[Bug 2072313] Re: jool-dkms FTBS with the latest linux 6.8 hwe on jammy

2024-07-05 Thread Andrea Righi
Test plan linux hwe 6.8:

jool_common.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

jool.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

jool_siit.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/


Test plan GA kernel 5.15:
jool_common.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

jool.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

jool_siit.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072313

Title:
  jool-dkms FTBS with the latest linux 6.8 hwe on jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jool/+bug/2072313/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072313] Re: jool-dkms FTBS with the latest linux 6.8 hwe on jammy

2024-07-05 Thread Andrea Righi
** Patch added: "jammy-jool-dkms.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/jool/+bug/2072313/+attachment/5794871/+files/jammy-jool-dkms.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072313

Title:
  jool-dkms FTBS with the latest linux 6.8 hwe on jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jool/+bug/2072313/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072313] [NEW] jool-dkms FTBS with the latest linux 6.8 hwe on jammy

2024-07-05 Thread Andrea Righi
Public bug reported:

[Impact]

/var/lib/dkms/jool-dkms/4.1.7/build/src/mod/common/nl/nl_common.c: In function 
‘get_jool_hdr’:
/var/lib/dkms/jool-dkms/4.1.7/build/src/mod/common/nl/nl_common.c:17:20: error: 
‘struct genl_info’ has no member named ‘userhdr’
   17 | return info->userhdr;
  |^~
/var/lib/dkms/jool-dkms/4.1.7/build/src/mod/common/nl/nl_common.c:18:1: error: 
control reaches end of non-void function [-Werror=return-type]
   18 | }
  | ^

[Test csae]

 $ sudo apt install jool-dkms

[Fix]

Backport the changes from Noble to properly support the new 6.8 kernel
ABI.

[Regression potential]

Jool is an is an IP/ICMP translator, with this applied we may experience
networking regressions with kernels >= 6.8.

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: jool-dkms 4.1.7-1ubuntu1
ProcVersionSignature: User Name 6.8.0-35.35.1~22.04.1-lowlatency 6.8.4
Uname: Linux 6.8.0-35-lowlatency x86_64
ApportVersion: 2.20.11-0ubuntu82.5
Architecture: amd64
CasperMD5CheckResult: unknown
CloudArchitecture: x86_64
CloudID: nocloud
CloudName: unknown
CloudPlatform: nocloud
CloudSubPlatform: config-disk (/dev/vdb)
Date: Fri Jul  5 08:49:14 2024
PackageArchitecture: all
ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=
 LANG=C.UTF-8
 SHELL=/bin/bash
SourcePackage: jool
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: jool (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: jool (Ubuntu Jammy)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug jammy uec-images

** Also affects: jool (Ubuntu Jammy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072313

Title:
  jool-dkms FTBS with the latest linux 6.8 hwe on jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jool/+bug/2072313/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071491] Re: iptables-netflow-dkms FTBS on jammy with the latest linux 6.8 hwe kernel

2024-07-05 Thread Andrea Righi
** Patch added: "jammy-iptables-netflow.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/iptables-netflow/+bug/2071491/+attachment/5794865/+files/jammy-iptables-netflow.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071491

Title:
  iptables-netflow-dkms FTBS on jammy with the latest linux 6.8 hwe
  kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/iptables-netflow/+bug/2071491/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071491] Re: iptables-netflow-dkms FTBS on jammy with the latest linux 6.8 hwe kernel

2024-07-05 Thread Andrea Righi
Test on 6.8 hwe kernel:

ipt_NETFLOW.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/


Test on 5.15 GA kernel:

ipt_NETFLOW.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071491

Title:
  iptables-netflow-dkms FTBS on jammy with the latest linux 6.8 hwe
  kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/iptables-netflow/+bug/2071491/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071334] Re: intel-ipu6-dkms FTBS with the latest linux 6.8 hwe kernel in jammy

2024-06-28 Thread Andrea Righi
** Also affects: ipu6-drivers (Ubuntu Jammy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071334

Title:
  intel-ipu6-dkms FTBS with the latest linux 6.8 hwe kernel in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipu6-drivers/+bug/2071334/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071486] Re: intel-vsc-dkms FTBS on jammy with the latest 6.8 hwe kernel

2024-06-28 Thread Andrea Righi
** Also affects: ivsc-driver (Ubuntu Jammy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071486

Title:
  intel-vsc-dkms FTBS on jammy with the latest 6.8 hwe kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ivsc-driver/+bug/2071486/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071491] [NEW] iptables-netflow-dkms FTBS on jammy with the latest linux 6.8 hwe kernel

2024-06-28 Thread Andrea Righi
Public bug reported:

[Impact]

/var/lib/dkms/ipt-netflow/2.6/build/ipt_NETFLOW.c:4090:17: error: implicit 
declaration of function ‘strlcpy’; did you mean ‘strscpy’? 
[-Werror=implicit-function-declaration]
 4090 | strlcpy(info.driver, dev->dev.parent->driver->name, 
sizeof(info.driver));
  | ^~~
  | strscpy
cc1: some warnings being treated as errors

[Test case]

 $ sudo apt install iptables-netflow-dkms

[Fix]

Backport from Noble the changes to properly support the new linux 6.8
kernel ABI.

[Regression potential]

We may experience networking-related regressions in systems that are
using the iptables-netflow-dkms module.

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: iptables-netflow-dkms 2.6-2ubuntu3
ProcVersionSignature: User Name 6.8.0-35.35.1~22.04.1-lowlatency 6.8.4
Uname: Linux 6.8.0-35-lowlatency x86_64
ApportVersion: 2.20.11-0ubuntu82.5
Architecture: amd64
CasperMD5CheckResult: unknown
CloudArchitecture: x86_64
CloudID: nocloud
CloudName: unknown
CloudPlatform: nocloud
CloudSubPlatform: config-disk (/dev/vdb)
Date: Fri Jun 28 16:54:31 2024
ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=
 LANG=C.UTF-8
 SHELL=/bin/bash
SourcePackage: iptables-netflow
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: iptables-netflow (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: iptables-netflow (Ubuntu Jammy)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug jammy uec-images

** Also affects: iptables-netflow (Ubuntu Jammy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071491

Title:
  iptables-netflow-dkms FTBS on jammy with the latest linux 6.8 hwe
  kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/iptables-netflow/+bug/2071491/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071486] Re: intel-vsc-dkms FTBS on jammy with the latest 6.8 hwe kernel

2024-06-28 Thread Andrea Righi
Test build with the new HWE kernel 6.8:

ljca.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

spi-ljca.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

gpio-ljca.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

i2c-ljca.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

mei-vsc.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

intel_vsc.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

mei_csi.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

mei_ace.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

mei_pse.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

mei_ace_debug.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

Test build with GA kernel 5.15:

ljca.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

spi-ljca.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

gpio-ljca.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

i2c-ljca.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

mei-vsc.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

intel_vsc.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

mei_csi.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

mei_ace.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

mei_pse.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

mei_ace_debug.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071486

Title:
  intel-vsc-dkms FTBS on jammy with the latest 6.8 hwe kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ivsc-driver/+bug/2071486/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071486] Re: intel-vsc-dkms FTBS on jammy with the latest 6.8 hwe kernel

2024-06-28 Thread Andrea Righi
** Patch added: "jammy-ivsc.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/ivsc-driver/+bug/2071486/+attachment/5793229/+files/jammy-ivsc.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071486

Title:
  intel-vsc-dkms FTBS on jammy with the latest 6.8 hwe kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ivsc-driver/+bug/2071486/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071486] [NEW] intel-vsc-dkms FTBS on jammy with the latest 6.8 hwe kernel

2024-06-28 Thread Andrea Righi
Public bug reported:

[Impact]

/var/lib/dkms/ivsc-driver/0~git202211241536.70d95269-0ubuntu0.22.04.1/build/drivers/mfd/ljca.c:219:17:
 error: implicit declaration of function ‘strlcpy’; did you mean ‘strscpy’? 
[-Werror=implicit-function-declaration]
  219 | strlcpy(ids[0].id, hids[i], sizeof(ids[0].id));
  | ^~~
  | strscpy

[Test case]

 $ sudo apt install intel-vsc-dkms

[Fix]

Backport the changes from noble to suppor the new linux 6.8 ABI.

[Regression potential]

We may experience regressions on Intel Alder Lake platforms with the
Intel Vision Sensing Controller (IVSC), especially with the new 6.8
kernel.

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: intel-vsc-dkms 0~git202211241536.70d95269-0ubuntu0.22.04.1
ProcVersionSignature: User Name 6.8.0-35.35.1~22.04.1-lowlatency 6.8.4
Uname: Linux 6.8.0-35-lowlatency x86_64
ApportVersion: 2.20.11-0ubuntu82.5
Architecture: amd64
CasperMD5CheckResult: unknown
CloudArchitecture: x86_64
CloudID: nocloud
CloudName: unknown
CloudPlatform: nocloud
CloudSubPlatform: config-disk (/dev/vdb)
Date: Fri Jun 28 15:58:27 2024
ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=
 LANG=C.UTF-8
 SHELL=/bin/bash
SourcePackage: ivsc-driver
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: ivsc-driver (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug jammy uec-images

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071486

Title:
  intel-vsc-dkms FTBS on jammy with the latest 6.8 hwe kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ivsc-driver/+bug/2071486/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071334] Re: intel-ipu6-dkms FTBS with the latest linux 6.8 hwe kernel in jammy

2024-06-28 Thread Andrea Righi
** Patch added: "jammy-ipu6.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/ipu6-drivers/+bug/2071334/+attachment/5793195/+files/jammy-ipu6.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071334

Title:
  intel-ipu6-dkms FTBS with the latest linux 6.8 hwe kernel in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipu6-drivers/+bug/2071334/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071334] Re: intel-ipu6-dkms FTBS with the latest linux 6.8 hwe kernel in jammy

2024-06-28 Thread Andrea Righi
Backporting the version from oracular allows to fix both the hwe 6.8
kernel and the GA 5.15 kernel.

Test build with 6.8:

intel-ipu6.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

intel-ipu6-isys.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

intel-ipu6-psys.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

hm11b1.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

ov01a1s.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

ov01a10.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

ov02c10.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

ov02e10.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

ov08a10.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

ov08x40.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

ov13858.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

ov8856.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

hm2170.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

hm2172.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

hi556.ko:
Running module version sanity check.
 - Original module
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/


Test build with GA 5.15:

intel-ipu6.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

intel-ipu6-isys.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

intel-ipu6-psys.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

hm11b1.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

ov01a1s.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

ov01a10.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

ov2740.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

gc5035.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

ov08a10.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

ov13858.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

ov8856.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

hm2170.ko:
Running module version sanity check.
 - Original module
   - No original module exists within 

[Bug 2071334] [NEW] intel-ipu6-dkms FTBS with the latest linux 6.8 hwe kernel in jammy

2024-06-27 Thread Andrea Righi
Public bug reported:

[Impact]

/var/lib/dkms/ipu6-drivers/0~git202211220708.278b7e3d-0ubuntu0.22.04.1/build/drivers/media/i2c/hm11b1.c:907:18:
 error: implicit declaration of function ‘v4l2_subdev_get_try_format’; did you 
mean ‘v4l2_subdev_get_fmt’? [-Werror=implicit-function-declaration]
  907 | *v4l2_subdev_get_try_format(sd, sd_state, fmt->pad) = 
fmt->format;
  |  ^~
  |  v4l2_subdev_get_fmt
/var/lib/dkms/ipu6-drivers/0~git202211220708.278b7e3d-0ubuntu0.22.04.1/build/drivers/media/i2c/hm11b1.c:907:17:
 error: invalid type argument of unary ‘*’ (have ‘int’)
  907 | *v4l2_subdev_get_try_format(sd, sd_state, fmt->pad) = 
fmt->format;
  | ^~~

[Test case]

 $ sudo apt install intel-ipu6-dkms

[Fix]

Backport from Noble the required changes to properly support the new 6.8
kernel ABI.

[Regression potential]

We may experience regressions in system that are using the ipu6 camera,
especially with the new 6.8 kernel.

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: intel-ipu6-dkms 0~git202211220708.278b7e3d-0ubuntu0.22.04.1
ProcVersionSignature: User Name 6.8.0-35.35.1~22.04.1-lowlatency 6.8.4
Uname: Linux 6.8.0-35-lowlatency x86_64
NonfreeKernelModules: wl
ApportVersion: 2.20.11-0ubuntu82.5
Architecture: amd64
CasperMD5CheckResult: unknown
CloudArchitecture: x86_64
CloudID: nocloud
CloudName: unknown
CloudPlatform: nocloud
CloudSubPlatform: config-disk (/dev/vdb)
Date: Thu Jun 27 09:28:42 2024
ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=
 LANG=C.UTF-8
 SHELL=/bin/bash
SourcePackage: ipu6-drivers
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: ipu6-drivers (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug jammy uec-images

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071334

Title:
  intel-ipu6-dkms FTBS with the latest linux 6.8 hwe kernel in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipu6-drivers/+bug/2071334/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070022] Re: evdi-dkms FTBS with the new hwe linux 6.8 in jammy

2024-06-27 Thread Andrea Righi
** Patch added: "jammy-evdi-dkms.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/evdi/+bug/2070022/+attachment/5792752/+files/jammy-evdi-dkms.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070022

Title:
  evdi-dkms FTBS with the new hwe linux 6.8 in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/evdi/+bug/2070022/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070022] Re: evdi-dkms FTBS with the new hwe linux 6.8 in jammy

2024-06-27 Thread Andrea Righi
Test build with GA kernel:

evdi.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

Test build with new hwe kernel:

evdi.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070022

Title:
  evdi-dkms FTBS with the new hwe linux 6.8 in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/evdi/+bug/2070022/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070022] [NEW] evdi-dkms FTBS with the new hwe linux 6.8 in jammy

2024-06-21 Thread Andrea Righi
Public bug reported:

[Impact]

/var/lib/dkms/evdi/1.12.0+dfsg/build/evdi_fb.c: In function ‘evdifb_create’:
/var/lib/dkms/evdi/1.12.0+dfsg/build/evdi_fb.c:421:23: error: ‘FBINFO_DEFAULT’ 
undeclared (first use in this function)
  421 | info->flags = FBINFO_DEFAULT;
  |   ^~
/var/lib/dkms/evdi/1.12.0+dfsg/build/evdi_fb.c:421:23: note: each undeclared 
identifier is reported only once for each function it appears in
make[2]: *** [scripts/Makefile.build:243: 
/var/lib/dkms/evdi/1.12.0+dfsg/build/evdi_fb.o] Error 1
make[2]: *** Waiting for unfinished jobs
In file included from /var/lib/dkms/evdi/1.12.0+dfsg/build/evdi_drm_drv.c:16:
/var/lib/dkms/evdi/1.12.0+dfsg/build/evdi_drm_drv.c:41:27: error: 
‘DRM_UNLOCKED’ undeclared here (not in a function); did you mean ‘VM_LOCKED’?
   41 |   DRM_UNLOCKED),
  |   ^~~~
./include/drm/drm_ioctl.h:155:26: note: in definition of macro 
‘DRM_IOCTL_DEF_DRV’
  155 | .flags = _flags,
\
  |  ^~
make[2]: *** [scripts/Makefile.build:243: 
/var/lib/dkms/evdi/1.12.0+dfsg/build/evdi_drm_drv.o] Error 1

[Test case]

 $ sudo apt instal evdi-dkms

[Fix]

Backport the changes from the evdi-dkms module in Noble to properly
support the new 6.8 kernel ABI.

