ath9k freezes suspend resume Ubuntu 17.04

Bug #1697027 reported by pureblood
14
This bug affects 3 people
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Fix Released
Undecided
Unassigned
Zesty
Fix Released
Undecided
Unassigned

Bug Description

[SRU Justification]
[Impact]
Ath9k stops working after system resume from suspend.

[Test Case]
Suspend/resume the system.
Ath9k should no longer freeze.

[Regression Potential]
This patch only effects ath9k, also, the change is pretty small.
The regression potential should be really low.

---

Description: Ubuntu Zesty Zapus
Release: 17.04

What was expected to happen?
I expected the laptop would suspend and resume without issues

What happened instead?
First the network fails, then all other programs slowly start to fail as well until the system freezes completely. The system is unable to shutdown and it requires a forced shutdown.

Often when suspending my system, a recent upgrade to 17.04 from 16.10, after resuming the network does not work and then slowly the whole system freezes. Looking at dmesg, the problem seems to arise just before the system suspends with the kernel trace attached below.

My best guess is that the issue is caused by ath9k. My system is a Dell XPS13 version 9333 (2013) running kernel 4.10.0-22-generic (with 8GB of RAM and no swap) and it is often connected to a Dell U3011 monitor.

I could not find other reports of this bug and this behaviour is new to 17.04, that is, it was not present in 16.10. I was always able to suspend and resume without issues before. I have been waiting to see bug 1674838 fixed before reporting this bug thinking that they might be related, but they are clearly independent as I am still having this suspend issue.

Happy to try to collect more info if this information is not enough to understand where the problem lies, however it is impossible to run apport once the bug arises.

[11292.289928] ------------[ cut here ]------------
[11292.289935] WARNING: CPU: 0 PID: 943 at /build/linux-nOqmtv/linux-4.10.0/kernel/kthread.c:69 kthread_stop+0x102/0x110
[11292.289936] Modules linked in: ccm rfcomm cmac bnep hid_generic dell_wmi sparse_keymap intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel dell_laptop dell_smbios kvm dcdbas snd_hda_codec_hdmi irqbypass snd_hda_codec_realtek uvcvideo snd_hda_codec_generic arc4 crct10dif_pclmul videobuf2_vmalloc snd_hda_intel crc32_pclmul videobuf2_memops ath9k snd_hda_codec ghash_clmulni_intel videobuf2_v4l2 ath9k_common pcbc snd_hda_core videobuf2_core ath9k_hw snd_hwdep usbhid videodev ath snd_pcm aesni_intel uas media ath3k mac80211 usb_storage hid aes_x86_64 btusb snd_seq_midi crypto_simd snd_seq_midi_event btrtl glue_helper cfg80211 snd_rawmidi cryptd btbcm btintel snd_seq bluetooth intel_cstate snd_seq_device intel_rapl_perf snd_timer snd input_leds joydev soundcore serio_raw shpchp mei_me mei
[11292.289977] lpc_ich acpi_als kfifo_buf industrialio mac_hid binfmt_misc parport_pc ppdev lp parport ip_tables x_tables autofs4 i915 i2c_algo_bit drm_kms_helper syscopyarea psmouse sysfillrect sysimgblt fb_sys_fops ahci drm libahci wmi fjes video
[11292.289995] CPU: 0 PID: 943 Comm: NetworkManager Not tainted 4.10.0-22-generic #24-Ubuntu
[11292.289996] Hardware name: Dell Inc. Dell System XPS L322X/0PJHXN, BIOS A09 05/15/2013
[11292.289997] Call Trace:
[11292.290001] dump_stack+0x63/0x81
[11292.290003] __warn+0xcb/0xf0
[11292.290005] warn_slowpath_null+0x1d/0x20
[11292.290007] kthread_stop+0x102/0x110
[11292.290014] ath9k_rng_stop+0x1a/0x20 [ath9k]
[11292.290018] ath9k_stop+0x3b/0x1d0 [ath9k]
[11292.290036] drv_stop+0x33/0x100 [mac80211]
[11292.290055] ieee80211_stop_device+0x43/0x50 [mac80211]
[11292.290072] ieee80211_do_stop+0x55a/0x860 [mac80211]
[11292.290075] ? _raw_spin_unlock_bh+0x1e/0x20
[11292.290077] ? dev_deactivate_many+0x205/0x240
[11292.290093] ieee80211_stop+0x1a/0x20 [mac80211]
[11292.290096] __dev_close_many+0x99/0x100
[11292.290098] __dev_close+0x45/0x70
[11292.290100] __dev_change_flags+0x9d/0x160
[11292.290102] dev_change_flags+0x29/0x60
[11292.290104] do_setlink+0x338/0xd20
[11292.290107] ? load_balance+0x1b4/0xa00
[11292.290109] ? update_load_avg+0x6b/0x510
[11292.290112] ? dequeue_entity+0xed/0x420
[11292.290114] ? nla_parse+0x31/0x110
[11292.290115] rtnl_newlink+0x5c6/0x860
[11292.290118] ? lookup_fast+0x57/0x310
[11292.290121] ? security_capget+0x60/0x70
[11292.290123] ? ns_capable_common+0x68/0x80
[11292.290125] ? ns_capable+0x13/0x20
[11292.290127] rtnetlink_rcv_msg+0xe6/0x210
[11292.290130] ? __kmalloc_node_track_caller+0x1f0/0x2a0
[11292.290133] ? __alloc_skb+0x87/0x1e0
[11292.290135] ? rtnl_newlink+0x860/0x860
[11292.290137] netlink_rcv_skb+0xa4/0xc0
[11292.290138] rtnetlink_rcv+0x28/0x30
[11292.290140] netlink_unicast+0x18c/0x220
[11292.290141] netlink_sendmsg+0x2f7/0x3b0
[11292.290144] ? aa_sock_msg_perm+0x61/0x150
[11292.290146] sock_sendmsg+0x38/0x50
[11292.290148] ___sys_sendmsg+0x2c2/0x2d0
[11292.290149] ? try_to_wake_up+0x59/0x3e0
[11292.290152] ? update_load_avg+0x6b/0x510
[11292.290154] ? update_load_avg+0x6b/0x510
[11292.290156] ? set_next_entity+0xc3/0x1b0
[11292.290157] ? pick_next_task_fair+0x47a/0x4b0
[11292.290160] ? __switch_to+0x23c/0x520
[11292.290162] ? __fget_light+0x25/0x60
[11292.290164] __sys_sendmsg+0x54/0x90
[11292.290166] SyS_sendmsg+0x12/0x20
[11292.290168] entry_SYSCALL_64_fastpath+0x1e/0xad
[11292.290169] RIP: 0033:0x7f6e2e5fb460
[11292.290170] RSP: 002b:00007fff77d8c390 EFLAGS: 00000293 ORIG_RAX: 000000000000002e
[11292.290172] RAX: ffffffffffffffda RBX: 0000560645dcbac0 RCX: 00007f6e2e5fb460
[11292.290173] RDX: 0000000000000000 RSI: 00007fff77d8c3f0 RDI: 000000000000000c
[11292.290174] RBP: 0000560645dc5d50 R08: 0000000000000000 R09: 00005606460bf600
[11292.290175] R10: 00005606460bf600 R11: 0000000000000293 R12: 0000560645dcbb40
[11292.290175] R13: 0000560645dcbb00 R14: 00007fff77d8b840 R15: 0000000000000001
[11292.290177] ---[ end trace 582ceb2f8a45c9ad ]---
[11292.290187] BUG: unable to handle kernel paging request at 00007f71eba4bb90
[11292.290232] IP: kthread_stop+0x30/0x110
[11292.290255] PGD 2347d6067
[11292.290255] PUD 0
[11292.290271]
[11292.290294] Oops: 0002 [#1] SMP
[11292.290312] Modules linked in: ccm rfcomm cmac bnep hid_generic dell_wmi sparse_keymap intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel dell_laptop dell_smbios kvm dcdbas snd_hda_codec_hdmi irqbypass snd_hda_codec_realtek uvcvideo snd_hda_codec_generic arc4 crct10dif_pclmul videobuf2_vmalloc snd_hda_intel crc32_pclmul videobuf2_memops ath9k snd_hda_codec ghash_clmulni_intel videobuf2_v4l2 ath9k_common pcbc snd_hda_core videobuf2_core ath9k_hw snd_hwdep usbhid videodev ath snd_pcm aesni_intel uas media ath3k mac80211 usb_storage hid aes_x86_64 btusb snd_seq_midi crypto_simd snd_seq_midi_event btrtl glue_helper cfg80211 snd_rawmidi cryptd btbcm btintel snd_seq bluetooth intel_cstate snd_seq_device intel_rapl_perf snd_timer snd input_leds joydev soundcore serio_raw shpchp mei_me mei
[11292.290677] lpc_ich acpi_als kfifo_buf industrialio mac_hid binfmt_misc parport_pc ppdev lp parport ip_tables x_tables autofs4 i915 i2c_algo_bit drm_kms_helper syscopyarea psmouse sysfillrect sysimgblt fb_sys_fops ahci drm libahci wmi fjes video
[11292.290796] CPU: 0 PID: 943 Comm: NetworkManager Tainted: G W 4.10.0-22-generic #24-Ubuntu
[11292.290842] Hardware name: Dell Inc. Dell System XPS L322X/0PJHXN, BIOS A09 05/15/2013
[11292.290886] task: ffff9b7ab068ad00 task.stack: ffffbcb581a54000
[11292.290919] RIP: 0010:kthread_stop+0x30/0x110
[11292.290943] RSP: 0018:ffffbcb581a575f8 EFLAGS: 00010292
[11292.290972] RAX: 0000000000000024 RBX: 00007f71eba4bb90 RCX: 0000000000000006
[11292.291007] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009
[11292.291043] RBP: ffffbcb581a57610 R08: 0000000000000001 R09: 00000000000003cc
[11292.291079] R10: ffffffffa9606a40 R11: 0000000000000000 R12: ffff9b7a54b92d00
[11292.291115] R13: ffff9b7ab15d9fb0 R14: ffff9b7ab15d8740 R15: ffff9b7ab137c018
[11292.291152] FS: 00007f6e309f6540(0000) GS:ffff9b7abf200000(0000) knlGS:0000000000000000
[11292.291193] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[11292.291222] CR2: 00007f71eba4bb90 CR3: 000000023478b000 CR4: 00000000001406f0
[11292.291259] Call Trace:
[11292.291279] ath9k_rng_stop+0x1a/0x20 [ath9k]
[11292.291306] ath9k_stop+0x3b/0x1d0 [ath9k]
[11292.291342] drv_stop+0x33/0x100 [mac80211]
[11292.291383] ieee80211_stop_device+0x43/0x50 [mac80211]
[11292.291427] ieee80211_do_stop+0x55a/0x860 [mac80211]
[11292.291455] ? _raw_spin_unlock_bh+0x1e/0x20
[11292.291479] ? dev_deactivate_many+0x205/0x240
[11292.291519] ieee80211_stop+0x1a/0x20 [mac80211]
[11292.291546] __dev_close_many+0x99/0x100
[11292.291570] __dev_close+0x45/0x70
[11292.291591] __dev_change_flags+0x9d/0x160
[11292.291614] dev_change_flags+0x29/0x60
[11292.291637] do_setlink+0x338/0xd20
[11292.291657] ? load_balance+0x1b4/0xa00
[11292.291678] ? update_load_avg+0x6b/0x510
[11292.291702] ? dequeue_entity+0xed/0x420
[11292.291725] ? nla_parse+0x31/0x110
[11292.291745] rtnl_newlink+0x5c6/0x860
[11292.291766] ? lookup_fast+0x57/0x310
[11292.291785] ? security_capget+0x60/0x70
[11292.291805] ? ns_capable_common+0x68/0x80
[11292.291826] ? ns_capable+0x13/0x20
[11292.291844] rtnetlink_rcv_msg+0xe6/0x210
[11292.291865] ? __kmalloc_node_track_caller+0x1f0/0x2a0
[11292.291889] ? __alloc_skb+0x87/0x1e0
[11292.291907] ? rtnl_newlink+0x860/0x860
[11292.291928] netlink_rcv_skb+0xa4/0xc0
[11292.291949] rtnetlink_rcv+0x28/0x30
[11292.291968] netlink_unicast+0x18c/0x220
[11292.291989] netlink_sendmsg+0x2f7/0x3b0
[11292.292011] ? aa_sock_msg_perm+0x61/0x150
[11292.292033] sock_sendmsg+0x38/0x50
[11292.292052] ___sys_sendmsg+0x2c2/0x2d0
[11292.292073] ? try_to_wake_up+0x59/0x3e0
[11292.292095] ? update_load_avg+0x6b/0x510
[11292.292117] ? update_load_avg+0x6b/0x510
[11292.292139] ? set_next_entity+0xc3/0x1b0
[11292.292161] ? pick_next_task_fair+0x47a/0x4b0
[11292.292185] ? __switch_to+0x23c/0x520
[11292.292207] ? __fget_light+0x25/0x60
[11292.292227] __sys_sendmsg+0x54/0x90
[11292.293801] SyS_sendmsg+0x12/0x20
[11292.295417] entry_SYSCALL_64_fastpath+0x1e/0xad
[11292.297041] RIP: 0033:0x7f6e2e5fb460
[11292.298664] RSP: 002b:00007fff77d8c390 EFLAGS: 00000293 ORIG_RAX: 000000000000002e
[11292.300331] RAX: ffffffffffffffda RBX: 0000560645dcbac0 RCX: 00007f6e2e5fb460
[11292.302005] RDX: 0000000000000000 RSI: 00007fff77d8c3f0 RDI: 000000000000000c
[11292.303616] RBP: 0000560645dc5d50 R08: 0000000000000000 R09: 00005606460bf600
[11292.305154] R10: 00005606460bf600 R11: 0000000000000293 R12: 0000560645dcbb40
[11292.306622] R13: 0000560645dcbb00 R14: 00007fff77d8b840 R15: 0000000000000001
[11292.308017] Code: 55 48 89 e5 41 55 41 54 49 89 fc 53 0f 1f 44 00 00 f0 41 ff 44 24 18 41 f6 44 24 1e 20 0f 84 c9 00 00 00 49 8b 9c 24 60 09 00 00 <f0> 80 0b 02 4c 89 e7 e8 44 ff ff ff 4c 89 e7 e8 bc b5 00 00 48
[11292.309494] RIP: kthread_stop+0x30/0x110 RSP: ffffbcb581a575f8
[11292.310864] CR2: 00007f71eba4bb90
[11292.324601] ---[ end trace 582ceb2f8a45c9ae ]---

Revision history for this message
pureblood (freeseek) wrote :
Revision history for this message
Ubuntu Foundations Team Bug Bot (crichton) wrote :

Thank you for taking the time to report this bug and helping to make Ubuntu better. It seems that your bug report is not filed about a specific source package though, rather it is just filed against Ubuntu in general. It is important that bug reports be filed about source packages so that people interested in the package can find the bugs about it. You can find some hints about determining what package your bug might be about at https://wiki.ubuntu.com/Bugs/FindRightPackage. You might also ask for help in the #ubuntu-bugs irc channel on Freenode.

To change the source package that this bug is filed about visit https://bugs.launchpad.net/ubuntu/+bug/1697027/+editstatus and add the package name in the text box next to the word Package.

[This is an automated message. I apologize if it reached you inappropriately; please just reply to this message indicating so.]

tags: added: bot-comment
affects: ubuntu → linux (Ubuntu)
Revision history for this message
Joseph Salisbury (jsalisbury) wrote :

Did this issue start happening after an update/upgrade? Was there a prior kernel version where you were not having this particular problem?

Would it be possible for you to test the latest upstream kernel? Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest v4.12 kernel[0].

If this bug is fixed in the mainline kernel, please add the following tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag: 'kernel-bug-exists-upstream'.

Once testing of the upstream kernel is complete, please mark this bug as "Confirmed".

Thanks in advance.

[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.12-rc4

Revision history for this message
Joseph Salisbury (jsalisbury) wrote : Missing required logs.

This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window:

apport-collect 1697027

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the Ubuntu Kernel Team.

Changed in linux (Ubuntu):
status: New → Incomplete
tags: added: zesty
Revision history for this message
pureblood (freeseek) wrote :

I can confirm that the same issue occurs with kernel 4.12.0-041200rc4-generic and that the issue did not exist with Ubuntu 16.10. I do not know which kernel introduced the issue but immediately after upgrading to Ubuntu 17.04 I started observing the machine occasionally freezing upon resuming from suspend.

I have just installed kernel version 4.12.0-041200rc4-generic and reproduced the bug. To reproduce the bug I usually need to suspend the system about five times. Most of the times suspend/resume does work just fine, and then occasionally it leaves the system in an unrecoverable state. Not sure if a specific state triggers the issue. It seems random to me.

I have attached the dmesg output I obtained with kernel 4.12.0-041200rc4-generic. The issue seems to be exactly the same as with kernel 4.10.0-22-generic.

Once the bug arises, I cannot file the report with apport as the machine is unable to use the network:
$ apport-collect 1697027
ERROR: connecting to Launchpad failed: Unable to find the server at launchpad.net
You can reset the credentials by removing the file /home/genovese/.cache/apport/launchpad.credentials

Is there a way to collect the data with apport into a file and upload it later after rebooting the machine?

Changed in linux (Ubuntu):
status: Incomplete → Confirmed
Revision history for this message
Kai-Heng Feng (kaihengfeng) wrote :

@pureblood

Please file an upstream bug at https://bugzilla.kernel.org

Revision history for this message
pureblood (freeseek) wrote :
Revision history for this message
pureblood (freeseek) wrote :

Many thanks to Miaoqing Pan for writing a patch for this bug:
https://patchwork.kernel.org/patch/9803211/

Changed in linux (Ubuntu):
status: Confirmed → Fix Committed
Revision history for this message
pureblood (freeseek) wrote :
Changed in linux (Ubuntu):
status: Fix Committed → Fix Released
description: updated
Seth Forshee (sforshee)
Changed in linux (Ubuntu):
status: Fix Released → Fix Committed
Changed in linux (Ubuntu Zesty):
status: New → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (24.9 KiB)

This bug was fixed in the package linux - 4.11.0-13.19

---------------
linux (4.11.0-13.19) artful; urgency=low

  * CVE-2017-7533
    - dentry name snapshots

linux (4.11.0-12.18) artful; urgency=low

  * linux: 4.11.0-12.18 -proposed tracker (LP: #1707635)
    - no change rebuild to pick up the new binutils.

  * Adt tests of src:linux time out often on armhf lxc containers (LP: #1705495)
    - [Packaging] tests -- reduce rebuild test to one flavour
    - [Packaging] tests -- reduce rebuild test to one flavour -- use filter

  * [ARM64] config EDAC_GHES=y depends on EDAC_MM_EDAC=y (LP: #1706141)
    - [Config] set EDAC_MM_EDAC=y for ARM64

  * [Hyper-V] hv_netvsc: Exclude non-TCP port numbers from vRSS hashing
    (LP: #1690174)
    - hv_netvsc: Exclude non-TCP port numbers from vRSS hashing

  * ath10k doesn't report full RSSI information (LP: #1706531)
    - ath10k: add per chain RSSI reporting

  * ideapad_laptop don't support v310-14isk (LP: #1705378)
    - platform/x86: ideapad-laptop: Add several models to no_hw_rfkill

  * Ubuntu 16.04.3: Qemu fails on P9 (LP: #1686019)
    - KVM: PPC: Pass kvm* to kvmppc_find_table()
    - KVM: PPC: Use preregistered memory API to access TCE list
    - KVM: PPC: VFIO: Add in-kernel acceleration for VFIO
    - powerpc/powernv/iommu: Add real mode version of iommu_table_ops::exchange()
    - powerpc/iommu/vfio_spapr_tce: Cleanup iommu_table disposal
    - powerpc/vfio_spapr_tce: Add reference counting to iommu_table
    - powerpc/mmu: Add real mode support for IOMMU preregistered memory
    - KVM: PPC: Reserve KVM_CAP_SPAPR_TCE_VFIO capability number
    - KVM: PPC: Book3S HV: Add radix checks in real-mode hypercall handlers

  * hns: ethtool selftest crashes system (LP: #1705712)
    - net/hns:bugfix of ethtool -t phy self_test

  * ThunderX: soft lockup on 4.8+ kernels when running qemu-efi with vhost=on
    (LP: #1673564)
    - KVM: arm/arm64: vgic-v3: Use PREbits to infer the number of ICH_APxRn_EL2
      registers
    - KVM: arm/arm64: vgic-v3: Fix nr_pre_bits bitfield extraction
    - arm64: Add a facility to turn an ESR syndrome into a sysreg encoding
    - KVM: arm/arm64: vgic-v3: Add accessors for the ICH_APxRn_EL2 registers
    - KVM: arm64: Make kvm_condition_valid32() accessible from EL2
    - KVM: arm64: vgic-v3: Add hook to handle guest GICv3 sysreg accesses at EL2
    - KVM: arm64: vgic-v3: Add ICV_BPR1_EL1 handler
    - KVM: arm64: vgic-v3: Add ICV_IGRPEN1_EL1 handler
    - KVM: arm64: vgic-v3: Add ICV_IAR1_EL1 handler
    - KVM: arm64: vgic-v3: Add ICV_EOIR1_EL1 handler
    - KVM: arm64: vgic-v3: Add ICV_AP1Rn_EL1 handler
    - KVM: arm64: vgic-v3: Add ICV_HPPIR1_EL1 handler
    - KVM: arm64: vgic-v3: Enable trapping of Group-1 system registers
    - KVM: arm64: Enable GICv3 Group-1 sysreg trapping via command-line
    - KVM: arm64: vgic-v3: Add ICV_BPR0_EL1 handler
    - KVM: arm64: vgic-v3: Add ICV_IGNREN0_EL1 handler
    - KVM: arm64: vgic-v3: Add misc Group-0 handlers
    - KVM: arm64: vgic-v3: Enable trapping of Group-0 system registers
    - KVM: arm64: Enable GICv3 Group-0 sysreg trapping via command-line
    - arm64: Add MIDR values for Cavium cn83XX SoCs
    - arm64: Add wor...

Changed in linux (Ubuntu):
status: Fix Committed → Fix Released
Revision history for this message
Kleber Sacilotto de Souza (kleber-souza) wrote :

This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-zesty' to 'verification-done-zesty'. If the problem still exists, change the tag 'verification-needed-zesty' to 'verification-failed-zesty'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: verification-needed-zesty
Revision history for this message
Kleber Sacilotto de Souza (kleber-souza) wrote :

Hi @pureblood,

Could you please verify if the zesty kernel currently in -proposed fixes the issue?

Thank you.

Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (8.5 KiB)

This bug was fixed in the package linux - 4.10.0-33.37

---------------
linux (4.10.0-33.37) zesty; urgency=low

  * linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)

  * CVE-2017-1000112
    - Revert "udp: consistently apply ufo or fragmentation"
    - udp: consistently apply ufo or fragmentation

  * CVE-2017-1000111
    - Revert "net-packet: fix race in packet_set_ring on PACKET_RESERVE"
    - packet: fix tp_reserve race in packet_set_ring

  * ThunderX: soft lockup on 4.8+ kernels when running qemu-efi with vhost=on
    (LP: #1673564)
    - irqchip/gic-v3: Add missing system register definitions
    - arm64: KVM: Do not use stack-protector to compile EL2 code
    - KVM: arm/arm64: vgic-v3: Use PREbits to infer the number of ICH_APxRn_EL2
      registers
    - KVM: arm/arm64: vgic-v3: Fix nr_pre_bits bitfield extraction
    - arm64: Add a facility to turn an ESR syndrome into a sysreg encoding
    - KVM: arm/arm64: vgic-v3: Add accessors for the ICH_APxRn_EL2 registers
    - KVM: arm64: Make kvm_condition_valid32() accessible from EL2
    - KVM: arm64: vgic-v3: Add hook to handle guest GICv3 sysreg accesses at EL2
    - KVM: arm64: vgic-v3: Add ICV_BPR1_EL1 handler
    - KVM: arm64: vgic-v3: Add ICV_IGRPEN1_EL1 handler
    - KVM: arm64: vgic-v3: Add ICV_IAR1_EL1 handler
    - KVM: arm64: vgic-v3: Add ICV_EOIR1_EL1 handler
    - KVM: arm64: vgic-v3: Add ICV_AP1Rn_EL1 handler
    - KVM: arm64: vgic-v3: Add ICV_HPPIR1_EL1 handler
    - KVM: arm64: vgic-v3: Enable trapping of Group-1 system registers
    - KVM: arm64: Enable GICv3 Group-1 sysreg trapping via command-line
    - KVM: arm64: vgic-v3: Add ICV_BPR0_EL1 handler
    - KVM: arm64: vgic-v3: Add ICV_IGNREN0_EL1 handler
    - KVM: arm64: vgic-v3: Add misc Group-0 handlers
    - KVM: arm64: vgic-v3: Enable trapping of Group-0 system registers
    - KVM: arm64: Enable GICv3 Group-0 sysreg trapping via command-line
    - arm64: Add MIDR values for Cavium cn83XX SoCs
    - [Config] CONFIG_CAVIUM_ERRATUM_30115=y
    - arm64: Add workaround for Cavium Thunder erratum 30115
    - KVM: arm64: vgic-v3: Add ICV_DIR_EL1 handler
    - KVM: arm64: vgic-v3: Add ICV_RPR_EL1 handler
    - KVM: arm64: vgic-v3: Add ICV_CTLR_EL1 handler
    - KVM: arm64: vgic-v3: Add ICV_PMR_EL1 handler
    - KVM: arm64: Enable GICv3 common sysreg trapping via command-line
    - KVM: arm64: vgic-v3: Log which GICv3 system registers are trapped
    - arm64: KVM: Make unexpected reads from WO registers inject an undef
    - KVM: arm64: Log an error if trapping a read-from-write-only GICv3 access
    - KVM: arm64: Log an error if trapping a write-to-read-only GICv3 access

  * ibmvscsis: Do not send aborted task response (LP: #1689365)
    - target: Fix unknown fabric callback queue-full errors
    - ibmvscsis: Do not send aborted task response
    - ibmvscsis: Clear left-over abort_cmd pointers
    - ibmvscsis: Fix the incorrect req_lim_delta

  * hisi_sas performance improvements (LP: #1708734)
    - scsi: hisi_sas: define hisi_sas_device.device_id as int
    - scsi: hisi_sas: optimise the usage of hisi_hba.lock
    - scsi: hisi_sas: relocate sata_done_v2_hw()
    - scsi: hisi_sas: optimise DMA slot memory

  * hisi_sas...

Read more...

Changed in linux (Ubuntu Zesty):
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.