Thanks to @ecanepa for the thorough analysis. He has identified a potentially
relevant configuration—CONFIG_INTEL_IOMMU_DEFAULT_ON—which may be contributing
to the performance issue. A similar problem has been reported in [1].
We’ve reviewed your environment and confirmed that
CONFIG_INTEL_IOMMU
The situation seems a bit unusual at this point. Perhaps you could try
rebuilding version 6.7.7 using your approach to confirm whether the
issue still persists? Please feel free to share any other thoughts you
may have or let me know if there’s anything I can assist with, @ecanepa.
--
You receive
Public bug reported:
[Impact]
When refresh_cache_worker attempts to refresh DFS referrals, it may access
uninitialized data, leading to a general protection fault caused by a NULL
pointer dereference.
[Fix]
There is an upstream commit that addresses this issue:
>From 41f10081a92a0ed280008218a8
I’ve reviewed the commits between v6.7.6 and v6.7.7 but haven’t found
anything particularly suspicious. From my perspective, it would be
reasonable to bisect the commits between these two versions to identify
the problematic one, and then confirm any related fixes accordingly.
Please let me know i
I would like to share some preliminary findings regarding this issue.
According to the customer's description, the problem persists in mainline
v6.12.16 but appears to be resolved in v6.12.17.
On the Ubuntu side, a noticeable performance degradation has been observed in
kernel version v6.8.0-40.
Jammy, Noble, and Oracular have been successfully verified on Oracle
Cloud, and the UBSAN warning is no longer present.
Jammy: Linux jammy-ipv6-bm 5.15.0-138-generic #148-Ubuntu SMP PREEMPT_DYNAMIC
Fri Mar 14 19:05:48 UTC 2025 x86_64 x86_64 x86_64 GNU/Linux
Noble: Linux noble-ipv6-bm 6.8.0-58-gen
** Also affects: grub2-unsigned (Ubuntu)
Importance: Undecided
Status: New
** Also affects: grub2 (Ubuntu Focal)
Importance: Undecided
Status: New
** Also affects: linux-bluefield (Ubuntu Focal)
Importance: Undecided
Status: New
** Also affects: grub2-unsigned (Ubun
** Changed in: grub2 (Ubuntu Focal)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/2098641
Title:
grub 2.06 prob fat fs fail.
Status in grub2
** Changed in: grub2 (Ubuntu Jammy)
Status: New => In Progress
** Changed in: grub2-unsigned (Ubuntu Jammy)
Status: New => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.l
Debdiff for grub2-unsigned in Jammy
** Patch added: "lp2098641-grub2-unsigned-jammy.debdiff"
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/2098641/+attachment/5860957/+files/lp2098641-grub2-unsigned-jammy.debdiff
--
You received this bug notification because you are a member of Kernel
Debdiff for grub2 in Jammy
** Patch added: "lp2098641-grub2-jammy.debdiff"
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/2098641/+attachment/5860956/+files/lp2098641-grub2-jammy.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, which is subscri
Noble and later versions already include the patch.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/2098641
Title:
FAT filesystem probing fails if a file's timestamp exceeds 203
** Description changed:
[Impact]
If any file's timestamp under `/boot/efi` exceeds 2038, the FAT filesystem
probe will fail, and the system will drop into the GRUB shell.
[Fix]
There is an upstream patch that fixes this issue:
https://git.savannah.gnu.org/cgit/grub.git/commit/grub-c
** Summary changed:
- grub 2.06 prob fat fs fail.
+ FAT filesystem probing fails if a file's timestamp exceeds 2038
** Description changed:
- I found this issue on Ubuntu 22.04.5 LTS, but it's a general issue for
grub-2.06.
