Install linux-oem-6.1/6.1.0-1004.4 on PAN14-PV-SKU4_202211-30870
$ hciconfig
hci0: Type: Primary Bus: USB
BD Address: AC:50:DE:72:73:22 ACL MTU: 1021:6 SCO MTU: 240:8
UP RUNNING PSCAN
RX bytes:958 acl:0 sco:0 events:80 errors:0
TX bytes:3915 acl:0 sco:0 comma
SRUed for unstable,
https://lists.ubuntu.com/archives/kernel-team/2023-January/135930.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.14 in Ubuntu.
https://bugs.launchpad.net/bugs/1946433
Title:
Can only reach PC3 when
Install linux-oem-6.0/6.0.0-1010.10 on PAN14-PV-SKU4_202211-30870
$ hciconfig
hci0: Type: Primary Bus: USB
BD Address: AC:50:DE:72:73:22 ACL MTU: 1021:6 SCO MTU: 240:8
UP RUNNING PSCAN
RX bytes:13692 acl:0 sco:0 events:355 errors:0
TX bytes:3933 acl:0 sco:0 c
** Changed in: ubuntu-z-systems
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1995941
Title:
[UBUNTU 20.04] KVM: PV: ext call delivered twic
** Changed in: ubuntu-z-systems
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996071
Title:
[UBUNTU 20.04] boot: Add s390x secure boot trai
** Also affects: linux (Ubuntu Lunar)
Importance: Undecided
Assignee: AceLan Kao (acelankao)
Status: Confirmed
** Also affects: linux-oem-5.13 (Ubuntu Lunar)
Importance: Undecided
Status: Invalid
** Also affects: linux-oem-5.14 (Ubuntu Lunar)
Importance: Undecided
** Changed in: linux-azure (Ubuntu Focal)
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure-4.15 in Ubuntu.
https://bugs.launchpad.net/bugs/1996093
Title:
[RELEASE BLOCKER] Call trace duri
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
All autopkgtests for the newly accepted linux-meta-ibm (5.19.0.1014.11) for
kinetic have finished running.
The following regressions have been reported in tests triggered by the package:
systemd/251.4-1ubuntu7 (amd64)
linux-ibm/5.19.0-1014.15 (amd64)
Please visit the excuses page listed below a
** Changed in: ubuntu-kernel-tests
Assignee: (unassigned) => Po-Hsu Lin (cypressyew)
** Changed in: ubuntu-kernel-tests
Status: New => In Progress
** Changed in: linux (Ubuntu Kinetic)
Assignee: (unassigned) => Po-Hsu Lin (cypressyew)
** Changed in: linux (Ubuntu)
Assignee:
5.15.0-57-generic
[1.341512] UBSAN: shift-out-of-bounds in
/build/linux-cwzuoS/linux-5.15.0/drivers/gpu/drm/amd/amdgpu/../amdkfd/kfd_device_queue_manager.c:997:32
[1.341514] shift exponent 64 is too large for 64-bit type 'long long
unsigned int'
and the crash is also there.
--
You rec
The fix is included in 5.19.0-28.29, which is in kinetic-proposed.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1994126
Title:
NULL pointer dereference in power_supply_get_property
St
Zero speaker_outs sounds like the issue:
[4.273272] snd_hda_codec_realtek hdaudioC0D0: autoconfig for ALC3266:
line_outs=1 (0x17/0x0/0x0/0x0/0x0) type:speaker
[4.273274] snd_hda_codec_realtek hdaudioC0D0:speaker_outs=0
(0x0/0x0/0x0/0x0/0x0)
[4.273276] snd_hda_codec_realtek hdaudi
*** This bug is a duplicate of bug 1783689 ***
https://bugs.launchpad.net/bugs/1783689
Tracking in bug 1783689.
** This bug has been marked a duplicate of bug 1783689
[Dell XPS 15 9560] No sound from speakers
--
You received this bug notification because you are a member of Kernel
Packag
*** This bug is a duplicate of bug 1783689 ***
https://bugs.launchpad.net/bugs/1783689
It looks like ALSA (the kernel) needs some tweaking because it is
reporting "speaker_outs=0"
Jan 05 09:59:52 luis-XPS-15-9560 kernel: snd_hda_codec_realtek hdaudioC0D0:
autoconfig for ALC3266: line_outs=1
Sorry for belated respose.
Johannes, does your system use S3 or S2idle?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988346
Title:
cm32181 module error blocking suspend
Status in li
This bug is awaiting verification that the linux-oracle/5.19.0-1014.16
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-kinetic' to 'verification-done-kinetic'. If the
problem still exi
This bug was fixed in the package linux-gcp - 5.4.0-1097.106
---
linux-gcp (5.4.0-1097.106) focal; urgency=medium
* focal/linux-gcp: 5.4.0-1097.106 -proposed tracker (LP: #1997813)
* b/linux-gcp-5.4: log_check WARNING on n2d-standard-64 (LP: #1958416)
- x86, swiotlb: Adjust S
This bug was fixed in the package linux-raspi - 5.19.0-1011.18
---
linux-raspi (5.19.0-1011.18) kinetic; urgency=medium
* kinetic/linux-raspi: 5.19.0-1011.18 -proposed tracker (LP: #1999742)
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
[ Ubuntu: 5.
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.4.0-136.153
---
linux (5.4.0-136.153) focal; urgency=medium
* focal/linux: 5.4.0-136.153 -proposed tracker (LP: #1997835)
* Expose built-in trusted and revoked certificates (LP: #1996892)
- [Packaging] Expose built-in trusted and re
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.4.0-136.153
---
linux (5.4.0-136.153) focal; urgency=medium
* focal/linux: 5.4.0-136.153 -proposed tracker (LP: #1997835)
* Expose built-in trusted and revoked certificates (LP: #1996892)
- [Packaging] Expose built-in trusted and re
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux-raspi - 5.19.0-1011.18
---
linux-raspi (5.19.0-1011.18) kinetic; urgency=medium
* kinetic/linux-raspi: 5.19.0-1011.18 -proposed tracker (LP: #1999742)
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
[ Ubuntu: 5.
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux-raspi - 5.19.0-1011.18
---
linux-raspi (5.19.0-1011.18) kinetic; urgency=medium
* kinetic/linux-raspi: 5.19.0-1011.18 -proposed tracker (LP: #1999742)
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
[ Ubuntu: 5.
This bug was not opened against linux-xilinx-zynqmp and the s390-tools
package is not relevant for this.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1996071
Title:
[UBUNTU 20.04] boot
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.4.0-136.153
---
linux (5.4.0-136.153) focal; urgency=medium
* focal/linux: 5.4.0-136.153 -proposed tracker (LP: #1997835)
* Expose built-in trusted and revoked certificates (LP: #1996892)
- [Packaging] Expose built-in trusted and re
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.4.0-136.153
---
linux (5.4.0-136.153) focal; urgency=medium
* focal/linux: 5.4.0-136.153 -proposed tracker (LP: #1997835)
* Expose built-in trusted and revoked certificates (LP: #1996892)
- [Packaging] Expose built-in trusted and re
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.15.0-57.63
---
linux (5.15.0-57.63) jammy; urgency=medium
* jammy/linux: 5.15.0-57.63 -proposed tracker (LP: #1997737)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- debian/dkms-versions -- update from kernel-
This bug was fixed in the package linux - 5.4.0-136.153
---
linux (5.4.0-136.153) focal; urgency=medium
* focal/linux: 5.4.0-136.153 -proposed tracker (LP: #1997835)
* Expose built-in trusted and revoked certificates (LP: #1996892)
- [Packaging] Expose built-in trusted and re
This bug was fixed in the package linux - 5.19.0-28.29
---
linux (5.19.0-28.29) kinetic; urgency=medium
* kinetic/linux: 5.19.0-28.29 -proposed tracker (LP: #1999746)
* mm:vma05 in ubuntu_ltp fails with '[vdso] bug not patched' on kinetic/linux
5.19.0-27.28 (LP: #1999094)
This bug was fixed in the package linux - 5.4.0-136.153
---
linux (5.4.0-136.153) focal; urgency=medium
* focal/linux: 5.4.0-136.153 -proposed tracker (LP: #1997835)
* Expose built-in trusted and revoked certificates (LP: #1996892)
- [Packaging] Expose built-in trusted and re
This bug was fixed in the package linux - 5.4.0-136.153
---
linux (5.4.0-136.153) focal; urgency=medium
* focal/linux: 5.4.0-136.153 -proposed tracker (LP: #1997835)
* Expose built-in trusted and revoked certificates (LP: #1996892)
- [Packaging] Expose built-in trusted and re
This bug was fixed in the package linux - 5.4.0-136.153
---
linux (5.4.0-136.153) focal; urgency=medium
* focal/linux: 5.4.0-136.153 -proposed tracker (LP: #1997835)
* Expose built-in trusted and revoked certificates (LP: #1996892)
- [Packaging] Expose built-in trusted and re
This bug was fixed in the package linux - 5.4.0-136.153
---
linux (5.4.0-136.153) focal; urgency=medium
* focal/linux: 5.4.0-136.153 -proposed tracker (LP: #1997835)
* Expose built-in trusted and revoked certificates (LP: #1996892)
- [Packaging] Expose built-in trusted and re
This bug was fixed in the package linux - 5.4.0-136.153
---
linux (5.4.0-136.153) focal; urgency=medium
* focal/linux: 5.4.0-136.153 -proposed tracker (LP: #1997835)
* Expose built-in trusted and revoked certificates (LP: #1996892)
- [Packaging] Expose built-in trusted and re
This bug was fixed in the package linux - 5.4.0-136.153
---
linux (5.4.0-136.153) focal; urgency=medium
* focal/linux: 5.4.0-136.153 -proposed tracker (LP: #1997835)
* Expose built-in trusted and revoked certificates (LP: #1996892)
- [Packaging] Expose built-in trusted and re
This bug was fixed in the package linux - 5.4.0-136.153
---
linux (5.4.0-136.153) focal; urgency=medium
* focal/linux: 5.4.0-136.153 -proposed tracker (LP: #1997835)
* Expose built-in trusted and revoked certificates (LP: #1996892)
- [Packaging] Expose built-in trusted and re
This bug was fixed in the package linux-azure-4.15 - 4.15.0-1158.173
---
linux-azure-4.15 (4.15.0-1158.173) bionic; urgency=medium
* bionic/linux-azure-4.15: 4.15.0-1158.173 -proposed tracker (LP:
#1997851)
* [RELEASE BLOCKER] Call trace during nvme storage performance test in
This bug was fixed in the package linux-raspi2 - 4.15.0-1125.133
---
linux-raspi2 (4.15.0-1125.133) bionic; urgency=medium
* bionic/linux-raspi2: 4.15.0-1125.133 -proposed tracker (LP:
#1997867)
* WARNING: CPU: 3 PID: 34 at /build/linux-raspi2-xwwT5i/linux-
raspi2-4.15.0/driv
This bug is awaiting verification that the linux-gcp/5.19.0-1014.15
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-kinetic' to 'verification-done-kinetic'. If the
problem still exists
On Debian unstable and testing, kernel version 6.0, resuming works fine
on the same hardware.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-meta in Ubuntu.
https://bugs.launchpad.net/bugs/1945289
Title:
Failed to properly resume
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2001567
** Changed in: systemd (Ubuntu)
Status: New => Won't Fix
** Changed in: systemd (Ubuntu)
Status: Won't Fix => Incomplete
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/169994
This bug is awaiting verification that the linux-oem-5.17/5.17.0-1026.27
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-jammy' to 'verification-done-jammy'. If the
problem still exist
This bug is awaiting verification that the linux-oem-5.17/5.17.0-1026.27
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-jammy' to 'verification-done-jammy'. If the
problem still exist
*** This bug is a duplicate of bug 1999213 ***
https://bugs.launchpad.net/bugs/1999213
Thanks -- great to know. Do you know if the fix will be brought into
22.04 ?
And thanks for the help on it.
--
You received this bug notification because you are a member of Kernel
Packages, which is subs
I hit this bug with Ubuntu 22.04 (Jammy) on Kernel 5.15.0-56
For testing, I have set up a RAID1 and a RAID5 in a VM. I put the disks
for each RAID on a separate controller. Based on the 'mdhang' script
(see comment #11), I was able to reproduce the error easily.
I ran 2 'mdhang' scripts at the sa
Cloned "https://git.launchpad.net/~canonical-
kernel/ubuntu/+source/linux-oem/+git/jammy"
Checked out branch: origin/oem-6.1-next e5a7793058a0 UBUNTU: Ubuntu-
oem-6.1-6.1.0-1004.4
Verified commit present to fix issue listed in bug sighting:
commit 46037daaddc52842faba587aed2351c152e0c0dd
Public bug reported:
I've experienced this pretty regularly in the last ~1 year of usage on
ubuntu 20.04.5 LTS with firefox 108.0.1 and the few versions behind it.
when actively using accessibility zoom, and downloading something off of
firefox, the system reliably crashes. sometimes the screen c
Hi Daniel et al,
After a few days of working in the full resolution (even after
hibernating and display swapping) today a resume from suspend again
resulted in a poor resolution on my 4K screen. Disconnecting, swapping
cables, rebooting,... didn't solve the issue. I'm stuck in the poor
resolution
** Tags added: oem-priority originate-from-1998821 somerville
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-6.0 in Ubuntu.
https://bugs.launchpad.net/bugs/2002013
Title:
Fix headset mic not working issue on Dell Latitude 534
Public bug reported:
[SRU Justification]
[Impact]
The Dell Latitude 5430 with Realtek audio codec ALC3254 fail to detect the
headphone microphone and thus unable to record audio.
[Fix]
The realtek audio quirk ALC269_FIXUP_DELL4_MIC_NO_PRESENCE is required since
the NID used for headphone micro
Public bug reported:
These warnings are presented in my kernel logs when I boot.
[jeu. janv. 5 17:14:17 2023] [ cut here ]
[jeu. janv. 5 17:14:17 2023] i915 :00:02.0: drm_WARN_ON(dig_port->tc_mode
!= TC_PORT_TBT_ALT && !tc_phy_is_owned(dig_port))
[jeu. janv. 5 17:
1 - 100 of 165 matches
Mail list logo