** Attachment added: "block device hierarchy"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1867916/+attachment/5347771/+files/lp1867916.1.out
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchp
Hi Mauricio,
thanks for your support. I have attached the requested information to
the bug. I had to pseudomize some of the logical volume names because
they are considered sensitive, but I did so in a consistent way so the
structure should still be clear.
So that you don’t have to look through a
Public bug reported:
After upgrading from kernel 4.15.0-88 to 4.15.0-91 one of our systems
does not boot any longer. It always crashes during boot with a kernel
panic.
I suspect that this crash might be related to Bcache because this is the
only one of our systems where we use Bcache and the kern
Hi Mauricio,
there is the problem that this tarball contains an awful lot of
sensitive data, some of that personal data that is protected under the
GDPR.
Maybe you could tell me which specific parts / sections you are
interested in, so that I can anonymize and upload them.
Thanks,
Sebastian
--
Hi Mauricio,
I can confirm that your patched kernel fixes the problem for me on
Bionic (kernel 4.15).
Thanks for your help!
-Sebastian
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1867
Hi Mauricio,
I have attached the requested information.
Best regards,
Sebastian
** Attachment added: "lp1867916-queue_block_size.seb"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1867916/+attachment/5379837/+files/lp1867916-queue_block_size.seb
--
You received this bug notification
Hi Mauricio,
according to my Bash history, I used the following two commands to
create the Bcache device:
make-bcache -B -b 524288 -w 524288 -o 8192 /dev/vg0/vg2-backend
make-bcache -C -b 4194304 -w 4096 -o 8192 /dev/vg1/vg2-cache
I think the reason why I used this block size was that the MD RAI
Thank you, Mauricio! I can confirm that your test kernel for Bionic
(4.15.0-110.111+lp1867916.1) fixes the problem for me.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1867916
Title:
R
We don’t have any systems with Xenial any longer, so I can’t test there.
In fact, just this week we decommissioned the Bionic-based system where
I originally discovered this bug, so even there, I can’t test it any
longer.
--
You received this bug notification because you are a member of Kernel
Pa
I think that unlike the bug title and description suggest, this bug is
not limited to IPv6. I am having the same problem with FreeRADIUS when
RADIUS packets are received over IPv4. This problem is fixed by the
Kernel from trusty-proposed, too.
Actually, this problem looks a lot like a regression t
Public bug reported:
I am running the 3.13 series kernel on Ubuntu 14.04 LTS (Trusty Tahr).
A change introduced in version 3.13.0-66.108 of this kernel breaks UDP
sockets under certain circumstances. The effect is that the recvfrom
operation returns with an error, setting errno to EFAULT, even th
*** This bug is a duplicate of bug 1508510 ***
https://bugs.launchpad.net/bugs/1508510
I can confirm that this bug is a duplicate of bug #1508510 and that the
kernel from -proposed fixes the problem.
--
You received this bug notification because you are a member of Kernel
Packages, which is
12 matches
Mail list logo