[Kernel-packages] [Bug 1521445] Re: linux-ti-omap4: 3.2.0-1475.97 -proposed tracker
USN needed for CVE-2015-7872 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-7872 ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1521445 Title: linux-ti-omap4: 3.2.0-1475.97 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: New Bug description: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 01. December 2015 03:01 UTC kernel-stable-master-bug:1521325 kernel-stable-Certification-testing-end:Wednesday, 02. December 2015 16:00 UTC kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 20:00 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 20:00 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:00 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Thursday, 03. December 2015 14:00 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 14:01 UTC kernel-stable-Regression-testing-start:Thursday, 03. December 2015 14:01 UTC proposed-announcement-sent:True kernel-stable-Verification-testing-start:Thursday, 03. December 2015 14:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521445/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1521445] Re: linux-ti-omap4: 3.2.0-1475.97 -proposed tracker
** Description changed: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 01. December 2015 03:01 UTC kernel-stable-master-bug:1521325 kernel-stable-Certification-testing-end:Wednesday, 02. December 2015 16:00 UTC kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 20:00 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 20:00 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:00 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Thursday, 03. December 2015 14:00 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 14:01 UTC kernel-stable-Regression-testing-start:Thursday, 03. December 2015 14:01 UTC proposed-announcement-sent:True kernel-stable-Verification-testing-start:Thursday, 03. December 2015 14:00 UTC + kernel-stable-Security-signoff-end:Friday, 04. December 2015 09:00 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1521445 Title: linux-ti-omap4: 3.2.0-1475.97 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: New Bug description: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 01. December 2015 03:01 UTC kernel-stable-master-bug:1521325 kernel-stable-Certification-testing-end:Wednesday, 02. December 2015 16:00 UTC kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 20:00 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 20:00 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:00 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Thursday, 03. December 2015 14:00 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 14:01 UTC kernel-stable-Regression-testing-start:Thursday, 03. December 2015 14:01 UTC proposed-announcement-sent:True kernel-stable-Verification-testing-start:Thursday, 03. December 2015 14:00 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 09:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521445/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1220199] Re: CVE-2013-2894
** Also affects: linux (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: Undecided Status: Won't Fix ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Undecided Status: Won't Fix ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-mako (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-manta (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-flo (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-wily (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Fix Committed ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => Low -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1220199 Title: CVE-2013-2894 Status in linux package in Ubuntu: Invalid Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-flo package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-goldfish package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: Won't Fix Status in linux-lts-backport-natty package in Ubuntu: Won't Fix Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-wily package in Ubuntu: Invalid Status in linux-mako package in Ubuntu: Invalid Status in linux-manta package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-raspi2 package in Ubuntu: Fix Committed Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-lts-backport-maverick source package in Lucid: Won't Fix Status in linux-lts-backport-natty source package in Lucid: Won't Fix Status in linux source package in Precise: Invalid Status in linux-armadaxp source package in Precise: Invalid Status in linux-ec2 source package in Precise: Invalid Status in linux-flo source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-goldfish source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: Won't Fix Status in linux-lts-backport-natty source package in Precise: Won't Fix Status in linux-lts-quantal source package in Precise: Invalid Status in linux-lts-raring source package in Precise: Fix Released Status in linux-lts-saucy source package in Precise: Invalid Status in linux-lts-trusty source package in Precise: Invalid Status in linux-lts-utopic source package in Precise: Invalid Status in linux-lts-vivid source package in Precise: Invalid Status in linux-lts-wily source package in Precise: Invalid Status in linux-mako source package in Precise: Invalid Status in linux-manta source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: Invalid Status in linux-raspi2 source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Quantal: Won't Fix Status in linux-lts-backport-natty source package in Quantal:
[Kernel-packages] [Bug 1470250] Re: [Hyper-V] Ubuntu 14.04.2 LTS Generation 2 SCSI Errors on VSS Based Backups
@decui Correct, ceteris paribus, the only changes were more of the same (disk space) and some package changes through apt-get update (Ubuntu 14.04 LTS). My guess is that the downgrade is related to one of the two. But I agree, let's postpone this one, until the read-only bug is fixed. Afterwards, I will upgrade my production kernels to the latest stable 4.x kernel with the patch applied (I just read that the HWE kernel for 14.04 is going to 4.x in January anyhow). Then the performance might be different after all. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1470250 Title: [Hyper-V] Ubuntu 14.04.2 LTS Generation 2 SCSI Errors on VSS Based Backups Status in linux package in Ubuntu: In Progress Status in linux source package in Trusty: In Progress Status in linux source package in Utopic: In Progress Status in linux source package in Vivid: In Progress Status in linux source package in Wily: In Progress Bug description: Customers have reported running various versions of Ubuntu 14.04.2 LTS on Generation 2 Hyper-V Hosts.On a random Basis, the file system will be mounted Read-Only due to a "disk error" (which really isn't the case here).As a result, they must reboot the Ubuntu guest to get the file system to mount RW again. The Error seen are the following: Apr 30 00:02:01 balticnetworkstraining kernel: [640153.968142] storvsc: Sense Key : Unit Attention [current] Apr 30 00:02:01 balticnetworkstraining kernel: [640153.968145] storvsc: Add. Sense: Changed operating definition Apr 30 00:02:01 balticnetworkstraining kernel: [640153.968161] sd 0:0:0:0: Warning! Received an indication that the operating parameters on this target have changed. The Linux SCSI layer does not automatically adjust these parameters. Apr 30 01:23:26 balticnetworkstraining kernel: [645039.584164] hv_storvsc vmbus_0_4: cmd 0x2a scsi status 0x2 srb status 0x82 Apr 30 01:23:26 balticnetworkstraining kernel: [645039.584178] hv_storvsc vmbus_0_4: stor pkt 88006eb6c700 autosense data valid - len 18 Apr 30 01:23:26 balticnetworkstraining kernel: [645039.584180] storvsc: Sense Key : Unit Attention [current] Apr 30 01:23:26 balticnetworkstraining kernel: [645039.584183] storvsc: Add. Sense: Changed operating definition Apr 30 01:23:26 balticnetworkstraining kernel: [645039.584198] sd 0:0:0:0: Warning! Received an indication that the operating parameters on this target have changed. The Linux SCSI layer does not automatically adjust these parameters. This relates to the VSS "Windows Server Backup" process that kicks off at midnight on the host and finishes an hour and half later. Yes, we do have hv_vss_daemon and hv_kvp_daemon running for the correct kernel version we have. We're currently running kernel version 3.13.0-49-generic #83 on one system and 3.16.0-34-generic #37 on the other. -- We see the same errors on both. As a result, we've been hesitant to drop any more ubuntu guests on our 2012R2 hyper-v system because of this. We can stop the backup process and all is good, but we need nightly backups to image all of our VM's. All the windows guests have no issues of course. We also have some CentOS based guests running without issues from what we've seen. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1470250/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1242321] Re: USB 3.0 Harddrive not recognised
Confirmed on ubuntu 15.10. I tried lsusb -v, Kirils workaround, the usb power management mode, nothing works. However if I boot with the disk plugged, it's ok. uname -as Linux odin 4.2.0-19-generic #23-Ubuntu SMP Wed Nov 11 11:39:30 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux lsusb Bus 004 Device 004: ID 0a5c:5800 Broadcom Corp. BCM5880 Secure Applications Processor Bus 004 Device 003: ID 413c:8143 Dell Computer Corp. Bus 004 Device 002: ID 8087:8000 Intel Corp. Bus 004 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 003 Device 003: ID 0c45:64d0 Microdia Bus 003 Device 002: ID 8087:8008 Intel Corp. Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 001 Device 002: ID 046d:c00f Logitech, Inc. MouseMan Traveler/Mobile Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1242321 Title: USB 3.0 Harddrive not recognised Status in linux package in Ubuntu: Confirmed Bug description: Ubuntu is not recognising any device plugged into any USB 3.0 ports. Sometimes Ubuntu will freeze for a few seconds when you plug something into a USB 3.0 port; when Ubuntu comes out of the freeze, the device is still NOT recognised. No problems with USB 2.0 ports and devices. The USB 3.0 on this computer only works in Windows 7 (I'm dual booting Ubuntu 13.10 and Windows 7, both are 64-bit). To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1242321/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522094] ProcCpuinfo.txt
apport information ** Attachment added: "ProcCpuinfo.txt" https://bugs.launchpad.net/bugs/1522094/+attachment/4529553/+files/ProcCpuinfo.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522094 Title: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts- vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() Status in linux package in Ubuntu: Confirmed Bug description: When I connect a monitor the VGA port on the laptop - this is found in dmesg, and some of the kernel modules linked in become unstable [ btrfs for instance, if it's in use]. [2.962400] [ cut here ] [2.962424] WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() [2.962425] SPLL already enabled [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp pps_core pata_acpi wmi sdhci_acpi video sdhci [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic #42~14.04.1-Ubuntu [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 05/19/2015 [2.962439] c02fd7f8 880220d23ab8 817af92b 3a7a [2.962440] 880220d23b08 880220d23af8 81074e0a 0046 [2.962442] 880035fb 88003615eb60 880035f8f400 88003615e800 [2.962444] Call Trace: [2.962449] [] dump_stack+0x45/0x57 [2.962452] [] warn_slowpath_common+0x8a/0xc0 [2.962453] [] warn_slowpath_fmt+0x46/0x50 [2.962464] [] hsw_crt_pre_enable+0x7f/0x90 [i915] [2.962475] [] haswell_crtc_enable+0x3fc/0xaf0 [i915] [2.962485] [] __intel_set_mode+0x872/0xc60 [i915] [2.962495] [] intel_crtc_set_config+0x9e2/0xf60 [i915] [2.962506] [] drm_mode_set_config_internal+0x6f/0x110 [drm] [2.962511] [] restore_fbdev_mode+0xc8/0xf0 [drm_kms_helper] [2.962515] [] drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper] [2.962525] [] intel_fbdev_restore_mode+0x1e/0x50 [i915] [2.962536] [] i915_driver_lastclose+0xe/0x20 [i915] [2.962541] [] drm_lastclose+0x2e/0x130 [drm] [2.962546] [] drm_release+0x338/0x540 [drm] [2.962549] [] __fput+0xe7/0x220 [2.962551] [] fput+0xe/0x10 [2.962553] [] task_work_run+0xac/0xd0 [2.962556] [] do_notify_resume+0x97/0xb0 [2.962558] [] int_signal+0x12/0x17 [2.962559] ---[ end trace b6b778d930eaeda7 ]--- This is the lts-vivid kernel. downgrading to the lts-utopic kernel fixes the issue. I tried the wily-lts, same issue. I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel- ppa : linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works fine! :) --- ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jcat 2559 F pulseaudio /dev/snd/controlC1: jcat 2559 F pulseaudio CurrentDesktop: GNOME DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f InstallationDate: Installed on 2015-11-25 (8 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) MachineType: Dell Inc. Latitude E6540 NonfreeKernelModules: fglrx Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-39-generic N/A linux-backports-modules-3.19.0-39-generic N/A linux-firmware 1.127.19 Tags: trusty Uname: Linux 3.19.0-39-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 05/19/2015 dmi.bios.vendor: Dell Inc. dmi.bios.version: A15 dmi.board.name: 0PXPYJ dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6540 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to :
[Kernel-packages] [Bug 1522094] CurrentDmesg.txt
apport information ** Attachment added: "CurrentDmesg.txt" https://bugs.launchpad.net/bugs/1522094/+attachment/4529549/+files/CurrentDmesg.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522094 Title: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts- vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() Status in linux package in Ubuntu: Confirmed Bug description: When I connect a monitor the VGA port on the laptop - this is found in dmesg, and some of the kernel modules linked in become unstable [ btrfs for instance, if it's in use]. [2.962400] [ cut here ] [2.962424] WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() [2.962425] SPLL already enabled [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp pps_core pata_acpi wmi sdhci_acpi video sdhci [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic #42~14.04.1-Ubuntu [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 05/19/2015 [2.962439] c02fd7f8 880220d23ab8 817af92b 3a7a [2.962440] 880220d23b08 880220d23af8 81074e0a 0046 [2.962442] 880035fb 88003615eb60 880035f8f400 88003615e800 [2.962444] Call Trace: [2.962449] [] dump_stack+0x45/0x57 [2.962452] [] warn_slowpath_common+0x8a/0xc0 [2.962453] [] warn_slowpath_fmt+0x46/0x50 [2.962464] [] hsw_crt_pre_enable+0x7f/0x90 [i915] [2.962475] [] haswell_crtc_enable+0x3fc/0xaf0 [i915] [2.962485] [] __intel_set_mode+0x872/0xc60 [i915] [2.962495] [] intel_crtc_set_config+0x9e2/0xf60 [i915] [2.962506] [] drm_mode_set_config_internal+0x6f/0x110 [drm] [2.962511] [] restore_fbdev_mode+0xc8/0xf0 [drm_kms_helper] [2.962515] [] drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper] [2.962525] [] intel_fbdev_restore_mode+0x1e/0x50 [i915] [2.962536] [] i915_driver_lastclose+0xe/0x20 [i915] [2.962541] [] drm_lastclose+0x2e/0x130 [drm] [2.962546] [] drm_release+0x338/0x540 [drm] [2.962549] [] __fput+0xe7/0x220 [2.962551] [] fput+0xe/0x10 [2.962553] [] task_work_run+0xac/0xd0 [2.962556] [] do_notify_resume+0x97/0xb0 [2.962558] [] int_signal+0x12/0x17 [2.962559] ---[ end trace b6b778d930eaeda7 ]--- This is the lts-vivid kernel. downgrading to the lts-utopic kernel fixes the issue. I tried the wily-lts, same issue. I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel- ppa : linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works fine! :) --- ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jcat 2559 F pulseaudio /dev/snd/controlC1: jcat 2559 F pulseaudio CurrentDesktop: GNOME DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f InstallationDate: Installed on 2015-11-25 (8 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) MachineType: Dell Inc. Latitude E6540 NonfreeKernelModules: fglrx Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-39-generic N/A linux-backports-modules-3.19.0-39-generic N/A linux-firmware 1.127.19 Tags: trusty Uname: Linux 3.19.0-39-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 05/19/2015 dmi.bios.vendor: Dell Inc. dmi.bios.version: A15 dmi.board.name: 0PXPYJ dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6540 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to :
[Kernel-packages] [Bug 1522094] ProcInterrupts.txt
apport information ** Attachment added: "ProcInterrupts.txt" https://bugs.launchpad.net/bugs/1522094/+attachment/4529555/+files/ProcInterrupts.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522094 Title: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts- vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() Status in linux package in Ubuntu: Confirmed Bug description: When I connect a monitor the VGA port on the laptop - this is found in dmesg, and some of the kernel modules linked in become unstable [ btrfs for instance, if it's in use]. [2.962400] [ cut here ] [2.962424] WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() [2.962425] SPLL already enabled [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp pps_core pata_acpi wmi sdhci_acpi video sdhci [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic #42~14.04.1-Ubuntu [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 05/19/2015 [2.962439] c02fd7f8 880220d23ab8 817af92b 3a7a [2.962440] 880220d23b08 880220d23af8 81074e0a 0046 [2.962442] 880035fb 88003615eb60 880035f8f400 88003615e800 [2.962444] Call Trace: [2.962449] [] dump_stack+0x45/0x57 [2.962452] [] warn_slowpath_common+0x8a/0xc0 [2.962453] [] warn_slowpath_fmt+0x46/0x50 [2.962464] [] hsw_crt_pre_enable+0x7f/0x90 [i915] [2.962475] [] haswell_crtc_enable+0x3fc/0xaf0 [i915] [2.962485] [] __intel_set_mode+0x872/0xc60 [i915] [2.962495] [] intel_crtc_set_config+0x9e2/0xf60 [i915] [2.962506] [] drm_mode_set_config_internal+0x6f/0x110 [drm] [2.962511] [] restore_fbdev_mode+0xc8/0xf0 [drm_kms_helper] [2.962515] [] drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper] [2.962525] [] intel_fbdev_restore_mode+0x1e/0x50 [i915] [2.962536] [] i915_driver_lastclose+0xe/0x20 [i915] [2.962541] [] drm_lastclose+0x2e/0x130 [drm] [2.962546] [] drm_release+0x338/0x540 [drm] [2.962549] [] __fput+0xe7/0x220 [2.962551] [] fput+0xe/0x10 [2.962553] [] task_work_run+0xac/0xd0 [2.962556] [] do_notify_resume+0x97/0xb0 [2.962558] [] int_signal+0x12/0x17 [2.962559] ---[ end trace b6b778d930eaeda7 ]--- This is the lts-vivid kernel. downgrading to the lts-utopic kernel fixes the issue. I tried the wily-lts, same issue. I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel- ppa : linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works fine! :) --- ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jcat 2559 F pulseaudio /dev/snd/controlC1: jcat 2559 F pulseaudio CurrentDesktop: GNOME DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f InstallationDate: Installed on 2015-11-25 (8 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) MachineType: Dell Inc. Latitude E6540 NonfreeKernelModules: fglrx Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-39-generic N/A linux-backports-modules-3.19.0-39-generic N/A linux-firmware 1.127.19 Tags: trusty Uname: Linux 3.19.0-39-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 05/19/2015 dmi.bios.vendor: Dell Inc. dmi.bios.version: A15 dmi.board.name: 0PXPYJ dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6540 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to :
[Kernel-packages] [Bug 1522094] Lspci.txt
apport information ** Attachment added: "Lspci.txt" https://bugs.launchpad.net/bugs/1522094/+attachment/4529551/+files/Lspci.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522094 Title: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts- vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() Status in linux package in Ubuntu: Confirmed Bug description: When I connect a monitor the VGA port on the laptop - this is found in dmesg, and some of the kernel modules linked in become unstable [ btrfs for instance, if it's in use]. [2.962400] [ cut here ] [2.962424] WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() [2.962425] SPLL already enabled [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp pps_core pata_acpi wmi sdhci_acpi video sdhci [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic #42~14.04.1-Ubuntu [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 05/19/2015 [2.962439] c02fd7f8 880220d23ab8 817af92b 3a7a [2.962440] 880220d23b08 880220d23af8 81074e0a 0046 [2.962442] 880035fb 88003615eb60 880035f8f400 88003615e800 [2.962444] Call Trace: [2.962449] [] dump_stack+0x45/0x57 [2.962452] [] warn_slowpath_common+0x8a/0xc0 [2.962453] [] warn_slowpath_fmt+0x46/0x50 [2.962464] [] hsw_crt_pre_enable+0x7f/0x90 [i915] [2.962475] [] haswell_crtc_enable+0x3fc/0xaf0 [i915] [2.962485] [] __intel_set_mode+0x872/0xc60 [i915] [2.962495] [] intel_crtc_set_config+0x9e2/0xf60 [i915] [2.962506] [] drm_mode_set_config_internal+0x6f/0x110 [drm] [2.962511] [] restore_fbdev_mode+0xc8/0xf0 [drm_kms_helper] [2.962515] [] drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper] [2.962525] [] intel_fbdev_restore_mode+0x1e/0x50 [i915] [2.962536] [] i915_driver_lastclose+0xe/0x20 [i915] [2.962541] [] drm_lastclose+0x2e/0x130 [drm] [2.962546] [] drm_release+0x338/0x540 [drm] [2.962549] [] __fput+0xe7/0x220 [2.962551] [] fput+0xe/0x10 [2.962553] [] task_work_run+0xac/0xd0 [2.962556] [] do_notify_resume+0x97/0xb0 [2.962558] [] int_signal+0x12/0x17 [2.962559] ---[ end trace b6b778d930eaeda7 ]--- This is the lts-vivid kernel. downgrading to the lts-utopic kernel fixes the issue. I tried the wily-lts, same issue. I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel- ppa : linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works fine! :) --- ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jcat 2559 F pulseaudio /dev/snd/controlC1: jcat 2559 F pulseaudio CurrentDesktop: GNOME DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f InstallationDate: Installed on 2015-11-25 (8 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) MachineType: Dell Inc. Latitude E6540 NonfreeKernelModules: fglrx Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-39-generic N/A linux-backports-modules-3.19.0-39-generic N/A linux-firmware 1.127.19 Tags: trusty Uname: Linux 3.19.0-39-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 05/19/2015 dmi.bios.vendor: Dell Inc. dmi.bios.version: A15 dmi.board.name: 0PXPYJ dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6540 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to :
[Kernel-packages] [Bug 1522094] Re: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]()
apport information ** Tags added: apport-collected trusty ** Description changed: When I connect a monitor the VGA port on the laptop - this is found in dmesg, and some of the kernel modules linked in become unstable [ btrfs for instance, if it's in use]. [2.962400] [ cut here ] [2.962424] WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() [2.962425] SPLL already enabled [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp pps_core pata_acpi wmi sdhci_acpi video sdhci [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic #42~14.04.1-Ubuntu [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 05/19/2015 [2.962439] c02fd7f8 880220d23ab8 817af92b 3a7a [2.962440] 880220d23b08 880220d23af8 81074e0a 0046 [2.962442] 880035fb 88003615eb60 880035f8f400 88003615e800 [2.962444] Call Trace: [2.962449] [] dump_stack+0x45/0x57 [2.962452] [] warn_slowpath_common+0x8a/0xc0 [2.962453] [] warn_slowpath_fmt+0x46/0x50 [2.962464] [] hsw_crt_pre_enable+0x7f/0x90 [i915] [2.962475] [] haswell_crtc_enable+0x3fc/0xaf0 [i915] [2.962485] [] __intel_set_mode+0x872/0xc60 [i915] [2.962495] [] intel_crtc_set_config+0x9e2/0xf60 [i915] [2.962506] [] drm_mode_set_config_internal+0x6f/0x110 [drm] [2.962511] [] restore_fbdev_mode+0xc8/0xf0 [drm_kms_helper] [2.962515] [] drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper] [2.962525] [] intel_fbdev_restore_mode+0x1e/0x50 [i915] [2.962536] [] i915_driver_lastclose+0xe/0x20 [i915] [2.962541] [] drm_lastclose+0x2e/0x130 [drm] [2.962546] [] drm_release+0x338/0x540 [drm] [2.962549] [] __fput+0xe7/0x220 [2.962551] [] fput+0xe/0x10 [2.962553] [] task_work_run+0xac/0xd0 [2.962556] [] do_notify_resume+0x97/0xb0 [2.962558] [] int_signal+0x12/0x17 [2.962559] ---[ end trace b6b778d930eaeda7 ]--- This is the lts-vivid kernel. downgrading to the lts-utopic kernel fixes the issue. I tried the wily-lts, same issue. I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel- ppa : linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken - linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works - fine! :) + linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works fine! :) + --- + ApportVersion: 2.14.1-0ubuntu3.19 + Architecture: amd64 + AudioDevicesInUse: + USERPID ACCESS COMMAND + /dev/snd/controlC0: jcat 2559 F pulseaudio + /dev/snd/controlC1: jcat 2559 F pulseaudio + CurrentDesktop: GNOME + DistroRelease: Ubuntu 14.04 + HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f + InstallationDate: Installed on 2015-11-25 (8 days ago) + InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) + MachineType: Dell Inc. Latitude E6540 + NonfreeKernelModules: fglrx + Package: linux (not installed) + ProcFB: 0 inteldrmfb + ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7 + ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9 + RelatedPackageVersions: + linux-restricted-modules-3.19.0-39-generic N/A + linux-backports-modules-3.19.0-39-generic N/A + linux-firmware 1.127.19 + Tags: trusty + Uname: Linux 3.19.0-39-generic x86_64 + UpgradeStatus: No upgrade log present (probably fresh install) + UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo + _MarkForUpload: True + dmi.bios.date: 05/19/2015 + dmi.bios.vendor: Dell Inc. + dmi.bios.version: A15 + dmi.board.name: 0PXPYJ + dmi.board.vendor: Dell Inc. + dmi.board.version: A00 + dmi.chassis.type: 9 + dmi.chassis.vendor: Dell Inc. + dmi.modalias: dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr: + dmi.product.name: Latitude E6540 + dmi.product.version: 01 + dmi.sys.vendor: Dell Inc. ** Attachment added: "AlsaInfo.txt" https://bugs.launchpad.net/bugs/1522094/+attachment/4529546/+files/AlsaInfo.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522094 Title: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts- vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() Status in linux package in Ubuntu: Confirmed Bug description: When I connect a monitor the VGA port on the
[Kernel-packages] [Bug 1522094] Lsusb.txt
apport information ** Attachment added: "Lsusb.txt" https://bugs.launchpad.net/bugs/1522094/+attachment/4529552/+files/Lsusb.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522094 Title: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts- vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() Status in linux package in Ubuntu: Confirmed Bug description: When I connect a monitor the VGA port on the laptop - this is found in dmesg, and some of the kernel modules linked in become unstable [ btrfs for instance, if it's in use]. [2.962400] [ cut here ] [2.962424] WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() [2.962425] SPLL already enabled [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp pps_core pata_acpi wmi sdhci_acpi video sdhci [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic #42~14.04.1-Ubuntu [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 05/19/2015 [2.962439] c02fd7f8 880220d23ab8 817af92b 3a7a [2.962440] 880220d23b08 880220d23af8 81074e0a 0046 [2.962442] 880035fb 88003615eb60 880035f8f400 88003615e800 [2.962444] Call Trace: [2.962449] [] dump_stack+0x45/0x57 [2.962452] [] warn_slowpath_common+0x8a/0xc0 [2.962453] [] warn_slowpath_fmt+0x46/0x50 [2.962464] [] hsw_crt_pre_enable+0x7f/0x90 [i915] [2.962475] [] haswell_crtc_enable+0x3fc/0xaf0 [i915] [2.962485] [] __intel_set_mode+0x872/0xc60 [i915] [2.962495] [] intel_crtc_set_config+0x9e2/0xf60 [i915] [2.962506] [] drm_mode_set_config_internal+0x6f/0x110 [drm] [2.962511] [] restore_fbdev_mode+0xc8/0xf0 [drm_kms_helper] [2.962515] [] drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper] [2.962525] [] intel_fbdev_restore_mode+0x1e/0x50 [i915] [2.962536] [] i915_driver_lastclose+0xe/0x20 [i915] [2.962541] [] drm_lastclose+0x2e/0x130 [drm] [2.962546] [] drm_release+0x338/0x540 [drm] [2.962549] [] __fput+0xe7/0x220 [2.962551] [] fput+0xe/0x10 [2.962553] [] task_work_run+0xac/0xd0 [2.962556] [] do_notify_resume+0x97/0xb0 [2.962558] [] int_signal+0x12/0x17 [2.962559] ---[ end trace b6b778d930eaeda7 ]--- This is the lts-vivid kernel. downgrading to the lts-utopic kernel fixes the issue. I tried the wily-lts, same issue. I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel- ppa : linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works fine! :) --- ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jcat 2559 F pulseaudio /dev/snd/controlC1: jcat 2559 F pulseaudio CurrentDesktop: GNOME DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f InstallationDate: Installed on 2015-11-25 (8 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) MachineType: Dell Inc. Latitude E6540 NonfreeKernelModules: fglrx Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-39-generic N/A linux-backports-modules-3.19.0-39-generic N/A linux-firmware 1.127.19 Tags: trusty Uname: Linux 3.19.0-39-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 05/19/2015 dmi.bios.vendor: Dell Inc. dmi.bios.version: A15 dmi.board.name: 0PXPYJ dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6540 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to :
[Kernel-packages] [Bug 1522094] IwConfig.txt
apport information ** Attachment added: "IwConfig.txt" https://bugs.launchpad.net/bugs/1522094/+attachment/4529550/+files/IwConfig.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522094 Title: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts- vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() Status in linux package in Ubuntu: Confirmed Bug description: When I connect a monitor the VGA port on the laptop - this is found in dmesg, and some of the kernel modules linked in become unstable [ btrfs for instance, if it's in use]. [2.962400] [ cut here ] [2.962424] WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() [2.962425] SPLL already enabled [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp pps_core pata_acpi wmi sdhci_acpi video sdhci [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic #42~14.04.1-Ubuntu [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 05/19/2015 [2.962439] c02fd7f8 880220d23ab8 817af92b 3a7a [2.962440] 880220d23b08 880220d23af8 81074e0a 0046 [2.962442] 880035fb 88003615eb60 880035f8f400 88003615e800 [2.962444] Call Trace: [2.962449] [] dump_stack+0x45/0x57 [2.962452] [] warn_slowpath_common+0x8a/0xc0 [2.962453] [] warn_slowpath_fmt+0x46/0x50 [2.962464] [] hsw_crt_pre_enable+0x7f/0x90 [i915] [2.962475] [] haswell_crtc_enable+0x3fc/0xaf0 [i915] [2.962485] [] __intel_set_mode+0x872/0xc60 [i915] [2.962495] [] intel_crtc_set_config+0x9e2/0xf60 [i915] [2.962506] [] drm_mode_set_config_internal+0x6f/0x110 [drm] [2.962511] [] restore_fbdev_mode+0xc8/0xf0 [drm_kms_helper] [2.962515] [] drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper] [2.962525] [] intel_fbdev_restore_mode+0x1e/0x50 [i915] [2.962536] [] i915_driver_lastclose+0xe/0x20 [i915] [2.962541] [] drm_lastclose+0x2e/0x130 [drm] [2.962546] [] drm_release+0x338/0x540 [drm] [2.962549] [] __fput+0xe7/0x220 [2.962551] [] fput+0xe/0x10 [2.962553] [] task_work_run+0xac/0xd0 [2.962556] [] do_notify_resume+0x97/0xb0 [2.962558] [] int_signal+0x12/0x17 [2.962559] ---[ end trace b6b778d930eaeda7 ]--- This is the lts-vivid kernel. downgrading to the lts-utopic kernel fixes the issue. I tried the wily-lts, same issue. I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel- ppa : linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works fine! :) --- ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jcat 2559 F pulseaudio /dev/snd/controlC1: jcat 2559 F pulseaudio CurrentDesktop: GNOME DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f InstallationDate: Installed on 2015-11-25 (8 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) MachineType: Dell Inc. Latitude E6540 NonfreeKernelModules: fglrx Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-39-generic N/A linux-backports-modules-3.19.0-39-generic N/A linux-firmware 1.127.19 Tags: trusty Uname: Linux 3.19.0-39-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 05/19/2015 dmi.bios.vendor: Dell Inc. dmi.bios.version: A15 dmi.board.name: 0PXPYJ dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6540 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to :
[Kernel-packages] [Bug 1522094] ProcEnviron.txt
apport information ** Attachment added: "ProcEnviron.txt" https://bugs.launchpad.net/bugs/1522094/+attachment/4529554/+files/ProcEnviron.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522094 Title: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts- vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() Status in linux package in Ubuntu: Confirmed Bug description: When I connect a monitor the VGA port on the laptop - this is found in dmesg, and some of the kernel modules linked in become unstable [ btrfs for instance, if it's in use]. [2.962400] [ cut here ] [2.962424] WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() [2.962425] SPLL already enabled [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp pps_core pata_acpi wmi sdhci_acpi video sdhci [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic #42~14.04.1-Ubuntu [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 05/19/2015 [2.962439] c02fd7f8 880220d23ab8 817af92b 3a7a [2.962440] 880220d23b08 880220d23af8 81074e0a 0046 [2.962442] 880035fb 88003615eb60 880035f8f400 88003615e800 [2.962444] Call Trace: [2.962449] [] dump_stack+0x45/0x57 [2.962452] [] warn_slowpath_common+0x8a/0xc0 [2.962453] [] warn_slowpath_fmt+0x46/0x50 [2.962464] [] hsw_crt_pre_enable+0x7f/0x90 [i915] [2.962475] [] haswell_crtc_enable+0x3fc/0xaf0 [i915] [2.962485] [] __intel_set_mode+0x872/0xc60 [i915] [2.962495] [] intel_crtc_set_config+0x9e2/0xf60 [i915] [2.962506] [] drm_mode_set_config_internal+0x6f/0x110 [drm] [2.962511] [] restore_fbdev_mode+0xc8/0xf0 [drm_kms_helper] [2.962515] [] drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper] [2.962525] [] intel_fbdev_restore_mode+0x1e/0x50 [i915] [2.962536] [] i915_driver_lastclose+0xe/0x20 [i915] [2.962541] [] drm_lastclose+0x2e/0x130 [drm] [2.962546] [] drm_release+0x338/0x540 [drm] [2.962549] [] __fput+0xe7/0x220 [2.962551] [] fput+0xe/0x10 [2.962553] [] task_work_run+0xac/0xd0 [2.962556] [] do_notify_resume+0x97/0xb0 [2.962558] [] int_signal+0x12/0x17 [2.962559] ---[ end trace b6b778d930eaeda7 ]--- This is the lts-vivid kernel. downgrading to the lts-utopic kernel fixes the issue. I tried the wily-lts, same issue. I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel- ppa : linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works fine! :) --- ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jcat 2559 F pulseaudio /dev/snd/controlC1: jcat 2559 F pulseaudio CurrentDesktop: GNOME DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f InstallationDate: Installed on 2015-11-25 (8 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) MachineType: Dell Inc. Latitude E6540 NonfreeKernelModules: fglrx Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-39-generic N/A linux-backports-modules-3.19.0-39-generic N/A linux-firmware 1.127.19 Tags: trusty Uname: Linux 3.19.0-39-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 05/19/2015 dmi.bios.vendor: Dell Inc. dmi.bios.version: A15 dmi.board.name: 0PXPYJ dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6540 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to :
[Kernel-packages] [Bug 1522094] BootDmesg.txt
apport information ** Attachment added: "BootDmesg.txt" https://bugs.launchpad.net/bugs/1522094/+attachment/4529547/+files/BootDmesg.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522094 Title: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts- vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() Status in linux package in Ubuntu: Confirmed Bug description: When I connect a monitor the VGA port on the laptop - this is found in dmesg, and some of the kernel modules linked in become unstable [ btrfs for instance, if it's in use]. [2.962400] [ cut here ] [2.962424] WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() [2.962425] SPLL already enabled [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp pps_core pata_acpi wmi sdhci_acpi video sdhci [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic #42~14.04.1-Ubuntu [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 05/19/2015 [2.962439] c02fd7f8 880220d23ab8 817af92b 3a7a [2.962440] 880220d23b08 880220d23af8 81074e0a 0046 [2.962442] 880035fb 88003615eb60 880035f8f400 88003615e800 [2.962444] Call Trace: [2.962449] [] dump_stack+0x45/0x57 [2.962452] [] warn_slowpath_common+0x8a/0xc0 [2.962453] [] warn_slowpath_fmt+0x46/0x50 [2.962464] [] hsw_crt_pre_enable+0x7f/0x90 [i915] [2.962475] [] haswell_crtc_enable+0x3fc/0xaf0 [i915] [2.962485] [] __intel_set_mode+0x872/0xc60 [i915] [2.962495] [] intel_crtc_set_config+0x9e2/0xf60 [i915] [2.962506] [] drm_mode_set_config_internal+0x6f/0x110 [drm] [2.962511] [] restore_fbdev_mode+0xc8/0xf0 [drm_kms_helper] [2.962515] [] drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper] [2.962525] [] intel_fbdev_restore_mode+0x1e/0x50 [i915] [2.962536] [] i915_driver_lastclose+0xe/0x20 [i915] [2.962541] [] drm_lastclose+0x2e/0x130 [drm] [2.962546] [] drm_release+0x338/0x540 [drm] [2.962549] [] __fput+0xe7/0x220 [2.962551] [] fput+0xe/0x10 [2.962553] [] task_work_run+0xac/0xd0 [2.962556] [] do_notify_resume+0x97/0xb0 [2.962558] [] int_signal+0x12/0x17 [2.962559] ---[ end trace b6b778d930eaeda7 ]--- This is the lts-vivid kernel. downgrading to the lts-utopic kernel fixes the issue. I tried the wily-lts, same issue. I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel- ppa : linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works fine! :) --- ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jcat 2559 F pulseaudio /dev/snd/controlC1: jcat 2559 F pulseaudio CurrentDesktop: GNOME DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f InstallationDate: Installed on 2015-11-25 (8 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) MachineType: Dell Inc. Latitude E6540 NonfreeKernelModules: fglrx Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-39-generic N/A linux-backports-modules-3.19.0-39-generic N/A linux-firmware 1.127.19 Tags: trusty Uname: Linux 3.19.0-39-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 05/19/2015 dmi.bios.vendor: Dell Inc. dmi.bios.version: A15 dmi.board.name: 0PXPYJ dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6540 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to :
[Kernel-packages] [Bug 1522094] PulseList.txt
apport information ** Attachment added: "PulseList.txt" https://bugs.launchpad.net/bugs/1522094/+attachment/4529557/+files/PulseList.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522094 Title: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts- vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() Status in linux package in Ubuntu: Confirmed Bug description: When I connect a monitor the VGA port on the laptop - this is found in dmesg, and some of the kernel modules linked in become unstable [ btrfs for instance, if it's in use]. [2.962400] [ cut here ] [2.962424] WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() [2.962425] SPLL already enabled [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp pps_core pata_acpi wmi sdhci_acpi video sdhci [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic #42~14.04.1-Ubuntu [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 05/19/2015 [2.962439] c02fd7f8 880220d23ab8 817af92b 3a7a [2.962440] 880220d23b08 880220d23af8 81074e0a 0046 [2.962442] 880035fb 88003615eb60 880035f8f400 88003615e800 [2.962444] Call Trace: [2.962449] [] dump_stack+0x45/0x57 [2.962452] [] warn_slowpath_common+0x8a/0xc0 [2.962453] [] warn_slowpath_fmt+0x46/0x50 [2.962464] [] hsw_crt_pre_enable+0x7f/0x90 [i915] [2.962475] [] haswell_crtc_enable+0x3fc/0xaf0 [i915] [2.962485] [] __intel_set_mode+0x872/0xc60 [i915] [2.962495] [] intel_crtc_set_config+0x9e2/0xf60 [i915] [2.962506] [] drm_mode_set_config_internal+0x6f/0x110 [drm] [2.962511] [] restore_fbdev_mode+0xc8/0xf0 [drm_kms_helper] [2.962515] [] drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper] [2.962525] [] intel_fbdev_restore_mode+0x1e/0x50 [i915] [2.962536] [] i915_driver_lastclose+0xe/0x20 [i915] [2.962541] [] drm_lastclose+0x2e/0x130 [drm] [2.962546] [] drm_release+0x338/0x540 [drm] [2.962549] [] __fput+0xe7/0x220 [2.962551] [] fput+0xe/0x10 [2.962553] [] task_work_run+0xac/0xd0 [2.962556] [] do_notify_resume+0x97/0xb0 [2.962558] [] int_signal+0x12/0x17 [2.962559] ---[ end trace b6b778d930eaeda7 ]--- This is the lts-vivid kernel. downgrading to the lts-utopic kernel fixes the issue. I tried the wily-lts, same issue. I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel- ppa : linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works fine! :) --- ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jcat 2559 F pulseaudio /dev/snd/controlC1: jcat 2559 F pulseaudio CurrentDesktop: GNOME DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f InstallationDate: Installed on 2015-11-25 (8 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) MachineType: Dell Inc. Latitude E6540 NonfreeKernelModules: fglrx Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-39-generic N/A linux-backports-modules-3.19.0-39-generic N/A linux-firmware 1.127.19 Tags: trusty Uname: Linux 3.19.0-39-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 05/19/2015 dmi.bios.vendor: Dell Inc. dmi.bios.version: A15 dmi.board.name: 0PXPYJ dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6540 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to :
[Kernel-packages] [Bug 1522094] WifiSyslog.txt
apport information ** Attachment added: "WifiSyslog.txt" https://bugs.launchpad.net/bugs/1522094/+attachment/4529561/+files/WifiSyslog.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522094 Title: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts- vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() Status in linux package in Ubuntu: Confirmed Bug description: When I connect a monitor the VGA port on the laptop - this is found in dmesg, and some of the kernel modules linked in become unstable [ btrfs for instance, if it's in use]. [2.962400] [ cut here ] [2.962424] WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() [2.962425] SPLL already enabled [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp pps_core pata_acpi wmi sdhci_acpi video sdhci [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic #42~14.04.1-Ubuntu [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 05/19/2015 [2.962439] c02fd7f8 880220d23ab8 817af92b 3a7a [2.962440] 880220d23b08 880220d23af8 81074e0a 0046 [2.962442] 880035fb 88003615eb60 880035f8f400 88003615e800 [2.962444] Call Trace: [2.962449] [] dump_stack+0x45/0x57 [2.962452] [] warn_slowpath_common+0x8a/0xc0 [2.962453] [] warn_slowpath_fmt+0x46/0x50 [2.962464] [] hsw_crt_pre_enable+0x7f/0x90 [i915] [2.962475] [] haswell_crtc_enable+0x3fc/0xaf0 [i915] [2.962485] [] __intel_set_mode+0x872/0xc60 [i915] [2.962495] [] intel_crtc_set_config+0x9e2/0xf60 [i915] [2.962506] [] drm_mode_set_config_internal+0x6f/0x110 [drm] [2.962511] [] restore_fbdev_mode+0xc8/0xf0 [drm_kms_helper] [2.962515] [] drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper] [2.962525] [] intel_fbdev_restore_mode+0x1e/0x50 [i915] [2.962536] [] i915_driver_lastclose+0xe/0x20 [i915] [2.962541] [] drm_lastclose+0x2e/0x130 [drm] [2.962546] [] drm_release+0x338/0x540 [drm] [2.962549] [] __fput+0xe7/0x220 [2.962551] [] fput+0xe/0x10 [2.962553] [] task_work_run+0xac/0xd0 [2.962556] [] do_notify_resume+0x97/0xb0 [2.962558] [] int_signal+0x12/0x17 [2.962559] ---[ end trace b6b778d930eaeda7 ]--- This is the lts-vivid kernel. downgrading to the lts-utopic kernel fixes the issue. I tried the wily-lts, same issue. I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel- ppa : linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works fine! :) --- ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jcat 2559 F pulseaudio /dev/snd/controlC1: jcat 2559 F pulseaudio CurrentDesktop: GNOME DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f InstallationDate: Installed on 2015-11-25 (8 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) MachineType: Dell Inc. Latitude E6540 NonfreeKernelModules: fglrx Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-39-generic N/A linux-backports-modules-3.19.0-39-generic N/A linux-firmware 1.127.19 Tags: trusty Uname: Linux 3.19.0-39-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 05/19/2015 dmi.bios.vendor: Dell Inc. dmi.bios.version: A15 dmi.board.name: 0PXPYJ dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6540 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to :
[Kernel-packages] [Bug 1522094] Re: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]()
apport-collect info added ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522094 Title: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts- vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() Status in linux package in Ubuntu: Confirmed Bug description: When I connect a monitor the VGA port on the laptop - this is found in dmesg, and some of the kernel modules linked in become unstable [ btrfs for instance, if it's in use]. [2.962400] [ cut here ] [2.962424] WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() [2.962425] SPLL already enabled [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp pps_core pata_acpi wmi sdhci_acpi video sdhci [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic #42~14.04.1-Ubuntu [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 05/19/2015 [2.962439] c02fd7f8 880220d23ab8 817af92b 3a7a [2.962440] 880220d23b08 880220d23af8 81074e0a 0046 [2.962442] 880035fb 88003615eb60 880035f8f400 88003615e800 [2.962444] Call Trace: [2.962449] [] dump_stack+0x45/0x57 [2.962452] [] warn_slowpath_common+0x8a/0xc0 [2.962453] [] warn_slowpath_fmt+0x46/0x50 [2.962464] [] hsw_crt_pre_enable+0x7f/0x90 [i915] [2.962475] [] haswell_crtc_enable+0x3fc/0xaf0 [i915] [2.962485] [] __intel_set_mode+0x872/0xc60 [i915] [2.962495] [] intel_crtc_set_config+0x9e2/0xf60 [i915] [2.962506] [] drm_mode_set_config_internal+0x6f/0x110 [drm] [2.962511] [] restore_fbdev_mode+0xc8/0xf0 [drm_kms_helper] [2.962515] [] drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper] [2.962525] [] intel_fbdev_restore_mode+0x1e/0x50 [i915] [2.962536] [] i915_driver_lastclose+0xe/0x20 [i915] [2.962541] [] drm_lastclose+0x2e/0x130 [drm] [2.962546] [] drm_release+0x338/0x540 [drm] [2.962549] [] __fput+0xe7/0x220 [2.962551] [] fput+0xe/0x10 [2.962553] [] task_work_run+0xac/0xd0 [2.962556] [] do_notify_resume+0x97/0xb0 [2.962558] [] int_signal+0x12/0x17 [2.962559] ---[ end trace b6b778d930eaeda7 ]--- This is the lts-vivid kernel. downgrading to the lts-utopic kernel fixes the issue. I tried the wily-lts, same issue. I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel- ppa : linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works fine! :) --- ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jcat 2559 F pulseaudio /dev/snd/controlC1: jcat 2559 F pulseaudio CurrentDesktop: GNOME DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f InstallationDate: Installed on 2015-11-25 (8 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) MachineType: Dell Inc. Latitude E6540 NonfreeKernelModules: fglrx Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-39-generic N/A linux-backports-modules-3.19.0-39-generic N/A linux-firmware 1.127.19 Tags: trusty Uname: Linux 3.19.0-39-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 05/19/2015 dmi.bios.vendor: Dell Inc. dmi.bios.version: A15 dmi.board.name: 0PXPYJ dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6540 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe :
[Kernel-packages] [Bug 1522793] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522793 Title: Touchpad not working, locked ? Status in linux package in Ubuntu: Confirmed Bug description: Touchpad not working on Dell units: Dell Inspiron 5547 Dell Inspiron 15-3552 Similar issue reported on: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374212 Distributor ID: Ubuntu Description: Ubuntu 15.10 Release: 15.10 Codename: wily ⎡ Virtual core pointerid=2[master pointer (3)] ⎜ ↳ Virtual core XTEST pointer id=4[slave pointer (2)] ⎜ ↳ ELAN Touchscreenid=10 [slave pointer (2)] ⎜ ↳ DLL063E:00 06CB:2934id=12 [slave pointer (2)] ⎜ ↳ SynPS/2 Synaptics TouchPad id=14 [slave pointer (2)] ⎣ Virtual core keyboard id=3[master keyboard (2)] ↳ Virtual core XTEST keyboard id=5[slave keyboard (3)] ↳ Power Buttonid=6[slave keyboard (3)] ↳ Video Bus id=7[slave keyboard (3)] ↳ Power Buttonid=8[slave keyboard (3)] ↳ Sleep Buttonid=9[slave keyboard (3)] ↳ Integrated_Webcam_HDid=11 [slave keyboard (3)] ↳ AT Translated Set 2 keyboardid=13 [slave keyboard (3)] ↳ Dell WMI hotkeysid=15 [slave keyboard (3)] ProblemType: Bug DistroRelease: Ubuntu 15.10 Package: linux-image-4.2.0-16-generic 4.2.0-16.19 ProcVersionSignature: Ubuntu 4.2.0-16.19-generic 4.2.3 Uname: Linux 4.2.0-16-generic x86_64 ApportVersion: 2.19.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: marcin 3077 F pulseaudio /dev/snd/controlC0: marcin 3077 F pulseaudio CasperVersion: 1.365 CurrentDesktop: Unity Date: Fri Dec 4 10:59:53 2015 LiveMediaBuild: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021) MachineType: Dell Inc. Inspiron 5547 ProcEnviron: TERM=xterm-256color PATH=(custom, no user) XDG_RUNTIME_DIR= LANG=en_US.UTF-8 SHELL=/bin/bash ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/NFS/15.10/desktop-amd64/casper/vmlinuz.efi append noprompt boot=casper modprobe.blacklist=wl rfkill.master_switch_mode=0 rfkill.default_state=1 nohibernate userfullname=User Name username=username proceed=AIO nfsroot=usb showmounts persistent-path=/NFS/15.10/desktop-amd64 persistent iso-scan/filename=/NFS/15.10/hostname-15.10-desktop-amd64.iso toram RelatedPackageVersions: linux-restricted-modules-4.2.0-16-generic N/A linux-backports-modules-4.2.0-16-generic N/A linux-firmware1.149 SourcePackage: linux UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev' UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 05/09/2014 dmi.bios.vendor: Dell Inc. dmi.bios.version: A04 dmi.board.name: 0CXY41 dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: A04 dmi.modalias: dmi:bvnDellInc.:bvrA04:bd05/09/2014:svnDellInc.:pnInspiron5547:pvrA04:rvnDellInc.:rn0CXY41:rvrA00:cvnDellInc.:ct8:cvrA04: dmi.product.name: Inspiron 5547 dmi.product.version: A04 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522793/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522094] CRDA.txt
apport information ** Attachment added: "CRDA.txt" https://bugs.launchpad.net/bugs/1522094/+attachment/4529548/+files/CRDA.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522094 Title: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts- vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() Status in linux package in Ubuntu: Confirmed Bug description: When I connect a monitor the VGA port on the laptop - this is found in dmesg, and some of the kernel modules linked in become unstable [ btrfs for instance, if it's in use]. [2.962400] [ cut here ] [2.962424] WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() [2.962425] SPLL already enabled [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp pps_core pata_acpi wmi sdhci_acpi video sdhci [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic #42~14.04.1-Ubuntu [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 05/19/2015 [2.962439] c02fd7f8 880220d23ab8 817af92b 3a7a [2.962440] 880220d23b08 880220d23af8 81074e0a 0046 [2.962442] 880035fb 88003615eb60 880035f8f400 88003615e800 [2.962444] Call Trace: [2.962449] [] dump_stack+0x45/0x57 [2.962452] [] warn_slowpath_common+0x8a/0xc0 [2.962453] [] warn_slowpath_fmt+0x46/0x50 [2.962464] [] hsw_crt_pre_enable+0x7f/0x90 [i915] [2.962475] [] haswell_crtc_enable+0x3fc/0xaf0 [i915] [2.962485] [] __intel_set_mode+0x872/0xc60 [i915] [2.962495] [] intel_crtc_set_config+0x9e2/0xf60 [i915] [2.962506] [] drm_mode_set_config_internal+0x6f/0x110 [drm] [2.962511] [] restore_fbdev_mode+0xc8/0xf0 [drm_kms_helper] [2.962515] [] drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper] [2.962525] [] intel_fbdev_restore_mode+0x1e/0x50 [i915] [2.962536] [] i915_driver_lastclose+0xe/0x20 [i915] [2.962541] [] drm_lastclose+0x2e/0x130 [drm] [2.962546] [] drm_release+0x338/0x540 [drm] [2.962549] [] __fput+0xe7/0x220 [2.962551] [] fput+0xe/0x10 [2.962553] [] task_work_run+0xac/0xd0 [2.962556] [] do_notify_resume+0x97/0xb0 [2.962558] [] int_signal+0x12/0x17 [2.962559] ---[ end trace b6b778d930eaeda7 ]--- This is the lts-vivid kernel. downgrading to the lts-utopic kernel fixes the issue. I tried the wily-lts, same issue. I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel- ppa : linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works fine! :) --- ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jcat 2559 F pulseaudio /dev/snd/controlC1: jcat 2559 F pulseaudio CurrentDesktop: GNOME DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f InstallationDate: Installed on 2015-11-25 (8 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) MachineType: Dell Inc. Latitude E6540 NonfreeKernelModules: fglrx Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-39-generic N/A linux-backports-modules-3.19.0-39-generic N/A linux-firmware 1.127.19 Tags: trusty Uname: Linux 3.19.0-39-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 05/19/2015 dmi.bios.vendor: Dell Inc. dmi.bios.version: A15 dmi.board.name: 0PXPYJ dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6540 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to :
[Kernel-packages] [Bug 1522094] UdevDb.txt
apport information ** Attachment added: "UdevDb.txt" https://bugs.launchpad.net/bugs/1522094/+attachment/4529559/+files/UdevDb.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522094 Title: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts- vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() Status in linux package in Ubuntu: Confirmed Bug description: When I connect a monitor the VGA port on the laptop - this is found in dmesg, and some of the kernel modules linked in become unstable [ btrfs for instance, if it's in use]. [2.962400] [ cut here ] [2.962424] WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() [2.962425] SPLL already enabled [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp pps_core pata_acpi wmi sdhci_acpi video sdhci [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic #42~14.04.1-Ubuntu [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 05/19/2015 [2.962439] c02fd7f8 880220d23ab8 817af92b 3a7a [2.962440] 880220d23b08 880220d23af8 81074e0a 0046 [2.962442] 880035fb 88003615eb60 880035f8f400 88003615e800 [2.962444] Call Trace: [2.962449] [] dump_stack+0x45/0x57 [2.962452] [] warn_slowpath_common+0x8a/0xc0 [2.962453] [] warn_slowpath_fmt+0x46/0x50 [2.962464] [] hsw_crt_pre_enable+0x7f/0x90 [i915] [2.962475] [] haswell_crtc_enable+0x3fc/0xaf0 [i915] [2.962485] [] __intel_set_mode+0x872/0xc60 [i915] [2.962495] [] intel_crtc_set_config+0x9e2/0xf60 [i915] [2.962506] [] drm_mode_set_config_internal+0x6f/0x110 [drm] [2.962511] [] restore_fbdev_mode+0xc8/0xf0 [drm_kms_helper] [2.962515] [] drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper] [2.962525] [] intel_fbdev_restore_mode+0x1e/0x50 [i915] [2.962536] [] i915_driver_lastclose+0xe/0x20 [i915] [2.962541] [] drm_lastclose+0x2e/0x130 [drm] [2.962546] [] drm_release+0x338/0x540 [drm] [2.962549] [] __fput+0xe7/0x220 [2.962551] [] fput+0xe/0x10 [2.962553] [] task_work_run+0xac/0xd0 [2.962556] [] do_notify_resume+0x97/0xb0 [2.962558] [] int_signal+0x12/0x17 [2.962559] ---[ end trace b6b778d930eaeda7 ]--- This is the lts-vivid kernel. downgrading to the lts-utopic kernel fixes the issue. I tried the wily-lts, same issue. I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel- ppa : linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works fine! :) --- ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jcat 2559 F pulseaudio /dev/snd/controlC1: jcat 2559 F pulseaudio CurrentDesktop: GNOME DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f InstallationDate: Installed on 2015-11-25 (8 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) MachineType: Dell Inc. Latitude E6540 NonfreeKernelModules: fglrx Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-39-generic N/A linux-backports-modules-3.19.0-39-generic N/A linux-firmware 1.127.19 Tags: trusty Uname: Linux 3.19.0-39-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 05/19/2015 dmi.bios.vendor: Dell Inc. dmi.bios.version: A15 dmi.board.name: 0PXPYJ dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6540 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to :
[Kernel-packages] [Bug 1522094] RfKill.txt
apport information ** Attachment added: "RfKill.txt" https://bugs.launchpad.net/bugs/1522094/+attachment/4529558/+files/RfKill.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522094 Title: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts- vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() Status in linux package in Ubuntu: Confirmed Bug description: When I connect a monitor the VGA port on the laptop - this is found in dmesg, and some of the kernel modules linked in become unstable [ btrfs for instance, if it's in use]. [2.962400] [ cut here ] [2.962424] WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() [2.962425] SPLL already enabled [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp pps_core pata_acpi wmi sdhci_acpi video sdhci [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic #42~14.04.1-Ubuntu [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 05/19/2015 [2.962439] c02fd7f8 880220d23ab8 817af92b 3a7a [2.962440] 880220d23b08 880220d23af8 81074e0a 0046 [2.962442] 880035fb 88003615eb60 880035f8f400 88003615e800 [2.962444] Call Trace: [2.962449] [] dump_stack+0x45/0x57 [2.962452] [] warn_slowpath_common+0x8a/0xc0 [2.962453] [] warn_slowpath_fmt+0x46/0x50 [2.962464] [] hsw_crt_pre_enable+0x7f/0x90 [i915] [2.962475] [] haswell_crtc_enable+0x3fc/0xaf0 [i915] [2.962485] [] __intel_set_mode+0x872/0xc60 [i915] [2.962495] [] intel_crtc_set_config+0x9e2/0xf60 [i915] [2.962506] [] drm_mode_set_config_internal+0x6f/0x110 [drm] [2.962511] [] restore_fbdev_mode+0xc8/0xf0 [drm_kms_helper] [2.962515] [] drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper] [2.962525] [] intel_fbdev_restore_mode+0x1e/0x50 [i915] [2.962536] [] i915_driver_lastclose+0xe/0x20 [i915] [2.962541] [] drm_lastclose+0x2e/0x130 [drm] [2.962546] [] drm_release+0x338/0x540 [drm] [2.962549] [] __fput+0xe7/0x220 [2.962551] [] fput+0xe/0x10 [2.962553] [] task_work_run+0xac/0xd0 [2.962556] [] do_notify_resume+0x97/0xb0 [2.962558] [] int_signal+0x12/0x17 [2.962559] ---[ end trace b6b778d930eaeda7 ]--- This is the lts-vivid kernel. downgrading to the lts-utopic kernel fixes the issue. I tried the wily-lts, same issue. I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel- ppa : linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works fine! :) --- ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jcat 2559 F pulseaudio /dev/snd/controlC1: jcat 2559 F pulseaudio CurrentDesktop: GNOME DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f InstallationDate: Installed on 2015-11-25 (8 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) MachineType: Dell Inc. Latitude E6540 NonfreeKernelModules: fglrx Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-39-generic N/A linux-backports-modules-3.19.0-39-generic N/A linux-firmware 1.127.19 Tags: trusty Uname: Linux 3.19.0-39-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 05/19/2015 dmi.bios.vendor: Dell Inc. dmi.bios.version: A15 dmi.board.name: 0PXPYJ dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6540 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to :
[Kernel-packages] [Bug 1521942] Re: linux-lts-utopic: 3.16.0-56.75~14.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-utopic in Ubuntu. https://bugs.launchpad.net/bugs/1521942 Title: linux-lts-utopic: 3.16.0-56.75~14.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-utopic source package in Trusty: New Bug description: This bug is for tracking the 3.16.0-56.75~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 10:13 UTC kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 20:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 20:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Thursday, 03. December 2015 15:03 UTC kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:03 UTC kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:03 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:03 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:03 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521942/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522786] [NEW] linux: 3.19.0-40.45 -proposed tracker
Public bug reported: This bug is for tracking the 3.19.0-40.45 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Friday, 04. December 2015 10:52 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Friday, 04. December 2015 10:52 UTC ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Platform QA Team (canonical-platform-qa) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux (Ubuntu Vivid) Importance: Medium Status: New ** Tags: block-proposed-vivid kernel-release-tracking-bug vivid ** Tags added: kernel-release-tracking-bug ** Tags added: block-proposed-vivid ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Tags added: vivid ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-signed Importance: Undecided => Medium ** Changed in:
[Kernel-packages] [Bug 1500242] Re: Bluetooth devices (Jabra BT250, Audi A3 car kit) can not be connected with BQ Aquaris 4.5
Ah sorry, confused that. The log files for the A3 would be great too then. ** Changed in: bluez (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bluez in Ubuntu. https://bugs.launchpad.net/bugs/1500242 Title: Bluetooth devices (Jabra BT250, Audi A3 car kit) can not be connected with BQ Aquaris 4.5 Status in Canonical System Image: Confirmed Status in bluez package in Ubuntu: Incomplete Status in ofono package in Ubuntu: Incomplete Bug description: STEPS: Requirements: Aquaris E4.5, Jabra BT250 blue tooth handset device (rather old one supports blue tooth 1.1 and therefore I thought should be no issue) or Audi car kit (A3 2012 model) 1. Put Jabra BT250 into receiving mode 2. Phone searches automatically every 15 - 30 seconds for a new blue tooth device 3. Phone finds Jabra BT250 and asks for pairing code 4. Enter code into phone 5. Jabra BT250 automatically exits the pairing mode (which is a sign that pairing should have worked) 6. Phone looses connection to Jabra BT250 7. Manual reconnection via phone works (shows Jabra BT250 as being connected) but ignores the device Same behaviour with Audi car kit (Audi A3, 2012 model) EXPECTED: I expect that the blue tooth kits work similar to my Seat Alhambra (also 2012 model) where the blue tooth pairing etc. works great (except some bugs which are already filed). ACTUAL: No connection to the blue tooth device VERSIONS: OS-Build-Number: 25 Ubuntu-Image: 20150825.1 POSSIBLE ROOT CAUSE: Is this issue also solved as soon as bluez5 is implemented? When will this be? To manage notifications about this bug go to: https://bugs.launchpad.net/canonical-devices-system-image/+bug/1500242/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522793] [NEW] Touchpad not working, locked ?
Public bug reported: Touchpad not working on Dell units: Dell Inspiron 5547 Dell Inspiron 15-3552 Similar issue reported on: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374212 Distributor ID: Ubuntu Description:Ubuntu 15.10 Release:15.10 Codename: wily ⎡ Virtual core pointer id=2[master pointer (3)] ⎜ ↳ Virtual core XTEST pointerid=4[slave pointer (2)] ⎜ ↳ ELAN Touchscreen id=10 [slave pointer (2)] ⎜ ↳ DLL063E:00 06CB:2934 id=12 [slave pointer (2)] ⎜ ↳ SynPS/2 Synaptics TouchPadid=14 [slave pointer (2)] ⎣ Virtual core keyboard id=3[master keyboard (2)] ↳ Virtual core XTEST keyboard id=5[slave keyboard (3)] ↳ Power Button id=6[slave keyboard (3)] ↳ Video Bus id=7[slave keyboard (3)] ↳ Power Button id=8[slave keyboard (3)] ↳ Sleep Button id=9[slave keyboard (3)] ↳ Integrated_Webcam_HD id=11 [slave keyboard (3)] ↳ AT Translated Set 2 keyboard id=13 [slave keyboard (3)] ↳ Dell WMI hotkeys id=15 [slave keyboard (3)] ProblemType: Bug DistroRelease: Ubuntu 15.10 Package: linux-image-4.2.0-16-generic 4.2.0-16.19 ProcVersionSignature: Ubuntu 4.2.0-16.19-generic 4.2.3 Uname: Linux 4.2.0-16-generic x86_64 ApportVersion: 2.19.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: marcin 3077 F pulseaudio /dev/snd/controlC0: marcin 3077 F pulseaudio CasperVersion: 1.365 CurrentDesktop: Unity Date: Fri Dec 4 10:59:53 2015 LiveMediaBuild: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021) MachineType: Dell Inc. Inspiron 5547 ProcEnviron: TERM=xterm-256color PATH=(custom, no user) XDG_RUNTIME_DIR= LANG=en_US.UTF-8 SHELL=/bin/bash ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/NFS/15.10/desktop-amd64/casper/vmlinuz.efi append noprompt boot=casper modprobe.blacklist=wl rfkill.master_switch_mode=0 rfkill.default_state=1 nohibernate userfullname=User Name username=username proceed=AIO nfsroot=usb showmounts persistent-path=/NFS/15.10/desktop-amd64 persistent iso-scan/filename=/NFS/15.10/hostname-15.10-desktop-amd64.iso toram RelatedPackageVersions: linux-restricted-modules-4.2.0-16-generic N/A linux-backports-modules-4.2.0-16-generic N/A linux-firmware1.149 SourcePackage: linux UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev' UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 05/09/2014 dmi.bios.vendor: Dell Inc. dmi.bios.version: A04 dmi.board.name: 0CXY41 dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: A04 dmi.modalias: dmi:bvnDellInc.:bvrA04:bd05/09/2014:svnDellInc.:pnInspiron5547:pvrA04:rvnDellInc.:rn0CXY41:rvrA00:cvnDellInc.:ct8:cvrA04: dmi.product.name: Inspiron 5547 dmi.product.version: A04 dmi.sys.vendor: Dell Inc. ** Affects: linux (Ubuntu) Importance: Undecided Status: Confirmed ** Attachment added: "synclint output" https://bugs.launchpad.net/bugs/1522793/+attachment/4529530/+files/synclient.log -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522793 Title: Touchpad not working, locked ? Status in linux package in Ubuntu: Confirmed Bug description: Touchpad not working on Dell units: Dell Inspiron 5547 Dell Inspiron 15-3552 Similar issue reported on: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374212 Distributor ID: Ubuntu Description: Ubuntu 15.10 Release: 15.10 Codename: wily ⎡ Virtual core pointerid=2[master pointer (3)] ⎜ ↳ Virtual core XTEST pointer id=4[slave pointer (2)] ⎜ ↳ ELAN Touchscreenid=10 [slave pointer (2)] ⎜ ↳ DLL063E:00 06CB:2934id=12 [slave pointer (2)] ⎜ ↳ SynPS/2 Synaptics TouchPad id=14 [slave pointer (2)] ⎣ Virtual core keyboard id=3[master keyboard (2)] ↳ Virtual core XTEST keyboard id=5[slave keyboard (3)] ↳ Power Buttonid=6[slave keyboard (3)] ↳ Video Bus id=7[slave keyboard (3)] ↳ Power Buttonid=8[slave keyboard (3)] ↳ Sleep Buttonid=9[slave keyboard (3)] ↳ Integrated_Webcam_HD
[Kernel-packages] [Bug 1324935] Re: [Dell Inspiron 1525] WARNING: CPU: 1 PID: 1154 at /build/buildd/linux-3.13.0/drivers/gpu/drm/i915/intel_display.c:9226 intel_modeset_check_state+0x62d/0x780 [i915](
KeithG, the issue you are reporting is an upstream one. Could you please report this problem following the instructions verbatim at https://wiki.ubuntu.com/Bugs/Upstream/kernel to the appropriate venue (TO Daniel Vetter and Jani Nikula CC intel-gfx)? Please provide a direct URL to your newly made report when it becomes available so that it may be tracked. Thank you for your understanding. ** Tags removed: kernel-bug-exists-upstream-3.16-rc6 kernel-fixed-upstream-3.16 needs-reverse-bisect ** Tags added: kernel-bug-exists-upstream-4.4-rc3 ** Changed in: linux (Ubuntu) Importance: Low => High ** Changed in: linux (Ubuntu) Status: Incomplete => Triaged -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1324935 Title: [Dell Inspiron 1525] WARNING: CPU: 1 PID: 1154 at /build/buildd/linux-3.13.0/drivers/gpu/drm/i915/intel_display.c:9226 intel_modeset_check_state+0x62d/0x780 [i915]() Status in linux package in Ubuntu: Triaged Bug description: Dmesg is filled with this: [32582.450283] [ cut here ] [32582.450302] WARNING: CPU: 1 PID: 1154 at /build/buildd/linux-3.13.0/drivers/gpu/drm/i915/intel_display.c:9226 intel_modeset_check_state+0x62d/0x780 [i915]() [32582.450304] encoder's hw state doesn't match sw tracking (expected 0, found 1) [32582.450306] Modules linked in: nfsv3 ctr ccm rfcomm bnep bluetooth rpcsec_gss_krb5 nfsv4 binfmt_misc nfsd auth_rpcgss nfs_acl nfs lockd sunrpc fscache arc4 gpio_ich dell_wmi sparse_keymap uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_core videodev dell_laptop dcdbas snd_hda_codec_idt snd_hda_codec_hdmi b43 snd_hda_intel snd_hda_codec snd_hwdep snd_pcm bcma coretemp snd_page_alloc snd_seq_midi snd_seq_midi_event snd_rawmidi joydev snd_seq serio_raw mac80211 snd_seq_device snd_timer snd lpc_ich cfg80211 ssb_hcd soundcore mac_hid wmi parport_pc ppdev lp parport psmouse ahci libahci sky2 ssb i915 video i2c_algo_bit drm_kms_helper drm [32582.450357] CPU: 1 PID: 1154 Comm: Xorg Tainted: GW 3.13.0-27-generic #50-Ubuntu [32582.450359] Hardware name: Dell Inc. Inspiron 1525 /0U990C, BIOS A17 10/27/2009 [32582.450361] 0009 8803bb68 817199c4 8803bbb0 [32582.450365] 8803bba0 810676bd 8803bc20 0001 [32582.450369] 88003684c800 88003684caf8 8800364a9800 8803bc00 [32582.450373] Call Trace: [32582.450378] [] dump_stack+0x45/0x56 [32582.450381] [] warn_slowpath_common+0x7d/0xa0 [32582.450384] [] warn_slowpath_fmt+0x4c/0x50 [32582.450405] [] ? intel_sdvo_get_hw_state+0x55/0xc0 [i915] [32582.450423] [] intel_modeset_check_state+0x62d/0x780 [i915] [32582.450441] [] intel_set_mode+0x25/0x30 [i915] [32582.450459] [] intel_crtc_set_config+0x7ab/0x9a0 [i915] [32582.450463] [] ? lapic_next_event+0x1d/0x30 [32582.450477] [] drm_mode_set_config_internal+0x5d/0xe0 [drm] [32582.450492] [] drm_mode_setcrtc+0xf7/0x5e0 [drm] [32582.450503] [] drm_ioctl+0x502/0x630 [drm] [32582.450508] [] ? __set_task_blocked+0x32/0x70 [32582.450513] [] do_vfs_ioctl+0x2e0/0x4c0 [32582.450517] [] ? vtime_account_user+0x54/0x60 [32582.450520] [] SyS_ioctl+0x81/0xa0 [32582.450524] [] tracesys+0xe1/0xe6 [32582.450526] ---[ end trace 8e8416ac0cd5b971 ]--- Resume results in black screen. Graphics can appear completely messed up (i.e. torn last jpg viewed over top of latest jpg). This happens in Ubuntu 13.10 and 14.04. It happens with: no intel drivers installed, and with or without the i915 and intel_agp modules explicitly enabled in /etc/initramfs-tools/modules. WORKAROUND: Using the following kernel parameters I no longer get the message in the log, the video does not appear to be as crisp somehow, but I can suspend and wake from the command: linemodeset=0 video.allow_duplicates=1 ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-27-generic 3.13.0-27.50 ProcVersionSignature: Ubuntu 3.13.0-27.50-generic 3.13.11 Uname: Linux 3.13.0-27-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: kgrider2212 F pulseaudio Date: Fri May 30 08:03:14 2014 HibernationDevice: RESUME=UUID=4957c02d-b4ca-4dce-8983-450640c97f46 MachineType: Dell Inc. Inspiron 1525 ProcEnviron: TERM=xterm PATH=(custom, no user) XDG_RUNTIME_DIR= LANG=en_US.UTF-8 SHELL=/bin/bash ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-27-generic root=UUID=7682c6bb-cf2f-413f-9243-eab8172b5bbc ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.13.0-27-generic N/A linux-backports-modules-3.13.0-27-generic N/A linux-firmware 1.127.2 RfKill:
[Kernel-packages] [Bug 1522766] [NEW] cryptsetup hangs after kernel upgrade to 3.13.0-72.115
Public bug reported: After upgrading to the proposed kernel for Trusty (3.13.0-72.115) I cannot unlock a luks formatted usb drive. The cryptsetup process seems to hang with the following stack: [] __synchronize_srcu+0xfe/0x180 [] synchronize_srcu+0x1d/0x20 [] __dm_destroy+0x117/0x290 [] dm_destroy+0x13/0x20 [] dev_remove+0xde/0x120 [] ctl_ioctl+0x255/0x500 [] dm_ctl_ioctl+0x13/0x20 [] do_vfs_ioctl+0x2e0/0x4c0 [] SyS_ioctl+0x81/0xa0 [] system_call_fastpath+0x1a/0x1f [] 0x ** Affects: linux (Ubuntu) Importance: High Status: Triaged -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522766 Title: cryptsetup hangs after kernel upgrade to 3.13.0-72.115 Status in linux package in Ubuntu: Triaged Bug description: After upgrading to the proposed kernel for Trusty (3.13.0-72.115) I cannot unlock a luks formatted usb drive. The cryptsetup process seems to hang with the following stack: [] __synchronize_srcu+0xfe/0x180 [] synchronize_srcu+0x1d/0x20 [] __dm_destroy+0x117/0x290 [] dm_destroy+0x13/0x20 [] dev_remove+0xde/0x120 [] ctl_ioctl+0x255/0x500 [] dm_ctl_ioctl+0x13/0x20 [] do_vfs_ioctl+0x2e0/0x4c0 [] SyS_ioctl+0x81/0xa0 [] system_call_fastpath+0x1a/0x1f [] 0x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522766/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522766] Re: cryptsetup hangs after kernel upgrade to 3.13.0-72.115
** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Trusty) Status: New => Triaged -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522766 Title: cryptsetup hangs after kernel upgrade to 3.13.0-72.115 Status in linux package in Ubuntu: Triaged Status in linux source package in Trusty: Triaged Bug description: After upgrading to the proposed kernel for Trusty (3.13.0-72.115) I cannot unlock a luks formatted usb drive. The cryptsetup process seems to hang with the following stack: [] __synchronize_srcu+0xfe/0x180 [] synchronize_srcu+0x1d/0x20 [] __dm_destroy+0x117/0x290 [] dm_destroy+0x13/0x20 [] dev_remove+0xde/0x120 [] ctl_ioctl+0x255/0x500 [] dm_ctl_ioctl+0x13/0x20 [] do_vfs_ioctl+0x2e0/0x4c0 [] SyS_ioctl+0x81/0xa0 [] system_call_fastpath+0x1a/0x1f [] 0x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522766/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1500242] Re: Bluetooth devices (Jabra BT250, Audi A3 car kit) can not be connected with BQ Aquaris 4.5
@Simon: I will retest with the debugging bluetooth tips. Abou the A3 issue. I wrote: - Audi A3, car kit: I have tested the rc-propsed version with my Car kit Audi A3 2012 model. There has been no significant change with this set-up. I can pair the phone with the car kit but can not establish a connection between the two. So there is not much to report here - So it is not yet fixed! I will roll back to rc-proposed and follow the above mentioned steps hopefully during the weekend. I hope to give you then a good feedback. @Tony & Simon: I did the test with the following rc-proposed version: current build number: 191 device name: krillin channel: ubuntu-touch/rc-proposed/bq-aquaris.en last update: 2015-11-30 17:03:26 version version: 191 version ubuntu: 20151130 version device: 20151028-869191d version custom: 2015--36-46-vivid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bluez in Ubuntu. https://bugs.launchpad.net/bugs/1500242 Title: Bluetooth devices (Jabra BT250, Audi A3 car kit) can not be connected with BQ Aquaris 4.5 Status in Canonical System Image: Confirmed Status in bluez package in Ubuntu: New Status in ofono package in Ubuntu: Incomplete Bug description: STEPS: Requirements: Aquaris E4.5, Jabra BT250 blue tooth handset device (rather old one supports blue tooth 1.1 and therefore I thought should be no issue) or Audi car kit (A3 2012 model) 1. Put Jabra BT250 into receiving mode 2. Phone searches automatically every 15 - 30 seconds for a new blue tooth device 3. Phone finds Jabra BT250 and asks for pairing code 4. Enter code into phone 5. Jabra BT250 automatically exits the pairing mode (which is a sign that pairing should have worked) 6. Phone looses connection to Jabra BT250 7. Manual reconnection via phone works (shows Jabra BT250 as being connected) but ignores the device Same behaviour with Audi car kit (Audi A3, 2012 model) EXPECTED: I expect that the blue tooth kits work similar to my Seat Alhambra (also 2012 model) where the blue tooth pairing etc. works great (except some bugs which are already filed). ACTUAL: No connection to the blue tooth device VERSIONS: OS-Build-Number: 25 Ubuntu-Image: 20150825.1 POSSIBLE ROOT CAUSE: Is this issue also solved as soon as bluez5 is implemented? When will this be? To manage notifications about this bug go to: https://bugs.launchpad.net/canonical-devices-system-image/+bug/1500242/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1520309] Re: Trusty update to 3.19.8-ckt10 stable release
** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Vivid) Status: New => Fix Committed ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1520309 Title: Trusty update to 3.19.8-ckt10 stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: Invalid Status in linux source package in Vivid: Fix Committed Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The 3.19.8-ckt10 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://kernel.ubuntu.com/ubuntu/linux.git TEST CASE: TBD The following patches are in the 3.19.8-ckt10 stable release: isdn_ppp: Add checks for allocation failure in isdn_ppp_open() ppp, slip: Validate VJ compression slot parameters completely [media] media/vivid-osd: fix info leak in ioctl staging/dgnc: fix info leak in ioctl tools lib traceevent: Fix string handling in heterogeneous arch environments perf tools: Fix copying of /proc/kcore m68k: Define asmlinkage_protect UBI: Validate data_size UBI: return ENOSPC if no enough space available drm/radeon: Restore LCD backlight level on resume (>= R5xx) drm/radeon: move bl encoder assignment into bl init drm/radeon: fix dpms when driver backlight control is disabled MIPS: dma-default: Fix 32-bit fall back to GFP_DMA MIPS: CPS: Stop dangling delay slot from has_mt. MIPS: CPS: Don't include MT code in non-MT kernels. MIPS: CPS: #ifdef on CONFIG_MIPS_MT_SMP rather than CONFIG_MIPS_MT x86/asm/entry: Create and use a 'TOP_OF_KERNEL_STACK_PADDING' macro x86/process: Add proper bound checks in 64bit get_wchan() drm/qxl: recreate the primary surface when the bo is not primary genirq: Fix race in register_irq_proc() x86/efi: Fix boot crash by mapping EFI memmap entries bottom-up at runtime, instead of top-down KVM: nSVM: Check for NRIPS support before updating control field Use WARN_ON_ONCE for missing X86_FEATURE_NRIPS mm: hugetlbfs: skip shared VMAs when unmapping private pages to satisfy a fault drm/dp/mst: fixup handling hotplug on port removal. drm/dp/mst: drop cancel work sync in the mstb destroy path (v2) x86/kexec: Fix kexec crash in syscall kexec_file_load() x86/mm: Set NX on gap between __ex_table and rodata md/raid0: update queue parameter in a safer location. md/raid0: apply base queue limits *before* disk_stack_limits arm64: ftrace: fix function_graph tracer panic clocksource: Fix abs() usage w/ 64bit values dmaengine: dw: properly read DWC_PARAMS register mm/slab: fix unexpected index mapping result of kmalloc_size(INDEX_NODE+1) regmap: debugfs: Ensure we don't underflow when printing access masks regmap: debugfs: Don't bother actually printing when calculating max length mtd: nand: sunxi: fix OOB handling in ->write_xxx() functions mtd: nand: sunxi: fix sunxi_nand_chips_cleanup() ARM: dts: fix usb pin control for imx-rex dts ASoC: db1200: Fix DAI link format for db1300 and db1550 x86/xen: Support kexec/kdump in HVM guests by doing a soft reset x86/xen: Do not clip xen_e820_map to xen_e820_map_entries when sanitizing map s390/boot/decompression: disable floating point in decompressor svcrdma: handle rdma read with a non-zero initial page offset ASoC: sgtl5000: fix wrong register MIC_BIAS_VOLTAGE setup on probe dm: fix AB-BA deadlock in __dm_destroy() [SMB3] Do not fall back to SMBWriteX in set_file_size error cases clk: ti: fix dual-registration of uart4_ick ASoC: dwc: correct irq clear method dm raid: fix round up of default region size ALSA: hda: Add dock support for ThinkPad T550 ALSA: hda - Apply SPDIF pin ctl to MacBookPro 12,1 USB: Add reset-resume quirk for two Plantronics usb headphones. usb: Add device quirk for Logitech PTZ cameras serial: 8250: add uart_config entry for PORT_RT2880 drivers/tty: require read access for controlling terminal staging: speakup: fix speakup-r regression ALSA: synth: Fix conflicting OSS device registration on AWE32 arm64: readahead: fault retry breaks mmap file read random detection ASoC: tas2552: Correct the Speaker Driver Playback Volume (PGA_GAIN) ASoC: tas2552: fix dBscale-min declaration sched/core: Fix TASK_DEAD race in finish_task_switch() dm cache: fix NULL pointer when switching from cleaner policy 3w-9xxx: don't unmap bounce buffered commands workqueue:
[Kernel-packages] [Bug 1516686] Re: linux: reduce stub delta to simplify review and fix rebuild test
** Changed in: linux (Ubuntu Vivid) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1516686 Title: linux: reduce stub delta to simplify review and fix rebuild test Status in linux package in Ubuntu: Invalid Status in linux source package in Precise: Fix Committed Status in linux source package in Trusty: Fix Committed Status in linux source package in Vivid: Fix Committed Status in linux source package in Wily: In Progress Bug description: We emit a lot of unnecessary delta to debian files, caused by ordering issues and lack of general clenliness. Backport these fixes from v/w/x to make all series consistant. Also fix rebuild test to not fire if triggered for the kernel which just built. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1516686/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1513980] Re: Ubuntu 14.04.03 did not detect Link down on Houston CU network adapter ports when cable pulled
** Changed in: linux (Ubuntu Vivid) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1513980 Title: Ubuntu 14.04.03 did not detect Link down on Houston CU network adapter ports when cable pulled Status in linux package in Ubuntu: Fix Released Status in linux source package in Vivid: Fix Committed Status in linux source package in Wily: Fix Released Status in linux source package in Xenial: Fix Released Bug description: Problem Description: I installed Houston CU (feature code 2CC1) PCIe2 10GbE SFP+ CU 4-port Converged Network Adapter in slot P1-C2 of tul117fp1 system. The system is configured as PowerNV and running Ubuntu 14.04.03 - I configured 2 copper ports of the adapter and running network stress on it for several hours. I then pulled cable and waited for sometime. - The OS did not detect the link down. Even though the TX/RX traffic stopped on the ports. - Kernel log and dmesg did not have any entry to indicate link down after cable pulled. 0007:00:00.0 PCI bridge: IBM Device 03dc 0007:01:00.0 Ethernet controller: Emulex Corporation OneConnect NIC (Lancer) (rev 10) 0007:01:00.1 Ethernet controller: Emulex Corporation OneConnect NIC (Lancer) (rev 10) 0007:01:00.2 Ethernet controller: Emulex Corporation OneConnect NIC (Lancer) (rev 10) 0007:01:00.3 Ethernet controller: Emulex Corporation OneConnect NIC (Lancer) (rev 10) 0007:01:00.4 Fibre Channel: Emulex Corporation OneConnect FCoE Initiator (Lancer) (rev 10) 0007:01:00.5 Fibre Channel: Emulex Corporation OneConnect FCoE Initiator (Lancer) (rev 10) - ifconfig -a cmd still show link up eth43 Link encap:Ethernet HWaddr 00:90:fa:6e:e0:f2 inet addr:103.1.1.15 Bcast:103.1.1.255 Mask:255.255.255.0 UP BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:7543074880 errors:1 dropped:9 overruns:0 frame:1 TX packets:5926170683 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:8997647070924 (8.9 TB) TX bytes:7177651764733 (7.1 TB) eth44 Link encap:Ethernet HWaddr 00:90:fa:6e:e0:f3 inet addr:103.1.2.15 Bcast:103.1.2.255 Mask:255.255.255.0 UP BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:5926170613 errors:1 dropped:0 overruns:0 frame:1 TX packets:7543089239 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:7488707854629 (7.4 TB) TX bytes:8619256135370 (8.6 TB) Paul, looking at the source code for the driver in Ubuntu 14.04.3 the driver doesn't log any messages after an update to the link status. The following commit upstream adds this functionality: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=18824894dbec3eb2202fc92d52a0c8bd27c8a63f I'll create a test kernel with this patch applied and will attach it here so you can test this commit - I installed Ubuntu patched kernel - I setup and re-ran the test on Houston adapter. I verified that with the patch link Up/Down events now get logged properly when cable pulls. I verified the patch and it fixed the problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1513980/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1498862] Re: autopkgtest: rebuild test should not run when testing ourselves
** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Vivid) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1498862 Title: autopkgtest: rebuild test should not run when testing ourselves Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Committed Status in linux source package in Vivid: Fix Committed Status in linux source package in Wily: Fix Released Bug description: We have a rebuild test which is intended to confirm the kernel still builds when core-utils, gcc, ld etc change. It makes no sense for this test to run for the kernel itself as it takes a very long time to run and we have literally just built the kernel with those tools. Check for the trigger being something other than the kernel packages themselves before doing the rebuild. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1498862/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522766] Re: cryptsetup hangs after kernel upgrade to 3.13.0-72.115
Tested with the kernel from comment #1 and cryptsetup does work with that. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522766 Title: cryptsetup hangs after kernel upgrade to 3.13.0-72.115 Status in linux package in Ubuntu: Triaged Bug description: After upgrading to the proposed kernel for Trusty (3.13.0-72.115) I cannot unlock a luks formatted usb drive. The cryptsetup process seems to hang with the following stack: [] __synchronize_srcu+0xfe/0x180 [] synchronize_srcu+0x1d/0x20 [] __dm_destroy+0x117/0x290 [] dm_destroy+0x13/0x20 [] dev_remove+0xde/0x120 [] ctl_ioctl+0x255/0x500 [] dm_ctl_ioctl+0x13/0x20 [] do_vfs_ioctl+0x2e0/0x4c0 [] SyS_ioctl+0x81/0xa0 [] system_call_fastpath+0x1a/0x1f [] 0x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522766/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522094] UdevLog.txt
apport information ** Attachment added: "UdevLog.txt" https://bugs.launchpad.net/bugs/1522094/+attachment/4529560/+files/UdevLog.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522094 Title: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts- vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() Status in linux package in Ubuntu: Confirmed Bug description: When I connect a monitor the VGA port on the laptop - this is found in dmesg, and some of the kernel modules linked in become unstable [ btrfs for instance, if it's in use]. [2.962400] [ cut here ] [2.962424] WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() [2.962425] SPLL already enabled [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp pps_core pata_acpi wmi sdhci_acpi video sdhci [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic #42~14.04.1-Ubuntu [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 05/19/2015 [2.962439] c02fd7f8 880220d23ab8 817af92b 3a7a [2.962440] 880220d23b08 880220d23af8 81074e0a 0046 [2.962442] 880035fb 88003615eb60 880035f8f400 88003615e800 [2.962444] Call Trace: [2.962449] [] dump_stack+0x45/0x57 [2.962452] [] warn_slowpath_common+0x8a/0xc0 [2.962453] [] warn_slowpath_fmt+0x46/0x50 [2.962464] [] hsw_crt_pre_enable+0x7f/0x90 [i915] [2.962475] [] haswell_crtc_enable+0x3fc/0xaf0 [i915] [2.962485] [] __intel_set_mode+0x872/0xc60 [i915] [2.962495] [] intel_crtc_set_config+0x9e2/0xf60 [i915] [2.962506] [] drm_mode_set_config_internal+0x6f/0x110 [drm] [2.962511] [] restore_fbdev_mode+0xc8/0xf0 [drm_kms_helper] [2.962515] [] drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper] [2.962525] [] intel_fbdev_restore_mode+0x1e/0x50 [i915] [2.962536] [] i915_driver_lastclose+0xe/0x20 [i915] [2.962541] [] drm_lastclose+0x2e/0x130 [drm] [2.962546] [] drm_release+0x338/0x540 [drm] [2.962549] [] __fput+0xe7/0x220 [2.962551] [] fput+0xe/0x10 [2.962553] [] task_work_run+0xac/0xd0 [2.962556] [] do_notify_resume+0x97/0xb0 [2.962558] [] int_signal+0x12/0x17 [2.962559] ---[ end trace b6b778d930eaeda7 ]--- This is the lts-vivid kernel. downgrading to the lts-utopic kernel fixes the issue. I tried the wily-lts, same issue. I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel- ppa : linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works fine! :) --- ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jcat 2559 F pulseaudio /dev/snd/controlC1: jcat 2559 F pulseaudio CurrentDesktop: GNOME DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f InstallationDate: Installed on 2015-11-25 (8 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) MachineType: Dell Inc. Latitude E6540 NonfreeKernelModules: fglrx Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-39-generic N/A linux-backports-modules-3.19.0-39-generic N/A linux-firmware 1.127.19 Tags: trusty Uname: Linux 3.19.0-39-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 05/19/2015 dmi.bios.vendor: Dell Inc. dmi.bios.version: A15 dmi.board.name: 0PXPYJ dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6540 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to :
[Kernel-packages] [Bug 1522094] ProcModules.txt
apport information ** Attachment added: "ProcModules.txt" https://bugs.launchpad.net/bugs/1522094/+attachment/4529556/+files/ProcModules.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522094 Title: WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts- vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() Status in linux package in Ubuntu: Confirmed Bug description: When I connect a monitor the VGA port on the laptop - this is found in dmesg, and some of the kernel modules linked in become unstable [ btrfs for instance, if it's in use]. [2.962400] [ cut here ] [2.962424] WARNING: CPU: 0 PID: 233 at /build/linux-lts-vivid-pTjnAT/linux-lts-vivid-3.19.0/drivers/gpu/drm/i915/intel_crt.c:145 hsw_crt_pre_enable+0x7f/0x90 [i915]() [2.962425] SPLL already enabled [2.962426] Modules linked in: uas usb_storage hid_generic usbhid hid i915 psmouse i2c_algo_bit e1000e drm_kms_helper ahci libahci sdhci_pci drm ptp pps_core pata_acpi wmi sdhci_acpi video sdhci [2.962437] CPU: 0 PID: 233 Comm: plymouthd Not tainted 3.19.0-37-generic #42~14.04.1-Ubuntu [2.962438] Hardware name: Dell Inc. Latitude E6540/0PXPYJ, BIOS A15 05/19/2015 [2.962439] c02fd7f8 880220d23ab8 817af92b 3a7a [2.962440] 880220d23b08 880220d23af8 81074e0a 0046 [2.962442] 880035fb 88003615eb60 880035f8f400 88003615e800 [2.962444] Call Trace: [2.962449] [] dump_stack+0x45/0x57 [2.962452] [] warn_slowpath_common+0x8a/0xc0 [2.962453] [] warn_slowpath_fmt+0x46/0x50 [2.962464] [] hsw_crt_pre_enable+0x7f/0x90 [i915] [2.962475] [] haswell_crtc_enable+0x3fc/0xaf0 [i915] [2.962485] [] __intel_set_mode+0x872/0xc60 [i915] [2.962495] [] intel_crtc_set_config+0x9e2/0xf60 [i915] [2.962506] [] drm_mode_set_config_internal+0x6f/0x110 [drm] [2.962511] [] restore_fbdev_mode+0xc8/0xf0 [drm_kms_helper] [2.962515] [] drm_fb_helper_restore_fbdev_mode_unlocked+0x29/0x80 [drm_kms_helper] [2.962525] [] intel_fbdev_restore_mode+0x1e/0x50 [i915] [2.962536] [] i915_driver_lastclose+0xe/0x20 [i915] [2.962541] [] drm_lastclose+0x2e/0x130 [drm] [2.962546] [] drm_release+0x338/0x540 [drm] [2.962549] [] __fput+0xe7/0x220 [2.962551] [] fput+0xe/0x10 [2.962553] [] task_work_run+0xac/0xd0 [2.962556] [] do_notify_resume+0x97/0xb0 [2.962558] [] int_signal+0x12/0x17 [2.962559] ---[ end trace b6b778d930eaeda7 ]--- This is the lts-vivid kernel. downgrading to the lts-utopic kernel fixes the issue. I tried the wily-lts, same issue. I've also tried to recent kernels in http://kernel.ubuntu.com/~kernel- ppa : linux-image-4.3.0-040300-generic_4.3.0-040300 is still broken linux-image-4.4.0-040400rc3-generic_4.4.0-040400rc3.201511300321 works fine! :) --- ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: jcat 2559 F pulseaudio /dev/snd/controlC1: jcat 2559 F pulseaudio CurrentDesktop: GNOME DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=b338325d-c293-4b5b-ab0a-542a7f02236f InstallationDate: Installed on 2015-11-25 (8 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) MachineType: Dell Inc. Latitude E6540 NonfreeKernelModules: fglrx Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.19.0-39-generic.efi.signed root=UUID=8c468c94-323c-4526-b3a2-e1eddacbed42 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.19.0-39.44~14.04.1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-39-generic N/A linux-backports-modules-3.19.0-39-generic N/A linux-firmware 1.127.19 Tags: trusty Uname: Linux 3.19.0-39-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 05/19/2015 dmi.bios.vendor: Dell Inc. dmi.bios.version: A15 dmi.board.name: 0PXPYJ dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA15:bd05/19/2015:svnDellInc.:pnLatitudeE6540:pvr01:rvnDellInc.:rn0PXPYJ:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6540 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522094/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to :
[Kernel-packages] [Bug 1522108] fozzie (amd64) - tests ran: 194, failed: 0
tests ran: 194, failed: 0; http://kernel.ubuntu.com/testing/4.2.0-21.25/fozzie__4.2.0-21.25__2015-12-04_09-35-00/results-index.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522108 Title: linux: 4.2.0-21.25 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Incomplete Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux package in Ubuntu: Invalid Status in linux source package in Wily: Confirmed Bug description: This bug is for tracking the 4.2.0-21.25 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 17:43 UTC kernel-stable-Prepare-package-end:Thursday, 03. December 2015 11:34 UTC kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 11:34 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 16:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Thursday, 03. December 2015 17:01 UTC kernel-stable-Verification-testing-start:Thursday, 03. December 2015 17:01 UTC kernel-stable-Certification-testing-start:Thursday, 03. December 2015 17:01 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 17:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 03. December 2015 17:01 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 08:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522108/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522421] bantam (amd64) - tests ran: 182, failed: 0
tests ran: 182, failed: 0; http://kernel.ubuntu.com/testing/4.3.0-1.10/bantam__4.3.0-1.10__2015-12-04_07-23-00/results-index.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522421 Title: linux: 4.3.0-1.10 -proposed tracker Status in Kernel Development Workflow: In Progress Status in Kernel Development Workflow automated-testing series: Incomplete Status in Kernel Development Workflow prepare-package series: Fix Released Status in Kernel Development Workflow prepare-package-meta series: Fix Released Status in Kernel Development Workflow prepare-package-signed series: Fix Released Status in Kernel Development Workflow promote-to-proposed series: Fix Released Status in Kernel Development Workflow promote-to-release series: New Status in linux package in Ubuntu: New Status in linux source package in Xenial: New Bug description: This bug is for tracking the 4.3.0-1.10 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Thursday, 03. December 2015 13:53 UTC kernel-phase-changed:Thursday, 03. December 2015 13:53 UTC kernel-phase:Prepare kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 14:00 UTC proposed-announcement-sent:True To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-development-workflow/+bug/1522421/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1521942] Re: linux-lts-utopic: 3.16.0-56.75~14.04.1 -proposed tracker
** Description changed: This bug is for tracking the 3.16.0-56.75~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 10:13 UTC kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 20:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 20:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Thursday, 03. December 2015 15:03 UTC kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:03 UTC kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:03 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:03 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:03 UTC + kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-utopic in Ubuntu. https://bugs.launchpad.net/bugs/1521942 Title: linux-lts-utopic: 3.16.0-56.75~14.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-utopic source package in Trusty: New Bug description: This bug is for tracking the 3.16.0-56.75~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 10:13 UTC kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 20:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 20:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Thursday, 03. December 2015 15:03 UTC kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:03 UTC kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:03 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:03 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:03 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521942/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522124] Re: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker
** Description changed: This bug is for tracking the 3.13.0-72.115~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC kernel-stable-master-bug:1521979 kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC + kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1522124 Title: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Confirmed Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: New Bug description: This bug is for tracking the 3.13.0-72.115~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC kernel-stable-master-bug:1521979 kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522124] Re: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker
Here's the relevant information: precise linux-lts-trusty 3.13.0-72.115~precise1 REGR summary Please verify test results in http://people.canonical.com/~kernel/status /adt-matrix/overall.txt ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1522124 Title: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Incomplete Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: New Bug description: This bug is for tracking the 3.13.0-72.115~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC kernel-stable-master-bug:1521979 kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522766] Re: cryptsetup hangs after kernel upgrade to 3.13.0-72.115
Looks like this kernel has a bad backport of upstream commit 2a708cff93f1 ("dm: fix AB-BA deadlock in __dm_destroy()"). To confirm this, I've uploaded a test kernel with this backport reverted: http://people.canonical.com/~henrix/lp1522766/v1/ -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522766 Title: cryptsetup hangs after kernel upgrade to 3.13.0-72.115 Status in linux package in Ubuntu: Triaged Bug description: After upgrading to the proposed kernel for Trusty (3.13.0-72.115) I cannot unlock a luks formatted usb drive. The cryptsetup process seems to hang with the following stack: [] __synchronize_srcu+0xfe/0x180 [] synchronize_srcu+0x1d/0x20 [] __dm_destroy+0x117/0x290 [] dm_destroy+0x13/0x20 [] dev_remove+0xde/0x120 [] ctl_ioctl+0x255/0x500 [] dm_ctl_ioctl+0x13/0x20 [] do_vfs_ioctl+0x2e0/0x4c0 [] SyS_ioctl+0x81/0xa0 [] system_call_fastpath+0x1a/0x1f [] 0x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522766/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522421] fozzie (i386) - tests ran: 155, failed: 0
tests ran: 155, failed: 0; http://kernel.ubuntu.com/testing/4.3.0-1.10/fozzie__4.3.0-1.10__2015-12-04_07-09-00/results-index.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522421 Title: linux: 4.3.0-1.10 -proposed tracker Status in Kernel Development Workflow: In Progress Status in Kernel Development Workflow automated-testing series: Incomplete Status in Kernel Development Workflow prepare-package series: Fix Released Status in Kernel Development Workflow prepare-package-meta series: Fix Released Status in Kernel Development Workflow prepare-package-signed series: Fix Released Status in Kernel Development Workflow promote-to-proposed series: Fix Released Status in Kernel Development Workflow promote-to-release series: New Status in linux package in Ubuntu: New Status in linux source package in Xenial: New Bug description: This bug is for tracking the 4.3.0-1.10 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Thursday, 03. December 2015 13:53 UTC kernel-phase-changed:Thursday, 03. December 2015 13:53 UTC kernel-phase:Prepare kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 14:00 UTC proposed-announcement-sent:True To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-development-workflow/+bug/1522421/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522124] Re: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1522124 Title: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Confirmed Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: New Bug description: This bug is for tracking the 3.13.0-72.115~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC kernel-stable-master-bug:1521979 kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522421] onza (amd64) - tests ran: 185, failed: 3
tests ran: 185, failed: 3; http://kernel.ubuntu.com/testing/4.3.0-1.10/onza__4.3.0-1.10__2015-12-04_07-47-00/results-index.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522421 Title: linux: 4.3.0-1.10 -proposed tracker Status in Kernel Development Workflow: In Progress Status in Kernel Development Workflow automated-testing series: Incomplete Status in Kernel Development Workflow prepare-package series: Fix Released Status in Kernel Development Workflow prepare-package-meta series: Fix Released Status in Kernel Development Workflow prepare-package-signed series: Fix Released Status in Kernel Development Workflow promote-to-proposed series: Fix Released Status in Kernel Development Workflow promote-to-release series: New Status in linux package in Ubuntu: New Status in linux source package in Xenial: New Bug description: This bug is for tracking the 4.3.0-1.10 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Thursday, 03. December 2015 13:53 UTC kernel-phase-changed:Thursday, 03. December 2015 13:53 UTC kernel-phase:Prepare kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 14:00 UTC proposed-announcement-sent:True To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-development-workflow/+bug/1522421/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1220194] Re: CVE-2013-2891
** Also affects: linux (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: Undecided Status: Won't Fix ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Undecided Status: Won't Fix ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-mako (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-manta (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-flo (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-wily (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Fix Committed ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => Low -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1220194 Title: CVE-2013-2891 Status in linux package in Ubuntu: Invalid Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-flo package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-goldfish package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: Won't Fix Status in linux-lts-backport-natty package in Ubuntu: Won't Fix Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: New Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-wily package in Ubuntu: Invalid Status in linux-mako package in Ubuntu: Invalid Status in linux-manta package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-raspi2 package in Ubuntu: Fix Committed Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-lts-backport-maverick source package in Lucid: Won't Fix Status in linux-lts-backport-natty source package in Lucid: Won't Fix Status in linux source package in Precise: Invalid Status in linux-armadaxp source package in Precise: Invalid Status in linux-ec2 source package in Precise: Invalid Status in linux-flo source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-goldfish source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: Won't Fix Status in linux-lts-backport-natty source package in Precise: Won't Fix Status in linux-lts-quantal source package in Precise: Invalid Status in linux-lts-raring source package in Precise: Won't Fix Status in linux-lts-saucy source package in Precise: New Status in linux-lts-trusty source package in Precise: Invalid Status in linux-lts-utopic source package in Precise: Invalid Status in linux-lts-vivid source package in Precise: Invalid Status in linux-lts-wily source package in Precise: Invalid Status in linux-mako source package in Precise: Invalid Status in linux-manta source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: Invalid Status in linux-raspi2 source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Quantal: Won't Fix Status in linux-lts-backport-natty source package in Quantal: Won't
[Kernel-packages] [Bug 1522124] dwalin (amd64) - tests ran: 2, failed: 0
tests ran: 2, failed: 0; http://kernel.ubuntu.com/testing/3.13.0-72.115~precise1/dwalin__3.13.0-72.115~precise1__2015-12-04_07-49-00/results-index.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1522124 Title: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Confirmed Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: New Bug description: This bug is for tracking the 3.13.0-72.115~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC kernel-stable-master-bug:1521979 kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522108] Re: linux: 4.2.0-21.25 -proposed tracker
** Description changed: This bug is for tracking the 4.2.0-21.25 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 17:43 UTC kernel-stable-Prepare-package-end:Thursday, 03. December 2015 11:34 UTC kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 11:34 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 16:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Thursday, 03. December 2015 17:01 UTC kernel-stable-Verification-testing-start:Thursday, 03. December 2015 17:01 UTC kernel-stable-Certification-testing-start:Thursday, 03. December 2015 17:01 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 17:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 03. December 2015 17:01 UTC + kernel-stable-Security-signoff-end:Friday, 04. December 2015 08:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522108 Title: linux: 4.2.0-21.25 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Incomplete Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux package in Ubuntu: Invalid Status in linux source package in Wily: Confirmed Bug description: This bug is for tracking the 4.2.0-21.25 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 17:43 UTC kernel-stable-Prepare-package-end:Thursday, 03. December 2015 11:34 UTC kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 11:34 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 16:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Thursday, 03. December 2015 17:01 UTC kernel-stable-Verification-testing-start:Thursday, 03. December 2015 17:01 UTC kernel-stable-Certification-testing-start:Thursday, 03. December 2015 17:01 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 17:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 03. December 2015 17:01 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 08:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522108/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1220192] Re: CVE-2013-2890
** Also affects: linux (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: Undecided Status: Won't Fix ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Undecided Status: Won't Fix ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-mako (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-manta (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-flo (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: Low Status: Invalid ** Also affects: linux-lts-wily (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => Low ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Fix Committed ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => Low -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1220192 Title: CVE-2013-2890 Status in linux package in Ubuntu: Invalid Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-flo package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-goldfish package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: Won't Fix Status in linux-lts-backport-natty package in Ubuntu: Won't Fix Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: New Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-wily package in Ubuntu: Invalid Status in linux-mako package in Ubuntu: Invalid Status in linux-manta package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-raspi2 package in Ubuntu: Fix Committed Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-lts-backport-maverick source package in Lucid: Won't Fix Status in linux-lts-backport-natty source package in Lucid: Won't Fix Status in linux source package in Precise: Invalid Status in linux-armadaxp source package in Precise: Invalid Status in linux-ec2 source package in Precise: Invalid Status in linux-flo source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-goldfish source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: Won't Fix Status in linux-lts-backport-natty source package in Precise: Won't Fix Status in linux-lts-quantal source package in Precise: Invalid Status in linux-lts-raring source package in Precise: Won't Fix Status in linux-lts-saucy source package in Precise: New Status in linux-lts-trusty source package in Precise: Invalid Status in linux-lts-utopic source package in Precise: Invalid Status in linux-lts-vivid source package in Precise: Invalid Status in linux-lts-wily source package in Precise: Invalid Status in linux-mako source package in Precise: Invalid Status in linux-manta source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: Invalid Status in linux-raspi2 source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Quantal: Won't Fix Status in linux-lts-backport-natty source package in Quantal: Won't
[Kernel-packages] [Bug 1185990] Re: CVE-2013-2850
** Also affects: linux (Ubuntu Xenial) Importance: High Status: Fix Released ** Also affects: linux-fsl-imx51 (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-mvl-dove (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-ec2 (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-ti-omap4 (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-backport-maverick (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-backport-natty (Ubuntu Xenial) Importance: Undecided Status: Invalid ** Also affects: linux-lts-backport-oneiric (Ubuntu Xenial) Importance: Undecided Status: Invalid ** Also affects: linux-armadaxp (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-quantal (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-raring (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-saucy (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-mako (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-manta (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-goldfish (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-flo (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-utopic (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-vivid (Ubuntu Xenial) Importance: High Status: Invalid ** Also affects: linux-lts-wily (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: linux-raspi2 (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux-lts-wily (Ubuntu Xenial) Status: New => Invalid ** Changed in: linux-lts-wily (Ubuntu Xenial) Importance: Undecided => High ** Changed in: linux-raspi2 (Ubuntu Xenial) Status: New => Fix Committed ** Changed in: linux-raspi2 (Ubuntu Xenial) Importance: Undecided => High -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1185990 Title: CVE-2013-2850 Status in linux package in Ubuntu: Fix Released Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-flo package in Ubuntu: Invalid Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-goldfish package in Ubuntu: Invalid Status in linux-lts-backport-maverick package in Ubuntu: Invalid Status in linux-lts-backport-natty package in Ubuntu: Invalid Status in linux-lts-backport-oneiric package in Ubuntu: Invalid Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: New Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-wily package in Ubuntu: Invalid Status in linux-mako package in Ubuntu: Invalid Status in linux-manta package in Ubuntu: Invalid Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-raspi2 package in Ubuntu: Fix Committed Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-lts-backport-maverick source package in Lucid: Invalid Status in linux-lts-backport-natty source package in Lucid: Invalid Status in linux-lts-backport-oneiric source package in Lucid: Invalid Status in linux source package in Precise: Fix Released Status in linux-armadaxp source package in Precise: Fix Released Status in linux-ec2 source package in Precise: Invalid Status in linux-flo source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-goldfish source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: Invalid Status in linux-lts-backport-natty source package in Precise: Invalid Status in linux-lts-backport-oneiric source package in Precise: Invalid Status in linux-lts-quantal source package in Precise: Fix Released Status in linux-lts-raring source package in Precise: Fix Released Status in linux-lts-saucy source package in Precise: New Status in linux-lts-trusty source package in Precise: Invalid Status in linux-lts-utopic source package in Precise: Invalid Status in linux-lts-vivid source package in Precise: Invalid Status in linux-lts-wily source package in Precise: Invalid Status in linux-mako source package in Precise: Invalid Status in linux-manta source package in
[Kernel-packages] [Bug 1522124] dwalin (i386) - tests ran: 2, failed: 0
tests ran: 2, failed: 0; http://kernel.ubuntu.com/testing/3.13.0-72.115~precise1/dwalin__3.13.0-72.115~precise1__2015-12-04_08-34-00/results-index.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1522124 Title: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Confirmed Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: In Progress Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: New Bug description: This bug is for tracking the 3.13.0-72.115~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC kernel-stable-master-bug:1521979 kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1520641] Re: linux: 3.19.0-38.43 -proposed tracker
*** This bug is a duplicate of bug 1521630 *** https://bugs.launchpad.net/bugs/1521630 This bug was fixed in the package linux - 3.19.0-39.44 --- linux (3.19.0-39.44) vivid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1521630 [ Upstream Kernel Changes ] * fib_rules: Fix dump_rules() not to exit early - LP: #1514785 linux (3.19.0-38.43) vivid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1520641 [ danielepa ] * SAUCE: usb: cdc-acm: blacklist VID/PID 0x058b/0x0041 device - LP: #1520147 * SAUCE: usb: usb-serial-simple: add 0x058b/0x0041 device - LP: #1520147 -- Luis HenriquesTue, 01 Dec 2015 12:22:47 + ** Changed in: linux (Ubuntu Vivid) Status: New => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1520641 Title: linux: 3.19.0-38.43 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Incomplete Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux package in Ubuntu: Invalid Status in linux source package in Vivid: Fix Released Bug description: This bug is for tracking the 3.19.0-38.43 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Friday, 27. November 2015 16:09 UTC kernel-stable-Prepare-package-end:Saturday, 28. November 2015 02:03 UTC kernel-stable-Promote-to-proposed-start:Saturday, 28. November 2015 02:03 UTC kernel-stable-Promote-to-proposed-end:Monday, 30. November 2015 19:07 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Monday, 30. November 2015 21:01 UTC kernel-stable-Verification-testing-start:Monday, 30. November 2015 21:01 UTC kernel-stable-Certification-testing-start:Monday, 30. November 2015 21:01 UTC kernel-stable-Security-signoff-start:Monday, 30. November 2015 21:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Monday, 30. November 2015 21:01 UTC kernel-stable-Security-signoff-end:Tuesday, 01. December 2015 09:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1520641/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522124] Re: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker
We are respinning this kernel due to a regression. ** Changed in: kernel-sru-workflow/certification-testing Status: Confirmed => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1522124 Title: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Incomplete Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: New Bug description: This bug is for tracking the 3.13.0-72.115~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC kernel-stable-master-bug:1521979 kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1514785] Re: kernel 3.16.0.52+53 - ip rule repeats all default rules (messing up rule table)
This bug was fixed in the package linux - 3.19.0-39.44 --- linux (3.19.0-39.44) vivid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1521630 [ Upstream Kernel Changes ] * fib_rules: Fix dump_rules() not to exit early - LP: #1514785 linux (3.19.0-38.43) vivid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1520641 [ danielepa ] * SAUCE: usb: cdc-acm: blacklist VID/PID 0x058b/0x0041 device - LP: #1520147 * SAUCE: usb: usb-serial-simple: add 0x058b/0x0041 device - LP: #1520147 -- Luis HenriquesTue, 01 Dec 2015 12:22:47 + ** Changed in: linux (Ubuntu Vivid) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Vivid) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1514785 Title: kernel 3.16.0.52+53 - ip rule repeats all default rules (messing up rule table) Status in linux package in Ubuntu: Confirmed Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux source package in Trusty: Fix Released Status in linux-lts-utopic source package in Trusty: Fix Released Status in linux source package in Vivid: Fix Released Bug description: Kernel breaks PBR routing on several versions. Problem occurs on server and desktop. Example using linux-image-3.13.0-70 lsb_release: Ubutu 14.04.3 LTS Release 14.04 Expected: To have the normal rule table when using 'ip rule show' 0: from all lookup local 32766: from all lookup main 32767: from all lookup default Instead: The 'ip rule show' command is messed up showing lots of repeated rules for local/main/default (did not count them - simply too much) A sec prob in my case as it is making policy based routing useless if you need to grep whether your rule exists already. Workaraound, go back to/remain on either of these series: 3.13.0-68 3.16.0.51 3.19.0-33 Confirmed working after the fix (see below messages) 3.13.0-71.114 3.16.0-55.74 3.19.0-39.44 PBR NOT working on: 3.13.0-69 3.13.0-70 3.16.0-52 3.16.0-53 3.19.0-37 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1514785/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522421] Re: linux: 4.3.0-1.10 -proposed tracker
** Tags removed: block-proposed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522421 Title: linux: 4.3.0-1.10 -proposed tracker Status in Kernel Development Workflow: In Progress Status in Kernel Development Workflow automated-testing series: Incomplete Status in Kernel Development Workflow prepare-package series: Fix Released Status in Kernel Development Workflow prepare-package-meta series: Fix Released Status in Kernel Development Workflow prepare-package-signed series: Fix Released Status in Kernel Development Workflow promote-to-proposed series: Fix Released Status in Kernel Development Workflow promote-to-release series: New Status in linux package in Ubuntu: New Status in linux source package in Xenial: New Bug description: This bug is for tracking the 4.3.0-1.10 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Thursday, 03. December 2015 13:53 UTC kernel-phase-changed:Thursday, 03. December 2015 13:53 UTC kernel-phase:Prepare kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 14:00 UTC proposed-announcement-sent:True To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-development-workflow/+bug/1522421/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1520651] Re: 10de:03ef [ASRock N68-GS4/USB3 FX] Networking and ACPI conflicts
Christopher, I'm a bit confused here. Didn't I do the upstream testing as you requested? Following your instructions exactly? Now, are you suggesting that "the issue you are reporting is an upstream one", well of course it is. You asked me to do it that way, and I obliged. As much fun as it has been getting involved in this testing and bug reports, the real reason, I made my initial report was that I have an unusable PC. I was hoping someone could suggest a practical work-around. Someone with knowledge of the new kernels who can tell me how to adapt the old work-arounds that I referenced to the current system? Is there anyone out there that can help me with that? I can see that no-one is able or willing to help me with that, so: I will unable to do any further testing on this issue as the PC is now packaged up and ready to dispatch back to the supplier, who has generously agreed to replace the motherboard for me. I note that this is an increasing problem with newer motherboards especially USB 3 ready ones. I hope that this issue is addressed soon or UBUNTU may seriously loose popularity as it will be unusable to an increasing number of new motherboard owners. Thank you for your help to date. What shall I do with this thread now? Close it down? Mike -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1520651 Title: 10de:03ef [ASRock N68-GS4/USB3 FX] Networking and ACPI conflicts Status in linux package in Ubuntu: Triaged Bug description: My on-board networking doesn't work, and trying to restart or shutdown the computer freezes the system. With an older 12.04 kernel, 3.2.0-23.36, there were two workarounds. https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1003297 WORKAROUND: Boot into rescue mode, drop to the terminal, run "rmmod forcedeth" then "modprobe forcedeth msi=0 msix=0" then resume a normal boot. This enabled both networking and regular ACPI functions. This needs to be repeated at every start up and several graphics drivers do not function well until the next normal boot. --- ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: taff 2383 F pulseaudio CurrentDesktop: Unity DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=UUID=3707218c-3355-4bdb-a631-69aee3520e51 InstallationDate: Installed on 2015-11-25 (5 days ago) InstallationMedia: Ubuntu 14.04.3 LTS "Trusty Tahr" - Beta amd64 (20150805) Lsusb: Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 004 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub MachineType: To Be Filled By O.E.M. To Be Filled By O.E.M. Package: linux (not installed) ProcFB: ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-25-generic root=UUID=c6fdfec8-75cf-427c-813d-c6b9dbff9919 ro recovery nomodeset ProcVersionSignature: Ubuntu 3.19.0-25.26~14.04.1-generic 3.19.8-ckt2 RelatedPackageVersions: linux-restricted-modules-3.19.0-25-generic N/A linux-backports-modules-3.19.0-25-generic N/A linux-firmware 1.127.18 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no Tags: trusty Uname: Linux 3.19.0-25-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 10/02/2014 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: P1.10 dmi.board.asset.tag: D050997CF5D0 dmi.board.name: N68-GS4/USB3 FX dmi.board.vendor: ASRock dmi.chassis.asset.tag: To Be Filled By O.E.M. dmi.chassis.type: 3 dmi.chassis.vendor: To Be Filled By O.E.M. dmi.chassis.version: To Be Filled By O.E.M. dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvrP1.10:bd10/02/2014:svnToBeFilledByO.E.M.:pnToBeFilledByO.E.M.:pvrToBeFilledByO.E.M.:rvnASRock:rnN68-GS4/USB3FX:rvr:cvnToBeFilledByO.E.M.:ct3:cvrToBeFilledByO.E.M.: dmi.product.name: To Be Filled By O.E.M. dmi.product.version: To Be Filled By O.E.M. dmi.sys.vendor: To Be Filled By O.E.M. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1520651/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1521875] Re: linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges (arges) ** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges (arges) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-vivid in Ubuntu. https://bugs.launchpad.net/bugs/1521875 Title: linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: In Progress Status in Kernel SRU Workflow promote-to-updates series: In Progress Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-vivid source package in Trusty: Fix Released Bug description: This bug is for tracking the 3.19.0-39.44~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 07:01 UTC kernel-stable-master-bug:1521630 kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 19:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 19:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:02 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 01:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:51 UTC kernel-stable-phase-changed:Friday, 04. December 2015 13:51 UTC kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:51 UTC kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:51 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521875/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1521875] Re: linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-39.44~14.04.1 --- linux-lts-vivid (3.19.0-39.44~14.04.1) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1521875 [ Upstream Kernel Changes ] * fib_rules: Fix dump_rules() not to exit early - LP: #1514785 linux (3.19.0-38.43) vivid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1520641 [ danielepa ] * SAUCE: usb: cdc-acm: blacklist VID/PID 0x058b/0x0041 device - LP: #1520147 * SAUCE: usb: usb-serial-simple: add 0x058b/0x0041 device - LP: #1520147 -- Luis HenriquesWed, 02 Dec 2015 09:28:31 + -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-vivid in Ubuntu. https://bugs.launchpad.net/bugs/1521875 Title: linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: In Progress Status in Kernel SRU Workflow promote-to-updates series: In Progress Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-vivid source package in Trusty: Fix Released Bug description: This bug is for tracking the 3.19.0-39.44~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 07:01 UTC kernel-stable-master-bug:1521630 kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 19:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 19:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:02 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 01:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:51 UTC kernel-stable-phase-changed:Friday, 04. December 2015 13:51 UTC kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:51 UTC kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:51 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521875/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1521875] Re: linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker
This bug was fixed in the package linux-lts-vivid - 3.19.0-39.44~14.04.1 --- linux-lts-vivid (3.19.0-39.44~14.04.1) trusty; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1521875 [ Upstream Kernel Changes ] * fib_rules: Fix dump_rules() not to exit early - LP: #1514785 linux (3.19.0-38.43) vivid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1520641 [ danielepa ] * SAUCE: usb: cdc-acm: blacklist VID/PID 0x058b/0x0041 device - LP: #1520147 * SAUCE: usb: usb-serial-simple: add 0x058b/0x0041 device - LP: #1520147 -- Luis HenriquesWed, 02 Dec 2015 09:28:31 + ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New => Fix Released ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-vivid in Ubuntu. https://bugs.launchpad.net/bugs/1521875 Title: linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: In Progress Status in Kernel SRU Workflow promote-to-updates series: In Progress Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-vivid source package in Trusty: Fix Released Bug description: This bug is for tracking the 3.19.0-39.44~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 07:01 UTC kernel-stable-master-bug:1521630 kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 19:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 19:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:02 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 01:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:51 UTC kernel-stable-phase-changed:Friday, 04. December 2015 13:51 UTC kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:51 UTC kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:51 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521875/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522766] Re: cryptsetup hangs after kernel upgrade to 3.13.0-72.115
** Changed in: linux (Ubuntu Trusty) Status: Triaged => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522766 Title: cryptsetup hangs after kernel upgrade to 3.13.0-72.115 Status in linux package in Ubuntu: Triaged Status in linux source package in Trusty: Fix Committed Bug description: After upgrading to the proposed kernel for Trusty (3.13.0-72.115) I cannot unlock a luks formatted usb drive. The cryptsetup process seems to hang with the following stack: [] __synchronize_srcu+0xfe/0x180 [] synchronize_srcu+0x1d/0x20 [] __dm_destroy+0x117/0x290 [] dm_destroy+0x13/0x20 [] dev_remove+0xde/0x120 [] ctl_ioctl+0x255/0x500 [] dm_ctl_ioctl+0x13/0x20 [] do_vfs_ioctl+0x2e0/0x4c0 [] SyS_ioctl+0x81/0xa0 [] system_call_fastpath+0x1a/0x1f [] 0x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522766/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1521630] Re: linux: 3.19.0-39.44 -proposed tracker
This bug was fixed in the package linux - 3.19.0-39.44 --- linux (3.19.0-39.44) vivid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1521630 [ Upstream Kernel Changes ] * fib_rules: Fix dump_rules() not to exit early - LP: #1514785 linux (3.19.0-38.43) vivid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1520641 [ danielepa ] * SAUCE: usb: cdc-acm: blacklist VID/PID 0x058b/0x0041 device - LP: #1520147 * SAUCE: usb: usb-serial-simple: add 0x058b/0x0041 device - LP: #1520147 -- Luis HenriquesTue, 01 Dec 2015 12:22:47 + ** Changed in: linux (Ubuntu Vivid) Status: New => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1521630 Title: linux: 3.19.0-39.44 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: In Progress Status in Kernel SRU Workflow promote-to-updates series: In Progress Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Vivid: Fix Released Bug description: This bug is for tracking the 3.19.0-39.44 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 01. December 2015 13:44 UTC kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 07:03 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 07:03 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 02. December 2015 19:43 UTC kernel-stable-Verification-testing-start:Wednesday, 02. December 2015 21:01 UTC kernel-stable-Certification-testing-start:Wednesday, 02. December 2015 21:02 UTC kernel-stable-Security-signoff-start:Wednesday, 02. December 2015 21:02 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Wednesday, 02. December 2015 21:02 UTC kernel-stable-Security-signoff-end:Wednesday, 02. December 2015 22:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:50 UTC kernel-stable-phase-changed:Friday, 04. December 2015 13:50 UTC kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:49 UTC kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:50 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521630/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1514785] Re: kernel 3.16.0.52+53 - ip rule repeats all default rules (messing up rule table)
This bug was fixed in the package linux - 3.19.0-39.44 --- linux (3.19.0-39.44) vivid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1521630 [ Upstream Kernel Changes ] * fib_rules: Fix dump_rules() not to exit early - LP: #1514785 linux (3.19.0-38.43) vivid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1520641 [ danielepa ] * SAUCE: usb: cdc-acm: blacklist VID/PID 0x058b/0x0041 device - LP: #1520147 * SAUCE: usb: usb-serial-simple: add 0x058b/0x0041 device - LP: #1520147 -- Luis HenriquesTue, 01 Dec 2015 12:22:47 + -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1514785 Title: kernel 3.16.0.52+53 - ip rule repeats all default rules (messing up rule table) Status in linux package in Ubuntu: Confirmed Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux source package in Trusty: Fix Released Status in linux-lts-utopic source package in Trusty: Fix Released Status in linux source package in Vivid: Fix Released Bug description: Kernel breaks PBR routing on several versions. Problem occurs on server and desktop. Example using linux-image-3.13.0-70 lsb_release: Ubutu 14.04.3 LTS Release 14.04 Expected: To have the normal rule table when using 'ip rule show' 0: from all lookup local 32766: from all lookup main 32767: from all lookup default Instead: The 'ip rule show' command is messed up showing lots of repeated rules for local/main/default (did not count them - simply too much) A sec prob in my case as it is making policy based routing useless if you need to grep whether your rule exists already. Workaraound, go back to/remain on either of these series: 3.13.0-68 3.16.0.51 3.19.0-33 Confirmed working after the fix (see below messages) 3.13.0-71.114 3.16.0-55.74 3.19.0-39.44 PBR NOT working on: 3.13.0-69 3.13.0-70 3.16.0-52 3.16.0-53 3.19.0-37 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1514785/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1520147] Re: Support firmware update interface of WWAN module
This bug was fixed in the package linux - 3.19.0-39.44 --- linux (3.19.0-39.44) vivid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1521630 [ Upstream Kernel Changes ] * fib_rules: Fix dump_rules() not to exit early - LP: #1514785 linux (3.19.0-38.43) vivid; urgency=low [ Luis Henriques ] * Release Tracking Bug - LP: #1520641 [ danielepa ] * SAUCE: usb: cdc-acm: blacklist VID/PID 0x058b/0x0041 device - LP: #1520147 * SAUCE: usb: usb-serial-simple: add 0x058b/0x0041 device - LP: #1520147 -- Luis HenriquesTue, 01 Dec 2015 12:22:47 + ** Changed in: linux (Ubuntu Vivid) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1520147 Title: Support firmware update interface of WWAN module Status in linux package in Ubuntu: In Progress Status in linux source package in Vivid: Fix Released Bug description: Bus 001 Device 005: ID 413c:81ba Dell Computer Corp. Need to use usb-serial-simple instead of acm when the module is in firmware loading mode. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1520147/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1478799] Re: bluetooth not working in 15.10
Leonardos trick did not work for me. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bluez in Ubuntu. https://bugs.launchpad.net/bugs/1478799 Title: bluetooth not working in 15.10 Status in Linux: Unknown Status in bluez package in Ubuntu: Invalid Status in linux package in Ubuntu: Triaged Bug description: Ubuntu 15.10 Wily No bluetooth indicator visible. I can't activate bluetooth in the bluetooth system-settings. Bluetooth mouse not working (I can't pair it). syslog: Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: Starting SDP server Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: DIS cannot start: GATT is disabled Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: Failed to init deviceinfo plugin Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: Failed to init proximity plugin Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: Failed to init time plugin Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: Failed to init alert plugin Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: Failed to init thermometer plugin Jul 28 10:44:51 norbert-Aspire-5737Z NetworkManager[647]: VPN: loaded org.freedesktop.NetworkManager.pptp Jul 28 10:44:51 norbert-Aspire-5737Z NetworkManager[647]: DNS: loaded plugin dnsmasq Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: bluetoothd[677]: Starting SDP server Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: bluetoothd[677]: DIS cannot start: GATT is disabled Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: bluetoothd[677]: Failed to init deviceinfo plugin Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: bluetoothd[677]: Failed to init proximity plugin Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: bluetoothd[677]: Failed to init time plugin Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: bluetoothd[677]: Failed to init alert plugin Jul 28 10:44:51 norbert-Aspire-5737Z bluetoothd[677]: bluetoothd[677]: Failed to init thermometer plugin Jul 28 10:44:51 norbert-Aspire-5737Z avahi-daemon[680]: Successfully called chroot(). Jul 28 10:44:51 norbert-Aspire-5737Z avahi-daemon[680]: Successfully dropped remaining capabilities. Jul 28 10:44:51 norbert-Aspire-5737Z avahi-daemon[680]: No service file found in /etc/avahi/services. Jul 28 10:44:51 norbert-Aspire-5737Z avahi-daemon[680]: Network interface enumeration completed. Jul 28 10:44:51 norbert-Aspire-5737Z systemd[1]: Started Avahi mDNS/DNS-SD Stack. Jul 28 10:44:51 norbert-Aspire-5737Z avahi-daemon[680]: Registering HINFO record with values 'X86_64'/'LINUX'. Jul 28 10:44:51 norbert-Aspire-5737Z systemd[1]: Started Bluetooth service. hciconfig hci0: Type: BR/EDR Bus: USB BD Address: 00:15:83:15:A3:0B ACL MTU: 672:4 SCO MTU: 48:1 DOWN RX bytes:445 acl:0 sco:0 events:15 errors:0 TX bytes:63 acl:0 sco:0 commands:15 errors:0 rfkill list 0: hci0: Bluetooth Soft blocked: no Hard blocked: no 1: phy0: Wireless LAN Soft blocked: no Hard blocked: no To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1478799/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1521630] Re: linux: 3.19.0-39.44 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges (arges) ** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges (arges) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1521630 Title: linux: 3.19.0-39.44 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: In Progress Status in Kernel SRU Workflow promote-to-updates series: In Progress Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Vivid: Fix Released Bug description: This bug is for tracking the 3.19.0-39.44 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 01. December 2015 13:44 UTC kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 07:03 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 07:03 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 02. December 2015 19:43 UTC kernel-stable-Verification-testing-start:Wednesday, 02. December 2015 21:01 UTC kernel-stable-Certification-testing-start:Wednesday, 02. December 2015 21:02 UTC kernel-stable-Security-signoff-start:Wednesday, 02. December 2015 21:02 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Wednesday, 02. December 2015 21:02 UTC kernel-stable-Security-signoff-end:Wednesday, 02. December 2015 22:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:50 UTC kernel-stable-phase-changed:Friday, 04. December 2015 13:50 UTC kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:49 UTC kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:50 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521630/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522108] fozzie (i386) - tests ran: 167, failed: 0
tests ran: 167, failed: 0; http://kernel.ubuntu.com/testing/4.2.0-21.25/fozzie__4.2.0-21.25__2015-12-04_12-42-00/results-index.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522108 Title: linux: 4.2.0-21.25 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Incomplete Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux package in Ubuntu: Invalid Status in linux source package in Wily: Confirmed Bug description: This bug is for tracking the 4.2.0-21.25 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 17:43 UTC kernel-stable-Prepare-package-end:Thursday, 03. December 2015 11:34 UTC kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 11:34 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 16:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Thursday, 03. December 2015 17:01 UTC kernel-stable-Verification-testing-start:Thursday, 03. December 2015 17:01 UTC kernel-stable-Certification-testing-start:Thursday, 03. December 2015 17:01 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 17:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 03. December 2015 17:01 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 08:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522108/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
Re: [Kernel-packages] [Bug 1520355] Re: Kernel/Debugging/Backlight/Ubuntu Gnome 15.10
InUbuntu14.04with kernel3.16the issue issolved so: http://compizomania.blogspot.de/2014/06/ubuntu-1404linux-mint-17.htmlTo upgrade the kernelhas not yet happened, asthere was little timeand knowledge.Whenwill updatebe sure to writeyou. InDebianJessiehas decided as follows:addedin/etc/defaults/grubinthe variablevalueGRUB_CMDLINE_LINUX_DEFAULT="acpi_backlight=vendor" 30.11.2015 23:47, Joseph Salisbury пишет: > Did this issue start happening after an update/upgrade? Was there a > prior kernel version where you were not having this particular problem? > > Would it be possible for you to test the latest upstream kernel? Refer > to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest > v4.4 kernel[0]. > > If this bug is fixed in the mainline kernel, please add the following > tag 'kernel-fixed-upstream'. > > If the mainline kernel does not fix this bug, please add the tag: > 'kernel-bug-exists-upstream'. > > Once testing of the upstream kernel is complete, please mark this bug as > "Confirmed". > > > Thanks in advance. > > [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.4-rc3-wily > > ** Changed in: linux (Ubuntu) > Importance: Undecided => Medium > > ** Changed in: linux (Ubuntu) > Status: Confirmed => Incomplete > -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1520355 Title: Kernel/Debugging/Backlight/Ubuntu Gnome 15.10 Status in linux package in Ubuntu: Incomplete Bug description: anatoly@anatoly-Lenovo-B570e:~$ ubuntu-bug linux anatoly@anatoly-Lenovo-B570e:~$ ls /sys/class/backlight > backlight anatoly@anatoly-Lenovo-B570e:~$ grep -r . /proc/acpi > acpi anatoly@anatoly-Lenovo-B570e:~$ sudo acpidump -o acpidump.txt [sudo] пароль для anatoly: anatoly@anatoly-Lenovo-B570e:~$ acpixtract acpidump.txt Intel ACPI Component Architecture ACPI Binary Table Extraction Utility version 20150717-64 Copyright (c) 2000 - 2015 Intel Corporation Acpi table [DSDT] - 39619 bytes written to dsdt.dat Acpi table [SSDT] - 4200 bytes written to ssdt1.dat Acpi table [SSDT] - 2388 bytes written to ssdt2.dat Acpi table [SSDT] - 2316 bytes written to ssdt3.dat Acpi table [SSDT] - 2454 bytes written to ssdt4.dat Acpi table [SSDT] - 1660 bytes written to ssdt5.dat Acpi table [SSDT] - 771 bytes written to ssdt6.dat Acpi table [SSDT] - 281 bytes written to ssdt7.dat anatoly@anatoly-Lenovo-B570e:~$ iasl -d DSDT.dat Intel ACPI Component Architecture ASL+ Optimizing Compiler version 20150717-64 Copyright (c) 2000 - 2015 Intel Corporation Could not open input file: No such file or directory anatoly@anatoly-Lenovo-B570e:~$ sudo fwts > fwts Test: Gather kernel system information. Gather kernel signature.1 info only Gather kernel system information. 1 info only Gather kernel boot command line.1 info only Gather ACPI driver version. 1 info only Test: Gather BIOS DMI information. Gather BIOS DMI information 1 info only Test: Scan kernel log for Oopses. Kernel log oops check. 2 passed Test: Scan kernel log for errors and warnings. Kernel log error check. 1 passed Test: MTRR tests. Validate the kernel MTRR IOMEM setup. 1 passed Validate the MTRR setup across all processors. 1 passed Test for AMD MtrrFixDramModEn being cleared by the B.. 1 skipped Test: General ACPI information test. Determine Kernel ACPI version. 1 info only Determine machine's ACPI version. 1 info only Determine AML compiler. 1 info only Test: Sanity check for UEFI Boot Path Boot. Test aborted.. Test: UEFI secure boot test. Test skipped.. Test: UEFI Compatibility Support Module test. UEFI Compatibility Support Module test. 1 info only Test: Test firmware has set PCI Express MaxReadReq to a higher value on n.. Test firmware settings MaxReadReq for PCI Express de.. 1 passed Test: Test PCI host bridge configuration using _CRS.
[Kernel-packages] [Bug 1511844] Re: [Acer Aspire ES1-711] System freezes occasionally
I have the same problem on my Medion netbook. It has worked fine until I upgraded to 15.10. I installed kernel 4.1.16 and I have had no problems with the kernel. I have not had the same problem with my desktop PC. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1511844 Title: [Acer Aspire ES1-711] System freezes occasionally Status in linux package in Ubuntu: Triaged Bug description: Occasionally my system freezes totally in 15.04 and 15.10. Switching to Console via Ctrl-Alt-F1 or rebooting via Ctrl-Alt-Del does not work. Some days my system will run for many hours without any problem, and on other days I experience 2 or 3 freezes in an hour time. ProblemType: Bug DistroRelease: Ubuntu 15.10 Package: linux-image-4.2.0-16-generic 4.2.0-16.19 ProcVersionSignature: Ubuntu 4.2.0-16.19-generic 4.2.3 Uname: Linux 4.2.0-16-generic x86_64 ApportVersion: 2.19.1-0ubuntu4 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: freek 2223 F pulseaudio CurrentDesktop: Unity Date: Fri Oct 30 21:11:26 2015 EcryptfsInUse: Yes HibernationDevice: RESUME=UUID=c4065390-4392-460d-b828-37b12c4605cb InstallationDate: Installed on 2015-07-13 (108 days ago) InstallationMedia: Ubuntu 15.04 "Vivid Vervet" - Release amd64 (20150422) MachineType: Acer Aspire ES1-711 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.2.0-16-generic.efi.signed root=UUID=772134c4-7cb5-40d6-b0c7-a6bc4a98efe5 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-4.2.0-16-generic N/A linux-backports-modules-4.2.0-16-generic N/A linux-firmware1.149 SourcePackage: linux UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev' UpgradeStatus: Upgraded to wily on 2015-10-27 (2 days ago) dmi.bios.date: 11/07/2014 dmi.bios.vendor: Insyde Corp. dmi.bios.version: V1.05 dmi.board.asset.tag: Type2 - Board Asset Tag dmi.board.name: EA70_BM dmi.board.vendor: Acer dmi.board.version: Type2 - A01 Board Version dmi.chassis.type: 10 dmi.chassis.vendor: Chassis Manufacturer dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnInsydeCorp.:bvrV1.05:bd11/07/2014:svnAcer:pnAspireES1-711:pvrV1.05:rvnAcer:rnEA70_BM:rvrType2-A01BoardVersion:cvnChassisManufacturer:ct10:cvrChassisVersion: dmi.product.name: Aspire ES1-711 dmi.product.version: V1.05 dmi.sys.vendor: Acer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1511844/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1521630] Re: linux: 3.19.0-39.44 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Confirmed ** Description changed: This bug is for tracking the 3.19.0-39.44 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 01. December 2015 13:44 UTC kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 07:03 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 07:03 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 02. December 2015 19:43 UTC - kernel-stable-phase:Verification & Testing - kernel-stable-phase-changed:Wednesday, 02. December 2015 21:01 UTC kernel-stable-Verification-testing-start:Wednesday, 02. December 2015 21:01 UTC kernel-stable-Certification-testing-start:Wednesday, 02. December 2015 21:02 UTC kernel-stable-Security-signoff-start:Wednesday, 02. December 2015 21:02 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Wednesday, 02. December 2015 21:02 UTC kernel-stable-Security-signoff-end:Wednesday, 02. December 2015 22:01 UTC + kernel-stable-phase:CopyToUpdates + kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:50 UTC + kernel-stable-phase-changed:Friday, 04. December 2015 13:50 UTC + kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:49 UTC + kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:50 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1521630 Title: linux: 3.19.0-39.44 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Confirmed Status in Kernel SRU Workflow promote-to-updates series: Confirmed Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Vivid: New Bug description: This bug is for tracking the 3.19.0-39.44 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 01. December 2015 13:44 UTC kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 07:03 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 07:03 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 02. December 2015 19:43 UTC kernel-stable-Verification-testing-start:Wednesday, 02. December 2015 21:01 UTC kernel-stable-Certification-testing-start:Wednesday, 02. December 2015 21:02 UTC kernel-stable-Security-signoff-start:Wednesday, 02. December 2015 21:02 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Wednesday, 02. December 2015 21:02 UTC kernel-stable-Security-signoff-end:Wednesday, 02. December 2015 22:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:50 UTC kernel-stable-phase-changed:Friday, 04. December 2015 13:50 UTC kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:49 UTC kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:50 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521630/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1521630] Re: linux: 3.19.0-39.44 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: Incomplete => Confirmed ** Changed in: kernel-sru-workflow/certification-testing Status: Confirmed => Invalid ** Changed in: kernel-sru-workflow/verification-testing Status: In Progress => Fix Released ** Tags added: qa-testing-passed ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1521630 Title: linux: 3.19.0-39.44 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Confirmed Status in Kernel SRU Workflow promote-to-updates series: Confirmed Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Vivid: New Bug description: This bug is for tracking the 3.19.0-39.44 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 01. December 2015 13:44 UTC kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 07:03 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 07:03 UTC kernel-stable-Promote-to-proposed-end:Wednesday, 02. December 2015 19:43 UTC kernel-stable-Verification-testing-start:Wednesday, 02. December 2015 21:01 UTC kernel-stable-Certification-testing-start:Wednesday, 02. December 2015 21:02 UTC kernel-stable-Security-signoff-start:Wednesday, 02. December 2015 21:02 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Wednesday, 02. December 2015 21:02 UTC kernel-stable-Security-signoff-end:Wednesday, 02. December 2015 22:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:50 UTC kernel-stable-phase-changed:Friday, 04. December 2015 13:50 UTC kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:49 UTC kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:50 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521630/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522108] tarf (amd64) - tests ran: 197, failed: 0
tests ran: 197, failed: 0; http://kernel.ubuntu.com/testing/4.2.0-21.25/tarf__4.2.0-21.25__2015-12-04_08-06-00/results-index.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522108 Title: linux: 4.2.0-21.25 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Incomplete Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux package in Ubuntu: Invalid Status in linux source package in Wily: Confirmed Bug description: This bug is for tracking the 4.2.0-21.25 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 17:43 UTC kernel-stable-Prepare-package-end:Thursday, 03. December 2015 11:34 UTC kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 11:34 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 16:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Thursday, 03. December 2015 17:01 UTC kernel-stable-Verification-testing-start:Thursday, 03. December 2015 17:01 UTC kernel-stable-Certification-testing-start:Thursday, 03. December 2015 17:01 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 17:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 03. December 2015 17:01 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 08:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522108/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1521875] Re: linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: Incomplete => Fix Released ** Changed in: kernel-sru-workflow/verification-testing Status: In Progress => Fix Released ** Tags added: qa-testing-passed ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => Fix Released ** Changed in: kernel-sru-workflow/certification-testing Status: Confirmed => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-vivid in Ubuntu. https://bugs.launchpad.net/bugs/1521875 Title: linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Confirmed Status in Kernel SRU Workflow promote-to-updates series: Confirmed Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-vivid source package in Trusty: New Bug description: This bug is for tracking the 3.19.0-39.44~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 07:01 UTC kernel-stable-master-bug:1521630 kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 19:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 19:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:02 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 01:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:51 UTC kernel-stable-phase-changed:Friday, 04. December 2015 13:51 UTC kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:51 UTC kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:51 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521875/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1460768] Re: Unable to build kernel 3.19.0-18
found this option: skipmodule=true , finally could rebuild all needed generic .debs. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1460768 Title: Unable to build kernel 3.19.0-18 Status in One Hundred Papercuts: Confirmed Status in linux package in Ubuntu: Confirmed Bug description: There is a bug during compiling kernel version 3.19.0-18. First I executed patch file from archive linux_3.19.0-18.18.diff.gz and source https://launchpad.net/ubuntu/+source/linux/3.19.0-18.18 Then I executed make-kpkg --initrd buildpackage with attached config file. But I got a compiling error: CC [M] ubuntu/vbox/vboxguest/VBoxGuest-linux.o In file included from :0:0: ././include/linux/kconfig.h:46:1: fatal error: ./ubuntu/vbox/vboxguest/include/VBox/VBoxGuestMangling.h: No such file or directory #endif /* __LINUX_KCONFIG_H */ ^ compilation terminated. make[6]: *** [ubuntu/vbox/vboxguest/VBoxGuest-linux.o] Error 1 make[5]: *** [ubuntu/vbox/vboxguest] Error 2 make[4]: *** [ubuntu/vbox] Error 2 make[3]: *** [ubuntu] Error 2 To manage notifications about this bug go to: https://bugs.launchpad.net/hundredpapercuts/+bug/1460768/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1521875] Re: linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Confirmed ** Description changed: This bug is for tracking the 3.19.0-39.44~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 07:01 UTC kernel-stable-master-bug:1521630 kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 19:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 19:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC - kernel-stable-phase:Verification & Testing - kernel-stable-phase-changed:Thursday, 03. December 2015 15:02 UTC kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:02 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 01:01 UTC + kernel-stable-phase:CopyToUpdates + kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:51 UTC + kernel-stable-phase-changed:Friday, 04. December 2015 13:51 UTC + kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:51 UTC + kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:51 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-vivid in Ubuntu. https://bugs.launchpad.net/bugs/1521875 Title: linux-lts-vivid: 3.19.0-39.44~14.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Confirmed Status in Kernel SRU Workflow promote-to-updates series: Confirmed Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-vivid source package in Trusty: New Bug description: This bug is for tracking the 3.19.0-39.44~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 07:01 UTC kernel-stable-master-bug:1521630 kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 19:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 19:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:02 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:02 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 01:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Friday, 04. December 2015 13:51 UTC kernel-stable-phase-changed:Friday, 04. December 2015 13:51 UTC kernel-stable-Certification-testing-end:Friday, 04. December 2015 13:51 UTC kernel-stable-Regression-testing-end:Friday, 04. December 2015 13:51 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521875/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522108] bantam (amd64) - tests ran: 194, failed: 0
tests ran: 194, failed: 0; http://kernel.ubuntu.com/testing/4.2.0-21.25/bantam__4.2.0-21.25__2015-12-04_10-53-00/results-index.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522108 Title: linux: 4.2.0-21.25 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Incomplete Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux package in Ubuntu: Invalid Status in linux source package in Wily: Confirmed Bug description: This bug is for tracking the 4.2.0-21.25 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 17:43 UTC kernel-stable-Prepare-package-end:Thursday, 03. December 2015 11:34 UTC kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 11:34 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 16:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Thursday, 03. December 2015 17:01 UTC kernel-stable-Verification-testing-start:Thursday, 03. December 2015 17:01 UTC kernel-stable-Certification-testing-start:Thursday, 03. December 2015 17:01 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 17:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 03. December 2015 17:01 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 08:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522108/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1521979] Re: linux: 3.13.0-72.115 -proposed tracker
*** This bug is a duplicate of bug 1522858 *** https://bugs.launchpad.net/bugs/1522858 ** This bug has been marked a duplicate of bug 1522858 linux: 3.13.0-73.116 -proposed tracker -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1521979 Title: linux: 3.13.0-72.115 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Incomplete Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: New Bug description: This bug is for tracking the 3.13.0-72.115 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 11:30 UTC kernel-stable-Prepare-package-end:Wednesday, 02. December 2015 19:06 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 02. December 2015 19:06 UTC kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 13:05 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Thursday, 03. December 2015 15:04 UTC kernel-stable-Verification-testing-start:Thursday, 03. December 2015 15:04 UTC kernel-stable-Certification-testing-start:Thursday, 03. December 2015 15:04 UTC kernel-stable-Security-signoff-start:Thursday, 03. December 2015 15:04 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Thursday, 03. December 2015 15:04 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 01:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1521979/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522793] Re: Touchpad not working, locked ?
Marcin, thank you for reporting this and helping make Ubuntu better. As per http://www.dell.com/support/home/us/en/19/product- support/product/inspiron-15-5547-laptop/drivers/advanced an update to your computer's buggy and outdated BIOS is available (A08). If you update to this following https://help.ubuntu.com/community/BIOSUpdate does it address the issue? If it doesn't, could you please both specify what happened, and provide the output of the following terminal command: sudo dmidecode -s bios-version && sudo dmidecode -s bios-release-date For more on BIOS updates and linux, please see https://help.ubuntu.com/community/ReportingBugs#Bug_reporting_etiquette . Please note your current BIOS is already in the Bug Description, so posting this on the old BIOS would not be helpful. Also, you don't have to create a new bug report. Once the BIOS is updated, if the problem is still reproducible, and the information above is provided, then please mark this report Status Confirmed. Otherwise, please mark this as Invalid. Thank you for your understanding. ** Description changed: - Touchpad not working on Dell units: - - Dell Inspiron 5547 - Dell Inspiron 15-3552 - - Similar issue reported on: - https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374212 - - Distributor ID: Ubuntu - Description: Ubuntu 15.10 - Release: 15.10 - Codename: wily + Touchpad not working on Dell Inspiron 5547. ⎡ Virtual core pointerid=2[master pointer (3)] ⎜ ↳ Virtual core XTEST pointer id=4[slave pointer (2)] ⎜ ↳ ELAN Touchscreenid=10 [slave pointer (2)] ⎜ ↳ DLL063E:00 06CB:2934id=12 [slave pointer (2)] ⎜ ↳ SynPS/2 Synaptics TouchPad id=14 [slave pointer (2)] ⎣ Virtual core keyboard id=3[master keyboard (2)] - ↳ Virtual core XTEST keyboard id=5[slave keyboard (3)] - ↳ Power Buttonid=6[slave keyboard (3)] - ↳ Video Bus id=7[slave keyboard (3)] - ↳ Power Buttonid=8[slave keyboard (3)] - ↳ Sleep Buttonid=9[slave keyboard (3)] - ↳ Integrated_Webcam_HDid=11 [slave keyboard (3)] - ↳ AT Translated Set 2 keyboardid=13 [slave keyboard (3)] - ↳ Dell WMI hotkeysid=15 [slave keyboard (3)] + ↳ Virtual core XTEST keyboard id=5[slave keyboard (3)] + ↳ Power Buttonid=6[slave keyboard (3)] + ↳ Video Bus id=7[slave keyboard (3)] + ↳ Power Buttonid=8[slave keyboard (3)] + ↳ Sleep Buttonid=9[slave keyboard (3)] + ↳ Integrated_Webcam_HDid=11 [slave keyboard (3)] + ↳ AT Translated Set 2 keyboardid=13 [slave keyboard (3)] + ↳ Dell WMI hotkeysid=15 [slave keyboard (3)] ProblemType: Bug DistroRelease: Ubuntu 15.10 Package: linux-image-4.2.0-16-generic 4.2.0-16.19 ProcVersionSignature: Ubuntu 4.2.0-16.19-generic 4.2.3 Uname: Linux 4.2.0-16-generic x86_64 ApportVersion: 2.19.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: - USERPID ACCESS COMMAND - /dev/snd/controlC1: marcin 3077 F pulseaudio - /dev/snd/controlC0: marcin 3077 F pulseaudio + USERPID ACCESS COMMAND + /dev/snd/controlC1: marcin 3077 F pulseaudio + /dev/snd/controlC0: marcin 3077 F pulseaudio CasperVersion: 1.365 CurrentDesktop: Unity Date: Fri Dec 4 10:59:53 2015 LiveMediaBuild: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021) MachineType: Dell Inc. Inspiron 5547 ProcEnviron: - TERM=xterm-256color - PATH=(custom, no user) - XDG_RUNTIME_DIR= - LANG=en_US.UTF-8 - SHELL=/bin/bash + TERM=xterm-256color + PATH=(custom, no user) + XDG_RUNTIME_DIR= + LANG=en_US.UTF-8 + SHELL=/bin/bash ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/NFS/15.10/desktop-amd64/casper/vmlinuz.efi append noprompt boot=casper modprobe.blacklist=wl rfkill.master_switch_mode=0 rfkill.default_state=1 nohibernate userfullname=User Name username=username proceed=AIO nfsroot=usb showmounts persistent-path=/NFS/15.10/desktop-amd64 persistent iso-scan/filename=/NFS/15.10/hostname-15.10-desktop-amd64.iso toram RelatedPackageVersions: - linux-restricted-modules-4.2.0-16-generic N/A - linux-backports-modules-4.2.0-16-generic N/A - linux-firmware1.149 + linux-restricted-modules-4.2.0-16-generic N/A +
[Kernel-packages] [Bug 1522858] [NEW] linux: 3.13.0-73.116 -proposed tracker
Public bug reported: This bug is for tracking the 3.13.0-73.116 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Friday, 04. December 2015 14:25 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Friday, 04. December 2015 14:25 UTC ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Platform QA Team (canonical-platform-qa) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux (Ubuntu Trusty) Importance: Medium Status: New ** Tags: block-proposed-trusty kernel-release-tracking-bug trusty ** Tags added: kernel-release-tracking-bug ** Tags added: block-proposed-trusty ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Tags added: trusty ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-signed Importance: Undecided => Medium ** Changed in:
[Kernel-packages] [Bug 1521053] Re: Network Performance dropping between vms on different location in Azure
Seyeong - can you try reverting 'hv_netvsc: Implement partial copy into send buffer' ? This backport was dropped from Utopic because it caused regressions. Perhaps the same is true of Vivid. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1521053 Title: Network Performance dropping between vms on different location in Azure Status in linux package in Ubuntu: Invalid Status in linux source package in Vivid: In Progress Bug description: [Impact] Ubuntu VMs between different location in Azure , especially North Europe and East Europe in this case, have network performance issue. It should be around 100MB/s speed between them. but it's around 0.3MB/s when dropping happens. [Fix] Upstream development 0d158852a8089099a6959ae235b20f230871982f ("hv_netvsc: Clean up two unused variables") It's affected over 3.19.0-28-generic (ubuntu-vivid) [Testcase] Make 2 VMs on North Europe, West Europe each. Then run below test script NE VM - netcat & nload while true; do netcat -l 8080 < /dev/zero; done; nload -u M eth0 ( need nload pkg ) - iperf iperf -s -f M WE VM - netcat for i in {1..1000} do timeout 30s nc NE_HOST 8080 > /dev/null done - iperf iperf -c HOST -f M Network performance dropping can be seen frequently. More Tests http://pastebin.ubuntu.com/13657083/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1521053/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522786] Re: linux: 3.19.0-40.45 -proposed tracker
*** This bug is a duplicate of bug 1522918 *** https://bugs.launchpad.net/bugs/1522918 ** This bug has been marked a duplicate of bug 1522918 linux: 3.19.0-41.46 -proposed tracker -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522786 Title: linux: 3.19.0-40.45 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Vivid: New Bug description: This bug is for tracking the 3.19.0-40.45 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Friday, 04. December 2015 10:52 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Friday, 04. December 2015 10:52 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522786/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522766] Re: cryptsetup hangs after kernel upgrade to 3.13.0-72.115
** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522766 Title: cryptsetup hangs after kernel upgrade to 3.13.0-72.115 Status in linux package in Ubuntu: Triaged Status in linux source package in Trusty: Fix Committed Status in linux source package in Vivid: New Bug description: After upgrading to the proposed kernel for Trusty (3.13.0-72.115) I cannot unlock a luks formatted usb drive. The cryptsetup process seems to hang with the following stack: [] __synchronize_srcu+0xfe/0x180 [] synchronize_srcu+0x1d/0x20 [] __dm_destroy+0x117/0x290 [] dm_destroy+0x13/0x20 [] dev_remove+0xde/0x120 [] ctl_ioctl+0x255/0x500 [] dm_ctl_ioctl+0x13/0x20 [] do_vfs_ioctl+0x2e0/0x4c0 [] SyS_ioctl+0x81/0xa0 [] system_call_fastpath+0x1a/0x1f [] 0x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522766/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522124] fozzie (amd64) - tests ran: 148, failed: 0
tests ran: 148, failed: 0; http://kernel.ubuntu.com/testing/3.13.0-72.115~precise1/fozzie__3.13.0-72.115~precise1__2015-12-04_15-42-00/results-index.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1522124 Title: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Incomplete Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: New Bug description: This bug is for tracking the 3.13.0-72.115~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC kernel-stable-master-bug:1521979 kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC kernel-stable-Certification-testing-end:Friday, 04. December 2015 16:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522124] bantam (amd64) - tests ran: 148, failed: 0
tests ran: 148, failed: 0; http://kernel.ubuntu.com/testing/3.2.0-96.136/bantam__3.2.0-96.136__2015-12-04_14-59-00/results-index.html -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1522124 Title: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Incomplete Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: New Bug description: This bug is for tracking the 3.13.0-72.115~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC kernel-stable-master-bug:1521979 kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC kernel-stable-Certification-testing-end:Friday, 04. December 2015 16:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1497428] Re: kernel BUG at /build/buildd/linux-3.13.0/mm/page_alloc.c:968
To clarify the bug, a bit of background is needed first (specific numbers apply only to this situation). The kernel refers to all pages under a single PMD (midlevel page table) as a "pageblock". It's the same size as a hugepage, 2M. In the function triggering the BUG(), it's expecting that the start and end pages are inside the same zone, but that isn't the case so the BUG() is triggered. One function up, move_freepages_block(), is where the start and end PFNs are set; the function takes one page and calculates the start and end PFNs (which are aligned) that contain the provided page. It then verifies that both PFNs are inside the original page's zone, and passes the start/end pages to move_freepages(). The problem is that the zone's PFN range is wrong. In this particular case, the zone's memory ends in the middle of a pageblock, which is unusual. So when move_freepages_block() checks if the end PFN of the pageblock is inside the zone (i.e. < zone end PFN), it *should* fail, and cause the function to return. However, it doesn't fail, meaning the zone's end PFN is wrong, and when move_freepages() checks the page_zone() of the start and end pages, they don't match - because the end page isn't valid - and the BUG() is triggered. In my testing, if I manually limit memory to end in the middle of a pageblock, the zone's end PFN is correctly set, so it seems that something is changing the zone PFN range (specifically the zone's spanned_pages value) at runtime - or, the particular environment for this bug is different that my test setup and getting the zone end PFN wrong somehow. I'm going to create a debug module that will jprobe these functions to check for this condition, and then print debug output and avoid the BUG(). As a workaround for this, if the amount of memory is set so that it ends at a multiple of the pageblock size (512 4k pages == 2M), this bug should not happen. On x86, the boot mem= param sets the maximum address, which should allow changing the zone's end pfn to be aligned with pageblock; e.g. if the dmesg e820 output lists the last line of the memory ranges as: [0.00] BIOS-e820: [mem 0x0001-0x0003e08f] usable then the last valid PFN is 0x3e08f, so the zone end pfn (1 more than last valid pfn) is 0x3e090, which isn't a multiple of the pageblock size (2M): $ echo $[ 0x3e090 % (2 * 1024 * 1024) ] 1048576 In this example case, restricting the last 1M of memory by setting mem=0x3e080 should work around this bug - although since I can't reproduce it yet, I've no way to verify the workaround; and it may simply cause the bug to appear at a different location. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1497428 Title: kernel BUG at /build/buildd/linux-3.13.0/mm/page_alloc.c:968 Status in linux package in Ubuntu: In Progress Status in linux source package in Trusty: In Progress Bug description: The kernel triggers a BUG when it finds it is in move_freepages() but the start and end pfns for the move are in different zones. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1497428/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522918] [NEW] linux: 3.19.0-41.46 -proposed tracker
Public bug reported: This bug is for tracking the 3.19.0-41.46 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Friday, 04. December 2015 17:34 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Friday, 04. December 2015 17:34 UTC ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Platform QA Team (canonical-platform-qa) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Medium Status: Invalid ** Affects: linux (Ubuntu Vivid) Importance: Medium Status: New ** Tags: block-proposed-vivid kernel-release-tracking-bug vivid ** Tags added: kernel-release-tracking-bug ** Tags added: block-proposed-vivid ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Tags added: vivid ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-signed Importance: Undecided => Medium ** Changed in:
[Kernel-packages] [Bug 1484919] Re: Kernel oops associated with BIRD/netlink
It takes us a bit of time to spin up an environment large enough to hit this, so I'm just trying to figure out how many runs we'll need to pin this down. What are your thoughts here? How many kernels are we likely to need to test, and is there a way for us to get good diagnostics out to look for the problem that way? 3.13: good ... 3.19: bad ... 4.2-rc7: good Wily: seems likely that this is good too? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1484919 Title: Kernel oops associated with BIRD/netlink Status in linux package in Ubuntu: Incomplete Status in linux source package in Vivid: In Progress Status in linux source package in Wily: Incomplete Status in linux source package in Xenial: Incomplete Bug description: Scale testing our product, which uses the BIRD BGP daemon, on Google's GCE cloud, we see frequent (40% of hosts) Kernel Oopses and reboots on kernel 3.19.0-25-generic #26~14.04.1-Ubuntu with BIRD running. This is the standard GCE-provided Ubuntu image. If we replace the image with a stock Ubuntu one (kernel 3.13.0-61-generic #100-Ubuntu), installed from ISO, then we do not see the issue. If we stop BIRD then we no longer see the issue. I suspect that this is an issue with the way BIRD is using netlink, triggering a kernel bug. It seems to happen more at scale, when BIRD is doing more with netlink and we have thousands of routes in place. Here's a sample kernel oops: [ 266.033276] BUG: unable to handle kernel paging request at 0019003c [ 266.035142] IP: [] __kmalloc_node_track_caller+0xfb/0x2c0 [ 266.036009] PGD b9e5e067 PUD 0 [ 266.036009] Oops: [#1] SMP [ 266.036009] Modules linked in: bridge stp llc dummy xt_mac xt_mark nf_conntrack_ipv6 nf_defrag_ipv6 xt_comment xt_set ip_set_hash_ip ip_set nfnetlink ebtable_nat ebtables xt_nat ipip tunnel4 ip_tunnel ipt_REJECT nf_reject_ipv4 xt_conntrack xt_CHECKSUM xt_tcpudp iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ip6table_filter ip6_tables iptable_filter ip_tables x_tables nbd ib_iser rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi dm_crypt ppdev dm_multipath scsi_dh 8250_fintek parport_pc i2c_piix4 mac_hid serio_raw parport crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd psmouse virtio_scsi [ 266.036009] CPU: 2 PID: 3456 Comm: bird Tainted: G C 3.19.0-25-generic #26~14.04.1-Ubuntu [ 266.036009] Hardware name: Google Google, BIOS Google 01/01/2011 [ 266.036009] task: 8801210775c0 ti: 880036a08000 task.ti: 880036a08000 [ 266.036009] RIP: 0010:[] [] __kmalloc_node_track_caller+0xfb/0x2c0 [ 266.036009] RSP: 0018:880036a0b7f8 EFLAGS: 00010246 [ 266.036009] RAX: RBX: 000102d0 RCX: 0008b0f6 [ 266.036009] RDX: 0008b0f5 RSI: RDI: 000171c0 [ 266.036009] RBP: 880036a0b848 R08: 8801263171c0 R09: 880121c01600 [ 266.036009] R10: R11: 880121c01600 R12: 000102d0 [ 266.036009] R13: 0180 R14: R15: 0019003c [ 266.036009] FS: 7fd470753740() GS:88012630() knlGS: [ 266.036009] CS: 0010 DS: ES: CR0: 80050033 [ 266.036009] CR2: 0019003c CR3: bb207000 CR4: 001406e0 [ 266.036009] Stack: [ 266.036009] 00010180 00c3 880121c01600 816992ea [ 266.036009] 0001 8800b1486a00 00d0 [ 266.036009] 0180 880036a0b898 81697261 [ 266.036009] Call Trace: [ 266.036009] [] ? pskb_expand_head+0x6a/0x260 [ 266.036009] [] __kmalloc_reserve.isra.27+0x31/0x90 [ 266.036009] [] pskb_expand_head+0x6a/0x260 [ 266.036009] [] netlink_trim+0xa3/0xe0 [ 266.036009] [] netlink_unicast+0x3e/0x200 [ 266.036009] [] nlmsg_notify+0x93/0xb0 [ 266.036009] [] rtnl_notify+0x2e/0x40 [ 266.036009] [] rtmsg_fib+0x115/0x160 [ 266.036009] [] ? trie_rebalance+0x10d/0x130 [ 266.036009] [] fib_table_insert+0x1da/0x8e0 [ 266.036009] [] inet_rtm_newroute+0x48/0x60 [ 266.036009] [] rtnetlink_rcv_msg+0x95/0x250 [ 266.036009] [] ? rhashtable_lookup_compare+0x36/0x70 [ 266.036009] [] ? __netlink_lookup+0x3e/0x50 [ 266.036009] [] ? rtnetlink_rcv+0x40/0x40 [ 266.036009] [] netlink_rcv_skb+0xc1/0xe0 [ 266.036009] [] rtnetlink_rcv+0x2c/0x40 [ 266.036009] [] netlink_unicast+0xf6/0x200 [ 266.036009] [] netlink_sendmsg+0x30c/0x680 [ 266.036009] [] ? aa_sk_perm.isra.4+0x70/0x150 [ 266.036009] [] do_sock_sendmsg+0x8c/0x100
[Kernel-packages] [Bug 1451246] Re: Intel 7265 Wifi instability workaround
** Changed in: linux (Ubuntu) Status: Expired => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1451246 Title: Intel 7265 Wifi instability workaround Status in linux package in Ubuntu: Incomplete Bug description: I have a Thinkpad T450s since 5/1/2015 (though linux wants the 7265D ucode though). It was unstable, even when upgrading to the 4.0.1 mainline kernel. Using the latest 7265 firmware improved things, but things like streams, speed tests, and youtube would tank the connection: retrieve the latest linux-firmware from their git: http://git.kernel.org/cgit/linux/kernel/git/firmware/linux-firmware.git (git clone https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git) sudo rm /lib/firmware/iwlwifi* sudo cp /path/to//iwlwifi-7265*-12.ucode /lib/firmware/. reboot WORKAROUND: Disable 802.11n: echo 'options iwlwifi 11n_disable=1' | sudo tee -a /etc/modprobe.d/iwlwifi.conf ProblemType: Bug DistroRelease: Ubuntu 15.04 Package: linux-image-3.19.0-15-generic 3.19.0-15.15 [modified: boot/vmlinuz-3.19.0-15-generic] ProcVersionSignature: Ubuntu 3.19.0-15.15-generic 3.19.3 Uname: Linux 3.19.0-15-generic x86_64 ApportVersion: 2.17.2-0ubuntu1 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: epicstar 1453 F pulseaudio /dev/snd/pcmC1D0p: epicstar 1453 F...m pulseaudio /dev/snd/controlC1: epicstar 1453 F pulseaudio CurrentDesktop: Unity Date: Sun May 3 15:43:35 2015 HibernationDevice: RESUME=UUID=9caf85bf-266f-4356-9a64-031df7edb239 InstallationDate: Installed on 2015-05-02 (1 days ago) InstallationMedia: Ubuntu 15.04 "Vivid Vervet" - Release amd64 (20150422) MachineType: LENOVO 20BXCTO1WW ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-15-generic.efi.signed root=UUID=b8187455-26c0-492f-bf45-755286cf5623 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.19.0-15-generic N/A linux-backports-modules-3.19.0-15-generic N/A linux-firmware 1.143 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no SourcePackage: linux UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev' UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 03/10/2015 dmi.bios.vendor: LENOVO dmi.bios.version: JBET47WW (1.12 ) dmi.board.asset.tag: Not Available dmi.board.name: 20BXCTO1WW dmi.board.vendor: LENOVO dmi.board.version: SDK0E50512 STD dmi.chassis.asset.tag: No Asset Information dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: None dmi.modalias: dmi:bvnLENOVO:bvrJBET47WW(1.12):bd03/10/2015:svnLENOVO:pn20BXCTO1WW:pvrThinkPadT450s:rvnLENOVO:rn20BXCTO1WW:rvrSDK0E50512STD:cvnLENOVO:ct10:cvrNone: dmi.product.name: 20BXCTO1WW dmi.product.version: ThinkPad T450s dmi.sys.vendor: LENOVO To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1451246/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522201] Re: NUC NUC5CPYH Does not reboot on Ubuntu 15.10 (linux-image-4.2.0-19)
** Attachment added: "DSDT generated with "sudo -u \#0 acpidump -bn DSDT; iasl -d dsdt.dat"" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522201/+attachment/4529649/+files/dsdt.dsl -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522201 Title: NUC NUC5CPYH Does not reboot on Ubuntu 15.10 (linux-image-4.2.0-19) Status in linux package in Ubuntu: Confirmed Bug description: This bug might be related to this bug: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1521749 I have an Intel NUC NUC5CPYH. This is the unit: http://www.intel.com/content/www/us/en/nuc/nuc-kit-nuc5cpyh.html It boots and reboots beautifully on Ubuntu 15.04 and Ubuntu 15.10 with linux-image-3.19.0-34-generic -- but when I try to boot with linux- image-4.2.0-19-generic on the latest PY0044 BIOS version, it does not boot at all. If I downgrade the BIOS to PY0043, it boots, but then I am not able to reboot it. When I run "reboot", it freezes showing this screen: https://www.dropbox.com/s/fxy4opcqwnmjmwo/IMG_1489.jpg?dl=0 I am also attaching the full syslog, dmesg and the relevant part of the syslog when the system froze. Any ideas? --- ApportVersion: 2.19.1-0ubuntu5 Architecture: amd64 DistroRelease: Ubuntu 15.10 ProcEnviron: TERM=linux PATH=(custom, no user) XDG_RUNTIME_DIR= LANG= SHELL=/bin/bash ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.2.0-19-generic root=UUID=4fa37335-eed0-4580-ae4b-62c996dfc275 ro vt.handoff=7 ProcVersionSignature: Ubuntu 4.2.0-19.23-generic 4.2.6 RelatedPackageVersions: linux-restricted-modules-4.2.0-19-generic N/A linux-backports-modules-4.2.0-19-generic N/A linux-firmware1.149.3 RfKill: Error: [Errno 2] No such file or directory Tags: wily UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev' Uname: Linux 4.2.0-19-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: _MarkForUpload: True dmi.bios.date: 09/04/2015 dmi.bios.vendor: Intel Corp. dmi.bios.version: PYBSWCEL.86A.0043.2015.0904.1904 dmi.board.name: NUC5CPYB dmi.board.vendor: Intel Corporation dmi.board.version: H61145-404 dmi.chassis.type: 3 dmi.modalias: dmi:bvnIntelCorp.:bvrPYBSWCEL.86A.0043.2015.0904.1904:bd09/04/2015:svn:pn:pvr:rvnIntelCorporation:rnNUC5CPYB:rvrH61145-404:cvn:ct3:cvr: To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522201/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522421] Re: linux: 4.3.0-1.10 -proposed tracker
** Tags added: block-proposed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522421 Title: linux: 4.3.0-1.10 -proposed tracker Status in Kernel Development Workflow: In Progress Status in Kernel Development Workflow automated-testing series: Incomplete Status in Kernel Development Workflow prepare-package series: Fix Released Status in Kernel Development Workflow prepare-package-meta series: Fix Released Status in Kernel Development Workflow prepare-package-signed series: Fix Released Status in Kernel Development Workflow promote-to-proposed series: Fix Released Status in Kernel Development Workflow promote-to-release series: New Status in linux package in Ubuntu: New Status in linux source package in Xenial: New Bug description: This bug is for tracking the 4.3.0-1.10 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Thursday, 03. December 2015 13:53 UTC kernel-phase-changed:Thursday, 03. December 2015 13:53 UTC kernel-phase:Prepare kernel-stable-Promote-to-proposed-end:Thursday, 03. December 2015 14:00 UTC proposed-announcement-sent:True To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-development-workflow/+bug/1522421/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522124] Re: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker
** Description changed: This bug is for tracking the 3.13.0-72.115~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC kernel-stable-master-bug:1521979 kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC + kernel-stable-Certification-testing-end:Friday, 04. December 2015 16:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1522124 Title: linux-lts-trusty: 3.13.0-72.115~precise1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Incomplete Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Confirmed Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: New Bug description: This bug is for tracking the 3.13.0-72.115~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 02. December 2015 19:04 UTC kernel-stable-master-bug:1521979 kernel-stable-Prepare-package-end:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 03. December 2015 18:02 UTC kernel-stable-Promote-to-proposed-end:Friday, 04. December 2015 03:01 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Friday, 04. December 2015 04:01 UTC kernel-stable-Verification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Certification-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-start:Friday, 04. December 2015 04:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 04. December 2015 04:01 UTC kernel-stable-Security-signoff-end:Friday, 04. December 2015 10:01 UTC kernel-stable-Certification-testing-end:Friday, 04. December 2015 16:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522124/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522858] Re: linux: 3.13.0-73.116 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => Fix Released ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Luis Henriques (henrix) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522858 Title: linux: 3.13.0-73.116 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: New Bug description: This bug is for tracking the 3.13.0-73.116 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Friday, 04. December 2015 14:25 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Friday, 04. December 2015 14:25 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522858/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522786] Re: linux: 3.19.0-40.45 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => Fix Released ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: Canonical Kernel Team (canonical-kernel-team) => Luis Henriques (henrix) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522786 Title: linux: 3.19.0-40.45 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: Invalid Status in linux source package in Vivid: New Bug description: This bug is for tracking the 3.19.0-40.45 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Friday, 04. December 2015 10:52 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Friday, 04. December 2015 10:52 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1522786/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1481575] Re: Fix Dell laptop to internal mic/headset mic
This bug was fixed in the package linux - 4.3.0-1.10 --- linux (4.3.0-1.10) xenial; urgency=low [ Andy Whitcroft ] * [Config] make IBMVETH consistent on powerpc/ppc64el - LP: #1521712 * [Config] follow ibmvscsi name change - LP: #1521712 * [Config] move ibm disk and ethernet drivers to linux-image - LP: #1521712 * [Config] include ibmveth in nic-modules for ppc64el - LP: #1521712 * [Config] s390x -- disable abi/module checks for s390x [ Tim Gardner ] * [Config] Add spl/zfs provides to generic and powerpc64-smp * [Config] Add zfs to d-i fs-core-modules [ Upstream Kernel Changes ] * KVM: x86: work around infinite loop in microcode when #AC is delivered * KVM: svm: unconditionally intercept #DB * Btrfs: fix truncation of compressed and inlined extents * staging/dgnc: fix info leak in ioctl * [media] media/vivid-osd: fix info leak in ioctl * crypto: asymmetric_keys - remove always false comparison * X.509: Fix the time validation [ver #2] * isdn_ppp: Add checks for allocation failure in isdn_ppp_open() * ppp, slip: Validate VJ compression slot parameters completely -- Andy WhitcroftTue, 01 Dec 2015 21:37:13 + ** Changed in: linux (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1481575 Title: Fix Dell laptop to internal mic/headset mic Status in linux package in Ubuntu: Fix Released Bug description: This bug is for tracking purposes. Please do not triage. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1481575/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1505671] Re: Missing patches for CXL dri
This bug was fixed in the package linux - 4.3.0-1.10 --- linux (4.3.0-1.10) xenial; urgency=low [ Andy Whitcroft ] * [Config] make IBMVETH consistent on powerpc/ppc64el - LP: #1521712 * [Config] follow ibmvscsi name change - LP: #1521712 * [Config] move ibm disk and ethernet drivers to linux-image - LP: #1521712 * [Config] include ibmveth in nic-modules for ppc64el - LP: #1521712 * [Config] s390x -- disable abi/module checks for s390x [ Tim Gardner ] * [Config] Add spl/zfs provides to generic and powerpc64-smp * [Config] Add zfs to d-i fs-core-modules [ Upstream Kernel Changes ] * KVM: x86: work around infinite loop in microcode when #AC is delivered * KVM: svm: unconditionally intercept #DB * Btrfs: fix truncation of compressed and inlined extents * staging/dgnc: fix info leak in ioctl * [media] media/vivid-osd: fix info leak in ioctl * crypto: asymmetric_keys - remove always false comparison * X.509: Fix the time validation [ver #2] * isdn_ppp: Add checks for allocation failure in isdn_ppp_open() * ppp, slip: Validate VJ compression slot parameters completely -- Andy WhitcroftTue, 01 Dec 2015 21:37:13 + ** Changed in: linux (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1505671 Title: Missing patches for CXL dri Status in linux package in Ubuntu: Fix Released Status in linux source package in Xenial: Fix Released Bug description: ---Problem Description--- cxl module patch missing Contact Information = Andrew Donnellan ---uname output--- 14.04.3 https://patchwork.ozlabs.org/patch/516142/ - powerpc/pci: export pcibios_free_controller() https://patchwork.ozlabs.org/patch/529548/ - cxl: Free virtual PHB when removing Andrew Donnellan - Sept. 10, 2015, 6:28 a.m. 1) Export pcibios_free_controller(), so it can be used by the cxl module to free virtual PHBs. arch/powerpc/kernel/pci-common.c | 1 + 1 file changed, 1 insertion(+) 2) When adding a vPHB in cxl_pci_vphb_add(), we allocate a pci_controller struct using pcibios_alloc_controller(). However, we don't free it in cxl_pci_vphb_remove(), causing a leak. Call pcibios_free_controller() in cxl_pci_vphb_remove() to free the vPHB data structure correctly. Signed-off-by: Daniel Axtens Signed-off-by: Andrew Donnellan This patch depends on "powerpc/pci: export pcibios_free_controller()" [0]. [0] https://patchwork.ozlabs.org/patch/516142/ --- drivers/misc/cxl/vphb.c | 2 ++ 1 file changed, 2 insertions(+) The target for this bug is 14.04.3 (3.19 kernel). To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1505671/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1509029] Re: [Hyper-V] Crash in hot-add/remove scsi devices (smp)
This bug was fixed in the package linux - 4.3.0-1.10 --- linux (4.3.0-1.10) xenial; urgency=low [ Andy Whitcroft ] * [Config] make IBMVETH consistent on powerpc/ppc64el - LP: #1521712 * [Config] follow ibmvscsi name change - LP: #1521712 * [Config] move ibm disk and ethernet drivers to linux-image - LP: #1521712 * [Config] include ibmveth in nic-modules for ppc64el - LP: #1521712 * [Config] s390x -- disable abi/module checks for s390x [ Tim Gardner ] * [Config] Add spl/zfs provides to generic and powerpc64-smp * [Config] Add zfs to d-i fs-core-modules [ Upstream Kernel Changes ] * KVM: x86: work around infinite loop in microcode when #AC is delivered * KVM: svm: unconditionally intercept #DB * Btrfs: fix truncation of compressed and inlined extents * staging/dgnc: fix info leak in ioctl * [media] media/vivid-osd: fix info leak in ioctl * crypto: asymmetric_keys - remove always false comparison * X.509: Fix the time validation [ver #2] * isdn_ppp: Add checks for allocation failure in isdn_ppp_open() * ppp, slip: Validate VJ compression slot parameters completely -- Andy WhitcroftTue, 01 Dec 2015 21:37:13 + ** Changed in: linux (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1509029 Title: [Hyper-V] Crash in hot-add/remove scsi devices (smp) Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Committed Status in linux source package in Vivid: Fix Committed Status in linux source package in Wily: Fix Committed Status in linux source package in Xenial: Fix Released Bug description: On some host errors storvsc module tries to remove sdev by scheduling a job which does the following: sdev = scsi_device_lookup(wrk->host, 0, 0, wrk->lun); if (sdev) { scsi_remove_device(sdev); scsi_device_put(sdev); } While this code seems correct the following crash is observed: general protection fault: [#1] SMP DEBUG_PAGEALLOC RIP: 0010:[] [] bdi_destroy+0x39/0x220 ... [] ? _raw_spin_unlock_irq+0x2c/0x40 [] blk_cleanup_queue+0x17b/0x270 [] __scsi_remove_device+0x54/0xd0 [scsi_mod] [] scsi_remove_device+0x2b/0x40 [scsi_mod] [] storvsc_remove_lun+0x3d/0x60 [hv_storvsc] [] process_one_work+0x1b1/0x530 ... The problem comes with the fact that many such jobs (for the same device) are being scheduled simultaneously. While scsi_remove_device() uses shost->scan_mutex and scsi_device_lookup() will fail for a device in SDEV_DEL state there is no protection against someone who did scsi_device_lookup() before we actually entered __scsi_remove_device(). So the whole scenario looks like that: two callers do simultaneous (or preemption happens) calls to scsi_device_lookup() ant these calls succeed for all of them, after that both callers try doing scsi_remove_device(). shost->scan_mutex only serializes their calls to __scsi_remove_device() and we end up doing the cleanup path twice. Signed-off-by: Vitaly Kuznetsov --- drivers/scsi/scsi_sysfs.c | 8 1 file changed, 8 insertions(+) diff --git a/drivers/scsi/scsi_sysfs.c b/drivers/scsi/scsi_sysfs.c index b89..e0d2707 100644 --- a/drivers/scsi/scsi_sysfs.c +++ b/drivers/scsi/scsi_sysfs.c @@ -1076,6 +1076,14 @@ void __scsi_remove_device(struct scsi_device *sdev) { struct device *dev = >sdev_gendev; + /* +* This cleanup path is not reentrant and while it is impossible +* to get a new reference with scsi_device_get() someone can still +* hold a previously acquired one. +*/ + if (sdev->sdev_state == SDEV_DEL) + return; + if (sdev->is_visible) { if (scsi_device_set_state(sdev, SDEV_CANCEL) != 0) return; -- 2.4.3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1509029/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1476211] Re: kswapd takes 100% CPU although there is no swap
This is still the case in Ubuntu 15.10. It would really be cool if this could be fixed, because it causes data loss and regularly interrupts my work. I cannot imagine this same software runs on servers, IoT and systems that need reliability. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1476211 Title: kswapd takes 100% CPU although there is no swap Status in linux package in Ubuntu: Confirmed Bug description: On a notebook with neither swap partition nor swap file (because of SSD and surplus of RAM), kswapd0 suddenly runs amok and takes 100% of CPU activity. When this happens, usually at most 5.5 of 8 GB RAM were in use, so there is no reason to swap. This happens so suddenly, that no user input is possible anymore, eg. I can barely switch to tty to kill processes that take most RAM. The processor becomes extremely hot and I can only turn the computer off and reboot. I consider this as critical and harmful to my hardware. I noticed that Ubuntu installs by default with swappiness 60. Now I changed that to 10 because I would never encounter the case that 8GB are in use, but it didn't have an effect. Expected behavior: - on systems without RAM, kswapd should never attempt to swap - if there is not enough RAM, kernel should kill processes to free up RAM - no process should be able to claim so much CPU activity, that the computer becomes unresponsive (it should always be possible to control/stop/kill processes over tty) Actual behavior: - kswapd tries to swap although there is no swap space ProblemType: Bug DistroRelease: Ubuntu 15.04 Package: linux-image-3.19.0-22-generic 3.19.0-22.22 ProcVersionSignature: Ubuntu 3.19.0-22.22-generic 3.19.8-ckt1 Uname: Linux 3.19.0-22-generic x86_64 ApportVersion: 2.17.2-0ubuntu1.1 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: andreas2368 F pulseaudio /dev/snd/controlC0: andreas2368 F pulseaudio CurrentDesktop: Unity Date: Mon Jul 20 12:49:24 2015 EcryptfsInUse: Yes InstallationDate: Installed on 2015-06-06 (43 days ago) InstallationMedia: Ubuntu 15.04 "Vivid Vervet" - Release amd64 (20150422) MachineType: LENOVO 20266 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-22-generic root=UUID=8a0dc2f3-fcf3-4e5b-8e23-1441bd36e3dc ro noprompt persistent quiet splash acpi_backlight=vendor vt.handoff=7 init=/sbin/upstart RelatedPackageVersions: linux-restricted-modules-3.19.0-22-generic N/A linux-backports-modules-3.19.0-22-generic N/A linux-firmware 1.143.1 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 10/31/2013 dmi.bios.vendor: LENOVO dmi.bios.version: 76CN31WW dmi.board.asset.tag: No Asset Tag dmi.board.name: Yoga2 dmi.board.vendor: LENOVO dmi.board.version: 31900058STD dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Lenovo Yoga 2 Pro dmi.modalias: dmi:bvnLENOVO:bvr76CN31WW:bd10/31/2013:svnLENOVO:pn20266:pvrLenovoYoga2Pro:rvnLENOVO:rnYoga2:rvr31900058STD:cvnLENOVO:ct10:cvrLenovoYoga2Pro: dmi.product.name: 20266 dmi.product.version: Lenovo Yoga 2 Pro dmi.sys.vendor: LENOVO To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1476211/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1390223] Re: Apparmor related regression on access to unix sockets on a candidate 3.16 backport kernel
This bug was fixed in the package linux - 4.3.0-1.10 --- linux (4.3.0-1.10) xenial; urgency=low [ Andy Whitcroft ] * [Config] make IBMVETH consistent on powerpc/ppc64el - LP: #1521712 * [Config] follow ibmvscsi name change - LP: #1521712 * [Config] move ibm disk and ethernet drivers to linux-image - LP: #1521712 * [Config] include ibmveth in nic-modules for ppc64el - LP: #1521712 * [Config] s390x -- disable abi/module checks for s390x [ Tim Gardner ] * [Config] Add spl/zfs provides to generic and powerpc64-smp * [Config] Add zfs to d-i fs-core-modules [ Upstream Kernel Changes ] * KVM: x86: work around infinite loop in microcode when #AC is delivered * KVM: svm: unconditionally intercept #DB * Btrfs: fix truncation of compressed and inlined extents * staging/dgnc: fix info leak in ioctl * [media] media/vivid-osd: fix info leak in ioctl * crypto: asymmetric_keys - remove always false comparison * X.509: Fix the time validation [ver #2] * isdn_ppp: Add checks for allocation failure in isdn_ppp_open() * ppp, slip: Validate VJ compression slot parameters completely -- Andy WhitcroftTue, 01 Dec 2015 21:37:13 + ** Changed in: linux (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1390223 Title: Apparmor related regression on access to unix sockets on a candidate 3.16 backport kernel Status in linux package in Ubuntu: Fix Released Status in linux source package in Utopic: Confirmed Status in linux source package in Vivid: Fix Committed Bug description: I recently noticed a bunch of containers failing in a rather odd way when running postfix. The most visible example is when running mailq on an empty queue. Without apparmor (unconfined container) I see that the queue is empty, with apparmor, I get Permission denied. That's all running as root so the permission denied looks a tiny bit odd. Also, running the 3.13 kernel, I don't get any of that weirdness. My guess is that it has to do with the work that went into the 3.16 kernel for socket mediation. In theory only systems that run the utopic apparmor (which I DO NOT) should be seeing that kind of behavior, but it looks like some code path isn't checking things properly :) == strace in unconfined container == chdir("/var/spool/postfix") = 0 rt_sigaction(SIGPIPE, {SIG_IGN, [PIPE], SA_RESTORER|SA_RESTART, 0x7f8963a62c30}, {SIG_IGN, [], 0}, 8) = 0 getuid()= 0 socket(PF_LOCAL, SOCK_STREAM, 0)= 4 fcntl(4, F_GETFL) = 0x2 (flags O_RDWR) fcntl(4, F_SETFL, O_RDWR) = 0 connect(4, {sa_family=AF_LOCAL, sun_path="public/showq"}, 110) = 0 poll([{fd=4, events=POLLIN}], 1, 360) = 1 ([{fd=4, revents=POLLIN|POLLHUP}]) read(4, "Mail queue is empty\n", 4096) = 20 poll([{fd=4, events=POLLIN}], 1, 360) = 1 ([{fd=4, revents=POLLIN|POLLHUP}]) read(4, "", 4096) = 0 write(1, "Mail queue is empty\n", 20Mail queue is empty ) = 20 close(4)= 0 exit_group(0) = ? +++ exited with 0 +++ == strace in confined container == chdir("/var/spool/postfix") = 0 rt_sigaction(SIGPIPE, {SIG_IGN, [PIPE], SA_RESTORER|SA_RESTART, 0x7ffe62de4c30}, {SIG_IGN, [], 0}, 8) = 0 getuid()= 0 socket(PF_LOCAL, SOCK_STREAM, 0)= 4 fcntl(4, F_GETFL) = 0x2 (flags O_RDWR) fcntl(4, F_SETFL, O_RDWR) = 0 connect(4, {sa_family=AF_LOCAL, sun_path="public/showq"}, 110) = 0 poll([{fd=4, events=POLLIN}], 1, 360) = 1 ([{fd=4, revents=POLLIN|POLLHUP}]) read(4, 0x7ffe65b35c00, 4096) = -1 EACCES (Permission denied) close(4)= 0 write(2, "postqueue: warning: close: Permi"..., 45postqueue: warning: close: Permission denied ) = 45 sendto(3, "<20>Nov 6 20:40:42 postfix/post"..., 78, MSG_NOSIGNAL, NULL, 0) = 78 exit_group(0) = ? Kernel is a slightly outdated version of the kernel from the kernel team PPA: Linux shell01 3.16.0-23-generic #31-Ubuntu SMP Thu Oct 23 20:13:35 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux If you think the latest build will improve this, I can test it, but seeing how this is a production server, I can't just flip kernels every 5 minutes (I'm running 3.16 to avoid a nasty btrfs bug on 3.13). To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1390223/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help :
[Kernel-packages] [Bug 1408833] Re: broken postinst test for uvtool-libvirt
This bug was fixed in the package linux - 4.3.0-1.10 --- linux (4.3.0-1.10) xenial; urgency=low [ Andy Whitcroft ] * [Config] make IBMVETH consistent on powerpc/ppc64el - LP: #1521712 * [Config] follow ibmvscsi name change - LP: #1521712 * [Config] move ibm disk and ethernet drivers to linux-image - LP: #1521712 * [Config] include ibmveth in nic-modules for ppc64el - LP: #1521712 * [Config] s390x -- disable abi/module checks for s390x [ Tim Gardner ] * [Config] Add spl/zfs provides to generic and powerpc64-smp * [Config] Add zfs to d-i fs-core-modules [ Upstream Kernel Changes ] * KVM: x86: work around infinite loop in microcode when #AC is delivered * KVM: svm: unconditionally intercept #DB * Btrfs: fix truncation of compressed and inlined extents * staging/dgnc: fix info leak in ioctl * [media] media/vivid-osd: fix info leak in ioctl * crypto: asymmetric_keys - remove always false comparison * X.509: Fix the time validation [ver #2] * isdn_ppp: Add checks for allocation failure in isdn_ppp_open() * ppp, slip: Validate VJ compression slot parameters completely -- Andy WhitcroftTue, 01 Dec 2015 21:37:13 + ** Changed in: linux (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1408833 Title: broken postinst test for uvtool-libvirt Status in AppArmor: Confirmed Status in openstack-installer: Confirmed Status in uvtool: Invalid Status in linux package in Ubuntu: Fix Released Status in linux source package in Utopic: Fix Released Bug description: Installing uvtool-libvirt *inside an lxc container* on utopic fails due to a test in the postinst script. It uses socat on the libvirt socket, which fails, despite libvirt being installed correctly. ubuntu@uoi-bootstrap:~$ sudo apt-get install -f Reading package lists... Done Building dependency tree Reading state information... Done The following packages were automatically installed and are no longer required: libfreetype6 os-prober Use 'apt-get autoremove' to remove them. 0 upgraded, 0 newly installed, 0 to remove and 19 not upgraded. 1 not fully installed or removed. After this operation, 0 B of additional disk space will be used. Setting up uvtool-libvirt (0~bzr92-0ubuntu2) ... 2015/01/08 13:01:34 socat[10184] E read(3, 0x13b2a30, 8192): Permission denied libvirtd does not appear to be listening on "/var/run/libvirt/libvirt-sock". On Ubuntu, libvirtd is managed with the "libvirt-bin" upstart job. Repair libvirtd, then reconfigure uvtool-libvirt with: sudo apt-get -f install dpkg: error processing package uvtool-libvirt (--configure): subprocess installed post-installation script returned error exit status 1 Errors were encountered while processing: uvtool-libvirt E: Sub-process /usr/bin/dpkg returned an error code (1) ubuntu@uoi-bootstrap:~$ ps -ef | grep libvirt libvirt+ 9556 1 0 09:52 ?00:00:00 /usr/sbin/dnsmasq --conf-file=/var/lib/libvirt/dnsmasq/default.conf --dhcp-script=/usr/lib/libvirt/libvirt_leaseshelper root 9557 9556 0 09:52 ?00:00:00 /usr/sbin/dnsmasq --conf-file=/var/lib/libvirt/dnsmasq/default.conf --dhcp-script=/usr/lib/libvirt/libvirt_leaseshelper root 9854 1 0 10:24 ?00:00:00 /usr/sbin/libvirtd -d ubuntu 10155 10120 0 12:56 pts/000:00:00 grep libvirt ubuntu@uoi-bootstrap:~$ groups ubuntu adm dialout cdrom floppy sudo audio dip video plugdev netdev libvirtd ubuntu@uoi-bootstrap:~$ virsh list IdName State for a little more context, there are notes here: https://gist.github.com/mikemccracken/53c665e6094db21efc03 To manage notifications about this bug go to: https://bugs.launchpad.net/apparmor/+bug/1408833/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1513583] Re: Add CAPI flash driver (cxlflash) patches to 15.10 SRU stream
This bug was fixed in the package linux - 4.3.0-1.10 --- linux (4.3.0-1.10) xenial; urgency=low [ Andy Whitcroft ] * [Config] make IBMVETH consistent on powerpc/ppc64el - LP: #1521712 * [Config] follow ibmvscsi name change - LP: #1521712 * [Config] move ibm disk and ethernet drivers to linux-image - LP: #1521712 * [Config] include ibmveth in nic-modules for ppc64el - LP: #1521712 * [Config] s390x -- disable abi/module checks for s390x [ Tim Gardner ] * [Config] Add spl/zfs provides to generic and powerpc64-smp * [Config] Add zfs to d-i fs-core-modules [ Upstream Kernel Changes ] * KVM: x86: work around infinite loop in microcode when #AC is delivered * KVM: svm: unconditionally intercept #DB * Btrfs: fix truncation of compressed and inlined extents * staging/dgnc: fix info leak in ioctl * [media] media/vivid-osd: fix info leak in ioctl * crypto: asymmetric_keys - remove always false comparison * X.509: Fix the time validation [ver #2] * isdn_ppp: Add checks for allocation failure in isdn_ppp_open() * ppp, slip: Validate VJ compression slot parameters completely -- Andy WhitcroftTue, 01 Dec 2015 21:37:13 + ** Changed in: linux (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1513583 Title: Add CAPI flash driver (cxlflash) patches to 15.10 SRU stream Status in linux package in Ubuntu: Fix Released Status in linux source package in Wily: In Progress Status in linux source package in Xenial: Fix Released Bug description: CAPI flash driver fixes. Contact Information = Matthew Ochs mro...@linux.vnet.ibm.com ---uname output--- n/a Machine Type = p8 ---Debugger--- A debugger is not configured Stack trace output: no Oops output: no System Dump Info: The system is not configured to capture a system dump. *Additional Instructions for Matthew Ochs mro...@linux.vnet.ibm.com: -Attach sysctl -a output output to the bug. == Comment: #2 - Matthew R. Ochs - 2015-11-04 16:14:17 == == Comment: #3 - Matthew R. Ochs - 2015-11-04 16:15:19 == == Comment: #4 - Matthew R. Ochs - 2015-11-04 16:17:40 == Patch 1 sends a link reset for port1 following a login timeout error. This same fix was delivered previously for port0. Patch 2 provides feedback to applications so that they may know when it is acceptable to perform an I/O retry for a virtual LUN. == Comment: #5 - Matthew R. Ochs - 2015-11-04 16:25:54 == These patches are not yet upstreamed but will be as part of the 4.4 'rc' phase. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1513583/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1521712] Re: power: commonise configs IBMVETH/IBMVSCSI and ensure both are in linux-image and udebs
This bug was fixed in the package linux - 4.3.0-1.10 --- linux (4.3.0-1.10) xenial; urgency=low [ Andy Whitcroft ] * [Config] make IBMVETH consistent on powerpc/ppc64el - LP: #1521712 * [Config] follow ibmvscsi name change - LP: #1521712 * [Config] move ibm disk and ethernet drivers to linux-image - LP: #1521712 * [Config] include ibmveth in nic-modules for ppc64el - LP: #1521712 * [Config] s390x -- disable abi/module checks for s390x [ Tim Gardner ] * [Config] Add spl/zfs provides to generic and powerpc64-smp * [Config] Add zfs to d-i fs-core-modules [ Upstream Kernel Changes ] * KVM: x86: work around infinite loop in microcode when #AC is delivered * KVM: svm: unconditionally intercept #DB * Btrfs: fix truncation of compressed and inlined extents * staging/dgnc: fix info leak in ioctl * [media] media/vivid-osd: fix info leak in ioctl * crypto: asymmetric_keys - remove always false comparison * X.509: Fix the time validation [ver #2] * isdn_ppp: Add checks for allocation failure in isdn_ppp_open() * ppp, slip: Validate VJ compression slot parameters completely -- Andy WhitcroftTue, 01 Dec 2015 21:37:13 + ** Changed in: linux (Ubuntu) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1521712 Title: power: commonise configs IBMVETH/IBMVSCSI and ensure both are in linux-image and udebs Status in linux package in Ubuntu: Fix Released Bug description: In Bug #1515872 we pulled IBMVSCSI out as a module. Ensure this is commonised to powerpc, and ensure that this and ibmveth are both in linux-image and both packaged in udebs. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1521712/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp