canonical-ubuntu-qa team mailing list archive
-
canonical-ubuntu-qa team
-
Mailing list archive
-
Message #00082
[Bug 1989258] Re: multiple kernel oops regarding hung tasks delaying boot
This bug was fixed in the package linux - 5.19.0-18.18
---------------
linux (5.19.0-18.18) kinetic; urgency=medium
* kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)
* 5.19.0-17.17: kernel NULL pointer dereference, address: 0000000000000084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for full
LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm values
for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple task
security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in an
audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM context
releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert "UBUNTU: SAUCE: fix shutdown unix socket owner conditional check"
- Revert "UBUNTU: SAUCE: apparmor: af_unix mediation"
- Revert "UBUNTU: SAUCE: apparmor: patch to provide compatibility with v2.x
net rules"
- Revert "UBUNTU: SAUCE: apparmor: add/use fns to print hash string hex value"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: fix aa_class_names[] to
match reserved classes"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: rework profile->rules to
be a list"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: refactor profile rules
and attachments"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: verify loaded permission
bits masks don't overlap"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: cleanup: move perm
accumulation into perms.h"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: make sure perm indexes
are accumulated"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: verify permission table
indexes"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: add the ability for
policy to specify a permission table"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: make unpack_array return
a trianary value"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: group dfa policydb
unpacking"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: make transition table
unpack generic so it can be reused"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: add user mode flag"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: add mediation class
information to auditing"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: extend permissions to
support a label and tag string"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: isolate policy backwards
compatibility to its own file"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: extend xindex size"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: move dfa perm macros
into policy_unpack"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: extend policydb
permission set by making use of the xbits"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: fix apparmor mediating
locking non-fs unix sockets"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: Fix abi check to include
v8 abi"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: preparse for state being
more than just an integer"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: convert policy lookup to
use accept as an index"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: cleanup shared
permission struct"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: convert xmatch lookup to
use accept as an index"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: convert fperm lookup to
use accept as an index"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: convert xmatch to using
the new shared policydb struct"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: combine file_rules and
aa_policydb into a single shared struct"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: compute policydb
permission on profile load"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: convert xmatch to use
aa_perms structure"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: rework and cleanup fperm
computation"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: move fperm computation
into policy_unpack"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: compute xmatch
permissions on profile load"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: compute file permissions
on profile load"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: expose compression level
limits in sysfs"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: use zstd compression for
profile data"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: reserve mediation
classes"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: fix lockdep warning when
removing a namespace"
- Revert "UBUNTU: SAUCE: apparmor-next 6.1: apparmor: fix a memleak in
multi_transaction_new()"
- Revert "UBUNTU: SAUCE: upstream v6.0: Smack: Provide read control for
io_uring_cmd"
- Revert "UBUNTU: SAUCE: upstream v6.0: selinux: implement the
security_uring_cmd() LSM hook"
- Revert "UBUNTU: SAUCE: upstream v6.0: lsm,io_uring: add LSM hooks for the
new uring_cmd file op"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: correct config reference to
intended one"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: move ptrace mediation to
more logical task.{h,c}"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: extend policydb permission
set by making use of the xbits"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: allow label to carry debug
flags"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: Fix some kernel-doc
comments"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: Mark alloc_unconfined() as
static"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: disable showing the mode as
part of a secid to secctx"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: Convert secid mapping to
XArrays instead of IDR"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: add a kernel label to use on
kernel objects"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: test: Remove some casts
which are no-longer required"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: Fix some kernel-doc
comments"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: Fix undefined reference to
`zlib_deflate_workspacesize'"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: Fix some kernel-doc
comments"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: Fix some kernel-doc
comments"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: Fix match_mnt_path_str() and
match_mnt() kernel-doc comment"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: Use struct_size() helper in
kmalloc()"
- Revert "UBUNTU: SAUCE: upstream v6.0: security/apparmor: remove redundant
ret variable"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: resolve uninitialized symbol
warnings in policy_unpack_test.c"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: don't create raw_sha1
symlink if sha1 hashing is disabled"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: Enable tuning of policy
paranoid load for embedded systems"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: make export of raw binary
profile to userspace optional"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: Update help description of
policy hash for introspection"
- Revert "UBUNTU: SAUCE: upstream v6.0: lsm: Fix kernel-doc"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: Fix kernel-doc"
- Revert "UBUNTU: SAUCE: upstream v6.0: apparmor: fix absroot causing audited
secids to begin with ="
- Revert "Revert "UBUNTU: SAUCE: apparmor: add/use fns to print hash string
hex value""
- Revert "Revert "UBUNTU: SAUCE: apparmor: patch to provide compatibility with
v2.x net rules""
- Revert "Revert "UBUNTU: SAUCE: apparmor: af_unix mediation""
- Revert "Revert "UBUNTU: SAUCE: apparmor: fix use after free in
sk_peer_label""
- Revert "Revert "UBUNTU SAUCE: apparmor: fix apparmor mediating locking non-
fs, unix sockets""
- Revert "Revert "apparmor: fix absroot causing audited secids to begin with
=""
- Revert "Revert "UBUNTU: SAUCE: apparmor: disable showing the mode as part of
a secid to secctx""
- Revert "Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()""
- Revert "Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX()
to aa_sock()""
- Revert "Revert "UBUNTU: SAUCE: LSM: Infrastructure management of the sock
security""
- Revert "Revert "UBUNTU: SAUCE: LSM: Create and manage the lsmblob data
structure.""
- Revert "Revert "UBUNTU: SAUCE: LSM: Use lsmblob in
security_audit_rule_match""
- Revert "Revert "UBUNTU: SAUCE: LSM: Use lsmblob in security_kernel_act_as""
- Revert "Revert "UBUNTU: SAUCE: net: Prepare UDS for security module
stacking""
- Revert "Revert "UBUNTU: SAUCE: LSM: Use lsmblob in
security_secctx_to_secid""
- Revert "Revert "UBUNTU: SAUCE: LSM: Use lsmblob in
security_secid_to_secctx""
- Revert "Revert "UBUNTU: SAUCE: LSM: Use lsmblob in security_ipc_getsecid""
- Revert "Revert "UBUNTU: SAUCE: LSM: Use lsmblob in security_task_getsecid""
- Revert "Revert "UBUNTU: SAUCE: LSM: Use lsmblob in security_inode_getsecid""
- Revert "Revert "UBUNTU: SAUCE: LSM: Use lsmblob in security_cred_getsecid""
- Revert "Revert "UBUNTU: SAUCE: IMA: Change internal interfaces to use
lsmblobs""
- Revert "Revert "UBUNTU: SAUCE: LSM: Specify which LSM to display""
- Revert "Revert "UBUNTU: SAUCE: LSM: Ensure the correct LSM context
releaser""
- Revert "Revert "UBUNTU: SAUCE: LSM: Use lsmcontext in
security_secid_to_secctx""
- Revert "Revert "UBUNTU: SAUCE: LSM: Use lsmcontext in
security_inode_getsecctx""
- Revert "Revert "UBUNTU: SAUCE: LSM: security_secid_to_secctx in netlink
netfilter""
- Revert "Revert "UBUNTU: SAUCE: NET: Store LSM netlabel data in a lsmblob""
- Revert "Revert "UBUNTU: SAUCE: Audit: Add new record for multiple process
LSM attributes""
- Revert "Revert "UBUNTU: SAUCE: Audit: Fix incorrect static inline function
declration.""
- Revert "Revert "UBUNTU: SAUCE: Audit: Add a new record for multiple object
LSM attributes""
- Revert "Revert "UBUNTU: SAUCE: LSM: Add /proc attr entry for full LSM
context""
- Revert "Revert "UBUNTU: SAUCE: AppArmor: Remove the exclusive flag""
- Revert "Revert "UBUNTU: SAUCE: Audit: Fix for missing NULL check""
- Revert "Revert "UBUNTU: SAUCE: apparmor: rename kzfree() to
kfree_sensitive()""
- Revert "Revert "UBUNTU: SAUCE: LSM: change ima_read_file() to use lsmblob""
- Revert "Revert "UBUNTU: SAUCE: LSM: Use lsmblob in smk_netlbl_mls()""
- Revert "Revert "UBUNTU: SAUCE: apparmor: Fix build error, make sk parameter
const""
- Revert "Revert "UBUNTU: SAUCE: LSM: Specify which LSM to display (using
struct cred as input)""
* [22.04 FEAT] Enhanced Interpretation for PCI Functions on s390x - kernel
part (LP: #1853306)
- s390/sclp: detect the zPCI load/store interpretation facility
- s390/sclp: detect the AISII facility
- s390/sclp: detect the AENI facility
- s390/sclp: detect the AISI facility
- s390/airq: pass more TPI info to airq handlers
- s390/airq: allow for airq structure that uses an input vector
- s390/pci: externalize the SIC operation controls and routine
- s390/pci: stash associated GISA designation
- s390/pci: stash dtsm and maxstbl
- vfio/pci: introduce CONFIG_VFIO_PCI_ZDEV_KVM
- KVM: s390: pci: add basic kvm_zdev structure
- KVM: s390: pci: do initial setup for AEN interpretation
- KVM: s390: pci: enable host forwarding of Adapter Event Notifications
- KVM: s390: mechanism to enable guest zPCI Interpretation
- KVM: s390: pci: provide routines for enabling/disabling interrupt forwarding
- KVM: s390: pci: add routines to start/stop interpretive execution
- vfio-pci/zdev: add open/close device hooks
- vfio-pci/zdev: add function handle to clp base capability
- vfio-pci/zdev: different maxstbl for interpreted devices
- KVM: s390: add KVM_S390_ZPCI_OP to manage guest zPCI devices
- MAINTAINERS: additional files related kvm s390 pci passthrough
- Documentation: kvm: extend KVM_S390_ZPCI_OP subheading underline
- KVM: s390: pci: Hook to access KVM lowlevel from VFIO
* [22.10 FEAT] [IO2201] Independent Usage of Secondary Physical Function
(LP: #1959542)
- PCI: Clean up pci_scan_slot()
- PCI: Split out next_ari_fn() from next_fn()
- PCI: Move jailhouse's isolated function handling to pci_scan_slot()
- PCI: Extend isolated function probing to s390
- s390/pci: allow zPCI zbus without a function zero
* AMD ACP 6.2 DMIC support (LP: #1989518)
- ASoC: amd: add Pink Sardine platform ACP IP register header
- ASoC: amd: add Pink Sardine ACP PCI driver
- ASoC: amd: add acp6.2 init/de-init functions
- ASoC: amd: add platform devices for acp6.2 pdm driver and dmic driver
- ASoC: amd: add acp6.2 pdm platform driver
- ASoC: amd: add acp6.2 irq handler
- ASoC: amd: add acp6.2 pdm driver dma ops
- ASoC: amd: add acp6.2 pci driver pm ops
- ASoC: amd: add acp6.2 pdm driver pm ops
- ASoC: amd: enable Pink Sardine acp6.2 drivers build
- ASoC: amd: create platform device for acp6.2 machine driver
- ASoC: amd: add Pink Sardine machine driver using dmic
- ASoC: amd: enable Pink sardine platform machine driver build.
- [Config] Enable audio for AMD PinkSardine
* support independent clock and LED GPIOs for Intel IPU6 platforms
(LP: #1989046)
- SAUCE: platform/x86: int3472: support independent clock and LED GPIOs
* CVE-2022-2978
- SAUCE: fs: fix UAF/GPF bug in nilfs_mdt_destroy
* Miscellaneous Ubuntu changes
- [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS
- SAUCE: Add mdev_set_iommu_device() kABI.
- SAUCE: apparmor: Fix regression in stacking due to label flags
- [Config] update toolchain version
* Miscellaneous upstream changes
- Revert "drm/i915/opregion: check port number bounds for SWSCI display power
state"
-- Andrea Righi <andrea.righi@xxxxxxxxxxxxx> Wed, 21 Sep 2022 16:28:46
+0200
** Changed in: linux (Ubuntu)
Status: Confirmed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-2978
--
You received this bug notification because you are a member of
Canonical's Ubuntu QA, which is subscribed to Auto Package Testing.
https://bugs.launchpad.net/bugs/1989258
Title:
multiple kernel oops regarding hung tasks delaying boot
Status in Auto Package Testing:
Fix Released
Status in linux package in Ubuntu:
Fix Released
Bug description:
Kinetic amd64 instances in the autopkgtest environment are regularly
experiencing a slow boot process due to a hung task timeout which
happens multiple times. The oops appears below:
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.485373] INFO: task systemd-udevd:140 blocked for more than 1208 seconds.
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.487120] Not tainted 5.19.0-15-generic #15-Ubuntu
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.490936] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.492717] task:systemd-udevd state:D stack: 0 pid: 140 ppid: 137 flags:0x00004006
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.494612] Call Trace:
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.495202] <TASK>
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.495727] __schedule+0x23b/0x5c0
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.496559] ? sched_clock_cpu+0x12/0xf0
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.497482] schedule+0x50/0xc0
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.498237] schedule_preempt_disabled+0x15/0x30
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.499306] __mutex_lock.constprop.0+0x4e7/0x760
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.500409] __mutex_lock_slowpath+0x13/0x20
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.501420] mutex_lock+0x36/0x40
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.502211] add_early_randomness+0x1b/0xc0
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.503178] hwrng_register+0x13e/0x1c0
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.504068] virtrng_scan+0x19/0x30 [virtio_rng]
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.505152] virtio_dev_probe+0x1f9/0x2c0
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.506096] really_probe+0x1d1/0x3a0
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.506958] __driver_probe_device+0x11b/0x190
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.507993] driver_probe_device+0x24/0xd0
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.508955] __driver_attach+0xd8/0x200
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.509859] ? __device_attach_driver+0x120/0x120
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.510952] bus_for_each_dev+0x7c/0xc0
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.511846] driver_attach+0x1e/0x30
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.512692] bus_add_driver+0x178/0x220
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.513597] driver_register+0x8f/0xf0
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.514474] ? 0xffffffffc0282000
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.515257] register_virtio_driver+0x20/0x40
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.516277] virtio_rng_driver_init+0x15/0x1000 [virtio_rng]
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.517602] do_one_initcall+0x4a/0x210
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.518498] ? kmem_cache_alloc_trace+0x181/0x300
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.519587] ? do_init_module+0x27/0x200
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.520516] do_init_module+0x50/0x200
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.521403] load_module+0xb60/0xcb0
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.522243] __do_sys_finit_module+0xbd/0x130
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.523255] ? __do_sys_finit_module+0xbd/0x130
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.524312] __x64_sys_finit_module+0x18/0x20
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.525343] do_syscall_64+0x5b/0x80
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.526183] ? syscall_exit_to_user_mode+0x26/0x50
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.527287] ? __x64_sys_mmap+0x33/0x50
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.528180] ? do_syscall_64+0x67/0x80
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.529064] ? exit_to_user_mode_prepare+0x30/0xa0
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.530182] ? syscall_exit_to_user_mode+0x26/0x50
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.531289] ? __x64_sys_newfstatat+0x1c/0x30
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.532310] ? do_syscall_64+0x67/0x80
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.533185] entry_SYSCALL_64_after_hwframe+0x63/0xcd
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.534354] RIP: 0033:0x7f66accbf9fd
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.535191] RSP: 002b:00007ffc83fb0058 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.536912] RAX: ffffffffffffffda RBX: 0000555b12b044d0 RCX: 00007f66accbf9fd
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.538541] RDX: 0000000000000000 RSI: 00007f66ace41458 RDI: 0000000000000005
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.540161] RBP: 00007f66ace41458 R08: 0000000000000000 R09: 0000000000000000
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.541803] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000020000
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.543431] R13: 0000555b12b03e60 R14: 0000000000000000 R15: 0000555b12afff80
Sep 9 22:31:32 bdmurray-test-systemd kernel: [ 1330.545063] </TASK>
This first occurred with at around 2022-08-24 with at least kernel
version 5.19.0-15-generic. But around 2022-09-07 started becoming
much more frequent. I've downgraded the version of systemd to
251.2-2ubuntu2 and that did not cause the oops to go away.
ProblemType: Bug
DistroRelease: Ubuntu 22.10
Package: linux-image-5.19.0-15-generic 5.19.0-15.15
ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
Uname: Linux 5.19.0-15-generic x86_64
AlsaDevices:
total 0
crw-rw---- 1 root audio 116, 1 Sep 9 22:30 seq
crw-rw---- 1 root audio 116, 33 Sep 9 22:30 timer
AplayDevices: Error: [Errno 2] No such file or directory: 'aplay'
ApportVersion: 2.23.0-0ubuntu1
Architecture: amd64
ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord'
AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1:
CRDA: N/A
CasperMD5CheckResult: unknown
Date: Sat Sep 10 15:51:33 2022
Ec2AMI: ami-00009dfb
Ec2AMIManifest: FIXME
Ec2AvailabilityZone: nova
Ec2InstanceType: autopkgtest
Ec2Kernel: unavailable
Ec2Ramdisk: unavailable
IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig'
Lsusb: Bus 001 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Lsusb-t: /: Bus 01.Port 1: Dev 1, Class=root_hub, Driver=uhci_hcd/2p, 12M
MachineType: OpenStack Foundation OpenStack Nova
PciMultimedia:
ProcEnviron:
LC_CTYPE=en_US.UTF-8
TERM=screen.xterm-256color
PATH=(custom, no user)
LANG=C.UTF-8
SHELL=/bin/bash
ProcFB:
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.19.0-15-generic root=UUID=63a35cf8-4d22-4a79-a93d-eb178abc8c07 ro console=ttyS0
RelatedPackageVersions:
linux-restricted-modules-5.19.0-15-generic N/A
linux-backports-modules-5.19.0-15-generic N/A
linux-firmware 20220831.gitd3c92280-0ubuntu1
RfKill: Error: [Errno 2] No such file or directory: 'rfkill'
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 04/01/2014
dmi.bios.release: 0.0
dmi.bios.vendor: SeaBIOS
dmi.bios.version: Ubuntu-1.8.2-1ubuntu1+esm1
dmi.chassis.type: 1
dmi.chassis.vendor: QEMU
dmi.chassis.version: pc-i440fx-xenial
dmi.modalias: dmi:bvnSeaBIOS:bvrUbuntu-1.8.2-1ubuntu1+esm1:bd04/01/2014:br0.0:svnOpenStackFoundation:pnOpenStackNova:pvr13.1.4:cvnQEMU:ct1:cvrpc-i440fx-xenial:sku:
dmi.product.family: Virtual Machine
dmi.product.name: OpenStack Nova
dmi.product.version: 13.1.4
dmi.sys.vendor: OpenStack Foundation
To manage notifications about this bug go to:
https://bugs.launchpad.net/auto-package-testing/+bug/1989258/+subscriptions