Hi, Guilherme.
I think you misunderstood and we are in agreement. What I mean by the
first point is that, on Focal, we need to support 5.4 and 5.15. I don't
even think we need to support 5.8 and 5.11 any longer, though 5.13, as
it will still be supported for a while needs supporting. But I also
There are two risks with that plan that we should overcome.
One is testing, such updates should not cause regressions. As of right
now, the small testing that makedumpfile receives is not sufficient and
gives a lot of false negatives. We should be testing that new kernels
are still dumpable (and
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972281
Title:
ext4: limit length to bitmap_maxbytes
To manage
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972740
Title:
Unprivileged users may use PTRACE_SEIZE to set
** Tags removed: verification-needed-impish
** Tags added: verification-done-impish
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972740
Title:
Unprivileged users may use PTRACE_SEIZE to set
** Tags removed: verification-needed-impish
** Tags added: verification-done-impish
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972281
Title:
ext4: limit length to bitmap_maxbytes
To manage
** Tags removed: verification-needed-jammy
** Tags added: verification-done-jammy
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Tags removed: verification-needed-jammy
** Tags added: verification-done-jammy
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Ubuntu Impish)
Status: New => In Progress
** Changed in: linux (Ubuntu Impish)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: linux (Ubuntu Bionic)
Status: New => In Progress
** Changed in: linux (Ubuntu Bionic)
Assignee: (unassigned)
with seccomp.
** Affects: linux (Ubuntu)
Importance: High
Status: Fix Committed
** Affects: linux (Ubuntu Xenial)
Importance: High
Assignee: Thadeu Lima de Souza Cascardo (cascardo)
Status: Triaged
** Affects: linux (Ubuntu Bionic)
Importance: High
Fails with the kernel in -updates, 4.15.0-176.
Works with kernel in -proposed, 4.15.0-177.
ubuntu@bionic:~$ uname -r
4.15.0-177-generic
ubuntu@bionic:~$ sudo modprobe ip6_gre
ubuntu@bionic:~$ unshare -Urn true
ubuntu@bionic:~$ unshare -Urn true
ubuntu@bionic:~$ unshare -Urn true
ubuntu@bionic:~$
ay regress.
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Fix Released
** Affects: linux (Ubuntu Xenial)
Importance: Low
Assignee: Thadeu Lima de Souza Cascardo (cascardo)
Status: In Progress
** Affects: linux (Ubuntu Bionic)
Importance: Low
Assign
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Released
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of
Importance: Medium
Assignee: Thadeu Lima de Souza Cascardo (cascardo)
Status: In Progress
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Bionic)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Bionic)
** Also affects: linux (Ubuntu Jammy)
Importance: Undecided
Status: Incomplete
** Changed in: linux (Ubuntu Jammy)
Status: Incomplete => In Progress
** Changed in: linux (Ubuntu Jammy)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in:
*** This bug is a security vulnerability ***
Public security bug reported:
[Impact]
Branch History Injection is made easier when all indirect calls are funneled
through very few points where the retpolines were. By replacing the retpoline
jumps by indirect calls whenever retpolines are
Does changing the sysctl kernel.unprivileged_bpf_disabled to 0 fix the
issue?
This has been recently changed in all kernels supporting ebpf to default
to 2, even on those kernels that do not support CAP_BPF.
Cascardo.
--
You received this bug notification because you are a member of Ubuntu
** Information type changed from Private Security to Public Security
** Changed in: linux (Ubuntu Xenial)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
80bfeeb9dd6b54ac108c884c792f0fc7d4912bee ("PCI: hv: Do not sleep in
compose_msi_msg()") might fix this issue.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1960059
Title:
linux-4.4 scheduling while
** Patch added: "fix for jammy"
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1877533/+attachment/5563543/+files/kdump-tools_1.6.10ubuntu1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
The build failed on jammy because of a new shellcheck warning, which was
fixed in Debian already. See https://bugs.debian.org/cgi-
bin/bugreport.cgi?bug=1002270.
I have uploaded a merge to a PPA, where it built just fine. I am
attaching the debdiff for that.
Cascardo.
** Bug watch added: Debian
Public bug reported:
[ 11.338145] BUG: scheduling while atomic: systemd-udevd/891/0x0002
[ 11.343832] Modules linked in: edac_core mlx4_core(+) kvm_intel input_leds
kvm irqbypass nf_conntrack_ipv4 serio_raw hv_balloon pci_hyperv i2c_piix4
nf_defrag_ipv4 8250_fintek xt_conntrack joydev
Public bug reported:
[Impact]
When booting a system, lots of error messages regarding bpfilter are observed,
like below. These indicate that the bpfilter user mode helper is exiting after
reading the request message.
[Test case]
Boot a system and do not observe messages like "bpfilter: read
https://lore.kernel.org/all/20211217154410.1228673-1-casca...@canonical.com/
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1950666
Title:
system crash when removing ipmi_msghandler module
To
*** This bug is a security vulnerability ***
Private security bug reported:
[Impact]
adjust_ptr_min_max_vals will allow a pointer arithmetic with any value, but set
the register to a SCALAR, preventing further pointer operations, leading to a
pointer leak, aka, KASLR leak.
[Potential
This debdiff for focal is against the version in impish. Contrary to the
previous version of the debdiff, this one builds fine on focal. The
versioned dependency on debhelper was changed from >= 13 to >= 12, as
debhelper 13 is not currently available on focal.
Cascardo.
** Patch added: "Proper
Notice the debdiff is against the version in impish (-release).
** Patch added: "Fix for hirsute"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/1954815/+attachment/5547608/+files/crash_7.3.0-1ubuntu1~21.04.1.debdiff
--
You received this bug notification because you are a member of
Notice the debdiff is against the version in impish (-release), which is
also the current version in jammy.
** Patch added: "Fix for focal"
https://bugs.launchpad.net/ubuntu/+source/crash/+bug/1954815/+attachment/5547607/+files/crash_7.3.0-1ubuntu1~20.04.1.debdiff
--
You received this bug
Now building on ppa:cascardo/kdump2 for testing.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954815
Title:
Support newer kernels
To manage notifications about this bug go to:
Lima de Souza Cascardo (cascardo)
Status: In Progress
** Affects: crash (Ubuntu Hirsute)
Importance: Medium
Assignee: Thadeu Lima de Souza Cascardo (cascardo)
Status: In Progress
** Affects: crash (Ubuntu Impish)
Importance: Undecided
Status: Fix Released
Status: New
** Changed in: linux (Ubuntu)
Status: New => Invalid
** Changed in: linux (Ubuntu Bionic)
Status: New => In Progress
** Changed in: linux (Ubuntu Bionic)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: linux (Ubun
https://lore.kernel.org/linuxppc-
dev/20211207130557.40566-1-casca...@canonical.com/T/#u
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953366
Title:
spectre_v2 from ubuntu_kernel_selftests ADT
This looks like very similar to the vulnerable case that I changed to
return as skipped. It's possible that the host is doing one mitigation
while the guest is informed of a different mitigation, leading to this
mis-match.
I will take this upstream and see how it goes.
Cascardo.
--
You
focal/linux-ibm has not been updated to the latest focal/master-next
version (5.4.0-92.103), which has the fix.
Cascardo.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1950239
Title:
creat09 from
As this is failing on ADT, it is failing on VMs on an environment we
don't have much control of. This could be caused by host kernel, qemu or
libvirt combinations that will make the guest kernel observe a given
mitigation while it's not really in place.
This test was added after 5.4, so the
There is already documentation about it. For example, from
https://ubuntu.com/server/docs/kernel-crash-dump
"If the dump does not work due to OOM (Out Of Memory) error, then try
increasing the amount of reserved memory by editing
/etc/default/grub.d/kdump-tools.cfg. For example, to reserve 512
This is a debdiff for the proposed solution for kdump-tools, based on
latest version on impish.
** Patch added: "kdump-tools_1.6.9ubuntu1+cascardo1.debdiff"
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1877533/+attachment/5544958/+files/kdump-tools_1.6.9ubuntu1+cascardo1.debdiff
--
You
Aside from the new default crashkernel (or rather, whether to keep the
2G-4G:320M option or simply not setup crashkernel for the 2G-4G case),
how does the new version of kdump-tools on ppa:cascardo/kdump2 work?
To give you an answer, it does upgrade the crashkernel value on
zipl.conf to a new
Maybe this is the case of a missing linux-modules-extra installed?
nls_utf8 module seems to be shipped on linux-modules-extra, and the
missing package would explain the failure.
Cascardo.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Works fine on 5.10.0-1052-oem.
Cascardo.
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1950239
Title:
creat09
Working as expected on 5.4.0-91-generic and 5.10.0-1052-oem.
$ ldattach HCI /dev/tty
ldattach: cannot set line discipline: Operation not permitted
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal
--
You received this bug notification because you are a member
ldattach HCI /dev/tty
That command works on 4.15.0-162, and fails with EPERM on 4.15.0-163.
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
5 tests failed with 4.15.0-162. ALL pass with 4.15.0-163.
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1788578
** Description changed:
+ [Impact]
+ setgid files may be created on setgid directories owned by the directory
+ group by users not belonging to that group. That is restricted to XFS.
+
+ [Fix/Backport]
+ The fix for 5.11 and 5.10 kernels is one simple commit with a minor
+ backport conflict
** Description changed:
+ [Impact]
+ Some uses of kernel_read_file_from_fd may lead to a WARN when the file is
+ not opened for reading.
+
+ The WARNING, however, is not present on earlier kernels, which will return
+ a different error code. The fix, however, has been applied to upstream stable
** Changed in: linux (Ubuntu Hirsute)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu Focal)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu Bionic)
Status: Confirmed => In Progress
** Changed in: linux-oem-5.10 (Ubuntu Focal)
Status:
*** This bug is a duplicate of bug 1950239 ***
https://bugs.launchpad.net/bugs/1950239
Hey, Tim.
This only fails on XFS, now that the test goes through all supported
filesystems. This is being tracked and worked on as a different but, LP:
#1950239.
Marked as duplicate.
Cascardo.
** This
.
Cascardo.
** Changed in: linux (Ubuntu Focal)
Status: New => In Progress
** Changed in: linux (Ubuntu Focal)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: linux (Ubuntu Bionic)
Status: New => In Progress
** Changed in: linux (Ubun
** Changed in: linux (Ubuntu Impish)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: linux (Ubuntu Hirsute)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu Hirsute)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo
** Changed in: linux-oem-5.10 (Ubuntu Bionic)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1950239
Title:
creat09 from ubuntu_ltp_syscalls and cve-2018-13405 from
** Also affects: linux-oem-5.14 (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux-oem-5.14 (Ubuntu Focal)
Status: New => Fix Released
** Changed in: linux-oem-5.14 (Ubuntu Impish)
Status: New => Invalid
** Changed in: linux-oem-5.14 (Ubuntu Hirsute)
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Hirsute)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Focal)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Jammy)
There is the in-disk inode structure that makes it complicated to
backport the fix. Eventually, we would need something like the commit
below in older releases.
542951592c99ff7b15c050954c051dd6dd6c0f97 ("xfs: remove the icdinode
di_uid/di_gid members")
Alternatively, just making sure values
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1950644
Title:
ubuntu_ltp / finit_module02 fails on v4.15 and other kernels
This will require a backport for older kernels as xfs_ialloc was renamed
to xfs_init_new_inode. I am working on it.
Cascardo.
** Changed in: linux (Ubuntu Hirsute)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: linux (Ubuntu Focal)
Assig
From the LTP creat09 test comment:
* This fix is incomplete if file is on xfs filesystem.
*
* Fixed in:
*
* commit 01ea173e103edd5ec41acec65b9261b87e123fc2
* Author: Christoph Hellwig
* Date: Fri Jan 22 16:48:18 2021 -0800
*
* xfs: fix up non-directory creation in SGID directories
I see a very similar issue from comment #36 on 3.13.0-187 and
3.13.0-188.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1748103
Title:
apic test in kvm-unit-test failed with timeout
To manage
Also fails on 3.13.0-187 and 3.13.0-188.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1824289
Title:
ioapic in ubuntu_kvm_unit_tests failed on Trusty
To manage notifications about this bug go to:
Fails on 3.13.0-187 and 3.13.0-188.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1821906
Title:
debug in ubuntu_kvm_unit_test failed on 3.13 / 4.4 (FAIL: single step
emulated instructions)
To
I found this failing on 3.13.0-187 and 3.13.0-188 as well, though after
doing movdqu (write).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1932966
Title:
kvm_unit_tests: emulator test fails on 4.4
Found on trusty/linux 3.13.0-187 and 3.13.0-188.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1821905
Title:
umip in ubuntu_kvm_unit_test failed on T-3.13 / T-4.4
To manage notifications about
: Thadeu Lima de Souza Cascardo (cascardo)
Status: In Progress
** Affects: linux (Ubuntu Bionic)
Importance: Low
Assignee: Thadeu Lima de Souza Cascardo (cascardo)
Status: In Progress
** Affects: linux (Ubuntu Focal)
Importance: Low
Assignee: Thadeu Lima de Souza
** Description changed:
[Impact]
Narrow loads for bpf_perf_event_data is not possible on 32-bit arches.
[Test case]
Run the bpf test_verifier.
[Potential regression]
- Loading sample_period of bpf_perf_event_data may fail.
+ Loading sample_period of bpf_perf_event_data may fail.
Backporting everything necessary would be up to many potential
regressions. That would include support for BPF calls and the change to
make unknown opcode handling more robust.
The former would be commit cc8b0b92a1699bc32f7fec71daa2bfc90de43a4d
"bpf: introduce function calls (function
Hey, Andre.
As we talked, this is applied to 5.4 kernels as well, 5.4.0-90 should
have it.
Can you test that it fixes the problem?
Thanks.
Cascardo.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux (Ubuntu Bionic)
Status: New => In Progress
** Changed in: linux (Ubuntu Bionic)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Description changed:
+ [Impact]
+ Narrow loads for bpf_perf_event_data is not possible on 32-bit
** Description changed:
+ [Impact]
+ When doing MOD by 1 with a immediate/constant divisor on PPC, the JIT will
produce code that returns the dividend, just like a division, instead of 0.
+
+ Both eBPF and cBPF will fail as well when doing such operations.
+
+ [Test case]
+ $ cat bpf-mod1.c
+
** Also affects: linux (Ubuntu Hirsute)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1948351
Title:
ppc64 BPF JIT mod by 1 will not return 0
To manage
** Summary changed:
- linux ADT test_bpf failure with linux/5.4.0-90.101
+ ppc64 BPF JIT mod by 1 will not return 0
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1948351
Title:
ppc64 BPF JIT mod
d in: linux (Ubuntu Bionic)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: linux (Ubuntu Focal)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: linux (Ubuntu Focal)
Importance: Undecided => Medium
** Changed in:
ression]
ACL changes on OCFS2 may stop working properly.
** Affects: linux (Ubuntu)
Importance: Medium
Assignee: Thadeu Lima de Souza Cascardo (cascardo)
Status: In Progress
** Affects: linux (Ubuntu Bionic)
Importance: Medium
Assignee: Thadeu Lima de Souz
[Impact]
bnx2x driver won't add all devices ports/interfaces.
[Test case]
Boot system with bnx2x device and verify all ports/interfaces have been added.
[Potential regression]
bnx2x devices won't be properly probed. Devices won't be added or SR-IOV won't
be correctly supported.
--
You
** Changed in: linux (Ubuntu)
Status: Incomplete => In Progress
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
--
You received this bug notification be
In Progress
** Changed in: linux (Ubuntu Focal)
Status: New => In Progress
** Changed in: linux (Ubuntu Bionic)
Status: New => In Progress
** Changed in: linux (Ubuntu Bionic)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: linux (Ubuntu
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945707
Title:
BCM57800 SRIOV bug causes interfaces to disappear
To
** Also affects: linux (Ubuntu Focal)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Hirsute)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
From glibc:
int
__libc_openat (int fd, const char *file, int oflag, ...)
{
mode_t mode = 0;
if (__OPEN_NEEDS_MODE (oflag))
{
va_list arg;
va_start (arg, oflag);
mode = va_arg (arg, mode_t);
va_end (arg);
}
return SYSCALL_CANCEL (openat, fd, file, oflag,
Sent request upstream:
https://lore.kernel.org/linuxppc-dev/YUpIqytZqpohq4EM@mussarela/T/#u
I will ping some folks for some help there.
Cascardo.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1943960
Title:
s390x BPF JIT vulnerabilities
To manage notifications about this
About this latest comment. So, CPU #0 has crashed at pc =
c00813566eb8, its ctr and r12 match, same as usual, it was called by
__bpf_prog_run_save_cb as the BPF JITed program. Dumping the program
from CPU #0 perspective, it has traps at that address.
It turns out the JIT fills up a whole page
9f:mon> di c00813566000 1000
c00813566000 7fe8 trap
...
c00813566eb8 6000 nop
...
c00813566ec0 7c0802a6 mflrr0
c00813566ec4 f8010010 std r0,16(r1)
c00813566ec8 f821ffa1 stdur1,-96(r1)
c00813566ecc 3d80c000 lis
*** This bug is a duplicate of bug 1909286 ***
https://bugs.launchpad.net/bugs/1909286
I tested that when reuseport_bpf_cpu did not consider the last CPU, the
one that has been hotplugged, it didn't crash. It didn't set affinity to
that CPU, didn't even allocate socket for it.
Then, I
*** This bug is a duplicate of bug 1909286 ***
https://bugs.launchpad.net/bugs/1909286
Krzysztof mentioned that this has been found on 5.14 as well. Using a
system he lent me (huggins), I also tested with the commit that changed
the call to use CTR and it failed as well. But it always failed
Test kernel at:
https://kernel.ubuntu.com/~cascardo/lp1927076_1.tar
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927076
Title:
IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net
I was looking at latest changes since 5.11 to powerpc64 BPF JIT and
found the following commit:
commit 20ccb004bad659c186f9091015a956da220d615d
Author: Naveen N. Rao
Date: Wed Jun 9 14:30:24 2021 +0530
powerpc/bpf: Use bctrl for making function calls
blrl corrupts the link stack.
Hi, Patricia.
Can you clarify if you always need to run the hotplug test before
reuseport_bpf_cpu in order to reproduce? I wonder what is the state that
the hotplug test leaves the system in? How is it being run? The makefile
runs it with the -a option, which in the systems I have available would
While looking for some improvements on cpu-on-off-test.sh, I
investigated the path that is taken on azure. One good tool to debug
these failures is the cpuhp tracing.
echo 1 > /sys/kernel/debug/tracing/events/cpuhp/enable
echo 1 > /sys/kernel/debug/tracing/tracing_on
cat
Hey, @joalif.
Has this been tested with focal 5.4 kernel too?
Thanks.
Cascardo.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1942784
Title:
makedumpfile not properly working on focal with 5.11
Also working on hirsute:focal-linux on the system where it was found:
ubuntu@riccioli:~$ uname -r ; virsh list
5.11.0-34-generic
Id Name State
1bionic running
And also on an oracle bare-metal instance with hirsute:linux-oracle
5.11.0-1017-oracle.
--
You
Working fine also with 5.11 kernel on riccioli with 5.11.0-34-generic on
hirsute.
And also on a bare-metal Oracle instance with 5.11.0-1017-oracle on hirsute.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Sent SIGTERM to all processes
Sent SIGKILL to all processes
Requesting system poweroff
[ 24.054392] reboot: Power down
ubuntu@bionic:~$ sudo poweroff
Connection to 192.168.122.239 closed by remote host.
Connection to 192.168.122.239 closed.
ubuntu@riccioli:~$ cat
Also works fine with focal:linux-oracle-5.11 5.11.0-1017-oracle.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1940107
Title:
libvirtd fails to create VM
To manage notifications about this bug go
Same with bionic:linux-oracle-5.4 5.4.0-1054-oracle.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1940134
Title:
fails to launch linux L2 guests on AMD
To manage notifications about this bug go
Requesting system poweroff
[ 12.137724] reboot: Power down
ubuntu@bionic:~$ sudo poweroff
Connection to 192.168.122.239 closed by remote host.
Connection to 192.168.122.239 closed.
ubuntu@riccioli:~$ uname -r
4.15.0-156-generic
ubuntu@riccioli:~$
** Tags added: verification-done-bionic
--
** Changed in: linux (Ubuntu Hirsute)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1940134
Title:
fails to launch linux L2 guests on AMD
To manage notifications
.
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-hwe-5.8 (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Bionic)
Importance: High
Assignee: Thadeu Lima de Souza Cascardo (cascardo)
Status
Ubuntu Focal)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: linux (Ubuntu Bionic)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
** Changed in: linux (Ubuntu Focal)
Status: New => In Progress
** Changed in: linux
** Summary changed:
- libvirtd failes to create VM
+ libvirtd fails to create VM
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1940107
Title:
libvirtd fails to create VM
To manage notifications
We have identified that upstream commit
00b89fe0197f0c55a045775c11553c0cdb7082fe ("sched: Make the idle task
quack like a per-CPU kthread") causes this, and its revert fixes the
problem.
@smb identified commit a8ea6fc9b089156d9230bfeef964dd9be101a4a9 ("sched:
Stop PF_NO_SETAFFINITY from being
linux (Ubuntu Hirsute)
Importance: Undecided => High
** Changed in: linux (Ubuntu Hirsute)
Assignee: (unassigned) => Thadeu Lima de Souza Cascardo (cascardo)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.l
1 - 100 of 2328 matches
Mail list logo