Focal 5.4.0-206.226 was tested using the test plan and confirmed that it
is functioning as expected.
root@focal-iouring:~# uname -a
Linux focal-iouring 5.4.0-206-generic #226-Ubuntu SMP Mon Jan 13 07:29:08 UTC
2025 x86_64 x86_64 x86_64 GNU/Linux
** Tags removed: verification-needed-focal-linux
*
** Description changed:
[Impact]
io_commit_cqring() writes the CQ ring tail to make it visible and also
triggers any deferred work.
When a ring is set up with IOPOLL, it doesn't require locking around the CQ
ring updates.
However, if there is deferred work that needs processing, io_queue
** Description changed:
[Impact]
io_commit_cqring() writes the CQ ring tail to make it visible and also
triggers any deferred work.
When a ring is set up with IOPOLL, it doesn't require locking around the CQ
ring updates.
However, if there is deferred work that needs processing, io_queue
** Changed in: linux (Ubuntu Focal)
Status: New => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2078659
Title:
Hold IOPOLL locks when triggering io_uring's deferred
** Description changed:
[Impact]
io_commit_cqring() writes the CQ ring tail to make it visible and also
triggers any deferred work.
When a ring is set up with IOPOLL, it doesn't require locking around the CQ
ring updates.
However, if there is deferred work that needs processing, io_queue
** Summary changed:
- io_uring: ensure IOPOLL locks around deferred work
+ Hold IOPOLL locks when triggering io_uring's deferred work
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2078659
s any issues, it may lead to a deadlock.
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux (Ubuntu Focal)
Importance: Undecided
Assignee: Chengen Du (chengendu)
Status: New
** Also affects: linux (Ubuntu Focal)
Importance: Unde
Mantic has already included this two commits in #2049202 [1].
c95b65ba744d x86/fpu: Allow caller to constrain xfeatures when copying to
uabi buffer
97cdceb46fb3 KVM: x86: Constrain guest-supported xfeatures only at
KVM_GET_XSAVE{2}
[1] https://bugs.launchpad.net/bugs/2049202
--
You receive
We have backported the following two patches in Jammy and waiting for review:
18164f66e6c5 x86/fpu: Allow caller to constrain xfeatures when copying
to uabi buffer
8647c52e9504 KVM: x86: Constrain guest-supported xfeatures only at
KVM_GET_XSAVE{2}
The fix will also apply to Focal-
** Description changed:
[Impact]
When a host that supports PKRU initiates a guest that lacks PKRU support, the
flag is enabled on the guest's fpstate.
This information is then passed to userspace through the vcpu ioctl
KVM_GET_XSAVE.
However, a problem arises when the user opts to migrat
Both Lunar (6.2.0-41.42) and Mantic (6.5.0-16.16) successfully verified by the
test plan.
root@ubuntu:~# dmesg -wT
[Wed Jan 10 08:28:27 2024] pci :08:00.0: [1af4:1042] type 00 class 0x01
[Wed Jan 10 08:28:27 2024] pci :08:00.0: reg 0x14: [mem
0x-0x0fff]
[Wed Jan 10 08:28:2
The verification of jammy (5.4.0-171.189) was conducted using a custom approach
due to the absence of an InfiniBand environment for testing the patch.
The patch specifically altered the count of mm->mm_users within a function.
To ensure that this modification did not impact the original logic, a k
Both Focal (5.4.0-171.189) and Jammy (5.15.0-93.103) successfully verified by
the test plan.
root@ubuntu:~# dmesg -wT
[Tue Jan 9 03:23:18 2024] pci :08:00.0: [1af4:1042] type 00 class 0x01
[Tue Jan 9 03:23:18 2024] pci :08:00.0: reg 0x14: [mem
0x-0x0fff]
[Tue Jan 9 03:2
Hi Mauricio,
Thank you for your ongoing assistance.
I have revised the patches and would appreciate it if you could take a look.
Please don't hesitate to let me know if there is anything else that needs
correction.
