[Kernel-packages] [Bug 2017903] [NEW] LSM stacking and AppArmor for 6.2: additional fixes

2023-04-27 Thread Andrea Righi
Public bug reported: [Impact] We maintain custom LSM stacking and AppArmor SAUCE patches in our kernel to provide additional features that are not available in the upstream AppArmor. We have experienced occasional bugs in the lunar kernel (specifically with the environ.sh test) that can lead to

[Kernel-packages] [Bug 2016186] Re: 5.19 not reporting cgroups v1 blkio.throttle.io_serviced

2023-04-28 Thread Andrea Righi
Potential upstream fix: https://lore.kernel.org/lkml/20230401094708.77631-1-hanjinke@bytedance.com/ However this seems to partially restore the old behavior of cgroup v1, because we still need to set io throttling limits in order to get the io statistics. We may need an additional fix like th

[Kernel-packages] [Bug 2018716] [NEW] zfs-dkms: support linux >= 6.3

2023-05-08 Thread Andrea Righi
Public bug reported: [Impact] The current version of zfs-dkms available in lunar fails to build with kernels >= 6.3. [Test case] $ apt install zfs-dkms [Fix] Resync with zfs version in Debian (2.1.1) and apply the usual Ubuntu specific changes. [Regression potential] We may experience zfs r

[Kernel-packages] [Bug 2015867] Re: Kernel 6.1 bumped the disk consumption on default images by 15%

2023-05-08 Thread Andrea Righi
** Also affects: linux (Ubuntu Mantic) Importance: Undecided Status: Confirmed ** Also affects: linux (Ubuntu Lunar) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. ht

[Kernel-packages] [Bug 2016186] Re: 5.19 not reporting cgroups v1 blkio.throttle.io_serviced

2023-05-08 Thread Andrea Righi
** Also affects: linux (Ubuntu) Importance: Undecided Status: New ** No longer affects: linux-aws (Ubuntu) ** No longer affects: linux-azure (Ubuntu) ** No longer affects: linux-gcp (Ubuntu) ** Also affects: linux (Ubuntu Kinetic) Importance: Undecided Status: New ** Also a

[Kernel-packages] [Bug 2016186] Re: 5.19 not reporting cgroups v1 blkio.throttle.io_serviced

2023-05-08 Thread Andrea Righi
** Description changed: + [Impact] + + Commit f382fb0bcef4 ("block: remove legacy IO schedulers") introduced a + behavior change in the blkio throttle cgroup subsystem: IO statistics + are not reported anymore unless a throttling rule is explicitly defined, + because the current code only counts

[Kernel-packages] [Bug 2015867] Re: Kernel 6.1 bumped the disk consumption on default images by 15%

2023-05-08 Thread Andrea Righi
** Description changed: + [Impact] + + After enabling Rust support in the kernel we noticed an increased size + in linux-headers, because all the Rust libraries required to build out- + of-tree kernel modules are now included in linux-headers directly. + + The increased size goes from ~30MB to

[Kernel-packages] [Bug 2016186] Re: 5.19 not reporting cgroups v1 blkio.throttle.io_serviced

2023-05-08 Thread Andrea Righi
** Description changed: [Impact] Commit f382fb0bcef4 ("block: remove legacy IO schedulers") introduced a behavior change in the blkio throttle cgroup subsystem: IO statistics are not reported anymore unless a throttling rule is explicitly defined, because the current code only counts

[Kernel-packages] [Bug 2019000] [NEW] Use new annotations model

2023-05-09 Thread Andrea Righi
Public bug reported: [Impact] Starting with lunar we have introduced a new way to manage kernel configs, unifying the duplicated information defined in the annotations file + config chunks into an annotations-only model. [Test case] An kernel build can be considered a valid test case, in partic

[Kernel-packages] [Bug 2019000] Re: Use new annotations model

2023-05-09 Thread Andrea Righi
** Description changed: [Impact] Starting with lunar we have introduced a new way to manage kernel configs, unifying the duplicated information defined in the annotations file + config chunks into an annotations-only model. [Test case] - An kernel build can be considered a valid

[Kernel-packages] [Bug 2009142] Re: nvidia-dkms-390 FTBS with linux 6.2

2023-05-16 Thread Andrea Righi
** Also affects: nvidia-graphics-drivers-390 (Ubuntu Jammy) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to nvidia-graphics-drivers-390 in Ubuntu. https://bugs.launchpad.net/bugs/2009142 Title:

[Kernel-packages] [Bug 2009142] Re: nvidia-dkms-390 FTBS with linux 6.2

2023-05-16 Thread Andrea Righi
Moving jammy to the same version of the driver used in lunar allows to use nvidia-dkms-390 both with the stock 5.15 kernel and the new hwe 6.2 (verified in a VM doing a simple test build). ** Patch added: "nvidia-dkms-390-jammy.debdiff" https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics

[Kernel-packages] [Bug 2009142] Re: nvidia-dkms-390 FTBS with linux 6.2

2023-05-16 Thread Andrea Righi
Better debdiff to backport only the patch required to support linux 6.2 (that is much better from an SRU perspective). Tested with positive result in a VM both with 5.15 and the new hwe 6.2 kernels. So, please ignore my previous comment. ** Patch added: "nvidia-dkms-390-jammy-support-linux-6.2.deb

[Kernel-packages] [Bug 2019869] [NEW] nvidia-dkms-390: better support for kernel 6.2

2023-05-16 Thread Andrea Righi
Public bug reported: [Impact] Instead of disabling acpi support completely with nvidia-dkms-390, we should try instead to see if it's possible to support it somehow. [Fix] This patch looks promising (even if it says huge hack in the comments...): https://gitlab.com/herecura/packages/nvidia-390x

[Kernel-packages] [Bug 2019869] Re: nvidia-dkms-390: better support for kernel 6.2

2023-05-16 Thread Andrea Righi
** Patch added: "nvidia-dkms-390-mantic-better-support-for-linux-6.2.debdiff" https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-390/+bug/2019869/+attachment/5673352/+files/nvidia-dkms-390-mantic-better-support-for-linux-6.2.debdiff -- You received this bug notification because

[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-06-20 Thread Andrea Righi
Test kernel with the additional overlayfs fix applied: https://kernel.ubuntu.com/~arighi/lp2016398/ -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2016398 Title: stacked overlay file sys

[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-06-21 Thread Andrea Righi
@bluescreen-avenger thanks for testing, I'll send a proper SRU email to apply this fix to the affected kernels! ** Also affects: linux (Ubuntu Lunar) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Kinetic) Importance: Undecided Status: New ** Also affects: l

[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-06-22 Thread Andrea Righi
** Description changed: + [Impact] + + Opened files reported in /proc/pid/map_files can be shows with the wrong + mount point using overlayfs with filesystem namspaces. + + This incorrect behavior is fixed: + + UBUNTU: SAUCE: overlayfs: fix incorrect mnt_id of files opened from + map_files +

[Kernel-packages] [Bug 2023007] Re: kernel .config lowlatency improvements

2023-06-25 Thread Andrea Righi
** Changed in: linux-lowlatency (Ubuntu Mantic) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lowlatency in Ubuntu. https://bugs.launchpad.net/bugs/2023007 Title: kernel .config lowlatency imp

[Kernel-packages] [Bug 2021605] Re: introduce do_lib_rust=true|false to enable/disable linux-lib-rust package

2023-06-27 Thread Andrea Righi
** Changed in: linux (Ubuntu Mantic) Status: Incomplete => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-aws in Ubuntu. https://bugs.launchpad.net/bugs/2021605 Title: introduce do_lib_rust=true|false to enab

[Kernel-packages] [Bug 2025134] [NEW] Revert variable symbol length modversion in all the jammy kernels

2023-06-27 Thread Andrea Righi
Public bug reported: [Impact] In order to support Rust in the kernel starting with Lunar we had to apply the following UBUNTU SAUCE patch: 27c4fe11712c ("UBUNTU: SAUCE: modpost: support arbitrary symbol length in modversion") This patch can potentially introduce a user-space regression, beca

[Kernel-packages] [Bug 2025134] Re: Revert variable symbol length modversion in all the jammy kernels

2023-06-27 Thread Andrea Righi
** Also affects: linux-hwe-6.2 (Ubuntu) Importance: Undecided Status: New ** No longer affects: linux (Ubuntu) ** No longer affects: linux (Ubuntu Jammy) ** Changed in: linux-hwe-6.2 (Ubuntu Jammy) Status: New => Fix Committed ** Also affects: linux-lowlatency-hwe-6.2 (Ubuntu)

[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-06-29 Thread Andrea Righi
@mihalicyn yes, it looks like we are missing "UBUNTU: SAUCE: overlayfs: allow with shiftfs as underlay" in all the kernels >= 6.2. I'll open a separate bug for this. I'm wondering... do we really need to support overlayfs on top of shiftfs? Of course we don't want to break the old behavior, so the

[Kernel-packages] [Bug 2016398] Re: stacked overlay file system mounts that have chroot() called against them appear to be getting locked (by the kernel most likely?)

2023-06-30 Thread Andrea Righi
@mihalicyn update: I did some tests and even if we're missing d24b8a547be1 ("UBUNTU: SAUCE: overlayfs: allow with shiftfs as underlay") in kernels >= 6.2 I'm able to use overlayfs on top of shiftfs (using the shiftfs mount-point as lower). I even tried the test case mentioned in the commit and I co

[Kernel-packages] [Bug 2025984] Re: Size in crease in modules in 6.2.0-1007

2023-07-10 Thread Andrea Righi
Between 6.2.0-1006-kvm and 6.2.0-1007-kvm the main kernel changed from 6.2.0-23 to 6.2.0-24, but the changes are minimal (only 2 fixes), that seem unrelated to any potential size increase. Maybe there was a toolchain/binutils update? I'll check the binaries to see if I spot something interesting.

[Kernel-packages] [Bug 2022361] Re: Please enable Renesas RZ platform serial installer

2023-07-10 Thread Andrea Righi
Applied to mantic/linux-unstable: https://git.launchpad.net/~ubuntu- kernel/ubuntu/+source/linux/+git/unstable/commit/?id=6f2091e61e72ed73f92cf49d882fb19c50dd860c Do you think we should SRU this change to lunar kernels (and jammy as well)? Thanks! ** Also affects: linux (Ubuntu Mantic) Impo

[Kernel-packages] [Bug 2022361] Re: Please enable Renesas RZ platform serial installer

2023-07-10 Thread Andrea Righi
** Also affects: linux (Ubuntu Lunar) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Focal) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Jammy) Importance: Undecided Status: New ** Description changed: + [Impact] + + The ubunt

[Kernel-packages] [Bug 2028247] [NEW] Mantic update: v6.4.1 upstream stable release

2023-07-20 Thread Andrea Righi
Public bug reported: SRU Justification Impact:    The upstream process for stable tree updates is quite similar    in scope to the Ubuntu SRU process, e.g., each patch has to    demonstrably fix a bug, and each patch is vetted by upstream    by originating either directly from

[Kernel-packages] [Bug 2028249] [NEW] Mantic update: v6.4.2 upstream stable release

2023-07-20 Thread Andrea Righi
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 2028250] [NEW] Mantic update: v6.4.3 upstream stable release

2023-07-20 Thread Andrea Righi
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 2028251] [NEW] Mantic update: v6.4.4 upstream stable release

2023-07-20 Thread Andrea Righi
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 2028253] [NEW] update apparmor and LSM stacking patch set

2023-07-20 Thread Andrea Righi
Public bug reported: [Impact] Provide an updated patch set for apparmor / LSM stacking with all the custom features that we need in the Ubuntu kernel. This patch set is required to provide the proper confinement with snaps and other Ubuntu-specific security features. [Fix] Apply the latest upd

[Kernel-packages] [Bug 2028790] [NEW] Mantic update: v6.4.5 upstream stable release

2023-07-26 Thread Andrea Righi
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 2028791] [NEW] Mantic update: v6.4.6 upstream stable release

2023-07-26 Thread Andrea Righi
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 2028253] Re: update apparmor and LSM stacking patch set

2023-07-26 Thread Andrea Righi
** Changed in: linux (Ubuntu Mantic) Status: Confirmed => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2028253 Title: update apparmor and LSM stacking patch set S

[Kernel-packages] [Bug 2033385] [NEW] zfs-dkms UBSAN array-out-of-bounds warning with kernel 6.5 on mantic

2023-08-29 Thread Andrea Righi
Public bug reported: [Impact] When the zfs module is loaded we can see the following errors in dmesg with the latest 6.5 kernel in mantic: [ 10.730318] UBSAN: array-index-out-of-bounds in /build/mantic/debian/build/build-generic/

[Kernel-packages] [Bug 2033385] Re: zfs-dkms UBSAN array-out-of-bounds warning with kernel 6.5 on mantic

2023-08-29 Thread Andrea Righi
debdiff in attach fixes the UBSAN warnings with linux 6.5 on mantic. ** Patch added: "zfs-fix-ubsan-warnings.debdiff" https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/2033385/+attachment/5696047/+files/zfs-fix-ubsan-warnings.debdiff -- You received this bug notification because you a

[Kernel-packages] [Bug 2033385] Re: zfs-dkms UBSAN array-out-of-bounds warning with kernel 6.5 on mantic

2023-08-29 Thread Andrea Righi
Add LP bug reference to the changelog. ** Patch added: "zfs-fix-ubsan-warnings.debdiff" https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/2033385/+attachment/5696048/+files/zfs-fix-ubsan-warnings.debdiff -- You received this bug notification because you are a member of Kernel Packages

[Kernel-packages] [Bug 2034510] [NEW] spl fails to unregister sysctl entries

2023-09-06 Thread Andrea Righi
Public bug reported: [Impact] On unload the spl module is not properly cleaning up the registered sysctl entries with kernel 6.5 in Mantic: 06:58 ubuntu@mantic$ sudo modprobe spl modprobe: ERROR: could not insert 'spl': Protocol driver not attached 06:58 ubuntu@mantic$ sudo dmesg | grep duplicat

[Kernel-packages] [Bug 2034510] Re: spl fails to unregister sysctl entries

2023-09-06 Thread Andrea Righi
Upstream pull request to fix this issue: https://github.com/openzfs/zfs/pull/15239 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to zfs-linux in Ubuntu. https://bugs.launchpad.net/bugs/2034510 Title: spl fails to unregister sysctl entrie

[Kernel-packages] [Bug 2034510] Re: spl fails to unregister sysctl entries

2023-09-06 Thread Andrea Righi
Attached debdiff seems to fix the bug (reproduced and tested in a local VM with the latest Mantic 6.5 kernel). ** Patch added: "spl-fix.debdiff" https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/2034510/+attachment/5697900/+files/spl-fix.debdiff -- You received this bug notification b

[Kernel-packages] [Bug 2030525] Re: Installation support for SMARC RZ/G2L platform

2023-09-12 Thread Andrea Righi
** Changed in: linux (Ubuntu Mantic) Status: Confirmed => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2030525 Title: Installation support for SMARC RZ/G2L platfor

[Kernel-packages] [Bug 2035581] [NEW] Mantic update: v6.5.1 upstream stable release

2023-09-13 Thread Andrea Righi
Public bug reported: SRU Justification Impact:    The upstream process for stable tree updates is quite similar    in scope to the Ubuntu SRU process, e.g., each patch has to    demonstrably fix a bug, and each patch is vetted by upstream    by originating either directly from

[Kernel-packages] [Bug 2035583] [NEW] Mantic update: v6.5.2 upstream stable release

2023-09-13 Thread Andrea Righi
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 2035588] [NEW] Mantic update: v6.5.3 upstream stable release

2023-09-14 Thread Andrea Righi
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 1991703] Re: Failure to boot with linux-image-5.19.0-18-generic and -5.19.0-19-generic

2022-10-10 Thread Andrea Righi
This bug should be fixed by 458ec0c8f359 ("drm/i915: fix null pointer dereference"), I'll prepare a test kernel with this fix applied on top of 5.19.0-19.19. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-signed in Ubuntu. https://b

[Kernel-packages] [Bug 1991703] Re: Failure to boot with linux-image-5.19.0-18-generic and -5.19.0-19-generic

2022-10-10 Thread Andrea Righi
Test kernel (5.19.0-19.19+i915fix) available here: https://kernel.ubuntu.com/~arighi/lp-1991703/ It would be great if someone affected by this problem could test this out. Thanks in advance! -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 1991703] Re: Failure to boot with linux-image-5.19.0-18-generic and -5.19.0-19-generic

2022-10-10 Thread Andrea Righi
So, it looks like there are multiple issues here. The NULL pointer dereference bug that I see in comment #25 seems to be fixed by 458ec0c8f359 ("drm/i915: fix null pointer dereference"), but this can happen only when i915 is used. For the other problem(s) do you happen to have a kernel oops / trac

[Kernel-packages] [Bug 1991703] Re: Failure to boot with linux-image-5.19.0-18-generic and -5.19.0-19-generic

2022-10-10 Thread Andrea Righi
*** This bug is a duplicate of bug 1991704 *** https://bugs.launchpad.net/bugs/1991704 ** This bug has been marked a duplicate of bug 1991704 Kinetic kernels 5.19.0-18/19-generic won't boot on Intel 11th/12th gen -- You received this bug notification because you are a member of Kernel Pac

[Kernel-packages] [Bug 1992525] Re: Boot failure when not in recovery mode

2022-10-12 Thread Andrea Righi
*** This bug is a duplicate of bug 1991704 *** https://bugs.launchpad.net/bugs/1991704 ** This bug has been marked a duplicate of bug 1991704 Kinetic kernels 5.19.0-18/19-generic won't boot on Intel 11th/12th gen -- You received this bug notification because you are a member of Kernel Pac

[Kernel-packages] [Bug 1993818] Re: Linux kernel crash on Ubuntu 22.10 on Thinkpad X1 Carbon Gen 10

2022-10-24 Thread Andrea Righi
I noticed that we're missing some i915 fixes from stable updates, so I've applied a bunch of patches from stable and produced this test kernel: https://kernel.ubuntu.com/~arighi/lp-1993818/ It'd be great if someone affected by this bug could give it a try and verify if the problem is still happen

[Kernel-packages] [Bug 1993818] Re: Linux kernel crash on Ubuntu 22.10 on Thinkpad X1 Carbon Gen 10

2022-10-24 Thread Andrea Righi
Thanks for testing and good to know that the kernel doesn't seem to crash (so far). All the i915 fixes that I applied will be available in the next official Kinetic kernel, so we should be good. Let me know if the problem happens again. About the color distortions I'll investigate a bit. I may ask

[Kernel-packages] [Bug 1993818] Re: Linux kernel crash on Ubuntu 22.10 on Thinkpad X1 Carbon Gen 10

2022-10-24 Thread Andrea Righi
** Changed in: linux (Ubuntu) Status: Confirmed => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1993818 Title: Linux kernel crash on Ubuntu 22.10 on Thinkpad X1 Ca

[Kernel-packages] [Bug 1981089] Re: Please have linux-tools-common Provide: bpftool

2022-11-07 Thread Andrea Righi
** Also affects: linux (Ubuntu Lunar) Importance: Medium Status: Triaged ** Also affects: lava (Ubuntu Lunar) Importance: Undecided Status: Triaged ** Also affects: bpfcc (Ubuntu Lunar) Importance: Undecided Status: Triaged ** Also affects: bpftrace (Ubuntu Lunar)

[Kernel-packages] [Bug 1993818] Re: Linux kernel crash on Ubuntu 22.10 on Thinkpad X1 Carbon Gen 10

2022-11-08 Thread Andrea Righi
** Also affects: linux (Ubuntu Kinetic) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1993818 Title: Linux kernel crash on Ubuntu 22.10 on Th

[Kernel-packages] [Bug 1945757] [NEW] sysdig-dkms fails to build on arm64 - kernel 5.13

2021-10-01 Thread Andrea Righi
Public bug reported: [Impact] sysdig-dkms fails to build on arm64 with the latest impish kernel (5.13): /var/lib/dkms/sysdig/0.27.1/build/main.c:1942:28: error: ‘SYSCALL_TABLE_ID0’ undeclared (first use in this function); did you mean ‘SYSCALL_TABLE_SIZE’? 1942 | table_index = id - SYS

[Kernel-packages] [Bug 1945757] Re: sysdig-dkms fails to build on arm64 - kernel 5.13

2021-10-01 Thread Andrea Righi
** Patch added: "sysdig-fix-arm64-build.debdiff" https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.6/+bug/1945757/+attachment/5529832/+files/sysdig-fix-arm64-build.debdiff -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-oem-5

[Kernel-packages] [Bug 1945757] Re: sysdig-dkms fails to build on arm64 - kernel 5.13

2021-10-01 Thread Andrea Righi
** Patch added: "sysdig-fix-arm64-build.debdiff" https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.6/+bug/1945757/+attachment/5529831/+files/sysdig-fix-arm64-build.debdiff -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-oem-5

[Kernel-packages] [Bug 1946001] [NEW] impish:linux-aws 5.13 panic during systemd autotest

2021-10-04 Thread Andrea Righi
Public bug reported: Found this when running the systemd autopkgtest on linux-aws 5.13.0-1004.5 (apparently it seems to affect nested kvm only): systemd-testsuite login: [ 70.235559] int3: [#1] SMP NOPTI [ 70.237824] CPU: 0 PID: 326 Comm: systemd-journal Not tainted 5.13.0-1004-aws #5-U

[Kernel-packages] [Bug 1836694] Re: memcg_test_3 from controllers in LTP failed with Bionic/Focal/Hirsute

2021-10-05 Thread Andrea Righi
** Also affects: linux (Ubuntu Impish) Importance: Undecided Status: Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1836694 Title: memcg_test_3 from controllers in LT

[Kernel-packages] [Bug 1946001] Re: impish:linux-aws 5.13 panic during systemd autotest

2021-10-07 Thread Andrea Righi
Update: disabling CONFIG_KFENCE_STATIC_KEYS prevents this problem from happening, so we may consider to disable this option as a temporary workaround, or even disable KFENCE entirely, since it's more like a debugging feature (low-overhead out-of-bounds / use-after-free / invalid-free memory detecto

[Kernel-packages] [Bug 1945590] Re: Thinkpad E14 Gen2: Kernel panic with trackpad and trackpoint enabled

2021-10-07 Thread Andrea Righi
@Pietro, thanks for reporting this. Can you do a test with the kernel that is currently in impish-proposed (5.13.0-18.18)? See https://wiki.ubuntu.com/Testing/EnableProposed on how to enable proposed (for this you need to upgrade from 21.04, then enable proposed, install 5.13.0-18.18, then reboot)

[Kernel-packages] [Bug 1945590] Re: Thinkpad E14 Gen2: Kernel panic with trackpad and trackpoint enabled

2021-10-07 Thread Andrea Righi
ok, another interesting test to do would be to see what happens with a mainline kernel (just to see if the problem is a mainline issue or if it's limited to the Ubuntu kernel). Can you try to do a test with this kernel? https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.13.19/ ^ This is basically

[Kernel-packages] [Bug 1946001] Re: impish:linux 5.13 panic during systemd autotest

2021-10-07 Thread Andrea Righi
Update: apparently CONFIG_KFENCE can only reduce the probability to trigger the bug, so it's not a reliable fix. According to all the traces that we got the soft lockup is always happening to any SLUB allocation function (__kmalloc, kmem_cache_alloc, and similar), and the instruction pointer is on

[Kernel-packages] [Bug 1945590] Re: Thinkpad E14 Gen2: Kernel panic with trackpad and trackpoint enabled

2021-10-07 Thread Andrea Righi
Maybe disable secure boot from the BIOS? Test kernels can't be signed, so I guess that's the only way... -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1945590 Title: Thinkpad E14 Gen2:

[Kernel-packages] [Bug 1945590] Re: Thinkpad E14 Gen2: Kernel panic with trackpad and trackpoint enabled

2021-10-07 Thread Andrea Righi
OK, so at least we know that it's a mainline issue. I'll investigate a bit and will keep you informed. Thank you so much for all the tests! -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/19

[Kernel-packages] [Bug 1945590] Re: Thinkpad E14 Gen2: Kernel panic with trackpad and trackpoint enabled

2021-10-08 Thread Andrea Righi
Looking at the oops it seems that the stack gets corrupted inside elantech_change_report_id(), that is defined in drivers/input/mouse/elantech.c. According to Stephan it seems that 5.11 is the last kernel that seems to work. If we look at the changes between 5.11 and 5.13 that are touching driver

[Kernel-packages] [Bug 1945590] Re: Thinkpad E14 Gen2: Kernel panic with trackpad and trackpoint enabled

2021-10-08 Thread Andrea Righi
Hm.. it's not trivial to revert that commit, because it depends on other subsystem changes. I was thinking that we may actually corrupt the stack because elantech_create_smbus() is using too much stack. How about allocating that i2c_props array in the heap. See the patch in attach. ** Patch added:

[Kernel-packages] [Bug 1945590] Re: Thinkpad E14 Gen2: Kernel panic with trackpad and trackpoint enabled

2021-10-08 Thread Andrea Righi
Hm.. it's not trivial to revert that commit, because it depends on other subsystem changes. I was thinking that we may actually corrupt the stack because elantech_create_smbus() is using too much stack. How about allocating that i2c_props array in the heap. See the patch in attach. ** Patch added:

[Kernel-packages] [Bug 1945590] Re: Thinkpad E14 Gen2: Kernel panic with trackpad and trackpoint enabled

2021-10-08 Thread Andrea Righi
Test kernel is available here, if you want to give it a try: https://kernel.ubuntu.com/~arighi/lp1945590/ Thanks! ** Changed in: linux (Ubuntu Impish) Assignee: (unassigned) => Andrea Righi (arighi) ** Changed in: linux (Ubuntu Impish) Importance: Undecided => High -- You re

[Kernel-packages] [Bug 1945590] Re: Thinkpad E14 Gen2: Kernel panic with trackpad and trackpoint enabled

2021-10-09 Thread Andrea Righi
You just need to install linux and linux-modules (sorry I wasn't very clear). But it looks like my patch didn't make any difference. I'll investigate a bit more. Thanks for testing! -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in

[Kernel-packages] [Bug 1946515] Re: impish provides no linux-modules-nvidia-*-server packages

2021-10-14 Thread Andrea Righi
** Also affects: linux-restricted-modules (Ubuntu Impish) Importance: High Assignee: dann frazier (dannf) Status: In Progress -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-restricted-modules in Ubuntu. https://bugs.l

[Kernel-packages] [Bug 1946515] Re: impish provides no linux-modules-nvidia-*-server packages

2021-10-14 Thread Andrea Righi
** Description changed: + [Impact] + + Impish is missing the nvidia server drivers. + + [Test case] + $ apt showsrc linux-restricted-modules | grep -e ^Version: -e server WARNING: apt does not have a stable CLI interface. Use with caution in scripts. - Version: 5.13.0-16.16 Versio

[Kernel-packages] [Bug 1988732] [NEW] Kinetic update: v5.19.6 upstream stable release

2022-09-05 Thread Andrea Righi
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 1988733] [NEW] Kinetic update: v5.19.7 upstream stable release

2022-09-05 Thread Andrea Righi
Public bug reported: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly

[Kernel-packages] [Bug 1986921] Re: lttng-modules/2.13.1-1 ADT test failure with linux/5.15.0-47.51

2022-09-08 Thread Andrea Righi
Fix for the 5.4 kernel in bionic reported in attach. ** Patch added: "lttng-support-kernel-5.4-without-random-tracepoints.debdiff" https://bugs.launchpad.net/ubuntu/+source/lttng-modules/+bug/1986921/+attachment/5614597/+files/lttng-support-kernel-5.4-without-random-tracepoints.debdiff -- Yo

[Kernel-packages] [Bug 1989258] Re: multiple kernel oops regarding hung tasks delaying boot

2022-09-13 Thread Andrea Righi
Hi Brian, we have also experienced this issue during our tests, but it's really hard to reproduce it on our side. It seems to be a regression in virtio-rng and I've prepared a test kernel, but we still haven't found a way to reproduce it systematically, so I couldn't verify if this test kernel is

[Kernel-packages] [Bug 1989983] [NEW] kinetic: apply new apparmor and LSM stacking patch set

2022-09-16 Thread Andrea Righi
Public bug reported: [Impact] Align with the latest apparmor and LSM stacking versions. To do so we need to: - revert sauce to get back to upstream apparmor, and drop old LSM stacking - pull in needed patches from upstream 6.0 - pull in needed patches from apparmor-next 6.1 This is required

[Kernel-packages] [Bug 1976511] Re: kernel taint ( warning ) caused by smpboot.c: on 5.4.0

2022-06-10 Thread Andrea Righi
@zhanglei-mao have you tried to update the kernel? Does it still happen also with a more recent 5.4? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1976511 Title: kernel taint ( warning

[Kernel-packages] [Bug 1978539] [NEW] nvidia-dkms-470 fails to build with kernel 5.19

2022-06-14 Thread Andrea Righi
Public bug reported: [Impact] nvidia-dkms-470 fails to build on kinetic with the new (upcoming) kernel 5.19. [Test case] sudo apt install nvidia-dkms-470 [Fix] Change driver to support the new 5.19 ABI. [Regression potential] We may see build issues / regressions in kernels >= 5.19, since t

[Kernel-packages] [Bug 1978539] Re: nvidia-dkms-470 fails to build with kernel 5.19

2022-06-14 Thread Andrea Righi
debdiff in attach fixes all the build failures with kernels >= 5.19. ** Patch added: "support-linux-5.19-nvidia-470.debdiff" https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-470/+bug/1978539/+attachment/5597189/+files/support-linux-5.19-nvidia-470.debdiff -- You received thi

[Kernel-packages] [Bug 1978539] Re: nvidia-dkms-470 fails to build with kernel 5.19

2022-06-14 Thread Andrea Righi
same fixes for nvidia-dkms-510. ** Patch added: "support-linux-5.19-nvidia-510.debdiff" https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-470/+bug/1978539/+attachment/5597215/+files/support-linux-5.19-nvidia-510.debdiff -- You received this bug notification because you are a

[Kernel-packages] [Bug 1978539] Re: nvidia-dkms-470 fails to build with kernel 5.19

2022-06-14 Thread Andrea Righi
same fixes for nvidia-dkms-470-server ** Patch added: "support-linux-5.19-nvidia-470-server.debdiff" https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-470/+bug/1978539/+attachment/5597370/+files/support-linux-5.19-nvidia-470-server.debdiff -- You received this bug notificatio

[Kernel-packages] [Bug 1978539] Re: nvidia-dkms-470 fails to build with kernel 5.19

2022-06-15 Thread Andrea Righi
Fixes for nvidia-dkms-510-server. ** Patch added: "support-linux-5.19-nvidia-510-server.debdiff" https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-470/+bug/1978539/+attachment/5597442/+files/support-linux-5.19-nvidia-510-server.debdiff -- You received this bug notification be

[Kernel-packages] [Bug 1981968] [NEW] bcmwl fails to build on the latest kinetic kernel 5.19

2022-07-18 Thread Andrea Righi
Public bug reported: [Impact] bcmwl fails to build on kernel 5.19 with the following errors: /var/lib/dkms/bcmwl/6.30.223.271+bdcom/build/src/shared/linux_osl.c:603:14: error: implicit declaration of function ‘pci_alloc_consistent’; did you mean ‘osl_dma_alloc_consistent’? [-Werror=implicit-fu

[Kernel-packages] [Bug 1981968] Re: bcmwl fails to build on the latest kinetic kernel 5.19

2022-07-18 Thread Andrea Righi
Fix to properly support kernels >= 5.18 in attach. ** Patch added: "bcmwl-support-linux-5.18.debdiff" https://bugs.launchpad.net/ubuntu/+source/bcmwl/+bug/1981968/+attachment/5603690/+files/bcmwl-support-linux-5.18.debdiff -- You received this bug notification because you are a member of Ker

[Kernel-packages] [Bug 1981658] Re: BUG: kernel NULL pointer dereference, address: 0000000000000008

2022-07-19 Thread Andrea Righi
I think this might be fixed by `55573f3a3f352 tcp: make sure treq->af_specific is initialized` that is currently applied to 5.4.0-123.139 in focal-proposed. It'd be great if someone that is able to reproduce the problem could try to install this new kernel from -proposed and verify if it's still h

[Kernel-packages] [Bug 1981658] Re: BUG: kernel NULL pointer dereference, address: 0000000000000008

2022-07-19 Thread Andrea Righi
@squirrelsc the next Azure kernel in Focal that will have this fix is going to be 5.4.0-1087.92, but I don't see it in proposed yet. If it helps I can upload to a ppa an "unofficial" Azure kernel with the fix. -- You received this bug notification because you are a member of Kernel Packages, whic

[Kernel-packages] [Bug 1981658] Re: BUG: kernel NULL pointer dereference, address: 0000000000000008

2022-07-19 Thread Andrea Righi
...or if it's easier, I've just uploaded some debs here: https://kernel.ubuntu.com/~arighi/lp-1981658/ This kernel (5.4.0-1087.92+arighi) is probably going to be the Azure kernel in proposed and it includes the fix that I mentioned above. -- You received this bug notification because you are a m

<    2   3   4   5   6   7