Hello Guys
Posted the wrong link again.
http://www.nextized.net/repo/linux/ubuntu-
linux-4.11.0_ryzen01_amd64_generic.tar.gz
This is the new 4.11.0 Final without AMD_PINCTRL.
Thanks you for testing it.
--
You received this bug notification because you are a member of Kernel
Packages, which is
Just to state that also affected me, seen many different bug reports (in
different distros) and the general proposed solution is to upgrade BIOS.
I already upgrade my BIOS and still facing the same issue.
--
You received this bug notification because you are a member of Kernel
Packages, which is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I would prefer 4.11.0 as it supports most of the mainboards newer ACL
sound codecs:
http://www.nextized.net/repo/linux/ubuntu-
linux-4.11.0_ryzen01_amd64_generic.tar.gz
As I can tell, Gigabyte is not really takling the issue because only a
very small number of people are affected by it. Alternate
The line from dpkg.log reporting installation of this kernel package is:
2020-12-01 06:19:50 status installed linux-image-5.4.0-56-generic:amd64
5.4.0-56.62
** Package changed: ubuntu => linux (Ubuntu)
** Description changed:
This is occurring on Ubuntu 20.04 with kernel 5.4.0-56-generic.
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440074/+files/IwConfig.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/19
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440072/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1906418
Ti
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440075/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1906418
apport information
** Attachment added: "Lspci-vt.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440076/+files/Lspci-vt.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/19
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440073/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Tags added: apport-collected focal
** Description changed:
This is occurring on Ubuntu 20.04 with kernel 5.4.0-56-generic.
To demonstrate, run
$ sudo tcpdump -nv -ienp4s0 igmp
(adjusting the interface name appropriately).
The result will be 0 packets capture
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440077/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1906418
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440083/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "Lsusb-v.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440079/+files/Lsusb-v.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1906
apport information
** Attachment added: "Lsusb-t.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440078/+files/Lsusb-t.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1906
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440081/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.l
apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440085/+files/RfKill.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1906418
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440082/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440086/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1906418
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440084/+files/PulseList.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440080/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440087/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "acpidump.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440088/+files/acpidump.txt
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, whic
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
you run into the same issue and has this been fixed for you on 5.4.0-48 as
well?
Kind regards,
Marc
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1886277
Title:
Regression on NFS
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hi,
Could you please attach a screenshot of the slider you are referring to?
I believe you are confusing the slider's purpose. The slider is to make your
bluetooth computer visible to be able to pair new devices, it does not
disconnect existing devices.
** Changed in: linux (Ubuntu)
Stat
Ok, actually the slider is in fact to disable bluetooth completely,
please ignore my previous comment.
** Changed in: bluez (Ubuntu)
Status: Incomplete => Confirmed
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Just found by Google search to this post. I have the same issue on
Windows 10 with a AX88179 adapter. The adapter randomly crashes / driver
crashes under heavy load or the bandwidth suddenly drops down from
500mbit/s to around 3mbit/s. You can see the issue happening here:
https://i.imgur.com/TtWR
Maybe the issue is heat, and the chip slows down of it overheats, and
some manufacturers did not include a heatsink on it, some did.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1269883
I can confirm that this goes away under 20.04 with the HWE stack (kernel
5.8+)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1880365
Title:
Dell Vostro 5391 trackpad loses functionality
That is great to hear @marianrh!
I switched the entire workforce to the 5.8 kernel after the bug was
introduced on those machines that are still on 18.04 and have HWE
installed. Now I installed two machines for testing purposes with Ubuntu
20.04 and the problem reappeared quite quickly, so I put t
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Ups I posted the wrong URL to my custom kernel:
http://www.nextized.net/repo/linux/ubuntu-
linux-4.10.3_ryzen01_amd64_generic.tar.gz
- Linux 4.10.3 AMD64 with Ubuntu patches
- Compiled from official ubuntu "linux-source-4.10.0" package
- AMD GPIO PIN Control removed
- No other changes from defaul
Good news:
For the people that are not able to compile a custom kernel, I provide
the download links of the binarys for you:
- Linux 4.10.3 AMD64 with Ubuntu patches
- Compiled from official ubuntu "linux-source-4.10.0" package
- AMD GPIO PIN Control removed
- No other changes from default confi
What you guys could test with the new kernel are mainboard related stuff
like sound, usb and so on. I would like to know what effects the
disabling AMD Pin CTRL has on other stuff.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in U
Thanks you guys for your early feedback.
I'll release a binary 4.11 with fixed audio for Gigabyte Ryzen
Mainboards as soon as 4.11 is stable (end of april). The release
candidates are mostly stable but not recommended to use on productive
systems.
If its just the LED Control that doesn't even mat
If you want I could power up a Zesty VM to compile a new kernel with
same settings as my 4.10.3 kernel and provide it for you guys.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1671360
T
@Edward: It seems like the kernel fails to build a module for a realtek usb
wlan card (https://github.com/gnab/rtl8812au) from kernel 4.3.8 - could you
remove this module or the kernel 4.3.8?
What version of ubuntu are you using? and could you reinstall it when its
necessary?
--
You received
Hello Guys
Seems AMD_PINCTRL has been excluded from official sources; I've built 2
new kernel versions today and both of them had AMD_PINCTRL disabled,
even though I applied all the patches from kernel.ubuntu.org.
Could someone please check if the newest stuff works without compiling a
custom ker
Its version 4.11 RC8
I took the source from kernel.org, applied ubuntu fixes (0001 - 0006) from
kernel.ubuntu.org (so it's basicly a ubuntu kernel), then configured it and
found out that AMD_PINCTRL was disabled from the beginning.
I'm not sure if ubuntu finally updated the fixes to disable it o
The latest patch does work when you realize that the skb_put function
has recently changed from (unsigned char*) to (void *) ( see
https://patchwork.ozlabs.org/patch/776580/ for fix).
The lines where appears "*skb_put" need to be changed to "*(u8
*)skb_put". This was enough for me to get my blueto
With kernel 4.13.0-31 and 4.13.0-32, resume from hibernate freeze every time.
After applying 'no_console_suspend' in grub, some more infos are printed to
console:
PM: quiesce of devices complete after x msec
PM: late quiesce of devices complete after x msec
PM: noirq quiesce of devices complete
Public bug reported:
After an update from 4.10.0-40-generic to 4.13.0-32-generic (ubuntu
16.04 + hwe kernel), the number of process when doing IO on my machine
has exploded.
Before the update, maximum number of process : 284
After the update, doing a simple rsync to an external disk : 771
The sy
apport-collect 1747597 fails with "Bad bot, go away!"
** Tags removed: zesty
** Tags added: xenial
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
http
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1747597/+attachment/5049589/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1747597
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1747597/+attachment/5049587/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "JournalErrors.txt"
https://bugs.launchpad.net/bugs/1747597/+attachment/5049588/+files/JournalErrors.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.n
apport information
** Tags added: apport-collected
** Description changed:
After an update from 4.10.0-40-generic to 4.13.0-32-generic (ubuntu
16.04 + hwe kernel), the number of process when doing IO on my machine
has exploded.
Before the update, maximum number of process : 284
Afte
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1747597/+attachment/5049590/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1747597
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1747597/+attachment/5049591/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1747597/+attachment/5049592/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.l
apport information
** Attachment added: "ProcEnviron.txt"
https://bugs.launchpad.net/bugs/1747597/+attachment/5049593/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1747597/+attachment/5049596/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1747597
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1747597/+attachment/5049594/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1747597/+attachment/5049597/+files/WifiSyslog.txt
** Package changed: linux (Ubuntu) => linux-meta-hwe (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which i
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1747597/+attachment/5049595/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
*** This bug is a duplicate of bug 1743094 ***
https://bugs.launchpad.net/bugs/1743094
I switched back to 4.13.0-21-generic and hibernation works.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
I installed the 4.15.0-041500-generic kernel, and the machine failed to
reboot, unfortunately this is a remote machine.
Next try in 6-8 hours.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
using the 4.15.0-041500-generic kernel, the total process count was very
high (473) just after the boot, perhaps something to do with the raid
array resync.
Now doing backup to the external disk, process count seems normal (287).
I still think there is a problem with that process count since olde
As requested, I added the tag kernel-bug-exists-upstream and changed the
status to confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1747597
Title:
Number of processes exploded af
4.16.0-041600rc2-generic is also affected.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1747597
Title:
Number of processes exploded after upgrade to 4.13.0-32-generic
Status in linux
I'm trying to bisect the bug, but I have some problem doing it.
I have cloned the branch hwe of git://kernel.ubuntu.com/ubuntu/ubuntu-
xenial.git, using "git clone -b hwe git://kernel.ubuntu.com/ubuntu
/ubuntu-xenial.git"
Then I have built the kernel (just to test the build process) using
"fakero
I've got 4 computers running ubuntu.
2 computers affected, and 2 computers unaffected. The two affected computer are
using btrfs.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1747597
Ti
*** This bug is a duplicate of bug 1743094 ***
https://bugs.launchpad.net/bugs/1743094
Problem still exists with Kernel 4.13.0-36.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/174511
With kernel 4.13.0-31, 4.13.0-32 and 4.13.0-36 resume from hibernate freeze
every time.
After applying 'no_console_suspend' in grub, some more infos are printed to
console:
PM: quiesce of devices complete after x msec
PM: late quiesce of devices complete after x msec
PM: noirq quiesce of devices
There are microcode packages available in the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
They will be published today or tomorrow once we get the corresponding
linux-meta packages.
--
You received this bug notification because you are
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1696440 ***
https://bugs.launchpad.net/bugs/1696440
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
*** This bug is a duplicate of bug 1696650 ***
https://bugs.launchpad.net/bugs/1696650
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1696440 ***
https://bugs.launchpad.net/bugs/1696440
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
@kaihengfeng I don't think this will be accepted by upstream, since it's
hardcoding hardware descriptors as magic numbers into the module.
@adrailien
Could you try the newest version of the nvidia drivers compatible with 4.11
http://www.askmetutorials.com/2017/04/install-uninstall-nvidia-driver-3
Hello Guys
Just compiled a new version (4.11.2) for Ubuntu:
http://www.nextized.net/repo/linux/ubuntu-
linux-4.11.2_ryzen01_amd64_generic.tar.gz
Please test it on your plattform. Confirmed works with nvidia 381
Answer from AMD developers who created this module:
Hi nextized,
This issue has bee
-generic 4.10.11
Uname: Linux 4.10.0-21-generic i686
ApportVersion: 2.20.4-0ubuntu4.1
Architecture: i386
AudioDevicesInUse:
USERPID ACCESS COMMAND
/dev/snd/controlC0: marc 1136 F pulseaudio
Date: Tue Jun 6 19:06:17 2017
ErrorMessage: subprocess new pre-installation script returned
I can replicate the issue on a Gigabyte GA370x Gaming 5 Mainboard with
AMD 1700x. After I upgraded Mint to Linux 4.10.3 the bug even happened
on older kernel versions installed with Ukuu (I could only boot on 4.4.0
used as default on Mint 18.2)
--
You received this bug notification because you ar
Hey Roland
Your informations are a breakthrough in this case, since Case A seems to
be a NullPointerException inside the Kernel (maybe amd_gpio is trying to
access an object that has been removed in newer kernel versions?).
Case B was almost 100% for myself but is also very interesting.
It seems
Hey Roland
You are surely right its a Gigabyte related issue, allthough it's amost
surely a change the engineers from Gigabyte made on either UEFI or even
Hardware level. Its pretty common for mainboard manufacturers to add
custom stuff to their mainboards as additional selling points.
The questi
I've created a post in the Gigabyte Forums AM4 Beta BIOS Thread.
http://forum.gigabyte.us/thread/886/am4-beta-bios-thread?page=21
Maybe they can figure out what is causing this issue to happen.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribe
We published updates for the issue already:
https://www.ubuntu.com/usn/
** Changed in: linux (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1555321
Title:
kernel should support disabling CLONE_NEWUSER via sysctl
Status
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
not all boards require that zImage has the dtb appended. In such a case,
uboot loads the device tree from the a file, preferable in the boot
partition. Loading it from a different partition may require a special
uboot hack.
--
You received this bug notification because you are a member of Kernel
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I'm still seeing this problem in stock amd64 16.04 (kernel 4.4.0-21):
Apr 28 13:46:37 rincewind kernel: [ 108.345612] NMI watchdog: BUG: soft lockup
- CPU#0 stuck for 22s! [QQmlThread:1159]
Apr 28 13:46:37 rincewind kernel: [ 108.347049] Modules linked in: pci_stub
vboxpci(OE) vboxnetadp(OE) v
The NMI messages went away after I upgraded the kernel to 4.5.2-040502
and the nVidia driver to 364.19.
However, I was still experiencing intermittent lockups.
Those went away after I disabled KDE's File Indexing (turning off baloo-
file-indexer). I think that maybe my original NMI problems coul
I suffered from these messages after upgrading to Kubuntu 16.04.
After changing my hard drive, then my entire PC, then upgrading the
kernel to 4.5.2 and also my nVidia drivers to 364.19, the messages went
away.
However, I STILL saw intermittent lockups. These finally went away
after I turned off
Wouldn't the grub2 package simply be held back if the proper version
required by grub2-signed isn't available?
Why did the grub2-signed binary package get uninstalled during the
update?
2015-12-15 20:26:59 status installed grub-efi-amd64-signed:amd64
1.55+2.02~beta2-29
2015-12-15 20:27:00 remove
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
: amd64
AudioDevicesInUse:
USERPID ACCESS COMMAND
/dev/snd/controlC0: marc 2459 F pulseaudio
Date: Fri Jan 22 09:27:12 2016
DuplicateSignature:
package:linux-image-3.13.0-76-generic:3.13.0-76.120:subprocess installed
post-installation script returned error exit status 2
101 - 200 of 516 matches
Mail list logo