[Kernel-packages] [Bug 2020319] Re: Encountering an issue with memcpy_fromio causing failed boot of SEV-enabled guest

2023-05-21 Thread ChengEn, Du
** Also affects: linux (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020319

Title:
  Encountering an issue with memcpy_fromio causing failed boot of SEV-
  enabled guest

Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Bionic:
  New
Status in linux source package in Focal:
  New
Status in linux source package in Jammy:
  New

Bug description:
  [Impact]
  When launching a SEV-enabled guest, the guest kernel panics with the 
following call trace,
  indicating a critical error in the system.

  ==
  [1.090638] software IO TLB: Memory encryption is active and system is 
using DMA bounce buffers
  [1.092105] Linux agpgart interface v0.103
  [1.092716] BUG: unable to handle page fault for address: 9b820003d068
  [1.093445] #PF: supervisor read access in kernel mode
  [1.093966] #PF: error_code(0x) - not-present page
  [1.094481] PGD 80010067 P4D 80010067 PUD 8001001d7067 PMD 
8001001da067 PTE 8000fed40173
  [1.094629] Oops:  [#1] SMP NOPTI
  [1.094629] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.15.0-46-generic 
#49-Ubuntu
  [1.094629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 
02/06/2015
  [1.094629] RIP: 0010:memcpy_fromio+0x27/0x50
  [1.094629] Code: cc cc cc 0f 1f 44 00 00 55 48 89 e5 48 85 d2 74 28 40 f6 
c6 01 75 30 48 83 fa 01 76 06 40 f6 c6 02 75 1c 48 89 d1 48 c1 e9 02  a5 f6 
c2 02 74 02 66 a5 f6 c2 01 74 01 a4 5d e9 14 b3 97 00 66
  [1.094629] RSP: 0018:9b820001ba50 EFLAGS: 00010212
  [1.094629] RAX: 9b820003d040 RBX: 9b820001bac0 RCX: 
0002
  [1.094629] RDX: 0008 RSI: 9b820003d068 RDI: 
9b820001ba90
  [1.094629] RBP: 9b820001ba50 R08: 0f80 R09: 
0f80
  [1.094629] R10: fed40080 R11: 9b820001bac0 R12: 
8cc7068eca48
  [1.094629] R13: 8cc700a64288 R14:  R15: 
fed40080
  [1.094629] FS:  () GS:8cc77bd0() 
knlGS:
  [1.094629] CS:  0010 DS:  ES:  CR0: 80050033
  [1.094629] CR2: 9b820003d068 CR3: 800174a1 CR4: 
00350ee0
  [1.094629] Call Trace:
  [1.094629]  
  [1.094629]  crb_map_io+0x315/0x870
  [1.094629]  ? radix_tree_iter_tag_clear+0x12/0x20
  [1.094629]  ? _raw_spin_unlock_irqrestore+0xe/0x30
  [1.094629]  crb_acpi_add+0xc2/0x140
  [1.094629]  acpi_device_probe+0x4c/0x170
  [1.094629]  really_probe+0x222/0x420
  [1.094629]  __driver_probe_device+0x119/0x190
  [1.094629]  driver_probe_device+0x23/0xc0
  [1.094629]  __driver_attach+0xbd/0x1e0
  [1.094629]  ? __device_attach_driver+0x120/0x120
  [1.094629]  bus_for_each_dev+0x7e/0xd0
  [1.094629]  driver_attach+0x1e/0x30
  [1.094629]  bus_add_driver+0x139/0x200
  [1.094629]  driver_register+0x95/0x100
  [1.094629]  ? init_tis+0xfd/0xfd
  [1.094629]  acpi_bus_register_driver+0x39/0x50
  [1.094629]  crb_acpi_driver_init+0x15/0x1b
  [1.094629]  do_one_initcall+0x48/0x1e0
  [1.094629]  do_initcalls+0x12f/0x159
  [1.094629]  kernel_init_freeable+0x162/0x1b5
  [1.094629]  ? rest_init+0x100/0x100
  [1.094629]  kernel_init+0x1b/0x150
  [1.094629]  ? rest_init+0x100/0x100
  [1.094629]  ret_from_fork+0x22/0x30
  [1.094629]  
  [1.094629] Modules linked in:
  [1.094629] CR2: 9b820003d068
  [1.094629] ---[ end trace 3d6d81c42a3c2030 ]---
  [1.094629] RIP: 0010:memcpy_fromio+0x27/0x50
  [1.094629] Code: cc cc cc 0f 1f 44 00 00 55 48 89 e5 48 85 d2 74 28 40 f6 
c6 01 75 30 48 83 fa 01 76 06 40 f6 c6 02 75 1c 48 89 d1 48 c1 e9 02  a5 f6 
c2 02 74 02 66 a5 f6 c2 01 74 01 a4 5d e9 14 b3 97 00 66
  [1.094629] RSP: 0018:9b820001ba50 EFLAGS: 00010212
  [1.094629] RAX: 9b820003d040 RBX: 9b820001bac0 RCX: 
0002
  [1.094629] RDX: 0008 RSI: 9b820003d068 RDI: 
9b820001ba90
  [1.094629] RBP: 9b820001ba50 R08: 0f80 R09: 
0f80
  [1.094629] R10: fed40080 R11: 9b820001bac0 R12: 
8cc7068eca48
  [1.094629] R13: 8cc700a64288 R14:  R15: 
fed40080
  [1.094629] FS:  () GS:8cc77bd0() 
knlGS:
  [1.094629] CS:  0010 DS:  ES:  CR0: 80050033
  [1.094629] CR2: 9b820003d068 CR3: 800174a1 CR4: 
00350ee0
  [1.094629] Kernel panic - not syncing: Attempted to kill init! 
exitcode=0x0009
  [1.094629] Kernel Offset: 0x20 from 0xff

[Kernel-packages] [Bug 2020319] Missing required logs.

2023-05-21 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 2020319

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020319

Title:
  Encountering an issue with memcpy_fromio causing failed boot of SEV-
  enabled guest

Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Bionic:
  New
Status in linux source package in Focal:
  New
Status in linux source package in Jammy:
  New

Bug description:
  [Impact]
  When launching a SEV-enabled guest, the guest kernel panics with the 
following call trace,
  indicating a critical error in the system.

  ==
  [1.090638] software IO TLB: Memory encryption is active and system is 
using DMA bounce buffers
  [1.092105] Linux agpgart interface v0.103
  [1.092716] BUG: unable to handle page fault for address: 9b820003d068
  [1.093445] #PF: supervisor read access in kernel mode
  [1.093966] #PF: error_code(0x) - not-present page
  [1.094481] PGD 80010067 P4D 80010067 PUD 8001001d7067 PMD 
8001001da067 PTE 8000fed40173
  [1.094629] Oops:  [#1] SMP NOPTI
  [1.094629] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.15.0-46-generic 
#49-Ubuntu
  [1.094629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 
02/06/2015
  [1.094629] RIP: 0010:memcpy_fromio+0x27/0x50
  [1.094629] Code: cc cc cc 0f 1f 44 00 00 55 48 89 e5 48 85 d2 74 28 40 f6 
c6 01 75 30 48 83 fa 01 76 06 40 f6 c6 02 75 1c 48 89 d1 48 c1 e9 02  a5 f6 
c2 02 74 02 66 a5 f6 c2 01 74 01 a4 5d e9 14 b3 97 00 66
  [1.094629] RSP: 0018:9b820001ba50 EFLAGS: 00010212
  [1.094629] RAX: 9b820003d040 RBX: 9b820001bac0 RCX: 
0002
  [1.094629] RDX: 0008 RSI: 9b820003d068 RDI: 
9b820001ba90
  [1.094629] RBP: 9b820001ba50 R08: 0f80 R09: 
0f80
  [1.094629] R10: fed40080 R11: 9b820001bac0 R12: 
8cc7068eca48
  [1.094629] R13: 8cc700a64288 R14:  R15: 
fed40080
  [1.094629] FS:  () GS:8cc77bd0() 
knlGS:
  [1.094629] CS:  0010 DS:  ES:  CR0: 80050033
  [1.094629] CR2: 9b820003d068 CR3: 800174a1 CR4: 
00350ee0
  [1.094629] Call Trace:
  [1.094629]  
  [1.094629]  crb_map_io+0x315/0x870
  [1.094629]  ? radix_tree_iter_tag_clear+0x12/0x20
  [1.094629]  ? _raw_spin_unlock_irqrestore+0xe/0x30
  [1.094629]  crb_acpi_add+0xc2/0x140
  [1.094629]  acpi_device_probe+0x4c/0x170
  [1.094629]  really_probe+0x222/0x420
  [1.094629]  __driver_probe_device+0x119/0x190
  [1.094629]  driver_probe_device+0x23/0xc0
  [1.094629]  __driver_attach+0xbd/0x1e0
  [1.094629]  ? __device_attach_driver+0x120/0x120
  [1.094629]  bus_for_each_dev+0x7e/0xd0
  [1.094629]  driver_attach+0x1e/0x30
  [1.094629]  bus_add_driver+0x139/0x200
  [1.094629]  driver_register+0x95/0x100
  [1.094629]  ? init_tis+0xfd/0xfd
  [1.094629]  acpi_bus_register_driver+0x39/0x50
  [1.094629]  crb_acpi_driver_init+0x15/0x1b
  [1.094629]  do_one_initcall+0x48/0x1e0
  [1.094629]  do_initcalls+0x12f/0x159
  [1.094629]  kernel_init_freeable+0x162/0x1b5
  [1.094629]  ? rest_init+0x100/0x100
  [1.094629]  kernel_init+0x1b/0x150
  [1.094629]  ? rest_init+0x100/0x100
  [1.094629]  ret_from_fork+0x22/0x30
  [1.094629]  
  [1.094629] Modules linked in:
  [1.094629] CR2: 9b820003d068
  [1.094629] ---[ end trace 3d6d81c42a3c2030 ]---
  [1.094629] RIP: 0010:memcpy_fromio+0x27/0x50
  [1.094629] Code: cc cc cc 0f 1f 44 00 00 55 48 89 e5 48 85 d2 74 28 40 f6 
c6 01 75 30 48 83 fa 01 76 06 40 f6 c6 02 75 1c 48 89 d1 48 c1 e9 02  a5 f6 
c2 02 74 02 66 a5 f6 c2 01 74 01 a4 5d e9 14 b3 97 00 66
  [1.094629] RSP: 0018:9b820001ba50 EFLAGS: 00010212
  [1.094629] RAX: 9b820003d040 RBX: 9b820001bac0 RCX: 
0002
  [1.094629] RDX: 0008 RSI: 9b820003d068 RDI: 
9b820001ba90
  [1.094629] RBP: 9b820001ba50 R08: 0f80 R09: 
0f80
  [1.094629] R10: fed40080 R11: 9b820001bac0 R12: 
8cc7068eca48
  [1.094629] R13: 8cc700a64288 R14:  R15: 
fed40080
  [1.094629] FS:  

[Kernel-packages] [Bug 2020319] [NEW] Encountering an issue with memcpy_fromio causing failed boot of SEV-enabled guest

2023-05-21 Thread ChengEn, Du
Public bug reported:

[Impact]
When launching a SEV-enabled guest, the guest kernel panics with the following 
call trace,
indicating a critical error in the system.

==
[1.090638] software IO TLB: Memory encryption is active and system is using 
DMA bounce buffers
[1.092105] Linux agpgart interface v0.103
[1.092716] BUG: unable to handle page fault for address: 9b820003d068
[1.093445] #PF: supervisor read access in kernel mode
[1.093966] #PF: error_code(0x) - not-present page
[1.094481] PGD 80010067 P4D 80010067 PUD 8001001d7067 PMD 
8001001da067 PTE 8000fed40173
[1.094629] Oops:  [#1] SMP NOPTI
[1.094629] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.15.0-46-generic 
#49-Ubuntu
[1.094629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 
02/06/2015
[1.094629] RIP: 0010:memcpy_fromio+0x27/0x50
[1.094629] Code: cc cc cc 0f 1f 44 00 00 55 48 89 e5 48 85 d2 74 28 40 f6 
c6 01 75 30 48 83 fa 01 76 06 40 f6 c6 02 75 1c 48 89 d1 48 c1 e9 02  a5 f6 
c2 02 74 02 66 a5 f6 c2 01 74 01 a4 5d e9 14 b3 97 00 66
[1.094629] RSP: 0018:9b820001ba50 EFLAGS: 00010212
[1.094629] RAX: 9b820003d040 RBX: 9b820001bac0 RCX: 0002
[1.094629] RDX: 0008 RSI: 9b820003d068 RDI: 9b820001ba90
[1.094629] RBP: 9b820001ba50 R08: 0f80 R09: 0f80
[1.094629] R10: fed40080 R11: 9b820001bac0 R12: 8cc7068eca48
[1.094629] R13: 8cc700a64288 R14:  R15: fed40080
[1.094629] FS:  () GS:8cc77bd0() 
knlGS:
[1.094629] CS:  0010 DS:  ES:  CR0: 80050033
[1.094629] CR2: 9b820003d068 CR3: 800174a1 CR4: 00350ee0
[1.094629] Call Trace:
[1.094629]  
[1.094629]  crb_map_io+0x315/0x870
[1.094629]  ? radix_tree_iter_tag_clear+0x12/0x20
[1.094629]  ? _raw_spin_unlock_irqrestore+0xe/0x30
[1.094629]  crb_acpi_add+0xc2/0x140
[1.094629]  acpi_device_probe+0x4c/0x170
[1.094629]  really_probe+0x222/0x420
[1.094629]  __driver_probe_device+0x119/0x190
[1.094629]  driver_probe_device+0x23/0xc0
[1.094629]  __driver_attach+0xbd/0x1e0
[1.094629]  ? __device_attach_driver+0x120/0x120
[1.094629]  bus_for_each_dev+0x7e/0xd0
[1.094629]  driver_attach+0x1e/0x30
[1.094629]  bus_add_driver+0x139/0x200
[1.094629]  driver_register+0x95/0x100
[1.094629]  ? init_tis+0xfd/0xfd
[1.094629]  acpi_bus_register_driver+0x39/0x50
[1.094629]  crb_acpi_driver_init+0x15/0x1b
[1.094629]  do_one_initcall+0x48/0x1e0
[1.094629]  do_initcalls+0x12f/0x159
[1.094629]  kernel_init_freeable+0x162/0x1b5
[1.094629]  ? rest_init+0x100/0x100
[1.094629]  kernel_init+0x1b/0x150
[1.094629]  ? rest_init+0x100/0x100
[1.094629]  ret_from_fork+0x22/0x30
[1.094629]  
[1.094629] Modules linked in:
[1.094629] CR2: 9b820003d068
[1.094629] ---[ end trace 3d6d81c42a3c2030 ]---
[1.094629] RIP: 0010:memcpy_fromio+0x27/0x50
[1.094629] Code: cc cc cc 0f 1f 44 00 00 55 48 89 e5 48 85 d2 74 28 40 f6 
c6 01 75 30 48 83 fa 01 76 06 40 f6 c6 02 75 1c 48 89 d1 48 c1 e9 02  a5 f6 
c2 02 74 02 66 a5 f6 c2 01 74 01 a4 5d e9 14 b3 97 00 66
[1.094629] RSP: 0018:9b820001ba50 EFLAGS: 00010212
[1.094629] RAX: 9b820003d040 RBX: 9b820001bac0 RCX: 0002
[1.094629] RDX: 0008 RSI: 9b820003d068 RDI: 9b820001ba90
[1.094629] RBP: 9b820001ba50 R08: 0f80 R09: 0f80
[1.094629] R10: fed40080 R11: 9b820001bac0 R12: 8cc7068eca48
[1.094629] R13: 8cc700a64288 R14:  R15: fed40080
[1.094629] FS:  () GS:8cc77bd0() 
knlGS:
[1.094629] CS:  0010 DS:  ES:  CR0: 80050033
[1.094629] CR2: 9b820003d068 CR3: 800174a1 CR4: 00350ee0
[1.094629] Kernel panic - not syncing: Attempted to kill init! 
exitcode=0x0009
[1.094629] Kernel Offset: 0x20 from 0x8100 (relocation 
range: 0x8000-0xbfff)
[1.094629] ---[ end Kernel panic - not syncing: Attempted to kill init! 
exitcode=0x0009 ]---
==