- This is my setup information:
- nvme0n1
- ├─nvme0n1p1 v
https://lists.ubuntu.com/archives/kernel-team/2025-February/156928.html
** Changed in: linux (Ubuntu Focal)
Assignee: (unassigned) => Chengen Du (chengendu)
** Changed in: linux (Ubuntu Jammy)
Assignee: (unassigned) => Chengen Du (chengendu)
** Changed in: linux (Ubuntu
Public bug reported:
[Impact]
During an iSCSI boot in an IPv6 environment, `iscsistart` continues to access
the `/sys/firmware/ibft/ethernetX/subnet-mask` entry, despite subnet masks
being irrelevant for IPv6. Since the IPv6 prefix length is 64, this leads to a
negative shift exponent, triggeri
Focal 5.4.0-206.226 was tested using the test plan and confirmed that it
is functioning as expected.
root@focal-iouring:~# uname -a
Linux focal-iouring 5.4.0-206-generic #226-Ubuntu SMP Mon Jan 13 07:29:08 UTC
2025 x86_64 x86_64 x86_64 GNU/Linux
** Tags removed: verification-needed-focal-linux
*
** Description changed:
[Impact]
io_commit_cqring() writes the CQ ring tail to make it visible and also
triggers any deferred work.
When a ring is set up with IOPOLL, it doesn't require locking around the CQ
ring updates.
However, if there is deferred work that needs processing, io_queue
** Description changed:
[Impact]
io_commit_cqring() writes the CQ ring tail to make it visible and also
triggers any deferred work.
When a ring is set up with IOPOLL, it doesn't require locking around the CQ
ring updates.
However, if there is deferred work that needs processing, io_queue
** Changed in: linux (Ubuntu Focal)
Status: New => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2078659
Title:
Hold IOPOLL locks when triggering io_uring's deferred
** Description changed:
[Impact]
io_commit_cqring() writes the CQ ring tail to make it visible and also
triggers any deferred work.
When a ring is set up with IOPOLL, it doesn't require locking around the CQ
ring updates.
However, if there is deferred work that needs processing, io_queue
** Summary changed:
- io_uring: ensure IOPOLL locks around deferred work
+ Hold IOPOLL locks when triggering io_uring's deferred work
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2078659
s any issues, it may lead to a deadlock.
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux (Ubuntu Focal)
Importance: Undecided
Assignee: Chengen Du (chengendu)
Status: New
** Also affects: linux (Ubuntu Focal)
Importance: Unde
Mantic has already included this two commits in #2049202 [1].
c95b65ba744d x86/fpu: Allow caller to constrain xfeatures when copying to
uabi buffer
97cdceb46fb3 KVM: x86: Constrain guest-supported xfeatures only at
KVM_GET_XSAVE{2}
[1] https://bugs.launchpad.net/bugs/2049202
--
You receive
We have backported the following two patches in Jammy and waiting for review:
18164f66e6c5 x86/fpu: Allow caller to constrain xfeatures when copying
to uabi buffer
8647c52e9504 KVM: x86: Constrain guest-supported xfeatures only at
KVM_GET_XSAVE{2}
The fix will also apply to Focal-
** Description changed:
[Impact]
When a host that supports PKRU initiates a guest that lacks PKRU support, the
flag is enabled on the guest's fpstate.
This information is then passed to userspace through the vcpu ioctl
KVM_GET_XSAVE.
However, a problem arises when the user opts to migrat
Both Lunar (6.2.0-41.42) and Mantic (6.5.0-16.16) successfully verified by the
test plan.
root@ubuntu:~# dmesg -wT
[Wed Jan 10 08:28:27 2024] pci :08:00.0: [1af4:1042] type 00 class 0x01
[Wed Jan 10 08:28:27 2024] pci :08:00.0: reg 0x14: [mem
0x-0x0fff]
[Wed Jan 10 08:28:2
The verification of jammy (5.4.0-171.189) was conducted using a custom approach
due to the absence of an InfiniBand environment for testing the patch.
The patch specifically altered the count of mm->mm_users within a function.
To ensure that this modification did not impact the original logic, a k
Both Focal (5.4.0-171.189) and Jammy (5.15.0-93.103) successfully verified by
the test plan.
root@ubuntu:~# dmesg -wT
[Tue Jan 9 03:23:18 2024] pci :08:00.0: [1af4:1042] type 00 class 0x01
[Tue Jan 9 03:23:18 2024] pci :08:00.0: reg 0x14: [mem
0x-0x0fff]
[Tue Jan 9 03:2
Hi Mauricio,
Thank you for your ongoing assistance.
I have revised the patches and would appreciate it if you could take a look.
Please don't hesitate to let me know if there is anything else that needs
correction.
--
You received this bug notification because you are a member of Kernel
Packag
Debdiff for Lunar
** Patch added: "lp2038249-crash-lunar.debdiff"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5736415/+files/lp2038249-crash-lunar.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to cr
Debdiff for Mantic
** Patch added: "lp2038249-crash-mantic.debdiff"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5736416/+files/lp2038249-crash-mantic.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
The merged test plan for reference.
** Attachment added: "crash_test_plan.txt"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5736417/+files/crash_test_plan.txt
** Changed in: crash (Ubuntu Jammy)
Status: Incomplete => In Progress
** Changed in: crash (Ubuntu
Debdiff for Jammy. I have included the structural changes from Linux
kernel 6.5.
** Patch added: "lp2038249-crash-jammy.debdiff"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5736414/+files/lp2038249-crash-jammy.debdiff
--
You received this bug notification because
** Changed in: linux (Ubuntu Focal)
Status: New => In Progress
** Changed in: linux (Ubuntu Jammy)
Status: New => In Progress
** Changed in: linux (Ubuntu Lunar)
Status: New => In Progress
** Changed in: linux (Ubuntu Mantic)
Status: New => In Progress
** Changed in:
** Description changed:
[Impact]
Hot-plugging SCSI disks for QEMU VMs booting with UEFI and using guest
kernels >= 6.5 might be broken.
The inconsistency suggests a potential race condition.
[Fix]
Reverting the two specified commits appears to restore reliability.
==
cc22
** Description changed:
[Impact]
Hot-plugging SCSI disks for QEMU VMs booting with UEFI and using guest
kernels >= 6.5 might be broken.
The inconsistency suggests a potential race condition.
[Fix]
Reverting the two specified commits appears to restore reliability.
==
cc22
Assignee: Chengen Du (chengendu)
Status: New
** Affects: linux (Ubuntu Focal)
Importance: Undecided
Assignee: Chengen Du (chengendu)
Status: New
** Affects: linux (Ubuntu Jammy)
Importance: Undecided
Assignee: Chengen Du (chengendu)
Status: New
**
** Changed in: crash (Ubuntu)
Status: Incomplete => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to crash in Ubuntu.
https://bugs.launchpad.net/bugs/2038249
Title:
The dump file parsing issue arises from structural ch
** Changed in: linux (Ubuntu Focal)
Status: New => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2046534
Title:
Page fault in RDMA ODP triggers BUG_ON during MMU noti
** Also affects: linux (Ubuntu Focal)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Focal)
Assignee: (unassigned) => Chengen Du (chengendu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubu
Public bug reported:
[Impact]
When a page fault is triggered in RDMA ODP, it registers an MMU notifier during
the process.
Unfortunately, an error arises due to a race condition where the mm is released
while attempting to register a notifier.
==
Oct 14 23:38:32 bnode001 kernel: [1576115
This bug only involves a revert to LP#2032164. We are actively working
on finding a comprehensive solution to address the live migration issue.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
The crash patch has been successfully merged upstream. Following the resolution
of this issue, I'll proceed to create a new bug report.
https://github.com/crash-utility/crash/commit/38acd02c7fc09843ffb10fc2d695cccdd10cc7f6
--
You received this bug notification because you are a member of Kernel
Regarding the swapped page read failure issue, I've sent a patch upstream for
review. Visit the link if you're interested:
https://lists.crash-utility.osci.io/archives/list/de...@lists.crash-utility.osci.io/thread/76EA25KPIRKQY5JDFFNYQY2C4CDRLZP2/
--
You received this bug notification because yo
Regarding the swapped page read failure, I've created an upstream PR. If you're
interested, please visit the following link:
https://github.com/crash-utility/crash/pull/159
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to crash in Ubuntu.
Please note that #16 has been tested on Jammy GA. The Jammy HWE uses the
same kernel version and package content as Lunar. Refer to Lunar's test
plan for Jammy HWE testing.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to crash in Ubuntu.
h
Test plan for Lunar
** Attachment added: "crash_lunar_test_plan.txt"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716334/+files/crash_lunar_test_plan.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to cra
Test plan for Jammy HWE
** Attachment added: "crash_jammy_test_plan.txt.txt"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716332/+files/crash_jammy_test_plan.txt.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subsc
debdiff for Jammy HWE
** Patch added: "lp2038249-crash-jammy.debdiff"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716331/+files/lp2038249-crash-jammy.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed t
debdiff for Lunar
** Patch added: "lp2038249-crash-lunar.debdiff"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716333/+files/lp2038249-crash-lunar.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to cr
Test plan for Mantic
** Attachment added: "crash_mantic_test_plan.txt.txt"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716336/+files/crash_mantic_test_plan.txt.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscr
debdiff for Mantic
** Patch added: "lp2038249-crash-mantic.debdiff"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716335/+files/lp2038249-crash-mantic.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
Hi, I'm focusing on resolving all issues caused by structural changes
rather than solely ensuring the crash utility functions across different
kernel versions. The patch set will be extensive and require additional
time for backporting and testing. I'll provide the new patch as soon as
possible.
-
Hi Andreas,
I apologize for the lack of detail.
The 5.15 GA kernel for Jammy has already passed testing. Please see the test
results below.
==
# uname -a
Linux ubuntu 5.15.0-87-generic #97-Ubuntu SMP Tue Oct 3 09:52:42 UTC 2023
aarch64 aarch64 aarch64 GNU/Linux
# apt-cache policy makedum
The package in -proposed has been successfully tested:
1:1.7.0-1ubuntu0.1 in Jammy, 1:1.7.2-1ubuntu0.1 in Lunar
** Tags removed: verification-needed verification-needed-jammy
verification-needed-lunar
** Tags added: verification-done verification-done-jammy verification-done-lunar
--
You receiv
The kernels (5.15.0-88.98) have been tested without any issues.
** Tags removed: verification-needed-jammy-linux
** Tags added: verification-done-jammy-linux
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.la
** Tags removed: verification-needed-jammy-linux-aws
verification-needed-jammy-linux-azure
** Tags added: verification-done-jammy-linux-aws
verification-done-jammy-linux-azure
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubun
debdiff for Lunar
** Patch added: "lp2038248-makedumpfile-lunar.debdiff"
https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/2038248/+attachment/5706208/+files/lp2038248-makedumpfile-lunar.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, whic
debdiff for Mantic
** Patch added: "lp2038249-crash-mantic.debdiff"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5706210/+files/lp2038249-crash-mantic.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
debdiff for Lunar
** Patch added: "lp2038249-crash-lunar.debdiff"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5706209/+files/lp2038249-crash-lunar.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to cr
.
However, it's crucial to note that this change may impact the content of the
dump file, potentially leading to a situation where the "crash" utility is
unable to parse it in the worst-case scenario.
** Affects: makedumpfile (Ubuntu)
Importance: Undecided
Status:
onality of the "crash"
command.
However, please be aware that these patches will alter the parsing logic and
could potentially result in the "crash" utility being unable to parse the dump
file in the worst-case scenario.
** Affects: crash (Ubuntu)
Importance: Unde
** Also affects: linux (Ubuntu Jammy)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Jammy)
Status: New => In Progress
** Changed in: linux (Ubuntu Jammy)
Assignee: (unassigned) => Chengen Du (chengendu)
--
You received this bug notification becau
** Changed in: linux (Ubuntu)
Status: Invalid => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2035166
Title:
NULL Pointer Dereference During KVM MMU Page Invalidatio
** Changed in: linux (Ubuntu Jammy)
Status: Incomplete => In Progress
** Changed in: linux (Ubuntu)
Status: Incomplete => New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2
altered.
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux (Ubuntu Jammy)
Importance: Undecided
Assignee: Chengen Du (chengendu)
Status: New
** Also affects: linux (Ubuntu Jammy)
Importance: Undecided
Status: New
** Chan
The kernels (5.15.0-85.95) have been tested without any issues.
** Tags removed: verification-needed-jammy-linux
** Tags added: verification-done-jammy-linux
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.la
The kernels (5.15.0-85.95/6.2.0-34.34) have been tested without any
issues.
** Tags removed: verification-needed-jammy-linux verification-needed-lunar-linux
** Tags added: verification-done-jammy-linux verification-done-lunar-linux
--
You received this bug notification because you are a member o
** Changed in: linux (Ubuntu)
Status: Incomplete => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020319
Title:
Encountering an issue with memcpy_fromio causing fail
** Changed in: linux (Ubuntu Focal)
Status: New => In Progress
** Changed in: linux (Ubuntu Jammy)
Status: New => In Progress
** Changed in: linux (Ubuntu Focal)
Assignee: (unassigned) => ChengEn, Du (chengendu)
** Changed in: linux (Ubuntu Jammy)
Assignee: (u
** Also affects: linux (Ubuntu Jammy)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Focal)
Importance: Undecided
Status: New
--
You received this bug notification because yo
ux (Ubuntu)
Importance: Undecided
Assignee: ChengEn, Du (chengendu)
Status: Incomplete
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => ChengEn, Du (chengendu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to li
** Tags removed: verification-needed-jammy
** Tags added: verification-done-jammy
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2008971
Title:
Do not sort the task scan result from /pro
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2008971
Title:
Do not sort the task scan result from /pro
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/2009325
Title:
NFS deathlock with last Kernel 5.4.0-1
The NFS patchset did resolve the issue our user encountered, but unfortunately
introduced some performance overhead that may have significant impacts in
certain scenarios.
We wanted to let you know that we have submitted a patch
(https://patchwork.kernel.org/project/linux-nfs/patch/2023041103024
** Tags removed: verification-needed-jammy
** Tags added: verification-done-jammy
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2008971
Title:
Do not sort the task scan result from /pro
The SRU targeted on Jammy only and doesn't need to be tested in Focal.
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchp
Hi @krglosse,
We have opened a bug to address the performance issue related to NFS.
You can find more details about the bug at this link:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2015827.
We have also sent a proposal to upstream for their consideration, but
unfortunately, we have no
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => ChengEn, Du (chengendu)
** Changed in: linux (Ubuntu)
Status: Incomplete => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
ally leading to performance
degradation.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: ChengEn, Du (chengendu)
Status: In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.
I would like to begin by expressing my sincere appreciation for your invaluable
assistance in identifying the performance issue and presenting us with a clear
reproducer for testing.
Your contributions have been extremely helpful.
We have carefully considered the possibility of reverting the NFS
I apologize for any confusion that may have arisen.
The test kernel 5.15.0-67.74+test20230307b2h2cbb6062f8eb has completely
reverted the new mechanism, resulting in the same behavior as before.
We understand that this can be concerning, and we want to assure you that we
are actively working towar
Hi,
I would like to share my thoughts on the increase in LOOKUP operations, which
may be attributed to a new mechanism introduced in the Linux 6.2-rc3 NFS client
side.
This mechanism clears the access cache as soon as the cache timestamp becomes
older than the user's login time.
Its primary obj
Tested using the same test plan by linux/5.15.0-70.77 and confirmed that
the issue has been resolved.
** Tags removed: verification-needed-jammy
** Tags added: verification-done-jammy
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
** Also affects: linux (Ubuntu Kinetic)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Lunar)
Importance: Undecided
Assignee: ChengEn, Du (chengendu)
Status: Confirmed
A problematic patch has been identified in a bug report, which can lead to
issues.
The bug report can be found at
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2003053.
This patch can affect several kernels, including:
linux/4.15.0-206.217 for bionic
linux/5.4.0-144.161 for focal
linux/5
The issue has been identified in the following bug:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2009325
We have sent a patch upstream
(https://lore.kernel.org/lkml/20230308080327.33906-1-chengen...@canonical.com/T/#u).
The test kernel proves that the issue has been solved by this patch.
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => ChengEn, Du (chengendu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2009325
Title:
NFS deathlock with last Kernel 5.
The first test kernel (5.15.0-67-generic
#74+test20230307b2h2cbb6062f8eb-Ubuntu) merely reverts file access
cache-related commits.
However, the second test kernel (5.15.0-67-generic
#74+test20230308b0h1a13a615ee32-Ubuntu) truly identifies and resolves the
problem.
The file access cache, which
I have sent a patch to fix the upstream error
(https://lkml.org/lkml/2023/3/8/107),
which is intended to resolve the issue of a massive increase in ACCESS
operations.
I have also prepared a test kernel that includes this patch and would
appreciate it if you could use it for testing.
To install
I have prepared a test kernel that reverts the file access cache-related
commits.
Please follow these steps and give it a try:
1. sudo add-apt-repository ppa:chengendu/jammy-nfs-test
2. sudo apt update
3. sudo apt install linux-headers-5.15.0-67-generic
linux-image-unsigned-5.15.0-67-generic lin
If the symptom observed is a massive increase in ACCESS operations,
it is more likely that the root cause is related to file access cache-related
commits.
I will build a test kernel without those commits for testing.
Thanks for your help.
--
You received this bug notification because you are a m
Thank you for bringing this to our attention.
The following commits were made between Ubuntu versions 5.15.0-60.66 and
5.15.0-67.74:
f391395fb6b1: NFS: Fix up a sparse warning
bcf920d0e616: NFS: Judge the file access cache's timestamp in rcu path
2cbb6062f8eb: NFS: Clear the file access cache upo
** Also affects: linux (Ubuntu Jammy)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => ChengEn, Du (chengendu)
** Changed in: linux (Ubuntu Jammy)
Assignee: (unassigned) => ChengEn, Du (chengendu)
** Changed in: linux (
Public bug reported:
[Impact]
The perf tool use scandir() to iterate threads and sort in alphabetical order
when synthesizing PERF_RECORD_ events.
If the process ID is and it has one thread (tid = 1), the thread will
be processed before the process.
It results in PERF_RECORD_FORK events
The focal-proposed kernel has been tested in linux/5.4.0-144.161.
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.ne
I have used the following kernel in -proposed for testing:
linux/4.15.0-206.217 for bionic
linux/5.4.0-144.161 for focal
linux/5.15.0-66.73 for jammy
linux/5.19.0-35.36 for kinetic
The issue no longer exists by testing with the same test plan.
** Tags removed: verification-needed-bionic
ncomplete => In Progress
** Changed in: linux (Ubuntu Lunar)
Status: Incomplete => In Progress
** Changed in: linux (Ubuntu Bionic)
Assignee: (unassigned) => ChengEn, Du (chengendu)
** Changed in: linux (Ubuntu Focal)
Assignee: (unassigned) => ChengEn, Du (chengendu)
1 - 100 of 107 matches
Mail list logo