I did not manage to compile the kernel the Ubuntu way
https://wiki.ubuntu.com/Kernel/BuildYourOwnKernel
Is this doc still relevant for Linux 5.4 and 20.04 / Focal?
I included the patch I ported to the latest version of ubuntu-focal
git clone git://kernel.ubuntu.com/ubuntu/ubuntu-focal.git
** Patc
I managed to build, install and boot the Linux Kernel 5.4 patched with
the above patch.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868551
Title:
Screen freezes : NULL pointer dereference i915_ac
** Attachment removed: "WifiSyslog.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+attachment/5340470/+files/WifiSyslog.txt
** Attachment removed: "RfKill.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+attachment/5340468/+files/RfKill.txt
** Attachme
Q: Is there an upstream commit?
A: Not that I am aware of
https://gitlab.freedesktop.org/drm/intel/issues/827
A month ago:
Hi, when will this make it's way into Kernel 5.4? -- The Boy from the MAD show
;-)
You can check if you had the same type crash of your Ubuntu 20.04 (soon
LTS)
zgrep -h i
zgrep -h i915_active_acquire /var/log/kern.log* kern.log* | cut -d ' '
-f1-3,5,9-
** Attachment added: "kern.log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+attachment/5342403/+files/kern.log
--
You received this bug notification because you are a member of Ubuntu
Bugs,
Seems to be fixed in the latest 5.5
http://kobi.wang/v5.x/ChangeLog-5.5
drm/i915: Hold reference to intel_frontbuffer as we track activity
Since obj->frontbuffer is no longer protected by the struct_mutex, as we
are processing the execbuf, it may be removed. Mark the
intel_fro
With the above patch, I still have the screen freeze but without Kernel oops.
I will compile and my own Linux Kernel 4.15 (18.04 LTS) for Ubuntu 20.04 (soon
LTS) as
Intel Graphics i915 is unusable on my Dell XPS 13 connected to external
screen and XFCE4
i915 :00:02.0: GPU HANG: ecode 9:1:0x
I am testing with Linux Kernel 5.5.13-050513-generic from
https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.5.13/
as older kernels (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954817#17
** Bug watch added: Debian Bug tracker #954817
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=95481
** Summary changed:
- Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4
+ Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4)
i915_active_acquire
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ub
So far no crash, freeze of any kind with Linux 5.5.13 compared to the
unstability of Ubuntu 20.04 with Linux 5.4 on Dell XPS 13 with 10th
Generation Intel Core i7-10510U CPU (Comet Lake)
I guess the patches are part of Linux v5.5.12 and later
https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.5.12/
Linux Kernel 5.5.x (>5.5.12) is working fine
** Changed in: linux (Ubuntu)
Status: Confirmed => New
** Information type changed from Public to Private
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/
motd-news is part base-files so it cannot be removed from Ubuntu Desktop,
Server or Core.
if you need to report a bug use
https://bugs.launchpad.net/ubuntu/+source/base-files/+filebug
On my point of view, motd-news is a Telemetry tool hidden in a Message of the
Day (MOTD)
serving Ads for Canoni
** Attachment added: "motd.ubuntu.com current Advertising for Canonical
Products"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389475/+files/ubuntu-desktop-2004-translate.png
--
You received this bug notification because you are a member of Ubuntu
Bugs, whic
** Attachment added: "motd-news ENABLED by default with telemetry every 12h
Without Consent"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389471/+files/ubuntu-desktop-2004-terminal2.png
--
You received this bug notification because you are a member of Ubuntu
** Attachment added: "Privacy has not opt-out for motd-news hidden telemetry in
User-Agent"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389470/+files/ubuntu-desktop-2004-privacy.png
--
You received this bug notification because you are a member of Ubuntu
Bu
** Attachment added: "Trying to remove motd-news via base-files will kill
Ubuntu"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389481/+files/ubuntu-desktop-2004-system-failure2.png
--
You received this bug notification because you are a member of Ubuntu
Bugs
** Attachment added: "No, don't send system info NOT RESPECTED BY MOTD-NEWS"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389468/+files/ubuntu-desktop-2004-optout.png
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subs
** Attachment added: "motd-news exfiltrate system information via User-Agent
and IP Address every 12 hours Without Consent"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389482/+files/ubuntu-desktop-2004-motd-news.png
--
You received this bug notification bec
** Attachment added: "Legal Notice DOES NOT COVER "motd-news" sending IP
address, Uptime, Idle time every 12h motd-news.service started during
installation Ubuntu Desktop 20.04 Without Consent"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389469/+files/ubuntu
** Attachment added: "Sample motd.ubuntu.com Ads from 2020"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389477/+files/ubuntu-desktop-2004-waybackmachine2.png
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed t
** Attachment added: "motd.ubuntu.com is up since 2017"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389476/+files/ubuntu-desktop-2004-waybackmachine.png
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubu
** Attachment added: "Sample motd.ubuntu.com Ads from 2017"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389478/+files/ubuntu-desktop-2004-waybackmachine3.png
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed t
** Attachment added: "motd-news is unremovable"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389480/+files/ubuntu-desktop-2004-system-failure1.png
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ht
** Attachment added: "Sample motd.ubuntu.com Ads from 2019"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389479/+files/ubuntu-desktop-2004-waybackmachine4.png
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed t
** Attachment added: "motd.ubuntu.com hosted in the Amazon EC2 cloud in Dublin,
Leinster, Ireland"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389474/+files/ubuntu-desktop-2004-terminal4.png
--
You received this bug notification because you are a member of
No updates from Canonical's legal departement
"A picture is worth a thousand words"
** Attachment added: "motd-news.service started during installation Ubuntu
Desktop 20.04 Without Consent"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389467/+files/ubuntu
** Attachment added: "motd-news force to run via motd-news.service and
motd-news.timer"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389472/+files/ubuntu-desktop-2004-terminal3.png
--
You received this bug notification because you are a member of Ubuntu
Bugs
https://news.softpedia.com/news/canonical-under-fire-for-putting-ads-in-the-ubuntu-motd-530372.shtml
Article like "Canonical Under Fire for Putting Ads in the Ubuntu MOTD"
miss the point that motd-news is not only displaying Advertising in the login
prompt but it a Privacy Nightmare because it ha
** Tags added: bionic cosmic disco
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424
Title:
motd-news transmitting private hardware data without consent or
knowledge in background
To manage n
This ticket should be updated to Security issue +250 points
I highly doubt that this Motd News "feature" is compliant with EU's
General Data Protection Regulation since daily reporting of computer's
infos are proceeded without the user's consent. Cf. GDPR application
comments [https://gdpr.eu/eu-g
Anyone privacy-conscious using any version of Ubuntu should do this in a shell
ASAP
sudo sed -i -r 's/(ENABLED)=.+/\1=0/' /etc/default/motd-news
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424
Thanks security-conscious Dustin Kirkland for this great bash script
("I've insisted on shell here for transparency! - Dustin ")
and other contributions like NSA's SELinux or security sensible
software like Pollinate (Entropy-as-a-Service in the cloud) via
https://entropy.ubuntu.com
Packing so m
Well known...
https://twitter.com/search?q=ubuntu%20motd-news&src=typed_query&f=live
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424
Title:
motd-news transmitting private hardware data withou
Part of the base OS ... resistance is futile
dpkg -L base-files | grep motd-news
/etc/default/motd-news
/etc/update-motd.d/50-motd-news
/lib/systemd/system/motd-news.service
/lib/systemd/system/motd-news.timer
sudo grep news /var/log/syslog
Jun 4 04:44:22 mbx 50-motd-news[94986]: * MicroK8s get
Please give the Message of the Day (MOTD) every time I get online on the
Internet
or I reboot my Ubuntu computer ...
Hold on, connecting to Amazon Cloud (Amazon Data Services)
motd.ubuntu.com ...
Your message of the day is
Building Trust is Hard, Breaking Trust is Easy
In exchange, please giv
Thanks Canonical for this great Telemetry master piece
hidden in a Daily "News" (Message of the Day) deep inside
the core of Ubuntu.
I found it active on all the Ubuntu laptop of my friends
and coworkers, all Ubuntu servers from local ISP and my
work. As well as on all Ubuntu flavours and Ubuntu d
This is more than just a Telemetry, It as a Trojan in Ubuntu Distro.
A remote code-execution (RCE) vulnerability
in all Ubuntu of the world! Why?
Simple
curl is launched as root (not the best practice!),
and Ubuntu Distro fetch https://motd.ubuntu.com multiple times per day
if someone (like 3-
motd-news is present in Nvidia Jetson Nano (derived from Ubuntu)
and Ubuntu for Raspberry Pi. It is enabled by default and also calling Home
Ubuntu via Amazon Cloud.
motd-news is also present in Ubuntu Core 18 for embedded systems (like Tesla
Car)
but unlike Ubuntu Server and Desktop Distro it is
The original request for motd-news came from Dustin Kirkland on
2016-10-30
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1637800
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424
Titl
I recommend the following action points to restore a bit of trust in Ubuntu
Product
after the introduction of motd-news by Dustin Kirkland (Ex- VP Product at
Canonical)
- Run all motd scripts including motd-news AND curl as non privileged
account -- not as root
- Move motd-news functionality f
I don't think it was safe decision to link the security of Ubuntu
base OS to curl running as root every 12 hours via motd-news just
to display Ads for products and not important security messages
like suggested in the original ticket (1637800).
Just imagine the consequence of https://motd.ubuntu.
The usage of motd-news as Advertising media for Canonical products is well
documented.
Now we need to know if Canonical share the crafted User-Agent with sensible
info in it with third party and use it for telemetry like Microsoft Windows 10.
Samples output of motd-news mirrored in both login pr
motd-news vs privacy / security / telemetry
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1637800
Title:
add a motd script for news
All messages received over a year (Ubuntu 18.04):
* Congrats to the Kubernetes community on 1.16 beta 1! Now available
* Kata Containers are now fully integrated in Charmed Kubernetes 1.16!
* Keen to learn Istio? It's included in the single-package MicroK8s.
* Kubernetes 1.18 GA is now available!
Privacy:
Ubuntu users don't have the opportunity to opt-out from motd-news before all
the private infos
and telemetry are sent via User-Agent. So even if people change ENABLED=1 to
ENABLED=0
in /etc/default/motd-news they only stop future leaks but the initial leak has
already been
done in back
https://github.com/curl/curl/issues/5557
** Bug watch added: github.com/curl/curl/issues #5557
https://github.com/curl/curl/issues/5557
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867424
Title
Maybe as manager of the Ubuntu Server team, you should ask to improve motd-news
software
to not curl as root.
You should also improve landscape and landscape on premises level of access so
any users
cannot list all processes and reboot any servers or execute shell script as
root.
Good luck, I
By the current design, you don't give choice to the Ubuntu users as they cannot
opt-out BEFORE
the laptop or server contacts motd.ubuntu.com sending the telemetry. By
implementing it as
essential package, you don't let user remove it but only disable it when it is
too late.
The same apply to la
And don't tell me that the fact that Canonical use motd as Telemetry was done
transparently,
with clear documentation... most users complain only about the advertising but
don't realize
that the motd-news is used as telemetry tool but seems to act as a advertising
/ news purpose
and the risk of
Best practices by Dustin Kirkland
https://manpages.ubuntu.com/manpages/focal/en/man5/update-motd.5.html
- No mention of curl running as root
- No mention of the exfiltration of private data done via User-Agent
- No mention of the novel concept of advertising via motd
- No mention of using motd-ne
I have decided to contact ICO (Information Commissioner's Office).
Because Canonical Ltd. has handled my personal information
(IP address, Hardware CPU, Choice of Cloud Hosting, and various meta-data)
and the one of the company I work for without concent.
The same apply to all users of Ubuntu (
I will first contact the Data Protection Officer (DPO) of Canonical Group
Limited
dataprotect...@canonical.com
https://ubuntu.com/legal/data-privacy
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867
FYI Canonical's legal departement is reviewing motd-news "feature" (such as
telemetry)
and will provide updated information next week.
All motd-news related tickets
https://bugs.launchpad.net/ubuntu/+source/base-
files/+bugs?field.searchtext=motd-
news&orderby=-datecreated&search=Search&field.st
https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.4.32/CHANGES
https://patchwork.ozlabs.org/project/ubuntu-
kernel/patch/20200407222740.7671-2-sultan.alsa...@canonical.com/
Note that this bug only affects 5.4 and has since been fixed in 5.5.
Normally, a backport of the fix from 5.5 would be in or
As 5.5 is more stable on my Dell XPS 13 than 5.4 with Intel iGPU (i915)
I did the following one-liner to install the latest version of Linux Kernel 5.5
on Ubuntu 20.04
which curl >/dev/null 2>&1 || sudo apt-get install -qq -y curl; for
version in $(curl -sL https://kernel.ubuntu.com/~kernel-ppa/m
Regarding #28
"on 20.04 LTS and v5.6 is not working properly with WiFi."
When I first tested Kernel 5.6 branch, the WiFi was broken because of this:
https://linuxreviews.org/Linux_5.6.2_Is_Released_With_Intel_Wifi_Fix
Now it is working again with the current 5.6 branch.
Kernel 5.5 is now EOL (a
https://ico.org.uk/make-a-complaint/your-personal-information-concerns/
To: ICO
Dear Information Commissioner’s Office,
I confirm that I want to proceed with the creation of the case about
Canonical's motd-news as Canonical don't want to remediate the privacy
issue of sending by default hardwar
I added https://ubuntu.com/legal/motd to Archive.org's Internet Wayback
Machine
https://web.archive.org/web/20200713070037/https://ubuntu.com/legal/motd
** Attachment added: "canonical-legal-motd.pdf"
https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5392271/+files
On my point of view, it's NOT enough to implement a legal notice
https://ubuntu.com/legal/motd with technical errors and it is not
possible to verify that Canonical does not store the IP address of
Ubuntu users in Apache log (the default) and/or database without an
external auditor (PwC, EY, KPMG,
I tested the test kernel 5.4 for about a day without issue
but all my computers using Intel GPU are using by default
kernel 5.5. I don't want to change that.
If you want to follow other users having the same kind of
issues with different i915 bugs on different Linux distro
follow comments on
https
This is my backport of Tomas Espeleta's patch to Linux 4.15.18 (linux-
source-4.15.0 / 4.15.0-45.48 available on Ubuntu 18.04.2 LTS)
** Patch added: "huawei-matebook-x-right-speaker-work-4.15.0.patch"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1721987/+attachment/5241510/+files/huawe
https://httpd.apache.org/docs/trunk/mod/mod_proxy_fcgi.html
14.04 LTS has Apache 2.4.7 so you cannot use this :
# Requires Apache 2.4.9 or later
SetHandler "proxy:unix:/var/run/php5-fpm.sock|fcgi://localhost/"
# Requires Apache 2.4.10 and later
SetHandler "proxy:fcgi://127.0.
FYI
I still have the issue on 3.13.0-91-generic (and 3.13.0-88-generic)
on a busy NFS server using XFS. I have this issue since 2015...
INFO: task kworker/1:2:31748 blocked for more than 120 seconds.
Not tainted 3.13.0-91-generic #138-Ubuntu
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs
Public bug reported:
After updating evolution to 3.18.5.1-1ubuntu1 on Ubuntu 16.04,
it stopped working:
$ evolution
(evolution:4688): e-data-server-WARNING **: e_module_load_all_in_directory:
Error opening directory '/usr/lib/evolution-data-server/credential-modules': No
such file or director
Same issue
This morning, a security update for libc has been automatically
deployed on all our servers running 14.04 LTS.
unattended-upgrades-dpkg_2016-05-26_06:36:05.829399.log:Unpacking
libc6-dev:amd64
unattended-upgrades-dpkg_2016-05-26_06:36:05.829399.log:Unpacking libc-dev-bin
unattended-u
Public bug reported:
Ubuntu 14.04 LTS and 15.04
Steps to reproduce:
apt-get install shorewall
vi /etc/default/shorewall
replace
startup=0
with
startup=1
cp -va
/usr/share/doc/shorewall/examples/one-interface/{interfaces,policy,rules,zones}
/etc/shorewall/
shorewall check
shorewall safe-restart
** Description changed:
-
Ubuntu 14.04 LTS and 15.04
Steps to reproduce:
apt-get install shorewall
- vi /etc/default/shorewall
+ vi /etc/default/shorewall
replace
startup=0
with
startup=1
cp -va
/usr/share/doc/shorewall/examples/one-interface/{interfaces,policy,rules,zones
Please note that my swap is NOT encrypted so it's not related to bug
1440098 or 953875
** Package changed: cryptsetup (Ubuntu) => systemd (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1463023
Public bug reported:
My Ubuntu 15.04 did not start --or took so long that I switched back to upstart!
ISSUE: (systemd during the boot)
Timed out waitingfor device dev-disk-by\x2duuid-... (swap)
Dependency failed for /dev/disk/by-uuid/... (swap)
Dependency failed for Swap.
Timed out waiting for
> Please attach /etc/fstab from your system, and show the output of 'swapon'
> when booted with upstart.
@vorlon content of fstab see "Bug Description"
$ sudo swapon
NAME TYPE SIZE USED PRIO
/dev/sda6 partition 7.9G 11.5M -1
Ok, I will try to go back to systemd for science ;-)
$ su
@pitti
I am unable to reproduce it with 3.19.0-20 nor 3.19.0-18.
So I installed back systemd-sysv and I will do the debug stuff
next time I have the issue.
I guess the issue was related to a strange state of swap or the disk
and after booting once with upstart something fixed it. fsck??
--
You
It could be related that ext4 was in a bad state and systemd was not able to
use it
then upstart executed fsck to fix it and now I can again use systemd.
# /var/log/syslog.4.gz
$ zgrep -h "fsck" /var/log/*.gz
Jun 8 08:43:06 mbp kernel: [1788385.038996] FAT-fs (sdb1): Volume was not
properly un
I agree with @Jamiejellicoe this ticket should be rated as "Security
issue" (250) but we are close that (236)...
Having /boot full can lead to kernel, inird image or grub.conf corruption and
on top of that it's blocking new security updates to be applied.
When /boot is full you cannot even purge
Same issue
$ lsb_release -r
Release:14.04
$ uname -r
3.13.0-52-generic
May 10 00:40:40 kernel: [...] Request for unknown module key 'Magrathea:
Glacier signing key: 1981bc916ffc00599231ec5630e666e0256fd6f1' err -11
May 10 00:40:40 kernel: [...] ipt_REJECT: module verification failed: sig
I had the same issue when AppArmor is active (default)
and when I try to enable qemu guest agent inside your
guest :
virsh start test
error: Failed to start domain test
error: internal error: process exited while connecting to monitor:
qemu-system-x86_64: -chardev
socket,id=charchannel0,path=/va
Is it possible to apply this patch to libvirt-bin package and allow to write to
/var/lib/libvirt/qemu/ ?
For me it makes sense because disabling AppArmor for OpenStack is not a good
idea
so you will be exposed to security issues like Venom
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/VENO
Public bug reported:
lvm2 version 2.02.98-6ubuntu2
After doing a lvextend of a LVM Thin Pool, I had a corruption all sub
LVM Thin Volumes and lost all of them. Then tried to dump/repair the
tmeta and end up with empty thin volumes (no more filesystem signature on them).
To sum up
The thin_pool
** Package changed: update-manager (Ubuntu) => lvm2 (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1480923
Title:
lvm thin corruption after lvresize
To manage notifications about this bug g
** Description changed:
lvm2 version 2.02.98-6ubuntu2
- After doing a lvextend of a LVM Thin Pool, I had a corruption all sub
- LVM Thin Volumes and lost all of them. Then tried to dump/repair the
+ After doing a lvresize of a LVM Thin Pool, I had a corruption all sub
+ LVM Thin Volumes and
My workaround:
dpkg --get-selections | grep 'linux-'
dpkg --get-selections | awk '/linux-(headers|image)-[0-9]\./ { print $1 }' |
grep -v "$(uname -r | sed -e 's/-generic//')" | sort -r -V -t- -k3 | tail -n+4
| xargs -r apt-get -qq -y purge
apt-get -qq -y install linux-{headers,image}-$(uname -r)
This bug should be a top priority because people will suffer from it as soon as
they reboot
their 14.04 LTS with an Intel Gigabit NIC and the "current" Utopic kernel
(3.16.0-48-generic).
I had the same problem with HP ProLiant DL380e Gen8 which an Intel I350 Gigabit
NIC
(Hewlett-Packard Compan
Same bug as https://bugs.launchpad.net/ubuntu/+source/linux-lts-
utopic/+bug/1492146
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1488024
Title:
[Regression] From 3.16.0-45 to -47: Intel IGB Tx Uni
Same bug as https://bugs.launchpad.net/ubuntu/+source/linux-lts-
utopic/+bug/1488024
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1492146
Title:
igb Detected Tx Unit Hang
To manage notifications a
Maybe it's another kernel regression with Intel NIC and TSO
so you can try this :
# tso => tcp-segmentation-offload
# gso => generic-segmentation-offload
# gro => generic-receive-offload
# sg => scatter-gather
# ufo => udp-fragmentation-offload (Cannot change)
# lro => large-receive-offload (Can
If directly related to igb module maybe this
LP: #1465653
https://lists.ubuntu.com/archives/kernel-team/2015-June/058671.html
https://lists.ubuntu.com/archives/kernel-team/2015-June/058586.html
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1465653
if not directly related to igb modules mayb
@boot0user I agree with you. The best workaround for now is to update
kernel to Vivid!
# Physical Server (with EFI):
sudo apt-get -y purge linux-{headers,image}-3.16.0-48-generic
sudo apt-get -y install linux-signed-generic-lts-vivid
sudo reboot
uname -r # 3.19.0-26-generic
sudo apt-get -y purge
Same problem on iMac15,1 with Radeon R9 M295X Mac Edition
and 4.2.0-7-generic (wily / 15.10)
Two partial workarounds:
- downgrade to 4.1.0-3-generic and install fglrx-updates
but bluetooth will not work --broken with this kernel*
http://www.spinics.net/lists/linux-bluetooth/msg64098.html
- u
Public bug reported:
Ubuntu 14.04.3 LTS with Kernel 3.19.0-26-generic
One of our servers running rsnapshot and nfs-kernel-server on XFS partitions
crashed or hanged two sundays in a raw.
Kernel 3.19.0-26-generic hangs multiple times (same time) in xlog_cil_force_lsn
(XFS).
I assume this bug is
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463952/+files/Lsusb.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442
Title:
XFS:
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463956/+files/UdevDb.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442
Title:
XF
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463955/+files/ProcModules.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463958/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442
Ti
apport information
** Attachment added: "UdevLog.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463957/+files/UdevLog.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442
Title:
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463954/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/149
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463951/+files/Lspci.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442
Title:
XFS:
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463950/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442
apport information
** Tags added: apport-collected staging trusty
** Description changed:
Ubuntu 14.04.3 LTS with Kernel 3.19.0-26-generic
One of our servers running rsnapshot and nfs-kernel-server on XFS partitions
crashed or hanged two sundays in a raw.
Kernel 3.19.0-26-generic h
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1495442/+attachment/4463953/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442
The bug doesn't seem to impact 3.13.0-63-generic.
(the server is in production we don't really want to test 4.2 unstable)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1495442
Title:
XFS: kernel ha
I still have the same issue with kernel 3.16.0-36-generic or 3.13.0-51-generic
(proposed-updates)
# KVM HOST (3.16.0-36-generic)
sudo apt-get install linux-signed-generic-lts-utopic/trusty-proposed
# KVM GUEST (3.16.0-36-generic)
sudo apt-get install linux-virtual-lts-utopic/trusty-proposed
apt-
1 - 100 of 128 matches
Mail list logo