038c0 EFLAGS: 00010282 May 21 19:09:59 esolr kernel: [ 18.787841] RAX: 0024 RBX: 94bf79565500 RCX: 0006 May 21 19:09:59 esolr kernel: [ 18.787842] RDX: RSI: 94bf7fc1b4d8 RDI: 94bf7fc1b4d0 May 21 19:09:59 esolr kernel: [ 18.787842] RBP: 94bf7fc038d0 R08: 0222 R09: 0004 May 21 19:09:59 esolr kernel: [ 18.787843] R10: 94bf7fc03860 R11: 0001 R12: 94bf795655c8 May 21 19:09:59 esolr kernel: [ 18.787844] R13: 0006 R14: 003b R15: May 21 19:09:59 esolr kernel: [ 18.787845] FS: 7f04071d4740() GS:94bf7fc0() knlGS: May 21 19:09:59 esolr kernel: [ 18.787846] CS: 0010 DS: ES: CR0: 80050033 May 21 19:09:59 esolr kernel: [ 18.787846] CR2: 7f0401995e60 CR3: 67586002 CR4: 001606f0 May 21 19:09:59 esolr kernel: [ 18.787850] DR0: DR1: DR2: May 21 19:09:59 esolr kernel: [ 18.787851] DR3: DR6: fffe0ff0 DR7: 0400 May 21 19:09:59 esolr kernel: [ 18.787851] Call Trace: May 21 19:09:59 esolr kernel: [ 18.787853] May 21 19:09:59 esolr kernel: [ 18.787866] inet_csk_destroy_sock+0x59/0x150 May 21 19:09:59 esolr kernel: [ 18.787868] tcp_done+0x96/0xa0 May 21 19:09:59 esolr kernel: [ 18.787872] tcp_time_wait+0x1be/0x280 May 21 19:09:59 esolr kernel: [ 18.787874] tcp_fin+0x16b/0x180 May 21 19:09:59 esolr kernel: [ 18.787876] tcp_data_queue+0x594/0xc20 May 21 19:09:59 esolr kernel: [ 18.787881] tcp_rcv_state_process+0x5dd/0xe70 May 21 19:09:59 esolr kernel: [ 18.787887] ? __slab_alloc+0x20/0x40 May 21 19:09:59 esolr kernel: [ 18.787889] ? kmem_cache_alloc+0x161/0x1c0 May 21 19:09:59 esolr kernel: [ 18.787891] ? skb_clone+0x56/0xc0 May 21 19:09:59 esolr kernel: [ 18.787897] tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787898] ? tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787899] tcp_v6_rcv+0x9b6/0xa60 May 21 19:09:59 esolr kernel: [ 18.787907] ? update_load_avg+0x5f9/0x780 May 21 19:09:59 esolr kernel: [ 18.787909] ip6_input_finish+0xcc/0x470 May 21 19:09:59 esolr kernel: [ 18.787911] ip6_input+0x3f/0xb0 May 21 19:09:59 esolr kernel: [ 18.787914] ? ip6_dst_check+0xb1/0xf0 May 21 19:09:59 esolr kernel: [ 18.787915] ip6_rcv_finish+0xd8/0x120 May 21 19:09:59 esolr kernel: [ 18.787916] ipv6_rcv+0x347/0x510 May 21 19:09:59 esolr kernel: [ 18.787917] ? __pskb_pull_tail+0x7f/0x4b0 May 21 19:09:59 esolr kernel: [ 18.787918] ? skb_copy_bits+0x141/0x280 May 21 19:09:59 esolr kernel: [ 18.787920] ? __kmalloc_node_track_caller+0x216/0x2b0 May 21 19:09:59 esolr kernel: [ 18.787923] __netif_receive_skb_core+0x432/0xb80 May 21 19:09:59 esolr kernel: [ 18.787929] ? tcp6_gro_receive+0x137/0x1a0 May 21 19:09:59 esolr kernel: [ 18.787931] ? ipv6_gro_receive+0x1a6/0x350 May 21 19:09:59 esolr kernel: [ 18.787932] __netif_receive_skb+0x18/0x60 May 21 19:09:59 esolr kernel: [ 18.787933] ? __netif_receive_skb+0x18/0x60 May 21 19:0
[Kernel-packages] [Bug 2020279] Missing required logs.
This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window: apport-collect 2020279 and then change the status of the bug to 'Confirmed'. If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'. This change has been made by an automated script, maintained by the Ubuntu Kernel Team. ** Changed in: linux (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2020279 Title: Kernel warning after upgrade to 4.15.0.211.194 Status in linux package in Ubuntu: Incomplete Bug description: After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel started to produce the below warning. It did not seem to cause any major issue. Revering to 4.15.0.210 stopped the warning. The server is a Droplet at DigitalOcean with their monitoring/management agent installed. May 21 19:09:59 esolr kernel: [ 18.787737] [ cut here ] May 21 19:09:59 esolr kernel: [ 18.787803] WARNING: CPU: 0 PID: 1027 at /build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787804] Modules linked in: isofs xt_set nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net May 21 19:09:59 esolr kernel: [ 18.787835] CPU: 0 PID: 1027 Comm: unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu May 21 19:09:59 esolr kernel: [ 18.787836] Hardware name: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 May 21 19:09:59 esolr kernel: [ 18.787839] RIP: 0010:sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787840] RSP: :94bf7fc038c0 EFLAGS: 00010282 May 21 19:09:59 esolr kernel: [ 18.787841] RAX: 0024 RBX: 94bf79565500 RCX: 0006 May 21 19:09:59 esolr kernel: [ 18.787842] RDX: RSI: 94bf7fc1b4d8 RDI: 94bf7fc1b4d0 May 21 19:09:59 esolr kernel: [ 18.787842] RBP: 94bf7fc038d0 R08: 0222 R09: 0004 May 21 19:09:59 esolr kernel: [ 18.787843] R10: 94bf7fc03860 R11: 0001 R12: 94bf795655c8 May 21 19:09:59 esolr kernel: [ 18.787844] R13: 0006 R14: 003b R15: May 21 19:09:59 esolr kernel: [ 18.787845] FS: 7f04071d4740() GS:94bf7fc0() knlGS: May 21 19:09:59 esolr kernel: [ 18.787846] CS: 0010 DS: ES: CR0: 80050033 May 21 19:09:59 esolr kernel: [ 18.787846] CR2: 7f0401995e60 CR3: 67586002 CR4: 001606f0 May 21 19:09:59 esolr kernel: [ 18.787850] DR0: DR1: DR2: May 21 19:09:59 esolr kernel: [ 18.787851] DR3: DR6: fffe0ff0 DR7: 0400 May 21 19:09:59 esolr kernel: [ 18.787851] Call Trace: May 21 19:09:59 esolr kernel: [ 18.787853] May 21 19:09:59 esolr kernel: [ 18.787866] inet_csk_destroy_sock+0x59/0x150 May 21 19:09:59 esolr kernel: [ 