Public bug reported:
Some of the newly installed apps are not shown in the dash immediately
after the install (unlike 14.04). They are shown after the
logout/reboot.
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Incomplete
--
You received this bug notification because
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1526901
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a
Temporary solution, script placed in /lib/systemd/system-sleep/
case $1/$2 in
post/suspend)
if [ `cat /sys/devices/system/cpu/cpu*/cpufreq/scaling_governor
| grep powersave | wc -l` -ne 4 ]; then
echo 'powersave' | tee
Sorry for spam.
I can confirm 3.13 is okay regarding this issue. Not really a good
kernel for broadwell laptops, since some FN-keys don't work etc. but it
will do for exam tomorrow :)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
Did this issue start happening after an update/upgrade? Was there a
prior kernel version where you were not having this particular problem?
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.4
Did this issue start happening after an update/upgrade? Was there a
prior kernel version where you were not having this particular problem?
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.4
Did this issue start happening after an update/upgrade? Was there a
prior kernel version where you were not having this particular problem?
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.4
Did this issue start happening after an update/upgrade? Was there a prior
kernel version where you were not having this particular problem?
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.4
Did this issue start happening after an update/upgrade? Was there a
prior kernel version where you were not having this particular problem?
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.4
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Tags added: regression-update wily
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1525878
Title:
Wacom serial pen
Priliminary patches for this posted at http://people.canonical.com/~xnox
/live-installer/
** Description changed:
should be able to do live-installer installs from mirrors, and cdrom
pool over the network
+
+ with live-installer patches this works.
+
+ however on s390x currently this
Joseph, I encounter this problem also in ubuntu 15.04 with a linux-
image-3.19.0-15-generic.
I can append some additional information how to reproduce this issue.
After my analysis I found dependence: drive filesystem vs backing file
filesystem:
Create backing file on a drive that is formatted
Hi Henrik,
Thanks for your post. I am not familiar with patches. Can you tell me how
to apply it?
Best regards,
Victor.
2015-12-10 21:24 GMT+01:00 Henrik Ingo :
> ** Patch added:
> "0001-uvcvideo-Acer-Integrated-Camera-5986-055a-add-UVC_QU.patch"
>
>
After working on the backport to Vivid, I'm not sure if the patch(Commit
c0ff971) requested in this bug is applicable to Vivid and Trusty.
Commit c0ff971 disables interrupts when re-routing legacy IRQs. However, the
functions affected by commit c0ff971 were not added until v4.2-rc1 by commit:
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
*** This bug is a duplicate of bug 1522918 ***
https://bugs.launchpad.net/bugs/1522918
This bug was fixed in the package linux - 3.19.0-41.46
---
linux (3.19.0-41.46) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522918
[ Upstream Kernel
** Description changed:
This bug is for tracking the 3.13.0-73.116~precise1 upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
This bug was fixed in the package linux - 3.19.0-41.46
---
linux (3.19.0-41.46) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522918
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in __dm_destroy()"
- LP: #1522766
* dm: fix
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
linux| 3.13.0-73.116 | trusty-updates | source
linux-meta | 3.13.0.73.79 | trusty-updates | source
linux-signed | 3.13.0-73.116 | trusty-updates | source
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Changed in:
This bug was fixed in the package linux - 3.19.0-41.46
---
linux (3.19.0-41.46) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522918
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in __dm_destroy()"
- LP: #1522766
* dm: fix
This bug was fixed in the package linux - 3.19.0-41.46
---
linux (3.19.0-41.46) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522918
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in __dm_destroy()"
- LP: #1522766
* dm: fix
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
This bug was fixed in the package linux - 3.19.0-41.46
---
linux (3.19.0-41.46) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522918
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in __dm_destroy()"
- LP: #1522766
* dm: fix
This bug was fixed in the package linux - 3.19.0-41.46
---
linux (3.19.0-41.46) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522918
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in __dm_destroy()"
- LP: #1522766
* dm: fix
This bug was fixed in the package linux - 3.19.0-41.46
---
linux (3.19.0-41.46) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522918
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in __dm_destroy()"
- LP: #1522766
* dm: fix
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges
(arges)
** Changed in: kernel-sru-workflow/promote-to-security
Debian has accepted the patch and its included with 2.02~beta2-33
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1472384
Title:
grub-install doesn't include raid5rec.mod
Status in
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges
(arges)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
This bug was fixed in the package linux-lts-vivid - 3.19.0-41.46~14.04.2
---
linux-lts-vivid (3.19.0-41.46~14.04.2) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1523036
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in
This bug was fixed in the package linux - 3.19.0-41.46
---
linux (3.19.0-41.46) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522918
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in __dm_destroy()"
- LP: #1522766
* dm: fix
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
linux-armadaxp | 3.2.0-1660.84 | precise-updates | source
linux-meta-armadaxp | 3.2.0.1660.68 | precise-updates | source
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status:
This bug was fixed in the package linux - 3.19.0-41.46
---
linux (3.19.0-41.46) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522918
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in __dm_destroy()"
- LP: #1522766
* dm: fix
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
This bug was fixed in the package linux - 3.19.0-41.46
---
linux (3.19.0-41.46) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522918
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in __dm_destroy()"
- LP: #1522766
* dm: fix
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
This bug was fixed in the package linux - 3.19.0-41.46
---
linux (3.19.0-41.46) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522918
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in __dm_destroy()"
- LP: #1522766
* dm: fix
*** This bug is a duplicate of bug 1522108 ***
https://bugs.launchpad.net/bugs/1522108
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
linux | 3.2.0-96.136 | precise-updates | source
linux-meta| 3.2.0.96.112 | precise-updates | source
linux-backports-modules-3.2.0 | 3.2.0-96.88 | precise-updates | source
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In
This bug was fixed in the package linux - 3.19.0-41.46
---
linux (3.19.0-41.46) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522918
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in __dm_destroy()"
- LP: #1522766
* dm: fix
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
linux-lts-trusty| 3.13.0-73.116~precise1 | precise-updates | source
linux-meta-lts-trusty | 3.13.0.73.65 | precise-updates | source
linux-signed-lts-trusty | 3.13.0-73.116~precise1 | precise-updates | source
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux - 3.19.0-41.46
---
linux (3.19.0-41.46) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522918
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in __dm_destroy()"
- LP: #1522766
* dm: fix
** Description changed:
This bug is for tracking the 3.2.0-96.136 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
This bug was fixed in the package linux - 3.19.0-41.46
---
linux (3.19.0-41.46) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522918
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in __dm_destroy()"
- LP: #1522766
* dm: fix
** Description changed:
This bug is for tracking the 3.16.0-56.75~14.04.1 upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Description changed:
This bug is for tracking the 3.2.0-1660.84 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
This bug was fixed in the package linux - 3.19.0-41.46
---
linux (3.19.0-41.46) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522918
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in __dm_destroy()"
- LP: #1522766
* dm: fix
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
This bug was fixed in the package linux - 3.19.0-41.46
---
linux (3.19.0-41.46) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522918
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in __dm_destroy()"
- LP: #1522766
* dm: fix
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges
(arges)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
This bug was fixed in the package linux-lts-vivid - 3.19.0-41.46~14.04.2
---
linux-lts-vivid (3.19.0-41.46~14.04.2) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1523036
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in
This bug was fixed in the package linux - 4.2.0-21.25
---
linux (4.2.0-21.25) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522108
[ Upstream Kernel Changes ]
* staging/dgnc: fix info leak in ioctl
- LP: #1509565
- CVE-2015-7885
*
** Description changed:
This bug is for tracking the 3.13.0-73.116 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
linux-lts-utopic| 3.16.0-56.75~14.04.1 | trusty-updates | source
linux-meta-lts-utopic | 3.16.0.56.47 | trusty-updates | source
linux-signed-lts-utopic | 3.16.0-56.75~14.04.1 | trusty-updates | source
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In
This bug was fixed in the package linux - 3.19.0-41.46
---
linux (3.19.0-41.46) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1522918
[ Upstream Kernel Changes ]
* Revert "dm: fix AB-BA deadlock in __dm_destroy()"
- LP: #1522766
* dm: fix
** Changed in: kernel-sru-workflow
Status: Incomplete => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522918
Title:
linux: 3.19.0-41.46 -proposed tracker
Status
Fresh install of ubuntu 15.04 with 3.19.0-15-generic on a new laptop,
updated to 3.19.0-39-generic. I've been avoiding using the 4.x kernals
since it requires adding acpi=off to the boot instructions, but when
loaded there is still no touchpad.
** Tags added: kernel-bug-exists-upstream
**
Tested on Linux evert-laptop 4.4.0-040400rc5-generic #201512140221 SMP
Mon Dec 14 02:23:36 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1525459
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Description changed:
This bug is for tracking the 3.19.0-41.46~14.04.2 upload package. This
bug will contain status
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Description changed:
This bug is for tracking the 3.19.0-41.46 upload package. This bug will
contain status and
** Changed in: linux (Ubuntu)
Importance: Undecided => High
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1526683
Title:
rtl8821ae has no connection on 5GHz networks and loses
Please:
1. Edit the bug description to include how to reproduce the bug, and what are
the observable consequences of it.
2. Set this bug status to "confirmed".
Thank you.
** Changed in: linux (Ubuntu)
Status: Confirmed => Incomplete
--
You received this bug notification because you
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1526537/+attachment/4535849/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1526537
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1526537/+attachment/4535852/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1526537/+attachment/4535850/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1526537
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/1526537/+attachment/4535847/+files/IwConfig.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/1526537/+attachment/4535854/+files/RfKill.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1526537/+attachment/4535853/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1526537/+attachment/4535846/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1526537/+attachment/4535851/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "JournalErrors.txt"
https://bugs.launchpad.net/bugs/1526537/+attachment/4535848/+files/JournalErrors.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1526537/+attachment/4535855/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1526537/+attachment/4535856/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Changed in: linux (Ubuntu)
Importance: Undecided => Critical
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1526661
Title:
Ubuntu 15.10 hangs on shutdown
Status in linux package
** Summary changed:
- [drm:intel_pipe_config_compare [i915]] *ERROR* mismatch in ips_enabled
(expected 1, found 0)
+ dmesg output contains error: "*ERROR* mismatch in ips_enabled (expected 1,
found 0)"
** Description changed:
+ The following error does appear in my dmesg output after every
Public bug reported:
When ever I connect m Nokia X2 Dual DS with Ubuntu 14.04LTS via Bluetooth and
browse files in m phone and try to copy to computer it gives me message
'Error while copying “IMG_20151206_151549.jpg”.
There was an error copying the file into /home/zahid/Desktop.
Another
To be honest, it's pretty annoying bug, as I am not able to install any
xenial VM :-(
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1524069
Title:
[Xenial] KVM trusty guest 3.13.0-68
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1526811
Title:
SRU: walker list corruption while being intensively stressed
Per apw's request I signed and uploaded all packages to
http://people.canonical.com/~chiluk/lp1523606/
I also added dep3 header information.
For ease of review I attached the updated xenial debdiff here, and
deleted all old debdiffs.
** Patch removed: "lp1523606.trusty.debdiff"
** Description changed:
This bug is for tracking the 3.19.0-41.46~14.04.2 upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1517951
Title:
CVE-2013-7446
Status in linux package in
apport information
** Tags added: apport-collected xenial
** Description changed:
On my laptop I am using the ubuntu in persistent mode with a backing files:
casper-rw, home-rw. For some time in the new editions of ubuntu [ 15.04 / 15.10
/ 16.04 daily (15.12) ] I meet with error:
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1526537/+attachment/4535845/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1526537
If you want to try yourself, this is what worked for me on a E550,
Ubuntu 15.10:
uname -a
# check your current kernel version, then download the same version
# note, no root!
apt-get source linux-image-extra-4.2.0-19-generic
# install packages needed to build the kernel
sudo apt-get build-dep
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu)
Status: Confirmed => Triaged
** Tags added: kernel-fixed-upstream needs-bisect wily
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
Did this issue start happening after an update/upgrade? Was there a
prior kernel version where you were not having this particular problem?
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.4
** Changed in: linux (Ubuntu Trusty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1294283
Title:
Memory balloning in Hyper-V generation 2
1 - 100 of 346 matches
Mail list logo