[Regression potential]

The EVDI module can be used to control multiple screens. We may
experience regressions related to graphics / monitors in systems that
are using this module, especially with the new hwe 6.8 kernel.

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: evdi-dkms 1.12.0+dfsg-0ubuntu2~22.04.3
ProcVersionSignature: User Name 6.8.0-35.35.1~22.04.1-lowlatency 6.8.4
Uname: Linux 6.8.0-35-lowlatency x86_64
ApportVersion: 2.20.11-0ubuntu82.5
Architecture: amd64
CasperMD5CheckResult: unknown
CloudArchitecture: x86_64
CloudID: nocloud
CloudName: unknown
CloudPlatform: nocloud
CloudSubPlatform: config-disk (/dev/vdb)
Date: Fri Jun 21 08:50:20 2024
PackageArchitecture: all
ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=
 LANG=C.UTF-8
 SHELL=/bin/bash
SourcePackage: evdi
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: evdi (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: evdi (Ubuntu Jammy)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug jammy uec-images

** Also affects: evdi (Ubuntu Jammy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070022

Title:
  evdi-dkms FTBS with the new hwe linux 6.8 in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/evdi/+bug/2070022/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069997] Re: dm-writeboost-dkms FTBS with the new hwe 6.8 kernel in jammy

2024-06-21 Thread Andrea Righi
Test build with the new 6.8 hwe kernel:

dm-writeboost.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/


Test build with the GA kernel 5.15:

dm-writeboost.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069997

Title:
  dm-writeboost-dkms FTBS with the new hwe 6.8 kernel in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dm-writeboost/+bug/2069997/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069997] Re: dm-writeboost-dkms FTBS with the new hwe 6.8 kernel in jammy

2024-06-21 Thread Andrea Righi
** Patch added: "jammy-dm-writeboost.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/dm-writeboost/+bug/2069997/+attachment/5791082/+files/jammy-dm-writeboost.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069997

Title:
  dm-writeboost-dkms FTBS with the new hwe 6.8 kernel in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dm-writeboost/+bug/2069997/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069997] [NEW] dm-writeboost-dkms FTBS with the new hwe 6.8 kernel in jammy

2024-06-21 Thread Andrea Righi
Public bug reported:

[Impact]

/var/lib/dkms/dm-writeboost/2.2.13/build/dm-writeboost-target.c:56:19: error: 
too few arguments to function ‘dm_io’
   56 | io->err = dm_io(io->io_req, io->num_regions, io->regions, 
>err_bits);
  |   ^
In file included from 
/var/lib/dkms/dm-writeboost/2.2.13/build/dm-writeboost.h:37,
 from 
/var/lib/dkms/dm-writeboost/2.2.13/build/dm-writeboost-target.c:23:
./include/linux/dm-io.h:82:5: note: declared here
   82 | int dm_io(struct dm_io_request *io_req, unsigned int num_regions,
  | ^
/var/lib/dkms/dm-writeboost/2.2.13/build/dm-writeboost-target.c: In function 
‘wb_io_internal’:
/var/lib/dkms/dm-writeboost/2.2.13/build/dm-writeboost-target.c:82:23: error: 
too few arguments to function ‘dm_io’
   82 | err = dm_io(io_req, num_regions, regions, err_bits);
  |   ^
./include/linux/dm-io.h:82:5: note: declared here
   82 | int dm_io(struct dm_io_request *io_req, unsigned int num_regions,
  | ^
/var/lib/dkms/dm-writeboost/2.2.13/build/dm-writeboost-target.c: In function 
‘writeboost_status’:
/var/lib/dkms/dm-writeboost/2.2.13/build/dm-writeboost-target.c:1899:9: 
warning: enumeration value ‘STATUSTYPE_IMA’ not handled in switch [-Wswitch]
 1899 | switch (type) {
  | ^~
make[3]: *** [scripts/Makefile.build:243: 
/var/lib/dkms/dm-writeboost/2.2.13/build/dm-writeboost-target.o] Error 1

[Test case]

 $ sudo apt install dm-writeboost-dkms

[Fix]

Backport the changes from the dm-writeboost-dkms module in Noble to
properly support the new 6.8 kernel ABI.

[Regression potential]

System using the dm-writeboost-dkms may experience regressions
especially with the new kernel, in that case we may see regressions
affecting storage performance.

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: dm-writeboost-dkms 2.2.13-1ubuntu3
ProcVersionSignature: User Name 6.8.0-35.35.1~22.04.1-lowlatency 6.8.4
Uname: Linux 6.8.0-35-lowlatency x86_64
ApportVersion: 2.20.11-0ubuntu82.5
Architecture: amd64
CasperMD5CheckResult: unknown
CloudArchitecture: x86_64
CloudID: nocloud
CloudName: unknown
CloudPlatform: nocloud
CloudSubPlatform: config-disk (/dev/vdb)
Date: Fri Jun 21 07:15:29 2024
PackageArchitecture: all
ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=
 LANG=C.UTF-8
 SHELL=/bin/bash
SourcePackage: dm-writeboost
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: dm-writeboost (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: dm-writeboost (Ubuntu Jammy)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug jammy uec-images

** Also affects: dm-writeboost (Ubuntu Jammy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069997

Title:
  dm-writeboost-dkms FTBS with the new hwe 6.8 kernel in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dm-writeboost/+bug/2069997/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069710] Re: ddcci-dkms FTBS with linux hwe 6.8 on jammy

2024-06-21 Thread Andrea Righi
Test build with the new 6.8 HWE kernel:

ddcci.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

ddcci-backlight.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

Test build with GA kernel 5.15:

ddcci.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

ddcci-backlight.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069710

Title:
  ddcci-dkms FTBS with linux hwe 6.8 on jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ddcci-driver-linux/+bug/2069710/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069710] Re: ddcci-dkms FTBS with linux hwe 6.8 on jammy

2024-06-21 Thread Andrea Righi
** Patch added: "jammy-ddcci-dkms.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/ddcci-driver-linux/+bug/2069710/+attachment/5791058/+files/jammy-ddcci-dkms.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069710

Title:
  ddcci-dkms FTBS with linux hwe 6.8 on jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ddcci-driver-linux/+bug/2069710/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069710] [NEW] ddcci-dkms FTBS with linux hwe 6.8 on jammy

2024-06-18 Thread Andrea Righi
Public bug reported:

[Impact]

/var/lib/dkms/ddcci/0.4.1/build/ddcci/ddcci.c:1677:9: error: implicit 
declaration of function ‘strlcpy’; did you mean ‘strscpy’? 
[-Werror=implicit-function-declaration]
 1677 | strlcpy(info->type, (outer_addr == DDCCI_DEFAULT_DEVICE_ADDR) ? 
"ddcci" : "ddcci-dependent", I2C_NAME_SIZE);
  | ^~~
  | strscpy
/var/lib/dkms/ddcci/0.4.1/build/ddcci/ddcci.c: At top level:
/var/lib/dkms/ddcci/0.4.1/build/ddcci/ddcci.c:1835:27: error: ‘I2C_CLASS_DDC’ 
undeclared here (not in a function); did you mean ‘I2C_CLASS_SPD’?
 1835 | .class  = I2C_CLASS_DDC,
  |   ^
  |   I2C_CLASS_SPD
cc1: some warnings being treated as errors

[Test case]

 $ sudo apt install ddcci-dkms

[Fix]

Backport from Noble the required changes to properly support the new 6.8
kernel ABI.

[Regression potential]

DDC/CI is a driver for compatible monitors and their integration into
the backlight system class. We may experience graphical regressions in
systems that are using this particular driver.

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: ddcci-dkms 0.4.1-3ubuntu3
ProcVersionSignature: User Name 6.8.0-35.35.1~22.04.1-lowlatency 6.8.4
Uname: Linux 6.8.0-35-lowlatency x86_64
ApportVersion: 2.20.11-0ubuntu82.5
Architecture: amd64
CasperMD5CheckResult: unknown
CloudArchitecture: x86_64
CloudID: nocloud
CloudName: unknown
CloudPlatform: nocloud
CloudSubPlatform: config-disk (/dev/vdb)
Date: Tue Jun 18 09:22:45 2024
PackageArchitecture: all
ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=
 LANG=C.UTF-8
 SHELL=/bin/bash
SourcePackage: ddcci-driver-linux
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: ddcci-driver-linux (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: ddcci-driver-linux (Ubuntu Jammy)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug jammy uec-images

** Also affects: ddcci-driver-linux (Ubuntu Jammy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069710

Title:
  ddcci-dkms FTBS with linux hwe 6.8 on jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ddcci-driver-linux/+bug/2069710/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069687] Re: dahdi-dkms FTBS with the new 6.8 hwe kernel in jammy

2024-06-18 Thread Andrea Righi
Test build with the new 6.8 hwe kernel:

Building initial module for 6.8.0-35-lowlatency
...
EFI variables are not supported on this system
/sys/firmware/efi/efivars not found, aborting.
Done.

dahdi_dummy.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

dahdi_dynamic_eth.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

dahdi_dynamic.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

dahdi_dynamic_loc.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

dahdi_echocan_jpah.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

dahdi_echocan_kb1.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

dahdi_echocan_mg2.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

dahdi_echocan_sec2.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

dahdi_echocan_sec.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

dahdi.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

dahdi_transcode.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

pciradio.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

tor2.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

wcb4xxp.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

wcfxo.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

wct1xxp.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

wct4xxp.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

wctc4xxp.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

wctdm.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

wctdm24xxp.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

wcte11xp.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

wcte12xp.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

xpd_fxo.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

xpd_fxs.ko:
Running module version sanity check.
 - Original module
   - No original module 

[Bug 2069687] Re: dahdi-dkms FTBS with the new 6.8 hwe kernel in jammy

2024-06-18 Thread Andrea Righi
** Patch added: "jammy-dahdi-dkms.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/dahdi-linux/+bug/2069687/+attachment/5790455/+files/jammy-dahdi-dkms.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069687

Title:
  dahdi-dkms FTBS with the new 6.8 hwe kernel in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dahdi-linux/+bug/2069687/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069687] [NEW] dahdi-dkms FTBS with the new 6.8 hwe kernel in jammy

2024-06-18 Thread Andrea Righi
Public bug reported:

[Impact]

/var/lib/dkms/dahdi/2.11.1~dfsg-1ubuntu12~22.04.3/build/drivers/dahdi/xpp/card_global.c:301:9:
 error: implicit declaration of function ‘strlcpy’; did you mean ‘strscpy’? 
[-Werror=implicit-function-declaration]
  301 | strlcpy(buf, cmdline, MAX_PROC_WRITE);  /* Save a copy */
  | ^~~
  | strscpy

[Test case]

 $ sudo apt install dahdi-dkms

[Fix]

Backport the patch from Noble to properly support the new 6.8 kernel
ABI.

[Regression potential]

DAHDI is an interface for telephony devices, we may experience
regressions in systems relying on this interface/module, especially with
the new 6.8 kernel.

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: dahdi-dkms 1:2.11.1~dfsg-1ubuntu12~22.04.3
ProcVersionSignature: User Name 6.8.0-35.35.1~22.04.1-lowlatency 6.8.4
Uname: Linux 6.8.0-35-lowlatency x86_64
NonfreeKernelModules: wl
ApportVersion: 2.20.11-0ubuntu82.5
Architecture: amd64
CasperMD5CheckResult: unknown
CloudArchitecture: x86_64
CloudID: nocloud
CloudName: unknown
CloudPlatform: nocloud
CloudSubPlatform: config-disk (/dev/vdb)
Date: Tue Jun 18 07:16:01 2024
PackageArchitecture: all
ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=
 LANG=C.UTF-8
 SHELL=/bin/bash
SourcePackage: dahdi-linux
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: dahdi-linux (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: dahdi-linux (Ubuntu Jammy)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug jammy uec-images

** Also affects: dahdi-linux (Ubuntu Jammy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069687

Title:
  dahdi-dkms FTBS with the new 6.8 hwe kernel in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dahdi-linux/+bug/2069687/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069582] Re: backport-iwlwifi-dkms FTBS with linux 6.8 in jammy

2024-06-18 Thread Andrea Righi
Test build with GA kernel 5.15:

Building initial module for 5.15.0-115-generic
...
iwlwifi-compat.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

iwlwifi.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

iwlxvt.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

iwlmvm.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

mac80211.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

cfg80211.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/


Test build with new 6.8 hwe kernel:

Building initial module for 6.8.0-35-lowlatency
...
iwlwifi-compat.ko:
Running module version sanity check.

Module has been obsoleted due to being included
in kernel 6.7.0.  We will avoid installing
for future kernels above 6.7.0.
You may override by specifying --force.

iwlwifi.ko:
Running module version sanity check.

Module has been obsoleted due to being included
in kernel 6.7.0.  We will avoid installing
for future kernels above 6.7.0.
You may override by specifying --force.

iwlxvt.ko:
Running module version sanity check.

Module has been obsoleted due to being included
in kernel 6.7.0.  We will avoid installing
for future kernels above 6.7.0.
You may override by specifying --force.

iwlmvm.ko:
Running module version sanity check.

Module has been obsoleted due to being included
in kernel 6.7.0.  We will avoid installing
for future kernels above 6.7.0.
You may override by specifying --force.

mac80211.ko:
Running module version sanity check.

Module has been obsoleted due to being included
in kernel 6.7.0.  We will avoid installing
for future kernels above 6.7.0.
You may override by specifying --force.

cfg80211.ko:
Running module version sanity check.

Module has been obsoleted due to being included
in kernel 6.7.0.  We will avoid installing
for future kernels above 6.7.0.
You may override by specifying --force.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069582

Title:
  backport-iwlwifi-dkms FTBS with linux 6.8 in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/backport-iwlwifi-dkms/+bug/2069582/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069582] Re: backport-iwlwifi-dkms FTBS with linux 6.8 in jammy

2024-06-18 Thread Andrea Righi
** Patch added: "jammy-backport-iwlwifi.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/backport-iwlwifi-dkms/+bug/2069582/+attachment/5790444/+files/jammy-backport-iwlwifi.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069582

Title:
  backport-iwlwifi-dkms FTBS with linux 6.8 in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/backport-iwlwifi-dkms/+bug/2069582/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069582] [NEW] backport-iwlwifi-dkms FTBS with linux 6.8 in jammy

2024-06-17 Thread Andrea Righi
Public bug reported:

[Impact]

In file included from 
/var/lib/dkms/backport-iwlwifi/9858/build/net/wireless/core.c:25:
/var/lib/dkms/backport-iwlwifi/9858/build/backport-include/net/genetlink.h: In 
function ‘__bp_genl_info_userhdr_set’:
/var/lib/dkms/backport-iwlwifi/9858/build/backport-include/net/genetlink.h:9:13:
 error: ‘struct genl_info’ has no member named ‘userhdr’
9 | info->userhdr = userhdr;
  | ^~
/var/lib/dkms/backport-iwlwifi/9858/build/backport-include/net/genetlink.h: In 
function ‘__bp_genl_info_userhdr’:
/var/lib/dkms/backport-iwlwifi/9858/build/backport-include/net/genetlink.h:14:20:
 error: ‘struct genl_info’ has no member named ‘userhdr’
   14 | return info->userhdr;
  |^~

[Test case]

$ sudo apt install backport-iwlwifi-dkms

[Fix]

Backport the patches (or the whole module) from noble to properly
support the new 6.8 kernel ABI.

[Regression potential]

We just need to support the build of this module, it is actually never
used, so there is basically no regression potential (unless we break
really old kernels, but for this it is sufficient to test build the
module with the new 6.8 kernel and the GA kernel).

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: backport-iwlwifi-dkms 9858-0ubuntu3.4
ProcVersionSignature: User Name 5.15.0-115.125-generic 5.15.158
Uname: Linux 5.15.0-115-generic x86_64
ApportVersion: 2.20.11-0ubuntu82.5
Architecture: amd64
CasperMD5CheckResult: unknown
CloudArchitecture: x86_64
CloudID: nocloud
CloudName: unknown
CloudPlatform: nocloud
CloudSubPlatform: config-disk (/dev/vdb)
Date: Mon Jun 17 07:38:27 2024
PackageArchitecture: all
ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=
 LANG=C.UTF-8
 SHELL=/bin/bash
RebootRequiredPkgs: Error: path contained symlinks.
SourcePackage: backport-iwlwifi-dkms
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: backport-iwlwifi-dkms (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: backport-iwlwifi-dkms (Ubuntu Jammy)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug jammy uec-images

** Also affects: backport-iwlwifi-dkms (Ubuntu Jammy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069582

Title:
  backport-iwlwifi-dkms FTBS with linux 6.8 in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/backport-iwlwifi-dkms/+bug/2069582/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069573] Re: apfs-dkms FTBS with the kernel 6.8 in jammy

2024-06-17 Thread Andrea Righi
** Patch added: "jammy-backport-apfs.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/linux-apfs-rw/+bug/2069573/+attachment/5790208/+files/jammy-backport-apfs.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069573

Title:
  apfs-dkms FTBS with the kernel 6.8 in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-apfs-rw/+bug/2069573/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069573] Re: apfs-dkms FTBS with the kernel 6.8 in jammy

2024-06-17 Thread Andrea Righi
Test plan with the new apfs dkms:
 - build test with hwe kernel 6.8 (lowlatency):

apfs.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/6.8.0-35-lowlatency/updates/dkms/

 - build test with GA kernel 5.15:

apfs.ko:
Running module version sanity check.
 - Original module
   - No original module exists within this kernel
 - Installation
   - Installing to /lib/modules/5.15.0-115-generic/updates/dkms/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069573

Title:
  apfs-dkms FTBS with the kernel 6.8 in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-apfs-rw/+bug/2069573/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069573] Re: apfs-dkms FTBS with the kernel 6.8 in jammy

2024-06-17 Thread Andrea Righi
** Description changed:

  [Impact]
  
  
/var/lib/dkms/linux-apfs-rw/0+git20220214+ds-2ubuntu2~22.04.3/build/apfs.h:978:14:
 error: implicit declaration of function ‘__getblk_gfp’; did you mean 
‘sb_getblk_gfp’? [-Werror=implicit-function-declaration]
-   978 | bh = __getblk_gfp(APFS_NXI(sb)->nx_bdev, block, 
sb->s_blocksize, __GFP_MOVABLE);
-   |  ^~~~
-   |  sb_getblk_gfp
+   978 | bh = __getblk_gfp(APFS_NXI(sb)->nx_bdev, block, 
sb->s_blocksize, __GFP_MOVABLE);
+   |  ^~~~
+   |  sb_getblk_gfp
  
  [Test case]
  
-  $ sudo apt install apfs-dkms
+  $ sudo apt install apfs-dkms
  
  [Fix]
  
- Backport from noble the patch to properly support the new 6.8 kernel
+ Backport the package from noble to properly support the new 6.8 kernel
  ABI.
  
  [Regression potential]
  
  We may experience regressions in systems that are using the Apple
- filesystem (especially in terms of allocations, since the new required
- API is related to memory).
+ filesystem (especially in terms of filesystem timestamps and memory
+ allocations, since the new required kernel ABIs are mostly related to
+ these properties).
  
  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: apfs-dkms 0+git20220214+ds-2ubuntu2~22.04.3
  ProcVersionSignature: User Name 6.8.0-35.35.1~22.04.1-lowlatency 6.8.4
  Uname: Linux 6.8.0-35-lowlatency x86_64
  ApportVersion: 2.20.11-0ubuntu82.5
  Architecture: amd64
  CasperMD5CheckResult: unknown
  CloudArchitecture: x86_64
  CloudID: nocloud
  CloudName: unknown
  CloudPlatform: nocloud
  CloudSubPlatform: config-disk (/dev/vdb)
  Date: Mon Jun 17 06:10:46 2024
  PackageArchitecture: all
  ProcEnviron:
-  TERM=xterm-256color
-  PATH=(custom, no user)
-  XDG_RUNTIME_DIR=
-  LANG=C.UTF-8
-  SHELL=/bin/bash
+  TERM=xterm-256color
+  PATH=(custom, no user)
+  XDG_RUNTIME_DIR=
+  LANG=C.UTF-8
+  SHELL=/bin/bash
  SourcePackage: linux-apfs-rw
  UpgradeStatus: No upgrade log present (probably fresh install)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069573

Title:
  apfs-dkms FTBS with the kernel 6.8 in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-apfs-rw/+bug/2069573/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069573] [NEW] apfs-dkms FTBS with the kernel 6.8 in jammy

2024-06-17 Thread Andrea Righi
Public bug reported:

[Impact]

/var/lib/dkms/linux-apfs-rw/0+git20220214+ds-2ubuntu2~22.04.3/build/apfs.h:978:14:
 error: implicit declaration of function ‘__getblk_gfp’; did you mean 
‘sb_getblk_gfp’? [-Werror=implicit-function-declaration]
  978 | bh = __getblk_gfp(APFS_NXI(sb)->nx_bdev, block, 
sb->s_blocksize, __GFP_MOVABLE);
  |  ^~~~
  |  sb_getblk_gfp

[Test case]

 $ sudo apt install apfs-dkms

[Fix]

Backport from noble the patch to properly support the new 6.8 kernel
ABI.

[Regression potential]

We may experience regressions in systems that are using the Apple
filesystem (especially in terms of allocations, since the new required
API is related to memory).

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: apfs-dkms 0+git20220214+ds-2ubuntu2~22.04.3
ProcVersionSignature: User Name 6.8.0-35.35.1~22.04.1-lowlatency 6.8.4
Uname: Linux 6.8.0-35-lowlatency x86_64
ApportVersion: 2.20.11-0ubuntu82.5
Architecture: amd64
CasperMD5CheckResult: unknown
CloudArchitecture: x86_64
CloudID: nocloud
CloudName: unknown
CloudPlatform: nocloud
CloudSubPlatform: config-disk (/dev/vdb)
Date: Mon Jun 17 06:10:46 2024
PackageArchitecture: all
ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=
 LANG=C.UTF-8
 SHELL=/bin/bash
SourcePackage: linux-apfs-rw
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: linux-apfs-rw (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-apfs-rw (Ubuntu Jammy)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug jammy package-from-proposed uec-images

** Also affects: linux-apfs-rw (Ubuntu Jammy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069573

Title:
  apfs-dkms FTBS with the kernel 6.8 in jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-apfs-rw/+bug/2069573/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2051672] Re: Backport iproute2 6.8.0 to noble

2024-05-17 Thread Andrea Righi
I have an update on this. I've talked with the LXD team during the
engineering sprint in Madrid and at the moment we can't break ubuntu-fan
or we could potentially break some running LXD installations.

I asked the LXD team to start working as soon as possible to remove the
support for this feature, that at this point is going happen in
Oracular.

Therefore, good job with the iproute2 sync in Oracular @dannf.
Unfortunately in Noble we still need to wait for now and support ubuntu-
fan... In the meantime I've sent an updated patch set to re-enable
ubuntu-fan in the kernel (with a small redesign to prevent potential
incompatibilities with the upstream vxlan_policy rules):

https://lists.ubuntu.com/archives/kernel-team/2024-May/150684.html

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051672

Title:
  Backport iproute2 6.8.0 to noble

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/iproute2/+bug/2051672/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056461] Re: autopkgtest-virt-qemu on noble images sometimes hangs doing copydown

2024-05-12 Thread Andrea Righi
** Description changed:

+ [Impact]
+ 
+ It seems that kernel 6.8 introduced a regression in the 9pfs related to
+ caching and netfslib, that can cause some user-space apps to read
+ content from files that is not up-to-date (when they are used in a
+ producer/consumer fashion).
+ 
+ It seems that the offending commit is this one:
+ 
+  80105ed2fd27 ("9p: Use netfslib read/write_iter")
+ 
+ Reverting the commit seems to fix the problem. However the actual bug
+ might be in netfslib or how netfslib is used in the 9p context.
+ 
+ The regression has been reported upstream and we are still investigating
+ (https://lore.kernel.org/lkml/Zj0ErxVBE3DYT2Ea@gpd/).
+ 
+ In the meantime it probably makes sense to temporarily revert the commit
+ as a SAUCE patch. Then we will drop the SAUCE patch once we'll have a
+ proper fix upstream.
+ 
+ [Test case]
+ 
+ The following test should complete correctly without any timeout:
+ 
+   pull-lp-source -d hello
+   autopkgtest-buildvm-ubuntu-cloud -r noble
+   autopkgtest -U hello*.dsc -- qemu ./autopkgtest-noble-amd64.img
+ 
+ 
+ [Fix]
+ 
+ Revert the following commit (until we have a proper fix upstream):
+ 
+  80105ed2fd27 ("9p: Use netfslib read/write_iter")
+ 
+ [Regression potential]
+ 
+ We may experience other regressions related to 9pfs with this change,
+ however it's quite unlikely to happen since we are reverting a commit,
+ restoring the previous behavior.
+ 
+ [Original bug report]
+ 
  autopkgtest-virt-qemu sometimes hangs when running tests on noble
  images. Originally reported by schopin, who also provided a reproducer:
  
-   pull-lp-source -d hello
-   autopkgtest-buildvm-ubuntu-cloud -r noble
-   autopkgtest -U hello*.dsc -- qemu ./autopkgtest-noble-amd64.img
+   pull-lp-source -d hello
+   autopkgtest-buildvm-ubuntu-cloud -r noble
+   autopkgtest -U hello*.dsc -- qemu ./autopkgtest-noble-amd64.img
  
  I've been able to reproduce it with debugging enabled:
  
-   autopkgtest -ddd -U hello_2.10-3.dsc -- qemu --debug --show-boot
+   autopkgtest -ddd -U hello_2.10-3.dsc -- qemu --debug --show-boot
  /path/to/image
  
  It can get stuck during different stages, but AFAICT always during
  "copydown" operations, log excerpts follow. It may be a coincidence, but
  this started happening around the time linux-image-6.8.0-11-generic
  (6.8.0-11.11) migrated to noble. The testbeds I used booted 6.6 but then
  rebooted into that 6.8 kernel after being upgraded by autopkgtest.
  
  -- logs --
  
  Removing autopkgtest-satdep (0) ...
  [...]
  autopkgtest-virt-qemu: DBG: executing copydown 
/tmp/autopkgtest.output.g8v75e8g/tests-tree/ /t/
  autopkgtest-virt-qemu: DBG: ['cmdls', "(['tar', '--directory', 
'/tmp/autopkgtest.output.g8v75e]
  autopkgtest-virt-qemu: DBG: ['srcstdin', "<_io.BufferedReader 
name='/dev/null'>", 'deststdout']
  autopkgtest-virt-qemu: DBG:  +< tar --directory 
/tmp/autopkgtest.output.g8v75e8g/tests-tree/ --
  autopkgtest-virt-qemu: DBG:  +> /tmp/autopkgtest-qemu.ztmr6f5k/runcmd sh -ec 
if ! test -d /tmp-
  autopkgtest-virt-qemu: DBG:  +>?
  
  -- or --
  
  autopkgtest: DBG: sending command to testbed: copydown 
/tmp/autopkgtest.output.c9utq3bx/tests-tree/ 
/tmp/autopkgtest.H8NDfW/build.DLR/src/
  autopkgtest-virt-qemu: DBG: executing copydown 
/tmp/autopkgtest.output.c9utq3bx/tests-tree/ 
/tmp/autopkgtest.H8NDfW/build.DLR/src/
  autopkgtest-virt-qemu: DBG: ['cmdls', "(['tar', '--directory', 
'/tmp/autopkgtest.output.c9utq3bx/tests-tree/', '--warning=none', '-c', '.', 
'-f', '-'], ['/tmp/autopkgtest-qemu.qtkcgg5l/runcm]
  autopkgtest-virt-qemu: DBG: ['srcstdin', "<_io.BufferedReader 
name='/dev/null'>", 'deststdout', "<_io.BufferedReader name='/dev/null'>", 
'devnull_read', <_io.BufferedReader name='/dev/null'>]
  autopkgtest-virt-qemu: DBG:  +< tar --directory 
/tmp/autopkgtest.output.c9utq3bx/tests-tree/ --warning=none -c . -f -
  autopkgtest-virt-qemu: DBG:  +> /tmp/autopkgtest-qemu.qtkcgg5l/runcmd sh -ec 
if ! test -d /tmp/autopkgtest.H8NDfW/build.DLR/src/; then mkdir -- 
/tmp/autopkgtest.H8NDfW/build.DLR/src/; fi; cd-
  autopkgtest-virt-qemu: DBG:  +>?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056461

Title:
  autopkgtest-virt-qemu on noble images sometimes hangs doing copydown

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/autopkgtest/+bug/2056461/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056461] Re: autopkgtest-virt-qemu on noble images sometimes hangs doing copydown

2024-05-09 Thread Andrea Righi
I've uploaded a test kernel here:

https://people.canonical.com/~arighi/lp2056461/amd64/

With this one I can't reproduce the problem. It'd be great if someone
else could test it as well, to confirm that it's actually fixing the
problem.

Note: this kernel is a 6.8.0-32.32 with this commit reverted:

 commit 80105ed2fd27 ("9p: Use netfslib read/write_iter")

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056461

Title:
  autopkgtest-virt-qemu on noble images sometimes hangs doing copydown

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/autopkgtest/+bug/2056461/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056461] Re: autopkgtest-virt-qemu on noble images sometimes hangs doing copydown

2024-05-09 Thread Andrea Righi
I've done some bisecting and it looks like the culprit is this commit:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=80105ed2fd2715fb09a8fdb0655a8bdc86c120db

I'll prepare a test kernel with this one reverted, then if it's
confirmed, we can figure out a proper fix.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056461

Title:
  autopkgtest-virt-qemu on noble images sometimes hangs doing copydown

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/autopkgtest/+bug/2056461/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065005] [NEW] ThinkPad P16s fails to resume from suspend sometimes [6.8]

2024-05-07 Thread Andrea Ieri
Public bug reported:

On a ThinkPad P16s running Noble, resuming from suspend fails about 10%
of the time. This usually leads to a reboot, and more rarely to a hang
that requires forcing a power off.

I don't recall this being the case with kernel 6.5 in Mantic.

How to reproduce:
* suspend the laptop (systemctl suspend, via the Gnome GUI, closing the lid, 
method doesn't matter)
* resume
* repeat about 10 times

A quick look at kernel logs doesn't show any kernel panic so perhaps the
issue happens too early in the resume process for dmesg to be updated.

This happens on both (at least) 6.8.0-31 and 6.8.0-28.

