This bug is missing log files that will aid in diagnosing the problem.
From a terminal window please run:
apport-collect 1465663
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a
As we are anticipating the issue, based on others feedback, we don't
have logs.
And having logs for data corruption sounds highly difficult to obtain.
So, confirming it.
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a
Geoff, thank you for reporting this and helping make Ubuntu better. As
per www.dell.com/support/home/us/en/19/product-
support/product/optiplex-320/drivers an update to your computer's buggy
and outdated BIOS is available (1.1.12). If you update to this following
Public bug reported:
Dear all,
In order to be able to upgrade one of our servers to the latest LTS (14.04), we
need that the Samsung SSD 8 series to be blacklisted from the libata for the
TRIM command.
Due to the bug described here [1], not having the SSD blacklisted would lead
to data
tests ran: 193, failed: 28;
http://kernel.ubuntu.com/testing/onibi__3.19.0-20.20__2015-06-16_11-24-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465419
Title:
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
** Description changed:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating
** Attachment added: dmesg.txt
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1464983/+attachment/4415663/+files/dmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1464983
** Attachment added: wakeup
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1464983/+attachment/4415662/+files/wakeup
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1464983
** Changed in: linux (Ubuntu Utopic)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465653
Title:
Utopic update to 3.16.7-ckt13 stable release
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: bluez (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1446239
I'm running into this problem (keys don't get automatically renewed and
are expired after 10 minutes) on a precise server running the trusty lts
kernel.
I've just rebooted into the latest version (3.13.0.53.46), and the
problem is still present.
#33 mentions that installing keyutils fixes this.
the bluetooth driver rtl8723au_bt-master from git-hub works fine, wlan driver
rtl8723au too.
Wlan driver I inserted into dkms
Unfortunately I didn't managed to integrate bluetooth driver rtl8723au_bt into
dkms.
After every kernel update it has to be reinstalled.
So could you please insert
tests ran: 152, failed: 74;
http://kernel.ubuntu.com/testing/rukbah__3.19.0-20.20__2015-06-16_11-27-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465419
Title:
I updated the bug status. Thanks!
** Changed in: linux (Ubuntu)
Status: Incomplete = Fix Released
** Changed in: bcmwl (Ubuntu)
Status: Confirmed = Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bcmwl in Ubuntu.
** Tags added: kernel-bug-exists-upstream
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1464723
Title:
Human interface devices stop working on USB 2.0 ports after some time,
continue
muka, as per http://support.lenovo.com/us/en/products/laptops-and-
netbooks/lenovo-y-series-laptops/y50-70-notebook-lenovo an update to
your computer's buggy and outdated BIOS is available (9ECN37WW). If you
update to this following https://help.ubuntu.com/community/BIOSUpdate
does it change
** Changed in: linux (Ubuntu Utopic)
Status: New = Fix Committed
** Changed in: linux (Ubuntu)
Status: New = Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465613
** Changed in: linux (Ubuntu Utopic)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1463445
Title:
CVE-2015-4003
Status in linux package in
** Changed in: linux (Ubuntu Utopic)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1416503
Title:
CVE-2015-1420
Status in linux package in
** Changed in: linux (Ubuntu Utopic)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1463442
Title:
CVE-2015-4001
Status in linux package in
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Utopic)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Changed in: linux (Ubuntu Utopic)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1463444
Title:
CVE-2015-4002
Status in linux package in
@Rob: Thanks to your advice I could avoid the errors according to #162,
but I am ending up at the same problem as you described in #166! Has
somebody any idea to solve this?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in
Have this bug with my Bluetooth mouse, aftere resume-wake and mouse
activity. Workaround: before mouse activity turn off bluetooth
connection via GUI, so bluetooth status icon does not have small padlock
in it.
I tested issue with trusty and vivid kernels.
$ uname -a
Linux ilya-vaio
related bug in redhat https://bugzilla.redhat.com/show_bug.cgi?id=630911
** Bug watch added: Red Hat Bugzilla #630911
https://bugzilla.redhat.com/show_bug.cgi?id=630911
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Tags removed: kernel-key
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to kexec-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1400319
Title:
[Hyper-V] Kernel panic not functional on 32bit Ubuntu 14.10 and 15.04
Status in
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either
** Changed in: linux (Ubuntu Vivid)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465696
Title:
Vivid update to 3.19.8-ckt1 stable release
Status
** Changed in: linux (Ubuntu Vivid)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1463442
Title:
CVE-2015-4001
Status in linux package in
** Changed in: linux (Ubuntu Vivid)
Status: In Progress = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1439780
Title:
[Hyper-V] Fiber Channel critical target
** Changed in: linux (Ubuntu Vivid)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1416503
Title:
CVE-2015-1420
Status in linux package in
Public bug reported:
This bug is for tracking the 3.16.0-42.56 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
I built two more test kernels. One has commit df438af reverted and the
other has df438af reverted. Can you test each of these kernels and see
which one resolves the bug? The kernels can be downloaded from:
http://kernel.ubuntu.com/~jsalisbury/lp1465322/df438af-reverted
and
Public bug reported:
This bug is for tracking the 3.19.0-22.22 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Changed in: linux (Ubuntu Vivid)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1463445
Title:
CVE-2015-4003
Status in linux package in
** Changed in: linux (Ubuntu Vivid)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1463444
Title:
CVE-2015-4002
Status in linux package in
I can confirm that reverting df438afe2d93 (debugfs: leave freeing a
symlink body until inode eviction) fixes the issue on an i386 VM. But
it would be great to have the original bug reporter to test that too.
--
You received this bug notification because you are a member of Kernel
Packages,
** Tags removed: kernel-key
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1440103
Title:
[Hyper-V] Kernel panic not functional on Vivid
Status in linux package in Ubuntu:
Confirmed
Hello,
I'm quite new here, so excuse if this is stupid question but would this
https://github.com/torvalds/linux/commit/47c1ffb2b6b630894e9a16442611c056ab21c057
be backported to the 14.04 kernel?
Looks like it is the cause of problems with E544 and E554 touchpad
--
You received this bug
Public bug reported:
This bug is for tracking the 3.13.0-56.93 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Attachment added: lspci-vnvn.log
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1465808/+attachment/4415784/+files/lspci-vnvn.log
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Public bug reported:
This happened twice during the last weeks with different kernel versions
on Kubuntu 15.04 (latest kernel images released). Steps taken:
1) Mount cifs: sudo mount -t cifs -ouser=admin //x.y.z.a/video
/home/packi/video/
2) Watch movies (VLC startet using dolphin)
3) Hibernate
tests ran: 167, failed: 27;
http://kernel.ubuntu.com/testing/fozzie__3.19.0-20.20__2015-06-16_14-11-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465419
Title:
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
I just tested the linked upstream kernel. It does not change the
behavior, I am observing the same bug on v4.1-rc8-unstable.
I added the tag accordingly.
Regarding the question whether this was happening after an upgrade.
Well it's actually a little complicated.
If my memory does not deceive
I filed debian bug https://bugs.debian.org/cgi-
bin/bugreport.cgi?bug=788841 about the race condition that I think
exists.
** Bug watch added: Debian Bug tracker #788841
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=788841
--
You received this bug notification because you are a member of
This bug is missing log files that will aid in diagnosing the problem.
From a terminal window please run:
apport-collect 1465808
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a
tests ran: 167, failed: 27;
http://kernel.ubuntu.com/testing/onibi__3.19.0-20.20__2015-06-16_14-21-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465419
Title:
Confirming manually as apport-collect is broken on Kubuntu, see #1439784
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
I updated my ppa for vivid. Changed module version. But I get feedbacks
that it worked without that.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1382404
Title:
10ec:b723 Realtek
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either
This bug is missing log files that will aid in diagnosing the problem.
From a terminal window please run:
apport-collect 1464490
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a
** Changed in: linux (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1463442
Title:
CVE-2015-4001
Status in linux package in
** Changed in: linux (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465796
Title:
Trusty update to 3.13.11-ckt21 stable release
** Changed in: linux (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1463444
Title:
CVE-2015-4002
Status in linux package in
** Changed in: linux (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1463445
Title:
CVE-2015-4003
Status in linux package in
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New = Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Canonical Kernel Team (canonical-kernel-team) = Brad Figg
(brad-figg)
--
You received this bug notification because you are a member
** Changed in: linux (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1416503
Title:
CVE-2015-1420
Status in linux package in
Both these test kernels for Trusty and Utopic worked as well.
Thanks,
Steve
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1463584
Title:
[Hyper-V] Add support for VMBus panic notifier
** Changed in: kernel-sru-workflow/prepare-package-signed
Status: New = Fix Released
** Changed in: kernel-sru-workflow/prepare-package-signed
Assignee: Canonical Kernel Team (canonical-kernel-team) = Brad Figg
(brad-figg)
--
You received this bug notification because you are a
*** This bug is a duplicate of bug 1338706 ***
https://bugs.launchpad.net/bugs/1338706
Can anyone tell me if this bug affects kernel 3.10?
I don't think this has the SATA 3.1 codes yet.. so I think it should be fine?
Thanks!
--
You received this bug notification because you are a member of
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465136
Title:
NVMe shutdown and suspend delay time is
** Changed in: kernel-sru-workflow/prepare-package-signed
Status: New = Fix Released
** Changed in: kernel-sru-workflow/prepare-package-signed
Assignee: Canonical Kernel Team (canonical-kernel-team) = Brad Figg
(brad-figg)
--
You received this bug notification because you are a
** Changed in: linux (Ubuntu Vivid)
Status: In Progress = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1460674
Title:
[i915_bpo] Rebase driver to 4.2~pre
Status
** Changed in: linux (Ubuntu Vivid)
Status: Triaged = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1460661
Title:
[i915, i915_bpo, snd-hda-intel] Switch to
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-lts-trusty (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux-lts-utopic (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux
** Description changed:
After 10 min or so, or an hour.
Workaround seems to be locking the CPU freq to something. I'm guessing
there might be a bug in the powernow-k8 driver that exhibits itself in
- systems with the XPRESS 200M CPU chipset.
+ systems with the XPRESS 200M GPU chipset.
Here's some more detail:
running 'strace df' shows the following:
statfs64(/sys/kernel/debug, 84, 0xbfddc6bc) = -1 ENOSYS (Function
not implemented)
A quick test shows that adding '.statfs = simple_statfs' in the
debugfs_super_operations struct fixes the problem, but I'm not sure
that's the
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New = Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Canonical Kernel Team (canonical-kernel-team) = Brad Figg
(brad-figg)
--
You received this bug notification because you are a member
I emailed Killer Network Support, the answered:
Thank you for your email. We have worked with Qualcomm to verify linux
drivers for teh Killer 1525. We have seen it work, and are awaiting the
open source/linux community to accept the 6174 2.x ath10k firmware so
that it is posted and available for
** Changed in: linux (Ubuntu Vivid)
Status: Triaged = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1445195
Title:
[Hyper-V] Kernel patches for storvsc
Status in
Tested! System still freezes as before.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1458569
Title:
System freezes randomly
Status in linux package in Ubuntu:
Confirmed
Bug
Reverting df438af seems to have fixed it.
$ cat /proc/version_signature
Ubuntu 3.2.0-86.123~lp1465322Commitdf438afReverted-generic 3.2.69
$ df | head -3
Filesystem 1K-blocksUsed Available Use% Mounted on
/dev/vda17481832 4735296 2366480 67% /
udev 371924 4
** Changed in: linux (Ubuntu Utopic)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465136
Title:
NVMe shutdown and suspend delay time is too short
apport information
** Attachment added: ProcEnviron.txt
https://bugs.launchpad.net/bugs/1465808/+attachment/4415843/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: RfKill.txt
https://bugs.launchpad.net/bugs/1465808/+attachment/4415847/+files/RfKill.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465808
apport information
** Attachment added: Lspci.txt
https://bugs.launchpad.net/bugs/1465808/+attachment/4415840/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465808
apport information
** Attachment added: Lsusb.txt
https://bugs.launchpad.net/bugs/1465808/+attachment/4415841/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465808
apport information
** Attachment added: CRDA.txt
https://bugs.launchpad.net/bugs/1465808/+attachment/4415836/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465808
apport information
** Attachment added: ProcModules.txt
https://bugs.launchpad.net/bugs/1465808/+attachment/4415845/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: WifiSyslog.txt
https://bugs.launchpad.net/bugs/1465808/+attachment/4415849/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Tags added: kernel-key
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1404409
Title:
[regression] Intel 10Gb NIC Crashes
Status in linux package in Ubuntu:
Triaged
Bug
apport information
** Attachment added: PulseList.txt
https://bugs.launchpad.net/bugs/1465808/+attachment/4415846/+files/PulseList.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: JournalErrors.txt
https://bugs.launchpad.net/bugs/1465808/+attachment/4415839/+files/JournalErrors.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: IwConfig.txt
https://bugs.launchpad.net/bugs/1465808/+attachment/4415838/+files/IwConfig.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Tags added: apport-collected vivid
** Description changed:
This happened twice during the last weeks with different kernel versions
on Kubuntu 15.04 (latest kernel images released). Steps taken:
1) Mount cifs: sudo mount -t cifs -ouser=admin //x.y.z.a/video
apport information
** Attachment added: ProcInterrupts.txt
https://bugs.launchpad.net/bugs/1465808/+attachment/4415844/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: CurrentDmesg.txt
https://bugs.launchpad.net/bugs/1465808/+attachment/4415837/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: ProcCpuinfo.txt
https://bugs.launchpad.net/bugs/1465808/+attachment/4415842/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
@chiluk: yes, i did before adding libata.force=noncq to my kernel
command line.
another article on SSDs from this manufacturer has further information:
https://blog.algolia.com/when-solid-state-drives-are-not-that-solid/
--
You received this bug notification because you are a member of Kernel
Just a comment, as it is right now, attempt to install trusty with hwe-v will
fail due to this bug.
In order to make that work, we need a released (or daily) image and
specifically the related boot-initrd 20150609.
That should happen in due course, the cloud-image daily builds had not
I am manually hand-holding a build through for the latest kernel CVE.
Image builds and promotion are in the works. ETA tomorrow morning.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
I've spent hours trying to sort this out. I've found no sane way to do a
BIOS upgrade with the current utilty provided by Lenovo
FreeDOS seems the best way but files name get rewritten to 8 char and I
would avoid to brik the pc (maybe just an ignorant fear?)
Need to spend more time on this.
I
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New = Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Canonical Kernel Team (canonical-kernel-team) = Brad Figg
(brad-figg)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/prepare-package-signed
Status: New = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465798
Title:
linux: 3.13.0-56.93 -proposed
Can I reopen this somehow?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1376120
Title:
Touch-pad dosen't work after installing Ubuntu 14.04 [Dual boot with
Windows 8]
Status in
Is there way to disable this useless brad-fagg bot somehow? It keeps
complaining over logs which are already attached.
** Changed in: linux (Ubuntu)
Status: Incomplete = New
** Changed in: linux (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1452165
Title:
currupted btrfs breaks both recovery and boot
Status
1 - 100 of 148 matches
Mail list logo