[Kernel-packages] [Bug 1950778] Re: Ubuntu 20.04.3 generates IO error message during FIO stress.

2022-06-10 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1950778

Title:
  Ubuntu 20.04.3 generates IO error message during FIO stress.

Status in linux package in Ubuntu:
  Expired

Bug description:
  With fio stress on Powerstore fcoe drives (lun) attached by using
  Qlogic QL41000 series controller, ubuntu 20.04.3 on MX740c blade
  server generates below mentioned i/o errors.

  Nov 11 20:25:17 e2e-l10-058234 kernel: 
[:3b:00.3]:[qedf_process_error_detect:1523]:13: Error detection CQE, 
xid=0x7bd
  Nov 11 20:25:17 e2e-l10-058234 kernel: 
[:3b:00.3]:[qedf_process_error_detect:1525]:13: 
err_warn_bitmap=0040:
  Nov 11 20:25:17 e2e-l10-058234 kernel: 
[:3b:00.3]:[qedf_process_error_detect:1529]:13: tx_buff_off=, 
rx_buff_off=, rx_id=041b
  Nov 11 20:25:19 e2e-l10-058234 kernel: 
[:3b:00.2]:[qedf_process_error_detect:1523]:3: Error detection CQE, 
xid=0x34d
  Nov 11 20:25:19 e2e-l10-058234 kernel: 
[:3b:00.2]:[qedf_process_error_detect:1525]:3: 
err_warn_bitmap=0040:
  Nov 11 20:25:19 e2e-l10-058234 kernel: 
[:3b:00.2]:[qedf_process_error_detect:1529]:3: tx_buff_off=, 
rx_buff_off=, rx_id=01f7

  Steps to reproduce.
  1. Configure QL41000 series controller on MX MX740c blade server.
  2. Configure APM3246 array directly connected to chassis module MX9116n.  
  3. Install Ubuntu 20.04.3 in any local drive.
  4. start I/O by using fio : # fio FileSystemCreateSingle/fio_test.cfg
  then we can observe error message in syslog

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1950778/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1968255] Re: Sudden, unexpected restart of the whole system. Reporting after automatic restart

2022-06-10 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1968255

Title:
  Sudden, unexpected restart of the whole system. Reporting after
  automatic restart

Status in linux package in Ubuntu:
  Expired

Bug description:
  Using browser the system just stopped and restarted. Browser hardware
  acceleration option was on.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: gnome-shell 42.0-1ubuntu1
  ProcVersionSignature: Ubuntu 5.15.0-25.25-generic 5.15.30
  Uname: Linux 5.15.0-25-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.20.11-0ubuntu80
  Architecture: amd64
  CasperMD5CheckResult: unknown
  CurrentDesktop: ubuntu:GNOME
  Date: Fri Apr  8 07:25:13 2022
  DisplayManager: gdm3
  InstallationDate: Installed on 2018-08-02 (1344 days ago)
  InstallationMedia: Ubuntu 18.04 LTS "Bionic Beaver" - Release amd64 (20180426)
  RelatedPackageVersions: mutter-common 42.0-1ubuntu1
  SourcePackage: gnome-shell
  UpgradeStatus: Upgraded to jammy on 2022-04-07 (0 days ago)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1968255/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1969482] Re: zfs-2.1.4+ sru

2022-06-10 Thread David Griffin
I can also confirm that the fixes in -proposed fixes some severe
performance issues on my system, with an encrypted ZFS root filesystem.

It should be noted that if you're using ZFS on an Intel machine with < 4
physical cores, these performance regressions are severe enough to cause
the entire machine to noticeably stutter and freeze when the disk is
accessed - so this is a fairly serious performance regression for a lot
of laptop users!

I think the reason why it's so severe on this configuration is due to
ZFS read/write spawning 4 tasks, which have a niceness of -20 causing
the userspace to be starved (and perhaps security mitigations
stopping/hindering the userspace from using hyperthreading).

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1969482

Title:
  zfs-2.1.4+ sru

Status in zfs-linux package in Ubuntu:
  Fix Released
Status in zfs-linux source package in Jammy:
  Fix Committed

Bug description:
  [Impact]

   * Upstream stable point release update with bugfixes, performance
  fixes, and newer kernel support as needed already in the OEM kernel
  and will be needed in the future HWE kernels.

  [Test Plan]

   * autopkgtest pass

   * kernel regression zfs testsuite pass

   * zsys integration test pass

  [Where problems could occur]

   * The stable branches maintain api/abi. Certain bugfixes do change
  userspace visible behavior of either succeeeding (when previously
  operations failed), or return errors when previously succeeding in
  error. For example there are changes when unlinking files in full
  volumes; changes to fallocate behaviour, etc. Overall they are minor
  corner cases, and bugfixes to correct the bahaviour to what is
  universally expected and how things behave on other filesystems (i.e.
  ext4).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1969482/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1978359] Status changed to Confirmed

2022-06-10 Thread Ubuntu Kernel Bot
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978359

Title:
  boot kernel errors

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Jun 10 23:34:40 luke kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_PR.PR00._CPC], AE_NOT_FOUND (20210730/psargs-330)
  Jun 10 23:34:40 luke kernel: fbcon: Taking over console
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: No Local Variables are initialized for Method 
[_CPC]
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: No Arguments are initialized for method [_CPC]
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: ACPI Error: Aborting method \_PR.PR01._CPC due 
to previous error (AE_NOT_FOUND) (20210730/psparse-529)
  Jun 10 23:34:40 luke kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_PR.PR00._CPC], AE_NOT_FOUND (20210730/psargs-330)
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: No Local Variables are initialized for Method 
[_CPC]
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: No Arguments are initialized for method [_CPC]
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: ACPI Error: Aborting method \_PR.PR02._CPC due 
to previous error (AE_NOT_FOUND) (20210730/psparse-529)
  Jun 10 23:34:40 luke kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_PR.PR00._CPC], AE_NOT_FOUND (20210730/psargs-330)
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: No Local Variables are initialized for Method 
[_CPC]
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: No Arguments are initialized for method [_CPC]
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: ACPI Error: Aborting method \_PR.PR03._CPC due 
to previous error (AE_NOT_FOUND) (20210730/psparse-529)
  Jun 10 23:34:40 luke kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_PR.PR00._CPC], AE_NOT_FOUND (20210730/psargs-330)
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: No Local Variables are initialized for Method 
[_CPC]
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: No Arguments are initialized for method [_CPC]
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: ACPI Error: Aborting method \_PR.PR04._CPC due 
to previous error (AE_NOT_FOUND) (20210730/psparse-529)
  Jun 10 23:34:40 luke kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_PR.PR00._CPC], AE_NOT_FOUND (20210730/psargs-330)
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: No Local Variables are initialized for Method 
[_CPC]
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: No Arguments are initialized for method [_CPC]
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: ACPI Error: Aborting method \_PR.PR05._CPC due 
to previous error (AE_NOT_FOUND) (20210730/psparse-529)
  Jun 10 23:34:40 luke kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_PR.PR00._CPC], AE_NOT_FOUND (20210730/psargs-330)
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: No Local Variables are initialized for Method 
[_CPC]
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: No Arguments are initialized for method [_CPC]
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: ACPI Error: Aborting method \_PR.PR06._CPC due 
to previous error (AE_NOT_FOUND) (20210730/psparse-529)
  Jun 10 23:34:40 luke kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_PR.PR00._CPC], AE_NOT_FOUND (20210730/psargs-330)
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: No Local Variables are initialized for Method 
[_CPC]
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: No Arguments are initialized for method [_CPC]
  Jun 10 23:34:40 luke kernel: 
  Jun 10 23:34:40 luke kernel: ACPI Error: Aborting method \_PR.PR07._CPC due 
to previous error (AE_NOT_FOUND) (20210730/psparse-529)

  This happens while booting a newer kernel than the gm kernel (-25) 
  bug is reported here and a fix already posted 
https://github.com/intel/linux-intel-lts/issues/22

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: linux-image-5.15.0-37-generic 5.15.0-37.39
  ProcVersionSignature: Ubuntu 5.15.0-37.39-generic 5.15.35
  Uname: Linux 5.15.0-37-generic x86_64
  NonfreeKernelModules: zfs zunicode zcommon znvpair zavl icp
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  alorenz1772 F pulseaudio
   /dev/snd/pcmC0D0p:   alorenz1772 F...m pulseaudio
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Fri Jun 10 23:45:45 2022
  InstallationDate: Installed on 2022-06-06 (4 days ago)
  InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Release 

[Kernel-packages] [Bug 1978359] [NEW] boot kernel errors

2022-06-10 Thread Kane Foss
Public bug reported:

Jun 10 23:34:40 luke kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_PR.PR00._CPC], AE_NOT_FOUND (20210730/psargs-330)
Jun 10 23:34:40 luke kernel: fbcon: Taking over console
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: No Local Variables are initialized for Method 
[_CPC]
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: No Arguments are initialized for method [_CPC]
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: ACPI Error: Aborting method \_PR.PR01._CPC due to 
previous error (AE_NOT_FOUND) (20210730/psparse-529)
Jun 10 23:34:40 luke kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_PR.PR00._CPC], AE_NOT_FOUND (20210730/psargs-330)
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: No Local Variables are initialized for Method 
[_CPC]
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: No Arguments are initialized for method [_CPC]
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: ACPI Error: Aborting method \_PR.PR02._CPC due to 
previous error (AE_NOT_FOUND) (20210730/psparse-529)
Jun 10 23:34:40 luke kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_PR.PR00._CPC], AE_NOT_FOUND (20210730/psargs-330)
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: No Local Variables are initialized for Method 
[_CPC]
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: No Arguments are initialized for method [_CPC]
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: ACPI Error: Aborting method \_PR.PR03._CPC due to 
previous error (AE_NOT_FOUND) (20210730/psparse-529)
Jun 10 23:34:40 luke kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_PR.PR00._CPC], AE_NOT_FOUND (20210730/psargs-330)
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: No Local Variables are initialized for Method 
[_CPC]
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: No Arguments are initialized for method [_CPC]
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: ACPI Error: Aborting method \_PR.PR04._CPC due to 
previous error (AE_NOT_FOUND) (20210730/psparse-529)
Jun 10 23:34:40 luke kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_PR.PR00._CPC], AE_NOT_FOUND (20210730/psargs-330)
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: No Local Variables are initialized for Method 
[_CPC]
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: No Arguments are initialized for method [_CPC]
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: ACPI Error: Aborting method \_PR.PR05._CPC due to 
previous error (AE_NOT_FOUND) (20210730/psparse-529)
Jun 10 23:34:40 luke kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_PR.PR00._CPC], AE_NOT_FOUND (20210730/psargs-330)
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: No Local Variables are initialized for Method 
[_CPC]
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: No Arguments are initialized for method [_CPC]
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: ACPI Error: Aborting method \_PR.PR06._CPC due to 
previous error (AE_NOT_FOUND) (20210730/psparse-529)
Jun 10 23:34:40 luke kernel: ACPI BIOS Error (bug): Could not resolve symbol 
[\_PR.PR00._CPC], AE_NOT_FOUND (20210730/psargs-330)
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: No Local Variables are initialized for Method 
[_CPC]
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: No Arguments are initialized for method [_CPC]
Jun 10 23:34:40 luke kernel: 
Jun 10 23:34:40 luke kernel: ACPI Error: Aborting method \_PR.PR07._CPC due to 
previous error (AE_NOT_FOUND) (20210730/psparse-529)

This happens while booting a newer kernel than the gm kernel (-25) 
bug is reported here and a fix already posted 
https://github.com/intel/linux-intel-lts/issues/22

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: linux-image-5.15.0-37-generic 5.15.0-37.39
ProcVersionSignature: Ubuntu 5.15.0-37.39-generic 5.15.35
Uname: Linux 5.15.0-37-generic x86_64
NonfreeKernelModules: zfs zunicode zcommon znvpair zavl icp
ApportVersion: 2.20.11-0ubuntu82.1
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC0:  alorenz1772 F pulseaudio
 /dev/snd/pcmC0D0p:   alorenz1772 F...m pulseaudio
CRDA: N/A
CasperMD5CheckResult: pass
CurrentDesktop: ubuntu:GNOME
Date: Fri Jun 10 23:45:45 2022
InstallationDate: Installed on 2022-06-06 (4 days ago)
InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 (20220419)
Lsusb:
 Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
 Bus 001 Device 003: ID 0bda:568c Realtek Semiconductor Corp. Integrated Webcam 
HD
 Bus 001 Device 002: ID 275d:0ba6  USB OPTICAL MOUSE 
 Bus 001 Device 005: ID 0a5c:5832 Broadcom Corp. 5880
 Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
MachineType: Dell Inc. Latitude 5490
ProcFB: 0 i915drmfb
ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.15.0-37-generic 

[Kernel-packages] [Bug 1978347] Status changed to Confirmed

2022-06-10 Thread Ubuntu Kernel Bot
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978347

Title:
  horrible IO degradation with encrypted zfs root on kernels past
  5.15.0-27

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  IO on encrypted zfs root has fallen off a cliff in kernel versions
  after 5.15.0-27 (the degradation is observed since version 5.15.0-30,
  also seen on -33 and -37, -25 and -27 work like a charm). Heavy usage
  almost hangs a new laptop (building large singularity images or
  synthetic testing with dd).

  I have confirmed that things are working as expected on a default +
  upgraded Ubuntu 22.04 desktop LVM+LUKS installation using another NVMe
  SSD on the same laptop. There seems to be a regression when using the
  native zfs encryption (did aes-ni acceleration get turned off?)

  How to reproduce:

  - install ubuntu 22.04 desktop from iso, don't install web updates, check use 
zfs and encryption
  - sudo apt update && apt install dstat htop
  - create a dataset with compression disabled so that dd actually writes 
things to disk

  * sudo zfs create rpool/dummy
  * sudo zfs set compress=off rpool/dummy
  * sudo chown -R myusername. /dummy

  - start dstat and htop in the background (show kernel threads in the htop 
config)
  - dd if=/dev/zero of=/dummy/bigfile bs=1M count=16384

  - sudo apt upgradeand reboot on the latest kernel, repeat

  Expected: some cpu load, dstat reports write speeds about as much as
  the SSD can sustain (2.9-3GiB/s with a 2TiB Samsung 970 EVO Plus for a
  16GiB write test, 1.4GiB/s for a few seconds then 800MiB/s sustained
  for whatever WD 512GiB model I had laying around).

  Observed on versions -30 and later: 700% or more system cpu load,
  mostly in z_wr_iss threads, writes top at around 150-180MiB/s, the
  system becomes somewhat unresponsive. Reads are also not good but I
  have not benchmarked. Booting the system and launching apps seems
  about normal due to the low IO load.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: linux-image-5.15.0-37-generic 5.15.0-37.39
  ProcVersionSignature: Ubuntu 5.15.0-37.39-generic 5.15.35
  Uname: Linux 5.15.0-37-generic x86_64
  NonfreeKernelModules: zfs zunicode zcommon znvpair zavl icp
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  laperlej   4100 F pulseaudio
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Fri Jun 10 15:52:12 2022
  HibernationDevice: RESUME=none
  InstallationDate: Installed on 2022-05-10 (31 days ago)
  InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 
(20220419)
  MachineType: HP HP EliteBook 850 G8 Notebook PC
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/BOOT/ubuntu_rgwvzq@/vmlinuz-5.15.0-37-generic 
root=ZFS=rpool/ROOT/ubuntu_rgwvzq ro quiet splash vt.handoff=1
  RelatedPackageVersions:
   linux-restricted-modules-5.15.0-37-generic N/A
   linux-backports-modules-5.15.0-37-generic  N/A
   linux-firmware 20220329.git681281e4-0ubuntu3.2
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 01/11/2022
  dmi.bios.release: 8.0
  dmi.bios.vendor: HP
  dmi.bios.version: T76 Ver. 01.08.00
  dmi.board.name: 8846
  dmi.board.vendor: HP
  dmi.board.version: KBC Version 30.37.00
  dmi.chassis.type: 10
  dmi.chassis.vendor: HP
  dmi.ec.firmware.release: 48.55
  dmi.modalias: 
dmi:bvnHP:bvrT76Ver.01.08.00:bd01/11/2022:br8.0:efr48.55:svnHP:pnHPEliteBook850G8NotebookPC:pvr:rvnHP:rn8846:rvrKBCVersion30.37.00:cvnHP:ct10:cvr:sku4V1S3UP#ABL:
  dmi.product.family: 103C_5336AN HP EliteBook
  dmi.product.name: HP EliteBook 850 G8 Notebook PC
  dmi.product.sku: 4V1S3UP#ABL
  dmi.sys.vendor: HP

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1978347/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1978347] [NEW] horrible IO degradation with encrypted zfs root on kernels past 5.15.0-27

2022-06-10 Thread Jean-François
Public bug reported:

IO on encrypted zfs root has fallen off a cliff in kernel versions after
5.15.0-27 (the degradation is observed since version 5.15.0-30, also
seen on -33 and -37, -25 and -27 work like a charm). Heavy usage almost
hangs a new laptop (building large singularity images or synthetic
testing with dd).

I have confirmed that things are working as expected on a default +
upgraded Ubuntu 22.04 desktop LVM+LUKS installation using another NVMe
SSD on the same laptop. There seems to be a regression when using the
native zfs encryption (did aes-ni acceleration get turned off?)

How to reproduce:

- install ubuntu 22.04 desktop from iso, don't install web updates, check use 
zfs and encryption
- sudo apt update && apt install dstat htop
- create a dataset with compression disabled so that dd actually writes things 
to disk

* sudo zfs create rpool/dummy
* sudo zfs set compress=off rpool/dummy
* sudo chown -R myusername. /dummy

- start dstat and htop in the background (show kernel threads in the htop 
config)
- dd if=/dev/zero of=/dummy/bigfile bs=1M count=16384

- sudo apt upgradeand reboot on the latest kernel, repeat

Expected: some cpu load, dstat reports write speeds about as much as the
SSD can sustain (2.9-3GiB/s with a 2TiB Samsung 970 EVO Plus for a 16GiB
write test, 1.4GiB/s for a few seconds then 800MiB/s sustained for
whatever WD 512GiB model I had laying around).

Observed on versions -30 and later: 700% or more system cpu load, mostly
in z_wr_iss threads, writes top at around 150-180MiB/s, the system
becomes somewhat unresponsive. Reads are also not good but I have not
benchmarked. Booting the system and launching apps seems about normal
due to the low IO load.

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: linux-image-5.15.0-37-generic 5.15.0-37.39
ProcVersionSignature: Ubuntu 5.15.0-37.39-generic 5.15.35
Uname: Linux 5.15.0-37-generic x86_64
NonfreeKernelModules: zfs zunicode zcommon znvpair zavl icp
ApportVersion: 2.20.11-0ubuntu82.1
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC0:  laperlej   4100 F pulseaudio
CRDA: N/A
CasperMD5CheckResult: pass
CurrentDesktop: ubuntu:GNOME
Date: Fri Jun 10 15:52:12 2022
HibernationDevice: RESUME=none
InstallationDate: Installed on 2022-05-10 (31 days ago)
InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 (20220419)
MachineType: HP HP EliteBook 850 G8 Notebook PC
ProcFB: 0 i915drmfb
ProcKernelCmdLine: BOOT_IMAGE=/BOOT/ubuntu_rgwvzq@/vmlinuz-5.15.0-37-generic 
root=ZFS=rpool/ROOT/ubuntu_rgwvzq ro quiet splash vt.handoff=1
RelatedPackageVersions:
 linux-restricted-modules-5.15.0-37-generic N/A
 linux-backports-modules-5.15.0-37-generic  N/A
 linux-firmware 20220329.git681281e4-0ubuntu3.2
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 01/11/2022
dmi.bios.release: 8.0
dmi.bios.vendor: HP
dmi.bios.version: T76 Ver. 01.08.00
dmi.board.name: 8846
dmi.board.vendor: HP
dmi.board.version: KBC Version 30.37.00
dmi.chassis.type: 10
dmi.chassis.vendor: HP
dmi.ec.firmware.release: 48.55
dmi.modalias: 
dmi:bvnHP:bvrT76Ver.01.08.00:bd01/11/2022:br8.0:efr48.55:svnHP:pnHPEliteBook850G8NotebookPC:pvr:rvnHP:rn8846:rvrKBCVersion30.37.00:cvnHP:ct10:cvr:sku4V1S3UP#ABL:
dmi.product.family: 103C_5336AN HP EliteBook
dmi.product.name: HP EliteBook 850 G8 Notebook PC
dmi.product.sku: 4V1S3UP#ABL
dmi.sys.vendor: HP

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed


** Tags: amd64 apport-bug jammy wayland-session

** Attachment added: "dmesg-outputs.tar.gz"
   
https://bugs.launchpad.net/bugs/1978347/+attachment/5596539/+files/dmesg-outputs.tar.gz

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978347

Title:
  horrible IO degradation with encrypted zfs root on kernels past
  5.15.0-27

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  IO on encrypted zfs root has fallen off a cliff in kernel versions
  after 5.15.0-27 (the degradation is observed since version 5.15.0-30,
  also seen on -33 and -37, -25 and -27 work like a charm). Heavy usage
  almost hangs a new laptop (building large singularity images or
  synthetic testing with dd).

  I have confirmed that things are working as expected on a default +
  upgraded Ubuntu 22.04 desktop LVM+LUKS installation using another NVMe
  SSD on the same laptop. There seems to be a regression when using the
  native zfs encryption (did aes-ni acceleration get turned off?)

