[Kernel-packages] [Bug 1873641] Re: pulseaudio says: ALSA woke us up to write new data to the device, but there was actually nothing to write.

2021-04-14 Thread Christian Castelli
Also got the same error in journalctl:

---
● pulseaudio.service - Sound Service
 Loaded: loaded (/usr/lib/systemd/user/pulseaudio.service; enabled; vendor 
preset: enabled)
 Active: active (running) since Wed 2021-04-14 06:43:42 CEST; 2h 20min ago
TriggeredBy: ● pulseaudio.socket
   Main PID: 1277 (pulseaudio)
 CGroup: /user.slice/user-1000.slice/user@1000.service/pulseaudio.service
 └─1277 /usr/bin/pulseaudio --daemonize=no --log-target=journal

apr 14 06:43:41 thecastles systemd[1271]: Starting Sound Service...
apr 14 06:43:42 thecastles systemd[1271]: Started Sound Service.
apr 14 08:59:35 thecastles pulseaudio[1277]: ALSA woke us up to write new data 
to the device, but there was actually nothing to write.
apr 14 08:59:35 thecastles pulseaudio[1277]: Most likely this is a bug in the 
ALSA driver 'snd_hda_intel'. Please report this issue to the ALSA developers.
apr 14 08:59:35 thecastles pulseaudio[1277]: We were woken up with POLLOUT set 
-- however a subsequent snd_pcm_avail() returned 0 or another value < min_avail.

---

However, I didn't experience any issue with audio.

Linux 5.8.0-48-generic #54~20.04.1-Ubuntu SMP Sat Mar 20 13:40:25 UTC 2021 
x86_64 x86_64 x86_64 GNU/Linux
Ubuntu 20.04.2

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1873641

Title:
  pulseaudio says: ALSA woke us up to write new data to the device, but
  there was actually nothing to write.

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Apr 19 03:12:37 shh pulseaudio[2107]: ALSA woke us up to write new data to 
the device, but there was actually nothing to write.
  Apr 19 03:12:37 shh pulseaudio[2107]: Most likely this is a bug in the ALSA 
driver 'snd_hda_intel'. Please report this issue to the ALSA developers.
  Apr 19 03:12:37 shh pulseaudio[2107]: We were woken up with POLLOUT set -- 
however a subsequent snd_pcm_avail() returned 0 or another value < min_avail.

  I'm running Ubuntu 20.04 beta, and have just gotten past several crash
  or abort issues in pulseaudio on this Gigabyte AX370-Gaming5
  motherboard.  With tonight's update to:

  Package: pulseaudio
  Architecture: amd64
  Version: 1:13.99.1-1ubuntu3

  and the running kernel:

  Linux shh.toad.com 5.4.0-24-generic #28-Ubuntu SMP Thu Apr 9 22:16:42
  UTC 2020 x86_64 x86_64 x86_64 GNU/Linux

  I got a somg;e report like this in syslog (so far).  Since the
  developers asked me to report it, here's the bug report.

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.4.0-24-generic 5.4.0-24.28
  ProcVersionSignature: Ubuntu 5.4.0-24.28-generic 5.4.30
  Uname: Linux 5.4.0-24-generic x86_64
  ApportVersion: 2.20.11-0ubuntu27
  Architecture: amd64
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Sun Apr 19 03:24:07 2020
  InstallationDate: Installed on 2020-04-17 (1 days ago)
  InstallationMedia: Ubuntu 20.04 LTS "Focal Fossa" - Beta amd64 (20200402)
  IwConfig:
   enp6s0no wireless extensions.
   
   enp5s0no wireless extensions.
   
   lono wireless extensions.
  MachineType: Gigabyte Technology Co., Ltd. AX370-Gaming 5
  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 nouveaudrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.4.0-24-generic 
root=UUID=35b84e12-683c-43ea-9b3f-64fae90e1984 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-5.4.0-24-generic N/A
   linux-backports-modules-5.4.0-24-generic  N/A
   linux-firmware1.187
  RfKill:
   
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  WifiSyslog:
   
  dmi.bios.date: 01/16/2019
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: F25
  dmi.board.asset.tag: Default string
  dmi.board.name: AX370-Gaming 5
  dmi.board.vendor: Gigabyte Technology Co., Ltd.
  dmi.board.version: Default string
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrF25:bd01/16/2019:svnGigabyteTechnologyCo.,Ltd.:pnAX370-Gaming5:pvrDefaultstring:rvnGigabyteTechnologyCo.,Ltd.:rnAX370-Gaming5:rvrDefaultstring:cvnDefaultstring:ct3:cvrDefaultstring:
  dmi.product.family: Default string
  dmi.product.name: AX370-Gaming 5
  dmi.product.sku: Default string
  dmi.product.version: Default string
  dmi.sys.vendor: Gigabyte Technology Co., Ltd.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1873641/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1900889] Re: BUG: kernel NULL pointer dereference, address: 0000000000000000

2021-04-14 Thread Christian Castelli
Got the same just a sec ago:

---
apr 14 09:45:02 thecastles kernel: BUG: kernel NULL pointer dereference, 
address: 
apr 14 09:45:02 thecastles kernel: #PF: supervisor read access in kernel mode
apr 14 09:45:02 thecastles kernel: #PF: error_code(0x) - not-present page
apr 14 09:45:02 thecastles kernel: PGD 0 P4D 0 
apr 14 09:45:02 thecastles kernel: Oops:  [#1] SMP NOPTI
apr 14 09:45:02 thecastles kernel: CPU: 1 PID: 24409 Comm: ThreadPoolForeg 
Tainted: G   OE 5.8.0-48-generic #54~20.04.1-Ubuntu
apr 14 09:45:02 thecastles kernel: Hardware name: LENOVO 90JVIX/36EE, BIOS 
O3TKT50A 09/01/2020
apr 14 09:45:02 thecastles kernel: RIP: 0010:unlink_anon_vmas+0x22/0x1b0
apr 14 09:45:02 thecastles kernel: Code: 00 00 00 00 00 0f 1f 00 0f 1f 44 00 00 
55 48 89 e5 41 57 41 56 41 55 4c 8d 6f 78 41 54 53 48 83 ec 08 48 8b 47 78 48 
89 7d d0 <48> 8b 30 49 39 c5 0f 84 5f 01 00 00 4c 8d 70 f0 4c 8d 66 f0 31 db
apr 14 09:45:02 thecastles kernel: RSP: 0018:a29303e0bba8 EFLAGS: 00010292
apr 14 09:45:02 thecastles kernel: RAX:  RBX: 8bd2ada57520 
RCX: 
apr 14 09:45:02 thecastles kernel: RDX: 7f6ec0231000 RSI: 8bd57bb8d3d8 
RDI: 8bd2ada57520
apr 14 09:45:02 thecastles kernel: RBP: a29303e0bbd8 R08: 7f6ec0231000 
R09: 9ca83800
apr 14 09:45:02 thecastles kernel: R10: 8bd3a2289b00 R11: 0001 
R12: 7f6eaf97d000
apr 14 09:45:02 thecastles kernel: R13: 8bd2ada57598 R14:  
R15: 8bd2ada56410
apr 14 09:45:02 thecastles kernel: FS:  7f6ea609f700() 
GS:8bd57ee4() knlGS:
apr 14 09:45:02 thecastles kernel: CS:  0010 DS:  ES:  CR0: 
80050033
apr 14 09:45:02 thecastles kernel: CR2:  CR3: 00020075e000 
CR4: 003406e0
apr 14 09:45:02 thecastles kernel: Call Trace:
apr 14 09:45:02 thecastles kernel:  free_pgtables+0x93/0xf0
apr 14 09:45:02 thecastles kernel:  exit_mmap+0xc7/0x1b0
apr 14 09:45:02 thecastles kernel:  mmput+0x5d/0x130
apr 14 09:45:02 thecastles kernel:  begin_new_exec+0x431/0x9d0
apr 14 09:45:02 thecastles kernel:  load_elf_binary+0x145/0xdc0
apr 14 09:45:02 thecastles kernel:  ? ima_bprm_check+0x89/0xb0
apr 14 09:45:02 thecastles kernel:  exec_binprm+0x134/0x430
apr 14 09:45:02 thecastles kernel:  __do_execve_file.isra.0+0x50d/0x7d0
apr 14 09:45:02 thecastles kernel:  __x64_sys_execve+0x39/0x50
apr 14 09:45:02 thecastles kernel:  do_syscall_64+0x49/0xc0
apr 14 09:45:02 thecastles kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
apr 14 09:45:02 thecastles kernel: RIP: 0033:0x7f6ec03192fb
apr 14 09:45:02 thecastles kernel: Code: Unable to access opcode bytes at RIP 
0x7f6ec03192d1.
apr 14 09:45:02 thecastles kernel: RSP: 002b:7f6ea609dad8 EFLAGS: 0212 
ORIG_RAX: 003b
apr 14 09:45:02 thecastles kernel: RAX: ffda RBX: 09d4dfa88f80 
RCX: 7f6ec03192fb
apr 14 09:45:02 thecastles kernel: RDX: 09d4de902380 RSI: 09d4dfa88f80 
RDI: 7f6ea609dae0
apr 14 09:45:02 thecastles kernel: RBP: 7f6ea609dc20 R08: 0011 
R09: 7f6ea609da26
apr 14 09:45:02 thecastles kernel: R10:  R11: 0212 
R12: 09d4de902380
apr 14 09:45:02 thecastles kernel: R13: 09d4e324a240 R14: 09d4de7fbf4e 
R15: 09d4de7fbf56
apr 14 09:45:02 thecastles kernel: Modules linked in: uas usb_storage 
binfmt_misc xt_nat xt_tcpudp veth xt_conntrack xt_MASQUERADE 
nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter 
iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c 
bpfilter br_netfilter bridge stp llc aufs overlay nls_iso8859_1 
snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi 
uvcvideo snd_usb_audio videobuf2_vmalloc videobuf2_memops snd_usbmidi_lib 
videobuf2_v4l2 snd_hda_intel videobuf2_common snd_intel_dspcfg snd_hda_codec 
videodev snd_hda_core snd_hwdep rtsx_usb_ms memstick edac_mce_amd snd_pcm 
kvm_amd snd_seq_midi snd_seq_midi_event kvm snd_rawmidi snd_seq mc joydev 
input_leds rapl serio_raw wmi_bmof k10temp snd_seq_device snd_timer snd 
snd_rn_pci_acp3x snd_pci_acp3x soundcore ccp mac_hid sch_fq_codel parport_pc 
ppdev lp parport ip_tables x_tables autofs4 rtsx_usb_sdmmc rtsx_usb hid_generic 
usbhid hid amdgpu(OE) iommu_v2 amd_sched(OE) amdttm(OE) crct10dif_pclmul
apr 14 09:45:02 thecastles kernel:  amdkcl(OE) i2c_algo_bit crc32_pclmul 
ghash_clmulni_intel drm_kms_helper aesni_intel syscopyarea crypto_simd 
sysfillrect sysimgblt cryptd fb_sys_fops glue_helper cec rc_core nvme ahci 
psmouse xhci_pci libahci drm i2c_piix4 r8169 nvme_core xhci_pci_renesas realtek 
wmi video
apr 14 09:45:02 thecastles kernel: CR2: 
apr 14 09:45:02 thecastles kernel: ---[ end trace 364e8e925d8f1e4b ]---
apr 14 09:45:02 thecastles kernel: RIP: 0010:unlink_anon_vmas+0x22/0x1b0
apr 14 09:45:02 thecastles kernel: Code: 00 00 00 00 00 0f 1f 00 0f 1f 44 00 00 
55 48 89 e5 41 57