Hi Michael,
I have tried daily build https://cdimage.ubuntu.com/ubuntu-
server/jammy/daily-live/
and the issue is got resolved with 22.04.1 daily build.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launch
Hi Sumit,
Referencing comment #9 this patch is not the issue
1a30fd18f21b scsi: mpi3mr: Call scsi_done() directly
The patch that is causing an issue is
256bd4f23d9c scsi: mpi3mr: Return I/Os to an unrecoverable HBA with
Otherwise I could build the test kernel very quickly.
--
You received t
** Changed in: linux (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1965241
Title:
Ubuntu 22.04 and 20.04 DPC Fixes for Failure Cases
Hi Gnanendra,
If the patch that you found fixed the issue it could possibly be in the
daily image. Can you try the daily image to see if it resolves your
issue?
http://cdimage.ubuntu.com/cdimage/ubuntu-server/jammy/daily-
live/current/
--
You received this bug notification because you are a me
This bug was fixed in the package linux - 4.15.0-191.202
---
linux (4.15.0-191.202) bionic; urgency=medium
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables: do not allow RULE_ID to refer to another
ch
This bug was fixed in the package linux - 4.15.0-191.202
---
linux (4.15.0-191.202) bionic; urgency=medium
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables: do not allow RULE_ID to refer to another
ch
This bug was fixed in the package linux - 4.15.0-191.202
---
linux (4.15.0-191.202) bionic; urgency=medium
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables: do not allow RULE_ID to refer to another
ch
This bug was fixed in the package linux - 4.15.0-191.202
---
linux (4.15.0-191.202) bionic; urgency=medium
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables: do not allow RULE_ID to refer to another
ch
This bug was fixed in the package linux-ibm-5.4 - 5.4.0-1031.35~18.04.1
---
linux-ibm-5.4 (5.4.0-1031.35~18.04.1) bionic; urgency=medium
[ Ubuntu: 5.4.0-1031.35 ]
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilt
This bug was fixed in the package linux-oracle - 5.4.0-1081.89
---
linux-oracle (5.4.0-1081.89) focal; urgency=medium
[ Ubuntu: 5.4.0-124.140 ]
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables: do n
This bug was fixed in the package linux-bluefield - 5.4.0-1044.49
---
linux-bluefield (5.4.0-1044.49) focal; urgency=medium
[ Ubuntu: 5.4.0-124.140 ]
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables
This bug was fixed in the package linux-bluefield - 5.4.0-1044.49
---
linux-bluefield (5.4.0-1044.49) focal; urgency=medium
[ Ubuntu: 5.4.0-124.140 ]
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables
This bug was fixed in the package linux-bluefield - 5.4.0-1044.49
---
linux-bluefield (5.4.0-1044.49) focal; urgency=medium
[ Ubuntu: 5.4.0-124.140 ]
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables
This bug was fixed in the package linux-bluefield - 5.4.0-1044.49
---
linux-bluefield (5.4.0-1044.49) focal; urgency=medium
[ Ubuntu: 5.4.0-124.140 ]
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables
This bug was fixed in the package linux-bluefield - 5.4.0-1044.49
---
linux-bluefield (5.4.0-1044.49) focal; urgency=medium
[ Ubuntu: 5.4.0-124.140 ]
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables
This bug was fixed in the package linux-azure - 5.15.0-1017.20
---
linux-azure (5.15.0-1017.20) jammy; urgency=medium
[ Ubuntu: 5.15.0-46.49 ]
* CVE-2022-2585
- SAUCE: posix-cpu-timers: Cleanup CPU timers before freeing them during
exec
* CVE-2022-2586
- SAUCE: netfilt
This bug was fixed in the package linux-azure - 5.4.0-1089.94
---
linux-azure (5.4.0-1089.94) focal; urgency=medium
[ Ubuntu: 5.4.0-124.140 ]
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables: do not
This bug was fixed in the package linux-azure - 5.4.0-1089.94
---
linux-azure (5.4.0-1089.94) focal; urgency=medium
[ Ubuntu: 5.4.0-124.140 ]
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables: do not
This bug was fixed in the package linux-azure - 5.15.0-1017.20
---
linux-azure (5.15.0-1017.20) jammy; urgency=medium
[ Ubuntu: 5.15.0-46.49 ]
* CVE-2022-2585
- SAUCE: posix-cpu-timers: Cleanup CPU timers before freeing them during
exec
* CVE-2022-2586
- SAUCE: netfilt
This bug was fixed in the package linux - 5.4.0-124.140
---
linux (5.4.0-124.140) focal; urgency=medium
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables: do not allow RULE_ID to refer to another
chain
This bug was fixed in the package linux - 5.4.0-124.140
---
linux (5.4.0-124.140) focal; urgency=medium
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables: do not allow RULE_ID to refer to another
chain
This bug was fixed in the package linux - 5.4.0-124.140
---
linux (5.4.0-124.140) focal; urgency=medium
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables: do not allow RULE_ID to refer to another
chain
This bug was fixed in the package linux - 5.4.0-124.140
---
linux (5.4.0-124.140) focal; urgency=medium
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables: do not allow RULE_ID to refer to another
chain
This bug was fixed in the package linux - 5.4.0-124.140
---
linux (5.4.0-124.140) focal; urgency=medium
* CVE-2022-2586
- SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
- SAUCE: netfilter: nf_tables: do not allow RULE_ID to refer to another
chain
# FOCAL - Proposed testing
--
# enable proposed repo
cat
>From what I can tell, this critical bug is still present in the release
candidate for 22.04.1 (at least, I just tried an install in a VM with
zfs encryption and after running `snap remove firefox` still get pushed
back to the gdm prompt and somehow /var/lib/apt ends up not being
mounted after that
Heitor advised that upping the kernel crashdump memory from 192MB to
512MB resolved Focal/Jammy not being able to report a crash dump. Thanks
Heitor!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to makedumpfile in Ubuntu.
https://bugs.laun
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1984117
and then change the status of the bug to 'Confirmed'.
If, due to the nature
Public bug reported:
Bug found for Jammy (22.04)
Steps to reproduce:
1. Create 3 partitions with parted tool on initial non-RAID drive
# parted -s /dev/nvme6n1 mklabel gpt
# parted -s /dev/nvme6n1 mkpart primary ext4 0% 30%
# parted -s /dev/nvme6n1 mkpart primary btrfs 30% 60%
# parted -s /dev/nv
** Changed in: nvidia-graphics-drivers-470 (Ubuntu)
Assignee: (unassigned) => Alberto Milone (albertomilone)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to nvidia-graphics-drivers-470 in Ubuntu.
https://bugs.launchpad.net/bugs/198411
Public bug reported:
[Impact]
After installing nvidia-driver-450, apt fails to install any of the following:
- nvidia-driver-450-server
- nvidia-driver-470-server
- nvidia-driver-510-server
- nvidia-driver-515-server
- nvidia-driver-510
- nvidia-driver-515
[Platforms]
- Bionic (ub
** No longer affects: linux-raspi (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-raspi in Ubuntu.
https://bugs.launchpad.net/bugs/1977764
Title:
kernel modules "zstd" and "z3fold" missing.
Status in Ubuntu Seeds:
New
Michael, Gentle reminder !
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1971151
Title:
[Ubuntu 22.04.1] mpi3mr: Add management application interface(BSG)
support
Status in linux pac
apport information
** Attachment added: "acpidump.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607482/+files/acpidump.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.ne
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607481/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpa
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607480/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607478/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launch
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607479/+files/PulseList.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607477/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607474/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launch
apport information
** Attachment added: "ProcEnviron.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607476/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launch
apport information
** Attachment added: "Package.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607473/+files/Package.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607475/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https
apport information
** Attachment added: "PaInfo.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607472/+files/PaInfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "Lsusb-t.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607470/+files/Lsusb-t.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/
apport information
** Attachment added: "Lsusb-v.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607471/+files/Lsusb-v.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607469/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "Lspci-vt.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607468/+files/Lspci-vt.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.ne
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607467/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607466/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.laun
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1984004/+attachment/5607465/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/19
apport information
** Tags added: apport-collected third-party-packages vanessa
** Description changed:
Kernel: 5.15.0-43-generic
linux-firmware: 20220329.git681281e4-0ubuntu3.3
Tested with: Mint 21 Cinnamon (Ubuntu 22.04 based)
In e.g. the Unigine benchmark, the linux-firmware packag
After looking into what apport-collect seems to do, i.e. providing crash
information: there is no crash. The system is stable even with the
problematic linux-firmware version. It's only the GPU performance in
gaming that is impacted. Otherwise (desktop, videos, browser), there is
no problem.
--
Y
Hi Kai-Heng Feng,
I have tested your patch by compiling Ubuntu Kinetic kernel 5.19
(22.10).
Unfortunately, the problem still occurs.
Any idea or solution? I see that there are similar problems with this
driver whose "fix" has already been released by Canonical, but the
problem persists...
After
This is a Mint 21 system, based on Ubuntu 22.04, and it doesn't have
apport-collect. That's why I filed the issue directly via Launchpad.
Here the poutput from inxi -Fxxxrz:
System:
Kernel: 5.15.0-43-generic x86_64 bits: 64 compiler: gcc v: 11.2.0
Desktop: Cinnamon 5.4.9 tk: GTK 3.24.33 wm:
** Description changed:
https://canonical.my.salesforce.com/5004K09oeuI
Upstream (v5.16) patches needed to allow live migration of confidential
VMs.
+ [Impact]
+ No support for live-migration of confidential VMs currently
+
+ [Fix]
+ Backport 5 patches from v5.16
+
+ [Test]
+ GCP
Please run:
$ apport-collect 1984004
** Changed in: linux-firmware (Ubuntu)
Status: New => Incomplete
** Tags added: kern-4121
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/b
57 matches
Mail list logo