ProblemType: Bug
DistroRelease: Ubuntu 24.04
Package: linux-image-6.8.0-31-generic 6.8.0-31.31
ProcVersionSignature: Ubuntu 6.8.0-31.31-generic 6.8.1
Uname: Linux 6.8.0-31-generic x86_64
NonfreeKernelModules: zfs
ApportVersion: 2.28.1-0ubuntu2
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/seq:aieri  4787 F pipewire
 /dev/snd/controlC0:  aieri  4793 F wireplumber
 /dev/snd/controlC1:  aieri  4793 F wireplumber
CasperMD5CheckResult: unknown
CurrentDesktop: ubuntu:GNOME
Date: Tue May  7 08:54:34 2024
MachineType: LENOVO 21K9001NUS
ProcFB: 0 amdgpudrmfb
ProcKernelCmdLine: root=zfs:zroot/ROOT/ubuntu quiet loglevel=4 
rtc_cmos.use_acpi_alarm=1 spl.spl_hostid=0x4605c990
RelatedPackageVersions:
 linux-restricted-modules-6.8.0-31-generic N/A
 linux-backports-modules-6.8.0-31-generic  N/A
 linux-firmware20240318.git3b128b60-0ubuntu2
SourcePackage: linux
UpgradeStatus: Upgraded to noble on 2024-04-14 (22 days ago)
dmi.bios.date: 02/20/2024
dmi.bios.release: 1.35
dmi.bios.vendor: LENOVO
dmi.bios.version: R2FET55W (1.35 )
dmi.board.asset.tag: Not Available
dmi.board.name: 21K9001NUS
dmi.board.vendor: LENOVO
dmi.board.version: SDK0T76530 WIN
dmi.chassis.asset.tag: No Asset Tag
dmi.chassis.type: 10
dmi.chassis.vendor: LENOVO
dmi.chassis.version: None
dmi.ec.firmware.release: 1.16
dmi.modalias: 
dmi:bvnLENOVO:bvrR2FET55W(1.35):bd02/20/2024:br1.35:efr1.16:svnLENOVO:pn21K9001NUS:pvrThinkPadP16sGen2:rvnLENOVO:rn21K9001NUS:rvrSDK0T76530WIN:cvnLENOVO:ct10:cvrNone:skuLENOVO_MT_21K9_BU_Think_FM_ThinkPadP16sGen2:
dmi.product.family: ThinkPad P16s Gen 2
dmi.product.name: 21K9001NUS
dmi.product.sku: LENOVO_MT_21K9_BU_Think_FM_ThinkPad P16s Gen 2
dmi.product.version: ThinkPad P16s Gen 2
dmi.sys.vendor: LENOVO

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug noble wayland-session

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065005

Title:
  ThinkPad P16s fails to resume from suspend sometimes [6.8]

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2065005/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058830] Re: vp9 hw decode broken on modern AMD apus, needs amdgpu update

2024-05-06 Thread Andrea Agnolin
Sadly I've updated this morning to Ubuntu 24.04 noble.

I have a snapshot taken before upgrading that I can eventually clone.
But I've never tried booting from another dataset so I'm not 100%
confident.

I can also try using this proposed firmware in noble.

Or maybe we can wait for someone that still run on jammy to do the
testing.

Let me know what you think. I think I might have some free time this
week.

By the way I've been running since the end of March until yesterday with
the firmware from upstream downloaded iirc on the 19/03/24. Those solved
the issue for sure.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058830

Title:
  vp9 hw decode broken on modern AMD apus, needs amdgpu update

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux-firmware/+bug/2058830/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058830] Re: vp9 hw decode broken on modern AMD apus, needs amdgpu update

2024-05-03 Thread Andrea Agnolin
For anyone still on 22.04 and 23.10 beware: the recent apt upgrade of
the linux-firmware package does not contains any update to the amdgpu
vcn firmware from upstream. So, if you updated, you have to re-copy the
ones from upstream (see workaround section above).

In my case the dmese reported VCN version reverted to:
`[2.889013] [drm] Found VCN firmware Version ENC: 1.19 DEC: 7 VEP: 0 
Revision: 0 `

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058830

Title:
  vp9 hw decode broken on modern AMD apus, needs amdgpu update

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux-firmware/+bug/2058830/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064508] Re: re-enable Ubuntu FAN in the Noble kernel

2024-05-01 Thread Andrea Righi
Test result with the patch set applied (ubuntu_fan_smoke_test):

11:48:05 INFO | Writing results to /home/ubuntu/autotest/client/results/default
11:48:05 INFO | START   timestamp=1714564085localtime=May 
01 11:48:05
11:48:05 INFO | START   ubuntu_fan_smoke_test.setup 
ubuntu_fan_smoke_test.setup timeout=1200timestamp=1714564085
localtime=May 01 11:48:05
11:48:07 INFO | GOODubuntu_fan_smoke_test.setup 
ubuntu_fan_smoke_test.setup timestamp=1714564087localtime=May 01 
11:48:07  completed successfully
11:48:07 INFO | END GOODubuntu_fan_smoke_test.setup 
ubuntu_fan_smoke_test.setup timestamp=1714564087localtime=May 01 
11:48:07
11:48:07 INFO | START   ubuntu_fan_smoke_test.fan-smoke-test
ubuntu_fan_smoke_test.fan-smoke-testtimeout=1800timestamp=1714564087
localtime=May 01 11:48:07
11:51:46 INFO | Testing Fan Networking (pre-0.13.0 API)
11:51:46 INFO | docker pull --platform linux/amd64 ubuntu: PASSED
11:51:46 INFO | enable disable fan test: PASSED
11:51:46 INFO | fanctl show test: PASSED
11:51:46 INFO | fanctl check bridge config test: PASSED
11:51:46 INFO | fanatic docker test(--dns=192.168.122.1): PASSED
11:51:47 INFO | GOODubuntu_fan_smoke_test.fan-smoke-test
ubuntu_fan_smoke_test.fan-smoke-testtimestamp=1714564307localtime=May 
01 11:51:47  completed successfully
11:51:47 INFO | END GOODubuntu_fan_smoke_test.fan-smoke-test
ubuntu_fan_smoke_test.fan-smoke-testtimestamp=1714564307localtime=May 
01 11:51:47
11:51:47 INFO | END GOODtimestamp=1714564307
localtime=May 01 11:51:47
11:51:47 INFO | Report successfully generated at 
/home/ubuntu/autotest/client/results/default/job_report.html

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064508

Title:
  re-enable Ubuntu FAN in the Noble kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2064508/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064508] Re: re-enable Ubuntu FAN in the Noble kernel

2024-05-01 Thread Andrea Righi
Patch set to re-enable Ubuntu FAN in the 6.8 Noble kernel:
https://lists.ubuntu.com/archives/kernel-team/2024-May/150684.html

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064508

Title:
  re-enable Ubuntu FAN in the Noble kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2064508/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064508] [NEW] re-enable Ubuntu FAN in the Noble kernel

2024-05-01 Thread Andrea Righi
Public bug reported:

[Impact]

In LP: #2063298, we have opted to deprecate Ubuntu FAN support because
of the maintenance overhead and the possibility of regressions /
conflicts with the new networking eBPF APIs in kernels >= 6.8.

However, we cannot disable this feature in HWE/backport kernels, so it
seems safer to adjust the Ubuntu FAN kernel patch set to ensure proper
co-existence with the updated vxlan policy requirements in newer 6.8
kernels.

The re-introduction of Ubuntu FAN should be considered as a temporary
measure, aimed at facilitating a smooth transition during its
deprecation without disrupting existing users (specifically Juju), and
enabling the backporting of 6.8 kernels to older releases.

The main plan is still to deprecate Ubuntu FAN in newer releases.

[Test case]

Rely on the specific Ubuntu FAN regression test to validate the proper
kernel support of this feature:

https://git.launchpad.net/~canonical-kernel-team/+git/autotest-client-
tests/tree/ubuntu_fan_smoke_test?h=autotest3

[Fix]

Re-apply the Ubuntu FAN patch set to the latest Noble kernel 6.8 and
integrate the IFLA_VXLAN_FAN_MAP attribute type in vxlan_policy to
satisfy the strict length validation check.

[Regression potential]

We may experience regressions with eBPF vxlan capabilities and
potentially specific use cases of the Ubuntu FAN technology (Juju
installations).

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu Noble)
 Importance: Undecided
 Status: New

** Also affects: linux (Ubuntu Noble)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064508

Title:
  re-enable Ubuntu FAN in the Noble kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2064508/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2051672] Re: Backport iproute2 6.8.0 to noble

2024-04-30 Thread Andrea Righi
Thanks @dannf for updating the bug! The SRU description looks good to me
and everything seems reasonable, same with the plan.

I'll keep monitoring this tracker and we'll proceed once oracular will
be open.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051672

Title:
  Backport iproute2 6.8.0 to noble

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/iproute2/+bug/2051672/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2045503] Re: provide a sched-ext enabled kernel for the 24.10 release

2024-04-30 Thread Andrea Righi
** Summary changed:

- apply sched-ext patch set to linux-unstable
+ provide a sched-ext enabled kernel for the 24.10 release

** Also affects: linux (Ubuntu Oracular)
   Importance: Undecided
   Status: New

** No longer affects: linux (Ubuntu Noble)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2045503

Title:
  provide a sched-ext enabled kernel for the 24.10 release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2045503/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2051672] Re: [FFe] Merge iproute2 with the latest Debian version: 6.8.0-1 from testing/unstable (main)

2024-04-29 Thread Andrea Righi
Hello, any progress on this? Now that ubuntu-fan is officially
deprecated in Noble can we simply sync iproute2 with Debian? Is there
any pending activity / requirement that are preventing this? Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051672

Title:
  [FFe] Merge iproute2 with the latest Debian version: 6.8.0-1 from
  testing/unstable (main)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/iproute2/+bug/2051672/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2063965] Re: package sgml-base 1.31 failed to install/upgrade: Local modifications to /etc/pam.d/common-* triggered dpkg error

2024-04-27 Thread Andrea Agnolin
** Changed in: sgml-base (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063965

Title:
  package sgml-base 1.31 failed to install/upgrade: Local modifications
  to /etc/pam.d/common-* triggered dpkg error

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sgml-base/+bug/2063965/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2063965] Re: package sgml-base 1.31 failed to install/upgrade: Local modifications to /etc/pam.d/common-* triggered dpkg error

2024-04-27 Thread Andrea Agnolin
** Attachment removed: "Df.txt"
   
https://bugs.launchpad.net/ubuntu/+source/sgml-base/+bug/2063965/+attachment/5771676/+files/Df.txt

** Attachment removed: "Dmesg.txt"
   
https://bugs.launchpad.net/ubuntu/+source/sgml-base/+bug/2063965/+attachment/5771677/+files/Dmesg.txt

** Attachment removed: "DpkgHistoryLog.txt"
   
https://bugs.launchpad.net/ubuntu/+source/sgml-base/+bug/2063965/+attachment/5771678/+files/DpkgHistoryLog.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063965

Title:
  package sgml-base 1.31 failed to install/upgrade: Local modifications
  to /etc/pam.d/common-* triggered dpkg error

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sgml-base/+bug/2063965/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2063965] [NEW] package sgml-base 1.31 failed to install/upgrade: Local modifications to /etc/pam.d/common-* triggered dpkg error

2024-04-27 Thread Andrea Agnolin
Public bug reported:

Summary:

Running `sudo apt install libpam-mount` I get

```
pam-auth-update: Local modifications to /etc/pam.d/common-*, not updating.
pam-auth-update: Run pam-auth-update --force to override.

Setting up libpam-mount-bin (2.19-1) ...
Processing triggers for libc-bin (2.38-1ubuntu6.2) ...
Processing triggers for man-db (2.11.2-3) ...
Errors were encountered while processing:
 sgml-base
E: Sub-process /usr/bin/dpkg returned an error code (1)
```

Plus apport-gtk pop-up

My `/etc/pam.d/common-authentication` is modified.

1) Release

```$ lsb_release -r
Release:23.10
```

2) Package version

```$  apt-cache policy sgml-base libpam-mount
sgml-base:
  Installed: 1.31
  Candidate: 1.31
  Version table:
 *** 1.31 500
500 http://it.archive.ubuntu.com/ubuntu mantic/main amd64 Packages
500 http://it.archive.ubuntu.com/ubuntu mantic/main i386 Packages
100 /var/lib/dpkg/status
 1.30 500
500 http://it.archive.ubuntu.com/ubuntu jammy/main amd64 Packages
500 http://it.archive.ubuntu.com/ubuntu jammy/main i386 Packages
libpam-mount:
  Installed: 2.19-1
  Candidate: 2.19-1
  Version table:
 *** 2.19-1 500
500 http://it.archive.ubuntu.com/ubuntu mantic/main amd64 Packages
100 /var/lib/dpkg/status
 2.18-2build2 500
500 http://it.archive.ubuntu.com/ubuntu jammy/main amd64 Packages
```

3) What is expected

Usually in this situation I get a dpkg prompt saying something like
"package maintainer provided a different configuration file" and asking
me which version of the configuration file. Or to see the differences.
Some file are then saved and `NAME.dpkg-new`/`NAME.dpkg-old`.

This way I can install the module and care about editing
`/etc/pam.d/common-auth` later.

4) What happened

See error above

ProblemType: Package
DistroRelease: Ubuntu 23.10
Package: sgml-base 1.31
ProcVersionSignature: Ubuntu 6.5.0-28.29-generic 6.5.13
Uname: Linux 6.5.0-28-generic x86_64
NonfreeKernelModules: zfs
ApportVersion: 2.27.0-0ubuntu5
AptOrdering:
 libhx32:amd64: Install
 libpam-mount:amd64: Install
 libpam-mount-bin:amd64: Install
 NULL: ConfigurePending
Architecture: amd64
CasperMD5CheckResult: pass
Date: Sat Apr 27 20:54:15 2024
ErrorMessage: il sottoprocesso installato pacchetto sgml-base script 
post-installation ha restituito lo stato di errore 2
InstallationDate: Installed on 2023-04-23 (370 days ago)
InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809.1)
PackageArchitecture: all
Python3Details: /usr/bin/python3.11, Python 3.11.6, python3-minimal, 3.11.4-5
PythonDetails: N/A
RelatedPackageVersions:
 dpkg 1.22.0ubuntu1.1
 apt  2.7.3ubuntu0.1
SourcePackage: sgml-base
Title: package sgml-base 1.31 failed to install/upgrade: il sottoprocesso 
installato pacchetto sgml-base script post-installation ha restituito lo stato 
di errore 2
UpgradeStatus: Upgraded to mantic on 2023-10-20 (190 days ago)

** Affects: sgml-base (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-package mantic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063965

Title:
  package sgml-base 1.31 failed to install/upgrade: Local modifications
  to /etc/pam.d/common-* triggered dpkg error

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sgml-base/+bug/2063965/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058752] Re: ath11k high jitter and packet loss when operating in 802.11ax mode

2024-04-24 Thread Andrea Ieri
unfortunately the problem is not actually gone in noble. I have upgraded
to the beta and are having significant but intermittent problems. On
6.8.0-31-generic I get periods of normal traffic mixed with 100% packet
loss for some seconds. This looks as follows:

64 bytes from 192.168.16.77: icmp_seq=2622 ttl=64 time=2.47 ms
64 bytes from 192.168.16.77: icmp_seq=2623 ttl=64 time=2.80 ms
64 bytes from 192.168.16.77: icmp_seq=2624 ttl=64 time=2.77 ms
From 192.168.16.231 icmp_seq=2637 Destination Host Unreachable
From 192.168.16.231 icmp_seq=2638 Destination Host Unreachable
From 192.168.16.231 icmp_seq=2639 Destination Host Unreachable
From 192.168.16.231 icmp_seq=2640 Destination Host Unreachable
From 192.168.16.231 icmp_seq=2644 Destination Host Unreachable
From 192.168.16.231 icmp_seq=2645 Destination Host Unreachable
64 bytes from 192.168.16.77: icmp_seq=2646 ttl=64 time=162 ms
64 bytes from 192.168.16.77: icmp_seq=2647 ttl=64 time=1.95 ms
64 bytes from 192.168.16.77: icmp_seq=2648 ttl=64 time=44.3 ms
64 bytes from 192.168.16.77: icmp_seq=2649 ttl=64 time=143 ms
64 bytes from 192.168.16.77: icmp_seq=2650 ttl=64 time=2.37 ms
64 bytes from 192.168.16.77: icmp_seq=2651 ttl=64 time=151 ms
64 bytes from 192.168.16.77: icmp_seq=2652 ttl=64 time=2.69 ms
64 bytes from 192.168.16.77: icmp_seq=2653 ttl=64 time=6.66 ms
64 bytes from 192.168.16.77: icmp_seq=2654 ttl=64 time=47.2 ms
64 bytes from 192.168.16.77: icmp_seq=2655 ttl=64 time=40.1 ms
64 bytes from 192.168.16.77: icmp_seq=2656 ttl=64 time=44.9 ms
64 bytes from 192.168.16.77: icmp_seq=2657 ttl=64 time=1583 ms
64 bytes from 192.168.16.77: icmp_seq=2658 ttl=64 time=560 ms
64 bytes from 192.168.16.77: icmp_seq=2659 ttl=64 time=1506 ms
64 bytes from 192.168.16.77: icmp_seq=2660 ttl=64 time=457 ms
64 bytes from 192.168.16.77: icmp_seq=2661 ttl=64 time=809 ms
64 bytes from 192.168.16.77: icmp_seq=2662 ttl=64 time=3014 ms
64 bytes from 192.168.16.77: icmp_seq=2663 ttl=64 time=2005 ms
64 bytes from 192.168.16.77: icmp_seq=2664 ttl=64 time=982 ms
64 bytes from 192.168.16.77: icmp_seq=2665 ttl=64 time=2.47 ms
64 bytes from 192.168.16.77: icmp_seq=2666 ttl=64 time=2471 ms
64 bytes from 192.168.16.77: icmp_seq=2667 ttl=64 time=1464 ms
64 bytes from 192.168.16.77: icmp_seq=2668 ttl=64 time=440 ms
64 bytes from 192.168.16.77: icmp_seq=2669 ttl=64 time=54.2 ms
64 bytes from 192.168.16.77: icmp_seq=2670 ttl=64 time=2.35 ms


If I find some time I'll try rerunning the same test from windows.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058752

Title:
  ath11k high jitter and packet loss when operating in 802.11ax mode

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2058752/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2063298] [NEW] deprecate ubuntu-fan in Noble

2024-04-23 Thread Andrea Righi
Public bug reported:

[Impact]

In order to provide ubuntu-fan we need to maintain additional kernel
SAUCE patches that are currently conflicting with upstream code,
potentially breaking networking eBPF APIs.

To prevent such incompatibility the whole patch set requires a major
redesign.

However, after investigations and a detailed assessment we have not
found any relevant real-world use-case that still requuires ubuntu-fan,
as most of its features are now available in the upstream kernel and
user-space tools, using alternative solutions.

Moreover, maintaining ubuntu-fan is also slowing down / preventing the
development of other packages (see for example LP: #2051672).

Therefore, we are proposing to deprecate ubuntu-fan starting with noble.

[Test case]

We have ubuntu-fan test cases in our regression testing suite. Such
tests are expected to fail with the noble kernel, so we can hint/disable
them in Noble.

[Fix]

Drop (do not apply) the ubuntu-fan SAUCE patch set from the Ubuntu
kernel.

[Regression potential]

There are still some existing tools/systems that may still rely on
ubuntu-fan, so we may experience regressions when such systems are
moving to noble. However, the potential of breaking eBPF networking has
a much higher impact, so we can probably workaround any potential
ubuntu-fan regression using alternative upstream solutions.

** Affects: iproute2 (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: iproute2 (Ubuntu Noble)
 Importance: Undecided
 Status: New

** Also affects: iproute2 (Ubuntu Noble)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063298

Title:
  deprecate ubuntu-fan in Noble

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/iproute2/+bug/2063298/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2051672] Re: [FFe] Merge iproute2 with the latest Debian version: 6.8.0-1 from testing/unstable (main)

2024-04-17 Thread Andrea Righi
According to the information that I collected (asking around,
investigating, etc.), it seems that there are no critical users of
ubuntu-fan.

Moreover, considering the impact of the ubuntu-fan kernel patches (that
would require a major refactoring to avoid breaking the network eBPF
ABI), we decided to proceed with the plan to deprecate this feature in
all the noble kernels.

Therefore, all the user-space components that rely on such feature can
follow the same plan and drop their corresponding ubuntu-fan support
(iproute2 included).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051672

Title:
  [FFe] Merge iproute2 with the latest Debian version: 6.8.0-1 from
  testing/unstable (main)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/iproute2/+bug/2051672/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061727] Re: bpfcc-tools autotest failure when multiple linux-tools- packages are installed

2024-04-16 Thread Andrea Righi
Test plan:

 - without this change:

/usr/lib/linux-tools-6.8.0-22/bpftool /usr/lib/linux-tools-6.8.0-25/bpftool gen 
skeleton /tmp/bpfcc-0.29.1+ds/libbpf-tools/.output/bashreadline.bpf.o > 
/tmp/bpfcc-0.29.1+ds/libbpf-tools/.output/bashreadline.skel.h
Usage: bpftool [OPTIONS] OBJECT { COMMAND | help }
   bpftool batch file FILE
   bpftool version

   OBJECT := { prog | map | link | cgroup | perf | net | feature | btf | 
gen | struct_ops | iter }
   OPTIONS := { {-j|--json} [{-p|--pretty}] | {-d|--debug} |
{-V|--version} }
make[2]: *** [Makefile:192: 
/tmp/bpfcc-0.29.1+ds/libbpf-tools/.output/bashreadline.skel.h] Error 255
make[2]: *** Deleting file 
'/tmp/bpfcc-0.29.1+ds/libbpf-tools/.output/bashreadline.skel.h'
make[2]: Leaving directory '/tmp/bpfcc-0.29.1+ds/libbpf-tools'

 - with this change applied:

100% tests passed, 0 tests failed out of 37

Total Test time (real) =  83.22 sec
make: Leaving directory '/tmp/autopkgtest.MOnsj0/tree/obj-x86_64-linux-gnu'
autopkgtest [06:43:12]: test command1: ---]
autopkgtest [06:43:12]: test command1:  - - - - - - - - - - results - - - - - - 
- - - -
command1 PASS
autopkgtest [06:43:12]:  summary
command1 PASS

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061727

Title:
  bpfcc-tools autotest failure when multiple linux-tools-
  packages are installed

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bpfcc/+bug/2061727/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061727] Re: bpfcc-tools autotest failure when multiple linux-tools- packages are installed

2024-04-16 Thread Andrea Righi
debdiff in attach allows to run the autopkgtest correctly also with
multiple kernels installed.

** Patch added: "bpfcc-tools-fix-autopkgtest.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/bpfcc/+bug/2061727/+attachment/5766017/+files/bpfcc-tools-fix-autopkgtest.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061727

Title:
  bpfcc-tools autotest failure when multiple linux-tools-
  packages are installed

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bpfcc/+bug/2061727/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061727] [NEW] bpfcc-tools autotest failure when multiple linux-tools- packages are installed

2024-04-16 Thread Andrea Righi
Public bug reported:

[Impact]

The autopkgtest for bpfcc-tools fails with the following error when
multiple linux-tools packages (multiple kernels) are installed:

942s /usr/lib/linux-tools-6.8.0-22/bpftool 
/usr/lib/linux-tools-6.8.0-25/bpftool gen skeleton 
/tmp/autopkgtest.2W4dxr/build.Uhs/src/libbpf-tools/.output/bashreadline.bpf.o > 
/tmp/autopkgtest.2W4dxr/build.Uhs/src/libbpf-tools/.output/bashreadline.skel.h
942s Usage: bpftool [OPTIONS] OBJECT { COMMAND | help }
942sbpftool batch file FILE
942sbpftool version
942s 
942sOBJECT := { prog | map | link | cgroup | perf | net | feature | btf 
| gen | struct_ops | iter }
942sOPTIONS := { {-j|--json} [{-p|--pretty}] | {-d|--debug} |
942s {-V|--version} }
942s make[2]: *** [Makefile:192: 
/tmp/autopkgtest.2W4dxr/build.Uhs/src/libbpf-tools/.output/bashreadline.skel.h] 
Error 255
942s make[2]: *** Deleting file 
'/tmp/autopkgtest.2W4dxr/build.Uhs/src/libbpf-tools/.output/bashreadline.skel.h'
942s make[2]: Leaving directory 
'/tmp/autopkgtest.2W4dxr/build.Uhs/src/libbpf-tools'
942s make[1]: *** [debian/rules:44: override_dh_auto_install] Error 2
942s make[1]: Leaving directory '/tmp/autopkgtest.2W4dxr/build.Uhs/src'

The reason is that in debian/rules we evaluate BPFTOOL assuming that
only one kernel is installed, but we may have multiple kernels
(therefore multiple linux-tools-) installed.

[Test case]

Install multiple linux-tools- and run the bpfcc-tools
autopkgtest.

[Fix]

Evaluate BPFTOOL in debian/rules only taking the last bpftool listed in
/usr/lib/linux-tools-*/bpftool.

[Regression potential]

This change affects only the autopkgtest and it allows to run the test
correctly also when multiple kernels are installed, no regresssion is
expected.

ProblemType: Bug
DistroRelease: Ubuntu 24.04
Package: bpfcc-tools 0.29.1+ds-1ubuntu6
ProcVersionSignature: User Name 6.8.0-22.22-generic 6.8.1
Uname: Linux 6.8.0-22-generic x86_64
ApportVersion: 2.28.0-0ubuntu1
Architecture: amd64
CasperMD5CheckResult: unknown
CloudArchitecture: x86_64
CloudBuildName: server
CloudID: nocloud
CloudName: unknown
CloudPlatform: nocloud
CloudSerial: 20240413
CloudSubPlatform: config-disk (/dev/vdb)
Date: Tue Apr 16 05:38:06 2024
PackageArchitecture: all
ProcEnviron:
 LANG=C.UTF-8
 PATH=(custom, no user)
 SHELL=/bin/bash
 TERM=xterm-256color
 XDG_RUNTIME_DIR=
SourcePackage: bpfcc
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: bpfcc (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: bpfcc (Ubuntu Noble)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug cloud-image noble

** Also affects: bpfcc (Ubuntu Noble)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061727

Title:
  bpfcc-tools autotest failure when multiple linux-tools-
  packages are installed

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bpfcc/+bug/2061727/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061329] Re: displaycal 3.9.11-2 fails to start in noble, needs python 3.11

2024-04-14 Thread Andrea Ieri
It's also worth noting that displaycal-py3 does not support python 3.12
yet. See for example https://github.com/eoyilmaz/displaycal-
py3/issues/335#issuecomment-2016761349

** Bug watch added: github.com/eoyilmaz/displaycal-py3/issues #335
   https://github.com/eoyilmaz/displaycal-py3/issues/335

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061329

Title:
  displaycal 3.9.11-2 fails to start in noble, needs python 3.11

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/displaycal-py3/+bug/2061329/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061329] [NEW] displaycal 3.9.11-2 fails to start in noble, needs python 3.11

2024-04-14 Thread Andrea Ieri
Public bug reported:

I have upgraded to the noble beta today, and displaycal fails to start.

The package dependencies request python 3.12, but the actual software
needs 3.11 (or older).

```
$ apt show displaycal | grep Depends

WARNING: apt does not have a stable CLI interface. Use with caution in
scripts.

Depends: libc6 (>= 2.34), libx11-6, libxinerama1 (>= 2:1.1.4),
libxrandr2 (>= 2:1.2.0), libxxf86vm1, python3 (<< 3.13), python3 (>=
3.12~), python3-build, python3-certifi, python3-dbus, python3-distro,
python3-numpy, python3-pil, python3-pychromecast, python3-send2trash,
python3-wxgtk4.0, python3-zeroconf, python3:any, dbus-x11, argyll,
libjs-jquery, python3-gi, libsdl2-mixer-2.0-0

$ displaycal --help  
Traceback (most recent call last):
  File "/usr/bin/displaycal", line 4, in 
from DisplayCAL.main import main
  File "/usr/lib/python3/dist-packages/DisplayCAL/main.py", line 27, in 
raise RuntimeError(
RuntimeError: Need Python version >= 3.8 <= 3.11, got 3.12.2

```

ProblemType: Bug
DistroRelease: Ubuntu 24.04
Package: displaycal 3.9.11-2
ProcVersionSignature: Ubuntu 6.8.0-22.22-generic 6.8.1
Uname: Linux 6.8.0-22-generic x86_64
NonfreeKernelModules: zfs
ApportVersion: 2.28.0-0ubuntu1
Architecture: amd64
CasperMD5CheckResult: unknown
CurrentDesktop: ubuntu:GNOME
Date: Sun Apr 14 15:16:10 2024
ProcEnviron:
 LANG=en_US.UTF-8
 PATH=(custom, no user)
 SHELL=/bin/zsh
 TERM=xterm-256color
 XDG_RUNTIME_DIR=
SourcePackage: displaycal-py3
UpgradeStatus: Upgraded to noble on 2024-04-14 (0 days ago)
mtime.conffile..etc.xdg.autostart.z-displaycal-apply-profiles.desktop: 
2023-10-22T21:28:16.420795

** Affects: displaycal-py3 (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug noble third-party-packages wayland-session

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061329

Title:
  displaycal 3.9.11-2 fails to start in noble, needs python 3.11

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/displaycal-py3/+bug/2061329/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060909] Re: Apply mitigations for the native BHI hardware vulnerabilty

2024-04-11 Thread Andrea Righi
** Description changed:

  [Impact]
  
  Branch History Injection (BHI) attacks may allow a malicious application
  to influence indirect branch prediction in kernel by poisoning the
  branch history. eIBRS isolates indirect branch targets in ring0.
  
  The BHB can still influence the choice of indirect branch predictor
  entry, and although branch predictor entries are isolated between modes
  when eIBRS is enabled, the BHB itself is not isolated between modes.
  
  Previously the only known real-world BHB attack vector was via
  unprivileged eBPF. Further research has found attacks that don't require
  unprivileged eBPF.
  
  See also:
  https://www.phoronix.com/news/Linux-BHI-Branch-History-Inject
  
  [Test case]
  
  https://www.vusec.net/projects/native-bhi/
  
  [Fix]
  
  Backport from upstream the merge that introduces spectre_bhi= boot
  option to control BHI mitigation:
  
   2bb69f5fc721 ("Merge tag 'nativebhi' of 
git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip")
   ed2e8d49b54d ("KVM: x86: Add BHI_NO")
   95a6ccbdc719 ("x86/bhi: Mitigate KVM by default")
   ec9404e40e8f ("x86/bhi: Add BHI mitigation knob")
   be482ff95009 ("x86/bhi: Enumerate Branch History Injection (BHI) bug")
   0f4a837615ff ("x86/bhi: Define SPEC_CTRL_BHI_DIS_S")
   7390db8aea0d ("x86/bhi: Add support for clearing branch history at syscall 
entry")
   1e3ad78334a6 ("x86/syscall: Don't force use of indirect calls for system 
calls")
   0cd01ac5dcb1 ("x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs 
file")
  
  Also set spectre_bhi=auto by default, that will rely on the BHI_DIS_S
  hardware control if it's available on the system CPUs, otherwise a
- proper software sequence will be deployed at VMexit.
+ proper software sequence will be executed at VMexit.
+ 
+ NOTE: we may get these changes via stable update in 6.8, when that
+ happens we can drop this backport and apply the patch set like any other
+ regular stable update.
  
  [Regression potential]
  
  We may experience performance regressions with this new mitigation
  enabled, especially in VMs and CPUs that don't have the BHI hardware
  support capability (due to the extra software sequence executed at
  VMexit).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060909

Title:
  Apply mitigations for the native BHI hardware vulnerabilty

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2060909/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060909] Re: Apply mitigations for the native BHI hardware vulnerabilty

2024-04-11 Thread Andrea Righi
** Summary changed:

- Backport mitigations for the native BHI hardware vulnerabilty
+ Apply mitigations for the native BHI hardware vulnerabilty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060909

Title:
  Apply mitigations for the native BHI hardware vulnerabilty

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2060909/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060909] Re: Backport mitigations for the native BHI hardware vulnerabilty

2024-04-11 Thread Andrea Righi
** Changed in: linux (Ubuntu Noble)
   Status: New => Fix Committed

** Description changed:

  [Impact]
  
  Branch History Injection (BHI) attacks may allow a malicious application
  to influence indirect branch prediction in kernel by poisoning the
  branch history. eIBRS isolates indirect branch targets in ring0.
  
  The BHB can still influence the choice of indirect branch predictor
  entry, and although branch predictor entries are isolated between modes
  when eIBRS is enabled, the BHB itself is not isolated between modes.
  
  Previously the only known real-world BHB attack vector was via
  unprivileged eBPF. Further research has found attacks that don't require
  unprivileged eBPF.
  
+ See also:
+ https://www.phoronix.com/news/Linux-BHI-Branch-History-Inject
+ 
  [Test case]
  
  https://www.vusec.net/projects/native-bhi/
  
  [Fix]
  
  Backport from upstream the merge that introduces spectre_bhi= boot
  option to control BHI mitigation:
  
-  2bb69f5fc721 ("Merge tag 'nativebhi' of 
git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip")
-  ed2e8d49b54d ("KVM: x86: Add BHI_NO")
-  95a6ccbdc719 ("x86/bhi: Mitigate KVM by default")
-  ec9404e40e8f ("x86/bhi: Add BHI mitigation knob")
-  be482ff95009 ("x86/bhi: Enumerate Branch History Injection (BHI) bug")
-  0f4a837615ff ("x86/bhi: Define SPEC_CTRL_BHI_DIS_S")
-  7390db8aea0d ("x86/bhi: Add support for clearing branch history at syscall 
entry")
-  1e3ad78334a6 ("x86/syscall: Don't force use of indirect calls for system 
calls")
-  0cd01ac5dcb1 ("x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs 
file")
+  2bb69f5fc721 ("Merge tag 'nativebhi' of 
git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip")
+  ed2e8d49b54d ("KVM: x86: Add BHI_NO")
+  95a6ccbdc719 ("x86/bhi: Mitigate KVM by default")
+  ec9404e40e8f ("x86/bhi: Add BHI mitigation knob")
+  be482ff95009 ("x86/bhi: Enumerate Branch History Injection (BHI) bug")
+  0f4a837615ff ("x86/bhi: Define SPEC_CTRL_BHI_DIS_S")
+  7390db8aea0d ("x86/bhi: Add support for clearing branch history at syscall 
entry")
+  1e3ad78334a6 ("x86/syscall: Don't force use of indirect calls for system 
calls")
+  0cd01ac5dcb1 ("x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs 
file")
  
  Also set spectre_bhi=auto by default, that will rely on the BHI_DIS_S
  hardware control if it's available on the system CPUs, otherwise a
  proper software sequence will be deployed at VMexit.
  
  [Regression potential]
  
  We may experience performance regressions with this new mitigation
  enabled, especially in VMs and CPUs that don't have the BHI hardware
  support capability (due to the extra software sequence executed at
  VMexit).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060909

Title:
  Backport mitigations for the native BHI hardware vulnerabilty

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2060909/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060909] [NEW] Backport mitigations for the native BHI hardware vulnerabilty

2024-04-10 Thread Andrea Righi
Public bug reported:

[Impact]

Branch History Injection (BHI) attacks may allow a malicious application
to influence indirect branch prediction in kernel by poisoning the
branch history. eIBRS isolates indirect branch targets in ring0.

The BHB can still influence the choice of indirect branch predictor
entry, and although branch predictor entries are isolated between modes
when eIBRS is enabled, the BHB itself is not isolated between modes.

Previously the only known real-world BHB attack vector was via
unprivileged eBPF. Further research has found attacks that don't require
unprivileged eBPF.

[Test case]

https://www.vusec.net/projects/native-bhi/

[Fix]

Backport from upstream the merge that introduces spectre_bhi= boot
option to control BHI mitigation:

 2bb69f5fc721 ("Merge tag 'nativebhi' of 
git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip")
 ed2e8d49b54d ("KVM: x86: Add BHI_NO")
 95a6ccbdc719 ("x86/bhi: Mitigate KVM by default")
 ec9404e40e8f ("x86/bhi: Add BHI mitigation knob")
 be482ff95009 ("x86/bhi: Enumerate Branch History Injection (BHI) bug")
 0f4a837615ff ("x86/bhi: Define SPEC_CTRL_BHI_DIS_S")
 7390db8aea0d ("x86/bhi: Add support for clearing branch history at syscall 
entry")
 1e3ad78334a6 ("x86/syscall: Don't force use of indirect calls for system 
calls")
 0cd01ac5dcb1 ("x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs 
file")

Also set spectre_bhi=auto by default, that will rely on the BHI_DIS_S
hardware control if it's available on the system CPUs, otherwise a
proper software sequence will be deployed at VMexit.

[Regression potential]

We may experience performance regressions with this new mitigation
enabled, especially in VMs and CPUs that don't have the BHI hardware
support capability (due to the extra software sequence executed at
VMexit).

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Fix Committed

** Affects: linux (Ubuntu Noble)
 Importance: Undecided
 Status: Fix Committed

** Also affects: linux (Ubuntu Noble)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060909

Title:
  Backport mitigations for the native BHI hardware vulnerabilty

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2060909/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055805] Re: touchpad not working with kernel 6.8

2024-04-10 Thread Andrea Righi
@tijs thanks for testing it! If 6.8.0-19 is working I assume that also
the latest kernel in release (6.8.0-22.22) is also working. If that's
the case I think we can close this for now.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055805

Title:
  touchpad not working with kernel 6.8

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2055805/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058830] Re: vp9 hw decode broken on modern AMD apus, needs amdgpu update

2024-04-04 Thread Andrea Agnolin
Any news? Pulling firmware from upstream is enough to solve this issue.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058830

Title:
  vp9 hw decode broken on modern AMD apus, needs amdgpu update

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux-firmware/+bug/2058830/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060130] Re: [SPR][EMR][GNR] TDX: efi: TD Measurement support for kernel cmdline/initrd sections from EFI stub

2024-04-04 Thread Andrea Righi
Applied all the listed commits to noble/linux, including also:

 9c55461040a9 ("x86/efistub: Remap kernel text read-only before dropping
NX attribute")


** Also affects: linux (Ubuntu Noble)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Noble)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060130

Title:
   [SPR][EMR][GNR] TDX: efi: TD Measurement support for kernel
  cmdline/initrd sections from EFI stub

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2060130/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2059080] Re: Add Real-time Linux Analysis tool (rtla) to linux-tools

2024-04-02 Thread Andrea Righi
** Changed in: linux (Ubuntu Noble)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059080

Title:
  Add Real-time Linux Analysis tool (rtla) to linux-tools

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2059080/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2059762] [NEW] CONFIG_INTEL_TDX_HOST conflicts with kexec in linux >= 6.8 for noble

2024-03-29 Thread Andrea Righi
Public bug reported:

[Impact]

CONFIG_INTEL_TDX_HOST depends on !KEXEC_CORE in the latest 6.8 kernel.
This was introduced by:

 cb8eb06d50fc ("x86/virt/tdx: Disable TDX host support when kexec is
enabled")

We cannot regress kexec, therefore we need to disable
CONFIG_INTEL_TDX_HOST in the generic kernel, despite our attempt with
LP: #2046040.

[Fix]

Disable CONFIG_INTEL_TDX_HOST in the generic kernel, until upstream will
properly support this option with kexec.

[Regression potential]

The Intel host TDX feature won't be available in the generic kernel.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Fix Committed

** Affects: linux (Ubuntu Noble)
 Importance: Undecided
 Status: Fix Committed

** Also affects: linux (Ubuntu Noble)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Noble)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059762

Title:
  CONFIG_INTEL_TDX_HOST conflicts with kexec in linux >= 6.8 for noble

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2059762/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2059237] Re: [Ubuntu-24.04] "array-index-out-of-bounds" error is observed after every reboot

2024-03-29 Thread Andrea Righi
If the issue is fixed without the extra patch, I think we can ignore it,
it was probably a false positive from UBSAN.

Let's keep an eye on it and if it shows up again in the future we can do
a test with my additional patch. Thanks for update!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059237

Title:
  [Ubuntu-24.04] "array-index-out-of-bounds" error is observed after
  every reboot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2059237/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2046040] Re: enable CONFIG_INTEL_TDX_HOST in linux >= 6.7 for noble

2024-03-29 Thread Andrea Righi
Changing the state to Won't fix, because of LP: #2059762.

** Changed in: linux (Ubuntu Noble)
   Status: Fix Released => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2046040

Title:
  enable CONFIG_INTEL_TDX_HOST in linux >= 6.7 for noble

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2046040/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2059237] Re: [Ubuntu-24.04] "array-index-out-of-bounds" error is observed after every reboot

2024-03-27 Thread Andrea Righi
Looking at the code this issue seems to be introduced by `UBUNTU: SAUCE:
modpost: support arbitrary symbol length in modversion` and the UBSAN
warning tells us that accessing vers->name[0] could be an out-of-bounds
access.

The struct modversion_info contains a flexibile array (name), that is
correctly defined as the last member of the struct, and its size is
allocated dynamically at runtime, so I would expect that vars->name[0]
is always allocated, unless vars is not initialized properly or there's
an empty name.

So, my guess is that UBSAN isn't really happy about the flexible array
and this is just a false positive.

However, to be 100% sure that we are not actually doing and out-of-bound
access and prevent the warning, we could apply something like the
following on top of our SAUCE patch:

diff --git a/arch/powerpc/kernel/module_64.c b/arch/powerpc/kernel/module_64.c
index 195714fc6e22..1f5960e25758 100644
--- a/arch/powerpc/kernel/module_64.c
+++ b/arch/powerpc/kernel/module_64.c
@@ -350,6 +350,8 @@ static void dedotify_versions(struct modversion_info *vers,
struct modversion_info *end = (void *)vers + size;
 
for (; vers < end && vers->next; vers = (void *)vers + vers->next) {
+   if (size <= offsetof(struct modversion_info, name))
+   continue;
if (vers->name[0] == '.') {
memmove(vers->name, vers->name+1, strlen(vers->name));
}


In this case even if (for any reason) vars->name[] is an empty string we can 
prevent the out-of-bound access and make UBSAN happy.

Opinions?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059237

Title:
  [Ubuntu-24.04] "array-index-out-of-bounds" error is observed after
  every reboot

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2059237/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2059080] [NEW] Add Real-time Linux Analysis tool (rtla) to linux-tools

2024-03-26 Thread Andrea Righi
Public bug reported:

[Impact]

The **rtla** is a meta-tool that includes a set of commands that aims to
analyze the real-time properties of Linux.

Considering the latest "low-latency" capabilities acquired by the
generic kernel and also considering the recent trend in Ubuntu to focus
on performance and observability (see for example
https://ubuntu.com/blog/ubuntu-performance-engineering-with-frame-
pointers-by-default), it makes sense to provide more tools that can help
to analyze timing/responsive performance, such as rtla.

[Test case]

Simple rtla usage to measure the timer irq / timer thread latency:

 $ sudo rtla timerlat

[Fix]

Enable the build of the rtla binary during the kernel build and ship it
with linux-tools.

[Regression potential]

The only potential regression is an increased amount of size in the
linux-tools package, due to the extra binary.

However, the binary itself is really small, the kernel already has all
the required capabilities enabled and we don't need to introduce any
additional user-space dependency, therefore such extra space is expected
to be minimal.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu Noble)
 Importance: Undecided
 Status: New

** Also affects: linux (Ubuntu Noble)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059080

Title:
  Add Real-time Linux Analysis tool (rtla) to linux-tools

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2059080/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058830] Re: vp9 hw decode broken on modern AMD apus, needs amdgpu update

2024-03-24 Thread Andrea Agnolin
** Description changed:

  Current version of amdgpu binaries in linux-firmware shipped with ubuntu
  22.04 (jammy) and ubuntu 23.10 (mantic) create various problems when
  decoding VP9 content with the iGPU on modern AMD mobile processor
  (rembrant and phoenix, i.e. 6xxxU/H, 7x40U/H and 7x35U/H processor).
  
  The issue has been reported and solved upstream:
  
- https://gitlab.com/kernel-firmware/linux-
- firmware/-/commit/977332782302476e1c863b09b840f463d0378807
+ https://gitlab.freedesktop.org/mesa/mesa/-/issues/8044
+ 
+ [EDIT: fixed link]
  
  Solution dates to the end of February: https://gitlab.com/kernel-
  firmware/linux-
  firmware/-/commit/977332782302476e1c863b09b840f463d0378807
  
  Ubuntu 24.04 already ships the updated binaries and should not be
  affected.
  
  Steps to reproduce:
  * on an affected system play a VP9 video with hardware decoding
  
  Additional links:
  * 
https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=977332782302476e1c863b09b840f463d0378807
  * https://bugzilla.redhat.com/show_bug.cgi?id=2267714
  * https://www.phoronix.com/news/AMDGPU-Firmware-Fixes-VP9
  
  Workaround:
  * download the amdgpu folder from upstream linux-firmware repos
  * compress each file with zstd
  * copy into /lib/firmware/amdgpu
  * regenerate the initrd
  
  I'm currently running ubuntu 23.10 (mantic) with binaries from upstream
  and the issue is solved.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058830

Title:
  vp9 hw decode broken on modern AMD apus, needs amdgpu update

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/2058830/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058830] Re: vp9 hw decode broken on modern AMD apus, needs amdgpu update

2024-03-23 Thread Andrea Agnolin
** Summary changed:

- vp9 hw decode broke on modern AMD apus, needs amdgpu update
+ vp9 hw decode broken on modern AMD apus, needs amdgpu update

** Description changed:

- Current version of amdgpu in linux-firmware shipped with ubuntu 22.04
- (jammy) and ubuntu 23.10 (mantic) create various problems when decoding
- VP9 content with the iGPU on modern AMD mobile processor (rembrant and
- phoenix, i.e. 6xxxU/H, 7x40U/H and 7735U/H processor).
+ Current version of amdgpu binaries in linux-firmware shipped with ubuntu
+ 22.04 (jammy) and ubuntu 23.10 (mantic) create various problems when
+ decoding VP9 content with the iGPU on modern AMD mobile processor
+ (rembrant and phoenix, i.e. 6xxxU/H, 7x40U/H and 7735U/H processor).
  
  The issue has been reported and solved upstream:
  
  https://gitlab.com/kernel-firmware/linux-
  firmware/-/commit/977332782302476e1c863b09b840f463d0378807
  
  Solution dates to the end of February: https://gitlab.com/kernel-
  firmware/linux-
  firmware/-/commit/977332782302476e1c863b09b840f463d0378807
  
  Ubuntu 24.04 already ships the updated binaries and should not be
  affected.
  