18.787868] tcp_done+0x96/0xa0 May 21 19:09:59 esolr kernel: [ 18.787872] tcp_time_wait+0x1be/0x280 May 21 19:09:59 esolr kernel: [ 18.787874] tcp_fin+0x16b/0x180 May 21 19:09:59 esolr kernel: [ 18.787876] tcp_data_queue+0x594/0xc20 May 21 19:09:59 esolr kernel: [ 18.787881] tcp_rcv_state_process+0x5dd/0xe70 May 21 19:09:59 esolr kernel: [ 18.787887] ? __slab_alloc+0x20/0x40 May 21 19:09:59 esolr kernel: [ 18.787889] ? kmem_cache_alloc+0x161/0x1c0 May 21 19:09:59 esolr kernel: [ 18.787891] ? skb_clone+0x56/0xc0 May 21 19:09:59 esolr kernel: [ 18.787897] tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787898] ? tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787899] tcp_v6_rcv+0x9b6/0xa60 May 21 19:09:59 esolr kernel: [ 18.787907] ? update_load_avg+0x5f9/0x780 May 21 19:09:59 esolr kernel: [ 18.787909] ip6_input_finish+0xcc/0x470 May 21 19:09:59 esolr kernel: [ 18.787911] ip6_input+0x3f/0xb0 May 21 19:09:59 esolr kernel: [ 18.787914] ? ip6_dst_check+0xb1/0xf0 May
[Kernel-packages] [Bug 2020279] [NEW] Kernel warning after upgrade to 4.15.0.211.194
Public bug reported: After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel started to produce the below warning. It did not seem to cause any major issue. Revering to 4.15.0.210 stopped the warning. The server is a Droplet at DigitalOcean with their monitoring/management agent installed. May 21 19:09:59 esolr kernel: [ 18.787737] [ cut here ] May 21 19:09:59 esolr kernel: [ 18.787803] WARNING: CPU: 0 PID: 1027 at /build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787804] Modules linked in: isofs xt_set nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net May 21 19:09:59 esolr kernel: [ 18.787835] CPU: 0 PID: 1027 Comm: unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu May 21 19:09:59 esolr kernel: [ 18.787836] Hardware name: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 May 21 19:09:59 esolr kernel: [ 18.787839] RIP: 0010:sk_stream_kill_queues+0xed/0x110 May 21 19:09:59 esolr kernel: [ 18.787840] RSP: :94bf7fc038c0 EFLAGS: 00010282 May 21 19:09:59 esolr kernel: [ 18.787841] RAX: 0024 RBX: 94bf79565500 RCX: 0006 May 21 19:09:59 esolr kernel: [ 18.787842] RDX: RSI: 94bf7fc1b4d8 RDI: 94bf7fc1b4d0 May 21 19:09:59 esolr kernel: [ 18.787842] RBP: 94bf7fc038d0 R08: 0222 R09: 0004 May 21 19:09:59 esolr kernel: [ 18.787843] R10: 94bf7fc03860 R11: 0001 R12: 94bf795655c8 May 21 19:09:59 esolr kernel: [ 18.787844] R13: 0006 R14: 003b R15: May 21 19:09:59 esolr kernel: [ 18.787845] FS: 7f04071d4740() GS:94bf7fc0() knlGS: May 21 19:09:59 esolr kernel: [ 18.787846] CS: 0010 DS: ES: CR0: 80050033 May 21 19:09:59 esolr kernel: [ 18.787846] CR2: 7f0401995e60 CR3: 67586002 CR4: 001606f0 May 21 19:09:59 esolr kernel: [ 18.787850] DR0: DR1: DR2: May 21 19:09:59 esolr kernel: [ 18.787851] DR3: DR6: fffe0ff0 DR7: 0400 May 21 19:09:59 esolr kernel: [ 18.787851] Call Trace: May 21 19:09:59 esolr kernel: [ 18.787853] May 21 19:09:59 esolr kernel: [ 18.787866] inet_csk_destroy_sock+0x59/0x150 May 21 19:09:59 esolr kernel: [ 18.787868] tcp_done+0x96/0xa0 May 21 19:09:59 esolr kernel: [ 18.787872] tcp_time_wait+0x1be/0x280 May 21 19:09:59 esolr kernel: [ 18.787874] tcp_fin+0x16b/0x180 May 21 19:09:59 esolr kernel: [ 18.787876] tcp_data_queue+0x594/0xc20 May 21 19:09:59 esolr kernel: [ 18.787881] tcp_rcv_state_process+0x5dd/0xe70 May 21 19:09:59 esolr kernel: [ 18.787887] ? __slab_alloc+0x20/0x40 May 21 19:09:59 esolr kernel: [ 18.787889] ? kmem_cache_alloc+0x161/0x1c0 May 21 19:09:59 esolr kernel: [ 18.787891] ? skb_clone+0x56/0xc0 May 21 19:09:59 esolr kernel: [ 18.787897] tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787898] ? tcp_v6_do_rcv+0x1ca/0x440 May 21 19:09:59 esolr kernel: [ 18.787899] tcp_v6_rcv+0x9b6/0xa60 May 21 19:09:59 esolr kernel: [ 18.787907] ? update_load_avg+0x5f9/0x780 May 21 19:09:59 esolr kernel: [ 18.787909] ip6_input_finish+0xcc/0x470 May 21 19:09:59 esolr kernel: [ 18.787911] ip6_input+0x3f/0xb0 May 21 19:09:59 esolr kernel: [ 18.787914] ? ip6_dst_check+0xb1/0xf0 May 21 19:09:59 esolr kernel: [ 18.787915] ip6_rcv_finish+0xd8/0x120 May 21 19:09:59 esolr kernel: [ 18.787916] ipv6_rcv+0x347/0x510 May 21 19:09:59 esolr kernel: [ 18.787917] ? __pskb_pull_tail+0x7f/0x4b0 May 21 19:09:59 esolr kernel: [ 18.787918] ? skb_copy_bits+0x141/0x280 May 21 19:09:59 esolr kernel: [ 18.787920] ? __kmalloc_node_track_caller+0x216/0x2b0 May 21 19:09:59 esolr kernel: [ 18.787923] __netif_receive_skb_core+0x432/0xb80 May 21 19:09:59 esolr kernel: [ 18.787929] ? tcp6_gro_receive+0x137/0x1a0 May 21 19:09:59 esolr kernel: [ 18.787931] ? ipv6_gro_receive+0x1a6/0x350 May 21 19:09:59 esolr kernel: [ 18.787932] __netif_receive_skb+0x18/0x60 May 21 19:09:59 esolr kernel: [ 18.787933] ? __netif_receive_skb+0x18/0x60 May 21 19:09:59 esolr kernel: [ 18.787935] netif_receive_skb_internal+0x45/0xe0 May 21 19:09:59 esolr kernel: [ 18.787937] napi_gro_receive+0xc5/0xf0 May 21 19:09:59 esolr kernel: [
[Kernel-packages] [Bug 2018960] Re: linux-image-5.4.0-149-generic (focal-proposed): 0 at net/core/stream.c:212 sk_stream_kill_queues+0xcf/0xe0
