Performing verification for jammy
I started a i3.8xlarge instance on AWS, and installed 5.15.0-144-generic from
-updates.
$ uname -rv
5.15.0-144-generic #157-Ubuntu SMP Mon Jun 16 07:33:10 UTC 2025
I ran through the reproducer:
$ lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINTS
xvda 202:
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2117395
[Impact]
The below commit was backported to 5.15.181 -stable, and introduced a NULL
pointer dereference in the raid10 subsystem, due to io_acct_set only being
used
in raid 0 and 456, and not 1 or 10.
com
** Summary changed:
- [Regression] kernel 5.15.0-144-generic - discard broken with RAID10
+ raid10: block discard causes a NULL pointer dereference after
5.15.0-144-generic
** Description changed:
- After upgrading to jammy kernel 5.15.0-144-generic we encountered a
- serious regression when t
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2117123
[Impact]
Tracing tools, such as ebpf fentry programs, can be attached to tasks all the
way to very late in do_exit(), and because of this, synchronize_rcu_tasks()
needs to wait for the dying task to finish and
The patch to enable rcutorture kernel module for testing.
** Patch added: "Kernel config changes to enable CONFIG_RCU_TORTURE_TEST"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2117123/+attachment/5890231/+files/0001-UBUNTU-Config-Enable-CONFIG_RCU_TORTURE_TEST.patch
** Description ch
kaller_logs/tree/main/221115_105658_synchronize_rcu
Upstream mailing list submission:
https://lore.kernel.org/lkml/20240217012745.3446231-1-boqun.f...@gmail.com/T/#u
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Fix Released
** Affects: linux (Ubuntu Noble)
Importance: Med
Performing verification for noble.
My user ran 6.8.0-63-generic on an AWS instance, and connected multiple
iSCSI disks, created a raid1 array, copied some data, and then started a check
operation.
They then forcefully disconnected all the iSCSI devices, and the kernel did
not panic.
They are ha
Performing verification for Oracular.
My user ran 6.11.0-29-generic on an AWS instance, and connected multiple
iSCSI disks, created a raid1 array, copied some data, and then started a check
operation.
They then forcefully disconnected all the iSCSI devices, and the kernel did
not panic.
They ar
Fix released plucky 6.14.0-20-generic
** Changed in: linux (Ubuntu Plucky)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2112519
Title:
rai
** Changed in: linux (Ubuntu Noble)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Oracular)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bu
Upstream mailing list discussion:
https://lore.kernel.org/linux-pci/20250611101442.387378-1-hui.w...@canonical.com/T/
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2111521
Title:
nvme n
Submitted to the Kernel Team mailing list:
Cover letter:
https://lists.ubuntu.com/archives/kernel-team/2025-June/160217.html
Patch:
https://lists.ubuntu.com/archives/kernel-team/2025-June/160218.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subs
** Description changed:
+ Subject: raid1: Fix NULL pointer de-reference in process_checks()
+
BugLink: https://bugs.launchpad.net/bugs/2112519
[Impact]
-
+ A null pointer dereference was found in raid1 during failure mode testing.
+ A raid1 array was set up, filled with data and a chec
rtance: Undecided
Status: Fix Released
** Affects: linux (Ubuntu Jammy)
Importance: Undecided
Status: Fix Committed
** Affects: linux (Ubuntu Noble)
Importance: Medium
Assignee: Matthew Ruffell (mruffell)
Status: In Progress
** Affects: linux (Ubuntu Or
** Changed in: linux (Ubuntu Noble)
Status: Won't Fix => Fix Released
** Changed in: linux (Ubuntu Oracular)
Status: Won't Fix => Fix Released
** Changed in: linux (Ubuntu Plucky)
Status: Won't Fix => Fix Released
** Changed in: linux (Ubuntu Questing)
Status: Won't F
Hi Stephane, or anyone else affected,
I have some test packages that contain the fix:
get_cachename_from_process_env((env_probe && (arg->upcall_target ==
UPTARGET_APP || arg->upcall_target == UPTARGET_UNSPECIFIED)) ? arg->pid
: 0);
in the following ppa:
https://launchpad.net/~mruffell/+archive/
Hi Stephane,
I am speaking with Bharath and other cifs-utils developers.
They are suggesting we can fix it with:
get_cachename_from_process_env((env_probe && (arg->upcall_target ==
UPTARGET_APP || arg->upcall_target == UPTARGET_UNSPECIFIED)) ? arg->pid
: 0);
I agree that it should fix the issue
Hi Stephane,
I sincerely apologise for causing this regression. I did try and cover all the
combinations with patched / unpatched kernel and patched / unpatched cifs-utils,
but it seems I missed this one.
It seems I only tested kerberos credential caches in the default locations,
and never hit th
Hi Christopher,
We got 2 ACKs from Senior Kernel Team members:
https://lists.ubuntu.com/archives/kernel-team/2025-May/159729.html
https://lists.ubuntu.com/archives/kernel-team/2025-May/159763.html
This should be accepted into the next SRU cycle.
The next step is for the kernel team to apply the
Performing verification for focal.
This will cover both the kernel and the cifs-utils package. both in
-proposed.
This is going to be long, as we need to test:
* patched kernel, patched cifs-utils
* patched kernel, existing cifs-utils
* existing kernel, patched cifs-utils
I started a fresh focal
Performing verification for jammy.
This will cover both the kernel and the cifs-utils package. both in
-proposed.
This is going to be long, as we need to test:
* patched kernel, patched cifs-utils
* patched kernel, existing cifs-utils
* existing kernel, patched cifs-utils
I started a fresh jammy
Performing verification for noble.
This will cover both the kernel and the cifs-utils package. both in
-proposed.
This is going to be long, as we need to test:
* patched kernel, patched cifs-utils
* patched kernel, existing cifs-utils
* existing kernel, patched cifs-utils
I started a fresh noble
Performing verification for oracular.
This will cover both the kernel and the cifs-utils package. both in
-proposed.
This is going to be long, as we need to test:
* patched kernel, patched cifs-utils
* patched kernel, existing cifs-utils
* existing kernel, patched cifs-utils
I started a fresh Or
We all have felt the frustration of evdi being out of tree for years
now, with constant breakage between the DRM subsystem and the evdi.ko
kernel module.
The best outcome would be to mainline the driver. There's a lot of
history behind it here:
https://github.com/DisplayLink/evdi/issues/25
The s
Hi Christopher,
I have written up a SRU template and submitted the revert to the Ubuntu
Kernel Team mailing list:
Cover letter:
https://lists.ubuntu.com/archives/kernel-team/2025-May/159630.html
Patch:
https://lists.ubuntu.com/archives/kernel-team/2025-May/159631.html
The next step is for the Ke
** Changed in: linux (Ubuntu)
Status: New => Invalid
** Changed in: linux (Ubuntu Jammy)
Status: New => In Progress
** Changed in: linux (Ubuntu Jammy)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Jammy)
Assignee: (unassigned) => Matthew Ruffe
Vinicius Peixoto has submitted the kernel patches for -generic to the
Kernel
Team mailing list:
Cover letter:
https://lists.ubuntu.com/archives/kernel-team/2025-April/159465.html
Patches:
https://lists.ubuntu.com/archives/kernel-team/2025-April/159466.html
https://lists.ubuntu.com/archives/k
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
This is currently in -proposed2 for 5.15.0-1080-gke.
** Changed in: linux-gke (Ubuntu Jammy)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gke in Ubuntu.
https://bugs.launchpad.net/bugs/2103564
Hi Benjamin,
I am actually in the process of getting
commit 961b4b5e86bf56a2e4b567f81682defa5cba957e
From: Chuck Lever
Date: Fri, 26 Jan 2024 12:45:17 -0500
Subject: NFSD: Reset cb_seq_status after NFS4ERR_DELAY
Link:
https://github.com/torvalds/linux/commit/961b4b5e86bf56a2e4b567f81682defa5cba
Also, I am having trouble reproducing the problem. Any chance that you can help
make a testcase?
I made a 5G disk, made a PV, VG and LV, and then made a btrfs filesystem. But
I could never get the udev trigger to actually occur to rename the device
links.
Any ideas?
$ uname -rv
5.15.0-127-generi
** Also affects: linux (Ubuntu Jammy)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2107516
Title:
Ubuntu 22.04 kernel 5.15.0.136 changes /pr
Hi Luca,
The 6.8.0-58-generic and 6.11.0-24-generic kernels have been released to
-updates now. You should be good to go.
Thanks,
Matthew
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/20
Hi Derek,
Yeah, its because its all hardware related. fwupdmgr is all about BIOS /
UEFI updates, firmware updates for your camera etc, and because its all
distro agnostic, managed by LVFS (Linux Vendor Firmware Service) from
https://fwupd.org/, its not included in regular system updates.
Its most
Hi Derek,
This is coming from fwupdmgr, which is a program that checks for
firmware updates for your computer, and also does the UEFI db updates.
You can run:
$ sudo fwupdmgr get-updates
to see the list of things that need updating, and then you can run:
$ sudo fwupdmgr update
to install all
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
ty/CVE-2025-2312
+ https://nvd.nist.gov/vuln/detail/CVE-2025-2312
** Changed in: linux (Ubuntu Focal)
Assignee: Matthew Ruffell (mruffell) => Vinicius Peixoto (vpeixoto)
** Changed in: linux (Ubuntu Jammy)
Assignee: Matthew Ruffell (mruffell) => Vinicius Peixoto (vpeixoto)
** Chang
Performing verification for oracular.
Firstly, I started with 6.11.0-21-generic with the following commit
reverted:
commit ab99a87542f194f28e2364a42afbf9fb48b1c724
Author: Ofir Gal
Date: Fri Jun 7 10:27:44 2024 +0300
Subject: md/md-bitmap: fix writing non bitmap pages
Link:
https://git.kernel.o
Performing verification for noble.
Firstly, I started with 6.8.0-57-generic with the following commit
reverted:
commit ab99a87542f194f28e2364a42afbf9fb48b1c724
Author: Ofir Gal
Date: Fri Jun 7 10:27:44 2024 +0300
Subject: md/md-bitmap: fix writing non bitmap pages
Link:
https://git.kernel.org/p
Hi Luca,
Thanks for testing, and its good to hear that it fixes the problem. The
SRU cycle is expected to complete the week of 14th of April,
https://kernel.ubuntu.com/, give or take a few days if there are any
delays due to late emerging CVEs etc. Soon your systemd CI will be back
to normal.
To
Attached is a debdiff for cifs-utils on oracular
** Patch added: "Debdiff for cifs-utils on oracular"
https://bugs.launchpad.net/ubuntu/oracular/+source/linux/+bug/2099914/+attachment/5868795/+files/lp2099914_oracular.debdiff
--
You received this bug notification because you are a member of
Attached is a debdiff for cifs-utils on jammy
** Patch added: "Debdiff for cifs-utils on jammy"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2099914/+attachment/5868797/+files/lp2099914_jammy.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, w
Attached is a debdiff for cifs-utils on focal
** Patch added: "Debdiff for cifs-utils on Focal"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2099914/+attachment/5868798/+files/lp2099914_focal.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, w
Attached is a debdiff for cifs-utils on noble
** Patch added: "Debdiff for cifs-utils on noble"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2099914/+attachment/5868796/+files/lp2099914_noble.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, w
** Changed in: cifs-utils (Ubuntu Focal)
Importance: Undecided => Medium
** Changed in: cifs-utils (Ubuntu Focal)
Status: New => In Progress
** Changed in: cifs-utils (Ubuntu Focal)
Assignee: (unassigned) => Matthew Ruffell (mruffell)
** Changed in: cifs-utils (Ubu
Fixed in plucky in:
cifs-utils 2:7.2-2
linux 6.14.0-13-generic
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: cifs-utils (Ubuntu Plucky)
Importance: Undecided
Hi Luca,
The Kernel Team has built and placed 6.8.0-58-generic into -proposed, and it
contains the fix for the btrfs qgroup issue.
Would you be able to install it to a test runner and try reproduce the issue,
and let me know if it fixes the issue?
Instructions to Install (On a noble system):
1)
Patches submitted to the Kernel Team Mailing List
Cover Letter:
https://lists.ubuntu.com/archives/kernel-team/2025-March/158128.html
Patch:
https://lists.ubuntu.com/archives/kernel-team/2025-March/158129.html
--
You received this bug notification because you are a member of Kernel
Packages, whic
Status: Fix Released
** Affects: linux (Ubuntu Jammy)
Importance: Medium
Assignee: Matthew Ruffell (mruffell)
Status: In Progress
** Affects: linux (Ubuntu Noble)
Importance: Medium
Assignee: Matthew Ruffell (mruffell)
Status: In Progress
** Tags: st
Hi linuxgeoff,
I can't reproduce unfortunately. I can make a smb v1 server and mount it
just fine on two vms running noble, both with 6.8.0-53-generic.
$ uname -rv
6.8.0-53-generic #55-Ubuntu SMP PREEMPT_DYNAMIC Fri Jan 17 15:37:52 UTC 2025
$ mount -l
//192.168.122.62/sambashare on /home/ubuntu/s
Hi Luca,
The patch has been applied to the noble and oracular git trees:
https://lists.ubuntu.com/archives/kernel-team/2025-February/157339.html
I am still unsure of what SRU cycle it will be a part of, but I will let
you know once there is a kernel in -proposed to verify.
Thanks,
Matthew
--
Hi,
I suggest you try it against 6.14-rc3 mainline, and see if you still
experience the issue.
If you do, I think you should rebase your patch ontop of 6.14-rc3 and
write to the ICE maintainers.
>From your 6.14-rc3 git repo:
$ scripts/get_maintainer.pl drivers/net/ethernet/intel/ice/ice_main.c
*** This bug is a duplicate of bug 2092649 ***
https://bugs.launchpad.net/bugs/2092649
** This bug has been marked a duplicate of bug 2092649
Can't enter passphrase for encrypted disk on splash screen after kernel
updated to 6.8.0-51-generic
--
You received this bug notification because
Hi Luca,
I'm sorry for the delay, it seems the Kernel Team have been extraordinarily busy
recently.
The patch has two acks from Senior Kernel Team members:
https://lists.ubuntu.com/archives/kernel-team/2025-February/156888.html
https://lists.ubuntu.com/archives/kernel-team/2025-February/157217.h
Hold tight, plucky should be moving to 6.13 and then 6.14 shortly after.
The ZFS dkms package should be fixed up then.
You probably use LXD on your system, with the zfs storage backend.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linu
Yeah, looks like power saving states indeed.
If you edit /etc/default/grub and add
"nvme_core.default_ps_max_latency_us=0 pcie_aspm=off pcie_port_pm=off"
after "quiet splash" to GRUB_CMDLINE_LINUX_DEFAULT=, save, then run
"sudo update-grub" and reboot, and leave it overnight, does the problem
go a
*** This bug is a duplicate of bug 2092649 ***
https://bugs.launchpad.net/bugs/2092649
Probably a duplicate of bug 2092649. I haven't had time to look at this,
sorry.
** This bug has been marked a duplicate of bug 2092649
Can't enter passphrase for encrypted disk on splash screen after ker
** Tags added: regression-proposed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2097541
Title:
6.8.0-53-generic test causes session crashes with mic/camera use
Status in linux package
*** This bug is a duplicate of bug 2084046 ***
https://bugs.launchpad.net/bugs/2084046
Will be fixed in 6.8.0-53-generic, hold tight, it will be released
widely soon.
** This bug has been marked a duplicate of bug 2084046
[i915] Phantom "Unknown" display detected on Intel Meteor Lake
--
** Tags added: verification-done-noble-linux
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2084046
Title:
[i915] Phantom "Unknown" display detected on Intel Meteor Lake
Status in Linux
Performing verification for oracular.
I deployed a lab system:
oracular
Sapphire Rapids
Intel(R) Xeon(R) Platinum 8468
with 6.11.0-14-generic from -updates.
Running stress-ng:
$ sudo stress-ng --seq=100 --clone 100 --timeout=60 --metrics
stress-ng: info: [143114] setting to a 1 min, 0 secs
Performing verification for noble.
I deployed a lab system:
24.04 LTS
Sapphire Rapids
Intel(R) Xeon(R) Platinum 8468
with 6.8.0-52-generic from -updates.
Running stress-ng:
$ sudo stress-ng --seq=100 --clone 100 --timeout=60 --metrics
stress-ng: info: [180365] setting to a 1 min, 0 secs run
Hi Ben,
Thanks for trying the test kernel out. Its great to hear that your analysis was
correct, and it was "x86: Increase brk randomness entropy for 64-bit systems"
causing the issues.
I am still deciding what to do.
You see, I came across this mailing list thread:
https://lore.kernel.org/all/
Patches are on Ubuntu Kernel Mailing List
Cover Letter
https://lists.ubuntu.com/archives/kernel-team/2025-January/156684.html
Patches
https://lists.ubuntu.com/archives/kernel-team/2025-January/156685.html
https://lists.ubuntu.com/archives/kernel-team/2025-January/156686.html
https://lists.ubuntu.c
Hi Ben,
I made you a test kernel with the following commit reverted:
ubuntu-jammy-aws: f5be153733b4d3dab31e3660b54660f34ff90584
commit 44c76825d6eefee9eb7ce06c38e1a6632ac7eb7d
Author: Kees Cook
Date: Fri Feb 16 22:25:43 2024 -0800
Subject: x86: Increase brk randomness entropy for 64-bit system
Hi Luca,
The commit has now landed in mainline as:
commit c0def46dec9c547679a25fe7552c4bcbec0b0dd2
Author: Qu Wenruo
Date: Mon Nov 11 07:29:07 2024 +1030
Subject: btrfs: improve the warning and error message for btrfs_remove_qgroup()
Link:
https://git.kernel.org/pub/scm/linux/kernel/git/torva
** Description changed:
- Can you please cherry-pick those 2 important commits from upstream?
+ BugLink: https://bugs.launchpad.net/bugs/2093871
- 1. net: introduce helper sendpages_ok()
- (https://github.com/torvalds/linux/commit/23a55f44)
+ [Impact]
- Network drivers are using sendpage_ok(
** Summary changed:
- Using sendpages_ok() in nvme_tcp_try_send_data()
+ Introduce and use sendpages_ok() instead of sendpage_ok() in nvme-tcp and drbg
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpa
* Changed in: linux (Ubuntu Oracular)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Noble)
Assignee: (unassigned) => Matthew Ruffell (mruffell)
** Changed in: linux (Ubuntu Oracular)
Assignee: (unassigned) => Matthew Ruffell (mruffell)
--
You received this bug
Hi Luca,
The patch is on the Ubuntu Kernel Team mailing list:
Cover Letter:
https://lists.ubuntu.com/archives/kernel-team/2025-January/156531.html
Patch:
https://lists.ubuntu.com/archives/kernel-team/2025-January/156530.html
Looking at https://kernel.ubuntu.com/, this should be accepted into the
signee: (unassigned) => Matthew Ruffell (mruffell)
** Summary changed:
- BTRFS kernel panic on btrfs_remove_qgroup
+ btrfs will WARN_ON() in btrfs_remove_qgroup() unnecessarily
** Description changed:
- We are able to trigger a kernel oops in the btrfs code from userspace:
+ BugLink: https://bugs.laun
Thanks for verifying Oracular Till!
** Tags added: verification-done-oracular-linux
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2084046
Title:
[i915] Phantom "Unknown" display detect
Hi everyone,
I have excellent news. The Kernel Team respun this current SRU cycle to include
more patches, and
commit ad604f0a4c040dcb8faf44dc72db25e457c28076
Author: Thomas Zimmermann
Date: Tue Sep 24 10:41:03 2024 +0200
Subject: firmware/sysfb: Disable sysfb for firmware buffers with unknown p
Performing verification for Jammy
I deployed a bare metal host, and installed a KVM stack just like the testcase
section.
Sapphire Rapids Intel(R) Xeon(R) Platinum 8468
22.04 LTS Jammy
5.15.0-130-generic
Outside VM
cpuid 2784
cpuid 2699
cpuid 2699
cpuid 2797
cpuid 2866
Inside VM
cpuid 52891
cp
Performing verification for Noble
I deployed a bare metal host, and installed a KVM stack just like the testcase
section.
Sapphire Rapids Intel(R) Xeon(R) Platinum 8468
24.04 LTS Noble
6.8.0-51-generic
Outside VM
cpuid 3528
cpuid 3526
cpuid 3444
cpuid 3360
cpuid 3268
Inside VM
cpuid 66278
cpui
Performing verification for Oracular
I deployed a bare metal host, and installed a KVM stack just like the testcase
section.
Sapphire Rapids Intel(R) Xeon(R) Platinum 8468
24.10 Oracular
6.11.0-13-generic
Outside VM
cpuid 3368
cpuid 3399
cpuid 3560
cpuid 3282
cpuid 3289
Inside VM
cpuid 66195
c
Hi Luca,
Mainline 6.13 was released on the 19th, which means the mainline merge
window opened on the 20th.
I had a look, but it seems the btrfs maintainer hasn't sent his merge
request to Linus Torvalds yet.
Merge window is open for two weeks, so I expect this will happen in this
window.
Once i
** Also affects: linux (Ubuntu Noble)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Oracular)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https:
Hi Justus,
Thanks for testing. We now know the fix, which is great news.
We just need to get it out to everyone now.
I see the Kernel Team has just tagged 6.8.0-52-generic, but
"firmware/sysfb: Disable sysfb for firmware buffers with unknown parent"
isn't in there. It looks like it might be a pa
Hi Justus,
The test kernel finished building. I built a 6.8 kernel for Noble and a 6.11
kernel for Oracular. It uses the same patches that the Kernel Team has applied
to their git tree.
Please note this package is NOT SUPPORTED by Canonical, and is for TESTING
PURPOSES ONLY. ONLY Install in a ded
** Changed in: linux (Ubuntu)
Status: Confirmed => Fix Released
** Changed in: linux (Ubuntu Noble)
Status: Confirmed => Fix Committed
** Changed in: linux (Ubuntu Oracular)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of
Hi Justus,
Thanks for bisecting! It really helps. Looking at what you found:
ubuntu-noble 648dd7aa1f69e1ea8eb6fdb8515e86945df2e424
commit b49420d6a1aeb399e5b107fc6eb8584d0860fbd7
Author: Alex Deucher
Date: Wed Aug 21 15:11:35 2024 -0400
Subject: video/aperture: optionally match the device in s
Cover Letter:
https://lists.ubuntu.com/archives/kernel-team/2025-January/156198.html
Patches:
https://lists.ubuntu.com/archives/kernel-team/2025-January/156199.html
https://lists.ubuntu.com/archives/kernel-team/2025-January/156201.html
https://lists.ubuntu.com/archives/kernel-team/2025-January/1562
Sapphire Rapids Intel(R) Xeon(R) Platinum 8468
22.04 LTS Jammy
5.15.0-130-generic
Outside VM
cpuid 2700
cpuid 2822
cpuid 2699
cpuid 2698
cpuid 2698
Inside VM
cpuid 51108
cpuid 54513
cpuid 51389
cpuid 53783
cpuid 53998
5.15.0-130-generic+TEST403286v20250107b1
Outside VM
cpuid 2752
cpuid 2771
cp
Sapphire Rapids Intel(R) Xeon(R) Platinum 8468
24.10 Oracular
6.11.0-13-generic
Outside VM
cpuid 3307
cpuid 3384
cpuid 3348
cpuid 3374
cpuid 3280
Inside VM
cpuid 67659
cpuid 67748
cpuid 69626
cpuid 67772
cpuid 65224
6.11.0-13-generic+TEST403286v20250107b1
Outside VM
cpuid 3450
cpuid 3499
cpuid
Sapphire Rapids Intel(R) Xeon(R) Platinum 8468
24.04 LTS Noble
6.8.0-51-generic
Outside VM
cpuid 3527
cpuid 3384
cpuid 3467
cpuid 3300
cpuid 3544
Inside VM
cpuid 68395
cpuid 58364
cpuid 65254
cpuid 68554
cpuid 66905
6.8.0-51-generic+TEST403286v20250107b1
Outside VM
cpuid 3253
cpuid 3416
cpuid
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2093146
[Impact]
The CPUID instruction is particularly slow on newer generation processors,
with Intel's Emerald Rapids processor taking significantly longer to execute
CPUID than Skylake or Icelake.
This introdu
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2093146
[Impact]
The CPUID instruction is particularly slow on newer generation processors,
with Intel's Emerald Rapids processor taking significantly longer to execute
CPUID than Skylake or Icelake.
This introdu
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2093146
[Impact]
The CPUID instruction is particularly slow on newer generation processors,
with Intel's Emerald Rapids processor taking significantly longer to execute
CPUID than Skylake or Icelake.
This introdu
2.1347853-1-sea...@google.com/T/#u
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Fix Released
** Affects: linux (Ubuntu Jammy)
Importance: Medium
Assignee: Matthew Ruffell (mruffell)
Status: In Progress
** Affects: linux (Ubuntu Noble)
Importance: Mediu
Hi James,
There is a huge amount of changes between -49 and -50 in the sound
subsystem, here is a list:
$ git log Ubuntu-6.8.0-49.49..Ubuntu-6.8.0-50.51 --oneline ./sound
eafd899459a7 ASoC: meson: axg-card: fix 'use-after-free'
3aba12195c93 ASoC: codecs: avoid possible garbage value in peb2466_r
*** This bug is a duplicate of bug 2092649 ***
https://bugs.launchpad.net/bugs/2092649
** This bug has been marked a duplicate of bug 2092649
Can't enter passphrase for encrypted disk on splash screen after kernel
updated to 6.8.0-51-generic
--
You received this bug notification because
** Changed in: linux (Ubuntu Noble)
Assignee: (unassigned) => Matthew Ruffell (mruffell)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2091719
Title:
BTRFS kernel panic on btrfs
1 - 100 of 587 matches
Mail list logo