Hi,
We can confirm that this issue still persists as of 4.4.0-103-generic
#126-Ubuntu SMP Mon Dec 4 16:23:28 UTC 2017 x86_64 x86_64 x86_64
GNU/Linux this update.
It only happens on a soft reboot, i.e. 'sudo reboot'.
Not sure if there is a work around for it.
--
You received this bug notificati
Hard to tell regarding updates, I'd say it started early january (but we
did not really pay attention at first). Our players have unattended
security upgrades so I'd say some kernel upgrade landing in january
might have introduced a regression. As far as I know we never
encountered this issue in 20
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.10 kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel does not fix t
The lkml tread you referenced in the bug description was for commit
37b12910dd11d9ab969f2c310dc9160b7f3e3405. That commit landed upstream
in v4.3.rc1, so it is already in the 4.4 based Xenial kernel.
Did this issue start happening after a recent upgrade, or after applying
updates?
--
You receiv
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu)
Importance: Medium => High
** Changed in: linux (Ubuntu Xenial)
Importance: Undecided => High
** Changed in: li
DHCPREQUEST of 10.34.242.77 on eth0 to 10.32.65.65 port 67 (xid=0x30fdf923)
BUG: unable to handle kernel NULL pointer dereference at (null)
IP: [] timecounter_read+0x13/0x60
PGD 0
Oops: [#1] SMP
Modules linked in: rfcomm ipt_MASQUERADE nf_nat_masquerade_ipv4 xt_multiport
xfrm_user
6 matches
Mail list logo