[Kernel-packages] [Bug 1873641] Re: pulseaudio says: ALSA woke us up to write new data to the device, but there was actually nothing to write.
Also got the same error in journalctl: --- ● pulseaudio.service - Sound Service Loaded: loaded (/usr/lib/systemd/user/pulseaudio.service; enabled; vendor preset: enabled) Active: active (running) since Wed 2021-04-14 06:43:42 CEST; 2h 20min ago TriggeredBy: ● pulseaudio.socket Main PID: 1277 (pulseaudio) CGroup: /user.slice/user-1000.slice/user@1000.service/pulseaudio.service └─1277 /usr/bin/pulseaudio --daemonize=no --log-target=journal apr 14 06:43:41 thecastles systemd[1271]: Starting Sound Service... apr 14 06:43:42 thecastles systemd[1271]: Started Sound Service. apr 14 08:59:35 thecastles pulseaudio[1277]: ALSA woke us up to write new data to the device, but there was actually nothing to write. apr 14 08:59:35 thecastles pulseaudio[1277]: Most likely this is a bug in the ALSA driver 'snd_hda_intel'. Please report this issue to the ALSA developers. apr 14 08:59:35 thecastles pulseaudio[1277]: We were woken up with POLLOUT set -- however a subsequent snd_pcm_avail() returned 0 or another value < min_avail. --- However, I didn't experience any issue with audio. Linux 5.8.0-48-generic #54~20.04.1-Ubuntu SMP Sat Mar 20 13:40:25 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux Ubuntu 20.04.2 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1873641 Title: pulseaudio says: ALSA woke us up to write new data to the device, but there was actually nothing to write. Status in linux package in Ubuntu: Confirmed Bug description: Apr 19 03:12:37 shh pulseaudio[2107]: ALSA woke us up to write new data to the device, but there was actually nothing to write. Apr 19 03:12:37 shh pulseaudio[2107]: Most likely this is a bug in the ALSA driver 'snd_hda_intel'. Please report this issue to the ALSA developers. Apr 19 03:12:37 shh pulseaudio[2107]: We were woken up with POLLOUT set -- however a subsequent snd_pcm_avail() returned 0 or another value < min_avail. I'm running Ubuntu 20.04 beta, and have just gotten past several crash or abort issues in pulseaudio on this Gigabyte AX370-Gaming5 motherboard. With tonight's update to: Package: pulseaudio Architecture: amd64 Version: 1:13.99.1-1ubuntu3 and the running kernel: Linux shh.toad.com 5.4.0-24-generic #28-Ubuntu SMP Thu Apr 9 22:16:42 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux I got a somg;e report like this in syslog (so far). Since the developers asked me to report it, here's the bug report. ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: linux-image-5.4.0-24-generic 5.4.0-24.28 ProcVersionSignature: Ubuntu 5.4.0-24.28-generic 5.4.30 Uname: Linux 5.4.0-24-generic x86_64 ApportVersion: 2.20.11-0ubuntu27 Architecture: amd64 CasperMD5CheckResult: skip CurrentDesktop: ubuntu:GNOME Date: Sun Apr 19 03:24:07 2020 InstallationDate: Installed on 2020-04-17 (1 days ago) InstallationMedia: Ubuntu 20.04 LTS "Focal Fossa" - Beta amd64 (20200402) IwConfig: enp6s0no wireless extensions. enp5s0no wireless extensions. lono wireless extensions. MachineType: Gigabyte Technology Co., Ltd. AX370-Gaming 5 ProcEnviron: TERM=xterm-256color PATH=(custom, no user) XDG_RUNTIME_DIR= LANG=en_US.UTF-8 SHELL=/bin/bash ProcFB: 0 nouveaudrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.4.0-24-generic root=UUID=35b84e12-683c-43ea-9b3f-64fae90e1984 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-5.4.0-24-generic N/A linux-backports-modules-5.4.0-24-generic N/A linux-firmware1.187 RfKill: SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) WifiSyslog: dmi.bios.date: 01/16/2019 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: F25 dmi.board.asset.tag: Default string dmi.board.name: AX370-Gaming 5 dmi.board.vendor: Gigabyte Technology Co., Ltd. dmi.board.version: Default string dmi.chassis.asset.tag: Default string dmi.chassis.type: 3 dmi.chassis.vendor: Default string dmi.chassis.version: Default string dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvrF25:bd01/16/2019:svnGigabyteTechnologyCo.,Ltd.:pnAX370-Gaming5:pvrDefaultstring:rvnGigabyteTechnologyCo.,Ltd.:rnAX370-Gaming5:rvrDefaultstring:cvnDefaultstring:ct3:cvrDefaultstring: dmi.product.family: Default string dmi.product.name: AX370-Gaming 5 dmi.product.sku: Default string dmi.product.version: Default string dmi.sys.vendor: Gigabyte Technology Co., Ltd. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1873641/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1900889] Re: BUG: kernel NULL pointer dereference, address: 0000000000000000
Got the same just a sec ago: --- apr 14 09:45:02 thecastles kernel: BUG: kernel NULL pointer dereference, address: apr 14 09:45:02 thecastles kernel: #PF: supervisor read access in kernel mode apr 14 09:45:02 thecastles kernel: #PF: error_code(0x) - not-present page apr 14 09:45:02 thecastles kernel: PGD 0 P4D 0 apr 14 09:45:02 thecastles kernel: Oops: [#1] SMP NOPTI apr 14 09:45:02 thecastles kernel: CPU: 1 PID: 24409 Comm: ThreadPoolForeg Tainted: G OE 5.8.0-48-generic #54~20.04.1-Ubuntu apr 14 09:45:02 thecastles kernel: Hardware name: LENOVO 90JVIX/36EE, BIOS O3TKT50A 09/01/2020 apr 14 09:45:02 thecastles kernel: RIP: 0010:unlink_anon_vmas+0x22/0x1b0 apr 14 09:45:02 thecastles kernel: Code: 00 00 00 00 00 0f 1f 00 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 4c 8d 6f 78 41 54 53 48 83 ec 08 48 8b 47 78 48 89 7d d0 <48> 8b 30 49 39 c5 0f 84 5f 01 00 00 4c 8d 70 f0 4c 8d 66 f0 31 db apr 14 09:45:02 thecastles kernel: RSP: 0018:a29303e0bba8 EFLAGS: 00010292 apr 14 09:45:02 thecastles kernel: RAX: RBX: 8bd2ada57520 RCX: apr 14 09:45:02 thecastles kernel: RDX: 7f6ec0231000 RSI: 8bd57bb8d3d8 RDI: 8bd2ada57520 apr 14 09:45:02 thecastles kernel: RBP: a29303e0bbd8 R08: 7f6ec0231000 R09: 9ca83800 apr 14 09:45:02 thecastles kernel: R10: 8bd3a2289b00 R11: 0001 R12: 7f6eaf97d000 apr 14 09:45:02 thecastles kernel: R13: 8bd2ada57598 R14: R15: 8bd2ada56410 apr 14 09:45:02 thecastles kernel: FS: 7f6ea609f700() GS:8bd57ee4() knlGS: apr 14 09:45:02 thecastles kernel: CS: 0010 DS: ES: CR0: 80050033 apr 14 09:45:02 thecastles kernel: CR2: CR3: 00020075e000 CR4: 003406e0 apr 14 09:45:02 thecastles kernel: Call Trace: apr 14 09:45:02 thecastles kernel: free_pgtables+0x93/0xf0 apr 14 09:45:02 thecastles kernel: exit_mmap+0xc7/0x1b0 apr 14 09:45:02 thecastles kernel: mmput+0x5d/0x130 apr 14 09:45:02 thecastles kernel: begin_new_exec+0x431/0x9d0 apr 14 09:45:02 thecastles kernel: load_elf_binary+0x145/0xdc0 apr 14 09:45:02 thecastles kernel: ? ima_bprm_check+0x89/0xb0 apr 14 09:45:02 thecastles kernel: exec_binprm+0x134/0x430 apr 14 09:45:02 thecastles kernel: __do_execve_file.isra.0+0x50d/0x7d0 apr 14 09:45:02 thecastles kernel: __x64_sys_execve+0x39/0x50 apr 14 09:45:02 thecastles kernel: do_syscall_64+0x49/0xc0 apr 14 09:45:02 thecastles kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9 apr 14 09:45:02 thecastles kernel: RIP: 0033:0x7f6ec03192fb apr 14 09:45:02 thecastles kernel: Code: Unable to access opcode bytes at RIP 0x7f6ec03192d1. apr 14 09:45:02 thecastles kernel: RSP: 002b:7f6ea609dad8 EFLAGS: 0212 ORIG_RAX: 003b apr 14 09:45:02 thecastles kernel: RAX: ffda RBX: 09d4dfa88f80 RCX: 7f6ec03192fb apr 14 09:45:02 thecastles kernel: RDX: 09d4de902380 RSI: 09d4dfa88f80 RDI: 7f6ea609dae0 apr 14 09:45:02 thecastles kernel: RBP: 7f6ea609dc20 R08: 0011 R09: 7f6ea609da26 apr 14 09:45:02 thecastles kernel: R10: R11: 0212 R12: 09d4de902380 apr 14 09:45:02 thecastles kernel: R13: 09d4e324a240 R14: 09d4de7fbf4e R15: 09d4de7fbf56 apr 14 09:45:02 thecastles kernel: Modules linked in: uas usb_storage binfmt_misc xt_nat xt_tcpudp veth xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c bpfilter br_netfilter bridge stp llc aufs overlay nls_iso8859_1 snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi uvcvideo snd_usb_audio videobuf2_vmalloc videobuf2_memops snd_usbmidi_lib videobuf2_v4l2 snd_hda_intel videobuf2_common snd_intel_dspcfg snd_hda_codec videodev snd_hda_core snd_hwdep rtsx_usb_ms memstick edac_mce_amd snd_pcm kvm_amd snd_seq_midi snd_seq_midi_event kvm snd_rawmidi snd_seq mc joydev input_leds rapl serio_raw wmi_bmof k10temp snd_seq_device snd_timer snd snd_rn_pci_acp3x snd_pci_acp3x soundcore ccp mac_hid sch_fq_codel parport_pc ppdev lp parport ip_tables x_tables autofs4 rtsx_usb_sdmmc rtsx_usb hid_generic usbhid hid amdgpu(OE) iommu_v2 amd_sched(OE) amdttm(OE) crct10dif_pclmul apr 14 09:45:02 thecastles kernel: amdkcl(OE) i2c_algo_bit crc32_pclmul ghash_clmulni_intel drm_kms_helper aesni_intel syscopyarea crypto_simd sysfillrect sysimgblt cryptd fb_sys_fops glue_helper cec rc_core nvme ahci psmouse xhci_pci libahci drm i2c_piix4 r8169 nvme_core xhci_pci_renesas realtek wmi video apr 14 09:45:02 thecastles kernel: CR2: apr 14 09:45:02 thecastles kernel: ---[ end trace 364e8e925d8f1e4b ]--- apr 14 09:45:02 thecastles kernel: RIP: 0010:unlink_anon_vmas+0x22/0x1b0 apr 14 09:45:02 thecastles kernel: Code: 00 00 00 00 00 0f 1f 00 0f 1f 44 00 00 55 48 89 e5 41 57