  How to reproduce:

  - install ubuntu 22.04 desktop from iso, don't install web updates, check use 
zfs and encryption
  - sudo apt update && apt install dstat htop
  - create a dataset with compression disabled so that dd actually writes 
things to disk

  * sudo zfs create rpool/dummy
  * sudo zfs set compress=off rpool/dummy
  * sudo chown -R 

[Kernel-packages] [Bug 1958191] Re: [i915] Screen flickering in Ubuntu 22.04 (until i915.enable_dc=0 intel_idle.max_cstate=2 are added)

2022-06-10 Thread Nikolai Kotsifas
I can confirm that 5.18.13 kernel has no flickers and no GRUB workaround
is needed.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1958191

Title:
  [i915] Screen flickering in Ubuntu 22.04 (until i915.enable_dc=0
  intel_idle.max_cstate=2 are added)

Status in linux package in Ubuntu:
  Triaged

Bug description:
  Ubuntu 22.04 development branch on kernel 5.15.0-17-generic @
  18/1/2022

  Booting into desktop gets heavy screen flickering and disforming (unusable)
  both booting on xorg and wayland

  on kernel 5.13 it did not occur so heavy (only little glitches once in
  a while see bug 1948778)

  adding the kernel paramater intel_idle.max_cstate=4 fixed this

  i had these same bugs on this machine before:

  https://bugs.launchpad.net/ubuntu/+source/linux-hwe/+bug/1838644

  https://bugs.launchpad.net/ubuntu/+source/mutter/+bug/1948778

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: linux-image-5.15.0-17-generic 5.15.0-17.17
  ProcVersionSignature: Ubuntu 5.15.0-17.17-generic 5.15.12
  Uname: Linux 5.15.0-17-generic x86_64
  ApportVersion: 2.20.11-0ubuntu75
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  lotuspsychje   1201 F pipewire-media-
lotuspsychje   1207 F pulseaudio
   /dev/snd/seq:lotuspsychje   1193 F pipewire
  CasperMD5CheckResult: unknown
  CurrentDesktop: ubuntu:GNOME
  Date: Tue Jan 18 04:22:00 2022
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 004: ID 8087:0025 Intel Corp. Wireless-AC 9260 Bluetooth 
Adapter
   Bus 001 Device 003: ID 04f2:b59e Chicony Electronics Co., Ltd Chicony USB2.0 
Camera
   Bus 001 Device 002: ID 046d:c534 Logitech, Inc. Unifying Receiver
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: Notebook N7x0WU
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-17-generic 
root=UUID=a41247d1-3bc3-453e-849a-e07fdcca6201 ro quiet splash 
intel_idle.max_cstate=4 vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-5.15.0-17-generic N/A
   linux-backports-modules-5.15.0-17-generic  N/A
   linux-firmware 1.204
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 01/07/2019
  dmi.bios.release: 7.13
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 7.13
  dmi.board.asset.tag: Tag 12345
  dmi.board.name: N7x0WU
  dmi.board.vendor: Notebook
  dmi.board.version: Not Applicable
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: No Enclosure
  dmi.chassis.version: N/A
  dmi.ec.firmware.release: 7.14
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr7.13:bd01/07/2019:br7.13:efr7.14:svnNotebook:pnN7x0WU:pvrNotApplicable:rvnNotebook:rnN7x0WU:rvrNotApplicable:cvnNoEnclosure:ct10:cvrN/A:skuNotApplicable:
  dmi.product.family: Not Applicable
  dmi.product.name: N7x0WU
  dmi.product.sku: Not Applicable
  dmi.product.version: Not Applicable
  dmi.sys.vendor: Notebook

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1958191/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1965927] Re: [Ubuntu 22.04] mpt3sas: Request to include latest bug fix patches

2022-06-10 Thread Jeff Lane 
** Changed in: linux (Ubuntu)
   Status: Expired => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1965927

Title:
  [Ubuntu 22.04] mpt3sas: Request to include latest bug fix patches

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Request to include below mpt3sas driver bug fix patches in Ubuntu
  22.04 kernel. These patches got accepted by the upstream and please
  find the corresponding commit IDs as below,

  5db207d66d mpt3sas: Fix incorrect 4gb boundary check
  ca23ac823c mpt3sas: Remove scsi_dma_map errors messages
  9211faa39a scsi: mpt3sas: Update persistent trigger pages from sysfs interface

  Below is the summary of each of the above bug fix commits,

  1. mpt3sas: Fix incorrect 4gb boundary check:
 Without this patch, driver was checking whether any of it's pool crosses 
the 4gb boundary or not using the pool's virtual address instead of using it's 
dma address. So some time driver may false positively assume that the pool as 
crossed the 4gb boundary region (as it observes that pool's virtual address is 
crossing the 4gb boundary) even though it is really not.

  2. mpt3sas: Remove scsi_dma_map errors messages:
 When driver set the DMA mask to 32bit then we observe that the SWIOTLB 
bounce buffers are getting exhausted quickly. For most of the IOs driver 
observe that scsi_dma_map() API returned with failure status and hence driver 
was printing below error message. Since this error message is getting printed 
per IO and if user issues heavy IOs then we observe that kernel overwhelmed 
with this error message. Also we will observe the kernel panic when the serial 
console is enabled. So to limit this issue, we removed this error message 
though this patch.
  "scsi_dma_map failed: request for 1310720 bytes!"  

  3. mpt3sas: Update persistent trigger pages from sysfs interface:
 When user set's any diag buffer trigger conditions then driver has to save 
these trigger conditions in the controller Firmware's NVRAM region. So that 
when system reboots then driver can get these trigger conditions from 
Firmware's NVRAM region and set these trigger conditions automatically. so that 
user no need to set these conditions again. Without this patch driver was not 
not saving these user provided trigger conditions in the Firmware's NVRAM 
region.   
  
  Please let me if I have missed to add any data.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1965927/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1978333] [NEW] Remove "ata_piix.prefer_ms_hyperv=0" parameter

2022-06-10 Thread Heather Lemon
Public bug reported:

Back-porting a fix from upstream to remove "ata_piix.prefer_ms_hyperv=0"
parameter.

target series - Kinetic-> Bionic

upstream patch

https://salsa.debian.org/debian/kdump-
tools/-/commit/b1bac9396ddbbce3817c34be3161630698e4a503

Thanks!

** Affects: kdump-tools (Ubuntu)
 Importance: Undecided
 Assignee: Heather Lemon (hypothetical-lemon)
 Status: New

** Affects: kdump-tools (Ubuntu Bionic)
 Importance: Undecided
 Assignee: Heather Lemon (hypothetical-lemon)
 Status: New

** Affects: kdump-tools (Ubuntu Focal)
 Importance: Undecided
 Assignee: Heather Lemon (hypothetical-lemon)
 Status: New

** Affects: kdump-tools (Ubuntu Jammy)
 Importance: Undecided
 Assignee: Heather Lemon (hypothetical-lemon)
 Status: New

** Affects: kdump-tools (Ubuntu Kinetic)
 Importance: Undecided
 Assignee: Heather Lemon (hypothetical-lemon)
 Status: New

** Also affects: kdump-tools (Ubuntu Kinetic)
   Importance: Undecided
   Status: New

** Also affects: kdump-tools (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: kdump-tools (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: kdump-tools (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: kdump-tools (Ubuntu Bionic)
 Assignee: (unassigned) => Heather Lemon (hypothetical-lemon)

** Changed in: kdump-tools (Ubuntu Focal)
 Assignee: (unassigned) => Heather Lemon (hypothetical-lemon)

** Changed in: kdump-tools (Ubuntu Jammy)
 Assignee: (unassigned) => Heather Lemon (hypothetical-lemon)

** Changed in: kdump-tools (Ubuntu Kinetic)
 Assignee: (unassigned) => Heather Lemon (hypothetical-lemon)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to kdump-tools in Ubuntu.
Matching subscriptions: Maintainer
https://bugs.launchpad.net/bugs/1978333

Title:
  Remove "ata_piix.prefer_ms_hyperv=0" parameter

Status in kdump-tools package in Ubuntu:
  New
Status in kdump-tools source package in Bionic:
  New
Status in kdump-tools source package in Focal:
  New
Status in kdump-tools source package in Jammy:
  New
Status in kdump-tools source package in Kinetic:
  New

Bug description:
  Back-porting a fix from upstream to remove
  "ata_piix.prefer_ms_hyperv=0" parameter.

  target series - Kinetic-> Bionic

  upstream patch

  https://salsa.debian.org/debian/kdump-
  tools/-/commit/b1bac9396ddbbce3817c34be3161630698e4a503

  Thanks!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kdump-tools/+bug/1978333/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1969482] Re: zfs-2.1.4+ sru

2022-06-10 Thread Harshal Prakash Patankar
I tested this version and it does fix a (severe) performance regression
as mentioned here (#1977699)
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1977699. Would
this be released before 21.10 reaches EOL?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1969482

Title:
  zfs-2.1.4+ sru

Status in zfs-linux package in Ubuntu:
  Fix Released
Status in zfs-linux source package in Jammy:
  Fix Committed

Bug description:
  [Impact]

   * Upstream stable point release update with bugfixes, performance
  fixes, and newer kernel support as needed already in the OEM kernel
  and will be needed in the future HWE kernels.

  [Test Plan]

   * autopkgtest pass

   * kernel regression zfs testsuite pass

   * zsys integration test pass

  [Where problems could occur]

   * The stable branches maintain api/abi. Certain bugfixes do change
  userspace visible behavior of either succeeeding (when previously
  operations failed), or return errors when previously succeeding in
  error. For example there are changes when unlinking files in full
  volumes; changes to fallocate behaviour, etc. Overall they are minor
  corner cases, and bugfixes to correct the bahaviour to what is
  universally expected and how things behave on other filesystems (i.e.
  ext4).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1969482/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1949770] Re: Enable arm64 for Hyper-V guests

2022-06-10 Thread Tim Gardner
** Changed in: linux-meta-azure (Ubuntu)
   Status: In Progress => Fix Released

** Changed in: linux-meta-azure (Ubuntu Jammy)
   Status: In Progress => Fix Released

** Changed in: linux-signed-azure (Ubuntu)
   Status: In Progress => Fix Released

** Changed in: linux-signed-azure (Ubuntu Jammy)
   Status: In Progress => Fix Released

** Changed in: linux-azure (Ubuntu)
   Status: Fix Committed => Fix Released

** Changed in: linux-azure (Ubuntu Jammy)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1949770

Title:
  Enable arm64 for Hyper-V guests

Status in linux-azure package in Ubuntu:
  Fix Released
Status in linux-meta-azure package in Ubuntu:
  Fix Released
Status in linux-signed-azure package in Ubuntu:
  Fix Released
Status in linux-azure source package in Hirsute:
  Fix Released
Status in linux-meta-azure source package in Hirsute:
  Fix Released
Status in linux-signed-azure source package in Hirsute:
  Fix Released
Status in linux-azure source package in Impish:
  Fix Released
Status in linux-meta-azure source package in Impish:
  Fix Released
Status in linux-signed-azure source package in Impish:
  Fix Released
Status in linux-azure source package in Jammy:
  Fix Released
Status in linux-meta-azure source package in Jammy:
  Fix Released
Status in linux-signed-azure source package in Jammy:
  Fix Released

Bug description:
  SRU Justification

  [Impact]

  Since linux-azure can also be used for local Hyper-V guests on Windows
  10 Pro running on arm64 platforms, enable arm64 build for this kernel
  as well.

  [Test Case]

  Boot an arm64 VM on a machine running Win10Pro with Hyper-V.

  [Where things could go wrong]

  Some of the patches touch common PCI code. Device detection could be
  impacted.

  [Other info]

  SF: #00310705

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1949770/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1946744] Re: linux-azure: cifs: use the expiry output of dns_query to schedule next resolution

2022-06-10 Thread Tim Gardner
*** This bug is a duplicate of bug 1960549 ***
https://bugs.launchpad.net/bugs/1960549

** This bug has been marked a duplicate of bug 1960549
   Azure: CIFS backport request

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1946744

Title:
  linux-azure: cifs: use the expiry output of dns_query to schedule next
  resolution

Status in linux-azure package in Ubuntu:
  Invalid
Status in linux-azure source package in Focal:
  In Progress

Bug description:
  SRU Justification

  [Impact]

  We recently fixed DNS resolution of the server hostname during reconnect. 
However, server IP address may change, even when the old one continues to 
server (although sub-optimally).
  
  We should schedule the next DNS resolution based on the TTL of the DNS record 
used for the last resolution. This way, we resolve the server hostname again 
when a DNS record expires.

  [Fix]

  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=506c1da44fee32ba1d3a70413289ad58c772bba6

  [Test Case]

  Microsoft tested

  [Regression potential]

  Samba Reconnects may fail.

  [Other Info]

  SF: #00320698

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1946744/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1961329] Re: linux-azure: Update HV support to 5.17

2022-06-10 Thread Tim Gardner
** Changed in: linux-azure (Ubuntu Focal)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1961329

Title:
  linux-azure: Update HV support to 5.17

Status in linux-azure package in Ubuntu:
  Fix Released
Status in linux-azure source package in Focal:
  Won't Fix
Status in linux-azure source package in Impish:
  Fix Released
Status in linux-azure source package in Jammy:
  Fix Released

Bug description:
  SRU Justification

  [Impact]

  Microsoft has requested these commits be present in all Azure tuned
  kernels:

  ac0f7d42584125dab8039e60ab4ade48cc2db61c Drivers: hv: copy from message page 
only what's needed
  a276463b7aeb6186e7e4315cccb032773fb31b5d Drivers: hv: allocate the exact 
needed memory for messages
  5cc415001bca8fe0e3f0ee6d58a953a314dd9751 Drivers: hv: avoid passing opaque 
pointer to vmbus_onmessage()
  b0a284dc65b401a508dc2c5ed7d465884220f607 Drivers: hv: make sure that 'struct 
vmbus_channel_message_header' compiles correctly
  52c7803f9bd4b1f0ac6e2e3e6051415198cc06bd Drivers: hv: check VMBus messages 
lengths
  06caa778d8b2fbcb4ac3878751e39d116424ba9b hv_utils: Add validation for 
untrusted Hyper-V values
  e99c4afbee07e9323e9191a20b24d74dbf815bdf Drivers: hv: vmbus: Initialize 
memory to be sent to the host
  fe8c1b18a27de4d6ca5d99b3ffb3125dc69a5b76 Drivers: hv: vmbus: Copy the 
hv_message in vmbus_on_msg_dpc()
  e3fa4b747f085d2cda09bba0533b86fa76038635 Drivers: hv: vmbus: Avoid 
use-after-free in vmbus_onoffer_rescind()
  e4d221b42354b2e2ddb9187a806afb651eee2cda Drivers: hv: vmbus: Resolve race 
condition in vmbus_onoffer_rescind()
  adae1e931acd8b430d31141a283ea06d4b705417 Drivers: hv: vmbus: Copy packets 
sent by Hyper-V out of the ring buffer
  9d68cd9120e4e3af38f843e165631c323b86b4e4 hv_utils: Set the maximum packet 
size for VSS driver to the length of the receive buffer
  f1940d4e9cbe6208e7e77e433c587af108152a17 Drivers: hv: vmbus: Fix kernel crash 
upon unbinding a device from uio_hv_generic driver
  007faec014cb5d26983c1f86fd08c6539b41392e x86/sev: Expose 
sev_es_ghcb_hv_call() for use by HyperV
  0cc4f6d9f0b9f20f3f1e1149bdb6737c0b4e134a x86/hyperv: Initialize GHCB page in 
Isolation VM
  af788f355e343373490b7d2e361016e7c24a0ffa x86/hyperv: Initialize shared memory 
boundary in the Isolation VM.
  810a521265023a1d5c6c081ea2d216bc63d422f5 x86/hyperv: Add new hvcall guest 
address host visibility support
  d4dccf353db80e209f262e3973c834e6e48ba9a9 Drivers: hv: vmbus: Mark vmbus ring 
buffer visible to host in Isolation VM
  faff44069ff538ccdfef187c4d7ec83d22dfb3a4 x86/hyperv: Add Write/Read MSR 
registers via ghcb page
  20c89a559e00dfe352b73e867211a669113ae881 x86/hyperv: Add ghcb hvcall support 
for SNP VM
  f2f136c05fb6093818a3b3fefcba46231ac66a62 Drivers: hv: vmbus: Add SNP support 
for VMbus channel initiate message
  9a8797722e4239242d0cb4cc4baa805df6ac979e Drivers: hv: vmbus: Initialize VMbus 
ring buffer for Isolation VM
  1a5e91d8375fc8369207cc0b9894a324f2bbf1d9 swiotlb: Add swiotlb bounce buffer 
remap function for HV IVM
  c789b90a69045d1924bc0802ae0dce2bba05a04e x86/hyper-v: Add hyperv Isolation VM 
check in the cc_platform_has()
  062a5c4260cdb734a4727230c58e38accf413315 hyper-v: Enable swiotlb bounce 
buffer for Isolation VM
  743b237c3a7b0f5b44aa704aae8a1058877b6322 scsi: storvsc: Add Isolation VM 
support for storvsc driver
  846da38de0e8224f2f94b885125cf1fd2d7b0d39 net: netvsc: Add Isolation VM 
support for netvsc driver
  2deb55d9f57bb7a877c0d77115cc4077e1e974ff swiotlb: Add CONFIG_HAS_IOMEM check 
around swiotlb_mem_remap()
  6a27e396ebb149fc47baccc1957a7a9dd70049a7 Drivers: hv: vmbus: Initialize 
request offers message for Isolation VM
  4eea5332d67d8ae6ba5717ec0f4e671fdbd222e7 scsi: storvsc: Fix 
storvsc_queuecommand() memory leak
  96d9d1fa5cd505078534113308ced0aa56d8da58 Drivers: hv: balloon: account for 
vmbus packet header in max_pkt_size

  [Test Plan]

  Microsoft tested

  [Where things could go wrong]

  Hyper-V guests may not work correctly.

  [Other Info]

  SF: #00323683

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1961329/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1973254] Missing required logs.

2022-06-10 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1973254

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1973254

Title:
  uc22 pc-kernel 5.15.0-30.31.1 iwlwifi Hardware error detected.
  Restarting.

Status in linux package in Ubuntu:
  Incomplete
Status in snapd package in Ubuntu:
  New

Bug description:
  None of our wifi tests seem to be working on one of the amd64 systems we use 
for testing full disk encryption.  The current kernel snap installed is:
  pc-kernel   5.15.0-30.31.1  99122/betacanonical✓   kernel

  When looking through the dmesg output, I found a call trace related to
  iwlwifi which repeats a lot of times. I've attached a section of it as
  dmesg.txt, as well as dmesg output from right after a fresh boot
  (dmesg-boot.txt) so you can see the earlier messages, firmware
  loading, etc.

  The relevant firmware line from dmesg is:
  [   13.667426] iwlwifi :00:14.3: loaded firmware version 66.f1c864e0.0 
QuZ-a0-jf-b0-66.ucode op_mode iwlmvm

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1973254/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1962610] Re: linux-azure: prevent VMbus deadlock

2022-06-10 Thread Tim Gardner
** Changed in: linux-azure (Ubuntu)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1962610

Title:
  linux-azure: prevent VMbus deadlock

Status in linux-azure package in Ubuntu:
  Won't Fix

Bug description:
  SRU Justification

  [Impact]

  The kernel can deadlock

  [Fix]

  240ad77cb50d9f0a961fcb0f21e67939cf7a9c04 ("PCI: hv: Prepare
  hv_compose_msi_msg() for the VMBus-channel-interrupt-to-vCPU
  reassignment functionality")

  [Test Plan]

  Microsoft tested

  [Other Info]

  SF: #00329336

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1962610/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1973254] Re: uc22 pc-kernel 5.15.0-30.31.1 iwlwifi Hardware error detected. Restarting.

2022-06-10 Thread Dimitri John Ledkov
** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1973254

Title:
  uc22 pc-kernel 5.15.0-30.31.1 iwlwifi Hardware error detected.
  Restarting.

Status in linux package in Ubuntu:
  New
Status in snapd package in Ubuntu:
  New

Bug description:
  None of our wifi tests seem to be working on one of the amd64 systems we use 
for testing full disk encryption.  The current kernel snap installed is:
  pc-kernel   5.15.0-30.31.1  99122/betacanonical✓   kernel

  When looking through the dmesg output, I found a call trace related to
  iwlwifi which repeats a lot of times. I've attached a section of it as
  dmesg.txt, as well as dmesg output from right after a fresh boot
  (dmesg-boot.txt) so you can see the earlier messages, firmware
  loading, etc.

  The relevant firmware line from dmesg is:
  [   13.667426] iwlwifi :00:14.3: loaded firmware version 66.f1c864e0.0 
QuZ-a0-jf-b0-66.ucode op_mode iwlmvm

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1973254/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1977919] Re: Docker container creation causes kernel oops on linux-aws 5.13.0.1028.31~20.04.22

2022-06-10 Thread Podesta
Fixed kernel works like a charm.

@matthew-nocturnal you have to change the default GRUB that loads, so it
is on /etc/default/grub. There you change the DEFAULT_GRUB with another
one, as has been pointed out in the previous messages. But now you can
simply run apt update / upgrade and it should get the latest kernel. If
you can't access the machine to do this, you can either use a rescue
machine, and do it with chroot, or try to disable docker before it
crashes.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws-5.13 in Ubuntu.
https://bugs.launchpad.net/bugs/1977919

Title:
  Docker container creation causes kernel oops on linux-aws
  5.13.0.1028.31~20.04.22

Status in linux-aws-5.13 package in Ubuntu:
  Confirmed
Status in linux-azure-5.13 package in Ubuntu:
  Confirmed
Status in linux-gcp-5.13 package in Ubuntu:
  Confirmed
Status in linux-intel-iotg-5.15 package in Ubuntu:
  Confirmed
Status in linux-oracle-5.13 package in Ubuntu:
  Confirmed
Status in linux-aws-5.13 source package in Focal:
  Fix Committed
Status in linux-azure-5.13 source package in Focal:
  Fix Committed
Status in linux-gcp-5.13 source package in Focal:
  Fix Committed
Status in linux-intel-iotg-5.15 source package in Focal:
  Won't Fix
Status in linux-oracle-5.13 source package in Focal:
  Fix Committed

Bug description:
  Running the attached script on the latest AWS AMI for Ubuntu 20.04, I
  get a kernel panic and hard reset of the node.

  [   12.314552] VFS: Close: file count is 0
  [   12.351090] [ cut here ]
  [   12.351093] kernel BUG at include/linux/fs.h:3104!
  [   12.355272] invalid opcode:  [#1] SMP PTI
  [   12.358963] CPU: 1 PID: 863 Comm: sed Not tainted 5.13.0-1028-aws 
#31~20.04.1-Ubuntu
  [   12.366241] Hardware name: Amazon EC2 m5.large/, BIOS 1.0 10/16/2017
  [   12.371130] RIP: 0010:__fput+0x247/0x250
  [   12.374897] Code: 00 48 85 ff 0f 84 8b fe ff ff f6 c7 40 0f 85 82 fe ff ff 
e8 ab 38 00 00 e9 78 fe ff ff 4c 89 f7 e8 2e 88 02 00 e9 b5 fe ff ff <0f> 0b 0f 
1f 80 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 53 31 db 48
  [   12.389075] RSP: 0018:b50280d9fd88 EFLAGS: 00010246
  [   12.393425] RAX:  RBX: 000a801d RCX: 
9152e0716000
  [   12.398679] RDX: 9152cf075280 RSI: 0001 RDI: 

  [   12.403879] RBP: b50280d9fdb0 R08: 0001 R09: 
9152dfcba2c8
  [   12.409102] R10: b50280d9fd88 R11: 9152d04e9d10 R12: 
9152d04e9d00
  [   12.414333] R13: 9152dfcba2c8 R14: 9152cf0752a0 R15: 
9152dfc2e180
  [   12.419533] FS:  () GS:9153ea90() 
knlGS:
  [   12.426937] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.431506] CR2: 556cf30250a8 CR3: bce10006 CR4: 
007706e0
  [   12.436716] DR0:  DR1:  DR2: 

  [   12.441941] DR3:  DR6: fffe0ff0 DR7: 
0400
  [   12.447170] PKRU: 5554
  [   12.450355] Call Trace:
  [   12.453408]  
  [   12.456296]  fput+0xe/0x10
  [   12.459633]  task_work_run+0x70/0xb0
  [   12.463157]  do_exit+0x37b/0xaf0
  [   12.466570]  do_group_exit+0x43/0xb0
  [   12.470142]  __x64_sys_exit_group+0x18/0x20
  [   12.473989]  do_syscall_64+0x61/0xb0
  [   12.477565]  ? exit_to_user_mode_prepare+0x9b/0x1c0
  [   12.481734]  ? do_user_addr_fault+0x1d0/0x650
  [   12.485665]  ? irqentry_exit_to_user_mode+0x9/0x20
  [   12.489790]  ? irqentry_exit+0x19/0x30
  [   12.493443]  ? exc_page_fault+0x8f/0x170
  [   12.497199]  ? asm_exc_page_fault+0x8/0x30
  [   12.501013]  entry_SYSCALL_64_after_hwframe+0x44/0xae
  [   12.505289] RIP: 0033:0x7f80d42a1bd6
  [   12.508868] Code: Unable to access opcode bytes at RIP 0x7f80d42a1bac.
  [   12.513783] RSP: 002b:7ffe924f9ed8 EFLAGS: 0246 ORIG_RAX: 
00e7
  [   12.520897] RAX: ffda RBX: 7f80d45a4740 RCX: 
7f80d42a1bd6
  [   12.526115] RDX:  RSI: 003c RDI: 

  [   12.531328] RBP:  R08: 00e7 R09: 
fe98
  [   12.536484] R10: 7f80d3d422a0 R11: 0246 R12: 
7f80d45a4740
  [   12.541687] R13: 0002 R14: 7f80d45ad708 R15: 

  [   12.546916]  
  [   12.549829] Modules linked in: xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c 
bpfilter br_netfilter bridge stp llc aufs overlay nls_iso8859_1 dm_multipath 
scsi_dh_rdac scsi_dh_emc scsi_dh_alua crct10dif_pclmul ppdev crc32_pclmul 
ghash_clmulni_intel aesni_intel crypto_simd psmouse cryptd parport_pc 
input_leds parport ena serio_raw sch_fq_codel ipmi_devintf ipmi_msghandler msr 
drm ip_tables x_tables autofs4
  [   12.583913] ---[ end trace 77367fed4d782aa4 ]---
  [   12.587963] 

[Kernel-packages] [Bug 1977919] Re: Docker container creation causes kernel oops on linux-aws 5.13.0.1028.31~20.04.22

2022-06-10 Thread Matthew Lenz
How did people fix this on aws instances that have no serial console
access?  assuming the disk was mounted and grub.cfg was edited. what did
you change in the grub.cfg?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws-5.13 in Ubuntu.
https://bugs.launchpad.net/bugs/1977919

Title:
  Docker container creation causes kernel oops on linux-aws
  5.13.0.1028.31~20.04.22

Status in linux-aws-5.13 package in Ubuntu:
  Confirmed
Status in linux-azure-5.13 package in Ubuntu:
  Confirmed
Status in linux-gcp-5.13 package in Ubuntu:
  Confirmed
Status in linux-intel-iotg-5.15 package in Ubuntu:
  Confirmed
Status in linux-oracle-5.13 package in Ubuntu:
  Confirmed
Status in linux-aws-5.13 source package in Focal:
  Fix Committed
Status in linux-azure-5.13 source package in Focal:
  Fix Committed
Status in linux-gcp-5.13 source package in Focal:
  Fix Committed
Status in linux-intel-iotg-5.15 source package in Focal:
  Won't Fix
Status in linux-oracle-5.13 source package in Focal:
  Fix Committed

Bug description:
  Running the attached script on the latest AWS AMI for Ubuntu 20.04, I
  get a kernel panic and hard reset of the node.

  [   12.314552] VFS: Close: file count is 0
  [   12.351090] [ cut here ]
  [   12.351093] kernel BUG at include/linux/fs.h:3104!
  [   12.355272] invalid opcode:  [#1] SMP PTI
  [   12.358963] CPU: 1 PID: 863 Comm: sed Not tainted 5.13.0-1028-aws 
#31~20.04.1-Ubuntu
  [   12.366241] Hardware name: Amazon EC2 m5.large/, BIOS 1.0 10/16/2017
  [   12.371130] RIP: 0010:__fput+0x247/0x250
  [   12.374897] Code: 00 48 85 ff 0f 84 8b fe ff ff f6 c7 40 0f 85 82 fe ff ff 
e8 ab 38 00 00 e9 78 fe ff ff 4c 89 f7 e8 2e 88 02 00 e9 b5 fe ff ff <0f> 0b 0f 
1f 80 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 53 31 db 48
  [   12.389075] RSP: 0018:b50280d9fd88 EFLAGS: 00010246
  [   12.393425] RAX:  RBX: 000a801d RCX: 
9152e0716000
  [   12.398679] RDX: 9152cf075280 RSI: 0001 RDI: 

  [   12.403879] RBP: b50280d9fdb0 R08: 0001 R09: 
9152dfcba2c8
  [   12.409102] R10: b50280d9fd88 R11: 9152d04e9d10 R12: 
9152d04e9d00
  [   12.414333] R13: 9152dfcba2c8 R14: 9152cf0752a0 R15: 
9152dfc2e180
  [   12.419533] FS:  () GS:9153ea90() 
knlGS:
  [   12.426937] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.431506] CR2: 556cf30250a8 CR3: bce10006 CR4: 
007706e0
  [   12.436716] DR0:  DR1:  DR2: 

  [   12.441941] DR3:  DR6: fffe0ff0 DR7: 
0400
  [   12.447170] PKRU: 5554
  [   12.450355] Call Trace:
  [   12.453408]  
  [   12.456296]  fput+0xe/0x10
  [   12.459633]  task_work_run+0x70/0xb0
  [   12.463157]  do_exit+0x37b/0xaf0
  [   12.466570]  do_group_exit+0x43/0xb0
  [   12.470142]  __x64_sys_exit_group+0x18/0x20
  [   12.473989]  do_syscall_64+0x61/0xb0
  [   12.477565]  ? exit_to_user_mode_prepare+0x9b/0x1c0
  [   12.481734]  ? do_user_addr_fault+0x1d0/0x650
  [   12.485665]  ? irqentry_exit_to_user_mode+0x9/0x20
  [   12.489790]  ? irqentry_exit+0x19/0x30
  [   12.493443]  ? exc_page_fault+0x8f/0x170
  [   12.497199]  ? asm_exc_page_fault+0x8/0x30
  [   12.501013]  entry_SYSCALL_64_after_hwframe+0x44/0xae
  [   12.505289] RIP: 0033:0x7f80d42a1bd6
  [   12.508868] Code: Unable to access opcode bytes at RIP 0x7f80d42a1bac.
  [   12.513783] RSP: 002b:7ffe924f9ed8 EFLAGS: 0246 ORIG_RAX: 
00e7
  [   12.520897] RAX: ffda RBX: 7f80d45a4740 RCX: 
7f80d42a1bd6
  [   12.526115] RDX:  RSI: 003c RDI: 

  [   12.531328] RBP:  R08: 00e7 R09: 
fe98
  [   12.536484] R10: 7f80d3d422a0 R11: 0246 R12: 
7f80d45a4740
  [   12.541687] R13: 0002 R14: 7f80d45ad708 R15: 

  [   12.546916]  
  [   12.549829] Modules linked in: xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c 
bpfilter br_netfilter bridge stp llc aufs overlay nls_iso8859_1 dm_multipath 
scsi_dh_rdac scsi_dh_emc scsi_dh_alua crct10dif_pclmul ppdev crc32_pclmul 
ghash_clmulni_intel aesni_intel crypto_simd psmouse cryptd parport_pc 
input_leds parport ena serio_raw sch_fq_codel ipmi_devintf ipmi_msghandler msr 
drm ip_tables x_tables autofs4
  [   12.583913] ---[ end trace 77367fed4d782aa4 ]---
  [   12.587963] RIP: 0010:__fput+0x247/0x250
  [   12.591729] Code: 00 48 85 ff 0f 84 8b fe ff ff f6 c7 40 0f 85 82 fe ff ff 
e8 ab 38 00 00 e9 78 fe ff ff 4c 89 f7 e8 2e 88 02 00 e9 b5 fe ff ff <0f> 0b 0f 
1f 80 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 53 31 db 48
  [   12.605796] RSP: 0018:b50280d9fd88 EFLAGS: 

[Kernel-packages] [Bug 1978145] Re: Request to back port vmci patches to Ubuntu kernel

2022-06-10 Thread Tim Gardner
Please try the test kernel at https://kernel.ubuntu.com/~rtg/jammy-vmci-
updates-lp1978145/5.15.0-37.38~lp1978145.1/

wget 
https://kernel.ubuntu.com/~rtg/jammy-vmci-updates-lp1978145/5.15.0-37.38~lp1978145.1/amd64/linux-image-unsigned-5.15.0-37-generic_5.15.0-37.38~lp1978145.1_amd64.deb
wget 
https://kernel.ubuntu.com/~rtg/jammy-vmci-updates-lp1978145/5.15.0-37.38~lp1978145.1/amd64/linux-modules-5.15.0-37-generic_5.15.0-37.38~lp1978145.1_amd64.deb
sudo dpkg -i *.deb
sudo reboot

You can view the kernel sources at 'git://git.launchpad.net/~timg-
tpi/ubuntu/+source/linux/+git/jammy jammy-vmci-updates-lp1978145'

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978145

Title:
  Request to back port vmci patches to Ubuntu kernel

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  The request is to bring vmci to TOT and back port the following patches into
  Ubuntu kernels.

  1.  fac608138c6136126faadafa5554cc0bbabf3c44 ("VMCI: dma dg: whitespace 
formatting change for vmci register defines")
  2.  e283a0e8b7ea83915e988ed059384af166b444c0 ("VMCI: dma dg: add MMIO access 
to registers")
  3.  eed2298d936087a1c85e0fa6f7170028e4f4fded ("VMCI: dma dg: detect DMA 
datagram capability")
  4.  8cb520bea1470ca205980fbf030ed1f472f4af2f ("VMCI: dma dg: set OS page 
size")
  5.  cc68f2177fcbfe2dbe5e9514789b96ba5995ec1e ("VMCI: dma dg: register dummy 
IRQ handlers for DMA datagrams")
  6.  5ee109828e73bbe4213c373988608d8f33e03d78 ("VMCI: dma dg: allocate send 
and receive buffers for DMA datagrams")
  7.  22aa5c7f323022477b70e044eb00e6bfea9498e8 ("VMCI: dma dg: add support for 
DMA datagrams sends")
  8.  463713eb6164b6577f8e91447c7745628215531b ("VMCI: dma dg: add support for 
DMA datagrams receive")
  9.  77e861619baea5a7c934e47fda74b03c0b072aec ("VMCI: Fix some error handling 
paths in vmci_guest_probe_device()")
  10. c8e9b30ccae605bf1dbeaf03971f9b83f70b928d ("VMCI: Release 
notification_bitmap in error path")
  11. 5df0e734b8c39598effe0f17e5bd8ff7748a0693 ("VMCI: Check exclusive_vectors 
when freeing interrupt 1")
  12. 1f7142915d304804a9bd952245fce92786b1b62f ("VMCI: Add support for ARM64")
  13. ba03a9bbd17b149c373c0ea44017f35fc2cd0f28 ("VMCI: Release resource if the 
work is already queued")

  Thanks,
  Vishnu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1978145/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1971460] Re: [amdgpu] System freezes coming out from suspension or randomly from screen power save

2022-06-10 Thread Mechano
After 2 kernel update now the situation using Wayland is better with my
RX 6600 expecially in returning from suspend.

But there's still random freeze on power on of monitor after screen
suspend and sync back 144hz.

Still lot of errors on amdgpu module.

Attach log file.


** Attachment added: "freeze_on_monitor_powersave_144hz.txt"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971460/+attachment/5596450/+files/freeze_on_monitor_powersave_144hz.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1971460

Title:
  [amdgpu] System freezes coming out from suspension or randomly from
  screen power save

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I've Ubuntu 22.04 with Wayland and Sapphire Radeon RX 6600 with Xiaomi
  34" curved gaming monitor capable of 3440x1440 @144,00hz.

  Using refresh of 120hz or 144hz, the system freezes coming out from
  suspension or randomly from screen power save.

  Setting @60hz it's more stable.

  It seems something related to wrong Modeline for this VGA and monitor
  resolution/frequencies. The problem is with both DP or HDMI cable.
  With HDMI it supports only 99,99hz

  I had no problem with the provious HP RX 460 HanSolo or XFX GTX 1060
  3GB with proprietary nVidia drivers.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: xorg 1:7.7+23ubuntu2
  ProcVersionSignature: Ubuntu 5.15.0-27.28-generic 5.15.30
  Uname: Linux 5.15.0-27-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82
  Architecture: amd64
  BootLog: Error: [Errno 13] Permesso negato: '/var/log/boot.log'
  CasperMD5CheckResult: pass
  CompositorRunning: None
  CurrentDesktop: ubuntu:GNOME
  Date: Tue May  3 18:29:05 2022
  DistUpgraded: Fresh install
  DistroCodename: jammy
  DistroVariant: ubuntu
  DkmsStatus:
   virtualbox/6.1.32, 5.15.0-25-generic, x86_64: installed
   virtualbox/6.1.32, 5.15.0-27-generic, x86_64: installed
  ExtraDebuggingInterest: Yes, if not too technical
  GpuHangFrequency: Several times a day
  GpuHangReproducibility: Yes, I can easily reproduce it
  GpuHangStarted: Immediately after installing this version of Ubuntu
  GraphicsCard:
   Advanced Micro Devices, Inc. [AMD/ATI] Navi 23 [Radeon RX 6600/6600 
XT/6600M] [1002:73ff] (rev c7) (prog-if 00 [VGA controller])
 Subsystem: Sapphire Technology Limited Navi 23 [Radeon RX 6600/6600 
XT/6600M] [1da2:e447]
  InstallationDate: Installed on 2022-04-23 (9 days ago)
  InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 
(20220419)
  MachineType: System manufacturer System Product Name
  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=it_IT.UTF-8
   SHELL=/bin/bash
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-27-generic 
root=UUID=be1c4139-f2bc-472b-87c1-099f2be97b1a ro quiet splash vt.handoff=7
  SourcePackage: xorg
  Symptom: display
  Title: Xorg freeze
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 02/25/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 3604
  dmi.board.asset.tag: Default string
  dmi.board.name: TUF B450M-PRO GAMING
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr3604:bd02/25/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnTUFB450M-PROGAMING:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer
  version.compiz: compiz N/A
  version.libdrm2: libdrm2 2.4.110-1ubuntu1
  version.libgl1-mesa-dri: libgl1-mesa-dri 22.0.1-1ubuntu2
  version.libgl1-mesa-glx: libgl1-mesa-glx N/A
  version.xserver-xorg-core: xserver-xorg-core 2:21.1.3-2ubuntu2
  version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
  version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:19.1.0-2build3
  version.xserver-xorg-video-intel: xserver-xorg-video-intel 
2:2.99.917+git20210115-1
  version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 
1:1.0.17-2build1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971460/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1975516] Re: System freeze

2022-06-10 Thread Douglas Silva
*** This bug is a duplicate of bug 1978133 ***
https://bugs.launchpad.net/bugs/1978133

** This bug has been marked a duplicate of bug 1978133
   System freeze followed by kernel panic or blank screen

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1975516

Title:
  System freeze

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I had LibreOffice Writer open at the time, but it was idle. The system
  became completely unresponsive and a power reset was the only way to
  shut it down. The "REISUB" command didn't work.

  I had Ubuntu 21.10 and Debian 11 before, and this was not reproducible
  with them.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: linux-image-5.15.0-33-generic 5.15.0-33.34
  ProcVersionSignature: Ubuntu 5.15.0-33.34-generic 5.15.30
  Uname: Linux 5.15.0-33-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  dsilva 1511 F pulseaudio
  CRDA: N/A
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Mon May 23 13:48:05 2022
  InstallationDate: Installed on 2022-05-23 (0 days ago)
  InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 
(20220419)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 003: ID 0c45:671e Microdia Integrated_Webcam_HD
   Bus 001 Device 002: ID 045e:07fd Microsoft Corp. Nano Transceiver 1.1
   Bus 001 Device 004: ID 8087:0aaa Intel Corp. Bluetooth 9460/9560 Jefferson 
Peak (JfP)
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: Dell Inc. Inspiron 3583
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.15.0-33-generic 
root=UUID=15cac922-78d2-4c88-aa40-a49c2bfda033 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-5.15.0-33-generic N/A
   linux-backports-modules-5.15.0-33-generic  N/A
   linux-firmware 20220329.git681281e4-0ubuntu3
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/21/2021
  dmi.bios.release: 1.13
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: 1.13.0
  dmi.board.name: 0DC2CG
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 10
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvr1.13.0:bd04/21/2021:br1.13:svnDellInc.:pnInspiron3583:pvr:rvnDellInc.:rn0DC2CG:rvrA00:cvnDellInc.:ct10:cvr:sku08CA:
  dmi.product.family: Inspiron
  dmi.product.name: Inspiron 3583
  dmi.product.sku: 08CA
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975516/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1977919] Re: Docker container creation causes kernel oops on linux-aws 5.13.0.1028.31~20.04.22

2022-06-10 Thread Francis Ginther
All of the updated 5.13 kernels have now made it to the archive and into
both the focal-updates and focal-security pockets. That list of kernels
is:

linux-aws-5.13 - 5.13.0-1029.32~20.04.1
linux-azure-5.13 - 5.13.0-1029.34~20.04.1
linux-gcp-5.13 - 5.13.0-1031.37~20.04.1
linux-oracle-5.13 - 5.13.0-1034.40~20.04.1

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws-5.13 in Ubuntu.
https://bugs.launchpad.net/bugs/1977919

Title:
  Docker container creation causes kernel oops on linux-aws
  5.13.0.1028.31~20.04.22

Status in linux-aws-5.13 package in Ubuntu:
  Confirmed
Status in linux-azure-5.13 package in Ubuntu:
  Confirmed
Status in linux-gcp-5.13 package in Ubuntu:
  Confirmed
Status in linux-intel-iotg-5.15 package in Ubuntu:
  Confirmed
Status in linux-oracle-5.13 package in Ubuntu:
  Confirmed
Status in linux-aws-5.13 source package in Focal:
  Fix Committed
Status in linux-azure-5.13 source package in Focal:
  Fix Committed
Status in linux-gcp-5.13 source package in Focal:
  Fix Committed
Status in linux-intel-iotg-5.15 source package in Focal:
  Won't Fix
Status in linux-oracle-5.13 source package in Focal:
  Fix Committed

Bug description:
  Running the attached script on the latest AWS AMI for Ubuntu 20.04, I
  get a kernel panic and hard reset of the node.

  [   12.314552] VFS: Close: file count is 0
  [   12.351090] [ cut here ]
  [   12.351093] kernel BUG at include/linux/fs.h:3104!
  [   12.355272] invalid opcode:  [#1] SMP PTI
  [   12.358963] CPU: 1 PID: 863 Comm: sed Not tainted 5.13.0-1028-aws 
#31~20.04.1-Ubuntu
  [   12.366241] Hardware name: Amazon EC2 m5.large/, BIOS 1.0 10/16/2017
  [   12.371130] RIP: 0010:__fput+0x247/0x250
  [   12.374897] Code: 00 48 85 ff 0f 84 8b fe ff ff f6 c7 40 0f 85 82 fe ff ff 
e8 ab 38 00 00 e9 78 fe ff ff 4c 89 f7 e8 2e 88 02 00 e9 b5 fe ff ff <0f> 0b 0f 
1f 80 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 53 31 db 48
  [   12.389075] RSP: 0018:b50280d9fd88 EFLAGS: 00010246
  [   12.393425] RAX:  RBX: 000a801d RCX: 
9152e0716000
  [   12.398679] RDX: 9152cf075280 RSI: 0001 RDI: 

  [   12.403879] RBP: b50280d9fdb0 R08: 0001 R09: 
9152dfcba2c8
  [   12.409102] R10: b50280d9fd88 R11: 9152d04e9d10 R12: 
9152d04e9d00
  [   12.414333] R13: 9152dfcba2c8 R14: 9152cf0752a0 R15: 
9152dfc2e180
  [   12.419533] FS:  () GS:9153ea90() 
knlGS:
  [   12.426937] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.431506] CR2: 556cf30250a8 CR3: bce10006 CR4: 
007706e0
  [   12.436716] DR0:  DR1:  DR2: 

  [   12.441941] DR3:  DR6: fffe0ff0 DR7: 
0400
  [   12.447170] PKRU: 5554
  [   12.450355] Call Trace:
  [   12.453408]  
  [   12.456296]  fput+0xe/0x10
  [   12.459633]  task_work_run+0x70/0xb0
  [   12.463157]  do_exit+0x37b/0xaf0
  [   12.466570]  do_group_exit+0x43/0xb0
  [   12.470142]  __x64_sys_exit_group+0x18/0x20
  [   12.473989]  do_syscall_64+0x61/0xb0
  [   12.477565]  ? exit_to_user_mode_prepare+0x9b/0x1c0
  [   12.481734]  ? do_user_addr_fault+0x1d0/0x650
  [   12.485665]  ? irqentry_exit_to_user_mode+0x9/0x20
  [   12.489790]  ? irqentry_exit+0x19/0x30
  [   12.493443]  ? exc_page_fault+0x8f/0x170
  [   12.497199]  ? asm_exc_page_fault+0x8/0x30
  [   12.501013]  entry_SYSCALL_64_after_hwframe+0x44/0xae
  [   12.505289] RIP: 0033:0x7f80d42a1bd6
  [   12.508868] Code: Unable to access opcode bytes at RIP 0x7f80d42a1bac.
  [   12.513783] RSP: 002b:7ffe924f9ed8 EFLAGS: 0246 ORIG_RAX: 
00e7
  [   12.520897] RAX: ffda RBX: 7f80d45a4740 RCX: 
7f80d42a1bd6
  [   12.526115] RDX:  RSI: 003c RDI: 

  [   12.531328] RBP:  R08: 00e7 R09: 
fe98
  [   12.536484] R10: 7f80d3d422a0 R11: 0246 R12: 
7f80d45a4740
  [   12.541687] R13: 0002 R14: 7f80d45ad708 R15: 

  [   12.546916]  
  [   12.549829] Modules linked in: xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c 
bpfilter br_netfilter bridge stp llc aufs overlay nls_iso8859_1 dm_multipath 
scsi_dh_rdac scsi_dh_emc scsi_dh_alua crct10dif_pclmul ppdev crc32_pclmul 
ghash_clmulni_intel aesni_intel crypto_simd psmouse cryptd parport_pc 
input_leds parport ena serio_raw sch_fq_codel ipmi_devintf ipmi_msghandler msr 
drm ip_tables x_tables autofs4
  [   12.583913] ---[ end trace 77367fed4d782aa4 ]---
  [   12.587963] RIP: 0010:__fput+0x247/0x250
  [   12.591729] Code: 00 48 85 ff 0f 84 8b fe ff ff f6 c7 40 0f 85 82 fe ff ff 
e8 ab 38 00 00 e9 78 fe ff ff 4c 89 f7 e8 2e 

[Kernel-packages] [Bug 1977919] Re: Docker container creation causes kernel oops on linux-aws 5.13.0.1028.31~20.04.22

2022-06-10 Thread Bernardo Hugo Signori
In Oracle Cloud you can start a cloud shell console connection then
force reboot the instance and in the console press esc, in the Grub menu
select the previous kernel. I was able to boot with kernel
5.13.0-1030-oracle without panics.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws-5.13 in Ubuntu.
https://bugs.launchpad.net/bugs/1977919

Title:
  Docker container creation causes kernel oops on linux-aws
  5.13.0.1028.31~20.04.22

Status in linux-aws-5.13 package in Ubuntu:
  Confirmed
Status in linux-azure-5.13 package in Ubuntu:
  Confirmed
Status in linux-gcp-5.13 package in Ubuntu:
  Confirmed
Status in linux-intel-iotg-5.15 package in Ubuntu:
  Confirmed
Status in linux-oracle-5.13 package in Ubuntu:
  Confirmed
Status in linux-aws-5.13 source package in Focal:
  Fix Committed
Status in linux-azure-5.13 source package in Focal:
  Fix Committed
Status in linux-gcp-5.13 source package in Focal:
  Fix Committed
Status in linux-intel-iotg-5.15 source package in Focal:
  Won't Fix
Status in linux-oracle-5.13 source package in Focal:
  Fix Committed

Bug description:
  Running the attached script on the latest AWS AMI for Ubuntu 20.04, I
  get a kernel panic and hard reset of the node.

