This bug was fixed in the package linux - 4.15.0-213.224
---
linux (4.15.0-213.224) bionic; urgency=medium
* bionic/linux: 4.15.0-213.224 -proposed tracker (LP: #2024234)
* Kernel warning after upgrade to 4.15.0.211.194 (LP: #2020279)
- net: Remove WARN_ON_ONCE(sk->sk_forward
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020279
Title:
Kernel warning after upgrade to 4.15.0.211.194
Status in linux package in Ubuntu:
Hi Thadeu, I updated a server a few hours ago and the warning did not
appear. I think we can say that the patch works. I see no undesirable
side-effect either so far.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https:/
Hi, @morc, this should release into the public repo with version
4.15.0-213.224. It should be in -proposed now. Can you verify that it
works, please?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.n
Hi Andrei, Thadeu, will this be release into the public repo (instead
of ESM) and in which version of the kernel?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020279
Title:
Kernel war
** Changed in: linux (Ubuntu Bionic)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020279
Title:
Kernel warning after upgrade to 4.15.0.211.19
Andrei, I installed your kernel version about 2 hours ago and did not
experience the warnings. It's also great that you could reproduce it.
Thanks for the effort!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bug
Gabor, I could reproduce the bug using the upstream test
(https://lore.kernel.org/netdev/20230208004245.83497-1-kun...@amazon.com/).
On 4.15.0-211-generic #222-Ubuntu I ended up with:
[ 31.286092] WARNING: CPU: 0 PID: 1088 at /build/linux-
RlFMDZ/linux-4.15.0/net/core/stream.c:212
sk_stream_kil
** Changed in: linux (Ubuntu)
Status: Fix Released => New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020279
Title:
Kernel warning after upgrade to 4.15.0.211.194
Status in l
Thanks, Gabor. I appreciate your help.
In the meanwhile, I have found the issue, and I have a fix in place. So
I think we should give this a spin directly, as I'm pretty confident it
will solve the problem. Note that the debs are unsigned, so you must
ensure that secure boot is disabled before att
Hi Andrei, if you give me a link to a DEB package I can test it.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020279
Title:
Kernel warning after upgrade to 4.15.0.211.194
Status in l
@Gabor @Jamie We are encountering some difficulties with getting a
proper IPv6 instance to work on for this. As an interim solution, I
could build a kernel with the patch above dropped and ask you to give it
a spin for a while. Is that something you could help with?
--
You received this bug notif
My Droplet has an IPv6 address, and traffic on that is even less
frequent than IPv4, so the sporadic occurrence we saw could be explained
by that.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/
Thanks for the extra details. I tried to reproduce it locally today, and
I couldn't. While checking the code and your logs, I suspect this is
IPv6-specific, and my testing env is IPv4-only. I'll come back when I
manage to reproduce it. My current suspicion is:
commit e198bdd7ad2834c77567d59158e883
For me this was a bare metal bionic install on a home personal, multi-
purpose, intranet server (rsyslog, apache, bind9, etc). The message was
triggered 480 times in ~6 hours and 15 minutes before I downgraded. I
didn't notice other issues. I looked at the logs and couldn't see a
pattern of 'cut he
Hi Andrei,
I have no idea what triggers it. The Droplet is a webserver, maybe
whenever someone requested a page. The warning did not happen
frequently, a few times in an hour, though this server is a test server,
probably does not see much traffic. Maybe Jamie has a better idea or
could give mor
I see the original report is on a DigitalOcean Droplet, but I think this
should also reproduce in a local VM. Is there anything specific I need
to do to trigger the bug, Gabor?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubunt
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Bionic)
Status: New => Confirmed
** Changed in: linux (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
I started seeing this too after upgrading to this kernel (from
https://ubuntu.com/security/notices/USN-6081-1):
ii linux-image-generic4.15.0.211.194
ii linux-image-4.15.0-211-generic 4.15.0-211.222
$ cat /proc/version_signature
Ubuntu 4.15.0-211.222-generic 4.15.18
apport information
** Tags added: apport-collected bionic uec-images
** Description changed:
After rebooting into 4.15.0.211.194 on Ubuntu 18.04.6 the kernel started
to produce the below warning. It did not seem to cause any major issue.
Revering to 4.15.0.210 stopped the warning. The serv
20 matches
Mail list logo