[Kernel-packages] [Bug 1521445] Re: linux-ti-omap4: 3.2.0-1475.97 -proposed tracker

2015-12-04 Thread Steve Beattie
USN needed for CVE-2015-7872

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-7872

** Changed in: kernel-sru-workflow/security-signoff
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1521445

Title:
  linux-ti-omap4: 3.2.0-1475.97 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New

Bug description:
  This bug is for tracking the  upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 01. December 2015 03:01 UTC
  kernel-stable-master-bug:1521325
  kernel-stable-Certification-testing-end:Wednesday, 02. December 2015 16:00 UTC
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 20:00 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 20:00 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:00 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Thursday, 03. December 2015 14:00 UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 14:01 UTC
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 14:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 14:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521445/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1521445] Re: linux-ti-omap4: 3.2.0-1475.97 -proposed tracker

2015-12-04 Thread Brad Figg
** Description changed:

  This bug is for tracking the  upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 01. December 2015 03:01 UTC
  kernel-stable-master-bug:1521325
  kernel-stable-Certification-testing-end:Wednesday, 02. December 2015 16:00 UTC
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 20:00 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 20:00 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:00 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Thursday, 03. December 2015 14:00 UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 14:01 UTC
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 14:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 14:00 UTC
+ kernel-stable-Security-signoff-end:Friday, 04. December 2015 09:00 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1521445

Title:
  linux-ti-omap4: 3.2.0-1475.97 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New

Bug description:
  This bug is for tracking the  upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 01. December 2015 03:01 UTC
  kernel-stable-master-bug:1521325
  kernel-stable-Certification-testing-end:Wednesday, 02. December 2015 16:00 UTC
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 20:00 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 20:00 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:00 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Thursday, 03. December 2015 14:00 UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 14:01 UTC
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 14:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 14:00 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 09:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521445/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1220199] Re: CVE-2013-2894

2015-12-04 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: Undecided
   Status: Won't Fix

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Undecided
   Status: Won't Fix

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Fix Committed

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1220199

Title:
  CVE-2013-2894

Status in linux package in Ubuntu:
  Invalid
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-goldfish package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  Won't Fix
Status in linux-lts-backport-natty package in Ubuntu:
  Won't Fix
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  Invalid
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Committed
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick source package in Lucid:
  Won't Fix
Status in linux-lts-backport-natty source package in Lucid:
  Won't Fix
Status in linux source package in Precise:
  Invalid
Status in linux-armadaxp source package in Precise:
  Invalid
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-flo source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  Won't Fix
Status in linux-lts-backport-natty source package in Precise:
  Won't Fix
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Fix Released
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Invalid
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Quantal:
  Won't Fix
Status in linux-lts-backport-natty source package in Quantal:
 

[Kernel-packages] [Bug 1470250] Re: [Hyper-V] Ubuntu 14.04.2 LTS Generation 2 SCSI Errors on VSS Based Backups

2015-12-04 Thread Frederik Bosch
@decui Correct, ceteris paribus, the only changes were more of the same
(disk space) and some package changes through apt-get update (Ubuntu
14.04 LTS). My guess is that the downgrade is related to one of the two.
But I agree, let's postpone this one, until the read-only bug is fixed.
Afterwards, I will upgrade my production kernels to the latest stable
4.x kernel with the patch applied (I just read that the HWE kernel for
14.04 is going to 4.x in January anyhow). Then the performance might be
different after all.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1470250

Title:
  [Hyper-V] Ubuntu 14.04.2 LTS Generation 2 SCSI Errors on VSS Based
  Backups

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Utopic:
  In Progress
Status in linux source package in Vivid:
  In Progress
Status in linux source package in Wily:
  In Progress

Bug description:
  Customers have reported running various versions of Ubuntu 14.04.2 LTS
  on Generation 2 Hyper-V Hosts.On a random Basis, the file system
  will be mounted Read-Only due to a "disk error" (which really isn't
  the case here).As a result, they must reboot the Ubuntu guest to
  get the file system to mount RW again.

  The Error seen are the following:
  Apr 30 00:02:01 balticnetworkstraining kernel: [640153.968142] storvsc: Sense 
Key : Unit Attention [current] 
  Apr 30 00:02:01 balticnetworkstraining kernel: [640153.968145] storvsc: Add. 
Sense: Changed operating definition
  Apr 30 00:02:01 balticnetworkstraining kernel: [640153.968161] sd 0:0:0:0: 
Warning! Received an indication that the operating parameters on this target 
have changed. The Linux SCSI layer does not automatically adjust these 
parameters.
  Apr 30 01:23:26 balticnetworkstraining kernel: [645039.584164] hv_storvsc 
vmbus_0_4: cmd 0x2a scsi status 0x2 srb status 0x82
  Apr 30 01:23:26 balticnetworkstraining kernel: [645039.584178] hv_storvsc 
vmbus_0_4: stor pkt 88006eb6c700 autosense data valid - len 18
  Apr 30 01:23:26 balticnetworkstraining kernel: [645039.584180] storvsc: Sense 
Key : Unit Attention [current] 
  Apr 30 01:23:26 balticnetworkstraining kernel: [645039.584183] storvsc: Add. 
Sense: Changed operating definition
  Apr 30 01:23:26 balticnetworkstraining kernel: [645039.584198] sd 0:0:0:0: 
Warning! Received an indication that the operating parameters on this target 
have changed.  The Linux SCSI layer does not automatically adjust these 
parameters.

  This relates to the VSS "Windows Server Backup" process that kicks off at 
midnight on the host and finishes an hour and half later.   
  Yes, we do have hv_vss_daemon and hv_kvp_daemon running for the correct 
kernel version we have.   We're currently running kernel version 
3.13.0-49-generic #83 on one system and 3.16.0-34-generic #37 on the other. -- 
We see the same errors on both.
  As a result, we've been hesitant to drop any more ubuntu guests on our 2012R2 
hyper-v system because of this.   We can stop the backup process and all is 
good, but we need nightly backups to image all of our VM's.   All the windows 
guests have no issues of course.   We also have some CentOS based guests 
running without issues from what we've seen.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1470250/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1242321] Re: USB 3.0 Harddrive not recognised

2015-12-04 Thread olikaf
Confirmed on ubuntu 15.10.
I tried lsusb -v, Kirils workaround, the usb power management mode, nothing 
works.

However if  I boot with the  disk plugged, it's ok.

uname -as
Linux odin 4.2.0-19-generic #23-Ubuntu SMP Wed Nov 11 11:39:30 UTC 2015 x86_64 
x86_64 x86_64 GNU/Linux

lsusb
Bus 004 Device 004: ID 0a5c:5800 Broadcom Corp. BCM5880 Secure Applications 
Processor
Bus 004 Device 003: ID 413c:8143 Dell Computer Corp. 
Bus 004 Device 002: ID 8087:8000 Intel Corp. 
Bus 004 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 003 Device 003: ID 0c45:64d0 Microdia 
Bus 003 Device 002: ID 8087:8008 Intel Corp. 
Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 001 Device 002: ID 046d:c00f Logitech, Inc. MouseMan Traveler/Mobile
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1242321

Title:
  USB 3.0 Harddrive not recognised

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Ubuntu is not recognising any device plugged into any USB 3.0 ports.
  Sometimes Ubuntu will freeze for a few seconds when you plug something
  into a USB 3.0 port; when Ubuntu comes out of the freeze, the device
  is still NOT recognised.

  No problems with USB 2.0 ports and devices.

  The USB 3.0 on this computer only works in Windows 7 (I'm dual booting
  Ubuntu 13.10 and Windows 7, both are 64-bit).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1242321/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522094] ProcCpuinfo.txt

2015-12-04 Thread Jcat-l
apport information

** Attachment added: "ProcCpuinfo.txt"
   
https://bugs.launchpad.net/bugs/1522094/+attachment/4529553/+files/ProcCpuinfo.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522094

Title:
  WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-
  vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
  hsw_crt_pre_enable+0x7f/0x90 [i915]()

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When I connect a monitor the VGA port on the laptop - this is found in
  dmesg, and some of the kernel modules linked in become unstable [
  btrfs for instance, if it's in use].

  [2.962400] [ cut here ]
  [2.962424] WARNING: CPU: 0 PID: 233 at 
/build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
 hsw_crt_pre_enable+0x7f/0x90 [i915]()
  [2.962425] SPLL already enabled
  [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 
psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp 
pps_core pata_acpi wmi sdhci_acpi video sdhci
  [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic 
#42~14.04.1-Ubuntu
  [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 
05/19/2015
  [2.962439]  c02fd7f8 880220d23ab8 817af92b 
3a7a
  [2.962440]  880220d23b08 880220d23af8 81074e0a 
0046
  [2.962442]  880035fb 88003615eb60 880035f8f400 
88003615e800
  [2.962444] Call Trace:
  [2.962449]  [] dump_stack+0x45/0x57
  [2.962452]  [] warn_slowpath_common+0x8a/0xc0
  [2.962453]  [] warn_slowpath_fmt+0x46/0x50
  [2.962464]  [] hsw_crt_pre_enable+0x7f/0x90 [i915]
  [2.962475]  [] haswell_crtc_enable+0x3fc/0xaf0 [i915]
  [2.962485]  [] __intel_set_mode+0x872/0xc60 [i915]
  [2.962495]  [] intel_crtc_set_config+0x9e2/0xf60 [i915]
  [2.962506]  [] drm_mode_set_config_internal+0x6f/0x110 
[drm]
  [2.962511]  [] restore_fbdev_mode+0xc8/0xf0 
[drm_kms_helper]
  [2.962515]  [] 
drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper]
  [2.962525]  [] intel_fbdev_restore_mode+0x1e/0x50 [i915]
  [2.962536]  [] i915_driver_lastclose+0xe/0x20 [i915]
  [2.962541]  [] drm_lastclose+0x2e/0x130 [drm]
  [2.962546]  [] drm_release+0x338/0x540 [drm]
  [2.962549]  [] __fput+0xe7/0x220
  [2.962551]  [] fput+0xe/0x10
  [2.962553]  [] task_work_run+0xac/0xd0
  [2.962556]  [] do_notify_resume+0x97/0xb0
  [2.962558]  [] int_signal+0x12/0x17
  [2.962559] ---[ end trace b6b778d930eaeda7 ]---

  This is the lts-vivid kernel.  downgrading to the lts-utopic kernel fixes the 
issue.
  I tried the wily-lts, same issue.

  I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel-
  ppa :

  linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken

  linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works 
fine!  :)
  --- 
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jcat   2559 F pulseaudio
   /dev/snd/controlC1:  jcat   2559 F pulseaudio
  CurrentDesktop: GNOME
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f
  InstallationDate: Installed on 2015-11-25 (8 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  MachineType: Dell Inc. Latitude E6540
  NonfreeKernelModules: fglrx
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed 
root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-39-generic N/A
   linux-backports-modules-3.19.0-39-generic  N/A
   linux-firmware 1.127.19
  Tags:  trusty
  Uname: Linux 3.19.0-39-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 05/19/2015
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A15
  dmi.board.name: 0PXPYJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6540
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : 

[Kernel-packages] [Bug 1522094] CurrentDmesg.txt

2015-12-04 Thread Jcat-l
apport information

** Attachment added: "CurrentDmesg.txt"
   
https://bugs.launchpad.net/bugs/1522094/+attachment/4529549/+files/CurrentDmesg.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522094

Title:
  WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-
  vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
  hsw_crt_pre_enable+0x7f/0x90 [i915]()

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When I connect a monitor the VGA port on the laptop - this is found in
  dmesg, and some of the kernel modules linked in become unstable [
  btrfs for instance, if it's in use].

  [2.962400] [ cut here ]
  [2.962424] WARNING: CPU: 0 PID: 233 at 
/build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
 hsw_crt_pre_enable+0x7f/0x90 [i915]()
  [2.962425] SPLL already enabled
  [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 
psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp 
pps_core pata_acpi wmi sdhci_acpi video sdhci
  [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic 
#42~14.04.1-Ubuntu
  [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 
05/19/2015
  [2.962439]  c02fd7f8 880220d23ab8 817af92b 
3a7a
  [2.962440]  880220d23b08 880220d23af8 81074e0a 
0046
  [2.962442]  880035fb 88003615eb60 880035f8f400 
88003615e800
  [2.962444] Call Trace:
  [2.962449]  [] dump_stack+0x45/0x57
  [2.962452]  [] warn_slowpath_common+0x8a/0xc0
  [2.962453]  [] warn_slowpath_fmt+0x46/0x50
  [2.962464]  [] hsw_crt_pre_enable+0x7f/0x90 [i915]
  [2.962475]  [] haswell_crtc_enable+0x3fc/0xaf0 [i915]
  [2.962485]  [] __intel_set_mode+0x872/0xc60 [i915]
  [2.962495]  [] intel_crtc_set_config+0x9e2/0xf60 [i915]
  [2.962506]  [] drm_mode_set_config_internal+0x6f/0x110 
[drm]
  [2.962511]  [] restore_fbdev_mode+0xc8/0xf0 
[drm_kms_helper]
  [2.962515]  [] 
drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper]
  [2.962525]  [] intel_fbdev_restore_mode+0x1e/0x50 [i915]
  [2.962536]  [] i915_driver_lastclose+0xe/0x20 [i915]
  [2.962541]  [] drm_lastclose+0x2e/0x130 [drm]
  [2.962546]  [] drm_release+0x338/0x540 [drm]
  [2.962549]  [] __fput+0xe7/0x220
  [2.962551]  [] fput+0xe/0x10
  [2.962553]  [] task_work_run+0xac/0xd0
  [2.962556]  [] do_notify_resume+0x97/0xb0
  [2.962558]  [] int_signal+0x12/0x17
  [2.962559] ---[ end trace b6b778d930eaeda7 ]---

  This is the lts-vivid kernel.  downgrading to the lts-utopic kernel fixes the 
issue.
  I tried the wily-lts, same issue.

  I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel-
  ppa :

  linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken

  linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works 
fine!  :)
  --- 
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jcat   2559 F pulseaudio
   /dev/snd/controlC1:  jcat   2559 F pulseaudio
  CurrentDesktop: GNOME
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f
  InstallationDate: Installed on 2015-11-25 (8 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  MachineType: Dell Inc. Latitude E6540
  NonfreeKernelModules: fglrx
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed 
root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-39-generic N/A
   linux-backports-modules-3.19.0-39-generic  N/A
   linux-firmware 1.127.19
  Tags:  trusty
  Uname: Linux 3.19.0-39-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 05/19/2015
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A15
  dmi.board.name: 0PXPYJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6540
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : 

[Kernel-packages] [Bug 1522094] ProcInterrupts.txt

2015-12-04 Thread Jcat-l
apport information

** Attachment added: "ProcInterrupts.txt"
   
https://bugs.launchpad.net/bugs/1522094/+attachment/4529555/+files/ProcInterrupts.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522094

Title:
  WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-
  vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
  hsw_crt_pre_enable+0x7f/0x90 [i915]()

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When I connect a monitor the VGA port on the laptop - this is found in
  dmesg, and some of the kernel modules linked in become unstable [
  btrfs for instance, if it's in use].

  [2.962400] [ cut here ]
  [2.962424] WARNING: CPU: 0 PID: 233 at 
/build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
 hsw_crt_pre_enable+0x7f/0x90 [i915]()
  [2.962425] SPLL already enabled
  [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 
psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp 
pps_core pata_acpi wmi sdhci_acpi video sdhci
  [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic 
#42~14.04.1-Ubuntu
  [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 
05/19/2015
  [2.962439]  c02fd7f8 880220d23ab8 817af92b 
3a7a
  [2.962440]  880220d23b08 880220d23af8 81074e0a 
0046
  [2.962442]  880035fb 88003615eb60 880035f8f400 
88003615e800
  [2.962444] Call Trace:
  [2.962449]  [] dump_stack+0x45/0x57
  [2.962452]  [] warn_slowpath_common+0x8a/0xc0
  [2.962453]  [] warn_slowpath_fmt+0x46/0x50
  [2.962464]  [] hsw_crt_pre_enable+0x7f/0x90 [i915]
  [2.962475]  [] haswell_crtc_enable+0x3fc/0xaf0 [i915]
  [2.962485]  [] __intel_set_mode+0x872/0xc60 [i915]
  [2.962495]  [] intel_crtc_set_config+0x9e2/0xf60 [i915]
  [2.962506]  [] drm_mode_set_config_internal+0x6f/0x110 
[drm]
  [2.962511]  [] restore_fbdev_mode+0xc8/0xf0 
[drm_kms_helper]
  [2.962515]  [] 
drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper]
  [2.962525]  [] intel_fbdev_restore_mode+0x1e/0x50 [i915]
  [2.962536]  [] i915_driver_lastclose+0xe/0x20 [i915]
  [2.962541]  [] drm_lastclose+0x2e/0x130 [drm]
  [2.962546]  [] drm_release+0x338/0x540 [drm]
  [2.962549]  [] __fput+0xe7/0x220
  [2.962551]  [] fput+0xe/0x10
  [2.962553]  [] task_work_run+0xac/0xd0
  [2.962556]  [] do_notify_resume+0x97/0xb0
  [2.962558]  [] int_signal+0x12/0x17
  [2.962559] ---[ end trace b6b778d930eaeda7 ]---

  This is the lts-vivid kernel.  downgrading to the lts-utopic kernel fixes the 
issue.
  I tried the wily-lts, same issue.

  I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel-
  ppa :

  linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken

  linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works 
fine!  :)
  --- 
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jcat   2559 F pulseaudio
   /dev/snd/controlC1:  jcat   2559 F pulseaudio
  CurrentDesktop: GNOME
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f
  InstallationDate: Installed on 2015-11-25 (8 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  MachineType: Dell Inc. Latitude E6540
  NonfreeKernelModules: fglrx
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed 
root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-39-generic N/A
   linux-backports-modules-3.19.0-39-generic  N/A
   linux-firmware 1.127.19
  Tags:  trusty
  Uname: Linux 3.19.0-39-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 05/19/2015
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A15
  dmi.board.name: 0PXPYJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6540
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : 

[Kernel-packages] [Bug 1522094] Lspci.txt

2015-12-04 Thread Jcat-l
apport information

** Attachment added: "Lspci.txt"
   https://bugs.launchpad.net/bugs/1522094/+attachment/4529551/+files/Lspci.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522094

Title:
  WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-
  vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
  hsw_crt_pre_enable+0x7f/0x90 [i915]()

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When I connect a monitor the VGA port on the laptop - this is found in
  dmesg, and some of the kernel modules linked in become unstable [
  btrfs for instance, if it's in use].

  [2.962400] [ cut here ]
  [2.962424] WARNING: CPU: 0 PID: 233 at 
/build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
 hsw_crt_pre_enable+0x7f/0x90 [i915]()
  [2.962425] SPLL already enabled
  [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 
psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp 
pps_core pata_acpi wmi sdhci_acpi video sdhci
  [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic 
#42~14.04.1-Ubuntu
  [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 
05/19/2015
  [2.962439]  c02fd7f8 880220d23ab8 817af92b 
3a7a
  [2.962440]  880220d23b08 880220d23af8 81074e0a 
0046
  [2.962442]  880035fb 88003615eb60 880035f8f400 
88003615e800
  [2.962444] Call Trace:
  [2.962449]  [] dump_stack+0x45/0x57
  [2.962452]  [] warn_slowpath_common+0x8a/0xc0
  [2.962453]  [] warn_slowpath_fmt+0x46/0x50
  [2.962464]  [] hsw_crt_pre_enable+0x7f/0x90 [i915]
  [2.962475]  [] haswell_crtc_enable+0x3fc/0xaf0 [i915]
  [2.962485]  [] __intel_set_mode+0x872/0xc60 [i915]
  [2.962495]  [] intel_crtc_set_config+0x9e2/0xf60 [i915]
  [2.962506]  [] drm_mode_set_config_internal+0x6f/0x110 
[drm]
  [2.962511]  [] restore_fbdev_mode+0xc8/0xf0 
[drm_kms_helper]
  [2.962515]  [] 
drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper]
  [2.962525]  [] intel_fbdev_restore_mode+0x1e/0x50 [i915]
  [2.962536]  [] i915_driver_lastclose+0xe/0x20 [i915]
  [2.962541]  [] drm_lastclose+0x2e/0x130 [drm]
  [2.962546]  [] drm_release+0x338/0x540 [drm]
  [2.962549]  [] __fput+0xe7/0x220
  [2.962551]  [] fput+0xe/0x10
  [2.962553]  [] task_work_run+0xac/0xd0
  [2.962556]  [] do_notify_resume+0x97/0xb0
  [2.962558]  [] int_signal+0x12/0x17
  [2.962559] ---[ end trace b6b778d930eaeda7 ]---

  This is the lts-vivid kernel.  downgrading to the lts-utopic kernel fixes the 
issue.
  I tried the wily-lts, same issue.

  I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel-
  ppa :

  linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken

  linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works 
fine!  :)
  --- 
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jcat   2559 F pulseaudio
   /dev/snd/controlC1:  jcat   2559 F pulseaudio
  CurrentDesktop: GNOME
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f
  InstallationDate: Installed on 2015-11-25 (8 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  MachineType: Dell Inc. Latitude E6540
  NonfreeKernelModules: fglrx
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed 
root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-39-generic N/A
   linux-backports-modules-3.19.0-39-generic  N/A
   linux-firmware 1.127.19
  Tags:  trusty
  Uname: Linux 3.19.0-39-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 05/19/2015
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A15
  dmi.board.name: 0PXPYJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6540
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : 

[Kernel-packages] [Bug 1522094] Re: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]()

2015-12-04 Thread Jcat-l
apport information

** Tags added: apport-collected trusty

** Description changed:

  When I connect a monitor the VGA port on the laptop - this is found in
  dmesg, and some of the kernel modules linked in become unstable [ btrfs
  for instance, if it's in use].
  
  [2.962400] [ cut here ]
  [2.962424] WARNING: CPU: 0 PID: 233 at 
/build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
 hsw_crt_pre_enable+0x7f/0x90 [i915]()
  [2.962425] SPLL already enabled
  [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 
psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp 
pps_core pata_acpi wmi sdhci_acpi video sdhci
  [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic 
#42~14.04.1-Ubuntu
  [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 
05/19/2015
  [2.962439]  c02fd7f8 880220d23ab8 817af92b 
3a7a
  [2.962440]  880220d23b08 880220d23af8 81074e0a 
0046
  [2.962442]  880035fb 88003615eb60 880035f8f400 
88003615e800
  [2.962444] Call Trace:
  [2.962449]  [] dump_stack+0x45/0x57
  [2.962452]  [] warn_slowpath_common+0x8a/0xc0
  [2.962453]  [] warn_slowpath_fmt+0x46/0x50
  [2.962464]  [] hsw_crt_pre_enable+0x7f/0x90 [i915]
  [2.962475]  [] haswell_crtc_enable+0x3fc/0xaf0 [i915]
  [2.962485]  [] __intel_set_mode+0x872/0xc60 [i915]
  [2.962495]  [] intel_crtc_set_config+0x9e2/0xf60 [i915]
  [2.962506]  [] drm_mode_set_config_internal+0x6f/0x110 
[drm]
  [2.962511]  [] restore_fbdev_mode+0xc8/0xf0 
[drm_kms_helper]
  [2.962515]  [] 
drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper]
  [2.962525]  [] intel_fbdev_restore_mode+0x1e/0x50 [i915]
  [2.962536]  [] i915_driver_lastclose+0xe/0x20 [i915]
  [2.962541]  [] drm_lastclose+0x2e/0x130 [drm]
  [2.962546]  [] drm_release+0x338/0x540 [drm]
  [2.962549]  [] __fput+0xe7/0x220
  [2.962551]  [] fput+0xe/0x10
  [2.962553]  [] task_work_run+0xac/0xd0
  [2.962556]  [] do_notify_resume+0x97/0xb0
  [2.962558]  [] int_signal+0x12/0x17
  [2.962559] ---[ end trace b6b778d930eaeda7 ]---
  
  This is the lts-vivid kernel.  downgrading to the lts-utopic kernel fixes the 
issue.
  I tried the wily-lts, same issue.
  
  I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel-
  ppa :
  
  linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken
  
- linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works
- fine!  :)
+ linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works 
fine!  :)
+ --- 
+ ApportVersion: 2.14.1-0ubuntu3.19
+ Architecture: amd64
+ AudioDevicesInUse:
+  USERPID ACCESS COMMAND
+  /dev/snd/controlC0:  jcat   2559 F pulseaudio
+  /dev/snd/controlC1:  jcat   2559 F pulseaudio
+ CurrentDesktop: GNOME
+ DistroRelease: Ubuntu 14.04
+ HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f
+ InstallationDate: Installed on 2015-11-25 (8 days ago)
+ InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
+ MachineType: Dell Inc. Latitude E6540
+ NonfreeKernelModules: fglrx
+ Package: linux (not installed)
+ ProcFB: 0 inteldrmfb
+ ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed 
root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7
+ ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9
+ RelatedPackageVersions:
+  linux-restricted-modules-3.19.0-39-generic N/A
+  linux-backports-modules-3.19.0-39-generic  N/A
+  linux-firmware 1.127.19
+ Tags:  trusty
+ Uname: Linux 3.19.0-39-generic x86_64
+ UpgradeStatus: No upgrade log present (probably fresh install)
+ UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
+ _MarkForUpload: True
+ dmi.bios.date: 05/19/2015
+ dmi.bios.vendor: Dell Inc.
+ dmi.bios.version: A15
+ dmi.board.name: 0PXPYJ
+ dmi.board.vendor: Dell Inc.
+ dmi.board.version: A00
+ dmi.chassis.type: 9
+ dmi.chassis.vendor: Dell Inc.
+ dmi.modalias: 
dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr:
+ dmi.product.name: Latitude E6540
+ dmi.product.version: 01
+ dmi.sys.vendor: Dell Inc.

** Attachment added: "AlsaInfo.txt"
   
https://bugs.launchpad.net/bugs/1522094/+attachment/4529546/+files/AlsaInfo.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522094

Title:
  WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-
  vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
  hsw_crt_pre_enable+0x7f/0x90 [i915]()

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When I connect a monitor the VGA port on the 

[Kernel-packages] [Bug 1522094] Lsusb.txt

2015-12-04 Thread Jcat-l
apport information

** Attachment added: "Lsusb.txt"
   https://bugs.launchpad.net/bugs/1522094/+attachment/4529552/+files/Lsusb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522094

Title:
  WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-
  vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
  hsw_crt_pre_enable+0x7f/0x90 [i915]()

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When I connect a monitor the VGA port on the laptop - this is found in
  dmesg, and some of the kernel modules linked in become unstable [
  btrfs for instance, if it's in use].

  [2.962400] [ cut here ]
  [2.962424] WARNING: CPU: 0 PID: 233 at 
/build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
 hsw_crt_pre_enable+0x7f/0x90 [i915]()
  [2.962425] SPLL already enabled
  [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 
psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp 
pps_core pata_acpi wmi sdhci_acpi video sdhci
  [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic 
#42~14.04.1-Ubuntu
  [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 
05/19/2015
  [2.962439]  c02fd7f8 880220d23ab8 817af92b 
3a7a
  [2.962440]  880220d23b08 880220d23af8 81074e0a 
0046
  [2.962442]  880035fb 88003615eb60 880035f8f400 
88003615e800
  [2.962444] Call Trace:
  [2.962449]  [] dump_stack+0x45/0x57
  [2.962452]  [] warn_slowpath_common+0x8a/0xc0
  [2.962453]  [] warn_slowpath_fmt+0x46/0x50
  [2.962464]  [] hsw_crt_pre_enable+0x7f/0x90 [i915]
  [2.962475]  [] haswell_crtc_enable+0x3fc/0xaf0 [i915]
  [2.962485]  [] __intel_set_mode+0x872/0xc60 [i915]
  [2.962495]  [] intel_crtc_set_config+0x9e2/0xf60 [i915]
  [2.962506]  [] drm_mode_set_config_internal+0x6f/0x110 
[drm]
  [2.962511]  [] restore_fbdev_mode+0xc8/0xf0 
[drm_kms_helper]
  [2.962515]  [] 
drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper]
  [2.962525]  [] intel_fbdev_restore_mode+0x1e/0x50 [i915]
  [2.962536]  [] i915_driver_lastclose+0xe/0x20 [i915]
  [2.962541]  [] drm_lastclose+0x2e/0x130 [drm]
  [2.962546]  [] drm_release+0x338/0x540 [drm]
  [2.962549]  [] __fput+0xe7/0x220
  [2.962551]  [] fput+0xe/0x10
  [2.962553]  [] task_work_run+0xac/0xd0
  [2.962556]  [] do_notify_resume+0x97/0xb0
  [2.962558]  [] int_signal+0x12/0x17
  [2.962559] ---[ end trace b6b778d930eaeda7 ]---

  This is the lts-vivid kernel.  downgrading to the lts-utopic kernel fixes the 
issue.
  I tried the wily-lts, same issue.

  I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel-
  ppa :

  linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken

  linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works 
fine!  :)
  --- 
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jcat   2559 F pulseaudio
   /dev/snd/controlC1:  jcat   2559 F pulseaudio
  CurrentDesktop: GNOME
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f
  InstallationDate: Installed on 2015-11-25 (8 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  MachineType: Dell Inc. Latitude E6540
  NonfreeKernelModules: fglrx
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed 
root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-39-generic N/A
   linux-backports-modules-3.19.0-39-generic  N/A
   linux-firmware 1.127.19
  Tags:  trusty
  Uname: Linux 3.19.0-39-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 05/19/2015
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A15
  dmi.board.name: 0PXPYJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6540
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : 

[Kernel-packages] [Bug 1522094] IwConfig.txt

2015-12-04 Thread Jcat-l
apport information

** Attachment added: "IwConfig.txt"
   
https://bugs.launchpad.net/bugs/1522094/+attachment/4529550/+files/IwConfig.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522094

Title:
  WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-
  vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
  hsw_crt_pre_enable+0x7f/0x90 [i915]()

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When I connect a monitor the VGA port on the laptop - this is found in
  dmesg, and some of the kernel modules linked in become unstable [
  btrfs for instance, if it's in use].

  [2.962400] [ cut here ]
  [2.962424] WARNING: CPU: 0 PID: 233 at 
/build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
 hsw_crt_pre_enable+0x7f/0x90 [i915]()
  [2.962425] SPLL already enabled
  [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 
psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp 
pps_core pata_acpi wmi sdhci_acpi video sdhci
  [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic 
#42~14.04.1-Ubuntu
  [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 
05/19/2015
  [2.962439]  c02fd7f8 880220d23ab8 817af92b 
3a7a
  [2.962440]  880220d23b08 880220d23af8 81074e0a 
0046
  [2.962442]  880035fb 88003615eb60 880035f8f400 
88003615e800
  [2.962444] Call Trace:
  [2.962449]  [] dump_stack+0x45/0x57
  [2.962452]  [] warn_slowpath_common+0x8a/0xc0
  [2.962453]  [] warn_slowpath_fmt+0x46/0x50
  [2.962464]  [] hsw_crt_pre_enable+0x7f/0x90 [i915]
  [2.962475]  [] haswell_crtc_enable+0x3fc/0xaf0 [i915]
  [2.962485]  [] __intel_set_mode+0x872/0xc60 [i915]
  [2.962495]  [] intel_crtc_set_config+0x9e2/0xf60 [i915]
  [2.962506]  [] drm_mode_set_config_internal+0x6f/0x110 
[drm]
  [2.962511]  [] restore_fbdev_mode+0xc8/0xf0 
[drm_kms_helper]
  [2.962515]  [] 
drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper]
  [2.962525]  [] intel_fbdev_restore_mode+0x1e/0x50 [i915]
  [2.962536]  [] i915_driver_lastclose+0xe/0x20 [i915]
  [2.962541]  [] drm_lastclose+0x2e/0x130 [drm]
  [2.962546]  [] drm_release+0x338/0x540 [drm]
  [2.962549]  [] __fput+0xe7/0x220
  [2.962551]  [] fput+0xe/0x10
  [2.962553]  [] task_work_run+0xac/0xd0
  [2.962556]  [] do_notify_resume+0x97/0xb0
  [2.962558]  [] int_signal+0x12/0x17
  [2.962559] ---[ end trace b6b778d930eaeda7 ]---

  This is the lts-vivid kernel.  downgrading to the lts-utopic kernel fixes the 
issue.
  I tried the wily-lts, same issue.

  I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel-
  ppa :

  linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken

  linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works 
fine!  :)
  --- 
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jcat   2559 F pulseaudio
   /dev/snd/controlC1:  jcat   2559 F pulseaudio
  CurrentDesktop: GNOME
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f
  InstallationDate: Installed on 2015-11-25 (8 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  MachineType: Dell Inc. Latitude E6540
  NonfreeKernelModules: fglrx
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed 
root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-39-generic N/A
   linux-backports-modules-3.19.0-39-generic  N/A
   linux-firmware 1.127.19
  Tags:  trusty
  Uname: Linux 3.19.0-39-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 05/19/2015
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A15
  dmi.board.name: 0PXPYJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6540
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : 

[Kernel-packages] [Bug 1522094] ProcEnviron.txt

2015-12-04 Thread Jcat-l
apport information

** Attachment added: "ProcEnviron.txt"
   
https://bugs.launchpad.net/bugs/1522094/+attachment/4529554/+files/ProcEnviron.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522094

Title:
  WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-
  vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
  hsw_crt_pre_enable+0x7f/0x90 [i915]()

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When I connect a monitor the VGA port on the laptop - this is found in
  dmesg, and some of the kernel modules linked in become unstable [
  btrfs for instance, if it's in use].

  [2.962400] [ cut here ]
  [2.962424] WARNING: CPU: 0 PID: 233 at 
/build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
 hsw_crt_pre_enable+0x7f/0x90 [i915]()
  [2.962425] SPLL already enabled
  [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 
psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp 
pps_core pata_acpi wmi sdhci_acpi video sdhci
  [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic 
#42~14.04.1-Ubuntu
  [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 
05/19/2015
  [2.962439]  c02fd7f8 880220d23ab8 817af92b 
3a7a
  [2.962440]  880220d23b08 880220d23af8 81074e0a 
0046
  [2.962442]  880035fb 88003615eb60 880035f8f400 
88003615e800
  [2.962444] Call Trace:
  [2.962449]  [] dump_stack+0x45/0x57
  [2.962452]  [] warn_slowpath_common+0x8a/0xc0
  [2.962453]  [] warn_slowpath_fmt+0x46/0x50
  [2.962464]  [] hsw_crt_pre_enable+0x7f/0x90 [i915]
  [2.962475]  [] haswell_crtc_enable+0x3fc/0xaf0 [i915]
  [2.962485]  [] __intel_set_mode+0x872/0xc60 [i915]
  [2.962495]  [] intel_crtc_set_config+0x9e2/0xf60 [i915]
  [2.962506]  [] drm_mode_set_config_internal+0x6f/0x110 
[drm]
  [2.962511]  [] restore_fbdev_mode+0xc8/0xf0 
[drm_kms_helper]
  [2.962515]  [] 
drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper]
  [2.962525]  [] intel_fbdev_restore_mode+0x1e/0x50 [i915]
  [2.962536]  [] i915_driver_lastclose+0xe/0x20 [i915]
  [2.962541]  [] drm_lastclose+0x2e/0x130 [drm]
  [2.962546]  [] drm_release+0x338/0x540 [drm]
  [2.962549]  [] __fput+0xe7/0x220
  [2.962551]  [] fput+0xe/0x10
  [2.962553]  [] task_work_run+0xac/0xd0
  [2.962556]  [] do_notify_resume+0x97/0xb0
  [2.962558]  [] int_signal+0x12/0x17
  [2.962559] ---[ end trace b6b778d930eaeda7 ]---

  This is the lts-vivid kernel.  downgrading to the lts-utopic kernel fixes the 
issue.
  I tried the wily-lts, same issue.

  I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel-
  ppa :

  linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken

  linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works 
fine!  :)
  --- 
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jcat   2559 F pulseaudio
   /dev/snd/controlC1:  jcat   2559 F pulseaudio
  CurrentDesktop: GNOME
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f
  InstallationDate: Installed on 2015-11-25 (8 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  MachineType: Dell Inc. Latitude E6540
  NonfreeKernelModules: fglrx
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed 
root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-39-generic N/A
   linux-backports-modules-3.19.0-39-generic  N/A
   linux-firmware 1.127.19
  Tags:  trusty
  Uname: Linux 3.19.0-39-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 05/19/2015
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A15
  dmi.board.name: 0PXPYJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6540
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : 

[Kernel-packages] [Bug 1522094] BootDmesg.txt

2015-12-04 Thread Jcat-l
apport information

** Attachment added: "BootDmesg.txt"
   
https://bugs.launchpad.net/bugs/1522094/+attachment/4529547/+files/BootDmesg.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522094

Title:
  WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-
  vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
  hsw_crt_pre_enable+0x7f/0x90 [i915]()

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When I connect a monitor the VGA port on the laptop - this is found in
  dmesg, and some of the kernel modules linked in become unstable [
  btrfs for instance, if it's in use].

  [2.962400] [ cut here ]
  [2.962424] WARNING: CPU: 0 PID: 233 at 
/build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
 hsw_crt_pre_enable+0x7f/0x90 [i915]()
  [2.962425] SPLL already enabled
  [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 
psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp 
pps_core pata_acpi wmi sdhci_acpi video sdhci
  [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic 
#42~14.04.1-Ubuntu
  [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 
05/19/2015
  [2.962439]  c02fd7f8 880220d23ab8 817af92b 
3a7a
  [2.962440]  880220d23b08 880220d23af8 81074e0a 
0046
  [2.962442]  880035fb 88003615eb60 880035f8f400 
88003615e800
  [2.962444] Call Trace:
  [2.962449]  [] dump_stack+0x45/0x57
  [2.962452]  [] warn_slowpath_common+0x8a/0xc0
  [2.962453]  [] warn_slowpath_fmt+0x46/0x50
  [2.962464]  [] hsw_crt_pre_enable+0x7f/0x90 [i915]
  [2.962475]  [] haswell_crtc_enable+0x3fc/0xaf0 [i915]
  [2.962485]  [] __intel_set_mode+0x872/0xc60 [i915]
  [2.962495]  [] intel_crtc_set_config+0x9e2/0xf60 [i915]
  [2.962506]  [] drm_mode_set_config_internal+0x6f/0x110 
[drm]
  [2.962511]  [] restore_fbdev_mode+0xc8/0xf0 
[drm_kms_helper]
  [2.962515]  [] 
drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper]
  [2.962525]  [] intel_fbdev_restore_mode+0x1e/0x50 [i915]
  [2.962536]  [] i915_driver_lastclose+0xe/0x20 [i915]
  [2.962541]  [] drm_lastclose+0x2e/0x130 [drm]
  [2.962546]  [] drm_release+0x338/0x540 [drm]
  [2.962549]  [] __fput+0xe7/0x220
  [2.962551]  [] fput+0xe/0x10
  [2.962553]  [] task_work_run+0xac/0xd0
  [2.962556]  [] do_notify_resume+0x97/0xb0
  [2.962558]  [] int_signal+0x12/0x17
  [2.962559] ---[ end trace b6b778d930eaeda7 ]---

  This is the lts-vivid kernel.  downgrading to the lts-utopic kernel fixes the 
issue.
  I tried the wily-lts, same issue.

  I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel-
  ppa :

  linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken

  linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works 
fine!  :)
  --- 
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jcat   2559 F pulseaudio
   /dev/snd/controlC1:  jcat   2559 F pulseaudio
  CurrentDesktop: GNOME
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f
  InstallationDate: Installed on 2015-11-25 (8 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  MachineType: Dell Inc. Latitude E6540
  NonfreeKernelModules: fglrx
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed 
root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-39-generic N/A
   linux-backports-modules-3.19.0-39-generic  N/A
   linux-firmware 1.127.19
  Tags:  trusty
  Uname: Linux 3.19.0-39-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 05/19/2015
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A15
  dmi.board.name: 0PXPYJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6540
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : 

[Kernel-packages] [Bug 1522094] PulseList.txt

2015-12-04 Thread Jcat-l
apport information

** Attachment added: "PulseList.txt"
   
https://bugs.launchpad.net/bugs/1522094/+attachment/4529557/+files/PulseList.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522094

Title:
  WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-
  vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
  hsw_crt_pre_enable+0x7f/0x90 [i915]()

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When I connect a monitor the VGA port on the laptop - this is found in
  dmesg, and some of the kernel modules linked in become unstable [
  btrfs for instance, if it's in use].

  [2.962400] [ cut here ]
  [2.962424] WARNING: CPU: 0 PID: 233 at 
/build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
 hsw_crt_pre_enable+0x7f/0x90 [i915]()
  [2.962425] SPLL already enabled
  [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 
psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp 
pps_core pata_acpi wmi sdhci_acpi video sdhci
  [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic 
#42~14.04.1-Ubuntu
  [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 
05/19/2015
  [2.962439]  c02fd7f8 880220d23ab8 817af92b 
3a7a
  [2.962440]  880220d23b08 880220d23af8 81074e0a 
0046
  [2.962442]  880035fb 88003615eb60 880035f8f400 
88003615e800
  [2.962444] Call Trace:
  [2.962449]  [] dump_stack+0x45/0x57
  [2.962452]  [] warn_slowpath_common+0x8a/0xc0
  [2.962453]  [] warn_slowpath_fmt+0x46/0x50
  [2.962464]  [] hsw_crt_pre_enable+0x7f/0x90 [i915]
  [2.962475]  [] haswell_crtc_enable+0x3fc/0xaf0 [i915]
  [2.962485]  [] __intel_set_mode+0x872/0xc60 [i915]
  [2.962495]  [] intel_crtc_set_config+0x9e2/0xf60 [i915]
  [2.962506]  [] drm_mode_set_config_internal+0x6f/0x110 
[drm]
  [2.962511]  [] restore_fbdev_mode+0xc8/0xf0 
[drm_kms_helper]
  [2.962515]  [] 
drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper]
  [2.962525]  [] intel_fbdev_restore_mode+0x1e/0x50 [i915]
  [2.962536]  [] i915_driver_lastclose+0xe/0x20 [i915]
  [2.962541]  [] drm_lastclose+0x2e/0x130 [drm]
  [2.962546]  [] drm_release+0x338/0x540 [drm]
  [2.962549]  [] __fput+0xe7/0x220
  [2.962551]  [] fput+0xe/0x10
  [2.962553]  [] task_work_run+0xac/0xd0
  [2.962556]  [] do_notify_resume+0x97/0xb0
  [2.962558]  [] int_signal+0x12/0x17
  [2.962559] ---[ end trace b6b778d930eaeda7 ]---

  This is the lts-vivid kernel.  downgrading to the lts-utopic kernel fixes the 
issue.
  I tried the wily-lts, same issue.

  I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel-
  ppa :

  linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken

  linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works 
fine!  :)
  --- 
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jcat   2559 F pulseaudio
   /dev/snd/controlC1:  jcat   2559 F pulseaudio
  CurrentDesktop: GNOME
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f
  InstallationDate: Installed on 2015-11-25 (8 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  MachineType: Dell Inc. Latitude E6540
  NonfreeKernelModules: fglrx
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed 
root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-39-generic N/A
   linux-backports-modules-3.19.0-39-generic  N/A
   linux-firmware 1.127.19
  Tags:  trusty
  Uname: Linux 3.19.0-39-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 05/19/2015
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A15
  dmi.board.name: 0PXPYJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6540
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : 

[Kernel-packages] [Bug 1522094] WifiSyslog.txt

2015-12-04 Thread Jcat-l
apport information

** Attachment added: "WifiSyslog.txt"
   
https://bugs.launchpad.net/bugs/1522094/+attachment/4529561/+files/WifiSyslog.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522094

Title:
  WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-
  vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
  hsw_crt_pre_enable+0x7f/0x90 [i915]()

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When I connect a monitor the VGA port on the laptop - this is found in
  dmesg, and some of the kernel modules linked in become unstable [
  btrfs for instance, if it's in use].

  [2.962400] [ cut here ]
  [2.962424] WARNING: CPU: 0 PID: 233 at 
/build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
 hsw_crt_pre_enable+0x7f/0x90 [i915]()
  [2.962425] SPLL already enabled
  [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 
psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp 
pps_core pata_acpi wmi sdhci_acpi video sdhci
  [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic 
#42~14.04.1-Ubuntu
  [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 
05/19/2015
  [2.962439]  c02fd7f8 880220d23ab8 817af92b 
3a7a
  [2.962440]  880220d23b08 880220d23af8 81074e0a 
0046
  [2.962442]  880035fb 88003615eb60 880035f8f400 
88003615e800
  [2.962444] Call Trace:
  [2.962449]  [] dump_stack+0x45/0x57
  [2.962452]  [] warn_slowpath_common+0x8a/0xc0
  [2.962453]  [] warn_slowpath_fmt+0x46/0x50
  [2.962464]  [] hsw_crt_pre_enable+0x7f/0x90 [i915]
  [2.962475]  [] haswell_crtc_enable+0x3fc/0xaf0 [i915]
  [2.962485]  [] __intel_set_mode+0x872/0xc60 [i915]
  [2.962495]  [] intel_crtc_set_config+0x9e2/0xf60 [i915]
  [2.962506]  [] drm_mode_set_config_internal+0x6f/0x110 
[drm]
  [2.962511]  [] restore_fbdev_mode+0xc8/0xf0 
[drm_kms_helper]
  [2.962515]  [] 
drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper]
  [2.962525]  [] intel_fbdev_restore_mode+0x1e/0x50 [i915]
  [2.962536]  [] i915_driver_lastclose+0xe/0x20 [i915]
  [2.962541]  [] drm_lastclose+0x2e/0x130 [drm]
  [2.962546]  [] drm_release+0x338/0x540 [drm]
  [2.962549]  [] __fput+0xe7/0x220
  [2.962551]  [] fput+0xe/0x10
  [2.962553]  [] task_work_run+0xac/0xd0
  [2.962556]  [] do_notify_resume+0x97/0xb0
  [2.962558]  [] int_signal+0x12/0x17
  [2.962559] ---[ end trace b6b778d930eaeda7 ]---

  This is the lts-vivid kernel.  downgrading to the lts-utopic kernel fixes the 
issue.
  I tried the wily-lts, same issue.

  I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel-
  ppa :

  linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken

  linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works 
fine!  :)
  --- 
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jcat   2559 F pulseaudio
   /dev/snd/controlC1:  jcat   2559 F pulseaudio
  CurrentDesktop: GNOME
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f
  InstallationDate: Installed on 2015-11-25 (8 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  MachineType: Dell Inc. Latitude E6540
  NonfreeKernelModules: fglrx
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed 
root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-39-generic N/A
   linux-backports-modules-3.19.0-39-generic  N/A
   linux-firmware 1.127.19
  Tags:  trusty
  Uname: Linux 3.19.0-39-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 05/19/2015
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A15
  dmi.board.name: 0PXPYJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6540
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : 

[Kernel-packages] [Bug 1522094] Re: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]()

2015-12-04 Thread Jcat-l
apport-collect info added

** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522094

Title:
  WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-
  vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
  hsw_crt_pre_enable+0x7f/0x90 [i915]()

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When I connect a monitor the VGA port on the laptop - this is found in
  dmesg, and some of the kernel modules linked in become unstable [
  btrfs for instance, if it's in use].

  [2.962400] [ cut here ]
  [2.962424] WARNING: CPU: 0 PID: 233 at 
/build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
 hsw_crt_pre_enable+0x7f/0x90 [i915]()
  [2.962425] SPLL already enabled
  [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 
psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp 
pps_core pata_acpi wmi sdhci_acpi video sdhci
  [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic 
#42~14.04.1-Ubuntu
  [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 
05/19/2015
  [2.962439]  c02fd7f8 880220d23ab8 817af92b 
3a7a
  [2.962440]  880220d23b08 880220d23af8 81074e0a 
0046
  [2.962442]  880035fb 88003615eb60 880035f8f400 
88003615e800
  [2.962444] Call Trace:
  [2.962449]  [] dump_stack+0x45/0x57
  [2.962452]  [] warn_slowpath_common+0x8a/0xc0
  [2.962453]  [] warn_slowpath_fmt+0x46/0x50
  [2.962464]  [] hsw_crt_pre_enable+0x7f/0x90 [i915]
  [2.962475]  [] haswell_crtc_enable+0x3fc/0xaf0 [i915]
  [2.962485]  [] __intel_set_mode+0x872/0xc60 [i915]
  [2.962495]  [] intel_crtc_set_config+0x9e2/0xf60 [i915]
  [2.962506]  [] drm_mode_set_config_internal+0x6f/0x110 
[drm]
  [2.962511]  [] restore_fbdev_mode+0xc8/0xf0 
[drm_kms_helper]
  [2.962515]  [] 
drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper]
  [2.962525]  [] intel_fbdev_restore_mode+0x1e/0x50 [i915]
  [2.962536]  [] i915_driver_lastclose+0xe/0x20 [i915]
  [2.962541]  [] drm_lastclose+0x2e/0x130 [drm]
  [2.962546]  [] drm_release+0x338/0x540 [drm]
  [2.962549]  [] __fput+0xe7/0x220
  [2.962551]  [] fput+0xe/0x10
  [2.962553]  [] task_work_run+0xac/0xd0
  [2.962556]  [] do_notify_resume+0x97/0xb0
  [2.962558]  [] int_signal+0x12/0x17
  [2.962559] ---[ end trace b6b778d930eaeda7 ]---

  This is the lts-vivid kernel.  downgrading to the lts-utopic kernel fixes the 
issue.
  I tried the wily-lts, same issue.

  I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel-
  ppa :

  linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken

  linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works 
fine!  :)
  --- 
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jcat   2559 F pulseaudio
   /dev/snd/controlC1:  jcat   2559 F pulseaudio
  CurrentDesktop: GNOME
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f
  InstallationDate: Installed on 2015-11-25 (8 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  MachineType: Dell Inc. Latitude E6540
  NonfreeKernelModules: fglrx
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed 
root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-39-generic N/A
   linux-backports-modules-3.19.0-39-generic  N/A
   linux-firmware 1.127.19
  Tags:  trusty
  Uname: Linux 3.19.0-39-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 05/19/2015
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A15
  dmi.board.name: 0PXPYJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6540
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : 

[Kernel-packages] [Bug 1522793] Status changed to Confirmed

2015-12-04 Thread Brad Figg
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522793

Title:
  Touchpad not working, locked ?

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Touchpad not working on Dell units:

  Dell Inspiron 5547
  Dell Inspiron 15-3552

  Similar issue reported on:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374212

  Distributor ID:   Ubuntu
  Description:  Ubuntu 15.10
  Release:  15.10
  Codename: wily

  ⎡ Virtual core pointerid=2[master pointer  (3)]
  ⎜   ↳ Virtual core XTEST pointer  id=4[slave  pointer 
 (2)]
  ⎜   ↳ ELAN Touchscreenid=10   [slave  pointer 
 (2)]
  ⎜   ↳ DLL063E:00 06CB:2934id=12   [slave  pointer 
 (2)]
  ⎜   ↳ SynPS/2 Synaptics TouchPad  id=14   [slave  pointer 
 (2)]
  ⎣ Virtual core keyboard   id=3[master keyboard (2)]
  ↳ Virtual core XTEST keyboard id=5[slave  
keyboard (3)]
  ↳ Power Buttonid=6[slave  
keyboard (3)]
  ↳ Video Bus   id=7[slave  
keyboard (3)]
  ↳ Power Buttonid=8[slave  
keyboard (3)]
  ↳ Sleep Buttonid=9[slave  
keyboard (3)]
  ↳ Integrated_Webcam_HDid=11   [slave  
keyboard (3)]
  ↳ AT Translated Set 2 keyboardid=13   [slave  
keyboard (3)]
  ↳ Dell WMI hotkeysid=15   [slave  
keyboard (3)]

  ProblemType: Bug
  DistroRelease: Ubuntu 15.10
  Package: linux-image-4.2.0-16-generic 4.2.0-16.19
  ProcVersionSignature: Ubuntu 4.2.0-16.19-generic 4.2.3
  Uname: Linux 4.2.0-16-generic x86_64
  ApportVersion: 2.19.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  marcin 3077 F pulseaudio
   /dev/snd/controlC0:  marcin 3077 F pulseaudio
  CasperVersion: 1.365
  CurrentDesktop: Unity
  Date: Fri Dec  4 10:59:53 2015
  LiveMediaBuild: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021)
  MachineType: Dell Inc. Inspiron 5547
  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/NFS/15.10/desktop-amd64/casper/vmlinuz.efi 
append noprompt boot=casper modprobe.blacklist=wl rfkill.master_switch_mode=0 
rfkill.default_state=1 nohibernate userfullname=User Name username=username 
proceed=AIO nfsroot=usb showmounts persistent-path=/NFS/15.10/desktop-amd64 
persistent iso-scan/filename=/NFS/15.10/hostname-15.10-desktop-amd64.iso toram
  RelatedPackageVersions:
   linux-restricted-modules-4.2.0-16-generic N/A
   linux-backports-modules-4.2.0-16-generic  N/A
   linux-firmware1.149
  SourcePackage: linux
  UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev'
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 05/09/2014
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A04
  dmi.board.name: 0CXY41
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 8
  dmi.chassis.vendor: Dell Inc.
  dmi.chassis.version: A04
  dmi.modalias: 
dmi:bvnDellInc.:bvrA04:bd05/09/2014:svnDellInc.:pnInspiron5547:pvrA04:rvnDellInc.:rn0CXY41:rvrA00:cvnDellInc.:ct8:cvrA04:
  dmi.product.name: Inspiron 5547
  dmi.product.version: A04
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522793/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522094] CRDA.txt

2015-12-04 Thread Jcat-l
apport information

** Attachment added: "CRDA.txt"
   https://bugs.launchpad.net/bugs/1522094/+attachment/4529548/+files/CRDA.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522094

Title:
  WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-
  vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
  hsw_crt_pre_enable+0x7f/0x90 [i915]()

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When I connect a monitor the VGA port on the laptop - this is found in
  dmesg, and some of the kernel modules linked in become unstable [
  btrfs for instance, if it's in use].

  [2.962400] [ cut here ]
  [2.962424] WARNING: CPU: 0 PID: 233 at 
/build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
 hsw_crt_pre_enable+0x7f/0x90 [i915]()
  [2.962425] SPLL already enabled
  [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 
psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp 
pps_core pata_acpi wmi sdhci_acpi video sdhci
  [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic 
#42~14.04.1-Ubuntu
  [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 
05/19/2015
  [2.962439]  c02fd7f8 880220d23ab8 817af92b 
3a7a
  [2.962440]  880220d23b08 880220d23af8 81074e0a 
0046
  [2.962442]  880035fb 88003615eb60 880035f8f400 
88003615e800
  [2.962444] Call Trace:
  [2.962449]  [] dump_stack+0x45/0x57
  [2.962452]  [] warn_slowpath_common+0x8a/0xc0
  [2.962453]  [] warn_slowpath_fmt+0x46/0x50
  [2.962464]  [] hsw_crt_pre_enable+0x7f/0x90 [i915]
  [2.962475]  [] haswell_crtc_enable+0x3fc/0xaf0 [i915]
  [2.962485]  [] __intel_set_mode+0x872/0xc60 [i915]
  [2.962495]  [] intel_crtc_set_config+0x9e2/0xf60 [i915]
  [2.962506]  [] drm_mode_set_config_internal+0x6f/0x110 
[drm]
  [2.962511]  [] restore_fbdev_mode+0xc8/0xf0 
[drm_kms_helper]
  [2.962515]  [] 
drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper]
  [2.962525]  [] intel_fbdev_restore_mode+0x1e/0x50 [i915]
  [2.962536]  [] i915_driver_lastclose+0xe/0x20 [i915]
  [2.962541]  [] drm_lastclose+0x2e/0x130 [drm]
  [2.962546]  [] drm_release+0x338/0x540 [drm]
  [2.962549]  [] __fput+0xe7/0x220
  [2.962551]  [] fput+0xe/0x10
  [2.962553]  [] task_work_run+0xac/0xd0
  [2.962556]  [] do_notify_resume+0x97/0xb0
  [2.962558]  [] int_signal+0x12/0x17
  [2.962559] ---[ end trace b6b778d930eaeda7 ]---

  This is the lts-vivid kernel.  downgrading to the lts-utopic kernel fixes the 
issue.
  I tried the wily-lts, same issue.

  I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel-
  ppa :

  linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken

  linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works 
fine!  :)
  --- 
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jcat   2559 F pulseaudio
   /dev/snd/controlC1:  jcat   2559 F pulseaudio
  CurrentDesktop: GNOME
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f
  InstallationDate: Installed on 2015-11-25 (8 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  MachineType: Dell Inc. Latitude E6540
  NonfreeKernelModules: fglrx
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed 
root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-39-generic N/A
   linux-backports-modules-3.19.0-39-generic  N/A
   linux-firmware 1.127.19
  Tags:  trusty
  Uname: Linux 3.19.0-39-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 05/19/2015
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A15
  dmi.board.name: 0PXPYJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6540
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : 

[Kernel-packages] [Bug 1522094] UdevDb.txt

2015-12-04 Thread Jcat-l
apport information

** Attachment added: "UdevDb.txt"
   https://bugs.launchpad.net/bugs/1522094/+attachment/4529559/+files/UdevDb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522094

Title:
  WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-
  vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
  hsw_crt_pre_enable+0x7f/0x90 [i915]()

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When I connect a monitor the VGA port on the laptop - this is found in
  dmesg, and some of the kernel modules linked in become unstable [
  btrfs for instance, if it's in use].

  [2.962400] [ cut here ]
  [2.962424] WARNING: CPU: 0 PID: 233 at 
/build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
 hsw_crt_pre_enable+0x7f/0x90 [i915]()
  [2.962425] SPLL already enabled
  [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 
psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp 
pps_core pata_acpi wmi sdhci_acpi video sdhci
  [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic 
#42~14.04.1-Ubuntu
  [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 
05/19/2015
  [2.962439]  c02fd7f8 880220d23ab8 817af92b 
3a7a
  [2.962440]  880220d23b08 880220d23af8 81074e0a 
0046
  [2.962442]  880035fb 88003615eb60 880035f8f400 
88003615e800
  [2.962444] Call Trace:
  [2.962449]  [] dump_stack+0x45/0x57
  [2.962452]  [] warn_slowpath_common+0x8a/0xc0
  [2.962453]  [] warn_slowpath_fmt+0x46/0x50
  [2.962464]  [] hsw_crt_pre_enable+0x7f/0x90 [i915]
  [2.962475]  [] haswell_crtc_enable+0x3fc/0xaf0 [i915]
  [2.962485]  [] __intel_set_mode+0x872/0xc60 [i915]
  [2.962495]  [] intel_crtc_set_config+0x9e2/0xf60 [i915]
  [2.962506]  [] drm_mode_set_config_internal+0x6f/0x110 
[drm]
  [2.962511]  [] restore_fbdev_mode+0xc8/0xf0 
[drm_kms_helper]
  [2.962515]  [] 
drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper]
  [2.962525]  [] intel_fbdev_restore_mode+0x1e/0x50 [i915]
  [2.962536]  [] i915_driver_lastclose+0xe/0x20 [i915]
  [2.962541]  [] drm_lastclose+0x2e/0x130 [drm]
  [2.962546]  [] drm_release+0x338/0x540 [drm]
  [2.962549]  [] __fput+0xe7/0x220
  [2.962551]  [] fput+0xe/0x10
  [2.962553]  [] task_work_run+0xac/0xd0
  [2.962556]  [] do_notify_resume+0x97/0xb0
  [2.962558]  [] int_signal+0x12/0x17
  [2.962559] ---[ end trace b6b778d930eaeda7 ]---

  This is the lts-vivid kernel.  downgrading to the lts-utopic kernel fixes the 
issue.
  I tried the wily-lts, same issue.

  I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel-
  ppa :

  linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken

  linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works 
fine!  :)
  --- 
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jcat   2559 F pulseaudio
   /dev/snd/controlC1:  jcat   2559 F pulseaudio
  CurrentDesktop: GNOME
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f
  InstallationDate: Installed on 2015-11-25 (8 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  MachineType: Dell Inc. Latitude E6540
  NonfreeKernelModules: fglrx
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed 
root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-39-generic N/A
   linux-backports-modules-3.19.0-39-generic  N/A
   linux-firmware 1.127.19
  Tags:  trusty
  Uname: Linux 3.19.0-39-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 05/19/2015
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A15
  dmi.board.name: 0PXPYJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6540
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : 

[Kernel-packages] [Bug 1522094] RfKill.txt

2015-12-04 Thread Jcat-l
apport information

** Attachment added: "RfKill.txt"
   https://bugs.launchpad.net/bugs/1522094/+attachment/4529558/+files/RfKill.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522094

Title:
  WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-
  vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
  hsw_crt_pre_enable+0x7f/0x90 [i915]()

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When I connect a monitor the VGA port on the laptop - this is found in
  dmesg, and some of the kernel modules linked in become unstable [
  btrfs for instance, if it's in use].

  [2.962400] [ cut here ]
  [2.962424] WARNING: CPU: 0 PID: 233 at 
/build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
 hsw_crt_pre_enable+0x7f/0x90 [i915]()
  [2.962425] SPLL already enabled
  [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 
psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp 
pps_core pata_acpi wmi sdhci_acpi video sdhci
  [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic 
#42~14.04.1-Ubuntu
  [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 
05/19/2015
  [2.962439]  c02fd7f8 880220d23ab8 817af92b 
3a7a
  [2.962440]  880220d23b08 880220d23af8 81074e0a 
0046
  [2.962442]  880035fb 88003615eb60 880035f8f400 
88003615e800
  [2.962444] Call Trace:
  [2.962449]  [] dump_stack+0x45/0x57
  [2.962452]  [] warn_slowpath_common+0x8a/0xc0
  [2.962453]  [] warn_slowpath_fmt+0x46/0x50
  [2.962464]  [] hsw_crt_pre_enable+0x7f/0x90 [i915]
  [2.962475]  [] haswell_crtc_enable+0x3fc/0xaf0 [i915]
  [2.962485]  [] __intel_set_mode+0x872/0xc60 [i915]
  [2.962495]  [] intel_crtc_set_config+0x9e2/0xf60 [i915]
  [2.962506]  [] drm_mode_set_config_internal+0x6f/0x110 
[drm]
  [2.962511]  [] restore_fbdev_mode+0xc8/0xf0 
[drm_kms_helper]
  [2.962515]  [] 
drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper]
  [2.962525]  [] intel_fbdev_restore_mode+0x1e/0x50 [i915]
  [2.962536]  [] i915_driver_lastclose+0xe/0x20 [i915]
  [2.962541]  [] drm_lastclose+0x2e/0x130 [drm]
  [2.962546]  [] drm_release+0x338/0x540 [drm]
  [2.962549]  [] __fput+0xe7/0x220
  [2.962551]  [] fput+0xe/0x10
  [2.962553]  [] task_work_run+0xac/0xd0
  [2.962556]  [] do_notify_resume+0x97/0xb0
  [2.962558]  [] int_signal+0x12/0x17
  [2.962559] ---[ end trace b6b778d930eaeda7 ]---

  This is the lts-vivid kernel.  downgrading to the lts-utopic kernel fixes the 
issue.
  I tried the wily-lts, same issue.

  I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel-
  ppa :

  linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken

  linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works 
fine!  :)
  --- 
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jcat   2559 F pulseaudio
   /dev/snd/controlC1:  jcat   2559 F pulseaudio
  CurrentDesktop: GNOME
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f
  InstallationDate: Installed on 2015-11-25 (8 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  MachineType: Dell Inc. Latitude E6540
  NonfreeKernelModules: fglrx
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed 
root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-39-generic N/A
   linux-backports-modules-3.19.0-39-generic  N/A
   linux-firmware 1.127.19
  Tags:  trusty
  Uname: Linux 3.19.0-39-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 05/19/2015
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A15
  dmi.board.name: 0PXPYJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6540
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : 

[Kernel-packages] [Bug 1521942] Re: linux-lts-utopic: 3.16.0-56.75~14.04.1 -proposed tracker

2015-12-04 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1521942

Title:
  linux-lts-utopic: 3.16.0-56.75~14.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  New

Bug description:
  This bug is for tracking the 3.16.0-56.75~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 10:13 UTC
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 20:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 20:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Thursday, 03. December 2015 15:03 UTC
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:03 UTC
  kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:03 
UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:03 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:03 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521942/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522786] [NEW] linux: 3.19.0-40.45 -proposed tracker

2015-12-04 Thread Luis Henriques
Public bug reported:

This bug is for tracking the 3.19.0-40.45 upload package. This bug will
contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Friday, 04. December 2015 10:52 UTC
kernel-stable-phase:Prepare
kernel-stable-phase-changed:Friday, 04. December 2015 10:52 UTC

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Platform QA Team (canonical-platform-qa)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux (Ubuntu Vivid)
 Importance: Medium
 Status: New


** Tags: block-proposed-vivid kernel-release-tracking-bug vivid

** Tags added: kernel-release-tracking-bug

** Tags added: block-proposed-vivid

** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Tags added: vivid

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow
   Status: New => In Progress

** Changed in: kernel-sru-workflow
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided => Medium

** Changed in: 

[Kernel-packages] [Bug 1500242] Re: Bluetooth devices (Jabra BT250, Audi A3 car kit) can not be connected with BQ Aquaris 4.5

2015-12-04 Thread Simon Fels
Ah sorry, confused that. The log files for the A3 would be great too
then.

** Changed in: bluez (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1500242

Title:
  Bluetooth devices (Jabra BT250, Audi A3 car kit) can not be connected
  with BQ Aquaris 4.5

Status in Canonical System Image:
  Confirmed
Status in bluez package in Ubuntu:
  Incomplete
Status in ofono package in Ubuntu:
  Incomplete

Bug description:
  STEPS:
  Requirements: Aquaris E4.5, Jabra BT250 blue tooth handset device (rather old 
one supports blue tooth 1.1 and therefore I thought should be no issue) or Audi 
car kit (A3 2012 model)

  1. Put Jabra BT250 into receiving mode
  2. Phone searches automatically every 15 - 30 seconds for a new blue tooth 
device
  3. Phone finds Jabra BT250 and asks for pairing code
  4. Enter code into phone
  5. Jabra BT250 automatically exits the pairing mode (which is a sign that 
pairing should have worked)
  6. Phone looses connection to Jabra BT250
  7. Manual reconnection via phone works (shows Jabra BT250 as being connected) 
but ignores the device

  Same behaviour with Audi car kit (Audi A3, 2012 model)

  EXPECTED:
  I expect that the blue tooth kits work similar to my Seat Alhambra (also 2012 
model) where the blue tooth pairing etc. works great (except some bugs which 
are already filed).

  ACTUAL:
  No connection to the blue tooth device

  VERSIONS:
  OS-Build-Number: 25
  Ubuntu-Image: 20150825.1

  POSSIBLE ROOT CAUSE:
  Is this issue also solved as soon as bluez5 is implemented? When will this be?

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-devices-system-image/+bug/1500242/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522793] [NEW] Touchpad not working, locked ?

2015-12-04 Thread Marcin
Public bug reported:

Touchpad not working on Dell units:

Dell Inspiron 5547
Dell Inspiron 15-3552

Similar issue reported on:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374212

Distributor ID: Ubuntu
Description:Ubuntu 15.10
Release:15.10
Codename:   wily

⎡ Virtual core pointer  id=2[master pointer  (3)]
⎜   ↳ Virtual core XTEST pointerid=4[slave  pointer  (2)]
⎜   ↳ ELAN Touchscreen  id=10   [slave  pointer  (2)]
⎜   ↳ DLL063E:00 06CB:2934  id=12   [slave  pointer  (2)]
⎜   ↳ SynPS/2 Synaptics TouchPadid=14   [slave  pointer  (2)]
⎣ Virtual core keyboard id=3[master keyboard (2)]
↳ Virtual core XTEST keyboard   id=5[slave  keyboard (3)]
↳ Power Button  id=6[slave  keyboard (3)]
↳ Video Bus id=7[slave  keyboard (3)]
↳ Power Button  id=8[slave  keyboard (3)]
↳ Sleep Button  id=9[slave  keyboard (3)]
↳ Integrated_Webcam_HD  id=11   [slave  keyboard (3)]
↳ AT Translated Set 2 keyboard  id=13   [slave  keyboard (3)]
↳ Dell WMI hotkeys  id=15   [slave  keyboard (3)]

ProblemType: Bug
DistroRelease: Ubuntu 15.10
Package: linux-image-4.2.0-16-generic 4.2.0-16.19
ProcVersionSignature: Ubuntu 4.2.0-16.19-generic 4.2.3
Uname: Linux 4.2.0-16-generic x86_64
ApportVersion: 2.19.1-0ubuntu3
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC1:  marcin 3077 F pulseaudio
 /dev/snd/controlC0:  marcin 3077 F pulseaudio
CasperVersion: 1.365
CurrentDesktop: Unity
Date: Fri Dec  4 10:59:53 2015
LiveMediaBuild: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021)
MachineType: Dell Inc. Inspiron 5547
ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=
 LANG=en_US.UTF-8
 SHELL=/bin/bash
ProcFB: 0 inteldrmfb
ProcKernelCmdLine: BOOT_IMAGE=/NFS/15.10/desktop-amd64/casper/vmlinuz.efi 
append noprompt boot=casper modprobe.blacklist=wl rfkill.master_switch_mode=0 
rfkill.default_state=1 nohibernate userfullname=User Name username=username 
proceed=AIO nfsroot=usb showmounts persistent-path=/NFS/15.10/desktop-amd64 
persistent iso-scan/filename=/NFS/15.10/hostname-15.10-desktop-amd64.iso toram
RelatedPackageVersions:
 linux-restricted-modules-4.2.0-16-generic N/A
 linux-backports-modules-4.2.0-16-generic  N/A
 linux-firmware1.149
SourcePackage: linux
UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev'
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 05/09/2014
dmi.bios.vendor: Dell Inc.
dmi.bios.version: A04
dmi.board.name: 0CXY41
dmi.board.vendor: Dell Inc.
dmi.board.version: A00
dmi.chassis.type: 8
dmi.chassis.vendor: Dell Inc.
dmi.chassis.version: A04
dmi.modalias: 
dmi:bvnDellInc.:bvrA04:bd05/09/2014:svnDellInc.:pnInspiron5547:pvrA04:rvnDellInc.:rn0CXY41:rvrA00:cvnDellInc.:ct8:cvrA04:
dmi.product.name: Inspiron 5547
dmi.product.version: A04
dmi.sys.vendor: Dell Inc.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed

** Attachment added: "synclint output"
   
https://bugs.launchpad.net/bugs/1522793/+attachment/4529530/+files/synclient.log

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522793

Title:
  Touchpad not working, locked ?

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Touchpad not working on Dell units:

  Dell Inspiron 5547
  Dell Inspiron 15-3552

  Similar issue reported on:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374212

  Distributor ID:   Ubuntu
  Description:  Ubuntu 15.10
  Release:  15.10
  Codename: wily

  ⎡ Virtual core pointerid=2[master pointer  (3)]
  ⎜   ↳ Virtual core XTEST pointer  id=4[slave  pointer 
 (2)]
  ⎜   ↳ ELAN Touchscreenid=10   [slave  pointer 
 (2)]
  ⎜   ↳ DLL063E:00 06CB:2934id=12   [slave  pointer 
 (2)]
  ⎜   ↳ SynPS/2 Synaptics TouchPad  id=14   [slave  pointer 
 (2)]
  ⎣ Virtual core keyboard   id=3[master keyboard (2)]
  ↳ Virtual core XTEST keyboard id=5[slave  
keyboard (3)]
  ↳ Power Buttonid=6[slave  
keyboard (3)]
  ↳ Video Bus   id=7[slave  
keyboard (3)]
  ↳ Power Buttonid=8[slave  
keyboard (3)]
  ↳ Sleep Buttonid=9[slave  
keyboard (3)]
  ↳ Integrated_Webcam_HD   

[Kernel-packages] [Bug 1324935] Re: [Dell Inspiron 1525] WARNING: CPU: 1 PID: 1154 at /build/buildd/linux-3.13.0/drivers/gpu/drm/i915/intel_display.c:9226 intel_modeset_check_state+0x62d/0x780 [i915](

2015-12-04 Thread Christopher M. Penalver
KeithG, the issue you are reporting is an upstream one. Could you please
report this problem following the instructions verbatim at
https://wiki.ubuntu.com/Bugs/Upstream/kernel to the appropriate venue
(TO Daniel Vetter and Jani Nikula CC intel-gfx)?

Please provide a direct URL to your newly made report when it becomes
available so that it may be tracked.

Thank you for your understanding.

** Tags removed: kernel-bug-exists-upstream-3.16-rc6 kernel-fixed-upstream-3.16 
needs-reverse-bisect
** Tags added: kernel-bug-exists-upstream-4.4-rc3

** Changed in: linux (Ubuntu)
   Importance: Low => High

** Changed in: linux (Ubuntu)
   Status: Incomplete => Triaged

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1324935

Title:
  [Dell Inspiron 1525] WARNING: CPU: 1 PID: 1154 at
  /build/buildd/linux-3.13.0/drivers/gpu/drm/i915/intel_display.c:9226
  intel_modeset_check_state+0x62d/0x780 [i915]()

Status in linux package in Ubuntu:
  Triaged

Bug description:
  Dmesg is filled with this:
  [32582.450283] [ cut here ]
  [32582.450302] WARNING: CPU: 1 PID: 1154 at 
/build/buildd/linux-3.13.0/drivers/gpu/drm/i915/intel_display.c:9226 
intel_modeset_check_state+0x62d/0x780 [i915]()
  [32582.450304] encoder's hw state doesn't match sw tracking (expected 0, 
found 1)
  [32582.450306] Modules linked in: nfsv3 ctr ccm rfcomm bnep bluetooth 
rpcsec_gss_krb5 nfsv4 binfmt_misc nfsd auth_rpcgss nfs_acl nfs lockd sunrpc 
fscache arc4 gpio_ich dell_wmi sparse_keymap uvcvideo videobuf2_vmalloc 
videobuf2_memops videobuf2_core videodev dell_laptop dcdbas snd_hda_codec_idt 
snd_hda_codec_hdmi b43 snd_hda_intel snd_hda_codec snd_hwdep snd_pcm bcma 
coretemp snd_page_alloc snd_seq_midi snd_seq_midi_event snd_rawmidi joydev 
snd_seq serio_raw mac80211 snd_seq_device snd_timer snd lpc_ich cfg80211 
ssb_hcd soundcore mac_hid wmi parport_pc ppdev lp parport psmouse ahci libahci 
sky2 ssb i915 video i2c_algo_bit drm_kms_helper drm
  [32582.450357] CPU: 1 PID: 1154 Comm: Xorg Tainted: GW
3.13.0-27-generic #50-Ubuntu
  [32582.450359] Hardware name: Dell Inc. Inspiron 1525   
/0U990C, BIOS A17 10/27/2009
  [32582.450361]  0009 8803bb68 817199c4 
8803bbb0
  [32582.450365]  8803bba0 810676bd 8803bc20 
0001
  [32582.450369]  88003684c800 88003684caf8 8800364a9800 
8803bc00
  [32582.450373] Call Trace:
  [32582.450378]  [] dump_stack+0x45/0x56
  [32582.450381]  [] warn_slowpath_common+0x7d/0xa0
  [32582.450384]  [] warn_slowpath_fmt+0x4c/0x50
  [32582.450405]  [] ? intel_sdvo_get_hw_state+0x55/0xc0 
[i915]
  [32582.450423]  [] intel_modeset_check_state+0x62d/0x780 
[i915]
  [32582.450441]  [] intel_set_mode+0x25/0x30 [i915]
  [32582.450459]  [] intel_crtc_set_config+0x7ab/0x9a0 [i915]
  [32582.450463]  [] ? lapic_next_event+0x1d/0x30
  [32582.450477]  [] drm_mode_set_config_internal+0x5d/0xe0 
[drm]
  [32582.450492]  [] drm_mode_setcrtc+0xf7/0x5e0 [drm]
  [32582.450503]  [] drm_ioctl+0x502/0x630 [drm]
  [32582.450508]  [] ? __set_task_blocked+0x32/0x70
  [32582.450513]  [] do_vfs_ioctl+0x2e0/0x4c0
  [32582.450517]  [] ? vtime_account_user+0x54/0x60
  [32582.450520]  [] SyS_ioctl+0x81/0xa0
  [32582.450524]  [] tracesys+0xe1/0xe6
  [32582.450526] ---[ end trace 8e8416ac0cd5b971 ]---

  Resume results in black screen. Graphics can appear completely messed
  up (i.e. torn last jpg viewed over top of latest jpg). This happens in
  Ubuntu 13.10 and 14.04. It happens with: no intel drivers installed,
  and with or without the i915 and intel_agp modules explicitly enabled
  in /etc/initramfs-tools/modules.

  WORKAROUND: Using the following kernel parameters I no longer get the message 
in the log, the video does not appear to be as crisp somehow, but I can suspend 
and wake from the command:
  linemodeset=0 video.allow_duplicates=1

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: linux-image-3.13.0-27-generic 3.13.0-27.50
  ProcVersionSignature: Ubuntu 3.13.0-27.50-generic 3.13.11
  Uname: Linux 3.13.0-27-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  kgrider2212 F pulseaudio
  Date: Fri May 30 08:03:14 2014
  HibernationDevice: RESUME=UUID=4957c02d-b4ca-4dce-8983-450640c97f46
  MachineType: Dell Inc. Inspiron 1525
  ProcEnviron:
   TERM=xterm
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-27-generic 
root=UUID=7682c6bb-cf2f-413f-9243-eab8172b5bbc ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.13.0-27-generic N/A
   linux-backports-modules-3.13.0-27-generic  N/A
   linux-firmware 1.127.2
  RfKill:

[Kernel-packages] [Bug 1522766] [NEW] cryptsetup hangs after kernel upgrade to 3.13.0-72.115

2015-12-04 Thread Stefan Bader
Public bug reported:

After upgrading to the proposed kernel for Trusty (3.13.0-72.115) I
cannot unlock a luks formatted usb drive. The cryptsetup process seems
to hang with the following stack:

[] __synchronize_srcu+0xfe/0x180
[] synchronize_srcu+0x1d/0x20
[] __dm_destroy+0x117/0x290
[] dm_destroy+0x13/0x20
[] dev_remove+0xde/0x120
[] ctl_ioctl+0x255/0x500
[] dm_ctl_ioctl+0x13/0x20
[] do_vfs_ioctl+0x2e0/0x4c0
[] SyS_ioctl+0x81/0xa0
[] system_call_fastpath+0x1a/0x1f
[] 0x

** Affects: linux (Ubuntu)
 Importance: High
 Status: Triaged

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522766

Title:
  cryptsetup hangs after kernel upgrade to 3.13.0-72.115

Status in linux package in Ubuntu:
  Triaged

Bug description:
  After upgrading to the proposed kernel for Trusty (3.13.0-72.115) I
  cannot unlock a luks formatted usb drive. The cryptsetup process seems
  to hang with the following stack:

  [] __synchronize_srcu+0xfe/0x180
  [] synchronize_srcu+0x1d/0x20
  [] __dm_destroy+0x117/0x290
  [] dm_destroy+0x13/0x20
  [] dev_remove+0xde/0x120
  [] ctl_ioctl+0x255/0x500
  [] dm_ctl_ioctl+0x13/0x20
  [] do_vfs_ioctl+0x2e0/0x4c0
  [] SyS_ioctl+0x81/0xa0
  [] system_call_fastpath+0x1a/0x1f
  [] 0x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522766/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522766] Re: cryptsetup hangs after kernel upgrade to 3.13.0-72.115

2015-12-04 Thread Luis Henriques
** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Trusty)
   Status: New => Triaged

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522766

Title:
  cryptsetup hangs after kernel upgrade to 3.13.0-72.115

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Trusty:
  Triaged

Bug description:
  After upgrading to the proposed kernel for Trusty (3.13.0-72.115) I
  cannot unlock a luks formatted usb drive. The cryptsetup process seems
  to hang with the following stack:

  [] __synchronize_srcu+0xfe/0x180
  [] synchronize_srcu+0x1d/0x20
  [] __dm_destroy+0x117/0x290
  [] dm_destroy+0x13/0x20
  [] dev_remove+0xde/0x120
  [] ctl_ioctl+0x255/0x500
  [] dm_ctl_ioctl+0x13/0x20
  [] do_vfs_ioctl+0x2e0/0x4c0
  [] SyS_ioctl+0x81/0xa0
  [] system_call_fastpath+0x1a/0x1f
  [] 0x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522766/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1500242] Re: Bluetooth devices (Jabra BT250, Audi A3 car kit) can not be connected with BQ Aquaris 4.5

2015-12-04 Thread Uranicus
@Simon:

I will retest with the debugging bluetooth tips.

Abou the A3 issue. I wrote:

-
Audi A3, car kit:

I have tested the rc-propsed version with my Car kit Audi A3 2012 model. There 
has been no significant change with this set-up. I can pair the phone with the 
car kit but can not establish a connection between the two. So there is not 
much to report here 
-

So it is not yet fixed! I will roll back to rc-proposed and follow the
above mentioned steps hopefully during the weekend. I hope to give you
then a good feedback.


@Tony & Simon:

I did the test with the following rc-proposed version:

current build number: 191
device name: krillin
channel: ubuntu-touch/rc-proposed/bq-aquaris.en
last update: 2015-11-30 17:03:26
version version: 191
version ubuntu: 20151130
version device: 20151028-869191d
version custom: 2015--36-46-vivid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1500242

Title:
  Bluetooth devices (Jabra BT250, Audi A3 car kit) can not be connected
  with BQ Aquaris 4.5

Status in Canonical System Image:
  Confirmed
Status in bluez package in Ubuntu:
  New
Status in ofono package in Ubuntu:
  Incomplete

Bug description:
  STEPS:
  Requirements: Aquaris E4.5, Jabra BT250 blue tooth handset device (rather old 
one supports blue tooth 1.1 and therefore I thought should be no issue) or Audi 
car kit (A3 2012 model)

  1. Put Jabra BT250 into receiving mode
  2. Phone searches automatically every 15 - 30 seconds for a new blue tooth 
device
  3. Phone finds Jabra BT250 and asks for pairing code
  4. Enter code into phone
  5. Jabra BT250 automatically exits the pairing mode (which is a sign that 
pairing should have worked)
  6. Phone looses connection to Jabra BT250
  7. Manual reconnection via phone works (shows Jabra BT250 as being connected) 
but ignores the device

  Same behaviour with Audi car kit (Audi A3, 2012 model)

  EXPECTED:
  I expect that the blue tooth kits work similar to my Seat Alhambra (also 2012 
model) where the blue tooth pairing etc. works great (except some bugs which 
are already filed).

  ACTUAL:
  No connection to the blue tooth device

  VERSIONS:
  OS-Build-Number: 25
  Ubuntu-Image: 20150825.1

  POSSIBLE ROOT CAUSE:
  Is this issue also solved as soon as bluez5 is implemented? When will this be?

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-devices-system-image/+bug/1500242/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1520309] Re: Trusty update to 3.19.8-ckt10 stable release

2015-12-04 Thread Luis Henriques
** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Vivid)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1520309

Title:
  Trusty update to 3.19.8-ckt10 stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from Linus' tree or in a minimally
     backported form of that patch. The 3.19.8-ckt10 upstream stable
     patch set is now available. It should be included in the Ubuntu
     kernel as well.

     git://kernel.ubuntu.com/ubuntu/linux.git

  TEST CASE: TBD

     The following patches are in the 3.19.8-ckt10 stable release:

  isdn_ppp: Add checks for allocation failure in isdn_ppp_open()
  ppp, slip: Validate VJ compression slot parameters completely
  [media] media/vivid-osd: fix info leak in ioctl
  staging/dgnc: fix info leak in ioctl
  tools lib traceevent: Fix string handling in heterogeneous arch environments
  perf tools: Fix copying of /proc/kcore
  m68k: Define asmlinkage_protect
  UBI: Validate data_size
  UBI: return ENOSPC if no enough space available
  drm/radeon: Restore LCD backlight level on resume (>= R5xx)
  drm/radeon: move bl encoder assignment into bl init
  drm/radeon: fix dpms when driver backlight control is disabled
  MIPS: dma-default: Fix 32-bit fall back to GFP_DMA
  MIPS: CPS: Stop dangling delay slot from has_mt.
  MIPS: CPS: Don't include MT code in non-MT kernels.
  MIPS: CPS: #ifdef on CONFIG_MIPS_MT_SMP rather than CONFIG_MIPS_MT
  x86/asm/entry: Create and use a 'TOP_OF_KERNEL_STACK_PADDING' macro
  x86/process: Add proper bound checks in 64bit get_wchan()
  drm/qxl: recreate the primary surface when the bo is not primary
  genirq: Fix race in register_irq_proc()
  x86/efi: Fix boot crash by mapping EFI memmap entries bottom-up at runtime, 
instead of top-down
  KVM: nSVM: Check for NRIPS support before updating control field
  Use WARN_ON_ONCE for missing X86_FEATURE_NRIPS
  mm: hugetlbfs: skip shared VMAs when unmapping private pages to satisfy a 
fault
  drm/dp/mst: fixup handling hotplug on port removal.
  drm/dp/mst: drop cancel work sync in the mstb destroy path (v2)
  x86/kexec: Fix kexec crash in syscall kexec_file_load()
  x86/mm: Set NX on gap between __ex_table and rodata
  md/raid0: update queue parameter in a safer location.
  md/raid0: apply base queue limits *before* disk_stack_limits
  arm64: ftrace: fix function_graph tracer panic
  clocksource: Fix abs() usage w/ 64bit values
  dmaengine: dw: properly read DWC_PARAMS register
  mm/slab: fix unexpected index mapping result of kmalloc_size(INDEX_NODE+1)
  regmap: debugfs: Ensure we don't underflow when printing access masks
  regmap: debugfs: Don't bother actually printing when calculating max length
  mtd: nand: sunxi: fix OOB handling in ->write_xxx() functions
  mtd: nand: sunxi: fix sunxi_nand_chips_cleanup()
  ARM: dts: fix usb pin control for imx-rex dts
  ASoC: db1200: Fix DAI link format for db1300 and db1550
  x86/xen: Support kexec/kdump in HVM guests by doing a soft reset
  x86/xen: Do not clip xen_e820_map to xen_e820_map_entries when sanitizing map
  s390/boot/decompression: disable floating point in decompressor
  svcrdma: handle rdma read with a non-zero initial page offset
  ASoC: sgtl5000: fix wrong register MIC_BIAS_VOLTAGE setup on probe
  dm: fix AB-BA deadlock in __dm_destroy()
  [SMB3] Do not fall back to SMBWriteX in set_file_size error cases
  clk: ti: fix dual-registration of uart4_ick
  ASoC: dwc: correct irq clear method
  dm raid: fix round up of default region size
  ALSA: hda: Add dock support for ThinkPad T550
  ALSA: hda - Apply SPDIF pin ctl to MacBookPro 12,1
  USB: Add reset-resume quirk for two Plantronics usb headphones.
  usb: Add device quirk for Logitech PTZ cameras
  serial: 8250: add uart_config entry for PORT_RT2880
  drivers/tty: require read access for controlling terminal
  staging: speakup: fix speakup-r regression
  ALSA: synth: Fix conflicting OSS device registration on AWE32
  arm64: readahead: fault retry breaks mmap file read random detection
  ASoC: tas2552: Correct the Speaker Driver Playback Volume (PGA_GAIN)
  ASoC: tas2552: fix dBscale-min declaration
  sched/core: Fix TASK_DEAD race in finish_task_switch()
  dm cache: fix NULL pointer when switching from cleaner policy
  3w-9xxx: don't unmap bounce buffered commands
  workqueue: 

[Kernel-packages] [Bug 1516686] Re: linux: reduce stub delta to simplify review and fix rebuild test

2015-12-04 Thread Luis Henriques
** Changed in: linux (Ubuntu Vivid)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1516686

Title:
  linux: reduce stub delta to simplify review and fix rebuild test

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Committed
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Vivid:
  Fix Committed
Status in linux source package in Wily:
  In Progress

Bug description:
  We emit a lot of unnecessary delta to debian files, caused by ordering
  issues and lack of general clenliness.  Backport these fixes from
  v/w/x to make all series consistant.

  Also fix rebuild test to not fire if triggered for the kernel which
  just built.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1516686/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1513980] Re: Ubuntu 14.04.03 did not detect Link down on Houston CU network adapter ports when cable pulled

2015-12-04 Thread Luis Henriques
** Changed in: linux (Ubuntu Vivid)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1513980

Title:
  Ubuntu 14.04.03 did not detect Link down on Houston CU network adapter
  ports when cable pulled

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Vivid:
  Fix Committed
Status in linux source package in Wily:
  Fix Released
Status in linux source package in Xenial:
  Fix Released

Bug description:
  Problem Description:
  

  I installed Houston CU (feature code 2CC1) PCIe2 10GbE SFP+ CU 4-port
  Converged Network Adapter in slot P1-C2 of tul117fp1 system. The
  system is configured as PowerNV and running Ubuntu 14.04.03

  - I configured 2 copper ports of the adapter and running network
  stress on it for several hours. I then pulled cable and waited for
  sometime.

  - The OS did not detect the link down. Even though the TX/RX traffic
  stopped on the ports.

  - Kernel log and dmesg did not have any entry to indicate link down
  after cable pulled.

  0007:00:00.0 PCI bridge: IBM Device 03dc
  0007:01:00.0 Ethernet controller: Emulex Corporation OneConnect NIC (Lancer) 
(rev 10)
  0007:01:00.1 Ethernet controller: Emulex Corporation OneConnect NIC (Lancer) 
(rev 10)
  0007:01:00.2 Ethernet controller: Emulex Corporation OneConnect NIC (Lancer) 
(rev 10)
  0007:01:00.3 Ethernet controller: Emulex Corporation OneConnect NIC (Lancer) 
(rev 10)
  0007:01:00.4 Fibre Channel: Emulex Corporation OneConnect FCoE Initiator 
(Lancer) (rev 10)
  0007:01:00.5 Fibre Channel: Emulex Corporation OneConnect FCoE Initiator 
(Lancer) (rev 10)

  - ifconfig -a cmd still show link up

  eth43 Link encap:Ethernet  HWaddr 00:90:fa:6e:e0:f2  
inet addr:103.1.1.15  Bcast:103.1.1.255  Mask:255.255.255.0
UP BROADCAST MULTICAST  MTU:1500  Metric:1
RX packets:7543074880 errors:1 dropped:9 overruns:0 frame:1
TX packets:5926170683 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000 
RX bytes:8997647070924 (8.9 TB)  TX bytes:7177651764733 (7.1 TB)

  eth44 Link encap:Ethernet  HWaddr 00:90:fa:6e:e0:f3  
inet addr:103.1.2.15  Bcast:103.1.2.255  Mask:255.255.255.0
UP BROADCAST MULTICAST  MTU:1500  Metric:1
RX packets:5926170613 errors:1 dropped:0 overruns:0 frame:1
TX packets:7543089239 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000 
RX bytes:7488707854629 (7.4 TB)  TX bytes:8619256135370 (8.6 TB)

  Paul, looking at the source code for the driver in Ubuntu 14.04.3 the
  driver doesn't log any messages after an update to the link status.

  The following commit upstream adds this functionality:

  
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=18824894dbec3eb2202fc92d52a0c8bd27c8a63f

  I'll create a test kernel with this patch applied and will attach it
  here so you can test this commit

  - I installed Ubuntu patched kernel

  - I setup and re-ran the test on Houston adapter. I verified that with
  the patch link Up/Down events now get logged properly when cable
  pulls.

  I verified the patch and it fixed the problem

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1513980/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1498862] Re: autopkgtest: rebuild test should not run when testing ourselves

2015-12-04 Thread Luis Henriques
** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Vivid)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1498862

Title:
  autopkgtest: rebuild test should not run when testing ourselves

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Vivid:
  Fix Committed
Status in linux source package in Wily:
  Fix Released

Bug description:
  We have a rebuild test which is intended to confirm the kernel still
  builds when core-utils, gcc, ld etc change.  It makes no sense for
  this test to run for the kernel itself as it takes a very long time to
  run and we have literally just built the kernel with those tools.

  Check for the trigger being something other than the kernel packages
  themselves before doing the rebuild.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1498862/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522766] Re: cryptsetup hangs after kernel upgrade to 3.13.0-72.115

2015-12-04 Thread Stefan Bader
Tested with the kernel from comment #1 and cryptsetup does work with
that.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522766

Title:
  cryptsetup hangs after kernel upgrade to 3.13.0-72.115

Status in linux package in Ubuntu:
  Triaged

Bug description:
  After upgrading to the proposed kernel for Trusty (3.13.0-72.115) I
  cannot unlock a luks formatted usb drive. The cryptsetup process seems
  to hang with the following stack:

  [] __synchronize_srcu+0xfe/0x180
  [] synchronize_srcu+0x1d/0x20
  [] __dm_destroy+0x117/0x290
  [] dm_destroy+0x13/0x20
  [] dev_remove+0xde/0x120
  [] ctl_ioctl+0x255/0x500
  [] dm_ctl_ioctl+0x13/0x20
  [] do_vfs_ioctl+0x2e0/0x4c0
  [] SyS_ioctl+0x81/0xa0
  [] system_call_fastpath+0x1a/0x1f
  [] 0x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522766/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522094] UdevLog.txt

2015-12-04 Thread Jcat-l
apport information

** Attachment added: "UdevLog.txt"
   
https://bugs.launchpad.net/bugs/1522094/+attachment/4529560/+files/UdevLog.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522094

Title:
  WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-
  vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
  hsw_crt_pre_enable+0x7f/0x90 [i915]()

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When I connect a monitor the VGA port on the laptop - this is found in
  dmesg, and some of the kernel modules linked in become unstable [
  btrfs for instance, if it's in use].

  [2.962400] [ cut here ]
  [2.962424] WARNING: CPU: 0 PID: 233 at 
/build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
 hsw_crt_pre_enable+0x7f/0x90 [i915]()
  [2.962425] SPLL already enabled
  [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 
psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp 
pps_core pata_acpi wmi sdhci_acpi video sdhci
  [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic 
#42~14.04.1-Ubuntu
  [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 
05/19/2015
  [2.962439]  c02fd7f8 880220d23ab8 817af92b 
3a7a
  [2.962440]  880220d23b08 880220d23af8 81074e0a 
0046
  [2.962442]  880035fb 88003615eb60 880035f8f400 
88003615e800
  [2.962444] Call Trace:
  [2.962449]  [] dump_stack+0x45/0x57
  [2.962452]  [] warn_slowpath_common+0x8a/0xc0
  [2.962453]  [] warn_slowpath_fmt+0x46/0x50
  [2.962464]  [] hsw_crt_pre_enable+0x7f/0x90 [i915]
  [2.962475]  [] haswell_crtc_enable+0x3fc/0xaf0 [i915]
  [2.962485]  [] __intel_set_mode+0x872/0xc60 [i915]
  [2.962495]  [] intel_crtc_set_config+0x9e2/0xf60 [i915]
  [2.962506]  [] drm_mode_set_config_internal+0x6f/0x110 
[drm]
  [2.962511]  [] restore_fbdev_mode+0xc8/0xf0 
[drm_kms_helper]
  [2.962515]  [] 
drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper]
  [2.962525]  [] intel_fbdev_restore_mode+0x1e/0x50 [i915]
  [2.962536]  [] i915_driver_lastclose+0xe/0x20 [i915]
  [2.962541]  [] drm_lastclose+0x2e/0x130 [drm]
  [2.962546]  [] drm_release+0x338/0x540 [drm]
  [2.962549]  [] __fput+0xe7/0x220
  [2.962551]  [] fput+0xe/0x10
  [2.962553]  [] task_work_run+0xac/0xd0
  [2.962556]  [] do_notify_resume+0x97/0xb0
  [2.962558]  [] int_signal+0x12/0x17
  [2.962559] ---[ end trace b6b778d930eaeda7 ]---

  This is the lts-vivid kernel.  downgrading to the lts-utopic kernel fixes the 
issue.
  I tried the wily-lts, same issue.

  I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel-
  ppa :

  linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken

  linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works 
fine!  :)
  --- 
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jcat   2559 F pulseaudio
   /dev/snd/controlC1:  jcat   2559 F pulseaudio
  CurrentDesktop: GNOME
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f
  InstallationDate: Installed on 2015-11-25 (8 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  MachineType: Dell Inc. Latitude E6540
  NonfreeKernelModules: fglrx
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed 
root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-39-generic N/A
   linux-backports-modules-3.19.0-39-generic  N/A
   linux-firmware 1.127.19
  Tags:  trusty
  Uname: Linux 3.19.0-39-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 05/19/2015
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A15
  dmi.board.name: 0PXPYJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6540
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : 

[Kernel-packages] [Bug 1522094] ProcModules.txt

2015-12-04 Thread Jcat-l
apport information

** Attachment added: "ProcModules.txt"
   
https://bugs.launchpad.net/bugs/1522094/+attachment/4529556/+files/ProcModules.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522094

Title:
  WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-
  vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
  hsw_crt_pre_enable+0x7f/0x90 [i915]()

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  When I connect a monitor the VGA port on the laptop - this is found in
  dmesg, and some of the kernel modules linked in become unstable [
  btrfs for instance, if it's in use].

  [2.962400] [ cut here ]
  [2.962424] WARNING: CPU: 0 PID: 233 at 
/build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145
 hsw_crt_pre_enable+0x7f/0x90 [i915]()
  [2.962425] SPLL already enabled
  [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 
psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp 
pps_core pata_acpi wmi sdhci_acpi video sdhci
  [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic 
#42~14.04.1-Ubuntu
  [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 
05/19/2015
  [2.962439]  c02fd7f8 880220d23ab8 817af92b 
3a7a
  [2.962440]  880220d23b08 880220d23af8 81074e0a 
0046
  [2.962442]  880035fb 88003615eb60 880035f8f400 
88003615e800
  [2.962444] Call Trace:
  [2.962449]  [] dump_stack+0x45/0x57
  [2.962452]  [] warn_slowpath_common+0x8a/0xc0
  [2.962453]  [] warn_slowpath_fmt+0x46/0x50
  [2.962464]  [] hsw_crt_pre_enable+0x7f/0x90 [i915]
  [2.962475]  [] haswell_crtc_enable+0x3fc/0xaf0 [i915]
  [2.962485]  [] __intel_set_mode+0x872/0xc60 [i915]
  [2.962495]  [] intel_crtc_set_config+0x9e2/0xf60 [i915]
  [2.962506]  [] drm_mode_set_config_internal+0x6f/0x110 
[drm]
  [2.962511]  [] restore_fbdev_mode+0xc8/0xf0 
[drm_kms_helper]
  [2.962515]  [] 
drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper]
  [2.962525]  [] intel_fbdev_restore_mode+0x1e/0x50 [i915]
  [2.962536]  [] i915_driver_lastclose+0xe/0x20 [i915]
  [2.962541]  [] drm_lastclose+0x2e/0x130 [drm]
  [2.962546]  [] drm_release+0x338/0x540 [drm]
  [2.962549]  [] __fput+0xe7/0x220
  [2.962551]  [] fput+0xe/0x10
  [2.962553]  [] task_work_run+0xac/0xd0
  [2.962556]  [] do_notify_resume+0x97/0xb0
  [2.962558]  [] int_signal+0x12/0x17
  [2.962559] ---[ end trace b6b778d930eaeda7 ]---

  This is the lts-vivid kernel.  downgrading to the lts-utopic kernel fixes the 
issue.
  I tried the wily-lts, same issue.

  I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel-
  ppa :

  linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken

  linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321   works 
fine!  :)
  --- 
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jcat   2559 F pulseaudio
   /dev/snd/controlC1:  jcat   2559 F pulseaudio
  CurrentDesktop: GNOME
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f
  InstallationDate: Installed on 2015-11-25 (8 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  MachineType: Dell Inc. Latitude E6540
  NonfreeKernelModules: fglrx
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed 
root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-39-generic N/A
   linux-backports-modules-3.19.0-39-generic  N/A
   linux-firmware 1.127.19
  Tags:  trusty
  Uname: Linux 3.19.0-39-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 05/19/2015
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A15
  dmi.board.name: 0PXPYJ
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: Latitude E6540
  dmi.product.version: 01
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : 

[Kernel-packages] [Bug 1522108] fozzie (amd64) - tests ran: 194, failed: 0

2015-12-04 Thread Brad Figg
tests ran: 194, failed: 0;
  
http://kernel.ubuntu.com/testing/4.2.0-21.25/fozzie__4.2.0-21.25__2015-12-04_09-35-00/results-index.html

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522108

Title:
  linux: 4.2.0-21.25 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Wily:
  Confirmed

Bug description:
  This bug is for tracking the 4.2.0-21.25 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 17:43 UTC
  kernel-stable-Prepare-package-end:Thursday, 03. December 2015 11:34 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 11:34 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 16:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Thursday, 03. December 2015 17:01 UTC
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 17:01 UTC
  kernel-stable-Certification-testing-start:Thursday, 03. December 2015 17:01 
UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 17:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 17:01 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 08:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522108/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522421] bantam (amd64) - tests ran: 182, failed: 0

2015-12-04 Thread Brad Figg
tests ran: 182, failed: 0;
  
http://kernel.ubuntu.com/testing/4.3.0-1.10/bantam__4.3.0-1.10__2015-12-04_07-23-00/results-index.html

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522421

Title:
  linux: 4.3.0-1.10 -proposed tracker

Status in Kernel Development Workflow:
  In Progress
Status in Kernel Development Workflow automated-testing series:
  Incomplete
Status in Kernel Development Workflow prepare-package series:
  Fix Released
Status in Kernel Development Workflow prepare-package-meta series:
  Fix Released
Status in Kernel Development Workflow prepare-package-signed series:
  Fix Released
Status in Kernel Development Workflow promote-to-proposed series:
  Fix Released
Status in Kernel Development Workflow promote-to-release series:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Xenial:
  New

Bug description:
  This bug is for tracking the 4.3.0-1.10 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-Prepare-package-start:Thursday, 03. December 2015 13:53 UTC
  kernel-phase-changed:Thursday, 03. December 2015 13:53 UTC
  kernel-phase:Prepare
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 14:00 UTC
  proposed-announcement-sent:True

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-development-workflow/+bug/1522421/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1521942] Re: linux-lts-utopic: 3.16.0-56.75~14.04.1 -proposed tracker

2015-12-04 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.16.0-56.75~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 10:13 UTC
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 20:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 20:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Thursday, 03. December 2015 15:03 UTC
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:03 UTC
  kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:03 
UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:03 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:03 UTC
+ kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1521942

Title:
  linux-lts-utopic: 3.16.0-56.75~14.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  New

Bug description:
  This bug is for tracking the 3.16.0-56.75~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 10:13 UTC
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 20:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 20:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Thursday, 03. December 2015 15:03 UTC
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:03 UTC
  kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:03 
UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:03 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:03 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521942/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522124] Re: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker

2015-12-04 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.13.0-72.115~precise1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC
  kernel-stable-master-bug:1521979
  kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC
+ kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1522124

Title:
  linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Confirmed
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.13.0-72.115~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC
  kernel-stable-master-bug:1521979
  kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522124] Re: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker

2015-12-04 Thread Brad Figg
Here's the relevant information:

precise linux-lts-trusty 3.13.0-72.115~precise1 REGR
summary

Please verify test results in http://people.canonical.com/~kernel/status
/adt-matrix/overall.txt


** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1522124

Title:
  linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.13.0-72.115~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC
  kernel-stable-master-bug:1521979
  kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522766] Re: cryptsetup hangs after kernel upgrade to 3.13.0-72.115

2015-12-04 Thread Luis Henriques
Looks like this kernel has a bad backport of upstream commit 2a708cff93f1 ("dm: 
fix AB-BA deadlock in __dm_destroy()").
To confirm this, I've uploaded a test kernel with this backport reverted:

http://people.canonical.com/~henrix/lp1522766/v1/

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522766

Title:
  cryptsetup hangs after kernel upgrade to 3.13.0-72.115

Status in linux package in Ubuntu:
  Triaged

Bug description:
  After upgrading to the proposed kernel for Trusty (3.13.0-72.115) I
  cannot unlock a luks formatted usb drive. The cryptsetup process seems
  to hang with the following stack:

  [] __synchronize_srcu+0xfe/0x180
  [] synchronize_srcu+0x1d/0x20
  [] __dm_destroy+0x117/0x290
  [] dm_destroy+0x13/0x20
  [] dev_remove+0xde/0x120
  [] ctl_ioctl+0x255/0x500
  [] dm_ctl_ioctl+0x13/0x20
  [] do_vfs_ioctl+0x2e0/0x4c0
  [] SyS_ioctl+0x81/0xa0
  [] system_call_fastpath+0x1a/0x1f
  [] 0x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522766/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522421] fozzie (i386) - tests ran: 155, failed: 0

2015-12-04 Thread Brad Figg
tests ran: 155, failed: 0;
  
http://kernel.ubuntu.com/testing/4.3.0-1.10/fozzie__4.3.0-1.10__2015-12-04_07-09-00/results-index.html

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522421

Title:
  linux: 4.3.0-1.10 -proposed tracker

Status in Kernel Development Workflow:
  In Progress
Status in Kernel Development Workflow automated-testing series:
  Incomplete
Status in Kernel Development Workflow prepare-package series:
  Fix Released
Status in Kernel Development Workflow prepare-package-meta series:
  Fix Released
Status in Kernel Development Workflow prepare-package-signed series:
  Fix Released
Status in Kernel Development Workflow promote-to-proposed series:
  Fix Released
Status in Kernel Development Workflow promote-to-release series:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Xenial:
  New

Bug description:
  This bug is for tracking the 4.3.0-1.10 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-Prepare-package-start:Thursday, 03. December 2015 13:53 UTC
  kernel-phase-changed:Thursday, 03. December 2015 13:53 UTC
  kernel-phase:Prepare
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 14:00 UTC
  proposed-announcement-sent:True

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-development-workflow/+bug/1522421/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522124] Re: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker

2015-12-04 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1522124

Title:
  linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Confirmed
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.13.0-72.115~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC
  kernel-stable-master-bug:1521979
  kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522421] onza (amd64) - tests ran: 185, failed: 3

2015-12-04 Thread Brad Figg
tests ran: 185, failed: 3;
  
http://kernel.ubuntu.com/testing/4.3.0-1.10/onza__4.3.0-1.10__2015-12-04_07-47-00/results-index.html

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522421

Title:
  linux: 4.3.0-1.10 -proposed tracker

Status in Kernel Development Workflow:
  In Progress
Status in Kernel Development Workflow automated-testing series:
  Incomplete
Status in Kernel Development Workflow prepare-package series:
  Fix Released
Status in Kernel Development Workflow prepare-package-meta series:
  Fix Released
Status in Kernel Development Workflow prepare-package-signed series:
  Fix Released
Status in Kernel Development Workflow promote-to-proposed series:
  Fix Released
Status in Kernel Development Workflow promote-to-release series:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Xenial:
  New

Bug description:
  This bug is for tracking the 4.3.0-1.10 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-Prepare-package-start:Thursday, 03. December 2015 13:53 UTC
  kernel-phase-changed:Thursday, 03. December 2015 13:53 UTC
  kernel-phase:Prepare
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 14:00 UTC
  proposed-announcement-sent:True

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-development-workflow/+bug/1522421/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1220194] Re: CVE-2013-2891

2015-12-04 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: Undecided
   Status: Won't Fix

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Undecided
   Status: Won't Fix

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Fix Committed

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1220194

Title:
  CVE-2013-2891

Status in linux package in Ubuntu:
  Invalid
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-goldfish package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  Won't Fix
Status in linux-lts-backport-natty package in Ubuntu:
  Won't Fix
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  New
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  Invalid
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Committed
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick source package in Lucid:
  Won't Fix
Status in linux-lts-backport-natty source package in Lucid:
  Won't Fix
Status in linux source package in Precise:
  Invalid
Status in linux-armadaxp source package in Precise:
  Invalid
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-flo source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  Won't Fix
Status in linux-lts-backport-natty source package in Precise:
  Won't Fix
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Won't Fix
Status in linux-lts-saucy source package in Precise:
  New
Status in linux-lts-trusty source package in Precise:
  Invalid
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Quantal:
  Won't Fix
Status in linux-lts-backport-natty source package in Quantal:
  Won't 

[Kernel-packages] [Bug 1522124] dwalin (amd64) - tests ran: 2, failed: 0

2015-12-04 Thread Brad Figg
tests ran:   2, failed: 0;
  
http://kernel.ubuntu.com/testing/3.13.0-72.115~precise1/dwalin__3.13.0-72.115~precise1__2015-12-04_07-49-00/results-index.html

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1522124

Title:
  linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Confirmed
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.13.0-72.115~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC
  kernel-stable-master-bug:1521979
  kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522108] Re: linux: 4.2.0-21.25 -proposed tracker

2015-12-04 Thread Brad Figg
** Description changed:

  This bug is for tracking the 4.2.0-21.25 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 17:43 UTC
  kernel-stable-Prepare-package-end:Thursday, 03. December 2015 11:34 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 11:34 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 16:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Thursday, 03. December 2015 17:01 UTC
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 17:01 UTC
  kernel-stable-Certification-testing-start:Thursday, 03. December 2015 17:01 
UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 17:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 17:01 UTC
+ kernel-stable-Security-signoff-end:Friday, 04. December 2015 08:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522108

Title:
  linux: 4.2.0-21.25 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Wily:
  Confirmed

Bug description:
  This bug is for tracking the 4.2.0-21.25 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 17:43 UTC
  kernel-stable-Prepare-package-end:Thursday, 03. December 2015 11:34 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 11:34 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 16:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Thursday, 03. December 2015 17:01 UTC
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 17:01 UTC
  kernel-stable-Certification-testing-start:Thursday, 03. December 2015 17:01 
UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 17:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 17:01 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 08:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522108/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1220192] Re: CVE-2013-2890

2015-12-04 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: Undecided
   Status: Won't Fix

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Undecided
   Status: Won't Fix

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: Low
   Status: Invalid

** Also affects: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided => Low

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Fix Committed

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1220192

Title:
  CVE-2013-2890

Status in linux package in Ubuntu:
  Invalid
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-goldfish package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  Won't Fix
Status in linux-lts-backport-natty package in Ubuntu:
  Won't Fix
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  New
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  Invalid
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Committed
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick source package in Lucid:
  Won't Fix
Status in linux-lts-backport-natty source package in Lucid:
  Won't Fix
Status in linux source package in Precise:
  Invalid
Status in linux-armadaxp source package in Precise:
  Invalid
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-flo source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  Won't Fix
Status in linux-lts-backport-natty source package in Precise:
  Won't Fix
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Won't Fix
Status in linux-lts-saucy source package in Precise:
  New
Status in linux-lts-trusty source package in Precise:
  Invalid
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Quantal:
  Won't Fix
Status in linux-lts-backport-natty source package in Quantal:
  Won't 

[Kernel-packages] [Bug 1185990] Re: CVE-2013-2850

2015-12-04 Thread Steve Beattie
** Also affects: linux (Ubuntu Xenial)
   Importance: High
   Status: Fix Released

** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-mvl-dove (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-ec2 (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-ti-omap4 (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-backport-maverick (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-backport-natty (Ubuntu Xenial)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial)
   Importance: Undecided
   Status: Invalid

** Also affects: linux-armadaxp (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-quantal (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-raring (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-saucy (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-mako (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-manta (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-goldfish (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-flo (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-trusty (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-utopic (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-vivid (Ubuntu Xenial)
   Importance: High
   Status: Invalid

** Also affects: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Also affects: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Status: New => Invalid

** Changed in: linux-lts-wily (Ubuntu Xenial)
   Importance: Undecided => High

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Status: New => Fix Committed

** Changed in: linux-raspi2 (Ubuntu Xenial)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1185990

Title:
  CVE-2013-2850

Status in linux package in Ubuntu:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  Invalid
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-goldfish package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick package in Ubuntu:
  Invalid
Status in linux-lts-backport-natty package in Ubuntu:
  Invalid
Status in linux-lts-backport-oneiric package in Ubuntu:
  Invalid
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  New
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  Invalid
Status in linux-manta package in Ubuntu:
  Invalid
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Committed
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-lts-backport-maverick source package in Lucid:
  Invalid
Status in linux-lts-backport-natty source package in Lucid:
  Invalid
Status in linux-lts-backport-oneiric source package in Lucid:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-flo source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  Invalid
Status in linux-lts-backport-natty source package in Precise:
  Invalid
Status in linux-lts-backport-oneiric source package in Precise:
  Invalid
Status in linux-lts-quantal source package in Precise:
  Fix Released
Status in linux-lts-raring source package in Precise:
  Fix Released
Status in linux-lts-saucy source package in Precise:
  New
Status in linux-lts-trusty source package in Precise:
  Invalid
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in 

[Kernel-packages] [Bug 1522124] dwalin (i386) - tests ran: 2, failed: 0

2015-12-04 Thread Brad Figg
tests ran:   2, failed: 0;
  
http://kernel.ubuntu.com/testing/3.13.0-72.115~precise1/dwalin__3.13.0-72.115~precise1__2015-12-04_08-34-00/results-index.html

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1522124

Title:
  linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Confirmed
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  In Progress
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.13.0-72.115~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC
  kernel-stable-master-bug:1521979
  kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1520641] Re: linux: 3.19.0-38.43 -proposed tracker

2015-12-04 Thread Launchpad Bug Tracker
*** This bug is a duplicate of bug 1521630 ***
https://bugs.launchpad.net/bugs/1521630

This bug was fixed in the package linux - 3.19.0-39.44

---
linux (3.19.0-39.44) vivid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1521630

  [ Upstream Kernel Changes ]

  * fib_rules: Fix dump_rules() not to exit early
- LP: #1514785

linux (3.19.0-38.43) vivid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1520641

  [ danielepa ]

  * SAUCE: usb: cdc-acm: blacklist VID/PID 0x058b/0x0041 device
- LP: #1520147
  * SAUCE: usb: usb-serial-simple: add 0x058b/0x0041 device
- LP: #1520147

 -- Luis Henriques   Tue, 01 Dec 2015
12:22:47 +

** Changed in: linux (Ubuntu Vivid)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1520641

Title:
  linux: 3.19.0-38.43 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Vivid:
  Fix Released

Bug description:
  This bug is for tracking the 3.19.0-38.43 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Friday, 27. November 2015 16:09 UTC
  kernel-stable-Prepare-package-end:Saturday, 28. November 2015 02:03 UTC
  kernel-stable-Promote-to-proposed-start:Saturday, 28. November 2015 02:03 UTC
  kernel-stable-Promote-to-proposed-end:Monday, 30. November 2015 19:07 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Monday, 30. November 2015 21:01 UTC
  kernel-stable-Verification-testing-start:Monday, 30. November 2015 21:01 UTC
  kernel-stable-Certification-testing-start:Monday, 30. November 2015 21:01 UTC
  kernel-stable-Security-signoff-start:Monday, 30. November 2015 21:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Monday, 30. November 2015 21:01 UTC
  kernel-stable-Security-signoff-end:Tuesday, 01. December 2015 09:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1520641/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522124] Re: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker

2015-12-04 Thread Luis Henriques
We are respinning this kernel due to a regression.

** Changed in: kernel-sru-workflow/certification-testing
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1522124

Title:
  linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.13.0-72.115~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC
  kernel-stable-master-bug:1521979
  kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1514785] Re: kernel 3.16.0.52+53 - ip rule repeats all default rules (messing up rule table)

2015-12-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-39.44

---
linux (3.19.0-39.44) vivid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1521630

  [ Upstream Kernel Changes ]

  * fib_rules: Fix dump_rules() not to exit early
- LP: #1514785

linux (3.19.0-38.43) vivid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1520641

  [ danielepa ]

  * SAUCE: usb: cdc-acm: blacklist VID/PID 0x058b/0x0041 device
- LP: #1520147
  * SAUCE: usb: usb-serial-simple: add 0x058b/0x0041 device
- LP: #1520147

 -- Luis Henriques   Tue, 01 Dec 2015
12:22:47 +

** Changed in: linux (Ubuntu Vivid)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Vivid)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1514785

Title:
  kernel 3.16.0.52+53 - ip rule repeats all default rules (messing up
  rule table)

Status in linux package in Ubuntu:
  Confirmed
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Released
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux source package in Vivid:
  Fix Released

Bug description:
  Kernel breaks PBR routing on several versions.
  Problem occurs on server and desktop.

  Example using linux-image-3.13.0-70

  lsb_release:
  Ubutu 14.04.3 LTS
  Release 14.04

  Expected:
  To have the normal rule table when using 'ip rule show'
   0:  from all lookup local
   32766:  from all lookup main
   32767:  from all lookup default

  Instead:
  The 'ip rule show' command is messed up showing lots of repeated rules for 
local/main/default (did not count them - simply too much)

  A sec prob in my case as it is making policy based routing useless if
  you need to grep whether your rule exists already.

  Workaraound, go back to/remain on either of these series:
  3.13.0-68
  3.16.0.51
  3.19.0-33

  Confirmed working after the fix (see below messages)
  3.13.0-71.114
  3.16.0-55.74
  3.19.0-39.44

  PBR NOT working on:
  3.13.0-69
  3.13.0-70
  3.16.0-52
  3.16.0-53
  3.19.0-37

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1514785/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522421] Re: linux: 4.3.0-1.10 -proposed tracker

2015-12-04 Thread Andy Whitcroft
** Tags removed: block-proposed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522421

Title:
  linux: 4.3.0-1.10 -proposed tracker

Status in Kernel Development Workflow:
  In Progress
Status in Kernel Development Workflow automated-testing series:
  Incomplete
Status in Kernel Development Workflow prepare-package series:
  Fix Released
Status in Kernel Development Workflow prepare-package-meta series:
  Fix Released
Status in Kernel Development Workflow prepare-package-signed series:
  Fix Released
Status in Kernel Development Workflow promote-to-proposed series:
  Fix Released
Status in Kernel Development Workflow promote-to-release series:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Xenial:
  New

Bug description:
  This bug is for tracking the 4.3.0-1.10 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-Prepare-package-start:Thursday, 03. December 2015 13:53 UTC
  kernel-phase-changed:Thursday, 03. December 2015 13:53 UTC
  kernel-phase:Prepare
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 14:00 UTC
  proposed-announcement-sent:True

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-development-workflow/+bug/1522421/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1520651] Re: 10de:03ef [ASRock N68-GS4/USB3 FX] Networking and ACPI conflicts

2015-12-04 Thread mike
Christopher,

I'm a bit confused here.  Didn't I do the upstream testing as you
requested?  Following your instructions exactly?

Now, are you suggesting that "the issue you are reporting is an upstream
one",  well of course it is.  You asked me to do it that way, and I
obliged.

As much fun as it has been getting involved in this testing and bug
reports, the real reason, I made my initial report was that I have an
unusable PC.

I was hoping someone could suggest a practical work-around.  Someone
with knowledge of the new kernels who can tell me how to adapt the old
work-arounds that I referenced to the current system?

Is there anyone out there that can help me with that?

I can see that no-one is able or willing to help me with that, so:  I
will unable to do any further testing on this issue as the PC is now
packaged up and ready to dispatch back to the supplier, who has
generously agreed to replace the motherboard for me.

I note that this is an increasing problem with newer motherboards
especially USB 3 ready ones.  I hope that this issue is addressed soon
or UBUNTU may seriously loose popularity as it will be unusable to an
increasing number of new motherboard owners.

Thank you for your help to date.

What shall I do with this thread now?  Close it down?




Mike

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1520651

Title:
  10de:03ef [ASRock N68-GS4/USB3 FX] Networking and ACPI conflicts

Status in linux package in Ubuntu:
  Triaged

Bug description:
  My on-board networking doesn't work, and trying to restart or shutdown
  the computer freezes the system.

  With an older 12.04 kernel, 3.2.0-23.36, there were two workarounds.
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1003297

  WORKAROUND: Boot into rescue mode, drop to the terminal, run "rmmod
  forcedeth" then "modprobe forcedeth msi=0 msix=0" then resume a normal
  boot. This enabled both networking and regular ACPI functions. This
  needs to be repeated at every start up and several graphics drivers do
  not function well until the next normal boot.

  ---
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  taff   2383 F pulseaudio
  CurrentDesktop: Unity
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=UUID=3707218c-3355-4bdb-a631-69aee3520e51
  InstallationDate: Installed on 2015-11-25 (5 days ago)
  InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
   Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
   Bus 004 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
  MachineType: To Be Filled By O.E.M. To Be Filled By O.E.M.
  Package: linux (not installed)
  ProcFB:

  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-25-generic 
root=UUID=c6fdfec8-75cf-427c-813d-c6b9dbff9919 ro recovery nomodeset
  ProcVersionSignature: Ubuntu 3.19.0-25.26~14.04.1-generic 3.19.8-ckt2
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-25-generic N/A
   linux-backports-modules-3.19.0-25-generic  N/A
   linux-firmware 1.127.18
  RfKill:
   0: phy0: Wireless LAN
    Soft blocked: no
    Hard blocked: no
  Tags:  trusty
  Uname: Linux 3.19.0-25-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 10/02/2014
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: P1.10
  dmi.board.asset.tag: D050997CF5D0
  dmi.board.name: N68-GS4/USB3 FX
  dmi.board.vendor: ASRock
  dmi.chassis.asset.tag: To Be Filled By O.E.M.
  dmi.chassis.type: 3
  dmi.chassis.vendor: To Be Filled By O.E.M.
  dmi.chassis.version: To Be Filled By O.E.M.
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrP1.10:bd10/02/2014:svnToBeFilledByO.E.M.:pnToBeFilledByO.E.M.:pvrToBeFilledByO.E.M.:rvnASRock:rnN68-GS4/USB3FX:rvr:cvnToBeFilledByO.E.M.:ct3:cvrToBeFilledByO.E.M.:
  dmi.product.name: To Be Filled By O.E.M.
  dmi.product.version: To Be Filled By O.E.M.
  dmi.sys.vendor: To Be Filled By O.E.M.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1520651/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1521875] Re: linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker

2015-12-04 Thread Chris J Arges
** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges 
(arges)

** Changed in: kernel-sru-workflow/promote-to-security
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges 
(arges)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.launchpad.net/bugs/1521875

Title:
  linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  In Progress
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-vivid source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.19.0-39.44~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 07:01 UTC
  kernel-stable-master-bug:1521630
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 19:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 19:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:02 UTC
  kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:02 
UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:02 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:02 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 01:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:51 UTC
  kernel-stable-phase-changed:Friday, 04. December 2015 13:51 UTC
  kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:51 UTC
  kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:51 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521875/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1521875] Re: linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker

2015-12-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-39.44~14.04.1

---
linux-lts-vivid (3.19.0-39.44~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1521875

  [ Upstream Kernel Changes ]

  * fib_rules: Fix dump_rules() not to exit early
- LP: #1514785

linux (3.19.0-38.43) vivid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1520641

  [ danielepa ]

  * SAUCE: usb: cdc-acm: blacklist VID/PID 0x058b/0x0041 device
- LP: #1520147
  * SAUCE: usb: usb-serial-simple: add 0x058b/0x0041 device
- LP: #1520147

 -- Luis Henriques   Wed, 02 Dec 2015
09:28:31 +

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.launchpad.net/bugs/1521875

Title:
  linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  In Progress
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-vivid source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.19.0-39.44~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 07:01 UTC
  kernel-stable-master-bug:1521630
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 19:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 19:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:02 UTC
  kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:02 
UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:02 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:02 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 01:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:51 UTC
  kernel-stable-phase-changed:Friday, 04. December 2015 13:51 UTC
  kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:51 UTC
  kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:51 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521875/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1521875] Re: linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker

2015-12-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-39.44~14.04.1

---
linux-lts-vivid (3.19.0-39.44~14.04.1) trusty; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1521875

  [ Upstream Kernel Changes ]

  * fib_rules: Fix dump_rules() not to exit early
- LP: #1514785

linux (3.19.0-38.43) vivid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1520641

  [ danielepa ]

  * SAUCE: usb: cdc-acm: blacklist VID/PID 0x058b/0x0041 device
- LP: #1520147
  * SAUCE: usb: usb-serial-simple: add 0x058b/0x0041 device
- LP: #1520147

 -- Luis Henriques   Wed, 02 Dec 2015
09:28:31 +

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New => Fix Released

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.launchpad.net/bugs/1521875

Title:
  linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  In Progress
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-vivid source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.19.0-39.44~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 07:01 UTC
  kernel-stable-master-bug:1521630
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 19:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 19:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:02 UTC
  kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:02 
UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:02 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:02 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 01:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:51 UTC
  kernel-stable-phase-changed:Friday, 04. December 2015 13:51 UTC
  kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:51 UTC
  kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:51 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521875/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522766] Re: cryptsetup hangs after kernel upgrade to 3.13.0-72.115

2015-12-04 Thread Luis Henriques
** Changed in: linux (Ubuntu Trusty)
   Status: Triaged => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522766

Title:
  cryptsetup hangs after kernel upgrade to 3.13.0-72.115

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Trusty:
  Fix Committed

Bug description:
  After upgrading to the proposed kernel for Trusty (3.13.0-72.115) I
  cannot unlock a luks formatted usb drive. The cryptsetup process seems
  to hang with the following stack:

  [] __synchronize_srcu+0xfe/0x180
  [] synchronize_srcu+0x1d/0x20
  [] __dm_destroy+0x117/0x290
  [] dm_destroy+0x13/0x20
  [] dev_remove+0xde/0x120
  [] ctl_ioctl+0x255/0x500
  [] dm_ctl_ioctl+0x13/0x20
  [] do_vfs_ioctl+0x2e0/0x4c0
  [] SyS_ioctl+0x81/0xa0
  [] system_call_fastpath+0x1a/0x1f
  [] 0x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522766/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1521630] Re: linux: 3.19.0-39.44 -proposed tracker

2015-12-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-39.44

---
linux (3.19.0-39.44) vivid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1521630

  [ Upstream Kernel Changes ]

  * fib_rules: Fix dump_rules() not to exit early
- LP: #1514785

linux (3.19.0-38.43) vivid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1520641

  [ danielepa ]

  * SAUCE: usb: cdc-acm: blacklist VID/PID 0x058b/0x0041 device
- LP: #1520147
  * SAUCE: usb: usb-serial-simple: add 0x058b/0x0041 device
- LP: #1520147

 -- Luis Henriques   Tue, 01 Dec 2015
12:22:47 +

** Changed in: linux (Ubuntu Vivid)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1521630

Title:
  linux: 3.19.0-39.44 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  In Progress
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Vivid:
  Fix Released

Bug description:
  This bug is for tracking the 3.19.0-39.44 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 01. December 2015 13:44 UTC
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 02. December 2015 19:43 UTC
  kernel-stable-Verification-testing-start:Wednesday, 02. December 2015 21:01 
UTC
  kernel-stable-Certification-testing-start:Wednesday, 02. December 2015 21:02 
UTC
  kernel-stable-Security-signoff-start:Wednesday, 02. December 2015 21:02 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Wednesday, 02. December 2015 21:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 02. December 2015 22:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:50 UTC
  kernel-stable-phase-changed:Friday, 04. December 2015 13:50 UTC
  kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:49 UTC
  kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:50 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521630/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1514785] Re: kernel 3.16.0.52+53 - ip rule repeats all default rules (messing up rule table)

2015-12-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-39.44

---
linux (3.19.0-39.44) vivid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1521630

  [ Upstream Kernel Changes ]

  * fib_rules: Fix dump_rules() not to exit early
- LP: #1514785

linux (3.19.0-38.43) vivid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1520641

  [ danielepa ]

  * SAUCE: usb: cdc-acm: blacklist VID/PID 0x058b/0x0041 device
- LP: #1520147
  * SAUCE: usb: usb-serial-simple: add 0x058b/0x0041 device
- LP: #1520147

 -- Luis Henriques   Tue, 01 Dec 2015
12:22:47 +

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1514785

Title:
  kernel 3.16.0.52+53 - ip rule repeats all default rules (messing up
  rule table)

Status in linux package in Ubuntu:
  Confirmed
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Released
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux source package in Vivid:
  Fix Released

Bug description:
  Kernel breaks PBR routing on several versions.
  Problem occurs on server and desktop.

  Example using linux-image-3.13.0-70

  lsb_release:
  Ubutu 14.04.3 LTS
  Release 14.04

  Expected:
  To have the normal rule table when using 'ip rule show'
   0:  from all lookup local
   32766:  from all lookup main
   32767:  from all lookup default

  Instead:
  The 'ip rule show' command is messed up showing lots of repeated rules for 
local/main/default (did not count them - simply too much)

  A sec prob in my case as it is making policy based routing useless if
  you need to grep whether your rule exists already.

  Workaraound, go back to/remain on either of these series:
  3.13.0-68
  3.16.0.51
  3.19.0-33

  Confirmed working after the fix (see below messages)
  3.13.0-71.114
  3.16.0-55.74
  3.19.0-39.44

  PBR NOT working on:
  3.13.0-69
  3.13.0-70
  3.16.0-52
  3.16.0-53
  3.19.0-37

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1514785/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1520147] Re: Support firmware update interface of WWAN module

2015-12-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.19.0-39.44

---
linux (3.19.0-39.44) vivid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1521630

  [ Upstream Kernel Changes ]

  * fib_rules: Fix dump_rules() not to exit early
- LP: #1514785

linux (3.19.0-38.43) vivid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
- LP: #1520641

  [ danielepa ]

  * SAUCE: usb: cdc-acm: blacklist VID/PID 0x058b/0x0041 device
- LP: #1520147
  * SAUCE: usb: usb-serial-simple: add 0x058b/0x0041 device
- LP: #1520147

 -- Luis Henriques   Tue, 01 Dec 2015
12:22:47 +

** Changed in: linux (Ubuntu Vivid)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1520147

Title:
  Support firmware update interface of WWAN module

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Vivid:
  Fix Released

Bug description:
  Bus 001 Device 005: ID 413c:81ba Dell Computer Corp.

  Need to use usb-serial-simple instead of acm when the module is in
  firmware loading mode.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1520147/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1478799] Re: bluetooth not working in 15.10

2015-12-04 Thread Mike Holmes
Leonardos trick did not work for me.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1478799

Title:
  bluetooth not working in 15.10

Status in Linux:
  Unknown
Status in bluez package in Ubuntu:
  Invalid
Status in linux package in Ubuntu:
  Triaged

Bug description:
  Ubuntu 15.10 Wily

  No bluetooth indicator visible.

  I can't activate bluetooth in the bluetooth system-settings.

  Bluetooth mouse not working (I can't pair it).

  syslog:
  Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: Starting SDP server
  Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: DIS cannot start: GATT 
is disabled
  Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: Failed to init 
deviceinfo plugin
  Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: Failed to init 
proximity plugin
  Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: Failed to init time 
plugin
  Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: Failed to init alert 
plugin
  Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: Failed to init 
thermometer plugin
  Jul 28 10:44:51 norbert-Aspire-5737Z NetworkManager[647]:  VPN: loaded 
org.freedesktop.NetworkManager.pptp
  Jul 28 10:44:51 norbert-Aspire-5737Z NetworkManager[647]:  DNS: loaded 
plugin dnsmasq
  Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: bluetoothd[677]: 
Starting SDP server
  Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: bluetoothd[677]: DIS 
cannot start: GATT is disabled
  Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: bluetoothd[677]: Failed 
to init deviceinfo plugin
  Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: bluetoothd[677]: Failed 
to init proximity plugin
  Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: bluetoothd[677]: Failed 
to init time plugin
  Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: bluetoothd[677]: Failed 
to init alert plugin
  Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: bluetoothd[677]: Failed 
to init thermometer plugin
  Jul 28 10:44:51 norbert-Aspire-5737Z avahi-daemon[680]: Successfully called 
chroot().
  Jul 28 10:44:51 norbert-Aspire-5737Z avahi-daemon[680]: Successfully dropped 
remaining capabilities.
  Jul 28 10:44:51 norbert-Aspire-5737Z avahi-daemon[680]: No service file found 
in /etc/avahi/services.
  Jul 28 10:44:51 norbert-Aspire-5737Z avahi-daemon[680]: Network interface 
enumeration completed.
  Jul 28 10:44:51 norbert-Aspire-5737Z systemd[1]: Started Avahi mDNS/DNS-SD 
Stack.
  Jul 28 10:44:51 norbert-Aspire-5737Z avahi-daemon[680]: Registering HINFO 
record with values 'X86_64'/'LINUX'.
  Jul 28 10:44:51 norbert-Aspire-5737Z systemd[1]: Started Bluetooth service.

  hciconfig 
  hci0: Type: BR/EDR  Bus: USB
BD Address: 00:15:83:15:A3:0B  ACL MTU: 672:4  SCO MTU: 48:1
DOWN 
RX bytes:445 acl:0 sco:0 events:15 errors:0
TX bytes:63 acl:0 sco:0 commands:15 errors:0

  rfkill list 
  0: hci0: Bluetooth
Soft blocked: no
Hard blocked: no
  1: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/1478799/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1521630] Re: linux: 3.19.0-39.44 -proposed tracker

2015-12-04 Thread Chris J Arges
** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges 
(arges)

** Changed in: kernel-sru-workflow/promote-to-security
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges 
(arges)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1521630

Title:
  linux: 3.19.0-39.44 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  In Progress
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Vivid:
  Fix Released

Bug description:
  This bug is for tracking the 3.19.0-39.44 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 01. December 2015 13:44 UTC
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 02. December 2015 19:43 UTC
  kernel-stable-Verification-testing-start:Wednesday, 02. December 2015 21:01 
UTC
  kernel-stable-Certification-testing-start:Wednesday, 02. December 2015 21:02 
UTC
  kernel-stable-Security-signoff-start:Wednesday, 02. December 2015 21:02 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Wednesday, 02. December 2015 21:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 02. December 2015 22:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:50 UTC
  kernel-stable-phase-changed:Friday, 04. December 2015 13:50 UTC
  kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:49 UTC
  kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:50 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521630/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522108] fozzie (i386) - tests ran: 167, failed: 0

2015-12-04 Thread Brad Figg
tests ran: 167, failed: 0;
  
http://kernel.ubuntu.com/testing/4.2.0-21.25/fozzie__4.2.0-21.25__2015-12-04_12-42-00/results-index.html

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522108

Title:
  linux: 4.2.0-21.25 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Wily:
  Confirmed

Bug description:
  This bug is for tracking the 4.2.0-21.25 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 17:43 UTC
  kernel-stable-Prepare-package-end:Thursday, 03. December 2015 11:34 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 11:34 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 16:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Thursday, 03. December 2015 17:01 UTC
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 17:01 UTC
  kernel-stable-Certification-testing-start:Thursday, 03. December 2015 17:01 
UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 17:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 17:01 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 08:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522108/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


Re: [Kernel-packages] [Bug 1520355] Re: Kernel/Debugging/Backlight/Ubuntu Gnome 15.10

2015-12-04 Thread Anatoly
InUbuntu14.04with kernel3.16the issue issolved so: 
http://compizomania.blogspot.de/2014/06/ubuntu-1404linux-mint-17.htmlTo 
upgrade the kernelhas not yet happened, asthere was little timeand 
knowledge.Whenwill updatebe sure to writeyou. InDebianJessiehas decided 
as follows:addedin/etc/defaults/grubinthe 
variablevalueGRUB_CMDLINE_LINUX_DEFAULT="acpi_backlight=vendor"







30.11.2015 23:47, Joseph Salisbury пишет:
> Did this issue start happening after an update/upgrade?  Was there a
> prior kernel version where you were not having this particular problem?
>
> Would it be possible for you to test the latest upstream kernel? Refer
> to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
> v4.4 kernel[0].
>
> If this bug is fixed in the mainline kernel, please add the following
> tag 'kernel-fixed-upstream'.
>
> If the mainline kernel does not fix this bug, please add the tag:
> 'kernel-bug-exists-upstream'.
>
> Once testing of the upstream kernel is complete, please mark this bug as
> "Confirmed".
>
>
> Thanks in advance.
>
> [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.4-rc3-wily
>
> ** Changed in: linux (Ubuntu)
> Importance: Undecided => Medium
>
> ** Changed in: linux (Ubuntu)
> Status: Confirmed => Incomplete
>

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1520355

Title:
  Kernel/Debugging/Backlight/Ubuntu Gnome 15.10

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  anatoly@anatoly-Lenovo-B570e:~$ ubuntu-bug linux
  anatoly@anatoly-Lenovo-B570e:~$ ls /sys/class/backlight > backlight
  anatoly@anatoly-Lenovo-B570e:~$ grep -r . /proc/acpi > acpi
  anatoly@anatoly-Lenovo-B570e:~$ sudo acpidump -o acpidump.txt
  [sudo] пароль для anatoly: 
  anatoly@anatoly-Lenovo-B570e:~$ acpixtract acpidump.txt

  Intel ACPI Component Architecture
  ACPI Binary Table Extraction Utility version 20150717-64
  Copyright (c) 2000 - 2015 Intel Corporation

  Acpi table [DSDT] - 39619 bytes written to dsdt.dat
  Acpi table [SSDT] - 4200 bytes written to ssdt1.dat
  Acpi table [SSDT] - 2388 bytes written to ssdt2.dat
  Acpi table [SSDT] - 2316 bytes written to ssdt3.dat
  Acpi table [SSDT] - 2454 bytes written to ssdt4.dat
  Acpi table [SSDT] - 1660 bytes written to ssdt5.dat
  Acpi table [SSDT] - 771 bytes written to ssdt6.dat
  Acpi table [SSDT] - 281 bytes written to ssdt7.dat
  anatoly@anatoly-Lenovo-B570e:~$ iasl -d DSDT.dat

  Intel ACPI Component Architecture
  ASL+ Optimizing Compiler version 20150717-64
  Copyright (c) 2000 - 2015 Intel Corporation

  Could not open input file: No such file or directory
  anatoly@anatoly-Lenovo-B570e:~$ sudo fwts > fwts
  Test: Gather kernel system information. 
Gather kernel signature.1 info only 
Gather kernel system information.   1 info only 
Gather kernel boot command line.1 info only 
Gather ACPI driver version. 1 info only 
  Test: Gather BIOS DMI information.  
Gather BIOS DMI information 1 info only 
  Test: Scan kernel log for Oopses.   
Kernel log oops check.  2 passed
  Test: Scan kernel log for errors and warnings.  
Kernel log error check. 1 passed
  Test: MTRR tests.   
Validate the kernel MTRR IOMEM setup.   1 passed
Validate the MTRR setup across all processors.  1 passed
Test for AMD MtrrFixDramModEn being cleared by the B..  1 skipped   
  Test: General ACPI information test.
Determine Kernel ACPI version.  1 info only 
Determine machine's ACPI version.   1 info only 
Determine AML compiler. 1 info only 
  Test: Sanity check for UEFI Boot Path Boot. 
   Test aborted..   
  Test: UEFI secure boot test.
   Test skipped..   
  Test: UEFI Compatibility Support Module test.   
UEFI Compatibility Support Module test. 1 info only 
  Test: Test firmware has set PCI Express MaxReadReq to a higher value on n.. 
Test firmware settings MaxReadReq for PCI Express de..  1 passed
  Test: Test PCI host bridge configuration using _CRS. 

[Kernel-packages] [Bug 1511844] Re: [Acer Aspire ES1-711] System freezes occasionally

2015-12-04 Thread Peter Storm
I have the same problem on my Medion netbook. It has worked fine until I 
upgraded to 15.10.
I installed kernel 4.1.16 and I have had no problems with the kernel.
I have not had the same problem with my desktop PC.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1511844

Title:
  [Acer Aspire ES1-711] System freezes occasionally

Status in linux package in Ubuntu:
  Triaged

Bug description:
  Occasionally my system freezes totally in 15.04 and 15.10. Switching
  to Console via Ctrl-Alt-F1 or rebooting via Ctrl-Alt-Del does not
  work.

  Some days my system will run for many hours without any problem,  and
  on other days I experience 2 or 3 freezes in an hour time.

  ProblemType: Bug
  DistroRelease: Ubuntu 15.10
  Package: linux-image-4.2.0-16-generic 4.2.0-16.19
  ProcVersionSignature: Ubuntu 4.2.0-16.19-generic 4.2.3
  Uname: Linux 4.2.0-16-generic x86_64
  ApportVersion: 2.19.1-0ubuntu4
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  freek  2223 F pulseaudio
  CurrentDesktop: Unity
  Date: Fri Oct 30 21:11:26 2015
  EcryptfsInUse: Yes
  HibernationDevice: RESUME=UUID=c4065390-4392-460d-b828-37b12c4605cb
  InstallationDate: Installed on 2015-07-13 (108 days ago)
  InstallationMedia: Ubuntu 15.04 "Vivid Vervet" - Release amd64 (20150422)
  MachineType: Acer Aspire ES1-711
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.2.0-16-generic.efi.signed 
root=UUID=772134c4-7cb5-40d6-b0c7-a6bc4a98efe5 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-4.2.0-16-generic N/A
   linux-backports-modules-4.2.0-16-generic  N/A
   linux-firmware1.149
  SourcePackage: linux
  UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev'
  UpgradeStatus: Upgraded to wily on 2015-10-27 (2 days ago)
  dmi.bios.date: 11/07/2014
  dmi.bios.vendor: Insyde Corp.
  dmi.bios.version: V1.05
  dmi.board.asset.tag: Type2 - Board Asset Tag
  dmi.board.name: EA70_BM
  dmi.board.vendor: Acer
  dmi.board.version: Type2 - A01 Board Version
  dmi.chassis.type: 10
  dmi.chassis.vendor: Chassis Manufacturer
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnInsydeCorp.:bvrV1.05:bd11/07/2014:svnAcer:pnAspireES1-711:pvrV1.05:rvnAcer:rnEA70_BM:rvrType2-A01BoardVersion:cvnChassisManufacturer:ct10:cvrChassisVersion:
  dmi.product.name: Aspire ES1-711
  dmi.product.version: V1.05
  dmi.sys.vendor: Acer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1511844/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1521630] Re: linux: 3.19.0-39.44 -proposed tracker

2015-12-04 Thread Brad Figg
** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Confirmed

** Description changed:

  This bug is for tracking the 3.19.0-39.44 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 01. December 2015 13:44 UTC
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 02. December 2015 19:43 UTC
- kernel-stable-phase:Verification & Testing
- kernel-stable-phase-changed:Wednesday, 02. December 2015 21:01 UTC
  kernel-stable-Verification-testing-start:Wednesday, 02. December 2015 21:01 
UTC
  kernel-stable-Certification-testing-start:Wednesday, 02. December 2015 21:02 
UTC
  kernel-stable-Security-signoff-start:Wednesday, 02. December 2015 21:02 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Wednesday, 02. December 2015 21:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 02. December 2015 22:01 UTC
+ kernel-stable-phase:CopyToUpdates
+ kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:50 UTC
+ kernel-stable-phase-changed:Friday, 04. December 2015 13:50 UTC
+ kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:49 UTC
+ kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:50 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1521630

Title:
  linux: 3.19.0-39.44 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Confirmed
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Vivid:
  New

Bug description:
  This bug is for tracking the 3.19.0-39.44 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 01. December 2015 13:44 UTC
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 02. December 2015 19:43 UTC
  kernel-stable-Verification-testing-start:Wednesday, 02. December 2015 21:01 
UTC
  kernel-stable-Certification-testing-start:Wednesday, 02. December 2015 21:02 
UTC
  kernel-stable-Security-signoff-start:Wednesday, 02. December 2015 21:02 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Wednesday, 02. December 2015 21:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 02. December 2015 22:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:50 UTC
  kernel-stable-phase-changed:Friday, 04. December 2015 13:50 UTC
  kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:49 UTC
  kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:50 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521630/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1521630] Re: linux: 3.19.0-39.44 -proposed tracker

2015-12-04 Thread Luis Henriques
** Changed in: kernel-sru-workflow/automated-testing
   Status: Incomplete => Confirmed

** Changed in: kernel-sru-workflow/certification-testing
   Status: Confirmed => Invalid

** Changed in: kernel-sru-workflow/verification-testing
   Status: In Progress => Fix Released

** Tags added: qa-testing-passed

** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1521630

Title:
  linux: 3.19.0-39.44 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Confirmed
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Vivid:
  New

Bug description:
  This bug is for tracking the 3.19.0-39.44 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 01. December 2015 13:44 UTC
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 07:03 UTC
  kernel-stable-Promote-to-proposed-end:Wednesday, 02. December 2015 19:43 UTC
  kernel-stable-Verification-testing-start:Wednesday, 02. December 2015 21:01 
UTC
  kernel-stable-Certification-testing-start:Wednesday, 02. December 2015 21:02 
UTC
  kernel-stable-Security-signoff-start:Wednesday, 02. December 2015 21:02 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Wednesday, 02. December 2015 21:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 02. December 2015 22:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:50 UTC
  kernel-stable-phase-changed:Friday, 04. December 2015 13:50 UTC
  kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:49 UTC
  kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:50 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521630/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522108] tarf (amd64) - tests ran: 197, failed: 0

2015-12-04 Thread Brad Figg
tests ran: 197, failed: 0;
  
http://kernel.ubuntu.com/testing/4.2.0-21.25/tarf__4.2.0-21.25__2015-12-04_08-06-00/results-index.html

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522108

Title:
  linux: 4.2.0-21.25 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Wily:
  Confirmed

Bug description:
  This bug is for tracking the 4.2.0-21.25 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 17:43 UTC
  kernel-stable-Prepare-package-end:Thursday, 03. December 2015 11:34 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 11:34 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 16:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Thursday, 03. December 2015 17:01 UTC
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 17:01 UTC
  kernel-stable-Certification-testing-start:Thursday, 03. December 2015 17:01 
UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 17:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 17:01 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 08:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522108/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1521875] Re: linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker

2015-12-04 Thread Luis Henriques
** Changed in: kernel-sru-workflow/automated-testing
   Status: Incomplete => Fix Released

** Changed in: kernel-sru-workflow/verification-testing
   Status: In Progress => Fix Released

** Tags added: qa-testing-passed

** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/certification-testing
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.launchpad.net/bugs/1521875

Title:
  linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Confirmed
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-vivid source package in Trusty:
  New

Bug description:
  This bug is for tracking the 3.19.0-39.44~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 07:01 UTC
  kernel-stable-master-bug:1521630
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 19:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 19:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:02 UTC
  kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:02 
UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:02 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:02 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 01:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:51 UTC
  kernel-stable-phase-changed:Friday, 04. December 2015 13:51 UTC
  kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:51 UTC
  kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:51 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521875/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1460768] Re: Unable to build kernel 3.19.0-18

2015-12-04 Thread Wladimir Mutel
found this option: skipmodule=true , finally could rebuild all needed
generic .debs.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1460768

Title:
  Unable to build kernel 3.19.0-18

Status in One Hundred Papercuts:
  Confirmed
Status in linux package in Ubuntu:
  Confirmed

Bug description:
  There is a bug during compiling kernel version 3.19.0-18.
  First I executed patch file from archive  linux_3.19.0-18.18.diff.gz and 
source https://launchpad.net/ubuntu/+source/linux/3.19.0-18.18

  Then I executed

  make-kpkg --initrd buildpackage

  with attached config file.

  But I got a compiling error:

  CC [M]  ubuntu/vbox/vboxguest/VBoxGuest-linux.o
  In file included from :0:0:
  ././include/linux/kconfig.h:46:1: fatal error: 
./ubuntu/vbox/vboxguest/include/VBox/VBoxGuestMangling.h: No such file or 
directory
   #endif /* __LINUX_KCONFIG_H */
   ^
  compilation terminated.
  make[6]: *** [ubuntu/vbox/vboxguest/VBoxGuest-linux.o] Error 1
  make[5]: *** [ubuntu/vbox/vboxguest] Error 2
  make[4]: *** [ubuntu/vbox] Error 2
  make[3]: *** [ubuntu] Error 2

To manage notifications about this bug go to:
https://bugs.launchpad.net/hundredpapercuts/+bug/1460768/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1521875] Re: linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker

2015-12-04 Thread Brad Figg
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Confirmed

** Description changed:

  This bug is for tracking the 3.19.0-39.44~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 07:01 UTC
  kernel-stable-master-bug:1521630
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 19:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 19:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC
- kernel-stable-phase:Verification & Testing
- kernel-stable-phase-changed:Thursday, 03. December 2015 15:02 UTC
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:02 UTC
  kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:02 
UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:02 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:02 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 01:01 UTC
+ kernel-stable-phase:CopyToUpdates
+ kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:51 UTC
+ kernel-stable-phase-changed:Friday, 04. December 2015 13:51 UTC
+ kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:51 UTC
+ kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:51 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.launchpad.net/bugs/1521875

Title:
  linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Confirmed
Status in Kernel SRU Workflow promote-to-updates series:
  Confirmed
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-vivid source package in Trusty:
  New

Bug description:
  This bug is for tracking the 3.19.0-39.44~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 07:01 UTC
  kernel-stable-master-bug:1521630
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 19:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 19:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:02 UTC
  kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:02 
UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:02 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:02 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 01:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:51 UTC
  kernel-stable-phase-changed:Friday, 04. December 2015 13:51 UTC
  kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:51 UTC
  kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:51 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521875/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522108] bantam (amd64) - tests ran: 194, failed: 0

2015-12-04 Thread Brad Figg
tests ran: 194, failed: 0;
  
http://kernel.ubuntu.com/testing/4.2.0-21.25/bantam__4.2.0-21.25__2015-12-04_10-53-00/results-index.html

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522108

Title:
  linux: 4.2.0-21.25 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Wily:
  Confirmed

Bug description:
  This bug is for tracking the 4.2.0-21.25 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 17:43 UTC
  kernel-stable-Prepare-package-end:Thursday, 03. December 2015 11:34 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 11:34 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 16:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Thursday, 03. December 2015 17:01 UTC
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 17:01 UTC
  kernel-stable-Certification-testing-start:Thursday, 03. December 2015 17:01 
UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 17:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 17:01 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 08:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522108/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1521979] Re: linux: 3.13.0-72.115 -proposed tracker

2015-12-04 Thread Luis Henriques
*** This bug is a duplicate of bug 1522858 ***
https://bugs.launchpad.net/bugs/1522858

** This bug has been marked a duplicate of bug 1522858
   linux: 3.13.0-73.116 -proposed tracker

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1521979

Title:
  linux: 3.13.0-72.115 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  New

Bug description:
  This bug is for tracking the 3.13.0-72.115 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 11:30 UTC
  kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 19:06 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 19:06 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Thursday, 03. December 2015 15:04 UTC
  kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:04 UTC
  kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:04 
UTC
  kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:04 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:04 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 01:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521979/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522793] Re: Touchpad not working, locked ?

2015-12-04 Thread Christopher M. Penalver
Marcin, thank you for reporting this and helping make Ubuntu better.

As per http://www.dell.com/support/home/us/en/19/product-
support/product/inspiron-15-5547-laptop/drivers/advanced an update to
your computer's buggy and outdated BIOS is available (A08). If you
update to this following https://help.ubuntu.com/community/BIOSUpdate
does it address the issue?

If it doesn't, could you please both specify what happened, and provide the 
output of the following terminal command:
sudo dmidecode -s bios-version && sudo dmidecode -s bios-release-date

For more on BIOS updates and linux, please see
https://help.ubuntu.com/community/ReportingBugs#Bug_reporting_etiquette
.

Please note your current BIOS is already in the Bug Description, so
posting this on the old BIOS would not be helpful.

Also, you don't have to create a new bug report.

Once the BIOS is updated, if the problem is still reproducible, and the
information above is provided, then please mark this report Status
Confirmed. Otherwise, please mark this as Invalid.

Thank you for your understanding.

** Description changed:

- Touchpad not working on Dell units:
- 
- Dell Inspiron 5547
- Dell Inspiron 15-3552
- 
- Similar issue reported on:
- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374212
- 
- Distributor ID:   Ubuntu
- Description:  Ubuntu 15.10
- Release:  15.10
- Codename: wily
+ Touchpad not working on Dell Inspiron 5547.
  
  ⎡ Virtual core pointerid=2[master pointer  (3)]
  ⎜   ↳ Virtual core XTEST pointer  id=4[slave  pointer 
 (2)]
  ⎜   ↳ ELAN Touchscreenid=10   [slave  pointer 
 (2)]
  ⎜   ↳ DLL063E:00 06CB:2934id=12   [slave  pointer 
 (2)]
  ⎜   ↳ SynPS/2 Synaptics TouchPad  id=14   [slave  pointer 
 (2)]
  ⎣ Virtual core keyboard   id=3[master keyboard (2)]
- ↳ Virtual core XTEST keyboard id=5[slave  
keyboard (3)]
- ↳ Power Buttonid=6[slave  
keyboard (3)]
- ↳ Video Bus   id=7[slave  
keyboard (3)]
- ↳ Power Buttonid=8[slave  
keyboard (3)]
- ↳ Sleep Buttonid=9[slave  
keyboard (3)]
- ↳ Integrated_Webcam_HDid=11   [slave  
keyboard (3)]
- ↳ AT Translated Set 2 keyboardid=13   [slave  
keyboard (3)]
- ↳ Dell WMI hotkeysid=15   [slave  
keyboard (3)]
+ ↳ Virtual core XTEST keyboard id=5[slave  
keyboard (3)]
+ ↳ Power Buttonid=6[slave  
keyboard (3)]
+ ↳ Video Bus   id=7[slave  
keyboard (3)]
+ ↳ Power Buttonid=8[slave  
keyboard (3)]
+ ↳ Sleep Buttonid=9[slave  
keyboard (3)]
+ ↳ Integrated_Webcam_HDid=11   [slave  
keyboard (3)]
+ ↳ AT Translated Set 2 keyboardid=13   [slave  
keyboard (3)]
+ ↳ Dell WMI hotkeysid=15   [slave  
keyboard (3)]
  
  ProblemType: Bug
  DistroRelease: Ubuntu 15.10
  Package: linux-image-4.2.0-16-generic 4.2.0-16.19
  ProcVersionSignature: Ubuntu 4.2.0-16.19-generic 4.2.3
  Uname: Linux 4.2.0-16-generic x86_64
  ApportVersion: 2.19.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
-  USERPID ACCESS COMMAND
-  /dev/snd/controlC1:  marcin 3077 F pulseaudio
-  /dev/snd/controlC0:  marcin 3077 F pulseaudio
+  USERPID ACCESS COMMAND
+  /dev/snd/controlC1:  marcin 3077 F pulseaudio
+  /dev/snd/controlC0:  marcin 3077 F pulseaudio
  CasperVersion: 1.365
  CurrentDesktop: Unity
  Date: Fri Dec  4 10:59:53 2015
  LiveMediaBuild: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021)
  MachineType: Dell Inc. Inspiron 5547
  ProcEnviron:
-  TERM=xterm-256color
-  PATH=(custom, no user)
-  XDG_RUNTIME_DIR=
-  LANG=en_US.UTF-8
-  SHELL=/bin/bash
+  TERM=xterm-256color
+  PATH=(custom, no user)
+  XDG_RUNTIME_DIR=
+  LANG=en_US.UTF-8
+  SHELL=/bin/bash
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/NFS/15.10/desktop-amd64/casper/vmlinuz.efi 
append noprompt boot=casper modprobe.blacklist=wl rfkill.master_switch_mode=0 
rfkill.default_state=1 nohibernate userfullname=User Name username=username 
proceed=AIO nfsroot=usb showmounts persistent-path=/NFS/15.10/desktop-amd64 
persistent iso-scan/filename=/NFS/15.10/hostname-15.10-desktop-amd64.iso toram
  RelatedPackageVersions:
-  linux-restricted-modules-4.2.0-16-generic N/A
-  linux-backports-modules-4.2.0-16-generic  N/A
-  linux-firmware1.149
+  linux-restricted-modules-4.2.0-16-generic N/A
+  

[Kernel-packages] [Bug 1522858] [NEW] linux: 3.13.0-73.116 -proposed tracker

2015-12-04 Thread Luis Henriques
Public bug reported:

This bug is for tracking the 3.13.0-73.116 upload package. This bug will
contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Friday, 04. December 2015 14:25 UTC
kernel-stable-phase:Prepare
kernel-stable-phase-changed:Friday, 04. December 2015 14:25 UTC

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Platform QA Team (canonical-platform-qa)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux (Ubuntu Trusty)
 Importance: Medium
 Status: New


** Tags: block-proposed-trusty kernel-release-tracking-bug trusty

** Tags added: kernel-release-tracking-bug

** Tags added: block-proposed-trusty

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Tags added: trusty

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow
   Status: New => In Progress

** Changed in: kernel-sru-workflow
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided => Medium

** Changed in: 

[Kernel-packages] [Bug 1521053] Re: Network Performance dropping between vms on different location in Azure

2015-12-04 Thread Tim Gardner
Seyeong - can you try reverting 'hv_netvsc: Implement partial copy into
send buffer' ? This backport was dropped from Utopic because it caused
regressions. Perhaps the same is true of Vivid.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1521053

Title:
  Network Performance dropping between vms on different location in
  Azure

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Vivid:
  In Progress

Bug description:
  [Impact]

  Ubuntu VMs between different location in Azure , especially North Europe and 
East Europe in this case, have network performance issue.
  It should be around 100MB/s speed between them. but it's around 0.3MB/s when 
dropping happens.

  [Fix]

  Upstream development
  0d158852a8089099a6959ae235b20f230871982f ("hv_netvsc: Clean up two unused 
variables")

  It's affected over 3.19.0-28-generic (ubuntu-vivid)

  [Testcase]

  Make 2 VMs on North Europe, West Europe each.
  Then run below test script

  NE VM

  - netcat & nload
   while true; do netcat -l 8080 < /dev/zero; done;
   nload -u M eth0 ( need nload pkg )

  - iperf
   iperf -s -f M

  WE VM

  - netcat
   for i in {1..1000}
   do
    timeout 30s nc NE_HOST 8080 > /dev/null
   done

  - iperf
   iperf -c HOST -f M

  Network performance dropping can be seen frequently.

  More Tests
  http://pastebin.ubuntu.com/13657083/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1521053/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522786] Re: linux: 3.19.0-40.45 -proposed tracker

2015-12-04 Thread Luis Henriques
*** This bug is a duplicate of bug 1522918 ***
https://bugs.launchpad.net/bugs/1522918

** This bug has been marked a duplicate of bug 1522918
   linux: 3.19.0-41.46 -proposed tracker

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522786

Title:
  linux: 3.19.0-40.45 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Vivid:
  New

Bug description:
  This bug is for tracking the 3.19.0-40.45 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Friday, 04. December 2015 10:52 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Friday, 04. December 2015 10:52 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522786/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522766] Re: cryptsetup hangs after kernel upgrade to 3.13.0-72.115

2015-12-04 Thread Luis Henriques
** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522766

Title:
  cryptsetup hangs after kernel upgrade to 3.13.0-72.115

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Vivid:
  New

Bug description:
  After upgrading to the proposed kernel for Trusty (3.13.0-72.115) I
  cannot unlock a luks formatted usb drive. The cryptsetup process seems
  to hang with the following stack:

  [] __synchronize_srcu+0xfe/0x180
  [] synchronize_srcu+0x1d/0x20
  [] __dm_destroy+0x117/0x290
  [] dm_destroy+0x13/0x20
  [] dev_remove+0xde/0x120
  [] ctl_ioctl+0x255/0x500
  [] dm_ctl_ioctl+0x13/0x20
  [] do_vfs_ioctl+0x2e0/0x4c0
  [] SyS_ioctl+0x81/0xa0
  [] system_call_fastpath+0x1a/0x1f
  [] 0x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522766/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522124] fozzie (amd64) - tests ran: 148, failed: 0

2015-12-04 Thread Brad Figg
tests ran: 148, failed: 0;
  
http://kernel.ubuntu.com/testing/3.13.0-72.115~precise1/fozzie__3.13.0-72.115~precise1__2015-12-04_15-42-00/results-index.html

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1522124

Title:
  linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.13.0-72.115~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC
  kernel-stable-master-bug:1521979
  kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC
  kernel-stable-Certification-testing-end:Friday, 04. December 2015 16:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522124] bantam (amd64) - tests ran: 148, failed: 0

2015-12-04 Thread Brad Figg
tests ran: 148, failed: 0;
  
http://kernel.ubuntu.com/testing/3.2.0-96.136/bantam__3.2.0-96.136__2015-12-04_14-59-00/results-index.html

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1522124

Title:
  linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.13.0-72.115~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC
  kernel-stable-master-bug:1521979
  kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC
  kernel-stable-Certification-testing-end:Friday, 04. December 2015 16:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1497428] Re: kernel BUG at /build/buildd/linux-3.13.0/mm/page_alloc.c:968

2015-12-04 Thread Dan Streetman
To clarify the bug, a bit of background is needed first (specific
numbers apply only to this situation).

The kernel refers to all pages under a single PMD (midlevel page table)
as a "pageblock".  It's the same size as a hugepage, 2M.  In the
function triggering the BUG(), it's expecting that the start and end
pages are inside the same zone, but that isn't the case so the BUG() is
triggered.  One function up, move_freepages_block(), is where the start
and end PFNs are set; the function takes one page and calculates the
start and end PFNs (which are aligned) that contain the provided page.
It then verifies that both PFNs are inside the original page's zone, and
passes the start/end pages to move_freepages().

The problem is that the zone's PFN range is wrong.  In this particular
case, the zone's memory ends in the middle of a pageblock, which is
unusual.  So when move_freepages_block() checks if the end PFN of the
pageblock is inside the zone (i.e. < zone end PFN), it *should* fail,
and cause the function to return.  However, it doesn't fail, meaning the
zone's end PFN is wrong, and when move_freepages() checks the
page_zone() of the start and end pages, they don't match - because the
end page isn't valid - and the BUG() is triggered.

In my testing, if I manually limit memory to end in the middle of a
pageblock, the zone's end PFN is correctly set, so it seems that
something is changing the zone PFN range (specifically the zone's
spanned_pages value) at runtime - or, the particular environment for
this bug is different that my test setup and getting the zone end PFN
wrong somehow.  I'm going to create a debug module that will jprobe
these functions to check for this condition, and then print debug output
and avoid the BUG().


As a workaround for this, if the amount of memory is set so that it ends at a 
multiple of the pageblock size (512 4k pages == 2M), this bug should not 
happen.  On x86, the boot mem= param sets the maximum address, which should 
allow changing the zone's end pfn to be aligned with pageblock; e.g. if the 
dmesg e820 output lists the last line of the memory ranges as:

[0.00] BIOS-e820: [mem 0x0001-0x0003e08f]
usable

then the last valid PFN is 0x3e08f, so the zone end pfn (1 more than
last valid pfn) is 0x3e090, which isn't a multiple of the pageblock
size (2M):

$ echo $[ 0x3e090 % (2 * 1024 * 1024) ]
1048576

In this example case, restricting the last 1M of memory by setting
mem=0x3e080 should work around this bug - although since I can't
reproduce it yet, I've no way to verify the workaround; and it may
simply cause the bug to appear at a different location.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1497428

Title:
  kernel BUG at /build/buildd/linux-3.13.0/mm/page_alloc.c:968

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Trusty:
  In Progress

Bug description:
  The kernel triggers a BUG when it finds it is in move_freepages() but
  the start and end pfns for the move are in different zones.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1497428/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522918] [NEW] linux: 3.19.0-41.46 -proposed tracker

2015-12-04 Thread Luis Henriques
Public bug reported:

This bug is for tracking the 3.19.0-41.46 upload package. This bug will
contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Friday, 04. December 2015 17:34 UTC
kernel-stable-phase:Prepare
kernel-stable-phase-changed:Friday, 04. December 2015 17:34 UTC

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Platform QA Team (canonical-platform-qa)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux (Ubuntu)
 Importance: Medium
 Status: Invalid

** Affects: linux (Ubuntu Vivid)
 Importance: Medium
 Status: New


** Tags: block-proposed-vivid kernel-release-tracking-bug vivid

** Tags added: kernel-release-tracking-bug

** Tags added: block-proposed-vivid

** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Tags added: vivid

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow
   Status: New => In Progress

** Changed in: kernel-sru-workflow
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided => Medium

** Changed in: 

[Kernel-packages] [Bug 1484919] Re: Kernel oops associated with BIRD/netlink

2015-12-04 Thread Matt Dupre
It takes us a bit of time to spin up an environment large enough to hit
this, so I'm just trying to figure out how many runs we'll need to pin
this down.

What are your thoughts here?  How many kernels are we likely to need to
test, and is there a way for us to get good diagnostics out to look for
the problem that way?


3.13: good
...
3.19: bad
...
4.2-rc7: good
Wily: seems likely that this is good too?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1484919

Title:
  Kernel oops associated with BIRD/netlink

Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Vivid:
  In Progress
Status in linux source package in Wily:
  Incomplete
Status in linux source package in Xenial:
  Incomplete

Bug description:
  Scale testing our product, which uses the BIRD BGP daemon, on Google's
  GCE cloud, we see frequent (40% of hosts) Kernel Oopses and reboots on
  kernel 3.19.0-25-generic #26~14.04.1-Ubuntu with BIRD running.  This
  is the standard GCE-provided Ubuntu image.

  If we replace the image with a stock Ubuntu one (kernel
  3.13.0-61-generic #100-Ubuntu), installed from ISO, then we do not see
  the issue.

  If we stop BIRD then we no longer see the issue.

  I suspect that this is an issue with the way BIRD is using netlink,
  triggering a kernel bug.   It seems to happen more at scale, when BIRD
  is doing more with netlink and we have thousands of routes in place.

  Here's a sample kernel oops:

  [  266.033276] BUG: unable to handle kernel paging request at 0019003c
  [  266.035142] IP: [] __kmalloc_node_track_caller+0xfb/0x2c0
  [  266.036009] PGD b9e5e067 PUD 0 
  [  266.036009] Oops:  [#1] SMP 
  [  266.036009] Modules linked in: bridge stp llc dummy xt_mac xt_mark 
nf_conntrack_ipv6 nf_defrag_ipv6 xt_comment xt_set ip_set_hash_ip ip_set 
nfnetlink ebtable_nat ebtables xt_nat ipip tunnel4 ip_tunnel ipt_REJECT 
nf_reject_ipv4 xt_conntrack xt_CHECKSUM xt_tcpudp iptable_mangle ipt_MASQUERADE 
nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 
nf_nat nf_conntrack ip6table_filter ip6_tables iptable_filter ip_tables 
x_tables nbd ib_iser rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp 
libiscsi_tcp libiscsi scsi_transport_iscsi dm_crypt ppdev dm_multipath scsi_dh 
8250_fintek parport_pc i2c_piix4 mac_hid serio_raw parport crct10dif_pclmul 
crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul 
glue_helper ablk_helper cryptd psmouse virtio_scsi
  [  266.036009] CPU: 2 PID: 3456 Comm: bird Tainted: G C 
3.19.0-25-generic #26~14.04.1-Ubuntu
  [  266.036009] Hardware name: Google Google, BIOS Google 01/01/2011
  [  266.036009] task: 8801210775c0 ti: 880036a08000 task.ti: 
880036a08000
  [  266.036009] RIP: 0010:[]  [] 
__kmalloc_node_track_caller+0xfb/0x2c0
  [  266.036009] RSP: 0018:880036a0b7f8  EFLAGS: 00010246
  [  266.036009] RAX:  RBX: 000102d0 RCX: 
0008b0f6
  [  266.036009] RDX: 0008b0f5 RSI:  RDI: 
000171c0
  [  266.036009] RBP: 880036a0b848 R08: 8801263171c0 R09: 
880121c01600
  [  266.036009] R10:  R11: 880121c01600 R12: 
000102d0
  [  266.036009] R13: 0180 R14:  R15: 
0019003c
  [  266.036009] FS:  7fd470753740() GS:88012630() 
knlGS:
  [  266.036009] CS:  0010 DS:  ES:  CR0: 80050033
  [  266.036009] CR2: 0019003c CR3: bb207000 CR4: 
001406e0
  [  266.036009] Stack:
  [  266.036009]  00010180 00c3 880121c01600 
816992ea
  [  266.036009]  0001 8800b1486a00  
00d0
  [  266.036009]  0180  880036a0b898 
81697261
  [  266.036009] Call Trace:
  [  266.036009]  [] ? pskb_expand_head+0x6a/0x260
  [  266.036009]  [] __kmalloc_reserve.isra.27+0x31/0x90
  [  266.036009]  [] pskb_expand_head+0x6a/0x260
  [  266.036009]  [] netlink_trim+0xa3/0xe0
  [  266.036009]  [] netlink_unicast+0x3e/0x200
  [  266.036009]  [] nlmsg_notify+0x93/0xb0
  [  266.036009]  [] rtnl_notify+0x2e/0x40
  [  266.036009]  [] rtmsg_fib+0x115/0x160
  [  266.036009]  [] ? trie_rebalance+0x10d/0x130
  [  266.036009]  [] fib_table_insert+0x1da/0x8e0
  [  266.036009]  [] inet_rtm_newroute+0x48/0x60
  [  266.036009]  [] rtnetlink_rcv_msg+0x95/0x250
  [  266.036009]  [] ? rhashtable_lookup_compare+0x36/0x70
  [  266.036009]  [] ? __netlink_lookup+0x3e/0x50
  [  266.036009]  [] ? rtnetlink_rcv+0x40/0x40
  [  266.036009]  [] netlink_rcv_skb+0xc1/0xe0
  [  266.036009]  [] rtnetlink_rcv+0x2c/0x40
  [  266.036009]  [] netlink_unicast+0xf6/0x200
  [  266.036009]  [] netlink_sendmsg+0x30c/0x680
  [  266.036009]  [] ? aa_sk_perm.isra.4+0x70/0x150
  [  266.036009]  [] do_sock_sendmsg+0x8c/0x100

[Kernel-packages] [Bug 1451246] Re: Intel 7265 Wifi instability workaround

2015-12-04 Thread Charles DeBergh
** Changed in: linux (Ubuntu)
   Status: Expired => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1451246

Title:
  Intel 7265 Wifi instability workaround

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  I have a Thinkpad T450s since 5/1/2015 (though linux wants the 7265D
  ucode though). It was unstable, even when upgrading to the 4.0.1
  mainline kernel.

  Using the latest 7265 firmware improved things, but things like streams, 
speed tests, and youtube would tank the connection:
  retrieve the latest linux-firmware from their git:
  http://git.kernel.org/cgit/linux/kernel/git/firmware/linux-firmware.git
  (git clone 
https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git)

  sudo rm /lib/firmware/iwlwifi*
  sudo cp /path/to//iwlwifi-7265*-12.ucode 
/lib/firmware/.
  reboot

  WORKAROUND: Disable 802.11n:
  echo 'options iwlwifi 11n_disable=1' | sudo tee -a 
/etc/modprobe.d/iwlwifi.conf

  ProblemType: Bug
  DistroRelease: Ubuntu 15.04
  Package: linux-image-3.19.0-15-generic 3.19.0-15.15 [modified: 
boot/vmlinuz-3.19.0-15-generic]
  ProcVersionSignature: Ubuntu 3.19.0-15.15-generic 3.19.3
  Uname: Linux 3.19.0-15-generic x86_64
  ApportVersion: 2.17.2-0ubuntu1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  epicstar   1453 F pulseaudio
   /dev/snd/pcmC1D0p:   epicstar   1453 F...m pulseaudio
   /dev/snd/controlC1:  epicstar   1453 F pulseaudio
  CurrentDesktop: Unity
  Date: Sun May  3 15:43:35 2015
  HibernationDevice: RESUME=UUID=9caf85bf-266f-4356-9a64-031df7edb239
  InstallationDate: Installed on 2015-05-02 (1 days ago)
  InstallationMedia: Ubuntu 15.04 "Vivid Vervet" - Release amd64 (20150422)
  MachineType: LENOVO 20BXCTO1WW
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-15-generic.efi.signed 
root=UUID=b8187455-26c0-492f-bf45-755286cf5623 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-15-generic N/A
   linux-backports-modules-3.19.0-15-generic  N/A
   linux-firmware 1.143
  RfKill:
   0: phy0: Wireless LAN
    Soft blocked: no
    Hard blocked: no
  SourcePackage: linux
  UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev'
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 03/10/2015
  dmi.bios.vendor: LENOVO
  dmi.bios.version: JBET47WW (1.12 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 20BXCTO1WW
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0E50512 STD
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: None
  dmi.modalias: 
dmi:bvnLENOVO:bvrJBET47WW(1.12):bd03/10/2015:svnLENOVO:pn20BXCTO1WW:pvrThinkPadT450s:rvnLENOVO:rn20BXCTO1WW:rvrSDK0E50512STD:cvnLENOVO:ct10:cvrNone:
  dmi.product.name: 20BXCTO1WW
  dmi.product.version: ThinkPad T450s
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1451246/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522201] Re: NUC NUC5CPYH Does not reboot on Ubuntu 15.10 (linux-image-4.2.0-19)

2015-12-04 Thread hackeron
** Attachment added: "DSDT generated with "sudo -u \#0 acpidump -bn DSDT;  iasl 
-d dsdt.dat""
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522201/+attachment/4529649/+files/dsdt.dsl

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522201

Title:
  NUC NUC5CPYH Does not reboot on Ubuntu 15.10 (linux-image-4.2.0-19)

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  This bug might be related to this bug:
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1521749

  I have an Intel NUC NUC5CPYH. This is the unit:
  http://www.intel.com/content/www/us/en/nuc/nuc-kit-nuc5cpyh.html

  It boots and reboots beautifully on Ubuntu 15.04 and Ubuntu 15.10 with
  linux-image-3.19.0-34-generic -- but when I try to boot with linux-
  image-4.2.0-19-generic on the latest PY0044 BIOS version, it does not
  boot at all. If I downgrade the BIOS to PY0043, it boots, but then I
  am not able to reboot it.

  When I run "reboot", it freezes showing this screen:
  https://www.dropbox.com/s/fxy4opcqwnmjmwo/IMG_1489.jpg?dl=0

  I am also attaching the full syslog, dmesg and the relevant part of
  the syslog when the system froze.

  Any ideas?

  ---
  ApportVersion: 2.19.1-0ubuntu5
  Architecture: amd64
  DistroRelease: Ubuntu 15.10

  ProcEnviron:
   TERM=linux
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=
   SHELL=/bin/bash
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.2.0-19-generic 
root=UUID=4fa37335-eed0-4580-ae4b-62c996dfc275 ro vt.handoff=7
  ProcVersionSignature: Ubuntu 4.2.0-19.23-generic 4.2.6
  RelatedPackageVersions:
   linux-restricted-modules-4.2.0-19-generic N/A
   linux-backports-modules-4.2.0-19-generic  N/A
   linux-firmware1.149.3
  RfKill: Error: [Errno 2] No such file or directory
  Tags:  wily
  UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev'
  Uname: Linux 4.2.0-19-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups:

  _MarkForUpload: True
  dmi.bios.date: 09/04/2015
  dmi.bios.vendor: Intel Corp.
  dmi.bios.version: PYBSWCEL.86A.0043.2015.0904.1904
  dmi.board.name: NUC5CPYB
  dmi.board.vendor: Intel Corporation
  dmi.board.version: H61145-404
  dmi.chassis.type: 3
  dmi.modalias: 
dmi:bvnIntelCorp.:bvrPYBSWCEL.86A.0043.2015.0904.1904:bd09/04/2015:svn:pn:pvr:rvnIntelCorporation:rnNUC5CPYB:rvrH61145-404:cvn:ct3:cvr:

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522201/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522421] Re: linux: 4.3.0-1.10 -proposed tracker

2015-12-04 Thread Andy Whitcroft
** Tags added: block-proposed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522421

Title:
  linux: 4.3.0-1.10 -proposed tracker

Status in Kernel Development Workflow:
  In Progress
Status in Kernel Development Workflow automated-testing series:
  Incomplete
Status in Kernel Development Workflow prepare-package series:
  Fix Released
Status in Kernel Development Workflow prepare-package-meta series:
  Fix Released
Status in Kernel Development Workflow prepare-package-signed series:
  Fix Released
Status in Kernel Development Workflow promote-to-proposed series:
  Fix Released
Status in Kernel Development Workflow promote-to-release series:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Xenial:
  New

Bug description:
  This bug is for tracking the 4.3.0-1.10 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-Prepare-package-start:Thursday, 03. December 2015 13:53 UTC
  kernel-phase-changed:Thursday, 03. December 2015 13:53 UTC
  kernel-phase:Prepare
  kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 14:00 UTC
  proposed-announcement-sent:True

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-development-workflow/+bug/1522421/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522124] Re: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker

2015-12-04 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.13.0-72.115~precise1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC
  kernel-stable-master-bug:1521979
  kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC
+ kernel-stable-Certification-testing-end:Friday, 04. December 2015 16:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1522124

Title:
  linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Incomplete
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Confirmed
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.13.0-72.115~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC
  kernel-stable-master-bug:1521979
  kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC
  kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC
  kernel-stable-Certification-testing-end:Friday, 04. December 2015 16:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522858] Re: linux: 3.13.0-73.116 -proposed tracker

2015-12-04 Thread Brad Figg
** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Luis Henriques 
(henrix)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522858

Title:
  linux: 3.13.0-73.116 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  New

Bug description:
  This bug is for tracking the 3.13.0-73.116 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Friday, 04. December 2015 14:25 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Friday, 04. December 2015 14:25 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522858/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522786] Re: linux: 3.19.0-40.45 -proposed tracker

2015-12-04 Thread Brad Figg
** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Luis Henriques 
(henrix)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522786

Title:
  linux: 3.19.0-40.45 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Vivid:
  New

Bug description:
  This bug is for tracking the 3.19.0-40.45 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Friday, 04. December 2015 10:52 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Friday, 04. December 2015 10:52 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522786/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1481575] Re: Fix Dell laptop to internal mic/headset mic

2015-12-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.3.0-1.10

---
linux (4.3.0-1.10) xenial; urgency=low

  [ Andy Whitcroft ]

  * [Config] make IBMVETH consistent on powerpc/ppc64el
- LP: #1521712
  * [Config] follow ibmvscsi name change
- LP: #1521712
  * [Config] move ibm disk and ethernet drivers to linux-image
- LP: #1521712
  * [Config] include ibmveth in nic-modules for ppc64el
- LP: #1521712
  * [Config] s390x -- disable abi/module checks for s390x

  [ Tim Gardner ]

  * [Config] Add spl/zfs provides to generic and powerpc64-smp
  * [Config] Add zfs to d-i fs-core-modules

  [ Upstream Kernel Changes ]

  * KVM: x86: work around infinite loop in microcode when #AC is delivered
  * KVM: svm: unconditionally intercept #DB
  * Btrfs: fix truncation of compressed and inlined extents
  * staging/dgnc: fix info leak in ioctl
  * [media] media/vivid-osd: fix info leak in ioctl
  * crypto: asymmetric_keys - remove always false comparison
  * X.509: Fix the time validation [ver #2]
  * isdn_ppp: Add checks for allocation failure in isdn_ppp_open()
  * ppp, slip: Validate VJ compression slot parameters completely

 -- Andy Whitcroft   Tue, 01 Dec 2015 21:37:13 +

** Changed in: linux (Ubuntu)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1481575

Title:
  Fix Dell laptop to internal mic/headset mic

Status in linux package in Ubuntu:
  Fix Released

Bug description:
  This bug is for tracking purposes. Please do not triage.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1481575/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1505671] Re: Missing patches for CXL dri

2015-12-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.3.0-1.10

---
linux (4.3.0-1.10) xenial; urgency=low

  [ Andy Whitcroft ]

  * [Config] make IBMVETH consistent on powerpc/ppc64el
- LP: #1521712
  * [Config] follow ibmvscsi name change
- LP: #1521712
  * [Config] move ibm disk and ethernet drivers to linux-image
- LP: #1521712
  * [Config] include ibmveth in nic-modules for ppc64el
- LP: #1521712
  * [Config] s390x -- disable abi/module checks for s390x

  [ Tim Gardner ]

  * [Config] Add spl/zfs provides to generic and powerpc64-smp
  * [Config] Add zfs to d-i fs-core-modules

  [ Upstream Kernel Changes ]

  * KVM: x86: work around infinite loop in microcode when #AC is delivered
  * KVM: svm: unconditionally intercept #DB
  * Btrfs: fix truncation of compressed and inlined extents
  * staging/dgnc: fix info leak in ioctl
  * [media] media/vivid-osd: fix info leak in ioctl
  * crypto: asymmetric_keys - remove always false comparison
  * X.509: Fix the time validation [ver #2]
  * isdn_ppp: Add checks for allocation failure in isdn_ppp_open()
  * ppp, slip: Validate VJ compression slot parameters completely

 -- Andy Whitcroft   Tue, 01 Dec 2015 21:37:13 +

** Changed in: linux (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1505671

Title:
  Missing patches for CXL dri

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Released

Bug description:
  ---Problem Description---
  cxl module patch missing
   
  Contact Information = Andrew Donnellan  
   
  ---uname output---
  14.04.3
   
  https://patchwork.ozlabs.org/patch/516142/ - powerpc/pci: export 
pcibios_free_controller()
  https://patchwork.ozlabs.org/patch/529548/ - cxl: Free virtual PHB when 
removing

  Andrew Donnellan - Sept. 10, 2015, 6:28 a.m.
  1)  Export pcibios_free_controller(), so it can be used by the cxl module to
  free virtual PHBs.

   arch/powerpc/kernel/pci-common.c | 1 +
   1 file changed, 1 insertion(+)

  2) When adding a vPHB in cxl_pci_vphb_add(), we allocate a pci_controller
  struct using pcibios_alloc_controller(). However, we don't free it in
  cxl_pci_vphb_remove(), causing a leak.

  Call pcibios_free_controller() in cxl_pci_vphb_remove() to free the vPHB
  data structure correctly.

  Signed-off-by: Daniel Axtens 
  Signed-off-by: Andrew Donnellan 

  This patch depends on "powerpc/pci: export pcibios_free_controller()"
  [0].

  [0] https://patchwork.ozlabs.org/patch/516142/
  ---
   drivers/misc/cxl/vphb.c | 2 ++
   1 file changed, 2 insertions(+)

  The target for this bug is 14.04.3 (3.19 kernel).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1505671/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1509029] Re: [Hyper-V] Crash in hot-add/remove scsi devices (smp)

2015-12-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.3.0-1.10

---
linux (4.3.0-1.10) xenial; urgency=low

  [ Andy Whitcroft ]

  * [Config] make IBMVETH consistent on powerpc/ppc64el
- LP: #1521712
  * [Config] follow ibmvscsi name change
- LP: #1521712
  * [Config] move ibm disk and ethernet drivers to linux-image
- LP: #1521712
  * [Config] include ibmveth in nic-modules for ppc64el
- LP: #1521712
  * [Config] s390x -- disable abi/module checks for s390x

  [ Tim Gardner ]

  * [Config] Add spl/zfs provides to generic and powerpc64-smp
  * [Config] Add zfs to d-i fs-core-modules

  [ Upstream Kernel Changes ]

  * KVM: x86: work around infinite loop in microcode when #AC is delivered
  * KVM: svm: unconditionally intercept #DB
  * Btrfs: fix truncation of compressed and inlined extents
  * staging/dgnc: fix info leak in ioctl
  * [media] media/vivid-osd: fix info leak in ioctl
  * crypto: asymmetric_keys - remove always false comparison
  * X.509: Fix the time validation [ver #2]
  * isdn_ppp: Add checks for allocation failure in isdn_ppp_open()
  * ppp, slip: Validate VJ compression slot parameters completely

 -- Andy Whitcroft   Tue, 01 Dec 2015 21:37:13 +

** Changed in: linux (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1509029

Title:
  [Hyper-V] Crash in hot-add/remove scsi devices (smp)

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Vivid:
  Fix Committed
Status in linux source package in Wily:
  Fix Committed
Status in linux source package in Xenial:
  Fix Released

Bug description:
  On some host errors storvsc module tries to remove sdev by scheduling a job
  which does the following:

 sdev = scsi_device_lookup(wrk->host, 0, 0, wrk->lun);
 if (sdev) {
 scsi_remove_device(sdev);
 scsi_device_put(sdev);
 }

  While this code seems correct the following crash is observed:

   general protection fault:  [#1] SMP DEBUG_PAGEALLOC
   RIP: 0010:[]  [] bdi_destroy+0x39/0x220
   ...
   [] ? _raw_spin_unlock_irq+0x2c/0x40
   [] blk_cleanup_queue+0x17b/0x270
   [] __scsi_remove_device+0x54/0xd0 [scsi_mod]
   [] scsi_remove_device+0x2b/0x40 [scsi_mod]
   [] storvsc_remove_lun+0x3d/0x60 [hv_storvsc]
   [] process_one_work+0x1b1/0x530
   ...

  The problem comes with the fact that many such jobs (for the same device)
  are being scheduled simultaneously. While scsi_remove_device() uses
  shost->scan_mutex and scsi_device_lookup() will fail for a device in
  SDEV_DEL state there is no protection against someone who did
  scsi_device_lookup() before we actually entered __scsi_remove_device(). So
  the whole scenario looks like that: two callers do simultaneous (or
  preemption happens) calls to scsi_device_lookup() ant these calls succeed
  for all of them, after that both callers try doing scsi_remove_device().
  shost->scan_mutex only serializes their calls to __scsi_remove_device()
  and we end up doing the cleanup path twice.

  Signed-off-by: Vitaly Kuznetsov 
  ---
   drivers/scsi/scsi_sysfs.c | 8 
   1 file changed, 8 insertions(+)

  diff --git a/drivers/scsi/scsi_sysfs.c b/drivers/scsi/scsi_sysfs.c
  index b89..e0d2707 100644
  --- a/drivers/scsi/scsi_sysfs.c
  +++ b/drivers/scsi/scsi_sysfs.c
  @@ -1076,6 +1076,14 @@ void __scsi_remove_device(struct scsi_device *sdev)
   {
  struct device *dev = >sdev_gendev;

  +   /*
  +* This cleanup path is not reentrant and while it is impossible
  +* to get a new reference with scsi_device_get() someone can still
  +* hold a previously acquired one.
  +*/
  +   if (sdev->sdev_state == SDEV_DEL)
  +   return;
  +
  if (sdev->is_visible) {
  if (scsi_device_set_state(sdev, SDEV_CANCEL) != 0)
  return;

  
  --
  2.4.3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1509029/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1476211] Re: kswapd takes 100% CPU although there is no swap

2015-12-04 Thread Andreas E.
This is still the case in Ubuntu 15.10.
It would really be cool if this could be fixed, because it causes data loss and 
regularly interrupts my work. I cannot imagine this same software runs on 
servers, IoT and systems that need reliability.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1476211

Title:
  kswapd takes 100% CPU although there is no swap

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  On a notebook with neither swap partition nor swap file (because of
  SSD and surplus of RAM), kswapd0 suddenly runs amok and takes 100% of
  CPU activity. When this happens, usually at most 5.5 of 8 GB RAM were
  in use, so there is no reason to swap.

  This happens so suddenly, that no user input is possible anymore, eg.
  I can barely switch to tty to kill processes that take most RAM. The
  processor becomes extremely hot and I can only turn the computer off
  and reboot. I  consider this as critical and harmful to my hardware.

  I noticed that Ubuntu installs by default with swappiness 60. Now I
  changed that to 10 because I would never encounter the case that 8GB
  are in use, but it didn't have an effect.

  Expected behavior:
  - on systems without RAM, kswapd should never attempt to swap
  - if there is not enough RAM, kernel should kill processes to free up RAM
  - no process should be able to claim so much CPU activity, that the computer 
becomes unresponsive (it should always be possible to control/stop/kill 
processes over tty)

  Actual behavior:
  - kswapd tries to swap although there is no swap space

  ProblemType: Bug
  DistroRelease: Ubuntu 15.04
  Package: linux-image-3.19.0-22-generic 3.19.0-22.22
  ProcVersionSignature: Ubuntu 3.19.0-22.22-generic 3.19.8-ckt1
  Uname: Linux 3.19.0-22-generic x86_64
  ApportVersion: 2.17.2-0ubuntu1.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  andreas2368 F pulseaudio
   /dev/snd/controlC0:  andreas2368 F pulseaudio
  CurrentDesktop: Unity
  Date: Mon Jul 20 12:49:24 2015
  EcryptfsInUse: Yes
  InstallationDate: Installed on 2015-06-06 (43 days ago)
  InstallationMedia: Ubuntu 15.04 "Vivid Vervet" - Release amd64 (20150422)
  MachineType: LENOVO 20266
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-22-generic 
root=UUID=8a0dc2f3-fcf3-4e5b-8e23-1441bd36e3dc ro noprompt persistent quiet 
splash acpi_backlight=vendor vt.handoff=7 init=/sbin/upstart
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-22-generic N/A
   linux-backports-modules-3.19.0-22-generic  N/A
   linux-firmware 1.143.1
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 10/31/2013
  dmi.bios.vendor: LENOVO
  dmi.bios.version: 76CN31WW
  dmi.board.asset.tag: No Asset Tag
  dmi.board.name: Yoga2
  dmi.board.vendor: LENOVO
  dmi.board.version: 31900058STD
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Lenovo Yoga 2 Pro
  dmi.modalias: 
dmi:bvnLENOVO:bvr76CN31WW:bd10/31/2013:svnLENOVO:pn20266:pvrLenovoYoga2Pro:rvnLENOVO:rnYoga2:rvr31900058STD:cvnLENOVO:ct10:cvrLenovoYoga2Pro:
  dmi.product.name: 20266
  dmi.product.version: Lenovo Yoga 2 Pro
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1476211/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1390223] Re: Apparmor related regression on access to unix sockets on a candidate 3.16 backport kernel

2015-12-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.3.0-1.10

---
linux (4.3.0-1.10) xenial; urgency=low

  [ Andy Whitcroft ]

  * [Config] make IBMVETH consistent on powerpc/ppc64el
- LP: #1521712
  * [Config] follow ibmvscsi name change
- LP: #1521712
  * [Config] move ibm disk and ethernet drivers to linux-image
- LP: #1521712
  * [Config] include ibmveth in nic-modules for ppc64el
- LP: #1521712
  * [Config] s390x -- disable abi/module checks for s390x

  [ Tim Gardner ]

  * [Config] Add spl/zfs provides to generic and powerpc64-smp
  * [Config] Add zfs to d-i fs-core-modules

  [ Upstream Kernel Changes ]

  * KVM: x86: work around infinite loop in microcode when #AC is delivered
  * KVM: svm: unconditionally intercept #DB
  * Btrfs: fix truncation of compressed and inlined extents
  * staging/dgnc: fix info leak in ioctl
  * [media] media/vivid-osd: fix info leak in ioctl
  * crypto: asymmetric_keys - remove always false comparison
  * X.509: Fix the time validation [ver #2]
  * isdn_ppp: Add checks for allocation failure in isdn_ppp_open()
  * ppp, slip: Validate VJ compression slot parameters completely

 -- Andy Whitcroft   Tue, 01 Dec 2015 21:37:13 +

** Changed in: linux (Ubuntu)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1390223

Title:
  Apparmor related regression on access to unix sockets on a candidate
  3.16 backport kernel

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Utopic:
  Confirmed
Status in linux source package in Vivid:
  Fix Committed

Bug description:
  I recently noticed a bunch of containers failing in a rather odd way
  when running postfix.

  The most visible example is when running mailq on an empty queue.
  Without apparmor (unconfined container) I see that the queue is empty,
  with apparmor, I get Permission denied.

  That's all running as root so the permission denied looks a tiny bit
  odd. Also, running the 3.13 kernel, I don't get any of that weirdness.

  My guess is that it has to do with the work that went into the 3.16
  kernel for socket mediation. In theory only systems that run the
  utopic apparmor (which I DO NOT) should be seeing that kind of
  behavior, but it looks like some code path isn't checking things
  properly :)

  == strace in unconfined container ==
  chdir("/var/spool/postfix") = 0
  rt_sigaction(SIGPIPE, {SIG_IGN, [PIPE], SA_RESTORER|SA_RESTART, 
0x7f8963a62c30}, {SIG_IGN, [], 0}, 8) = 0
  getuid()= 0
  socket(PF_LOCAL, SOCK_STREAM, 0)= 4
  fcntl(4, F_GETFL)   = 0x2 (flags O_RDWR)
  fcntl(4, F_SETFL, O_RDWR)   = 0
  connect(4, {sa_family=AF_LOCAL, sun_path="public/showq"}, 110) = 0
  poll([{fd=4, events=POLLIN}], 1, 360) = 1 ([{fd=4, 
revents=POLLIN|POLLHUP}])
  read(4, "Mail queue is empty\n", 4096)  = 20
  poll([{fd=4, events=POLLIN}], 1, 360) = 1 ([{fd=4, 
revents=POLLIN|POLLHUP}])
  read(4, "", 4096)   = 0
  write(1, "Mail queue is empty\n", 20Mail queue is empty
  )   = 20
  close(4)= 0
  exit_group(0)   = ?
  +++ exited with 0 +++

  == strace in confined container ==
  chdir("/var/spool/postfix") = 0
  rt_sigaction(SIGPIPE, {SIG_IGN, [PIPE], SA_RESTORER|SA_RESTART, 
0x7ffe62de4c30}, {SIG_IGN, [], 0}, 8) = 0
  getuid()= 0
  socket(PF_LOCAL, SOCK_STREAM, 0)= 4
  fcntl(4, F_GETFL)   = 0x2 (flags O_RDWR)
  fcntl(4, F_SETFL, O_RDWR)   = 0
  connect(4, {sa_family=AF_LOCAL, sun_path="public/showq"}, 110) = 0
  poll([{fd=4, events=POLLIN}], 1, 360) = 1 ([{fd=4, 
revents=POLLIN|POLLHUP}])
  read(4, 0x7ffe65b35c00, 4096)   = -1 EACCES (Permission denied)
  close(4)= 0
  write(2, "postqueue: warning: close: Permi"..., 45postqueue: warning: close: 
Permission denied
  ) = 45
  sendto(3, "<20>Nov  6 20:40:42 postfix/post"..., 78, MSG_NOSIGNAL, NULL, 0) = 
78
  exit_group(0)   = ?

  Kernel is a slightly outdated version of the kernel from the kernel team PPA:
  Linux shell01 3.16.0-23-generic #31-Ubuntu SMP Thu Oct 23 20:13:35 UTC 2014 
x86_64 x86_64 x86_64 GNU/Linux

  If you think the latest build will improve this, I can test it, but
  seeing how this is a production server, I can't just flip kernels
  every 5 minutes (I'm running 3.16 to avoid a nasty btrfs bug on 3.13).

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1390223/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : 

[Kernel-packages] [Bug 1408833] Re: broken postinst test for uvtool-libvirt

2015-12-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.3.0-1.10

---
linux (4.3.0-1.10) xenial; urgency=low

  [ Andy Whitcroft ]

  * [Config] make IBMVETH consistent on powerpc/ppc64el
- LP: #1521712
  * [Config] follow ibmvscsi name change
- LP: #1521712
  * [Config] move ibm disk and ethernet drivers to linux-image
- LP: #1521712
  * [Config] include ibmveth in nic-modules for ppc64el
- LP: #1521712
  * [Config] s390x -- disable abi/module checks for s390x

  [ Tim Gardner ]

  * [Config] Add spl/zfs provides to generic and powerpc64-smp
  * [Config] Add zfs to d-i fs-core-modules

  [ Upstream Kernel Changes ]

  * KVM: x86: work around infinite loop in microcode when #AC is delivered
  * KVM: svm: unconditionally intercept #DB
  * Btrfs: fix truncation of compressed and inlined extents
  * staging/dgnc: fix info leak in ioctl
  * [media] media/vivid-osd: fix info leak in ioctl
  * crypto: asymmetric_keys - remove always false comparison
  * X.509: Fix the time validation [ver #2]
  * isdn_ppp: Add checks for allocation failure in isdn_ppp_open()
  * ppp, slip: Validate VJ compression slot parameters completely

 -- Andy Whitcroft   Tue, 01 Dec 2015 21:37:13 +

** Changed in: linux (Ubuntu)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1408833

Title:
  broken postinst test for uvtool-libvirt

Status in AppArmor:
  Confirmed
Status in openstack-installer:
  Confirmed
Status in uvtool:
  Invalid
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Utopic:
  Fix Released

Bug description:
  Installing uvtool-libvirt *inside an lxc container* on utopic fails
  due to a test in the postinst script.

  It uses socat on the libvirt socket, which fails, despite libvirt
  being installed correctly.

  ubuntu@uoi-bootstrap:~$ sudo apt-get install -f
  Reading package lists... Done
  Building dependency tree   
  Reading state information... Done
  The following packages were automatically installed and are no longer 
required:
libfreetype6 os-prober
  Use 'apt-get autoremove' to remove them.
  0 upgraded, 0 newly installed, 0 to remove and 19 not upgraded.
  1 not fully installed or removed.
  After this operation, 0 B of additional disk space will be used.
  Setting up uvtool-libvirt (0~bzr92-0ubuntu2) ...
  2015/01/08 13:01:34 socat[10184] E read(3, 0x13b2a30, 8192): Permission denied
  libvirtd does not appear to be listening on "/var/run/libvirt/libvirt-sock".
  On Ubuntu, libvirtd is managed with the "libvirt-bin" upstart job.
  Repair libvirtd, then reconfigure uvtool-libvirt with:
  sudo apt-get -f install
  dpkg: error processing package uvtool-libvirt (--configure):
   subprocess installed post-installation script returned error exit status 1
  Errors were encountered while processing:
   uvtool-libvirt
  E: Sub-process /usr/bin/dpkg returned an error code (1)

  
  ubuntu@uoi-bootstrap:~$ ps -ef | grep libvirt
  libvirt+  9556 1  0 09:52 ?00:00:00 /usr/sbin/dnsmasq 
--conf-file=/var/lib/libvirt/dnsmasq/default.conf 
--dhcp-script=/usr/lib/libvirt/libvirt_leaseshelper
  root  9557  9556  0 09:52 ?00:00:00 /usr/sbin/dnsmasq 
--conf-file=/var/lib/libvirt/dnsmasq/default.conf 
--dhcp-script=/usr/lib/libvirt/libvirt_leaseshelper
  root  9854 1  0 10:24 ?00:00:00 /usr/sbin/libvirtd -d
  ubuntu   10155 10120  0 12:56 pts/000:00:00 grep libvirt

  ubuntu@uoi-bootstrap:~$ groups
  ubuntu adm dialout cdrom floppy sudo audio dip video plugdev netdev libvirtd

  
  ubuntu@uoi-bootstrap:~$ virsh list
   IdName   State
  

  for a little more context, there are notes here:
  https://gist.github.com/mikemccracken/53c665e6094db21efc03

To manage notifications about this bug go to:
https://bugs.launchpad.net/apparmor/+bug/1408833/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1513583] Re: Add CAPI flash driver (cxlflash) patches to 15.10 SRU stream

2015-12-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.3.0-1.10

---
linux (4.3.0-1.10) xenial; urgency=low

  [ Andy Whitcroft ]

  * [Config] make IBMVETH consistent on powerpc/ppc64el
- LP: #1521712
  * [Config] follow ibmvscsi name change
- LP: #1521712
  * [Config] move ibm disk and ethernet drivers to linux-image
- LP: #1521712
  * [Config] include ibmveth in nic-modules for ppc64el
- LP: #1521712
  * [Config] s390x -- disable abi/module checks for s390x

  [ Tim Gardner ]

  * [Config] Add spl/zfs provides to generic and powerpc64-smp
  * [Config] Add zfs to d-i fs-core-modules

  [ Upstream Kernel Changes ]

  * KVM: x86: work around infinite loop in microcode when #AC is delivered
  * KVM: svm: unconditionally intercept #DB
  * Btrfs: fix truncation of compressed and inlined extents
  * staging/dgnc: fix info leak in ioctl
  * [media] media/vivid-osd: fix info leak in ioctl
  * crypto: asymmetric_keys - remove always false comparison
  * X.509: Fix the time validation [ver #2]
  * isdn_ppp: Add checks for allocation failure in isdn_ppp_open()
  * ppp, slip: Validate VJ compression slot parameters completely

 -- Andy Whitcroft   Tue, 01 Dec 2015 21:37:13 +

** Changed in: linux (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1513583

Title:
  Add CAPI flash driver (cxlflash) patches to 15.10 SRU stream

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Wily:
  In Progress
Status in linux source package in Xenial:
  Fix Released

Bug description:
  CAPI flash driver fixes.
   
  Contact Information = Matthew Ochs mro...@linux.vnet.ibm.com 
   
  ---uname output---
  n/a
   
  Machine Type = p8 
   
  ---Debugger---
  A debugger is not configured
   
  Stack trace output:
   no
   
  Oops output:
   no
   
  System Dump Info:
The system is not configured to capture a system dump.
   
  *Additional Instructions for Matthew Ochs mro...@linux.vnet.ibm.com: 
  -Attach sysctl -a output output to the bug.

  == Comment: #2 - Matthew R. Ochs  - 2015-11-04
  16:14:17 ==

  
  == Comment: #3 - Matthew R. Ochs  - 2015-11-04 16:15:19 ==

  
  == Comment: #4 - Matthew R. Ochs  - 2015-11-04 16:17:40 ==
  Patch 1 sends a link reset for port1 following a login timeout error. This 
same fix was delivered previously for port0.

  Patch 2 provides feedback to applications so that they may know when
  it is acceptable to perform an I/O retry for a virtual LUN.

  == Comment: #5 - Matthew R. Ochs  - 2015-11-04 16:25:54 ==
  These patches are not yet upstreamed but will be as part of the 4.4 'rc' 
phase.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1513583/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1521712] Re: power: commonise configs IBMVETH/IBMVSCSI and ensure both are in linux-image and udebs

2015-12-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.3.0-1.10

---
linux (4.3.0-1.10) xenial; urgency=low

  [ Andy Whitcroft ]

  * [Config] make IBMVETH consistent on powerpc/ppc64el
- LP: #1521712
  * [Config] follow ibmvscsi name change
- LP: #1521712
  * [Config] move ibm disk and ethernet drivers to linux-image
- LP: #1521712
  * [Config] include ibmveth in nic-modules for ppc64el
- LP: #1521712
  * [Config] s390x -- disable abi/module checks for s390x

  [ Tim Gardner ]

  * [Config] Add spl/zfs provides to generic and powerpc64-smp
  * [Config] Add zfs to d-i fs-core-modules

  [ Upstream Kernel Changes ]

  * KVM: x86: work around infinite loop in microcode when #AC is delivered
  * KVM: svm: unconditionally intercept #DB
  * Btrfs: fix truncation of compressed and inlined extents
  * staging/dgnc: fix info leak in ioctl
  * [media] media/vivid-osd: fix info leak in ioctl
  * crypto: asymmetric_keys - remove always false comparison
  * X.509: Fix the time validation [ver #2]
  * isdn_ppp: Add checks for allocation failure in isdn_ppp_open()
  * ppp, slip: Validate VJ compression slot parameters completely

 -- Andy Whitcroft   Tue, 01 Dec 2015 21:37:13 +

** Changed in: linux (Ubuntu)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1521712

Title:
  power: commonise configs IBMVETH/IBMVSCSI and ensure both are in
  linux-image and udebs

Status in linux package in Ubuntu:
  Fix Released

Bug description:
  In Bug #1515872 we pulled IBMVSCSI out as a module.  Ensure this is
  commonised to powerpc, and ensure that this and ibmveth are both in
  linux-image and both packaged in udebs.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1521712/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


  1   2   >