** Tags removed: verification-needed-jammy-linux-aws
** Tags added: verification-done-jammy-linux-aws
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2033122
Title:
Request backport of xe
For posterity, LTS 5.15 picked up this fix in 5.15.154
** Tags removed: verification-needed-jammy-linux
** Tags added: verification-done-jammy-linux
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.n
I've tested linux/5.15.0-104.114 and it passes my tests. Marking
verification-done-jammy-linux.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2056227
Title:
KVM: arm64: softlockups in
Public bug reported:
[Impact]
Tearing down kvm VMs on arm64 can cause softlockups to appear on console. When
terminating VMs with > 100Gb of memory and 4k pages, the memory unmap times
often exceed 20 seconds, which can trigger the softlockup detector. Portions of
the unmap path also have inter
This specifically affects Jammy and the 5.15 series. I have the
necessary patches prepared and will e-mail those to the kernel team's
mailing list.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.ne
Patches to mailing list here:
https://lists.ubuntu.com/archives/kernel-team/2024-March/149383.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2056227
Title:
KVM: arm64: softlockups
Public bug reported:
I have systems that are regularly hitting a WARN in
trace_event_dyn_put_ref.
The exact message is:
WARNING: CPU: 1 PID: 30309 at kernel/trace/trace_dynevent.c:46
+trace_event_dyn_put_ref+0x15/0x20
With the following stacktrace:
perf_trace_init+0x8f/0xd0
perf_tp_event_ini
apport information
** Tags added: apport-collected focal uec-images
** Description changed:
I have systems that are regularly hitting a WARN in
trace_event_dyn_put_ref.
The exact message is:
WARNING: CPU: 1 PID: 30309 at kernel/trace/trace_dynevent.c:46
+trace_event_dyn_put_ref+0
apport information
** Attachment added: "Lspci-vt.txt"
https://bugs.launchpad.net/bugs/1987232/+attachment/5610809/+files/Lspci-vt.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/19
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1987232/+attachment/5610808/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1987232
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1987232/+attachment/5610812/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1987232/+attachment/5610811/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1987232/+attachment/5610810/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.l
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1987232/+attachment/5610813/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1987232
The fix has also been added to the Stable queue for 5.15 and 5.19 as of
this morning:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-
queue.git/tree/queue-5.19/tracing-perf-fix-double-put-of-trace-event-
when-init-fails.patch
https://git.kernel.org/pub/scm/linux/kernel/git/stable/s
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1987232/+attachment/5610814/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "acpidump.txt"
https://bugs.launchpad.net/bugs/1987232/+attachment/5610815/+files/acpidump.txt
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, whic
Should this also get nominated as affecting Focal? I hit this on the
5.15 kernel that was attached to linux-aws for Focal.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1987232
Title:
Thanks, booted both kernels on i3 instances that reported support for
invariant tsc and had nomigrate set and was able to validate that both
selected the tsc instead of xen as the clocksource.
** Tags removed: verification-needed-jammy-linux verification-needed-lunar-linux
** Tags added: verificat
@Stefan thanks for explaining how the process works. I appreciate your
willingness to take this patch ahead of its arrival in the stable pull
for the Jammy train. One of your updates mentioned TBD on a test. I
have a reproducer in the original cover letter to Steven here, if it
helps:
https://l
I ran the original reproducer on a VM that was running
linux/5.15.0-50.56 and linux/linux/5.15.0-46.49. On the former the
problem did not reproduce, but on the latter it did. Marking this as
verified via testing and setting 'verification-done-jammy'.
** Tags added: verification-done-jammy
--
Y
I've re-run the tests against the proposed kernel and no longer see
these warnings. Thanks for taking the patches to fix this!
** Tags removed: verification-needed-jammy-linux
** Tags added: verification-done-jammy-linux
--
You received this bug notification because you are a member of Kernel
P
Patches sent to kernel team's list:
https://lists.ubuntu.com/archives/kernel-team/2025-March/157856.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2101120
Title:
mptcp BUG 'schedul
Public bug reported:
[Impact]
If mptcp endpoints are configured on a host using an address that is
external to the host, then the kernel will create an implicit endpoint
with the host's local address when mptcp receives its first flow. If
multiple packets for these local interfaces arrive in par
I have a patch for this accepted upstream that I'll send to the Ubuntu
kernel team in short order. This has been merged to Linus's tree but
has yet to be picked up by Stable. It's tagged to go there, it just
hasn't been picked up by the robots yet. It affects all releases from
5.17 onward, which
Patches sent to list: https://lists.ubuntu.com/archives/kernel-
team/2025-March/158376.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2104210
Title:
uprobe-related panics during pro
Public bug reported:
Impact]
On systems that utilize both uprobes and perf_events style profiling, it
is possible to hit a panic in the uprobe_free_utask code. This occurs
during process exit. If the profiler fires while uprobe_free_utask is
in the process of cleaning up the utask, the NMI may
27 matches
Mail list logo