Ah yeah, that could be. I figured I'd test what's in -proposed but if
-proposed is a security only fix on top of -37, that wouldn't help much.

It's a bit frustrating because users would have gotten the busted kernel
as part of -37 which includes a security fix but then the only real
option to get a booting system back now is to go to pre-security-fix.

Unfortunately this is a production server and I already spent half of
the week dealing with this mess so don't have more time to play kernel
bingo. Server is now running a clean upstream build.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1966499

Title:
  Recent 5.13 kernel has broken KVM support

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Upgrading to 5.13.0-37 or 5.13.0-39 immediately crashes my production servers 
as they hit:
  
https://lore.kernel.org/all/f1ea22d3-cff8-406a-ad6a-cb8e0124a...@leemhuis.info/T/#md1f5c8c4aa01130a449a47f3e7559f06b0372f55

  It looks like we need to get e90e51d5f01d included in those kernels.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1966499/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to