Hi Mike, the new package is built and correctly runs as well, so I'm
sharing a full guide on how to test it.
First of all, just in case, mark your current kernel as "hold", so it won't be uninstalled
sudo apt-mark hold linux-image-6.17.0-14-generic
This will allow us to always come back to this image in case of a
catastrophic failure.
Now, download the 2 important packages manually by running:
wget https://launchpad.net/~alessiofaina/+archive/ubuntu/launchpad-bug-2141216/+files/linux-image-unsigned-6.17.0-15-generic_6.17.0-15.15afaina1_amd64.deb
wget https://launchpad.net/~alessiofaina/+archive/ubuntu/launchpad-bug-2141216/+files/linux-modules-6.17.0-15-generic_6.17.0-15.15afaina1_amd64.deb
Those commands will download the deb packages of the kernel we want to
install.
Now let's install those packages:
sudo dpkg -i ./linux-modules-6.17.0-15-generic_6.17.0-15.15afaina1_amd64.deb ./linux-image-unsigned-6.17.0-15-generic_6.17.0-15.15afaina1_amd64.deb
This will install the new UNSIGNED kernel in your machine. The kernel
will not run, as it's not signed by Canonical, so now we need to do
another step to be able to run it.
There are 2 ways to do this. The "easiest" way, is to disable "secure boot" in your machine temporarily.
You can do this by rebooting the machine, entering the UEFI bios by pressing ESC, F10 or F12 (depends on your machine unfortunately, I can't tell), and modifying the security parameters in the BIOS.
After disabling the secure boot option, you will be able to boot the kernel I shared with you.
Without this step, you will get a message along the lines of
"error: bad shim signature"
"error: you need to load the kernel first"
and you will be bounced back to GRUB and from there you will need to select "Advanced ..." and choose the 6.17.0-14 kernel to boot back into the machine.
There is another way to sign the kernel with a self-signed key, I'll
share it with you if you don't feel confident with the BIOS modification
step.
After the testing, please uninstall my kernel by running
sudo apt remove linux-image-unsigned-6.17.0-15-generic
sudo apt remove linux-modules-6.17.0-15-generic
and unmark the kernel from the hold status.
sudo apt-mark unhold linux-image-6.17.0-14-generic
After the reboot, please re-enable the "Secure boot" option in the BIOS,
as without it, you are exposed to a variety of security vulnerabilities.
edit: adding all the forgotten "sudo"
--
You received this bug notification because you are subscribed to linux
in Ubuntu.
Matching subscriptions: Bgg, Bmail, Nb
https://bugs.launchpad.net/bugs/2141216
Title:
Suspend/resume broken after latest Ubuntu update on AMD RX 960 XT
(andgpu SMU resume failure)
Status in linux package in Ubuntu:
New
Status in linux source package in Questing:
Triaged
Bug description:
Summary: Suspend/resume broken after latest Ubuntu update on AMD RX
What Happens: After suspend, system wakes but display remains black. VT switching (Ctrl–Alt–F3) does not work. Only hard reboot recovers.
Regression: This started immediately after a recent Ubuntu update
Hardware: AMD RX 960 XT (Nav 44) + AMD Raphael iGPU
Relevant logs: SMU resume failure. GPU ring timeouts, GPU ring timeouts, devcoredump created (already captured by ubuntu-bug tool)
ProblemType: Bug
DistroRelease: Ubuntu 25.10
Package: linux-image-6.17.0-12-generic 6.17.0-12.12
ProcVersionSignature: Ubuntu 6.17.0-12.12-generic 6.17.2
Uname: Linux 6.17.0-12-generic x86_64
ApportVersion: 2.33.1-0ubuntu3
Architecture: amd64
CasperMD5CheckResult: unknown
CurrentDesktop: ubuntu:GNOME
Date: Sat Feb 7 17:54:17 2026
InstallationDate: Installed on 2025-10-20 (110 days ago)
InstallationMedia: Ubuntu 25.10 "Questing Quokka" - Release amd64 (20251007)
MachineType: ASUS System Product Name
ProcEnviron:
LANG=en_US.UTF-8
PATH=(custom, no user)
SHELL=/bin/bash
TERM=xterm-256color
XDG_RUNTIME_DIR=<set>
ProcFB: 0 amdgpudrmfb
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-6.17.0-12-generic root=UUID=3412c7b3-e116-4927-b603-3da7641a647b ro quiet splash mem_sleep_default=s2idle crashkernel=2G-4G:320M,4G-32G:512M,32G-64G:1024M,64G-128G:2048M,128G-:4096M vt.handoff=7
RelatedPackageVersions:
firmware-sof N/A
linux-firmware 20250901.git993ff19b-0ubuntu1.6
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 06/11/2025
dmi.bios.release: 32.65
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: 3265
dmi.board.asset.tag: Default string
dmi.board.name: TUF GAMING B650E-E WIFI
dmi.board.vendor: ASUSTeK COMPUTER INC.
dmi.board.version: Rev 1.xx
dmi.chassis.asset.tag: Default string
dmi.chassis.type: 3
dmi.chassis.vendor: Default string
dmi.chassis.version: Default string
dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr3265:bd06/11/2025:br32.65:svnASUS:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnTUFGAMINGB650E-EWIFI:rvrRev1.xx:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
dmi.product.family: To be filled by O.E.M.
dmi.product.name: System Product Name
dmi.product.sku: SKU
dmi.product.version: System Version
dmi.sys.vendor: ASUS
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2141216/+subscriptions
Комментариев нет:
Отправить комментарий