  [   12.314552] VFS: Close: file count is 0
  [   12.351090] [ cut here ]
  [   12.351093] kernel BUG at include/linux/fs.h:3104!
  [   12.355272] invalid opcode:  [#1] SMP PTI
  [   12.358963] CPU: 1 PID: 863 Comm: sed Not tainted 5.13.0-1028-aws 
#31~20.04.1-Ubuntu
  [   12.366241] Hardware name: Amazon EC2 m5.large/, BIOS 1.0 10/16/2017
  [   12.371130] RIP: 0010:__fput+0x247/0x250
  [   12.374897] Code: 00 48 85 ff 0f 84 8b fe ff ff f6 c7 40 0f 85 82 fe ff ff 
e8 ab 38 00 00 e9 78 fe ff ff 4c 89 f7 e8 2e 88 02 00 e9 b5 fe ff ff <0f> 0b 0f 
1f 80 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 53 31 db 48
  [   12.389075] RSP: 0018:b50280d9fd88 EFLAGS: 00010246
  [   12.393425] RAX:  RBX: 000a801d RCX: 
9152e0716000
  [   12.398679] RDX: 9152cf075280 RSI: 0001 RDI: 

  [   12.403879] RBP: b50280d9fdb0 R08: 0001 R09: 
9152dfcba2c8
  [   12.409102] R10: b50280d9fd88 R11: 9152d04e9d10 R12: 
9152d04e9d00
  [   12.414333] R13: 9152dfcba2c8 R14: 9152cf0752a0 R15: 
9152dfc2e180
  [   12.419533] FS:  () GS:9153ea90() 
knlGS:
  [   12.426937] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.431506] CR2: 556cf30250a8 CR3: bce10006 CR4: 
007706e0
  [   12.436716] DR0:  DR1:  DR2: 

  [   12.441941] DR3:  DR6: fffe0ff0 DR7: 
0400
  [   12.447170] PKRU: 5554
  [   12.450355] Call Trace:
  [   12.453408]  
  [   12.456296]  fput+0xe/0x10
  [   12.459633]  task_work_run+0x70/0xb0
  [   12.463157]  do_exit+0x37b/0xaf0
  [   12.466570]  do_group_exit+0x43/0xb0
  [   12.470142]  __x64_sys_exit_group+0x18/0x20
  [   12.473989]  do_syscall_64+0x61/0xb0
  [   12.477565]  ? exit_to_user_mode_prepare+0x9b/0x1c0
  [   12.481734]  ? do_user_addr_fault+0x1d0/0x650
  [   12.485665]  ? irqentry_exit_to_user_mode+0x9/0x20
  [   12.489790]  ? irqentry_exit+0x19/0x30
  [   12.493443]  ? exc_page_fault+0x8f/0x170
  [   12.497199]  ? asm_exc_page_fault+0x8/0x30
  [   12.501013]  entry_SYSCALL_64_after_hwframe+0x44/0xae
  [   12.505289] RIP: 0033:0x7f80d42a1bd6
  [   12.508868] Code: Unable to access opcode bytes at RIP 0x7f80d42a1bac.
  [   12.513783] RSP: 002b:7ffe924f9ed8 EFLAGS: 0246 ORIG_RAX: 
00e7
  [   12.520897] RAX: ffda RBX: 7f80d45a4740 RCX: 
7f80d42a1bd6
  [   12.526115] RDX:  RSI: 003c RDI: 

  [   12.531328] RBP:  R08: 00e7 R09: 
fe98
  [   12.536484] R10: 7f80d3d422a0 R11: 0246 R12: 
7f80d45a4740
  [   12.541687] R13: 0002 R14: 7f80d45ad708 R15: 

  [   12.546916]  
  [   12.549829] Modules linked in: xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c 
bpfilter br_netfilter bridge stp llc aufs overlay nls_iso8859_1 dm_multipath 
scsi_dh_rdac scsi_dh_emc scsi_dh_alua crct10dif_pclmul ppdev crc32_pclmul 
ghash_clmulni_intel aesni_intel crypto_simd psmouse cryptd parport_pc 
input_leds parport ena serio_raw sch_fq_codel ipmi_devintf ipmi_msghandler msr 
drm ip_tables x_tables autofs4
  [   12.583913] ---[ end trace 77367fed4d782aa4 ]---
  [   12.587963] RIP: 0010:__fput+0x247/0x250
  [   12.591729] Code: 00 48 85 ff 0f 84 8b fe ff ff f6 c7 40 0f 85 82 fe ff ff 
e8 ab 38 00 00 e9 78 fe ff ff 4c 89 f7 e8 2e 88 02 00 e9 b5 fe ff ff <0f> 0b 0f 
1f 80 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 

[Kernel-packages] [Bug 1978317] [NEW] package linux-firmware 1.187.31 failed to install/upgrade: installed linux-firmware package post-installation script subprocess returned error exit status 1

2022-06-10 Thread Chris Ward
Public bug reported:

Standard update. This is another variation of numerous bug reports

ProblemType: Package
DistroRelease: Ubuntu 20.04
Package: linux-firmware 1.187.31
ProcVersionSignature: Ubuntu 5.4.0-117.132-generic 5.4.189
Uname: Linux 5.4.0-117-generic x86_64
ApportVersion: 2.20.11-0ubuntu27.24
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC1:  chris  2080 F pulseaudio
 /dev/snd/controlC0:  chris  2080 F pulseaudio
CasperMD5CheckResult: skip
Date: Fri Jun 10 14:17:18 2022
Dependencies:
 
ErrorMessage: installed linux-firmware package post-installation script 
subprocess returned error exit status 1
HibernationDevice: RESUME=UUID=3eb0cc8f-10d5-466f-ad48-7ad42d84e9b1
InstallationDate: Installed on 2015-12-07 (2377 days ago)
InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
IwConfig:
 eth0  no wireless extensions.
 
 lono wireless extensions.
MachineType: System manufacturer System Product Name
PackageArchitecture: all
ProcFB: 0 radeondrmfb
ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.4.0-117-generic 
root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7
PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
Python3Details: /usr/bin/python3.8, Python 3.8.10, python3-minimal, 
3.8.2-0ubuntu2
PythonDetails: /usr/bin/python2.7, Python 2.7.18, python-is-python2, 2.7.17-4
RelatedPackageVersions: grub-pc 2.04-1ubuntu26.15
RfKill:
 
SourcePackage: linux-firmware
Title: package linux-firmware 1.187.31 failed to install/upgrade: installed 
linux-firmware package post-installation script subprocess returned error exit 
status 1
UpgradeStatus: Upgraded to focal on 2021-06-22 (352 days ago)
dmi.bios.date: 12/04/2014
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: 1602
dmi.board.asset.tag: To be filled by O.E.M.
dmi.board.name: A88X-PRO
dmi.board.vendor: ASUSTeK COMPUTER INC.
dmi.board.version: Rev X.0x
dmi.chassis.asset.tag: Asset-1234567890
dmi.chassis.type: 3
dmi.chassis.vendor: Chassis Manufacture
dmi.chassis.version: Chassis Version
dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr1602:bd12/04/2014:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnA88X-PRO:rvrRevX.0x:cvnChassisManufacture:ct3:cvrChassisVersion:
dmi.product.family: To be filled by O.E.M.
dmi.product.name: System Product Name
dmi.product.sku: SKU
dmi.product.version: System Version
dmi.sys.vendor: System manufacturer

** Affects: linux-firmware (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-package focal need-duplicate-check

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1978317

Title:
  package linux-firmware 1.187.31 failed to install/upgrade: installed
  linux-firmware package post-installation script subprocess returned
  error exit status 1

Status in linux-firmware package in Ubuntu:
  New

Bug description:
  Standard update. This is another variation of numerous bug reports

  ProblemType: Package
  DistroRelease: Ubuntu 20.04
  Package: linux-firmware 1.187.31
  ProcVersionSignature: Ubuntu 5.4.0-117.132-generic 5.4.189
  Uname: Linux 5.4.0-117-generic x86_64
  ApportVersion: 2.20.11-0ubuntu27.24
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  chris  2080 F pulseaudio
   /dev/snd/controlC0:  chris  2080 F pulseaudio
  CasperMD5CheckResult: skip
  Date: Fri Jun 10 14:17:18 2022
  Dependencies:
   
  ErrorMessage: installed linux-firmware package post-installation script 
subprocess returned error exit status 1
  HibernationDevice: RESUME=UUID=3eb0cc8f-10d5-466f-ad48-7ad42d84e9b1
  InstallationDate: Installed on 2015-12-07 (2377 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  IwConfig:
   eth0  no wireless extensions.
   
   lono wireless extensions.
  MachineType: System manufacturer System Product Name
  PackageArchitecture: all
  ProcFB: 0 radeondrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.4.0-117-generic 
root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  Python3Details: /usr/bin/python3.8, Python 3.8.10, python3-minimal, 
3.8.2-0ubuntu2
  PythonDetails: /usr/bin/python2.7, Python 2.7.18, python-is-python2, 2.7.17-4
  RelatedPackageVersions: grub-pc 2.04-1ubuntu26.15
  RfKill:
   
  SourcePackage: linux-firmware
  Title: package linux-firmware 1.187.31 failed to install/upgrade: installed 
linux-firmware package post-installation script subprocess returned error exit 
status 1
  UpgradeStatus: Upgraded to focal on 2021-06-22 (352 days ago)
  dmi.bios.date: 12/04/2014
  dmi.bios.vendor: 

[Kernel-packages] [Bug 1976511] Re: kernel taint ( warning ) caused by smpboot.c: on 5.4.0

2022-06-10 Thread Zachary Tahenakos
The Intel Xeon Platinum 8380 is an IceLake chip (see
https://www.intel.com/content/www/us/en/products/sku/212287/intel-xeon-
platinum-8380-processor-60m-cache-2-30-ghz/specifications.html). The
change referenced by Zhanglei only addresses chips that are Skylake-X.

There is a change in the upstream kernel that changes how this SNC detection 
works to now default it on except for COD (Cluster-on-Die, SNC is a newer 
implementation of this tech it seems):
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc1=2c88d45edbb89029c1190bb3b136d2602f057c98

The hwe-5.13 kernel has this change, but the 5.4 kernel does not.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1976511

Title:
  kernel taint ( warning ) caused by smpboot.c: on 5.4.0

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Apr  6 02:33:31 G292-280 kernel: [0.007531] [ cut here 
]
  Apr  6 02:33:31 G292-280 kernel: [0.007531] sched: CPU #20's llc-sibling 
CPU #0 is not on the same node! [node: 1 != 0]. Ignoring dependency.
  Apr  6 02:33:31 G292-280 kernel: [0.007531] WARNING: CPU: 20 PID: 0 at 
/build/linux-hwe-5.4-9Mb2g5/linux-hwe-5.4-5.4.0/arch/x86/kernel/smpboot.c:426 
topology_sane.isra.9+0x6c/0x70
  Apr  6 02:33:31 G292-280 kernel: [0.007531] Modules linked in:
  Apr  6 02:33:31 G292-280 kernel: [0.007531] CPU: 20 PID: 0 Comm: 
swapper/20 Not tainted 5.4.0-107-generic #121~18.04.1-Ubuntu
  Apr  6 02:33:31 G292-280 kernel: [0.007531] Hardware name: GIGABYTE 
G292-280-00/MG52-G20-00, BIOS F02 10/28/2021
  Apr  6 02:33:31 G292-280 kernel: [0.007531] RIP: 
0010:topology_sane.isra.9+0x6c/0x70
  Apr  6 02:33:31 G292-280 kernel: [0.007531] Code: 41 5c 5d c3 80 3d 1e 75 
ba 01 00 75 ec 89 f1 41 89 d9 89 fe 45 89 e0 48 c7 c7 b8 00 b4 a6 c6 05 04 75 
ba 01 01 e8 b4 c7 03 00
   <0f> 0b eb cb 0f 1f 44 00 00 55 0f b6 05 a3 8d f0 01 c6 05 9c 8d f0
  Apr  6 02:33:31 G292-280 kernel: [0.007531] RSP: :b76b58e17eb8 
EFLAGS: 00010086
  Apr  6 02:33:31 G292-280 kernel: [0.007531] RAX:  RBX: 
 RCX: a7264e88
  Apr  6 02:33:31 G292-280 kernel: [0.007531] RDX: a7264e88 RSI: 
0096 RDI: 0046
  Apr  6 02:33:31 G292-280 kernel: [0.007531] RBP: b76b58e17ec8 R08: 
 R09: 0002f680
  Apr  6 02:33:31 G292-280 kernel: [0.007531] R10: 8b69bf80 R11: 
02c0 R12: 0001
  Apr  6 02:33:31 G292-280 kernel: [0.007531] R13: 0014 R14: 
0014 R15: 0002
  Apr  6 02:33:31 G292-280 kernel: [0.007531] FS:  () 
GS:8b69bf80() knlGS:
  Apr  6 02:33:31 G292-280 kernel: [0.007531] CS:  0010 DS:  ES:  
CR0: 80050033
  Apr  6 02:33:31 G292-280 kernel: [0.007531] CR2:  CR3: 
007ee1a0a001 CR4: 00760ee0
  Apr  6 02:33:31 G292-280 kernel: [0.007531] DR0:  DR1: 
 DR2: 
  Apr  6 02:33:31 G292-280 kernel: [0.007531] DR3:  DR6: 
fffe0ff0 DR7: 0400
  Apr  6 02:33:31 G292-280 kernel: [0.007531] PKRU: 
  Apr  6 02:33:31 G292-280 kernel: [0.007531] Call Trace:
  Apr  6 02:33:31 G292-280 kernel: [0.007531]  
set_cpu_sibling_map+0x14f/0x600
  Apr  6 02:33:31 G292-280 kernel: [0.007531]  start_secondary+0x6e/0x1c0
  Apr  6 02:33:31 G292-280 kernel: [0.007531]  
secondary_startup_64+0xa4/0xb0
  Apr  6 02:33:31 G292-280 kernel: [0.007531] ---[ end trace 
789d1f3abd3d96d4 ]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1976511/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1975582] Re: [UBUNTU 20.04] rcu stalls with many storage key guests

2022-06-10 Thread Frank Heimes
Added test builds for Impish and Jammy on top of the focal ones:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1975582

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1975582

Title:
  [UBUNTU 20.04] rcu stalls with many storage key guests

Status in Ubuntu on IBM z Systems:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  In Progress
Status in linux source package in Impish:
  In Progress
Status in linux source package in Jammy:
  In Progress

Bug description:
  SRU Justification:
  ==

  [Impact]

   * Ubuntu on s390x KVM environments with lots of large guests with storage
 keys can be affected by rcu stalls.

   * These rcu stalls can cause the system to crash/dump.

  [Fix]

   * 3ae11dbcfac9 3ae11dbcfac906a8c3a480e98660a823130dc16a "s390/mm: use
  non-quiescing sske for KVM switch to keyed guest"

   * 6d5946274df1 6d5946274df1fff539a7eece458a43be733d1db8 "s390/gmap:
  voluntarily schedule during key setting"

  [Test Plan]

   * There is no trigger or direct test or re-creation of the 
 problem situation possible, but...

   * and IBM z13 or LinuxONE (or never) LPAR is needed that
 runs Ubuntu Server 20.04 LTS or 18.04 LTS with HWE kernel
 and acts as KVM host with again several large guests running
 on top with storage groups.

   * Let such a system running for days under significant load
 and watch the logs for rcu issues.

   * Prior to the submission of this SRU patched test kernels
 for focal 5.4 and bionic hwe-5.4 were created and tested.
 They ran for days at a staging environemnt at IBM
 without further issues.

   * The modifications are all limited to s390x.

   * A test kernel was build (see below) that ran in a test environment
 at IBM under appropriate load for several days.

  [Where problems could occur]

   * Due to the change for the KVM switch to keyed guest
 from classic sske to non-quiescing sske
 the KVM behaviour might have changed and the storage keys harmed.

   * The now more generous scheduling while setting keys
 has an impact on the guest memory management and mapping
 which will lead to a different performance.

   * This, with the introduction of __s390_enable_skey_pmd and
 cond_resched, might increase the overhead in certain situations,
 but eventually improves the responsiveness over time,
 hence avoid rcu stalls.

  [Other Info]
   
   * Since the patches are upstream in 5.19-rc1,
 they will be included in the kernel that is planned for kinetic (5.19).

   * Hence this is an SRU to jammy, impish and focal.

  __

  ---Problem Description---
  There can be rcu stalls when running lots of large guests with storage keys:

  [1377614.579833] rcu: INFO: rcu_sched self-detected stall on CPU
  [1377614.579845] rcu:   18-: (2099 ticks this GP) 
idle=54e/1/0x4002 softirq=35598716/35598716 fqs=998
  [1377614.579895](t=2100 jiffies g=155867385 q=20879)
  [1377614.579898] Task dump for CPU 18:
  [1377614.579899] CPU 1/KVM   R  running task0 1030947 256019 
0x0604
  [1377614.579902] Call Trace:
  [1377614.579912] ([<001f1f4b4f52>] show_stack+0x7a/0xc0)
  [1377614.579918]  [<001f1ec8e96c>] sched_show_task.part.0+0xdc/0x100
  [1377614.579919]  [<001f1f4b7248>] rcu_dump_cpu_stacks+0xc0/0x100
  [1377614.579924]  [<001f1ecdd10c>] rcu_sched_clock_irq+0x75c/0x980
  [1377614.579926]  [<001f1eceb26c>] update_process_times+0x3c/0x80
  [1377614.579931]  [<001f1ecfcfea>] tick_sched_handle.isra.0+0x4a/0x70
  [1377614.579932]  [<001f1ecfd28e>] tick_sched_timer+0x5e/0xc0
  [1377614.579933]  [<001f1ecec294>] __hrtimer_run_queues+0x114/0x2f0
  [1377614.579935]  [<001f1ececfdc>] hrtimer_interrupt+0x12c/0x2a0
  [1377614.579938]  [<001f1ebecb6a>] do_IRQ+0xaa/0xb0
  [1377614.579942]  [<001f1f4c6d08>] ext_int_handler+0x130/0x134
  [1377614.579945]  [<001f1ec0af10>] ptep_zap_key+0x40/0x60

  Contact Information = cborn...@de.ibm.com

  ---uname output---
   RELEASE: 5.4.0-90-generic
   VERSION: #101-Ubuntu SMP Fri Oct 15 19:59:45 UTC 2021

  == Comment: #1 - Christian Borntraeger  - 2022-05-24 
03:59:37 ==
  This is a test patch that might address the rcu stalls.

  == Comment: #2 - Christian Borntraeger  - 2022-05-24 
04:00:22 ==
  This is a 2nd patch that reduces the cost of key setting.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1975582/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1975582] Re: [UBUNTU 20.04] rcu stalls with many storage key guests

2022-06-10 Thread Frank Heimes
SRU request submitted to the Ubuntu kernel team mailing list for jammy, impish 
and focal:
https://lists.ubuntu.com/archives/kernel-team/2022-June/thread.html#130934
Changing status to 'In Progress' for jammy, impish and focal.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1975582

Title:
  [UBUNTU 20.04] rcu stalls with many storage key guests

Status in Ubuntu on IBM z Systems:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Focal:
  In Progress
Status in linux source package in Impish:
  In Progress
Status in linux source package in Jammy:
  In Progress

Bug description:
  SRU Justification:
  ==

  [Impact]

   * Ubuntu on s390x KVM environments with lots of large guests with storage
 keys can be affected by rcu stalls.

   * These rcu stalls can cause the system to crash/dump.

  [Fix]

   * 3ae11dbcfac9 3ae11dbcfac906a8c3a480e98660a823130dc16a "s390/mm: use
  non-quiescing sske for KVM switch to keyed guest"

   * 6d5946274df1 6d5946274df1fff539a7eece458a43be733d1db8 "s390/gmap:
  voluntarily schedule during key setting"

  [Test Plan]

   * There is no trigger or direct test or re-creation of the 
 problem situation possible, but...

   * and IBM z13 or LinuxONE (or never) LPAR is needed that
 runs Ubuntu Server 20.04 LTS or 18.04 LTS with HWE kernel
 and acts as KVM host with again several large guests running
 on top with storage groups.

   * Let such a system running for days under significant load
 and watch the logs for rcu issues.

   * Prior to the submission of this SRU patched test kernels
 for focal 5.4 and bionic hwe-5.4 were created and tested.
 They ran for days at a staging environemnt at IBM
 without further issues.

   * The modifications are all limited to s390x.

   * A test kernel was build (see below) that ran in a test environment
 at IBM under appropriate load for several days.

  [Where problems could occur]

   * Due to the change for the KVM switch to keyed guest
 from classic sske to non-quiescing sske
 the KVM behaviour might have changed and the storage keys harmed.

   * The now more generous scheduling while setting keys
 has an impact on the guest memory management and mapping
 which will lead to a different performance.

   * This, with the introduction of __s390_enable_skey_pmd and
 cond_resched, might increase the overhead in certain situations,
 but eventually improves the responsiveness over time,
 hence avoid rcu stalls.

  [Other Info]
   
   * Since the patches are upstream in 5.19-rc1,
 they will be included in the kernel that is planned for kinetic (5.19).

   * Hence this is an SRU to jammy, impish and focal.

  __

  ---Problem Description---
  There can be rcu stalls when running lots of large guests with storage keys:

  [1377614.579833] rcu: INFO: rcu_sched self-detected stall on CPU
  [1377614.579845] rcu:   18-: (2099 ticks this GP) 
idle=54e/1/0x4002 softirq=35598716/35598716 fqs=998
  [1377614.579895](t=2100 jiffies g=155867385 q=20879)
  [1377614.579898] Task dump for CPU 18:
  [1377614.579899] CPU 1/KVM   R  running task0 1030947 256019 
0x0604
  [1377614.579902] Call Trace:
  [1377614.579912] ([<001f1f4b4f52>] show_stack+0x7a/0xc0)
  [1377614.579918]  [<001f1ec8e96c>] sched_show_task.part.0+0xdc/0x100
  [1377614.579919]  [<001f1f4b7248>] rcu_dump_cpu_stacks+0xc0/0x100
  [1377614.579924]  [<001f1ecdd10c>] rcu_sched_clock_irq+0x75c/0x980
  [1377614.579926]  [<001f1eceb26c>] update_process_times+0x3c/0x80
  [1377614.579931]  [<001f1ecfcfea>] tick_sched_handle.isra.0+0x4a/0x70
  [1377614.579932]  [<001f1ecfd28e>] tick_sched_timer+0x5e/0xc0
  [1377614.579933]  [<001f1ecec294>] __hrtimer_run_queues+0x114/0x2f0
  [1377614.579935]  [<001f1ececfdc>] hrtimer_interrupt+0x12c/0x2a0
  [1377614.579938]  [<001f1ebecb6a>] do_IRQ+0xaa/0xb0
  [1377614.579942]  [<001f1f4c6d08>] ext_int_handler+0x130/0x134
  [1377614.579945]  [<001f1ec0af10>] ptep_zap_key+0x40/0x60

  Contact Information = cborn...@de.ibm.com

  ---uname output---
   RELEASE: 5.4.0-90-generic
   VERSION: #101-Ubuntu SMP Fri Oct 15 19:59:45 UTC 2021

  == Comment: #1 - Christian Borntraeger  - 2022-05-24 
03:59:37 ==
  This is a test patch that might address the rcu stalls.

  == Comment: #2 - Christian Borntraeger  - 2022-05-24 
04:00:22 ==
  This is a 2nd patch that reduces the cost of key setting.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1975582/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1975592] Re: Enable Nezha board

2022-06-10 Thread Dimitri John Ledkov
** Description changed:

  Enable Nezha board
  
  Apply relevant patches to linux-riscv-5.17 kernel to enable nezha kernel
  flavour.
+ 
+ Backport patches from https://github.com/AlexGhiti/riscv-
+ linux/tree/int/alex/nezha_Ubuntu-unstable-5.17.0-8.8

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-riscv in Ubuntu.
https://bugs.launchpad.net/bugs/1975592

Title:
  Enable Nezha board

Status in linux-riscv package in Ubuntu:
  New

Bug description:
  Enable Nezha board

  Apply relevant patches to linux-riscv-5.17 kernel to enable nezha
  kernel flavour.

  Backport patches from https://github.com/AlexGhiti/riscv-
  linux/tree/int/alex/nezha_Ubuntu-unstable-5.17.0-8.8

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-riscv/+bug/1975592/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1975582] Re: [UBUNTU 20.04] rcu stalls with many storage key guests

2022-06-10 Thread Frank Heimes
** Also affects: linux (Ubuntu Impish)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: In Progress => Invalid

** Changed in: linux (Ubuntu Focal)
   Status: New => In Progress

** Changed in: linux (Ubuntu Impish)
   Status: New => In Progress

** Changed in: linux (Ubuntu Jammy)
   Status: New => In Progress

** Description changed:

+ SRU Justification:
+ ==
+ 
+ [Impact]
+ 
+  * Ubuntu on s390x KVM environments with lots of large guests with storage
+keys can be affected by rcu stalls.
+ 
+  * These rcu stalls can cause the system to crash/dump.
+ 
+ [Fix]
+ 
+  * 3ae11dbcfac9 3ae11dbcfac906a8c3a480e98660a823130dc16a "s390/mm: use
+ non-quiescing sske for KVM switch to keyed guest"
+ 
+  * 6d5946274df1 6d5946274df1fff539a7eece458a43be733d1db8 "s390/gmap:
+ voluntarily schedule during key setting"
+ 
+ [Test Plan]
+ 
+  * There is no trigger or direct test or re-creation of the 
+problem situation possible, but...
+ 
+  * and IBM z13 or LinuxONE (or never) LPAR is needed that
+runs Ubuntu Server 20.04 LTS or 18.04 LTS with HWE kernel
+and acts as KVM host with again several large guests running
+on top with storage groups.
+ 
+  * Let such a system running for days under significant load
+and watch the logs for rcu issues.
+ 
+  * Prior to the submission of this SRU patched test kernels
+for focal 5.4 and bionic hwe-5.4 were created and tested.
+They ran for days at a staging environemnt at IBM
+without further issues.
+ 
+  * The modifications are all limited to s390x.
+ 
+  * A test kernel was build (see below) that ran in a test environment
+at IBM under appropriate load for several days.
+ 
+ [Where problems could occur]
+ 
+  * Due to the change for the KVM switch to keyed guest
+from classic sske to non-quiescing sske
+the KVM behaviour might have changed and the storage keys harmed.
+ 
+  * The now more generous scheduling while setting keys
+has an impact on the guest memory management and mapping
+which will lead to a different performance.
+ 
+  * This, with the introduction of __s390_enable_skey_pmd and
+cond_resched, might increase the overhead in certain situations,
+but eventually improves the responsiveness over time,
+hence avoid rcu stalls.
+ 
+ [Other Info]
+  
+  * Since the patches are upstream in 5.19-rc1,
+they will be included in the kernel that is planned for kinetic (5.19).
+ 
+  * Hence this is an SRU to jammy, impish and focal.
+ 
+ __
+ 
  ---Problem Description---
  There can be rcu stalls when running lots of large guests with storage keys:
  
  [1377614.579833] rcu: INFO: rcu_sched self-detected stall on CPU
- [1377614.579845] rcu:   18-: (2099 ticks this GP) 
idle=54e/1/0x4002 softirq=35598716/35598716 fqs=998 
+ [1377614.579845] rcu:   18-: (2099 ticks this GP) 
idle=54e/1/0x4002 softirq=35598716/35598716 fqs=998
  [1377614.579895](t=2100 jiffies g=155867385 q=20879)
  [1377614.579898] Task dump for CPU 18:
  [1377614.579899] CPU 1/KVM   R  running task0 1030947 256019 
0x0604
  [1377614.579902] Call Trace:
  [1377614.579912] ([<001f1f4b4f52>] show_stack+0x7a/0xc0)
- [1377614.579918]  [<001f1ec8e96c>] sched_show_task.part.0+0xdc/0x100 
- [1377614.579919]  [<001f1f4b7248>] rcu_dump_cpu_stacks+0xc0/0x100 
- [1377614.579924]  [<001f1ecdd10c>] rcu_sched_clock_irq+0x75c/0x980 
- [1377614.579926]  [<001f1eceb26c>] update_process_times+0x3c/0x80 
- [1377614.579931]  [<001f1ecfcfea>] tick_sched_handle.isra.0+0x4a/0x70 
- [1377614.579932]  [<001f1ecfd28e>] tick_sched_timer+0x5e/0xc0 
- [1377614.579933]  [<001f1ecec294>] __hrtimer_run_queues+0x114/0x2f0 
- [1377614.579935]  [<001f1ececfdc>] hrtimer_interrupt+0x12c/0x2a0 
- [1377614.579938]  [<001f1ebecb6a>] do_IRQ+0xaa/0xb0 
- [1377614.579942]  [<001f1f4c6d08>] ext_int_handler+0x130/0x134 
- [1377614.579945]  [<001f1ec0af10>] ptep_zap_key+0x40/0x60 
+ [1377614.579918]  [<001f1ec8e96c>] sched_show_task.part.0+0xdc/0x100
+ [1377614.579919]  [<001f1f4b7248>] rcu_dump_cpu_stacks+0xc0/0x100
+ [1377614.579924]  [<001f1ecdd10c>] rcu_sched_clock_irq+0x75c/0x980
+ [1377614.579926]  [<001f1eceb26c>] update_process_times+0x3c/0x80
+ [1377614.579931]  [<001f1ecfcfea>] tick_sched_handle.isra.0+0x4a/0x70
+ [1377614.579932]  [<001f1ecfd28e>] tick_sched_timer+0x5e/0xc0
+ [1377614.579933]  [<001f1ecec294>] __hrtimer_run_queues+0x114/0x2f0
+ [1377614.579935]  [<001f1ececfdc>] hrtimer_interrupt+0x12c/0x2a0
+ [1377614.579938]  [<001f1ebecb6a>] do_IRQ+0xaa/0xb0
+ [1377614.579942]  [<001f1f4c6d08>] ext_int_handler+0x130/0x134
+ [1377614.579945]  [<001f1ec0af10>] ptep_zap_key+0x40/0x60
  
-  
- 

[Kernel-packages] [Bug 1978296] RfKill.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "RfKill.txt"
   https://bugs.launchpad.net/bugs/1978296/+attachment/5596416/+files/RfKill.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 

[Kernel-packages] [Bug 1978296] PulseList.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "PulseList.txt"
   
https://bugs.launchpad.net/bugs/1978296/+attachment/5596415/+files/PulseList.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 

[Kernel-packages] [Bug 1978296] ProcModules.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "ProcModules.txt"
   
https://bugs.launchpad.net/bugs/1978296/+attachment/5596414/+files/ProcModules.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 

[Kernel-packages] [Bug 1978296] ProcInterrupts.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "ProcInterrupts.txt"
   
https://bugs.launchpad.net/bugs/1978296/+attachment/5596413/+files/ProcInterrupts.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 

[Kernel-packages] [Bug 1978296] WifiSyslog.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "WifiSyslog.txt"
   
https://bugs.launchpad.net/bugs/1978296/+attachment/5596418/+files/WifiSyslog.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 

[Kernel-packages] [Bug 1978296] acpidump.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "acpidump.txt"
   
https://bugs.launchpad.net/bugs/1978296/+attachment/5596419/+files/acpidump.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 

[Kernel-packages] [Bug 1978296] UdevDb.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "UdevDb.txt"
   https://bugs.launchpad.net/bugs/1978296/+attachment/5596417/+files/UdevDb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 

[Kernel-packages] [Bug 1978296] Lsusb-t.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "Lsusb-t.txt"
   
https://bugs.launchpad.net/bugs/1978296/+attachment/5596407/+files/Lsusb-t.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 

[Kernel-packages] [Bug 1978296] ProcEnviron.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "ProcEnviron.txt"
   
https://bugs.launchpad.net/bugs/1978296/+attachment/5596412/+files/ProcEnviron.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 

[Kernel-packages] [Bug 1978296] ProcCpuinfoMinimal.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "ProcCpuinfoMinimal.txt"
   
https://bugs.launchpad.net/bugs/1978296/+attachment/5596411/+files/ProcCpuinfoMinimal.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 

[Kernel-packages] [Bug 1978296] ProcCpuinfo.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "ProcCpuinfo.txt"
   
https://bugs.launchpad.net/bugs/1978296/+attachment/5596410/+files/ProcCpuinfo.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 

[Kernel-packages] [Bug 1978296] Lsusb.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "Lsusb.txt"
   https://bugs.launchpad.net/bugs/1978296/+attachment/5596406/+files/Lsusb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 7f6d61d7af40
 

[Kernel-packages] [Bug 1978296] PaInfo.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "PaInfo.txt"
   https://bugs.launchpad.net/bugs/1978296/+attachment/5596409/+files/PaInfo.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 

[Kernel-packages] [Bug 1978296] Lsusb-v.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "Lsusb-v.txt"
   
https://bugs.launchpad.net/bugs/1978296/+attachment/5596408/+files/Lsusb-v.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 

[Kernel-packages] [Bug 1978296] CurrentDmesg.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "CurrentDmesg.txt"
   
https://bugs.launchpad.net/bugs/1978296/+attachment/5596402/+files/CurrentDmesg.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 

[Kernel-packages] [Bug 1978296] Lspci.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "Lspci.txt"
   https://bugs.launchpad.net/bugs/1978296/+attachment/5596404/+files/Lspci.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 7f6d61d7af40
 

[Kernel-packages] [Bug 1978296] IwConfig.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "IwConfig.txt"
   
https://bugs.launchpad.net/bugs/1978296/+attachment/5596403/+files/IwConfig.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 

[Kernel-packages] [Bug 1978296] Lspci-vt.txt

2022-06-10 Thread tannenzaepfle
apport information

** Attachment added: "Lspci-vt.txt"
   
https://bugs.launchpad.net/bugs/1978296/+attachment/5596405/+files/Lspci-vt.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 

[Kernel-packages] [Bug 1978296] Re: System hang with kernel general protection fault

2022-06-10 Thread tannenzaepfle
apport information

** Tags added: apport-collected jammy

** Description changed:

  My system running up-to-date Xubuntu 22.04 LTS and will frequently crash
  (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to press
  the power button and do a hard shutoff. The system hang is more likely
  when I open a webpage that taxes the system, but it also sometimes just
  happens randomly.
  
  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.
  
  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.
  
  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509
  
  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: fe00 RBX:  RCX: 7f6dc641ca3d
  RDX:  RSI: 0080 RDI: 7f6d237e6368
  RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
  R10:  R11: 0246 R12: 7f6d237e6340
  R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 7f6d61d7af40
   
  Modules linked in: uhid ccm rfcomm nvidia_uvm(PO) cmac algif_hash 
algif_skcipher af_alg bnep snd_hda_codec_hdmi intel_tcc_cooling 
snd_sof_pci_intel_cnl snd_sof_intel_hda_common soundwire_intel 
soundwire_generic_allocation soundwire_cadence snd_sof_intel_hda snd_sof_pci 
snd_sof_xtensa_dsp snd_sof snd_ctl_led 

[Kernel-packages] [Bug 1977919] Re: Docker container creation causes kernel oops on linux-aws 5.13.0.1028.31~20.04.22

2022-06-10 Thread Erik Forsberg
The ability to do 'sudo grub-reboot' depends on the use-case. In my
case, the docker jobs were started via crontab, and the machine didn't
crash completely, so I was able to login.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws-5.13 in Ubuntu.
https://bugs.launchpad.net/bugs/1977919

Title:
  Docker container creation causes kernel oops on linux-aws
  5.13.0.1028.31~20.04.22

Status in linux-aws-5.13 package in Ubuntu:
  Confirmed
Status in linux-azure-5.13 package in Ubuntu:
  Confirmed
Status in linux-gcp-5.13 package in Ubuntu:
  Confirmed
Status in linux-intel-iotg-5.15 package in Ubuntu:
  Confirmed
Status in linux-oracle-5.13 package in Ubuntu:
  Confirmed
Status in linux-aws-5.13 source package in Focal:
  Fix Committed
Status in linux-azure-5.13 source package in Focal:
  Fix Committed
Status in linux-gcp-5.13 source package in Focal:
  Fix Committed
Status in linux-intel-iotg-5.15 source package in Focal:
  Won't Fix
Status in linux-oracle-5.13 source package in Focal:
  Fix Committed

Bug description:
  Running the attached script on the latest AWS AMI for Ubuntu 20.04, I
  get a kernel panic and hard reset of the node.

  [   12.314552] VFS: Close: file count is 0
  [   12.351090] [ cut here ]
  [   12.351093] kernel BUG at include/linux/fs.h:3104!
  [   12.355272] invalid opcode:  [#1] SMP PTI
  [   12.358963] CPU: 1 PID: 863 Comm: sed Not tainted 5.13.0-1028-aws 
#31~20.04.1-Ubuntu
  [   12.366241] Hardware name: Amazon EC2 m5.large/, BIOS 1.0 10/16/2017
  [   12.371130] RIP: 0010:__fput+0x247/0x250
  [   12.374897] Code: 00 48 85 ff 0f 84 8b fe ff ff f6 c7 40 0f 85 82 fe ff ff 
e8 ab 38 00 00 e9 78 fe ff ff 4c 89 f7 e8 2e 88 02 00 e9 b5 fe ff ff <0f> 0b 0f 
1f 80 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 53 31 db 48
  [   12.389075] RSP: 0018:b50280d9fd88 EFLAGS: 00010246
  [   12.393425] RAX:  RBX: 000a801d RCX: 
9152e0716000
  [   12.398679] RDX: 9152cf075280 RSI: 0001 RDI: 

  [   12.403879] RBP: b50280d9fdb0 R08: 0001 R09: 
9152dfcba2c8
  [   12.409102] R10: b50280d9fd88 R11: 9152d04e9d10 R12: 
9152d04e9d00
  [   12.414333] R13: 9152dfcba2c8 R14: 9152cf0752a0 R15: 
9152dfc2e180
  [   12.419533] FS:  () GS:9153ea90() 
knlGS:
  [   12.426937] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.431506] CR2: 556cf30250a8 CR3: bce10006 CR4: 
007706e0
  [   12.436716] DR0:  DR1:  DR2: 

  [   12.441941] DR3:  DR6: fffe0ff0 DR7: 
0400
  [   12.447170] PKRU: 5554
  [   12.450355] Call Trace:
  [   12.453408]  
  [   12.456296]  fput+0xe/0x10
  [   12.459633]  task_work_run+0x70/0xb0
  [   12.463157]  do_exit+0x37b/0xaf0
  [   12.466570]  do_group_exit+0x43/0xb0
  [   12.470142]  __x64_sys_exit_group+0x18/0x20
  [   12.473989]  do_syscall_64+0x61/0xb0
  [   12.477565]  ? exit_to_user_mode_prepare+0x9b/0x1c0
  [   12.481734]  ? do_user_addr_fault+0x1d0/0x650
  [   12.485665]  ? irqentry_exit_to_user_mode+0x9/0x20
  [   12.489790]  ? irqentry_exit+0x19/0x30
  [   12.493443]  ? exc_page_fault+0x8f/0x170
  [   12.497199]  ? asm_exc_page_fault+0x8/0x30
  [   12.501013]  entry_SYSCALL_64_after_hwframe+0x44/0xae
  [   12.505289] RIP: 0033:0x7f80d42a1bd6
  [   12.508868] Code: Unable to access opcode bytes at RIP 0x7f80d42a1bac.
  [   12.513783] RSP: 002b:7ffe924f9ed8 EFLAGS: 0246 ORIG_RAX: 
00e7
  [   12.520897] RAX: ffda RBX: 7f80d45a4740 RCX: 
7f80d42a1bd6
  [   12.526115] RDX:  RSI: 003c RDI: 

  [   12.531328] RBP:  R08: 00e7 R09: 
fe98
  [   12.536484] R10: 7f80d3d422a0 R11: 0246 R12: 
7f80d45a4740
  [   12.541687] R13: 0002 R14: 7f80d45ad708 R15: 

  [   12.546916]  
  [   12.549829] Modules linked in: xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c 
bpfilter br_netfilter bridge stp llc aufs overlay nls_iso8859_1 dm_multipath 
scsi_dh_rdac scsi_dh_emc scsi_dh_alua crct10dif_pclmul ppdev crc32_pclmul 
ghash_clmulni_intel aesni_intel crypto_simd psmouse cryptd parport_pc 
input_leds parport ena serio_raw sch_fq_codel ipmi_devintf ipmi_msghandler msr 
drm ip_tables x_tables autofs4
  [   12.583913] ---[ end trace 77367fed4d782aa4 ]---
  [   12.587963] RIP: 0010:__fput+0x247/0x250
  [   12.591729] Code: 00 48 85 ff 0f 84 8b fe ff ff f6 c7 40 0f 85 82 fe ff ff 
e8 ab 38 00 00 e9 78 fe ff ff 4c 89 f7 e8 2e 88 02 00 e9 b5 fe ff ff <0f> 0b 0f 
1f 80 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 53 31 db 48
  [   12.605796] RSP: 

[Kernel-packages] [Bug 1978296] Missing required logs.

2022-06-10 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1978296

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 

[Kernel-packages] [Bug 1978296] Re: System hang with kernel general protection fault

2022-06-10 Thread Chris Guiver
Thank you for taking the time to report this bug and helping to make
Ubuntu better. Please execute the following command only once, as it
will automatically gather debugging information, in a terminal:

apport-collect 1978296

When reporting bugs in the future please use apport by using 'ubuntu-
bug' and the name of the package affected. You can learn more about this
functionality at https://wiki.ubuntu.com/ReportingBugs.

** Package changed: ubuntu => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1978296

Title:
  System hang with kernel general protection fault

Status in linux package in Ubuntu:
  New

Bug description:
  My system running up-to-date Xubuntu 22.04 LTS and will frequently
  crash (several times a day). I found a "general protection fault" in
  /var/log/syslog. The system will be entirely unresponsive; I cannot
  escape to TTY and kill whatever offending process it is. I need to
  press the power button and do a hard shutoff. The system hang is more
  likely when I open a webpage that taxes the system, but it also
  sometimes just happens randomly.

  Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
  sudo lshw says 087C, which is a 9570; not sure if this is relevant).
  This has an 8th generation i7 core.

  When googling the error message, I found a similar error message here,
  also a Dell, but the linked bug appears to have been patched.

  https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509

  
   general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
   CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
   Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
   RIP: 0010:rmqueue+0x44a/0xba0
   Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 
00 00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 
48 89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
   RSP: 0018:a945044d7750 EFLAGS: 00010093
   RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
   RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
   RBP: a945044d7820 R08: f0d490323600 R09: 0001
   R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
   R13:  R14: 90c62c536590 R15: 0002d588
   FS:  () GS:90c62c50() knlGS:
   CS:  0010 DS:  ES:  CR0: 80050033
   CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
   Call Trace:

? cpumask_next_and+0x24/0x30
? cpumask_next_and+0x24/0x30
? update_sg_lb_stats+0x78/0x570
? update_sg_lb_stats+0x78/0x570
get_page_from_freelist+0xd1/0x520
__alloc_pages+0x17e/0x320
alloc_pages_vma+0x9d/0x380
wp_page_copy+0x7b/0x570
? find_busiest_group+0x75/0x190
do_wp_page+0xca/0x2e0
handle_pte_fault+0x20b/0x230
__handle_mm_fault+0x3c7/0x700
handle_mm_fault+0xd8/0x2c0
do_user_addr_fault+0x1c5/0x670
exc_page_fault+0x77/0x160
asm_exc_page_fault+0x1e/0x30
   RIP: 0010:__put_user_nocheck_4+0x3/0x11
   Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 
00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca 
c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
   RSP: 0018:a945044d7c80 EFLAGS: 00050293
   RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
   RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
   RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
   R10: 0027 R11:  R12: 90c3c2db9940
   R13: 90c2da579980 R14:  R15: 90c3c2db9940
? mm_release+0xad/0xd0
exit_mm_release+0x23/0x30
exit_mm+0x3c/0x1d0
do_exit+0x1e0/0x3c0
do_group_exit+0x3b/0xb0
get_signal+0x150/0x900
arch_do_signal_or_restart+0xda/0x100
? do_futex+0x13d/0x1d0
? __x64_sys_futex+0x78/0x1e0
exit_to_user_mode_loop+0xc4/0x160
exit_to_user_mode_prepare+0x9c/0xb0
syscall_exit_to_user_mode+0x27/0x50
do_syscall_64+0x69/0xc0
? do_syscall_64+0x69/0xc0
? exit_to_user_mode_prepare+0x37/0xb0
? syscall_exit_to_user_mode+0x27/0x50
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? __do_sys_sched_yield+0xe/0x20
? do_syscall_64+0x69/0xc0
? irqentry_exit+0x19/0x30
? exc_page_fault+0x89/0x160
   ? asm_exc_page_fault+0x8/0x30
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7f6dc641ca3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
  RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
  RAX: 

[Kernel-packages] [Bug 1978296] [NEW] System hang with kernel general protection fault

2022-06-10 Thread Launchpad Bug Tracker
You have been subscribed to a public bug:

My system running up-to-date Xubuntu 22.04 LTS and will frequently crash
(several times a day). I found a "general protection fault" in
/var/log/syslog. The system will be entirely unresponsive; I cannot
escape to TTY and kill whatever offending process it is. I need to press
the power button and do a hard shutoff. The system hang is more likely
when I open a webpage that taxes the system, but it also sometimes just
happens randomly.

Hardware is a Dell XPS 15 (the label says P56F, which is a 9550, but
sudo lshw says 087C, which is a 9570; not sure if this is relevant).
This has an 8th generation i7 core.

When googling the error message, I found a similar error message here,
also a Dell, but the linked bug appears to have been patched.

https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.10/+bug/1931509


 general protection fault, probably for non-canonical address 
0xfffdf0d490323650:  [#16] SMP PTI
 CPU: 4 PID: 19037 Comm: WRRende~ckend#7 Tainted: P  DO  
5.15.0-37-generic #39-Ubuntu
 Hardware name: Dell Inc. XPS 15 9570/0D0T05, BIOS 1.23.0 12/02/2021
 RIP: 0010:rmqueue+0x44a/0xba0
 Code: 04 49 8b 46 10 49 01 db 49 39 c3 0f 84 2f 01 00 00 48 be 00 01 00 00 00 
00 ad de 49 8b 46 10 48 8b 08 48 8b 50 08 4c 8d 40 f8 <48> 89 51 08 48 89 0a 48 
89 30 48 83 c6 22 48 89 70 08 41 83 fd 1f
 RSP: 0018:a945044d7750 EFLAGS: 00010093
 RAX: f0d490323608 RBX: 90c62c536580 RCX: fffdf0d490323648
 RDX: 90c62c5365a0 RSI: dead0100 RDI: 90c63c7d6b80
 RBP: a945044d7820 R08: f0d490323600 R09: 0001
 R10: 0293 R11: 90c62c5365a0 R12: 90c63c7d6b80
 R13:  R14: 90c62c536590 R15: 0002d588
 FS:  () GS:90c62c50() knlGS:
 CS:  0010 DS:  ES:  CR0: 80050033
 CR2: 7f6d61d7d910 CR3: 0003944a4004 CR4: 003706e0
 Call Trace:
  
  ? cpumask_next_and+0x24/0x30
  ? cpumask_next_and+0x24/0x30
  ? update_sg_lb_stats+0x78/0x570
  ? update_sg_lb_stats+0x78/0x570
  get_page_from_freelist+0xd1/0x520
  __alloc_pages+0x17e/0x320
  alloc_pages_vma+0x9d/0x380
  wp_page_copy+0x7b/0x570
  ? find_busiest_group+0x75/0x190
  do_wp_page+0xca/0x2e0
  handle_pte_fault+0x20b/0x230
  __handle_mm_fault+0x3c7/0x700
  handle_mm_fault+0xd8/0x2c0
  do_user_addr_fault+0x1c5/0x670
  exc_page_fault+0x77/0x160
  asm_exc_page_fault+0x1e/0x30
 RIP: 0010:__put_user_nocheck_4+0x3/0x11
 Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 00 
48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 
66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f
 RSP: 0018:a945044d7c80 EFLAGS: 00050293
 RAX:  RBX: 7fffeffd RCX: 7f6d61d7d910
 RDX:  RSI: 90c2da579980 RDI: 7f6d61d7d910
 RBP: a945044d7ca0 R08: 0009 R09: 7f6d61d7d920
 R10: 0027 R11:  R12: 90c3c2db9940
 R13: 90c2da579980 R14:  R15: 90c3c2db9940
  ? mm_release+0xad/0xd0
  exit_mm_release+0x23/0x30
  exit_mm+0x3c/0x1d0
  do_exit+0x1e0/0x3c0
  do_group_exit+0x3b/0xb0
  get_signal+0x150/0x900
  arch_do_signal_or_restart+0xda/0x100
  ? do_futex+0x13d/0x1d0
  ? __x64_sys_futex+0x78/0x1e0
  exit_to_user_mode_loop+0xc4/0x160
  exit_to_user_mode_prepare+0x9c/0xb0
  syscall_exit_to_user_mode+0x27/0x50
  do_syscall_64+0x69/0xc0
  ? do_syscall_64+0x69/0xc0
  ? exit_to_user_mode_prepare+0x37/0xb0
  ? syscall_exit_to_user_mode+0x27/0x50
  ? __do_sys_sched_yield+0xe/0x20
  ? do_syscall_64+0x69/0xc0
  ? __do_sys_sched_yield+0xe/0x20
  ? do_syscall_64+0x69/0xc0
  ? irqentry_exit+0x19/0x30
  ? exc_page_fault+0x89/0x160
 ? asm_exc_page_fault+0x8/0x30
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f6dc641ca3d
Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 
c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
RSP: 002b:7f6d61d7aeb8 EFLAGS: 0246 ORIG_RAX: 00ca
RAX: fe00 RBX:  RCX: 7f6dc641ca3d
RDX:  RSI: 0080 RDI: 7f6d237e6368
RBP: 7f6d237e6368 R08: 7f6d443dd100 R09: 0060
R10:  R11: 0246 R12: 7f6d237e6340
R13: 7f6dc641ca20 R14: 7f6d61d7afd0 R15: 7f6d61d7af40
 
Modules linked in: uhid ccm rfcomm nvidia_uvm(PO) cmac algif_hash 
algif_skcipher af_alg bnep snd_hda_codec_hdmi intel_tcc_cooling 
snd_sof_pci_intel_cnl snd_sof_intel_hda_common soundwire_intel 
soundwire_generic_allocation soundwire_cadence snd_sof_intel_hda snd_sof_pci 
snd_sof_xtensa_dsp snd_sof snd_ctl_led snd_soc_hdac_hda x86_pkg_temp_thermal 
snd_hda_ext_core intel_powerclamp snd_hda_codec_realtek 
snd_soc_acpi_intel_match snd_soc_acpi snd_hda_codec_generic soundwire_bus 
snd_soc_core snd_compress ac97_bus snd_pcm_dmaengine mei_hdcp 

[Kernel-packages] [Bug 1967205] Re: Lenovo laptop doesn't wake from sleep with kernel newer than 5.13.0-27-generic

2022-06-10 Thread naktinis
I may have the same or related issue after upgrading to 22.04 on Lenovo
Carbon X1 4th gen. Not only does it not wake up from sleep, but it
doesn't even shut down properly. The screen switches off, but the
keyboard lights are still on and the battery keeps draining so I presume
other parts of hardware are still on as well.

When it goes to sleep it looks similar, but also the power button
pulsates indicating sleep mode. It just doesn't wake up. Had no problem
with 20.04, also Windows can sleep and shut down properly on the same
machine.

Couldn't see anything obvious in journalctl during the shutdown, but
I'll attach some excerpts below anyway.

Example end of shutdown log in journalct:

```
jun 10 12:32:29 carbon systemd-journald[327]: Journal stopped
jun 10 12:32:29 carbon systemd-shutdown[1]: Sending SIGTERM to remaining 
processes...
jun 10 12:32:29 carbon systemd-shutdown[1]: Syncing filesystems and block 
devices.
jun 10 12:32:29 carbon systemd[1]: Shutting down.
jun 10 12:32:29 carbon systemd[1]: Reached target System Power Off.
jun 10 12:32:29 carbon systemd[1]: Finished System Power Off.
jun 10 12:32:29 carbon systemd[1]: systemd-poweroff.service: Deactivated 
successfully.
jun 10 12:32:29 carbon systemd[1]: Reached target Late Shutdown Services.
jun 10 12:32:29 carbon systemd[1]: Reached target Unmount All Filesystems.
```

Example end of suspend log in journalctl:

```
jun 10 12:51:02 carbon kernel: PM: suspend entry (deep)
jun 10 12:51:02 carbon systemd-sleep[6398]: Entering sleep state 'suspend'...
jun 10 12:51:02 carbon systemd[1]: Finished Record successful boot for GRUB.
jun 10 12:51:02 carbon systemd[1]: grub-common.service: Deactivated 
successfully.
jun 10 12:51:02 carbon systemd[1]: Starting System Suspend...
jun 10 12:51:02 carbon systemd[1]: Starting Record successful boot for GRUB...
jun 10 12:51:01 carbon systemd[1]: Reached target Sleep.
```

Let me know if I can provide any additional information.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1967205

Title:
  Lenovo laptop doesn't wake from sleep with kernel newer than
  5.13.0-27-generic

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Issue: When closing the lid, my Lenovo 6 laptop goes to sleep, but
  when opening the lid the laptop will not wake from sleep when using a
  kernel newer than 5.13.0-27-generic. Pressing keys or the power button
  also does not wake the laptop from sleep.

  Expected behavior: The laptop should wake from sleep when opening the
  laptop lid when using the newest kernel.

  Steps to reproduce:
  1. Boot laptop using kernel 5.13.0-27-generic
  2. Close lid to put laptop to sleep
  3. Open laptop lid and see laptop resume from sleep
  4. Boot laptop with kernel newer than 5.13.0-27-generic
  5. Close lid to put laptop to sleep
  6. Open laptop lid and see laptop never resumes from sleep

  Work around: Hold the power button until laptop powers off. Press the
  power button again to power on the laptop

  Release: Ubuntu 21.10
  Machine: Lenovo Yoga 6 laptop

  ProblemType: Bug
  DistroRelease: Ubuntu 21.10
  Package: linux-image-5.13.0-39-generic 5.13.0-39.44
  ProcVersionSignature: Ubuntu 5.13.0-39.44-generic 5.13.19
  Uname: Linux 5.13.0-39-generic x86_64
  ApportVersion: 2.20.11-0ubuntu71
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  cale   1963 F pulseaudio
   /dev/snd/controlC2:  cale   1963 F pulseaudio
   /dev/snd/controlC0:  cale   1963 F pulseaudio
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Wed Mar 30 21:50:57 2022
  InstallationDate: Installed on 2021-12-06 (114 days ago)
  InstallationMedia: Ubuntu 21.10 "Impish Indri" - Release amd64 (20211012)
  MachineType: LENOVO 82ND
  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 amdgpudrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.13.0-39-generic 
root=UUID=5f98fca4-658f-4f22-8c2b-f320c086f693 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-5.13.0-39-generic N/A
   linux-backports-modules-5.13.0-39-generic  N/A
   linux-firmware 1.201.5
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 05/28/2021
  dmi.bios.release: 1.10
  dmi.bios.vendor: LENOVO
  dmi.bios.version: H6CN10WW(V1.03)
  dmi.board.asset.tag: NO Asset Tag
  dmi.board.name: LNVNB161216
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0J40709 WIN
  dmi.chassis.asset.tag: NO Asset Tag
  dmi.chassis.type: 31
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Yoga 6 13ALC6
  dmi.ec.firmware.release: 1.10
  dmi.modalias: 

[Kernel-packages] [Bug 1977919] Re: Docker container creation causes kernel oops on linux-aws 5.13.0.1028.31~20.04.22

2022-06-10 Thread Jason Campanella
Not sure if it will work on GCP but in Azure you hold escape to get into
Grub while the system is booting.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws-5.13 in Ubuntu.
https://bugs.launchpad.net/bugs/1977919

Title:
  Docker container creation causes kernel oops on linux-aws
  5.13.0.1028.31~20.04.22

Status in linux-aws-5.13 package in Ubuntu:
  Confirmed
Status in linux-azure-5.13 package in Ubuntu:
  Confirmed
Status in linux-gcp-5.13 package in Ubuntu:
  Confirmed
Status in linux-intel-iotg-5.15 package in Ubuntu:
  Confirmed
Status in linux-oracle-5.13 package in Ubuntu:
  Confirmed
Status in linux-aws-5.13 source package in Focal:
  Fix Committed
Status in linux-azure-5.13 source package in Focal:
  Fix Committed
Status in linux-gcp-5.13 source package in Focal:
  Fix Committed
Status in linux-intel-iotg-5.15 source package in Focal:
  Won't Fix
Status in linux-oracle-5.13 source package in Focal:
  Fix Committed

Bug description:
  Running the attached script on the latest AWS AMI for Ubuntu 20.04, I
  get a kernel panic and hard reset of the node.

  [   12.314552] VFS: Close: file count is 0
  [   12.351090] [ cut here ]
  [   12.351093] kernel BUG at include/linux/fs.h:3104!
  [   12.355272] invalid opcode:  [#1] SMP PTI
  [   12.358963] CPU: 1 PID: 863 Comm: sed Not tainted 5.13.0-1028-aws 
#31~20.04.1-Ubuntu
  [   12.366241] Hardware name: Amazon EC2 m5.large/, BIOS 1.0 10/16/2017
  [   12.371130] RIP: 0010:__fput+0x247/0x250
  [   12.374897] Code: 00 48 85 ff 0f 84 8b fe ff ff f6 c7 40 0f 85 82 fe ff ff 
e8 ab 38 00 00 e9 78 fe ff ff 4c 89 f7 e8 2e 88 02 00 e9 b5 fe ff ff <0f> 0b 0f 
1f 80 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 53 31 db 48
  [   12.389075] RSP: 0018:b50280d9fd88 EFLAGS: 00010246
  [   12.393425] RAX:  RBX: 000a801d RCX: 
9152e0716000
  [   12.398679] RDX: 9152cf075280 RSI: 0001 RDI: 

  [   12.403879] RBP: b50280d9fdb0 R08: 0001 R09: 
9152dfcba2c8
  [   12.409102] R10: b50280d9fd88 R11: 9152d04e9d10 R12: 
9152d04e9d00
  [   12.414333] R13: 9152dfcba2c8 R14: 9152cf0752a0 R15: 
9152dfc2e180
  [   12.419533] FS:  () GS:9153ea90() 
knlGS:
  [   12.426937] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.431506] CR2: 556cf30250a8 CR3: bce10006 CR4: 
007706e0
  [   12.436716] DR0:  DR1:  DR2: 

  [   12.441941] DR3:  DR6: fffe0ff0 DR7: 
0400
  [   12.447170] PKRU: 5554
  [   12.450355] Call Trace:
  [   12.453408]  
  [   12.456296]  fput+0xe/0x10
  [   12.459633]  task_work_run+0x70/0xb0
  [   12.463157]  do_exit+0x37b/0xaf0
  [   12.466570]  do_group_exit+0x43/0xb0
  [   12.470142]  __x64_sys_exit_group+0x18/0x20
  [   12.473989]  do_syscall_64+0x61/0xb0
  [   12.477565]  ? exit_to_user_mode_prepare+0x9b/0x1c0
  [   12.481734]  ? do_user_addr_fault+0x1d0/0x650
  [   12.485665]  ? irqentry_exit_to_user_mode+0x9/0x20
  [   12.489790]  ? irqentry_exit+0x19/0x30
  [   12.493443]  ? exc_page_fault+0x8f/0x170
  [   12.497199]  ? asm_exc_page_fault+0x8/0x30
  [   12.501013]  entry_SYSCALL_64_after_hwframe+0x44/0xae
  [   12.505289] RIP: 0033:0x7f80d42a1bd6
  [   12.508868] Code: Unable to access opcode bytes at RIP 0x7f80d42a1bac.
  [   12.513783] RSP: 002b:7ffe924f9ed8 EFLAGS: 0246 ORIG_RAX: 
00e7
  [   12.520897] RAX: ffda RBX: 7f80d45a4740 RCX: 
7f80d42a1bd6
  [   12.526115] RDX:  RSI: 003c RDI: 

  [   12.531328] RBP:  R08: 00e7 R09: 
fe98
  [   12.536484] R10: 7f80d3d422a0 R11: 0246 R12: 
7f80d45a4740
  [   12.541687] R13: 0002 R14: 7f80d45ad708 R15: 

  [   12.546916]  
  [   12.549829] Modules linked in: xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c 
bpfilter br_netfilter bridge stp llc aufs overlay nls_iso8859_1 dm_multipath 
scsi_dh_rdac scsi_dh_emc scsi_dh_alua crct10dif_pclmul ppdev crc32_pclmul 
ghash_clmulni_intel aesni_intel crypto_simd psmouse cryptd parport_pc 
input_leds parport ena serio_raw sch_fq_codel ipmi_devintf ipmi_msghandler msr 
drm ip_tables x_tables autofs4
  [   12.583913] ---[ end trace 77367fed4d782aa4 ]---
  [   12.587963] RIP: 0010:__fput+0x247/0x250
  [   12.591729] Code: 00 48 85 ff 0f 84 8b fe ff ff f6 c7 40 0f 85 82 fe ff ff 
e8 ab 38 00 00 e9 78 fe ff ff 4c 89 f7 e8 2e 88 02 00 e9 b5 fe ff ff <0f> 0b 0f 
1f 80 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 53 31 db 48
  [   12.605796] RSP: 0018:b50280d9fd88 EFLAGS: 00010246
  [   12.610166] RAX:  RBX: 

[Kernel-packages] [Bug 1967493] Re: pl2303 serial adapter not recognized

2022-06-10 Thread Po-Hsu Lin
Thanks for the test! I will SRU this to our kernel.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1967493

Title:
  pl2303 serial adapter not recognized

Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Impish:
  New
Status in linux source package in Jammy:
  New
Status in linux source package in Kinetic:
  Incomplete

Bug description:
  Hi

  After upgrading the Linux kernel from 5.11.0-27 to 5.13.0-37 a device
  that uses a pl2303 usb serial chip no longer works.

  This seems very similar to bug 1959110, and according to that it
  should be fixed, but somehow it's not.

  # uname -a
  Linux GAU23LD04 5.13.0-37-generic #42~20.04.1-Ubuntu SMP Tue Mar 15 
15:44:28 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux

  # journalctl -b -k -g pl2303 -o cat
  usbcore: registered new interface driver pl2303
  usbserial: USB Serial support registered for pl2303
  pl2303 1-12:1.0: pl2303 converter detected
  pl2303 1-12:1.0: unknown device type, please report to 
linux-...@vger.kernel.org

  # udevadm info /sys/devices/pci:00/:00:14.0/usb1/1-12/1-12:1.0 
  P: /devices/pci:00/:00:14.0/usb1/1-12/1-12:1.0
  L: 0
  E: DEVPATH=/devices/pci:00/:00:14.0/usb1/1-12/1-12:1.0
  E: DEVTYPE=usb_interface
  E: PRODUCT=67b/2303/300
  E: TYPE=0/0/0
  E: INTERFACE=255/0/0
  E: MODALIAS=usb:v067Bp2303d0300dc00dsc00dp00icFFisc00ip00in00
  E: SUBSYSTEM=usb
  E: USEC_INITIALIZED=56177916
  E: ID_VENDOR_FROM_DATABASE=Prolific Technology, Inc.
  E: ID_MODEL_FROM_DATABASE=PL2303 Serial Port
  E: ID_PATH=pci-:00:14.0-usb-0:12:1.0
  E: ID_PATH_TAG=pci-_00_14_0-usb-0_12_1_0
  E: ID_MM_TTY_MANUAL_SCAN_ONLY=1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1967493/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1977919] Re: Docker container creation causes kernel oops on linux-aws 5.13.0.1028.31~20.04.22

2022-06-10 Thread dan the person
i'm intrigued, how do you 'sudo grub-reboot' when the machine is
crashed?

And if anyone knows how to get the grub boot menu to respond to the
keyboard over the serial console on GCP that'd be great, as it would
have having to attach the disk to another instance to change the boot
kernel or options

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws-5.13 in Ubuntu.
https://bugs.launchpad.net/bugs/1977919

Title:
  Docker container creation causes kernel oops on linux-aws
  5.13.0.1028.31~20.04.22

Status in linux-aws-5.13 package in Ubuntu:
  Confirmed
Status in linux-azure-5.13 package in Ubuntu:
  Confirmed
Status in linux-gcp-5.13 package in Ubuntu:
  Confirmed
Status in linux-intel-iotg-5.15 package in Ubuntu:
  Confirmed
Status in linux-oracle-5.13 package in Ubuntu:
  Confirmed
Status in linux-aws-5.13 source package in Focal:
  Fix Committed
Status in linux-azure-5.13 source package in Focal:
  Fix Committed
Status in linux-gcp-5.13 source package in Focal:
  Fix Committed
Status in linux-intel-iotg-5.15 source package in Focal:
  Won't Fix
Status in linux-oracle-5.13 source package in Focal:
  Fix Committed

Bug description:
  Running the attached script on the latest AWS AMI for Ubuntu 20.04, I
  get a kernel panic and hard reset of the node.

  [   12.314552] VFS: Close: file count is 0
  [   12.351090] [ cut here ]
  [   12.351093] kernel BUG at include/linux/fs.h:3104!
  [   12.355272] invalid opcode:  [#1] SMP PTI
  [   12.358963] CPU: 1 PID: 863 Comm: sed Not tainted 5.13.0-1028-aws 
#31~20.04.1-Ubuntu
  [   12.366241] Hardware name: Amazon EC2 m5.large/, BIOS 1.0 10/16/2017
  [   12.371130] RIP: 0010:__fput+0x247/0x250
  [   12.374897] Code: 00 48 85 ff 0f 84 8b fe ff ff f6 c7 40 0f 85 82 fe ff ff 
e8 ab 38 00 00 e9 78 fe ff ff 4c 89 f7 e8 2e 88 02 00 e9 b5 fe ff ff <0f> 0b 0f 
1f 80 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 53 31 db 48
  [   12.389075] RSP: 0018:b50280d9fd88 EFLAGS: 00010246
  [   12.393425] RAX:  RBX: 000a801d RCX: 
9152e0716000
  [   12.398679] RDX: 9152cf075280 RSI: 0001 RDI: 

  [   12.403879] RBP: b50280d9fdb0 R08: 0001 R09: 
9152dfcba2c8
  [   12.409102] R10: b50280d9fd88 R11: 9152d04e9d10 R12: 
9152d04e9d00
  [   12.414333] R13: 9152dfcba2c8 R14: 9152cf0752a0 R15: 
9152dfc2e180
  [   12.419533] FS:  () GS:9153ea90() 
knlGS:
  [   12.426937] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.431506] CR2: 556cf30250a8 CR3: bce10006 CR4: 
007706e0
  [   12.436716] DR0:  DR1:  DR2: 

  [   12.441941] DR3:  DR6: fffe0ff0 DR7: 
0400
  [   12.447170] PKRU: 5554
  [   12.450355] Call Trace:
  [   12.453408]  
  [   12.456296]  fput+0xe/0x10
  [   12.459633]  task_work_run+0x70/0xb0
  [   12.463157]  do_exit+0x37b/0xaf0
  [   12.466570]  do_group_exit+0x43/0xb0
  [   12.470142]  __x64_sys_exit_group+0x18/0x20
  [   12.473989]  do_syscall_64+0x61/0xb0
  [   12.477565]  ? exit_to_user_mode_prepare+0x9b/0x1c0
  [   12.481734]  ? do_user_addr_fault+0x1d0/0x650
  [   12.485665]  ? irqentry_exit_to_user_mode+0x9/0x20
  [   12.489790]  ? irqentry_exit+0x19/0x30
  [   12.493443]  ? exc_page_fault+0x8f/0x170
  [   12.497199]  ? asm_exc_page_fault+0x8/0x30
  [   12.501013]  entry_SYSCALL_64_after_hwframe+0x44/0xae
  [   12.505289] RIP: 0033:0x7f80d42a1bd6
  [   12.508868] Code: Unable to access opcode bytes at RIP 0x7f80d42a1bac.
  [   12.513783] RSP: 002b:7ffe924f9ed8 EFLAGS: 0246 ORIG_RAX: 
00e7
  [   12.520897] RAX: ffda RBX: 7f80d45a4740 RCX: 
7f80d42a1bd6
  [   12.526115] RDX:  RSI: 003c RDI: 

  [   12.531328] RBP:  R08: 00e7 R09: 
fe98
  [   12.536484] R10: 7f80d3d422a0 R11: 0246 R12: 
7f80d45a4740
  [   12.541687] R13: 0002 R14: 7f80d45ad708 R15: 

  [   12.546916]  
  [   12.549829] Modules linked in: xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c 
bpfilter br_netfilter bridge stp llc aufs overlay nls_iso8859_1 dm_multipath 
scsi_dh_rdac scsi_dh_emc scsi_dh_alua crct10dif_pclmul ppdev crc32_pclmul 
ghash_clmulni_intel aesni_intel crypto_simd psmouse cryptd parport_pc 
input_leds parport ena serio_raw sch_fq_codel ipmi_devintf ipmi_msghandler msr 
drm ip_tables x_tables autofs4
  [   12.583913] ---[ end trace 77367fed4d782aa4 ]---
  [   12.587963] RIP: 0010:__fput+0x247/0x250
  [   12.591729] Code: 00 48 85 ff 0f 84 8b fe ff ff f6 c7 40 0f 85 82 fe ff ff 
e8 ab 38 00 00 e9 78 fe ff ff 4c 89 f7 e8 2e 88 02 00 e9 b5 

[Kernel-packages] [Bug 1976511] Re: kernel taint ( warning ) caused by smpboot.c: on 5.4.0

2022-06-10 Thread Andrea Righi
@zhanglei-mao have you tried to update the kernel? Does it still happen
also with a more recent 5.4?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1976511

Title:
  kernel taint ( warning ) caused by smpboot.c: on 5.4.0

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Apr  6 02:33:31 G292-280 kernel: [0.007531] [ cut here 
]
  Apr  6 02:33:31 G292-280 kernel: [0.007531] sched: CPU #20's llc-sibling 
CPU #0 is not on the same node! [node: 1 != 0]. Ignoring dependency.
  Apr  6 02:33:31 G292-280 kernel: [0.007531] WARNING: CPU: 20 PID: 0 at 
/build/linux-hwe-5.4-9Mb2g5/linux-hwe-5.4-5.4.0/arch/x86/kernel/smpboot.c:426 
topology_sane.isra.9+0x6c/0x70
  Apr  6 02:33:31 G292-280 kernel: [0.007531] Modules linked in:
  Apr  6 02:33:31 G292-280 kernel: [0.007531] CPU: 20 PID: 0 Comm: 
swapper/20 Not tainted 5.4.0-107-generic #121~18.04.1-Ubuntu
  Apr  6 02:33:31 G292-280 kernel: [0.007531] Hardware name: GIGABYTE 
G292-280-00/MG52-G20-00, BIOS F02 10/28/2021
  Apr  6 02:33:31 G292-280 kernel: [0.007531] RIP: 
0010:topology_sane.isra.9+0x6c/0x70
  Apr  6 02:33:31 G292-280 kernel: [0.007531] Code: 41 5c 5d c3 80 3d 1e 75 
ba 01 00 75 ec 89 f1 41 89 d9 89 fe 45 89 e0 48 c7 c7 b8 00 b4 a6 c6 05 04 75 
ba 01 01 e8 b4 c7 03 00
   <0f> 0b eb cb 0f 1f 44 00 00 55 0f b6 05 a3 8d f0 01 c6 05 9c 8d f0
  Apr  6 02:33:31 G292-280 kernel: [0.007531] RSP: :b76b58e17eb8 
EFLAGS: 00010086
  Apr  6 02:33:31 G292-280 kernel: [0.007531] RAX:  RBX: 
 RCX: a7264e88
  Apr  6 02:33:31 G292-280 kernel: [0.007531] RDX: a7264e88 RSI: 
0096 RDI: 0046
  Apr  6 02:33:31 G292-280 kernel: [0.007531] RBP: b76b58e17ec8 R08: 
 R09: 0002f680
  Apr  6 02:33:31 G292-280 kernel: [0.007531] R10: 8b69bf80 R11: 
02c0 R12: 0001
  Apr  6 02:33:31 G292-280 kernel: [0.007531] R13: 0014 R14: 
0014 R15: 0002
  Apr  6 02:33:31 G292-280 kernel: [0.007531] FS:  () 
GS:8b69bf80() knlGS:
  Apr  6 02:33:31 G292-280 kernel: [0.007531] CS:  0010 DS:  ES:  
CR0: 80050033
  Apr  6 02:33:31 G292-280 kernel: [0.007531] CR2:  CR3: 
007ee1a0a001 CR4: 00760ee0
  Apr  6 02:33:31 G292-280 kernel: [0.007531] DR0:  DR1: 
 DR2: 
  Apr  6 02:33:31 G292-280 kernel: [0.007531] DR3:  DR6: 
fffe0ff0 DR7: 0400
  Apr  6 02:33:31 G292-280 kernel: [0.007531] PKRU: 
  Apr  6 02:33:31 G292-280 kernel: [0.007531] Call Trace:
  Apr  6 02:33:31 G292-280 kernel: [0.007531]  
set_cpu_sibling_map+0x14f/0x600
  Apr  6 02:33:31 G292-280 kernel: [0.007531]  start_secondary+0x6e/0x1c0
  Apr  6 02:33:31 G292-280 kernel: [0.007531]  
secondary_startup_64+0xa4/0xb0
  Apr  6 02:33:31 G292-280 kernel: [0.007531] ---[ end trace 
789d1f3abd3d96d4 ]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1976511/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1929209] Re: [i915] external monitor goes black for several seconds at a time, randomly

2022-06-10 Thread Daniel van Vugt
See also bug 1975872

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1929209

Title:
  [i915] external monitor goes black for several seconds at a time,
  randomly

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  At times it is completely debilitating; at other times it does not happen for 
hours.
  The physical connections are clean and solid.

   I guess the attachments will show that I'm using Intel graphics
  hardware.  The monitor is a very popular Samsung one.

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: xorg 1:7.7+19ubuntu14
  ProcVersionSignature: Ubuntu 5.4.0-73.82-generic 5.4.106
  Uname: Linux 5.4.0-73-generic x86_64
  ApportVersion: 2.20.11-0ubuntu27.17
  Architecture: amd64
  BootLog: Error: [Errno 13] Permission denied: '/var/log/boot.log'
  CasperMD5CheckResult: skip
  CompositorRunning: None
  CurrentDesktop: ubuntu:GNOME
  Date: Thu May 20 16:56:04 2021
  DistUpgraded: 2020-06-01 15:46:34,953 ERROR got error from PostInstallScript 
./xorg_fix_proprietary.py (g-exec-error-quark: Failed to execute child process 
“./xorg_fix_proprietary.py” (No such file or directory) (8))
  DistroCodename: focal
  DistroVariant: ubuntu
  DkmsStatus: virtualbox, 6.1.16, 5.4.0-73-generic, x86_64: installed
  EcryptfsInUse: Yes
  ExtraDebuggingInterest: Yes, if not too technical
  GraphicsCard:
   Intel Corporation HD Graphics 5500 [8086:1616] (rev 09) (prog-if 00 [VGA 
controller])
     Subsystem: Lenovo HD Graphics 5500 [17aa:5036]
  InstallationDate: Installed on 2019-01-24 (847 days ago)
  InstallationMedia: Ubuntu 18.10 "Cosmic Cuttlefish" - Release amd64 
(20181017.3)
  MachineType: LENOVO 20BXCTO1WW
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.4.0-73-generic 
root=UUID=a6081f39-700f-4698-bda4-464e53d9d229 ro quiet splash vt.handoff=7
  SourcePackage: xorg
  Symptom: display
  UpgradeStatus: Upgraded to focal on 2020-06-01 (353 days ago)
  dmi.bios.date: 09/13/2017
  dmi.bios.vendor: LENOVO
  dmi.bios.version: JBET66WW (1.30 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 20BXCTO1WW
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0J40697 WIN
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: None
  dmi.modalias: 
dmi:bvnLENOVO:bvrJBET66WW(1.30):bd09/13/2017:svnLENOVO:pn20BXCTO1WW:pvrThinkPadT450s:rvnLENOVO:rn20BXCTO1WW:rvrSDK0J40697WIN:cvnLENOVO:ct10:cvrNone:
  dmi.product.family: ThinkPad T450s
  dmi.product.name: 20BXCTO1WW
  dmi.product.sku: LENOVO_MT_20BX_BU_Think_FM_ThinkPad T450s
  dmi.product.version: ThinkPad T450s
  dmi.sys.vendor: LENOVO
  version.compiz: compiz N/A
  version.libdrm2: libdrm2 2.4.102-1ubuntu1~20.04.1
  version.libgl1-mesa-dri: libgl1-mesa-dri 20.2.6-0ubuntu0.20.04.1
  version.libgl1-mesa-glx: libgl1-mesa-glx 20.2.6-0ubuntu0.20.04.1
  version.xserver-xorg-core: xserver-xorg-core 2:1.20.9-2ubuntu1.2~20.04.2
  version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
  version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:19.1.0-1
  version.xserver-xorg-video-intel: xserver-xorg-video-intel 
2:2.99.917+git20200226-1
  version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 1:1.0.16-1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1929209/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1978297] [NEW] [SRU][Jammy/OEM-5.17][PATCH 0/1] Fix calltrace in mac80211

2022-06-10 Thread AaronMa
Public bug reported:

[Impact]
When bootup Jammy kernel, it shows callrace:
kernel: 

kernel: UBSAN: invalid-load in 
/home/u/aaron/bionic/net/mac80211/status.c:1164:21
kernel: load of value 216 is not a valid value for type '_Bool'
kernel: CPU: 9 PID: 0 Comm: swapper/9 Not tainted 5.15.36+ #12
kernel: Hardware name: LENOVO 21D2SIT061/21D2SIT061, BIOS N3GET30W (1.11 ) 
05/27/2022
kernel: Call Trace:
kernel:  
kernel:  dump_stack_lvl+0x4a/0x5f
kernel:  dump_stack+0x10/0x12
kernel:  ubsan_epilogue+0x9/0x45
kernel:  __ubsan_handle_load_invalid_value.cold+0x44/0x49
kernel:  ieee80211_tx_status_ext.cold+0x1e/0xb0 [mac80211]
kernel:  ? percpu_ref_kill_and_confirm+0xd0/0xd0
kernel:  ? rht_key_get_hash.isra.0+0x19/0x20 [mac80211]
kernel:  ? sta_info_hash_lookup+0xac/0x100 [mac80211]
kernel:  ieee80211_tx_status+0x72/0xa0 [mac80211]
kernel:  ieee80211_tasklet_handler+0xa2/0xd0 [mac80211]
kernel:  tasklet_action_common.constprop.0+0xc0/0xf0
kernel:  tasklet_action+0x22/0x30
kernel:  __do_softirq+0xd9/0x2e3
kernel:  irq_exit_rcu+0x8c/0xb0
kernel:  common_interrupt+0x8a/0xa0
kernel:  
kernel:  
kernel:  asm_common_interrupt+0x1e/0x40
kernel: RIP: 0010:cpuidle_enter_state+0xd9/0x620
kernel: Code: 3d b4 85 3d 5c e8 57 a7 6b ff 49 89 c7 0f 1f 44 00 00 31 ff e8 a8 
b3 6b ff 80 7d d0>
kernel: RSP: 0018:9e2dc01f7e38 EFLAGS: 0246
kernel: RAX: 8dfdb6870b00 RBX: 8df6c3ab6c00 RCX: 00023cd33784
kernel: RDX: 00023d103fa8 RSI: 00023cd33784 RDI: 
kernel: RBP: 9e2dc01f7e88 R08: 00023cd33d63 R09: 000aae60
kernel: R10: 0004 R11: 071c71c71c71c71c R12: a4ce65a0
kernel: R13: 0003 R14: 0003 R15: 00023cd33d63
kernel:  ? cpuidle_enter_state+0xc8/0x620
kernel:  ? sched_clock_local+0x13/0x90
kernel:  cpuidle_enter+0x2e/0x40
kernel:  do_idle+0x203/0x2a0
kernel:  cpu_startup_entry+0x20/0x30
kernel:  start_secondary+0x12a/0x180
kernel:  secondary_startup_64_no_verify+0xc2/0xcb
kernel:  
kernel: 


[Fix]
The size of the status_driver_data field was not adjusted
when the is_valid_ack_signal field was added.
Adjust the struct size accordingly.

[Test]
Verified on hardware, no error.

[Where problems could occur]
Low risk, It may break wifi driver.
Minor changes in title of "Copyright" when backport.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: In Progress

** Affects: linux-oem-5.17 (Ubuntu)
 Importance: Undecided
 Status: In Progress

** Affects: linux (Ubuntu Jammy)
 Importance: Undecided
 Status: In Progress

** Affects: linux-oem-5.17 (Ubuntu Jammy)
 Importance: Undecided
 Status: In Progress

** Also affects: linux (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: linux-oem-5.17 (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: New => In Progress

** Changed in: linux (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: linux-oem-5.17 (Ubuntu)
   Status: New => In Progress

** Changed in: linux-oem-5.17 (Ubuntu Jammy)
   Status: New => In Progress

** Description changed:

  [Impact]
  When bootup Jammy kernel, it shows callrace:
  kernel: 

  kernel: UBSAN: invalid-load in 
/home/u/aaron/bionic/net/mac80211/status.c:1164:21
  kernel: load of value 216 is not a valid value for type '_Bool'
  kernel: CPU: 9 PID: 0 Comm: swapper/9 Not tainted 5.15.36+ #12
  kernel: Hardware name: LENOVO 21D2SIT061/21D2SIT061, BIOS N3GET30W (1.11 ) 
05/27/2022
  kernel: Call Trace:
  kernel:  
  kernel:  dump_stack_lvl+0x4a/0x5f
  kernel:  dump_stack+0x10/0x12
  kernel:  ubsan_epilogue+0x9/0x45
  kernel:  __ubsan_handle_load_invalid_value.cold+0x44/0x49
  kernel:  ieee80211_tx_status_ext.cold+0x1e/0xb0 [mac80211]
  kernel:  ? percpu_ref_kill_and_confirm+0xd0/0xd0
  kernel:  ? rht_key_get_hash.isra.0+0x19/0x20 [mac80211]
  kernel:  ? sta_info_hash_lookup+0xac/0x100 [mac80211]
  kernel:  ieee80211_tx_status+0x72/0xa0 [mac80211]
  kernel:  ieee80211_tasklet_handler+0xa2/0xd0 [mac80211]
  kernel:  tasklet_action_common.constprop.0+0xc0/0xf0
  kernel:  tasklet_action+0x22/0x30
  kernel:  __do_softirq+0xd9/0x2e3
  kernel:  irq_exit_rcu+0x8c/0xb0
  kernel:  common_interrupt+0x8a/0xa0
  kernel:  
  kernel:  
  kernel:  asm_common_interrupt+0x1e/0x40
  kernel: RIP: 0010:cpuidle_enter_state+0xd9/0x620
  kernel: Code: 3d b4 85 3d 5c e8 57 a7 6b ff 49 89 c7 0f 1f 44 00 00 31 ff e8 
a8 b3 6b ff 80 7d d0>
  kernel: RSP: 0018:9e2dc01f7e38 EFLAGS: 0246
  kernel: RAX: 8dfdb6870b00 RBX: 8df6c3ab6c00 RCX: 00023cd33784
  kernel: RDX: 00023d103fa8 RSI: 00023cd33784 RDI: 
  kernel: RBP: 9e2dc01f7e88 R08: 00023cd33d63 R09: 

[Kernel-packages] [Bug 1977815] Re: ADLP AX211 iwlwifi firmware crash after resume

2022-06-10 Thread Cyrus Lien
Invalid this bug due to the issue can not be reproduced after swap wifi
module.

** Changed in: linux-firmware (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1977815

Title:
  ADLP AX211 iwlwifi firmware crash after resume

Status in linux-firmware package in Ubuntu:
  Invalid

Bug description:
  On Intel ADL-P platform with AX211 Wi-Fi, encounter firmware crash
  after resume from suspend.

  wifi failed to connect after the below message.

  [ 5525.553757] iwlwifi :00:14.3: Queue 2 is stuck 2 3
  [ 5525.554875] iwlwifi :00:14.3: Microcode SW error detected. Restarting 
0x0.
  [ 5525.555117] iwlwifi :00:14.3: Start IWL Error Log Dump:
  [ 5525.555122] iwlwifi :00:14.3: Transport status: 0x004A, valid: 6
  [ 5525.555129] iwlwifi :00:14.3: Loaded firmware version: 67.8f59b80b.0 
so-a0-gf-a0-67.ucode
  [ 5525.555135] iwlwifi :00:14.3: 0x0084 | NMI_INTERRUPT_UNKNOWN
  [ 5525.555141] iwlwifi :00:14.3: 0x02F3 | trm_hw_status0
  [ 5525.555145] iwlwifi :00:14.3: 0x | trm_hw_status1
  [ 5525.555149] iwlwifi :00:14.3: 0x004D9EF2 | branchlink2
  [ 5525.555153] iwlwifi :00:14.3: 0x004D960E | interruptlink1
  [ 5525.555157] iwlwifi :00:14.3: 0x004D960E | interruptlink2
  [ 5525.555160] iwlwifi :00:14.3: 0x004C6C34 | data1
  [ 5525.555163] iwlwifi :00:14.3: 0x0100 | data2
  [ 5525.555167] iwlwifi :00:14.3: 0x | data3
  [ 5525.555170] iwlwifi :00:14.3: 0x1AC138AE | beacon time
  [ 5525.555174] iwlwifi :00:14.3: 0xFA1F775A | tsf low
  [ 5525.555177] iwlwifi :00:14.3: 0x0002 | tsf hi
  [ 5525.555181] iwlwifi :00:14.3: 0x | time gp1
  [ 5525.555184] iwlwifi :00:14.3: 0x029BB566 | time gp2
  [ 5525.555188] iwlwifi :00:14.3: 0x0001 | uCode revision type
  [ 5525.555191] iwlwifi :00:14.3: 0x0043 | uCode version major
  [ 5525.555194] iwlwifi :00:14.3: 0x8F59B80B | uCode version minor
  [ 5525.555198] iwlwifi :00:14.3: 0x0370 | hw version
  [ 5525.555202] iwlwifi :00:14.3: 0x00489002 | board version
  --- 
  ProblemType: Bug
  ApportVersion: 2.20.11-0ubuntu27.24
  Architecture: amd64
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/by-path', 
'/dev/snd/controlC0', '/dev/snd/hwC0D0', '/dev/snd/hwC0D2', 
'/dev/snd/pcmC0D5p', '/dev/snd/pcmC0D4p', '/dev/snd/pcmC0D3p', 
'/dev/snd/pcmC0D1c', '/dev/snd/pcmC0D1p', '/dev/snd/pcmC0D0c', 
'/dev/snd/pcmC0D0p', '/dev/snd/pcmC0D7c', '/dev/snd/pcmC0D6c', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CasperMD5CheckResult: skip
  Dependencies:
   
  DistributionChannelDescriptor:
   # This is the distribution channel descriptor for the OEM CDs
   # For more information see 
http://wiki.ubuntu.com/DistributionChannelDescriptor
   canonical-oem-somerville-focal-amd64-20200502-85+fossa-qyburn+X170
  DistroRelease: Ubuntu 20.04
  InstallationDate: Installed on 2022-06-07 (0 days ago)
  InstallationMedia: Ubuntu 20.04 "Focal" - Build amd64 LIVE Binary 
20200502-05:58
  IwConfig:
   lono wireless extensions.
   
   wlp0s20f3  no wireless extensions.
   
   enx00e04f8238df  no wireless extensions.
  MachineType: Dell Inc. Inspiron 16 5620
  Package: linux-firmware 1.187.31
  PackageArchitecture: all
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.14.0-1040-oem 
root=UUID=202d0ced-071f-4d95-a481-17b8e1078844 ro automatic-oem-config quiet 
splash vt.handoff=7
  ProcVersionSignature: Ubuntu 5.14.0-1040.44-oem 5.14.21
  RelatedPackageVersions:
   linux-restricted-modules-5.14.0-1040-oem N/A
   linux-backports-modules-5.14.0-1040-oem  N/A
   linux-firmware   1.187.31
  Tags:  focal
  Uname: Linux 5.14.0-1040-oem x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: sudo
  WifiSyslog:
   
  _MarkForUpload: True
  dmi.bios.date: 04/21/2022
  dmi.bios.release: 1.1
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: 1.1.1
  dmi.board.name: 0Q901G
  dmi.board.vendor: Dell Inc.
  dmi.board.version: D02
  dmi.chassis.type: 10
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvr1.1.1:bd04/21/2022:br1.1:svnDellInc.:pnInspiron165620:pvr:rvnDellInc.:rn0Q901G:rvrD02:cvnDellInc.:ct10:cvr:sku0BAA:
  dmi.product.family: Inspiron
  dmi.product.name: Inspiron 16 5620
  dmi.product.sku: 0BAA
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/1977815/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1977946] Re: README points to non-existent URL

2022-06-10 Thread Ubuntu Foundations Team Bug Bot
The attachment "1-0.12.16ubuntu1.debdiff" seems to be a debdiff.  The
ubuntu-sponsors team has been subscribed to the bug report so that they
can review and hopefully sponsor the debdiff.  If the attachment isn't a
patch, please remove the "patch" flag from the attachment, remove the
"patch" tag, and if you are member of the ~ubuntu-sponsors, unsubscribe
the team.

[This is an automated message performed by a Launchpad user owned by
~brian-murray, for any issue please contact him.]

** Tags added: patch

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to ubuntu-fan in Ubuntu.
https://bugs.launchpad.net/bugs/1977946

Title:
  README points to non-existent URL

Status in ubuntu-fan package in Ubuntu:
  Fix Committed

Bug description:
  /usr/share/doc/ubuntu-fan/README.gz (ubuntu-fan/README) reads:

  "More information on the Fan, including more detailed configuration
  information, can be found at http://www.ubuntu.com/fan.;

  However, the aforementioned URL (with and without trailing dot) does not 
exist.
  Is this supposed to point to https://wiki.ubuntu.com/FanNetworking instead?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-fan/+bug/1977946/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1978293] [NEW] nvidia-kernel-source-450 450.119.03-0ubuntu0.20.04.1: nvidia kernel module failed to build

2022-06-10 Thread Giorgio Cavinato
Public bug reported:

The error sometimes occurs randomly

ProblemType: Package
DistroRelease: Ubuntu 20.04
Package: nvidia-kernel-source-450 450.119.03-0ubuntu0.20.04.1
ProcVersionSignature: Ubuntu 5.13.0-44.49~20.04.1-generic 5.13.19
Uname: Linux 5.13.0-44-generic x86_64
ApportVersion: 2.20.11-0ubuntu27.24
Architecture: amd64
CasperMD5CheckResult: skip
DKMSKernelVersion: 5.13.0-48-generic
Date: Fri Jun 10 10:15:44 2022
Dependencies:
 
DuplicateSignature: 
dkms:nvidia-kernel-source-450:450.119.03-0ubuntu0.20.04.1:/var/lib/dkms/nvidia/450.119.03/build/nvidia-drm/nvidia-drm-crtc.c:234:23:
 error: initialization of ‘int (*)(struct drm_plane *, struct drm_atomic_state 
*)’ from incompatible pointer type ‘int (*)(struct drm_plane *, struct 
drm_plane_state *)’ [-Werror=incompatible-pointer-types]
InstallationDate: Installed on 2020-11-23 (563 days ago)
InstallationMedia: Ubuntu 20.04.1 LTS "Focal Fossa" - Release amd64 (20200731)
PackageVersion: 450.119.03-0ubuntu0.20.04.1
Python3Details: /usr/bin/python3.8, Python 3.8.10, python3-minimal, 
3.8.2-0ubuntu2
PythonDetails: /usr/bin/python2.7, Python 2.7.18, unpackaged
RelatedPackageVersions:
 dpkg 1.19.7ubuntu3.2
 apt  2.0.6
SourcePackage: nvidia-graphics-drivers-450
Title: nvidia-kernel-source-450 450.119.03-0ubuntu0.20.04.1: nvidia kernel 
module failed to build
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: nvidia-graphics-drivers-450 (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-package focal need-duplicate-check

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to nvidia-graphics-drivers-450 in Ubuntu.
https://bugs.launchpad.net/bugs/1978293

Title:
  nvidia-kernel-source-450 450.119.03-0ubuntu0.20.04.1: nvidia kernel
  module failed to build

Status in nvidia-graphics-drivers-450 package in Ubuntu:
  New

Bug description:
  The error sometimes occurs randomly

  ProblemType: Package
  DistroRelease: Ubuntu 20.04
  Package: nvidia-kernel-source-450 450.119.03-0ubuntu0.20.04.1
  ProcVersionSignature: Ubuntu 5.13.0-44.49~20.04.1-generic 5.13.19
  Uname: Linux 5.13.0-44-generic x86_64
  ApportVersion: 2.20.11-0ubuntu27.24
  Architecture: amd64
  CasperMD5CheckResult: skip
  DKMSKernelVersion: 5.13.0-48-generic
  Date: Fri Jun 10 10:15:44 2022
  Dependencies:
   
  DuplicateSignature: 
dkms:nvidia-kernel-source-450:450.119.03-0ubuntu0.20.04.1:/var/lib/dkms/nvidia/450.119.03/build/nvidia-drm/nvidia-drm-crtc.c:234:23:
 error: initialization of ‘int (*)(struct drm_plane *, struct drm_atomic_state 
*)’ from incompatible pointer type ‘int (*)(struct drm_plane *, struct 
drm_plane_state *)’ [-Werror=incompatible-pointer-types]
  InstallationDate: Installed on 2020-11-23 (563 days ago)
  InstallationMedia: Ubuntu 20.04.1 LTS "Focal Fossa" - Release amd64 (20200731)
  PackageVersion: 450.119.03-0ubuntu0.20.04.1
  Python3Details: /usr/bin/python3.8, Python 3.8.10, python3-minimal, 
3.8.2-0ubuntu2
  PythonDetails: /usr/bin/python2.7, Python 2.7.18, unpackaged
  RelatedPackageVersions:
   dpkg 1.19.7ubuntu3.2
   apt  2.0.6
  SourcePackage: nvidia-graphics-drivers-450
  Title: nvidia-kernel-source-450 450.119.03-0ubuntu0.20.04.1: nvidia kernel 
module failed to build
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-450/+bug/1978293/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1977919] Re: Docker container creation causes kernel oops on linux-aws 5.13.0.1028.31~20.04.22

2022-06-10 Thread Erik Forsberg
I had limited success with "grub-reboot 2", but the following worked
fine for me on an AWS EC2 running Ubuntu 20.04.2

sudo grub-reboot "Advanced options for Ubuntu>Ubuntu, with Linux
5.13.0-1025-aws"

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws-5.13 in Ubuntu.
https://bugs.launchpad.net/bugs/1977919

Title:
  Docker container creation causes kernel oops on linux-aws
  5.13.0.1028.31~20.04.22

Status in linux-aws-5.13 package in Ubuntu:
  Confirmed
Status in linux-azure-5.13 package in Ubuntu:
  Confirmed
Status in linux-gcp-5.13 package in Ubuntu:
  Confirmed
Status in linux-intel-iotg-5.15 package in Ubuntu:
  Confirmed
Status in linux-oracle-5.13 package in Ubuntu:
  Confirmed
Status in linux-aws-5.13 source package in Focal:
  Fix Committed
Status in linux-azure-5.13 source package in Focal:
  Fix Committed
Status in linux-gcp-5.13 source package in Focal:
  Fix Committed
Status in linux-intel-iotg-5.15 source package in Focal:
  Won't Fix
Status in linux-oracle-5.13 source package in Focal:
  Fix Committed

Bug description:
  Running the attached script on the latest AWS AMI for Ubuntu 20.04, I
  get a kernel panic and hard reset of the node.

  [   12.314552] VFS: Close: file count is 0
  [   12.351090] [ cut here ]
  [   12.351093] kernel BUG at include/linux/fs.h:3104!
  [   12.355272] invalid opcode:  [#1] SMP PTI
  [   12.358963] CPU: 1 PID: 863 Comm: sed Not tainted 5.13.0-1028-aws 
#31~20.04.1-Ubuntu
  [   12.366241] Hardware name: Amazon EC2 m5.large/, BIOS 1.0 10/16/2017
  [   12.371130] RIP: 0010:__fput+0x247/0x250
  [   12.374897] Code: 00 48 85 ff 0f 84 8b fe ff ff f6 c7 40 0f 85 82 fe ff ff 
e8 ab 38 00 00 e9 78 fe ff ff 4c 89 f7 e8 2e 88 02 00 e9 b5 fe ff ff <0f> 0b 0f 
1f 80 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 53 31 db 48
  [   12.389075] RSP: 0018:b50280d9fd88 EFLAGS: 00010246
  [   12.393425] RAX:  RBX: 000a801d RCX: 
9152e0716000
  [   12.398679] RDX: 9152cf075280 RSI: 0001 RDI: 

  [   12.403879] RBP: b50280d9fdb0 R08: 0001 R09: 
9152dfcba2c8
  [   12.409102] R10: b50280d9fd88 R11: 9152d04e9d10 R12: 
9152d04e9d00
  [   12.414333] R13: 9152dfcba2c8 R14: 9152cf0752a0 R15: 
9152dfc2e180
  [   12.419533] FS:  () GS:9153ea90() 
knlGS:
  [   12.426937] CS:  0010 DS:  ES:  CR0: 80050033
  [   12.431506] CR2: 556cf30250a8 CR3: bce10006 CR4: 
007706e0
  [   12.436716] DR0:  DR1:  DR2: 

  [   12.441941] DR3:  DR6: fffe0ff0 DR7: 
0400
  [   12.447170] PKRU: 5554
  [   12.450355] Call Trace:
  [   12.453408]  
  [   12.456296]  fput+0xe/0x10
  [   12.459633]  task_work_run+0x70/0xb0
  [   12.463157]  do_exit+0x37b/0xaf0
  [   12.466570]  do_group_exit+0x43/0xb0
  [   12.470142]  __x64_sys_exit_group+0x18/0x20
  [   12.473989]  do_syscall_64+0x61/0xb0
  [   12.477565]  ? exit_to_user_mode_prepare+0x9b/0x1c0
  [   12.481734]  ? do_user_addr_fault+0x1d0/0x650
  [   12.485665]  ? irqentry_exit_to_user_mode+0x9/0x20
  [   12.489790]  ? irqentry_exit+0x19/0x30
  [   12.493443]  ? exc_page_fault+0x8f/0x170
  [   12.497199]  ? asm_exc_page_fault+0x8/0x30
  [   12.501013]  entry_SYSCALL_64_after_hwframe+0x44/0xae
  [   12.505289] RIP: 0033:0x7f80d42a1bd6
  [   12.508868] Code: Unable to access opcode bytes at RIP 0x7f80d42a1bac.
  [   12.513783] RSP: 002b:7ffe924f9ed8 EFLAGS: 0246 ORIG_RAX: 
00e7
  [   12.520897] RAX: ffda RBX: 7f80d45a4740 RCX: 
7f80d42a1bd6
  [   12.526115] RDX:  RSI: 003c RDI: 

  [   12.531328] RBP:  R08: 00e7 R09: 
fe98
  [   12.536484] R10: 7f80d3d422a0 R11: 0246 R12: 
7f80d45a4740
  [   12.541687] R13: 0002 R14: 7f80d45ad708 R15: 

  [   12.546916]  
  [   12.549829] Modules linked in: xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c 
bpfilter br_netfilter bridge stp llc aufs overlay nls_iso8859_1 dm_multipath 
scsi_dh_rdac scsi_dh_emc scsi_dh_alua crct10dif_pclmul ppdev crc32_pclmul 
ghash_clmulni_intel aesni_intel crypto_simd psmouse cryptd parport_pc 
input_leds parport ena serio_raw sch_fq_codel ipmi_devintf ipmi_msghandler msr 
drm ip_tables x_tables autofs4
  [   12.583913] ---[ end trace 77367fed4d782aa4 ]---
  [   12.587963] RIP: 0010:__fput+0x247/0x250
  [   12.591729] Code: 00 48 85 ff 0f 84 8b fe ff ff f6 c7 40 0f 85 82 fe ff ff 
e8 ab 38 00 00 e9 78 fe ff ff 4c 89 f7 e8 2e 88 02 00 e9 b5 fe ff ff <0f> 0b 0f 
1f 80 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 53 31 db 48
  [   12.605796] RSP: 

[Kernel-packages] [Bug 1967493] Re: pl2303 serial adapter not recognized

2022-06-10 Thread Gary van der Merwe
I've tested on the test kernel, and it's working perfectly - Thanks!

# uname -a
Linux GAU23LD12 5.13.0-47-generic #52~20.04.1+lp1967493 SMP Mon Jun 6 
06:43:52 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1967493

Title:
  pl2303 serial adapter not recognized

Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Impish:
  New
Status in linux source package in Jammy:
  New
Status in linux source package in Kinetic:
  Incomplete

Bug description:
  Hi

  After upgrading the Linux kernel from 5.11.0-27 to 5.13.0-37 a device
  that uses a pl2303 usb serial chip no longer works.

  This seems very similar to bug 1959110, and according to that it
  should be fixed, but somehow it's not.

  # uname -a
  Linux GAU23LD04 5.13.0-37-generic #42~20.04.1-Ubuntu SMP Tue Mar 15 
15:44:28 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux

  # journalctl -b -k -g pl2303 -o cat
  usbcore: registered new interface driver pl2303
  usbserial: USB Serial support registered for pl2303
  pl2303 1-12:1.0: pl2303 converter detected
  pl2303 1-12:1.0: unknown device type, please report to 
linux-...@vger.kernel.org

  # udevadm info /sys/devices/pci:00/:00:14.0/usb1/1-12/1-12:1.0 
  P: /devices/pci:00/:00:14.0/usb1/1-12/1-12:1.0
  L: 0
  E: DEVPATH=/devices/pci:00/:00:14.0/usb1/1-12/1-12:1.0
  E: DEVTYPE=usb_interface
  E: PRODUCT=67b/2303/300
  E: TYPE=0/0/0
  E: INTERFACE=255/0/0
  E: MODALIAS=usb:v067Bp2303d0300dc00dsc00dp00icFFisc00ip00in00
  E: SUBSYSTEM=usb
  E: USEC_INITIALIZED=56177916
  E: ID_VENDOR_FROM_DATABASE=Prolific Technology, Inc.
  E: ID_MODEL_FROM_DATABASE=PL2303 Serial Port
  E: ID_PATH=pci-:00:14.0-usb-0:12:1.0
  E: ID_PATH_TAG=pci-_00_14_0-usb-0_12_1_0
  E: ID_MM_TTY_MANUAL_SCAN_ONLY=1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1967493/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1978289] [NEW] The BCM 4313 Wireless Doesnt work

2022-06-10 Thread Lucas Raposo
Public bug reported:

udo dmidecode -s bios-version
sudo dmidecode -s bios-release-date 
12:00.0 Network controller [0280]: Broadcom Inc. and subsidiaries BCM4313 
802.11bgn Wireless Network Adapter [14e4:4727] (rev 01)
Subsystem: Dell Inspiron M5010 / XPS 8300 [1028:0010]
Physical Slot: 0-1
Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR+ FastB2B- DisINTx-
Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- 
Kernel driver in use: wl
Description:Ubuntu 22.04 LTS
Release:22.04
Linux lucas-inspironn4030 5.15.0-37-generic #39-Ubuntu SMP Wed Jun 1 19:16:45 
UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
A07
03/23/2011

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: bcmwl-kernel-source 6.30.223.271+bdcom-0ubuntu8
ProcVersionSignature: Ubuntu 5.15.0-37.39-generic 5.15.35
Uname: Linux 5.15.0-37-generic x86_64
NonfreeKernelModules: wl
ApportVersion: 2.20.11-0ubuntu82.1
Architecture: amd64
CasperMD5CheckResult: unknown
Date: Fri Jun 10 09:23:11 2022
InstallationDate: Installed on 2022-06-09 (0 days ago)
InstallationMedia: Lubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 
(20220419)
SourcePackage: bcmwl
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: bcmwl (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug jammy

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bcmwl in Ubuntu.
https://bugs.launchpad.net/bugs/1978289

Title:
  The BCM 4313 Wireless Doesnt work

Status in bcmwl package in Ubuntu:
  New

Bug description:
  udo dmidecode -s bios-version
  sudo dmidecode -s bios-release-date 
  12:00.0 Network controller [0280]: Broadcom Inc. and subsidiaries BCM4313 
802.11bgn Wireless Network Adapter [14e4:4727] (rev 01)
  Subsystem: Dell Inspiron M5010 / XPS 8300 [1028:0010]
  Physical Slot: 0-1
  Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
Stepping- SERR+ FastB2B- DisINTx-
  Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- 
SERR- 
  Kernel driver in use: wl
  Description:Ubuntu 22.04 LTS
  Release:22.04
  Linux lucas-inspironn4030 5.15.0-37-generic #39-Ubuntu SMP Wed Jun 1 19:16:45 
UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
  A07
  03/23/2011

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: bcmwl-kernel-source 6.30.223.271+bdcom-0ubuntu8
  ProcVersionSignature: Ubuntu 5.15.0-37.39-generic 5.15.35
  Uname: Linux 5.15.0-37-generic x86_64
  NonfreeKernelModules: wl
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  CasperMD5CheckResult: unknown
  Date: Fri Jun 10 09:23:11 2022
  InstallationDate: Installed on 2022-06-09 (0 days ago)
  InstallationMedia: Lubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 
(20220419)
  SourcePackage: bcmwl
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bcmwl/+bug/1978289/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1978087] Re: package linux-firmware 20220329.git681281e4-0ubuntu3.2 failed to install/upgrade: installed linux-firmware package post-installation script subprocess returned erro

2022-06-10 Thread Juerg Haefliger
Hardware problems. From the log:

[  444.432309] ata1.00: exception Emask 0x0 SAct 0xc00f SErr 0x5 action 0x0
[  444.432328] ata1.00: irq_stat 0x4001
[  444.432335] ata1: SError: { PHYRdyChg CommWake }
[  444.432345] ata1.00: failed command: WRITE FPDMA QUEUED
[  444.432351] ata1.00: cmd 61/40:00:00:59:22/05:00:2f:00:00/40 tag 0 ncq dma 
688128 out
res 41/40:78:a0:14:00/00:00:00:00:00/40 Emask 0x9 
(media error)
[  444.432373] ata1.00: status: { DRDY ERR }
[  444.432379] ata1.00: error: { UNC }
[  444.432387] ata1.00: failed command: WRITE FPDMA QUEUED
[  444.432392] ata1.00: cmd 61/c0:08:40:5e:22/02:00:2f:00:00/40 tag 1 ncq dma 
360448 out
res 41/40:78:a0:14:00/00:00:00:00:00/40 Emask 0x9 
(media error)
[  444.432411] ata1.00: status: { DRDY ERR }
[  444.432417] ata1.00: error: { UNC }
[  444.432424] ata1.00: failed command: WRITE FPDMA QUEUED
[  444.432429] ata1.00: cmd 61/40:10:00:61:22/05:00:2f:00:00/40 tag 2 ncq dma 
688128 out
res 41/40:78:a0:14:00/00:00:00:00:00/40 Emask 0x9 
(media error)
[  444.432445] ata1.00: status: { DRDY ERR }
[  444.432450] ata1.00: error: { UNC }
[  444.432457] ata1.00: failed command: WRITE FPDMA QUEUED
[  444.432462] ata1.00: cmd 61/c0:18:40:66:22/02:00:2f:00:00/40 tag 3 ncq dma 
360448 out
res 41/40:78:a0:14:00/00:00:00:00:00/40 Emask 0x9 
(media error)
[  444.432478] ata1.00: status: { DRDY ERR }
[  444.432483] ata1.00: error: { UNC }
[  444.432490] ata1.00: failed command: READ FPDMA QUEUED
[  444.432494] ata1.00: cmd 60/00:70:a0:14:00/01:00:00:00:00/40 tag 14 ncq dma 
131072 in
res 41/40:00:a0:14:00/00:01:00:00:00/40 Emask 0x409 
(media error) 
[  444.432510] ata1.00: status: { DRDY ERR }
[  444.432516] ata1.00: error: { UNC }
[  444.432522] ata1.00: failed command: READ FPDMA QUEUED
[  444.432526] ata1.00: cmd 60/00:78:a0:15:00/01:00:00:00:00/40 tag 15 ncq dma 
131072 in
res 41/40:78:a0:14:00/00:00:00:00:00/40 Emask 0x9 
(media error)
[  444.432541] ata1.00: status: { DRDY ERR }
[  444.432546] ata1.00: error: { UNC }
[  444.435750] ata1.00: configured for UDMA/100
[  444.435804] sd 0:0:0:0: [sda] tag#0 FAILED Result: hostbyte=DID_OK 
driverbyte=DRIVER_OK cmd_age=3s
[  444.435812] sd 0:0:0:0: [sda] tag#0 Sense Key : Medium Error [current]

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1978087

Title:
  package linux-firmware 20220329.git681281e4-0ubuntu3.2 failed to
  install/upgrade: installed linux-firmware package post-installation
  script subprocess returned error exit status 1

Status in linux-firmware package in Ubuntu:
  Invalid

Bug description:
  not installed

  ProblemType: Package
  DistroRelease: Ubuntu 22.04
  Package: linux-firmware 20220329.git681281e4-0ubuntu3.2
  ProcVersionSignature: Ubuntu 5.15.0-25.25-generic 5.15.30
  Uname: Linux 5.15.0-25-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  arsss  1298 F pulseaudio
   /dev/snd/controlC0:  arsss  1298 F pulseaudio
  CRDA: N/A
  CasperMD5CheckResult: pass
  Date: Thu Jun  9 17:19:39 2022
  Dependencies: firmware-sof-signed 2.0-1ubuntu3
  ErrorMessage: installed linux-firmware package post-installation script 
subprocess returned error exit status 1
  InstallationDate: Installed on 2022-06-09 (0 days ago)
  InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 
(20220419)
  MachineType: LENOVO 20369
  PackageArchitecture: all
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-25-generic 
root=UUID=2a960677-859f-46a6-9471-a9c94e8b41bd ro quiet splash vt.handoff=7
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  Python3Details: /usr/bin/python3.10, Python 3.10.4, python3-minimal, 
3.10.4-0ubuntu2
  PythonDetails: N/A
  RebootRequiredPkgs: Error: path contained symlinks.
  RelatedPackageVersions: grub-pc 2.06-2ubuntu7
  SourcePackage: linux-firmware
  Title: package linux-firmware 20220329.git681281e4-0ubuntu3.2 failed to 
install/upgrade: installed linux-firmware package post-installation script 
subprocess returned error exit status 1
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 10/20/2014
  dmi.bios.release: 0.29
  dmi.bios.vendor: LENOVO
  dmi.bios.version: 9ACN29WW
  dmi.board.asset.tag: No Asset Tag
  dmi.board.name: Lancer 4A2
  dmi.board.vendor: LENOVO
  dmi.board.version: NANANANANO DPK
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Lenovo G40-70
  dmi.ec.firmware.release: 0.29
  dmi.modalias: 

[Kernel-packages] [Bug 1977946] Re: README points to non-existent URL

2022-06-10 Thread Akbarkhon Variskhanov
Link changed to the proposed wiki. pbuilder succeeded, README updated.

** Patch added: "1-0.12.16ubuntu1.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/ubuntu-fan/+bug/1977946/+attachment/5596248/+files/1-0.12.16ubuntu1.debdiff

** Changed in: ubuntu-fan (Ubuntu)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to ubuntu-fan in Ubuntu.
https://bugs.launchpad.net/bugs/1977946

Title:
  README points to non-existent URL

Status in ubuntu-fan package in Ubuntu:
  Fix Committed

Bug description:
  /usr/share/doc/ubuntu-fan/README.gz (ubuntu-fan/README) reads:

  "More information on the Fan, including more detailed configuration
  information, can be found at http://www.ubuntu.com/fan.;

  However, the aforementioned URL (with and without trailing dot) does not 
exist.
  Is this supposed to point to https://wiki.ubuntu.com/FanNetworking instead?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-fan/+bug/1977946/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp