Ok I will try the upstream kernel and then report back any findings
On Mon, Aug 21, 2017 at 4:41 PM, Joseph Salisbury < joseph.salisb...@canonical.com> wrote: > Did this issue start happening after an update/upgrade? Was there a > prior kernel version where you were not having this particular problem? > > Would it be possible for you to test the latest upstream kernel? Refer > to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest > v4.13 kernel[0]. > > If this bug is fixed in the mainline kernel, please add the following > tag 'kernel-fixed-upstream'. > > If the mainline kernel does not fix this bug, please add the tag: > 'kernel-bug-exists-upstream'. > > Once testing of the upstream kernel is complete, please mark this bug as > "Confirmed". > > > Thanks in advance. > > [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.13-rc6 > > ** Changed in: linux (Ubuntu) > Importance: Undecided => Medium > > -- > You received this bug notification because you are subscribed to the bug > report. > https://bugs.launchpad.net/bugs/1711877 > > Title: > possible connectivity bug? > > Status in linux package in Ubuntu: > Incomplete > > Bug description: > having some connectivity issues and found this message repeating in > the kern.log thought it might be worth reporting. > > ``` > ug 19 22:40:51 zack kernel: [ 4645.749394] ------------[ cut here > ]------------ > Aug 19 22:40:51 zack kernel: [ 4645.749405] WARNING: CPU: 2 PID: 1259 at > /build/linux-hwe-CXNcgz/linux-hwe-4.10.0/drivers/net/ > wireless/intel/iwlwifi/mvm/sta.c:1523 iwl_mvm_rm_sta+0x3ea/0x460 [iwlmvm] > Aug 19 22:40:51 zack kernel: [ 4645.749406] Modules linked in: ccm > rfcomm xt_CHECKSUM iptable_mangle ipt_REJECT nf_reject_ipv4 xt_tcpudp > ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netlink nfnetlink > xfrm_user xfrm_algo iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 > nf_nat_ipv4 xt_addrtype xt_conntrack nf_nat nf_conntrack libcrc32c > br_netfilter bridge stp llc aufs ebtable_filter ebtables ip6table_filter > ip6_tables iptable_filter ip_tables x_tables bnep snd_hda_codec_hdmi > snd_hda_codec_realtek snd_hda_codec_generic nls_iso8859_1 joydev arc4 > intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp crct10dif_pclmul > crc32_pclmul snd_soc_skl snd_soc_skl_ipc ghash_clmulni_intel > snd_soc_sst_ipc snd_soc_sst_dsp snd_hda_ext_core snd_soc_sst_match pcbc > snd_soc_core snd_compress ac97_bus snd_pcm_dmaengine snd_hda_intel > snd_hda_codec > Aug 19 22:40:51 zack kernel: [ 4645.749429] snd_hda_core iwlmvm > aesni_intel snd_hwdep mac80211 aes_x86_64 crypto_simd glue_helper cryptd > snd_pcm intel_cstate intel_rapl_perf snd_seq_midi snd_seq_midi_event > hid_sensor_accel_3d snd_rawmidi iwlwifi snd_seq hid_sensor_trigger > snd_seq_device industrialio_triggered_buffer snd_timer kfifo_buf cfg80211 > hid_sensor_iio_common snd rtsx_pci_ms input_leds hid_multitouch soundcore > memstick serio_raw mei_me shpchp btusb mei btrtl intel_pch_thermal > toshiba_acpi sparse_keymap industrialio wmi ucsi toshiba_bluetooth hci_uart > btbcm btqca btintel bluetooth intel_lpss_acpi intel_lpss acpi_pad mac_hid > kvm_intel kvm irqbypass parport_pc ppdev lp parport autofs4 > hid_sensor_custom hid_sensor_hub usbhid rtsx_pci_sdmmc i915 i2c_algo_bit > drm_kms_helper syscopyarea sysfillrect psmouse sysimgblt fb_sys_fops > Aug 19 22:40:51 zack kernel: [ 4645.749455] drm ahci rtsx_pci libahci > pinctrl_sunrisepoint pinctrl_intel i2c_hid video hid fjes > Aug 19 22:40:51 zack kernel: [ 4645.749460] CPU: 2 PID: 1259 Comm: > wpa_supplicant Tainted: G W 4.10.0-32-generic > #36~16.04.1-Ubuntu > Aug 19 22:40:51 zack kernel: [ 4645.749461] Hardware name: TOSHIBA > Satellite P55W-C/0693, BIOS 1.20 10/07/2015 > Aug 19 22:40:51 zack kernel: [ 4645.749461] Call Trace: > Aug 19 22:40:51 zack kernel: [ 4645.749465] dump_stack+0x63/0x90 > Aug 19 22:40:51 zack kernel: [ 4645.749467] __warn+0xcb/0xf0 > Aug 19 22:40:51 zack kernel: [ 4645.749468] warn_slowpath_null+0x1d/0x20 > Aug 19 22:40:51 zack kernel: [ 4645.749473] iwl_mvm_rm_sta+0x3ea/0x460 > [iwlmvm] > Aug 19 22:40:51 zack kernel: [ 4645.749477] > iwl_mvm_mac_sta_state+0x40a/0x600 > [iwlmvm] > Aug 19 22:40:51 zack kernel: [ 4645.749490] drv_sta_state+0x8a/0x460 > [mac80211] > Aug 19 22:40:51 zack kernel: [ 4645.749498] > __sta_info_destroy_part2+0x17a/0x1b0 > [mac80211] > Aug 19 22:40:51 zack kernel: [ 4645.749506] > __sta_info_flush+0x103/0x1b0 [mac80211] > Aug 19 22:40:51 zack kernel: [ 4645.749518] > ieee80211_set_disassoc+0xba/0x3f0 > [mac80211] > Aug 19 22:40:51 zack kernel: [ 4645.749530] > ieee80211_mgd_auth+0x26c/0x3c0 [mac80211] > Aug 19 22:40:51 zack kernel: [ 4645.749543] ? > cfg80211_get_bss+0x1c5/0x2d0 [cfg80211] > Aug 19 22:40:51 zack kernel: [ 4645.749553] ieee80211_auth+0x18/0x20 > [mac80211] > Aug 19 22:40:51 zack kernel: [ 4645.749563] > cfg80211_mlme_auth+0x101/0x210 [cfg80211] > Aug 19 22:40:51 zack kernel: [ 4645.749571] > nl80211_authenticate+0x30b/0x370 > [cfg80211] > Aug 19 22:40:51 zack kernel: [ 4645.749581] genl_family_rcv_msg+0x1db/ > 0x3b0 > Aug 19 22:40:51 zack kernel: [ 4645.749582] genl_rcv_msg+0x59/0xa0 > Aug 19 22:40:51 zack kernel: [ 4645.749583] ? genl_notify+0x80/0x80 > Aug 19 22:40:51 zack kernel: [ 4645.749584] netlink_rcv_skb+0xa4/0xc0 > Aug 19 22:40:51 zack kernel: [ 4645.749585] genl_rcv+0x28/0x40 > Aug 19 22:40:51 zack kernel: [ 4645.749586] netlink_unicast+0x18c/0x240 > Aug 19 22:40:51 zack kernel: [ 4645.749588] netlink_sendmsg+0x2fb/0x3a0 > Aug 19 22:40:51 zack kernel: [ 4645.749590] ? > aa_sock_msg_perm+0x61/0x150 > Aug 19 22:40:51 zack kernel: [ 4645.749592] sock_sendmsg+0x38/0x50 > Aug 19 22:40:51 zack kernel: [ 4645.749593] ___sys_sendmsg+0x2c2/0x2d0 > Aug 19 22:40:51 zack kernel: [ 4645.749594] ? destroy_inode+0x3b/0x60 > Aug 19 22:40:51 zack kernel: [ 4645.749595] ? evict+0x136/0x1a0 > Aug 19 22:40:51 zack kernel: [ 4645.749597] ? iput+0x1bb/0x240 > Aug 19 22:40:51 zack kernel: [ 4645.749598] ? __dentry_kill+0x110/0x160 > Aug 19 22:40:51 zack kernel: [ 4645.749598] ? dput+0x214/0x250 > Aug 19 22:40:51 zack kernel: [ 4645.749600] ? mntput+0x24/0x40 > Aug 19 22:40:51 zack kernel: [ 4645.749601] ? __fput+0x190/0x220 > Aug 19 22:40:51 zack kernel: [ 4645.749603] __sys_sendmsg+0x54/0x90 > Aug 19 22:40:51 zack kernel: [ 4645.749604] SyS_sendmsg+0x12/0x20 > Aug 19 22:40:51 zack kernel: [ 4645.749606] entry_SYSCALL_64_fastpath+ > 0x1e/0xad > Aug 19 22:40:51 zack kernel: [ 4645.749607] RIP: 0033:0x7fd1941ad450 > Aug 19 22:40:51 zack kernel: [ 4645.749608] RSP: 002b:00007ffdd7156da8 > EFLAGS: 00000246 ORIG_RAX: 000000000000002e > Aug 19 22:40:51 zack kernel: [ 4645.749609] RAX: ffffffffffffffda RBX: > 0000000000000004 RCX: 00007fd1941ad450 > Aug 19 22:40:51 zack kernel: [ 4645.749609] RDX: 0000000000000000 RSI: > 00007ffdd7156e30 RDI: 0000000000000007 > Aug 19 22:40:51 zack kernel: [ 4645.749610] RBP: 000055ed3cc6e84c R08: > 0000000000000000 R09: 000000000000008c > Aug 19 22:40:51 zack kernel: [ 4645.749610] R10: 0000000000001000 R11: > 0000000000000246 R12: 000055ed3cc6e84c > Aug 19 22:40:51 zack kernel: [ 4645.749611] R13: 000055ed3cc716e0 R14: > 0000000000000000 R15: 0000000000000000 > Aug 19 22:40:51 zack kernel: [ 4645.749612] ---[ end trace > e05d38b0c933b143 ]--- > Aug 19 22:40:51 zack kernel: [ 4645.753800] wlp1s0: authenticate with > a4:2b:b0:e9:c2:8c > Aug 19 22:40:51 zack kernel: [ 4645.758951] wlp1s0: send auth to > a4:2b:b0:e9:c2:8c (try 1/3) > Aug 19 22:40:51 zack kernel: [ 4645.761210] wlp1s0: authenticated > Aug 19 22:40:51 zack kernel: [ 4645.762524] wlp1s0: associate with > a4:2b:b0:e9:c2:8c (try 1/3) > Aug 19 22:40:51 zack kernel: [ 4645.763441] wlp1s0: RX AssocResp from > a4:2b:b0:e9:c2:8c (capab=0x1011 status=0 aid=3) > Aug 19 22:40:51 zack kernel: [ 4645.764626] wlp1s0: associated > Aug 19 22:40:51 zack NetworkManager[1024]: <info> [1503196851.2235] > device (wlp1s0): supplicant interface state: completed -> authenticating > Aug 19 22:40:51 zack NetworkManager[1024]: <info> [1503196851.2435] > device (wlp1s0): supplicant interface state: authenticating -> associated > Aug 19 22:40:51 zack NetworkManager[1024]: <info> [1503196851.2703] > device (wlp1s0): supplicant interface state: associated -> 4-way handshake > Aug 19 22:40:51 zack NetworkManager[1024]: <info> [1503196851.2703] > device (wlp1s0): supplicant interface state: 4-way handshake -> completed > ``` > > To manage notifications about this bug go to: > https://bugs.launchpad.net/ubuntu/+source/linux/+bug/ > 1711877/+subscriptions > -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1711877 Title: possible connectivity bug? To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1711877/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs