пятница

[Bug 2092703] Re: Ubuntu 22.04 fails to start after kernel update to 6.8.0-50

The same bug affects me. I use a Lenovo ThinkPad T14 Gen 2 AMD laptop,
with Ryzen 5 PRO 5650U processor.

Ubuntu 22.04 fails to boot after the update (by the Software Updater application) on Friday 2024-12-20 to kernel Linux 6.8.0-50-generic on my laptop.
A black screen with blinking cursor appears after booting. Ctrl-Alt-Delete changes this to a Lenovo and Ubuntu logo, and triggers a restart. The same happens during each new boot to the now default kernel.
Selecting the old Linux 6.8.0-49-generic kernel during boot results in a successful boot and fully functional system, but any attempt with 6.8.0-50-generic fails.

When booting with with 6.8.0-50-generic, the following error message
appears in the log files: " org.gnome.Shell.desktop[1547]: Failed to
setup: No GPUs found ".

--
You received this bug notification because you are subscribed to linux
in Ubuntu.
Matching subscriptions: Bgg, Bmail, Nb
https://bugs.launchpad.net/bugs/2092703

Title:
Ubuntu 22.04 fails to start after kernel update to 6.8.0-50

Status in linux package in Ubuntu:
Confirmed

Bug description:
Hello, I've recently (2024-12-24) updated the kernel in my Ubuntu
22.04 from 6.8.0-49 to 6.8.0-50, but it doesn't work. I can still
successfully boot 6.8.0-49 kernel. I'm using Lenovo Thinkpad L15 Gen 2
with AMD Ryzen 5850U.

As far as I noticed in boot logs from previous boot (journalctl -b
-1), there is some problem with X.org:

gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (II) modesetting: Driver for Modesetting Kernel Drivers: kms
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (II) FBDEV: driver for framebuffer: fbdev
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (II) VESA: driver for VESA chipsets: vesa
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: xf86EnableIO: failed to enable I/O ports 0000-03ff (Operation not permitted)
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (EE) open /dev/dri/card0: No such file or directory
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (WW) Falling back to old probe method for modesetting
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (EE) open /dev/dri/card0: No such file or directory
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (II) Loading sub module "fbdevhw"
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (II) LoadModule: "fbdevhw"
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (II) Loading /usr/lib/xorg/modules/libfbdevhw.so
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (II) Module fbdevhw: vendor="X.Org Foundation"
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: compiled for 1.21.1.4, module version = 0.0.2
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: ABI class: X.Org Video Driver, version 25.2
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (EE) Unable to find a valid framebuffer device
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (WW) Falling back to old probe method for fbdev
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (II) Loading sub module "fbdevhw"
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (II) LoadModule: "fbdevhw"
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (II) Loading /usr/lib/xorg/modules/libfbdevhw.so
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (II) Module fbdevhw: vendor="X.Org Foundation"
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: compiled for 1.21.1.4, module version = 0.0.2
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: ABI class: X.Org Video Driver, version 25.2
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (EE) open /dev/fb0: No such file or directory
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: vesa: Ignoring device with a bound kernel driver
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (EE) Screen 0 deleted because of no matching config section.
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (II) UnloadModule: "modesetting"
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (EE) Screen 0 deleted because of no matching config section.
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (II) UnloadModule: "fbdev"
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (II) UnloadSubModule: "fbdevhw"
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (II) UnloadSubModule: "fbdevhw"
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (II) UnloadSubModule: "fbdevhw"
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (EE) Screen 0 deleted because of no matching config section.
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (II) UnloadModule: "vesa"
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (EE) Device(s) detected, but none match those in the config file.
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (EE)
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: Fatal server error:
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (EE) no screens found(EE)
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (EE)
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: Please consult the The X.Org Foundation support
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: at http://wiki.x.org
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: for help.
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (EE) Please also check the log file at "/var/log/Xorg.0.log" for additional information.
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (EE)
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1667]: (EE) Server terminated with error (1). Closing log file.
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a /usr/libexec/gdm-x-session[1664]: Unable to run X server
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a gdm-launch-environment][1657]: pam_unix(gdm-launch-environment:session): session closed for user gdm
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a gdm3[1205]: Gdm: GdmDisplay: Session never registered, failing
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a gdm-launch-environment][1657]: GLib-GObject: g_object_unref: assertion 'G_IS_OBJECT (object)' failed
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a kernel: logitech-hidpp-device 0003:046D:4082.0004: HID++ 4.5 device connected.
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a systemd[1]: session-c6.scope: Deactivated successfully.
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a gdm3[1205]: Gdm: GdmLocalDisplayFactory: maximum number of X display failures reached: check X server log for errors
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a gdm3[1205]: Gdm: Child process -1664 was already dead.
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a gdm3[1205]: Gdm: GdmDisplay: Session never registered, failing
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a systemd-logind[1049]: Session c6 logged out. Waiting for processes to exit.
gru 30 07:00:40 adrian-ThinkPad-L15-Gen-2a systemd-logind[1049]: Removed session c6.


When booting 6.8.0-49 (the one that works fine), I see it uses /dev/dri/card1 instead (extract from logs attached as kernel-6.8.0-49-journalctl-boot-logs-ok.txt).

I'm also attaching:

- cat /proc/version_signature > version.log (from the working kernel 6.8.0-49)
- sudo lspci -vnvn > lspci-vnvn.log (from the working kernel 6.8.0-49)
- apt-updated-packages.txt - a list of updated packages
- kernel-6.8.0-50-journalctl-boot-logs-issue.txt - extract from logs from journalctl -b -1 (boot attempt using problematic kernel 6.8.0-50)
- kernel-6.8.0-49-journalctl-boot-logs-ok.txt - extract from logs from journalctl -b -0 (booting working kernel 6.8.0-49)

How can I make kernel 6.8.0-50 work?

BR,
Adrian

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2092703/+subscriptions

[Bug 2091990] Re: ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel 5.15.0-127.137

This bug is awaiting verification that the linux-nvidia-tegra-
igx/5.15.0-1020.20 kernel in -proposed solves the problem. Please test
the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-jammy-linux-nvidia-tegra-
igx' to 'verification-done-jammy-linux-nvidia-tegra-igx'. If the problem
still exists, change the tag 'verification-needed-jammy-linux-nvidia-
tegra-igx' to 'verification-failed-jammy-linux-nvidia-tegra-igx'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-jammy-linux-nvidia-tegra-igx-v2 verification-needed-jammy-linux-nvidia-tegra-igx

--
You received this bug notification because you are subscribed to linux
in Ubuntu.
Matching subscriptions: Bgg, Bmail, Nb
https://bugs.launchpad.net/bugs/2091990

Title:
ovs/linuxbridge jobs running on ubuntu jammy broken with latest kernel
5.15.0-127.137

Status in linux package in Ubuntu:
Invalid
Status in linux source package in Jammy:
Fix Released
Status in linux source package in Oracular:
Fix Committed

Bug description:
A commit[1] got backported to ubuntu jammy kernel[2] which had an
issue, Fix is already available[3] but not got released with latest
kernel so all our ovs/linuxbridge/fullstack/functional jobs running on
ubuntu jammy are impacted. Master also impacted as we have grenade
jobs running on ubuntu and 1 dedicated job that we run on ubuntu
jammy.

Errors like below can be seen in these jobs
(4, ('', 'ip6tables-restore v1.8.7 (nf_tables): unknown option "--set-xmark"\nError occurred at line: 26\nTry `ip6tables-restore -h\' or \'ip6tables-restore --help\' for more information.\n', 2)) {{(pid=56448)

# Completed by iptables_manager
; Stdout: ; Stderr: ip6tables-restore v1.8.7 (nf_tables): unknown option "--set-xmark"
Error occurred at line: 26
Try `ip6tables-restore -h' or 'ip6tables-restore --help' for more information.

example failures:-
https://b711d185688da3b864bc-5593d50c131879f6a486eeedbad80e3c.ssl.cf2.rackcdn.com/937879/1/check/neutron-functional-with-uwsgi/91e08a5/testr_results.html
https://2d070bf6c45f6c37d47e-4e5a5ec72a48e33cae1713c394f26e02.ssl.cf1.rackcdn.com/937879/1/check/neutron-fullstack-with-uwsgi/4b33689/testr_results.html
https://storage.bhs.cloud.ovh.net/v1/AUTH_dcaab5e32b234d56b626f72581e3644c/zuul_opendev_logs_720/937879/1/check/neutron-ovs-grenade-dvr-multinode/720442a/controller/logs/grenade.sh_log.txt
https://storage.gra.cloud.ovh.net/v1/AUTH_dcaab5e32b234d56b626f72581e3644c/zuul_opendev_logs_0be/937603/2/check/neutron-tempest-plugin-openvswitch-ubuntu-jammy/0be23a8/testr_results.html
https://7c5dce2b8628b0a2e78b-f88cc2e228aea8b2c74f92ce7ecb609d.ssl.cf1.rackcdn.com/periodic/opendev.org/openstack/neutron/stable/2024.2/neutron-tempest-plugin-linuxbridge-2024-2/1d99042/testr_results.html


[1] https://github.com/torvalds/linux/commit/0bfcb7b71e735560077a42847f69597ec7dcc326
[2] https://launchpad.net/ubuntu/+source/linux/5.15.0-127.137
[3] https://github.com/torvalds/linux/commit/306ed1728e8438caed30332e1ab46b28c25fe3d8

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2091990/+subscriptions

[Bug 1959940] Re: [22.10 FEAT] KVM: Secure Execution guest dump encryption with customer keys - kernel part

This bug is awaiting verification that the linux-nvidia-tegra-
igx/5.15.0-1020.20 kernel in -proposed solves the problem. Please test
the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-jammy-linux-nvidia-tegra-
igx' to 'verification-done-jammy-linux-nvidia-tegra-igx'. If the problem
still exists, change the tag 'verification-needed-jammy-linux-nvidia-
tegra-igx' to 'verification-failed-jammy-linux-nvidia-tegra-igx'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-jammy-linux-nvidia-tegra-igx-v2 verification-needed-jammy-linux-nvidia-tegra-igx

--
You received this bug notification because you are subscribed to linux
in Ubuntu.
Matching subscriptions: Bgg, Bmail, Nb
https://bugs.launchpad.net/bugs/1959940

Title:
[22.10 FEAT] KVM: Secure Execution guest dump encryption with customer
keys - kernel part

Status in Ubuntu on IBM z Systems:
Fix Released
Status in linux package in Ubuntu:
Fix Released
Status in linux source package in Jammy:
Fix Released

Bug description:
SRU Justification:

[ Impact ]

* Hypervisor-initiated dumps for Secure Execution
(aka confidential computing) guests are not helpful,
because memory and CPU state is encrypted by a
transient key only available to the Ultravisor (uv).

* Workload owners can still configure kdump in order to obtain kernel
crash information, but there are situation where kdump doesn't work.

* In such situations problem determination is severely impeded.

* This patch set solves this by implementing dumps created in a way
that can only be decrypted by the owner of the guest image
and be used for problem determination.

[ Test Plan ]

* The setup of a Secure Execution environment is not trivial
and requires a certain set of hardware (IBM z15 or higher)
with FC 115).

* On top of the modification of qemu that are handled in this
LP bug, modifications of the Kernel (LP#1959940) and
the s390-tools (LP#1959965) are required on top.

* So at least a modified kernel and qemu test builds are needed
or both should be in -proposed at the same time (which might
be difficult).
A modified s390-tools is not urgently needed, since for the
verification of the kernel and qemu part a newer version
can be used (but a modified s390-tools is also available in PPA).

* A detailed description (using Ubuntu as example) on how to setup
secure execution is available here:
Introducing IBM Secure Execution for Linux, April 2024 update
https://www.ibm.com/docs/en/linuxonibm/pdf/lx24se04.pdf

* And information on 'Working with dumps of KVM guests in
IBM Secure Execution mode' is available here:
https://www.ibm.com/docs/en/linux-on-systems?topic=commands-zgetdump#czgetdump__se_dump_examples

[ Where problems could occur ]

* Ultravisor (uv) return codes are introduced, which is
generally appreciated. Just the right return codes need to be set
(and reacted upon).

* Protected virtual machine dumps are newly introduced on top of
dump of 'normal' KVM VMs.
Since code is shared, it could have an unforeseen impact.

* The doc renaming could lead to confusion,
if people rely on old doc structure.

* The new capability case (217) could cause issues,
for example is case of issues during initialization..

* CPU dump functionality was added (mainly as new s390x specific code
under s390/kvm), but CPU dump is only one part,
if not working correctly, it may lead to partially useless dump data.

* Configuration dump functionality was also added
(again mainly as new s390x specific code under s390/kvm),
similar to CPU dump.
And moving from dumping inside of a VM to dumping from outside
(due to potential failures if done inside), might lead to a more
complex flow (now involving the uv), hence could be more error prone.

* Adding query dump information, requires user space buffers.
Here it's crucial that buffer size is big enough.

* The newly added constants and structure definitions that are
needed for dump support could become problematic in case wrong
data types were used (applies to all header modifications).

* IOCTL for PV information retrieval got introduced
(kvm_s390_handle_pv_info, kvm_s390_handle_pv).
There are potential side effect (see man ioctl),
hence all potential failure cases should be covered.

* New dump feature requires to know how much memory is needed, but if
this call for this is incorrect, it could break the dump process.

* uv_cb_header struct changed to offset representation,
but using wrong offsets will lead to a wrong struct,
dump issues and potential crashes.

[ Other Info ]

* Since 22.04 is a popular LTS release, it is already in use by many
secure execution customers.
But in case of severe crashes or issues in the secure execution
(KVM) guests dumps cannot be used as of today.

* This enables customers, IBM and Canonical to get support in case of
crashes/dumps on hardware that runs secure execution environments.

__________

KVM: Secure Execution guest dump encryption with customer keys -
kernel part

Description:
Hypervisor-initiated dumps for Secure Execution guests are not helpful because memory and CPU state is encrypted by a transient key only available to the Ultravisor. Workload owners can still configure kdump in order to obtain kernel crash infomation, but there are situation where kdump doesn't work. In such situations problem determination is severely impeded. This feature will implement dumps created in a way that can only be decrypted by the owner of the guest image and be used for problem determination.

Request Type: Kernel - Enhancement from IBM
Upstream Acceptance: In Progress
Code Contribution: IBM code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959940/+subscriptions

[Bug 2064176] Re: LXD fan bridge causes blocked tasks

This bug is awaiting verification that the linux-nvidia-tegra-
igx/5.15.0-1020.20 kernel in -proposed solves the problem. Please test
the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-jammy-linux-nvidia-tegra-
igx' to 'verification-done-jammy-linux-nvidia-tegra-igx'. If the problem
still exists, change the tag 'verification-needed-jammy-linux-nvidia-
tegra-igx' to 'verification-failed-jammy-linux-nvidia-tegra-igx'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-jammy-linux-nvidia-tegra-igx-v2 verification-needed-jammy-linux-nvidia-tegra-igx

--
You received this bug notification because you are subscribed to linux
in Ubuntu.
Matching subscriptions: Bgg, Bmail, Nb
https://bugs.launchpad.net/bugs/2064176

Title:
LXD fan bridge causes blocked tasks

Status in linux package in Ubuntu:
Invalid
Status in linux source package in Jammy:
Fix Released
Status in linux source package in Noble:
Fix Released
Status in linux source package in Oracular:
Fix Released

Bug description:
SRU Justification:

[Impact]

User can trigger a host crash on Jammy/Noble by launching
a container which uses Ubuntu FAN network in LXD.

[Fix]

A first proposed patch fixes RCU locking by releasing rcu_read_lock
on the skb discard codepath.

Second patch just use a proper way (dev_core_stats_tx_dropped_inc() function)
to increase netdev's tx_dropped statistic value.

[Test Plan]

As provided by Max Asnaashari:

# Install LXD from channel latest/stable
snap install lxd --channel latest/stable

# Configure LXD
lxd init --auto

# Create a FAN network
lxc network create lxdfan0 bridge.mode=fan ipv4.nat=true

# Launch a container using the FAN network
lxc launch ubuntu-minimal:22.04 c1 --network lxdfan0

# Try to interact with LXD
lxc ls

[Where problems could occur]

Change is local and only related to Ubuntu FAN code. I would not expect
any problems with this patchset.

Hi, cross posting this from
https://github.com/canonical/lxd/issues/12161

I've got a lxd cluster running across 3 VMs using the fan bridge. I'm
using a dev revision of LXD based on 6413a948. Creating a container
causes the trace in the attached syslog snippet; this causes the
container creation process to hang indefinitely. ssh logins, `lxc
shell cluster1`, and `ps -aux` also hang.

Apr 29 17:15:01 cluster1 kernel: [ 161.250951] ------------[ cut here ]------------
Apr 29 17:15:01 cluster1 kernel: [ 161.250957] Voluntary context switch within RCU read-side critical section!
Apr 29 17:15:01 cluster1 kernel: [ 161.250990] WARNING: CPU: 2 PID: 510 at kernel/rcu/tree_plugin.h:320 rcu_note_context_switch+0x2a7/0x2f0
Apr 29 17:15:01 cluster1 kernel: [ 161.251003] Modules linked in: nft_masq nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 vxlan ip6_udp_tunnel udp_tunnel dummy br
idge stp llc zfs(PO) spl(O) nf_tables libcrc32c nfnetlink vhost_vsock vhost vhost_iotlb binfmt_misc nls_iso8859_1 intel_rapl_msr intel_rapl_common kvm_intel kvm irqbypass crct10dif
_pclmul crc32_pclmul virtio_gpu polyval_clmulni polyval_generic ghash_clmulni_intel sha256_ssse3 sha1_ssse3 virtio_dma_buf aesni_intel vmw_vsock_virtio_transport 9pnet_virtio xhci_
pci drm_shmem_helper i2c_i801 ahci 9pnet vmw_vsock_virtio_transport_common xhci_pci_renesas drm_kms_helper libahci crypto_simd joydev virtio_input cryptd lpc_ich virtiofs i2c_smbus
 vsock psmouse input_leds mac_hid serio_raw rapl qemu_fw_cfg vmgenid nfsd dm_multipath auth_rpcgss scsi_dh_rdac nfs_acl lockd scsi_dh_emc scsi_dh_alua grace sch_fq_codel drm sunrpc
 efi_pstore virtio_rng ip_tables x_tables autofs4
Apr 29 17:15:01 cluster1 kernel: [ 161.251085] CPU: 2 PID: 510 Comm: nmbd Tainted: P O 6.5.0-28-generic #29~22.04.1-Ubuntu
Apr 29 17:15:01 cluster1 kernel: [ 161.251089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS unknown 2/2/2022
Apr 29 17:15:01 cluster1 kernel: [ 161.251091] RIP: 0010:rcu_note_context_switch+0x2a7/0x2f0
Apr 29 17:15:01 cluster1 kernel: [ 161.251095] Code: 08 f0 83 44 24 fc 00 48 89 de 4c 89 f7 e8 d1 af ff ff e9 1e fe ff ff 48 c7 c7 d0 60 56 88 c6 05 e6 27 40 02 01 e8 79 b2 f2 ff
<0f> 0b e9 bd fd ff ff a9 ff ff ff 7f 0f 84 75 fe ff ff 65 48 8b 3c
Apr 29 17:15:01 cluster1 kernel: [ 161.251098] RSP: 0018:ffffb9cbc11dbbc8 EFLAGS: 00010046
Apr 29 17:15:01 cluster1 kernel: [ 161.251101] RAX: 0000000000000000 RBX: ffff941ef7cb3f80 RCX: 0000000000000000
Apr 29 17:15:01 cluster1 kernel: [ 161.251103] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
Apr 29 17:15:01 cluster1 kernel: [ 161.251104] RBP: ffffb9cbc11dbbe8 R08: 0000000000000000 R09: 0000000000000000
Apr 29 17:15:01 cluster1 kernel: [ 161.251106] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
Apr 29 17:15:01 cluster1 kernel: [ 161.251111] R13: ffff941d893e9980 R14: 0000000000000000 R15: ffff941d80ad7a80
Apr 29 17:15:01 cluster1 kernel: [ 161.251113] FS: 00007c7dcbdb8a00(0000) GS:ffff941ef7c80000(0000) knlGS:0000000000000000
Apr 29 17:15:01 cluster1 kernel: [ 161.251115] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Apr 29 17:15:01 cluster1 kernel: [ 161.251117] CR2: 00005a30877ae488 CR3: 0000000105888003 CR4: 0000000000170ee0
Apr 29 17:15:01 cluster1 kernel: [ 161.251122] Call Trace:
Apr 29 17:15:01 cluster1 kernel: [ 161.251128] <TASK>
Apr 29 17:15:01 cluster1 kernel: [ 161.251133] ? show_regs+0x6d/0x80
Apr 29 17:15:01 cluster1 kernel: [ 161.251145] ? __warn+0x89/0x160
Apr 29 17:15:01 cluster1 kernel: [ 161.251152] ? rcu_note_context_switch+0x2a7/0x2f0
Apr 29 17:15:01 cluster1 kernel: [ 161.251155] ? report_bug+0x17e/0x1b0
Apr 29 17:15:01 cluster1 kernel: [ 161.251172] ? handle_bug+0x46/0x90
Apr 29 17:15:01 cluster1 kernel: [ 161.251187] ? exc_invalid_op+0x18/0x80
Apr 29 17:15:01 cluster1 kernel: [ 161.251190] ? asm_exc_invalid_op+0x1b/0x20
Apr 29 17:15:01 cluster1 kernel: [ 161.251202] ? rcu_note_context_switch+0x2a7/0x2f0
Apr 29 17:15:01 cluster1 kernel: [ 161.251205] ? rcu_note_context_switch+0x2a7/0x2f0
Apr 29 17:15:01 cluster1 kernel: [ 161.251208] __schedule+0xcc/0x750
Apr 29 17:15:01 cluster1 kernel: [ 161.251218] schedule+0x63/0x110
Apr 29 17:15:01 cluster1 kernel: [ 161.251222] schedule_hrtimeout_range_clock+0xbc/0x130
Apr 29 17:15:01 cluster1 kernel: [ 161.251238] ? __pfx_hrtimer_wakeup+0x10/0x10
Apr 29 17:15:01 cluster1 kernel: [ 161.251245] schedule_hrtimeout_range+0x13/0x30
Apr 29 17:15:01 cluster1 kernel: [ 161.251248] ep_poll+0x33f/0x390
Apr 29 17:15:01 cluster1 kernel: [ 161.251254] ? __pfx_ep_autoremove_wake_function+0x10/0x10
Apr 29 17:15:01 cluster1 kernel: [ 161.251257] do_epoll_wait+0xdb/0x100
Apr 29 17:15:01 cluster1 kernel: [ 161.251259] __x64_sys_epoll_wait+0x6f/0x110
Apr 29 17:15:01 cluster1 kernel: [ 161.251265] do_syscall_64+0x5b/0x90
Apr 29 17:15:01 cluster1 kernel: [ 161.251270] ? do_epoll_ctl+0x3cb/0x860
Apr 29 17:15:01 cluster1 kernel: [ 161.251273] ? __task_pid_nr_ns+0x6c/0xc0
Apr 29 17:15:01 cluster1 kernel: [ 161.251279] ? exit_to_user_mode_prepare+0x30/0xb0
Apr 29 17:15:01 cluster1 kernel: [ 161.251284] ? syscall_exit_to_user_mode+0x37/0x60
Apr 29 17:15:01 cluster1 kernel: [ 161.251286] ? do_syscall_64+0x67/0x90
Apr 29 17:15:01 cluster1 kernel: [ 161.251288] ? syscall_exit_to_user_mode+0x37/0x60
Apr 29 17:15:01 cluster1 kernel: [ 161.251300] ? do_syscall_64+0x67/0x90
Apr 29 17:15:01 cluster1 kernel: [ 161.251304] ? syscall_exit_to_user_mode+0x37/0x60
Apr 29 17:15:01 cluster1 kernel: [ 161.251306] ? do_syscall_64+0x67/0x90
Apr 29 17:15:01 cluster1 kernel: [ 161.251309] ? do_syscall_64+0x67/0x90
Apr 29 17:15:01 cluster1 kernel: [ 161.251313] entry_SYSCALL_64_after_hwframe+0x6e/0xd8
Apr 29 17:15:01 cluster1 kernel: [ 161.251316] RIP: 0033:0x7c7dcf325dea
Apr 29 17:15:01 cluster1 kernel: [ 161.251333] Code: 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 e8 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 5e c3 0f 1f 44 00 00 48 83 ec 28 89 54 24 18
Apr 29 17:15:01 cluster1 kernel: [ 161.251335] RSP: 002b:00007ffdde5e0278 EFLAGS: 00000246 ORIG_RAX: 00000000000000e8
Apr 29 17:15:01 cluster1 kernel: [ 161.251338] RAX: ffffffffffffffda RBX: 00005a30877a2ea0 RCX: 00007c7dcf325dea
Apr 29 17:15:01 cluster1 kernel: [ 161.251340] RDX: 0000000000000001 RSI: 00007ffdde5e02ac RDI: 0000000000000005
Apr 29 17:15:01 cluster1 kernel: [ 161.251341] RBP: 00005a3087794590 R08: 00000000000f423f R09: 00007ffdde5e0357
Apr 29 17:15:01 cluster1 kernel: [ 161.251343] R10: 00000000000003e8 R11: 0000000000000246 R12: 00005a30877a2f30
Apr 29 17:15:01 cluster1 kernel: [ 161.251345] R13: 00000000000003e8 R14: 0000000000000090 R15: 000000000000000a
Apr 29 17:15:01 cluster1 kernel: [ 161.251348] </TASK>
Apr 29 17:15:01 cluster1 kernel: [ 161.251349] ---[ end trace 0000000000000000 ]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2064176/+subscriptions

[Bug 2069961] Re: turbostat fails with too many open files on large systems

This bug is awaiting verification that the linux-nvidia-tegra-
igx/5.15.0-1020.20 kernel in -proposed solves the problem. Please test
the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-jammy-linux-nvidia-tegra-
igx' to 'verification-done-jammy-linux-nvidia-tegra-igx'. If the problem
still exists, change the tag 'verification-needed-jammy-linux-nvidia-
tegra-igx' to 'verification-failed-jammy-linux-nvidia-tegra-igx'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-jammy-linux-nvidia-tegra-igx-v2 verification-needed-jammy-linux-nvidia-tegra-igx

--
You received this bug notification because you are subscribed to linux
in Ubuntu.
Matching subscriptions: Bgg, Bmail, Nb
https://bugs.launchpad.net/bugs/2069961

Title:
turbostat fails with too many open files on large systems

Status in linux package in Ubuntu:
Fix Released
Status in linux source package in Jammy:
Fix Released
Status in linux source package in Mantic:
Won't Fix
Status in linux source package in Noble:
Fix Released

Bug description:
BugLink: https://bugs.launchpad.net/bugs/2069961

[Impact]

On large systems, e.g. with 512 cpus or more, turbostat fails to run
due to exceeding the rlimit for number of files. 512 cpus requires
1028 file descriptors, but the current limit is 999.

$ lscpu
...
CPU(s): 512
  On-line CPU(s) list: 0-511
...

$ sudo turbostat
...
turbostat: /sys/devices/system/cpu/cpu477/cpuidle/state0/usage: open failed: Too many open files

There is no workaround, apart from maybe using powerstat instead.

[Fix]

The fix is to increase the rlimit to increase the amount of file
descriptors that turbostat can open to 2^15, which should be plenty
for some time to come.

commit 3ac1d14d0583a2de75d49a5234d767e2590384dd
Author: Wyes Karny <wyes.karny@amd.com>
Date: Tue Oct 3 05:07:51 2023 +0000
Subject: tools/power turbostat: Increase the limit for fd opened
Link: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3ac1d14d0583a2de75d49a5234d767e2590384dd

This landed in 6.9-rc4, and requires a backport for minor context
adjustment in the first hunk for jammy. Noble got fixed already
through upstream stable.

[Testcase]

Deploy a bare metal system with 512 or more cpus.

Install linux-tools:

$ sudo apt install linux-tools-$(uname -r)

Run turbostat:

$ sudo turbostat
...
turbostat: /sys/devices/system/cpu/cpu477/cpuidle/state0/usage: open failed: Too many open files

There are test kernels available in the following ppa:

https://launchpad.net/~mruffell/+archive/ubuntu/sf388491-test

If you install them, you should be able to see normal turbostat output
for all cpus installed in the system.

[Where problems can occur]

We are simply increasing the rlimit for file descriptors that
turbostat can open. This should have no impact on any existing
systems.

If a regression should occur, then turbostat functionality might not
work. Users could use powerstat instead as a workaround while things
are fixed.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2069961/+subscriptions

[Bug 2074380] Re: [UBUNTU 22.04] s390/cpum_cf: make crypto counters upward compatible

This bug is awaiting verification that the linux-nvidia-tegra-
igx/5.15.0-1020.20 kernel in -proposed solves the problem. Please test
the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-jammy-linux-nvidia-tegra-
igx' to 'verification-done-jammy-linux-nvidia-tegra-igx'. If the problem
still exists, change the tag 'verification-needed-jammy-linux-nvidia-
tegra-igx' to 'verification-failed-jammy-linux-nvidia-tegra-igx'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-jammy-linux-nvidia-tegra-igx-v2 verification-needed-jammy-linux-nvidia-tegra-igx

--
You received this bug notification because you are subscribed to linux
in Ubuntu.
Matching subscriptions: Bgg, Bmail, Nb
https://bugs.launchpad.net/bugs/2074380

Title:
[UBUNTU 22.04] s390/cpum_cf: make crypto counters upward compatible

Status in Ubuntu on IBM z Systems:
Fix Released
Status in linux package in Ubuntu:
Fix Released
Status in linux source package in Jammy:
Fix Released
Status in linux source package in Noble:
Fix Released

Bug description:
SRU Justification:

[ Impact ]

 * The CPU Measurement Facility (CPU MF) crypto counter set
   is not listed in the device sysfs tree - it's not exported
   in the sysfs directory /sys/devices/cpum_cf/events.

 * The attribute files for each CPU-MF counter defined
   in the crypto counter set is missing.

 * This is caused by the counter second version number of CPU MF
   hardware being incremented on new machines.

 * This causes a sanity check to fail,
   but the counters are supported by hardware.

 * The solution is to remove the upper limit in counter second
   version number check.

[ Fix ]

 * f10933cbd2df f10933cbd2dfddf6273698a45f76db9bafd8150f
"s390/cpum_cf: make crypto counters upward compatible across machine types"

 * The fix was upstream accepted with kernel v6.10(-rc1).

* Upstream commit applies cleanly on noble master-next,
but needed to be backported to jammy master-next due to different code
and context in kernel 5.15.

[ Test Plan ]

 * Run the following commands on a new machine generation:
   (hence only doable by IBM)
   # ls -l /sys/devices/cpum_cf/events/ | grep AES

 * If the output is empty than this patch is required.

 * With a patched kernel the output should be like:
   # ls /sys/devices/cpum_cf/events/ | grep AES
   AES_BLOCKED_CYCLES
   AES_BLOCKED_FUNCTIONS
   AES_CYCLES
   AES_FUNCTIONS

[ Where problems could occur ]

 * This affects s390x only - CPU MF is s390-specific,
   and only s390 specific code is modified.

 * And it furthermore is limited to the crypto counter set
   of CPU MF.

 * So any impact is likely limited to hardware crypto counters
   on s390x only.

 * In s390/kernel/perf_cpum_cf.c the else if case got changed from
   explicitly checking for 6 or 7 to >= 6 which seems to require
   attention for future 8 and more cases.

 * In s390/kernel/perf_cpum_cf_events.c the switch (ci.csvn) statement
   was changed to an if / else if with similar logic.
   Again attentioin for any potential future cases >= 8.

 * It does not look like currently used cases (1..5 and 6..7)
   are affected by the modification, just >7.

 * Test build of patched jammy and noble s390x kernels were build
   and are avaiable here:
   https://launchpad.net/~fheimes/+archive/ubuntu/lp2074380

[ Other Info ]

 * Since the code/fix was upstream accepted with kernel v6.10(-rc1)
   it does not affect the current development release oracular.

 * This SRU can also be seen under the umbrella of new
    hardware enablement.

 * Since it requires special hw, the verification needs to be
   done by IBM.

__________

Description: kernel: s390/cpum_cf: make crypto counters upward
compatible

Symptom: The CPU Measurement facility crypto counter set is not
               listed in the device sysfs tree.

Problem: The CPU Measurement facility crypto counter set is not
               exported in the sysfs directory
               /sys/devices/cpum_cf/events.
               The attribute files for each CPU-MF counter defined
               in the crypto counter set is missing. This is caused
               by the counter second version number of the CPU
               Measurement Facility hardware being incremented on
               new machines. This causes a sanity check to fail,
               but the counters are supported by hardware.

Solution: Remove upper limit in counter second version number
               check.

Reproduction: Run command on a new machine generation:
                # ls -l /sys/devices/cpum_cf/events/ | grep AES
                #
               If the output is empty than this patch is required.
               The output should be:
                # ls /sys/devices/cpum_cf/events/ | grep AES
                AES_BLOCKED_CYCLES
                AES_BLOCKED_FUNCTIONS
                AES_CYCLES
                AES_FUNCTIONS
                #

Upstream-ID of fix: f10933cbd2dfddf6273698a45f76db9bafd8150f

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2074380/+subscriptions

[Bug 2077321] Re: Please backport the more restrictive XSAVES deactivation for Zen1/2 arch

This bug is awaiting verification that the linux-nvidia-tegra-
igx/5.15.0-1020.20 kernel in -proposed solves the problem. Please test
the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-jammy-linux-nvidia-tegra-
igx' to 'verification-done-jammy-linux-nvidia-tegra-igx'. If the problem
still exists, change the tag 'verification-needed-jammy-linux-nvidia-
tegra-igx' to 'verification-failed-jammy-linux-nvidia-tegra-igx'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-jammy-linux-nvidia-tegra-igx-v2 verification-needed-jammy-linux-nvidia-tegra-igx

--
You received this bug notification because you are subscribed to linux
in Ubuntu.
Matching subscriptions: Bgg, Bmail, Nb
https://bugs.launchpad.net/bugs/2077321

Title:
Please backport the more restrictive XSAVES deactivation for Zen1/2
arch

Status in linux package in Ubuntu:
Confirmed
Status in linux source package in Jammy:
Fix Released
Status in linux source package in Noble:
Fix Released
Status in linux source package in Oracular:
Confirmed

Bug description:
On recent kernels, commit https://git.launchpad.net/~ubuntu-
kernel/ubuntu/+source/linux/+git/jammy/commit/?id=b0563468eeac88ebc70559d52a0b66efc37e4e9d
deactivate the XSAVES instruction for Zen 1/2 architectures.

This means that for a QEMU vm using cpu=host running on older kernels
where XSAVES is activated, it will not be possible to migrate that VM
to newer kernels which have the XSAVES disabled.

The more recent commit
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=29ba89f1895285f06c333546882e0c5ae9a6df23
only deactivates XSAVES on kernel where the fixed microcode is not
present.

This will prevent the QEMU migration problem to occur on AMD system
where the microcode has been correctly updated.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2077321/+subscriptions

[Bug 2080378] Re: IOMMU warnings on AMD systems after booting into kdump kernel

This bug is awaiting verification that the linux-nvidia-tegra-
igx/5.15.0-1020.20 kernel in -proposed solves the problem. Please test
the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-jammy-linux-nvidia-tegra-
igx' to 'verification-done-jammy-linux-nvidia-tegra-igx'. If the problem
still exists, change the tag 'verification-needed-jammy-linux-nvidia-
tegra-igx' to 'verification-failed-jammy-linux-nvidia-tegra-igx'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-jammy-linux-nvidia-tegra-igx-v2 verification-needed-jammy-linux-nvidia-tegra-igx

--
You received this bug notification because you are subscribed to linux
in Ubuntu.
Matching subscriptions: Bgg, Bmail, Nb
https://bugs.launchpad.net/bugs/2080378

Title:
IOMMU warnings on AMD systems after booting into kdump kernel

Status in linux package in Ubuntu:
Invalid
Status in linux source package in Jammy:
Fix Released

Bug description:
[impact]
On some AMD systems, loading into a kdump kernel will show a few warnings IOMMU warnings during early boot. These warnings have not been observed yet to cause any issues but there is a fix upstream for them. Currently only focal-HWE and jammy 5.15 are affected. Newer kernel releases already have the fix. The stack traces look like the following:

    [ 9.125703] WARNING: CPU: 0 PID: 1 at drivers/iommu/amd/init.c:829 iommu_init_irq+0x2f2/0x3c0
    [ 9.134223] Modules linked in:
    [ 9.137283] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.15.0-107-generic #117~20.04.1-Ubuntu
    [ 9.145716] Hardware name: <hidden>
    [ 9.153111] RIP: 0010:iommu_init_irq+0x2f2/0x3c0
    [ 9.157729] Code: 90 ff 85 c0 0f 84 e8 fd ff ff be 01 00 00 00 44 89 ef 89 45 94 e8 2e dc 90 ff 4c 89 e7 e8 b6 cf 90 ff 8b 45 94 e9 6c fd ff ff <0f> 0b 31 c0 e9 63 fd ff ff 0f 0b 31 c0 e9 5a fd ff ff 31 c9 48 c7
    [ 9.176475] RSP: 0018:ffffa005000fbd00 EFLAGS: 00010202
    [ 9.181703] RAX: 0000000000000198 RBX: ffff9335af44a000 RCX: ffffa00500100000
    [ 9.188838] RDX: ffffa00500100000 RSI: ffff9335c05b9140 RDI: ffff9335c05b95c8
    [ 9.195970] RBP: ffffa005000fbd70 R08: ffffffffffffffff R09: 0000000000000000
    [ 9.203101] R10: ffffffe000000000 R11: 0000000000000025 R12: ffff9335c0468cc0
    [ 9.210231] R13: 000000000000001a R14: ffff9335b0151600 R15: 0000000000000006
    [ 9.217362] FS: 0000000000000000(0000) GS:ffff9336aec00000(0000) knlGS:0000000000000000
    [ 9.225446] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    [ 9.231185] CR2: 0000000000000000 CR3: 000002006c810000 CR4: 0000000000350ef0
    [ 9.238318] Call Trace:
    [ 9.240763] <TASK>
    [ 9.242869] ? show_regs.cold+0x1a/0x1f
    [ 9.246710] ? iommu_init_irq+0x2f2/0x3c0
    [ 9.250722] ? __warn+0x8b/0xe0
    [ 9.253868] ? iommu_init_irq+0x2f2/0x3c0
    [ 9.257883] ? report_bug+0xd5/0x110
    [ 9.261461] ? handle_bug+0x39/0x90
    [ 9.264956] ? exc_invalid_op+0x19/0x70
    [ 9.268794] ? asm_exc_invalid_op+0x1b/0x20
    [ 9.272980] ? iommu_init_irq+0x2f2/0x3c0
    [ 9.276993] ? e820__memblock_setup+0x89/0x89
    [ 9.281353] state_next+0x3f5/0x6ba
    [ 9.284847] ? e820__memblock_setup+0x89/0x89
    [ 9.289206] iommu_go_to_state+0x28/0x31
    [ 9.293131] amd_iommu_init+0x15/0x4f
    [ 9.296797] ? e820__memblock_setup+0x89/0x89
    [ 9.301150] pci_iommu_init+0x1a/0x48
    [ 9.304817] do_one_initcall+0x48/0x1e0
    [ 9.308655] kernel_init_freeable+0x284/0x2f1
    [ 9.313016] ? rest_init+0x100/0x100
    [ 9.316593] kernel_init+0x1b/0x150
    [ 9.320078] ? rest_init+0x100/0x100
    [ 9.323658] ret_from_fork+0x22/0x30
    [ 9.327238] </TASK>
    [ 9.329431] ---[ end trace 6113ebe8cb8ce54f ]---

The commit that fixes the issue is:

* c5e1a1eb9279 ("iommu/amd: Simplify and Consolidate Virtual APIC
(AVIC) Enablement")

However another commit was also created that fixed compiler warnings
introduced by the above commit:

* be280ea763f7 ("iommu/amd: Fix compile warning in init code")

[Test Plan]

1- On a machine using an AMD CPU and running the focal-hwe or jammy
5.15 kernel, make sure kdump is configured following these steps:
https://ubuntu.com/server/docs/kernel-crash-dump

2- Trigger a kernel panic. This can be done using the command:

$ echo c > /proc/sysrq-trigger

3- When the machine reboots, you will notice IOMMU warnings during the
early phases of the boot process in dmesg.

4- After applying the two commits and repeating step 2. No IOMMU
warnings should show up anymore in dmesg.

[Fix]
Only the first commit of the below list is required to fix the bug, but the second one is good to have to avoid compilation warnings introduced by that commit:

* c5e1a1eb9279 ("iommu/amd: Simplify and Consolidate Virtual APIC (AVIC) Enablement")
* be280ea763f7 ("iommu/amd: Fix compile warning in init code")

[where problems could occur]

* IOMMU can fail to initialize after applying these commits on AMD
systems.

* There is a chance these commits do not fix IOMMU warnings for all
AMD system configurations

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2080378/+subscriptions

[Bug 2085082] Re: Cannot detect audio sinks and sources in proposed kernel

This bug is awaiting verification that the linux-nvidia-tegra-
igx/5.15.0-1020.20 kernel in -proposed solves the problem. Please test
the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-jammy-linux-nvidia-tegra-
igx' to 'verification-done-jammy-linux-nvidia-tegra-igx'. If the problem
still exists, change the tag 'verification-needed-jammy-linux-nvidia-
tegra-igx' to 'verification-failed-jammy-linux-nvidia-tegra-igx'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-jammy-linux-nvidia-tegra-igx-v2 verification-needed-jammy-linux-nvidia-tegra-igx

--
You received this bug notification because you are subscribed to linux
in Ubuntu.
Matching subscriptions: Bgg, Bmail, Nb
https://bugs.launchpad.net/bugs/2085082

Title:
Cannot detect audio sinks and sources in proposed kernel

Status in linux package in Ubuntu:
New
Status in linux-hwe-5.15 package in Ubuntu:
Invalid
Status in linux source package in Focal:
Invalid
Status in linux-hwe-5.15 source package in Focal:
Fix Released
Status in linux source package in Jammy:
Fix Released
Status in linux-hwe-5.15 source package in Jammy:
Invalid

Bug description:
[Impact]

Failed to detect audio sinks/sources.

[Test Case]

1. run "pactl list sinks short | grep -v -E "monitor|auto_null" to check if any sinks was found
2. run "pactl list sources short | grep -v -E "monitor|auto_null" to check if any sources was found


[Verify]

1. reverse the kernel to 5.15.0.124
2. run the same tests
3. confirmed audio is activate


[Fail rate]

3/3


[Expected result]

0 alsa_output.pci-0000_00_1f.3-platform-sof_sdw.HiFi__hw_sofsoundwire_7__sink module-alsa-card.c s16le 2ch 48000Hz SUSPENDED
1 alsa_output.pci-0000_00_1f.3-platform-sof_sdw.HiFi__hw_sofsoundwire_6__sink module-alsa-card.c s16le 2ch 48000Hz SUSPENDED
2 alsa_output.pci-0000_00_1f.3-platform-sof_sdw.HiFi__hw_sofsoundwire_5__sink module-alsa-card.c s16le 2ch 48000Hz SUSPENDED
3 alsa_output.pci-0000_00_1f.3-platform-sof_sdw.HiFi__hw_sofsoundwire__sink module-alsa-card.c s16le 2ch 48000Hz SUSPENDED
4 alsa_output.pci-0000_00_1f.3-platform-sof_sdw.HiFi__hw_sofsoundwire_2__sink module-alsa-card.c s16le 2ch 48000Hz SUSPENDED



[Actual result]

No available sources found.


[Additional information]
https://certification.canonical.com/hardware/202111-29676/

ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: linux-image-5.15.0-125-generic 5.15.0-125.135~20.04.1
ProcVersionSignature: Ubuntu 5.15.0-125.135~20.04.1-generic 5.15.167
Uname: Linux 5.15.0-125-generic x86_64
ApportVersion: 2.20.11-0ubuntu27.27
Architecture: amd64
CasperMD5CheckResult: skip
CloudArchitecture: x86_64
CloudID: maas
CloudName: maas
CloudPlatform: maas
CloudSubPlatform: seed-dir (http://10.102.160.2:5248/MAAS/metadata/)
Date: Mon Oct 21 14:02:46 2024
DistributionChannelDescriptor:
# This is the distribution channel descriptor for the OEM CDs
# For more information see http://wiki.ubuntu.com/DistributionChannelDescriptor
canonical-oem-somerville-focal-amd64-20200502-85+fossa-starmie-adl+X173
InstallationDate: Installed on 2024-10-16 (4 days ago)
InstallationMedia: Ubuntu 20.04 "Focal" - Build amd64 LIVE Binary 20200502-05:58
SourcePackage: linux-signed-hwe-5.15
UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2085082/+subscriptions

[Bug 2077260] Re: freeze after updating to newest kernel on log in sreen or just after log in (6.8.0-45 ?). Had to use Grub to restero to 6.5.0-45

Hi.
Anyone of the affected users got rid of this issue? If so, how?
I still facing the issue...

--
You received this bug notification because you are subscribed to linux
in Ubuntu.
Matching subscriptions: Bgg, Bmail, Nb
https://bugs.launchpad.net/bugs/2077260

Title:
freeze after updating to newest kernel on log in sreen or just after
log in (6.8.0-45 ?). Had to use Grub to restero to 6.5.0-45

Status in linux package in Ubuntu:
Confirmed

Bug description:
freeze after updating to newest kernel on log in sreen or just after
log in (6.8.0-45 ?). Had to use Grub to rester to 6.5.0-45

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: linux-image-6.5.0-45-generic 6.5.0-45.45~22.04.1
ProcVersionSignature: Ubuntu 6.5.0-45.45~22.04.1-generic 6.5.13
Uname: Linux 6.5.0-45-generic x86_64
NonfreeKernelModules: wl
ApportVersion: 2.20.11-0ubuntu82.6
Architecture: amd64
CasperMD5CheckResult: unknown
CurrentDesktop: ubuntu:GNOME
Date: Sun Aug 18 15:53:56 2024
SourcePackage: linux-signed-hwe-6.5
UpgradeStatus: No upgrade log present (probably fresh install)
---
ProblemType: Bug
ApportVersion: 2.28.1-0ubuntu3.1
Architecture: amd64
AudioDevicesInUse:
USER PID ACCESS COMMAND
/dev/snd/controlC0: michal 2670 F.... wireplumber
/dev/snd/seq: michal 2665 F.... pipewire
CRDA: N/A
CasperMD5CheckResult: unknown
CurrentDesktop: ubuntu:GNOME
DistroRelease: Ubuntu 24.04
MachineType: Hewlett-Packard HP G62 Notebook PC
NonfreeKernelModules: wl
Package: linux (not installed)
ProcFB: 0 i915drmfb
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-6.5.0-45-generic root=UUID=62689215-60a8-4e0a-8e4e-fb3115fd7b88 ro quiet splash vt.handoff=7
ProcVersionSignature: Ubuntu 6.5.0-45.45~22.04.1-generic 6.5.13
RelatedPackageVersions:
linux-restricted-modules-6.5.0-45-generic N/A
linux-backports-modules-6.5.0-45-generic N/A
linux-firmware 20240318.git3b128b60-0ubuntu2.2
Tags: noble wayland-session
Uname: Linux 6.5.0-45-generic x86_64
UpgradeStatus: No upgrade log present (probably fresh install)
UserGroups: adm cdrom dip lpadmin lxd plugdev sambashare sudo
_MarkForUpload: True
dmi.bios.date: 10/29/2010
dmi.bios.release: 15.37
dmi.bios.vendor: Hewlett-Packard
dmi.bios.version: F.37
dmi.board.asset.tag: Base Board Asset Tag
dmi.board.name: 1439
dmi.board.vendor: Hewlett-Packard
dmi.board.version: 60.3F
dmi.chassis.asset.tag: Chassis Asset Tag
dmi.chassis.type: 10
dmi.chassis.vendor: Hewlett-Packard
dmi.chassis.version: Chassis Version
dmi.ec.firmware.release: 60.63
dmi.modalias: dmi:bvnHewlett-Packard:bvrF.37:bd10/29/2010:br15.37:efr60.63:svnHewlett-Packard:pnHPG62NotebookPC:pvr0594110000252710001020100:rvnHewlett-Packard:rn1439:rvr60.3F:cvnHewlett-Packard:ct10:cvrChassisVersion:skuLD667EA#AKD:
dmi.product.family: 103C_5335KV
dmi.product.name: HP G62 Notebook PC
dmi.product.sku: LD667EA#AKD
dmi.product.version: 0594110000252710001020100
dmi.sys.vendor: Hewlett-Packard
mtime.conffile..etc.init.d.apport: 2024-07-22T14:59:07

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2077260/+subscriptions

[Bug 1786013] Autopkgtest regression report (linux-restricted-modules/5.15.0-132.143)

All autopkgtests for the newly accepted linux-restricted-modules (5.15.0-132.143) for jammy have finished running.
The following regressions have been reported in tests triggered by the package:

nvidia-graphics-drivers-525/unknown (amd64)


Please visit the excuses page listed below and investigate the failures, proceeding afterwards as per the StableReleaseUpdates policy regarding autopkgtest regressions [1].

https://people.canonical.com/~ubuntu-archive/proposed-
migration/jammy/update_excuses.html#linux-restricted-modules


[1] https://wiki.ubuntu.com/StableReleaseUpdates#Autopkgtest_Regressions

Thank you!

--
You received this bug notification because you are subscribed to linux
in Ubuntu.
Matching subscriptions: Bgg, Bmail, Nb
https://bugs.launchpad.net/bugs/1786013

Title:
Packaging resync

Status in linux package in Ubuntu:
Fix Released
Status in linux-azure package in Ubuntu:
Fix Released
Status in linux-azure-edge package in Ubuntu:
Fix Released
Status in linux source package in Precise:
Fix Released
Status in linux-azure source package in Precise:
Won't Fix
Status in linux-azure-edge source package in Precise:
Won't Fix
Status in linux source package in Trusty:
Fix Released
Status in linux-azure source package in Trusty:
Fix Released
Status in linux-azure-edge source package in Trusty:
Won't Fix
Status in linux source package in Xenial:
Fix Released
Status in linux-azure source package in Xenial:
Fix Released
Status in linux-azure-edge source package in Xenial:
Fix Released
Status in linux source package in Bionic:
Fix Released
Status in linux-azure source package in Bionic:
Fix Released
Status in linux-azure-edge source package in Bionic:
Fix Released
Status in linux source package in Cosmic:
Fix Released
Status in linux-azure source package in Cosmic:
Fix Released
Status in linux-azure-edge source package in Cosmic:
Won't Fix
Status in linux source package in Disco:
Fix Released
Status in linux-azure source package in Disco:
Fix Released
Status in linux-azure-edge source package in Disco:
Won't Fix

Bug description:
Ongoing packaging resyncs.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1786013/+subscriptions

[Bug 2095199] [NEW] Focal update: v5.4.288 upstream stable release

Public bug reported:


SRU Justification

Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:

v5.4.288 upstream stable release
from git://git.kernel.org/

usb: host: max3421-hcd: Correctly abort a USB request.
ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys()
usb: dwc2: hcd: Fix GetPortStatus & SetPortFeature
usb: ehci-hcd: fix call balance of clocks handling routines
usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer
xfs: don't drop errno values when we fail to ficlone the entire range
bpf, sockmap: Fix update element with same
batman-adv: Do not send uninitialized TT changes
batman-adv: Remove uninitialized data in full table TT response
batman-adv: Do not let TT changes list grows indefinitely
tipc: fix NULL deref in cleanup_bearer()
net: lapb: increase LAPB_HEADER_LEN
ACPI: resource: Fix memory resource type union access
qca_spi: Fix clock speed for multiple QCA7000
qca_spi: Make driver probing reliable
net/sched: netem: account for backlog updates from child qdisc
ACPICA: events/evxfregn: don't release the ContextMutex that was never acquired
blk-iocost: clamp inuse and skip noops in __propagate_weights()
blk-iocost: fix weight updates of inner active iocgs
blk-iocost: Avoid using clamp() on inuse in __propagate_weights()
KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status
tracing/kprobes: Skip symbol counting logic for module symbols in create_local_trace_kprobe()
xen/netfront: fix crash when removing device
ALSA: usb-audio: Fix a DMA to stack memory bug
Linux 5.4.288
UBUNTU: Upstream stable to v5.4.288

** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid

** Affects: linux (Ubuntu Focal)
Importance: Medium
Assignee: Noah Wager (nwager)
Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Focal)
Importance: Undecided
Status: New

** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Focal)
Importance: Undecided => Medium

** Changed in: linux (Ubuntu Focal)
Status: New => In Progress

** Changed in: linux (Ubuntu Focal)
Assignee: (unassigned) => Noah Wager (nwager)

** Description changed:


SRU Justification

Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:

v5.4.288 upstream stable release
from git://git.kernel.org/

-
+ usb: host: max3421-hcd: Correctly abort a USB request.
+ ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys()
+ usb: dwc2: hcd: Fix GetPortStatus & SetPortFeature
+ usb: ehci-hcd: fix call balance of clocks handling routines
+ usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer
+ xfs: don't drop errno values when we fail to ficlone the entire range
+ bpf, sockmap: Fix update element with same
+ batman-adv: Do not send uninitialized TT changes
+ batman-adv: Remove uninitialized data in full table TT response
+ batman-adv: Do not let TT changes list grows indefinitely
+ tipc: fix NULL deref in cleanup_bearer()
+ net: lapb: increase LAPB_HEADER_LEN
+ ACPI: resource: Fix memory resource type union access
+ qca_spi: Fix clock speed for multiple QCA7000
+ qca_spi: Make driver probing reliable
+ net/sched: netem: account for backlog updates from child qdisc
+ ACPICA: events/evxfregn: don't release the ContextMutex that was never acquired
+ blk-iocost: clamp inuse and skip noops in __propagate_weights()
+ blk-iocost: fix weight updates of inner active iocgs
+ blk-iocost: Avoid using clamp() on inuse in __propagate_weights()
+ KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status
+ tracing/kprobes: Skip symbol counting logic for module symbols in create_local_trace_kprobe()
+ xen/netfront: fix crash when removing device
+ ALSA: usb-audio: Fix a DMA to stack memory bug
Linux 5.4.288
- ALSA: usb-audio: Fix a DMA to stack memory bug
- xen/netfront: fix crash when removing device
- tracing/kprobes: Skip symbol counting logic for module symbols in create_local_trace_kprobe()
- KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status
- blk-iocost: Avoid using clamp() on inuse in __propagate_weights()
- blk-iocost: fix weight updates of inner active iocgs
- blk-iocost: clamp inuse and skip noops in __propagate_weights()
- ACPICA: events/evxfregn: don't release the ContextMutex that was never acquired
- net/sched: netem: account for backlog updates from child qdisc
- qca_spi: Make driver probing reliable
- qca_spi: Fix clock speed for multiple QCA7000
- ACPI: resource: Fix memory resource type union access
- net: lapb: increase LAPB_HEADER_LEN
- tipc: fix NULL deref in cleanup_bearer()
- batman-adv: Do not let TT changes list grows indefinitely
- batman-adv: Remove uninitialized data in full table TT response
- batman-adv: Do not send uninitialized TT changes
- bpf, sockmap: Fix update element with same
- xfs: don't drop errno values when we fail to ficlone the entire range
- usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer
- usb: ehci-hcd: fix call balance of clocks handling routines
- usb: dwc2: hcd: Fix GetPortStatus & SetPortFeature
- ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys()
- usb: host: max3421-hcd: Correctly abort a USB request.
+ UBUNTU: Upstream stable to v5.4.288

--
You received this bug notification because you are subscribed to linux
in Ubuntu.
Matching subscriptions: Bgg, Bmail, Nb
https://bugs.launchpad.net/bugs/2095199

Title:
Focal update: v5.4.288 upstream stable release

Status in linux package in Ubuntu:
Invalid
Status in linux source package in Focal:
In Progress

Bug description:

SRU Justification

Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:

v5.4.288 upstream stable release
from git://git.kernel.org/

usb: host: max3421-hcd: Correctly abort a USB request.
ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys()
usb: dwc2: hcd: Fix GetPortStatus & SetPortFeature
usb: ehci-hcd: fix call balance of clocks handling routines
usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer
xfs: don't drop errno values when we fail to ficlone the entire range
bpf, sockmap: Fix update element with same
batman-adv: Do not send uninitialized TT changes
batman-adv: Remove uninitialized data in full table TT response
batman-adv: Do not let TT changes list grows indefinitely
tipc: fix NULL deref in cleanup_bearer()
net: lapb: increase LAPB_HEADER_LEN
ACPI: resource: Fix memory resource type union access
qca_spi: Fix clock speed for multiple QCA7000
qca_spi: Make driver probing reliable
net/sched: netem: account for backlog updates from child qdisc
ACPICA: events/evxfregn: don't release the ContextMutex that was never acquired
blk-iocost: clamp inuse and skip noops in __propagate_weights()
blk-iocost: fix weight updates of inner active iocgs
blk-iocost: Avoid using clamp() on inuse in __propagate_weights()
KVM: arm64: Ignore PMCNTENSET_EL0 while checking for overflow status
tracing/kprobes: Skip symbol counting logic for module symbols in create_local_trace_kprobe()
xen/netfront: fix crash when removing device
ALSA: usb-audio: Fix a DMA to stack memory bug
Linux 5.4.288
UBUNTU: Upstream stable to v5.4.288

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2095199/+subscriptions

[Bug 2086606] Re: Add list of source files to linux-buildinfo

This bug is awaiting verification that the linux/5.15.0-132.143 kernel
in -proposed solves the problem. Please test the kernel and update this
bug with the results. If the problem is solved, change the tag
'verification-needed-jammy-linux' to 'verification-done-jammy-linux'. If
the problem still exists, change the tag 'verification-needed-jammy-
linux' to 'verification-failed-jammy-linux'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-jammy-linux-v2 verification-needed-jammy-linux

--
You received this bug notification because you are subscribed to linux
in Ubuntu.
Matching subscriptions: Bgg, Bmail, Nb
https://bugs.launchpad.net/bugs/2086606

Title:
Add list of source files to linux-buildinfo

Status in linux package in Ubuntu:
Fix Committed
Status in linux source package in Focal:
Fix Committed
Status in linux source package in Jammy:
Fix Committed
Status in linux source package in Noble:
Fix Committed
Status in linux source package in Oracular:
Fix Committed
Status in linux source package in Plucky:
Fix Committed

Bug description:
[Impact]

For CVE triaging, it's helpful to have an exact list of the source
files used for a build. Add that information to the linux-buildinfo
packages.

[Test Case]

Check content of linux-buildinfo packages of the individual kernels.

Test packages for Noble, Jammy and Focal:
https://launchpad.net/~juergh/+archive/ubuntu/linux/+packages

[Where Problems Could Occur]

Build failures. This does not change the functionality of any of the
kernel packages but just adds another text file to the linux-buildinfo
packages so should not cause any user visible issues.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2086606/+subscriptions