  Steps to reproduce:
  * on an affected system play a VP9 video with hardware decoding
  
  Additional links:
  * 
https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=977332782302476e1c863b09b840f463d0378807
  * https://bugzilla.redhat.com/show_bug.cgi?id=2267714
  * https://www.phoronix.com/news/AMDGPU-Firmware-Fixes-VP9
  
  Workaround:
  * download the amdgpu folder from upstream linux-firmware repos
  * compress each file with zstd
  * copy into /lib/firmware/amdgpu
  * regenerate the initrd
  
  I'm currently running ubuntu 23.10 (mantic) with binaries from upstream
  and the issue is solved.

** Description changed:

  Current version of amdgpu binaries in linux-firmware shipped with ubuntu
  22.04 (jammy) and ubuntu 23.10 (mantic) create various problems when
  decoding VP9 content with the iGPU on modern AMD mobile processor
- (rembrant and phoenix, i.e. 6xxxU/H, 7x40U/H and 7735U/H processor).
+ (rembrant and phoenix, i.e. 6xxxU/H, 7x40U/H and 7x35U/H processor).
  
  The issue has been reported and solved upstream:
  
  https://gitlab.com/kernel-firmware/linux-
  firmware/-/commit/977332782302476e1c863b09b840f463d0378807
  
  Solution dates to the end of February: https://gitlab.com/kernel-
  firmware/linux-
  firmware/-/commit/977332782302476e1c863b09b840f463d0378807
  
  Ubuntu 24.04 already ships the updated binaries and should not be
  affected.
  
  Steps to reproduce:
  * on an affected system play a VP9 video with hardware decoding
  
  Additional links:
  * 
https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=977332782302476e1c863b09b840f463d0378807
  * https://bugzilla.redhat.com/show_bug.cgi?id=2267714
  * https://www.phoronix.com/news/AMDGPU-Firmware-Fixes-VP9
  
  Workaround:
  * download the amdgpu folder from upstream linux-firmware repos
  * compress each file with zstd
  * copy into /lib/firmware/amdgpu
  * regenerate the initrd
  
  I'm currently running ubuntu 23.10 (mantic) with binaries from upstream
  and the issue is solved.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058830

Title:
  vp9 hw decode broken on modern AMD apus, needs amdgpu update

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/2058830/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058830] [NEW] vp9 hw decode broken on modern AMD apus, needs amdgpu update

2024-03-23 Thread Andrea Agnolin
Public bug reported:

Current version of amdgpu binaries in linux-firmware shipped with ubuntu
22.04 (jammy) and ubuntu 23.10 (mantic) create various problems when
decoding VP9 content with the iGPU on modern AMD mobile processor
(rembrant and phoenix, i.e. 6xxxU/H, 7x40U/H and 7x35U/H processor).

The issue has been reported and solved upstream:

https://gitlab.com/kernel-firmware/linux-
firmware/-/commit/977332782302476e1c863b09b840f463d0378807

Solution dates to the end of February: https://gitlab.com/kernel-
firmware/linux-
firmware/-/commit/977332782302476e1c863b09b840f463d0378807

Ubuntu 24.04 already ships the updated binaries and should not be
affected.

Steps to reproduce:
* on an affected system play a VP9 video with hardware decoding

Additional links:
* 
https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=977332782302476e1c863b09b840f463d0378807
* https://bugzilla.redhat.com/show_bug.cgi?id=2267714
* https://www.phoronix.com/news/AMDGPU-Firmware-Fixes-VP9

Workaround:
* download the amdgpu folder from upstream linux-firmware repos
* compress each file with zstd
* copy into /lib/firmware/amdgpu
* regenerate the initrd

I'm currently running ubuntu 23.10 (mantic) with binaries from upstream
and the issue is solved.

** Affects: linux-firmware (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058830

Title:
  vp9 hw decode broken on modern AMD apus, needs amdgpu update

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/2058830/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058752] Re: ath11k high jitter and packet loss when operating in 802.11ax mode

2024-03-22 Thread Andrea Ieri
Well, that was a pleasant surprise! On 6.8.0-11 the problem seems to be
completely gone. I guess I'll be upgrading to Noble as soon as possible.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058752

Title:
  ath11k high jitter and packet loss when operating in 802.11ax mode

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2058752/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2051560] Re: Provide python perf module

2024-03-22 Thread Andrea Righi
** Changed in: linux (Ubuntu)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051560

Title:
  Provide python perf module

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2051560/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2051560] Re: Provide python perf module

2024-03-22 Thread Andrea Righi
Patch sent to the kernel team mailing list for review:
https://lists.ubuntu.com/archives/kernel-team/2024-March/149751.html

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051560

Title:
  Provide python perf module

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2051560/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058752] [NEW] ath11k high jitter and packet loss when operating in 802.11ax mode

2024-03-22 Thread Andrea Ieri
Public bug reported:

On 6.5.0-26-generic, my QCNFA765 cannot really operate in 802.11ax mode.

I have a Thinkpad P16s Gen 2 with a (soldered, sadly) QCNFA765 card, which uses 
the ath11k driver.
I also have a Ruckus R650 AP, which supports wifi6.

Connecting the two and pinging the AP yields the following:

```
64 bytes from 192.168.16.77: icmp_seq=45 ttl=64 time=22.4 ms
64 bytes from 192.168.16.77: icmp_seq=46 ttl=64 time=29.6 ms
64 bytes from 192.168.16.77: icmp_seq=47 ttl=64 time=26.8 ms
64 bytes from 192.168.16.77: icmp_seq=48 ttl=64 time=2174 ms
64 bytes from 192.168.16.77: icmp_seq=49 ttl=64 time=1158 ms
64 bytes from 192.168.16.77: icmp_seq=50 ttl=64 time=130 ms
64 bytes from 192.168.16.77: icmp_seq=51 ttl=64 time=503 ms
64 bytes from 192.168.16.77: icmp_seq=54 ttl=64 time=1832 ms
64 bytes from 192.168.16.77: icmp_seq=55 ttl=64 time=808 ms
64 bytes from 192.168.16.77: icmp_seq=56 ttl=64 time=9.32 ms
64 bytes from 192.168.16.77: icmp_seq=57 ttl=64 time=2.11 ms
64 bytes from 192.168.16.77: icmp_seq=58 ttl=64 time=25.6 ms
64 bytes from 192.168.16.77: icmp_seq=59 ttl=64 time=30.9 ms
64 bytes from 192.168.16.77: icmp_seq=60 ttl=64 time=95.6 ms
^C
--- 192.168.16.77 ping statistics ---
60 packets transmitted, 55 received, 8.3% packet loss, time 59273ms
rtt min/avg/max/mdev = 2.105/275.084/2344.792/560.334 ms, pipe 3
```

Those periodic bursts of >1s latency make some webpages fail to load and
videochats unusable.

No interference is present in my channel of choice.

Nothing interesting is printed in dmesg while the above occurs.

The above does not happen if:
* I disable wifi 6 in the AP
* I ping a wifi 5 AP (I also have an older R710, which is a 802.11ac AP)
* I ping the R650 in wifi 6 mode from a AX210 on kernel 6.2
* I ping the R650 from a completely different OS and device (e.g. Android)

I'll test with a 24.04 daily image next.

ProblemType: Bug
DistroRelease: Ubuntu 23.10
Package: linux-image-6.5.0-26-generic 6.5.0-26.26
ProcVersionSignature: Ubuntu 6.5.0-26.26-generic 6.5.13
Uname: Linux 6.5.0-26-generic x86_64
NonfreeKernelModules: zfs
ApportVersion: 2.27.0-0ubuntu5
Architecture: amd64
CasperMD5CheckResult: unknown
CurrentDesktop: ubuntu:GNOME
Date: Thu Mar 21 16:58:07 2024
MachineType: {report['dmi.sys.vendor']} {report['dmi.product.name']}
ProcFB: 0 amdgpudrmfb
ProcKernelCmdLine: root=zfs:zroot/ROOT/ubuntu quiet loglevel=4 
rtc_cmos.use_acpi_alarm=1 spl.spl_hostid=0x4605c990
RelatedPackageVersions:
 linux-restricted-modules-6.5.0-26-generic N/A
 linux-backports-modules-6.5.0-26-generic  N/A
 linux-firmware20230919.git3672ccab-0ubuntu2.9
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 01/15/2024
dmi.bios.release: 1.18
dmi.bios.vendor: LENOVO
dmi.bios.version: R2FET38W (1.18 )
dmi.board.asset.tag: Not Available
dmi.board.name: 21K9001NUS
dmi.board.vendor: LENOVO
dmi.board.version: SDK0T76530 WIN
dmi.chassis.asset.tag: No Asset Tag
dmi.chassis.type: 10
dmi.chassis.vendor: LENOVO
dmi.chassis.version: None
dmi.ec.firmware.release: 1.11
dmi.modalias: 
dmi:bvnLENOVO:bvrR2FET38W(1.18):bd01/15/2024:br1.18:efr1.11:svnLENOVO:pn21K9001NUS:pvrThinkPadP16sGen2:rvnLENOVO:rn21K9001NUS:rvrSDK0T76530WIN:cvnLENOVO:ct10:cvrNone:skuLENOVO_MT_21K9_BU_Think_FM_ThinkPadP16sGen2:
dmi.product.family: ThinkPad P16s Gen 2
dmi.product.name: 21K9001NUS
dmi.product.sku: LENOVO_MT_21K9_BU_Think_FM_ThinkPad P16s Gen 2
dmi.product.version: ThinkPad P16s Gen 2
dmi.sys.vendor: LENOVO

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug mantic wayland-session

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058752

Title:
  ath11k high jitter and packet loss when operating in 802.11ax mode

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2058752/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2051560] Re: Provide python perf module

2024-03-22 Thread Andrea Righi
** Description changed:

+ [Impact]
+ 
+ We need to provide the python perf module, because some applications
+ (such as tuned) require it.
+ 
+ This module is implemented inside perf, provided by the kernel.
+ 
+ At the moment we provide a distinct perf for each kernel installed in
+ the system. There is really no reason to do that, because perf is both
+ backward and forward compatible, but this is a different issue and we
+ are not going to solve it in this context and it will be addressed in a
+ separate bug.
+ 
+ For now, to solve this specific issue, we need to enable the python
+ module when we build perf (as part of the kernel build) and ship the
+ library inside the linux-tools- package.
+ 
+ However, this brings a new problem, because we need to install the
+ module in a standard python path (so that python applications can be
+ able to use it in a regular way), but we need to support multiple
+ installed versions and add some logic to transparently select the right
+ one when a generic user-space python application uses `import perf`.
+ 
+ For this reason we need to provide a python wrapper module that is
+ imported via a regular `import perf` and it transparently loads the
+ actual python perf module, based on the kernel that is currently
+ running.
+ 
+ [Test case]
+ 
+ Install linux-tools- and run the following simple test
+ case:
+ 
+  $ python -c 'import perf; [print(c) for c in perf.cpu_map()]'
+ 
+ [Fix]
+ 
+  - Enable the python perf module build during the regular kernel build
+  - Provide a virtual `perf` python module wrapper in linux-tools-common
+ 
+ [Regression potential]
+ 
+ We are adding a new python module to linux-tools (that is something new,
+ we don't ship any other python module), but we are not changing anything
+ that is already provided, so the only regression that can happen is an
+ increased size of the linux-tools package.
+ 
+ [Original bug report]
+ 
  The tuned package has some plugins which rely on the perf python module
  [1], and right now they are not working because we do not have the perf
  python module available in Ubuntu.
  
  Initially, this was reported in this other bug [2], but it seems the
  scope of that bug is bigger than what we (Server) need for tuned. So
  filing this new bug as requested by the Kernel team to provide just the
  python module.
  
  For reference, in Fedora it's shipped in the bin:python3-perf package:
  
  [root@f39 ~]# rpm -ql python3-perf
  /usr/lib/.build-id
  /usr/lib/.build-id/80
  /usr/lib/.build-id/80/9022196f598cb3327545c2d497b1d9fdf55630
  /usr/lib64/python3.12/site-packages/perf-0.1-py3.12.egg-info
  /usr/lib64/python3.12/site-packages/perf-0.1-py3.12.egg-info/PKG-INFO
  /usr/lib64/python3.12/site-packages/perf-0.1-py3.12.egg-info/SOURCES.txt
  
/usr/lib64/python3.12/site-packages/perf-0.1-py3.12.egg-info/dependency_links.txt
  /usr/lib64/python3.12/site-packages/perf-0.1-py3.12.egg-info/top_level.txt
  /usr/lib64/python3.12/site-packages/perf.cpython-312-x86_64-linux-gnu.so
  /usr/share/licenses/python3-perf
  /usr/share/licenses/python3-perf/COPYING
  
  Built from their kernel-tools package[3].
  
- 
  [1] https://bugs.launchpad.net/ubuntu/+source/tuned/+bug/2051290
  [2] https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1613393
  [3] 
https://src.fedoraproject.org/rpms/kernel-tools/blob/rawhide/f/kernel-tools.spec#_148

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051560

Title:
  Provide python perf module

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2051560/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058191] Re: Getting SIGSEGV and SIGILL in many programs

2024-03-20 Thread Andrea Righi
Unfortunately those traces don't say much without the debugging symbols.
If it happens also with the mainline kernel we should see similar bugs
reported upstream, that's why I'm not very convinced about this being a
kernel issue. More likely a library issue, considering that it happens
with different applications (or interactions between kernel and a
particular library).

You mention that the last kernel that was working was like a 6.5?
There's a huge delta between 6.5 and 6.8. Maybe we could try to restrict
this range a bit more...

At https://kernel.ubuntu.com/mainline/ you can find the debs of pretty
much all the mainline kernel versions, maybe you could also test some
kernels between 6.5 and 6.8 (assuming you can easily reproduce the
problem),  in order to restrict the range of changes and have a better
idea where to look.

Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058191

Title:
  Getting SIGSEGV and SIGILL in many programs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/2058191/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058191] Re: Getting SIGSEGV and SIGILL in many programs

2024-03-20 Thread Andrea Righi
Hm... honestly this looks more like a user-space / brave issue than a
kernel issue. Do you get similar SIGSEGV with other apps?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058191

Title:
  Getting SIGSEGV and SIGILL in many programs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/2058191/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058191] Re: Getting SIGSEGV and SIGILL in many programs

2024-03-19 Thread Andrea Righi
Can you give it a try also with the latest upstream 6.8 (available here
https://kernel.ubuntu.com/mainline/v6.8.1/). This should help to verify
if it's an upstream issue or a specific issue with the Ubuntu kernel.

Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058191

Title:
  Getting SIGSEGV and SIGILL in many programs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/2058191/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055805] Re: touchpad not working with kernel 6.8

2024-03-19 Thread Andrea Righi
@tijs not exactly that kernel, but a kernel that has all the fixes that
are included in 6.8.1. :)

If you are willing to do one more test to confirm that everything is
fine in the next candidate kernel for 24.04, you could try with
6.8.0-20.20 from this ppa: https://launchpad.net/~canonical-kernel-
team/+archive/ubuntu/bootstrap

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055805

Title:
  touchpad not working with kernel 6.8

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2055805/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055805] Re: touchpad not working with kernel 6.8

2024-03-19 Thread Andrea Righi
I don't have the hardware at the moment. It'd be great if you could do a
test with the latest mainline build, so that we can better understand if
it's an upstream issue or something specific with the Ubuntu kernel (or
maybe a kernel .config issue):

https://kernel.ubuntu.com/mainline/v6.8.1/

Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055805

Title:
  touchpad not working with kernel 6.8

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2055805/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058191] Re: Getting SIGSEGV and SIGILL in many programs

2024-03-19 Thread Andrea Righi
The message `mce: [Hardware Error]: Machine check events logged` really
seems to indicate a potential hardware malfunction.

Can you double check if this is happening only with the latest 6.8? Do
you see anything similar in dmesg with other kernels?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058191

Title:
  Getting SIGSEGV and SIGILL in many programs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/2058191/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058165] Re: System freeze on copy large files on usb

2024-03-19 Thread Andrea Righi
Can you elaborate more on the freeze part? Does the system completely
freezes and it never recovers or is it a temporary freeze (until the
copy completes)?

How much RAM do you have in your system?

Can you check if the following helps to mitigate the problem?

 $ echo $((32 * 1024 * 1024)) | sudo tee /proc/sys/vm/dirty_bytes
 $ echo $((16 * 1024 * 1024)) | sudo tee /proc/sys/vm/dirty_background_bytes

Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058165

Title:
  System freeze on copy large files on usb

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-meta-lowlatency/+bug/2058165/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056616] Re: left-over ceph debugging printks

2024-03-08 Thread Andrea Righi
** Changed in: linux (Ubuntu Noble)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056616

Title:
  left-over ceph debugging printks

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2056616/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2051342] Re: Enable lowlatency settings in the generic kernel

2024-03-07 Thread Andrea Righi
** Changed in: linux (Ubuntu Noble)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051342

Title:
  Enable lowlatency settings in the generic kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2051342/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056126] Re: hwmon: (coretemp) Fix core count limitation

2024-03-06 Thread Andrea Righi
** Changed in: linux (Ubuntu Noble)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056126

Title:
  hwmon: (coretemp) Fix core count limitation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2056126/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056126] [NEW] hwmon: (coretemp) Fix core count limitation

2024-03-04 Thread Andrea Righi
Public bug reported:

[Impact]

In linux 6.8 the coretemp driver supports at most 128 cores per package.
Cores higher than 128 will lose their core temperature information.

There is an upstream patch set that allows to support more than 128
cores per package, but it's applied to linux-next for now and it's
scheduled for 6.9.

We should apply the patch set to the Noble 6.8 kernel, so that we can
properly support systems with a large amount of cores per package.

[Test case]

Read temperature info from /sys/class/hwmon on a system with > 128 cores
per package (that means we don't have a proper test case to verify the
fix at the moment).

[Fix]

Apply the following commits (from linux-next):

18cb15e9c108 hwmon: (coretemp) Use dynamic allocated memory for core temp_data
f0a5f46b0100 hwmon: (coretemp) Remove redundant temp_data->is_pkg_data
16a29729c00c hwmon: (coretemp) Split package temp_data and core temp_data
b48fddda2b30 hwmon: (coretemp) Abstract core_temp helpers
a30f3dc6e9bf hwmon: (coretemp) Remove redundant pdata->cpu_map[]
e416450cb080 hwmon: (coretemp) Replace sensor_device_attribute with 
device_attribute
46ee134971bb hwmon: (coretemp) Remove unnecessary dependency of array index
9f360b22929c hwmon: (coretemp) Introduce enum for attr index

[Regression potential]

We may experience hwmon-related regressions, either systems reading
incorrect temperature information or even bugs/crashes when accessing
data from /sys/class/hwmon.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu Noble)
 Importance: Undecided
 Status: New

** Also affects: linux (Ubuntu Noble)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056126

Title:
  hwmon: (coretemp) Fix core count limitation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2056126/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2054682] Re: apfs-dkms FTBS in noble with the latest 6.8 kernel

2024-03-04 Thread Andrea Righi
** Changed in: linux-apfs-rw (Ubuntu Noble)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2054682

Title:
  apfs-dkms FTBS in noble with the latest 6.8 kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-apfs-rw/+bug/2054682/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055310] Re: dmesg spammed by virtui-fs and 9pnet-virtio messages

2024-03-02 Thread Andrea Righi
I haven't been able to reproduce this on my PC yet... Looking at the
error, especially the virtio-fs part, I'm wondering if you're missing
virtiofsd in your host. Can you try to `apt install virtiofsd` (if you
don't have it installed already)?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055310

Title:
  dmesg spammed by virtui-fs and 9pnet-virtio messages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2055310/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1951440] Re: Enable CONFIG_INTEL_IOMMU_DEFAULT_ON and CONFIG_INTEL_IOMMU_SCALABLE_MODE_DEFAULT_ON

2024-02-29 Thread Andrea Righi
** Changed in: linux (Ubuntu Noble)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1951440

Title:
  Enable CONFIG_INTEL_IOMMU_DEFAULT_ON and
  CONFIG_INTEL_IOMMU_SCALABLE_MODE_DEFAULT_ON

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1951440/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2049390] Re: Please change CONFIG_CONSOLE_LOGLEVEL_QUIET to 3

2024-02-29 Thread Andrea Righi
For the general use case I think that reducing the verbosity makes
sense. About our testing, I think we're not booting kernels with
"quiet", and if we do we should definitely drop it from the kernel boot
options.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2049390

Title:
  Please change CONFIG_CONSOLE_LOGLEVEL_QUIET to 3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2049390/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055310] Re: dmesg spammed by virtui-fs and 9pnet-virtio messages

2024-02-28 Thread Andrea Righi
I don't see these messages with the latest Noble using the kernel from
the proposed pocket (6.8.0-11-generic). Can you also give it a try (if
you can)?

Hopefully we'll be able to promote a 6.8 in release soon, we are
currently blocked by a glibc regression (that doesn't seem to be a
kernel regression). If we can unblock/hint this one (hopefully this
week, or worst case next week) we'll have a new 6.8 in release.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055310

Title:
  dmesg spammed by virtui-fs and 9pnet-virtio messages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2055310/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1977730] [NEW] Kinetic update: v5.18.1 upstream stable release

2022-06-06 Thread Andrea Righi
Public bug reported:

SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   v5.18.1 upstream stable release
   from git://git.kernel.org/

lockdown: also lock down previous kgdb use
HID: amd_sfh: Add support for sensor discovery
random: fix sysctl documentation nits
init: call time_init() before rand_initialize()
ia64: define get_cycles macro for arch-override
s390: define get_cycles macro for arch-override
parisc: define get_cycles macro for arch-override
alpha: define get_cycles macro for arch-override
powerpc: define get_cycles macro for arch-override
timekeeping: Add raw clock fallback for random_get_entropy()
m68k: use fallback for random_get_entropy() instead of zero
riscv: use fallback for random_get_entropy() instead of zero
mips: use fallback for random_get_entropy() instead of just c0 random
arm: use fallback for random_get_entropy() instead of zero
nios2: use fallback for random_get_entropy() instead of zero
x86/tsc: Use fallback for random_get_entropy() instead of zero
um: use fallback for random_get_entropy() instead of zero
sparc: use fallback for random_get_entropy() instead of zero
xtensa: use fallback for random_get_entropy() instead of zero
random: insist on random_get_entropy() existing in order to simplify
random: do not use batches when !crng_ready()
random: use first 128 bits of input as fast init
random: do not pretend to handle premature next security model
random: order timer entropy functions below interrupt functions
random: do not use input pool from hard IRQs
random: help compiler out with fast_mix() by using simpler arguments
siphash: use one source of truth for siphash permutations
random: use symbolic constants for crng_init states
random: avoid initializing twice in credit race
random: move initialization out of reseeding hot path
random: remove ratelimiting for in-kernel unseeded randomness
random: use proper jiffies comparison macro
random: handle latent entropy and command line from random_init()
random: credit architectural init the exact amount
random: use static branch for crng_ready()
random: remove extern from functions in header
random: use proper return types on get_random_{int,long}_wait()
random: make consistent use of buf and len
random: move initialization functions out of hot pages
random: move randomize_page() into mm where it belongs
random: unify batched entropy implementations
random: convert to using fops->read_iter()
random: convert to using fops->write_iter()
random: wire up fops->splice_{read,write}_iter()
random: check for signals after page of pool writes
ACPI: sysfs: Fix BERT error region memory mapping
ALSA: ctxfi: Add SB046x PCI ID
Linux 5.18.1

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed

** Affects: linux (Ubuntu Kinetic)
 Importance: Undecided
 Status: Confirmed


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Kinetic)
   Importance: Undecided
   Status: Confirmed

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+    v5.18.1 upstream stable release
+    from git://git.kernel.org/
  
-v5.18.1 upstream stable release
-from git://git.kernel.org/
+ lockdown: also lock down previous kgdb use
+ HID: amd_sfh: Add support for sensor discovery
+ random: fix sysctl documentation nits
+ init: call time_init() before rand_initialize()
+ ia64: define get_cycles macro for arch-override
+ s390: define get_cycles macro for arch-override
+ parisc: define get_cycles macro for arch-override
+ alpha: define get_cycles macro for arch-override
+ powerpc: define get_cycles 

[Bug 1977732] [NEW] Kinetic update: v5.18.2 upstream stable release

2022-06-06 Thread Andrea Righi
Public bug reported:


SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   v5.18.2 upstream stable release
   from git://git.kernel.org/


Linux 5.18.2
ALSA: usb-audio: Optimize TEAC clock quirk
bpf: Do write access check for kfunc and global func
bpf: Check PTR_TO_MEM | MEM_RDONLY in check_helper_mem_access
bpf: Reject writes for PTR_TO_MAP_KEY in check_helper_mem_access
bpf: Fix excessive memory allocation in stack_map_alloc()
bpf: Fix usage of trace RCU in local storage.
bpf: Enlarge offset check value to INT_MAX in bpf_skb_{load,store}_bytes
bpf: Fix combination of jit blinding and pointers to bpf subprogs.
bpf: Fix potential array overflow in bpf_trampoline_get_progs()
bpf: Fill new bpf_prog_pack with illegal instructions
NFSD: Fix possible sleep during nfsd4_release_lockowner()
NFS: Memory allocation failures are not server fatal errors
docs: submitting-patches: Fix crossref to 'The canonical patch format'
tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe()
tpm: Fix buffer access in tpm2_get_tpm_pt()
media: i2c: imx412: Fix power_off ordering
media: i2c: imx412: Fix reset GPIO polarity
x86/sgx: Ensure no data in PCMD page after truncate
x86/sgx: Fix race between reclaimer and page fault handler
x86/sgx: Obtain backing storage page with enclave mutex held
x86/sgx: Mark PCMD page as dirty when modifying contents
x86/sgx: Disconnect backing page references from dirty status
HID: multitouch: add quirks to enable Lenovo X12 trackpoint
HID: multitouch: Add support for Google Whiskers Touchpad
fs/ntfs3: validate BOOT sectors_per_clusters
raid5: introduce MD_BROKEN
dm verity: set DM_TARGET_IMMUTABLE feature flag
dm stats: add cond_resched when looping over entries
dm crypt: make printing of the key constant-time
dm integrity: fix error code in dm_integrity_ctr()
ARM: dts: s5pv210: Correct interrupt name for bluetooth in Aries
Bluetooth: hci_qca: Use del_timer_sync() before freeing
ALSA: usb-audio: Configure sync endpoints before data
ALSA: usb-audio: Add missing ep_idx in fixed EP quirks
ALSA: usb-audio: Workaround for clock setup on TEAC devices
tools/memory-model/README: Update klitmus7 compat table
zsmalloc: fix races between asynchronous zspage free and page migration
crypto: qat - rework the VF2PF interrupt handling logic
crypto: ecrdsa - Fix incorrect use of vli_cmp
crypto: caam - fix i.MX6SX entropy delay value
KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak
KVM: x86/mmu: Don't rebuild page when the page is synced and no tlb flushing is 
required
KVM: x86: Drop WARNs that assert a triple fault never "escapes" from L2
KVM: x86: Fix the intel_pt PMI handling wrongly considered from guest
KVM: x86: avoid loading a vCPU after .vm_destroy was called
KVM: x86: avoid calling x86 emulator without a decoded instruction
KVM: x86: fix typo in __try_cmpxchg_user causing non-atomicness
KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses
KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits
x86/uaccess: Implement macros for CMPXCHG on user addresses
x86, kvm: use correct GFP flags for preemption disabled
x86/kvm: Alloc dummy async #PF token outside of raw spinlock
x86/fpu: KVM: Set the base guest FPU uABI size to sizeof(struct kvm_xsave)
KVM: PPC: Book3S HV: fix incorrect NULL check on list iterator
netfilter: conntrack: re-fetch conntrack after insertion
netfilter: nf_tables: double hook unregistration in netns path
netfilter: nf_tables: hold mutex on netns pre_exit path
netfilter: nf_tables: sanitize nft_set_desc_concat_parse()
netfilter: nft_limit: Clone packet limits' cost value
exfat: check if cluster num is valid
drm/i915: Fix -Wstringop-overflow warning in call to intel_read_wm_latency()
net: ipa: compute proper aggregation limit
pipe: Fix missing lock in pipe_resize_ring()
pipe: make poll_usage boolean and annotate its access
assoc_array: Fix BUG_ON during garbage collect
i2c: ismt: prevent memory corruption in ismt_access()
netfilter: nf_tables: disallow non-stateful expression in sets earlier

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed

** Affects: linux (Ubuntu Kinetic)
 Importance: Undecided
 Status: Confirmed


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Kinetic)
   Importance: Undecided
   Status: Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

[Bug 1977544] [NEW] missing python3-pycurl dep

2022-06-03 Thread Andrea Mantoni
Public bug reported:

this is missing python3-pycurl as a dependency, as reported here:
https://github.com/osdlyrics/osdlyrics/issues/75

** Affects: osdlyrics (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1977544

Title:
  missing python3-pycurl dep

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/osdlyrics/+bug/1977544/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1976287] Re: casper: qemu instances too small during autopkgtest (potential OOM failures)

2022-05-30 Thread Andrea Righi
** Summary changed:

- casper: qemu image too small in autopkgtest
+ casper: qemu instances too small during autopkgtest (potential OOM failures)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976287

Title:
  casper: qemu instances too small during autopkgtest (potential OOM
  failures)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/casper/+bug/1976287/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1976287] Re: casper: qemu image too small in autopkgtest

2022-05-30 Thread Andrea Righi
Fix for focal (where we are experiencing regressions with hwe-5.15) in
the attached debdiff.

** Patch added: "casper-increase-memory-to-test-instances.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/casper/+bug/1976287/+attachment/5593861/+files/casper-increase-memory-to-test-instances.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976287

Title:
  casper: qemu image too small in autopkgtest

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/casper/+bug/1976287/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1976287] [NEW] casper: qemu image too small in autopkgtest

2022-05-30 Thread Andrea Righi
Public bug reported:

[Impact]

During autopkgtest we are creating VMs with 768MB of RAM, that used to
be enough in the past, but nowdays we typically require more memory and
we may trigger some sporadic out-of-memory failures during autopkgtest.

[Test case]

Run autopkgtest with a recent kernel (e.g., 5.15 or above).

[Fix]

Bump up the memory size to 1G.

[Regression potential]

We may see regressions in test systems with a small amount of memory (in
the host / hypervisor), because after this change we need more RAM in
order to run and complete autopkgtest successfully.

** Affects: casper (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: casper (Ubuntu Focal)
 Importance: Undecided
 Status: New

** Affects: casper (Ubuntu Jammy)
 Importance: Undecided
 Status: New

** Affects: casper (Ubuntu Kinetic)
 Importance: Undecided
 Status: New

** Also affects: casper (Ubuntu Kinetic)
   Importance: Undecided
   Status: New

** Also affects: casper (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: casper (Ubuntu Jammy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976287

Title:
  casper: qemu image too small in autopkgtest

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/casper/+bug/1976287/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

  1   2   3   4   5   6   7   8   9   10   >