Performing verification for jammy
I started a i3.8xlarge instance on AWS, and installed 5.15.0-144-generic from
-updates.
$ uname -rv
5.15.0-144-generic #157-Ubuntu SMP Mon Jun 16 07:33:10 UTC 2025
I ran through the reproducer:
$ lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINTS
xvda 202:
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2117395
[Impact]
The below commit was backported to 5.15.181 -stable, and introduced a NULL
pointer dereference in the raid10 subsystem, due to io_acct_set only being
used
in raid 0 and 456, and not 1 or 10.
com
** Summary changed:
- [Regression] kernel 5.15.0-144-generic - discard broken with RAID10
+ raid10: block discard causes a NULL pointer dereference after
5.15.0-144-generic
** Description changed:
- After upgrading to jammy kernel 5.15.0-144-generic we encountered a
- serious regression when t
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2117123
[Impact]
Tracing tools, such as ebpf fentry programs, can be attached to tasks all the
way to very late in do_exit(), and because of this, synchronize_rcu_tasks()
needs to wait for the dying task to finish and
The patch to enable rcutorture kernel module for testing.
** Patch added: "Kernel config changes to enable CONFIG_RCU_TORTURE_TEST"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2117123/+attachment/5890231/+files/0001-UBUNTU-Config-Enable-CONFIG_RCU_TORTURE_TEST.patch
** Description ch
kaller_logs/tree/main/221115_105658_synchronize_rcu
Upstream mailing list submission:
https://lore.kernel.org/lkml/20240217012745.3446231-1-boqun.f...@gmail.com/T/#u
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Fix Released
** Affects: linux (Ubuntu Noble)
Importance: Med
Public bug reported:
This series just made linux-next and is expected to land in v6.17. It
adds support for device cacheable memory within a VM and is needed to
support GPU PT on NVIDIA Grace systems.
Lore discussion:
https://lore.kernel.org/all/20250705071717.5062-1-ank...@nvidia.com/
Upstream
Performing verification for noble.
My user ran 6.8.0-63-generic on an AWS instance, and connected multiple
iSCSI disks, created a raid1 array, copied some data, and then started a check
operation.
They then forcefully disconnected all the iSCSI devices, and the kernel did
not panic.
They are ha
Performing verification for Oracular.
My user ran 6.11.0-29-generic on an AWS instance, and connected multiple
iSCSI disks, created a raid1 array, copied some data, and then started a check
operation.
They then forcefully disconnected all the iSCSI devices, and the kernel did
not panic.
They ar
Fix released plucky 6.14.0-20-generic
** Changed in: linux (Ubuntu Plucky)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2112519
Title:
rai
** Changed in: linux (Ubuntu Noble)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Oracular)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bu
Upstream mailing list discussion:
https://lore.kernel.org/linux-pci/20250611101442.387378-1-hui.w...@canonical.com/T/
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2111521
Title:
nvme n
Submitted to the Kernel Team mailing list:
Cover letter:
https://lists.ubuntu.com/archives/kernel-team/2025-June/160217.html
Patch:
https://lists.ubuntu.com/archives/kernel-team/2025-June/160218.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subs
** Description changed:
+ Subject: raid1: Fix NULL pointer de-reference in process_checks()
+
BugLink: https://bugs.launchpad.net/bugs/2112519
[Impact]
-
+ A null pointer dereference was found in raid1 during failure mode testing.
+ A raid1 array was set up, filled with data and a chec
rtance: Undecided
Status: Fix Released
** Affects: linux (Ubuntu Jammy)
Importance: Undecided
Status: Fix Committed
** Affects: linux (Ubuntu Noble)
Importance: Medium
Assignee: Matthew Ruffell (mruffell)
Status: In Progress
** Affects: linux (Ubuntu Or
** Changed in: linux (Ubuntu Noble)
Status: Won't Fix => Fix Released
** Changed in: linux (Ubuntu Oracular)
Status: Won't Fix => Fix Released
** Changed in: linux (Ubuntu Plucky)
Status: Won't Fix => Fix Released
** Changed in: linux (Ubuntu Questing)
Status: Won't F
of below:
a) the filesystem is mounted by a non-root user via sudo and/or specified
uid=!0, or
b) the multiuser mount option specified, or
c) the cruid mount option specified
Thanks,
Matthew
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed t
it should fix the issue. I am building new test packages
right now.
Will write back once they are ready.