[Fix]
The issue arises when launching kernels in libvirt-managed SEV virtual machines 
due to the addition of a tpm-crb device by virt-install.
Upstream commit 4009a4ac82dd has fixed this issue.
==
Author: Joerg Roedel 
Date: Mon Mar 21 10:33:51 2022 +0100

x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO

The io-specific memcpy/memset functions use string mmio accesses to do
their work. Under SEV, the hypervisor can't emulate these instructions
because they read/write directly from/to encrypted memory.
==

[Test Plan]
1. Use virt-install to create a SEV-enabled guest
virt-install --name sev_guest --memory 16384 --vcpus

[Kernel-packages] [Bug 2018473] Re: Jammy update: v6.1.26 upstream stable release

2023-05-21 Thread Atlas Yu
** Changed in: oem-priority
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-6.1 in Ubuntu.
https://bugs.launchpad.net/bugs/2018473

Title:
  Jammy update: v6.1.26 upstream stable release

Status in OEM Priority Project:
  Fix Released
Status in linux-oem-6.1 package in Ubuntu:
  Confirmed
Status in linux-oem-6.1 source package in Jammy:
  New

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 v6.1.26 upstream stable release
 from git://git.kernel.org/

  
  Linux 6.1.26
  ASN.1: Fix check for strdup() success
  ASoC: fsl_sai: Fix pins setting for i.MX8QM platform
  ASoC: fsl_asrc_dma: fix potential null-ptr-deref
  ASoC: SOF: pm: Tear down pipelines only if DSP was active
  mm/page_alloc: fix potential deadlock on zonelist_update_seq seqlock
  fpga: bridge: properly initialize bridge device before populating children
  iio: adc: at91-sama5d2_adc: fix an error code in at91_adc_allocate_trigger()
  Input: pegasus-notetaker - check pipe type when probing
  gcc: disable '-Warray-bounds' for gcc-13 too
  sctp: Call inet6_destroy_sock() via sk->sk_destruct().
  dccp: Call inet6_destroy_sock() via sk->sk_destruct().
  inet6: Remove inet6_destroy_sock() in sk->sk_prot->destroy().
  purgatory: fix disabling debug info
  fuse: always revalidate rename target dentry
  MIPS: Define RUNTIME_DISCARD_EXIT in LD script
  KVM: arm64: Fix buffer overflow in kvm_arm_set_fw_reg()
  KVM: arm64: Make vcpu flag updates non-preemptible
  sched/fair: Fixes for capacity inversion detection
  sched/fair: Consider capacity inversion in util_fits_cpu()
  sched/fair: Detect capacity inversion
  mm/mmap: regression fix for unmapped_area{_topdown}
  mm: page_alloc: skip regions with hugetlbfs pages when allocating 1G pages
  mm: kmsan: handle alloc failures in kmsan_vmap_pages_range_noflush()
  mm: kmsan: handle alloc failures in kmsan_ioremap_page_range()
  mm/huge_memory.c: warn with pr_warn_ratelimited instead of 
VM_WARN_ON_ONCE_FOLIO
  mm/khugepaged: check again on anon uffd-wp during isolation
  mm/userfaultfd: fix uffd-wp handling for THP migration entries
  drm/rockchip: vop2: Use regcache_sync() to fix suspend/resume
  drm/rockchip: vop2: fix suspend/resume
  drm/amd/display: set dcn315 lb bpp to 48
  drm/amdgpu: Fix desktop freezed after gpu-reset
  drm/i915: Fix fast wake AUX sync len
  mmc: sdhci_am654: Set HIGH_SPEED_ENA for SDR12 and SDR25
  writeback, cgroup: fix null-ptr-deref write in bdi_split_work_to_wbs
  kernel/sys.c: fix and improve control flow in __sys_setres[ug]id()
  memstick: fix memory leak if card device is never registered
  tools/mm/page_owner_sort.c: fix TGID output when cull=tg is used
  nilfs2: initialize unused bytes in segment summary blocks
  maple_tree: fix a potential memory leak, OOB access, or other unpredictable 
bug
  maple_tree: fix mas_empty_area() search
  maple_tree: make maple state reusable after mas_empty_area_rev()
  LoongArch: Mark 3 symbol exports as non-GPL
  LoongArch: Fix probing of the CRC32 feature
  rust: kernel: Mark rust_fmt_argument as extern "C"
  btrfs: get the next extent map during fiemap/lseek more efficiently
  ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook
  iio: light: tsl2772: fix reading proximity-diodes from device tree
  iio: dac: ad5755: Add missing fwnode_handle_put()
  drm/amdgpu/vcn: Disable indirect SRAM on Vangogh broken BIOSes
  Revert "userfaultfd: don't fail on unrecognized features"
  mtd: spi-nor: fix memory leak when using debugfs_lookup()
  platform/x86: asus-nb-wmi: Add quirk_asus_tablet_mode to other ROG Flow X13 
models
  platform/x86: gigabyte-wmi: add support for X570S AORUS ELITE
  xen/netback: use same error messages for same errors
  nvme-tcp: fix a possible UAF when failing to allocate an io queue
  drm: test: Fix 32-bit issue in drm_buddy_test
  drm: buddy_allocator: Fix buddy allocator init on 32-bit systems
  s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling
  platform/x86: gigabyte-wmi: add support for B650 AORUS ELITE AX
  net: dsa: b53: mmap: add phy ops
  scsi: core: Improve scsi_vpd_inquiry() checks
  scsi: megaraid_sas: Fix fw_crash_buffer_show()
  selftests: sigaltstack: fix -Wuninitialized
  platform/x86 (gigabyte-wmi): Add support for A320M-S2H V2
  platform/x86/intel: vsec: Fix a memory leak in intel_vsec_add_aux
  f2fs: Fix f2fs_truncate_partial_nodes ftrace event
  net: bridge: switchdev: don't notify FDB entries with "master dynamic"
  e1000e: Dis

[Kernel-packages] [Bug 1937133] Re: devlink_port_split from ubuntu_kernel_selftests.net fails on hirsute (KeyError: 'flavour')

2023-05-21 Thread Po-Hsu Lin
Test passed (skipped) with f-riscv-5.15

** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1937133

Title:
  devlink_port_split from ubuntu_kernel_selftests.net fails on hirsute
  (KeyError: 'flavour')

Status in ubuntu-kernel-tests:
  In Progress
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Hirsute:
  Won't Fix
Status in linux source package in Jammy:
  Fix Released
Status in linux source package in Kinetic:
  Fix Released
Status in linux source package in Lunar:
  Fix Released

Bug description:
  [Impact]
  On s390x LPAR instances, this test will fail with:
  #   File "linux/tools/testing/selftests/net/devlink_port_split.py", line 
64, in get_if_names
  # if ports[port]['flavour'] == 'physical':
  # KeyError: 'flavour'
not ok 1 selftests: net: devlink_port_split.py # exit=1

  This is because the mlx4 driver in use on this instance does not set
  attributes, therefore `devlink -j port show` command output does not
  contain this "flavour" key.

  [Fix]
  * 3de66d08d3 selftests: net: devlink_port_split.py: skip test if no
suitable device available

  This patch can be cherry-picked into our J/K/L kernels.

  [Test]
  Run the patched devlink_port_split.py on s390x LPAR, and it won't
  fail with # KeyError: 'flavour' but marked as SKIP instead.

  [Where problems could occur]
  If this change is incorrect, it may affect the test result, however it's
  limited to testing tools, no actual impact to kernel functions.


  [Original Bug Report]
  Failing on hirsute/linux 5.11.0-26.28  host s2lp4

  Not a regression as this is also failing on 5.11.0-24.25

  17:16:32 DEBUG| [stdout] # selftests: net: devlink_port_split.py
  17:16:32 DEBUG| [stdout] # Traceback (most recent call last):
  17:16:32 DEBUG| [stdout] #   File 
"/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net/./devlink_port_split.py",
 line 283, in 
  17:16:32 DEBUG| [stdout] # main()
  17:16:32 DEBUG| [stdout] #   File 
"/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net/./devlink_port_split.py",
 line 256, in main
  17:16:32 DEBUG| [stdout] # ports = devlink_ports(dev)
  17:16:32 DEBUG| [stdout] #   File 
"/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net/./devlink_port_split.py",
 line 70, in __init__
  17:16:32 DEBUG| [stdout] # self.if_names = devlink_ports.get_if_names(dev)
  17:16:32 DEBUG| [stdout] #   File 
"/home/ubuntu/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net/./devlink_port_split.py",
 line 64, in get_if_names
  17:16:32 DEBUG| [stdout] # if ports[port]['flavour'] == 'physical':
  17:16:32 DEBUG| [stdout] # KeyError: 'flavour'
  17:16:32 DEBUG| [stdout] not ok 44 selftests: net: devlink_port_split.py # 
exit=1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1937133/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2020295] [NEW] Include the MAC address pass through function on RTL8153DD-CG

2023-05-21 Thread AceLan Kao
Public bug reported:

[Impact]

[Fix]
Commit in v6.3-rc1 fixes the issue.
ec51fbd1b8a2 r8152: add USB device driver for config selection

[Test]

[Where problems could occur]

** Affects: hwe-next
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Assignee: AceLan Kao (acelankao)
 Status: Fix Released

** Affects: linux-oem-6.1 (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Jammy)
 Importance: Undecided
 Assignee: AceLan Kao (acelankao)
 Status: In Progress

** Affects: linux-oem-6.1 (Ubuntu Jammy)
 Importance: Undecided
 Assignee: AceLan Kao (acelankao)
 Status: In Progress

** Affects: linux (Ubuntu Kinetic)
 Importance: Undecided
 Assignee: AceLan Kao (acelankao)
 Status: In Progress

** Affects: linux-oem-6.1 (Ubuntu Kinetic)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Lunar)
 Importance: Undecided
 Assignee: AceLan Kao (acelankao)
 Status: In Progress

** Affects: linux-oem-6.1 (Ubuntu Lunar)
 Importance: Undecided
 Status: Invalid

** Affects: linux (Ubuntu Mantic)
 Importance: Undecided
 Assignee: AceLan Kao (acelankao)
 Status: Fix Released

** Affects: linux-oem-6.1 (Ubuntu Mantic)
 Importance: Undecided
 Status: Invalid


** Tags: oem-priority originate-from-1974429 somerville

** Also affects: linux (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Kinetic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Lunar)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Mantic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Mantic)
   Status: New => Fix Released

** Changed in: linux (Ubuntu Jammy)
 Assignee: (unassigned) => AceLan Kao (acelankao)

** Changed in: linux (Ubuntu Kinetic)
 Assignee: (unassigned) => AceLan Kao (acelankao)

** Changed in: linux (Ubuntu Lunar)
 Assignee: (unassigned) => AceLan Kao (acelankao)

** Changed in: linux (Ubuntu Mantic)
 Assignee: (unassigned) => AceLan Kao (acelankao)

** Changed in: linux (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: linux (Ubuntu Kinetic)
   Status: New => In Progress

** Changed in: linux (Ubuntu Lunar)
   Status: New => In Progress

** Tags added: oem-priority originate-from-1974429 somerville

** Description changed:

  [Impact]
  
  [Fix]
+ Commit in v6.3-rc1 fixes the issue.
+ ec51fbd1b8a2 r8152: add USB device driver for config selection
  
  [Test]
  
  [Where problems could occur]

** Also affects: linux-oem-6.1 (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-oem-6.1 (Ubuntu Kinetic)
   Status: New => Invalid

** Changed in: linux-oem-6.1 (Ubuntu Lunar)
   Status: New => Invalid

** Changed in: linux-oem-6.1 (Ubuntu Mantic)
   Status: New => Invalid

** Changed in: linux-oem-6.1 (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: linux-oem-6.1 (Ubuntu Jammy)
 Assignee: (unassigned) => AceLan Kao (acelankao)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020295

Title:
  Include the MAC address pass through function on RTL8153DD-CG

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Fix Released
Status in linux-oem-6.1 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  In Progress
Status in linux-oem-6.1 source package in Jammy:
  In Progress
Status in linux source package in Kinetic:
  In Progress
Status in linux-oem-6.1 source package in Kinetic:
  Invalid
Status in linux source package in Lunar:
  In Progress
Status in linux-oem-6.1 source package in Lunar:
  Invalid
Status in linux source package in Mantic:
  Fix Released
Status in linux-oem-6.1 source package in Mantic:
  Invalid

Bug description:
  [Impact]

  [Fix]
  Commit in v6.3-rc1 fixes the issue.
  ec51fbd1b8a2 r8152: add USB device driver for config selection

  [Test]

  [Where problems could occur]

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/2020295/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


Re: [Kernel-packages] [Bug 2004534] Re: Lenovo IdeaPad 3 15ABA7 never wakes from sleep

2023-05-21 Thread Ivan Kirov
the fact is that with Garuda linux or Slackware the bug is not there.
so i use garuda.
The bug is somewhere in Ubuntu.

On Sun, May 21, 2023, 14:05 andreas <2004...@bugs.launchpad.net> wrote:

> Exactly the same bug here with all Distros and up to Kernel 6.2.x
>
> I think it has to do with the internal ssd. It looks like the ssd won't
> wake up after suspend and there are no BIOS settings to change the
> behavior.
>
> I hope this will fixed sometimes.
>
> Cheers
>
> --
> You received this bug notification because you are subscribed to the bug
> report.
> https://bugs.launchpad.net/bugs/2004534
>
> Title:
>   Lenovo IdeaPad 3 15ABA7 never wakes from sleep
>
> Status in linux package in Ubuntu:
>   Confirmed
>
> Bug description:
>- on locked screen: the keyboard blocks after a while and I cannot
> login anymore;
>- on unlocked screen:
>= apps do not start (failed to start);
>= no icon pictures on desktop;
>= no wallpaper anymore (black background);
>
>   ProblemType: Bug
>   DistroRelease: Ubuntu 22.04
>   Package: xorg 1:7.7+23ubuntu2
>   ProcVersionSignature: Ubuntu 5.15.0-58.64-generic 5.15.74
>   Uname: Linux 5.15.0-58-generic x86_64
>   ApportVersion: 2.20.11-0ubuntu82.3
>   Architecture: amd64
>   BootLog: Error: [Errno 13] Permission denied: '/var/log/boot.log'
>   CasperMD5CheckResult: pass
>   CompositorRunning: None
>   CurrentDesktop: ubuntu:GNOME
>   Date: Thu Feb  2 07:15:13 2023
>   DistUpgraded: Fresh install
>   DistroCodename: jammy
>   DistroVariant: ubuntu
>   ExtraDebuggingInterest: Yes, including running git bisection searches
>   GraphicsCard:
>Advanced Micro Devices, Inc. [AMD/ATI] Barcelo [1002:15e7] (rev c2)
> (prog-if 00 [VGA controller])
>  Subsystem: Lenovo Device [17aa:3801]
>   InstallationDate: Installed on 2023-02-01 (1 days ago)
>   InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64
> (20220809.1)
>   MachineType: LENOVO 82RN
>   ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-58-generic
> root=UUID=b63af605-bd2f-4b16-8bb4-1cc9bb85554c ro quiet splash vt.handoff=7
>   SourcePackage: xorg
>   Symptom: display
>   UpgradeStatus: No upgrade log present (probably fresh install)
>   dmi.bios.date: 08/04/2022
>   dmi.bios.release: 1.38
>   dmi.bios.vendor: LENOVO
>   dmi.bios.version: JTCN38WW
>   dmi.board.asset.tag: No Asset Tag
>   dmi.board.name: LNVNB161216
>   dmi.board.vendor: LENOVO
>   dmi.board.version: NO DPK
>   dmi.chassis.asset.tag: No Asset Tag
>   dmi.chassis.type: 10
>   dmi.chassis.vendor: LENOVO
>   dmi.chassis.version: IdeaPad 3 15ABA7
>   dmi.ec.firmware.release: 1.38
>   dmi.modalias:
> dmi:bvnLENOVO:bvrJTCN38WW:bd08/04/2022:br1.38:efr1.38:svnLENOVO:pn82RN:pvrIdeaPad315ABA7:rvnLENOVO:rnLNVNB161216:rvrNODPK:cvnLENOVO:ct10:cvrIdeaPad315ABA7:skuLENOVO_MT_82RN_BU_idea_FM_IdeaPad315ABA7:
>   dmi.product.family: IdeaPad 3 15ABA7
>   dmi.product.name: 82RN
>   dmi.product.sku: LENOVO_MT_82RN_BU_idea_FM_IdeaPad 3 15ABA7
>   dmi.product.version: IdeaPad 3 15ABA7
>   dmi.sys.vendor: LENOVO
>   version.compiz: compiz N/A
>   version.libdrm2: libdrm2 2.4.110-1ubuntu1
>   version.libgl1-mesa-dri: libgl1-mesa-dri 22.0.5-0ubuntu0.1
>   version.libgl1-mesa-glx: libgl1-mesa-glx N/A
>   version.xserver-xorg-core: xserver-xorg-core 2:21.1.3-2ubuntu2.5
>   version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
>   version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:19.1.0-2ubuntu1
>   version.xserver-xorg-video-intel: xserver-xorg-video-intel
> 2:2.99.917+git20210115-1
>   version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau
> 1:1.0.17-2build1
>
> To manage notifications about this bug go to:
> https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2004534/+subscriptions
>
>

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2004534

Title:
  Lenovo IdeaPad 3 15ABA7 never wakes from sleep

Status in linux package in Ubuntu:
  Confirmed

Bug description:
   - on locked screen: the keyboard blocks after a while and I cannot login 
anymore;
   - on unlocked screen: 
   = apps do not start (failed to start); 
   = no icon pictures on desktop; 
   = no wallpaper anymore (black background);

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: xorg 1:7.7+23ubuntu2
  ProcVersionSignature: Ubuntu 5.15.0-58.64-generic 5.15.74
  Uname: Linux 5.15.0-58-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.3
  Architecture: amd64
  BootLog: Error: [Errno 13] Permission denied: '/var/log/boot.log'
  CasperMD5CheckResult: pass
  CompositorRunning: None
  CurrentDesktop: ubuntu:GNOME
  Date: Thu Feb  2 07:15:13 2023
  DistUpgraded: Fresh install
  DistroCodename: jammy
  DistroVariant: ubuntu
  ExtraDebuggingInterest: Yes, including running git bisection searches
  GraphicsCard:
   Advanced Micro Devices, Inc. [AMD/ATI] Barcelo [1002:15e7] (rev c2) (prog-if 
00 [VGA controller])
 Subsyste

[Kernel-packages] [Bug 2020062] Re: No HDMI/DP audio output on dock(Nvidia GPU)

2023-05-21 Thread AceLan Kao
** Tags removed: verification-needed-jammy
** Tags added: verification-done-jammy

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-6.0 in Ubuntu.
https://bugs.launchpad.net/bugs/2020062

Title:
  No  HDMI/DP audio output on dock(Nvidia GPU)

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  In Progress
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux-oem-6.1 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  In Progress
Status in linux-oem-6.0 source package in Jammy:
  In Progress
Status in linux-oem-6.1 source package in Jammy:
  In Progress
Status in linux source package in Lunar:
  In Progress
Status in linux-oem-6.0 source package in Lunar:
  Invalid
Status in linux-oem-6.1 source package in Lunar:
  Invalid
Status in linux source package in Mantic:
  In Progress
Status in linux-oem-6.0 source package in Mantic:
  Invalid
Status in linux-oem-6.1 source package in Mantic:
  Invalid

Bug description:
  [Impact]
  When the machine is docked with an external monitor, it is able to output 
display, but the HDMI/DP audio output option is lost in DGFF Hybrid 
Discrete/Discrete mode(Nvidia GPU).

  [Fix]
  Nvidia provides a patch to fix it
  
https://patchwork.kernel.org/project/alsa-devel/patch/20230517090736.15088-1-nmah...@nvidia.com/

  [Test]
  Verified on the target machine.

  {Where problems could occur]
  The patch just adds IDs, and won't lead to any regression.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/2020062/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2020279] UdevDb.txt

2023-05-21 Thread Gábor KORMOS
apport information

** Attachment added: "UdevDb.txt"
   https://bugs.launchpad.net/bugs/2020279/+attachment/5674491/+files/UdevDb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020279

Title:
  Kernel warning after upgrade to 4.15.0.211.194

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel
  started to produce the below warning. It did not seem to cause any
  major issue. Revering to 4.15.0.210 stopped the warning. The server is
  a Droplet at DigitalOcean with their monitoring/management agent
  installed.

  May 21 19:09:59 esolr kernel: [   18.787737] [ cut here 
]
  May 21 19:09:59 esolr kernel: [   18.787803] WARNING: CPU: 0 PID: 1027 at 
/build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 
sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787804] Modules linked in: isofs xt_set 
nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack 
ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc 
irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm 
ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables 
autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 
crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net
  May 21 19:09:59 esolr kernel: [   18.787835] CPU: 0 PID: 1027 Comm: 
unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu
  May 21 19:09:59 esolr kernel: [   18.787836] Hardware name: DigitalOcean 
Droplet/Droplet, BIOS 20171212 12/12/2017
  May 21 19:09:59 esolr kernel: [   18.787839] RIP: 
0010:sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787840] RSP: :94bf7fc038c0 
EFLAGS: 00010282
  May 21 19:09:59 esolr kernel: [   18.787841] RAX: 0024 RBX: 
94bf79565500 RCX: 0006
  May 21 19:09:59 esolr kernel: [   18.787842] RDX:  RSI: 
94bf7fc1b4d8 RDI: 94bf7fc1b4d0
  May 21 19:09:59 esolr kernel: [   18.787842] RBP: 94bf7fc038d0 R08: 
0222 R09: 0004
  May 21 19:09:59 esolr kernel: [   18.787843] R10: 94bf7fc03860 R11: 
0001 R12: 94bf795655c8
  May 21 19:09:59 esolr kernel: [   18.787844] R13: 0006 R14: 
003b R15: 
  May 21 19:09:59 esolr kernel: [   18.787845] FS:  7f04071d4740() 
GS:94bf7fc0() knlGS:
  May 21 19:09:59 esolr kernel: [   18.787846] CS:  0010 DS:  ES:  CR0: 
80050033
  May 21 19:09:59 esolr kernel: [   18.787846] CR2: 7f0401995e60 CR3: 
67586002 CR4: 001606f0
  May 21 19:09:59 esolr kernel: [   18.787850] DR0:  DR1: 
 DR2: 
  May 21 19:09:59 esolr kernel: [   18.787851] DR3:  DR6: 
fffe0ff0 DR7: 0400
  May 21 19:09:59 esolr kernel: [   18.787851] Call Trace:
  May 21 19:09:59 esolr kernel: [   18.787853]  
  May 21 19:09:59 esolr kernel: [   18.787866]  inet_csk_destroy_sock+0x59/0x150
  May 21 19:09:59 esolr kernel: [   18.787868]  tcp_done+0x96/0xa0
  May 21 19:09:59 esolr kernel: [   18.787872]  tcp_time_wait+0x1be/0x280
  May 21 19:09:59 esolr kernel: [   18.787874]  tcp_fin+0x16b/0x180
  May 21 19:09:59 esolr kernel: [   18.787876]  tcp_data_queue+0x594/0xc20
  May 21 19:09:59 esolr kernel: [   18.787881]  
tcp_rcv_state_process+0x5dd/0xe70
  May 21 19:09:59 esolr kernel: [   18.787887]  ? __slab_alloc+0x20/0x40
  May 21 19:09:59 esolr kernel: [   18.787889]  ? kmem_cache_alloc+0x161/0x1c0
  May 21 19:09:59 esolr kernel: [   18.787891]  ? skb_clone+0x56/0xc0
  May 21 19:09:59 esolr kernel: [   18.787897]  tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787898]  ? tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787899]  tcp_v6_rcv+0x9b6/0xa60
  May 21 19:09:59 esolr kernel: [   18.787907]  ? update_load_avg+0x5f9/0x780
  May 21 19:09:59 esolr kernel: [   18.787909]  ip6_input_finish+0xcc/0x470
  May 21 19:09:59 esolr kernel: [   18.787911]  ip6_input+0x3f/0xb0
  May 21 19:09:59 esolr kernel: [   18.787914]  ? ip6_dst_check+0xb1/0xf0
  May 21 19:09:59 esolr kernel: [   18.787915]  ip6_rcv_finish+0xd8/0x120
  May 21 19:09:59 esolr kernel: [   18.787916]  ipv6_rcv+0x347/0x510
  May 21 19:09:59 esolr kernel: [   18.787917]  ? __pskb_pull_tail+0x7f/0x4b0
  May 21 19:09:59 esolr kernel: [   18.787918]  ? skb_copy_bits+0x141/0x280
  May 21 19:09:59 esolr kernel: [   18.787920]  ? 
__kmalloc_node_track_caller+0x216/0x2b0
  May 21 19:09:59 esolr kernel: [   18.787923]  
__netif_receive_skb_core+0x432/0xb80
  

[Kernel-packages] [Bug 2020279] ProcInterrupts.txt

2023-05-21 Thread Gábor KORMOS
apport information

** Attachment added: "ProcInterrupts.txt"
   
https://bugs.launchpad.net/bugs/2020279/+attachment/5674489/+files/ProcInterrupts.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020279

Title:
  Kernel warning after upgrade to 4.15.0.211.194

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel
  started to produce the below warning. It did not seem to cause any
  major issue. Revering to 4.15.0.210 stopped the warning. The server is
  a Droplet at DigitalOcean with their monitoring/management agent
  installed.

  May 21 19:09:59 esolr kernel: [   18.787737] [ cut here 
]
  May 21 19:09:59 esolr kernel: [   18.787803] WARNING: CPU: 0 PID: 1027 at 
/build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 
sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787804] Modules linked in: isofs xt_set 
nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack 
ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc 
irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm 
ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables 
autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 
crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net
  May 21 19:09:59 esolr kernel: [   18.787835] CPU: 0 PID: 1027 Comm: 
unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu
  May 21 19:09:59 esolr kernel: [   18.787836] Hardware name: DigitalOcean 
Droplet/Droplet, BIOS 20171212 12/12/2017
  May 21 19:09:59 esolr kernel: [   18.787839] RIP: 
0010:sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787840] RSP: :94bf7fc038c0 
EFLAGS: 00010282
  May 21 19:09:59 esolr kernel: [   18.787841] RAX: 0024 RBX: 
94bf79565500 RCX: 0006
  May 21 19:09:59 esolr kernel: [   18.787842] RDX:  RSI: 
94bf7fc1b4d8 RDI: 94bf7fc1b4d0
  May 21 19:09:59 esolr kernel: [   18.787842] RBP: 94bf7fc038d0 R08: 
0222 R09: 0004
  May 21 19:09:59 esolr kernel: [   18.787843] R10: 94bf7fc03860 R11: 
0001 R12: 94bf795655c8
  May 21 19:09:59 esolr kernel: [   18.787844] R13: 0006 R14: 
003b R15: 
  May 21 19:09:59 esolr kernel: [   18.787845] FS:  7f04071d4740() 
GS:94bf7fc0() knlGS:
  May 21 19:09:59 esolr kernel: [   18.787846] CS:  0010 DS:  ES:  CR0: 
80050033
  May 21 19:09:59 esolr kernel: [   18.787846] CR2: 7f0401995e60 CR3: 
67586002 CR4: 001606f0
  May 21 19:09:59 esolr kernel: [   18.787850] DR0:  DR1: 
 DR2: 
  May 21 19:09:59 esolr kernel: [   18.787851] DR3:  DR6: 
fffe0ff0 DR7: 0400
  May 21 19:09:59 esolr kernel: [   18.787851] Call Trace:
  May 21 19:09:59 esolr kernel: [   18.787853]  
  May 21 19:09:59 esolr kernel: [   18.787866]  inet_csk_destroy_sock+0x59/0x150
  May 21 19:09:59 esolr kernel: [   18.787868]  tcp_done+0x96/0xa0
  May 21 19:09:59 esolr kernel: [   18.787872]  tcp_time_wait+0x1be/0x280
  May 21 19:09:59 esolr kernel: [   18.787874]  tcp_fin+0x16b/0x180
  May 21 19:09:59 esolr kernel: [   18.787876]  tcp_data_queue+0x594/0xc20
  May 21 19:09:59 esolr kernel: [   18.787881]  
tcp_rcv_state_process+0x5dd/0xe70
  May 21 19:09:59 esolr kernel: [   18.787887]  ? __slab_alloc+0x20/0x40
  May 21 19:09:59 esolr kernel: [   18.787889]  ? kmem_cache_alloc+0x161/0x1c0
  May 21 19:09:59 esolr kernel: [   18.787891]  ? skb_clone+0x56/0xc0
  May 21 19:09:59 esolr kernel: [   18.787897]  tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787898]  ? tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787899]  tcp_v6_rcv+0x9b6/0xa60
  May 21 19:09:59 esolr kernel: [   18.787907]  ? update_load_avg+0x5f9/0x780
  May 21 19:09:59 esolr kernel: [   18.787909]  ip6_input_finish+0xcc/0x470
  May 21 19:09:59 esolr kernel: [   18.787911]  ip6_input+0x3f/0xb0
  May 21 19:09:59 esolr kernel: [   18.787914]  ? ip6_dst_check+0xb1/0xf0
  May 21 19:09:59 esolr kernel: [   18.787915]  ip6_rcv_finish+0xd8/0x120
  May 21 19:09:59 esolr kernel: [   18.787916]  ipv6_rcv+0x347/0x510
  May 21 19:09:59 esolr kernel: [   18.787917]  ? __pskb_pull_tail+0x7f/0x4b0
  May 21 19:09:59 esolr kernel: [   18.787918]  ? skb_copy_bits+0x141/0x280
  May 21 19:09:59 esolr kernel: [   18.787920]  ? 
__kmalloc_node_track_caller+0x216/0x2b0
  May 21 19:09:59 esolr kernel: [   18.787923]  
__netif_receive_skb_co

[Kernel-packages] [Bug 2020279] WifiSyslog.txt

2023-05-21 Thread Gábor KORMOS
apport information

** Attachment added: "WifiSyslog.txt"
   
https://bugs.launchpad.net/bugs/2020279/+attachment/5674492/+files/WifiSyslog.txt

** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020279

Title:
  Kernel warning after upgrade to 4.15.0.211.194

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel
  started to produce the below warning. It did not seem to cause any
  major issue. Revering to 4.15.0.210 stopped the warning. The server is
  a Droplet at DigitalOcean with their monitoring/management agent
  installed.

  May 21 19:09:59 esolr kernel: [   18.787737] [ cut here 
]
  May 21 19:09:59 esolr kernel: [   18.787803] WARNING: CPU: 0 PID: 1027 at 
/build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 
sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787804] Modules linked in: isofs xt_set 
nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack 
ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc 
irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm 
ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables 
autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 
crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net
  May 21 19:09:59 esolr kernel: [   18.787835] CPU: 0 PID: 1027 Comm: 
unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu
  May 21 19:09:59 esolr kernel: [   18.787836] Hardware name: DigitalOcean 
Droplet/Droplet, BIOS 20171212 12/12/2017
  May 21 19:09:59 esolr kernel: [   18.787839] RIP: 
0010:sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787840] RSP: :94bf7fc038c0 
EFLAGS: 00010282
  May 21 19:09:59 esolr kernel: [   18.787841] RAX: 0024 RBX: 
94bf79565500 RCX: 0006
  May 21 19:09:59 esolr kernel: [   18.787842] RDX:  RSI: 
94bf7fc1b4d8 RDI: 94bf7fc1b4d0
  May 21 19:09:59 esolr kernel: [   18.787842] RBP: 94bf7fc038d0 R08: 
0222 R09: 0004
  May 21 19:09:59 esolr kernel: [   18.787843] R10: 94bf7fc03860 R11: 
0001 R12: 94bf795655c8
  May 21 19:09:59 esolr kernel: [   18.787844] R13: 0006 R14: 
003b R15: 
  May 21 19:09:59 esolr kernel: [   18.787845] FS:  7f04071d4740() 
GS:94bf7fc0() knlGS:
  May 21 19:09:59 esolr kernel: [   18.787846] CS:  0010 DS:  ES:  CR0: 
80050033
  May 21 19:09:59 esolr kernel: [   18.787846] CR2: 7f0401995e60 CR3: 
67586002 CR4: 001606f0
  May 21 19:09:59 esolr kernel: [   18.787850] DR0:  DR1: 
 DR2: 
  May 21 19:09:59 esolr kernel: [   18.787851] DR3:  DR6: 
fffe0ff0 DR7: 0400
  May 21 19:09:59 esolr kernel: [   18.787851] Call Trace:
  May 21 19:09:59 esolr kernel: [   18.787853]  
  May 21 19:09:59 esolr kernel: [   18.787866]  inet_csk_destroy_sock+0x59/0x150
  May 21 19:09:59 esolr kernel: [   18.787868]  tcp_done+0x96/0xa0
  May 21 19:09:59 esolr kernel: [   18.787872]  tcp_time_wait+0x1be/0x280
  May 21 19:09:59 esolr kernel: [   18.787874]  tcp_fin+0x16b/0x180
  May 21 19:09:59 esolr kernel: [   18.787876]  tcp_data_queue+0x594/0xc20
  May 21 19:09:59 esolr kernel: [   18.787881]  
tcp_rcv_state_process+0x5dd/0xe70
  May 21 19:09:59 esolr kernel: [   18.787887]  ? __slab_alloc+0x20/0x40
  May 21 19:09:59 esolr kernel: [   18.787889]  ? kmem_cache_alloc+0x161/0x1c0
  May 21 19:09:59 esolr kernel: [   18.787891]  ? skb_clone+0x56/0xc0
  May 21 19:09:59 esolr kernel: [   18.787897]  tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787898]  ? tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787899]  tcp_v6_rcv+0x9b6/0xa60
  May 21 19:09:59 esolr kernel: [   18.787907]  ? update_load_avg+0x5f9/0x780
  May 21 19:09:59 esolr kernel: [   18.787909]  ip6_input_finish+0xcc/0x470
  May 21 19:09:59 esolr kernel: [   18.787911]  ip6_input+0x3f/0xb0
  May 21 19:09:59 esolr kernel: [   18.787914]  ? ip6_dst_check+0xb1/0xf0
  May 21 19:09:59 esolr kernel: [   18.787915]  ip6_rcv_finish+0xd8/0x120
  May 21 19:09:59 esolr kernel: [   18.787916]  ipv6_rcv+0x347/0x510
  May 21 19:09:59 esolr kernel: [   18.787917]  ? __pskb_pull_tail+0x7f/0x4b0
  May 21 19:09:59 esolr kernel: [   18.787918]  ? skb_copy_bits+0x141/0x280
  May 21 19:09:59 esolr kernel: [   18.787920]  ? 
__kmalloc_node_track_caller+0x216/0x2b0
  May 21 

[Kernel-packages] [Bug 2020279] ProcModules.txt

2023-05-21 Thread Gábor KORMOS
apport information

** Attachment added: "ProcModules.txt"
   
https://bugs.launchpad.net/bugs/2020279/+attachment/5674490/+files/ProcModules.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020279

Title:
  Kernel warning after upgrade to 4.15.0.211.194

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel
  started to produce the below warning. It did not seem to cause any
  major issue. Revering to 4.15.0.210 stopped the warning. The server is
  a Droplet at DigitalOcean with their monitoring/management agent
  installed.

  May 21 19:09:59 esolr kernel: [   18.787737] [ cut here 
]
  May 21 19:09:59 esolr kernel: [   18.787803] WARNING: CPU: 0 PID: 1027 at 
/build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 
sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787804] Modules linked in: isofs xt_set 
nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack 
ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc 
irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm 
ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables 
autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 
crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net
  May 21 19:09:59 esolr kernel: [   18.787835] CPU: 0 PID: 1027 Comm: 
unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu
  May 21 19:09:59 esolr kernel: [   18.787836] Hardware name: DigitalOcean 
Droplet/Droplet, BIOS 20171212 12/12/2017
  May 21 19:09:59 esolr kernel: [   18.787839] RIP: 
0010:sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787840] RSP: :94bf7fc038c0 
EFLAGS: 00010282
  May 21 19:09:59 esolr kernel: [   18.787841] RAX: 0024 RBX: 
94bf79565500 RCX: 0006
  May 21 19:09:59 esolr kernel: [   18.787842] RDX:  RSI: 
94bf7fc1b4d8 RDI: 94bf7fc1b4d0
  May 21 19:09:59 esolr kernel: [   18.787842] RBP: 94bf7fc038d0 R08: 
0222 R09: 0004
  May 21 19:09:59 esolr kernel: [   18.787843] R10: 94bf7fc03860 R11: 
0001 R12: 94bf795655c8
  May 21 19:09:59 esolr kernel: [   18.787844] R13: 0006 R14: 
003b R15: 
  May 21 19:09:59 esolr kernel: [   18.787845] FS:  7f04071d4740() 
GS:94bf7fc0() knlGS:
  May 21 19:09:59 esolr kernel: [   18.787846] CS:  0010 DS:  ES:  CR0: 
80050033
  May 21 19:09:59 esolr kernel: [   18.787846] CR2: 7f0401995e60 CR3: 
67586002 CR4: 001606f0
  May 21 19:09:59 esolr kernel: [   18.787850] DR0:  DR1: 
 DR2: 
  May 21 19:09:59 esolr kernel: [   18.787851] DR3:  DR6: 
fffe0ff0 DR7: 0400
  May 21 19:09:59 esolr kernel: [   18.787851] Call Trace:
  May 21 19:09:59 esolr kernel: [   18.787853]  
  May 21 19:09:59 esolr kernel: [   18.787866]  inet_csk_destroy_sock+0x59/0x150
  May 21 19:09:59 esolr kernel: [   18.787868]  tcp_done+0x96/0xa0
  May 21 19:09:59 esolr kernel: [   18.787872]  tcp_time_wait+0x1be/0x280
  May 21 19:09:59 esolr kernel: [   18.787874]  tcp_fin+0x16b/0x180
  May 21 19:09:59 esolr kernel: [   18.787876]  tcp_data_queue+0x594/0xc20
  May 21 19:09:59 esolr kernel: [   18.787881]  
tcp_rcv_state_process+0x5dd/0xe70
  May 21 19:09:59 esolr kernel: [   18.787887]  ? __slab_alloc+0x20/0x40
  May 21 19:09:59 esolr kernel: [   18.787889]  ? kmem_cache_alloc+0x161/0x1c0
  May 21 19:09:59 esolr kernel: [   18.787891]  ? skb_clone+0x56/0xc0
  May 21 19:09:59 esolr kernel: [   18.787897]  tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787898]  ? tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787899]  tcp_v6_rcv+0x9b6/0xa60
  May 21 19:09:59 esolr kernel: [   18.787907]  ? update_load_avg+0x5f9/0x780
  May 21 19:09:59 esolr kernel: [   18.787909]  ip6_input_finish+0xcc/0x470
  May 21 19:09:59 esolr kernel: [   18.787911]  ip6_input+0x3f/0xb0
  May 21 19:09:59 esolr kernel: [   18.787914]  ? ip6_dst_check+0xb1/0xf0
  May 21 19:09:59 esolr kernel: [   18.787915]  ip6_rcv_finish+0xd8/0x120
  May 21 19:09:59 esolr kernel: [   18.787916]  ipv6_rcv+0x347/0x510
  May 21 19:09:59 esolr kernel: [   18.787917]  ? __pskb_pull_tail+0x7f/0x4b0
  May 21 19:09:59 esolr kernel: [   18.787918]  ? skb_copy_bits+0x141/0x280
  May 21 19:09:59 esolr kernel: [   18.787920]  ? 
__kmalloc_node_track_caller+0x216/0x2b0
  May 21 19:09:59 esolr kernel: [   18.787923]  
__netif_receive_skb_core+0x4

[Kernel-packages] [Bug 2020279] ProcCpuinfoMinimal.txt

2023-05-21 Thread Gábor KORMOS
apport information

** Attachment added: "ProcCpuinfoMinimal.txt"
   
https://bugs.launchpad.net/bugs/2020279/+attachment/5674488/+files/ProcCpuinfoMinimal.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020279

Title:
  Kernel warning after upgrade to 4.15.0.211.194

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel
  started to produce the below warning. It did not seem to cause any
  major issue. Revering to 4.15.0.210 stopped the warning. The server is
  a Droplet at DigitalOcean with their monitoring/management agent
  installed.

  May 21 19:09:59 esolr kernel: [   18.787737] [ cut here 
]
  May 21 19:09:59 esolr kernel: [   18.787803] WARNING: CPU: 0 PID: 1027 at 
/build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 
sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787804] Modules linked in: isofs xt_set 
nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack 
ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc 
irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm 
ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables 
autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 
crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net
  May 21 19:09:59 esolr kernel: [   18.787835] CPU: 0 PID: 1027 Comm: 
unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu
  May 21 19:09:59 esolr kernel: [   18.787836] Hardware name: DigitalOcean 
Droplet/Droplet, BIOS 20171212 12/12/2017
  May 21 19:09:59 esolr kernel: [   18.787839] RIP: 
0010:sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787840] RSP: :94bf7fc038c0 
EFLAGS: 00010282
  May 21 19:09:59 esolr kernel: [   18.787841] RAX: 0024 RBX: 
94bf79565500 RCX: 0006
  May 21 19:09:59 esolr kernel: [   18.787842] RDX:  RSI: 
94bf7fc1b4d8 RDI: 94bf7fc1b4d0
  May 21 19:09:59 esolr kernel: [   18.787842] RBP: 94bf7fc038d0 R08: 
0222 R09: 0004
  May 21 19:09:59 esolr kernel: [   18.787843] R10: 94bf7fc03860 R11: 
0001 R12: 94bf795655c8
  May 21 19:09:59 esolr kernel: [   18.787844] R13: 0006 R14: 
003b R15: 
  May 21 19:09:59 esolr kernel: [   18.787845] FS:  7f04071d4740() 
GS:94bf7fc0() knlGS:
  May 21 19:09:59 esolr kernel: [   18.787846] CS:  0010 DS:  ES:  CR0: 
80050033
  May 21 19:09:59 esolr kernel: [   18.787846] CR2: 7f0401995e60 CR3: 
67586002 CR4: 001606f0
  May 21 19:09:59 esolr kernel: [   18.787850] DR0:  DR1: 
 DR2: 
  May 21 19:09:59 esolr kernel: [   18.787851] DR3:  DR6: 
fffe0ff0 DR7: 0400
  May 21 19:09:59 esolr kernel: [   18.787851] Call Trace:
  May 21 19:09:59 esolr kernel: [   18.787853]  
  May 21 19:09:59 esolr kernel: [   18.787866]  inet_csk_destroy_sock+0x59/0x150
  May 21 19:09:59 esolr kernel: [   18.787868]  tcp_done+0x96/0xa0
  May 21 19:09:59 esolr kernel: [   18.787872]  tcp_time_wait+0x1be/0x280
  May 21 19:09:59 esolr kernel: [   18.787874]  tcp_fin+0x16b/0x180
  May 21 19:09:59 esolr kernel: [   18.787876]  tcp_data_queue+0x594/0xc20
  May 21 19:09:59 esolr kernel: [   18.787881]  
tcp_rcv_state_process+0x5dd/0xe70
  May 21 19:09:59 esolr kernel: [   18.787887]  ? __slab_alloc+0x20/0x40
  May 21 19:09:59 esolr kernel: [   18.787889]  ? kmem_cache_alloc+0x161/0x1c0
  May 21 19:09:59 esolr kernel: [   18.787891]  ? skb_clone+0x56/0xc0
  May 21 19:09:59 esolr kernel: [   18.787897]  tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787898]  ? tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787899]  tcp_v6_rcv+0x9b6/0xa60
  May 21 19:09:59 esolr kernel: [   18.787907]  ? update_load_avg+0x5f9/0x780
  May 21 19:09:59 esolr kernel: [   18.787909]  ip6_input_finish+0xcc/0x470
  May 21 19:09:59 esolr kernel: [   18.787911]  ip6_input+0x3f/0xb0
  May 21 19:09:59 esolr kernel: [   18.787914]  ? ip6_dst_check+0xb1/0xf0
  May 21 19:09:59 esolr kernel: [   18.787915]  ip6_rcv_finish+0xd8/0x120
  May 21 19:09:59 esolr kernel: [   18.787916]  ipv6_rcv+0x347/0x510
  May 21 19:09:59 esolr kernel: [   18.787917]  ? __pskb_pull_tail+0x7f/0x4b0
  May 21 19:09:59 esolr kernel: [   18.787918]  ? skb_copy_bits+0x141/0x280
  May 21 19:09:59 esolr kernel: [   18.787920]  ? 
__kmalloc_node_track_caller+0x216/0x2b0
  May 21 19:09:59 esolr kernel: [   18.787923]  
__netif_receiv

[Kernel-packages] [Bug 2020279] Lspci.txt

2023-05-21 Thread Gábor KORMOS
apport information

** Attachment added: "Lspci.txt"
   https://bugs.launchpad.net/bugs/2020279/+attachment/5674486/+files/Lspci.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020279

Title:
  Kernel warning after upgrade to 4.15.0.211.194

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel
  started to produce the below warning. It did not seem to cause any
  major issue. Revering to 4.15.0.210 stopped the warning. The server is
  a Droplet at DigitalOcean with their monitoring/management agent
  installed.

