This happens with 4.20-rc2. This is fixed by the patch referenced in
this thread:
https://marc.info/?l=linux-netdev&m=154239557300724&w=2
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
** Tags added: kernel-bug-exists-upstream
--
You received this bug notification because
Nevermind, 4.18.17 is not enough to fix the crash. Currently testing
with 4.19.1.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1802480
Title:
Crash when using IPsec VTI interfaces on 4
Sorry, currently, all hosts are running a mainline kernel (4.18.17).
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/180
Commit fdb06c787b34fd397f28f515105627307d615025 title is "xfrm: reset
transport header back to network header after all input transforms ahave
been applied"
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.laun
Public bug reported:
Hey!
After upgrading a few VPN to 4.15.0-38.41 (either Xenial or Bionic), we
get random crashes. This also happens with the 4.18 in bionic-proposed.
These crashes didn't happen with 4.4 from Xenial. Here is a stack trace:
[ 31.154360] BUG: unable to handle kernel NULL poin
The fix is not present in -32. It seems to be scheduled for -33.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1778486
Title:
x86/kvm: fix LAPIC timer drift when guest uses periodic mod
No log files to provide.
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1764956
Title:
Guests using IBRS incur a lar
Public bug reported:
Hello!
As of Linux 4.4.0-119, when a KVM guest is using IBRS, this incurs a
very large performance penalty on the hosts and other guests.
>From my understanding, the patch
f676aa34b4027d1a7a4bbcc58b81b20c68c7ce0c is incomplete. If host doesn't
handle IBRS itself (which is no
Compared to previous kernel, IBRS/IBPB are not exposed anymore for use
by KVM (MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD). VM running on the
previous kernel (with a profile mandating spec-ctrl) won't be able to
start anymore.
--
You received this bug notification because you are a member of Kernel
As mentioned in #1742995, one patch is incomplete and doesn't expose the
appropriate CPUID for KVM hosts when running on Intel hardware.
8339cae23d79be97a38df3852ef5dab870806a58 should add speculative control
CPUID support for guests. The patch looks truncated as it defines
KVM_CPUID_BIT_SPEC_CTRL
The last patch doesn't apply cleanly. This one does:
https://github.com/exoscale/pkg-
kernel-4.4/blob/7586bedddca6a5a7d3e2f4fc2fbe944043fa9780/debian/patches/ibrs%2Bkvm/0003-x86
-provide-get-scattered-cpuid-leaf.patch
--
You received this bug notification because you are a member of Kernel
Packag
Hey!
The patchset seems incomplete: 8339cae23d79be97a38df3852ef5dab870806a58
should add speculative control CPUID support for guests but only the AMD
part is here. When running a guest on top of KVM, CPUID doesn't contain
the spec-ctrl bit.
I am using this patch instead:
https://github.com/exos
Public bug reported:
Hey!
The Intel Atom C3000 platform comes with an integrated X553 Intel NIC.
Support was added in Linux 4.11:
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-
next.git/commit/?id=b3eb4e1860f35. PCI IDs are 8086:15E4 and 8086:15E5.
Would it be possible to backport su
The symlinks are generated by debian/clean:
https://git.launchpad.net/~ubuntu-
kernel/ubuntu/+source/linux/+git/xenial/tree/debian/source/options
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/
No need for a log file, this is a wishlist.
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1233014
Title:
Use CFLAGS
Public bug reported:
Hi!
Tools, like systemtap, need to circumvent some bugs in GCC, notably in
the way it reports debugging data for highly-optimized programs.
Systemtap includes workarounds but they are only reliable when the
kernel is using some options. Therefore, systemtap needs to know with
16 matches
Mail list logo