Thanks,
Matthew
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2099914
Title
? arg->pid : 0);
to something a little more reasonable. I just need to balance regression risk,
vs closing the actual CVE, to try not cause any further disruption.
Again, I am sorry for any inconvenience caused.
Thanks,
Matthew
--
You received this bug notification because you are a me
the patch to the git tree.
I'll write back once that has happened.
Thanks,
Matthew
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2107516
Title:
Mounting btrfs LVM volumes ch
Performing verification for focal.
This will cover both the kernel and the cifs-utils package. both in
-proposed.
This is going to be long, as we need to test:
* patched kernel, patched cifs-utils
* patched kernel, existing cifs-utils
* existing kernel, patched cifs-utils
I started a fresh focal
Performing verification for jammy.
This will cover both the kernel and the cifs-utils package. both in
-proposed.
This is going to be long, as we need to test:
* patched kernel, patched cifs-utils
* patched kernel, existing cifs-utils
* existing kernel, patched cifs-utils
I started a fresh jammy
Performing verification for noble.
This will cover both the kernel and the cifs-utils package. both in
-proposed.
This is going to be long, as we need to test:
* patched kernel, patched cifs-utils
* patched kernel, existing cifs-utils
* existing kernel, patched cifs-utils
I started a fresh noble
Performing verification for oracular.
This will cover both the kernel and the cifs-utils package. both in
-proposed.
This is going to be long, as we need to test:
* patched kernel, patched cifs-utils
* patched kernel, existing cifs-utils
* existing kernel, patched cifs-utils
I started a fresh Or
Public bug reported:
This series was upstreamed in v6.15 and provides a driver to support
communicating with a CRB-based TPM service over FF-A. This will be
needed for some upcoming NVIDIA SoCs. Backport to 24.04-linux-
nvidia-6.11 and 24.04-linux-nvidia-6.14.
Lore: https://lore.kernel.org/all/2
** Description changed:
This patch provides a HDA controller driver needed for some upcoming
NVIDIA SoCs that use ACPI rather than devicetree. It is in the process
of being upstreamed, and was picked from the Maintainer's "for-next"
- branch. Backport to 24.04-linux-nvidia-6.11 and 24.04-lin
** Description changed:
This patch provides a HDA controller driver needed for some upcoming
NVIDIA SoCs that use ACPI rather than devicetree. It is in the process
- of being upstreamed, but it is unclear at the moment when it will be
- taken by the Maintainer. Backport to 24.04-linux-nvidia-6
Public bug reported:
This patch provides a HDA controller driver needed for some upcoming
NVIDIA SoCs that use ACPI rather than devicetree. It is in the process
of being upstreamed, but it is unclear at the moment when it will be
taken by the Maintainer. Backport to 24.04-linux-nvidia-6.11 and
24.
We all have felt the frustration of evdi being out of tree for years
now, with constant breakage between the DRM subsystem and the evdi.ko
kernel module.
The best outcome would be to mainline the driver. There's a lot of
history behind it here:
https://github.com/DisplayLink/evdi/issues/25
The s
Kernel Team to review the patch, and we need 2x
acks from Senior Kernel Team members to get approved for the next SRU
cycle.
I'll keep an eye out and let you know as things move forward.
Thanks,
Matthew
--
You received this bug notification because you are a member of Kernel
Packages, whi
** Changed in: linux (Ubuntu)
Status: New => Invalid
** Changed in: linux (Ubuntu Jammy)
Status: New => In Progress
** Changed in: linux (Ubuntu Jammy)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Jammy)
Assignee: (unassigned) => Matthew Ruffe
Vinicius Peixoto has submitted the kernel patches for -generic to the
Kernel
Team mailing list:
Cover letter:
https://lists.ubuntu.com/archives/kernel-team/2025-April/159465.html
Patches:
https://lists.ubuntu.com/archives/kernel-team/2025-April/159466.html
https://lists.ubuntu.com/archives/k
I have the same symptoms but with a Filco Majestouch2 keyboard.
This is on a Lenovo IdeaPad 5 with the following details in lshw:
*-usb:3
description: Bluetooth wireless interface
product: AX201 Bluetooth
vendor: Intel Corp.
Public bug reported:
This v6.14 series fixes the list of supported events and filters in NVIDIA
Grace CoreSight PMUs. Backport to 24.04-linux-nvidia and
24.04-linux-nvidia-6.11.
Lore discussion:
https://lore.kernel.org/all/20241031142118.1865965-1-bwicaks...@nvidia.com/
Upstream SHAs:
ac4c52
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
This is currently in -proposed2 for 5.15.0-1080-gke.
** Changed in: linux-gke (Ubuntu Jammy)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gke in Ubuntu.
https://bugs.launchpad.net/bugs/2103564
OEM kernel, they are really meant for Laptop users and not
for servers.
Thanks,
Matthew
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2062568
Title:
nfsd gets unresponsive after som
Also, I am having trouble reproducing the problem. Any chance that you can help
make a testcase?
I made a 5G disk, made a PV, VG and LV, and then made a btrfs filesystem. But
I could never get the udev trigger to actually occur to rename the device
links.
Any ideas?
$ uname -rv
5.15.0-127-generi
** Also affects: linux (Ubuntu Jammy)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2107516
Title:
Ubuntu 22.04 kernel 5.15.0.136 changes /pr
Hi Luca,
The 6.8.0-58-generic and 6.11.0-24-generic kernels have been released to
-updates now. You should be good to go.
Thanks,
Matthew
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs
mostly used by hardware manufacturers to install firmware updates to
consumer devices like laptops, desktops etc. For enterprise servers its
still usually done in the iDRAC / ILO interface instead.
Anyway, there's no rush, you can patch whenever it suits you.
Thanks,
Matthew
** Changed in:
firmware updates.
If you install the update it will stop pestering you to update on
startup.
Thanks,
Matthew
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2107251
Title:
UEFI dbx does
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870091/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.l
apport information
** Attachment added: "PaInfo.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870089/+files/PaInfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2106352
apport information
** Attachment added: "Lspci-vt.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870085/+files/Lspci-vt.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/21
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870074/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.l
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870095/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2106352
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870093/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Tags added: apport-collected xia
** Description changed:
Audio freezes/loops (UBSAN DAPM errors) on Acer Chromebook 14 (Edgar) /
Atom x5-E8000 / RT5650 (SOF) with Kernel 6.8 / 6.11
Hardware:
System: Acer Chromebook 14 (CB3-431)
Board Name: GOOGLE Edgar (Conf
** Description changed:
BugLink: https://bugs.launchpad.net/bugs/2099914
[Impact]
This is CVE-2025-2312, where namespace confusion by cifs.upcall may lead to
disclosing sensitive data from the host or container Kerberos credentials
cache
by accessing the wrong credential cache tha
ty/CVE-2025-2312
+ https://nvd.nist.gov/vuln/detail/CVE-2025-2312
** Changed in: linux (Ubuntu Focal)
Assignee: Matthew Ruffell (mruffell) => Vinicius Peixoto (vpeixoto)
** Changed in: linux (Ubuntu Jammy)
Assignee: Matthew Ruffell (mruffell) => Vinicius Peixoto (vpeixoto)
** Chang
apport information
** Attachment added: "Lsusb-t.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870070/+files/Lsusb-t.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2106
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870066/+files/IwConfig.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/21
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870073/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "Lsusb-v.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870088/+files/Lsusb-v.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2106
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870079/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "Lsusb-v.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870071/+files/Lsusb-v.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2106
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870086/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2106352
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870067/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2106352
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870076/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870092/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
Responding to the request above:
I have now run sudo apport-collect 2106352. The collected system
information should be attached to this report.
Regarding whether the audio worked on older kernels:
I installed Linux Mint 22.1 "Xia" (based on Ubuntu 24.04 "Noble")
recently. It came with the 6.8 k
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870096/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "acpidump.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870097/+files/acpidump.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/21
apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870094/+files/RfKill.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2106352
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870090/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870078/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2106352
apport information
** Attachment added: "Lsusb-t.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870087/+files/Lsusb-t.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2106
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870084/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2106352
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870082/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870083/+files/IwConfig.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/21
apport information
** Attachment added: "AlsaInfo.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870081/+files/AlsaInfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/21
apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870077/+files/RfKill.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2106352
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870075/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "acpidump.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870080/+files/acpidump.txt
** Description changed:
Audio freezes/loops (UBSAN DAPM errors) on Acer Chromebook 14 (Edgar) /
Atom x5-E8000 / RT5650 (SOF) with Kernel 6.8 / 6.11
apport information
** Attachment added: "PaInfo.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870072/+files/PaInfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2106352
apport information
** Attachment added: "Lspci-vt.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870068/+files/Lspci-vt.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/21
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870069/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2106352
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/2106352/+attachment/5870065/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
Performing verification for oracular.
Firstly, I started with 6.11.0-21-generic with the following commit
reverted:
commit ab99a87542f194f28e2364a42afbf9fb48b1c724
Author: Ofir Gal
Date: Fri Jun 7 10:27:44 2024 +0300
Subject: md/md-bitmap: fix writing non bitmap pages
Link:
https://git.kernel.o
Performing verification for noble.
Firstly, I started with 6.8.0-57-generic with the following commit
reverted:
commit ab99a87542f194f28e2364a42afbf9fb48b1c724
Author: Ofir Gal
Date: Fri Jun 7 10:27:44 2024 +0300
Subject: md/md-bitmap: fix writing non bitmap pages
Link:
https://git.kernel.org/p
** Description changed:
- Bug Report
-
- Title: Audio freezes/loops (UBSAN DAPM errors) on Acer Chromebook 14
- (Edgar) / Atom x5-E8000 / RT5650 (SOF) with Kernel 6.8 / 6.11
+ Audio freezes/loops (UBSAN DAPM errors) on Acer Chromebook 14 (Edgar) /
+ Atom x5-E8000 / RT5650 (SOF) with Kernel 6.8 /
Public bug reported:
Bug Report
Title: Audio freezes/loops (UBSAN DAPM errors) on Acer Chromebook 14
(Edgar) / Atom x5-E8000 / RT5650 (SOF) with Kernel 6.8 / 6.11
Hardware:
System: Acer Chromebook 14 (CB3-431)
Board Name: GOOGLE Edgar (Confirmed via dmidecode)
CPU: Intel(R) Atom(TM) x5-E8000 CP
the Kernel Team: I have also run both the 6.11 and 6.8 kernels
through xfstests btrfs/* and had both runs complete with identical
results to -updates, since I can't exactly reproduce this issue myself.
I have enough confidence to mark this as verified.
Thanks,
Matthew
** Tags re
Attached is a debdiff for cifs-utils on oracular
** Patch added: "Debdiff for cifs-utils on oracular"
https://bugs.launchpad.net/ubuntu/oracular/+source/linux/+bug/2099914/+attachment/5868795/+files/lp2099914_oracular.debdiff
--
You received this bug notification because you are a member of
Attached is a debdiff for cifs-utils on jammy
** Patch added: "Debdiff for cifs-utils on jammy"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2099914/+attachment/5868797/+files/lp2099914_jammy.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, w
Attached is a debdiff for cifs-utils on focal
** Patch added: "Debdiff for cifs-utils on Focal"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2099914/+attachment/5868798/+files/lp2099914_focal.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, w
Attached is a debdiff for cifs-utils on noble
** Patch added: "Debdiff for cifs-utils on noble"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2099914/+attachment/5868796/+files/lp2099914_noble.debdiff
--
You received this bug notification because you are a member of Kernel
Packages, w
** Changed in: cifs-utils (Ubuntu Focal)
Importance: Undecided => Medium
** Changed in: cifs-utils (Ubuntu Focal)
Status: New => In Progress
** Changed in: cifs-utils (Ubuntu Focal)
Assignee: (unassigned) => Matthew Ruffell (mruffell)
** Changed in: cifs-utils (Ubu
Fixed in plucky in:
cifs-utils 2:7.2-2
linux 6.14.0-13-generic
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: cifs-utils (Ubuntu Plucky)
Importance: Undecided
8.0-58-generic linux-modules-6.8.0-58-generic
linux-modules-extra-6.8.0-58-generic linux-headers-6.8.0-58-generic
4) sudo reboot
5) uname -rv
6.8.0-58-generic #60-Ubuntu SMP PREEMPT_DYNAMIC Fri Mar 14 18:29:48 UTC 2025
Thanks,
Matthew
--
You received this bug notification because you are a mem
Public bug reported:
This small series replaces some out-of-tree patches with their [now] upstream
counterparts. The version of the series that made it upstream differed slightly
from the SAUCE patches based upon feedback on the mailing list:
- Blackwell PCI device ID addition was split into a
Patches submitted to the Kernel Team Mailing List
Cover Letter:
https://lists.ubuntu.com/archives/kernel-team/2025-March/158128.html
Patch:
https://lists.ubuntu.com/archives/kernel-team/2025-March/158129.html
--
You received this bug notification because you are a member of Kernel
Packages, whic
1 - 100 of 996 matches
Mail list logo