This bug was fixed in the package linux - 3.13.0-92.139
---
linux (3.13.0-92.139) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597060
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
loading is restricted
Per Moritz, the problem has not occurred on the production systems
running the -proposed kernel.
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in
I've installed the 3.13.0-92.139 kernel from trusty-proposed on eight
production systems. I'll let you know by Monday.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1592429
Title:
trust
Moritz, its understood that this can only be "verified" as a long-term
stability issue. Please install the -proposed kernel on some of your
servers as a smoke test, and we'll consider if verified if you don't see
problems in the next few days.
--
You received this bug notification because you ar
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
** Changed in: linux (Ubuntu Trusty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1592429
Title:
trusty kernel crash in OOM killer related t
** Changed in: linux (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1592429
Title:
trusty kernel crash in OOM killer related to cgroup
Patch set submitted for kernel team review:
https://lists.ubuntu.com/archives/kernel-team/2016-June/078598.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1592429
Title:
trusty kerne
This looks good to me: We have been running the test kernel on nine
production servers for more than a week now and the systems are stable
(while previous we'd seen three kernel hands over the course of 48
hours).
--
You received this bug notification because you are a member of Kernel
Packages,
Same kernel, but rebuilt with the complete set of .debs:
http://people.canonical.com/~kamal/lp1592429.2/
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1592429
Title:
trusty kernel crash
Moritz, here is a test kernel with the three needed oom_kill patches*
applied. Please confirm that it resolves the problem:
http://people.canonical.com/~kamal/lp1592429/
*[mainline]
4d4048b oom_kill: add rcu_read_lock() into find_lock_task_mm()
ad96244 oom_kill: has_intersects_mems_allowed() nee
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Trusty)
Status: New => In Progress
** Changed in: linux (Ubuntu Trusty)
Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)
--
You received this bug notification becaus
** Changed in: linux (Ubuntu)
Status: Incomplete => In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs
13 matches
Mail list logo