Does this issue still happen on up-to-date Bionic?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1807348
Title:
kernel BUG at arch/x86/mm/pat.c when authorising thunderbolt eGPU
In xenial with hwe stack I got 4.15.0-46-generic now also and the bug is
gone.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1813873
Title:
Userspace break as a result of missing patch
** Attachment added: "dmesg.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1818407/+attachment/5243877/+files/dmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Okay, downloaded all debs then dpkg -i ./*.deb and update-grub then reboot:
patakija@patakija-TP202NAS:~$ uname -r
4.18.0-16-generic
patakija@patakija-TP202NAS:~$ dmesg | grep mmc
[3.165138] mmc0: SDHCI controller on PCI [:00:1c.0] using ADMA 64-bit
[3.284207] mmc0: mmc_select_hs400
Please test this kernel:
https://people.canonical.com/~khfeng/lp1818407/
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1818407
Title:
Cant access emmc, error -84
Status in linux
** Attachment added: "1257738916.jpg"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1818609/+attachment/5243621/+files/1257738916.jpg
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Attached is the pictures of this bug
** Attachment added: "1274037136.jpg"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1818609/+attachment/5243620/+files/1274037136.jpg
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
Public bug reported:
An OEM system is suffering from screen corruption when the touchpad is
used. This would be fixed by backporting these commits from 4.18:
ebdef28ebbcf767 drm/amdgpu/gmc: steal the appropriate amount of vram for fw
hand-over (v3)
6f752ec2c20c6a5 drm/amdgpu: Free VGA stolen
What's the symptom when you remove all the kernel parameters?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1818580
Title:
[drm:amdgpu_init [amdgpu]] *ERROR* VGACON disables amdgpu
I talked to Kai-Heng about this issue and he agrees that although it's
not completely fixed by the patches applied they don't introduce further
regressions. Based on that, we will proceed with Bionic and Cosmic
kernels promotion to -updates. Follow up fixes can be submitted for a
future kernel
@Kai-Heng Feng (kaihengfeng)
No change, same behavior. I removed all parameters except "ro"
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1818580
Title:
[drm:amdgpu_init [amdgpu]]
Possible to re-test v5.0? If it doesn't solve the issue, a kernel
bisection is needed.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1702265
Title:
High fan speed after suspend then
Have you tried -generic kernel instead of -lowlatency?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1818580
Title:
[drm:amdgpu_init [amdgpu]] *ERROR* VGACON disables amdgpu kernel
nope i didnt lets test now
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1818580
Title:
[drm:amdgpu_init [amdgpu]] *ERROR* VGACON disables amdgpu kernel
modesetting.
Status in
Default Comment by Bridge
** Attachment added: "sosreport host"
https://bugs.launchpad.net/bugs/1818645/+attachment/5243655/+files/sosreport-cs-host-f37-ac922-3.guestcrash-20190228053237.tar.xz
** Changed in: ubuntu
Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage
@Kai-Heng Feng (kaihengfeng)
NO change again, same behavior with -generic kernel
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1818580
Title:
[drm:amdgpu_init [amdgpu]] *ERROR* VGACON
Are the logs collected after hibernation?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1818381
Title:
Two finger scroll does not work after hibernate
Status in linux package in
Hi Mark,
According to comment
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1818340/comments/8,
the systemd-networkd issue has been isolated to systemd and verified
that it's not a regression introduced by kernel 4.15.0-46-generic.
So considering the assessment of bug #1818340 and the
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Description changed:
This bug is for tracking the 4.15.0-1016.18 upload package. This bug
will contain status and testing results related to that upload.
For an explanation of the tasks
Ok.
Thank you for solving this issue!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1818204
Title:
Qualcomm Atheros QCA9377 wireless does not work
Status in linux package in Ubuntu:
Patch sent:
https://lkml.org/lkml/2019/3/5/133
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1818204
Title:
Qualcomm Atheros QCA9377 wireless does not work
Status in linux package in
Does this issue happen on previous kernel version?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1818275
Title:
PCI/internal sound card not detected
Status in linux package in Ubuntu:
You have been subscribed to a public bug:
i cannot boot PC normally, i must use recovery mode.
ProblemType: Bug
DistroRelease: Ubuntu 19.04
Package: xserver-xorg-video-amdgpu 18.1.99+git20190207-1
ProcVersionSignature: Ubuntu 5.0.0-7.8-lowlatency 5.0.0
Uname: Linux 5.0.0-7-lowlatency x86_64
And yes, the "NOMODESET" parameter lets me boot, but performance is
really awful :(
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1568211
Title:
Unable to boot
Status in linux package
Hey Andrea,
I have the same problem as you. There are still some regions of the
earth where it is still March 4th. I hope the fix will be released soon.
It is sad that of all things, the both LTS versions which are advertised
to be used for better reliability and stability, seem to get fixed at
I'm located in solar > earth > europe but still waiting for the -update
version of xenial too (@_@)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1813873
Title:
Userspace break as a
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
Issue remains in latest 4.15.0-1040-azure.
No new version for kdump-tools - latest 1.5.5-2ubuntu1.6.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1804054
Title:
[Hyper-V] kdump
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-trusty
** Tags removed: block-proposed
** Description changed:
This bug is for
In the long run, the driver should be included in the kernel...
** Changed in: linux (Ubuntu)
Status: Confirmed => Opinion
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1816493
You have been subscribed to a public bug:
== Comment: #0 - Satheesh Rajendran - 2019-02-28 04:38:22
==
---Problem Description---
Power8 Compat guest(RHEL 7.6) crashes during guest boot with > 256G of memory
(kernel/kvm)
Contact Information = sathe...@in.ibm.com
---uname output---
Host
Didn't freeze overnight, so maybe 4.16 fixed the issue.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1818219
Title:
Lenovo T480 freezes after screen has been locked
Status in linux
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1818612
and then change the status of the bug to 'Confirmed'.
If, due to the
Hello Christopher,
I already did, but as i was unsure about the affected package, i set it
to xserver-xorg-video-amdgpu instead of Linux
https://bugs.launchpad.net/ubuntu/+source/xserver-xorg-video-
amdgpu/+bug/1818580
--
You received this bug notification because you are a member of
This works with ARM64 ThunderX node "starmie" on 18.04 with 4.15 kernel
It looks like since 4.18 kernel, this SyS_write has been changed into
ksys_write
Test result from 5.0.0 ARM64 ThunderX node "wright"
# grep ksys_write ftrace.log |grep dd | tail
dd-1389 [002]
Once the fix is in the default Bionic kernel, you can switch back to use
it.
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Kai-Heng Feng (kaihengfeng)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
What's the reason for -lowlatency instead of -generic?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1818187
Title:
Any USB plugged works slow or even not detected well
Status in
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-bionic
** Tags removed: block-proposed
** Description changed:
This bug is for
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-bionic
** Tags removed: block-proposed
** Description changed:
This bug is for
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-bionic
** Tags removed: block-proposed
** Description changed:
This bug will contain
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-bionic
** Tags removed: block-proposed
** Description changed:
This bug is for
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
** Description changed:
This bug is for
John, please test this kernel:
https://people.canonical.com/~khfeng/lp1771431/
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1771431
Title:
Lenovo Essential Wireless Keyboard doesn't
Upstream bug in https://bugzilla.kernel.org/show_bug.cgi?id=202571 .
** Bug watch added: Linux Kernel Bug Tracker #202571
https://bugzilla.kernel.org/show_bug.cgi?id=202571
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in
** Package changed: xserver-xorg-video-amdgpu (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1818580
Title:
[drm:amdgpu_init [amdgpu]] *ERROR* VGACON disables
Am I wrong or the fix hasn't yet been released?
I understood the release date was the 4th March.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1813873
Title:
Userspace break as a
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1818580
Title:
[drm:amdgpu_init [amdgpu]]
Verification tests completed successfully with this kernel, marking
verification-testing as 'Fix Released'.
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
Do other types of USB device other than disk cause the same symptom?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1817419
Title:
USB ports conflict with each other
Status in linux
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-bionic
** Tags removed: block-proposed
** Description changed:
This bug is for
** Changed in: kernel-sru-workflow/automated-testing
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-bionic
** Tags removed: block-proposed
** Description changed:
This bug is for
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
** Description changed:
This bug is for
After changing the guest image to match the host (e.g. bionic on
bionic), this seems to be working now.
Tested with B / D, need to keep an eye on this for other releases.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
bionic has 4.18 backport now, installed with 18.04.2 image or manually
via 'linux-generic-hwe-18.04'
** Changed in: linux (Ubuntu Bionic)
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
I am having similar problems with Dell Optiplex 7060 running Ubuntu
18.04.2. I think the problem is connected with the chipset they are
using since other machines are fine.
The network is extremely slow with the e1000e module provided by Ubuntu
(3.2.6-k). Compiling the latest driver from Intel
I don't believe this is a bug in Checkbox, checkbox can only use the
info that the kernel and system tools provide. This could be a driver
issue, or perhaps a cabling issue. Could you
A: verify the cables are plugged into the correct places and check via ethtool
what the connect speeds are for
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-raspi2 - 4.15.0-1032.34
---
linux-raspi2 (4.15.0-1032.34) bionic; urgency=medium
* linux-raspi2: 4.15.0-1032.34 -proposed tracker (LP: #1814728)
* Packaging resync (LP: #1786013)
- [Packaging] update update.conf
* rpi-cm3 dtb is not
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-kvm - 4.15.0-1030.30
---
linux-kvm (4.15.0-1030.30) bionic; urgency=medium
* linux-kvm: 4.15.0-1030.30 -proposed tracker (LP: #1814736)
* CONFIG_SECURITY_SELINUX_DISABLE should be disabled on KVM kernel
(LP: #1812153)
- [Config]:
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-gcp - 4.15.0-1028.29~16.04.1
---
linux-gcp (4.15.0-1028.29~16.04.1) xenial; urgency=medium
* linux-gcp: 4.15.0-1028.29~16.04.1 -proposed tracker (LP: #1814744)
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
[
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-oem - 4.15.0-1034.39
---
linux-oem (4.15.0-1034.39) bionic; urgency=medium
* linux-oem: 4.15.0-1034.39 -proposed tracker (LP: #1814730)
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
* Miscellaneous upstream
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated
This bug was fixed in the package linux-aws - 4.15.0-1033.35
---
linux-aws (4.15.0-1033.35) bionic; urgency=medium
* linux-aws: 4.15.0-1033.35 -proposed tracker (LP: #1814731)
[ Ubuntu: 4.15.0-46.49 ]
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails
*** This bug is a duplicate of bug 1736390 ***
https://bugs.launchpad.net/bugs/1736390
** This bug has been marked a duplicate of bug 1736390
openvswitch: kernel oops destroying interfaces on i386
--
You received this bug notification because you are a member of Kernel
Packages, which is
This bug was fixed in the package linux - 4.15.0-46.49
---
linux (4.15.0-46.49) bionic; urgency=medium
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails on ext4 with dax (LP: #1799237)
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion
*
This bug was fixed in the package linux - 4.15.0-46.49
---
linux (4.15.0-46.49) bionic; urgency=medium
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails on ext4 with dax (LP: #1799237)
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion
*
This bug was fixed in the package linux - 4.15.0-46.49
---
linux (4.15.0-46.49) bionic; urgency=medium
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails on ext4 with dax (LP: #1799237)
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion
*
This bug was fixed in the package linux - 4.15.0-46.49
---
linux (4.15.0-46.49) bionic; urgency=medium
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails on ext4 with dax (LP: #1799237)
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion
*
This bug was fixed in the package linux - 4.15.0-46.49
---
linux (4.15.0-46.49) bionic; urgency=medium
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails on ext4 with dax (LP: #1799237)
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion
*
This bug was fixed in the package linux - 4.15.0-46.49
---
linux (4.15.0-46.49) bionic; urgency=medium
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails on ext4 with dax (LP: #1799237)
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion
*
This bug was fixed in the package linux - 4.15.0-46.49
---
linux (4.15.0-46.49) bionic; urgency=medium
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails on ext4 with dax (LP: #1799237)
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion
*
This bug was fixed in the package linux - 4.15.0-46.49
---
linux (4.15.0-46.49) bionic; urgency=medium
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails on ext4 with dax (LP: #1799237)
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion
*
This bug was fixed in the package linux - 4.15.0-46.49
---
linux (4.15.0-46.49) bionic; urgency=medium
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails on ext4 with dax (LP: #1799237)
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion
*
This bug was fixed in the package linux - 4.15.0-46.49
---
linux (4.15.0-46.49) bionic; urgency=medium
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails on ext4 with dax (LP: #1799237)
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion
*
This bug was fixed in the package linux - 4.15.0-46.49
---
linux (4.15.0-46.49) bionic; urgency=medium
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails on ext4 with dax (LP: #1799237)
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion
*
This bug was fixed in the package linux - 4.15.0-46.49
---
linux (4.15.0-46.49) bionic; urgency=medium
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails on ext4 with dax (LP: #1799237)
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion
*
This bug was fixed in the package linux - 4.15.0-46.49
---
linux (4.15.0-46.49) bionic; urgency=medium
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails on ext4 with dax (LP: #1799237)
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion
*
This bug was fixed in the package linux - 4.15.0-46.49
---
linux (4.15.0-46.49) bionic; urgency=medium
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails on ext4 with dax (LP: #1799237)
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion
*
This bug was fixed in the package linux - 4.15.0-46.49
---
linux (4.15.0-46.49) bionic; urgency=medium
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails on ext4 with dax (LP: #1799237)
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion
*
please test the new mesa on bionic/cosmic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1815172
Title:
Black screen on skylake after 18.0 => 18.2 update
Status in Mesa:
Fix Released
This bug was fixed in the package linux - 4.15.0-46.49
---
linux (4.15.0-46.49) bionic; urgency=medium
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails on ext4 with dax (LP: #1799237)
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion
*
This bug was fixed in the package linux - 4.15.0-46.49
---
linux (4.15.0-46.49) bionic; urgency=medium
* linux: 4.15.0-46.49 -proposed tracker (LP: #1814726)
* mprotect fails on ext4 with dax (LP: #1799237)
- x86/speculation/l1tf: Exempt zeroed PTEs from inversion
*
Update?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1813873
Title:
Userspace break as a result of missing patch backport
Status in linux package in Ubuntu:
Fix Committed
Status in
Assuming that this happens with all guests with more than 256GB of
memory, since it's a KVM host kernel side issue.
** Also affects: ubuntu-power-systems
Importance: Undecided
Status: New
** Changed in: ubuntu-power-systems
Importance: Undecided => High
** Changed in:
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
derivatives: bug 1818200
1 - 100 of 237 matches
Mail list logo