  May 21 19:09:59 esolr kernel: [   18.787737] [ cut here 
]
  May 21 19:09:59 esolr kernel: [   18.787803] WARNING: CPU: 0 PID: 1027 at 
/build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 
sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787804] Modules linked in: isofs xt_set 
nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack 
ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc 
irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm 
ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables 
autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 
crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net
  May 21 19:09:59 esolr kernel: [   18.787835] CPU: 0 PID: 1027 Comm: 
unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu
  May 21 19:09:59 esolr kernel: [   18.787836] Hardware name: DigitalOcean 
Droplet/Droplet, BIOS 20171212 12/12/2017
  May 21 19:09:59 esolr kernel: [   18.787839] RIP: 
0010:sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787840] RSP: :94bf7fc038c0 
EFLAGS: 00010282
  May 21 19:09:59 esolr kernel: [   18.787841] RAX: 0024 RBX: 
94bf79565500 RCX: 0006
  May 21 19:09:59 esolr kernel: [   18.787842] RDX:  RSI: 
94bf7fc1b4d8 RDI: 94bf7fc1b4d0
  May 21 19:09:59 esolr kernel: [   18.787842] RBP: 94bf7fc038d0 R08: 
0222 R09: 0004
  May 21 19:09:59 esolr kernel: [   18.787843] R10: 94bf7fc03860 R11: 
0001 R12: 94bf795655c8
  May 21 19:09:59 esolr kernel: [   18.787844] R13: 0006 R14: 
003b R15: 
  May 21 19:09:59 esolr kernel: [   18.787845] FS:  7f04071d4740() 
GS:94bf7fc0() knlGS:
  May 21 19:09:59 esolr kernel: [   18.787846] CS:  0010 DS:  ES:  CR0: 
80050033
  May 21 19:09:59 esolr kernel: [   18.787846] CR2: 7f0401995e60 CR3: 
67586002 CR4: 001606f0
  May 21 19:09:59 esolr kernel: [   18.787850] DR0:  DR1: 
 DR2: 
  May 21 19:09:59 esolr kernel: [   18.787851] DR3:  DR6: 
fffe0ff0 DR7: 0400
  May 21 19:09:59 esolr kernel: [   18.787851] Call Trace:
  May 21 19:09:59 esolr kernel: [   18.787853]  
  May 21 19:09:59 esolr kernel: [   18.787866]  inet_csk_destroy_sock+0x59/0x150
  May 21 19:09:59 esolr kernel: [   18.787868]  tcp_done+0x96/0xa0
  May 21 19:09:59 esolr kernel: [   18.787872]  tcp_time_wait+0x1be/0x280
  May 21 19:09:59 esolr kernel: [   18.787874]  tcp_fin+0x16b/0x180
  May 21 19:09:59 esolr kernel: [   18.787876]  tcp_data_queue+0x594/0xc20
  May 21 19:09:59 esolr kernel: [   18.787881]  
tcp_rcv_state_process+0x5dd/0xe70
  May 21 19:09:59 esolr kernel: [   18.787887]  ? __slab_alloc+0x20/0x40
  May 21 19:09:59 esolr kernel: [   18.787889]  ? kmem_cache_alloc+0x161/0x1c0
  May 21 19:09:59 esolr kernel: [   18.787891]  ? skb_clone+0x56/0xc0
  May 21 19:09:59 esolr kernel: [   18.787897]  tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787898]  ? tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787899]  tcp_v6_rcv+0x9b6/0xa60
  May 21 19:09:59 esolr kernel: [   18.787907]  ? update_load_avg+0x5f9/0x780
  May 21 19:09:59 esolr kernel: [   18.787909]  ip6_input_finish+0xcc/0x470
  May 21 19:09:59 esolr kernel: [   18.787911]  ip6_input+0x3f/0xb0
  May 21 19:09:59 esolr kernel: [   18.787914]  ? ip6_dst_check+0xb1/0xf0
  May 21 19:09:59 esolr kernel: [   18.787915]  ip6_rcv_finish+0xd8/0x120
  May 21 19:09:59 esolr kernel: [   18.787916]  ipv6_rcv+0x347/0x510
  May 21 19:09:59 esolr kernel: [   18.787917]  ? __pskb_pull_tail+0x7f/0x4b0
  May 21 19:09:59 esolr kernel: [   18.787918]  ? skb_copy_bits+0x141/0x280
  May 21 19:09:59 esolr kernel: [   18.787920]  ? 
__kmalloc_node_track_caller+0x216/0x2b0
  May 21 19:09:59 esolr kernel: [   18.787923]  
__netif_receive_skb_core+0x432/0xb80
  Ma

[Kernel-packages] [Bug 2020279] ProcCpuinfo.txt

2023-05-21 Thread Gábor KORMOS
apport information

** Attachment added: "ProcCpuinfo.txt"
   
https://bugs.launchpad.net/bugs/2020279/+attachment/5674487/+files/ProcCpuinfo.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020279

Title:
  Kernel warning after upgrade to 4.15.0.211.194

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel
  started to produce the below warning. It did not seem to cause any
  major issue. Revering to 4.15.0.210 stopped the warning. The server is
  a Droplet at DigitalOcean with their monitoring/management agent
  installed.

  May 21 19:09:59 esolr kernel: [   18.787737] [ cut here 
]
  May 21 19:09:59 esolr kernel: [   18.787803] WARNING: CPU: 0 PID: 1027 at 
/build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 
sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787804] Modules linked in: isofs xt_set 
nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack 
ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc 
irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm 
ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables 
autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 
crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net
  May 21 19:09:59 esolr kernel: [   18.787835] CPU: 0 PID: 1027 Comm: 
unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu
  May 21 19:09:59 esolr kernel: [   18.787836] Hardware name: DigitalOcean 
Droplet/Droplet, BIOS 20171212 12/12/2017
  May 21 19:09:59 esolr kernel: [   18.787839] RIP: 
0010:sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787840] RSP: :94bf7fc038c0 
EFLAGS: 00010282
  May 21 19:09:59 esolr kernel: [   18.787841] RAX: 0024 RBX: 
94bf79565500 RCX: 0006
  May 21 19:09:59 esolr kernel: [   18.787842] RDX:  RSI: 
94bf7fc1b4d8 RDI: 94bf7fc1b4d0
  May 21 19:09:59 esolr kernel: [   18.787842] RBP: 94bf7fc038d0 R08: 
0222 R09: 0004
  May 21 19:09:59 esolr kernel: [   18.787843] R10: 94bf7fc03860 R11: 
0001 R12: 94bf795655c8
  May 21 19:09:59 esolr kernel: [   18.787844] R13: 0006 R14: 
003b R15: 
  May 21 19:09:59 esolr kernel: [   18.787845] FS:  7f04071d4740() 
GS:94bf7fc0() knlGS:
  May 21 19:09:59 esolr kernel: [   18.787846] CS:  0010 DS:  ES:  CR0: 
80050033
  May 21 19:09:59 esolr kernel: [   18.787846] CR2: 7f0401995e60 CR3: 
67586002 CR4: 001606f0
  May 21 19:09:59 esolr kernel: [   18.787850] DR0:  DR1: 
 DR2: 
  May 21 19:09:59 esolr kernel: [   18.787851] DR3:  DR6: 
fffe0ff0 DR7: 0400
  May 21 19:09:59 esolr kernel: [   18.787851] Call Trace:
  May 21 19:09:59 esolr kernel: [   18.787853]  
  May 21 19:09:59 esolr kernel: [   18.787866]  inet_csk_destroy_sock+0x59/0x150
  May 21 19:09:59 esolr kernel: [   18.787868]  tcp_done+0x96/0xa0
  May 21 19:09:59 esolr kernel: [   18.787872]  tcp_time_wait+0x1be/0x280
  May 21 19:09:59 esolr kernel: [   18.787874]  tcp_fin+0x16b/0x180
  May 21 19:09:59 esolr kernel: [   18.787876]  tcp_data_queue+0x594/0xc20
  May 21 19:09:59 esolr kernel: [   18.787881]  
tcp_rcv_state_process+0x5dd/0xe70
  May 21 19:09:59 esolr kernel: [   18.787887]  ? __slab_alloc+0x20/0x40
  May 21 19:09:59 esolr kernel: [   18.787889]  ? kmem_cache_alloc+0x161/0x1c0
  May 21 19:09:59 esolr kernel: [   18.787891]  ? skb_clone+0x56/0xc0
  May 21 19:09:59 esolr kernel: [   18.787897]  tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787898]  ? tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787899]  tcp_v6_rcv+0x9b6/0xa60
  May 21 19:09:59 esolr kernel: [   18.787907]  ? update_load_avg+0x5f9/0x780
  May 21 19:09:59 esolr kernel: [   18.787909]  ip6_input_finish+0xcc/0x470
  May 21 19:09:59 esolr kernel: [   18.787911]  ip6_input+0x3f/0xb0
  May 21 19:09:59 esolr kernel: [   18.787914]  ? ip6_dst_check+0xb1/0xf0
  May 21 19:09:59 esolr kernel: [   18.787915]  ip6_rcv_finish+0xd8/0x120
  May 21 19:09:59 esolr kernel: [   18.787916]  ipv6_rcv+0x347/0x510
  May 21 19:09:59 esolr kernel: [   18.787917]  ? __pskb_pull_tail+0x7f/0x4b0
  May 21 19:09:59 esolr kernel: [   18.787918]  ? skb_copy_bits+0x141/0x280
  May 21 19:09:59 esolr kernel: [   18.787920]  ? 
__kmalloc_node_track_caller+0x216/0x2b0
  May 21 19:09:59 esolr kernel: [   18.787923]  
__netif_receive_skb_core+0x4

[Kernel-packages] [Bug 2020279] Re: Kernel warning after upgrade to 4.15.0.211.194

2023-05-21 Thread Gábor KORMOS
apport information

** Tags added: apport-collected bionic uec-images

** Description changed:

  After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel started
  to produce the below warning. It did not seem to cause any major issue.
  Revering to 4.15.0.210 stopped the warning. The server is a Droplet at
  DigitalOcean with their monitoring/management agent installed.
  
  May 21 19:09:59 esolr kernel: [   18.787737] [ cut here 
]
  May 21 19:09:59 esolr kernel: [   18.787803] WARNING: CPU: 0 PID: 1027 at 
/build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 
sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787804] Modules linked in: isofs xt_set 
nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack 
ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc 
irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm 
ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables 
autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 
crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net
  May 21 19:09:59 esolr kernel: [   18.787835] CPU: 0 PID: 1027 Comm: 
unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu
  May 21 19:09:59 esolr kernel: [   18.787836] Hardware name: DigitalOcean 
Droplet/Droplet, BIOS 20171212 12/12/2017
  May 21 19:09:59 esolr kernel: [   18.787839] RIP: 
0010:sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787840] RSP: :94bf7fc038c0 
EFLAGS: 00010282
  May 21 19:09:59 esolr kernel: [   18.787841] RAX: 0024 RBX: 
94bf79565500 RCX: 0006
  May 21 19:09:59 esolr kernel: [   18.787842] RDX:  RSI: 
94bf7fc1b4d8 RDI: 94bf7fc1b4d0
  May 21 19:09:59 esolr kernel: [   18.787842] RBP: 94bf7fc038d0 R08: 
0222 R09: 0004
  May 21 19:09:59 esolr kernel: [   18.787843] R10: 94bf7fc03860 R11: 
0001 R12: 94bf795655c8
  May 21 19:09:59 esolr kernel: [   18.787844] R13: 0006 R14: 
003b R15: 
  May 21 19:09:59 esolr kernel: [   18.787845] FS:  7f04071d4740() 
GS:94bf7fc0() knlGS:
  May 21 19:09:59 esolr kernel: [   18.787846] CS:  0010 DS:  ES:  CR0: 
80050033
  May 21 19:09:59 esolr kernel: [   18.787846] CR2: 7f0401995e60 CR3: 
67586002 CR4: 001606f0
  May 21 19:09:59 esolr kernel: [   18.787850] DR0:  DR1: 
 DR2: 
  May 21 19:09:59 esolr kernel: [   18.787851] DR3:  DR6: 
fffe0ff0 DR7: 0400
  May 21 19:09:59 esolr kernel: [   18.787851] Call Trace:
  May 21 19:09:59 esolr kernel: [   18.787853]  
  May 21 19:09:59 esolr kernel: [   18.787866]  inet_csk_destroy_sock+0x59/0x150
  May 21 19:09:59 esolr kernel: [   18.787868]  tcp_done+0x96/0xa0
  May 21 19:09:59 esolr kernel: [   18.787872]  tcp_time_wait+0x1be/0x280
  May 21 19:09:59 esolr kernel: [   18.787874]  tcp_fin+0x16b/0x180
  May 21 19:09:59 esolr kernel: [   18.787876]  tcp_data_queue+0x594/0xc20
  May 21 19:09:59 esolr kernel: [   18.787881]  
tcp_rcv_state_process+0x5dd/0xe70
  May 21 19:09:59 esolr kernel: [   18.787887]  ? __slab_alloc+0x20/0x40
  May 21 19:09:59 esolr kernel: [   18.787889]  ? kmem_cache_alloc+0x161/0x1c0
  May 21 19:09:59 esolr kernel: [   18.787891]  ? skb_clone+0x56/0xc0
  May 21 19:09:59 esolr kernel: [   18.787897]  tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787898]  ? tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787899]  tcp_v6_rcv+0x9b6/0xa60
  May 21 19:09:59 esolr kernel: [   18.787907]  ? update_load_avg+0x5f9/0x780
  May 21 19:09:59 esolr kernel: [   18.787909]  ip6_input_finish+0xcc/0x470
  May 21 19:09:59 esolr kernel: [   18.787911]  ip6_input+0x3f/0xb0
  May 21 19:09:59 esolr kernel: [   18.787914]  ? ip6_dst_check+0xb1/0xf0
  May 21 19:09:59 esolr kernel: [   18.787915]  ip6_rcv_finish+0xd8/0x120
  May 21 19:09:59 esolr kernel: [   18.787916]  ipv6_rcv+0x347/0x510
  May 21 19:09:59 esolr kernel: [   18.787917]  ? __pskb_pull_tail+0x7f/0x4b0
  May 21 19:09:59 esolr kernel: [   18.787918]  ? skb_copy_bits+0x141/0x280
  May 21 19:09:59 esolr kernel: [   18.787920]  ? 
__kmalloc_node_track_caller+0x216/0x2b0
  May 21 19:09:59 esolr kernel: [   18.787923]  
__netif_receive_skb_core+0x432/0xb80
  May 21 19:09:59 esolr kernel: [   18.787929]  ? tcp6_gro_receive+0x137/0x1a0
  May 21 19:09:59 esolr kernel: [   18.787931]  ? ipv6_gro_receive+0x1a6/0x350
  May 21 19:09:59 esolr kernel: [   18.787932]  __netif_receive_skb+0x18/0x60
  May 21 19:09:59 esolr kernel: [   18.787933]  ? __netif_receive_skb+0x18/0x60
  May 21 19:0

[Kernel-packages] [Bug 2020279] Missing required logs.

2023-05-21 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 2020279

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020279

Title:
  Kernel warning after upgrade to 4.15.0.211.194

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel
  started to produce the below warning. It did not seem to cause any
  major issue. Revering to 4.15.0.210 stopped the warning. The server is
  a Droplet at DigitalOcean with their monitoring/management agent
  installed.

