TCP memory leak, slow network (arm64)
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Committed
|
Undecided
|
Philip Cox | ||
Mantic |
Fix Released
|
Medium
|
Philip Cox | ||
Noble |
Fix Released
|
Medium
|
Philip Cox |
Bug Description
Hello! 👋
We have Ubuntu OS-based servers running in both AWS and Azure clouds. These servers are handling thousands of connections, and we've been experiencing issues with TCP memory usage since upgrading to Ubuntu 22.04.3 from 22.04.2.
$ cat /proc/net/sockstat
sockets: used 6642
TCP: inuse 5962 orphan 0 tw 292 alloc 6008 mem 128989
UDP: inuse 5 mem 0
UDPLITE: inuse 0
RAW: inuse 0
FRAG: inuse 0 memory 0
As shown in the output below, even after stopping all possible services and closing all open connections, the TCP memory usage remains high and only decreases very slowly.
$ cat /proc/net/sockstat
sockets: used 138
TCP: inuse 2 orphan 0 tw 0 alloc 3 mem 128320
UDP: inuse 3 mem 0
UDPLITE: inuse 0
RAW: inuse 0
FRAG: inuse 0 memory 0
I have attached a screenshot of linear TCP memory usage growth, which we believe may indicate a TCP memory leak
When net.ipv4.tcp_mem limit is reached, it causes network slowdown
We've never had these issues before, and the only solution we've found so far is to reboot the node. Do you have any suggestions on how to troubleshoot further?
Thank you for any help or guidance you can provide!
ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: linux-image-
ProcVersionSign
Uname: Linux 6.2.0-1015-aws aarch64
ApportVersion: 2.20.11-0ubuntu82.5
Architecture: arm64
CasperMD5CheckR
CloudArchitecture: aarch64
CloudID: aws
CloudName: aws
CloudPlatform: ec2
CloudRegion: us-west-2
CloudSubPlatform: metadata (http://
Date: Mon Dec 4 13:13:08 2023
Ec2AMI: ami-095a68e28e7
Ec2AMIManifest: (unknown)
Ec2Architecture: arm64
Ec2Availability
Ec2Imageid: ami-095a68e28e7
Ec2InstanceType: m7g.large
Ec2Instancetype: m7g.large
Ec2Kernel: unavailable
Ec2Ramdisk: unavailable
Ec2Region: us-west-2
ProcEnviron:
TERM=xterm-
PATH=(custom, no user)
LANG=C.UTF-8
SHELL=/bin/bash
RebootRequiredPkgs: Error: path contained symlinks.
SourcePackage: linux-signed-
UpgradeStatus: No upgrade log present (probably fresh install)
CVE References
- 2023-52880
- 2023-6270
- 2024-23307
- 2024-24861
- 2024-26593
- 2024-26642
- 2024-26643
- 2024-26694
- 2024-26710
- 2024-26712
- 2024-26733
- 2024-26734
- 2024-26735
- 2024-26736
- 2024-26748
- 2024-26782
- 2024-26789
- 2024-26790
- 2024-26792
- 2024-26798
- 2024-26802
- 2024-26803
- 2024-26809
- 2024-26838
- 2024-26889
- 2024-26890
- 2024-26922
- 2024-26923
- 2024-26924
- 2024-26925
- 2024-26926
Lev Petrushchak (sabretus) wrote : | #1 |
- Screenshot 2023-12-04 at 14.27.09.png Edit (218.4 KiB, image/png)
- Dependencies.txt Edit (3.0 KiB, text/plain; charset="utf-8")
- ProcCpuinfoMinimal.txt Edit (360 bytes, text/plain; charset="utf-8")
Launchpad Janitor (janitor) wrote : | #2 |
Changed in linux-signed-aws-6.2 (Ubuntu): | |
status: | New → Confirmed |
Ryan Huddleston (rshuddleston) wrote : | #3 |
affects 6.2.0-1011-aws -> 6.2.0-1016-aws, 6.2.0-1011-azure -> 6.2.0-1016-azure kernels, did not affect 5.19 and prior kernels in 22.04.2
Lev Petrushchak (sabretus) wrote : | #4 |
We tried to downgrade the kernel in Ubuntu 22.04.3 from 6.2 to 5.15 by installing linux-image-
Lev Petrushchak (sabretus) wrote : Re: TCP memory leak, slow network | #5 |
We have confirmed that this issue only related to ARM64 architecture
summary: |
- Possible TCP memory leak + TCP memory leak, slow network |
description: | updated |
summary: |
- TCP memory leak, slow network + TCP memory leak, slow network (arm64) |
description: | updated |
Jonathan Heathcote (mossblaser) wrote : | #6 |
- TCP memory consumption Edit (55.9 KiB, image/png)
As another "me too" situation, I'm seeing the same phenomenon, though on Rocky 9 rather than Ubuntu and on older kernels (5.14). Reporting details here on the off chance this provides some insight.
Hardware: Ampere Altra Max 128 cores (aarch64), ConnectX6-DX NICs (2 x dual 100G port)
Kernel versions tested: 5.15 (Rocky 9 native kernel) and 6.8 (elrepo kernel), both configured with 64 KB pages
OS: Rocky Linux 9
Software: nginx serving ~90k HTTPS clients at ~350 GBit/s (a synthetic load test)
Bare-metal (no virtualisation).
In my test environment, ~90k HTTPS connections are opened (and reused via keepalive) and used to stream ~350 GBit/s of traffic to a cluster of load generators. In this scenario, TCP memory gradually creeps up until reaching the memory pressure threshold in /proc/sys/
Closing all connections or restarting nginx does not free up the memory, only a reboot resolves the situation -- as reported above already.
Leaked memory appears to persist even if all connections are closed prior to hitting any of the above limits.
Unfortunately I don't yet have any ideas on how to fix this but would be glad to hear (and will share) any insights about what might be going on here!
Jonathan Heathcote (mossblaser) wrote : | #7 |
I've been digging into this and this appears to be a regression introduced by the following patch https:/
The bug is not a memory leak but rather a bug in how memory usage is counted. Excess memory is not actually being consumed, though the bug is still fatal since the counter controls Linux's memory pressure logic.
The (apparently) responsible patch is a performance optimisation which attempts to reduce the frequency of writes to the system-wide counter which (I suspect) is subtly misusing some atomic operation on ARM. If you undo this patch in a recent kernel, the bug disappears.
I am currently working on a detailed bug report for the relevant Kernel maintainers.
NB: It appears that the "5.15" kernel shipped by Rocky (and RHEL) includes a back-port of this bug, hence my seeing the bug in that kernel version on Rocky Linux. A non-RedHat-patched vanilla build of 5.15 does not exhibit the bug in my system either.
Lev Petrushchak (sabretus) wrote : | #8 |
Hi Jonathan,
Thanks for all the information and the deep dive into this issue! Please post the link to the kernel bug report here when it's ready.
Jonathan Heathcote (mossblaser) wrote : | #9 |
The bug report can be found here:
https://<email address hidden>/
The subsequently produced patch (not by me!) to fix this can be found here:
https:/
I've also verified that the above patch does fix the problem at least in my case!
Changed in linux-signed-aws-6.2 (Ubuntu): | |
assignee: | nobody → Philip Cox (philcox) |
Philip Cox (philcox) wrote : | #10 |
I've looked at this issue in some detail now. The initial memory leak was introduced in linux kernel version v6.0, and the fix was introduced in the v6.9 kernel version. This means that the 6.5, and 6.8 based ubuntu kernels will contain this memory leak.
I will submit a fix for the generic 6.8, and generic 6.5 kernels so all ubuntu kernels will receive the fix.
For reference: The commit that introduces this issue is 3cd3399dd7a84ad
And the commit I will be working with to provide the fix is the stable backport to the 6.8.y stable kernel which is: d2fa3493811ecd4
affects: | linux-signed-aws-6.2 (Ubuntu) → linux (Ubuntu) |
Changed in linux (Ubuntu Mantic): | |
status: | New → Confirmed |
assignee: | nobody → Philip Cox (philcox) |
Changed in linux (Ubuntu Noble): | |
assignee: | nobody → Philip Cox (philcox) |
status: | New → Confirmed |
Changed in linux (Ubuntu): | |
status: | Confirmed → Fix Committed |
Philip Cox (philcox) wrote : | #11 |
Two patches are actually needed for this fix. From the 6.8.y stable branch, the following two patches cherry-pick and build clean on the generic ubuntu mantic (6.5), and noble (6.8) kernels. I will perform some more testing and send these out for review.
The two patches are:
d2fa3493811ecd4
e830c804e26733f
Philip Cox (philcox) wrote : | #12 |
The review for this change has been sent out. It is: https:/
Changed in linux (Ubuntu Noble): | |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Mantic): | |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Noble): | |
status: | Confirmed → Fix Committed |
Changed in linux (Ubuntu Mantic): | |
status: | Confirmed → Fix Committed |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #13 |
This bug is awaiting verification that the linux/6.5.0-44.44 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #14 |
This bug is awaiting verification that the linux/6.8.0-38.38 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-mantic-linux-v2 verification-needed-mantic-linux |
tags: | added: kernel-spammed-noble-linux-v2 verification-needed-noble-linux |
Nicolai Antiferov (nklya) wrote (last edit ): | #16 |
Hi,
I’m wondering if this bugfix will be backported for Jammy / 22.04?
Right now as I see only Mantic/Noble is planned in status.
Jammy has 6.2/6.5 kernels and they’re affected by this.
P.S. Also, it feels that priority might be higher. In some cases it creates pretty serious network related problems .
Philip Cox (philcox) wrote : | #17 |
@nklya
The 6.5 and 6.8 based jammy kernels have received this patch as well. The 6.2 based jammy kernel is no longer supported so it will not be receiving these patches.
The way that the jammy 6.5/6.8 kernels work are, they are backports of the newer series kernels. So, for noble (24.04) for example, the noble 6.8 kernel has been back ported to jammy and is the jammy 6.8 based kernel. So, when changes go in to the noble 6.8 kernel, they automatically make it into the jammy 6.8 kernel.
So this was targeted to noble and mantic, with the understanding that the changes would end up in the jammy 6.8 and 6.5 based kernel backports.
Nicolai Antiferov (nklya) wrote : | #18 |
Cool, thank you for details, all clear now.
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #19 |
This bug is awaiting verification that the linux-nvidia-
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-noble-linux-nvidia-lowlatency-v2 verification-needed-noble-linux-nvidia-lowlatency |
Launchpad Janitor (janitor) wrote : | #20 |
This bug was fixed in the package linux - 6.5.0-44.44
---------------
linux (6.5.0-44.44) mantic; urgency=medium
* mantic/linux: 6.5.0-44.44 -proposed tracker (LP: #2068341)
* Packaging resync (LP: #1786013)
- [Packaging] debian.
(
* Some DUTs can't boot up after installing the proposed kernel on Mantic
(LP: #2061940)
- SAUCE: Revert "x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat
section"
- SAUCE: Revert "x86/boot: Increase section and file alignment to 4k/512"
- SAUCE: Revert "x86/boot: Split off PE/COFF .data section"
- SAUCE: Revert "x86/boot: Drop PE/COFF .reloc section"
- SAUCE: Revert "x86/boot: Construct PE/COFF .text section from assembler"
- SAUCE: Revert "x86/boot: Derive file size from _edata symbol"
- SAUCE: Revert "x86/boot: Define setup size in linker script"
- SAUCE: Revert "x86/boot: Set EFI handover offset directly in header asm"
- SAUCE: Revert "x86/boot: Grab kernel_info offset from zoffset header
directly"
- SAUCE: Revert "x86/boot: Drop redundant code setting the root device"
- SAUCE: Revert "x86/boot: Drop references to startup_64"
- SAUCE: Revert "x86/boot: Omit compression buffer from PE/COFF image memory
footprint"
- SAUCE: Revert "x86/boot: Remove the 'bugger off' message"
- SAUCE: Revert "x86/efi: Drop alignment flags from PE section headers"
- SAUCE: Revert "x86/efi: Drop EFI stub .bss from .data section"
* CVE-2023-52880
- tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc
* i915 cannot probe successfully on HP ZBook Power 16 G11 (LP: #2067883)
- drm/i915/mtl: Remove the 'force_probe' requirement for Meteor Lake
* CVE-2024-26838
- RDMA/irdma: Fix KASAN issue with tasklet
* mtk_t7xx WWAN module fails to probe with: Invalid device status 0x1
(LP: #2049358)
- Revert "UBUNTU: SAUCE: net: wwan: t7xx: PCIe reset rescan"
- Revert "UBUNTU: SAUCE: net: wwan: t7xx: Add AP CLDMA"
- net: wwan: t7xx: Add AP CLDMA
- wwan: core: Add WWAN fastboot port type
- net: wwan: t7xx: Add sysfs attribute for device state machine
- net: wwan: t7xx: Infrastructure for early port configuration
- net: wwan: t7xx: Add fastboot WWAN port
* TCP memory leak, slow network (arm64) (LP: #2045560)
- net: make SK_MEMORY_
- net: fix sk_memory_
* CVE-2024-26923
- af_unix: Do not use atomic ops for unix_sk(
- af_unix: Fix garbage collector racing against connect()
* Add support for Quectel EM160R-GL modem [1eac:100d] (LP: #2063399)
- Add support for Quectel EM160R-GL modem
* Add support for Quectel RM520N-GL modem [1eac:1007] (LP: #2063529)
- Add support for Quectel RM520N-GL modem
- Add support for Quectel RM520N-GL modem
* [SRU][22.04.4]: megaraid_sas: Critical Bug Fixes (LP: #2046722)
- scsi: megaraid_sas: Log message when controller reset is requested but not
issued
- scsi: megaraid_sas: Driver version update to 07.727.03.00-rc1
* Fix the RTL8852CE BT FW Crash based on SER false alar...
Changed in linux (Ubuntu Mantic): | |
status: | Fix Committed → Fix Released |
Launchpad Janitor (janitor) wrote : | #21 |
This bug was fixed in the package linux - 6.8.0-38.38
---------------
linux (6.8.0-38.38) noble; urgency=medium
* noble/linux: 6.8.0-38.38 -proposed tracker (LP: #2068318)
* race_sched in ubuntu_
Azure Standard_A2_v2 instance (LP: #2068024)
- sched/eevdf: Prevent vlag from going out of bounds in reweight_eevdf()
* Noble: btrfs: re-introduce 'norecovery' mount option (LP: #2068591)
- btrfs: re-introduce 'norecovery' mount option
* Fix system hang while entering suspend with AMD Navi3x graphics
(LP: #2063417)
- drm/amdgpu/mes: fix use-after-free issue
* Noble update: v6.8.8 upstream stable release (LP: #2068087)
- io_uring: Fix io_cqring_wait() not restoring sigmask on get_timespec64()
failure
- drm/i915/cdclk: Fix voltage_level programming edge case
- Revert "vmgenid: emit uevent when VMGENID updates"
- SUNRPC: Fix rpcgss_context trace event acceptor field
- selftests/ftrace: Limit length in subsystem-enable tests
- random: handle creditable entropy from atomic process context
- scsi: core: Fix handling of SCMD_FAIL_
- net: usb: ax88179_178a: avoid writing the mac address before first reading
- btrfs: do not wait for short bulk allocation
- btrfs: zoned: do not flag ZEROOUT on non-dirty extent buffer
- r8169: fix LED-related deadlock on module removal
- r8169: add missing conditional compiling for call to r8169_remove_leds
- scsi: ufs: qcom: Add missing interconnect bandwidth values for Gear 5
- netfilter: nf_tables: Fix potential data-race in __nft_expr_
- netfilter: nf_tables: Fix potential data-race in __nft_obj_
- netfilter: br_netfilter: skip conntrack input hook for promisc packets
- netfilter: nft_set_pipapo: constify lookup fn args where possible
- netfilter: nft_set_pipapo: walk over current view on netlink dump
- netfilter: flowtable: validate pppoe header
- netfilter: flowtable: incorrect pppoe tuple
- af_unix: Call manage_oob() for every skb in unix_stream_
- af_unix: Don't peek OOB data without MSG_OOB.
- net: sparx5: flower: fix fragment flags handling
- net/mlx5: Lag, restore buckets number to default after hash LAG deactivation
- net/mlx5: Restore mistakenly dropped parts in register devlink flow
- net/mlx5e: Prevent deadlock while disabling aRFS
- net: change maximum number of UDP segments to 128
- octeontx2-pf: fix FLOW_DIS_
- selftests/tcp_ao: Make RST tests less flaky
- selftests/tcp_ao: Zero-init tcp_ao_info_opt
- selftests/tcp_ao: Fix fscanf() call for format-security
- selftests/tcp_ao: Printing fixes to confirm with format-security
- net: stmmac: Apply half-duplex-less constraint for DW QoS Eth only
- net: stmmac: Fix max-speed being ignored on queue re-init
- net: stmmac: Fix IP-cores specific MAC capabilities
- ice: tc: check src_vsi in case of traffic from VF
- ice: tc: allow zero flags in parsing tc flower
- ice: Fix checking for unsupported keys on non-tunnel device
- tun: limit printing rate whe...
Changed in linux (Ubuntu Noble): | |
status: | Fix Committed → Fix Released |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #22 |
This bug is awaiting verification that the linux-gke/
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-noble-linux-gke-v2 verification-needed-noble-linux-gke |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #23 |
This bug is awaiting verification that the linux-nvidia/
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-noble-linux-nvidia-v2 verification-needed-noble-linux-nvidia |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #24 |
This bug is awaiting verification that the linux-ibm/
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-noble-linux-ibm-v2 verification-needed-noble-linux-ibm |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #25 |
This bug is awaiting verification that the linux-hwe-
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-jammy-linux-hwe-6.8-v2 verification-needed-jammy-linux-hwe-6.8 |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #26 |
This bug is awaiting verification that the linux-azure/
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #27 |
This bug is awaiting verification that the linux-aws/
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-mantic-linux-azure-v2 verification-needed-mantic-linux-azure |
tags: | added: kernel-spammed-mantic-linux-aws-v2 verification-needed-mantic-linux-aws |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #29 |
This bug is awaiting verification that the linux-laptop/
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-mantic-linux-laptop-v2 verification-needed-mantic-linux-laptop |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #30 |
This bug is awaiting verification that the linux-oracle/
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-mantic-linux-oracle-v2 verification-needed-mantic-linux-oracle |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #31 |
This bug is awaiting verification that the linux-nvidia-
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-jammy-linux-nvidia-6.5-v2 verification-needed-jammy-linux-nvidia-6.5 |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #32 |
This bug is awaiting verification that the linux-oem-
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-jammy-linux-oem-6.5-v2 verification-needed-jammy-linux-oem-6.5 |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #33 |
This bug is awaiting verification that the linux-hwe-
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-jammy-linux-hwe-6.5-v2 verification-needed-jammy-linux-hwe-6.5 |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #34 |
This bug is awaiting verification that the linux-azure-
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-jammy-linux-azure-6.8-v2 verification-needed-jammy-linux-azure-6.8 |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #35 |
This bug is awaiting verification that the linux-lowlatenc
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-jammy-linux-lowlatency-hwe-6.8-v2 verification-needed-jammy-linux-lowlatency-hwe-6.8 |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #36 |
This bug is awaiting verification that the linux-gcp-
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-jammy-linux-gcp-6.5-v2 verification-needed-jammy-linux-gcp-6.5 |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #37 |
This bug is awaiting verification that the linux-raspi-
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-noble-linux-raspi-realtime-v2 verification-needed-noble-linux-raspi-realtime |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #38 |
This bug is awaiting verification that the linux-ibm-
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-jammy-linux-ibm-6.8-v2 verification-needed-jammy-linux-ibm-6.8 |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #39 |
This bug is awaiting verification that the linux-lowlatenc
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-mantic-linux-lowlatency-v2 verification-needed-mantic-linux-lowlatency |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #40 |
This bug is awaiting verification that the linux-starfive/
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-mantic-linux-starfive-v2 verification-needed-mantic-linux-starfive |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #41 |
This bug is awaiting verification that the linux-riscv/
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-mantic-linux-riscv-v2 verification-needed-mantic-linux-riscv |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #42 |
This bug is awaiting verification that the linux-aws-
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-jammy-linux-aws-6.8-v2 verification-needed-jammy-linux-aws-6.8 |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #43 |
This bug is awaiting verification that the linux-nvidia-
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-jammy-linux-nvidia-6.8-v2 verification-needed-jammy-linux-nvidia-6.8 |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #44 |
This bug is awaiting verification that the linux-riscv/
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-noble-linux-riscv-v2 verification-needed-noble-linux-riscv |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #45 |
This bug is awaiting verification that the linux-oracle/
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-noble-linux-oracle-v2 verification-needed-noble-linux-oracle |
Nicolai Antiferov (nklya) wrote : | #46 |
@philcox you mentioned here that jammy 6.5 kernel will be backported as well.
https:/
However, in list of updates coming to this ticket I see only “jammy-
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #47 |
This bug is awaiting verification that the linux-riscv-
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-jammy-linux-riscv-6.8-v2 verification-needed-jammy-linux-riscv-6.8 |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #48 |
This bug is awaiting verification that the linux-oracle-
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-jammy-linux-oracle-6.5-v2 verification-needed-jammy-linux-oracle-6.5 |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #49 |
This bug is awaiting verification that the linux-lowlatenc
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-jammy-linux-lowlatency-hwe-6.5-v2 verification-needed-jammy-linux-lowlatency-hwe-6.5 |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #50 |
This bug is awaiting verification that the linux-aws-
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-jammy-linux-aws-6.5-v2 verification-needed-jammy-linux-aws-6.5 |
Philip Cox (philcox) wrote : | #51 |
@nklya
> you mentioned here that jammy 6.5 kernel will be backported as well.
> https:/
>
> However, in list of updates coming to this ticket I see only “jammy-
Funnily enough, I looked this up yesterday for someone else, so I have all the info handy...
So, for 6.5 based kernels, it is in 6.5.0-44.44 and for 6.8 based kernels, it is in 6.8.0-38.38 of the generic Ubuntu kernels.
If you would like the AWS specific kernels, those versions are 6.5.0-1023.23 for the 6.5 based mantic kernel, and 6.8.0-1011.11 for the 6.8 based noble kernel.
If you would like the 6.5 or 6.8 based jammy kernel, look for the versionjammy version that matches or is newer than the mantic or noble equivalent. For the 6.5 jammy kernel, it looks like you want: 6.5.0-1023.
And it looks like this is the version in the -updates pocket. You should be able to install the AWS kernel, or the generic version of the kernel to test this.
----
And I just noticed that the kernel-bot posted much of the same info I did.
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #52 |
This bug is awaiting verification that the linux-fips/
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-noble-linux-fips-v2 verification-needed-noble-linux-fips |
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : | #53 |
This bug is awaiting verification that the linux-riscv-
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/
tags: | added: kernel-spammed-jammy-linux-riscv-6.5-v2 verification-needed-jammy-linux-riscv-6.5 |
Status changed to 'Confirmed' because the bug affects multiple users.