Public bug reported:
Hello,
after upgrading to kernel version linux-image-4.13.0-26-generic, my
bluetooth mouse (Microsoft Bluetooth Mouse 3600) stopped working. After
turning off bluetooth and re-pairing, it works for a short while, but
than stops again. It used to work reliable in the past. I
I've just tested 4.15-rc9 generic from http://kernel.ubuntu.com/~kernel-
ppa/mainline/v4.15-rc9/. It works now.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1743041
Title:
Updating
fix confirmed spec-ctrl cpu flag is now visible inside kvm guest
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1744244
Title:
linux: 4.4.0-112.135 -proposed tracker
Status in Kernel
Any chance for a workaround for this issue?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1743995
Title:
Upgrade 17.04 to 17.10 not possible
Status in linux package in Ubuntu:
ad #19
I've tried 4.14.14 as well: no boot without additional boot options.
With the above mentioned 5 boot options it fails to boot "sometimes"; one out
of three, may be.
It should mention that I'm using a dell latitude e6500 for these tests; the
discrepancy between our results will probably
** Tags added: kernel-da-key
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1720219
Title:
Repeated keys stop after a few characters (^@ character spam every
second)
Status in linux
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: New => Confirmed
** Tags added: block-proposed-precise
** Tags added: block-proposed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
This bug was fixed in the package linux-firmware - 1.169.2
---
linux-firmware (1.169.2) artful; urgency=medium
* Intel 9260/9462/9560 firmware support (LP: #1734243)
- iwlwifi: add firmware version 33 for new 9000 series
- linux-firmware: Add firmware file for Intel
The verification of the Stable Release Update for linux-firmware has
completed successfully and the package has now been released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you
whether this patchset will merge into ubuntu 16.04.4 version or not? this
patchset will important for our DO5 board, Can you check it please?
thank you
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
I wanna let you know that the hardware solution works.
Hope to help someone else, thanks for feedback and suggestions: Mika
Westerberg, Edenbar, Alex Friis.
Problem: UEFI mode, secure boot on, can't boot anything except netboot
but UEFI doesn't let you install a linux distro in order to update
4.13.0-30.33 (available in artful-proposed) don't work for me
4.14.14 works well
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1743094
Title:
hibernation broken (freezes with resume)
** Tags removed: kernel-release-tracking-bug-live
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1744247
Title:
linux-aws: -proposed tracker
Status in Kernel SRU Workflow:
** Tags removed: kernel-release-tracking-bug-live
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1744284
Title:
linux: -proposed tracker
Status in Kernel SRU Workflow:
Invalid
This bug was fixed in the package linux-firmware - 1.169.2
---
linux-firmware (1.169.2) artful; urgency=medium
* Intel 9260/9462/9560 firmware support (LP: #1734243)
- iwlwifi: add firmware version 33 for new 9000 series
- linux-firmware: Add firmware file for Intel
The verification of the Stable Release Update for linux-firmware has
completed successfully and the package has now been released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you
Setting automated-testing to 'Fix Released' based on the test results
from the previous release (3.13.0-140.189).
http://people.canonical.com/~kernel/status/adt-matrix/trusty-linux-
meta.html
** Changed in: kernel-sru-workflow/automated-testing
Status: Confirmed => Fix Released
**
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a member
Setting regression-testing to 'Fix Released' based on test results from
Trusty 3.13.0-141.190 tests (bug 1744308).
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed =>
No regression found.
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1744294
Title:
linux:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-trusty
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-precise
** Tags removed: block-proposed
--
You received this bug notification because
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1744308
Title:
linux: 3.13.0-141.190
I like how all others list this as "critical" or "high" priority, but
Ubuntu is like "it's mostly 32-bit users, *bleep* 'em". Shows that
they're dropping 32-bit support when they don't care about critical
bugs.
The grub edit stuff works btw. Asus EeePC 1005HA here.
--
You received this bug
Yes, probably differences in results due to different hardware.
But based on your and my test results i see 2 probably different
problems:
1. Mine looks quite well as a result of some Ubuntu patch applied in
4.13.0-26 and above - i can use without problems all mainline kernels
and all kernels up
Thanks for your support. I have created an upstream bug report:
https://bugs.freedesktop.org/show_bug.cgi?id=104738
** Bug watch added: freedesktop.org Bugzilla #104738
https://bugs.freedesktop.org/show_bug.cgi?id=104738
--
You received this bug notification because you are a member of
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Changed in:
I built a test kernel with commit 11d7a0bb95ea. The test kernel can be
downloaded from:
http://kernel.ubuntu.com/~jsalisbury/lp1744078
Can you test this kernel and see if it resolves this bug?
Note, to test this kernel, you need to install both the linux-image and
linux-image-extra .deb
Did this issue start happening after an update/upgrade? Was there a
prior kernel version where you were not having this particular problem?
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.15
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.15 kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel does not fix
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.15 kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel does not fix
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in:
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in:
Setting automated-testing to 'Fix Released' based on the test results
from the previous version (4.4.0-111.134).
http://people.canonical.com/~kernel/status/adt-matrix/xenial-linux-
meta.html
** Changed in: kernel-sru-workflow/automated-testing
Status: Confirmed => Fix Released
** Changed
This bug was fixed in the package linux - 3.13.0-141.190
---
linux (3.13.0-141.190) trusty; urgency=low
* linux: 3.13.0-141.190 -proposed tracker (LP: #1744308)
* ubuntu_32_on_64 test crash Trusty 3.13.0-140 amd64 system (LP: #1744199) //
test_too_early_vsyscall from
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux - 4.13.0-31.34
---
linux (4.13.0-31.34) artful; urgency=low
* linux: 4.13.0-31.34 -proposed tracker (LP: #1744294)
[ Stefan Bader ]
* CVE-2017-5715 // CVE-2017-5753
- SAUCE: s390: improve cpu alternative handling for gmb and nobp
*** This bug is a duplicate of bug 1744308 ***
https://bugs.launchpad.net/bugs/1744308
This bug was fixed in the package linux - 3.13.0-141.190
---
linux (3.13.0-141.190) trusty; urgency=low
* linux: 3.13.0-141.190 -proposed tracker (LP: #1744308)
* ubuntu_32_on_64 test
*** This bug is a duplicate of bug 1744244 ***
https://bugs.launchpad.net/bugs/1744244
This bug was fixed in the package linux - 4.4.0-112.135
---
linux (4.4.0-112.135) xenial; urgency=low
* linux: 4.4.0-112.135 -proposed tracker (LP: #1744244)
* CVE-2017-5715 //
*** This bug is a duplicate of bug 1744244 ***
https://bugs.launchpad.net/bugs/1744244
This bug was fixed in the package linux - 4.4.0-112.135
---
linux (4.4.0-112.135) xenial; urgency=low
* linux: 4.4.0-112.135 -proposed tracker (LP: #1744244)
* CVE-2017-5715 //
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
Can you see if this bug happens in the -112 kernel in proposed:
See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed.
Thank you in advance!
** Changed in: linux (Ubuntu)
Importance: Undecided => High
** Tags added: kernel-da-key pti
**
Setting regression to 'Fix Released' based on the test status from the
previous released (3.13.0-140.189) reported on bug 1743375 and positive
verification of the fixes for bug 1744199 and 1744226.
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Fix Released
--
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a member
This bug was fixed in the package linux - 4.4.0-112.135
---
linux (4.4.0-112.135) xenial; urgency=low
* linux: 4.4.0-112.135 -proposed tracker (LP: #1744244)
* CVE-2017-5715 // CVE-2017-5753
- x86/cpuid: Provide get_scattered_cpuid_leaf()
- SAUCE: Fix spec_ctrl support
This bug was fixed in the package linux - 4.13.0-31.34
---
linux (4.13.0-31.34) artful; urgency=low
* linux: 4.13.0-31.34 -proposed tracker (LP: #1744294)
[ Stefan Bader ]
* CVE-2017-5715 // CVE-2017-5753
- SAUCE: s390: improve cpu alternative handling for gmb and nobp
The package has been published and the bug is being set to Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/snap-release-to-beta
Status: Confirmed => Fix Released
** Changed in:
You may need to run the following from a terminal:
sudo apt-get install -f
sudo apt-get clean
sudo apt-get update
Then re-install the package or updates.
If that does not resolve your issue, please mark the bug as "Confirmed"
** Changed in: linux (Ubuntu)
Importance: Undecided => Low
**
@rbalint cool, almost 5 years for that answer. (a completely bogus
answer)
I can tell you've never actually tried FLASH_KERNEL_SKIP, as it doesn't
work in an early debian-install (di) environment.
See: March 15, 2013:
Setting regression-testing to 'Fix Released' based on test results from
previous version (4.4.0-111.134) reported on bug 1743362.
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-trusty
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
Can the fix be downported to 14.04 LTS(4.4 series kernel) release as
well?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1723986
Title:
Touchpad and TrackPoint Does Not Work on Lenovo
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-artful
** Tags removed: block-proposed
--
You received this bug notification because you
This bug was fixed in the package linux - 4.13.0-31.34
---
linux (4.13.0-31.34) artful; urgency=low
* linux: 4.13.0-31.34 -proposed tracker (LP: #1744294)
[ Stefan Bader ]
* CVE-2017-5715 // CVE-2017-5753
- SAUCE: s390: improve cpu alternative handling for gmb and nobp
This bug was fixed in the package linux - 4.13.0-31.34
---
linux (4.13.0-31.34) artful; urgency=low
* linux: 4.13.0-31.34 -proposed tracker (LP: #1744294)
[ Stefan Bader ]
* CVE-2017-5715 // CVE-2017-5753
- SAUCE: s390: improve cpu alternative handling for gmb and nobp
This bug was fixed in the package linux - 4.4.0-112.135
---
linux (4.4.0-112.135) xenial; urgency=low
* linux: 4.4.0-112.135 -proposed tracker (LP: #1744244)
* CVE-2017-5715 // CVE-2017-5753
- x86/cpuid: Provide get_scattered_cpuid_leaf()
- SAUCE: Fix spec_ctrl support
This bug was fixed in the package linux - 4.13.0-31.34
---
linux (4.13.0-31.34) artful; urgency=low
* linux: 4.13.0-31.34 -proposed tracker (LP: #1744294)
[ Stefan Bader ]
* CVE-2017-5715 // CVE-2017-5753
- SAUCE: s390: improve cpu alternative handling for gmb and nobp
This bug was fixed in the package linux - 4.4.0-112.135
---
linux (4.4.0-112.135) xenial; urgency=low
* linux: 4.4.0-112.135 -proposed tracker (LP: #1744244)
* CVE-2017-5715 // CVE-2017-5753
- x86/cpuid: Provide get_scattered_cpuid_leaf()
- SAUCE: Fix spec_ctrl support
*** This bug is a duplicate of bug 1744308 ***
https://bugs.launchpad.net/bugs/1744308
This bug was fixed in the package linux - 3.13.0-141.190
---
linux (3.13.0-141.190) trusty; urgency=low
* linux: 3.13.0-141.190 -proposed tracker (LP: #1744308)
* ubuntu_32_on_64 test
*** This bug is a duplicate of bug 1744294 ***
https://bugs.launchpad.net/bugs/1744294
This bug was fixed in the package linux - 4.13.0-31.34
---
linux (4.13.0-31.34) artful; urgency=low
* linux: 4.13.0-31.34 -proposed tracker (LP: #1744294)
[ Stefan Bader ]
*
This bug was fixed in the package linux - 4.4.0-112.135
---
linux (4.4.0-112.135) xenial; urgency=low
* linux: 4.4.0-112.135 -proposed tracker (LP: #1744244)
* CVE-2017-5715 // CVE-2017-5753
- x86/cpuid: Provide get_scattered_cpuid_leaf()
- SAUCE: Fix spec_ctrl support
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in:
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in:
** Changed in: kernel-sru-workflow/security-signoff
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1744309
Title:
linux-lts-trusty:
Setting automated-testing to 'Fix Released' based on results from
previous version (4.13.0-30.33).
http://people.canonical.com/~kernel/status/adt-matrix/artful-linux-
meta.html
** Changed in: kernel-sru-workflow/automated-testing
Status: Confirmed => Fix Released
** Changed in:
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1744244
Title:
linux: 4.4.0-112.135
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
--- Comment From hbath...@in.ibm.com 2018-01-22 13:19 EDT---
(In reply to comment #0)
> ---Problem Description---
> A default offset of 128MB is enforced for crashkernel by kdump-tools utility
> overriding the kernel default.
>
> While the kernel default offset for crashkernel is also
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1744294
Title:
linux: 4.13.0-31.34
Issue present on my Lenovo Yoga 2 11.
Was using a LiveUSB due to having no internal drive present at the time.
Wanted to try out Ubuntu MATE 17.10 at the time and now I can only boot
from this liveUSB, nothing more. Cannot access the UEFI menu either.
Is it possible to create some sort of
This bug was fixed in the package linux - 3.13.0-141.190
---
linux (3.13.0-141.190) trusty; urgency=low
* linux: 3.13.0-141.190 -proposed tracker (LP: #1744308)
* ubuntu_32_on_64 test crash Trusty 3.13.0-140 amd64 system (LP: #1744199) //
test_too_early_vsyscall from
This bug was fixed in the package linux - 3.13.0-141.190
---
linux (3.13.0-141.190) trusty; urgency=low
* linux: 3.13.0-141.190 -proposed tracker (LP: #1744308)
* ubuntu_32_on_64 test crash Trusty 3.13.0-140 amd64 system (LP: #1744199) //
test_too_early_vsyscall from
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux - 4.13.0-31.34
---
linux (4.13.0-31.34) artful; urgency=low
* linux: 4.13.0-31.34 -proposed tracker (LP: #1744294)
[ Stefan Bader ]
* CVE-2017-5715 // CVE-2017-5753
- SAUCE: s390: improve cpu alternative handling for gmb and nobp
*** This bug is a duplicate of bug 1744294 ***
https://bugs.launchpad.net/bugs/1744294
This bug was fixed in the package linux - 4.13.0-31.34
---
linux (4.13.0-31.34) artful; urgency=low
* linux: 4.13.0-31.34 -proposed tracker (LP: #1744294)
[ Stefan Bader ]
*
You have been subscribed to a public bug:
---Problem Description---
No debug kernel deb packages available for 4.13.0-25-generic kernel [Ubuntu
18.04 ]
Unable to analyze vmcore generated via crash.
---uname output---
Linux spoon2 4.13.0-25-generic #29-Ubuntu SMP Mon Jan 8 21:15:55 UTC 2018
Public bug reported:
---Problem Description---
No debug kernel deb packages available for 4.13.0-25-generic kernel [Ubuntu
18.04 ]
Unable to analyze vmcore generated via crash.
---uname output---
Linux spoon2 4.13.0-25-generic #29-Ubuntu SMP Mon Jan 8 21:15:55 UTC 2018
ppc64le ppc64le
Did this issue start happening after an update/upgrade? Was there a
prior kernel version where you were not having this particular problem?
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.15
Would it be possible for you to test the proposed kernel and post back if it
resolves this bug?
See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to
enable and use -proposed.
Thank you in advance!
** Changed in: linux (Ubuntu)
Importance: Undecided => High
**
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.15 kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel does not fix
Did this issue start happening after an update/upgrade? Was there a
prior kernel version where you were not having this particular problem?
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.15
This bug also affects hogplum, a Dell PowerEdge T610, running Ubuntu
14.04 with a 3.13.0-140 kernel. Here's the uname data from it:
$ uname -a
Linux hogplum 3.13.0-140-generic #189-Ubuntu SMP Mon Jan 15 16:06:29 UTC 2018
x86_64 x86_64 x86_64 GNU/Linux
Running "sudo fwts uefirtmisc" causes a
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1744853
and then change the status of the bug to 'Confirmed'.
If, due to the
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1744852
and then change the status of the bug to 'Confirmed'.
If, due to the
The problem still exists in kernel 4.4.0-112
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1737671
Title:
Blu-ray burner no longer detected
Status in linux package in Ubuntu:
Please try Linux kernel here:
http://people.canonical.com/~khfeng/lp1744712/
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1744712
Title:
Dell XPS 13 9360 bluetooth (Atheros) won't
I installed already linux-hwe using by "sudo apt-get install
--install-recommends linux-kernel-hwe-16.04 xserver-xorg-hwe-16.04'
then, I booted with linux-hwe kernel 4.13.0-31 to do apport-collect.
apport-collect 1744582 says that
dpkg-query: no packages found matching linux
Package linux-hwe
The following patch was NOT applied:
* nvme: Fix memory order on async queue deletion
The reason is that this patch fixes a race condition in function
async_completion() in drivers/nvme/host/pci.c . However, this function had been
removed entirely in commit
None os this kernels has the bug.
Thank you.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1743908
Title:
MODSIGN: Couldn't get UEFI db list
Status in linux package in Ubuntu:
In regards to comment #1 - additional testing, especially around the
nvme area, would be nice.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1744794
Title:
Xenial update to 4.4.101
1 - 100 of 206 matches
Mail list logo