  May 21 19:09:59 esolr kernel: [   18.787737] [ cut here 
]
  May 21 19:09:59 esolr kernel: [   18.787803] WARNING: CPU: 0 PID: 1027 at 
/build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 
sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787804] Modules linked in: isofs xt_set 
nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack 
ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc 
irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm 
ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables 
autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 
crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net
  May 21 19:09:59 esolr kernel: [   18.787835] CPU: 0 PID: 1027 Comm: 
unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu
  May 21 19:09:59 esolr kernel: [   18.787836] Hardware name: DigitalOcean 
Droplet/Droplet, BIOS 20171212 12/12/2017
  May 21 19:09:59 esolr kernel: [   18.787839] RIP: 
0010:sk_stream_kill_queues+0xed/0x110
  May 21 19:09:59 esolr kernel: [   18.787840] RSP: :94bf7fc038c0 
EFLAGS: 00010282
  May 21 19:09:59 esolr kernel: [   18.787841] RAX: 0024 RBX: 
94bf79565500 RCX: 0006
  May 21 19:09:59 esolr kernel: [   18.787842] RDX:  RSI: 
94bf7fc1b4d8 RDI: 94bf7fc1b4d0
  May 21 19:09:59 esolr kernel: [   18.787842] RBP: 94bf7fc038d0 R08: 
0222 R09: 0004
  May 21 19:09:59 esolr kernel: [   18.787843] R10: 94bf7fc03860 R11: 
0001 R12: 94bf795655c8
  May 21 19:09:59 esolr kernel: [   18.787844] R13: 0006 R14: 
003b R15: 
  May 21 19:09:59 esolr kernel: [   18.787845] FS:  7f04071d4740() 
GS:94bf7fc0() knlGS:
  May 21 19:09:59 esolr kernel: [   18.787846] CS:  0010 DS:  ES:  CR0: 
80050033
  May 21 19:09:59 esolr kernel: [   18.787846] CR2: 7f0401995e60 CR3: 
67586002 CR4: 001606f0
  May 21 19:09:59 esolr kernel: [   18.787850] DR0:  DR1: 
 DR2: 
  May 21 19:09:59 esolr kernel: [   18.787851] DR3:  DR6: 
fffe0ff0 DR7: 0400
  May 21 19:09:59 esolr kernel: [   18.787851] Call Trace:
  May 21 19:09:59 esolr kernel: [   18.787853]  
  May 21 19:09:59 esolr kernel: [   18.787866]  inet_csk_destroy_sock+0x59/0x150
  May 21 19:09:59 esolr kernel: [   18.787868]  tcp_done+0x96/0xa0
  May 21 19:09:59 esolr kernel: [   18.787872]  tcp_time_wait+0x1be/0x280
  May 21 19:09:59 esolr kernel: [   18.787874]  tcp_fin+0x16b/0x180
  May 21 19:09:59 esolr kernel: [   18.787876]  tcp_data_queue+0x594/0xc20
  May 21 19:09:59 esolr kernel: [   18.787881]  
tcp_rcv_state_process+0x5dd/0xe70
  May 21 19:09:59 esolr kernel: [   18.787887]  ? __slab_alloc+0x20/0x40
  May 21 19:09:59 esolr kernel: [   18.787889]  ? kmem_cache_alloc+0x161/0x1c0
  May 21 19:09:59 esolr kernel: [   18.787891]  ? skb_clone+0x56/0xc0
  May 21 19:09:59 esolr kernel: [   18.787897]  tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787898]  ? tcp_v6_do_rcv+0x1ca/0x440
  May 21 19:09:59 esolr kernel: [   18.787899]  tcp_v6_rcv+0x9b6/0xa60
  May 21 19:09:59 esolr kernel: [   18.787907]  ? update_load_avg+0x5f9/0x780
  May 21 19:09:59 esolr kernel: [   18.787909]  ip6_input_finish+0xcc/0x470
  May 21 19:09:59 esolr kernel: [   18.787911]  ip6_input+0x3f/0xb0
  May 21 19:09:59 esolr kernel: [   18.787914]  ? ip6_dst_check+0xb1/0xf0
  May

[Kernel-packages] [Bug 2020279] [NEW] Kernel warning after upgrade to 4.15.0.211.194

2023-05-21 Thread Gábor KORMOS
Public bug reported:

After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel started
to produce the below warning. It did not seem to cause any major issue.
Revering to 4.15.0.210 stopped the warning. The server is a Droplet at
DigitalOcean with their monitoring/management agent installed.

May 21 19:09:59 esolr kernel: [   18.787737] [ cut here 
]
May 21 19:09:59 esolr kernel: [   18.787803] WARNING: CPU: 0 PID: 1027 at 
/build/linux-RlFMDZ/linux-4.15.0/net/core/stream.c:212 
sk_stream_kill_queues+0xed/0x110
May 21 19:09:59 esolr kernel: [   18.787804] Modules linked in: isofs xt_set 
nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_conntrack nf_conntrack 
ip_set_hash_net ip_set nfnetlink nls_iso8859_1 kvm_intel kvm binfmt_misc 
irqbypass input_leds joydev serio_raw sch_fq_codel ib_iser rdma_cm iw_cm ib_cm 
ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables 
autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 
crypto_simd glue_helper cryptd psmouse virtio_blk virtio_scsi virtio_net
May 21 19:09:59 esolr kernel: [   18.787835] CPU: 0 PID: 1027 Comm: 
unattended-upgr Not tainted 4.15.0-211-generic #222-Ubuntu
May 21 19:09:59 esolr kernel: [   18.787836] Hardware name: DigitalOcean 
Droplet/Droplet, BIOS 20171212 12/12/2017
May 21 19:09:59 esolr kernel: [   18.787839] RIP: 
0010:sk_stream_kill_queues+0xed/0x110
May 21 19:09:59 esolr kernel: [   18.787840] RSP: :94bf7fc038c0 EFLAGS: 
00010282
May 21 19:09:59 esolr kernel: [   18.787841] RAX: 0024 RBX: 
94bf79565500 RCX: 0006
May 21 19:09:59 esolr kernel: [   18.787842] RDX:  RSI: 
94bf7fc1b4d8 RDI: 94bf7fc1b4d0
May 21 19:09:59 esolr kernel: [   18.787842] RBP: 94bf7fc038d0 R08: 
0222 R09: 0004
May 21 19:09:59 esolr kernel: [   18.787843] R10: 94bf7fc03860 R11: 
0001 R12: 94bf795655c8
May 21 19:09:59 esolr kernel: [   18.787844] R13: 0006 R14: 
003b R15: 
May 21 19:09:59 esolr kernel: [   18.787845] FS:  7f04071d4740() 
GS:94bf7fc0() knlGS:
May 21 19:09:59 esolr kernel: [   18.787846] CS:  0010 DS:  ES:  CR0: 
80050033
May 21 19:09:59 esolr kernel: [   18.787846] CR2: 7f0401995e60 CR3: 
67586002 CR4: 001606f0
May 21 19:09:59 esolr kernel: [   18.787850] DR0:  DR1: 
 DR2: 
May 21 19:09:59 esolr kernel: [   18.787851] DR3:  DR6: 
fffe0ff0 DR7: 0400
May 21 19:09:59 esolr kernel: [   18.787851] Call Trace:
May 21 19:09:59 esolr kernel: [   18.787853]  
May 21 19:09:59 esolr kernel: [   18.787866]  inet_csk_destroy_sock+0x59/0x150
May 21 19:09:59 esolr kernel: [   18.787868]  tcp_done+0x96/0xa0
May 21 19:09:59 esolr kernel: [   18.787872]  tcp_time_wait+0x1be/0x280
May 21 19:09:59 esolr kernel: [   18.787874]  tcp_fin+0x16b/0x180
May 21 19:09:59 esolr kernel: [   18.787876]  tcp_data_queue+0x594/0xc20
May 21 19:09:59 esolr kernel: [   18.787881]  tcp_rcv_state_process+0x5dd/0xe70
May 21 19:09:59 esolr kernel: [   18.787887]  ? __slab_alloc+0x20/0x40
May 21 19:09:59 esolr kernel: [   18.787889]  ? kmem_cache_alloc+0x161/0x1c0
May 21 19:09:59 esolr kernel: [   18.787891]  ? skb_clone+0x56/0xc0
May 21 19:09:59 esolr kernel: [   18.787897]  tcp_v6_do_rcv+0x1ca/0x440
May 21 19:09:59 esolr kernel: [   18.787898]  ? tcp_v6_do_rcv+0x1ca/0x440
May 21 19:09:59 esolr kernel: [   18.787899]  tcp_v6_rcv+0x9b6/0xa60
May 21 19:09:59 esolr kernel: [   18.787907]  ? update_load_avg+0x5f9/0x780
May 21 19:09:59 esolr kernel: [   18.787909]  ip6_input_finish+0xcc/0x470
May 21 19:09:59 esolr kernel: [   18.787911]  ip6_input+0x3f/0xb0
May 21 19:09:59 esolr kernel: [   18.787914]  ? ip6_dst_check+0xb1/0xf0
May 21 19:09:59 esolr kernel: [   18.787915]  ip6_rcv_finish+0xd8/0x120
May 21 19:09:59 esolr kernel: [   18.787916]  ipv6_rcv+0x347/0x510
May 21 19:09:59 esolr kernel: [   18.787917]  ? __pskb_pull_tail+0x7f/0x4b0
May 21 19:09:59 esolr kernel: [   18.787918]  ? skb_copy_bits+0x141/0x280
May 21 19:09:59 esolr kernel: [   18.787920]  ? 
__kmalloc_node_track_caller+0x216/0x2b0
May 21 19:09:59 esolr kernel: [   18.787923]  
__netif_receive_skb_core+0x432/0xb80
May 21 19:09:59 esolr kernel: [   18.787929]  ? tcp6_gro_receive+0x137/0x1a0
May 21 19:09:59 esolr kernel: [   18.787931]  ? ipv6_gro_receive+0x1a6/0x350
May 21 19:09:59 esolr kernel: [   18.787932]  __netif_receive_skb+0x18/0x60
May 21 19:09:59 esolr kernel: [   18.787933]  ? __netif_receive_skb+0x18/0x60
May 21 19:09:59 esolr kernel: [   18.787935]  
netif_receive_skb_internal+0x45/0xe0
May 21 19:09:59 esolr kernel: [   18.787937]  napi_gro_receive+0xc5/0xf0
May 21 19:09:59 esolr kernel: [

[Kernel-packages] [Bug 2018960] Re: linux-image-5.4.0-149-generic (focal-proposed): 0 at net/core/stream.c:212 sk_stream_kill_queues+0xcf/0xe0

2023-05-21 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: linux-signed (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/2018960

Title:
  linux-image-5.4.0-149-generic (focal-proposed): 0 at
  net/core/stream.c:212 sk_stream_kill_queues+0xcf/0xe0

Status in linux-signed package in Ubuntu:
  Confirmed

Bug description:
  After upgrading and rebooting this Ubuntu 20.04 LTS server (Ubuntu
  Focal), I noticed that it was suddenly getting a bunch of kernel log
  (dmesg) reports like:

  WARNING: CPU: 4 PID: 0 at net/core/stream.c:212
  sk_stream_kill_queues+0xcf/0xe0

  while investigating I determined that it is currently running the
  focal-proposed kernel (linux-image-5.4.0-149-generic), which it turns
  out was enabled for this server (clearly it seemed like a good idea at
  the time).

  I'm not expecting focal-proposed to be fixed as if it were a release
  package, but since I couldn't find any reports on Launchpad I figured
  I should let y'all know this focal-proposed package could do with some
  additional work before it's actually released :-)

  There have been at least 80 such reports in the last 5 hours since the
  server was rebooted, differing only by the CPU core and the process
  reported, although it seems the last one was a couple of hours ago, so
  I guess it's traffic dependent/timing dependent.

  ewen@naosr620:~$ uptime
   16:27:32 up  5:19,  1 user,  load average: 0.08, 0.14, 0.06
  ewen@naosr620:~$ dmesg -t | grep WARNING | sed 's/CPU: [0-9]*/CPU: N/; s/PID: 
[0-9]*/PID: N/;' | uniq -c
   88 WARNING: CPU: N PID: N at net/core/stream.c:212 
sk_stream_kill_queues+0xcf/0xe0
  ewen@naosr620:~$ 

  Ubuntu Release:

  ewen@naosr620:~$ lsb_release -rd
  Description:  Ubuntu 20.04.6 LTS
  Release:  20.04
  ewen@naosr620:~$ 

  
  Kernel/package version affected:

  ewen@naosr620:~$ uname -a
  Linux naosr620 5.4.0-149-generic #166-Ubuntu SMP Tue Apr 18 16:51:45 UTC 2023 
x86_64 x86_64 x86_64 GNU/Linux
  ewen@naosr620:~$ dpkg -l | grep linux-image | grep 149
  ii  linux-image-5.4.0-149-generic  5.4.0-149.166  
   amd64Signed kernel image generic
  ii  linux-image-generic5.4.0.149.147  
   amd64Generic Linux kernel image
  ewen@naosr620:~$ apt-cache policy linux-image-5.4.0-149-generic 
  linux-image-5.4.0-149-generic:
Installed: 5.4.0-149.166
Candidate: 5.4.0-149.166
Version table:
   *** 5.4.0-149.166 500
  500 https://mirror.fsmg.org.nz/ubuntu focal-proposed/main amd64 
Packages
  100 /var/lib/dpkg/status
  ewen@naosr620:~$ apt-cache policy linux-image-generic
  linux-image-generic:
Installed: 5.4.0.149.147
Candidate: 5.4.0.149.147
Version table:
   *** 5.4.0.149.147 500
  500 https://mirror.fsmg.org.nz/ubuntu focal-proposed/main amd64 
Packages
  100 /var/lib/dpkg/status
   5.4.0.148.146 500
  500 https://mirror.fsmg.org.nz/ubuntu focal-updates/main amd64 
Packages
  500 https://mirror.fsmg.org.nz/ubuntu focal-security/main amd64 
Packages
   5.4.0.26.32 500
  500 https://mirror.fsmg.org.nz/ubuntu focal/main amd64 Packages
  ewen@naosr620:~$ 
  ewen@naosr620:~$ apt-cache show linux-image-5.4.0-149-generic | grep Source:
  Source: linux-signed
  ewen@naosr620:~$ 

  
  Full example dmesg, including stack trace (they all seem to be WARNINGs, and 
other than filling dmesg / system logs the system "appears to be running okay", 
so I'm not going to rush another reboot now -- near end of business day):

  ewen@naosr620:~$ date
  Tue 09 May 2023 16:34:56 NZST
  ewen@naosr620:~$ dmesg -T | tail -100 | grep -B 150 "end trace" | grep -A 999 
"cut here"
  [Tue May  9 14:21:18 2023] [ cut here ]
  [Tue May  9 14:21:18 2023] WARNING: CPU: 10 PID: 0 at net/core/stream.c:212 
sk_stream_kill_queues+0xcf/0xe0
  [Tue May  9 14:21:18 2023] Modules linked in: mpt3sas raid_class 
scsi_transport_sas mptctl mptbase vhost_net vhost tap ip6t_REJECT 
nf_reject_ipv6 ip6table_mangle ip6table_nat ip6table_raw nf_log_ipv6 xt_recent 
ipt_REJECT nf_reject_ipv4 xt_hashlimit xt_addrtype xt_multiport xt_comment 
xt_conntrack xt_mark iptable_mangle xt_MASQUERADE iptable_nat xt_CT xt_tcpudp 
iptable_raw nfnetlink_log xt_NFLOG nf_log_ipv4 nf_log_common xt_LOG nf_nat_tftp 
nf_nat_snmp_basic nf_conntrack_snmp nf_nat_sip nf_nat_pptp nf_nat_irc 
ebtable_filter nf_nat_h323 ebtables nf_nat_ftp nf_nat_amanda ts_kmp 
ip6table_filter nf_conntrack_amanda nf_nat ip6_tables nf_conntrack_sane 
nf_conntrack_tftp nf_conntrack_sip nf_conntrack_pptp nf_conntrack_netlink 
nfnetlink nf_conntrack_netbios_ns nf_conntrack_broadcast nf_conntrack_irc 
nf_conntrack_h323 nf_conntrack_ftp nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 
iptable_filter bpfilter dell_rbu nls_iso8859_

[Kernel-packages] [Bug 2018470] Re: Linux 5.19 amdgpu: NULL pointer on GCN2 and invalid load on GCN1

2023-05-21 Thread Thomas Debesse
I now see the original message was edited, with this words added:

> [Test case]
> Install the update, check that display works again on amdgpu

I confirm display works again on amdgpu

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2018470

Title:
  Linux 5.19 amdgpu: NULL pointer on GCN2 and invalid load on GCN1

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Kinetic:
  Fix Committed
Status in linux source package in Mantic:
  Confirmed

Bug description:
  [Impact]
  A regression caused by incomplete stable backports

  [Fix]

  commit 8273b4048664fff356fd10059033f0e2f5a422a1
  Author: Arunpravin Paneer Selvam 
  Date:   Tue Oct 18 07:08:38 2022 -0700

  drm/amdgpu: Fix for BO move issue

  [Test case]

  Install the update, check that display works again on amdgpu

  --

  The day I updated from Ubuntu 22.04 to 22.10 some months ago, I had to
  stick on Linux 5.15 because 5.19 was not working with my computer. The
  last two days I spent time to find a way to run Linux 5.19, and found
  one version working: 5.19.0-23.

  Here are the versions I tested:

  - 5.19.0-23
  - 5.19.0-29
  - 5.19.0-31
  - 5.19.0-42

  In that list, only Linux 5.19.0-23 is working with that computer.

  There may be other versions that work I have not tested, but basically
  the breakages occurred after 5.19.0-23.

  I face two problems, let's talk about the first one, the graphic one
  still present in 5.19.0-42. It starts to occurs with 5.19.0-31
  (5.19.0-29 is not affected): graphic breaks at the moment it should
  switch from low resolution display to high resolution display at the
  very beginning of startup. The computer is not completely broken, but
  the graphic is dead. X11 cannot start, trying to use the framebuffer,
  meaning the amdgpu driver is not functional).

  The second bug is the one I get with the 5.19.0-29 version. Linux
  5.19.0-29 doesn't experience the graphic bug but has another issue
  that makes the computer unusable: some CPU got locked, and some btrfs
  process runs at 100% CPU, syncing never ends, even preventing to
  reboot. This bug is less important because I don't reproduce it on
  version 5.19.0-42, so if 5.19.0-42 fixes the graphic all will be fine.

  I have not updated to Ubuntu 23.04 yet because I'm afraid of newer
  kernels from it would leave my computer totally unusable, I have run
  Ubuntu 22.10 with Ubuntu 22.04's 5.15 kernel until today because of
  that fear.

  It actually took me two work days to test various combinations to boot
  the computer so I'm sticking on 5.19.0-29 for now, and I have limited
  time to test other options. I also tried various BIOS options, and
  also upgraded the BIOS…, and since that ThreadRipper PRO computer has
  very slow booting BIOS, trying various configurations or software
  versions that requires a reboot quickly eats-up whole hours.

  The attached logs may have traces of dkim modules like amdgpu-pro, but
  the first time I experienced the bug I had none of them. I reproduced
  the bug on a 5.19.0-42 kernel free of amdgpu-pro yesterday. I'm simply
  opening the ticket from my working environment, and I decided to not
  spend one more hour just to uninstall amdgpu-pro and reboot only to do
  that ticket.

  Here are some details on the hardware:

  - MOBO: Gigabyte WRX80-SU8-IPMI rev. 1.0 (BIOS version F5, also named 
WRX80PRO-F1 in dmidecode, dated 08/04/2022) 
https://www.gigabyte.com/Motherboard/WRX80-SU8-IPMI-rev-10
  - RAM: 8× Kingston Server Premier 32GB DDR4 3200 MHz ECC CL22 2Rx8 PC4-25600 
KSM32ED8/32ME 16Gbit Micron E
  - CPU: AMD Ryzen Threadripper PRO 3955WX 16-Cores (Castle Peak, Zen 2)
  - GPU: AMD Radeon R9 390X (Hawaii/Grenada, GCN2, amdgpu driver)
  - GPU: AMD Radeon R7 240 (Oland, GCN1, amdgpu driver)
  - GPU: ASPEED graphic Family rev 41

  The ASPEED graphic is a small card integrated in the motherboard and
  part of the BMC, I cannot remove it. This may participate in the
  trouble.

  When the graphic works (Linux 5.19.0-23, Linux 5.19.0-29), the boot is
  displayed on all AMD and ASPEED graphic output, then at the moment the
  graphic switches from low resolution to high resolution, the ASPEED
  graphic goes off and the display continue on AMD cards.

  When the graphic doesn't work (5.19.0-31, 5.19.0-42), the boot is
  displayed on all AMD and ASPEED graphic output, then at the moment the
  graphic switches from low resolution to high resolution, the AMD cards
  display garbage but the display continue on the ASPEED card. The
  ASPEED card is a very basic integrated card without hardware
  acceleration and featuring only one VGA output so that's unusable. As
  an additional information I know X11 never start on the ASPEED if
  there are discrete cards plugged in (tested last year).

  So right now that computer is sticking on Linux 5.19.0-23 which
  doesn't doesn't the graphic a

[Kernel-packages] [Bug 2018470] Re: Linux 5.19 amdgpu: NULL pointer on GCN2 and invalid load on GCN1

2023-05-21 Thread Thomas Debesse
I'm on 5.19.0-44.45 right now.

What 5.19.0-44.45 is expected to fix?

- The computer boots properly, I have both R7 240 and R9 390X displaying
something fine, so that error is fixed.

- I still have an error message in dmesg:

```
[7.609329] 

[7.610224] UBSAN: invalid-load in 
/build/linux-le9C0y/linux-5.19.0/drivers/gpu/drm/amd/amdgpu/../pm/amdgpu_dpm.c:1363:37
[7.611125] load of value 232 is not a valid value for type '_Bool'
[7.612025] CPU: 14 PID: 400 Comm: systemd-udevd Not tainted 
5.19.0-44-generic #45-Ubuntu
[7.612928] Hardware name: Default string Default string/Default string, 
BIOS WRX80PRO-F1 08/04/2022
[7.613836] Call Trace:
[7.614736]  
[7.615633]  show_stack+0x4e/0x61
[7.616531]  dump_stack_lvl+0x4a/0x6f
[7.617429]  dump_stack+0x10/0x18
[7.618333]  ubsan_epilogue+0x9/0x3a
[7.619231]  __ubsan_handle_load_invalid_value.cold+0x42/0x47
[7.620124]  amdgpu_dpm_is_overdrive_supported.cold+0x12/0x45 [amdgpu]
[7.621402]  default_attr_update+0x332/0x500 [amdgpu]
[7.622641]  amdgpu_pm_sysfs_init+0x16f/0x1e0 [amdgpu]
[7.623871]  amdgpu_device_init.cold+0x3b7/0x80a [amdgpu]
[7.625107]  amdgpu_driver_load_kms+0x1c/0x170 [amdgpu]
[7.626277]  amdgpu_pci_probe+0x15f/0x3c0 [amdgpu]
[7.627419]  local_pci_probe+0x47/0x90
[7.628270]  pci_call_probe+0x55/0x190
[7.629107]  pci_device_probe+0x84/0x120
[7.629934]  really_probe+0x1df/0x3b0
[7.630767]  __driver_probe_device+0x12c/0x1b0
[7.631596]  driver_probe_device+0x24/0xd0
[7.632426]  __driver_attach+0x10b/0x210
[7.633255]  ? __device_attach_driver+0x170/0x170
[7.634087]  bus_for_each_dev+0x90/0xe0
[7.634917]  driver_attach+0x1e/0x30
[7.635740]  bus_add_driver+0x187/0x230
[7.636562]  driver_register+0x8f/0x100
[7.637379]  __pci_register_driver+0x62/0x70
[7.638203]  amdgpu_init+0x6a/0x1000 [amdgpu]
[7.639307]  ? 0xc05c
[7.640118]  do_one_initcall+0x5e/0x240
[7.640929]  do_init_module+0x50/0x210
[7.641736]  load_module+0xb7d/0xcd0
[7.642532]  __do_sys_finit_module+0xc4/0x140
[7.643316]  ? __do_sys_finit_module+0xc4/0x140
[7.644100]  __x64_sys_finit_module+0x18/0x30
[7.644879]  do_syscall_64+0x5b/0x90
[7.645661]  ? ksys_mmap_pgoff+0x11d/0x260
[7.646444]  ? exit_to_user_mode_prepare+0x30/0xb0
[7.647231]  ? syscall_exit_to_user_mode+0x29/0x50
[7.648016]  ? do_syscall_64+0x67/0x90
[7.648796]  ? do_syscall_64+0x67/0x90
[7.649566]  ? syscall_exit_to_user_mode+0x29/0x50
[7.650347]  ? do_syscall_64+0x67/0x90
[7.651120]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[7.651888] RIP: 0033:0x7f790b1eec4d
[7.652645] Code: 5d c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 
f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 
f0 ff ff 73 01 c3 48 8b 0d 83 f1 0d 00 f7 d8 64 89 01 48
[7.653432] RSP: 002b:7fffa9b1d908 EFLAGS: 0246 ORIG_RAX: 
0139
[7.654222] RAX: ffda RBX: 556a6508e430 RCX: 7f790b1eec4d
[7.655015] RDX:  RSI: 556a650933b0 RDI: 0015
[7.655815] RBP: 556a650933b0 R08:  R09: 7f790b2cec60
[7.656610] R10: 0015 R11: 0246 R12: 0002
[7.657414] R13: 556a650795d0 R14:  R15: 556a65079030
[7.658216]  
[7.659037] 

```

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2018470

Title:
  Linux 5.19 amdgpu: NULL pointer on GCN2 and invalid load on GCN1

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Kinetic:
  Fix Committed
Status in linux source package in Mantic:
  Confirmed

Bug description:
  [Impact]
  A regression caused by incomplete stable backports

  [Fix]

  commit 8273b4048664fff356fd10059033f0e2f5a422a1
  Author: Arunpravin Paneer Selvam 
  Date:   Tue Oct 18 07:08:38 2022 -0700

  drm/amdgpu: Fix for BO move issue

  [Test case]

  Install the update, check that display works again on amdgpu

  --

  The day I updated from Ubuntu 22.04 to 22.10 some months ago, I had to
  stick on Linux 5.15 because 5.19 was not working with my computer. The
  last two days I spent time to find a way to run Linux 5.19, and found
  one version working: 5.19.0-23.

  Here are the versions I tested:

  - 5.19.0-23
  - 5.19.0-29
  - 5.19.0-31
  - 5.19.0-42

  In that list, only Linux 5.19.0-23 is working with that computer.

  There may be other versions that work I have not tested, but basically
  the breakages occurred after 5.19.0-23.

  I face two problems, let's talk about the first one, the graphic one
  still present in 5.19.0-42. It starts to occurs with 5.19.0-

[Kernel-packages] [Bug 2018128] Re: Apport does not collect all logs when the package is HWE kernel

2023-05-21 Thread lotuspsychje
@4 Benjamin

i ran sudo ln -s source_linux.py /usr/share/apport/package-
hooks/source_linux-signed-hwe.py

and added a symlink /usr/share/apport/package-hooks/source_linux-signed-
hwe.py -> source_linux.py

then created a new bug against 'linux' but the results were the same, no
logs were imported

see the new bug report https://bugs.launchpad.net/ubuntu/+source/linux-
signed-hwe-5.19/+bug/2020268

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2018128

Title:
  Apport does not collect all logs when the package is HWE kernel

Status in apport package in Ubuntu:
  Triaged
Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Ubuntu 22.04 LTS with kernel 5.19.0-41-generic

  When filing bugs against the package 'linux' apport collects all the logs 
needed
  to the kernel

  But in case the user is not on stock kernel anymore and has the HWE kernel
  apport only imports 2 logs Dependencies.txt + ProcCpuInfoMinimal.txt

  and forwards the package 'linux' towards linux-signed-hwe-5.19 (in my
  case)

  would it be possible to make apport collect all the logs needed in all
  kernel cases?

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: apport 2.20.11-0ubuntu82.4
  ProcVersionSignature: Ubuntu 5.19.0-41.42~22.04.1-generic 5.19.17
  Uname: Linux 5.19.0-41-generic x86_64
  ApportLog:
   
  ApportVersion: 2.20.11-0ubuntu82.4
  Architecture: amd64
  CasperMD5CheckResult: unknown
  CurrentDesktop: ubuntu:GNOME
  Date: Sat Apr 29 05:25:30 2023
  PackageArchitecture: all
  SourcePackage: apport
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/2018128/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2020268] Re: test bug against HWE

2023-05-21 Thread lotuspsychje
** Changed in: linux-signed-hwe-5.19 (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-hwe-5.19 in Ubuntu.
https://bugs.launchpad.net/bugs/2020268

Title:
  test bug against HWE

Status in linux-signed-hwe-5.19 package in Ubuntu:
  Invalid

Bug description:
  this is a test

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: linux-image-5.19.0-41-generic 5.19.0-41.42~22.04.1
  ProcVersionSignature: Ubuntu 5.19.0-41.42~22.04.1-generic 5.19.17
  Uname: Linux 5.19.0-41-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.4
  Architecture: amd64
  CasperMD5CheckResult: unknown
  CurrentDesktop: ubuntu:GNOME
  Date: Sun May 21 16:32:24 2023
  SourcePackage: linux-signed-hwe-5.19
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed-hwe-5.19/+bug/2020268/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2020268] [NEW] test bug against HWE

2023-05-21 Thread lotuspsychje
Public bug reported:

this is a test

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: linux-image-5.19.0-41-generic 5.19.0-41.42~22.04.1
ProcVersionSignature: Ubuntu 5.19.0-41.42~22.04.1-generic 5.19.17
Uname: Linux 5.19.0-41-generic x86_64
ApportVersion: 2.20.11-0ubuntu82.4
Architecture: amd64
CasperMD5CheckResult: unknown
CurrentDesktop: ubuntu:GNOME
Date: Sun May 21 16:32:24 2023
SourcePackage: linux-signed-hwe-5.19
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: linux-signed-hwe-5.19 (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug jammy wayland-session

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-hwe-5.19 in Ubuntu.
https://bugs.launchpad.net/bugs/2020268

Title:
  test bug against HWE

Status in linux-signed-hwe-5.19 package in Ubuntu:
  New

Bug description:
  this is a test

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: linux-image-5.19.0-41-generic 5.19.0-41.42~22.04.1
  ProcVersionSignature: Ubuntu 5.19.0-41.42~22.04.1-generic 5.19.17
  Uname: Linux 5.19.0-41-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.4
  Architecture: amd64
  CasperMD5CheckResult: unknown
  CurrentDesktop: ubuntu:GNOME
  Date: Sun May 21 16:32:24 2023
  SourcePackage: linux-signed-hwe-5.19
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed-hwe-5.19/+bug/2020268/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2016829] Re: Completely support vxlan and erspan for flower

2023-05-21 Thread Tony Duan
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/2016829

Title:
  Completely support vxlan and erspan for flower

Status in linux-bluefield package in Ubuntu:
  Invalid
Status in linux-bluefield source package in Focal:
  Fix Committed

Bug description:
  * Explain the bug(s)

  vxlan and erspan are already supported for flower to allow flower to
  match vxlan and erspan options. It needs to support vxlan and erspan
  to act_tunnel_key and related bug fixes for the sake of completeness
  and to avoid bug in the future.

