`refcount_t: underflow; use-after-free.` on hidon w/ 5.15.0-85-generic

Bug #2034447 reported by Francis Ginther
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Fix Released
Undecided
Unassigned
Jammy
Fix Released
High
Unassigned

Bug Description

Seeing a panic on hidon (an Nvidia H100) after booting the 5.15.0-85-generic kernel:

[ 58.935877] ------------[ cut here ]------------
[ 58.935893] refcount_t: underflow; use-after-free.
[ 58.935920] WARNING: CPU: 207 PID: 2985 at lib/refcount.c:28 refcount_warn_saturate+0xf7/0x150
[ 58.935943] Modules linked in: x86_pkg_temp_thermal(+) intel_powerclamp coretemp nls_iso8859_1 rapl irdma(+) i40e qat_4xxx(+) isst_if_mbox_pci intel_qat pmt_telemetry pmt_crashlog idxd(+) isst_if_mmio pmt_class isst_if_common authenc idxd_bus intel_th_gth mei_me intel_th_pci intel_th mei switchtec ipmi_ssif acpi_ipmi ipmi_si ipmi_devintf ipmi_msghandler mac_hid sch_fq_codel dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua ramoops reed_solomon pstore_blk pstore_zone efi_pstore ip_tables x_tables autofs4 btrfs blake2b_generic zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 multipath linear mlx5_ib ib_uverbs ib_core ast i2c_algo_bit drm_vram_helper drm_ttm_helper ttm drm_kms_helper raid0 mlx5_core syscopyarea sysfillrect sysimgblt crct10dif_pclmul fb_sys_fops crc32_pclmul ixgbe cec mlxfw ghash_clmulni_intel aesni_intel psample crypto_simd xfrm_algo ice rc_core cryptd tls nvme i2c_i801 dca xhci_pci intel_pmt drm
[ 58.936077] pci_hyperv_intf i2c_ismt i2c_smbus
[ 58.936080] QAT: Could not find a device on node 1
[ 58.936080] QAT: Could not find a device on node 1
[ 58.936080] QAT: Could not find a device on node 1
[ 58.936080] QAT: Could not find a device on node 1
[ 58.936080] QAT: Could not find a device on node 1
[ 58.936080] QAT: Could not find a device on node 1
[ 58.936083] mdio
[ 58.936096] xhci_pci_renesas nvme_core wmi pinctrl_emmitsburg
[ 58.936106] CPU: 207 PID: 2985 Comm: systemd-udevd Not tainted 5.15.0-85-generic #95-Ubuntu
[ 58.936115] Hardware name: NVIDIA DGXH100/DGXH100, BIOS 1.0.7 05/08/2023
[ 58.936119] RIP: 0010:refcount_warn_saturate+0xf7/0x150
[ 58.936130] Code: eb 9e 0f b6 1d 5e e6 b9 01 80 fb 01 0f 87 f4 63 6f 00 83 e3 01 75 89 48 c7 c7 88 c3 23 9e c6 05 42 e6 b9 01 01 e8 d8 e4 6b 00 <0f> 0b e9 6f ff ff ff 0f b6 1d 2d e6 b9 01 80 fb 01 0f 87 b1 63 6f
[ 58.936135] RSP: 0018:ff4d5d94b2c7fa28 EFLAGS: 00010282
[ 58.936142] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000027
[ 58.936146] RDX: ff314dbbbf9e0588 RSI: 0000000000000001 RDI: ff314dbbbf9e0580
[ 58.936149] RBP: ff4d5d94b2c7fa30 R08: 0000000000000026 R09: ff4d5d94b2c7f9c0
[ 58.936153] R10: 0000000000000028 R11: 0000000000000001 R12: 0000000000000000
[ 58.936156] R13: ff314cbfdbcb6900 R14: ff314cbfdbcb67b8 R15: ff314cbfd24b4000
[ 58.936159] FS: 00007fadd2f6c8c0(0000) GS:ff314dbbbf9c0000(0000) knlGS:0000000000000000
[ 58.936163] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 58.936167] CR2: 00007fadd243b584 CR3: 000000012972c006 CR4: 0000000000771ee0
[ 58.936171] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 58.936174] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[ 58.936177] PKRU: 55555554
[ 58.936179] Call Trace:
[ 58.936184] <TASK>
[ 58.936188] ? show_trace_log_lvl+0x1d6/0x2ea
[ 58.936204] ? show_trace_log_lvl+0x1d6/0x2ea
[ 58.936212] ? crypto_mod_put+0x6b/0x80
[ 58.936225] ? show_regs.part.0+0x23/0x29
[ 58.936232] ? show_regs.cold+0x8/0xd
[ 58.936239] ? refcount_warn_saturate+0xf7/0x150
[ 58.936246] ? __warn+0x8c/0x100
[ 58.936255] ? refcount_warn_saturate+0xf7/0x150
[ 58.936263] ? report_bug+0xa4/0xd0
[ 58.936274] ? down_trylock+0x2e/0x40
[ 58.936285] ? handle_bug+0x39/0x90
[ 58.936296] ? exc_invalid_op+0x19/0x70
[ 58.936301] ? asm_exc_invalid_op+0x1b/0x20
[ 58.936310] ? refcount_warn_saturate+0xf7/0x150
[ 58.936317] ? refcount_warn_saturate+0xf7/0x150
[ 58.936323] crypto_mod_put+0x6b/0x80
[ 58.936329] crypto_destroy_tfm+0x4e/0xa0
[ 58.936336] pkcs1pad_exit_tfm+0x15/0x20
[ 58.936345] crypto_akcipher_exit_tfm+0x13/0x20
[ 58.936352] crypto_destroy_tfm+0x43/0xa0
[ 58.936358] public_key_verify_signature+0x2dc/0x3c0
[ 58.936366] ? find_asymmetric_key+0xd2/0x1d0
[ 58.936374] ? kfree+0x1f7/0x250
[ 58.936385] public_key_verify_signature_2+0x15/0x20
[ 58.936389] verify_signature+0x37/0x60
[ 58.936393] pkcs7_validate_trust_one.constprop.0+0x156/0x1e0
[ 58.936400] pkcs7_validate_trust+0x4a/0xa0
[ 58.936406] verify_pkcs7_message_sig+0x83/0x120
[ 58.936418] verify_pkcs7_signature+0x4f/0x80
[ 58.936424] mod_verify_sig+0xb5/0xf0
[ 58.936435] load_module+0x275/0xbc0
[ 58.936440] ? kernel_read_file_from_fd+0x56/0xa0
[ 58.936450] __do_sys_finit_module+0xbf/0x120
[ 58.936496] __x64_sys_finit_module+0x18/0x20
[ 58.936504] do_syscall_64+0x59/0xc0
[ 58.936510] ? exit_to_user_mode_prepare+0x37/0xb0
[ 58.936521] ? syscall_exit_to_user_mode+0x35/0x50
[ 58.936530] ? __x64_sys_mmap+0x33/0x50
[ 58.936539] ? do_syscall_64+0x69/0xc0
[ 58.936544] ? syscall_exit_to_user_mode+0x35/0x50
[ 58.936550] ? do_syscall_64+0x69/0xc0
[ 58.936555] entry_SYSCALL_64_after_hwframe+0x62/0xcc
[ 58.936560] RIP: 0033:0x7fadd3663a3d
[ 58.936566] Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
[ 58.936570] RSP: 002b:00007ffef20c7b08 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
[ 58.936576] RAX: ffffffffffffffda RBX: 000055651a57b310 RCX: 00007fadd3663a3d
[ 58.936579] RDX: 0000000000000000 RSI: 00007fadd37fc441 RDI: 0000000000000011
[ 58.936582] RBP: 0000000000020000 R08: 0000000000000000 R09: 00007ffef20c7c40
[ 58.936585] R10: 0000000000000011 R11: 0000000000000246 R12: 00007fadd37fc441
[ 58.936587] R13: 000055651a54b780 R14: 000055651a539530 R15: 000055651a554b40
[ 58.936592] </TASK>
[ 58.936595] ---[ end trace 6b4de64023014d9a ]---
[ 58.942796] #PF: supervisor read access in kernel mode
[ 58.942802] #PF: error_code(0x0000) - not-present page
[ 58.942806] PGD 0
[ 58.942810] Oops: 0000 [#1] SMP NOPTI
[ 59.008727] ------------[ cut here ]------------
[ 59.013012] CPU: 2 PID: 0 Comm: swapper/2 Tainted: G W 5.15.0-85-generic #95-Ubuntu
[ 59.013022] Hardware name: NVIDIA DGXH100/DGXH100, BIOS 1.0.7 05/08/2023
[ 59.013024] RIP: 0010:qat_rsa_cb+0x3a/0x130 [intel_qat]
[ 59.018446] WARNING: CPU: 128 PID: 1536 at kernel/rcu/tree.c:3323 kfree_rcu_work+0x2d1/0x390
[ 59.023838] Code: 41 55 41 54 53 48 8b 5f 08 44 0f b6 67 05 48 8b 83 e0 00 00 00 48 8b 33 41 c1 fc 06 4c 8b ab e8 00 00 00 48 8b 90 85 00 00 00 <48> 8b 52 20 4c 8b 72 64 ba ea ff ff ff 49 81 c6 d0 00 00 00 41 83
[ 59.023844] RSP: 0018:ff4d5d94803fce68 EFLAGS: 00010246
[ 59.029256] Modules linked in:
[ 59.034454] RAX: ff314bc0710e9d18 RBX: ff314bc0710e9d00 RCX: 0000000000000001
[ 59.039857] x86_pkg_temp_thermal(+)
[ 59.049538] RDX: 0080030000000000 RSI: 000000013a8e7400 RDI: ff314bc06f1db240
[ 59.049544] RBP: ff4d5d94803fce88 R08: ff314bc05bd667c0 R09: 1615e897948f1e86
[ 59.146810] intel_powerclamp
[ 59.151904] R10: ffffffff9ea060c0 R11: ff4d5d94803fcff8 R12: 0000000000000000
[ 59.151909] R13: ff314bc0710e9cb8 R14: ff314bc05bd667c0 R15: 0000000000000002
[ 59.157316] coretemp
[ 59.162713] FS: 0000000000000000(0000) GS:ff314cbbbe480000(0000) knlGS:0000000000000000
[ 59.162719] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 59.168121] nls_iso8859_1
[ 59.173517] CR2: 0080030000000020 CR3: 000000011be7c004 CR4: 0000000000771ee0
[ 59.173523] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 59.178927] rapl
[ 59.184324] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[ 59.184330] PKRU: 55555554
[ 59.186521] irdma(+)
[ 59.193086] Call Trace:
[ 59.193092] <IRQ>
[ 59.202495] i40e
[ 59.210042] ? show_trace_log_lvl+0x1d6/0x2ea
[ 59.215942] qat_4xxx(+)
[ 59.237039] ? show_trace_log_lvl+0x1d6/0x2ea
[ 59.242933] isst_if_mbox_pci
[ 59.250963] ? qat_alg_asym_callback+0x1f/0x40 [intel_qat]
[ 59.259003] intel_qat
[ 59.267036] ? show_regs.part.0+0x23/0x29
[ 59.275080] pmt_telemetry
[ 59.283106] ? __die_body.cold+0x8/0xd
[ 59.292225] pmt_crashlog
[ 59.298696] ? __die+0x2b/0x37
[ 59.306736] idxd(+)
[ 59.314768] ? page_fault_oops+0x13b/0x170
[ 59.322811] isst_if_mmio
[ 59.325864] ? wake_affine+0x111/0x310
[ 59.328639] pmt_class
[ 59.331016] ? do_user_addr_fault+0x321/0x670
[ 59.335935] isst_if_common
[ 59.340842] ? ttwu_queue_wakelist+0x131/0x1c0
[ 59.345182] authenc
[ 59.349699] ? exc_page_fault+0x77/0x170
[ 59.353833] idxd_bus
[ 59.359034] ? asm_exc_page_fault+0x27/0x30
[ 59.362676] intel_th_gth
[ 59.367879] ? qat_rsa_cb+0x3a/0x130 [intel_qat]
[ 59.371823] mei_me
[ 59.375952] qat_alg_asym_callback+0x1f/0x40 [intel_qat]
[ 59.379898] intel_th_pci
[ 59.384225] adf_ring_response_handler+0xc1/0x190 [intel_qat]
[ 59.388951] intel_th
[ 59.394150] ? sysvec_call_function_single+0x4e/0x90
[ 59.394161] adf_response_handler+0x1c/0x40 [intel_qat]
[ 59.399365] mei
[ 59.403496] tasklet_action_common.constprop.0+0xeb/0xf0
[ 59.408030] switchtec
[ 59.412448] tasklet_hi_action+0x1f/0x30
[ 59.417564] ipmi_ssif
[ 59.422080] __do_softirq+0xd6/0x2e7
[ 59.422089] irq_exit_rcu+0x94/0xc0
[ 59.427687] acpi_ipmi
[ 59.432592] common_interrupt+0x8e/0xa0
[ 59.436246] ipmi_si
[ 59.441838] </IRQ>
[ 59.441842] <TASK>
[ 59.441844] asm_common_interrupt+0x27/0x40
[ 59.446174] ipmi_devintf
[ 59.452640] RIP: 0010:cpuidle_enter_state+0xd9/0x620
[ 59.457370] ipmi_msghandler
[ 59.462569] Code: 3d dc 69 98 62 e8 a7 66 67 ff 49 89 c7 0f 1f 44 00 00 31 ff e8 e8 73 67 ff 80 7d d0 00 0f 85 61 01 00 00 fb 66 0f 1f 44 00 00 <45> 85 f6 0f 88 6d 01 00 00 4d 63 ee 49 83 fd 09 0f 87 e7 03 00 00
[ 59.467491] mac_hid
[ 59.471620] RSP: 0018:ff4d5d94803f7e28 EFLAGS: 00000246
[ 59.475666] sch_fq_codel
[ 59.480967] RAX: ff314cbbbe4b14c0 RBX: ff7f5c947e493c60 RCX: 0000000000000000
[ 59.480971] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 59.485886] dm_multipath
[ 59.490798] RBP: ff4d5d94803f7e78 R08: 0000000db8cd49ba R09: 00000000000c3500
[ 59.490802] R10: 0000000000000004 R11: 071c71c71c71c71c R12: ffffffff9ecd6a20
[ 59.494844] scsi_dh_rdac
[ 59.500239] R13: 0000000000000002 R14: 0000000000000002 R15: 0000000db8cd49ba
[ 59.500247] ? cpuidle_enter_state+0xc8/0x620
[ 59.505646] scsi_dh_emc
[ 59.509969] cpuidle_enter+0x2e/0x50
[ 59.514211] scsi_dh_alua
[ 59.519605] cpuidle_idle_call+0x142/0x1e0
[ 59.523840] ramoops
[ 59.529529] do_idle+0x83/0xf0
[ 59.533562] reed_solomon
[ 59.554660] cpu_startup_entry+0x20/0x30
[ 59.559735] ens6f0 speed is unknown, defaulting to 1000
[ 59.559980] ens6f0 speed is unknown, defaulting to 1000
[ 59.563190] pstore_blk
[ 59.571216] start_secondary+0x12a/0x180
[ 59.579260] pstore_zone
[ 59.587284] secondary_startup_64_no_verify+0xc2/0xcb
[ 59.595325] efi_pstore
[ 59.603358] </TASK>
[ 59.603362] Modules linked in: x86_pkg_temp_thermal(+)
[ 59.605841] ip_tables
[ 59.611040] intel_powerclamp coretemp nls_iso8859_1
[ 59.616841] x_tables
[ 59.622625] rapl irdma(+)
[ 59.624916] autofs4
[ 59.629044] i40e qat_4xxx(+) isst_if_mbox_pci
[ 59.634259] btrfs
[ 59.644335] intel_qat pmt_telemetry pmt_crashlog idxd(+) isst_if_mmio
[ 59.651894] blake2b_generic
[ 59.657780] pmt_class isst_if_common authenc
[ 59.667283] zstd_compress
[ 59.688374] idxd_bus intel_th_gth mei_me intel_th_pci
[ 59.694268] raid10
[ 59.697714] intel_th mei switchtec
[ 59.705754] raid456
[ 59.709783] ipmi_ssif acpi_ipmi ipmi_si
[ 59.717825] async_raid6_recov
[ 59.725850] ipmi_devintf ipmi_msghandler mac_hid
[ 59.729214] async_memcpy
[ 59.737240] sch_fq_codel dm_multipath scsi_dh_rdac
[ 59.745279] async_pq
[ 59.747844] scsi_dh_emc
[ 59.756957] async_xor
[ 59.763424] scsi_dh_alua ramoops reed_solomon
[ 59.766495] async_tx
[ 59.774518] pstore_blk pstore_zone efi_pstore
[ 59.782556] xor
[ 59.784735] ip_tables x_tables autofs4
[ 59.792780] raid6_pq
[ 59.795837] btrfs
[ 59.798415] libcrc32c
[ 59.801178] blake2b_generic zstd_compress raid10
[ 59.803462] raid1
[ 59.805644] raid456 async_raid6_recov async_memcpy
[ 59.810562] multipath
[ 59.813424] async_pq async_xor async_tx
[ 59.818344] linear
[ 59.821693] xor raid6_pq libcrc32c
[ 59.827881] mlx5_ib
[ 59.830544] raid1 multipath linear mlx5_ib
[ 59.835063] ib_uverbs
[ 59.838121] ib_uverbs ib_core ast
[ 59.842361] ib_core
[ 59.845323] i2c_algo_bit drm_vram_helper drm_ttm_helper
[ 59.848778] ast
[ 59.851251] ttm
[ 59.855874] i2c_algo_bit
[ 59.858835] drm_kms_helper raid0 mlx5_core syscopyarea
[ 59.863071] drm_vram_helper
[ 59.865737] sysfillrect sysimgblt crct10dif_pclmul
[ 59.870657] drm_ttm_helper
[ 59.873808] fb_sys_fops crc32_pclmul ixgbe
[ 59.878825] ttm
[ 59.881299] cec mlxfw ghash_clmulni_intel
[ 59.885738] drm_kms_helper
[ 59.888301] aesni_intel
[ 59.893023] raid0
[ 59.895981] psample
[ 59.901192] mlx5_core
[ 59.903565] crypto_simd
[ 59.909555] syscopyarea
[ 59.912515] xfrm_algo ice rc_core cryptd tls
[ 59.918998] sysfillrect
[ 59.921563] nvme i2c_i801 dca xhci_pci
[ 59.927166] sysimgblt
[ 59.933050] intel_pmt drm pci_hyperv_intf
[ 59.935136] crct10dif_pclmul
[ 59.941124] i2c_ismt i2c_smbus mdio
[ 59.943796] fb_sys_fops
[ 59.948217] xhci_pci_renesas nvme_core wmi pinctrl_emmitsburg
[ 59.950895] crc32_pclmul
[ 59.954928] CR2: 0080030000000020
[ 59.958869] ixgbe
[ 59.961538] ---[ end trace 6b4de64023014d9b ]---
[ 59.961540] BUG: kernel NULL pointer dereference, address: 0000000000000030
[ 59.961549] #PF: supervisor read access in kernel mode
[ 59.961554] #PF: error_code(0x0000) - not-present page
[ 59.961558] PGD 1853c2067 P4D 0
[ 59.961566] Oops: 0000 [#2] SMP NOPTI
[ 59.961573] CPU: 211 PID: 2869 Comm: systemd-journal Tainted: G D W 5.15.0-85-generic #95-Ubuntu
[ 59.961580] Hardware name: NVIDIA DGXH100/DGXH100, BIOS 1.0.7 05/08/2023
[ 59.961583] RIP: 0010:seccomp_run_filters+0x8e/0x150
[ 59.961598] Code: 21 d0 48 98 48 0f a3 01 0f 92 c0 41 be 00 00 ff 7f 84 c0 75 52 41 be 00 00 ff 7f 4d 8b bc 24 98 00 00 00 e8 04 63 f1 ff 66 90 <49> 8b 47 30 49 8d 77 48 4c 89 ef ff d0 0f 1f 00 89 c3 e8 1b 31 f2
[ 59.961604] RSP: 0018:ff4d5d949e32bd48 EFLAGS: 00010202
[ 59.961611] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ff314bc05b526b10
[ 59.961614] RDX: ff314bc0a7128000 RSI: ff4d5d949e32bd90 RDI: ff4d5d949e32bd98
[ 59.961618] RBP: ff4d5d949e32bd80 R08: 0000000000002000 R09: 00007ffdc82eeb90
[ 59.961622] R10: 0000000000000009 R11: 0000000000000000 R12: ff314bc05b526b00
[ 59.961626] R13: ff4d5d949e32bd98 R14: 000000007fff0000 R15: 0000000000000000
[ 59.961630] FS: 00007f85a1778900(0000) GS:ff314dbbbfac0000(0000) knlGS:0000000000000000
[ 59.961636] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 59.961640] CR2: 0000000000000030 CR3: 000000012b0ae006 CR4: 0000000000771ee0
[ 59.961644] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 59.961648] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[ 59.961651] PKRU: 55555554
[ 59.961654] Call Trace:
[ 59.961657] <TASK>
[ 59.961661] ? show_trace_log_lvl+0x1d6/0x2ea
[ 59.961672] ? show_trace_log_lvl+0x1d6/0x2ea
[ 59.961680] ? __seccomp_filter+0x4a/0x4a0
[ 59.961687] ? show_regs.part.0+0x23/0x29
[ 59.961694] ? __die_body.cold+0x8/0xd
[ 59.961702] ? __die+0x2b/0x37
[ 59.961711] ? page_fault_oops+0x13b/0x170
[ 59.961723] ? do_user_addr_fault+0x321/0x670
[ 59.961730] ? devkmsg_poll+0x5a/0xa0
[ 59.961742] ? exc_page_fault+0x77/0x170
[ 59.961752] ? asm_exc_page_fault+0x27/0x30
[ 59.961760] ? seccomp_run_filters+0x8e/0x150
[ 59.961765] ? seccomp_run_filters+0x8c/0x150
[ 59.961771] __seccomp_filter+0x4a/0x4a0
[ 59.961778] __secure_computing+0xa9/0x120
[ 59.961783] syscall_trace_enter.constprop.0+0xa7/0x1c0
[ 59.961793] syscall_enter_from_user_mode+0x2f/0x40
[ 59.961801] do_syscall_64+0x37/0xc0
[ 59.961807] ? __secure_computing+0xa9/0x120
[ 59.961814] ? syscall_trace_enter.constprop.0+0xa7/0x1c0
[ 59.961820] ? exit_to_user_mode_prepare+0x37/0xb0
[ 59.961828] ? syscall_exit_to_user_mode+0x35/0x50
[ 59.961835] ? __do_sys_gettid+0x1b/0x30
[ 59.961844] ? do_syscall_64+0x69/0xc0
[ 59.961849] ? exit_to_user_mode_prepare+0x37/0xb0
[ 59.961856] ? irqentry_exit_to_user_mode+0x17/0x20
[ 59.961863] ? irqentry_exit+0x1d/0x30
[ 59.961870] ? exc_page_fault+0x89/0x170
[ 59.961877] entry_SYSCALL_64_after_hwframe+0x62/0xcc
[ 59.961882] RIP: 0033:0x7f85a21479cc
[ 59.961888] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 c0 f7 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ff c0 f7 ff 48
[ 59.961893] RSP: 002b:00007ffdc82ee2e0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 59.961899] RAX: ffffffffffffffda RBX: 00007ffdc82f0c00 RCX: 00007f85a21479cc
[ 59.961903] RDX: 0000000000002000 RSI: 00007ffdc82eeb90 RDI: 0000000000000009
[ 59.961906] RBP: 00007ffdc82f0cd0 R08: 0000000000000000 R09: 0000000000000001
[ 59.961909] R10: 00007ffdc8373080 R11: 0000000000000246 R12: 0000000000000000
[ 59.961913] R13: 00007ffdc82eeb90 R14: 0000000000000000 R15: 0000000000000001
[ 59.961918] </TASK>
[ 59.961920] Modules linked in: x86_pkg_temp_thermal(+) intel_powerclamp coretemp nls_iso8859_1 rapl irdma(+) i40e qat_4xxx(+) isst_if_mbox_pci intel_qat pmt_telemetry pmt_crashlog idxd(+) isst_if_mmio pmt_class isst_if_common authenc idxd_bus intel_th_gth mei_me intel_th_pci intel_th mei switchtec ipmi_ssif acpi_ipmi ipmi_si ipmi_devintf ipmi_msghandler mac_hid sch_fq_codel dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua ramoops reed_solomon pstore_blk pstore_zone efi_pstore ip_tables x_tables autofs4 btrfs blake2b_generic zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 multipath linear mlx5_ib ib_uverbs ib_core ast i2c_algo_bit drm_vram_helper drm_ttm_helper ttm drm_kms_helper raid0 mlx5_core syscopyarea sysfillrect sysimgblt crct10dif_pclmul fb_sys_fops crc32_pclmul ixgbe cec mlxfw ghash_clmulni_intel aesni_intel psample crypto_simd xfrm_algo ice rc_core cryptd tls nvme i2c_i801 dca xhci_pci intel_pmt drm
[ 59.962150] pci_hyperv_intf i2c_ismt i2c_smbus mdio xhci_pci_renesas nvme_core wmi pinctrl_emmitsburg
[ 59.962177] CR2: 0000000000000030
[ 59.962183] ---[ end trace 6b4de64023014d9c ]---
[ 59.965868] cec
[ 60.046995] RIP: 0010:qat_rsa_cb+0x3a/0x130 [intel_qat]
[ 60.052384] mlxfw
[ 60.055637] Code: 41 55 41 54 53 48 8b 5f 08 44 0f b6 67 05 48 8b 83 e0 00 00 00 48 8b 33 41 c1 fc 06 4c 8b ab e8 00 00 00 48 8b 90 85 00 00 00 <48> 8b 52 20 4c 8b 72 64 ba ea ff ff ff 49 81 c6 d0 00 00 00 41 83
[ 60.135449] RIP: 0010:qat_rsa_cb+0x3a/0x130 [intel_qat]
[ 60.135491] Code: 41 55 41 54 53 48 8b 5f 08 44 0f b6 67 05 48 8b 83 e0 00 00 00 48 8b 33 41 c1 fc 06 4c 8b ab e8 00 00 00 48 8b 90 85 00 00 00 <48> 8b 52 20 4c 8b 72 64 ba ea ff ff ff 49 81 c6 d0 00 00 00 41 83
[ 60.135498] RSP: 0018:ff4d5d94803fce68 EFLAGS: 00010246
[ 60.135506] RAX: ff314bc0710e9d18 RBX: ff314bc0710e9d00 RCX: 0000000000000001
[ 60.135512] RDX: 0080030000000000 RSI: 000000013a8e7400 RDI: ff314bc06f1db240
[ 60.135518] RBP: ff4d5d94803fce88 R08: ff314bc05bd667c0 R09: 1615e897948f1e86
[ 60.135524] R10: ffffffff9ea060c0 R11: ff4d5d94803fcff8 R12: 0000000000000000
[ 60.135529] R13: ff314bc0710e9cb8 R14: ff314bc05bd667c0 R15: 0000000000000002
[ 60.135532] FS: 0000000000000000(0000) GS:ff314cbbbe480000(0000) knlGS:0000000000000000
[ 60.135538] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 60.135544] CR2: 0080030000000020 CR3: 000000011be7c004 CR4: 0000000000771ee0
[ 60.135548] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 60.135552] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[ 60.135556] PKRU: 55555554
[ 60.135560] Kernel panic - not syncing: Fatal exception in interrupt
[ 61.196485] RSP: 0018:ff4d5d94803fce68 EFLAGS: 00010246
[ 61.202378] RAX: ff314bc0710e9d18 RBX: ff314bc0710e9d00 RCX: 0000000000000001
[ 61.210411] RDX: 0080030000000000 RSI: 000000013a8e7400 RDI: ff314bc06f1db240
[ 61.218449] RBP: ff4d5d94803fce88 R08: ff314bc05bd667c0 R09: 1615e897948f1e86
[ 61.226481] R10: ffffffff9ea060c0 R11: ff4d5d94803fcff8 R12: 0000000000000000
[ 61.234518] R13: ff314bc0710e9cb8 R14: ff314bc05bd667c0 R15: 0000000000000002
[ 61.242555] FS: 00007f85a1778900(0000) GS:ff314dbbbfac0000(0000) knlGS:0000000000000000
[ 61.251666] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 61.258143] CR2: 0000000000000030 CR3: 000000012b0ae006 CR4: 0000000000771ee0
[ 61.266176] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 61.274213] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[ 61.282245] PKRU: 55555554
[ 61.285383] Kernel Offset: 0x1bc00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[ 61.375816] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---
---
ProblemType: Bug
AlsaDevices:
 total 0
 crw-rw---- 1 root audio 116, 1 Sep 6 12:25 seq
 crw-rw---- 1 root audio 116, 33 Sep 6 12:25 timer
AplayDevices: Error: [Errno 2] No such file or directory: 'aplay'
ApportVersion: 2.20.11-0ubuntu82.5
Architecture: amd64
ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord'
AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1:
CRDA: N/A
CasperMD5CheckResult: unknown
DistroRelease: Ubuntu 22.04
IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig'
Lsusb:
 Bus 002 Device 002: ID 0451:8140 Texas Instruments, Inc. TUSB8041 4-Port Hub
 Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
 Bus 001 Device 002: ID 0451:8142 Texas Instruments, Inc. TUSB8041 4-Port Hub
 Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Lsusb-t:
 /: Bus 02.Port 1: Dev 1, Class=root_hub, Driver=xhci_hcd/10p, 10000M
     |__ Port 10: Dev 2, If 0, Class=Hub, Driver=hub/4p, 5000M
 /: Bus 01.Port 1: Dev 1, Class=root_hub, Driver=xhci_hcd/16p, 480M
     |__ Port 10: Dev 2, If 0, Class=Hub, Driver=hub/4p, 480M
MachineType: NVIDIA DGXH100
Package: linux (not installed)
PciMultimedia:

ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 LANG=C.UTF-8
 SHELL=/bin/bash
ProcFB: 0 astdrmfb
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-83-generic root=UUID=43a0d64c-490d-4a20-a5e2-8c1ba57e2600 ro sysrq_always_enabled console=ttyS0,115200n8 iommu=pt
ProcVersionSignature: Ubuntu 5.15.0-83.92-generic 5.15.116
RelatedPackageVersions:
 linux-restricted-modules-5.15.0-83-generic N/A
 linux-backports-modules-5.15.0-83-generic N/A
 linux-firmware 20220329.git681281e4-0ubuntu3.18
RfKill: Error: [Errno 2] No such file or directory: 'rfkill'
Tags: jammy uec-images
Uname: Linux 5.15.0-83-generic x86_64
UpgradeStatus: No upgrade log present (probably fresh install)
UserGroups: N/A
_MarkForUpload: True
dmi.bios.date: 05/08/2023
dmi.bios.release: 1.0
dmi.bios.vendor: NVIDIA
dmi.bios.version: 1.0.7
dmi.board.asset.tag: Default string
dmi.board.name: DGXH100
dmi.board.vendor: NVIDIA
dmi.board.version: 555.07L01.0001
dmi.chassis.asset.tag: 00000000000000000000000000000000
dmi.chassis.type: 23
dmi.chassis.vendor: NVIDIA
dmi.chassis.version: 920-24387-2540-000
dmi.modalias: dmi:bvnNVIDIA:bvr1.0.7:bd05/08/2023:br1.0:svnNVIDIA:pnDGXH100:pvrA.5:rvnNVIDIA:rnDGXH100:rvr555.07L01.0001:cvnNVIDIA:ct23:cvr920-24387-2540-000:sku920-24387-2540-000:
dmi.product.family: DGX
dmi.product.name: DGXH100
dmi.product.sku: 920-24387-2540-000
dmi.product.version: A.5
dmi.sys.vendor: NVIDIA

Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Missing required logs.

This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window:

apport-collect 2034447

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the Ubuntu Kernel Team.

Changed in linux (Ubuntu):
status: New → Incomplete
Revision history for this message
Francis Ginther (fginther) wrote :

Here's the full log from where that snippet was pulled.

Revision history for this message
Francis Ginther (fginther) wrote :
Download full text (5.4 KiB)

Another panic with the same kernel on hidon, but a different trace:

[ 53.908045] kernel tried to execute NX-protected page - exploit attempt? (uid: 0)
[ 53.910849] ipmi_si IPI0001:00: IPMI kcs interface initialized
[ 53.916485] BUG: unable to handle page fault for address: ff3bbb1e67db8300
[ 53.916488] #PF: supervisor instruction fetch in kernel mode
[ 53.916489] #PF: error_code(0x0011) - permissions violation
[ 53.916490] PGD bc51202067 P4D bc51203067 PUD 114ee8063 PMD 127c6e063 PTE 8000000127db8163
[ 53.916495] Oops: 0011 [#1] SMP NOPTI
[ 53.916498] CPU: 192 PID: 0 Comm: swapper/192 Not tainted 5.15.0-85-generic #95-Ubuntu
[ 53.916501] Hardware name: NVIDIA DGXH100/DGXH100, BIOS 1.0.7 05/08/2023
[ 53.916502] RIP: 0010:0xff3bbb1e67db8300
[ 53.916505] Code: 13 00 00 00 00 00 00 00 00 00 00 50 0c 99 3c 18 48 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 d0 64 1e bb 3b ff 28 50 30 6b 1e bb 3b ff 00 00 00 00 00 00
[ 53.916507] RSP: 0018:ff48183c9bc04eb0 EFLAGS: 00010202
[ 53.916509] RAX: ff3bbb1e67db8300 RBX: 0000000000000207 RCX: ffffffffa5a0a898
[ 53.916511] RDX: ff3bbc1ddb48bfa0 RSI: ffffffffa479751d RDI: ff3bbc1ddb48c000
[ 53.916512] RBP: ff48183c9bc04f20 R08: 0000000000000001 R09: 0000000000000000
[ 53.916513] R10: 0000000000000001 R11: 0000000000000000 R12: ff48183c9bc04ed8
[ 53.916514] R13: 0000000000000206 R14: ff3bbd19bf6322c0 R15: ff3bbc1dce49c080
[ 53.916516] FS: 0000000000000000(0000) GS:ff3bbd19bf600000(0000) knlGS:0000000000000000
[ 53.916517] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 53.916519] CR2: ff3bbb1e67db8300 CR3: 000000bc4f810003 CR4: 0000000000771ee0
[ 54.036823] ens6f0 speed is unknown, defaulting to 1000
[ 54.036851] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 54.045100] ens6f0 speed is unknown, defaulting to 1000
[ 54.053987] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[ 54.053989] PKRU: 55555554
[ 54.053990] Call Trace:
[ 54.053992] <IRQ>
[ 54.055846] 4xxx 0000:e8:00.0: qat_dev1 started 9 acceleration engines
[ 54.060696] ens6f0 speed is unknown, defaulting to 1000
[ 54.068491] ? show_trace_log_lvl+0x1d6/0x2ea
[ 54.078858] ens6f0 speed is unknown, defaulting to 1000
[ 54.082407] ? show_trace_log_lvl+0x1d6/0x2ea
[ 54.133342] ? rcu_core+0x122/0x2a0
[ 54.133349] ? show_regs.part.0+0x23/0x29
[ 54.133352] ? __die_body.cold+0x8/0xd
[ 54.133355] ? __die+0x2b/0x37
[ 54.133358] ? page_fault_oops+0x13b/0x170
[ 54.133363] ? search_exception_tables+0x61/0x70
[ 54.133367] ? kernelmode_fixup_or_oops+0xa2/0x120
[ 54.133370] ? __bad_area_nosemaphore+0x15d/0x1a0
[ 54.133372] ? bad_area_nosemaphore+0x16/0x20
[ 54.133374] ? do_kern_addr_fault+0x62/0x80
[ 54.133377] ? exc_page_fault+0xe7/0x170
[ 54.133382] ? asm_exc_page_fault+0x27/0x30
[ 54.133386] ? file_free_rcu+0x2d/0x60
[ 54.133392] ? rcu_do_batch+0x14e/0x430
[ 54.133395] rcu_core+0x122/0x2a0
[ 54.133398] rcu_core_si+0xe/0x20
[ 54.133401] __do_softirq+0xd6/0x2e7
[ 54.133404] irq_exit_rcu+0x94/0xc0
[ 54.133408] sysvec_apic_timer_interrupt+0x80/0x90
[ 54.133411] </IR...

Read more...

Revision history for this message
Francis Ginther (fginther) wrote : CurrentDmesg.txt

apport information

tags: added: apport-collected jammy uec-images
description: updated
Revision history for this message
Francis Ginther (fginther) wrote : Lspci.txt

apport information

Revision history for this message
Francis Ginther (fginther) wrote : Lspci-vt.txt

apport information

Revision history for this message
Francis Ginther (fginther) wrote : Lsusb-v.txt

apport information

Revision history for this message
Francis Ginther (fginther) wrote : ProcCpuinfo.txt

apport information

Revision history for this message
Francis Ginther (fginther) wrote : ProcCpuinfoMinimal.txt

apport information

Revision history for this message
Francis Ginther (fginther) wrote : ProcInterrupts.txt

apport information

Revision history for this message
Francis Ginther (fginther) wrote : ProcModules.txt

apport information

Revision history for this message
Francis Ginther (fginther) wrote : UdevDb.txt

apport information

Revision history for this message
Francis Ginther (fginther) wrote : WifiSyslog.txt

apport information

Revision history for this message
Francis Ginther (fginther) wrote : acpidump.txt

apport information

Revision history for this message
Stefan Bader (smb) wrote :

Since this is somewhere in crypto and I saw QAT in the messages, this is the list of related changes between -83 and -85:

88c7bf897ef7 crypto: qat - unmap buffers before free for RSA
d66aa0d64549 crypto: qat - unmap buffer before free for DH
32a99d9afc4d crypto: qat - Use helper to set reqsize
d389108b0aee crypto: kpp - Add helper to set reqsize
18d6f474609d crypto: qat - use reference to structure in dma_map_single()
d72b1246a048 crypto: qat - replace get_current_node() with numa_node_id()
abcd04ccb419 crypto: qat - honor CRYPTO_TFM_REQ_MAY_SLEEP flag

Revision history for this message
Stefan Bader (smb) wrote :

Current upstream stable level is v5.15.122, latest is v5.15.130. Between those versions there seem to be no additional related patches.

Revision history for this message
Timo Aaltonen (tjaalton) wrote :

probably caused by 32a99d9afc4d, details at

https://www.spinics.net/lists/stable/msg678947.html

Stefan Bader (smb)
Changed in linux (Ubuntu Jammy):
importance: Undecided → High
status: New → Triaged
Changed in linux (Ubuntu):
status: Incomplete → Fix Released
Stefan Bader (smb)
Changed in linux (Ubuntu Jammy):
status: Triaged → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (56.7 KiB)

This bug was fixed in the package linux - 5.15.0-86.96

---------------
linux (5.15.0-86.96) jammy; urgency=medium

  * jammy/linux: 5.15.0-86.96 -proposed tracker (LP: #2036575)

  * 5.15.0-85 live migration regression (LP: #2036675)
    - Revert "KVM: x86: Always enable legacy FP/SSE in allowed user XFEATURES"
    - Revert "x86/kvm/fpu: Limit guest user_xfeatures to supported bits of XCR0"

  * Regression for ubuntu_bpf test build on Jammy 5.15.0-85.95 (LP: #2035181)
    - selftests/bpf: fix static assert compilation issue for test_cls_*.c

  * `refcount_t: underflow; use-after-free.` on hidon w/ 5.15.0-85-generic
    (LP: #2034447)
    - crypto: rsa-pkcs1pad - Use helper to set reqsize

linux (5.15.0-85.95) jammy; urgency=medium

  * jammy/linux: 5.15.0-85.95 -proposed tracker (LP: #2033821)

  * Please enable Renesas RZ platform serial installer (LP: #2022361)
    - [Config] enable hihope RZ/G2M serial console
    - [Config] Mark sh-sci as built-in

  * Request backport of xen timekeeping performance improvements (LP: #2033122)
    - x86/xen/time: prefer tsc as clocksource when it is invariant

  * kdump doesn't work with UEFI secure boot and kernel lockdown enabled on
    ARM64 (LP: #2033007)
    - [Config]: Enable CONFIG_KEXEC_IMAGE_VERIFY_SIG
    - kexec, KEYS: make the code in bzImage64_verify_sig generic
    - arm64: kexec_file: use more system keyrings to verify kernel image signature

  * ubuntu_kernel_selftests:net:vrf-xfrm-tests.sh: 8 failed test cases on
    jammy/fips (LP: #2019880)
    - selftests: net: vrf-xfrm-tests: change authentication and encryption algos

  * ubuntu_kernel_selftests:net:tls: 88 failed test cases on jammy/fips
    (LP: #2019868)
    - selftests/harness: allow tests to be skipped during setup
    - selftests: net: tls: check if FIPS mode is enabled

  * A general-proteciton exception during guest migration to unsupported PKRU
    machine (LP: 2032164, reverted)
    - x86/kvm/fpu: Limit guest user_xfeatures to supported bits of XCR0
    - KVM: x86: Always enable legacy FP/SSE in allowed user XFEATURES

  * CVE-2023-4569
    - netfilter: nf_tables: deactivate catchall elements in next generation

  * CVE-2023-20569
    - x86/cpu, kvm: Add support for CPUID_80000021_EAX
    - x86/srso: Add a Speculative RAS Overflow mitigation
    - x86/srso: Add IBPB_BRTYPE support
    - x86/srso: Add SRSO_NO support
    - x86/srso: Add IBPB
    - x86/srso: Add IBPB on VMEXIT
    - x86/srso: Fix return thunks in generated code
    - x86/srso: Tie SBPB bit setting to microcode patch detection
    - x86: fix backwards merge of GDS/SRSO bit
    - x86/srso: Fix build breakage with the LLVM linker
    - x86/cpu: Fix __x86_return_thunk symbol type
    - x86/cpu: Fix up srso_safe_ret() and __x86_return_thunk()
    - x86/alternative: Make custom return thunk unconditional
    - objtool: Add frame-pointer-specific function ignore
    - x86/ibt: Add ANNOTATE_NOENDBR
    - x86/cpu: Clean up SRSO return thunk mess
    - x86/cpu: Rename original retbleed methods
    - x86/cpu: Rename srso_(.*)_alias to srso_alias_\1
    - x86/cpu: Cleanup the untrain mess
    - x86/srso: Explain the untraining sequences a bit more
    - x86/static_call:...

Changed in linux (Ubuntu Jammy):
status: Fix Committed → Fix Released
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote :

This bug is awaiting verification that the linux-azure/5.15.0-1050.57 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-jammy-linux-azure' to 'verification-done-jammy-linux-azure'. If the problem still exists, change the tag 'verification-needed-jammy-linux-azure' to 'verification-failed-jammy-linux-azure'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: kernel-spammed-jammy-linux-azure-v2 verification-needed-jammy-linux-azure
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote :

This bug is awaiting verification that the linux-aws/5.15.0-1048.53 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-jammy-linux-aws' to 'verification-done-jammy-linux-aws'. If the problem still exists, change the tag 'verification-needed-jammy-linux-aws' to 'verification-failed-jammy-linux-aws'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: kernel-spammed-jammy-linux-aws-v2 verification-needed-jammy-linux-aws
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote :

This bug is awaiting verification that the linux-nvidia-tegra/5.15.0-1018.18 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-jammy-linux-nvidia-tegra' to 'verification-done-jammy-linux-nvidia-tegra'. If the problem still exists, change the tag 'verification-needed-jammy-linux-nvidia-tegra' to 'verification-failed-jammy-linux-nvidia-tegra'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: kernel-spammed-jammy-linux-nvidia-tegra-v2 verification-needed-jammy-linux-nvidia-tegra
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote :

This bug is awaiting verification that the linux-raspi/5.15.0-1040.43 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-jammy-linux-raspi' to 'verification-done-jammy-linux-raspi'. If the problem still exists, change the tag 'verification-needed-jammy-linux-raspi' to 'verification-failed-jammy-linux-raspi'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: kernel-spammed-jammy-linux-raspi-v2 verification-needed-jammy-linux-raspi
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote :

This bug is awaiting verification that the linux-bluefield/5.15.0-1027.29 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-jammy-linux-bluefield' to 'verification-done-jammy-linux-bluefield'. If the problem still exists, change the tag 'verification-needed-jammy-linux-bluefield' to 'verification-failed-jammy-linux-bluefield'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: kernel-spammed-jammy-linux-bluefield-v2 verification-needed-jammy-linux-bluefield
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote :

This bug is awaiting verification that the linux-intel-iotg-5.15/5.15.0-1043.49~20.04.1 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-focal-linux-intel-iotg-5.15' to 'verification-done-focal-linux-intel-iotg-5.15'. If the problem still exists, change the tag 'verification-needed-focal-linux-intel-iotg-5.15' to 'verification-failed-focal-linux-intel-iotg-5.15'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: kernel-spammed-focal-linux-intel-iotg-5.15-v2 verification-needed-focal-linux-intel-iotg-5.15
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote :

This bug is awaiting verification that the linux-nvidia-tegra-igx/5.15.0-1005.5 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-jammy-linux-nvidia-tegra-igx' to 'verification-done-jammy-linux-nvidia-tegra-igx'. If the problem still exists, change the tag 'verification-needed-jammy-linux-nvidia-tegra-igx' to 'verification-failed-jammy-linux-nvidia-tegra-igx'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: kernel-spammed-jammy-linux-nvidia-tegra-igx-v2 verification-needed-jammy-linux-nvidia-tegra-igx
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote :

This bug is awaiting verification that the linux-nvidia-tegra-5.15/5.15.0-1018.18~20.04.1 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-focal-linux-nvidia-tegra-5.15' to 'verification-done-focal-linux-nvidia-tegra-5.15'. If the problem still exists, change the tag 'verification-needed-focal-linux-nvidia-tegra-5.15' to 'verification-failed-focal-linux-nvidia-tegra-5.15'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: kernel-spammed-focal-linux-nvidia-tegra-5.15-v2 verification-needed-focal-linux-nvidia-tegra-5.15
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote :

This bug is awaiting verification that the linux-gcp-tcpx/5.15.0-1002.2 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-focal-linux-gcp-tcpx' to 'verification-done-focal-linux-gcp-tcpx'. If the problem still exists, change the tag 'verification-needed-focal-linux-gcp-tcpx' to 'verification-failed-focal-linux-gcp-tcpx'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: kernel-spammed-focal-linux-gcp-tcpx-v2 verification-needed-focal-linux-gcp-tcpx
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote :

This bug is awaiting verification that the linux-xilinx-zynqmp/5.15.0-1025.29 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-jammy-linux-xilinx-zynqmp' to 'verification-done-jammy-linux-xilinx-zynqmp'. If the problem still exists, change the tag 'verification-needed-jammy-linux-xilinx-zynqmp' to 'verification-failed-jammy-linux-xilinx-zynqmp'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: kernel-spammed-jammy-linux-xilinx-zynqmp-v2 verification-needed-jammy-linux-xilinx-zynqmp
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote :

This bug is awaiting verification that the linux-mtk/5.15.0-1030.34 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-jammy-linux-mtk' to 'verification-done-jammy-linux-mtk'. If the problem still exists, change the tag 'verification-needed-jammy-linux-mtk' to 'verification-failed-jammy-linux-mtk'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: kernel-spammed-jammy-linux-mtk-v2 verification-needed-jammy-linux-mtk
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.