--
You received this bug notification because you are a member of Kernel
Packag
Debdiff for Lunar
** Patch added: "lp2038249-crash-lunar.debdiff"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5736415/+files/lp2038249-crash-lunar.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to cr
Debdiff for Mantic
** Patch added: "lp2038249-crash-mantic.debdiff"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5736416/+files/lp2038249-crash-mantic.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
The merged test plan for reference.
** Attachment added: "crash_test_plan.txt"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5736417/+files/crash_test_plan.txt
** Changed in: crash (Ubuntu Jammy)
Status: Incomplete => In Progress
** Changed in: crash (Ubuntu
Debdiff for Jammy. I have included the structural changes from Linux
kernel 6.5.
** Patch added: "lp2038249-crash-jammy.debdiff"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5736414/+files/lp2038249-crash-jammy.debdiff
--
You received this bug notification because
** Changed in: linux (Ubuntu Focal)
Status: New => In Progress
** Changed in: linux (Ubuntu Jammy)
Status: New => In Progress
** Changed in: linux (Ubuntu Lunar)
Status: New => In Progress
** Changed in: linux (Ubuntu Mantic)
Status: New => In Progress
** Changed in:
** Description changed:
[Impact]
Hot-plugging SCSI disks for QEMU VMs booting with UEFI and using guest
kernels >= 6.5 might be broken.
The inconsistency suggests a potential race condition.
[Fix]
Reverting the two specified commits appears to restore reliability.
==
cc22
** Description changed:
[Impact]
Hot-plugging SCSI disks for QEMU VMs booting with UEFI and using guest
kernels >= 6.5 might be broken.
The inconsistency suggests a potential race condition.
[Fix]
Reverting the two specified commits appears to restore reliability.
==
cc22
Assignee: Chengen Du (chengendu)
Status: New
** Affects: linux (Ubuntu Focal)
Importance: Undecided
Assignee: Chengen Du (chengendu)
Status: New
** Affects: linux (Ubuntu Jammy)
Importance: Undecided
Assignee: Chengen Du (chengendu)
Status: New
**
** Changed in: crash (Ubuntu)
Status: Incomplete => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to crash in Ubuntu.
https://bugs.launchpad.net/bugs/2038249
Title:
The dump file parsing issue arises from structural ch
** Changed in: linux (Ubuntu Focal)
Status: New => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2046534
Title:
Page fault in RDMA ODP triggers BUG_ON during MMU noti
** Also affects: linux (Ubuntu Focal)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Focal)
Assignee: (unassigned) => Chengen Du (chengendu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubu
Public bug reported:
[Impact]
When a page fault is triggered in RDMA ODP, it registers an MMU notifier during
the process.
Unfortunately, an error arises due to a race condition where the mm is released
while attempting to register a notifier.
==
Oct 14 23:38:32 bnode001 kernel: [1576115
This bug only involves a revert to LP#2032164. We are actively working
on finding a comprehensive solution to address the live migration issue.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
The crash patch has been successfully merged upstream. Following the resolution
of this issue, I'll proceed to create a new bug report.
https://github.com/crash-utility/crash/commit/38acd02c7fc09843ffb10fc2d695cccdd10cc7f6
--
You received this bug notification because you are a member of Kernel
Regarding the swapped page read failure issue, I've sent a patch upstream for
review. Visit the link if you're interested:
https://lists.crash-utility.osci.io/archives/list/de...@lists.crash-utility.osci.io/thread/76EA25KPIRKQY5JDFFNYQY2C4CDRLZP2/
--
You received this bug notification because yo
Regarding the swapped page read failure, I've created an upstream PR. If you're
interested, please visit the following link:
https://github.com/crash-utility/crash/pull/159
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to crash in Ubuntu.
Please note that #16 has been tested on Jammy GA. The Jammy HWE uses the
same kernel version and package content as Lunar. Refer to Lunar's test
plan for Jammy HWE testing.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to crash in Ubuntu.
h
Test plan for Lunar
** Attachment added: "crash_lunar_test_plan.txt"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716334/+files/crash_lunar_test_plan.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to cra
Test plan for Jammy HWE
** Attachment added: "crash_jammy_test_plan.txt.txt"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716332/+files/crash_jammy_test_plan.txt.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subsc
debdiff for Jammy HWE
** Patch added: "lp2038249-crash-jammy.debdiff"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716331/+files/lp2038249-crash-jammy.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed t
debdiff for Lunar
** Patch added: "lp2038249-crash-lunar.debdiff"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716333/+files/lp2038249-crash-lunar.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to cr
Test plan for Mantic
** Attachment added: "crash_mantic_test_plan.txt.txt"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716336/+files/crash_mantic_test_plan.txt.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscr
debdiff for Mantic
** Patch added: "lp2038249-crash-mantic.debdiff"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5716335/+files/lp2038249-crash-mantic.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
Hi, I'm focusing on resolving all issues caused by structural changes
rather than solely ensuring the crash utility functions across different
kernel versions. The patch set will be extensive and require additional
time for backporting and testing. I'll provide the new patch as soon as
possible.
-
Hi Andreas,
I apologize for the lack of detail.
The 5.15 GA kernel for Jammy has already passed testing. Please see the test
results below.
==
# uname -a
Linux ubuntu 5.15.0-87-generic #97-Ubuntu SMP Tue Oct 3 09:52:42 UTC 2023
aarch64 aarch64 aarch64 GNU/Linux
# apt-cache policy makedum
The package in -proposed has been successfully tested:
1:1.7.0-1ubuntu0.1 in Jammy, 1:1.7.2-1ubuntu0.1 in Lunar
** Tags removed: verification-needed verification-needed-jammy
verification-needed-lunar
** Tags added: verification-done verification-done-jammy verification-done-lunar
--
You receiv
The kernels (5.15.0-88.98) have been tested without any issues.
** Tags removed: verification-needed-jammy-linux
** Tags added: verification-done-jammy-linux
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.la
** Tags removed: verification-needed-jammy-linux-aws
verification-needed-jammy-linux-azure
** Tags added: verification-done-jammy-linux-aws
verification-done-jammy-linux-azure
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubun
debdiff for Lunar
** Patch added: "lp2038248-makedumpfile-lunar.debdiff"
https://bugs.launchpad.net/ubuntu/+source/makedumpfile/+bug/2038248/+attachment/5706208/+files/lp2038248-makedumpfile-lunar.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, whic
debdiff for Mantic
** Patch added: "lp2038249-crash-mantic.debdiff"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5706210/+files/lp2038249-crash-mantic.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
debdiff for Lunar
** Patch added: "lp2038249-crash-lunar.debdiff"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/2038249/+attachment/5706209/+files/lp2038249-crash-lunar.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to cr
.
However, it's crucial to note that this change may impact the content of the
dump file, potentially leading to a situation where the "crash" utility is
unable to parse it in the worst-case scenario.
** Affects: makedumpfile (Ubuntu)
Importance: Undecided
Status:
onality of the "crash"
command.
However, please be aware that these patches will alter the parsing logic and
could potentially result in the "crash" utility being unable to parse the dump
file in the worst-case scenario.
** Affects: crash (Ubuntu)
Importance: Unde
** Also affects: linux (Ubuntu Jammy)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Jammy)
Status: New => In Progress
** Changed in: linux (Ubuntu Jammy)
Assignee: (unassigned) => Chengen Du (chengendu)
--
You received this bug notification becau
** Changed in: linux (Ubuntu)
Status: Invalid => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2035166
Title:
NULL Pointer Dereference During KVM MMU Page Invalidatio
** Changed in: linux (Ubuntu Jammy)
Status: Incomplete => In Progress
** Changed in: linux (Ubuntu)
Status: Incomplete => New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2
altered.
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux (Ubuntu Jammy)
Importance: Undecided
Assignee: Chengen Du (chengendu)
Status: New
** Also affects: linux (Ubuntu Jammy)
Importance: Undecided
Status: New
** Chan
The kernels (5.15.0-85.95) have been tested without any issues.
** Tags removed: verification-needed-jammy-linux
** Tags added: verification-done-jammy-linux
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.la
The kernels (5.15.0-85.95/6.2.0-34.34) have been tested without any
issues.
** Tags removed: verification-needed-jammy-linux verification-needed-lunar-linux
** Tags added: verification-done-jammy-linux verification-done-lunar-linux
--
You received this bug notification because you are a member o
** Changed in: linux (Ubuntu)
Status: Incomplete => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020319
Title:
Encountering an issue with memcpy_fromio causing fail
** Changed in: linux (Ubuntu Focal)
Status: New => In Progress
** Changed in: linux (Ubuntu Jammy)
Status: New => In Progress
** Changed in: linux (Ubuntu Focal)
Assignee: (unassigned) => ChengEn, Du (chengendu)
** Changed in: linux (Ubuntu Jammy)
Assignee: (u
** Also affects: linux (Ubuntu Jammy)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Focal)
Importance: Undecided
Status: New
--
You received this bug notification because yo
ux (Ubuntu)
Importance: Undecided
Assignee: ChengEn, Du (chengendu)
Status: Incomplete
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => ChengEn, Du (chengendu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to li
** Tags removed: verification-needed-jammy
** Tags added: verification-done-jammy
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2008971
Title:
Do not sort the task scan result from /pro
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2008971
Title:
Do not sort the task scan result from /pro
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/2009325
Title:
NFS deathlock with last Kernel 5.4.0-1
The NFS patchset did resolve the issue our user encountered, but unfortunately
introduced some performance overhead that may have significant impacts in
certain scenarios.
We wanted to let you know that we have submitted a patch
(https://patchwork.kernel.org/project/linux-nfs/patch/2023041103024
** Tags removed: verification-needed-jammy
** Tags added: verification-done-jammy
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2008971
Title:
Do not sort the task scan result from /pro
The SRU targeted on Jammy only and doesn't need to be tested in Focal.
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchp
Hi @krglosse,
We have opened a bug to address the performance issue related to NFS.
You can find more details about the bug at this link:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2015827.
We have also sent a proposal to upstream for their consideration, but
unfortunately, we have no
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => ChengEn, Du (chengendu)
** Changed in: linux (Ubuntu)
Status: Incomplete => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
ally leading to performance
degradation.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: ChengEn, Du (chengendu)
Status: In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.
I would like to begin by expressing my sincere appreciation for your invaluable
assistance in identifying the performance issue and presenting us with a clear
reproducer for testing.
Your contributions have been extremely helpful.
We have carefully considered the possibility of reverting the NFS
I apologize for any confusion that may have arisen.
The test kernel 5.15.0-67.74+test20230307b2h2cbb6062f8eb has completely
reverted the new mechanism, resulting in the same behavior as before.
We understand that this can be concerning, and we want to assure you that we
are actively working towar
Hi,
I would like to share my thoughts on the increase in LOOKUP operations, which
may be attributed to a new mechanism introduced in the Linux 6.2-rc3 NFS client
side.
This mechanism clears the access cache as soon as the cache timestamp becomes
older than the user's login time.
Its primary obj
Tested using the same test plan by linux/5.15.0-70.77 and confirmed that
the issue has been resolved.
** Tags removed: verification-needed-jammy
** Tags added: verification-done-jammy
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
** Also affects: linux (Ubuntu Kinetic)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Lunar)
Importance: Undecided
Assignee: ChengEn, Du (chengendu)
Status: Confirmed
A problematic patch has been identified in a bug report, which can lead to
issues.
The bug report can be found at
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2003053.
This patch can affect several kernels, including:
linux/4.15.0-206.217 for bionic
linux/5.4.0-144.161 for focal
linux/5
The issue has been identified in the following bug:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2009325
We have sent a patch upstream
(https://lore.kernel.org/lkml/20230308080327.33906-1-chengen...@canonical.com/T/#u).
The test kernel proves that the issue has been solved by this patch.
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => ChengEn, Du (chengendu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2009325
Title:
NFS deathlock with last Kernel 5.
The first test kernel (5.15.0-67-generic
#74+test20230307b2h2cbb6062f8eb-Ubuntu) merely reverts file access
cache-related commits.
However, the second test kernel (5.15.0-67-generic
#74+test20230308b0h1a13a615ee32-Ubuntu) truly identifies and resolves the
problem.
The file access cache, which
I have sent a patch to fix the upstream error
(https://lkml.org/lkml/2023/3/8/107),
which is intended to resolve the issue of a massive increase in ACCESS
operations.
I have also prepared a test kernel that includes this patch and would
appreciate it if you could use it for testing.
To install
I have prepared a test kernel that reverts the file access cache-related
commits.
Please follow these steps and give it a try:
1. sudo add-apt-repository ppa:chengendu/jammy-nfs-test
2. sudo apt update
3. sudo apt install linux-headers-5.15.0-67-generic
linux-image-unsigned-5.15.0-67-generic lin
If the symptom observed is a massive increase in ACCESS operations,
it is more likely that the root cause is related to file access cache-related
commits.
I will build a test kernel without those commits for testing.
Thanks for your help.
--
You received this bug notification because you are a m
Thank you for bringing this to our attention.
The following commits were made between Ubuntu versions 5.15.0-60.66 and
5.15.0-67.74:
f391395fb6b1: NFS: Fix up a sparse warning
bcf920d0e616: NFS: Judge the file access cache's timestamp in rcu path
2cbb6062f8eb: NFS: Clear the file access cache upo
** Also affects: linux (Ubuntu Jammy)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => ChengEn, Du (chengendu)
** Changed in: linux (Ubuntu Jammy)
Assignee: (unassigned) => ChengEn, Du (chengendu)
** Changed in: linux (
Public bug reported:
[Impact]
The perf tool use scandir() to iterate threads and sort in alphabetical order
when synthesizing PERF_RECORD_ events.
If the process ID is and it has one thread (tid = 1), the thread will
be processed before the process.
It results in PERF_RECORD_FORK events
The focal-proposed kernel has been tested in linux/5.4.0-144.161.
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.ne
I have used the following kernel in -proposed for testing:
linux/4.15.0-206.217 for bionic
linux/5.4.0-144.161 for focal
linux/5.15.0-66.73 for jammy
linux/5.19.0-35.36 for kinetic
The issue no longer exists by testing with the same test plan.
** Tags removed: verification-needed-bionic
ncomplete => In Progress
** Changed in: linux (Ubuntu Lunar)
Status: Incomplete => In Progress
** Changed in: linux (Ubuntu Bionic)
Assignee: (unassigned) => ChengEn, Du (chengendu)
** Changed in: linux (Ubuntu Focal)
Assignee: (unassigned) => ChengEn, Du (chengendu)
Public bug reported:
[Impact]
The NFS client's access cache becomes stale due to the user's group membership
changing on the server after the user has already logged in on the client.
The access cache only expires if either NFS_INO_INVALID_ACCESS flag is on or
timeout (without delegation).
Addin
I have used the linux/4.15.0-195.206 kernel in -proposed for testing.
The issue no longer exists by testing with the same test plan.
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Changed in: linux (Ubuntu)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1991774
Title:
Memory leak while using NFQUEUE to delegate the de
** Changed in: linux (Ubuntu Bionic)
Assignee: (unassigned) => ChengEn, Du (chengendu)
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => ChengEn, Du (chengendu)
** Changed in: linux (Ubuntu)
Status: Incomplete => In Progress
** Changed in: linux (Ubun
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1991774
Title:
Memory leak while using NFQUEUE to delega
** Description changed:
[Impact]
Environment: v4.15.0-177-generic Xenial ESM
Using NFQUEUE to delegate the decision on TCP packets to userspace processes
will cause memory leak.
The symptom is that TCP slab objects will accumulate and eventually cause OOM.
[Fix]
There is a
Public bug reported:
[Impact]
Environment: v4.15.0-177-generic Xenial ESM
Using NFQUEUE to delegate the decision on TCP packets to userspace processes
will cause memory leak.
The symptom is that TCP slab objects will accumulate and eventually cause OOM.
[Fix]
There is a discrepancy between ba
91 matches
Mail list logo