  * Brief explanation of fixes

  Cherry-pick. No adaptation. Add vxlan/erspan support for act_tunnel_key and 
bug fixes.
  c96adff95619 cls_flower: call nla_ok() before nla_next()
  8e1b3ac47866 net: sched: initialize with 0 before setting erspan md->u
  e20d4ff2acd7 net: sched: add erspan option support to act_tunnel_key
  fca3f91cc38a net: sched: add vxlan option support to act_tunnel_key

  * How to test

  For vxlan support:
It is to allow setting vxlan options using the
  act_tunnel_key action. Different from geneve options,
  only one option can be set. And also, geneve options
  and vxlan options can't be set at the same time.
  gbp is the only param for vxlan options:

# ip link add name vxlan0 type vxlan dstport 0 external
# tc qdisc add dev eth0 ingress
# tc filter add dev eth0 protocol ip parent : \
 flower indev eth0 \
ip_proto udp \
action tunnel_key \
set src_ip 10.0.99.192 \
dst_ip 10.0.99.193 \
dst_port 6081 \
id 11 \
vxlan_opts 01020304 \
 action mirred egress redirect dev vxlan0

  For erspan support:
It is to allow setting erspan options using the
  act_tunnel_key action. Different from geneve options,
  only one option can be set. And also, geneve options,
  vxlan options or erspan options can't be set at the
  same time.

  Options are expressed as ver:index:dir:hwid, when ver
  is set to 1, index will be applied while dir and hwid
  will be ignored, and when ver is set to 2, dir and
  hwid will be used while index will be ignored.

# ip link add name erspan1 type erspan external
# tc qdisc add dev eth0 ingress
# tc filter add dev eth0 protocol ip parent : \
 flower indev eth0 \
ip_proto udp \
action tunnel_key \
set src_ip 10.0.99.192 \
dst_ip 10.0.99.193 \
dst_port 6081 \
id 11 \
  erspan_opts 1:2:0:0 \
 action mirred egress redirect dev erspan1

  * What it could break.

  Nothing.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2016829/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2020265] [NEW] package linux-firmware 20220329.git681281e4-0ubuntu3.13 failed to install/upgrade: unable to open '/lib/firmware/iwlwifi-7265-13.ucode.dpkg-new': Operation not pe

2023-05-21 Thread Ron P
Public bug reported:

having an issue with wifi adapter not working, tried refreshing firmware to 
make sure nothing broken, ran:
sudo apt install --reinstall linux-firmware
got an error and reporting.

ProblemType: Package
DistroRelease: Ubuntu 22.04
Package: linux-firmware 20220329.git681281e4-0ubuntu3.13
ProcVersionSignature: Ubuntu 5.15.0-72.79-generic 5.15.98
Uname: Linux 5.15.0-72-generic x86_64
ApportVersion: 2.20.11-0ubuntu82.4
AptOrdering:
 linux-firmware:amd64: Install
 NULL: ConfigurePending
Architecture: amd64
AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
CRDA: Error: command ['iw', 'reg', 'get'] failed with exit code 1: nl80211 not 
found.
CasperMD5CheckResult: unknown
Date: Sun May 21 09:44:18 2023
Dependencies: firmware-sof-signed 2.0-1ubuntu4.1
DpkgTerminalLog:
 Preparing to unpack 
.../linux-firmware_20220329.git681281e4-0ubuntu3.13_all.deb ...
 Unpacking linux-firmware (20220329.git681281e4-0ubuntu3.13) over 
(20220329.git681281e4-0ubuntu3.13) ...
 dpkg: error processing archive 
/var/cache/apt/archives/linux-firmware_20220329.git681281e4-0ubuntu3.13_all.deb 
(--unpack):
  unable to open '/lib/firmware/iwlwifi-7265-13.ucode.dpkg-new': Operation not 
permitted
ErrorMessage: unable to open '/lib/firmware/iwlwifi-7265-13.ucode.dpkg-new': 
Operation not permitted
InstallationDate: Installed on 2019-09-23 (1335 days ago)
InstallationMedia: Ubuntu 19.04 "Disco Dingo" - Release amd64 (20190416)
IwConfig:
 lono wireless extensions.
 
 enp0s31f6  no wireless extensions.
Lsusb:
 Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
 Bus 001 Device 004: ID 0cf3:e007 Qualcomm Atheros Communications 
 Bus 001 Device 003: ID 046d:c534 Logitech, Inc. Unifying Receiver
 Bus 001 Device 002: ID 0bda:5686 Realtek Semiconductor Corp. 
Integrated_Webcam_HD
 Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
MachineType: Dell Inc. Latitude E5570
PackageArchitecture: all
ProcFB: 0 EFI VGA
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-72-generic 
root=UUID=1f9d15e2-0d87-4693-8b50-0f7de800259f ro quiet splash vt.handoff=7
PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
Python3Details: /usr/bin/python3.10, Python 3.10.6, python3-minimal, 
3.10.6-1~22.04
PythonDetails: N/A
RelatedPackageVersions: grub-pc 2.06-2ubuntu7.1
RfKill:
 
SourcePackage: linux-firmware
Title: package linux-firmware 20220329.git681281e4-0ubuntu3.13 failed to 
install/upgrade: unable to open '/lib/firmware/iwlwifi-7265-13.ucode.dpkg-new': 
Operation not permitted
UpgradeStatus: Upgraded to jammy on 2023-05-13 (8 days ago)
dmi.bios.date: 11/20/2022
dmi.bios.release: 1.34
dmi.bios.vendor: Dell Inc.
dmi.bios.version: 1.34.3
dmi.board.name: 01D4DJ
dmi.board.vendor: Dell Inc.
dmi.board.version: A00
dmi.chassis.type: 9
dmi.chassis.vendor: Dell Inc.
dmi.modalias: 
dmi:bvnDellInc.:bvr1.34.3:bd11/20/2022:br1.34:svnDellInc.:pnLatitudeE5570:pvr:rvnDellInc.:rn01D4DJ:rvrA00:cvnDellInc.:ct9:cvr:sku06DF:
dmi.product.family: Latitude
dmi.product.name: Latitude E5570
dmi.product.sku: 06DF
dmi.sys.vendor: Dell Inc.

** Affects: linux-firmware (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-package jammy

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/2020265

Title:
  package linux-firmware 20220329.git681281e4-0ubuntu3.13 failed to
  install/upgrade: unable to open
  '/lib/firmware/iwlwifi-7265-13.ucode.dpkg-new': Operation not
  permitted

Status in linux-firmware package in Ubuntu:
  New

Bug description:
  having an issue with wifi adapter not working, tried refreshing firmware to 
make sure nothing broken, ran:
  sudo apt install --reinstall linux-firmware
  got an error and reporting.

  ProblemType: Package
  DistroRelease: Ubuntu 22.04
  Package: linux-firmware 20220329.git681281e4-0ubuntu3.13
  ProcVersionSignature: Ubuntu 5.15.0-72.79-generic 5.15.98
  Uname: Linux 5.15.0-72-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.4
  AptOrdering:
   linux-firmware:amd64: Install
   NULL: ConfigurePending
  Architecture: amd64
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CRDA: Error: command ['iw', 'reg', 'get'] failed with exit code 1: nl80211 
not found.
  CasperMD5CheckResult: unknown
  Date: Sun May 21 09:44:18 2023
  Dependencies: firmware-sof-signed 2.0-1ubuntu4.1
  DpkgTerminalLog:
   Preparing to unpack 
.../linux-firmware_20220329.git681281e4-0ubuntu3.13_all.deb ...
   Unpacking linux-firmware (20220329.git681281e4-0ubuntu3.13) over 
(20220329.git681281e4-0ubuntu3.13) ...
   dpkg: error processing archive 
/var/cache/apt/archives/linux-firmware_20220329.git681281e4-0ubuntu3.13_all.deb 
(--unpack):
unable to open '/lib/firmware/iwlwif

[Kernel-packages] [Bug 2009136] Re: No HDMI audio under 5.19.0-35 & -37 (regression from -32)

2023-05-21 Thread Wiktor Tomanek
Wow, you are really pissed off about that bot. I just want my audio to
finally work after months of Ubuntu being stupid. I haven't used my GPU
for anything for the last few months.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2009136

Title:
  No HDMI audio under 5.19.0-35 & -37 (regression from -32)

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Jammy:
  Invalid
Status in linux source package in Kinetic:
  Fix Released

Bug description:
  [Impact]
  For amdgpu/i915, hdmi audio output device has disappeared.

  [Fix]
  The latest fix for the non-contiguous memalloc helper changed the
  allocation method for a non-IOMMU system to use only the fallback
  allocator.  This should have worked, but it caused a problem sometimes
  when too many non-contiguous pages are allocated that can't be treated
  by HD-audio controller.
  
  As a quirk workaround, go back to the original strategy: use
  dma_alloc_noncontiguous() at first, and apply the fallback only when
  it fails, but only for non-IOMMU case

  [Test Case]
  1. boot with kernel applied the patches.
  2. check the cards in /proc/asound/cards.
 Get the hdmi cards.

   0 [PCH ]: HDA-Intel - HDA Intel PCH
HDA Intel PCH at 0xe232 irq 137
   1 [HDMI ]: HDA-Intel - HDA ATI HDMI
HDA ATI HDMI at 0xe226 irq 134

  [Where problems could occur]
  Low, this is just workaround and may have a better solution in the future.

  [Misc]
  All patches has been landed on OEM-6.1 and lunar.

  ~~
  CLARIFICATION: Just to avoid any confusion for those coming to this bug 
report; the "Jammy: invalid" status above does *not* mean that this bug doesn't 
affect jammy -- it does, and the kernel team is aware of this. All it reflects 
is that the fix has to go into the kinetic kernel package which will then flow 
into the kernel-hwe package implicitly.

  Currently known affected cards:

  * HD 7700 (comment 8)
  * R9 290 (comment 21)
  * RX 550 (LP: #2012141, and comment 27)
  * RX 570 (mine)
  * RX 580 (LP: #2009276, and comment 28)
  * WX 3200 (comment 29)
  * RX 6600 (LP: #2009542)
  * RX 6700 (LP: #2009275)

  [ Original Description ]

  After upgrading my Ubuntu jammy (22.04) desktop to the -35 release of
  the kernel, I found my HDMI audio output device had disappeared.
  Reverting to the -32 release caused it to appear again (hence why I'm
  filing the bug against the kernel rather than pulseaudio). I'm
  attaching the dmesg output from immediately after booting each kernel,
  but after a bit of trimming and diffing I *think* the following lines
  are the salient ones:

  input: HDA ATI HDMI HDMI/DP,pcm=3 as 
/devices/pci:00/:00:03.1/:2b:00.1/sound/card0/input12
  input: HDA ATI HDMI HDMI/DP,pcm=7 as 
/devices/pci:00/:00:03.1/:2b:00.1/sound/card0/input13
  input: HDA ATI HDMI HDMI/DP,pcm=8 as 
/devices/pci:00/:00:03.1/:2b:00.1/sound/card0/input14
  input: HDA ATI HDMI HDMI/DP,pcm=9 as 
/devices/pci:00/:00:03.1/:2b:00.1/sound/card0/input15
  input: HDA ATI HDMI HDMI/DP,pcm=10 as 
/devices/pci:00/:00:03.1/:2b:00.1/sound/card0/input16
  input: HDA ATI HDMI HDMI/DP,pcm=11 as 
/devices/pci:00/:00:03.1/:2b:00.1/sound/card0/input17
  snd_hda_intel :2b:00.1: bound :2b:00.0 (ops 
amdgpu_dm_audio_component_bind_ops [amdgpu])

  These lines appear in the dmesg of the -32 kernel, but not in the -35
  kernel's log. Meanwhile, the following lines appear in the -35
  kernel's log but not in the -32:

  hdaudio hdaudioC0D0: no AFG or MFG node found
  snd_hda_intel :2b:00.1: no codecs initialized

  I'll also attach the output of "pactl list" under each kernel (this
  shows the HDMI audio sink showing up under -32, but not -35) just in
  case that helps shed any light on things.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2009136/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2004534] Re: Lenovo IdeaPad 3 15ABA7 never wakes from sleep

2023-05-21 Thread andreas
Exactly the same bug here with all Distros and up to Kernel 6.2.x

I think it has to do with the internal ssd. It looks like the ssd won't
wake up after suspend and there are no BIOS settings to change the
behavior.

I hope this will fixed sometimes.

Cheers

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2004534

Title:
  Lenovo IdeaPad 3 15ABA7 never wakes from sleep

Status in linux package in Ubuntu:
  Confirmed

Bug description:
   - on locked screen: the keyboard blocks after a while and I cannot login 
anymore;
   - on unlocked screen: 
   = apps do not start (failed to start); 
   = no icon pictures on desktop; 
   = no wallpaper anymore (black background);

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: xorg 1:7.7+23ubuntu2
  ProcVersionSignature: Ubuntu 5.15.0-58.64-generic 5.15.74
  Uname: Linux 5.15.0-58-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.3
  Architecture: amd64
  BootLog: Error: [Errno 13] Permission denied: '/var/log/boot.log'
  CasperMD5CheckResult: pass
  CompositorRunning: None
  CurrentDesktop: ubuntu:GNOME
  Date: Thu Feb  2 07:15:13 2023
  DistUpgraded: Fresh install
  DistroCodename: jammy
  DistroVariant: ubuntu
  ExtraDebuggingInterest: Yes, including running git bisection searches
  GraphicsCard:
   Advanced Micro Devices, Inc. [AMD/ATI] Barcelo [1002:15e7] (rev c2) (prog-if 
00 [VGA controller])
 Subsystem: Lenovo Device [17aa:3801]
  InstallationDate: Installed on 2023-02-01 (1 days ago)
  InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809.1)
  MachineType: LENOVO 82RN
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-58-generic 
root=UUID=b63af605-bd2f-4b16-8bb4-1cc9bb85554c ro quiet splash vt.handoff=7
  SourcePackage: xorg
  Symptom: display
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 08/04/2022
  dmi.bios.release: 1.38
  dmi.bios.vendor: LENOVO
  dmi.bios.version: JTCN38WW
  dmi.board.asset.tag: No Asset Tag
  dmi.board.name: LNVNB161216
  dmi.board.vendor: LENOVO
  dmi.board.version: NO DPK
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: IdeaPad 3 15ABA7
  dmi.ec.firmware.release: 1.38
  dmi.modalias: 
dmi:bvnLENOVO:bvrJTCN38WW:bd08/04/2022:br1.38:efr1.38:svnLENOVO:pn82RN:pvrIdeaPad315ABA7:rvnLENOVO:rnLNVNB161216:rvrNODPK:cvnLENOVO:ct10:cvrIdeaPad315ABA7:skuLENOVO_MT_82RN_BU_idea_FM_IdeaPad315ABA7:
  dmi.product.family: IdeaPad 3 15ABA7
  dmi.product.name: 82RN
  dmi.product.sku: LENOVO_MT_82RN_BU_idea_FM_IdeaPad 3 15ABA7
  dmi.product.version: IdeaPad 3 15ABA7
  dmi.sys.vendor: LENOVO
  version.compiz: compiz N/A
  version.libdrm2: libdrm2 2.4.110-1ubuntu1
  version.libgl1-mesa-dri: libgl1-mesa-dri 22.0.5-0ubuntu0.1
  version.libgl1-mesa-glx: libgl1-mesa-glx N/A
  version.xserver-xorg-core: xserver-xorg-core 2:21.1.3-2ubuntu2.5
  version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
  version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:19.1.0-2ubuntu1
  version.xserver-xorg-video-intel: xserver-xorg-video-intel 
2:2.99.917+git20210115-1
  version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 
1:1.0.17-2build1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2004534/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp