[Kernel-packages] [Bug 2033122] Re: Request backport of xen timekeeping performance improvements

2023-10-06 Thread Krister Johansen
** Tags removed: verification-needed-jammy-linux-aws ** Tags added: verification-done-jammy-linux-aws -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2033122 Title: Request backport of xe

[Kernel-packages] [Bug 2056227] Re: KVM: arm64: softlockups in stage2_apply_range

2024-04-11 Thread Krister Johansen
For posterity, LTS 5.15 picked up this fix in 5.15.154 ** Tags removed: verification-needed-jammy-linux ** Tags added: verification-done-jammy-linux -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.n

[Kernel-packages] [Bug 2056227] Re: KVM: arm64: softlockups in stage2_apply_range

2024-04-11 Thread Krister Johansen
I've tested linux/5.15.0-104.114 and it passes my tests. Marking verification-done-jammy-linux. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2056227 Title: KVM: arm64: softlockups in

[Kernel-packages] [Bug 2056227] [NEW] KVM: arm64: softlockups in stage2_apply_range

2024-03-05 Thread Krister Johansen
Public bug reported: [Impact] Tearing down kvm VMs on arm64 can cause softlockups to appear on console. When terminating VMs with > 100Gb of memory and 4k pages, the memory unmap times often exceed 20 seconds, which can trigger the softlockup detector. Portions of the unmap path also have inter

[Kernel-packages] [Bug 2056227] Re: KVM: arm64: softlockups in stage2_apply_range

2024-03-05 Thread Krister Johansen
This specifically affects Jammy and the 5.15 series. I have the necessary patches prepared and will e-mail those to the kernel team's mailing list. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.ne

[Kernel-packages] [Bug 2056227] Re: KVM: arm64: softlockups in stage2_apply_range

2024-03-05 Thread Krister Johansen
Patches to mailing list here: https://lists.ubuntu.com/archives/kernel-team/2024-March/149383.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2056227 Title: KVM: arm64: softlockups

[Kernel-packages] [Bug 1987232] [NEW] WARN in trace_event_dyn_put_ref

2022-08-21 Thread Krister Johansen
Public bug reported: I have systems that are regularly hitting a WARN in trace_event_dyn_put_ref. The exact message is: WARNING: CPU: 1 PID: 30309 at kernel/trace/trace_dynevent.c:46 +trace_event_dyn_put_ref+0x15/0x20 With the following stacktrace: perf_trace_init+0x8f/0xd0 perf_tp_event_ini

[Kernel-packages] [Bug 1987232] Re: WARN in trace_event_dyn_put_ref

2022-08-22 Thread Krister Johansen
apport information ** Tags added: apport-collected focal uec-images ** Description changed: I have systems that are regularly hitting a WARN in trace_event_dyn_put_ref. The exact message is: WARNING: CPU: 1 PID: 30309 at kernel/trace/trace_dynevent.c:46 +trace_event_dyn_put_ref+0

[Kernel-packages] [Bug 1987232] Lspci-vt.txt

2022-08-22 Thread Krister Johansen
apport information ** Attachment added: "Lspci-vt.txt" https://bugs.launchpad.net/bugs/1987232/+attachment/5610809/+files/Lspci-vt.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/19

[Kernel-packages] [Bug 1987232] Lspci.txt

2022-08-22 Thread Krister Johansen
apport information ** Attachment added: "Lspci.txt" https://bugs.launchpad.net/bugs/1987232/+attachment/5610808/+files/Lspci.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1987232

[Kernel-packages] [Bug 1987232] ProcModules.txt

2022-08-22 Thread Krister Johansen
apport information ** Attachment added: "ProcModules.txt" https://bugs.launchpad.net/bugs/1987232/+attachment/5610812/+files/ProcModules.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/b

[Kernel-packages] [Bug 1987232] ProcInterrupts.txt

2022-08-22 Thread Krister Johansen
apport information ** Attachment added: "ProcInterrupts.txt" https://bugs.launchpad.net/bugs/1987232/+attachment/5610811/+files/ProcInterrupts.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad

[Kernel-packages] [Bug 1987232] ProcCpuinfoMinimal.txt

2022-08-22 Thread Krister Johansen
apport information ** Attachment added: "ProcCpuinfoMinimal.txt" https://bugs.launchpad.net/bugs/1987232/+attachment/5610810/+files/ProcCpuinfoMinimal.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.l

[Kernel-packages] [Bug 1987232] UdevDb.txt

2022-08-22 Thread Krister Johansen
apport information ** Attachment added: "UdevDb.txt" https://bugs.launchpad.net/bugs/1987232/+attachment/5610813/+files/UdevDb.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1987232

[Kernel-packages] [Bug 1987232] Re: WARN in trace_event_dyn_put_ref

2022-08-22 Thread Krister Johansen
The fix has also been added to the Stable queue for 5.15 and 5.19 as of this morning: https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable- queue.git/tree/queue-5.19/tracing-perf-fix-double-put-of-trace-event- when-init-fails.patch https://git.kernel.org/pub/scm/linux/kernel/git/stable/s

[Kernel-packages] [Bug 1987232] WifiSyslog.txt

2022-08-22 Thread Krister Johansen
apport information ** Attachment added: "WifiSyslog.txt" https://bugs.launchpad.net/bugs/1987232/+attachment/5610814/+files/WifiSyslog.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bug

[Kernel-packages] [Bug 1987232] acpidump.txt

2022-08-22 Thread Krister Johansen
apport information ** Attachment added: "acpidump.txt" https://bugs.launchpad.net/bugs/1987232/+attachment/5610815/+files/acpidump.txt ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Kernel Packages, whic

[Kernel-packages] [Bug 1987232] Re: WARN in trace_event_dyn_put_ref

2022-08-29 Thread Krister Johansen
Should this also get nominated as affecting Focal? I hit this on the 5.15 kernel that was attached to linux-aws for Focal. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1987232 Title:

[Kernel-packages] [Bug 2033122] Re: Request backport of xen timekeeping performance improvements

2023-09-08 Thread Krister Johansen
Thanks, booted both kernels on i3 instances that reported support for invariant tsc and had nomigrate set and was able to validate that both selected the tsc instead of xen as the clocksource. ** Tags removed: verification-needed-jammy-linux verification-needed-lunar-linux ** Tags added: verificat

[Kernel-packages] [Bug 1987232] Re: WARN in trace_event_dyn_put_ref

2022-09-18 Thread Krister Johansen
@Stefan thanks for explaining how the process works. I appreciate your willingness to take this patch ahead of its arrival in the stable pull for the Jammy train. One of your updates mentioned TBD on a test. I have a reproducer in the original cover letter to Steven here, if it helps: https://l

[Kernel-packages] [Bug 1987232] Re: WARN in trace_event_dyn_put_ref

2022-09-22 Thread Krister Johansen
I ran the original reproducer on a VM that was running linux/5.15.0-50.56 and linux/linux/5.15.0-46.49. On the former the problem did not reproduce, but on the latter it did. Marking this as verified via testing and setting 'verification-done-jammy'. ** Tags added: verification-done-jammy -- Y

[Kernel-packages] [Bug 2089373] Re: WARN in trc_wait_for_one_reader about failed IPIs

2025-01-22 Thread Krister Johansen
I've re-run the tests against the proposed kernel and no longer see these warnings. Thanks for taking the patches to fix this! ** Tags removed: verification-needed-jammy-linux ** Tags added: verification-done-jammy-linux -- You received this bug notification because you are a member of Kernel P

[Kernel-packages] [Bug 2101120] Re: mptcp BUG 'scheduling while atomic' in mptcp_pm_nl_append_new_local_addr

2025-03-07 Thread Krister Johansen
Patches sent to kernel team's list: https://lists.ubuntu.com/archives/kernel-team/2025-March/157856.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2101120 Title: mptcp BUG 'schedul

[Kernel-packages] [Bug 2101120] [NEW] mptcp BUG 'scheduling while atomic' in mptcp_pm_nl_append_new_local_addr

2025-03-07 Thread Krister Johansen
Public bug reported: [Impact] If mptcp endpoints are configured on a host using an address that is external to the host, then the kernel will create an implicit endpoint with the host's local address when mptcp receives its first flow. If multiple packets for these local interfaces arrive in par

[Kernel-packages] [Bug 2101120] Re: mptcp BUG 'scheduling while atomic' in mptcp_pm_nl_append_new_local_addr

2025-03-07 Thread Krister Johansen
I have a patch for this accepted upstream that I'll send to the Ubuntu kernel team in short order. This has been merged to Linus's tree but has yet to be picked up by Stable. It's tagged to go there, it just hasn't been picked up by the robots yet. It affects all releases from 5.17 onward, which

[Kernel-packages] [Bug 2104210] Re: uprobe-related panics during profiling

2025-03-25 Thread Krister Johansen
Patches sent to list: https://lists.ubuntu.com/archives/kernel- team/2025-March/158376.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2104210 Title: uprobe-related panics during pro

[Kernel-packages] [Bug 2104210] [NEW] uprobe-related panics during profiling

2025-03-25 Thread Krister Johansen
Public bug reported: Impact] On systems that utilize both uprobes and perf_events style profiling, it is possible to hit a panic in the uprobe_free_utask code. This occurs during process exit. If the profiler fires while uprobe_free_utask is in the process of cleaning up the utask, the NMI may