[Kernel-packages] [Bug 1836031] Re: [SRU][B/B-OEM]Fix resume failure on some TPM chips

2019-07-16 Thread Khaled El Mously
** Changed in: linux (Ubuntu Bionic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836031

Title:
  [SRU][B/B-OEM]Fix resume failure on some TPM chips

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Bionic:
  Fix Committed

Bug description:
  SRU justification:

  [Impact]
  System will reboot when resume from S3 with some TPM chips installed.

  [Fix]
  stable patch is merged in 4.15 kernel:
  888d867df441 (tpm: cmd_ready command can be issued only after granting 
locality)
  it needs a fix:
  tpm: separate cmd_ready/go_idle from runtime_pm
  these 2 patches fix the issue and enable tpm resume
  after seprating cmd_ready/go_idle.

  [Test]
  Verified on hardware. resume from S3 about 30 times with positive result.

  [Regression Potential]
  Medium, stable patches backported. Verified on hardware.
  backported with minor adjustion.

  These 2 patches are included in 4.18 and 5.0 kernel, only 4.15 needs
  them.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1836031/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836839] Re: prctl04 in LTP syscall test failed with T kernel on P8 node

2019-07-16 Thread Po-Hsu Lin
The test result on AMD64:

 startup='Tue Jul 9 14:23:18 2019'
 tst_test.c:1100: INFO: Timeout per run is 0h 05m 00s
 prctl04.c:213: INFO: kernel support PR_GET/SET_SECCOMP
 prctl04.c:125: PASS: prctl(PR_SET_SECCOMP) sets SECCOMP_MODE_STRICT succeed
 prctl04.c:197: PASS: SECCOMP_MODE_STRICT doesn't permit GET_SECCOMP call
 prctl04.c:133: PASS: SECCOMP_MODE_STRICT permits read(2) write(2) and _exit(2)
 prctl04.c:197: PASS: SECCOMP_MODE_STRICT doesn't permit close(2) 
 prctl04.c:165: PASS: prctl(PR_SET_SECCOMP) sets SECCOMP_MODE_FILTER succeed
 prctl04.c:197: PASS: SECCOMP_MODE_FILTER doestn't permit GET_SECCOMP call
 prctl04.c:171: PASS: SECCOMP_MODE_FILTER permits close(2)
 prctl04.c:197: PASS: SECCOMP_MODE_FILTER doesn't permit exit()
 prctl04.c:95: PASS: SECCOMP_MODE_FILTER permits fork(2)
 prctl04.c:102: PASS: SECCOMP_MODE_FILTER has been inherited by child

 Summary:
 passed 10
 failed 0
 skipped 0
 warnings 0

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836839

Title:
  prctl04 in LTP syscall test failed with T kernel on P8 node

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Trusty:
  New

Bug description:
  This failure was only spotted on PowerPC (node "modoc"), it has passed
  with AMD64 / i386, entirely skipped on ARM64.

   startup='Mon Jul 15 22:48:25 2019'
   tst_test.c:1100: INFO: Timeout per run is 0h 05m 00s
   prctl04.c:213: INFO: kernel support PR_GET/SET_SECCOMP
   prctl04.c:125: PASS: prctl(PR_SET_SECCOMP) sets SECCOMP_MODE_STRICT succeed
   prctl04.c:197: PASS: SECCOMP_MODE_STRICT doesn't permit GET_SECCOMP call
   prctl04.c:133: PASS: SECCOMP_MODE_STRICT permits read(2) write(2) and 
_exit(2)
   prctl04.c:197: PASS: SECCOMP_MODE_STRICT doesn't permit close(2) 
   prctl04.c:155: CONF: kernel doesn't support SECCOMP_MODE_FILTER
   prctl04.c:155: CONF: kernel doesn't support SECCOMP_MODE_FILTER
   prctl04.c:155: CONF: kernel doesn't support SECCOMP_MODE_FILTER
   prctl04.c:205: FAIL: SECCOMP_MODE_FILTER permits exit() unexpectedly
   prctl04.c:155: CONF: kernel doesn't support SECCOMP_MODE_FILTER

   Summary:
   passed 4
   failed 1
   skipped 4
   warnings 0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1836839/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836755] Re: hda/realtek: can't detect external mic on a Dell machine

2019-07-16 Thread Khaled El Mously
** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Bionic)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Disco)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836755

Title:
  hda/realtek: can't detect external mic on a Dell machine

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Bionic:
  Fix Committed
Status in linux source package in Disco:
  Fix Committed

Bug description:
  [Impact]
  The external can't be detected when plugging headset in the
  front audio jack.

  [Fix]
  apply the alc891 fixup to set headset-mic and headpphone-mic pins.

  [Test Case]
  apply this patch and boot with the kernel, plug the headset-mic
  and choose headset-mic from popup dialogue, the headset-mic can
  record sound very well.

  [Regression Risk]
  Low. this patch is specific to a dell machine by pin configuration
  definition.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1836755/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1767992] Re: Linux md raid-10 freezes during resync

2019-07-16 Thread Khaled El Mously
** Changed in: linux (Ubuntu Bionic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1767992

Title:
  Linux md raid-10 freezes during resync

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Bionic:
  Fix Committed

Bug description:
  [Impact]

  * If regular and resync IO happen at the same time during a regular IO
split, the split bio will wait until resync IO finishes while at the
same time the resync IO is waiting for regular IO to finish. This
results in deadlock.

  * I believe this only impacts Bionic as Disco+ already contains this
commit. Xenial doesn't contain the commit that this one fixes.

  [Test Case]

  The test kernel containing this commit received positive feedback in the
  launchpad bug.

  From the launchpad bug comment #10:

  "For reproduce on 4.15.0-50-generic: Make new raid-10, add some io fio/dd, 
  unpack anaconda archives, after minute or two deadlocked"

  [Regression Potential]

  * This fix has been in mainline since December 2018 and I don't see any
fixup commits upstream referencing this one. The small number of
changes in this commit seem reasonable for managing the `nr_pending`
adjustments which preclude either regular or resync IO.


  Original bug description follows:
  -

  I'm trying to setup a few nodes with software raid-10.

  When array is created and resync is running i'm trying to install a
  few packages and frequently system stops responding, resync process
  stops, and I'm getting following errors in the kernel log.

  This looks like a deadlock for me.

  I had this problem in both 18.04 and 16.04. Reboot is the only way to
  fix the node.

  [ 2659.317256] INFO: task kworker/u24:13:343 blocked for more than 120 
seconds.
  [ 2659.317313]   Not tainted 4.15.0-20-generic #21-Ubuntu
  [ 2659.317350] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables 
this message.
  [ 2659.317401] kworker/u24:13  D0   343  2 0x8000
  [ 2659.317414] Workqueue: writeback wb_workfn (flush-9:1)
  [ 2659.317417] Call Trace:
  [ 2659.317430]  __schedule+0x297/0x8b0
  [ 2659.317435]  schedule+0x2c/0x80
  [ 2659.317443]  wait_barrier+0x146/0x1a0 [raid10]
  [ 2659.317449]  ? wait_woken+0x80/0x80
  [ 2659.317454]  raid10_write_request+0x77/0x950 [raid10]
  [ 2659.317459]  ? r10bio_pool_alloc+0x24/0x30 [raid10]
  [ 2659.317465]  ? mempool_alloc+0x71/0x190
  [ 2659.317469]  ? ___slab_alloc+0x20a/0x4b0
  [ 2659.317475]  ? md_write_start+0xc8/0x200
  [ 2659.317480]  ? mempool_alloc_slab+0x15/0x20
  [ 2659.317484]  raid10_make_request+0xcc/0x140 [raid10]
  [ 2659.317489]  md_handle_request+0x126/0x1a0
  [ 2659.317494]  md_make_request+0x6b/0x150
  [ 2659.317501]  generic_make_request+0x124/0x300
  [ 2659.317506]  submit_bio+0x73/0x150
  [ 2659.317510]  ? submit_bio+0x73/0x150
  [ 2659.317579]  xfs_submit_ioend+0x87/0x1c0 [xfs]
  [ 2659.317626]  xfs_do_writepage+0x377/0x6a0 [xfs]
  [ 2659.317632]  write_cache_pages+0x20c/0x4e0
  [ 2659.317674]  ? xfs_vm_writepages+0xf0/0xf0 [xfs]
  [ 2659.317682]  ? intel_pstate_update_pstate+0x40/0x40
  [ 2659.317687]  ? update_load_avg+0x5c5/0x6e0
  [ 2659.317727]  xfs_vm_writepages+0xbe/0xf0 [xfs]
  [ 2659.317732]  do_writepages+0x4b/0xe0
  [ 2659.317738]  ? check_preempt_curr+0x83/0x90
  [ 2659.317742]  ? ttwu_do_wakeup+0x1e/0x150
  [ 2659.317746]  __writeback_single_inode+0x45/0x340
  [ 2659.317749]  ? __writeback_single_inode+0x45/0x340
  [ 2659.317752]  writeback_sb_inodes+0x1e1/0x510
  [ 2659.317756]  __writeback_inodes_wb+0x67/0xb0
  [ 2659.317759]  wb_writeback+0x271/0x300
  [ 2659.317764]  wb_workfn+0x180/0x410
  [ 2659.317766]  ? wb_workfn+0x180/0x410
  [ 2659.317773]  process_one_work+0x1de/0x410
  [ 2659.317776]  worker_thread+0x32/0x410
  [ 2659.317781]  kthread+0x121/0x140
  [ 2659.317784]  ? process_one_work+0x410/0x410
  [ 2659.317788]  ? kthread_create_worker_on_cpu+0x70/0x70
  [ 2659.317793]  ? do_syscall_64+0x73/0x130
  [ 2659.317797]  ? SyS_exit_group+0x14/0x20
  [ 2659.317801]  ret_from_fork+0x35/0x40
  [ 2659.317806] INFO: task md1_resync:429 blocked for more than 120 seconds.
  [ 2659.317853]   Not tainted 4.15.0-20-generic #21-Ubuntu
  [ 2659.317889] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables 
this message.
  [ 2659.317940] md1_resync  D0   429  2 0x8000
  [ 2659.317943] Call Trace:
  [ 2659.317949]  __schedule+0x297/0x8b0
  [ 2659.317954]  schedule+0x2c/0x80
  [ 2659.317959]  raise_barrier+0xa1/0x1a0 [raid10]
  [ 2659.317963]  ? wait_woken+0x80/0x80
  [ 2659.317968]  raid10_sync_request+0x205/0x1f10 [raid10]
  [ 2659.317975]  ? find_next_bit+0xb/0x10
  [ 2659.317980]  ? cpumask_next+0x1b/0x20
  [ 2659.317985]  ? is_mddev_idle+0x92/0xf4
  [ 2659.317990]  md_do_sync+0x8ca/0xf10
  [ 2659.317994]  ? wait_woken+0x80/0x80
  [ 2659.31800

[Kernel-packages] [Bug 1836839] [NEW] prctl04 in LTP syscall test failed with T kernel on P8 node

2019-07-16 Thread Po-Hsu Lin
Public bug reported:

This failure was only spotted on PowerPC (node "modoc"), it has passed
with AMD64 / i386, entirely skipped on ARM64.

 startup='Mon Jul 15 22:48:25 2019'
 tst_test.c:1100: INFO: Timeout per run is 0h 05m 00s
 prctl04.c:213: INFO: kernel support PR_GET/SET_SECCOMP
 prctl04.c:125: PASS: prctl(PR_SET_SECCOMP) sets SECCOMP_MODE_STRICT succeed
 prctl04.c:197: PASS: SECCOMP_MODE_STRICT doesn't permit GET_SECCOMP call
 prctl04.c:133: PASS: SECCOMP_MODE_STRICT permits read(2) write(2) and _exit(2)
 prctl04.c:197: PASS: SECCOMP_MODE_STRICT doesn't permit close(2) 
 prctl04.c:155: CONF: kernel doesn't support SECCOMP_MODE_FILTER
 prctl04.c:155: CONF: kernel doesn't support SECCOMP_MODE_FILTER
 prctl04.c:155: CONF: kernel doesn't support SECCOMP_MODE_FILTER
 prctl04.c:205: FAIL: SECCOMP_MODE_FILTER permits exit() unexpectedly
 prctl04.c:155: CONF: kernel doesn't support SECCOMP_MODE_FILTER

 Summary:
 passed 4
 failed 1
 skipped 4
 warnings 0

** Affects: ubuntu-kernel-tests
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu Trusty)
 Importance: Undecided
 Status: New


** Tags: 3.13 ppc64el sru-20190701 trusty ubuntu-ltp-syscalls

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: ubuntu-kernel-tests
   Importance: Undecided
   Status: New

** Tags added: 3.13 ppc64el sru-20190701 trusty ubuntu-ltp-syscalls

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836839

Title:
  prctl04 in LTP syscall test failed with T kernel on P8 node

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Trusty:
  New

Bug description:
  This failure was only spotted on PowerPC (node "modoc"), it has passed
  with AMD64 / i386, entirely skipped on ARM64.

   startup='Mon Jul 15 22:48:25 2019'
   tst_test.c:1100: INFO: Timeout per run is 0h 05m 00s
   prctl04.c:213: INFO: kernel support PR_GET/SET_SECCOMP
   prctl04.c:125: PASS: prctl(PR_SET_SECCOMP) sets SECCOMP_MODE_STRICT succeed
   prctl04.c:197: PASS: SECCOMP_MODE_STRICT doesn't permit GET_SECCOMP call
   prctl04.c:133: PASS: SECCOMP_MODE_STRICT permits read(2) write(2) and 
_exit(2)
   prctl04.c:197: PASS: SECCOMP_MODE_STRICT doesn't permit close(2) 
   prctl04.c:155: CONF: kernel doesn't support SECCOMP_MODE_FILTER
   prctl04.c:155: CONF: kernel doesn't support SECCOMP_MODE_FILTER
   prctl04.c:155: CONF: kernel doesn't support SECCOMP_MODE_FILTER
   prctl04.c:205: FAIL: SECCOMP_MODE_FILTER permits exit() unexpectedly
   prctl04.c:155: CONF: kernel doesn't support SECCOMP_MODE_FILTER

   Summary:
   passed 4
   failed 1
   skipped 4
   warnings 0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1836839/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836474] Re: dell touchpad not working

2019-07-16 Thread Kai-Heng Feng
Does kernel parameter "i8042.nomux=1" help?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836474

Title:
  dell touchpad not working

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  i installed ubuntu today on my dell lattitude 3540 and touchpad was working 
fine while installing 
  ubuntu os but after its installation and rebooting touchpad is not working at 
all. it is not even detecting it . in device list.

  ProblemType: Bug
  DistroRelease: Ubuntu 19.04
  Package: linux-image-5.0.0-20-generic 5.0.0-20.21
  ProcVersionSignature: Ubuntu 5.0.0-20.21-generic 5.0.8
  Uname: Linux 5.0.0-20-generic x86_64
  ApportVersion: 2.20.10-0ubuntu27.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  motican1678 F pulseaudio
  CurrentDesktop: ubuntu:GNOME
  Date: Sun Jul 14 14:10:35 2019
  InstallationDate: Installed on 2019-07-14 (0 days ago)
  InstallationMedia: Ubuntu 19.04 "Disco Dingo" - Release amd64 (20190416)
  MachineType: Dell Inc. Latitude 3540
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.0.0-20-generic 
root=UUID=b6ff2f80-7175-4690-8484-add63299c36e ro quiet splash vt.handoff=1
  RelatedPackageVersions:
   linux-restricted-modules-5.0.0-20-generic N/A
   linux-backports-modules-5.0.0-20-generic  N/A
   linux-firmware1.178.2
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 05/18/2018
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A13
  dmi.board.name: 043T50
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: A13
  dmi.modalias: 
dmi:bvnDellInc.:bvrA13:bd05/18/2018:svnDellInc.:pnLatitude3540:pvrA13:rvnDellInc.:rn043T50:rvrA00:cvnDellInc.:ct8:cvrA13:
  dmi.product.name: Latitude 3540
  dmi.product.sku: Latitude 3540
  dmi.product.version: A13
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836474/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1775378] Re: fanotify06 in LTP syscall test failed with T kernel

2019-07-16 Thread Po-Hsu Lin
I could see this failing on Trusty ARM64 Moonshot node, but not the ppc64le 
node "modoc":
startup='Tue Jul 9 07:45:17 2019'
tst_device.c:231: INFO: Using test device LTP_DEV='/dev/loop0'
tst_mkfs.c:90: INFO: Formatting /dev/loop0 with ext2 opts='' extra opts=''
mke2fs 1.42.9 (4-Feb-2014)
tst_test.c:1100: INFO: Timeout per run is 0h 05m 00s
tst_fs_setup.c:43: INFO: fanotify06.c:239: overlayfs is not configured in this 
kernel
fanotify06.c:169: INFO: Test #0: Fanotify merge mount mark
fanotify06.c:147: PASS: group 0 got event: mask 2 pid=6308 fd=30
fanotify06.c:147: PASS: group 1 got event: mask 2 pid=6308 fd=30
fanotify06.c:147: PASS: group 2 got event: mask 2 pid=6308 fd=30
fanotify06.c:220: FAIL: group 3 got event
fanotify06.c:230: PASS: group 4 got no event
fanotify06.c:220: FAIL: group 5 got event
fanotify06.c:230: PASS: group 6 got no event
fanotify06.c:230: PASS: group 7 got no event
fanotify06.c:230: PASS: group 8 got no event
fanotify06.c:169: INFO: Test #1: Fanotify merge overlayfs mount mark 
fanotify06.c:173: CONF: overlayfs is not configured in this kernel.

Summary:
passed 7
failed 2
skipped 1
warnings 0


** Tags added: arm64 sru-20190701 ubuntu-ltp-syscalls

** Tags added: 3.13

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1775378

Title:
  fanotify06 in LTP syscall test failed with T kernel

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Trusty:
  Triaged

Bug description:
  The "fanotify06" from the LTP syscall tests has failed on a testing
  node with T kernel installed.

  Steps (with root):
1. sudo apt-get install git xfsprogs -y
2. git clone --depth=1 https://github.com/linux-test-project/ltp.git
3. cd ltp
4. make autotools
5. ./configure
6. make; make install
7. /opt/ltp/testcases/bin/fanotify06

  <<>>
  tag=fanotify06 stime=1528269991
  cmdline="fanotify06"
  contacts=""
  analysis=exit
  <<>>
  tst_test.c:1015: INFO: Timeout per run is 0h 05m 00s
  fanotify06.c:147: PASS: group 0 get event: mask 2 pid=22619 fd=29
  fanotify06.c:147: PASS: group 1 get event: mask 2 pid=22619 fd=29
  fanotify06.c:147: PASS: group 2 get event: mask 2 pid=22619 fd=29
  fanotify06.c:197: FAIL: group 3 got event
  fanotify06.c:197: FAIL: group 4 got event
  fanotify06.c:197: FAIL: group 5 got event
  fanotify06.c:208: PASS: group 6 got no event
  fanotify06.c:208: PASS: group 7 got no event
  fanotify06.c:197: FAIL: group 8 got event

  Summary:
  passed   5
  failed   4
  skipped  0
  warnings 0
  <<>>
  initiation_status="ok"
  duration=0 termination_type=exited termination_id=1 corefile=no
  cutime=0 cstime=0
  <<>>

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-149-generic 3.13.0-149.199
  ProcVersionSignature: User Name 3.13.0-149.199-generic 3.13.11-ckt39
  Uname: Linux 3.13.0-149-generic x86_64
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 Jun  6 10:09 seq
   crw-rw 1 root audio 116, 33 Jun  6 10:09 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay'
  ApportVersion: 2.14.1-0ubuntu3.29
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CurrentDmesg: [3.472391] init: plymouth-upstart-bridge main process 
ended, respawning
  Date: Wed Jun  6 10:12:15 2018
  IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig'
  MachineType: Intel Corporation S1200RP
  PciMultimedia:
   
  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-149-generic 
root=UUID=b0d2ae4e-12dd-423e-acea-272ee8b2a893 ro
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-149-generic N/A
   linux-backports-modules-3.13.0-149-generic  N/A
   linux-firmware  1.127.24
  RfKill: Error: [Errno 2] No such file or directory: 'rfkill'
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 07/01/2015
  dmi.bios.vendor: Intel Corp.
  dmi.bios.version: S1200RP.86B.03.02.0003.070120151022
  dmi.board.asset.tag: 
  dmi.board.name: S1200RP
  dmi.board.vendor: Intel Corporation
  dmi.board.version: G62254-407
  dmi.chassis.asset.tag: 
  dmi.chassis.type: 17
  dmi.chassis.vendor: ..
  dmi.chassis.version: ..
  dmi.modalias: 
dmi:bvnIntelCorp.:bvrS1200RP.86B.03.02.0003.070120151022:bd07/01/2015:svnIntelCorporation:pnS1200RP:pvr:rvnIntelCorporation:rnS1200RP:rvrG62254-407:cvn..:ct17:cvr..:
  dmi.product.name: S1200RP
  dmi.product.ver

[Kernel-packages] [Bug 1836801] Re: BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

2019-07-16 Thread Stefan Bader
Upstream stable 4.4.181 had many brcmfmac updates. From the trace
suspicious seems:

brcmfmac: revise handling events in receive path

commit 9c349892ccc90c6de2baaa69cc78449f58082273 upstream.

which has a fixup upstream that sounds like the issue:

commit 31143e2933d1675c4c1ba6ce125cdd95870edd85
Author: Franky Lin 
Date:   Thu Jun 2 02:00:27 2016 -0700

brcmfmac: add eth_type_trans back for PCIe full dongle

A regression was introduced in commit 9c349892ccc9 ("brcmfmac: revise
handling events in receive path") which moves eth_type_trans() call
to brcmf_rx_frame(). Msgbuf layer doesn't use brcmf_rx_frame() but invokes
brcmf_netif_rx() directly. In such case the Ethernet header was not
stripped out resulting in null pointer dereference in the networking
stack.

BUG: unable to handle kernel NULL pointer dereference at 0048
IP: [] enqueue_to_backlog+0x56/0x260
...
Fixes: 9c349892ccc9 ("brcmfmac: revise handling events in receive path")
Reported-by: Rafal Milecki 
Reported-by: Grey Christoforo 
Reviewed-by: Pieter-Paul Giesberts 
Reviewed-by: Arend Van Spriel 
Reviewed-by: Hante Meuleman 
Signed-off-by: Franky Lin 
[ar...@broadcom.com: rephrased the commit message]
Signed-off-by: Arend van Spriel 
Signed-off-by: Kalle Valo 

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1836801

Title:
  BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

Status in linux package in Ubuntu:
  Confirmed
Status in linux-signed package in Ubuntu:
  New

Bug description:
  [Description]

  The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
  with the proposed kernel 4.4.0-155.182-generic will cause kernel
  trace[1]. However the wifi function works properly with the kernel
  4.4.0-154.181

  [Steps to Reproduce]
  1. Install ubuntu xenial, enable the proposed repository, and update the 
system with "sudo apt-get dist-upgrade"
  2. nmcli d wifi rescan
  3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
  4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

  [Expected Result]
  The AP is connected

  [Actual Result]
  You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

  Sometime the system hangs when connecting to a wifi AP.

  [More Information]

  [1] The kernel trace log
  hecking kernel ring buffer for brcmfmac messages:
  kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
  kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
  kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: 
renamed from wlan0
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm c

[Kernel-packages] [Bug 1828166] Re: perf top problem on z with Ubuntu 18.04

2019-07-16 Thread Frank Heimes
I can also confirm that the issue still exists, but only if I run perf top as 
root or with sudo.
Running perf top it as regular user is fine - even w/o the patches packages!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1828166

Title:
  perf top problem on z with Ubuntu 18.04

Status in Ubuntu on IBM z Systems:
  Confirmed
Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Bionic:
  In Progress
Status in linux source package in Cosmic:
  Invalid

Bug description:
  SRU Justification:
  ==

  [Impact]

  * The perf top tool hangs and shows error messages, like 'Not enough
  memory for annotating'

  [Fix]

  * edeb0c90df3581b821a764052d185df985f8b8dc edeb0c9 "perf tools: Stop
  fallbacking to kallsyms for vdso symbols lookup"

  [Test Case]

  * start a benchmark (mem_alloc, but it doesn't really matter what)

  * execute perf top in a second terminal

  * the output of perf top is correct

  * now stop the benchmark

  * and perf top shows an error message, like "Not enough memory for
  annotating '__irf_end' symbol!)"

  * and perf top can't be exited anymore

  [Regression Potential]

  * The regression potential can be considered as low since this happens
  only while using the perf top tool

  * and it is known that the commit (above) fixes the problem

  * and the fix is upstream since 4.19

  [Other Info]

  * current disco and eoan kernels don't show that problem

  * bisecting result points to above commit

  * applies cleanly on cosmic, but has a little conflict on bionic (both 
master-next)
  _

  perf top hangs and shows error messages

  ---uname output---
  Linux weather 4.15.0-46-generic #49-Ubuntu SMP Wed Feb 6 09:32:27 UTC 2019 
s390x s390x s390x GNU/Linux

  ---Steps to Reproduce---
   I start a benchmark (mem_alloc, but it really doesn't matter) and then issue 
perf top in a second terminal, the output from perf top is correct. Now I stop 
the benchmark: perf top shows a error message (Not enough memory for annotating 
'__irf_end' symbol!) and I can't quit from perf top anymore

  Following analyse took place:
  No problem with current kernel .
  Bi-Secting of perf tool took place and following commit was found:

  commit edeb0c90df3581b821a764052d185df985f8b8dc (HEAD, refs/bisect/bad)
  Author: Arnaldo Carvalho de Melo 
  Date:   Tue Oct 16 17:08:29 2018 -0300

  perf tools: Stop fallbacking to kallsyms for vdso symbols lookup

  When you apply this patch the issue is gone, however it is contained
  in these versions:

  git tag --contains  edeb0c90df3581b821
  v4.19
  v4.20
  

  The level I was debugging was kernel 4.15 which does not contain this
  patch.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1828166/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836836] [NEW] First click on Goodix touchpad doesn't be recognized after runtime suspended

2019-07-16 Thread AceLan Kao
Public bug reported:

[Impact]
Wake up from runtime suspend, Goodix doesn't report correct Tap event by
tapping it the first time, so if you double tap the touchpad, the system
only got one tap.

[Fix]
Adding one missing platform which uses Goodix touchpad IC to the i2c
designware quirk list.

[Test]
Verified on the buggy machines.

[Regression Potential]
Low, this quirk doesn't hurt anything and do little or none to power 
consumption.

** Affects: linux-oem-osp1 (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: linux-oem-osp1 (Ubuntu Bionic)
 Importance: Undecided
 Assignee: AceLan Kao (acelankao)
 Status: In Progress

** Also affects: linux-oem-osp1 (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux (Ubuntu)

** Also affects: linux-oem-osp1 (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: linux-oem-osp1 (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: linux-oem-osp1 (Ubuntu Bionic)
 Assignee: (unassigned) => AceLan Kao (acelankao)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836836

Title:
  First click on Goodix touchpad doesn't be recognized after runtime
  suspended

Status in linux-oem-osp1 package in Ubuntu:
  New
Status in linux-oem-osp1 source package in Bionic:
  In Progress

Bug description:
  [Impact]
  Wake up from runtime suspend, Goodix doesn't report correct Tap event by
  tapping it the first time, so if you double tap the touchpad, the system
  only got one tap.

  [Fix]
  Adding one missing platform which uses Goodix touchpad IC to the i2c
  designware quirk list.

  [Test]
  Verified on the buggy machines.

  [Regression Potential]
  Low, this quirk doesn't hurt anything and do little or none to power 
consumption.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-oem-osp1/+bug/1836836/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836467] Re: Bluetooth fails with "Bluetooth: hci0: request failed to create LE connection: status 0x0c" message with Kernel 4.20 and up [9df0:0034]

2019-07-16 Thread You-Sheng Yang
https://lists.ubuntu.com/archives/kernel-team/2019-July/102298.html
https://lists.ubuntu.com/archives/kernel-team/2019-July/102299.html

** Description changed:

+ SRU Justification:
+ 
+ [Impact]
+ Bluetooth for Intel Wireless-AC 9560 variant 9df0:0034 still fails to
+ pair BT LE HID devices on recent (>= 4.19) kernel.
+ 
+ [Fix]
+ Bluetooth firmware REL0450 or newer is required to fix this issue.
+ 
+ [Test Case]
+ Install new firmware blob to /lib/firmware/intel, shutdown the machine
+ completely and wait for a couple minutes to trigger firmware reloading
+ at the next boot. Then perform Bluetooth LE HID devices pairing to
+ verify if the proposed fw fixes this issue.
+ 
+ [Regression Risk]
+ Low. This affects only sub models of Intel JeffersonPeak Bluetooth chip
+ series using these firmware blobs.
+ 
+ == Original Bug Description ==
+ 
  This is similar to https://bugs.launchpad.net/bugs/1829737 - however the
  issue was not fixed by linux-firmware 1.173.8 so I was advised to log a
  new bug.
  
  I have an ASUS ZenBook 14 - UX433FA - which based on this - 
https://www.notebookcheck.net/ASUS-ZenBook-14-UX433FA-Core-i5-8265U-SSD-FHD-Laptop-Review.403541.0.html
 - I believe has an Intel 9560 chipset (I am not sure how to independently 
verify this).
  With kernels older than 4.20 I can successfully pair my bluetooth mouse 
(Logitech MX Master) - but with newer kernels I get "Bluetooth: hci0: request 
failed to create LE connection: status 0x0c" messages.
  
  I'm running Linux Mint 19.1
  
  I tried installing linux-firmware 1.173.8, and it didn't seem to help -
  I also downloaded 1.173.9 proposed from here:
  https://launchpad.net/ubuntu/bionic/amd64/linux-firmware/1.173.9 and
  that also didn't seem to help.
  
  Both after a cold reboot and a warm reboot I see
  [ 14.724438] Bluetooth: hci0: Firmware revision 0.1 build 201 week 49 2017
  
  in my dmesg output.
  
  Bluetooth works just fine with earlier kernels (however other aspects of
  the laptop like suspend don't work as well, which is why I'm trying the
  newer kernel.
  
  Linux warren-ZenBook 5.1.16-050116-generic #201907031232 SMP Wed Jul 3
  12:35:21 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
  
  dmesg | egrep -i 'blue|firm'
  [
  [0.180273] Spectre V2 : Enabling Restricted Speculation for firmware calls
  [0.004526] [Firmware Bug]: TSC ADJUST differs within socket(s), fixing 
all errors
  [1.417663] [drm] Finished loading DMC firmware i915/kbl_dmc_ver1_04.bin 
(v1.4)
  [   14.641146] iwlwifi :00:14.3: Direct firmware load for 
iwlwifi-9000-pu-b0-jf-b0-46.ucode failed with error -2
  [   14.642377] iwlwifi :00:14.3: Direct firmware load for 
iwlwifi-9000-pu-b0-jf-b0-45.ucode failed with error -2
  [   14.642392] iwlwifi :00:14.3: Direct firmware load for 
iwlwifi-9000-pu-b0-jf-b0-44.ucode failed with error -2
  [   14.652301] iwlwifi :00:14.3: loaded firmware version 43.95eb4e97.0 
op_mode iwlmvm
  [   14.675356] Bluetooth: Core ver 2.22
  [   14.675374] Bluetooth: HCI device and connection manager initialized
  [   14.675377] Bluetooth: HCI socket layer initialized
  [   14.675379] Bluetooth: L2CAP socket layer initialized
  [   14.675382] Bluetooth: SCO socket layer initialized
  [   14.724438] Bluetooth: hci0: Firmware revision 0.1 build 201 week 49 2017
  [   15.207800] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
  [   15.207801] Bluetooth: BNEP filters: protocol multicast
  [   15.207804] Bluetooth: BNEP socket layer initialized
  [   22.040223] Bluetooth: HIDP (Human Interface Emulation) ver 1.2
  [   22.040232] Bluetooth: HIDP socket layer initialized
  [   22.042238] input: Logitech K810 Keyboard as 
/devices/pci:00/:00:14.0/usb1/1-10/1-10:1.0/bluetooth/hci0/hci0:256/0005:046D:B319.0004/input/input27
  [   22.042996] input: Logitech K810 Consumer Control as 
/devices/pci:00/:00:14.0/usb1/1-10/1-10:1.0/bluetooth/hci0/hci0:256/0005:046D:B319.0004/input/input28
  [   22.043235] input: Logitech K810 System Control as 
/devices/pci:00/:00:14.0/usb1/1-10/1-10:1.0/bluetooth/hci0/hci0:256/0005:046D:B319.0004/input/input29
  [   22.043426] hid-generic 0005:046D:B319.0004: input,hidraw3: BLUETOOTH HID 
v12.02 Keyboard [Logitech K810] on 00:bb:60:09:27:1a
  [   29.296700] Bluetooth: RFCOMM TTY layer initialized
  [   29.296705] Bluetooth: RFCOMM socket layer initialized
  [   29.296711] Bluetooth: RFCOMM ver 1.11
  [  217.675736] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c
  [  217.709807] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c
  [  218.537827] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c
  [  218.767709] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c
  [  220.244821] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c
  
  If there are any other debugging things to try, or info you need, let me
  know...

-- 
You received this bug notification because you

[Kernel-packages] [Bug 1836668] Re: Xenial update: 4.4.185 upstream stable release

2019-07-16 Thread Khaled El Mously
2 patches were skipped because they were already applied:

0002-mm-page_idle.c-fix-oops-because-end_pfn-is-larger-th.patch
0036-KVM-X86-Fix-scan-ioapic-use-before-initialization.patch

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836668

Title:
  Xenial update: 4.4.185 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  New

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.185 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836668/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836668] Re: Xenial update: 4.4.185 upstream stable release

2019-07-16 Thread Khaled El Mously
Applied patches:

* fs/binfmt_flat.c: make load_flat_shared_library() work
* scsi: vmw_pscsi: Fix use-after-free in pvscsi_queue_lck()
* tracing: Silence GCC 9 array bounds warning
* gcc-9: silence 'address-of-packed-member' warning
* usb: chipidea: udc: workaround for endpoint conflict issue
* Input: uinput - add compat ioctl number translation for UI_*_FF_UPLOAD
* apparmor: enforce nullbyte at end of tag string
* parport: Fix mem leak in parport_register_dev_model
* parisc: Fix compiler warnings in float emulation code
* IB/hfi1: Insure freeze_work work_struct is canceled on shutdown
* MIPS: uprobes: remove set but not used variable 'epc'
* net: hns: Fix loopback test failed at copper ports
* sparc: perf: fix updated event period in response to PERF_EVENT_IOC_PERIOD
* scripts/checkstack.pl: Fix arm64 wrong or unknown architecture
* scsi: ufs: Check that space was properly alloced in copy_query_response
* s390/qeth: fix VLAN attribute in bridge_hostnotify udev event
* hwmon: (pmbus/core) Treat parameters as paged if on multiple pages
* Btrfs: fix race between readahead and device replace/removal
* btrfs: start readahead also in seed devices
* can: flexcan: fix timeout when set small bitrate
* can: purge socket error queue on sock destruct
* ARM: imx: cpuidle-imx6sx: Restrict the SW2ISO increase to i.MX6SX
* Bluetooth: Align minimum encryption key size for LE and BR/EDR connections
* Bluetooth: Fix regression with minimum encryption key size alignment
* SMB3: retry on STATUS_INSUFFICIENT_RESOURCES instead of failing write
* cfg80211: fix memory leak of wiphy device name
* mac80211: drop robust management frames from unknown TA
* perf ui helpline: Use strlcpy() as a shorter form of strncpy() + explicit set 
nul
* perf help: Remove needless use of strncpy()
* 9p/rdma: do not disconnect on down_interruptible EAGAIN
* 9p: acl: fix uninitialized iattr access
* 9p/rdma: remove useless check in cm_event_handler
* 9p: p9dirent_read: check network-provided name length
* net/9p: include trans_common.h to fix missing prototype warning.
* ovl: modify ovl_permission() to do checks on two inodes
* x86/speculation: Allow guests to use SSBD even if host does not
* cpu/speculation: Warn on unsupported mitigations= parameter
* sctp: change to hold sk after auth shkey is created successfully
* tipc: change to use register_pernet_device
* tipc: check msg->req data len in tipc_nl_compat_bearer_disable
* team: Always enable vlan tx offload
* ipv4: Use return value of inet_iif() for __raw_v4_lookup in the while loop
* bonding: Always enable vlan tx offload
* net: check before dereferencing netdev_ops during busy poll
* Bluetooth: Fix faulty expression for minimum encryption key size check
* um: Compile with modern headers
* ASoC : cs4265 : readable register too low
* spi: bitbang: Fix NULL pointer dereference in spi_unregister_master
* ASoC: max98090: remove 24-bit format support if RJ is 0
* usb: gadget: fusb300_udc: Fix memory leak of fusb300->ep[i]
* usb: gadget: udc: lpc32xx: allocate descriptor with GFP_ATOMIC
* scsi: hpsa: correct ioaccel2 chaining
* ARC: Assume multiplier is always present
* ARC: fix build warning in elf.h
* MIPS: math-emu: do not use bools for arithmetic
* mfd: omap-usb-tll: Fix register offsets
* swiotlb: Make linux/swiotlb.h standalone includible
* bug.h: work around GCC PR82365 in BUG()
* MIPS: Workaround GCC __builtin_unreachable reordering bug
* ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME
* crypto: user - prevent operating on larval algorithms
* ALSA: seq: fix incorrect order of dest_client/dest_ports arguments
* ALSA: firewire-lib/fireworks: fix miss detection of received MIDI messages
* ALSA: usb-audio: fix sign unintended sign extension on left shifts
* lib/mpi: Fix karactx leak in mpi_powm
* btrfs: Ensure replaced device doesn't have pending chunk allocation
* tty: rocket: fix incorrect forward declaration of 'rp_init()'
* ARC: handle gcc generated __builtin_trap for older compiler
* arm64, vdso: Define vdso_{start,end} as array
* KVM: x86: degrade WARN to pr_warn_ratelimited
* dmaengine: imx-sdma: remove BD_INTR for channel0
* Linux 4.4.185

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836668

Title:
  Xenial update: 4.4.185 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  New

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.185 upstream stable release
 fro

[Kernel-packages] [Bug 1836667] Re: Xenial update: 4.4.184 upstream stable release

2019-07-16 Thread Khaled El Mously
All patches from this updated were already applied.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836667

Title:
  Xenial update: 4.4.184 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  New

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.184 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836667/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836666] Re: Xenial update: 4.4.183 upstream stable release

2019-07-16 Thread Khaled El Mously
One patch was skipped as it was already present:

0039-Revert-Bluetooth-Align-minimum-encryption-key-size-f.patch

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/183

Title:
  Xenial update: 4.4.183 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  New

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.183 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/183/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836665] Re: Xenial update: 4.4.182 upstream stable release

2019-07-16 Thread Khaled El Mously
All patches from this updated were already applied.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836665

Title:
  Xenial update: 4.4.182 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.182 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836665/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836665] Re: Xenial update: 4.4.182 upstream stable release

2019-07-16 Thread Khaled El Mously
Applied patches:

* Linux 4.4.182

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836665

Title:
  Xenial update: 4.4.182 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.182 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836665/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836666] Re: Xenial update: 4.4.183 upstream stable release

2019-07-16 Thread Khaled El Mously
Applied patches:

* fs/fat/file.c: issue flush after the writeback of FAT
* sysctl: return -EINVAL if val violates minmax
* ipc: prevent lockup on alloc_msg and free_msg
* hugetlbfs: on restore reserve error path retain subpool reservation
* mm/cma.c: fix crash on CMA allocation if bitmap allocation fails
* mm/cma_debug.c: fix the break condition in cma_maxchunk_get()
* kernel/sys.c: prctl: fix false positive in validate_prctl_map()
* mfd: intel-lpss: Set the device in reset state when init
* mfd: twl6040: Fix device init errors for ACCCTL register
* perf/x86/intel: Allow PEBS multi-entry in watermark mode
* drm/bridge: adv7511: Fix low refresh rate selection
* ntp: Allow TAI-UTC offset to be set to zero
* f2fs: fix to avoid panic in do_recover_data()
* f2fs: fix to do sanity check on valid block count of segment
* iommu/vt-d: Set intel_iommu_gfx_mapped correctly
* ALSA: hda - Register irq handler after the chip initialization
* nvmem: core: fix read buffer in place
* fuse: retrieve: cap requested size to negotiated max_write
* nfsd: allow fh_want_write to be called twice
* x86/PCI: Fix PCI IRQ routing table memory leak
* platform/chrome: cros_ec_proto: check for NULL transfer function
* soc: mediatek: pwrap: Zero initialize rdata in pwrap_init_cipher
* clk: rockchip: Turn on "aclk_dmac1" for suspend on rk3288
* ARM: dts: imx6sx: Specify IMX6SX_CLK_IPG as "ahb" clock to SDMA
* ARM: dts: imx6sx: Specify IMX6SX_CLK_IPG as "ipg" clock to SDMA
* ARM: dts: imx6qdl: Specify IMX6QDL_CLK_IPG as "ipg" clock to SDMA
* PCI: rpadlpar: Fix leaked device_node references in add/remove paths
* PCI: rcar: Fix a potential NULL pointer dereference
* video: hgafb: fix potential NULL pointer dereference
* video: imsttfb: fix potential NULL pointer dereferences
* PCI: xilinx: Check for __get_free_pages() failure
* gpio: gpio-omap: add check for off wake capable gpios
* dmaengine: idma64: Use actual device for DMA transfers
* pwm: tiehrpwm: Update shadow register for disabling PWMs
* ARM: dts: exynos: Always enable necessary APIO_1V8 and ABB_1V8 regulators on 
Arndale Octa
* pwm: Fix deadlock warning when removing PWM device
* ARM: exynos: Fix undefined instruction during Exynos5422 resume
* futex: Fix futex lock the wrong page
* ALSA: seq: Cover unsubscribe_port() in list_mutex
* libata: Extend quirks for the ST1000LM024 drives with NOLPM quirk
* mm/list_lru.c: fix memory leak in __memcg_init_list_lru_node
* fs/ocfs2: fix race in ocfs2_dentry_attach_lock()
* signal/ptrace: Don't leak unitialized kernel memory with PTRACE_PEEK_SIGINFO
* ptrace: restore smp_rmb() in __ptrace_may_access()
* i2c: acorn: fix i2c warning
* bcache: fix stack corruption by PRECEDING_KEY()
* cgroup: Use css_tryget() instead of css_tryget_online() in task_get_css()
* ASoC: cs42xx8: Add regcache mask dirty
* Drivers: misc: fix out-of-bounds access in function param_set_kgdbts_var
* scsi: lpfc: add check for loss of ndlp when sending RRQ
* scsi: bnx2fc: fix incorrect cast to u64 on shift operation
* usbnet: ipheth: fix racing condition
* KVM: x86/pmu: do not mask the value that is written to fixed PMUs
* KVM: s390: fix memory slot handling for KVM_SET_USER_MEMORY_REGION
* drm/vmwgfx: integer underflow in vmw_cmd_dx_set_shader() leading to an 
invalid read
* drm/vmwgfx: NULL pointer dereference from vmw_cmd_dx_view_define()
* USB: Fix chipmunk-like voice when using Logitech C270 for recording audio.
* USB: usb-storage: Add new ID to ums-realtek
* USB: serial: pl2303: add Allied Telesis VT-Kit3
* USB: serial: option: add support for Simcom SIM7500/SIM7600 RNDIS mode
* USB: serial: option: add Telit 0x1260 and 0x1261 compositions
* ax25: fix inconsistent lock state in ax25_destroy_timer
* be2net: Fix number of Rx queues used for flow hashing
* ipv6: flowlabel: fl6_sock_lookup() must use atomic_inc_not_zero
* lapb: fixed leak of control-blocks.
* neigh: fix use-after-free read in pneigh_get_next
* sunhv: Fix device naming inconsistency between sunhv_console and sunhv_reg
* mISDN: make sure device name is NUL terminated
* x86/CPU/AMD: Don't force the CPB cap when running under a hypervisor
* perf/ring_buffer: Fix exposing a temporarily decreased data_head
* perf/ring_buffer: Add ordering to rb->nest increment
* gpio: fix gpio-adp5588 build errors
* net: tulip: de4x5: Drop redundant MODULE_DEVICE_TABLE()
* i2c: dev: fix potential memory leak in i2cdev_ioctl_rdwr
* configfs: Fix use-after-free when accessing sd->s_dentry
* ia64: fix build errors by exporting paddr_to_nid()
* KVM: PPC: Book3S: Use new mutex to synchronize access to rtas token list
* net: sh_eth: fix mdio access in sh_eth_close() for R-Car Gen2 and RZ/A1 SoCs
* scsi: libcxgbi: add a check for NULL pointer in cxgbi_check_route()
* scsi: libsas: delete sas port if expander discover failed
* Revert "crypto: crypto4xx - properly set IV after de- and encrypt"
* coredump: fix race condition between mmget_not_zero()/get_task_mm() and core 
dumping
* Abort file_remove_privs() for non-reg. files
* Linux 4.4

[Kernel-packages] [Bug 1836667] Re: Xenial update: 4.4.184 upstream stable release

2019-07-16 Thread Khaled El Mously
Applied patches:

* Linux 4.4.184

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836667

Title:
  Xenial update: 4.4.184 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  New

Bug description:
  
  SRU Justification

  Impact:
 The upstream process for stable tree updates is quite similar
 in scope to the Ubuntu SRU process, e.g., each patch has to
 demonstrably fix a bug, and each patch is vetted by upstream
 by originating either directly from a mainline/stable Linux tree or
 a minimally backported form of that patch. The following upstream
 stable patches should be included in the Ubuntu kernel:

 4.4.184 upstream stable release
 from git://git.kernel.org/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836667/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1818974] Re: Ubuntu 18.04 Kernel 4.18 - Standby wakeup user session crash

2019-07-16 Thread Kai-Heng Feng
Yes, please test hwe-edge kernel.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1818974

Title:
  Ubuntu 18.04 Kernel 4.18 - Standby wakeup user session crash

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I'm using Ubuntu 18.04 (Linux Mint 19.1 Tessa) with HWE.
  Since kernel 4.18 sometimes while waking up from standby my user session 
crash.
  I assume that my attached external USB to SATA HDD could be cause this kernel 
bug.
  --- 
  ProblemType: Bug
  ApportVersion: 2.20.9-0ubuntu7.5
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  martin27966 F pulseaudio
  CurrentDesktop: X-Cinnamon
  DistroRelease: Linux Mint 19.1
  HibernationDevice: RESUME=UUID=4a747812-cab0-438b-ace1-a46b73f00d4a
  InstallationDate: Installed on 2018-07-21 (228 days ago)
  InstallationMedia: Linux Mint 19 "Tara" - Release amd64 20180626
  MachineType: LENOVO 20FXS05500
  NonfreeKernelModules: nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.18.0-16-generic 
root=UUID=8ffc268d-6911-42c4-9bc3-a290376cb41b ro quiet splash 
nvidia-drm.modeset=1 nopti spectre_v2=off spectre_v2_user=off nospec noibrs 
noibpb l1tf=off vt.handoff=1
  ProcVersionSignature: Ubuntu 4.18.0-16.17~18.04.1-generic 4.18.20
  RelatedPackageVersions:
   linux-restricted-modules-4.18.0-16-generic N/A
   linux-backports-modules-4.18.0-16-generic  N/A
   linux-firmware 1.173.3
  Tags:  tessa
  Uname: Linux 4.18.0-16-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom davfs2 dip lpadmin plugdev sambashare scanner sudo
  _MarkForUpload: True
  dmi.bios.date: 09/27/2018
  dmi.bios.vendor: LENOVO
  dmi.bios.version: R07ET87W (2.27 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 20FXS05500
  dmi.board.vendor: LENOVO
  dmi.board.version: Not Defined
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: None
  dmi.modalias: 
dmi:bvnLENOVO:bvrR07ET87W(2.27):bd09/27/2018:svnLENOVO:pn20FXS05500:pvrThinkPadT460p:rvnLENOVO:rn20FXS05500:rvrNotDefined:cvnLENOVO:ct10:cvrNone:
  dmi.product.family: ThinkPad T460p
  dmi.product.name: 20FXS05500
  dmi.product.sku: LENOVO_MT_20FX_BU_Think_FM_ThinkPad T460p
  dmi.product.version: ThinkPad T460p
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1818974/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1774394] Re: fcntl35 / fcntl35_64 in LTP syscall test failed with T/X/X-LTS kernel

2019-07-16 Thread Po-Hsu Lin
** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: linux-lts-xenial (Ubuntu Trusty)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1774394

Title:
  fcntl35 / fcntl35_64 in LTP syscall test failed with T/X/X-LTS kernel

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in linux-lts-xenial package in Ubuntu:
  New
Status in linux source package in Trusty:
  New
Status in linux-lts-xenial source package in Trusty:
  New

Bug description:
  The "fcntl35" and "fcntl35_64" from the LTP syscall tests have failed
  on a testing node with X-LTS i386 kernel installed (they were not
  tested on amd64/arm64 because the test was not ready when the SRU
  starts).

  <>>
  tag=fcntl35 stime=1527764565
  cmdline="fcntl35"
  contacts=""
  analysis=exit
  <<>>
  tst_test.c:1015: INFO: Timeout per run is 0h 05m 00s
  fcntl35.c:98: FAIL: an unprivileged user init the capacity of a pipe to 65536 
unexpectedly, expected 4096
  fcntl35.c:101: PASS: a privileged user init the capacity of a pipe to 65536 
successfully

  Summary:
  passed   1
  failed   1
  skipped  0
  warnings 0
  <<>>
  initiation_status="ok"
  duration=0 termination_type=exited termination_id=1 corefile=no
  cutime=0 cstime=0
  <<>>

  
  <<>>
  tag=fcntl35_64 stime=1527764565
  cmdline="fcntl35_64"
  contacts=""
  analysis=exit
  <<>>
  tst_test.c:1015: INFO: Timeout per run is 0h 05m 00s
  fcntl35.c:98: FAIL: an unprivileged user init the capacity of a pipe to 65536 
unexpectedly, expected 4096
  fcntl35.c:101: PASS: a privileged user init the capacity of a pipe to 65536 
successfully

  Summary:
  passed   1
  failed   1
  skipped  0
  warnings 0
  <<>>
  initiation_status="ok"
  duration=0 termination_type=exited termination_id=1 corefile=no
  cutime=0 cstime=0
  <<>>

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-4.4.0-128-generic 4.4.0-128.154~14.04.1
  ProcVersionSignature: User Name 4.4.0-128.154~14.04.1-generic 4.4.131
  Uname: Linux 4.4.0-128-generic i686
  ApportVersion: 2.14.1-0ubuntu3.28
  Architecture: i386
  Date: Thu May 31 11:05:58 2018
  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  SourcePackage: linux-lts-xenial
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1774394/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836467] Re: Bluetooth fails with "Bluetooth: hci0: request failed to create LE connection: status 0x0c" message with Kernel 4.20 and up

2019-07-16 Thread You-Sheng Yang
Thank you, Warren. So I think I can begin to send a patch to the series
don't have REL0450 ibt-17-16-1.sfi, so that owners of the same devices
don't have to manually download again.

For polluted /lib/firmware, I think I would restore what it was and copy
only ibt-17-16-1.sfi to keep Bluetooth working. Because I myself run apt
updates everyday, and I don't want to break any installation script as
possible. Besides, yes, keep things simple would also be nice.

** Also affects: linux-firmware (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Also affects: linux-firmware (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux-firmware (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Changed in: linux-firmware (Ubuntu)
 Assignee: (unassigned) => You-Sheng Yang (vicamo)

** Changed in: linux-firmware (Ubuntu)
   Status: Incomplete => In Progress

** Changed in: linux-firmware (Ubuntu Cosmic)
   Status: New => Won't Fix

** Changed in: linux-firmware (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: linux-firmware (Ubuntu Disco)
   Status: New => In Progress

** Summary changed:

- Bluetooth fails with "Bluetooth: hci0: request failed to create LE 
connection: status 0x0c" message with Kernel 4.20 and up
+ Bluetooth fails with "Bluetooth: hci0: request failed to create LE 
connection: status 0x0c" message with Kernel 4.20 and up [9df0:0034]

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1836467

Title:
  Bluetooth fails with "Bluetooth: hci0: request failed to create LE
  connection: status 0x0c" message with Kernel 4.20 and up [9df0:0034]

Status in linux-firmware package in Ubuntu:
  In Progress
Status in linux-firmware source package in Bionic:
  In Progress
Status in linux-firmware source package in Cosmic:
  Won't Fix
Status in linux-firmware source package in Disco:
  In Progress

Bug description:
  This is similar to https://bugs.launchpad.net/bugs/1829737 - however
  the issue was not fixed by linux-firmware 1.173.8 so I was advised to
  log a new bug.

  I have an ASUS ZenBook 14 - UX433FA - which based on this - 
https://www.notebookcheck.net/ASUS-ZenBook-14-UX433FA-Core-i5-8265U-SSD-FHD-Laptop-Review.403541.0.html
 - I believe has an Intel 9560 chipset (I am not sure how to independently 
verify this).
  With kernels older than 4.20 I can successfully pair my bluetooth mouse 
(Logitech MX Master) - but with newer kernels I get "Bluetooth: hci0: request 
failed to create LE connection: status 0x0c" messages.

  I'm running Linux Mint 19.1

  I tried installing linux-firmware 1.173.8, and it didn't seem to help
  - I also downloaded 1.173.9 proposed from here:
  https://launchpad.net/ubuntu/bionic/amd64/linux-firmware/1.173.9 and
  that also didn't seem to help.

  Both after a cold reboot and a warm reboot I see
  [ 14.724438] Bluetooth: hci0: Firmware revision 0.1 build 201 week 49 2017

  in my dmesg output.

  Bluetooth works just fine with earlier kernels (however other aspects
  of the laptop like suspend don't work as well, which is why I'm trying
  the newer kernel.

  Linux warren-ZenBook 5.1.16-050116-generic #201907031232 SMP Wed Jul 3
  12:35:21 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux

  dmesg | egrep -i 'blue|firm'
  [
  [0.180273] Spectre V2 : Enabling Restricted Speculation for firmware calls
  [0.004526] [Firmware Bug]: TSC ADJUST differs within socket(s), fixing 
all errors
  [1.417663] [drm] Finished loading DMC firmware i915/kbl_dmc_ver1_04.bin 
(v1.4)
  [   14.641146] iwlwifi :00:14.3: Direct firmware load for 
iwlwifi-9000-pu-b0-jf-b0-46.ucode failed with error -2
  [   14.642377] iwlwifi :00:14.3: Direct firmware load for 
iwlwifi-9000-pu-b0-jf-b0-45.ucode failed with error -2
  [   14.642392] iwlwifi :00:14.3: Direct firmware load for 
iwlwifi-9000-pu-b0-jf-b0-44.ucode failed with error -2
  [   14.652301] iwlwifi :00:14.3: loaded firmware version 43.95eb4e97.0 
op_mode iwlmvm
  [   14.675356] Bluetooth: Core ver 2.22
  [   14.675374] Bluetooth: HCI device and connection manager initialized
  [   14.675377] Bluetooth: HCI socket layer initialized
  [   14.675379] Bluetooth: L2CAP socket layer initialized
  [   14.675382] Bluetooth: SCO socket layer initialized
  [   14.724438] Bluetooth: hci0: Firmware revision 0.1 build 201 week 49 2017
  [   15.207800] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
  [   15.207801] Bluetooth: BNEP filters: protocol multicast
  [   15.207804] Bluetooth: BNEP socket layer initialized
  [   22.040223] Bluetooth: HIDP (Human Interface Emulation) ver 1.2
  [   22.040232] Bluetooth: HIDP socket layer initialized
  [   22.042238] input: Logitech K810 Keyboard as 
/devices/pci:00/:00:14.0/usb1/1-10/1-10:1.0/bluetooth/hci0/hci0:256/0005:046D:B319.0004/input/input27
  [   22.042996] input: Logitech K810 Consumer Contro

[Kernel-packages] [Bug 1830084] Re: ubuntu_kernel_tests ftrace fails

2019-07-16 Thread Sean Feole
On GCP trace_printk module can't be found which triggers exit_unresolved

/home/jenkins/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/ftrace/test.d/event/trace_printk.tc
+ rmmod trace-printk
rmmod: ERROR: Module trace_printk is not currently loaded
+ :
+ modprobe trace-printk
modprobe: FATAL: Module trace-printk not found in directory 
/lib/modules/5.0.0-1011-gcp
+ echo No trace-printk sample module - please make CONFIG_SAMPLE_TRACE_PRINTK=m


** Also affects: linux-gcp (Ubuntu)
   Importance: Undecided
   Status: New

** Tags added: aws gcp sru-20190701

** Tags removed: aws

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1830084

Title:
  ubuntu_kernel_tests ftrace fails

Status in ubuntu-kernel-tests:
  Confirmed
Status in linux-aws package in Ubuntu:
  New
Status in linux-azure package in Ubuntu:
  Confirmed
Status in linux-gcp package in Ubuntu:
  New
Status in linux-aws source package in Disco:
  New
Status in linux-azure source package in Disco:
  Confirmed
Status in linux-gcp source package in Disco:
  New

Bug description:
  Cloud: Azure
  Series: Disco
  Kernel: 5.0.0-1007.7  linux-azure
  Instance: Standard_D2_v3 and others. 

  05/20 14:24:27 DEBUG| utils:0116| Running 'sudo sh -c 'echo 1 > 
/proc/sys/net/ipv4/conf/all/accept_local''
  05/20 14:24:27 DEBUG| utils:0116| Running 'sudo make -C 
linux/tools/testing/selftests TARGETS=ftrace run_tests'
  05/20 14:24:27 DEBUG| utils:0153| [stdout] make: Entering directory 
'/home/azure/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests'
  05/20 14:24:27 DEBUG| utils:0153| [stdout] make[1]: Entering directory 
'/home/azure/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/ftrace'
  05/20 14:24:27 DEBUG| utils:0153| [stdout] make[1]: Nothing to be done 
for 'all'.
  05/20 14:24:27 DEBUG| utils:0153| [stdout] make[1]: Leaving directory 
'/home/azure/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/ftrace'
  05/20 14:24:27 DEBUG| utils:0153| [stdout] make[1]: Entering directory 
'/home/azure/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/ftrace'
  05/20 14:24:27 DEBUG| utils:0153| [stdout] TAP version 13
  05/20 14:24:27 DEBUG| utils:0153| [stdout] selftests: ftrace: ftracetest
  05/20 14:24:27 DEBUG| utils:0153| [stdout] 

  05/20 14:24:27 ERROR| utils:0153| [stderr] ./ftracetest: 163: [: Illegal 
number: 
  05/20 14:24:27 DEBUG| utils:0153| [stdout] -e === Ftrace unit tests ===
  05/20 14:24:27 DEBUG| utils:0153| [stdout] -e -n [1] Basic trace file 
check
  05/20 14:24:27 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:27 DEBUG| utils:0153| [stdout] -e -n [2] Basic test for 
tracers
  05/20 14:24:31 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:31 DEBUG| utils:0153| [stdout] -e -n [3] Basic trace clock 
test
  05/20 14:24:32 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:32 DEBUG| utils:0153| [stdout] -e -n [4] Basic event tracing 
check
  05/20 14:24:32 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:32 DEBUG| utils:0153| [stdout] -e -n [5] Change the 
ringbuffer size
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e -n [6] Snapshot and tracing 
setting
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e -n [7] trace_pipe and 
trace_marker
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e -n [8] Generic dynamic 
event - add/remove kprobe events
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e -n [9] Generic dynamic 
event - add/remove synthetic events
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e -n [10] Generic dynamic 
event - selective clear (compatibility)
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e -n [11] Generic dynamic 
event - generic clear event
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e -n [12] event tracing - 
enable/disable with event level files
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e -n [13] event tracing - 
restricts events based on pid
  05/20 14:24:35 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:35 DEBUG| utils:0153| [stdout] -e -n [14] event tracing - 
enable/disable with subsystem level files
  05/20 14:24:35 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20

[Kernel-packages] [Bug 1830084] Re: ubuntu_kernel_tests ftrace fails

2019-07-16 Thread Sean Feole
On Google, GCP this appears to fail across all of our tested instances.

Looks like that the cause is from the following due to the following

07/16 06:52:00 DEBUG| utils:0153| [stdout] [16] Test trace_printk from module   
[UNRESOLVED]
07/16 06:52:05 DEBUG| utils:0153| [stdout] [21] ftrace - function trace with 
cpumask[UNRESOLVED]
07/16 06:52:08 DEBUG| utils:0153| [stdout] [23] ftrace - function trace on 
module   [UNRESOLVED]

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1830084

Title:
  ubuntu_kernel_tests ftrace fails

Status in ubuntu-kernel-tests:
  Confirmed
Status in linux-aws package in Ubuntu:
  New
Status in linux-azure package in Ubuntu:
  Confirmed
Status in linux-gcp package in Ubuntu:
  New
Status in linux-aws source package in Disco:
  New
Status in linux-azure source package in Disco:
  Confirmed
Status in linux-gcp source package in Disco:
  New

Bug description:
  Cloud: Azure
  Series: Disco
  Kernel: 5.0.0-1007.7  linux-azure
  Instance: Standard_D2_v3 and others. 

  05/20 14:24:27 DEBUG| utils:0116| Running 'sudo sh -c 'echo 1 > 
/proc/sys/net/ipv4/conf/all/accept_local''
  05/20 14:24:27 DEBUG| utils:0116| Running 'sudo make -C 
linux/tools/testing/selftests TARGETS=ftrace run_tests'
  05/20 14:24:27 DEBUG| utils:0153| [stdout] make: Entering directory 
'/home/azure/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests'
  05/20 14:24:27 DEBUG| utils:0153| [stdout] make[1]: Entering directory 
'/home/azure/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/ftrace'
  05/20 14:24:27 DEBUG| utils:0153| [stdout] make[1]: Nothing to be done 
for 'all'.
  05/20 14:24:27 DEBUG| utils:0153| [stdout] make[1]: Leaving directory 
'/home/azure/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/ftrace'
  05/20 14:24:27 DEBUG| utils:0153| [stdout] make[1]: Entering directory 
'/home/azure/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/ftrace'
  05/20 14:24:27 DEBUG| utils:0153| [stdout] TAP version 13
  05/20 14:24:27 DEBUG| utils:0153| [stdout] selftests: ftrace: ftracetest
  05/20 14:24:27 DEBUG| utils:0153| [stdout] 

  05/20 14:24:27 ERROR| utils:0153| [stderr] ./ftracetest: 163: [: Illegal 
number: 
  05/20 14:24:27 DEBUG| utils:0153| [stdout] -e === Ftrace unit tests ===
  05/20 14:24:27 DEBUG| utils:0153| [stdout] -e -n [1] Basic trace file 
check
  05/20 14:24:27 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:27 DEBUG| utils:0153| [stdout] -e -n [2] Basic test for 
tracers
  05/20 14:24:31 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:31 DEBUG| utils:0153| [stdout] -e -n [3] Basic trace clock 
test
  05/20 14:24:32 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:32 DEBUG| utils:0153| [stdout] -e -n [4] Basic event tracing 
check
  05/20 14:24:32 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:32 DEBUG| utils:0153| [stdout] -e -n [5] Change the 
ringbuffer size
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e -n [6] Snapshot and tracing 
setting
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e -n [7] trace_pipe and 
trace_marker
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e -n [8] Generic dynamic 
event - add/remove kprobe events
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e -n [9] Generic dynamic 
event - add/remove synthetic events
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e -n [10] Generic dynamic 
event - selective clear (compatibility)
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e -n [11] Generic dynamic 
event - generic clear event
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e -n [12] event tracing - 
enable/disable with event level files
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e -n [13] event tracing - 
restricts events based on pid
  05/20 14:24:35 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:35 DEBUG| utils:0153| [stdout] -e -n [14] event tracing - 
enable/disable with subsystem level files
  05/20 14:24:35 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:35 DEBUG| utils:0153| [stdout] -e -n [15] event tracing - 
enable/disable with top level files
  05/20 14:24:35 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 1

[Kernel-packages] [Bug 1821906] Re: debug in ubuntu_kvm_unit_test failed on 3.13 / 4.4

2019-07-16 Thread Po-Hsu Lin
Failure on Trusty:
 timeout -k 1s --foreground 90s /usr/bin/qemu-system-x86_64 -nodefaults -device 
pc-testdev -device isa-debug-exit,iobase=0xf4,iosize=0x4 -vnc none -serial 
stdio -device pci-testdev -machine accel=kvm -kernel /tmp/tmp.4VEzBBYPcp -smp 1 
# -initrd /tmp/tmp.Ef5R8Mt7p5
 enabling apic
 PASS: #BP
 FAIL: hw breakpoint (test that dr6.BS is not set) 
 FAIL: hw breakpoint (test that dr6.BS is not cleared)
 FAIL: single step
 FAIL: single step emulated instructions
 FAIL: hw watchpoint (test that dr6.BS is not cleared)
 FAIL: hw watchpoint (test that dr6.BS is not set) 
 PASS: icebp
 PASS: MOV SS + watchpoint + ICEBP
 PASS: MOV SS + watchpoint + int $1
 PASS: MOV SS + watchpoint + INT3
 SUMMARY: 11 tests, 6 unexpected failures
 FAIL debug (11 tests, 6 unexpected failures)


** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

** Changed in: linux (Ubuntu Xenial)
   Status: Incomplete => Confirmed

** Changed in: linux (Ubuntu Trusty)
   Status: Incomplete => Confirmed

** Tags added: 3.13 4.4 ubuntu-kvm-unit-tests

** Tags added: sru-20190701

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1821906

Title:
  debug in ubuntu_kvm_unit_test failed on 3.13 / 4.4

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Trusty:
  Confirmed
Status in linux source package in Xenial:
  Confirmed

Bug description:
  This test has failed on:
   * T-3.13:
  - FAIL debug (11 tests, 6 unexpected failures)
   * T-4.4 / X-4.4:
  - FAIL debug (11 tests, 1 unexpected failures)

  
root@gonzo:/home/ubuntu/autotest/client/tmp/ubuntu_kvm_unit_tests/src/kvm-unit-tests#
 TESTNAME=debug TIMEOUT=90s ACCEL= ./x86/run x86/debug.flat -smp 1
  timeout -k 1s --foreground 90s /usr/bin/qemu-system-x86_64 -nodefaults 
-device pc-testdev -device isa-debug-exit,iobase=0xf4,iosize=0x4 -vnc none 
-serial stdio -device pci-testdev -machine accel=kvm -kernel x86/debug.flat 
-smp 1 # -initrd /tmp/tmp.WOQmQkB7bo
  enabling apic
  PASS: #BP
  PASS: hw breakpoint (test that dr6.BS is not set)
  PASS: hw breakpoint (test that dr6.BS is not cleared)
  PASS: single step
  FAIL: single step emulated instructions
  PASS: hw watchpoint (test that dr6.BS is not cleared)
  PASS: hw watchpoint (test that dr6.BS is not set)
  PASS: icebp
  PASS: MOV SS + watchpoint + ICEBP
  PASS: MOV SS + watchpoint + int $1
  PASS: MOV SS + watchpoint + INT3
  SUMMARY: 11 tests, 1 unexpected failures

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-4.4.0-143-generic 4.4.0-143.169~14.04.2
  ProcVersionSignature: User Name 4.4.0-143.169~14.04.2-generic 4.4.170
  Uname: Linux 4.4.0-143-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.29
  Architecture: amd64
  Date: Wed Mar 27 11:15:05 2019
  SourcePackage: linux-signed-lts-xenial
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1821906/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836809] Re: segfault when CCD are present in two different HOG services

2019-07-16 Thread Daniel van Vugt
Thanks for the bug report.

Please tell us what version of Ubuntu you are using. Then please report
the problem to the BlueZ developers at:

  https://bugzilla.kernel.org (Product: Drivers, Component: Bluetooth)

and then tell us the new bug ID.

** Changed in: bluez (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1836809

Title:
  segfault when CCD are present in two different HOG services

Status in bluez package in Ubuntu:
  Incomplete

Bug description:
  Hello everyone,

  We are currently developing a device that contains two HID services.
  That device, as it is right now, is properly functioning on Windows & Android.
  However, when pairing the device on Linux running bluez 5.50 we do get 
segfaults (see attached files).
  Our bluetooth device has 4 services : 1 battery service, 2 HID Over Gatt 
services and 1 device information service.
  With trial and error, we managed to find that we wouldn't get any crash as 
long as only 1 HOG service was present.

  Here's the interesting part. The two HOG services are made as follows:
  - standard keyboard over gatt: protocole mode / report map / 1 INPUT report / 
boot INPUT + OUTPUT / HID information / HID Control point
  - raw HID over gatt : report map / 1 INPUT report / 1 OUTPUT report / HID 
information / HID control point

  Looking at the write_ccc in the call stacks we wondered if the
  callbacks subscribing to notifications for the INPUT reports were
  causing this issue.

  We therefore changed the raw HID over gatt (and its report map) to
  remove the INPUT report and change it into 1 OUTPUT report (leading to
  2 OUTPUT reports): no crash.

  We therefore hypothesize that the segfault occurs when subscribing to
  notification on a second HOG service...

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1836809/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836467] Re: Bluetooth fails with "Bluetooth: hci0: request failed to create LE connection: status 0x0c" message with Kernel 4.20 and up

2019-07-16 Thread Warren Baird
** Attachment added: "dmesg output after reverting to rel0450 of 
ibt-17-16-1.sfi"
   
https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/1836467/+attachment/5277544/+files/dmesg3.out

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1836467

Title:
  Bluetooth fails with "Bluetooth: hci0: request failed to create LE
  connection: status 0x0c" message with Kernel 4.20 and up

Status in linux-firmware package in Ubuntu:
  Incomplete

Bug description:
  This is similar to https://bugs.launchpad.net/bugs/1829737 - however
  the issue was not fixed by linux-firmware 1.173.8 so I was advised to
  log a new bug.

  I have an ASUS ZenBook 14 - UX433FA - which based on this - 
https://www.notebookcheck.net/ASUS-ZenBook-14-UX433FA-Core-i5-8265U-SSD-FHD-Laptop-Review.403541.0.html
 - I believe has an Intel 9560 chipset (I am not sure how to independently 
verify this).
  With kernels older than 4.20 I can successfully pair my bluetooth mouse 
(Logitech MX Master) - but with newer kernels I get "Bluetooth: hci0: request 
failed to create LE connection: status 0x0c" messages.

  I'm running Linux Mint 19.1

  I tried installing linux-firmware 1.173.8, and it didn't seem to help
  - I also downloaded 1.173.9 proposed from here:
  https://launchpad.net/ubuntu/bionic/amd64/linux-firmware/1.173.9 and
  that also didn't seem to help.

  Both after a cold reboot and a warm reboot I see
  [ 14.724438] Bluetooth: hci0: Firmware revision 0.1 build 201 week 49 2017

  in my dmesg output.

  Bluetooth works just fine with earlier kernels (however other aspects
  of the laptop like suspend don't work as well, which is why I'm trying
  the newer kernel.

  Linux warren-ZenBook 5.1.16-050116-generic #201907031232 SMP Wed Jul 3
  12:35:21 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux

  dmesg | egrep -i 'blue|firm'
  [
  [0.180273] Spectre V2 : Enabling Restricted Speculation for firmware calls
  [0.004526] [Firmware Bug]: TSC ADJUST differs within socket(s), fixing 
all errors
  [1.417663] [drm] Finished loading DMC firmware i915/kbl_dmc_ver1_04.bin 
(v1.4)
  [   14.641146] iwlwifi :00:14.3: Direct firmware load for 
iwlwifi-9000-pu-b0-jf-b0-46.ucode failed with error -2
  [   14.642377] iwlwifi :00:14.3: Direct firmware load for 
iwlwifi-9000-pu-b0-jf-b0-45.ucode failed with error -2
  [   14.642392] iwlwifi :00:14.3: Direct firmware load for 
iwlwifi-9000-pu-b0-jf-b0-44.ucode failed with error -2
  [   14.652301] iwlwifi :00:14.3: loaded firmware version 43.95eb4e97.0 
op_mode iwlmvm
  [   14.675356] Bluetooth: Core ver 2.22
  [   14.675374] Bluetooth: HCI device and connection manager initialized
  [   14.675377] Bluetooth: HCI socket layer initialized
  [   14.675379] Bluetooth: L2CAP socket layer initialized
  [   14.675382] Bluetooth: SCO socket layer initialized
  [   14.724438] Bluetooth: hci0: Firmware revision 0.1 build 201 week 49 2017
  [   15.207800] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
  [   15.207801] Bluetooth: BNEP filters: protocol multicast
  [   15.207804] Bluetooth: BNEP socket layer initialized
  [   22.040223] Bluetooth: HIDP (Human Interface Emulation) ver 1.2
  [   22.040232] Bluetooth: HIDP socket layer initialized
  [   22.042238] input: Logitech K810 Keyboard as 
/devices/pci:00/:00:14.0/usb1/1-10/1-10:1.0/bluetooth/hci0/hci0:256/0005:046D:B319.0004/input/input27
  [   22.042996] input: Logitech K810 Consumer Control as 
/devices/pci:00/:00:14.0/usb1/1-10/1-10:1.0/bluetooth/hci0/hci0:256/0005:046D:B319.0004/input/input28
  [   22.043235] input: Logitech K810 System Control as 
/devices/pci:00/:00:14.0/usb1/1-10/1-10:1.0/bluetooth/hci0/hci0:256/0005:046D:B319.0004/input/input29
  [   22.043426] hid-generic 0005:046D:B319.0004: input,hidraw3: BLUETOOTH HID 
v12.02 Keyboard [Logitech K810] on 00:bb:60:09:27:1a
  [   29.296700] Bluetooth: RFCOMM TTY layer initialized
  [   29.296705] Bluetooth: RFCOMM socket layer initialized
  [   29.296711] Bluetooth: RFCOMM ver 1.11
  [  217.675736] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c
  [  217.709807] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c
  [  218.537827] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c
  [  218.767709] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c
  [  220.244821] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c

  If there are any other debugging things to try, or info you need, let
  me know...

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/1836467/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836467] Re: Bluetooth fails with "Bluetooth: hci0: request failed to create LE connection: status 0x0c" message with Kernel 4.20 and up

2019-07-16 Thread Warren Baird
OK - after installing the rel0450 version, shutting down for 5 minutes and 
rebooting, Bluetooth is still working for me.  Here's the new md5sum
b24eceb411cf63695aac8e0b6d9f1743  /lib/firmware/intel/ibt-17-16-1.sfi

I'll upload the latest output of dmesg | egrep -i "blue|firm", in case
that helps.

is there a downside to leaving the firmware content that I got off the
git site in my /lib/firmware folder for now, or should I reset it?

Thanks for your help!!!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1836467

Title:
  Bluetooth fails with "Bluetooth: hci0: request failed to create LE
  connection: status 0x0c" message with Kernel 4.20 and up

Status in linux-firmware package in Ubuntu:
  Incomplete

Bug description:
  This is similar to https://bugs.launchpad.net/bugs/1829737 - however
  the issue was not fixed by linux-firmware 1.173.8 so I was advised to
  log a new bug.

  I have an ASUS ZenBook 14 - UX433FA - which based on this - 
https://www.notebookcheck.net/ASUS-ZenBook-14-UX433FA-Core-i5-8265U-SSD-FHD-Laptop-Review.403541.0.html
 - I believe has an Intel 9560 chipset (I am not sure how to independently 
verify this).
  With kernels older than 4.20 I can successfully pair my bluetooth mouse 
(Logitech MX Master) - but with newer kernels I get "Bluetooth: hci0: request 
failed to create LE connection: status 0x0c" messages.

  I'm running Linux Mint 19.1

  I tried installing linux-firmware 1.173.8, and it didn't seem to help
  - I also downloaded 1.173.9 proposed from here:
  https://launchpad.net/ubuntu/bionic/amd64/linux-firmware/1.173.9 and
  that also didn't seem to help.

  Both after a cold reboot and a warm reboot I see
  [ 14.724438] Bluetooth: hci0: Firmware revision 0.1 build 201 week 49 2017

  in my dmesg output.

  Bluetooth works just fine with earlier kernels (however other aspects
  of the laptop like suspend don't work as well, which is why I'm trying
  the newer kernel.

  Linux warren-ZenBook 5.1.16-050116-generic #201907031232 SMP Wed Jul 3
  12:35:21 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux

  dmesg | egrep -i 'blue|firm'
  [
  [0.180273] Spectre V2 : Enabling Restricted Speculation for firmware calls
  [0.004526] [Firmware Bug]: TSC ADJUST differs within socket(s), fixing 
all errors
  [1.417663] [drm] Finished loading DMC firmware i915/kbl_dmc_ver1_04.bin 
(v1.4)
  [   14.641146] iwlwifi :00:14.3: Direct firmware load for 
iwlwifi-9000-pu-b0-jf-b0-46.ucode failed with error -2
  [   14.642377] iwlwifi :00:14.3: Direct firmware load for 
iwlwifi-9000-pu-b0-jf-b0-45.ucode failed with error -2
  [   14.642392] iwlwifi :00:14.3: Direct firmware load for 
iwlwifi-9000-pu-b0-jf-b0-44.ucode failed with error -2
  [   14.652301] iwlwifi :00:14.3: loaded firmware version 43.95eb4e97.0 
op_mode iwlmvm
  [   14.675356] Bluetooth: Core ver 2.22
  [   14.675374] Bluetooth: HCI device and connection manager initialized
  [   14.675377] Bluetooth: HCI socket layer initialized
  [   14.675379] Bluetooth: L2CAP socket layer initialized
  [   14.675382] Bluetooth: SCO socket layer initialized
  [   14.724438] Bluetooth: hci0: Firmware revision 0.1 build 201 week 49 2017
  [   15.207800] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
  [   15.207801] Bluetooth: BNEP filters: protocol multicast
  [   15.207804] Bluetooth: BNEP socket layer initialized
  [   22.040223] Bluetooth: HIDP (Human Interface Emulation) ver 1.2
  [   22.040232] Bluetooth: HIDP socket layer initialized
  [   22.042238] input: Logitech K810 Keyboard as 
/devices/pci:00/:00:14.0/usb1/1-10/1-10:1.0/bluetooth/hci0/hci0:256/0005:046D:B319.0004/input/input27
  [   22.042996] input: Logitech K810 Consumer Control as 
/devices/pci:00/:00:14.0/usb1/1-10/1-10:1.0/bluetooth/hci0/hci0:256/0005:046D:B319.0004/input/input28
  [   22.043235] input: Logitech K810 System Control as 
/devices/pci:00/:00:14.0/usb1/1-10/1-10:1.0/bluetooth/hci0/hci0:256/0005:046D:B319.0004/input/input29
  [   22.043426] hid-generic 0005:046D:B319.0004: input,hidraw3: BLUETOOTH HID 
v12.02 Keyboard [Logitech K810] on 00:bb:60:09:27:1a
  [   29.296700] Bluetooth: RFCOMM TTY layer initialized
  [   29.296705] Bluetooth: RFCOMM socket layer initialized
  [   29.296711] Bluetooth: RFCOMM ver 1.11
  [  217.675736] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c
  [  217.709807] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c
  [  218.537827] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c
  [  218.767709] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c
  [  220.244821] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c

  If there are any other debugging things to try, or info you need, let
  me know...

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/

[Kernel-packages] [Bug 1836467] Re: Bluetooth fails with "Bluetooth: hci0: request failed to create LE connection: status 0x0c" message with Kernel 4.20 and up

2019-07-16 Thread Warren Baird
The md5sum of what is current installed and working is:
5740378bfc048108341a204b83ca97c7  /lib/firmware/intel/ibt-17-16-1.sfi

Which is the same md5sum as the rel0472 version you link to above, so
yes, that does seem to be working.

I've downloaded the rel0450 version now, I'll install it, and leave my
computer off for at least 5 minutes this time, and see what happens...

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1836467

Title:
  Bluetooth fails with "Bluetooth: hci0: request failed to create LE
  connection: status 0x0c" message with Kernel 4.20 and up

Status in linux-firmware package in Ubuntu:
  Incomplete

Bug description:
  This is similar to https://bugs.launchpad.net/bugs/1829737 - however
  the issue was not fixed by linux-firmware 1.173.8 so I was advised to
  log a new bug.

  I have an ASUS ZenBook 14 - UX433FA - which based on this - 
https://www.notebookcheck.net/ASUS-ZenBook-14-UX433FA-Core-i5-8265U-SSD-FHD-Laptop-Review.403541.0.html
 - I believe has an Intel 9560 chipset (I am not sure how to independently 
verify this).
  With kernels older than 4.20 I can successfully pair my bluetooth mouse 
(Logitech MX Master) - but with newer kernels I get "Bluetooth: hci0: request 
failed to create LE connection: status 0x0c" messages.

  I'm running Linux Mint 19.1

  I tried installing linux-firmware 1.173.8, and it didn't seem to help
  - I also downloaded 1.173.9 proposed from here:
  https://launchpad.net/ubuntu/bionic/amd64/linux-firmware/1.173.9 and
  that also didn't seem to help.

  Both after a cold reboot and a warm reboot I see
  [ 14.724438] Bluetooth: hci0: Firmware revision 0.1 build 201 week 49 2017

  in my dmesg output.

  Bluetooth works just fine with earlier kernels (however other aspects
  of the laptop like suspend don't work as well, which is why I'm trying
  the newer kernel.

  Linux warren-ZenBook 5.1.16-050116-generic #201907031232 SMP Wed Jul 3
  12:35:21 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux

  dmesg | egrep -i 'blue|firm'
  [
  [0.180273] Spectre V2 : Enabling Restricted Speculation for firmware calls
  [0.004526] [Firmware Bug]: TSC ADJUST differs within socket(s), fixing 
all errors
  [1.417663] [drm] Finished loading DMC firmware i915/kbl_dmc_ver1_04.bin 
(v1.4)
  [   14.641146] iwlwifi :00:14.3: Direct firmware load for 
iwlwifi-9000-pu-b0-jf-b0-46.ucode failed with error -2
  [   14.642377] iwlwifi :00:14.3: Direct firmware load for 
iwlwifi-9000-pu-b0-jf-b0-45.ucode failed with error -2
  [   14.642392] iwlwifi :00:14.3: Direct firmware load for 
iwlwifi-9000-pu-b0-jf-b0-44.ucode failed with error -2
  [   14.652301] iwlwifi :00:14.3: loaded firmware version 43.95eb4e97.0 
op_mode iwlmvm
  [   14.675356] Bluetooth: Core ver 2.22
  [   14.675374] Bluetooth: HCI device and connection manager initialized
  [   14.675377] Bluetooth: HCI socket layer initialized
  [   14.675379] Bluetooth: L2CAP socket layer initialized
  [   14.675382] Bluetooth: SCO socket layer initialized
  [   14.724438] Bluetooth: hci0: Firmware revision 0.1 build 201 week 49 2017
  [   15.207800] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
  [   15.207801] Bluetooth: BNEP filters: protocol multicast
  [   15.207804] Bluetooth: BNEP socket layer initialized
  [   22.040223] Bluetooth: HIDP (Human Interface Emulation) ver 1.2
  [   22.040232] Bluetooth: HIDP socket layer initialized
  [   22.042238] input: Logitech K810 Keyboard as 
/devices/pci:00/:00:14.0/usb1/1-10/1-10:1.0/bluetooth/hci0/hci0:256/0005:046D:B319.0004/input/input27
  [   22.042996] input: Logitech K810 Consumer Control as 
/devices/pci:00/:00:14.0/usb1/1-10/1-10:1.0/bluetooth/hci0/hci0:256/0005:046D:B319.0004/input/input28
  [   22.043235] input: Logitech K810 System Control as 
/devices/pci:00/:00:14.0/usb1/1-10/1-10:1.0/bluetooth/hci0/hci0:256/0005:046D:B319.0004/input/input29
  [   22.043426] hid-generic 0005:046D:B319.0004: input,hidraw3: BLUETOOTH HID 
v12.02 Keyboard [Logitech K810] on 00:bb:60:09:27:1a
  [   29.296700] Bluetooth: RFCOMM TTY layer initialized
  [   29.296705] Bluetooth: RFCOMM socket layer initialized
  [   29.296711] Bluetooth: RFCOMM ver 1.11
  [  217.675736] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c
  [  217.709807] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c
  [  218.537827] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c
  [  218.767709] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c
  [  220.244821] Bluetooth: hci0: request failed to create LE connection: 
status 0x0c

  If there are any other debugging things to try, or info you need, let
  me know...

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/1836467/+subscriptions

-- 
Mailing list: https://launchpad.net/~ker

[Kernel-packages] [Bug 1685794] Re: Boot delayed for about 90 seconds until 'random: crng init done'

2019-07-16 Thread Daniel van Vugt
** Also affects: plymouth (Debian) via
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=897572
   Importance: Unknown
   Status: Unknown

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1685794

Title:
  Boot delayed for about 90 seconds until 'random: crng init done'

Status in linux package in Ubuntu:
  Confirmed
Status in broadcom-sta package in Debian:
  New
Status in plymouth package in Debian:
  Unknown

Bug description:

  Shortened dmesg output, notice the unnaturally long delay before crng
  init finishes:

  [8.533630] Bluetooth: hci0: Intel Bluetooth firmware patch completed and 
activated
  [8.542239] input: HDA Intel PCH Mic as 
/devices/pci:00/:00:1b.0/sound/card1/input18
  [8.542313] input: HDA Intel PCH Line as 
/devices/pci:00/:00:1b.0/sound/card1/input19
  [8.542382] input: HDA Intel PCH Dock Line Out as 
/devices/pci:00/:00:1b.0/sound/card1/input20
  [8.542449] input: HDA Intel PCH Headphone as 
/devices/pci:00/:00:1b.0/sound/card1/input21
  [8.544240] cdc_ether 2-6:2.0 usb0: register 'cdc_ether' at 
usb-:00:14.0-6, CDC Ethernet Device, 02:1e:10:1f:00:00
  [8.544271] usbcore: registered new interface driver cdc_ether
  [8.637660] ieee80211 phy0: Selected rate control algorithm 'iwl-mvm-rs'
  [8.654022] input: HP WMI hotkeys as /devices/virtual/input/input22
  [8.688226] cdc_ether 2-6:2.0 enp0s20u6c2: renamed from usb0
  [8.713288] iwlwifi :02:00.0 wlo1: renamed from wlan0
  [9.804308] input: ST LIS3LV02DL Accelerometer as 
/devices/platform/lis3lv02d/input/input23
  [   98.327857] random: crng init done
  [   98.330072] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
  [   98.330073] Bluetooth: BNEP filters: protocol multicast
  [   98.330077] Bluetooth: BNEP socket layer initialized
  [   98.443281] kauditd_printk_skb: 90 callbacks suppressed
  [   98.492927] IPv6: ADDRCONF(NETDEV_UP): enp0s25: link is not ready
  [   98.681030] IPv6: ADDRCONF(NETDEV_UP): enp0s25: link is not ready
  [   98.685672] IPv6: ADDRCONF(NETDEV_UP): enp0s20u6c2: link is not ready
  [   98.685789] cdc_ether 2-6:2.0 enp0s20u6c2: kevent 12 may have been dropped
  [   98.688384] IPv6: ADDRCONF(NETDEV_UP): wlo1: link is not ready
  [   98.690915] iwlwifi :02:00.0: L1 Enabled - LTR Enabled

  ProblemType: Bug
  DistroRelease: Ubuntu 17.04
  Package: linux-image-4.10.0-19-generic 4.10.0-19.21 [modified: 
boot/vmlinuz-4.10.0-19-generic]
  ProcVersionSignature: Ubuntu 4.10.0-19.21-generic 4.10.8
  Uname: Linux 4.10.0-19-generic x86_64
  ApportVersion: 2.20.4-0ubuntu4
  Architecture: amd64
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/by-path', 
'/dev/snd/hwC1D0', '/dev/snd/pcmC1D0c', '/dev/snd/pcmC1D0p', 
'/dev/snd/controlC1', '/dev/snd/hwC0D0', '/dev/snd/pcmC0D8p', 
'/dev/snd/pcmC0D7p', '/dev/snd/pcmC0D3p', '/dev/snd/controlC0', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CurrentDesktop: Unity:Unity7
  Date: Mon Apr 24 14:58:33 2017
  EcryptfsInUse: Yes
  InstallationDate: Installed on 2017-04-18 (5 days ago)
  InstallationMedia: Ubuntu 17.04 "Zesty Zapus" - Release amd64 (20170412)
  MachineType: Hewlett-Packard HP EliteBook 840 G1
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.10.0-19-generic.efi.signed 
root=UUID=9fb9fc1d-15a4-4e98-a2ae-bf572e0900d5 ro quiet splash vt.handoff=7
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-4.10.0-19-generic N/A
   linux-backports-modules-4.10.0-19-generic  N/A
   linux-firmware 1.164
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 05/23/2016
  dmi.bios.vendor: Hewlett-Packard
  dmi.bios.version: L71 Ver. 01.37
  dmi.board.name: 198F
  dmi.board.vendor: Hewlett-Packard
  dmi.board.version: KBC Version 15.59
  dmi.chassis.asset.tag: USH452L0B1
  dmi.chassis.type: 10
  dmi.chassis.vendor: Hewlett-Packard
  dmi.modalias: 
dmi:bvnHewlett-Packard:bvrL71Ver.01.37:bd05/23/2016:svnHewlett-Packard:pnHPEliteBook840G1:pvrA3009DD10203:rvnHewlett-Packard:rn198F:rvrKBCVersion15.59:cvnHewlett-Packard:ct10:cvr:
  dmi.product.name: HP EliteBook 840 G1
  dmi.product.version: A3009DD10203
  dmi.sys.vendor: Hewlett-Packard

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1685794/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1835879] Re: Intel Wireless-AC 9462/9560 not supported on ICL

2019-07-16 Thread You-Sheng Yang
** Changed in: linux-firmware (Ubuntu)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1835879

Title:
  Intel Wireless-AC 9462/9560 not supported on ICL

Status in HWE Next:
  New
Status in linux-firmware package in Ubuntu:
  Fix Committed
Status in linux-oem-osp1 package in Ubuntu:
  Fix Committed
Status in linux-firmware source package in Bionic:
  Fix Committed
Status in linux-oem-osp1 source package in Bionic:
  Fix Committed
Status in linux-firmware source package in Cosmic:
  Won't Fix
Status in linux-oem-osp1 source package in Cosmic:
  Won't Fix
Status in linux-firmware source package in Disco:
  Fix Committed
Status in linux-oem-osp1 source package in Disco:
  Won't Fix

Bug description:
  [Impact]
  Intel Wireless-AC 9560/9462 is not correctly enabled on IceLake
  platforms.

  [Fix]
  Two changes from Intel maintained backport-iwlwifi repository are
  necessary to add device ID/configs to iwlwifi driver.

  [Test]
  Verified on hardware 9462/9560 on IceLake/CometLake platforms.

  [Regression Potential]
  Low. These changes are part of the series to enable 9462/9560 on
  CometLake/IceLake platforms that don't have the support originally.

  = Original Bug Description =

  Intel Wireless-AC 9462/9560 on CML was previously enabled via bug
  1833065, bug 1834415 and bug 1834464. However on ICL, it fails to
  startup with following error messages with kernel v5.2-rc7:

    iwlwifi :00:14.3: loaded firmware version 48.13675109.0 op_mode iwlmvm
    iwlwifi :00:14.3: Detected Intel(R) Wireless-AC 9560, REV=0x338
    iwlwifi :00:14.3: Loaded firmware version: 48.13675109.0
    iwlwifi :00:14.3: SecBoot CPU1 Status: 0x5c97, CPU2 Status: 0x3
    iwlwifi :00:14.3: Failed to start RT ucode: -5
    iwlwifi :00:14.3: Collecting data: trigger 16 fired.
    iwlwifi :00:14.3: Firmware not running - cannot dump error
    iwlwifi :00:14.3: Failed to run INIT ucode: -5

  Also tried backport-iwlwifi out-of-tree driver revision 7858 (HEAD at
  the moment) with no luck.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1835879/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1830084] Re: ubuntu_kernel_tests ftrace fails

2019-07-16 Thread Sean Feole
** Summary changed:

- ubuntu_kernel_tests ftrace fails on disco, linux-azure
+ ubuntu_kernel_tests ftrace fails

** Also affects: linux-aws (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1830084

Title:
  ubuntu_kernel_tests ftrace fails

Status in ubuntu-kernel-tests:
  Confirmed
Status in linux-aws package in Ubuntu:
  New
Status in linux-azure package in Ubuntu:
  Confirmed
Status in linux-aws source package in Disco:
  New
Status in linux-azure source package in Disco:
  Confirmed

Bug description:
  Cloud: Azure
  Series: Disco
  Kernel: 5.0.0-1007.7  linux-azure
  Instance: Standard_D2_v3 and others. 

  05/20 14:24:27 DEBUG| utils:0116| Running 'sudo sh -c 'echo 1 > 
/proc/sys/net/ipv4/conf/all/accept_local''
  05/20 14:24:27 DEBUG| utils:0116| Running 'sudo make -C 
linux/tools/testing/selftests TARGETS=ftrace run_tests'
  05/20 14:24:27 DEBUG| utils:0153| [stdout] make: Entering directory 
'/home/azure/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests'
  05/20 14:24:27 DEBUG| utils:0153| [stdout] make[1]: Entering directory 
'/home/azure/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/ftrace'
  05/20 14:24:27 DEBUG| utils:0153| [stdout] make[1]: Nothing to be done 
for 'all'.
  05/20 14:24:27 DEBUG| utils:0153| [stdout] make[1]: Leaving directory 
'/home/azure/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/ftrace'
  05/20 14:24:27 DEBUG| utils:0153| [stdout] make[1]: Entering directory 
'/home/azure/autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/ftrace'
  05/20 14:24:27 DEBUG| utils:0153| [stdout] TAP version 13
  05/20 14:24:27 DEBUG| utils:0153| [stdout] selftests: ftrace: ftracetest
  05/20 14:24:27 DEBUG| utils:0153| [stdout] 

  05/20 14:24:27 ERROR| utils:0153| [stderr] ./ftracetest: 163: [: Illegal 
number: 
  05/20 14:24:27 DEBUG| utils:0153| [stdout] -e === Ftrace unit tests ===
  05/20 14:24:27 DEBUG| utils:0153| [stdout] -e -n [1] Basic trace file 
check
  05/20 14:24:27 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:27 DEBUG| utils:0153| [stdout] -e -n [2] Basic test for 
tracers
  05/20 14:24:31 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:31 DEBUG| utils:0153| [stdout] -e -n [3] Basic trace clock 
test
  05/20 14:24:32 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:32 DEBUG| utils:0153| [stdout] -e -n [4] Basic event tracing 
check
  05/20 14:24:32 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:32 DEBUG| utils:0153| [stdout] -e -n [5] Change the 
ringbuffer size
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e -n [6] Snapshot and tracing 
setting
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e -n [7] trace_pipe and 
trace_marker
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e -n [8] Generic dynamic 
event - add/remove kprobe events
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e -n [9] Generic dynamic 
event - add/remove synthetic events
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:33 DEBUG| utils:0153| [stdout] -e -n [10] Generic dynamic 
event - selective clear (compatibility)
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e -n [11] Generic dynamic 
event - generic clear event
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e -n [12] event tracing - 
enable/disable with event level files
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:34 DEBUG| utils:0153| [stdout] -e -n [13] event tracing - 
restricts events based on pid
  05/20 14:24:35 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:35 DEBUG| utils:0153| [stdout] -e -n [14] event tracing - 
enable/disable with subsystem level files
  05/20 14:24:35 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:35 DEBUG| utils:0153| [stdout] -e -n [15] event tracing - 
enable/disable with top level files
  05/20 14:24:35 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:35 DEBUG| utils:0153| [stdout] -e -n [16] Test trace_printk 
from module
  05/20 14:24:36 DEBUG| utils:0153| [stdout] -e [UNRESOLVED]
  05/20 14:24:36 DEBUG| utils:0153| [stdout] -e -n [17] ftrace - function 
graph filters with stack tracer
  05/20 14:24:38 DEBUG| utils:0153| [stdout] -e [PASS]
  05/20 14:24:38 D

[Kernel-packages] [Bug 1834930] Re: linux-aws: 4.15.0-1044.46 -proposed tracker

2019-07-16 Thread Sean Feole
** Tags added: regression-testing-passed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1834930

Title:
  linux-aws: 4.15.0-1044.46 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Confirmed
Status in linux-aws package in Ubuntu:
  Invalid
Status in linux-aws source package in Bionic:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  backports: bug 1834929 (xenial/linux-aws-hwe)
  derivatives: bug 1834927 (aws-kernel)

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1834954
  phase: Ready for Testing
  phase-changed: Thursday, 11. July 2019 00:11 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
verification-testing: Ongoing -- testing in progress
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1834930/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1834930] Re: linux-aws: 4.15.0-1044.46 -proposed tracker

2019-07-16 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  backports: bug 1834929 (xenial/linux-aws-hwe)
  derivatives: bug 1834927 (aws-kernel)
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1834954
  phase: Ready for Testing
  phase-changed: Thursday, 11. July 2019 00:11 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
-   regression-testing: Ongoing -- testing in progress
verification-testing: Ongoing -- testing in progress
  variant: debs

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1834930

Title:
  linux-aws: 4.15.0-1044.46 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Confirmed
Status in linux-aws package in Ubuntu:
  Invalid
Status in linux-aws source package in Bionic:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  backports: bug 1834929 (xenial/linux-aws-hwe)
  derivatives: bug 1834927 (aws-kernel)

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1834954
  phase: Ready for Testing
  phase-changed: Thursday, 11. July 2019 00:11 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
verification-testing: Ongoing -- testing in progress
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1834930/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1834886] Re: linux-aws: 5.0.0-1011.12 -proposed tracker

2019-07-16 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  backports: bug 1835782 (bionic/linux-aws-edge)
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1834902
  phase: Ready for Testing
  phase-changed: Monday, 15. July 2019 12:35 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
-   regression-testing: Ongoing -- testing in progress
verification-testing: Ongoing -- testing in progress
  variant: debs

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1834886

Title:
  linux-aws: 5.0.0-1011.12 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Confirmed
Status in linux-aws package in Ubuntu:
  Invalid
Status in linux-aws source package in Disco:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  backports: bug 1835782 (bionic/linux-aws-edge)

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1834902
  phase: Ready for Testing
  phase-changed: Monday, 15. July 2019 12:35 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
verification-testing: Ongoing -- testing in progress
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1834886/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1834886] Re: linux-aws: 5.0.0-1011.12 -proposed tracker

2019-07-16 Thread Sean Feole
** Tags added: regression-testing-passed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1834886

Title:
  linux-aws: 5.0.0-1011.12 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Confirmed
Status in linux-aws package in Ubuntu:
  Invalid
Status in linux-aws source package in Disco:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  backports: bug 1835782 (bionic/linux-aws-edge)

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1834902
  phase: Ready for Testing
  phase-changed: Monday, 15. July 2019 12:35 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
verification-testing: Ongoing -- testing in progress
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1834886/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1828948] Re: OBSOLETE_BY in DKMS.CONF does not work

2019-07-16 Thread Mathew Hodson
** Changed in: dkms (Ubuntu Disco)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to dkms in Ubuntu.
https://bugs.launchpad.net/bugs/1828948

Title:
  OBSOLETE_BY in DKMS.CONF does not work

Status in DKMS:
  Fix Released
Status in OEM Priority Project:
  Fix Committed
Status in dkms package in Ubuntu:
  Fix Released
Status in dkms source package in Bionic:
  Fix Committed
Status in dkms source package in Disco:
  Fix Committed

Bug description:
  [Impact]
  OBSOLETE_BY in DKMS.CONF not work
  Which also be reported on upstream:
  https://github.com/dell/dkms/issues/81

  [Test case]
  1. add OBSOLETE_BY in DKMS.CONF
  e.g. OBSOLETE_BY="4.15.0-1033"
  2. the kernel module should not be built with kernel greater than the version 
specified by OBSOLETE_BY
  e.g.
   - user install kernel 4.15.0-1030 and 4.15.0-10360
   - user install kernel oem-wifi-qualcomm-ath10k-lp1803647-4.15-dkms [1] which 
has OBSOLETE_BY="4.15.0-1033"
   - the kernel module from dkms [1] should only built for 4.15.0-1030, but not 
for 4.15.0-10360

  [Regression potential]
  None as it used to work, but somehow regression there.

  [1] https://code.launchpad.net/~alextu/+recipe/oem-wifi-qualcomm-
  ath10k-lp1803647-4.15-dkms-daily

To manage notifications about this bug go to:
https://bugs.launchpad.net/dkms/+bug/1828948/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836211] Re: bcmwl fails to install with recent Eoan (Bad return status for module build on kernel: 5.0.0-20-generic)

2019-07-16 Thread Alexander Browne
I went to try again and get the log ... and with today's build it is
working. Let me try on the other machine that I was seeing this with and
then I will close the bug.

(The one thing I noticed is that I needed to restart the computer before
it worked, while I could swear it used to work as soon as the driver was
installed, and so also in a live session. But I have no proof, and maybe
it was a different proprietary wi-fi driver I'm thinking of.)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bcmwl in Ubuntu.
https://bugs.launchpad.net/bugs/1836211

Title:
  bcmwl fails to install with recent Eoan (Bad return status for module
  build on kernel: 5.0.0-20-generic)

Status in bcmwl package in Ubuntu:
  Incomplete

Bug description:
  With recent Eoan builds, bcmwl fails to install completely, . It had
  worked when I installed Eoan a couple weeks ago, but not when I first
  tried to clean install on 9 July until today. (I've unfortunately
  erased the old, working installation so I don't have more details.)

  
  $ sudo apt install bcmwl-kernel-source 
  Reading package lists... Done
  Building dependency tree   
  Reading state information... Done
  The following additional packages will be installed:
dkms
  Suggested packages:
menu
  The following NEW packages will be installed:
bcmwl-kernel-source dkms
  0 upgraded, 2 newly installed, 0 to remove and 0 not upgraded.
  Need to get 1,610 kB of archives.
  After this operation, 8,359 kB of additional disk space will be used.
  Do you want to continue? [Y/n] 
  Get:1 http://us.archive.ubuntu.com/ubuntu eoan/main amd64 dkms all 
2.7.1-1ubuntu1 [66.5 kB]
  Get:2 http://us.archive.ubuntu.com/ubuntu eoan/restricted amd64 
bcmwl-kernel-source amd64 6.30.223.271+bdcom-0ubuntu5 [1,544 kB]
  Fetched 1,610 kB in 0s (4,097 kB/s)
  Selecting previously unselected package dkms.
  (Reading database ... 122315 files and directories currently installed.)
  Preparing to unpack .../dkms_2.7.1-1ubuntu1_all.deb ...
  Unpacking dkms (2.7.1-1ubuntu1) ...
  Selecting previously unselected package bcmwl-kernel-source.
  Preparing to unpack 
.../bcmwl-kernel-source_6.30.223.271+bdcom-0ubuntu5_amd64.deb ...
  Unpacking bcmwl-kernel-source (6.30.223.271+bdcom-0ubuntu5) ...
  Setting up dkms (2.7.1-1ubuntu1) ...
  Setting up bcmwl-kernel-source (6.30.223.271+bdcom-0ubuntu5) ...
  Loading new bcmwl-6.30.223.271+bdcom DKMS files...
  Building for 5.0.0-20-generic
  Building for architecture x86_64
  Building initial module for 5.0.0-20-generic
  Error! Bad return status for module build on kernel: 5.0.0-20-generic (x86_64)
  Consult /var/lib/dkms/bcmwl/6.30.223.271+bdcom/build/make.log for more 
information.
  dpkg: error processing package bcmwl-kernel-source (--configure):
   installed bcmwl-kernel-source package post-installation script subprocess 
returned error exit status 10
  Processing triggers for man-db (2.8.5-2) ...
  Errors were encountered while processing:
   bcmwl-kernel-source
  E: Sub-process /usr/bin/dpkg returned an error code (1)

  ProblemType: Bug
  DistroRelease: Ubuntu 19.10
  Package: bcmwl-kernel-source 6.30.223.271+bdcom-0ubuntu5
  ProcVersionSignature: Ubuntu 5.0.0-20.21-generic 5.0.8
  Uname: Linux 5.0.0-20-generic x86_64
  ApportVersion: 2.20.11-0ubuntu3
  Architecture: amd64
  CurrentDesktop: ubuntu:GNOME
  Date: Thu Jul 11 09:02:53 2019
  InstallationDate: Installed on 2019-07-11 (0 days ago)
  InstallationMedia: Ubuntu 19.10 "Eoan Ermine" - Alpha amd64 (20190711)
  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  SourcePackage: bcmwl
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bcmwl/+bug/1836211/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836816] Missing required logs.

2019-07-16 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1836816

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836816

Title:
  Fix nf_conntrack races when dealing with same origin requests in NAT
  environments

Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Bionic:
  In Progress
Status in linux source package in Cosmic:
  Won't Fix

Bug description:
  BugLink: https://bugs.launchpad.net/bugs/1836816

  [Impact]

  There are a number of races in nf_conntrack when multiple packets are
  sent from the same origin to the same destination at the same time,
  where there is no pre-existing confirmed conntrack entry, in a NAT
  environment.

  This is most frequently seen in users with kubernetes workloads, where dns
  requests are sent from the same socket at the same time, from different 
threads. One request is for a A record, the other . A conntrack race 
happens, which leads to one request being dropped, which leads to 5 second dns 
timeouts.

  This problem is not specific to kubernetes, as any multi-threaded process
  which sends UDP packets from the same socket at the same time from different
  threads is affected.

  Note that since UDP is connectionless, no packet is sent when connect() is
  called, so no conntrack entries are created until a packet is first sent.

  In the scenario where two UDP packets are sent at the same time from the same
  socket on different threads, there are the following possible races:

  1.) Neither of the packets find a confirmed conntrack entry. This leads to
   two conntrack entries being created with the same tuples.
  2.) Same as 1), but a conntrack entry is confirmed for one of the packets 
before the other calls get_unique_tuple(). The other packet gets a different 
reply tuple with the source port changed.

  The outcomes of the races are the same, one of the packets is dropped when it
  comes time to confirm conntrack entries with __nf_conntrack_confirm().

  For more information, read the technical blog post:
  https://www.weave.works/blog/racy-conntrack-and-dns-lookup-timeouts

  [Fix]

  The fix to race 1) was included in 4.19 upstream by this commit:

  netfilter: nf_conntrack: resolve clash for matching conntracks
  commit ed07d9a021df6da53456663a76999189badc432a
  Author: Martynas Pumputis 
  Date: Mon Jul 2 16:52:14 2018 +0200

  This commit adds an extra check to see if the two entries are the same and to
  merge the entries if they are.

  The fix to race 2) was included in 5.0 upstream by this commit:

  netfilter: nf_nat: skip nat clash resolution for same-origin entries
  commit 4e35c1cb9460240e983a01745b5f29fe3a4d8e39
  Author: Martynas Pumputis 
  Date: Tue Jan 29 15:51:42 2019 +0100

  This commit ensures that a new source port is not allocated to a duplicated
  entry, and forwards the duplicated entries to be resolved later on.

  Note that 4e35c1cb9460240e983a01745b5f29fe3a4d8e39 was also backported
  to stable releases 4.9.163, 4.14.106, 4.19.29, 4.20.16.

  Both commits cherry-pick to 4.15 bionic cleanly. Please cherry-pick
  both commits to all bionic kernels.

  [Testcase]

  The reproducer has been provided by the author of the fixes, and is
  best viewed here:

  https://github.com/brb/conntrack-race

  The dmesg logs and packet traces in the above github repo are best
  viewed while reading upstream discussion:

  https://patchwork.ozlabs.org/patch/937963/

  I have built a test kernel for xenial HWE, which can be found here:
  https://launchpad.net/~mruffell/+archive/ubuntu/sf00227747-test-kernel

  The test kernel has been tested with a kubernetes workload and aided with
  resolution of kubernetes problems.

  [Regression Potential]

  As noted previously, 4e35c1cb9460240e983a01745b5f29fe3a4d8e39 has been
  backported to stable releases 4.9.163, 4.14.106, 4.19.29, 4.20.16 and has no
  changes to the primary commit. This commit is well tested and considered 
stable by the community.

  Both commits have also been present in the -azure kernels since 
4.15.0-1030.31 and 4.18.0-1004.4, as per LP #1795493, 
http://bugs.launchpad.net/bugs/1795493
  They have received wide testing, and no problems have been reported.

  The changes are specifically limited to resolving clashes between duplicate
  conntrack entries, and any regressions will be limited to that s

[Kernel-packages] [Bug 1836816] [NEW] Fix nf_conntrack races when dealing with same origin requests in NAT environments

2019-07-16 Thread Matthew Ruffell
Public bug reported:

BugLink: https://bugs.launchpad.net/bugs/1836816

[Impact]

There are a number of races in nf_conntrack when multiple packets are
sent from the same origin to the same destination at the same time,
where there is no pre-existing confirmed conntrack entry, in a NAT
environment.

This is most frequently seen in users with kubernetes workloads, where dns
requests are sent from the same socket at the same time, from different 
threads. One request is for a A record, the other . A conntrack race 
happens, which leads to one request being dropped, which leads to 5 second dns 
timeouts.

This problem is not specific to kubernetes, as any multi-threaded process
which sends UDP packets from the same socket at the same time from different
threads is affected.

Note that since UDP is connectionless, no packet is sent when connect() is
called, so no conntrack entries are created until a packet is first sent.

In the scenario where two UDP packets are sent at the same time from the same
socket on different threads, there are the following possible races:

1.) Neither of the packets find a confirmed conntrack entry. This leads to  
 two conntrack entries being created with the same tuples.
2.) Same as 1), but a conntrack entry is confirmed for one of the packets 
before the other calls get_unique_tuple(). The other packet gets a different 
reply tuple with the source port changed.

The outcomes of the races are the same, one of the packets is dropped when it
comes time to confirm conntrack entries with __nf_conntrack_confirm().

For more information, read the technical blog post:
https://www.weave.works/blog/racy-conntrack-and-dns-lookup-timeouts

[Fix]

The fix to race 1) was included in 4.19 upstream by this commit:

netfilter: nf_conntrack: resolve clash for matching conntracks
commit ed07d9a021df6da53456663a76999189badc432a
Author: Martynas Pumputis 
Date: Mon Jul 2 16:52:14 2018 +0200

This commit adds an extra check to see if the two entries are the same and to
merge the entries if they are.

The fix to race 2) was included in 5.0 upstream by this commit:

netfilter: nf_nat: skip nat clash resolution for same-origin entries
commit 4e35c1cb9460240e983a01745b5f29fe3a4d8e39
Author: Martynas Pumputis 
Date: Tue Jan 29 15:51:42 2019 +0100

This commit ensures that a new source port is not allocated to a duplicated
entry, and forwards the duplicated entries to be resolved later on.

Note that 4e35c1cb9460240e983a01745b5f29fe3a4d8e39 was also backported
to stable releases 4.9.163, 4.14.106, 4.19.29, 4.20.16.

Both commits cherry-pick to 4.15 bionic cleanly. Please cherry-pick both
commits to all bionic kernels.

[Testcase]

The reproducer has been provided by the author of the fixes, and is best
viewed here:

https://github.com/brb/conntrack-race

The dmesg logs and packet traces in the above github repo are best
viewed while reading upstream discussion:

https://patchwork.ozlabs.org/patch/937963/

I have built a test kernel for xenial HWE, which can be found here:
https://launchpad.net/~mruffell/+archive/ubuntu/sf00227747-test-kernel

The test kernel has been tested with a kubernetes workload and aided with
resolution of kubernetes problems.

[Regression Potential]

As noted previously, 4e35c1cb9460240e983a01745b5f29fe3a4d8e39 has been
backported to stable releases 4.9.163, 4.14.106, 4.19.29, 4.20.16 and has no
changes to the primary commit. This commit is well tested and considered stable 
by the community.

Both commits have also been present in the -azure kernels since 4.15.0-1030.31 
and 4.18.0-1004.4, as per LP #1795493, http://bugs.launchpad.net/bugs/1795493
They have received wide testing, and no problems have been reported.

The changes are specifically limited to resolving clashes between duplicate
conntrack entries, and any regressions will be limited to that scenario. The
overall risk of regression is very low.

[Notes]
The commits in the -azure kernels will need to be reverted before importing the 
generic bionic updates, since they are the pre-upstream commits, and have had 
several revisions since they were imported. Replacing them with the
actual upstream commits will make things easier in the future to maintain.

http://bugs.launchpad.net/bugs/1795493

For race 1):
Azure: https://patchwork.ozlabs.org/patch/937963/
Upstream: ed07d9a021df6da53456663a76999189badc432a
Commits are the same.

For race 2):
Azure: https://patchwork.ozlabs.org/patch/952939/
Upstream: 4e35c1cb9460240e983a01745b5f29fe3a4d8e39
Note the difference, old commit must be reverted first.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Incomplete

** Affects: linux (Ubuntu Bionic)
 Importance: Medium
 Assignee: Matthew Ruffell (mruffell)
 Status: In Progress

** Affects: linux (Ubuntu Cosmic)
 Importance: Medium
 Status: Won't Fix


** Tags: sts

** Also affects: linux (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ub

[Kernel-packages] [Bug 1836742] Re: Please enable CONFIG_PMIC_OPREGION and it's components to resolve issues with enabling integrated display on some BayTrail/CherryTrail-based devices

2019-07-16 Thread Gannet
** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836742

Title:
  Please enable CONFIG_PMIC_OPREGION and it's components to resolve
  issues with enabling integrated display on some BayTrail/CherryTrail-
  based devices

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Please enable CONFIG_PMIC_OPREGION and it's components
  (CONFIG_CRC_PMIC_OPREGION, CONFIG_XPOWER_PMIC_OPREGION,
  CONFIG_BXT_WC_PMIC_OPREGION, CONFIG_CHT_WC_PMIC_OPREGION,
  CONFIG_CHT_DC_TI_PMIC_OPREGION). On GPD Win 1 and GPD Pocket 1 this
  should allow to use integrated display when external display is
  connected.

  More details is here: 
  
https://github.com/torvalds/linux/commit/7b5618f4b834330a052958db934c3dffad4a15c2
  
https://github.com/torvalds/linux/commit/4e8052af858a6ea2cf656bdb6dbcf16dd87a39c1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836742/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812159] Re: q-r-t security test wants SCHED_STACK_END_CHECK to be enabled in KVM kernels

2019-07-16 Thread Steve Beattie
I can confirm that the SCHED_STACK_END_CHECK config option has been
enabled in the linux-kvm kernel 4.4.0-1052.59 for xenial, 4.15.0-1039.39
for bionic, and 5.0.0-1011.12 for disco. Thanks!

** Tags added: verification-done-bionic verification-done-disco
verification-failed-xenial

** Tags removed: verification-failed-xenial
** Tags added: verification-done-xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1812159

Title:
  q-r-t security test wants SCHED_STACK_END_CHECK to be enabled in KVM
  kernels

Status in ubuntu-kernel-tests:
  In Progress
Status in linux-kvm package in Ubuntu:
  In Progress
Status in linux-kvm source package in Xenial:
  Fix Committed
Status in linux-kvm source package in Bionic:
  Fix Committed
Status in linux-kvm source package in Cosmic:
  Fix Committed
Status in linux-kvm source package in Disco:
  Fix Committed

Bug description:
  == SRU Justification ==
  Security team requires the SCHED_STACK_END_CHECK config to be enabled
  on all of our kernel.

  The test_380_config_sched_stack_end_check test from q-r-t will fail on
  all the KVM kernels.

  Copied from the config help text:
  This option checks for a stack overrun on calls to schedule(). If the
  stack end location is found to be over written always panic as the
  content of the corrupted region can no longer be trusted. This is to
  ensure no erroneous behaviour occurs which could result in data
  corruption or a sporadic crash at a later stage once the region is
  examined. The runtime overhead introduced is minimal.

  == Test ==
  Test kernels could be found here: 
  https://people.canonical.com/~phlin/kernel/lp-1812159-kvm-sched-check/
  This issue case be verified with the test_380_config_sched_stack_end_check 
test from q-r-t, the test will pass with the patched kernel.

  == Regression Potential ==
  Low, the introduced runtime overhead is minimal, and it's already enabled in 
the generic kernel.

  == Original Bug report ==
  The test_380_config_sched_stack_end_check test failed on the Bionic
  KVM kernel

   FAIL: test_380_config_sched_stack_end_check 
(__main__.KernelSecurityConfigTest)
   Ensure SCHED_STACK_END_CHECK is set
   --
   Traceback (most recent call last):
   File "./test-kernel-security.py", line 2628, in 
test_380_config_sched_stack_end_check
   self.assertKernelConfig('SCHED_STACK_END_CHECK', expected)
   File "./test-kernel-security.py", line 207, in assertKernelConfig
   self.assertKernelConfigSet(name)
   File "./test-kernel-security.py", line 194, in assertKernelConfigSet
   '%s option was expected to be set in the kernel config' % name)
   AssertionError: SCHED_STACK_END_CHECK option was expected to be set in the 
kernel config

  ProblemType: Bug
  DistroRelease: Ubuntu 18.04
  Package: linux-image-4.15.0-1028-kvm 4.15.0-1028.28
  ProcVersionSignature: User Name 4.15.0-1028.28-kvm 4.15.18
  Uname: Linux 4.15.0-1028-kvm x86_64
  ApportVersion: 2.20.9-0ubuntu7.5
  Architecture: amd64
  Date: Thu Jan 17 06:44:41 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812159/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836806] Re: Two crashes on raid0 error path (during a member device removal)

2019-07-16 Thread Guilherme G. Piccoli
This issue affects only kernels after 4.17 and before 5.2, hence it's
fixed on Bionic and Eoan, and won't be fixed in Cosmic (4.18) since it
is EOL.

Patches submitted to kernel-team ML: https://lists.ubuntu.com/archives
/kernel-team/2019-July/102287.html

Cheers,


Guilherme

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836806

Title:
  Two crashes on raid0 error path (during a member device removal)

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Bionic:
  Fix Released
Status in linux source package in Cosmic:
  Won't Fix
Status in linux source package in Disco:
  In Progress
Status in linux source package in Eoan:
  Fix Released

Bug description:
  [Impact]

  * During raid0 error path testing, by removing one member of the
  array, we've noticed after kernel 4.18 we can trigger a crash
  depending if there's I/O in-flight during the array removal. When
  debugging the issue, a second problem was found, that could cause a
  different crash.

  * For the first and more relevant problem, commit cd4a4ae4683d
  ("block: don't use blocking queue entered for recursive bio submits") 
introduced the flag BIO_QUEUE_ENTERED in order BIOs that were split do bypass 
the blocking queue entering routine and use the live non-blocking version. What 
happens with md/raid0 though is that their BIOs have their underlying device 
changed to the physical disk (array member). If we remove this physical disk 
(or if it fails), we could have one BIO that had the flag changed to 
BIO_QUEUE_ENTERED and had the device changed to the removed array member 
(before its removal); this bio then skips a lot of checks in 
generic_make_request_checks(), triggering the following crash:

  BUG: unable to handle kernel NULL pointer dereference at 0155
  PGD 0 P4D 0
  Oops:  [#1] SMP PTI
  RIP: 0010:blk_throtl_bio+0x45/0x970
  [...]
  Call Trace:
   generic_make_request_checks+0x1bf/0x690
   generic_make_request+0x64/0x3f0
   raid0_make_request+0x184/0x620 [raid0]
   ? raid0_make_request+0x184/0x620 [raid0]
   md_handle_request+0x126/0x1a0
   md_make_request+0x7b/0x180
   generic_make_request+0x19e/0x3f0
   submit_bio+0x73/0x140
  [...]

  * When debugging the above issue, by rebuilding the kernel with
  CONFIG_BLK_CGROUP=n we've noticed a different crash. Commit
  37f9579f4c31 ("blk-mq: Avoid that submitting a bio concurrently with
  device removal triggers a crash") introduced a NULL pointer
  dereference in generic_make_request(), that manifests as:

  BUG: unable to handle kernel NULL pointer dereference at 0078
  PGD 0 P4D 0
  Oops:  [#1] SMP PTI
  RIP: 0010:generic_make_request+0x32b/0x400
  Call Trace:
   submit_bio+0x73/0x140
   ext4_io_submit+0x4d/0x60
   ext4_writepages+0x626/0xe90
   do_writepages+0x4b/0xe0
  [...]

  * For both the issues, we have simple patches that are present in 
linux-stable but not in Linus tree.
  ## For issue 1 (md removal crash):
  869eec894663 ("md/raid0: Do not bypass blocking queue entered for raid0 bios")
  
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=869eec894663

  ## For issue 2 (generic_make_request() NULL dereference):
  c9d8d3e9d7a0 ("block: Fix a NULL pointer dereference in 
generic_make_request()")
  
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=c9d8d3e9d7a0

  The reasoning for both patches not being present in Linus tree is
  explained in the commit messages, but in summary Ming Lei submitted a
  major clean-up series at the same time I've submitted both patches, it
  wouldn't make sense to accept my patches to soon after remove the code
  paths with his clean-up. But Ming's series rely on legacy I/O path
  removal, and so it's very hard to backport. Hence maintainers
  suggested me to submit my small fixes to stable tree only.

  [Test case]

  For both cases, the test is the same, the only change being a kernel
  config option. To reproduce issue 1 (md removal crash), a regular
  Ubuntu kernel config is enough. For the issue 2, a kernel rebuild with
  CONFIG_BLK_CGROUP=n is necessary.

  Steps to reproduce:

  a) Create a raid0 md array with 2 NVMe devices as members, and mount it with 
an ext4 filesystem.
  
  b) Run the following oneliner (supposing the raid0 is mounted in /mnt):
  (dd of=/mnt/tmp if=/dev/zero bs=1M count=999 &); sleep 0.3;\
  echo 1 > /sys/block/nvme1n1/device/device/remove
  (whereas nvme1n1 is the 2nd array member)

  [Regression potential]

  The fixes are self-contained and small, both validated by a great
  number of subsystem maintainers (including block, raid and stable).
  Commit c9d8d3e9d7a0 was also validated by the author of the offender
  patch it fixes, and has no functional change. Commit 869eec894663 has
  only raid0 driver as scope, and fall-backs raid0 to a previous
  behavior before the introduction of BIO_QU

[Kernel-packages] [Bug 1836806] Re: Two crashes on raid0 error path (during a member device removal)

2019-07-16 Thread Guilherme G. Piccoli
** Description changed:

- TBD
+ [Impact]
+ 
+ * During raid0 error path testing, by removing one member of the array,
+ we've noticed after kernel 4.18 we can trigger a crash depending if
+ there's I/O in-flight during the array removal. When debugging the
+ issue, a second problem was found, that could cause a different crash.
+ 
+ * For the first and more relevant problem, commit cd4a4ae4683d
+ ("block: don't use blocking queue entered for recursive bio submits") 
introduced the flag BIO_QUEUE_ENTERED in order BIOs that were split do bypass 
the blocking queue entering routine and use the live non-blocking version. What 
happens with md/raid0 though is that their BIOs have their underlying device 
changed to the physical disk (array member). If we remove this physical disk 
(or if it fails), we could have one BIO that had the flag changed to 
BIO_QUEUE_ENTERED and had the device changed to the removed array member 
(before its removal); this bio then skips a lot of checks in 
generic_make_request_checks(), triggering the following crash:
+ 
+ BUG: unable to handle kernel NULL pointer dereference at 0155
+ PGD 0 P4D 0
+ Oops:  [#1] SMP PTI
+ RIP: 0010:blk_throtl_bio+0x45/0x970
+ [...]
+ Call Trace:
+  generic_make_request_checks+0x1bf/0x690
+  generic_make_request+0x64/0x3f0
+  raid0_make_request+0x184/0x620 [raid0]
+  ? raid0_make_request+0x184/0x620 [raid0]
+  md_handle_request+0x126/0x1a0
+  md_make_request+0x7b/0x180
+  generic_make_request+0x19e/0x3f0
+  submit_bio+0x73/0x140
+ [...]
+ 
+ * When debugging the above issue, by rebuilding the kernel with
+ CONFIG_BLK_CGROUP=n we've noticed a different crash. Commit 37f9579f4c31
+ ("blk-mq: Avoid that submitting a bio concurrently with device removal
+ triggers a crash") introduced a NULL pointer dereference in
+ generic_make_request(), that manifests as:
+ 
+ BUG: unable to handle kernel NULL pointer dereference at 0078
+ PGD 0 P4D 0
+ Oops:  [#1] SMP PTI
+ RIP: 0010:generic_make_request+0x32b/0x400
+ Call Trace:
+  submit_bio+0x73/0x140
+  ext4_io_submit+0x4d/0x60
+  ext4_writepages+0x626/0xe90
+  do_writepages+0x4b/0xe0
+ [...]
+ 
+ * For both the issues, we have simple patches that are present in 
linux-stable but not in Linus tree.
+ ## For issue 1 (md removal crash):
+ 869eec894663 ("md/raid0: Do not bypass blocking queue entered for raid0 bios")
+ 
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=869eec894663
+ 
+ ## For issue 2 (generic_make_request() NULL dereference):
+ c9d8d3e9d7a0 ("block: Fix a NULL pointer dereference in 
generic_make_request()")
+ 
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=c9d8d3e9d7a0
+ 
+ The reasoning for both patches not being present in Linus tree is
+ explained in the commit messages, but in summary Ming Lei submitted a
+ major clean-up series at the same time I've submitted both patches, it
+ wouldn't make sense to accept my patches to soon after remove the code
+ paths with his clean-up. But Ming's series rely on legacy I/O path
+ removal, and so it's very hard to backport. Hence maintainers suggested
+ me to submit my small fixes to stable tree only.
+ 
+ [Test case]
+ 
+ For both cases, the test is the same, the only change being a kernel
+ config option. To reproduce issue 1 (md removal crash), a regular Ubuntu
+ kernel config is enough. For the issue 2, a kernel rebuild with
+ CONFIG_BLK_CGROUP=n is necessary.
+ 
+ Steps to reproduce:
+ 
+ a) Create a raid0 md array with 2 NVMe devices as members, and mount it with 
an ext4 filesystem.
+ 
+ b) Run the following oneliner (supposing the raid0 is mounted in /mnt):
+ (dd of=/mnt/tmp if=/dev/zero bs=1M count=999 &); sleep 0.3;\
+ echo 1 > /sys/block/nvme1n1/device/device/remove
+ (whereas nvme1n1 is the 2nd array member)
+ 
+ [Regression potential]
+ 
+ The fixes are self-contained and small, both validated by a great number
+ of subsystem maintainers (including block, raid and stable). Commit
+ c9d8d3e9d7a0 was also validated by the author of the offender patch it
+ fixes, and has no functional change. Commit 869eec894663 has only raid0
+ driver as scope, and fall-backs raid0 to a previous behavior before the
+ introduction of BIO_QUEUE_ENTERED flag (which indeed increases the
+ amount of checks performed in BIOs), so the regression potential is low
+ and restricted to raid0.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836806

Title:
  Two crashes on raid0 error path (during a member device removal)

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Bionic:
  Fix Released
Status in linux source package in Cosmic:
  Won't Fix
Status in linux source package in Disco:
  In Progress
Status in linux source package in Eoan:
  Fix Released

Bug description:
  [Impact]

  * During raid0 error path testing, by removing one member of

[Kernel-packages] [Bug 1812624] Re: PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was expected to be set in C-KVM

2019-07-16 Thread Steve Beattie
I can confirm that the PAGE_POISONING, PAGE_POISONING_NO_SANITY, and
PAGE_POISONING_ZERO config options are set in the linux-kvm
5.0.0-1011.12 kernel in disco proposed. Thanks!

** Tags added: verification-done-disco

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1812624

Title:
  PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option
  was expected to be set in C-KVM

Status in ubuntu-kernel-tests:
  In Progress
Status in linux-aws package in Ubuntu:
  Fix Released
Status in linux-azure package in Ubuntu:
  Fix Released
Status in linux-kvm package in Ubuntu:
  In Progress
Status in linux-aws source package in Cosmic:
  Fix Released
Status in linux-azure source package in Cosmic:
  Fix Released
Status in linux-kvm source package in Cosmic:
  Fix Released
Status in linux-aws source package in Disco:
  Fix Released
Status in linux-azure source package in Disco:
  Fix Released
Status in linux-kvm source package in Disco:
  Fix Committed

Bug description:
  Issue reported by the kernel-security test:

    ==
    FAIL: test_420_config_page_poisoning (__main__.KernelSecurityConfigTest)
    Ensure page poisoning is enabled (LP: #1783651)
    --
    Traceback (most recent call last):
  File "./test-kernel-security.py", line 2676, in 
test_420_config_page_poisoning
    self.assertKernelConfig('PAGE_POISONING', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
    self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
    '%s option was expected to be set in the kernel config' % name)
    AssertionError: PAGE_POISONING option was expected to be set in the kernel 
config

  
==
FAIL: test_421_config_page_poisoning_no_sanity 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning allocation sanity checking is disabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2694, in 
test_421_config_page_poisoning_no_sanity
self.assertKernelConfig('PAGE_POISONING_NO_SANITY', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_NO_SANITY option was expected to be set in 
the kernel config

==
FAIL: test_421_config_page_poisoning_zero 
(__main__.KernelSecurityConfigTest)
Ensure page poisoning to zero is enabled (LP: #1783651)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2685, in 
test_421_config_page_poisoning_zero
self.assertKernelConfig('PAGE_POISONING_ZERO', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: PAGE_POISONING_ZERO option was expected to be set in the 
kernel config


  
  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:12:54 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1820311] Re: linux-kvm: 5.0.0-1001.1 -proposed tracker

2019-07-16 Thread Steve Beattie
linux-kvm is currently 5.0.0-1010.11 in disco, looks like this bug got
left behind. Closing.

** Changed in: linux-kvm (Ubuntu)
   Status: Confirmed => Fix Released

** Changed in: linux-kvm (Ubuntu Disco)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1820311

Title:
  linux-kvm: 5.0.0-1001.1 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-release series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in linux-kvm package in Ubuntu:
  Fix Released
Status in linux-kvm source package in Disco:
  Fix Released

Bug description:
  This bug is for tracking the  upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  -- swm properties --
  kernel-master-bug: 1819759
  phase: Ready for Release
  phase-changed: Friday, 22. March 2019 13:07 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1820311/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1811981] Re: test_410_config_lock_down_kernel in ubuntu_kernel_security test failed on B/C/D KVM

2019-07-16 Thread Steve Beattie
I can confirm that the CONFIG_LOCK_DOWN_KERNEL config is enabled in the
5.0.0-1011.12 linux-kvm kernel in disco-proposed. Thanks!


** Tags added: verifiction-done-disco

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1811981

Title:
  test_410_config_lock_down_kernel in ubuntu_kernel_security test failed
  on B/C/D KVM

Status in QA Regression Testing:
  Fix Released
Status in ubuntu-kernel-tests:
  In Progress
Status in linux-kvm package in Ubuntu:
  In Progress
Status in linux-kvm source package in Bionic:
  Fix Committed
Status in linux-kvm source package in Cosmic:
  Fix Committed
Status in linux-kvm source package in Disco:
  Fix Committed

Bug description:
  == SRU Justification ==
  Security team requires the CONFIG_LOCK_DOWN_KERNEL to be enabled in all of 
our kernels.

  == Test ==
  Test kernels could be found here:
  https://people.canonical.com/~phlin/kernel/lp-1811981-kvm-lockdown/
  This issue can be verified with test_410_config_lock_down_kernel
  test from q-r-t, the test will pass with the patched kernel.

  == Regression Potential ==
  Low, we already have this config enabled in the generic kernel.

  
  == Original bug report ==
  Kernel Version: 4.15.0-44.47

  This test has passed on s390x / AMD64 / ARM64 / i386, but failed with
  Power8 and Power9

  FAIL: test_410_config_lock_down_kernel (__main__.KernelSecurityConfigTest)
  Ensure kernel efi lockdown is enabled
  --
  Traceback (most recent call last):
    File "./test-kernel-security.py", line 2668, in 
test_410_config_lock_down_kernel
  self.assertKernelConfig('LOCK_DOWN_KERNEL', expected)
    File "./test-kernel-security.py", line 207, in assertKernelConfig
  self.assertKernelConfigSet(name)
    File "./test-kernel-security.py", line 194, in assertKernelConfigSet
  '%s option was expected to be set in the kernel config' % name)
  AssertionError: LOCK_DOWN_KERNEL option was expected to be set in the kernel 
config

To manage notifications about this bug go to:
https://bugs.launchpad.net/qa-regression-testing/+bug/1811981/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1795659] Re: kernel panic using CIFS share smb2_push_mandatory_locks

2019-07-16 Thread Guilherme G. Piccoli
** Changed in: linux (Ubuntu Disco)
   Status: Confirmed => Fix Released

** Changed in: linux (Ubuntu Cosmic)
   Status: Confirmed => Won't Fix

** Changed in: linux (Ubuntu Bionic)
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1795659

Title:
  kernel panic using CIFS share smb2_push_mandatory_locks

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Bionic:
  In Progress
Status in linux source package in Cosmic:
  Won't Fix
Status in linux source package in Disco:
  Fix Released

Bug description:
  Description:Ubuntu 16.04.5 LTS
  Release:16.04

  Kernel: 4.15.0-36-generic #39~16.04.1-Ubuntu SMP Tue Sep 25 08:59:23
  UTC 2018 x86_64 x86_64 x86_64 GNU/Linux

  Under load, getting a system crash when accessing files on an SMB3
  share. dmesg from crash attached. I can upload the crash dump if
  needed.

  Share is mounted with the following options:

  
"ro,_netdev,username=*,password=*,domain=*,vers=3.02,sec=ntlmsspi,nounix,noserverino,nobrl,cache=none"

  Dmesg points to the cifs module

  [ 2192.662345] BUG: unable to handle kernel NULL pointer dereference at 
0038
  [ 2192.662407] IP: smb2_push_mandatory_locks+0x10e/0x3b0 [cifs]

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1795659/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1824981] Re: cifs set_oplock buffer overflow in strcat

2019-07-16 Thread Guilherme G. Piccoli
** Changed in: linux (Ubuntu Cosmic)
   Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1824981

Title:
  cifs set_oplock buffer overflow in strcat

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Bionic:
  In Progress
Status in linux source package in Cosmic:
  Won't Fix
Status in linux source package in Disco:
  In Progress
Status in linux source package in Eoan:
  Fix Committed

Bug description:
  Ubuntu 18.04.2 LTS
  Linux SRV013 4.15.0-47-generic #50-Ubuntu SMP Wed Mar 13 10:44:52 UTC 2019 
x86_64 x86_64 x86_64 GNU/Linux

  DELL R740, 2 CPU (40 Cores, 80 Threads), 384 GiB RAM

  top - 12:39:53 up  3:41,  4 users,  load average: 66.19, 64.06, 76.90
  Tasks: 1076 total,   1 running, 675 sleeping,  12 stopped,   1 zombie
  %Cpu(s): 28.2 us,  0.3 sy,  0.0 ni, 71.5 id,  0.0 wa,  0.0 hi,  0.1 si,  0.0 
st
  KiB Mem : 39483801+total, 24077185+free, 57428284 used, 96637872 buff/cache
  KiB Swap:   999420 total,   999420 free,0 used. 33477683+avail Mem


  We've seen the following bug many times since we introduced new
  machines running Ubuntu 18. Wasn't an issue older machines running
  Ubuntu 16. Three different machines are affected, so it's rather not a
  hardware issue.

  
  | detected buffer overflow in strcat
  | [ cut here ]
  | kernel BUG at /build/linux-6ZmFRN/linux-4.15.0/lib/string.c:1052!
  | invalid opcode:  [#1] SMP PTI
  | Modules linked in: [...]
  | Hardware name: Dell Inc. PowerEdge R740/0923K0, BIOS 1.6.11 11/20/2018
  | RIP: 0010:fortify_panic+0x13/0x22
  |  [...]
  | Call Trace:
  |  smb21_set_oplock_level+0x147/0x1a0 [cifs]
  |  smb3_set_oplock_level+0x22/0x90 [cifs]
  |  smb2_set_fid+0x76/0xb0 [cifs]
  |  cifs_new_fileinfo+0x259/0x390 [cifs]
  |  ? smb2_get_lease_key+0x40/0x40 [cifs]
  |  ? cifs_new_fileinfo+0x259/0x390 [cifs]
  |  cifs_open+0x3db/0x8d0 [cifs]
  |  [...]

  (Full dmesg output attached)

  After hitting this bug there are many cifs related dmesg entries,
  processes lock up and eventually the systems freezes.

  
  The share is mounted using:
  //server/share  /mnt/server/ cifs 
defaults,auto,iocharset=utf8,noperm,file_mode=0777,dir_mode=0777,credentials=/root/passwords/share,domain=myDomain,uid=myUser,gid=10513,mfsymlinks

  Currently we're testing the cifs mount options "cache=none" as the bug
  seems to be oplock related.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1824981/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1828495] Autopkgtest regression report (qemu/1:3.1+dfsg-2ubuntu3.3)

2019-07-16 Thread Łukasz Zemczak
All autopkgtests for the newly accepted qemu (1:3.1+dfsg-2ubuntu3.3) for disco 
have finished running.
There have been regressions in tests triggered by the package. Please visit the 
sru report page and investigate the failures.

https://people.canonical.com/~ubuntu-archive/pending-sru.html#disco

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1828495

Title:
  [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

Status in intel:
  New
Status in libvirt package in Ubuntu:
  Fix Released
Status in linux package in Ubuntu:
  In Progress
Status in qemu package in Ubuntu:
  Fix Released
Status in libvirt source package in Bionic:
  Confirmed
Status in linux source package in Bionic:
  Confirmed
Status in qemu source package in Bionic:
  Fix Committed
Status in libvirt source package in Cosmic:
  Won't Fix
Status in linux source package in Cosmic:
  Won't Fix
Status in qemu source package in Cosmic:
  Won't Fix
Status in libvirt source package in Disco:
  Confirmed
Status in linux source package in Disco:
  Confirmed
Status in qemu source package in Disco:
  Fix Committed
Status in libvirt source package in Eoan:
  Fix Released
Status in linux source package in Eoan:
  In Progress
Status in qemu source package in Eoan:
  Fix Released

Bug description:
  [Impact]

   * QEMU does not support IceLake and CascadeLake CPUs specific features.
   * Most important feature to be supported is: IA32_ARCH_CAPABILITIES MSR.
   * With IA32_ARCH_CAPABILITIES, QEMU is able to advertise HW mitigations:
 - Rogue Data Cache Load
 - Enhanced IBRS
 - RSB Alternate
 - L1D flush need on VMENTRY
 - speculative Store Bypass
 to guests, as described in document:
 Intel 336996-Speculative-Execution-Side-Channel-Mitigations.pdf

  [Test Case]

   * From Original Description:

  """
  1. Boot up guest using: -cpu Cascadelake-Server

  [root@clx-2s2 yexin]# qemu-system-x86_64 -accel kvm -drive
  if=virtio,id=hd,file=/home/x/x,format=qcow2  -m 4096 -smp 4 -cpu
  Cascadelake-Server -serial stdio

  char device redirected to /dev/pts/3 (label serial0)

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  2. To check CPU ID related to features[FEAT_7_0_EDX]
  :CPUID_7_0_EDX_ARCH_CAPABILITIES

  Expected Result: Both host and guest's CPUID.07H EDX bit 29 should be
  1.

  Actual Result:

  Host's cpuid: 0x0007 0x00: eax=0x ebx=0xd39b
  ecx=0x0818 edx=0xbc00  (EDX bit 29=1)

  Guest's cpuid : 0x0007 0x00: eax=0x ebx=0xd19f0fb9
  ecx=0x0818 edx=0x8400 (EDX bit 29=0)

  Commit:2bdb76c015df7125783d8394d6339d181cb5bc30

  Target Kerned: 5.1
  Target Release: 19.10

  """

  [Regression Potential]

   * Most changes are related to CPU type definitions and its supported
  features. They are all based in upstream changes but, for obvious
  reasons, backporting and/or cherry-picking those could bring issues.
  Biggest concern is breaking something that currently works. Right now,
  the parts being changed that could affect other CPU types would be
  related to a small refactoring of how the features are organized, and
  that would be seen right away when trying to start a new VM after the
  package is installed.

   * Other tests, related to the features being backported, are being
  done by our KVM regression tests, including migration combinations, to
  reduce chances that a regression is introduced.

  [Other Info]
   
   * N/A

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1828495/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1811981] Re: test_410_config_lock_down_kernel in ubuntu_kernel_security test failed on B/C/D KVM

2019-07-16 Thread Steve Beattie
I can confirm that the CONFIG_LOCK_DOWN_KERNEL config is enabled in the
4.15.0-1039.39 linux-kvm kernel in bionic-proposed. Thanks!

** Tags added: verification-done-bionic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1811981

Title:
  test_410_config_lock_down_kernel in ubuntu_kernel_security test failed
  on B/C/D KVM

Status in QA Regression Testing:
  Fix Released
Status in ubuntu-kernel-tests:
  In Progress
Status in linux-kvm package in Ubuntu:
  In Progress
Status in linux-kvm source package in Bionic:
  Fix Committed
Status in linux-kvm source package in Cosmic:
  Fix Committed
Status in linux-kvm source package in Disco:
  Fix Committed

Bug description:
  == SRU Justification ==
  Security team requires the CONFIG_LOCK_DOWN_KERNEL to be enabled in all of 
our kernels.

  == Test ==
  Test kernels could be found here:
  https://people.canonical.com/~phlin/kernel/lp-1811981-kvm-lockdown/
  This issue can be verified with test_410_config_lock_down_kernel
  test from q-r-t, the test will pass with the patched kernel.

  == Regression Potential ==
  Low, we already have this config enabled in the generic kernel.

  
  == Original bug report ==
  Kernel Version: 4.15.0-44.47

  This test has passed on s390x / AMD64 / ARM64 / i386, but failed with
  Power8 and Power9

  FAIL: test_410_config_lock_down_kernel (__main__.KernelSecurityConfigTest)
  Ensure kernel efi lockdown is enabled
  --
  Traceback (most recent call last):
    File "./test-kernel-security.py", line 2668, in 
test_410_config_lock_down_kernel
  self.assertKernelConfig('LOCK_DOWN_KERNEL', expected)
    File "./test-kernel-security.py", line 207, in assertKernelConfig
  self.assertKernelConfigSet(name)
    File "./test-kernel-security.py", line 194, in assertKernelConfigSet
  '%s option was expected to be set in the kernel config' % name)
  AssertionError: LOCK_DOWN_KERNEL option was expected to be set in the kernel 
config

To manage notifications about this bug go to:
https://bugs.launchpad.net/qa-regression-testing/+bug/1811981/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836809] [NEW] segfault when CCD are present in two different HOG services

2019-07-16 Thread Mathieu Stephan
Public bug reported:

Hello everyone,

We are currently developing a device that contains two HID services.
That device, as it is right now, is properly functioning on Windows & Android.
However, when pairing the device on Linux running bluez 5.50 we do get 
segfaults (see attached files).
Our bluetooth device has 4 services : 1 battery service, 2 HID Over Gatt 
services and 1 device information service.
With trial and error, we managed to find that we wouldn't get any crash as long 
as only 1 HOG service was present.

Here's the interesting part. The two HOG services are made as follows:
- standard keyboard over gatt: protocole mode / report map / 1 INPUT report / 
boot INPUT + OUTPUT / HID information / HID Control point
- raw HID over gatt : report map / 1 INPUT report / 1 OUTPUT report / HID 
information / HID control point

Looking at the write_ccc in the call stacks we wondered if the callbacks
subscribing to notifications for the INPUT reports were causing this
issue.

We therefore changed the raw HID over gatt (and its report map) to
remove the INPUT report and change it into 1 OUTPUT report (leading to 2
OUTPUT reports): no crash.

We therefore hypothesize that the segfault occurs when subscribing to
notification on a second HOG service...

** Affects: bluez (Ubuntu)
 Importance: Undecided
 Status: New

** Attachment added: "callstacks.txt"
   
https://bugs.launchpad.net/bugs/1836809/+attachment/5277531/+files/callstacks.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1836809

Title:
  segfault when CCD are present in two different HOG services

Status in bluez package in Ubuntu:
  New

Bug description:
  Hello everyone,

  We are currently developing a device that contains two HID services.
  That device, as it is right now, is properly functioning on Windows & Android.
  However, when pairing the device on Linux running bluez 5.50 we do get 
segfaults (see attached files).
  Our bluetooth device has 4 services : 1 battery service, 2 HID Over Gatt 
services and 1 device information service.
  With trial and error, we managed to find that we wouldn't get any crash as 
long as only 1 HOG service was present.

  Here's the interesting part. The two HOG services are made as follows:
  - standard keyboard over gatt: protocole mode / report map / 1 INPUT report / 
boot INPUT + OUTPUT / HID information / HID Control point
  - raw HID over gatt : report map / 1 INPUT report / 1 OUTPUT report / HID 
information / HID control point

  Looking at the write_ccc in the call stacks we wondered if the
  callbacks subscribing to notifications for the INPUT reports were
  causing this issue.

  We therefore changed the raw HID over gatt (and its report map) to
  remove the INPUT report and change it into 1 OUTPUT report (leading to
  2 OUTPUT reports): no crash.

  We therefore hypothesize that the segfault occurs when subscribing to
  notification on a second HOG service...

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1836809/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836760] Re: ixgbe{vf} - Physical Function gets IRQ when VF checks link state

2019-07-16 Thread Guilherme G. Piccoli
** Changed in: linux (Ubuntu Ff-series)
   Status: Fix Released => Fix Committed

** Changed in: linux (Ubuntu Eoan)
   Status: Confirmed => In Progress

** Changed in: linux (Ubuntu Disco)
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836760

Title:
  ixgbe{vf} - Physical Function gets IRQ when VF checks link state

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Bionic:
  In Progress
Status in linux source package in Cosmic:
  Won't Fix
Status in linux source package in Disco:
  In Progress
Status in linux source package in Eoan:
  In Progress
Status in linux source package in FF-Series:
  Fix Committed

Bug description:
  [Impact]

  * Intel NICs that are SR-IOV capable and are managed by ixgbe driver presents 
a potentially harmful behavior when the ixgbevf-managed VFs (Virtual Functions) 
perform an ethtool link check. The ixgbevf driver issues a mailbox command in 
the ethtool link state handler, which induces one IRQ in the PF (Physical 
Function) per link check.
   
  * This was reported as a sort of "denial-of-service" from a guest; due to 
some link check loop running inside a guest with PCI-PT of a ixgbevf-managed 
VF, the host received a huge amount of IRQs causing soft-lockups.
   
  * The patch proposed in this SRU request fix this behavior by relying in the 
saved link state (obtained in the ixgbevf's watchdog routine) instead of 
issuing a mailbox command to the PF in every link state check request. The 
commit is available on Linus tree: 1e1b0c658d9b ("ixgbevf: Use cached link 
state instead of re-reading the value for ethtool")
  http://git.kernel.org/linus/1e1b0c658d9b

  [Test case]

  Reproducing the behavior is pretty simple; having a machine with an
  Intel NIC managed by ixgbe, proceed with the following steps:

  a) Create one or more VFs
  (echo 1 > /sys/class/net//device/sriov_numvfs)

  b) In a different terminal, monitor the non-TxRx PF IRQs:
  (watch -n1 "cat /proc/interrupts | grep  | grep -v Tx")

  c) Run "ethtool " in a loop

  Without the hereby proposed patch, the PF IRQs will increase.

  [Regression potential]

  The patch scope is restricted to ixgbevf ethtool link-check procedure,
  and was developed by the vendor itself. Being a self-contained patch
  affecting only this driver's ethtool handler, the worst potential
  regression would be a wrong link state report.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836760/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1835879] Re: Intel Wireless-AC 9462/9560 not supported on ICL

2019-07-16 Thread Seth Forshee
** Changed in: linux-firmware (Ubuntu Bionic)
   Status: In Progress => Fix Committed

** Changed in: linux-firmware (Ubuntu Cosmic)
   Status: In Progress => Won't Fix

** Changed in: linux-firmware (Ubuntu Disco)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1835879

Title:
  Intel Wireless-AC 9462/9560 not supported on ICL

Status in HWE Next:
  New
Status in linux-firmware package in Ubuntu:
  In Progress
Status in linux-oem-osp1 package in Ubuntu:
  Fix Committed
Status in linux-firmware source package in Bionic:
  Fix Committed
Status in linux-oem-osp1 source package in Bionic:
  Fix Committed
Status in linux-firmware source package in Cosmic:
  Won't Fix
Status in linux-oem-osp1 source package in Cosmic:
  Won't Fix
Status in linux-firmware source package in Disco:
  Fix Committed
Status in linux-oem-osp1 source package in Disco:
  Won't Fix

Bug description:
  [Impact]
  Intel Wireless-AC 9560/9462 is not correctly enabled on IceLake
  platforms.

  [Fix]
  Two changes from Intel maintained backport-iwlwifi repository are
  necessary to add device ID/configs to iwlwifi driver.

  [Test]
  Verified on hardware 9462/9560 on IceLake/CometLake platforms.

  [Regression Potential]
  Low. These changes are part of the series to enable 9462/9560 on
  CometLake/IceLake platforms that don't have the support originally.

  = Original Bug Description =

  Intel Wireless-AC 9462/9560 on CML was previously enabled via bug
  1833065, bug 1834415 and bug 1834464. However on ICL, it fails to
  startup with following error messages with kernel v5.2-rc7:

    iwlwifi :00:14.3: loaded firmware version 48.13675109.0 op_mode iwlmvm
    iwlwifi :00:14.3: Detected Intel(R) Wireless-AC 9560, REV=0x338
    iwlwifi :00:14.3: Loaded firmware version: 48.13675109.0
    iwlwifi :00:14.3: SecBoot CPU1 Status: 0x5c97, CPU2 Status: 0x3
    iwlwifi :00:14.3: Failed to start RT ucode: -5
    iwlwifi :00:14.3: Collecting data: trigger 16 fired.
    iwlwifi :00:14.3: Firmware not running - cannot dump error
    iwlwifi :00:14.3: Failed to run INIT ucode: -5

  Also tried backport-iwlwifi out-of-tree driver revision 7858 (HEAD at
  the moment) with no luck.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1835879/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836806] Re: Two crashes on raid0 error path (during a member device removal)

2019-07-16 Thread Guilherme G. Piccoli
** Also affects: linux (Ubuntu Eoan)
   Importance: Medium
 Assignee: Guilherme G. Piccoli (gpiccoli)
   Status: Confirmed

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Bionic)
   Status: New => Fix Released

** Changed in: linux (Ubuntu Eoan)
   Status: Confirmed => Fix Released

** Changed in: linux (Ubuntu Disco)
   Status: New => In Progress

** Changed in: linux (Ubuntu Disco)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Disco)
 Assignee: (unassigned) => Guilherme G. Piccoli (gpiccoli)

** Changed in: linux (Ubuntu Bionic)
 Assignee: (unassigned) => Guilherme G. Piccoli (gpiccoli)

** Also affects: linux (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Cosmic)
   Status: New => Won't Fix

** Changed in: linux (Ubuntu Cosmic)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Cosmic)
 Assignee: (unassigned) => Guilherme G. Piccoli (gpiccoli)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836806

Title:
  Two crashes on raid0 error path (during a member device removal)

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Bionic:
  Fix Released
Status in linux source package in Cosmic:
  Won't Fix
Status in linux source package in Disco:
  In Progress
Status in linux source package in Eoan:
  Fix Released

Bug description:
  TBD

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836806/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1813721] Re: SECURITY_SELINUX_DISABLE should be enable on X s390x

2019-07-16 Thread Steve Beattie
Turning this option off is only significant in 4.12 kernels and newer,
where the LSM hooks make use of __ro_after_init if
CONFIG_SECURITY_SELINUX_DISABLE is disabled.

Per the discussion on the kernel-team list
(https://lists.ubuntu.com/archives/kernel-team/2019-July/102026.html),
I've made sure the test won't fail for kernels older than 4.12
regardless of whether CONFIG_SECURITY_SELINUX_DISABLE is set or unset:
https://git.launchpad.net/qa-regression-
testing/commit/?id=3a1752a5f5743fb330336b4d01f0a6a4200fe31f

Thanks.

** Changed in: qa-regression-testing
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1813721

Title:
  SECURITY_SELINUX_DISABLE should be enable on X s390x

Status in QA Regression Testing:
  Fix Released
Status in ubuntu-kernel-tests:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  == SRU Justification ==
  Security team requires the CONFIG_SECURITY_SELINUX_DISABLE should be
  enabled in all of our kernels.

  Currently it's not enabled for s390x in Xenial. And causing the
  test_081_config_security_selinux_disable test in ubuntu_kernel_security
  test suite complaining about this:

==
FAIL: test_081_config_security_selinux_disable 
(__main__.KernelSecurityConfigTest)
Ensure CONFIG_SECURITY_SELINUX_DISABLE is disabled (LP: #1680315)
--
Traceback (most recent call last):
  File "./test-kernel-security.py", line 2158, in 
test_081_config_security_selinux_disable
self.assertKernelConfig('SECURITY_SELINUX_DISABLE', expected)
  File "./test-kernel-security.py", line 207, in assertKernelConfig
self.assertKernelConfigSet(name)
  File "./test-kernel-security.py", line 194, in assertKernelConfigSet
'%s option was expected to be set in the kernel config' % name)
AssertionError: SECURITY_SELINUX_DISABLE option was expected to be set in 
the kernel config

  == Test ==
  A test kernel could be found here:
  https://people.canonical.com/~phlin/kernel/lp-1813721-s390x-selinux/

  This issue can be verified with a q-r-t test:
  test_081_config_security_selinux_disable, the test will pass with the
  patched kernel.

test_081_config_security_selinux_disable (__main__.KernelSecurityConfigTest)
Ensure CONFIG_SECURITY_SELINUX_DISABLE is disabled (LP: #1680315) ... 
(skipped: l) ok

  == Regression Potential ==
  Low, we already have this config enabled in all kernels except this
  specific Xenial s390x.


  --

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-142-generic 4.4.0-142.168
  ProcVersionSignature: Ubuntu 4.4.0-142.168-generic 4.4.167
  Uname: Linux 4.4.0-142-generic s390x
  NonfreeKernelModules: zfs zunicode zcommon znvpair zavl
  AlsaDevices: Error: command ['ls', '-l', '/dev/snd/'] failed with exit code 
2: ls: cannot access '/dev/snd/': No such file or directory
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay'
  ApportVersion: 2.20.1-0ubuntu2.18
  Architecture: s390x
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord'
  CRDA: Error: command ['iw', 'reg', 'get'] failed with exit code 1: nl80211 
not found.
  CurrentDmesg:

  Date: Tue Jan 29 02:30:42 2019
  HibernationDevice: RESUME=UUID=ca468a9c-9563-442c-85c6-6055e800a66e
  IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig'
  Lspci:

  Lsusb: Error: command ['lsusb'] failed with exit code 1:
  PciMultimedia:

  ProcFB: Error: [Errno 2] No such file or directory: '/proc/fb'
  ProcKernelCmdLine: root=UUID=b65b756a-ba4e-4c53-aa32-0db2bdb50bb3 
crashkernel=196M
  RelatedPackageVersions:
   linux-restricted-modules-4.4.0-142-generic N/A
   linux-backports-modules-4.4.0-142-generic  N/A
   linux-firmware 1.157.21
  RfKill: Error: [Errno 2] No such file or directory: 'rfkill'
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/qa-regression-testing/+bug/1813721/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836806] [NEW] Two crashes on raid0 error path (during a member device removal)

2019-07-16 Thread Guilherme G. Piccoli
Public bug reported:

TBD

** Affects: linux (Ubuntu)
 Importance: Medium
 Assignee: Guilherme G. Piccoli (gpiccoli)
 Status: Confirmed

** Affects: linux (Ubuntu Bionic)
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu Disco)
 Importance: Undecided
 Status: New

** Affects: linux (Ubuntu Eoan)
 Importance: Medium
 Assignee: Guilherme G. Piccoli (gpiccoli)
 Status: Confirmed


** Tags: sts

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836806

Title:
  Two crashes on raid0 error path (during a member device removal)

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Bionic:
  New
Status in linux source package in Disco:
  New
Status in linux source package in Eoan:
  Confirmed

Bug description:
  TBD

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836806/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836801] Status changed to Confirmed

2019-07-16 Thread Ubuntu Kernel Bot
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1836801

Title:
  BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

Status in linux package in Ubuntu:
  Confirmed
Status in linux-signed package in Ubuntu:
  New

Bug description:
  [Description]

  The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
  with the proposed kernel 4.4.0-155.182-generic will cause kernel
  trace[1]. However the wifi function works properly with the kernel
  4.4.0-154.181

  [Steps to Reproduce]
  1. Install ubuntu xenial, enable the proposed repository, and update the 
system with "sudo apt-get dist-upgrade"
  2. nmcli d wifi rescan
  3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
  4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

  [Expected Result]
  The AP is connected

  [Actual Result]
  You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

  Sometime the system hangs when connecting to a wifi AP.

  [More Information]

  [1] The kernel trace log
  hecking kernel ring buffer for brcmfmac messages:
  kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
  kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
  kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: 
renamed from wlan0
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]

  [Known Affected Platforms]

  Dell XPS 15 9550 (CID 201606-22346)

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-155-generic 4.4.0-155.182
  ProcVersionSignature: Ubuntu 4.4.0-155.182-generic 4.4.181
  Uname: Linux 4.4.0-155-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Date: Tue Jul 16 15:57:36 2019
  InstallationDate: Installed on 2018-01-11 (551 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  SourcePackage: linux-signed
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID A

[Kernel-packages] [Bug 1685794] Re: Boot delayed for about 90 seconds until 'random: crng init done'

2019-07-16 Thread sabby
Just to add more ubuntu/debian specific details because this includes a
kernel config options that was changed from vanilla kernel and that not
everyone may agree with and I had missed myself.

This seem to have started when crg_init was changed in the kernel to 1
to fix a CVE. This caused a change in behavior and after that fix when
calls to getrandom in the early boot were done it was now properly
blocking until it was securely initialized.

As described in this systemd discussion

https://github.com/systemd/systemd/issues/4167

This caused software that were calling getrandom without GRND_NONBLOCK
to now properly block. The problem is if any of those software did not
require this, e.g. they could use urandom instead or did not even need a
random number in the first place, and were called during the early boot
process they would cause the system to hang unnecessarily. This was what
happened with

"plymouth/fontconfig/libuuid (generating uuids requires randomness).
That specific UUID generation can be prevented, and util-linux 2.32
makes the getrandom call non-blocking."

which was fixed in util-linux 2.32 and was causing my long boot delay
before the login screen appeared. Now I was using 18.04 LTS which still
has util-linux 2.31 so the reason kernel 5.1.x was working when kernel
4.19 did not, was not because the source of the problem was really in
the kernel, it was because of this change in the ubuntu/debian kernel
that is not in the vanilla kernel

https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1823754

which sets CONFIG_RANDOM_TRUST_CPU=y instead of N on the vanilla kernel.
This kernel option was added in 4.19 by Theodore Ts'o and must have
landed somewhere in the ubuntu/debian kernel between 4.19 and 5.1

https://lwn.net/Articles/760121/

This is why a kernel who has CONFIG_RANDOM_TRUST_CPU=y and software that
wrongly call a blocking getrandom during boot time where crg_init is
still 1, i.e. random number generator is not fully initialized, does not
block if they have a CPU that support random number generation like many
modern CPU. Note that there is an associated boot option to change this
manually

random.trust_cpu=on/off

It seems like there might have been a time where the crg_init patch
landed and the CONFIG_RANDOM_TRUST_CPU=y was not there yet that may have
caused issues, but at least the state of the packages in 18.04 does not
have this problem for me. Nevertheless, while I will probably keep
CONFIG_RANDOM_TRUST_CPU=y I can see some hardware where this might not
be an appropriate default.

Therefore if someone wants to run with CONFIG_RANDOM_TRUST_CPU=N, and
util-linux < 2.32 or any other software that calls a blocking getrandom
at boot when it is not required, the only options left are software that
were suggested here like rng-tools and haveged to attempt to speed up
the kernel entropy generation.

In addition, to libuuid I also saw that the Bluetooth library may have
also at one point using wrongly a blocking getrandom call which seems to
be the problem of the original poster. However, I do not have this
library on this machine so I cannot verify but assume at some point that
library must have also been fixed down the line. Otherwise, any of the
fixes above would also work.

** Bug watch added: github.com/systemd/systemd/issues #4167
   https://github.com/systemd/systemd/issues/4167

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1685794

Title:
  Boot delayed for about 90 seconds until 'random: crng init done'

Status in linux package in Ubuntu:
  Confirmed
Status in broadcom-sta package in Debian:
  New

Bug description:

  Shortened dmesg output, notice the unnaturally long delay before crng
  init finishes:

  [8.533630] Bluetooth: hci0: Intel Bluetooth firmware patch completed and 
activated
  [8.542239] input: HDA Intel PCH Mic as 
/devices/pci:00/:00:1b.0/sound/card1/input18
  [8.542313] input: HDA Intel PCH Line as 
/devices/pci:00/:00:1b.0/sound/card1/input19
  [8.542382] input: HDA Intel PCH Dock Line Out as 
/devices/pci:00/:00:1b.0/sound/card1/input20
  [8.542449] input: HDA Intel PCH Headphone as 
/devices/pci:00/:00:1b.0/sound/card1/input21
  [8.544240] cdc_ether 2-6:2.0 usb0: register 'cdc_ether' at 
usb-:00:14.0-6, CDC Ethernet Device, 02:1e:10:1f:00:00
  [8.544271] usbcore: registered new interface driver cdc_ether
  [8.637660] ieee80211 phy0: Selected rate control algorithm 'iwl-mvm-rs'
  [8.654022] input: HP WMI hotkeys as /devices/virtual/input/input22
  [8.688226] cdc_ether 2-6:2.0 enp0s20u6c2: renamed from usb0
  [8.713288] iwlwifi :02:00.0 wlo1: renamed from wlan0
  [9.804308] input: ST LIS3LV02DL Accelerometer as 
/devices/platform/lis3lv02d/input/input23
  [   98.327857] random: crng init done
  [   98.330072] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
  [ 

[Kernel-packages] [Bug 1836801] RfKill.txt

2019-07-16 Thread Taihsiang Ho
apport information

** Attachment added: "RfKill.txt"
   https://bugs.launchpad.net/bugs/1836801/+attachment/5277507/+files/RfKill.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1836801

Title:
  BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

Status in linux package in Ubuntu:
  New
Status in linux-signed package in Ubuntu:
  New

Bug description:
  [Description]

  The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
  with the proposed kernel 4.4.0-155.182-generic will cause kernel
  trace[1]. However the wifi function works properly with the kernel
  4.4.0-154.181

  [Steps to Reproduce]
  1. Install ubuntu xenial, enable the proposed repository, and update the 
system with "sudo apt-get dist-upgrade"
  2. nmcli d wifi rescan
  3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
  4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

  [Expected Result]
  The AP is connected

  [Actual Result]
  You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

  Sometime the system hangs when connecting to a wifi AP.

  [More Information]

  [1] The kernel trace log
  hecking kernel ring buffer for brcmfmac messages:
  kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
  kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
  kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: 
renamed from wlan0
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]

  [Known Affected Platforms]

  Dell XPS 15 9550 (CID 201606-22346)

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-155-generic 4.4.0-155.182
  ProcVersionSignature: Ubuntu 4.4.0-155.182-generic 4.4.181
  Uname: Linux 4.4.0-155-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Date: Tue Jul 16 15:57:36 2019
  InstallationDate: Installed on 2018-01-11 (551 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  SourcePackage: linux-signed
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Audi

[Kernel-packages] [Bug 1836801] UdevDb.txt

2019-07-16 Thread Taihsiang Ho
apport information

** Attachment added: "UdevDb.txt"
   https://bugs.launchpad.net/bugs/1836801/+attachment/5277508/+files/UdevDb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1836801

Title:
  BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

Status in linux package in Ubuntu:
  New
Status in linux-signed package in Ubuntu:
  New

Bug description:
  [Description]

  The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
  with the proposed kernel 4.4.0-155.182-generic will cause kernel
  trace[1]. However the wifi function works properly with the kernel
  4.4.0-154.181

  [Steps to Reproduce]
  1. Install ubuntu xenial, enable the proposed repository, and update the 
system with "sudo apt-get dist-upgrade"
  2. nmcli d wifi rescan
  3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
  4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

  [Expected Result]
  The AP is connected

  [Actual Result]
  You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

  Sometime the system hangs when connecting to a wifi AP.

  [More Information]

  [1] The kernel trace log
  hecking kernel ring buffer for brcmfmac messages:
  kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
  kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
  kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: 
renamed from wlan0
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]

  [Known Affected Platforms]

  Dell XPS 15 9550 (CID 201606-22346)

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-155-generic 4.4.0-155.182
  ProcVersionSignature: Ubuntu 4.4.0-155.182-generic 4.4.181
  Uname: Linux 4.4.0-155-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Date: Tue Jul 16 15:57:36 2019
  InstallationDate: Installed on 2018-01-11 (551 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  SourcePackage: linux-signed
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Audi

[Kernel-packages] [Bug 1836801] WifiSyslog.txt

2019-07-16 Thread Taihsiang Ho
apport information

** Attachment added: "WifiSyslog.txt"
   
https://bugs.launchpad.net/bugs/1836801/+attachment/5277509/+files/WifiSyslog.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1836801

Title:
  BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

Status in linux package in Ubuntu:
  New
Status in linux-signed package in Ubuntu:
  New

Bug description:
  [Description]

  The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
  with the proposed kernel 4.4.0-155.182-generic will cause kernel
  trace[1]. However the wifi function works properly with the kernel
  4.4.0-154.181

  [Steps to Reproduce]
  1. Install ubuntu xenial, enable the proposed repository, and update the 
system with "sudo apt-get dist-upgrade"
  2. nmcli d wifi rescan
  3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
  4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

  [Expected Result]
  The AP is connected

  [Actual Result]
  You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

  Sometime the system hangs when connecting to a wifi AP.

  [More Information]

  [1] The kernel trace log
  hecking kernel ring buffer for brcmfmac messages:
  kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
  kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
  kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: 
renamed from wlan0
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]

  [Known Affected Platforms]

  Dell XPS 15 9550 (CID 201606-22346)

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-155-generic 4.4.0-155.182
  ProcVersionSignature: Ubuntu 4.4.0-155.182-generic 4.4.181
  Uname: Linux 4.4.0-155-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Date: Tue Jul 16 15:57:36 2019
  InstallationDate: Installed on 2018-01-11 (551 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  SourcePackage: linux-signed
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd

[Kernel-packages] [Bug 1836760] Re: ixgbe{vf} - Physical Function gets IRQ when VF checks link state

2019-07-16 Thread Guilherme G. Piccoli
SRU request was sent to kernel-team mailing list:
https://lists.ubuntu.com/archives/kernel-team/2019-July/102282.html

Cheers,


Guilherme

** Changed in: linux (Ubuntu Xenial)
   Status: Confirmed => In Progress

** Changed in: linux (Ubuntu Bionic)
   Status: Confirmed => In Progress

** Changed in: linux (Ubuntu Cosmic)
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836760

Title:
  ixgbe{vf} - Physical Function gets IRQ when VF checks link state

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Bionic:
  In Progress
Status in linux source package in Cosmic:
  Won't Fix
Status in linux source package in Disco:
  Confirmed
Status in linux source package in Eoan:
  Confirmed
Status in linux source package in FF-Series:
  Fix Released

Bug description:
  [Impact]

  * Intel NICs that are SR-IOV capable and are managed by ixgbe driver presents 
a potentially harmful behavior when the ixgbevf-managed VFs (Virtual Functions) 
perform an ethtool link check. The ixgbevf driver issues a mailbox command in 
the ethtool link state handler, which induces one IRQ in the PF (Physical 
Function) per link check.
   
  * This was reported as a sort of "denial-of-service" from a guest; due to 
some link check loop running inside a guest with PCI-PT of a ixgbevf-managed 
VF, the host received a huge amount of IRQs causing soft-lockups.
   
  * The patch proposed in this SRU request fix this behavior by relying in the 
saved link state (obtained in the ixgbevf's watchdog routine) instead of 
issuing a mailbox command to the PF in every link state check request. The 
commit is available on Linus tree: 1e1b0c658d9b ("ixgbevf: Use cached link 
state instead of re-reading the value for ethtool")
  http://git.kernel.org/linus/1e1b0c658d9b

  [Test case]

  Reproducing the behavior is pretty simple; having a machine with an
  Intel NIC managed by ixgbe, proceed with the following steps:

  a) Create one or more VFs
  (echo 1 > /sys/class/net//device/sriov_numvfs)

  b) In a different terminal, monitor the non-TxRx PF IRQs:
  (watch -n1 "cat /proc/interrupts | grep  | grep -v Tx")

  c) Run "ethtool " in a loop

  Without the hereby proposed patch, the PF IRQs will increase.

  [Regression potential]

  The patch scope is restricted to ixgbevf ethtool link-check procedure,
  and was developed by the vendor itself. Being a self-contained patch
  affecting only this driver's ethtool handler, the worst potential
  regression would be a wrong link state report.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836760/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836802] Re: Bionic update: upstream stable patchset 2019-07-16

2019-07-16 Thread Kamal Mostafa
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+    upstream stable patchset 2019-07-16
  
-upstream stable patchset 2019-07-16
-from git://git.kernel.org/
+ Ported from the following upstream stable releases:
+ v4.14.81, v4.18.19,
+ v4.14.82, v4.18.20
+ 
+    from git://git.kernel.org/
+ 
+ mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB
+ spi: bcm-qspi: switch back to reading flash using smaller chunks
+ bcache: trace missed reading by cache_missed
+ bcache: fix miss key refill->end in writeback
+ hwmon: (pmbus) Fix page count auto-detection.
+ jffs2: free jffs2_sb_info through jffs2_kill_sb()
+ cpufreq: conservative: Take limits changes into account properly
+ pcmcia: Implement CLKRUN protocol disabling for Ricoh bridges
+ parisc: Fix address in HPMC IVA
+ parisc: Fix map_pages() to not overwrite existing pte entries
+ parisc: Fix exported address of os_hpmc handler
+ ALSA: hda - Add quirk for ASUS G751 laptop
+ ALSA: hda - Fix headphone pin config for ASUS G751
+ ALSA: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905)
+ ALSA: ca0106: Disable IZD on SB0570 DAC to fix audio pops
+ x86/xen: Fix boot loader version reported for PVH guests
+ x86/corruption-check: Fix panic in memory_corruption_check() when boot option 
without value is provided
+ ARM: dts: exynos: Disable pull control for MAX8997 interrupts on Origen
+ bpf: do not blindly change rlimit in reuseport net selftest
+ Revert "perf tools: Fix PMU term format max value calculation"
+ xfrm: policy: use hlist rcu variants on insert
+ perf vendor events intel: Fix wrong filter_band* values for uncore events
+ sched/fair: Fix the min_vruntime update logic in dequeue_entity()
+ perf tools: Fix use of alternatives to find JDIR
+ perf cpu_map: Align cpu map synthesized events properly.
+ x86/fpu: Remove second definition of fpu in __fpu__restore_sig()
+ net: qla3xxx: Remove overflowing shift statement
+ selftests: ftrace: Add synthetic event syntax testcase
+ i2c: rcar: cleanup DMA for all kinds of failure
+ locking/lockdep: Fix debug_locks off performance problem
+ ataflop: fix error handling during setup
+ swim: fix cleanup on setup error
+ nfp: devlink port split support for 1x100G CXP NIC
+ tun: Consistently configure generic netdev params via rtnetlink
+ s390/sthyi: Fix machine name validity indication
+ hwmon: (pwm-fan) Set fan speed to 0 on suspend
+ lightnvm: pblk: fix two sleep-in-atomic-context bugs
+ spi: spi-ep93xx: Use dma_data_direction for ep93xx_spi_dma_{finish,prepare}
+ perf tools: Free temporary 'sys' string in read_event_files()
+ perf tools: Cleanup trace-event-info 'tdata' leak
+ perf strbuf: Match va_{add,copy} with va_end
+ cpupower: Fix coredump on VMWare
+ mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev 0x8620 rev 0x01
+ iwlwifi: pcie: avoid empty free RB queue
+ iwlwifi: mvm: clear HW_RESTART_REQUESTED when stopping the interface
+ x86/olpc: Indicate that legacy PC XO-1 platform should not register RTC
+ ACPI / processor: Fix the return value of acpi_processor_ids_walk()
+ cpufreq: dt: Try freeing static OPPs only if we have added them
+ mtd: rawnand: atmel: Fix potential NULL pointer dereference
+ signal: Introduce COMPAT_SIGMINSTKSZ for use in compat_sys_sigaltstack
+ Bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth
+ x86: boot: Fix EFI stub alignment
+ pinctrl: qcom: spmi-mpp: Fix err handling of pmic_mpp_set_mux
+ brcmfmac: fix for proper support of 160MHz bandwidth
+ net: phy: phylink: ensure the carrier is off when starting phylink
+ block, bfq: correctly charge and reset entity service in all cases
+ kprobes: Return error if we fail to reuse kprobe instead of BUG_ON()
+ ACPI / LPSS: Add alternative ACPI HIDs for Cherry Trail DMA controllers
+ pinctrl: qcom: spmi-mpp: Fix drive strength setting
+ pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be compliant
+ pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be compliant
+ net: dsa: mv88e6xxx: Fix writing to a PHY page.
+ iwlwifi: mvm: fix BAR seq ctrl reporting
+ ixgbevf:

[Kernel-packages] [Bug 1836801] Lsusb.txt

2019-07-16 Thread Taihsiang Ho
apport information

** Attachment added: "Lsusb.txt"
   https://bugs.launchpad.net/bugs/1836801/+attachment/5277500/+files/Lsusb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1836801

Title:
  BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

Status in linux package in Ubuntu:
  New
Status in linux-signed package in Ubuntu:
  New

Bug description:
  [Description]

  The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
  with the proposed kernel 4.4.0-155.182-generic will cause kernel
  trace[1]. However the wifi function works properly with the kernel
  4.4.0-154.181

  [Steps to Reproduce]
  1. Install ubuntu xenial, enable the proposed repository, and update the 
system with "sudo apt-get dist-upgrade"
  2. nmcli d wifi rescan
  3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
  4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

  [Expected Result]
  The AP is connected

  [Actual Result]
  You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

  Sometime the system hangs when connecting to a wifi AP.

  [More Information]

  [1] The kernel trace log
  hecking kernel ring buffer for brcmfmac messages:
  kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
  kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
  kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: 
renamed from wlan0
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]

  [Known Affected Platforms]

  Dell XPS 15 9550 (CID 201606-22346)

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-155-generic 4.4.0-155.182
  ProcVersionSignature: Ubuntu 4.4.0-155.182-generic 4.4.181
  Uname: Linux 4.4.0-155-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Date: Tue Jul 16 15:57:36 2019
  InstallationDate: Installed on 2018-01-11 (551 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  SourcePackage: linux-signed
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  AudioD

[Kernel-packages] [Bug 1836801] CurrentDmesg.txt

2019-07-16 Thread Taihsiang Ho
apport information

** Attachment added: "CurrentDmesg.txt"
   
https://bugs.launchpad.net/bugs/1836801/+attachment/5277497/+files/CurrentDmesg.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1836801

Title:
  BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

Status in linux package in Ubuntu:
  New
Status in linux-signed package in Ubuntu:
  New

Bug description:
  [Description]

  The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
  with the proposed kernel 4.4.0-155.182-generic will cause kernel
  trace[1]. However the wifi function works properly with the kernel
  4.4.0-154.181

  [Steps to Reproduce]
  1. Install ubuntu xenial, enable the proposed repository, and update the 
system with "sudo apt-get dist-upgrade"
  2. nmcli d wifi rescan
  3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
  4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

  [Expected Result]
  The AP is connected

  [Actual Result]
  You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

  Sometime the system hangs when connecting to a wifi AP.

  [More Information]

  [1] The kernel trace log
  hecking kernel ring buffer for brcmfmac messages:
  kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
  kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
  kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: 
renamed from wlan0
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]

  [Known Affected Platforms]

  Dell XPS 15 9550 (CID 201606-22346)

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-155-generic 4.4.0-155.182
  ProcVersionSignature: Ubuntu 4.4.0-155.182-generic 4.4.181
  Uname: Linux 4.4.0-155-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Date: Tue Jul 16 15:57:36 2019
  InstallationDate: Installed on 2018-01-11 (551 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  SourcePackage: linux-signed
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture:

[Kernel-packages] [Bug 1836801] ProcModules.txt

2019-07-16 Thread Taihsiang Ho
apport information

** Attachment added: "ProcModules.txt"
   
https://bugs.launchpad.net/bugs/1836801/+attachment/5277505/+files/ProcModules.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1836801

Title:
  BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

Status in linux package in Ubuntu:
  New
Status in linux-signed package in Ubuntu:
  New

Bug description:
  [Description]

  The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
  with the proposed kernel 4.4.0-155.182-generic will cause kernel
  trace[1]. However the wifi function works properly with the kernel
  4.4.0-154.181

  [Steps to Reproduce]
  1. Install ubuntu xenial, enable the proposed repository, and update the 
system with "sudo apt-get dist-upgrade"
  2. nmcli d wifi rescan
  3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
  4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

  [Expected Result]
  The AP is connected

  [Actual Result]
  You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

  Sometime the system hangs when connecting to a wifi AP.

  [More Information]

  [1] The kernel trace log
  hecking kernel ring buffer for brcmfmac messages:
  kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
  kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
  kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: 
renamed from wlan0
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]

  [Known Affected Platforms]

  Dell XPS 15 9550 (CID 201606-22346)

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-155-generic 4.4.0-155.182
  ProcVersionSignature: Ubuntu 4.4.0-155.182-generic 4.4.181
  Uname: Linux 4.4.0-155-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Date: Tue Jul 16 15:57:36 2019
  InstallationDate: Installed on 2018-01-11 (551 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  SourcePackage: linux-signed
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: a

[Kernel-packages] [Bug 1836801] ProcCpuinfoMinimal.txt

2019-07-16 Thread Taihsiang Ho
apport information

** Attachment added: "ProcCpuinfoMinimal.txt"
   
https://bugs.launchpad.net/bugs/1836801/+attachment/5277502/+files/ProcCpuinfoMinimal.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1836801

Title:
  BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

Status in linux package in Ubuntu:
  New
Status in linux-signed package in Ubuntu:
  New

Bug description:
  [Description]

  The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
  with the proposed kernel 4.4.0-155.182-generic will cause kernel
  trace[1]. However the wifi function works properly with the kernel
  4.4.0-154.181

  [Steps to Reproduce]
  1. Install ubuntu xenial, enable the proposed repository, and update the 
system with "sudo apt-get dist-upgrade"
  2. nmcli d wifi rescan
  3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
  4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

  [Expected Result]
  The AP is connected

  [Actual Result]
  You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

  Sometime the system hangs when connecting to a wifi AP.

  [More Information]

  [1] The kernel trace log
  hecking kernel ring buffer for brcmfmac messages:
  kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
  kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
  kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: 
renamed from wlan0
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]

  [Known Affected Platforms]

  Dell XPS 15 9550 (CID 201606-22346)

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-155-generic 4.4.0-155.182
  ProcVersionSignature: Ubuntu 4.4.0-155.182-generic 4.4.181
  Uname: Linux 4.4.0-155-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Date: Tue Jul 16 15:57:36 2019
  InstallationDate: Installed on 2018-01-11 (551 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  SourcePackage: linux-signed
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.20.1-0ubuntu2.19
  A

[Kernel-packages] [Bug 1836801] ProcCpuinfo.txt

2019-07-16 Thread Taihsiang Ho
apport information

** Attachment added: "ProcCpuinfo.txt"
   
https://bugs.launchpad.net/bugs/1836801/+attachment/5277501/+files/ProcCpuinfo.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1836801

Title:
  BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

Status in linux package in Ubuntu:
  New
Status in linux-signed package in Ubuntu:
  New

Bug description:
  [Description]

  The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
  with the proposed kernel 4.4.0-155.182-generic will cause kernel
  trace[1]. However the wifi function works properly with the kernel
  4.4.0-154.181

  [Steps to Reproduce]
  1. Install ubuntu xenial, enable the proposed repository, and update the 
system with "sudo apt-get dist-upgrade"
  2. nmcli d wifi rescan
  3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
  4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

  [Expected Result]
  The AP is connected

  [Actual Result]
  You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

  Sometime the system hangs when connecting to a wifi AP.

  [More Information]

  [1] The kernel trace log
  hecking kernel ring buffer for brcmfmac messages:
  kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
  kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
  kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: 
renamed from wlan0
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]

  [Known Affected Platforms]

  Dell XPS 15 9550 (CID 201606-22346)

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-155-generic 4.4.0-155.182
  ProcVersionSignature: Ubuntu 4.4.0-155.182-generic 4.4.181
  Uname: Linux 4.4.0-155-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Date: Tue Jul 16 15:57:36 2019
  InstallationDate: Installed on 2018-01-11 (551 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  SourcePackage: linux-signed
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: a

[Kernel-packages] [Bug 1836801] IwConfig.txt

2019-07-16 Thread Taihsiang Ho
apport information

** Attachment added: "IwConfig.txt"
   
https://bugs.launchpad.net/bugs/1836801/+attachment/5277498/+files/IwConfig.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1836801

Title:
  BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

Status in linux package in Ubuntu:
  New
Status in linux-signed package in Ubuntu:
  New

Bug description:
  [Description]

  The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
  with the proposed kernel 4.4.0-155.182-generic will cause kernel
  trace[1]. However the wifi function works properly with the kernel
  4.4.0-154.181

  [Steps to Reproduce]
  1. Install ubuntu xenial, enable the proposed repository, and update the 
system with "sudo apt-get dist-upgrade"
  2. nmcli d wifi rescan
  3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
  4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

  [Expected Result]
  The AP is connected

  [Actual Result]
  You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

  Sometime the system hangs when connecting to a wifi AP.

  [More Information]

  [1] The kernel trace log
  hecking kernel ring buffer for brcmfmac messages:
  kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
  kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
  kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: 
renamed from wlan0
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]

  [Known Affected Platforms]

  Dell XPS 15 9550 (CID 201606-22346)

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-155-generic 4.4.0-155.182
  ProcVersionSignature: Ubuntu 4.4.0-155.182-generic 4.4.181
  Uname: Linux 4.4.0-155-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Date: Tue Jul 16 15:57:36 2019
  InstallationDate: Installed on 2018-01-11 (551 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  SourcePackage: linux-signed
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
 

[Kernel-packages] [Bug 1836801] ProcEnviron.txt

2019-07-16 Thread Taihsiang Ho
apport information

** Attachment added: "ProcEnviron.txt"
   
https://bugs.launchpad.net/bugs/1836801/+attachment/5277503/+files/ProcEnviron.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1836801

Title:
  BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

Status in linux package in Ubuntu:
  New
Status in linux-signed package in Ubuntu:
  New

Bug description:
  [Description]

  The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
  with the proposed kernel 4.4.0-155.182-generic will cause kernel
  trace[1]. However the wifi function works properly with the kernel
  4.4.0-154.181

  [Steps to Reproduce]
  1. Install ubuntu xenial, enable the proposed repository, and update the 
system with "sudo apt-get dist-upgrade"
  2. nmcli d wifi rescan
  3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
  4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

  [Expected Result]
  The AP is connected

  [Actual Result]
  You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

  Sometime the system hangs when connecting to a wifi AP.

  [More Information]

  [1] The kernel trace log
  hecking kernel ring buffer for brcmfmac messages:
  kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
  kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
  kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: 
renamed from wlan0
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]

  [Known Affected Platforms]

  Dell XPS 15 9550 (CID 201606-22346)

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-155-generic 4.4.0-155.182
  ProcVersionSignature: Ubuntu 4.4.0-155.182-generic 4.4.181
  Uname: Linux 4.4.0-155-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Date: Tue Jul 16 15:57:36 2019
  InstallationDate: Installed on 2018-01-11 (551 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  SourcePackage: linux-signed
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: a

[Kernel-packages] [Bug 1836801] CRDA.txt

2019-07-16 Thread Taihsiang Ho
apport information

** Attachment added: "CRDA.txt"
   https://bugs.launchpad.net/bugs/1836801/+attachment/5277496/+files/CRDA.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1836801

Title:
  BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

Status in linux package in Ubuntu:
  New
Status in linux-signed package in Ubuntu:
  New

Bug description:
  [Description]

  The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
  with the proposed kernel 4.4.0-155.182-generic will cause kernel
  trace[1]. However the wifi function works properly with the kernel
  4.4.0-154.181

  [Steps to Reproduce]
  1. Install ubuntu xenial, enable the proposed repository, and update the 
system with "sudo apt-get dist-upgrade"
  2. nmcli d wifi rescan
  3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
  4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

  [Expected Result]
  The AP is connected

  [Actual Result]
  You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

  Sometime the system hangs when connecting to a wifi AP.

  [More Information]

  [1] The kernel trace log
  hecking kernel ring buffer for brcmfmac messages:
  kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
  kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
  kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: 
renamed from wlan0
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]

  [Known Affected Platforms]

  Dell XPS 15 9550 (CID 201606-22346)

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-155-generic 4.4.0-155.182
  ProcVersionSignature: Ubuntu 4.4.0-155.182-generic 4.4.181
  Uname: Linux 4.4.0-155-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Date: Tue Jul 16 15:57:36 2019
  InstallationDate: Installed on 2018-01-11 (551 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  SourcePackage: linux-signed
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  AudioDev

[Kernel-packages] [Bug 1836801] [NEW] BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

2019-07-16 Thread Taihsiang Ho
Public bug reported:

[Description]

The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
with the proposed kernel 4.4.0-155.182-generic will cause kernel
trace[1]. However the wifi function works properly with the kernel
4.4.0-154.181

[Steps to Reproduce]
1. Install ubuntu xenial, enable the proposed repository, and update the system 
with "sudo apt-get dist-upgrade"
2. nmcli d wifi rescan
3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

[Expected Result]
The AP is connected

[Actual Result]
You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

Sometime the system hangs when connecting to a wifi AP.

[More Information]

[1] The kernel trace log
hecking kernel ring buffer for brcmfmac messages:
kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: renamed 
from wlan0
kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
 aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
 videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
 aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
 videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]

[Known Affected Platforms]

Dell XPS 15 9550 (CID 201606-22346)

ProblemType: Bug
DistroRelease: Ubuntu 16.04
Package: linux-image-4.4.0-155-generic 4.4.0-155.182
ProcVersionSignature: Ubuntu 4.4.0-155.182-generic 4.4.181
Uname: Linux 4.4.0-155-generic x86_64
ApportVersion: 2.20.1-0ubuntu2.19
Architecture: amd64
Date: Tue Jul 16 15:57:36 2019
InstallationDate: Installed on 2018-01-11 (551 days ago)
InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 (20160420.1)
SourcePackage: linux-signed
UpgradeStatus: No upgrade log present (probably fresh install)
--- 
ApportVersion: 2.20.1-0ubuntu2.19
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC0:  ubuntu 1756 F pulseaudio
DistroRelease: Ubuntu 16.04
HibernationDevice: RESUME=UUID=d93551ad-a8f2-44f5-93ad-2ff3a972a488
InstallationDate: Installed on 2018-01-11 (551 days ago)
InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 (20160420.1)
MachineType: Dell Inc. XPS 15 9550
Package: linux-signed
ProcFB: 0 inteldrmfb
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-155-generic 
root=UUID=97caa0b1-7590-4cb2-8da8-d6a8af773f58 ro
ProcVersionSignature: Ubuntu 4.4.0-155.182-ge

[Kernel-packages] [Bug 1836801] AlsaInfo.txt

2019-07-16 Thread Taihsiang Ho
apport information

** Attachment added: "AlsaInfo.txt"
   
https://bugs.launchpad.net/bugs/1836801/+attachment/5277495/+files/AlsaInfo.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1836801

Title:
  BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

Status in linux package in Ubuntu:
  New
Status in linux-signed package in Ubuntu:
  New

Bug description:
  [Description]

  The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
  with the proposed kernel 4.4.0-155.182-generic will cause kernel
  trace[1]. However the wifi function works properly with the kernel
  4.4.0-154.181

  [Steps to Reproduce]
  1. Install ubuntu xenial, enable the proposed repository, and update the 
system with "sudo apt-get dist-upgrade"
  2. nmcli d wifi rescan
  3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
  4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

  [Expected Result]
  The AP is connected

  [Actual Result]
  You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

  Sometime the system hangs when connecting to a wifi AP.

  [More Information]

  [1] The kernel trace log
  hecking kernel ring buffer for brcmfmac messages:
  kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
  kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
  kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: 
renamed from wlan0
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]

  [Known Affected Platforms]

  Dell XPS 15 9550 (CID 201606-22346)

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-155-generic 4.4.0-155.182
  ProcVersionSignature: Ubuntu 4.4.0-155.182-generic 4.4.181
  Uname: Linux 4.4.0-155-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Date: Tue Jul 16 15:57:36 2019
  InstallationDate: Installed on 2018-01-11 (551 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  SourcePackage: linux-signed
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
 

[Kernel-packages] [Bug 1836801] ProcInterrupts.txt

2019-07-16 Thread Taihsiang Ho
apport information

** Attachment added: "ProcInterrupts.txt"
   
https://bugs.launchpad.net/bugs/1836801/+attachment/5277504/+files/ProcInterrupts.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1836801

Title:
  BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

Status in linux package in Ubuntu:
  New
Status in linux-signed package in Ubuntu:
  New

Bug description:
  [Description]

  The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
  with the proposed kernel 4.4.0-155.182-generic will cause kernel
  trace[1]. However the wifi function works properly with the kernel
  4.4.0-154.181

  [Steps to Reproduce]
  1. Install ubuntu xenial, enable the proposed repository, and update the 
system with "sudo apt-get dist-upgrade"
  2. nmcli d wifi rescan
  3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
  4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

  [Expected Result]
  The AP is connected

  [Actual Result]
  You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

  Sometime the system hangs when connecting to a wifi AP.

  [More Information]

  [1] The kernel trace log
  hecking kernel ring buffer for brcmfmac messages:
  kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
  kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
  kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: 
renamed from wlan0
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]

  [Known Affected Platforms]

  Dell XPS 15 9550 (CID 201606-22346)

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-155-generic 4.4.0-155.182
  ProcVersionSignature: Ubuntu 4.4.0-155.182-generic 4.4.181
  Uname: Linux 4.4.0-155-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Date: Tue Jul 16 15:57:36 2019
  InstallationDate: Installed on 2018-01-11 (551 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  SourcePackage: linux-signed
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.20.1-0ubuntu2.19
  Architect

[Kernel-packages] [Bug 1836801] Lspci.txt

2019-07-16 Thread Taihsiang Ho
apport information

** Attachment added: "Lspci.txt"
   https://bugs.launchpad.net/bugs/1836801/+attachment/5277499/+files/Lspci.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1836801

Title:
  BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

Status in linux package in Ubuntu:
  New
Status in linux-signed package in Ubuntu:
  New

Bug description:
  [Description]

  The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
  with the proposed kernel 4.4.0-155.182-generic will cause kernel
  trace[1]. However the wifi function works properly with the kernel
  4.4.0-154.181

  [Steps to Reproduce]
  1. Install ubuntu xenial, enable the proposed repository, and update the 
system with "sudo apt-get dist-upgrade"
  2. nmcli d wifi rescan
  3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
  4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

  [Expected Result]
  The AP is connected

  [Actual Result]
  You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

  Sometime the system hangs when connecting to a wifi AP.

  [More Information]

  [1] The kernel trace log
  hecking kernel ring buffer for brcmfmac messages:
  kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
  kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
  kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: 
renamed from wlan0
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]

  [Known Affected Platforms]

  Dell XPS 15 9550 (CID 201606-22346)

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-155-generic 4.4.0-155.182
  ProcVersionSignature: Ubuntu 4.4.0-155.182-generic 4.4.181
  Uname: Linux 4.4.0-155-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Date: Tue Jul 16 15:57:36 2019
  InstallationDate: Installed on 2018-01-11 (551 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  SourcePackage: linux-signed
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  AudioD

[Kernel-packages] [Bug 1836801] PulseList.txt

2019-07-16 Thread Taihsiang Ho
apport information

** Attachment added: "PulseList.txt"
   
https://bugs.launchpad.net/bugs/1836801/+attachment/5277506/+files/PulseList.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1836801

Title:
  BCM43602 802.11ac Wireless regression - PCI ID 14e4:43ba

Status in linux package in Ubuntu:
  New
Status in linux-signed package in Ubuntu:
  New

Bug description:
  [Description]

  The wifi device BCM43602 802.11ac Wireless (PCI ID 14e4:43ba) running
  with the proposed kernel 4.4.0-155.182-generic will cause kernel
  trace[1]. However the wifi function works properly with the kernel
  4.4.0-154.181

  [Steps to Reproduce]
  1. Install ubuntu xenial, enable the proposed repository, and update the 
system with "sudo apt-get dist-upgrade"
  2. nmcli d wifi rescan
  3. nmcli -t -f SSID,CHAN,FREQ,SIGNAL d wifi list ifname wlp2s0 (if your wifi 
interface is wlp2s0), you will see the available SSIDs in your environment.
  4. nmcli d wifi connect  ifname wlp2s0 name TEST_CON

  [Expected Result]
  The AP is connected

  [Actual Result]
  You will get the message: "Error: Connection activation failed: (5) IP 
configuration could not be reserved (no available address, timeout, etc.)." and 
the kernel trace from /var/log/syslog[1]

  Sometime the system hangs when connecting to a wifi AP.

  [More Information]

  [1] The kernel trace log
  hecking kernel ring buffer for brcmfmac messages:
  kern  :info  : [Tue Jul 16 09:58:34 2019] usbcore: registered new interface 
driver brcmfmac
  kern  :warn  : [Tue Jul 16 09:58:34 2019] brcmfmac :02:00.0: Direct 
firmware load for brcm/brcmfmac43602-pcie.txt failed with error -2
  kern  :info  : [Tue Jul 16 09:58:35 2019] brcmfmac :02:00.0 wlp2s0: 
renamed from wlan0
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019] Modules linked in: rfcomm bnep 
snd_hda_codec_hdmi dell_led snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_codec i2c_designware_platform i2c_designware_core 
snd_hda_core snd_hwd
  ep snd_pcm dell_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp 
kvm_intel snd_seq_midi dell_laptop kvm irqbypass crct10dif_pclmul crc32_pclmul 
dcdbas ghash_clmulni_intel snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device
   aesni_intel snd_timer aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd 
snd input_leds joydev soundcore serio_raw brcmfmac cdc_ether rtsx_pci_ms 
brcmutil usbnet memstick btusb btrtl uvcvideo btbcm cfg80211 videobuf2_vmalloc 
btintel
   videobuf2_memops r8152 bluetooth mii videobuf2_v4l2 idma64 virt_dma 
videobuf2_core mei_me v4l2_common intel_lpss_pci intel_lpss
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_netif_rx+0x73/0xa0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_msgbuf_process_rx+0x142/0x5f0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_proto_msgbuf_rx_trigger+0x31/0xe0 [brcmfmac]
  kern  :warn  : [Tue Jul 16 10:08:01 2019]  [] 
brcmf_pcie_isr_thread_v2+0x17a/0x1e0 [brcmfmac]

  [Known Affected Platforms]

  Dell XPS 15 9550 (CID 201606-22346)

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-155-generic 4.4.0-155.182
  ProcVersionSignature: Ubuntu 4.4.0-155.182-generic 4.4.181
  Uname: Linux 4.4.0-155-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64
  Date: Tue Jul 16 15:57:36 2019
  InstallationDate: Installed on 2018-01-11 (551 days ago)
  InstallationMedia: Ubuntu 16.04 LTS "Xenial Xerus" - Release amd64 
(20160420.1)
  SourcePackage: linux-signed
  UpgradeStatus: No upgrade log present (probably fresh install)
  --- 
  ApportVersion: 2.20.1-0ubuntu2.19
  Architecture: amd64

[Kernel-packages] [Bug 1836802] [NEW] Bionic update: upstream stable patchset 2019-07-16

2019-07-16 Thread Kamal Mostafa
Public bug reported:

SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   upstream stable patchset 2019-07-16

Ported from the following upstream stable releases:
v4.14.81, v4.18.19,
v4.14.82, v4.18.20

   from git://git.kernel.org/

mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB
spi: bcm-qspi: switch back to reading flash using smaller chunks
bcache: trace missed reading by cache_missed
bcache: fix miss key refill->end in writeback
hwmon: (pmbus) Fix page count auto-detection.
jffs2: free jffs2_sb_info through jffs2_kill_sb()
cpufreq: conservative: Take limits changes into account properly
pcmcia: Implement CLKRUN protocol disabling for Ricoh bridges
parisc: Fix address in HPMC IVA
parisc: Fix map_pages() to not overwrite existing pte entries
parisc: Fix exported address of os_hpmc handler
ALSA: hda - Add quirk for ASUS G751 laptop
ALSA: hda - Fix headphone pin config for ASUS G751
ALSA: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905)
ALSA: ca0106: Disable IZD on SB0570 DAC to fix audio pops
x86/xen: Fix boot loader version reported for PVH guests
x86/corruption-check: Fix panic in memory_corruption_check() when boot option 
without value is provided
ARM: dts: exynos: Disable pull control for MAX8997 interrupts on Origen
bpf: do not blindly change rlimit in reuseport net selftest
Revert "perf tools: Fix PMU term format max value calculation"
xfrm: policy: use hlist rcu variants on insert
perf vendor events intel: Fix wrong filter_band* values for uncore events
sched/fair: Fix the min_vruntime update logic in dequeue_entity()
perf tools: Fix use of alternatives to find JDIR
perf cpu_map: Align cpu map synthesized events properly.
x86/fpu: Remove second definition of fpu in __fpu__restore_sig()
net: qla3xxx: Remove overflowing shift statement
selftests: ftrace: Add synthetic event syntax testcase
i2c: rcar: cleanup DMA for all kinds of failure
locking/lockdep: Fix debug_locks off performance problem
ataflop: fix error handling during setup
swim: fix cleanup on setup error
nfp: devlink port split support for 1x100G CXP NIC
tun: Consistently configure generic netdev params via rtnetlink
s390/sthyi: Fix machine name validity indication
hwmon: (pwm-fan) Set fan speed to 0 on suspend
lightnvm: pblk: fix two sleep-in-atomic-context bugs
spi: spi-ep93xx: Use dma_data_direction for ep93xx_spi_dma_{finish,prepare}
perf tools: Free temporary 'sys' string in read_event_files()
perf tools: Cleanup trace-event-info 'tdata' leak
perf strbuf: Match va_{add,copy} with va_end
cpupower: Fix coredump on VMWare
mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev 0x8620 rev 0x01
iwlwifi: pcie: avoid empty free RB queue
iwlwifi: mvm: clear HW_RESTART_REQUESTED when stopping the interface
x86/olpc: Indicate that legacy PC XO-1 platform should not register RTC
ACPI / processor: Fix the return value of acpi_processor_ids_walk()
cpufreq: dt: Try freeing static OPPs only if we have added them
mtd: rawnand: atmel: Fix potential NULL pointer dereference
signal: Introduce COMPAT_SIGMINSTKSZ for use in compat_sys_sigaltstack
Bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth
x86: boot: Fix EFI stub alignment
pinctrl: qcom: spmi-mpp: Fix err handling of pmic_mpp_set_mux
brcmfmac: fix for proper support of 160MHz bandwidth
net: phy: phylink: ensure the carrier is off when starting phylink
block, bfq: correctly charge and reset entity service in all cases
kprobes: Return error if we fail to reuse kprobe instead of BUG_ON()
ACPI / LPSS: Add alternative ACPI HIDs for Cherry Trail DMA controllers
pinctrl: qcom: spmi-mpp: Fix drive strength setting
pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be compliant
pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be compliant
net: dsa: mv88e6xxx: Fix writing to a PHY page.
iwlwifi: mvm: fix BAR seq ctrl reporting
ixgbevf: VF2VF TCP RSS
ath10k: schedule hardware restart if WMI command times out
thermal: da9062/61: Prevent hardware access during system suspend
cgroup, netclassid: add a preemption point to write_classid
scsi: esp_scsi: Track residual for PIO transfers
UAPI: ndctl: Fix g++-unsupported initialisation in headers
KVM: nVMX: Clear reserved bits of #DB exit qualification
scsi: megaraid_sas: fix a missing-check bug
RDMA/core: Do not expose unsupported counters
IB/ipoib: Clear IPCB before icmp_send
RDMA/bnxt_re: Fix recursive lock warning in debug kernel
usb: host: ohci-at91: fix request of irq for optional gpio
PCI: mediatek: Fix mtk_pcie_find_port() endpoint/port matching logic
tpm: suppress transmit cmd error lo

[Kernel-packages] [Bug 1828495] Autopkgtest regression report (qemu/1:2.11+dfsg-1ubuntu7.16)

2019-07-16 Thread Łukasz Zemczak
All autopkgtests for the newly accepted qemu (1:2.11+dfsg-1ubuntu7.16) for 
bionic have finished running.
There have been regressions in tests triggered by the package. Please visit the 
sru report page and investigate the failures.

https://people.canonical.com/~ubuntu-archive/pending-sru.html#bionic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1828495

Title:
  [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

Status in intel:
  New
Status in libvirt package in Ubuntu:
  Fix Released
Status in linux package in Ubuntu:
  In Progress
Status in qemu package in Ubuntu:
  Fix Released
Status in libvirt source package in Bionic:
  Confirmed
Status in linux source package in Bionic:
  Confirmed
Status in qemu source package in Bionic:
  Fix Committed
Status in libvirt source package in Cosmic:
  Won't Fix
Status in linux source package in Cosmic:
  Won't Fix
Status in qemu source package in Cosmic:
  Won't Fix
Status in libvirt source package in Disco:
  Confirmed
Status in linux source package in Disco:
  Confirmed
Status in qemu source package in Disco:
  Fix Committed
Status in libvirt source package in Eoan:
  Fix Released
Status in linux source package in Eoan:
  In Progress
Status in qemu source package in Eoan:
  Fix Released

Bug description:
  [Impact]

   * QEMU does not support IceLake and CascadeLake CPUs specific features.
   * Most important feature to be supported is: IA32_ARCH_CAPABILITIES MSR.
   * With IA32_ARCH_CAPABILITIES, QEMU is able to advertise HW mitigations:
 - Rogue Data Cache Load
 - Enhanced IBRS
 - RSB Alternate
 - L1D flush need on VMENTRY
 - speculative Store Bypass
 to guests, as described in document:
 Intel 336996-Speculative-Execution-Side-Channel-Mitigations.pdf

  [Test Case]

   * From Original Description:

  """
  1. Boot up guest using: -cpu Cascadelake-Server

  [root@clx-2s2 yexin]# qemu-system-x86_64 -accel kvm -drive
  if=virtio,id=hd,file=/home/x/x,format=qcow2  -m 4096 -smp 4 -cpu
  Cascadelake-Server -serial stdio

  char device redirected to /dev/pts/3 (label serial0)

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  2. To check CPU ID related to features[FEAT_7_0_EDX]
  :CPUID_7_0_EDX_ARCH_CAPABILITIES

  Expected Result: Both host and guest's CPUID.07H EDX bit 29 should be
  1.

  Actual Result:

  Host's cpuid: 0x0007 0x00: eax=0x ebx=0xd39b
  ecx=0x0818 edx=0xbc00  (EDX bit 29=1)

  Guest's cpuid : 0x0007 0x00: eax=0x ebx=0xd19f0fb9
  ecx=0x0818 edx=0x8400 (EDX bit 29=0)

  Commit:2bdb76c015df7125783d8394d6339d181cb5bc30

  Target Kerned: 5.1
  Target Release: 19.10

  """

  [Regression Potential]

   * Most changes are related to CPU type definitions and its supported
  features. They are all based in upstream changes but, for obvious
  reasons, backporting and/or cherry-picking those could bring issues.
  Biggest concern is breaking something that currently works. Right now,
  the parts being changed that could affect other CPU types would be
  related to a small refactoring of how the features are organized, and
  that would be seen right away when trying to start a new VM after the
  package is installed.

   * Other tests, related to the features being backported, are being
  done by our KVM regression tests, including migration combinations, to
  reduce chances that a regression is introduced.

  [Other Info]
   
   * N/A

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1828495/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836630] Re: System76 Oryx Pro (oryp5) with 5.0.0-21: Fail to resume from suspend

2019-07-16 Thread Jeremy Soller
I have tested a kernel with _only_
6c6bc1aee6a61fe7a98196794735849286761a4a "PCI: PM: Skip devices in D0
for suspend-to-idle" reverted. That appears to fix all issues with
suspend on this system. I am now attempting to find a minimal patch for
restoring functionality.

** Also affects: linux via
   https://bugzilla.kernel.org/show_bug.cgi?id=204187
   Importance: Unknown
   Status: Unknown

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836630

Title:
  System76 Oryx Pro (oryp5) with 5.0.0-21: Fail to resume from suspend

Status in Linux:
  Unknown
Status in linux package in Ubuntu:
  Confirmed
Status in linux-hwe-edge package in Ubuntu:
  Confirmed

Bug description:
  After upgrading the Ubuntu kernel to version 5.0.0-21, the System76
  Oryx Pro (oryp5) fails to resume from suspend when using discrete
  NVIDIA graphics

  The issue can be created on this hardware by following these steps:
  - Install Ubuntu 18.04.2
  - Add the proposed updates: https://wiki.ubuntu.com/Testing/EnableProposed
  - Upgrade:
sudo apt-get updatesudo apt-get dist-upgrade
  - Install 5.0 HWE kernel:
sudo apt-get install linux-generic-hwe-18.04-edge
  - Install NVIDIA driver:
sudo apt-get install nvidia-driver-430
  - Reboot:
sudo reboot
  - Attempt suspend/resume cycle

  This occurred after upgrading the kernel from version 5.0.0-20.
  --- 
  ProblemType: Bug
  ApportVersion: 2.20.9-0ubuntu7.7
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  system76   1721 F pulseaudio
   /dev/snd/controlC0:  system76   1721 F pulseaudio
  CurrentDesktop: ubuntu:GNOME
  DistroRelease: Ubuntu 18.04
  MachineType: System76 Oryx Pro
  NonfreeKernelModules: nvidia_modeset nvidia
  Package: linux-hwe-edge
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.0.0-21-generic 
root=UUID=10b5d457-8884-4b50-bd82-9b38e7f36564 ro
  ProcVersionSignature: Ubuntu 5.0.0-21.22~18.04.1-generic 5.0.15
  RelatedPackageVersions:
   linux-restricted-modules-5.0.0-21-generic N/A
   linux-backports-modules-5.0.0-21-generic  N/A
   linux-firmware1.173.9
  Tags:  bionic
  Uname: Linux 5.0.0-21-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm sudo
  _MarkForUpload: True
  dmi.bios.date: 05/07/2019
  dmi.bios.vendor: INSYDE Corp.
  dmi.bios.version: 1.07.08
  dmi.board.asset.tag: Tag 12345
  dmi.board.name: Oryx Pro
  dmi.board.vendor: System76
  dmi.board.version: oryp5
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: System76
  dmi.chassis.version: oryp5
  dmi.modalias: 
dmi:bvnINSYDECorp.:bvr1.07.08:bd05/07/2019:svnSystem76:pnOryxPro:pvroryp5:rvnSystem76:rnOryxPro:rvroryp5:cvnSystem76:ct10:cvroryp5:
  dmi.product.family: Not Applicable
  dmi.product.name: Oryx Pro
  dmi.product.sku: Not Applicable
  dmi.product.version: oryp5
  dmi.sys.vendor: System76

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/1836630/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836760] Re: ixgbe{vf} - Physical Function gets IRQ when VF checks link state

2019-07-16 Thread Guilherme G. Piccoli
** Description changed:

- TBA
+ [Impact]
+ 
+ * Intel NICs that are SR-IOV capable and are managed by ixgbe driver presents 
a potentially harmful behavior when the ixgbevf-managed VFs (Virtual Functions) 
perform an ethtool link check. The ixgbevf driver issues a mailbox command in 
the ethtool link state handler, which induces one IRQ in the PF (Physical 
Function) per link check.
+  
+ * This was reported as a sort of "denial-of-service" from a guest; due to 
some link check loop running inside a guest with PCI-PT of a ixgbevf-managed 
VF, the host received a huge amount of IRQs causing soft-lockups.
+  
+ * The patch proposed in this SRU request fix this behavior by relying in the 
saved link state (obtained in the ixgbevf's watchdog routine) instead of 
issuing a mailbox command to the PF in every link state check request. The 
commit is available on Linus tree: 1e1b0c658d9b ("ixgbevf: Use cached link 
state instead of re-reading the value for ethtool")
+ http://git.kernel.org/linus/1e1b0c658d9b
+ 
+ [Test case]
+ 
+ Reproducing the behavior is pretty simple; having a machine with an
+ Intel NIC managed by ixgbe, proceed with the following steps:
+ 
+ a) Create one or more VFs
+ (echo 1 > /sys/class/net//device/sriov_numvfs)
+ 
+ b) In a different terminal, monitor the non-TxRx PF IRQs:
+ (watch -n1 "cat /proc/interrupts | grep  | grep -v Tx")
+ 
+ c) Run "ethtool " in a loop
+ 
+ Without the hereby proposed patch, the PF IRQs will increase.
+ 
+ [Regression potential]
+ 
+ The patch scope is restricted to ixgbevf ethtool link-check procedure,
+ and was developed by the vendor itself. Being a self-contained patch
+ affecting only this driver's ethtool handler, the worst potential
+ regression would be a wrong link state report.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836760

Title:
  ixgbe{vf} - Physical Function gets IRQ when VF checks link state

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  Confirmed
Status in linux source package in Bionic:
  Confirmed
Status in linux source package in Cosmic:
  Confirmed
Status in linux source package in Disco:
  Confirmed
Status in linux source package in Eoan:
  Confirmed
Status in linux source package in FF-Series:
  Fix Released

Bug description:
  [Impact]

  * Intel NICs that are SR-IOV capable and are managed by ixgbe driver presents 
a potentially harmful behavior when the ixgbevf-managed VFs (Virtual Functions) 
perform an ethtool link check. The ixgbevf driver issues a mailbox command in 
the ethtool link state handler, which induces one IRQ in the PF (Physical 
Function) per link check.
   
  * This was reported as a sort of "denial-of-service" from a guest; due to 
some link check loop running inside a guest with PCI-PT of a ixgbevf-managed 
VF, the host received a huge amount of IRQs causing soft-lockups.
   
  * The patch proposed in this SRU request fix this behavior by relying in the 
saved link state (obtained in the ixgbevf's watchdog routine) instead of 
issuing a mailbox command to the PF in every link state check request. The 
commit is available on Linus tree: 1e1b0c658d9b ("ixgbevf: Use cached link 
state instead of re-reading the value for ethtool")
  http://git.kernel.org/linus/1e1b0c658d9b

  [Test case]

  Reproducing the behavior is pretty simple; having a machine with an
  Intel NIC managed by ixgbe, proceed with the following steps:

  a) Create one or more VFs
  (echo 1 > /sys/class/net//device/sriov_numvfs)

  b) In a different terminal, monitor the non-TxRx PF IRQs:
  (watch -n1 "cat /proc/interrupts | grep  | grep -v Tx")

  c) Run "ethtool " in a loop

  Without the hereby proposed patch, the PF IRQs will increase.

  [Regression potential]

  The patch scope is restricted to ixgbevf ethtool link-check procedure,
  and was developed by the vendor itself. Being a self-contained patch
  affecting only this driver's ethtool handler, the worst potential
  regression would be a wrong link state report.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836760/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836630] Re: System76 Oryx Pro (oryp5) with 5.0.0-21: Fail to resume from suspend

2019-07-16 Thread Jeremy Soller
It looks like reverting 1bde9ecf018ee646b68258921bf0fa364afda38a fixes
suspend issues when writing devices to /sys/power/pm_test, but also
reverting 6c6bc1aee6a61fe7a98196794735849286761a4a fixes suspend issues
when using standard suspend/resume:

commit 6c6bc1aee6a61fe7a98196794735849286761a4a
Author: Rafael J. Wysocki 
Date:   Thu Jun 13 23:59:45 2019 +0200

PCI: PM: Skip devices in D0 for suspend-to-idle

BugLink: https://bugs.launchpad.net/bugs/1808957

Patchwork: https://patchwork.kernel.org/patch/10993697/

Commit d491f2b75237 ("PCI: PM: Avoid possible suspend-to-idle issue")
attempted to avoid a problem with devices whose drivers want them to
stay in D0 over suspend-to-idle and resume, but it did not go as far
as it should with that.

Namely, first of all, the power state of a PCI bridge with a
downstream device in D0 must be D0 (based on the PCI PM spec r1.2,
sec 6, table 6-1, if the bridge is not in D0, there can be no PCI
transactions on its secondary bus), but that is not actively enforced
during system-wide PM transitions, so use the skip_bus_pm flag
introduced by commit d491f2b75237 for that.

Second, the configuration of devices left in D0 (whatever the reason)
during suspend-to-idle need not be changed and attempting to put them
into D0 again by force is pointless, so explicitly avoid doing that.

Fixes: d491f2b75237 ("PCI: PM: Avoid possible suspend-to-idle issue")
Reported-by: Kai-Heng Feng 
Signed-off-by: Rafael J. Wysocki 
Reviewed-by: Mika Westerberg 
Tested-by: Kai-Heng Feng 
(cherry picked from commit 3e26c5feed2add218046ecf91bab3cfa9bf762a6)
Signed-off-by: Kai-Heng Feng 
Acked-by: Timo Aaltonen 
Acked-by: Stefan Bader 
Signed-off-by: Kleber Sacilotto de Souza 

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836630

Title:
  System76 Oryx Pro (oryp5) with 5.0.0-21: Fail to resume from suspend

Status in linux package in Ubuntu:
  Confirmed
Status in linux-hwe-edge package in Ubuntu:
  Confirmed

Bug description:
  After upgrading the Ubuntu kernel to version 5.0.0-21, the System76
  Oryx Pro (oryp5) fails to resume from suspend when using discrete
  NVIDIA graphics

  The issue can be created on this hardware by following these steps:
  - Install Ubuntu 18.04.2
  - Add the proposed updates: https://wiki.ubuntu.com/Testing/EnableProposed
  - Upgrade:
sudo apt-get updatesudo apt-get dist-upgrade
  - Install 5.0 HWE kernel:
sudo apt-get install linux-generic-hwe-18.04-edge
  - Install NVIDIA driver:
sudo apt-get install nvidia-driver-430
  - Reboot:
sudo reboot
  - Attempt suspend/resume cycle

  This occurred after upgrading the kernel from version 5.0.0-20.
  --- 
  ProblemType: Bug
  ApportVersion: 2.20.9-0ubuntu7.7
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  system76   1721 F pulseaudio
   /dev/snd/controlC0:  system76   1721 F pulseaudio
  CurrentDesktop: ubuntu:GNOME
  DistroRelease: Ubuntu 18.04
  MachineType: System76 Oryx Pro
  NonfreeKernelModules: nvidia_modeset nvidia
  Package: linux-hwe-edge
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.0.0-21-generic 
root=UUID=10b5d457-8884-4b50-bd82-9b38e7f36564 ro
  ProcVersionSignature: Ubuntu 5.0.0-21.22~18.04.1-generic 5.0.15
  RelatedPackageVersions:
   linux-restricted-modules-5.0.0-21-generic N/A
   linux-backports-modules-5.0.0-21-generic  N/A
   linux-firmware1.173.9
  Tags:  bionic
  Uname: Linux 5.0.0-21-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm sudo
  _MarkForUpload: True
  dmi.bios.date: 05/07/2019
  dmi.bios.vendor: INSYDE Corp.
  dmi.bios.version: 1.07.08
  dmi.board.asset.tag: Tag 12345
  dmi.board.name: Oryx Pro
  dmi.board.vendor: System76
  dmi.board.version: oryp5
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: System76
  dmi.chassis.version: oryp5
  dmi.modalias: 
dmi:bvnINSYDECorp.:bvr1.07.08:bd05/07/2019:svnSystem76:pnOryxPro:pvroryp5:rvnSystem76:rnOryxPro:rvroryp5:cvnSystem76:ct10:cvroryp5:
  dmi.product.family: Not Applicable
  dmi.product.name: Oryx Pro
  dmi.product.sku: Not Applicable
  dmi.product.version: oryp5
  dmi.sys.vendor: System76

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836630/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1828495] Re: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

2019-07-16 Thread Brian Murray
Hello quanxian, or anyone else affected,

Accepted qemu into bionic-proposed. The package will build now and be
available at https://launchpad.net/ubuntu/+source/qemu/1:2.11+dfsg-
1ubuntu7.16 in a few hours, and then in the -proposed repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how
to enable and use -proposed.  Your feedback will aid us getting this
update out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested and change the tag from
verification-needed-bionic to verification-done-bionic. If it does not
fix the bug for you, please add a comment stating that, and change the
tag to verification-failed-bionic. In either case, without details of
your testing we will not be able to proceed.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance for helping!

N.B. The updated package will be released to -updates after the bug(s)
fixed by this package have been verified and the package has been in
-proposed for a minimum of 7 days.

** Changed in: qemu (Ubuntu Bionic)
   Status: In Progress => Fix Committed

** Tags added: verification-needed-bionic

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1828495

Title:
  [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

Status in intel:
  New
Status in libvirt package in Ubuntu:
  Fix Released
Status in linux package in Ubuntu:
  In Progress
Status in qemu package in Ubuntu:
  Fix Released
Status in libvirt source package in Bionic:
  Confirmed
Status in linux source package in Bionic:
  Confirmed
Status in qemu source package in Bionic:
  Fix Committed
Status in libvirt source package in Cosmic:
  Won't Fix
Status in linux source package in Cosmic:
  Won't Fix
Status in qemu source package in Cosmic:
  Won't Fix
Status in libvirt source package in Disco:
  Confirmed
Status in linux source package in Disco:
  Confirmed
Status in qemu source package in Disco:
  Fix Committed
Status in libvirt source package in Eoan:
  Fix Released
Status in linux source package in Eoan:
  In Progress
Status in qemu source package in Eoan:
  Fix Released

Bug description:
  [Impact]

   * QEMU does not support IceLake and CascadeLake CPUs specific features.
   * Most important feature to be supported is: IA32_ARCH_CAPABILITIES MSR.
   * With IA32_ARCH_CAPABILITIES, QEMU is able to advertise HW mitigations:
 - Rogue Data Cache Load
 - Enhanced IBRS
 - RSB Alternate
 - L1D flush need on VMENTRY
 - speculative Store Bypass
 to guests, as described in document:
 Intel 336996-Speculative-Execution-Side-Channel-Mitigations.pdf

  [Test Case]

   * From Original Description:

  """
  1. Boot up guest using: -cpu Cascadelake-Server

  [root@clx-2s2 yexin]# qemu-system-x86_64 -accel kvm -drive
  if=virtio,id=hd,file=/home/x/x,format=qcow2  -m 4096 -smp 4 -cpu
  Cascadelake-Server -serial stdio

  char device redirected to /dev/pts/3 (label serial0)

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  2. To check CPU ID related to features[FEAT_7_0_EDX]
  :CPUID_7_0_EDX_ARCH_CAPABILITIES

  Expected Result: Both host and guest's CPUID.07H EDX bit 29 should be
  1.

  Actual Result:

  Host's cpuid: 0x0007 0x00: eax=0x ebx=0xd39b
  ecx=0x0818 edx=0xbc00  (EDX bit 29=1)

  Guest's cpuid : 0x0007 0x00: eax=0x ebx=0xd19f0fb9
  ecx=0x0818 edx=0x8400 (EDX bit 29=0)

  Commit:2bdb76c015df7125783d8394d6339d181cb5bc30

  Target Kerned: 5.1
  Target Release: 19.10

  """

  [Regression Potential]

   * Most changes are related to CPU type definitions and its supported
  features. They are all based in upstream changes but, for obvious
  reasons, backporting and/or cherry-picking those could bring issues.
  Biggest concern is breaking something that currently works. Right now,
  the parts being changed that could affect other CPU types would be
  related to a small refactoring of how the features are organized, and
  that would be seen right away when trying to start a new VM after the
  package is installed.

   * Other tests, related to the features being backported, are being
  done by our KVM regression tests, including migration combinations, to
  reduce chances that a regression is introduced.

  [Other Info]
   
   * N/A

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/

[Kernel-packages] [Bug 1828495] Re: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

2019-07-16 Thread Rafael David Tinoco
** Changed in: libvirt (Ubuntu Bionic)
   Importance: Undecided => Wishlist

** Changed in: libvirt (Ubuntu Cosmic)
   Importance: Undecided => Wishlist

** Changed in: libvirt (Ubuntu Disco)
   Importance: Undecided => Wishlist

** Changed in: libvirt (Ubuntu Eoan)
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1828495

Title:
  [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

Status in intel:
  New
Status in libvirt package in Ubuntu:
  Fix Released
Status in linux package in Ubuntu:
  In Progress
Status in qemu package in Ubuntu:
  Fix Released
Status in libvirt source package in Bionic:
  Confirmed
Status in linux source package in Bionic:
  Confirmed
Status in qemu source package in Bionic:
  Fix Committed
Status in libvirt source package in Cosmic:
  Won't Fix
Status in linux source package in Cosmic:
  Won't Fix
Status in qemu source package in Cosmic:
  Won't Fix
Status in libvirt source package in Disco:
  Confirmed
Status in linux source package in Disco:
  Confirmed
Status in qemu source package in Disco:
  Fix Committed
Status in libvirt source package in Eoan:
  Fix Released
Status in linux source package in Eoan:
  In Progress
Status in qemu source package in Eoan:
  Fix Released

Bug description:
  [Impact]

   * QEMU does not support IceLake and CascadeLake CPUs specific features.
   * Most important feature to be supported is: IA32_ARCH_CAPABILITIES MSR.
   * With IA32_ARCH_CAPABILITIES, QEMU is able to advertise HW mitigations:
 - Rogue Data Cache Load
 - Enhanced IBRS
 - RSB Alternate
 - L1D flush need on VMENTRY
 - speculative Store Bypass
 to guests, as described in document:
 Intel 336996-Speculative-Execution-Side-Channel-Mitigations.pdf

  [Test Case]

   * From Original Description:

  """
  1. Boot up guest using: -cpu Cascadelake-Server

  [root@clx-2s2 yexin]# qemu-system-x86_64 -accel kvm -drive
  if=virtio,id=hd,file=/home/x/x,format=qcow2  -m 4096 -smp 4 -cpu
  Cascadelake-Server -serial stdio

  char device redirected to /dev/pts/3 (label serial0)

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  2. To check CPU ID related to features[FEAT_7_0_EDX]
  :CPUID_7_0_EDX_ARCH_CAPABILITIES

  Expected Result: Both host and guest's CPUID.07H EDX bit 29 should be
  1.

  Actual Result:

  Host's cpuid: 0x0007 0x00: eax=0x ebx=0xd39b
  ecx=0x0818 edx=0xbc00  (EDX bit 29=1)

  Guest's cpuid : 0x0007 0x00: eax=0x ebx=0xd19f0fb9
  ecx=0x0818 edx=0x8400 (EDX bit 29=0)

  Commit:2bdb76c015df7125783d8394d6339d181cb5bc30

  Target Kerned: 5.1
  Target Release: 19.10

  """

  [Regression Potential]

   * Most changes are related to CPU type definitions and its supported
  features. They are all based in upstream changes but, for obvious
  reasons, backporting and/or cherry-picking those could bring issues.
  Biggest concern is breaking something that currently works. Right now,
  the parts being changed that could affect other CPU types would be
  related to a small refactoring of how the features are organized, and
  that would be seen right away when trying to start a new VM after the
  package is installed.

   * Other tests, related to the features being backported, are being
  done by our KVM regression tests, including migration combinations, to
  reduce chances that a regression is introduced.

  [Other Info]
   
   * N/A

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1828495/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1812622] Re: fib related test in net from ubuntu_kernel_selftests failed

2019-07-16 Thread Sean Feole
also occurs on AWS-disco 5.0.0-1011.12 : amd64


** Summary changed:

- fib related test in net from ubuntu_kernel_selftests failed on C-KVM
+ fib related test in net from ubuntu_kernel_selftests failed

** Tags added: aws disco sru-20190701

** Also affects: linux-aws (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux-aws (Ubuntu Cosmic)

** Also affects: linux (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Also affects: linux-aws (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Also affects: linux-kvm (Ubuntu Disco)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1812622

Title:
  fib related test in net from ubuntu_kernel_selftests failed

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in linux-aws package in Ubuntu:
  New
Status in linux-kvm package in Ubuntu:
  New
Status in linux source package in Cosmic:
  Incomplete
Status in linux-kvm source package in Cosmic:
  New
Status in linux source package in Disco:
  New
Status in linux-aws source package in Disco:
  New
Status in linux-kvm source package in Disco:
  New

Bug description:
  These tests:
  * fib_tests.sh
  * fib-onlink-tests.sh
  * fib_rule_tests.sh

  All failed on Cosmic KVM kernel with RTNETLINK answers: Operation not
  supported:

  
   selftests: net: fib_tests.sh
  
   Single path route test
   RTNETLINK answers: Operation not supported
   not ok 1..11 selftests: net: fib_tests.sh [FAIL]

   selftests: net: fib-onlink-tests.sh
  
  
   Configuring interfaces
   RTNETLINK answers: Operation not supported
   not ok 1..12 selftests: net: fib-onlink-tests.sh [FAIL]

   selftests: net: fib_rule_tests.sh
   
   RTNETLINK answers: Operation not supported
   not ok 1..16 selftests: net: fib_rule_tests.sh [FAIL]


  (works on generic Cosmic kernel)

  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-1006-kvm 4.18.0-1006.6
  ProcVersionSignature: User Name 4.18.0-1006.6-kvm 4.18.17
  Uname: Linux 4.18.0-1006-kvm x86_64
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  Date: Mon Jan 21 08:00:22 2019
  SourcePackage: linux-kvm
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1812622/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1828495] Re: [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

2019-07-16 Thread Brian Murray
Hello quanxian, or anyone else affected,

Accepted qemu into disco-proposed. The package will build now and be
available at https://launchpad.net/ubuntu/+source/qemu/1:3.1+dfsg-
2ubuntu3.3 in a few hours, and then in the -proposed repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how
to enable and use -proposed.  Your feedback will aid us getting this
update out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested and change the tag from
verification-needed-disco to verification-done-disco. If it does not fix
the bug for you, please add a comment stating that, and change the tag
to verification-failed-disco. In either case, without details of your
testing we will not be able to proceed.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance for helping!

N.B. The updated package will be released to -updates after the bug(s)
fixed by this package have been verified and the package has been in
-proposed for a minimum of 7 days.

** Changed in: qemu (Ubuntu Disco)
   Status: In Progress => Fix Committed

** Tags added: verification-needed verification-needed-disco

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1828495

Title:
  [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM.

Status in intel:
  New
Status in libvirt package in Ubuntu:
  Fix Released
Status in linux package in Ubuntu:
  In Progress
Status in qemu package in Ubuntu:
  Fix Released
Status in libvirt source package in Bionic:
  Confirmed
Status in linux source package in Bionic:
  Confirmed
Status in qemu source package in Bionic:
  Fix Committed
Status in libvirt source package in Cosmic:
  Won't Fix
Status in linux source package in Cosmic:
  Won't Fix
Status in qemu source package in Cosmic:
  Won't Fix
Status in libvirt source package in Disco:
  Confirmed
Status in linux source package in Disco:
  Confirmed
Status in qemu source package in Disco:
  Fix Committed
Status in libvirt source package in Eoan:
  Fix Released
Status in linux source package in Eoan:
  In Progress
Status in qemu source package in Eoan:
  Fix Released

Bug description:
  [Impact]

   * QEMU does not support IceLake and CascadeLake CPUs specific features.
   * Most important feature to be supported is: IA32_ARCH_CAPABILITIES MSR.
   * With IA32_ARCH_CAPABILITIES, QEMU is able to advertise HW mitigations:
 - Rogue Data Cache Load
 - Enhanced IBRS
 - RSB Alternate
 - L1D flush need on VMENTRY
 - speculative Store Bypass
 to guests, as described in document:
 Intel 336996-Speculative-Execution-Side-Channel-Mitigations.pdf

  [Test Case]

   * From Original Description:

  """
  1. Boot up guest using: -cpu Cascadelake-Server

  [root@clx-2s2 yexin]# qemu-system-x86_64 -accel kvm -drive
  if=virtio,id=hd,file=/home/x/x,format=qcow2  -m 4096 -smp 4 -cpu
  Cascadelake-Server -serial stdio

  char device redirected to /dev/pts/3 (label serial0)

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  qemu-system-x86_64: warning: host doesn't support requested feature:
  CPUID.07H:ECX [bit 4]

  2. To check CPU ID related to features[FEAT_7_0_EDX]
  :CPUID_7_0_EDX_ARCH_CAPABILITIES

  Expected Result: Both host and guest's CPUID.07H EDX bit 29 should be
  1.

  Actual Result:

  Host's cpuid: 0x0007 0x00: eax=0x ebx=0xd39b
  ecx=0x0818 edx=0xbc00  (EDX bit 29=1)

  Guest's cpuid : 0x0007 0x00: eax=0x ebx=0xd19f0fb9
  ecx=0x0818 edx=0x8400 (EDX bit 29=0)

  Commit:2bdb76c015df7125783d8394d6339d181cb5bc30

  Target Kerned: 5.1
  Target Release: 19.10

  """

  [Regression Potential]

   * Most changes are related to CPU type definitions and its supported
  features. They are all based in upstream changes but, for obvious
  reasons, backporting and/or cherry-picking those could bring issues.
  Biggest concern is breaking something that currently works. Right now,
  the parts being changed that could affect other CPU types would be
  related to a small refactoring of how the features are organized, and
  that would be seen right away when trying to start a new VM after the
  package is installed.

   * Other tests, related to the features being backported, are being
  done by our KVM regression tests, including migration combinations, to
  reduce chances that a regression is introduced.

  [Other Info]
   
   * N/A

To manage notifications about this bug go to:
https://bugs.launchpad.net

[Kernel-packages] [Bug 1808957] Re: Dell XPS 13 (9370) defaults to s2idle sleep/suspend instead of deep, NVMe drains lots of power under s2idle

2019-07-16 Thread Jeremy Soller
The application of 1bde9ecf018ee646b68258921bf0fa364afda38a appears to
have caused https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836630

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem in Ubuntu.
https://bugs.launchpad.net/bugs/1808957

Title:
  Dell XPS 13 (9370) defaults to s2idle sleep/suspend instead of deep,
  NVMe drains lots of power under s2idle

Status in linux package in Ubuntu:
  Confirmed
Status in linux-oem package in Ubuntu:
  New
Status in linux-oem-osp1 package in Ubuntu:
  New
Status in linux source package in Bionic:
  Fix Committed
Status in linux-oem source package in Bionic:
  New
Status in linux-oem-osp1 source package in Bionic:
  Fix Released
Status in linux source package in Cosmic:
  Fix Committed
Status in linux-oem source package in Cosmic:
  Invalid
Status in linux-oem-osp1 source package in Cosmic:
  Invalid
Status in linux source package in Disco:
  Fix Committed
Status in linux-oem source package in Disco:
  Invalid
Status in linux-oem-osp1 source package in Disco:
  Invalid

Bug description:
  It seems that the Dell 9370 is set to go into s2idle mode rather than
  deep sleep, forgoing significant power savings.

  I have confirmed this by suspending and then checking:
  sudo journalctl | grep "PM: suspend" | tail -2. If the output is

  PM: suspend entry (s2idle)
  PM: suspend exit

  cat /sys/power/mem_sleep showed

  [s2idle] deep

  As a temporary fix, I typed 
  echo deep > /sys/power/mem_sleep 
  as a root user (sudo -i). 

  Then the output of cat /sys/power/mem_sleep was
  s2idle [deep]

  After suspending now, 
  sudo journalctl | grep "PM: suspend" | tail -2 returns

  PM: suspend entry (deep)
  PM: suspend exit

  I have made this permanent by editing 
  /etc/default/grub

  and replacing
  GRUB_CMDLINE_LINUX_DEFAULT="quiet splash"
  with
  GRUB_CMDLINE_LINUX_DEFAULT="quiet splash mem_sleep_default=deep"

  then regenerating my grub configuration (sudo grub-mkconfig -o
  /boot/grub/grub.cfg).

  This appears to be working with no ill effects.

  Credit to https://askubuntu.com/a/1036122/470077

  ProblemType: Bug
  DistroRelease: Ubuntu 18.10
  Package: linux-image-4.18.0-11-generic 4.18.0-11.12
  ProcVersionSignature: Ubuntu 4.18.0-11.12-generic 4.18.12
  Uname: Linux 4.18.0-11-generic x86_64
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
  ApportVersion: 2.20.10-0ubuntu13.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  aaron-work   3672 F pulseaudio
   /dev/snd/pcmC0D0p:   aaron-work   3672 F...m pulseaudio
  Date: Tue Dec 18 09:52:44 2018
  EcryptfsInUse: Yes
  HibernationDevice: RESUME=/dev/ubuntu-vg/swap_1
  InstallationDate: Installed on 2018-09-04 (104 days ago)
  InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 
(20180725)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 003: ID 0489:e0a2 Foxconn / Hon Hai 
   Bus 001 Device 002: ID 0bda:58f4 Realtek Semiconductor Corp. 
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: Dell Inc. XPS 13 9370
  ProcEnviron:
   LANGUAGE=en_GB:en
   TERM=xterm-256color
   PATH=(custom, no user)
   LANG=en_GB.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-4.18.0-11-generic 
root=/dev/mapper/ubuntu--vg-root ro quiet splash mem_sleep_default=deep 
vt.handoff=1
  PulseList:
   Error: command ['pacmd', 'list'] failed with exit code 1: Home directory not 
accessible: Permission denied
   No PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-4.18.0-11-generic N/A
   linux-backports-modules-4.18.0-11-generic  N/A
   linux-firmware 1.175.1
  SourcePackage: linux
  UpgradeStatus: Upgraded to cosmic on 2018-10-26 (52 days ago)
  dmi.bios.date: 08/09/2018
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: 1.5.1
  dmi.board.name: 0F6P3V
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 10
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvr1.5.1:bd08/09/2018:svnDellInc.:pnXPS139370:pvr:rvnDellInc.:rn0F6P3V:rvrA00:cvnDellInc.:ct10:cvr:
  dmi.product.family: XPS
  dmi.product.name: XPS 13 9370
  dmi.product.sku: 07E6
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1808957/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836202] Re: bionic/linux-gke-5.0: 5.0.0-1011.11~18.04.1 -proposed tracker

2019-07-16 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/regression-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/security-signoff
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  derivatives: bug 1836201 (gke-kernel)
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1834891
- phase: Promote to Proposed
- phase-changed: Monday, 15. July 2019 13:10 UTC
+ phase: Testing
+ phase-changed: Tuesday, 16. July 2019 16:53 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror 
sync
+   automated-testing: Stalled -- testing FAILED
promote-to-updates: Pending -- Nvidia objects not found -- 
current-driver-5.0.0-1011-gke-d1809-0-amd64
+   regression-testing: Ongoing -- testing in progress
+   verification-testing: Ongoing -- testing in progress
  variant: debs

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836202

Title:
  bionic/linux-gke-5.0: 5.0.0-1011.11~18.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Confirmed
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  derivatives: bug 1836201 (gke-kernel)

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1834891
  phase: Testing
  phase-changed: Tuesday, 16. July 2019 16:53 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
automated-testing: Stalled -- testing FAILED
promote-to-updates: Pending -- Nvidia objects not found -- 
current-driver-5.0.0-1011-gke-d1809-0-amd64
regression-testing: Ongoing -- testing in progress
verification-testing: Ongoing -- testing in progress
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1836202/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836630] Re: System76 Oryx Pro (oryp5) with 5.0.0-21: Fail to resume from suspend

2019-07-16 Thread Jeremy Soller
Also reported here: https://bugzilla.kernel.org/show_bug.cgi?id=204187

** Bug watch added: Linux Kernel Bug Tracker #204187
   https://bugzilla.kernel.org/show_bug.cgi?id=204187

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836630

Title:
  System76 Oryx Pro (oryp5) with 5.0.0-21: Fail to resume from suspend

Status in linux package in Ubuntu:
  Confirmed
Status in linux-hwe-edge package in Ubuntu:
  Confirmed

Bug description:
  After upgrading the Ubuntu kernel to version 5.0.0-21, the System76
  Oryx Pro (oryp5) fails to resume from suspend when using discrete
  NVIDIA graphics

  The issue can be created on this hardware by following these steps:
  - Install Ubuntu 18.04.2
  - Add the proposed updates: https://wiki.ubuntu.com/Testing/EnableProposed
  - Upgrade:
sudo apt-get updatesudo apt-get dist-upgrade
  - Install 5.0 HWE kernel:
sudo apt-get install linux-generic-hwe-18.04-edge
  - Install NVIDIA driver:
sudo apt-get install nvidia-driver-430
  - Reboot:
sudo reboot
  - Attempt suspend/resume cycle

  This occurred after upgrading the kernel from version 5.0.0-20.
  --- 
  ProblemType: Bug
  ApportVersion: 2.20.9-0ubuntu7.7
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  system76   1721 F pulseaudio
   /dev/snd/controlC0:  system76   1721 F pulseaudio
  CurrentDesktop: ubuntu:GNOME
  DistroRelease: Ubuntu 18.04
  MachineType: System76 Oryx Pro
  NonfreeKernelModules: nvidia_modeset nvidia
  Package: linux-hwe-edge
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.0.0-21-generic 
root=UUID=10b5d457-8884-4b50-bd82-9b38e7f36564 ro
  ProcVersionSignature: Ubuntu 5.0.0-21.22~18.04.1-generic 5.0.15
  RelatedPackageVersions:
   linux-restricted-modules-5.0.0-21-generic N/A
   linux-backports-modules-5.0.0-21-generic  N/A
   linux-firmware1.173.9
  Tags:  bionic
  Uname: Linux 5.0.0-21-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm sudo
  _MarkForUpload: True
  dmi.bios.date: 05/07/2019
  dmi.bios.vendor: INSYDE Corp.
  dmi.bios.version: 1.07.08
  dmi.board.asset.tag: Tag 12345
  dmi.board.name: Oryx Pro
  dmi.board.vendor: System76
  dmi.board.version: oryp5
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: System76
  dmi.chassis.version: oryp5
  dmi.modalias: 
dmi:bvnINSYDECorp.:bvr1.07.08:bd05/07/2019:svnSystem76:pnOryxPro:pvroryp5:rvnSystem76:rnOryxPro:rvroryp5:cvnSystem76:ct10:cvroryp5:
  dmi.product.family: Not Applicable
  dmi.product.name: Oryx Pro
  dmi.product.sku: Not Applicable
  dmi.product.version: oryp5
  dmi.sys.vendor: System76

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836630/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836202] Re: bionic/linux-gke-5.0: 5.0.0-1011.11~18.04.1 -proposed tracker

2019-07-16 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836202

Title:
  bionic/linux-gke-5.0: 5.0.0-1011.11~18.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Committed
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  derivatives: bug 1836201 (gke-kernel)

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1834891
  phase: Promote to Proposed
  phase-changed: Monday, 15. July 2019 13:10 UTC
  reason:
promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror 
sync
promote-to-updates: Pending -- Nvidia objects not found -- 
current-driver-5.0.0-1011-gke-d1809-0-amd64
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1836202/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836202] Re: bionic/linux-gke-5.0: 5.0.0-1011.11~18.04.1 -proposed tracker

2019-07-16 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/automated-testing
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836202

Title:
  bionic/linux-gke-5.0: 5.0.0-1011.11~18.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Committed
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  derivatives: bug 1836201 (gke-kernel)

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1834891
  phase: Promote to Proposed
  phase-changed: Monday, 15. July 2019 13:10 UTC
  reason:
promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror 
sync
promote-to-updates: Pending -- Nvidia objects not found -- 
current-driver-5.0.0-1011-gke-d1809-0-amd64
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1836202/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836630] Re: System76 Oryx Pro (oryp5) with 5.0.0-21: Fail to resume from suspend

2019-07-16 Thread Jeremy Soller
I was able to narrow this down to this commit:

commit 1bde9ecf018ee646b68258921bf0fa364afda38a
Author: Keith Busch 
Date:   Thu May 23 09:27:35 2019 -0600

nvme-pci: Use host managed power state for suspend

BugLink: https://bugs.launchpad.net/bugs/1808957

The nvme pci driver prepares its devices for power loss during suspend
by shutting down the controllers. The power setting is deferred to
pci driver's power management before the platform removes power. The
suspend-to-idle mode, however, does not remove power.

NVMe devices that implement host managed power settings can achieve
lower power and better transition latencies than using generic PCI power
settings. Try to use this feature if the platform is not involved with
the suspend. If successful, restore the previous power state on resume.

Cc: Mario Limonciello 
Cc: Kai Heng Feng 
Tested-by: Kai-Heng Feng 
Tested-by: Mario Limonciello 
Reviewed-by: Rafael J. Wysocki 
Reviewed-by: Christoph Hellwig 
Signed-off-by: Keith Busch 
Signed-off-by: Sagi Grimberg 
(cherry picked from commit a0805317252ad9cf09d4a32b0435e165580adf8a)
Signed-off-by: Kai-Heng Feng 
Acked-by: Timo Aaltonen 
Acked-by: Stefan Bader 
Signed-off-by: Kleber Sacilotto de Souza 

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836630

Title:
  System76 Oryx Pro (oryp5) with 5.0.0-21: Fail to resume from suspend

Status in linux package in Ubuntu:
  Confirmed
Status in linux-hwe-edge package in Ubuntu:
  Confirmed

Bug description:
  After upgrading the Ubuntu kernel to version 5.0.0-21, the System76
  Oryx Pro (oryp5) fails to resume from suspend when using discrete
  NVIDIA graphics

  The issue can be created on this hardware by following these steps:
  - Install Ubuntu 18.04.2
  - Add the proposed updates: https://wiki.ubuntu.com/Testing/EnableProposed
  - Upgrade:
sudo apt-get updatesudo apt-get dist-upgrade
  - Install 5.0 HWE kernel:
sudo apt-get install linux-generic-hwe-18.04-edge
  - Install NVIDIA driver:
sudo apt-get install nvidia-driver-430
  - Reboot:
sudo reboot
  - Attempt suspend/resume cycle

  This occurred after upgrading the kernel from version 5.0.0-20.
  --- 
  ProblemType: Bug
  ApportVersion: 2.20.9-0ubuntu7.7
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  system76   1721 F pulseaudio
   /dev/snd/controlC0:  system76   1721 F pulseaudio
  CurrentDesktop: ubuntu:GNOME
  DistroRelease: Ubuntu 18.04
  MachineType: System76 Oryx Pro
  NonfreeKernelModules: nvidia_modeset nvidia
  Package: linux-hwe-edge
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.0.0-21-generic 
root=UUID=10b5d457-8884-4b50-bd82-9b38e7f36564 ro
  ProcVersionSignature: Ubuntu 5.0.0-21.22~18.04.1-generic 5.0.15
  RelatedPackageVersions:
   linux-restricted-modules-5.0.0-21-generic N/A
   linux-backports-modules-5.0.0-21-generic  N/A
   linux-firmware1.173.9
  Tags:  bionic
  Uname: Linux 5.0.0-21-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm sudo
  _MarkForUpload: True
  dmi.bios.date: 05/07/2019
  dmi.bios.vendor: INSYDE Corp.
  dmi.bios.version: 1.07.08
  dmi.board.asset.tag: Tag 12345
  dmi.board.name: Oryx Pro
  dmi.board.vendor: System76
  dmi.board.version: oryp5
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: System76
  dmi.chassis.version: oryp5
  dmi.modalias: 
dmi:bvnINSYDECorp.:bvr1.07.08:bd05/07/2019:svnSystem76:pnOryxPro:pvroryp5:rvnSystem76:rnOryxPro:rvroryp5:cvnSystem76:ct10:cvroryp5:
  dmi.product.family: Not Applicable
  dmi.product.name: Oryx Pro
  dmi.product.sku: Not Applicable
  dmi.product.version: oryp5
  dmi.sys.vendor: System76

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836630/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1828166] Re: perf top problem on z with Ubuntu 18.04

2019-07-16 Thread Kleber Sacilotto de Souza
Hi Klaus,

The same version of perf is expected.

I was able to reproduce the issue and I can confirm that I see the same
behavior as you described even with the patched test kernel.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1828166

Title:
  perf top problem on z with Ubuntu 18.04

Status in Ubuntu on IBM z Systems:
  Confirmed
Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Bionic:
  In Progress
Status in linux source package in Cosmic:
  Invalid

Bug description:
  SRU Justification:
  ==

  [Impact]

  * The perf top tool hangs and shows error messages, like 'Not enough
  memory for annotating'

  [Fix]

  * edeb0c90df3581b821a764052d185df985f8b8dc edeb0c9 "perf tools: Stop
  fallbacking to kallsyms for vdso symbols lookup"

  [Test Case]

  * start a benchmark (mem_alloc, but it doesn't really matter what)

  * execute perf top in a second terminal

  * the output of perf top is correct

  * now stop the benchmark

  * and perf top shows an error message, like "Not enough memory for
  annotating '__irf_end' symbol!)"

  * and perf top can't be exited anymore

  [Regression Potential]

  * The regression potential can be considered as low since this happens
  only while using the perf top tool

  * and it is known that the commit (above) fixes the problem

  * and the fix is upstream since 4.19

  [Other Info]

  * current disco and eoan kernels don't show that problem

  * bisecting result points to above commit

  * applies cleanly on cosmic, but has a little conflict on bionic (both 
master-next)
  _

  perf top hangs and shows error messages

  ---uname output---
  Linux weather 4.15.0-46-generic #49-Ubuntu SMP Wed Feb 6 09:32:27 UTC 2019 
s390x s390x s390x GNU/Linux

  ---Steps to Reproduce---
   I start a benchmark (mem_alloc, but it really doesn't matter) and then issue 
perf top in a second terminal, the output from perf top is correct. Now I stop 
the benchmark: perf top shows a error message (Not enough memory for annotating 
'__irf_end' symbol!) and I can't quit from perf top anymore

  Following analyse took place:
  No problem with current kernel .
  Bi-Secting of perf tool took place and following commit was found:

  commit edeb0c90df3581b821a764052d185df985f8b8dc (HEAD, refs/bisect/bad)
  Author: Arnaldo Carvalho de Melo 
  Date:   Tue Oct 16 17:08:29 2018 -0300

  perf tools: Stop fallbacking to kallsyms for vdso symbols lookup

  When you apply this patch the issue is gone, however it is contained
  in these versions:

  git tag --contains  edeb0c90df3581b821
  v4.19
  v4.20
  

  The level I was debugging was kernel 4.15 which does not contain this
  patch.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1828166/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1831268] Re: Ubuntu 19.04: Random SR-IOV issues

2019-07-16 Thread Joseph Salisbury
This issues is due to a test case bug.  Please close.

** Changed in: linux-azure (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1831268

Title:
  Ubuntu 19.04: Random SR-IOV issues

Status in linux-azure package in Ubuntu:
  Invalid

Bug description:
  No VFs inside the VM.

  Unfortunately this issue doesn’t have a 100% repro. Sometimes all the
  VFs are missing, other times a few are available and the rest are
  missing.

  The best test case to catch this issue is VERIFY-ENABLE-DISABLE-SRIOV-
  ON-EXISTING-VM.

  Comparing the logs between working/not working VMs, the only difference was 
that these 2 messages were missing from the broken VMs:
  mlx4_en: rename9: Steering Mode 2

  mlx4_en: rename9: Link Up

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1831268/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836202] Re: bionic/linux-gke-5.0: 5.0.0-1011.11~18.04.1 -proposed tracker

2019-07-16 Thread Ubuntu Kernel Bot
** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  derivatives: bug 1836201 (gke-kernel)
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1834891
  phase: Promote to Proposed
  phase-changed: Monday, 15. July 2019 13:10 UTC
  reason:
-   promote-to-proposed: Pending -- packages copied to Proposed 
signed:retry-needed
+   promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror 
sync
promote-to-updates: Pending -- Nvidia objects not found -- 
current-driver-5.0.0-1011-gke-d1809-0-amd64
  variant: debs

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836202

Title:
  bionic/linux-gke-5.0: 5.0.0-1011.11~18.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Committed
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  derivatives: bug 1836201 (gke-kernel)

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1834891
  phase: Promote to Proposed
  phase-changed: Monday, 15. July 2019 13:10 UTC
  reason:
promote-to-proposed: Ongoing -- packages waiting in -proposed for mirror 
sync
promote-to-updates: Pending -- Nvidia objects not found -- 
current-driver-5.0.0-1011-gke-d1809-0-amd64
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1836202/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836760] [NEW] ixgbe{vf} - Physical Function gets IRQ when VF checks link state

2019-07-16 Thread Guilherme G. Piccoli
Public bug reported:

TBA

** Affects: linux (Ubuntu)
 Importance: High
 Assignee: Guilherme G. Piccoli (gpiccoli)
 Status: Confirmed

** Affects: linux (Ubuntu Xenial)
 Importance: High
 Assignee: Guilherme G. Piccoli (gpiccoli)
 Status: Confirmed

** Affects: linux (Ubuntu Bionic)
 Importance: High
 Assignee: Guilherme G. Piccoli (gpiccoli)
 Status: Confirmed

** Affects: linux (Ubuntu Cosmic)
 Importance: High
 Assignee: Guilherme G. Piccoli (gpiccoli)
 Status: Confirmed

** Affects: linux (Ubuntu Disco)
 Importance: High
 Assignee: Guilherme G. Piccoli (gpiccoli)
 Status: Confirmed

** Affects: linux (Ubuntu Eoan)
 Importance: High
 Assignee: Guilherme G. Piccoli (gpiccoli)
 Status: Confirmed

** Affects: linux (Ubuntu Ff-series)
 Importance: High
 Assignee: Guilherme G. Piccoli (gpiccoli)
 Status: Fix Released


** Tags: sts

** Summary changed:

- ixgbe - Physical Function gets IRQ when VF checks link state 
+ ixgbe{vf} - Physical Function gets IRQ when VF checks link state

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Cosmic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Eoan)
   Importance: High
 Assignee: Guilherme G. Piccoli (gpiccoli)
   Status: Confirmed

** Also affects: linux (Ubuntu Ff-series)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Disco)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Ff-series)
   Importance: Undecided => High

** Changed in: linux (Ubuntu Disco)
   Importance: Undecided => High

** Changed in: linux (Ubuntu Cosmic)
   Importance: Undecided => High

** Changed in: linux (Ubuntu Bionic)
   Importance: Undecided => High

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => High

** Changed in: linux (Ubuntu Ff-series)
 Assignee: (unassigned) => Guilherme G. Piccoli (gpiccoli)

** Changed in: linux (Ubuntu Disco)
 Assignee: (unassigned) => Guilherme G. Piccoli (gpiccoli)

** Changed in: linux (Ubuntu Cosmic)
 Assignee: (unassigned) => Guilherme G. Piccoli (gpiccoli)

** Changed in: linux (Ubuntu Bionic)
 Assignee: (unassigned) => Guilherme G. Piccoli (gpiccoli)

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Guilherme G. Piccoli (gpiccoli)

** Changed in: linux (Ubuntu Disco)
   Status: New => Confirmed

** Changed in: linux (Ubuntu Cosmic)
   Status: New => Confirmed

** Changed in: linux (Ubuntu Bionic)
   Status: New => Confirmed

** Changed in: linux (Ubuntu Xenial)
   Status: New => Confirmed

** Changed in: linux (Ubuntu Ff-series)
   Status: New => Confirmed

** Changed in: linux (Ubuntu Ff-series)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836760

Title:
  ixgbe{vf} - Physical Function gets IRQ when VF checks link state

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  Confirmed
Status in linux source package in Bionic:
  Confirmed
Status in linux source package in Cosmic:
  Confirmed
Status in linux source package in Disco:
  Confirmed
Status in linux source package in Eoan:
  Confirmed
Status in linux source package in FF-Series:
  Fix Released

Bug description:
  TBA

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836760/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1799988] Re: Missing wifi and bluetooth after sleep on XPS 9370

2019-07-16 Thread Rex Tsai
** Tags added: ath10k

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1799988

Title:
  Missing wifi and bluetooth after sleep on XPS 9370

Status in Dell Sputnik:
  New
Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I have XPS9370 with self-installed Ubuntu 18.10 (not project sputnik) with 
Killer 1435 wireless module.
  And sometimes I find wifi and bluetooth missing after sleep. I cannot exactly 
define preconditions, but it seems there are following steps to reproduce the 
issue
  1. Connect something via bluetooth  (I use bluetooth headset)
  2. Send laptop to sleep
  3. Wake it and find wifi and bluetooth missing.

  I have to mention that I have also been experienced bluetooth only
  missing, but it somehow transformed to the issue with both wireless
  devices.

  Dmesg after waking up with the issue attached
  --- 
  ProblemType: Bug
  ApportVersion: 2.20.10-0ubuntu13
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  kao2362 F pulseaudio
  CurrentDesktop: ubuntu:GNOME
  DistroRelease: Ubuntu 18.10
  InstallationDate: Installed on 2018-09-22 (33 days ago)
  InstallationMedia: Ubuntu 18.10 "Cosmic Cuttlefish" - Alpha amd64 (20180922)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 012: ID 0489:e0a2 Foxconn / Hon Hai 
   Bus 001 Device 002: ID 0bda:58f4 Realtek Semiconductor Corp. 
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: Dell Inc. XPS 13 9370
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.18.0-10-generic 
root=UUID=34230cbd-d3d2-4cb8-855a-307883bc35ea ro quiet splash 
mem_sleep_default=deep video=1920x1080 usbcore.dyndbg=+p vt.handoff=1
  ProcVersionSignature: Ubuntu 4.18.0-10.11-generic 4.18.12
  RelatedPackageVersions:
   linux-restricted-modules-4.18.0-10-generic N/A
   linux-backports-modules-4.18.0-10-generic  N/A
   linux-firmware 1.175
  Tags:  cosmic
  Uname: Linux 4.18.0-10-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 08/09/2018
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: 1.5.1
  dmi.board.name: 0VM1FG
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 10
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvr1.5.1:bd08/09/2018:svnDellInc.:pnXPS139370:pvr:rvnDellInc.:rn0VM1FG:rvrA00:cvnDellInc.:ct10:cvr:
  dmi.product.family: XPS
  dmi.product.name: XPS 13 9370
  dmi.product.sku: 07E6
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/dell-sputnik/+bug/1799988/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1818881] Re: ath10k_pci crashing

2019-07-16 Thread Rex Tsai
** Tags added: ath10k

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1818881

Title:
  ath10k_pci crashing

Status in OEM Priority Project:
  Triaged
Status in linux package in Ubuntu:
  Confirmed

Bug description:
  
  The below happens on a regular basis on my DELL XPS 13 9380:

  [77451.338493] RIP: 0010:ath10k_htt_rx_pop_paddr.isra.29+0xd9/0xf0 
[ath10k_core]
  [77451.338494] Code: 74 32 48 8b 87 10 02 00 00 48 85 c0 74 26 48 8b 40 28 48 
85 c0 74 17 45 31 c0 b9 02 00 00 00 e8 dd c1 d7 db 48 89 d8 5b 5d c3 <0f> 0b 31 
db 48 89 d8 5b 5d c3 48 8b 05 de 67 5a dc eb d1 0f 1f 40 
  [77451.338531] RSP: 0018:9d996e503d78 EFLAGS: 00010246
  [77451.338533] RAX:  RBX: 9d97b7c12290 RCX: 
9d96cbfd5528
  [77451.338534] RDX: 37af2804 RSI: 9d9944c51ed4 RDI: 
9d9944c51de0
  [77451.338535] RBP: 9d996e503d80 R08: 0020 R09: 

  [77451.338537] R10: 9d94f045ecd8 R11: 01ff R12: 
9d9944c51520
  [77451.338538] R13: 9d996e503e40 R14: 0040 R15: 
9d996e503e28
  [77451.338540] FS:  () GS:9d996e50() 
knlGS:
  [77451.338541] CS:  0010 DS:  ES:  CR0: 80050033
  [77451.338542] CR2: 1f1104c31000 CR3: 00017aa0a005 CR4: 
003606e0
  [77451.338543] Call Trace:
  [77451.338545]  
  [77451.338557]  ath10k_htt_txrx_compl_task+0x3d6/0xe40 [ath10k_core]
  [77451.338561]  ? ath10k_pci_irq_msi_fw_unmask+0x70/0x70 [ath10k_pci]
  [77451.338563]  ? ath10k_pci_wake.part.24+0xa0/0xa0 [ath10k_pci]
  [77451.338567]  ath10k_pci_napi_poll+0x54/0x110 [ath10k_pci]
  [77451.338571]  net_rx_action+0x140/0x3a0
  [77451.338575]  __do_softirq+0xe4/0x2d4
  [77451.338580]  irq_exit+0xc5/0xd0
  [77451.338582]  do_IRQ+0x8a/0xe0
  [77451.338585]  common_interrupt+0xf/0xf
  [77451.338586]  
  [77451.338589] RIP: 0010:cpuidle_enter_state+0xa5/0x2c0
  [77451.338590] Code: 8b 3d df bf 9d 63 e8 6a 09 89 ff 48 89 c3 0f 1f 44 00 00 
31 ff e8 cb 14 89 ff 45 84 ff 0f 85 c8 01 00 00 fb 66 0f 1f 44 00 00 <48> 2b 5d 
d0 48 ba cf f7 53 e3 a5 9b c4 20 48 89 d8 48 c1 fb 3f 48 
  [77451.338621] RSP: 0018:af4601993e50 EFLAGS: 0246 ORIG_RAX: 
ffde
  [77451.338623] RAX: 9d996e522c40 RBX: 46710b80e2b6 RCX: 
001f
  [77451.338624] RDX: 46710b80e2b6 RSI: 4041cc98 RDI: 

  [77451.338625] RBP: af4601993e90 R08: 0002 R09: 
000224c0
  [77451.338626] R10: af4601993e20 R11: 00d9 R12: 
0004
  [77451.338626] R13: 9d996e52ce00 R14: 9d3849f8 R15: 

  [77451.338630]  cpuidle_enter+0x17/0x20
  [77451.338632]  call_cpuidle+0x23/0x40
  [77451.338634]  do_idle+0x204/0x280
  [77451.338636]  cpu_startup_entry+0x73/0x80
  [77451.338639]  start_secondary+0x1ab/0x200
  [77451.338642]  secondary_startup_64+0xa5/0xb0
  [77451.338643] ---[ end trace 22914e3b3a848f81 ]---
  [77451.338655] ath10k_pci :02:00.0: failed to pop paddr list: -2

  $ uname -a
  Linux perseus 4.18.0-15-generic #16~18.04.1-Ubuntu SMP Thu Feb 7 14:06:04 UTC 
2019 x86_64 x86_64 x86_64 GNU/Linux

  $ modinfo ath10k_pci
  filename:   
/lib/modules/4.18.0-15-generic/kernel/drivers/net/wireless/ath/ath10k/ath10k_pci.ko
  firmware:   ath10k/QCA9377/hw1.0/board.bin
  firmware:   ath10k/QCA9377/hw1.0/firmware-5.bin
  firmware:   ath10k/QCA9377/hw1.0/firmware-6.bin
  firmware:   ath10k/QCA6174/hw3.0/board-2.bin
  firmware:   ath10k/QCA6174/hw3.0/board.bin
  firmware:   ath10k/QCA6174/hw3.0/firmware-6.bin
  firmware:   ath10k/QCA6174/hw3.0/firmware-5.bin
  firmware:   ath10k/QCA6174/hw3.0/firmware-4.bin
  firmware:   ath10k/QCA6174/hw2.1/board-2.bin
  firmware:   ath10k/QCA6174/hw2.1/board.bin
  firmware:   ath10k/QCA6174/hw2.1/firmware-5.bin
  firmware:   ath10k/QCA6174/hw2.1/firmware-4.bin
  firmware:   ath10k/QCA9887/hw1.0/board-2.bin
  firmware:   ath10k/QCA9887/hw1.0/board.bin
  firmware:   ath10k/QCA9887/hw1.0/firmware-5.bin
  firmware:   ath10k/QCA988X/hw2.0/board-2.bin
  firmware:   ath10k/QCA988X/hw2.0/board.bin
  firmware:   ath10k/QCA988X/hw2.0/firmware-5.bin
  firmware:   ath10k/QCA988X/hw2.0/firmware-4.bin
  firmware:   ath10k/QCA988X/hw2.0/firmware-3.bin
  firmware:   ath10k/QCA988X/hw2.0/firmware-2.bin
  license:Dual BSD/GPL
  description:Driver support for Qualcomm Atheros 802.11ac WLAN PCIe/AHB 
devices
  author: Qualcomm Atheros
  srcversion: D49EBAB0107B6CE28383BB8
  alias:  pci:v168Cd0050sv*sd*bc*sc*i*
  alias:  pci:v168Cd0042sv*sd*bc*sc*i*
  alias:  pci:v168Cd0046sv*sd*bc*sc*i*
  alias:  pci:v168Cd0056sv*sd*bc*sc*i*
  alias:  pci:v168Cd0040sv*sd*bc*sc*i*
  alias:  pci:v168Cd0

[Kernel-packages] [Bug 1836755] Missing required logs.

2019-07-16 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1836755

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836755

Title:
  hda/realtek: can't detect external mic on a Dell machine

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Incomplete

Bug description:
  [Impact]
  The external can't be detected when plugging headset in the
  front audio jack.

  [Fix]
  apply the alc891 fixup to set headset-mic and headpphone-mic pins.

  [Test Case]
  apply this patch and boot with the kernel, plug the headset-mic
  and choose headset-mic from popup dialogue, the headset-mic can
  record sound very well.

  [Regression Risk]
  Low. this patch is specific to a dell machine by pin configuration
  definition.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1836755/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1836755] Re: hda/realtek: can't detect external mic on a Dell machine

2019-07-16 Thread Hui Wang
** Description changed:

- [Expected result]
- External microphone can work well
+ [Impact]
+ The external can't be detected when plugging headset in the
+ front audio jack.
  
- [Actual result]
- Can not detect external microphone
+ [Fix]
+ apply the alc891 fixup to set headset-mic and headpphone-mic pins.
+ 
+ [Test Case]
+ apply this patch and boot with the kernel, plug the headset-mic
+ and choose headset-mic from popup dialogue, the headset-mic can
+ record sound very well.
+ 
+ [Regression Risk]
+ Low. this patch is specific to a dell machine by pin configuration
+ definition.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1836755

Title:
  hda/realtek: can't detect external mic on a Dell machine

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Incomplete

Bug description:
  [Impact]
  The external can't be detected when plugging headset in the
  front audio jack.

  [Fix]
  apply the alc891 fixup to set headset-mic and headpphone-mic pins.

  [Test Case]
  apply this patch and boot with the kernel, plug the headset-mic
  and choose headset-mic from popup dialogue, the headset-mic can
  record sound very well.

  [Regression Risk]
  Low. this patch is specific to a dell machine by pin configuration
  definition.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1836755/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


  1   2   >