With the 4.18.0-8-generic kernel, I see AMD IOMMU IO_PAGE_FAULTs for invalid
addresses
AMD-Vi: Event logged [IO_PAGE_FAULT device=e1:00.0 domain=0x
address=0xfffd14c0 flags=0x0030]
PERC controller is still present btw, but the vdbench stress crashed due
to this page faults.
** Attac
I see the disks going offline during stress in mainline
4.19.0-041900rc7-generic as well.
Although the symptoms look different in 4.15 and 4.18 kernels, I feel
the bug is not fixed; address being accessed is still out-of-range in
this 16GB server.
--
You received this bug notification because yo
*** This bug is a duplicate of bug 1797061 ***
https://bugs.launchpad.net/bugs/1797061
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Li
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-aws - 4.15.0-1025.25
---
linux-aws (4.15.0-1025.25) bionic; urgency=medium
* linux-aws: 4.15.0-1025.25 -proposed tracker (LP: #1797066)
[ Ubuntu: 4.15.0-38.41 ]
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corru
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
*** This bug is a duplicate of bug 1797066 ***
https://bugs.launchpad.net/bugs/1797066
This bug was fixed in the package linux-aws - 4.15.0-1025.25
---
linux-aws (4.15.0-1025.25) bionic; urgency=medium
* linux-aws: 4.15.0-1025.25 -proposed tracker (LP: #1797066)
[ Ubuntu: 4.
Is there any way to fix the problem if I do NOT have access to Ubuntu
(or any other Linux distro) at all? I can only run on Windows10
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1734147
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
--
You received this bug notification because you are a
This bug was fixed in the package linux-aws - 4.15.0-1025.25
---
linux-aws (4.15.0-1025.25) bionic; urgency=medium
* linux-aws: 4.15.0-1025.25 -proposed tracker (LP: #1797066)
[ Ubuntu: 4.15.0-38.41 ]
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corru
This bug was fixed in the package linux - 3.13.0-161.211
---
linux (3.13.0-161.211) trusty; urgency=medium
* linux: 3.13.0-161.211 -proposed tracker (LP: #1795595)
* CVE-2017-0794
- scsi: sg: protect accesses to 'reserved' page array
- scsi: sg: reset 'res_in_use' after u
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/snap-release-to-stable
Status: New => Confirmed
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bug
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-trusty
** Tags removed: block-proposed
--
You received this bug notification because you
With latest 4.15 LTS kernels, I see the vdbench process crash and the
PERC controller and the related disks go offline..
** Attachment added: "4.15 - vdbench - disks go offline"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1795453/+attachment/5204195/+files/4.15-stress_fails.txt
--
Y
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
** Changed in: ubuntu-z-systems
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1793086
Title:
qeth: use vzalloc for QUERY OAT buffer
Status
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-bionic
** Tags removed: block-proposed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bug
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sr
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-bionic
** Tags removed: block-proposed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bug
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sr
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
This bug was fixed in the package linux-kvm - 4.4.0-1036.42
---
linux-kvm (4.4.0-1036.42) xenial; urgency=medium
* linux-kvm: 4.4.0-1036.42 -proposed tracker (LP: #1795589)
* Xenial update to 4.4.148 stable release (LP: #1792174)
- [config] updateconfigs for master changes
This bug was fixed in the package linux - 4.4.0-138.164
---
linux (4.4.0-138.164) xenial; urgency=medium
* linux: 4.4.0-138.164 -proposed tracker (LP: #1795582)
* Linux 4.4.155 stable release build is broken on ppc64 (LP: #1795662)
- powerpc/fadump: Return error when fadump r
This bug was fixed in the package linux-aws - 4.4.0-1032.35
---
linux-aws (4.4.0-1032.35) trusty; urgency=medium
* linux-aws: 4.4.0-1032.35 -proposed tracker (LP: #1795583)
[ Ubuntu: 4.4.0-138.164 ]
* linux: 4.4.0-138.164 -proposed tracker (LP: #1795582)
* Linux 4.4.155 stab
*** This bug is a duplicate of bug 1797065 ***
https://bugs.launchpad.net/bugs/1797065
This bug was fixed in the package linux-kvm - 4.15.0-1025.25
---
linux-kvm (4.15.0-1025.25) bionic; urgency=medium
* linux-kvm: 4.15.0-1025.25 -proposed tracker (LP: #1797065)
[ Ubuntu: 4.
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-kvm - 4.4.0-1036.42
---
linux-kvm (4.4.0-1036.42) xenial; urgency=medium
* linux-kvm: 4.4.0-1036.42 -proposed tracker (LP: #1795589)
* Xenial update to 4.4.148 stable release (LP: #1792174)
- [config] updateconfigs for master changes
This bug was fixed in the package linux-kvm - 4.15.0-1025.25
---
linux-kvm (4.15.0-1025.25) bionic; urgency=medium
* linux-kvm: 4.15.0-1025.25 -proposed tracker (LP: #1797065)
[ Ubuntu: 4.15.0-38.41 ]
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corru
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-aws - 4.4.0-1070.80
---
linux-aws (4.4.0-1070.80) xenial; urgency=medium
* linux-aws: 4.4.0-1070.80 -proposed tracker (LP: #1795585)
[ Ubuntu: 4.4.0-138.164 ]
* linux: 4.4.0-138.164 -proposed tracker (LP: #1795582)
* Linux 4.4.155 stab
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-kvm - 4.4.0-1036.42
---
linux-kvm (4.4.0-1036.42) xenial; urgency=medium
* linux-kvm: 4.4.0-1036.42 -proposed tracker (LP: #1795589)
* Xenial update to 4.4.148 stable release (LP: #1792174)
- [config] updateconfigs for master changes
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-kvm - 4.15.0-1025.25
---
linux-kvm (4.15.0-1025.25) bionic; urgency=medium
* linux-kvm: 4.15.0-1025.25 -proposed tracker (LP: #1797065)
[ Ubuntu: 4.15.0-38.41 ]
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corru
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
--
You received this bug notification because you are a
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
This bug was fixed in the package linux - 4.4.0-138.164
---
linux (4.4.0-138.164) xenial; urgency=medium
* linux: 4.4.0-138.164 -proposed tracker (LP: #1795582)
* Linux 4.4.155 stable release build is broken on ppc64 (LP: #1795662)
- powerpc/fadump: Return error when fadump r
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sr
** Changed in: ubuntu-z-systems
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1794294
Title:
[Ubuntu] s390/crypto: Fix return code checking
I think I just ran into this bug on bionic. I was building a yocto distribution
like this user here:
https://www.spinics.net/lists/linux-unionfs/msg05363.html
I was I was two point releases behind at :
$ uname -a
Linux ses-docker50c 4.15.0-34-generic #37-Ubuntu SMP Mon Aug 27 15:21:48 UTC
2018 x
It looks like the bug was fixed upstream here:
https://github.com/torvalds/linux/commit/355139a8dba446cc11a424cddbf7afebc3041ba1
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1736808
Tit
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1798674
Title:
linux-azure: 4.15.0-1028.29~16.04
Public bug reported:
Ubuntu starts, w/ /sbin/init, a kworker process that never stops running
below 85%:
pb@pb-tower:~/Downloads$ ps -elf
F S UIDPID PPID C PRI NI ADDR SZ WCHAN STIME TTY TIME CMD
4 S root 1 0 0 80 0 - 56471 - 18:30 ?00:00:01
/sbi
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
This bug was fixed in the package linux - 3.13.0-161.211
---
linux (3.13.0-161.211) trusty; urgency=medium
* linux: 3.13.0-161.211 -proposed tracker (LP: #1795595)
* CVE-2017-0794
- scsi: sg: protect accesses to 'reserved' page array
- scsi: sg: reset 'res_in_use' after u
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
- b
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-bionic
** Tags removed: block-proposed
--
You received this bug notification because you ar
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1797080
Title:
linux-gcp: 4.15.0-1023.24~16.04.1 -
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-precise
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem in Ubuntu.
https://bugs.launchpad.net/bugs/1797069
Title:
linux-oem: 4.15.0-1024.29 -proposed
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1798658
Title:
linux-azure: 4.15.0-1028.29 -prop
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-trusty
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1797062
Title:
linux-gcp: 4.15.0-1023.24 -proposed
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1797066
Title:
linux-aws: 4.15.0-1025.25 -proposed
Feel free to close this if it makes sense. I am researching how best to
report this upstream. The documentation on reporting kernel bugs makes
it clear you need to identify the affected subsystem or your bug will be
bit-bucketed. More hard core log diving is called for :)
** Changed in: linux (Ubu
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1795595
Title:
linux: 3.13.0-161.211 -propos
Does not need to go to the security pocket.
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1797080
Title:
linux-gcp: 4.15.0-1023.24~16.0
I've moved to ubuntu 1810 in the meantime, can't file a bug from the
system anymore
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchp
Does not need to go to the security pocket
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/17
Seems like there are some UEFI magic happens under the scene. Have you
tried using the default macOS boot loader instead?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1794641
Title:
Sl
Did this issue start happening after an update/upgrade? Was there a
prior kernel version where you were not having this particular problem?
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.19 kernel[0
Does not need to go to the security pocket.
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/17
Does not need to go to the security pocket.
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/179
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1797065
Title:
linux-kvm: 4.15.0-1025.25 -pro
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem in Ubuntu.
https://bugs.launchpad.net/bugs/1797069
Title:
linux-oem: 4.15.0-1024.29 -pro
Does not need to go to security pocket
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1797061
Tit
Did this issue start happening after an update/upgrade? Was there a
prior kernel version where you were not having this particular problem?
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.19 kernel[0
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1795596
Title:
linux-lts-trusty:
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1795583
Title:
linux-aws: 4.4.0-1032.35
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1795582
Title:
linux: 4.4.0-138.164 -propose
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1795589
Title:
linux-kvm: 4.4.0-1036.42
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1795585
Title:
linux-aws: 4.4.0-1070.80
** Changed in: linux (Ubuntu)
Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) =>
Canonical Kernel Team (canonical-kernel-team)
** Changed in: ubuntu-power-systems
Status: New => Incomplete
** Changed in: linux (Ubuntu)
Status: New => Incomplete
** Chang
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1799201
and then change the status of the bug to 'Confirmed'.
If, due to the nature
** Package changed: kernel-package (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1799201
Title:
slow upload speed to smb / cifs
Status in linux package in Ub
101 - 200 of 246 matches
Mail list logo