focal/linux-uc20-efi: 5.4.0-105.119.1 snap-debs snap:pc-kernel
Bug #1964204 reported by
Kleber Sacilotto de Souza
This bug report is a duplicate of:
Bug #1968543: focal/linux-uc20-efi: 5.4.0-109.123.1 snap-debs snap:pc-kernel.
Edit
Remove
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Kernel SRU Workflow |
Fix Released
|
Medium
|
Unassigned | ||
Snap-certification-testing |
Incomplete
|
Medium
|
Canonical Hardware Certification | ||
Snap-prepare |
Fix Released
|
Medium
|
Canonical Kernel Team | ||
Snap-release-to-beta |
Fix Released
|
Medium
|
Canonical Kernel Team | ||
Snap-release-to-candidate |
New
|
Medium
|
Canonical Kernel Team | ||
Snap-release-to-edge |
Fix Released
|
Medium
|
Canonical Kernel Team | ||
Snap-release-to-stable |
New
|
Medium
|
Canonical Kernel Team |
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
issue: KSRU-1294
kernel-
phase: Certification Testing
phase-changed: Sunday, 20. March 2022 23:16 UTC
reason:
snap-
snap-name: pc-kernel
variant: snap-debs
versions-clamp:
parent: 5.4.0-105.119.1
self: 5.4.0-105.119.1
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2022.02.21-3 |
description: | updated |
description: | updated |
tags: | added: kernel-sru-derivative-of-1964206 |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | Confirmed → Triaged |
summary: |
- focal/linux-uc20-efi: <version to be filled> snap-debs + focal/linux-uc20-efi: <version to be filled> snap-debs snap:pc-kernel |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | Triaged → In Progress |
tags: | added: kernel-jira-issue-ksru-1294 |
description: | updated |
summary: |
- focal/linux-uc20-efi: <version to be filled> snap-debs snap:pc-kernel + focal/linux-uc20-efi: 5.4.0-105.119.1 snap-debs snap:pc-kernel |
description: | updated |
description: | updated |
description: | updated |
tags: | added: kernel-jira-preparation-blocked |
description: | updated |
tags: | removed: kernel-jira-preparation-blocked |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
Changed in kernel-sru-workflow: | |
status: | In Progress → Fix Released |
To post a comment you must log in.
I'm currently seeing a regression with this kernel on dawson FDE nuc on the clocktest test in checkbox. This is a test that checks for cpu clock jitter, and I retried it multiple times and it is very reproducible. I also reverted to the kernel in stable and failed to reproduce it there. You can find the code for this test at https:/ /git.launchpad. net/plainbox- provider- checkbox/ tree/src/ clocktest. c or you can also install the checkbox snap (uc18/stable) and run "checkbox. checkbox- cli run '.*clocktest.*'" to run it from the snap.
This looks to be the same thing we reported seeing in the 4.15 kernel in https:/ /bugs.launchpad .net/kernel- sru-workflow/ +bug/1964213 and seems to come about because of the constant stream of messages like this:
[ 1634.056656] Bluetooth: hci0: Malicious advertising data. Stopping processing
[ 1634.141571] Bluetooth: hci0: Malicious advertising data. Stopping processing
[ 1634.226498] Bluetooth: hci0: Malicious advertising data. Stopping processing
[ 1634.311406] Bluetooth: hci0: Malicious advertising data. Stopping processing
[ 1634.396312] Bluetooth: hci0: Malicious advertising data. Stopping processing
[ 1634.481252] Bluetooth: hci0: Malicious advertising data. Stopping processing
[ 1634.566168] Bluetooth: hci0: Malicious advertising data. Stopping processing
[ 1634.651073] Bluetooth: hci0: Malicious advertising data. Stopping processing
[ 1634.735994] Bluetooth: hci0: Malicious advertising data. Stopping processing
[ 1634.820859] Bluetooth: hci0: Malicious advertising data. Stopping processing