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: linux-signed (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-signed in Ubuntu. https://bugs.launchpad.net/bugs/2018960 Title: linux-image-5.4.0-149-generic (focal-proposed): 0 at net/core/stream.c:212 sk_stream_kill_queues+0xcf/0xe0 Status in linux-signed package in Ubuntu: Confirmed Bug description: After upgrading and rebooting this Ubuntu 20.04 LTS server (Ubuntu Focal), I noticed that it was suddenly getting a bunch of kernel log (dmesg) reports like: WARNING: CPU: 4 PID: 0 at net/core/stream.c:212 sk_stream_kill_queues+0xcf/0xe0 while investigating I determined that it is currently running the focal-proposed kernel (linux-image-5.4.0-149-generic), which it turns out was enabled for this server (clearly it seemed like a good idea at the time). I'm not expecting focal-proposed to be fixed as if it were a release package, but since I couldn't find any reports on Launchpad I figured I should let y'all know this focal-proposed package could do with some additional work before it's actually released :-) There have been at least 80 such reports in the last 5 hours since the server was rebooted, differing only by the CPU core and the process reported, although it seems the last one was a couple of hours ago, so I guess it's traffic dependent/timing dependent. ewen@naosr620:~$ uptime 16:27:32 up 5:19, 1 user, load average: 0.08, 0.14, 0.06 ewen@naosr620:~$ dmesg -t | grep WARNING | sed 's/CPU: [0-9]*/CPU: N/; s/PID: [0-9]*/PID: N/;' | uniq -c 88 WARNING: CPU: N PID: N at net/core/stream.c:212 sk_stream_kill_queues+0xcf/0xe0 ewen@naosr620:~$ Ubuntu Release: ewen@naosr620:~$ lsb_release -rd Description: Ubuntu 20.04.6 LTS Release: 20.04 ewen@naosr620:~$ Kernel/package version affected: ewen@naosr620:~$ uname -a Linux naosr620 5.4.0-149-generic #166-Ubuntu SMP Tue Apr 18 16:51:45 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux ewen@naosr620:~$ dpkg -l | grep linux-image | grep 149 ii linux-image-5.4.0-149-generic 5.4.0-149.166 amd64Signed kernel image generic ii linux-image-generic5.4.0.149.147 amd64Generic Linux kernel image ewen@naosr620:~$ apt-cache policy linux-image-5.4.0-149-generic linux-image-5.4.0-149-generic: Installed: 5.4.0-149.166 Candidate: 5.4.0-149.166 Version table: *** 5.4.0-149.166 500 500 https://mirror.fsmg.org.nz/ubuntu focal-proposed/main amd64 Packages 100 /var/lib/dpkg/status ewen@naosr620:~$ apt-cache policy linux-image-generic linux-image-generic: Installed: 5.4.0.149.147 Candidate: 5.4.0.149.147 Version table: *** 5.4.0.149.147 500 500 https://mirror.fsmg.org.nz/ubuntu focal-proposed/main amd64 Packages 100 /var/lib/dpkg/status 5.4.0.148.146 500 500 https://mirror.fsmg.org.nz/ubuntu focal-updates/main amd64 Packages 500 https://mirror.fsmg.org.nz/ubuntu focal-security/main amd64 Packages 5.4.0.26.32 500 500 https://mirror.fsmg.org.nz/ubuntu focal/main amd64 Packages ewen@naosr620:~$ ewen@naosr620:~$ apt-cache show linux-image-5.4.0-149-generic | grep Source: Source: linux-signed ewen@naosr620:~$ Full example dmesg, including stack trace (they all seem to be WARNINGs, and other than filling dmesg / system logs the system "appears to be running okay", so I'm not going to rush another reboot now -- near end of business day): ewen@naosr620:~$ date Tue 09 May 2023 16:34:56 NZST ewen@naosr620:~$ dmesg -T | tail -100 | grep -B 150 "end trace" | grep -A 999 "cut here" [Tue May 9 14:21:18 2023] [ cut here ] [Tue May 9 14:21:18 2023] WARNING: CPU: 10 PID: 0 at net/core/stream.c:212 sk_stream_kill_queues+0xcf/0xe0 [Tue May 9 14:21:18 2023] Modules linked in: mpt3sas raid_class scsi_transport_sas mptctl mptbase vhost_net vhost tap ip6t_REJECT nf_reject_ipv6 ip6table_mangle ip6table_nat ip6table_raw nf_log_ipv6 xt_recent ipt_REJECT nf_reject_ipv4 xt_hashlimit xt_addrtype xt_multiport xt_comment xt_conntrack xt_mark iptable_mangle xt_MASQUERADE iptable_nat xt_CT xt_tcpudp iptable_raw nfnetlink_log xt_NFLOG nf_log_ipv4 nf_log_common xt_LOG nf_nat_tftp nf_nat_snmp_basic nf_conntrack_snmp nf_nat_sip nf_nat_pptp nf_nat_irc ebtable_filter nf_nat_h323 ebtables nf_nat_ftp nf_nat_amanda ts_kmp ip6table_filter nf_conntrack_amanda nf_nat ip6_tables nf_conntrack_sane nf_conntrack_tftp nf_conntrack_sip nf_conntrack_pptp nf_conntrack_netlink nfnetlink nf_conntrack_netbios_ns nf_conntrack_broadcast nf_conntrack_irc nf_conntrack_h323 nf_conntrack_ftp nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 iptable_filter bpfilter dell_rbu nls_iso8859_
[Kernel-packages] [Bug 2018470] Re: Linux 5.19 amdgpu: NULL pointer on GCN2 and invalid load on GCN1
I now see the original message was edited, with this words added: > [Test case] > Install the update, check that display works again on amdgpu I confirm display works again on amdgpu -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2018470 Title: Linux 5.19 amdgpu: NULL pointer on GCN2 and invalid load on GCN1 Status in linux package in Ubuntu: Confirmed Status in linux source package in Kinetic: Fix Committed Status in linux source package in Mantic: Confirmed Bug description: [Impact] A regression caused by incomplete stable backports [Fix] commit 8273b4048664fff356fd10059033f0e2f5a422a1 Author: Arunpravin Paneer Selvam Date: Tue Oct 18 07:08:38 2022 -0700 drm/amdgpu: Fix for BO move issue [Test case] Install the update, check that display works again on amdgpu -- The day I updated from Ubuntu 22.04 to 22.10 some months ago, I had to stick on Linux 5.15 because 5.19 was not working with my computer. The last two days I spent time to find a way to run Linux 5.19, and found one version working: 5.19.0-23. Here are the versions I tested: - 5.19.0-23 - 5.19.0-29 - 5.19.0-31 - 5.19.0-42 In that list, only Linux 5.19.0-23 is working with that computer. There may be other versions that work I have not tested, but basically the breakages occurred after 5.19.0-23. I face two problems, let's talk about the first one, the graphic one still present in 5.19.0-42. It starts to occurs with 5.19.0-31 (5.19.0-29 is not affected): graphic breaks at the moment it should switch from low resolution display to high resolution display at the very beginning of startup. The computer is not completely broken, but the graphic is dead. X11 cannot start, trying to use the framebuffer, meaning the amdgpu driver is not functional). The second bug is the one I get with the 5.19.0-29 version. Linux 5.19.0-29 doesn't experience the graphic bug but has another issue that makes the computer unusable: some CPU got locked, and some btrfs process runs at 100% CPU, syncing never ends, even preventing to reboot. This bug is less important because I don't reproduce it on version 5.19.0-42, so if 5.19.0-42 fixes the graphic all will be fine. I have not updated to Ubuntu 23.04 yet because I'm afraid of newer kernels from it would leave my computer totally unusable, I have run Ubuntu 22.10 with Ubuntu 22.04's 5.15 kernel until today because of that fear. It actually took me two work days to test various combinations to boot the computer so I'm sticking on 5.19.0-29 for now, and I have limited time to test other options. I also tried various BIOS options, and also upgraded the BIOS…, and since that ThreadRipper PRO computer has very slow booting BIOS, trying various configurations or software versions that requires a reboot quickly eats-up whole hours. The attached logs may have traces of dkim modules like amdgpu-pro, but the first time I experienced the bug I had none of them. I reproduced the bug on a 5.19.0-42 kernel free of amdgpu-pro yesterday. I'm simply opening the ticket from my working environment, and I decided to not spend one more hour just to uninstall amdgpu-pro and reboot only to do that ticket. Here are some details on the hardware: - MOBO: Gigabyte WRX80-SU8-IPMI rev. 1.0 (BIOS version F5, also named WRX80PRO-F1 in dmidecode, dated 08/04/2022) https://www.gigabyte.com/Motherboard/WRX80-SU8-IPMI-rev-10 - RAM: 8× Kingston Server Premier 32GB DDR4 3200 MHz ECC CL22 2Rx8 PC4-25600 KSM32ED8/32ME 16Gbit Micron E - CPU: AMD Ryzen Threadripper PRO 3955WX 16-Cores (Castle Peak, Zen 2) - GPU: AMD Radeon R9 390X (Hawaii/Grenada, GCN2, amdgpu driver) - GPU: AMD Radeon R7 240 (Oland, GCN1, amdgpu driver) - GPU: ASPEED graphic Family rev 41 The ASPEED graphic is a small card integrated in the motherboard and part of the BMC, I cannot remove it. This may participate in the trouble. When the graphic works (Linux 5.19.0-23, Linux 5.19.0-29), the boot is displayed on all AMD and ASPEED graphic output, then at the moment the graphic switches from low resolution to high resolution, the ASPEED graphic goes off and the display continue on AMD cards. When the graphic doesn't work (5.19.0-31, 5.19.0-42), the boot is displayed on all AMD and ASPEED graphic output, then at the moment the graphic switches from low resolution to high resolution, the AMD cards display garbage but the display continue on the ASPEED card. The ASPEED card is a very basic integrated card without hardware acceleration and featuring only one VGA output so that's unusable. As an additional information I know X11 never start on the ASPEED if there are discrete cards plugged in (tested last year). So right now that computer is sticking on Linux 5.19.0-23 which doesn't doesn't the graphic a
[Kernel-packages] [Bug 2018470] Re: Linux 5.19 amdgpu: NULL pointer on GCN2 and invalid load on GCN1
I'm on 5.19.0-44.45 right now. What 5.19.0-44.45 is expected to fix? - The computer boots properly, I have both R7 240 and R9 390X displaying something fine, so that error is fixed. - I still have an error message in dmesg: ``` [7.609329] [7.610224] UBSAN: invalid-load in /build/linux-le9C0y/linux-5.19.0/drivers/gpu/drm/amd/amdgpu/../pm/amdgpu_dpm.c:1363:37 [7.611125] load of value 232 is not a valid value for type '_Bool' [7.612025] CPU: 14 PID: 400 Comm: systemd-udevd Not tainted 5.19.0-44-generic #45-Ubuntu [7.612928] Hardware name: Default string Default string/Default string, BIOS WRX80PRO-F1 08/04/2022 [7.613836] Call Trace: [7.614736] [7.615633] show_stack+0x4e/0x61 [7.616531] dump_stack_lvl+0x4a/0x6f [7.617429] dump_stack+0x10/0x18 [7.618333] ubsan_epilogue+0x9/0x3a [7.619231] __ubsan_handle_load_invalid_value.cold+0x42/0x47 [7.620124] amdgpu_dpm_is_overdrive_supported.cold+0x12/0x45 [amdgpu] [7.621402] default_attr_update+0x332/0x500 [amdgpu] [7.622641] amdgpu_pm_sysfs_init+0x16f/0x1e0 [amdgpu] [7.623871] amdgpu_device_init.cold+0x3b7/0x80a [amdgpu] [7.625107] amdgpu_driver_load_kms+0x1c/0x170 [amdgpu] [7.626277] amdgpu_pci_probe+0x15f/0x3c0 [amdgpu] [7.627419] local_pci_probe+0x47/0x90 [7.628270] pci_call_probe+0x55/0x190 [7.629107] pci_device_probe+0x84/0x120 [7.629934] really_probe+0x1df/0x3b0 [7.630767] __driver_probe_device+0x12c/0x1b0 [7.631596] driver_probe_device+0x24/0xd0 [7.632426] __driver_attach+0x10b/0x210 [7.633255] ? __device_attach_driver+0x170/0x170 [7.634087] bus_for_each_dev+0x90/0xe0 [7.634917] driver_attach+0x1e/0x30 [7.635740] bus_add_driver+0x187/0x230 [7.636562] driver_register+0x8f/0x100 [7.637379] __pci_register_driver+0x62/0x70 [7.638203] amdgpu_init+0x6a/0x1000 [amdgpu] [7.639307] ? 0xc05c [7.640118] do_one_initcall+0x5e/0x240 [7.640929] do_init_module+0x50/0x210 [7.641736] load_module+0xb7d/0xcd0 [7.642532] __do_sys_finit_module+0xc4/0x140 [7.643316] ? __do_sys_finit_module+0xc4/0x140 [7.644100] __x64_sys_finit_module+0x18/0x30 [7.644879] do_syscall_64+0x5b/0x90 [7.645661] ? ksys_mmap_pgoff+0x11d/0x260 [7.646444] ? exit_to_user_mode_prepare+0x30/0xb0 [7.647231] ? syscall_exit_to_user_mode+0x29/0x50 [7.648016] ? do_syscall_64+0x67/0x90 [7.648796] ? do_syscall_64+0x67/0x90 [7.649566] ? syscall_exit_to_user_mode+0x29/0x50 [7.650347] ? do_syscall_64+0x67/0x90 [7.651120] entry_SYSCALL_64_after_hwframe+0x63/0xcd [7.651888] RIP: 0033:0x7f790b1eec4d [7.652645] Code: 5d c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 83 f1 0d 00 f7 d8 64 89 01 48 [7.653432] RSP: 002b:7fffa9b1d908 EFLAGS: 0246 ORIG_RAX: 0139 [7.654222] RAX: ffda RBX: 556a6508e430 RCX: 7f790b1eec4d [7.655015] RDX: RSI: 556a650933b0 RDI: 0015 [7.655815] RBP: 556a650933b0 R08: R09: 7f790b2cec60 [7.656610] R10: 0015 R11: 0246 R12: 0002 [7.657414] R13: 556a650795d0 R14: R15: 556a65079030 [7.658216] [7.659037] ``` -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2018470 Title: Linux 5.19 amdgpu: NULL pointer on GCN2 and invalid load on GCN1 Status in linux package in Ubuntu: Confirmed Status in linux source package in Kinetic: Fix Committed Status in linux source package in Mantic: Confirmed Bug description: [Impact] A regression caused by incomplete stable backports [Fix] commit 8273b4048664fff356fd10059033f0e2f5a422a1 Author: Arunpravin Paneer Selvam Date: Tue Oct 18 07:08:38 2022 -0700 drm/amdgpu: Fix for BO move issue [Test case] Install the update, check that display works again on amdgpu -- The day I updated from Ubuntu 22.04 to 22.10 some months ago, I had to stick on Linux 5.15 because 5.19 was not working with my computer. The last two days I spent time to find a way to run Linux 5.19, and found one version working: 5.19.0-23. Here are the versions I tested: - 5.19.0-23 - 5.19.0-29 - 5.19.0-31 - 5.19.0-42 In that list, only Linux 5.19.0-23 is working with that computer. There may be other versions that work I have not tested, but basically the breakages occurred after 5.19.0-23. I face two problems, let's talk about the first one, the graphic one still present in 5.19.0-42. It starts to occurs with 5.19.0-
[Kernel-packages] [Bug 2018128] Re: Apport does not collect all logs when the package is HWE kernel
@4 Benjamin i ran sudo ln -s source_linux.py /usr/share/apport/package- hooks/source_linux-signed-hwe.py and added a symlink /usr/share/apport/package-hooks/source_linux-signed- hwe.py -> source_linux.py then created a new bug against 'linux' but the results were the same, no logs were imported see the new bug report https://bugs.launchpad.net/ubuntu/+source/linux- signed-hwe-5.19/+bug/2020268 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2018128 Title: Apport does not collect all logs when the package is HWE kernel Status in apport package in Ubuntu: Triaged Status in linux package in Ubuntu: Confirmed Bug description: Ubuntu 22.04 LTS with kernel 5.19.0-41-generic When filing bugs against the package 'linux' apport collects all the logs needed to the kernel But in case the user is not on stock kernel anymore and has the HWE kernel apport only imports 2 logs Dependencies.txt + ProcCpuInfoMinimal.txt and forwards the package 'linux' towards linux-signed-hwe-5.19 (in my case) would it be possible to make apport collect all the logs needed in all kernel cases? ProblemType: Bug DistroRelease: Ubuntu 22.04 Package: apport 2.20.11-0ubuntu82.4 ProcVersionSignature: Ubuntu 5.19.0-41.42~22.04.1-generic 5.19.17 Uname: Linux 5.19.0-41-generic x86_64 ApportLog: ApportVersion: 2.20.11-0ubuntu82.4 Architecture: amd64 CasperMD5CheckResult: unknown CurrentDesktop: ubuntu:GNOME Date: Sat Apr 29 05:25:30 2023 PackageArchitecture: all SourcePackage: apport UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apport/+bug/2018128/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2020268] Re: test bug against HWE
** Changed in: linux-signed-hwe-5.19 (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-signed-hwe-5.19 in Ubuntu. https://bugs.launchpad.net/bugs/2020268 Title: test bug against HWE Status in linux-signed-hwe-5.19 package in Ubuntu: Invalid Bug description: this is a test ProblemType: Bug DistroRelease: Ubuntu 22.04 Package: linux-image-5.19.0-41-generic 5.19.0-41.42~22.04.1 ProcVersionSignature: Ubuntu 5.19.0-41.42~22.04.1-generic 5.19.17 Uname: Linux 5.19.0-41-generic x86_64 ApportVersion: 2.20.11-0ubuntu82.4 Architecture: amd64 CasperMD5CheckResult: unknown CurrentDesktop: ubuntu:GNOME Date: Sun May 21 16:32:24 2023 SourcePackage: linux-signed-hwe-5.19 UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-signed-hwe-5.19/+bug/2020268/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2020268] [NEW] test bug against HWE
Public bug reported: this is a test ProblemType: Bug DistroRelease: Ubuntu 22.04 Package: linux-image-5.19.0-41-generic 5.19.0-41.42~22.04.1 ProcVersionSignature: Ubuntu 5.19.0-41.42~22.04.1-generic 5.19.17 Uname: Linux 5.19.0-41-generic x86_64 ApportVersion: 2.20.11-0ubuntu82.4 Architecture: amd64 CasperMD5CheckResult: unknown CurrentDesktop: ubuntu:GNOME Date: Sun May 21 16:32:24 2023 SourcePackage: linux-signed-hwe-5.19 UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: linux-signed-hwe-5.19 (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug jammy wayland-session -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-signed-hwe-5.19 in Ubuntu. https://bugs.launchpad.net/bugs/2020268 Title: test bug against HWE Status in linux-signed-hwe-5.19 package in Ubuntu: New Bug description: this is a test ProblemType: Bug DistroRelease: Ubuntu 22.04 Package: linux-image-5.19.0-41-generic 5.19.0-41.42~22.04.1 ProcVersionSignature: Ubuntu 5.19.0-41.42~22.04.1-generic 5.19.17 Uname: Linux 5.19.0-41-generic x86_64 ApportVersion: 2.20.11-0ubuntu82.4 Architecture: amd64 CasperMD5CheckResult: unknown CurrentDesktop: ubuntu:GNOME Date: Sun May 21 16:32:24 2023 SourcePackage: linux-signed-hwe-5.19 UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-signed-hwe-5.19/+bug/2020268/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2016829] Re: Completely support vxlan and erspan for flower
** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-bluefield in Ubuntu. https://bugs.launchpad.net/bugs/2016829 Title: Completely support vxlan and erspan for flower Status in linux-bluefield package in Ubuntu: Invalid Status in linux-bluefield source package in Focal: Fix Committed Bug description: * Explain the bug(s) vxlan and erspan are already supported for flower to allow flower to match vxlan and erspan options. It needs to support vxlan and erspan to act_tunnel_key and related bug fixes for the sake of completeness and to avoid bug in the future. * Brief explanation of fixes Cherry-pick. No adaptation. Add vxlan/erspan support for act_tunnel_key and bug fixes. c96adff95619 cls_flower: call nla_ok() before nla_next() 8e1b3ac47866 net: sched: initialize with 0 before setting erspan md->u e20d4ff2acd7 net: sched: add erspan option support to act_tunnel_key fca3f91cc38a net: sched: add vxlan option support to act_tunnel_key * How to test For vxlan support: It is to allow setting vxlan options using the act_tunnel_key action. Different from geneve options, only one option can be set. And also, geneve options and vxlan options can't be set at the same time. gbp is the only param for vxlan options: # ip link add name vxlan0 type vxlan dstport 0 external # tc qdisc add dev eth0 ingress # tc filter add dev eth0 protocol ip parent : \ flower indev eth0 \ ip_proto udp \ action tunnel_key \ set src_ip 10.0.99.192 \ dst_ip 10.0.99.193 \ dst_port 6081 \ id 11 \ vxlan_opts 01020304 \ action mirred egress redirect dev vxlan0 For erspan support: It is to allow setting erspan options using the act_tunnel_key action. Different from geneve options, only one option can be set. And also, geneve options, vxlan options or erspan options can't be set at the same time. Options are expressed as ver:index:dir:hwid, when ver is set to 1, index will be applied while dir and hwid will be ignored, and when ver is set to 2, dir and hwid will be used while index will be ignored. # ip link add name erspan1 type erspan external # tc qdisc add dev eth0 ingress # tc filter add dev eth0 protocol ip parent : \ flower indev eth0 \ ip_proto udp \ action tunnel_key \ set src_ip 10.0.99.192 \ dst_ip 10.0.99.193 \ dst_port 6081 \ id 11 \ erspan_opts 1:2:0:0 \ action mirred egress redirect dev erspan1 * What it could break. Nothing. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2016829/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2020265] [NEW] package linux-firmware 20220329.git681281e4-0ubuntu3.13 failed to install/upgrade: unable to open '/lib/firmware/iwlwifi-7265-13.ucode.dpkg-new': Operation not pe
Public bug reported: having an issue with wifi adapter not working, tried refreshing firmware to make sure nothing broken, ran: sudo apt install --reinstall linux-firmware got an error and reporting. ProblemType: Package DistroRelease: Ubuntu 22.04 Package: linux-firmware 20220329.git681281e4-0ubuntu3.13 ProcVersionSignature: Ubuntu 5.15.0-72.79-generic 5.15.98 Uname: Linux 5.15.0-72-generic x86_64 ApportVersion: 2.20.11-0ubuntu82.4 AptOrdering: linux-firmware:amd64: Install NULL: ConfigurePending Architecture: amd64 AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1: CRDA: Error: command ['iw', 'reg', 'get'] failed with exit code 1: nl80211 not found. CasperMD5CheckResult: unknown Date: Sun May 21 09:44:18 2023 Dependencies: firmware-sof-signed 2.0-1ubuntu4.1 DpkgTerminalLog: Preparing to unpack .../linux-firmware_20220329.git681281e4-0ubuntu3.13_all.deb ... Unpacking linux-firmware (20220329.git681281e4-0ubuntu3.13) over (20220329.git681281e4-0ubuntu3.13) ... [1mdpkg:[0m error processing archive /var/cache/apt/archives/linux-firmware_20220329.git681281e4-0ubuntu3.13_all.deb (--unpack): unable to open '/lib/firmware/iwlwifi-7265-13.ucode.dpkg-new': Operation not permitted ErrorMessage: unable to open '/lib/firmware/iwlwifi-7265-13.ucode.dpkg-new': Operation not permitted InstallationDate: Installed on 2019-09-23 (1335 days ago) InstallationMedia: Ubuntu 19.04 "Disco Dingo" - Release amd64 (20190416) IwConfig: lono wireless extensions. enp0s31f6 no wireless extensions. Lsusb: Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 001 Device 004: ID 0cf3:e007 Qualcomm Atheros Communications Bus 001 Device 003: ID 046d:c534 Logitech, Inc. Unifying Receiver Bus 001 Device 002: ID 0bda:5686 Realtek Semiconductor Corp. Integrated_Webcam_HD Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub MachineType: Dell Inc. Latitude E5570 PackageArchitecture: all ProcFB: 0 EFI VGA ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-72-generic root=UUID=1f9d15e2-0d87-4693-8b50-0f7de800259f ro quiet splash vt.handoff=7 PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon. Python3Details: /usr/bin/python3.10, Python 3.10.6, python3-minimal, 3.10.6-1~22.04 PythonDetails: N/A RelatedPackageVersions: grub-pc 2.06-2ubuntu7.1 RfKill: SourcePackage: linux-firmware Title: package linux-firmware 20220329.git681281e4-0ubuntu3.13 failed to install/upgrade: unable to open '/lib/firmware/iwlwifi-7265-13.ucode.dpkg-new': Operation not permitted UpgradeStatus: Upgraded to jammy on 2023-05-13 (8 days ago) dmi.bios.date: 11/20/2022 dmi.bios.release: 1.34 dmi.bios.vendor: Dell Inc. dmi.bios.version: 1.34.3 dmi.board.name: 01D4DJ dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvr1.34.3:bd11/20/2022:br1.34:svnDellInc.:pnLatitudeE5570:pvr:rvnDellInc.:rn01D4DJ:rvrA00:cvnDellInc.:ct9:cvr:sku06DF: dmi.product.family: Latitude dmi.product.name: Latitude E5570 dmi.product.sku: 06DF dmi.sys.vendor: Dell Inc. ** Affects: linux-firmware (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package jammy -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-firmware in Ubuntu. https://bugs.launchpad.net/bugs/2020265 Title: package linux-firmware 20220329.git681281e4-0ubuntu3.13 failed to install/upgrade: unable to open '/lib/firmware/iwlwifi-7265-13.ucode.dpkg-new': Operation not permitted Status in linux-firmware package in Ubuntu: New Bug description: having an issue with wifi adapter not working, tried refreshing firmware to make sure nothing broken, ran: sudo apt install --reinstall linux-firmware got an error and reporting. ProblemType: Package DistroRelease: Ubuntu 22.04 Package: linux-firmware 20220329.git681281e4-0ubuntu3.13 ProcVersionSignature: Ubuntu 5.15.0-72.79-generic 5.15.98 Uname: Linux 5.15.0-72-generic x86_64 ApportVersion: 2.20.11-0ubuntu82.4 AptOrdering: linux-firmware:amd64: Install NULL: ConfigurePending Architecture: amd64 AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1: CRDA: Error: command ['iw', 'reg', 'get'] failed with exit code 1: nl80211 not found. CasperMD5CheckResult: unknown Date: Sun May 21 09:44:18 2023 Dependencies: firmware-sof-signed 2.0-1ubuntu4.1 DpkgTerminalLog: Preparing to unpack .../linux-firmware_20220329.git681281e4-0ubuntu3.13_all.deb ... Unpacking linux-firmware (20220329.git681281e4-0ubuntu3.13) over (20220329.git681281e4-0ubuntu3.13) ... [1mdpkg:[0m error processing archive /var/cache/apt/archives/linux-firmware_20220329.git681281e4-0ubuntu3.13_all.deb (--unpack): unable to open '/lib/firmware/iwlwif
[Kernel-packages] [Bug 2009136] Re: No HDMI audio under 5.19.0-35 & -37 (regression from -32)
Wow, you are really pissed off about that bot. I just want my audio to finally work after months of Ubuntu being stupid. I haven't used my GPU for anything for the last few months. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2009136 Title: No HDMI audio under 5.19.0-35 & -37 (regression from -32) Status in linux package in Ubuntu: Confirmed Status in linux source package in Jammy: Invalid Status in linux source package in Kinetic: Fix Released Bug description: [Impact] For amdgpu/i915, hdmi audio output device has disappeared. [Fix] The latest fix for the non-contiguous memalloc helper changed the allocation method for a non-IOMMU system to use only the fallback allocator. This should have worked, but it caused a problem sometimes when too many non-contiguous pages are allocated that can't be treated by HD-audio controller. As a quirk workaround, go back to the original strategy: use dma_alloc_noncontiguous() at first, and apply the fallback only when it fails, but only for non-IOMMU case [Test Case] 1. boot with kernel applied the patches. 2. check the cards in /proc/asound/cards. Get the hdmi cards. 0 [PCH ]: HDA-Intel - HDA Intel PCH HDA Intel PCH at 0xe232 irq 137 1 [HDMI ]: HDA-Intel - HDA ATI HDMI HDA ATI HDMI at 0xe226 irq 134 [Where problems could occur] Low, this is just workaround and may have a better solution in the future. [Misc] All patches has been landed on OEM-6.1 and lunar. ~~ CLARIFICATION: Just to avoid any confusion for those coming to this bug report; the "Jammy: invalid" status above does *not* mean that this bug doesn't affect jammy -- it does, and the kernel team is aware of this. All it reflects is that the fix has to go into the kinetic kernel package which will then flow into the kernel-hwe package implicitly. Currently known affected cards: * HD 7700 (comment 8) * R9 290 (comment 21) * RX 550 (LP: #2012141, and comment 27) * RX 570 (mine) * RX 580 (LP: #2009276, and comment 28) * WX 3200 (comment 29) * RX 6600 (LP: #2009542) * RX 6700 (LP: #2009275) [ Original Description ] After upgrading my Ubuntu jammy (22.04) desktop to the -35 release of the kernel, I found my HDMI audio output device had disappeared. Reverting to the -32 release caused it to appear again (hence why I'm filing the bug against the kernel rather than pulseaudio). I'm attaching the dmesg output from immediately after booting each kernel, but after a bit of trimming and diffing I *think* the following lines are the salient ones: input: HDA ATI HDMI HDMI/DP,pcm=3 as /devices/pci:00/:00:03.1/:2b:00.1/sound/card0/input12 input: HDA ATI HDMI HDMI/DP,pcm=7 as /devices/pci:00/:00:03.1/:2b:00.1/sound/card0/input13 input: HDA ATI HDMI HDMI/DP,pcm=8 as /devices/pci:00/:00:03.1/:2b:00.1/sound/card0/input14 input: HDA ATI HDMI HDMI/DP,pcm=9 as /devices/pci:00/:00:03.1/:2b:00.1/sound/card0/input15 input: HDA ATI HDMI HDMI/DP,pcm=10 as /devices/pci:00/:00:03.1/:2b:00.1/sound/card0/input16 input: HDA ATI HDMI HDMI/DP,pcm=11 as /devices/pci:00/:00:03.1/:2b:00.1/sound/card0/input17 snd_hda_intel :2b:00.1: bound :2b:00.0 (ops amdgpu_dm_audio_component_bind_ops [amdgpu]) These lines appear in the dmesg of the -32 kernel, but not in the -35 kernel's log. Meanwhile, the following lines appear in the -35 kernel's log but not in the -32: hdaudio hdaudioC0D0: no AFG or MFG node found snd_hda_intel :2b:00.1: no codecs initialized I'll also attach the output of "pactl list" under each kernel (this shows the HDMI audio sink showing up under -32, but not -35) just in case that helps shed any light on things. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2009136/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2004534] Re: Lenovo IdeaPad 3 15ABA7 never wakes from sleep
Exactly the same bug here with all Distros and up to Kernel 6.2.x I think it has to do with the internal ssd. It looks like the ssd won't wake up after suspend and there are no BIOS settings to change the behavior. I hope this will fixed sometimes. Cheers -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2004534 Title: Lenovo IdeaPad 3 15ABA7 never wakes from sleep Status in linux package in Ubuntu: Confirmed Bug description: - on locked screen: the keyboard blocks after a while and I cannot login anymore; - on unlocked screen: = apps do not start (failed to start); = no icon pictures on desktop; = no wallpaper anymore (black background); ProblemType: Bug DistroRelease: Ubuntu 22.04 Package: xorg 1:7.7+23ubuntu2 ProcVersionSignature: Ubuntu 5.15.0-58.64-generic 5.15.74 Uname: Linux 5.15.0-58-generic x86_64 ApportVersion: 2.20.11-0ubuntu82.3 Architecture: amd64 BootLog: Error: [Errno 13] Permission denied: '/var/log/boot.log' CasperMD5CheckResult: pass CompositorRunning: None CurrentDesktop: ubuntu:GNOME Date: Thu Feb 2 07:15:13 2023 DistUpgraded: Fresh install DistroCodename: jammy DistroVariant: ubuntu ExtraDebuggingInterest: Yes, including running git bisection searches GraphicsCard: Advanced Micro Devices, Inc. [AMD/ATI] Barcelo [1002:15e7] (rev c2) (prog-if 00 [VGA controller]) Subsystem: Lenovo Device [17aa:3801] InstallationDate: Installed on 2023-02-01 (1 days ago) InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 (20220809.1) MachineType: LENOVO 82RN ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-58-generic root=UUID=b63af605-bd2f-4b16-8bb4-1cc9bb85554c ro quiet splash vt.handoff=7 SourcePackage: xorg Symptom: display UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 08/04/2022 dmi.bios.release: 1.38 dmi.bios.vendor: LENOVO dmi.bios.version: JTCN38WW dmi.board.asset.tag: No Asset Tag dmi.board.name: LNVNB161216 dmi.board.vendor: LENOVO dmi.board.version: NO DPK dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: IdeaPad 3 15ABA7 dmi.ec.firmware.release: 1.38 dmi.modalias: dmi:bvnLENOVO:bvrJTCN38WW:bd08/04/2022:br1.38:efr1.38:svnLENOVO:pn82RN:pvrIdeaPad315ABA7:rvnLENOVO:rnLNVNB161216:rvrNODPK:cvnLENOVO:ct10:cvrIdeaPad315ABA7:skuLENOVO_MT_82RN_BU_idea_FM_IdeaPad315ABA7: dmi.product.family: IdeaPad 3 15ABA7 dmi.product.name: 82RN dmi.product.sku: LENOVO_MT_82RN_BU_idea_FM_IdeaPad 3 15ABA7 dmi.product.version: IdeaPad 3 15ABA7 dmi.sys.vendor: LENOVO version.compiz: compiz N/A version.libdrm2: libdrm2 2.4.110-1ubuntu1 version.libgl1-mesa-dri: libgl1-mesa-dri 22.0.5-0ubuntu0.1 version.libgl1-mesa-glx: libgl1-mesa-glx N/A version.xserver-xorg-core: xserver-xorg-core 2:21.1.3-2ubuntu2.5 version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:19.1.0-2ubuntu1 version.xserver-xorg-video-intel: xserver-xorg-video-intel 2:2.99.917+git20210115-1 version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 1:1.0.17-2build1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2004534/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp