SRU:
* http://10.131.201.69/kernel/jammy-linux-oem/pulls/81 (oem-6.5)
* http://10.131.201.69/kernel/jammy-linux-oem/pulls/82 (oem-6.1)
** Changed in: linux-oem-6.5 (Ubuntu Jammy)
Importance: Undecided => High
** Changed in: linux-oem-6.5 (Ubuntu Jammy)
Status: New => In Progress
** Cha
SRU:
* https://lists.ubuntu.com/archives/kernel-team/2023-October/146164.html (lunar)
* https://lists.ubuntu.com/archives/kernel-team/2023-October/146166.html
(unstable, mantic)
** Also affects: linux-oem-6.5 (Ubuntu)
Importance: Undecided
Status: New
** Also affects: linux-oem-6.1 (Ub
I think if linux-headers package produces /usr/src/linux-
headers-4.15.0-219-generic/vmlinux file everything will "just" work for
everybody.
Although stuff might be surprised if it is not a full vmlinux but just
btf info.
But this might even fix generating btf info for dkms modules.
--
You rece
I'm having the exact same issue albeit on a Lenovo Z16 running Arch
Linux (kernel 6.5.7). I'm curious if your Thinkpad is using the Qualcomm
Bluetooth stack like the Z16 is?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Can you please try refresh to channel 23.10/beta or --revision 1474 and
let me know if this improves things?
** Changed in: linux (Ubuntu)
Status: Triaged => In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Dimitri John Ledkov (xnox)
--
You received this bug notif
** Changed in: linux (Ubuntu)
Status: Incomplete => Triaged
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2034688
Title:
installation of kernel headers fail with "Read-only file
Public bug reported:
Dmesg is full of UBSAN errors to do with the mpt3sas driver when
initializing an mpt2sas device.
[5.012673] UBSAN: array-index-out-of-bounds in
/build/linux-oem-6.5-XiW3QL/linux-oem-6.5-6.5.0/drivers/scsi/mpt3sas/mpt3sas_scsih.c:4667:12
[5.014521] index 1 is out of r
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
apport information
** Attachment added: "acpidump.txt"
https://bugs.launchpad.net/bugs/2039211/+attachment/5708982/+files/acpidump.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/20
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/2039211/+attachment/5708981/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/2039211/+attachment/5708980/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2039211
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/2039211/+attachment/5708979/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/2039211/+attachment/5708977/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.l
apport information
** Attachment added: "PaInfo.txt"
https://bugs.launchpad.net/bugs/2039211/+attachment/5708975/+files/PaInfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2039211
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/2039211/+attachment/5708978/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/2039211/+attachment/5708976/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Changed in: linux (Ubuntu Jammy)
Status: New => In Progress
** Changed in: linux (Ubuntu Jammy)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Jammy)
Assignee: (unassigned) => Kamal Mostafa (kamalmo
apport information
** Tags added: apport-collected
** Description changed:
[114596.323853] [ cut here ]
[114596.323855] WARNING: CPU: 1 PID: 46587 at net/netfilter/nf_nat_core.c:678
nf_nat_setup_info+0x30e/0x360 [nf_nat]
[114596.323865] Modules linked in: tls xt_na
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
Hi garry could you test the kernel in comment #101 please
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2031537
Title:
Ethernet not stable 23.04 (RTL8168/8169)
Status in linux package
6.2.0-34-generic (release)
GRUB_CMDLINE_LINUX_DEFAULT="quiet splash fsck.mode=force fsck.repair=yes
pcie_aspm=off"
When the driver fails, NetworkManager shows "active (running)" and
/sys/class/net/enp2s0/speed shows "1000" :-(
kernel: [ cut here ]
kernel: NETDEV WATCHDO
Thank you for the updated documentation here:
https://wiki.ubuntu.com/RISC-V/StarFive%20VisionFive%202
Finally a hint how to get this working...
Using the brand new image from here:
https://cdimage.ubuntu.com/releases/23.10/release/ubuntu-23.10-preinstalled-
server-riscv64+visionfive2.img.xz
The
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 2039211
and then change the status of the bug to 'Confirmed'.
If, due to the nature
Public bug reported:
[114596.323853] [ cut here ]
[114596.323855] WARNING: CPU: 1 PID: 46587 at net/netfilter/nf_nat_core.c:678
nf_nat_setup_info+0x30e/0x360 [nf_nat]
[114596.323865] Modules linked in: tls xt_nat xt_tcpudp xt_conntrack
nft_chain_nat xt_MASQUERADE nf_nat n
** Attachment added: "journalctl.txt"
https://bugs.launchpad.net/ubuntu/+source/mutter/+bug/1968040/+attachment/5708896/+files/journalctl.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-hwe-5.19 in Ubuntu.
https://bugs.launch
I am also able to reproduce this bug. I logged in via ssh and collected
journal logs and drm_info while the screen was blank and unrecoverable.
MUTTER_DEBUG_ENABLE_ATOMIC_KMS=0 does in fact solve the issue for me.
** Attachment added: "drm_info.txt"
https://bugs.launchpad.net/ubuntu/+source
https://lists.ubuntu.com/archives/kernel-team/2023-October/146153.html
** Also affects: linux-azure (Ubuntu Jammy)
Importance: Undecided
Status: New
** Changed in: linux-azure (Ubuntu Jammy)
Importance: Undecided => Medium
** Changed in: linux-azure (Ubuntu Jammy)
Status: New
** Changed in: mutter
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2034619
Title:
[amdgpu] gnome-shell gets SIGKILL'd when lock screen or under heavy
Public bug reported:
SRU Justification
[Impact]
On Azure, the VM SKU Standard_NC64as_T4_v3's bandwidth is 30 Gbps, but we can
only reach 15~20 Gbps with the 5.15.0-1049-azure kernel in Ubuntu 20.04 or the
6.2.0-1014-azure kernel in Ubuntu 22.04.
After I pick up the upstream patch(es) to enable
Sounds like a good news.
On my side I was also experiencing hw issues (hence many many freezes
and other problems), the motherboard of my laptop has been replaced
recently.
As suggested by someone from lenovo on lenovo forum, I'm now running fedora 38
which seemed to be stable for him (I'm waiti
This is related to kernel 6.5 and happens for me on Ryzen 5 3500U on
Mantic Minotaur.
It is fixed in kernel 6.5.6, as described here:
https://gitlab.freedesktop.org/drm/amd/-/issues/2830
I first saw this on Fedora with kernel 6.5.5 (it was not present on
kernel 6.4) and can confirm kernel 6.5.6 f
Public bug reported:
[Impact]
* Kernel OOPS encountered on 32-bit kernels due to commit cd0e9ab from
git://git.launchpad.net/~canonical-kernel/ubuntu/+source/linux-gcp/+git/lunar
[Fix]
* Clean cherry pick from linux-next, commit 3e3255265291
[Test Case]
* Compile tested
* Boot tested
* To b
Linux-firmware (only) is being added to this build
Oct 11 19:09:07 ziirkaan kernel: Linux version 6.2.0-34-generic
(buildd@bos03-amd64-059) (x86_64-linux-gnu-gcc-11 (Ubuntu
11.4.0-1ubuntu1~22.04) 11.4.0, GNU ld (GNU Binutils for Ubuntu) 2.38)
#34~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Sep 7 13
** Tags removed: verification-needed-jammy
** Tags added: verification-done-jammy
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/2037403
Title:
PCI BARs larger than 128GB are d
** Tags added: architecture-s39064 bugnameltc-203848 severity-medium
targetmilestone-inin---
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2038583
Title:
Turning COMPAT_32BIT_TIME off o
*** This bug is a duplicate of bug 2038981 ***
https://bugs.launchpad.net/bugs/2038981
** This bug has been marked a duplicate of bug 2038981
No external output when hotplugging to a DP monitor after the monitor went
to sleep for AMD 6300 GPU
--
You received this bug notification because
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2039173
Title:
tc goes to 100% CPU and locks
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
Public bug reported:
Install a new Ubuntu 22.04 Jammy system and run the following commands
in a bash shell:
sudo -i
apt-get update && apt-get install -y iproute2 # often not necessary
depmod -a
modprobe ifb numifbs=1
ip link add ifb0 type ifb
ip link set dev ifb0 up
tc qdisc add dev lo ingress
** Changed in: apparmor (Ubuntu)
Status: Confirmed => Invalid
** Changed in: apparmor (Ubuntu Lunar)
Status: Confirmed => Invalid
** Changed in: maas
Status: Fix Committed => Fix Released
** Changed in: apparmor
Status: Fix Committed => Fix Released
--
You received
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2039167
Title:
I get this message "array-inde
Public bug reported:
UBSAN: array-index-out-of-bounds in
/build/linux-D15vQj/linux-6.5.0/drivers/gpu/drm/amd/amdgpu/../pm/powerplay/hwmgr/processpptables.c:929:40
index 1 is out of range for type 'UCHAR [1]'
My firmware version is X515DAP.311.
OS type 64-bit.
GNOME version 45.0.
Kernel version L
*** This bug is a duplicate of bug 2038546 ***
https://bugs.launchpad.net/bugs/2038546
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: linux-starfive (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: apparmor (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/203856
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: snapd (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2038567
This bug was fixed in the package linux-firmware -
20220329.git681281e4-0ubuntu3.21
---
linux-firmware (20220329.git681281e4-0ubuntu3.21) jammy; urgency=medium
* linux-firmware is outdated (LP: #2033441)
- nvidia: update Tu10x and Tu11x signed firmware to support newer Turing HW
This bug was fixed in the package linux-firmware -
20220329.git681281e4-0ubuntu3.21
---
linux-firmware (20220329.git681281e4-0ubuntu3.21) jammy; urgency=medium
* linux-firmware is outdated (LP: #2033441)
- nvidia: update Tu10x and Tu11x signed firmware to support newer Turing HW
The verification of the Stable Release Update for linux-firmware has
completed successfully and the package is now being released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you enco
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: bcache-tools (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-riscv in Ubuntu.
https://bugs.launchpad.net/b
The verification of the Stable Release Update for linux-firmware has
completed successfully and the package is now being released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you enco
This bug was fixed in the package linux-firmware -
20220329.git681281e4-0ubuntu3.21
---
linux-firmware (20220329.git681281e4-0ubuntu3.21) jammy; urgency=medium
* linux-firmware is outdated (LP: #2033441)
- nvidia: update Tu10x and Tu11x signed firmware to support newer Turing HW
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: lightdm (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2038765
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: linux-riscv (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-riscv in Ubuntu.
https://bugs.launchpad.net/bu
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: linux-riscv (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-riscv in Ubuntu.
https://bugs.launchpad.net/bu
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: linux-riscv (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-riscv in Ubuntu.
https://bugs.launchpad.net/bu
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 2039151
and then change the status of the bug to 'Confirmed'.
If, due to the nature
Public bug reported:
[Impact]
Some systems use a special hotkey to mute speaker audio. On systems using
CS35L41 HDA which have this hotkey, add a mechanism which uses ACPI
notifications to detect whether the hotkey is triggered to switch the mute
state.
[Fix]
Backport the fix from Cirrus on li
** Changed in: linux-aws (Ubuntu Lunar)
Importance: Undecided => High
** Changed in: linux-aws (Ubuntu Mantic)
Importance: Undecided => High
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad
** No longer affects: linux (Ubuntu Mantic)
** No longer affects: linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-6.5 in Ubuntu.
https://bugs.launchpad.net/bugs/2031302
Title:
test_290_config_hardened_usercopy
** Package changed: ubuntu => linux-raspi (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-raspi in Ubuntu.
https://bugs.launchpad.net/bugs/2039141
Title:
linux-tools-raspi is missing at least one module needed by usbip
S
You have been subscribed to a public bug:
my install command-line was sudo apt install linux-tools-raspi
if is search for it with apt - I find it. This bug reporting tool told
me it doesn't exist.
~$ apt search linux-tools-raspi
Sorting... Done
Full Text Search... Done
linux-tools-raspi/jammy-up
Public bug reported:
Currently, the wifi NIC comes up with a random MAC address which causes
issues in some environments (routers sending out 'new device added'
messages after every reboot).
Instead, set a unique MAC address at boot and let network manager handle
MAC randomization if that is desi
** Summary changed:
- test_290_config_hardened_usercopy in ubuntu_qrt_kernel_security failed with
J-oem-6.5 (HAVE_HARDENED_USERCOPY_ALLOCATOR does not exist anymore)
+ test_290_config_hardened_usercopy in ubuntu_qrt_kernel_security failed with
J-oem-6.5 / M-linux (HAVE_HARDENED_USERCOPY_ALLOCATO
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 2031302
and then change the status of the bug to 'Confirmed'.
If, due to the nature
I've sent a pull req to fix the test:
https://code.launchpad.net/~p-pisati/qa-regression-testing/+git/qa-
regression-testing/+merge/453326
basically, the HAVE_HARDENED_USERCOPY_ALLOCATOR has been retired in
v6.5-rc1 so the test thinks the option is off and thus the test should
always fail.
** Al
** Tags added: rls-jj-incoming
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2037667
Title:
Regression on Jammy's kernel 5.15 when creating ip6gre and vti6
tunnels
Status in linux pa
66 matches
Mail list logo