Ok I will try the upstream kernel and then report back any findings

On Mon, Aug 21, 2017 at 4:41 PM, Joseph Salisbury <
joseph.salisb...@canonical.com> wrote:

> Did this issue start happening after an update/upgrade?  Was there a
> prior kernel version where you were not having this particular problem?
>
> Would it be possible for you to test the latest upstream kernel? Refer
> to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
> v4.13 kernel[0].
>
> If this bug is fixed in the mainline kernel, please add the following
> tag 'kernel-fixed-upstream'.
>
> If the mainline kernel does not fix this bug, please add the tag:
> 'kernel-bug-exists-upstream'.
>
> Once testing of the upstream kernel is complete, please mark this bug as
> "Confirmed".
>
>
> Thanks in advance.
>
> [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.13-rc6
>
> ** Changed in: linux (Ubuntu)
>    Importance: Undecided => Medium
>
> --
> You received this bug notification because you are subscribed to the bug
> report.
> https://bugs.launchpad.net/bugs/1711877
>
> Title:
>   possible connectivity bug?
>
> Status in linux package in Ubuntu:
>   Incomplete
>
> Bug description:
>   having some connectivity issues and found this message repeating in
>   the kern.log thought it might be worth reporting.
>
>   ```
>   ug 19 22:40:51 zack kernel: [ 4645.749394] ------------[ cut here
> ]------------
>   Aug 19 22:40:51 zack kernel: [ 4645.749405] WARNING: CPU: 2 PID: 1259 at
> /build/linux-hwe-CXNcgz/linux-hwe-4.10.0/drivers/net/
> wireless/intel/iwlwifi/mvm/sta.c:1523 iwl_mvm_rm_sta+0x3ea/0x460 [iwlmvm]
>   Aug 19 22:40:51 zack kernel: [ 4645.749406] Modules linked in: ccm
> rfcomm xt_CHECKSUM iptable_mangle ipt_REJECT nf_reject_ipv4 xt_tcpudp
> ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink nfnetlink
> xfrm_user xfrm_algo iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4
> nf_nat_ipv4 xt_addrtype xt_conntrack nf_nat nf_conntrack libcrc32c
> br_netfilter bridge stp llc aufs ebtable_filter ebtables ip6table_filter
> ip6_tables iptable_filter ip_tables x_tables bnep snd_hda_codec_hdmi
> snd_hda_codec_realtek snd_hda_codec_generic nls_iso8859_1 joydev arc4
> intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp crct10dif_pclmul
> crc32_pclmul snd_soc_skl snd_soc_skl_ipc ghash_clmulni_intel
> snd_soc_sst_ipc snd_soc_sst_dsp snd_hda_ext_core snd_soc_sst_match pcbc
> snd_soc_core snd_compress ac97_bus snd_pcm_dmaengine snd_hda_intel
> snd_hda_codec
>   Aug 19 22:40:51 zack kernel: [ 4645.749429]  snd_hda_core iwlmvm
> aesni_intel snd_hwdep mac80211 aes_x86_64 crypto_simd glue_helper cryptd
> snd_pcm intel_cstate intel_rapl_perf snd_seq_midi snd_seq_midi_event
> hid_sensor_accel_3d snd_rawmidi iwlwifi snd_seq hid_sensor_trigger
> snd_seq_device industrialio_triggered_buffer snd_timer kfifo_buf cfg80211
> hid_sensor_iio_common snd rtsx_pci_ms input_leds hid_multitouch soundcore
> memstick serio_raw mei_me shpchp btusb mei btrtl intel_pch_thermal
> toshiba_acpi sparse_keymap industrialio wmi ucsi toshiba_bluetooth hci_uart
> btbcm btqca btintel bluetooth intel_lpss_acpi intel_lpss acpi_pad mac_hid
> kvm_intel kvm irqbypass parport_pc ppdev lp parport autofs4
> hid_sensor_custom hid_sensor_hub usbhid rtsx_pci_sdmmc i915 i2c_algo_bit
> drm_kms_helper syscopyarea sysfillrect psmouse sysimgblt fb_sys_fops
>   Aug 19 22:40:51 zack kernel: [ 4645.749455]  drm ahci rtsx_pci libahci
> pinctrl_sunrisepoint pinctrl_intel i2c_hid video hid fjes
>   Aug 19 22:40:51 zack kernel: [ 4645.749460] CPU: 2 PID: 1259 Comm:
> wpa_supplicant Tainted: G        W       4.10.0-32-generic
> #36~16.04.1-Ubuntu
>   Aug 19 22:40:51 zack kernel: [ 4645.749461] Hardware name: TOSHIBA
> Satellite P55W-C/0693, BIOS 1.20 10/07/2015
>   Aug 19 22:40:51 zack kernel: [ 4645.749461] Call Trace:
>   Aug 19 22:40:51 zack kernel: [ 4645.749465]  dump_stack+0x63/0x90
>   Aug 19 22:40:51 zack kernel: [ 4645.749467]  __warn+0xcb/0xf0
>   Aug 19 22:40:51 zack kernel: [ 4645.749468]  warn_slowpath_null+0x1d/0x20
>   Aug 19 22:40:51 zack kernel: [ 4645.749473]  iwl_mvm_rm_sta+0x3ea/0x460
> [iwlmvm]
>   Aug 19 22:40:51 zack kernel: [ 4645.749477]  
> iwl_mvm_mac_sta_state+0x40a/0x600
> [iwlmvm]
>   Aug 19 22:40:51 zack kernel: [ 4645.749490]  drv_sta_state+0x8a/0x460
> [mac80211]
>   Aug 19 22:40:51 zack kernel: [ 4645.749498]  
> __sta_info_destroy_part2+0x17a/0x1b0
> [mac80211]
>   Aug 19 22:40:51 zack kernel: [ 4645.749506]
> __sta_info_flush+0x103/0x1b0 [mac80211]
>   Aug 19 22:40:51 zack kernel: [ 4645.749518]  
> ieee80211_set_disassoc+0xba/0x3f0
> [mac80211]
>   Aug 19 22:40:51 zack kernel: [ 4645.749530]
> ieee80211_mgd_auth+0x26c/0x3c0 [mac80211]
>   Aug 19 22:40:51 zack kernel: [ 4645.749543]  ?
> cfg80211_get_bss+0x1c5/0x2d0 [cfg80211]
>   Aug 19 22:40:51 zack kernel: [ 4645.749553]  ieee80211_auth+0x18/0x20
> [mac80211]
>   Aug 19 22:40:51 zack kernel: [ 4645.749563]
> cfg80211_mlme_auth+0x101/0x210 [cfg80211]
>   Aug 19 22:40:51 zack kernel: [ 4645.749571]  
> nl80211_authenticate+0x30b/0x370
> [cfg80211]
>   Aug 19 22:40:51 zack kernel: [ 4645.749581]  genl_family_rcv_msg+0x1db/
> 0x3b0
>   Aug 19 22:40:51 zack kernel: [ 4645.749582]  genl_rcv_msg+0x59/0xa0
>   Aug 19 22:40:51 zack kernel: [ 4645.749583]  ? genl_notify+0x80/0x80
>   Aug 19 22:40:51 zack kernel: [ 4645.749584]  netlink_rcv_skb+0xa4/0xc0
>   Aug 19 22:40:51 zack kernel: [ 4645.749585]  genl_rcv+0x28/0x40
>   Aug 19 22:40:51 zack kernel: [ 4645.749586]  netlink_unicast+0x18c/0x240
>   Aug 19 22:40:51 zack kernel: [ 4645.749588]  netlink_sendmsg+0x2fb/0x3a0
>   Aug 19 22:40:51 zack kernel: [ 4645.749590]  ?
> aa_sock_msg_perm+0x61/0x150
>   Aug 19 22:40:51 zack kernel: [ 4645.749592]  sock_sendmsg+0x38/0x50
>   Aug 19 22:40:51 zack kernel: [ 4645.749593]  ___sys_sendmsg+0x2c2/0x2d0
>   Aug 19 22:40:51 zack kernel: [ 4645.749594]  ? destroy_inode+0x3b/0x60
>   Aug 19 22:40:51 zack kernel: [ 4645.749595]  ? evict+0x136/0x1a0
>   Aug 19 22:40:51 zack kernel: [ 4645.749597]  ? iput+0x1bb/0x240
>   Aug 19 22:40:51 zack kernel: [ 4645.749598]  ? __dentry_kill+0x110/0x160
>   Aug 19 22:40:51 zack kernel: [ 4645.749598]  ? dput+0x214/0x250
>   Aug 19 22:40:51 zack kernel: [ 4645.749600]  ? mntput+0x24/0x40
>   Aug 19 22:40:51 zack kernel: [ 4645.749601]  ? __fput+0x190/0x220
>   Aug 19 22:40:51 zack kernel: [ 4645.749603]  __sys_sendmsg+0x54/0x90
>   Aug 19 22:40:51 zack kernel: [ 4645.749604]  SyS_sendmsg+0x12/0x20
>   Aug 19 22:40:51 zack kernel: [ 4645.749606]  entry_SYSCALL_64_fastpath+
> 0x1e/0xad
>   Aug 19 22:40:51 zack kernel: [ 4645.749607] RIP: 0033:0x7fd1941ad450
>   Aug 19 22:40:51 zack kernel: [ 4645.749608] RSP: 002b:00007ffdd7156da8
> EFLAGS: 00000246 ORIG_RAX: 000000000000002e
>   Aug 19 22:40:51 zack kernel: [ 4645.749609] RAX: ffffffffffffffda RBX:
> 0000000000000004 RCX: 00007fd1941ad450
>   Aug 19 22:40:51 zack kernel: [ 4645.749609] RDX: 0000000000000000 RSI:
> 00007ffdd7156e30 RDI: 0000000000000007
>   Aug 19 22:40:51 zack kernel: [ 4645.749610] RBP: 000055ed3cc6e84c R08:
> 0000000000000000 R09: 000000000000008c
>   Aug 19 22:40:51 zack kernel: [ 4645.749610] R10: 0000000000001000 R11:
> 0000000000000246 R12: 000055ed3cc6e84c
>   Aug 19 22:40:51 zack kernel: [ 4645.749611] R13: 000055ed3cc716e0 R14:
> 0000000000000000 R15: 0000000000000000
>   Aug 19 22:40:51 zack kernel: [ 4645.749612] ---[ end trace
> e05d38b0c933b143 ]---
>   Aug 19 22:40:51 zack kernel: [ 4645.753800] wlp1s0: authenticate with
> a4:2b:b0:e9:c2:8c
>   Aug 19 22:40:51 zack kernel: [ 4645.758951] wlp1s0: send auth to
> a4:2b:b0:e9:c2:8c (try 1/3)
>   Aug 19 22:40:51 zack kernel: [ 4645.761210] wlp1s0: authenticated
>   Aug 19 22:40:51 zack kernel: [ 4645.762524] wlp1s0: associate with
> a4:2b:b0:e9:c2:8c (try 1/3)
>   Aug 19 22:40:51 zack kernel: [ 4645.763441] wlp1s0: RX AssocResp from
> a4:2b:b0:e9:c2:8c (capab=0x1011 status=0 aid=3)
>   Aug 19 22:40:51 zack kernel: [ 4645.764626] wlp1s0: associated
>   Aug 19 22:40:51 zack NetworkManager[1024]: <info>  [1503196851.2235]
> device (wlp1s0): supplicant interface state: completed -> authenticating
>   Aug 19 22:40:51 zack NetworkManager[1024]: <info>  [1503196851.2435]
> device (wlp1s0): supplicant interface state: authenticating -> associated
>   Aug 19 22:40:51 zack NetworkManager[1024]: <info>  [1503196851.2703]
> device (wlp1s0): supplicant interface state: associated -> 4-way handshake
>   Aug 19 22:40:51 zack NetworkManager[1024]: <info>  [1503196851.2703]
> device (wlp1s0): supplicant interface state: 4-way handshake -> completed
>   ```
>
> To manage notifications about this bug go to:
> https://bugs.launchpad.net/ubuntu/+source/linux/+bug/
> 1711877/+subscriptions
>

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1711877

Title:
  possible connectivity bug?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1711877/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to