[Kernel-packages] [Bug 1474538] Re: nouveau driver fills syslog when running xscreensaver (molecule)

2016-02-22 Thread Christopher M. Penalver
As per https://bugs.freedesktop.org/show_bug.cgi?id=91373#c10.

** No longer affects: linux (Ubuntu)

** Project changed: nouveau => linux (Ubuntu)

** Changed in: linux (Ubuntu)
   Importance: Medium => Undecided

** Changed in: linux (Ubuntu)
   Status: Confirmed => New

** Changed in: linux (Ubuntu)
 Remote watch: freedesktop.org Bugzilla #91373 => None

** Changed in: linux (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1474538

Title:
  nouveau driver fills syslog when running xscreensaver (molecule)

Status in linux package in Ubuntu:
  Invalid

Bug description:
  nouveau fills /var/log/kern.log and /var/log/syslog with _very_ frequent 
messages when the molecule xscreensaver is running.
  This is a big problem as it prevents me from letting my machine do anything 
overnight (with the screenlock on).

  I haven't tested other screensavers and don't appear to get messages
  otherwise. Here is an excerpt:

  8< CUT HERE 
8<=
  $ tail -n 3000 kern.log.1 | head -n 50
  Jul 10 18:02:35 dioo-XPS kernel: [114893.357149] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
  Jul 10 18:02:35 dioo-XPS kernel: [114893.406261] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
  Jul 10 18:02:35 dioo-XPS kernel: [114893.406269] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
  Jul 10 18:02:35 dioo-XPS kernel: [114893.420442] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
  Jul 10 18:02:35 dioo-XPS kernel: [114893.420447] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
  Jul 10 18:02:35 dioo-XPS kernel: [114893.479210] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
  Jul 10 18:02:35 dioo-XPS kernel: [114893.479217] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
  Jul 10 18:02:35 dioo-XPS kernel: [114893.568349] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
  Jul 10 18:02:35 dioo-XPS kernel: [114893.568356] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
  Jul 10 18:02:35 dioo-XPS kernel: [114893.622806] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
  Jul 10 18:02:35 dioo-XPS kernel: [114893.622813] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
  Jul 10 18:02:35 dioo-XPS kernel: [114893.637217] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
  Jul 10 18:02:35 dioo-XPS kernel: [114893.637221] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
  Jul 10 18:02:35 dioo-XPS kernel: [114893.695836] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
  Jul 10 18:02:35 dioo-XPS kernel: [114893.695843] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
  Jul 10 18:02:35 dioo-XPS kernel: [114893.784309] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
  Jul 10 18:02:35 dioo-XPS kernel: [114893.784316] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
  Jul 10 18:02:35 dioo-XPS kernel: [114893.838180] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
  Jul 10 18:02:35 dioo-XPS kernel: [114893.838187] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
  Jul 10 18:02:35 dioo-XPS kernel: [114893.853754] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
  Jul 10 18:02:35 dioo-XPS kernel: [114893.853759] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
  Jul 10 18:02:35 dioo-XPS kernel: [114893.913521] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
  Jul 10 18:02:35 dioo-XPS kernel: [114893.913528] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
  Jul 10 18:02:35 dioo-XPS kernel: [114893.977242] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
  Jul 10 18:02:35 dioo-XPS kernel: [114893.977249] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
  Jul 10 18:02:35 dioo-XPS kernel: [114894.068780] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
  Jul 10 18:02:35 dioo-XPS kernel: [114894.068788] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
  Jul 10 18:02:35 dioo-XPS kernel: [114894.122599] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
  Jul 10 18:02:35 dioo-XPS kernel: [114894.122606] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
  Jul 10 18:02:35 dioo-XPS kernel: [114894.137025] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
  Jul 10 18:02:35 dioo-XPS kernel: [114894.

[Kernel-packages] [Bug 1474538] [NEW] nouveau driver fills syslog when running xscreensaver (molecule)

2016-02-22 Thread Launchpad Bug Tracker
You have been subscribed to a public bug:

nouveau fills /var/log/kern.log and /var/log/syslog with _very_ frequent 
messages when the molecule xscreensaver is running.
This is a big problem as it prevents me from letting my machine do anything 
overnight (with the screenlock on).

I haven't tested other screensavers and don't appear to get messages
otherwise. Here is an excerpt:

8< CUT HERE 
8<=
$ tail -n 3000 kern.log.1 | head -n 50
Jul 10 18:02:35 dioo-XPS kernel: [114893.357149] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:35 dioo-XPS kernel: [114893.406261] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:35 dioo-XPS kernel: [114893.406269] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:35 dioo-XPS kernel: [114893.420442] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:35 dioo-XPS kernel: [114893.420447] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:35 dioo-XPS kernel: [114893.479210] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:35 dioo-XPS kernel: [114893.479217] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:35 dioo-XPS kernel: [114893.568349] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:35 dioo-XPS kernel: [114893.568356] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:35 dioo-XPS kernel: [114893.622806] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:35 dioo-XPS kernel: [114893.622813] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:35 dioo-XPS kernel: [114893.637217] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:35 dioo-XPS kernel: [114893.637221] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:35 dioo-XPS kernel: [114893.695836] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:35 dioo-XPS kernel: [114893.695843] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:35 dioo-XPS kernel: [114893.784309] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:35 dioo-XPS kernel: [114893.784316] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:35 dioo-XPS kernel: [114893.838180] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:35 dioo-XPS kernel: [114893.838187] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:35 dioo-XPS kernel: [114893.853754] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:35 dioo-XPS kernel: [114893.853759] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:35 dioo-XPS kernel: [114893.913521] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:35 dioo-XPS kernel: [114893.913528] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:35 dioo-XPS kernel: [114893.977242] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:35 dioo-XPS kernel: [114893.977249] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:35 dioo-XPS kernel: [114894.068780] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:35 dioo-XPS kernel: [114894.068788] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:35 dioo-XPS kernel: [114894.122599] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:35 dioo-XPS kernel: [114894.122606] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:35 dioo-XPS kernel: [114894.137025] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:35 dioo-XPS kernel: [114894.137030] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:35 dioo-XPS kernel: [114894.195675] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:35 dioo-XPS kernel: [114894.195682] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:36 dioo-XPS kernel: [114894.284069] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:36 dioo-XPS kernel: [114894.284078] nouveau E[   
PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 
0x906e
Jul 10 18:02:36 dioo-XPS kernel: [114894.339830] nouveau E[   
PFIFO][:01:00.0] PBDMA0: LBREQ
Jul 10 18:02:36 dioo-XPS kernel: [114894.339837] nouveau E[   
PF

[Kernel-packages] [Bug 1543980] Re: Kernel 3.13.0-77 crashes (can be triggered by Samba)

2016-02-22 Thread Stefan Metzmacher
https://forge.univention.org/bugzilla/show_bug.cgi?id=40558#c11

Indicates that commit
51cd3ed4c41b3895869925b99dd95a704bd2c91a unix: avoid use-after-free in 
ep_remove_wait_queue
should be reverted in order to avoid this regression.

Can we please get some progress on this?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1543980

Title:
  Kernel 3.13.0-77 crashes (can be triggered by Samba)

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Trusty:
  Triaged

Bug description:
  Ubuntu 14.04.3 LTS

  After updating to kernel 3.13.0-77 system crashes.
  First, network dies, then the whole system.
  There are several kernel crashes in the logs.

  --- snip ---
  ProblemType: KernelOops
  Annotation: Your system might become unstable now and might need to be 
restarted.
  Date: Wed Feb 10 09:20:35 2016
  Failure: oops
  OopsText:
   BUG: soft lockup - CPU#1 stuck for 23s! [smbd:5908]
  --- snap ---

  Followed by kernel stack traces.

  After some investigation, it turned out that the crash can be triggered by 
Samba.
  It's easily reproducible by running the following commands in the Samba 
master branch:
  ./configure.developer
  TDB_NO_FSYNC=1 make -j test FAIL_IMMEDIATELY=1 SOCKET_WRAPPER_KEEP_PCAP=1 
TESTS="samba3.raw.composite"

  Downgrading to kernel 3.13.0-76 solves this problem.

  Please let me know if we can provide more information or help testing.

  Thanks!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1543980/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548519] Re: linux: 3.13.0-80.124 -proposed tracker

2016-02-22 Thread Brad Figg
** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Brad Figg 
(brad-figg)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548519

Title:
  linux: 3.13.0-80.124 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  New
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Trusty:
  New

Bug description:
  This bug is for tracking the 3.13.0-80.124 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:49 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Monday, 22. February 2016 21:49 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548519/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548548] Re: linux: 3.19.0-52.58 -proposed tracker

2016-02-22 Thread Brad Figg
** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Brad Figg 
(brad-figg)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548548

Title:
  linux: 3.19.0-52.58 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  New
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Vivid:
  New

Bug description:
  This bug is for tracking the 3.19.0-52.58 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 22. February 2016 23:08 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Monday, 22. February 2016 23:08 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548548/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548579] Re: linux: 4.2.0-31.36 -proposed tracker

2016-02-22 Thread Brad Figg
** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/prepare-package-signed
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Brad Figg 
(brad-figg)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548579

Title:
  linux: 4.2.0-31.36 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  New
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Wily:
  New

Bug description:
  This bug is for tracking the 4.2.0-31.36 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 23. February 2016 01:25 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Tuesday, 23. February 2016 01:25 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548579/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548506] Re: linux-armadaxp: 3.2.0-1663.87 -proposed tracker

2016-02-22 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.2.0-1663.87 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:02 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Monday, 22. February 2016 21:02 UTC
  kernel-stable-master-bug:1548504
+ kernel-stable-Certification-testing-end:Tuesday, 23. February 2016 06:01 UTC
+ kernel-stable-Security-signoff-end:Tuesday, 23. February 2016 06:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1548506

Title:
  linux-armadaxp: 3.2.0-1663.87 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-armadaxp source package in Precise:
  In Progress

Bug description:
  This bug is for tracking the 3.2.0-1663.87 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:02 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Monday, 22. February 2016 21:02 UTC
  kernel-stable-master-bug:1548504
  kernel-stable-Certification-testing-end:Tuesday, 23. February 2016 06:01 UTC
  kernel-stable-Security-signoff-end:Tuesday, 23. February 2016 06:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548506/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548504] Re: linux: 3.2.0-100.140 -proposed tracker

2016-02-22 Thread Brad Figg
** Changed in: kernel-sru-workflow/prepare-package
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548504

Title:
  linux: 3.2.0-100.140 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.2.0-100.140 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:49 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Monday, 22. February 2016 21:49 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548504/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] ProcInterrupts.txt

2016-02-22 Thread jone
apport information

** Attachment added: "ProcInterrupts.txt"
   
https://bugs.launchpad.net/bugs/1548587/+attachment/4578629/+files/ProcInterrupts.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] WifiSyslog.txt

2016-02-22 Thread jone
apport information

** Attachment added: "WifiSyslog.txt"
   
https://bugs.launchpad.net/bugs/1548587/+attachment/4578632/+files/WifiSyslog.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] ProcCpuinfo.txt

2016-02-22 Thread jone
apport information

** Attachment added: "ProcCpuinfo.txt"
   
https://bugs.launchpad.net/bugs/1548587/+attachment/4578627/+files/ProcCpuinfo.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] ProcEnviron.txt

2016-02-22 Thread jone
apport information

** Attachment added: "ProcEnviron.txt"
   
https://bugs.launchpad.net/bugs/1548587/+attachment/4578628/+files/ProcEnviron.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] UdevDb.txt

2016-02-22 Thread jone
apport information

** Attachment added: "UdevDb.txt"
   https://bugs.launchpad.net/bugs/1548587/+attachment/4578631/+files/UdevDb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] AlsaInfo.txt

2016-02-22 Thread jone
apport information

** Attachment added: "AlsaInfo.txt"
   
https://bugs.launchpad.net/bugs/1548587/+attachment/4578622/+files/AlsaInfo.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] apport information

2016-02-22 Thread jone
ApportVersion: 2.19.1-0ubuntu5
Architecture: amd64
AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/by-path', 
'/dev/snd/midiC0D0', '/dev/snd/pcmC0D1p', '/dev/snd/pcmC0D0c', 
'/dev/snd/pcmC0D0p', '/dev/snd/controlC0', '/dev/snd/seq', '/dev/snd/timer'] 
failed with exit code 1:
DistroRelease: Ubuntu 15.10
HibernationDevice: RESUME=UUID=5743f1a7-f815-48de-b708-d0c8bf6b9254
InstallationDate: Installed on 2016-02-23 (0 days ago)
InstallationMedia: Xubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021)
IwConfig:
 eno1636  no wireless extensions.
 
 lono wireless extensions.
Lsusb:
 Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
 Bus 002 Device 003: ID 0e0f:0002 VMware, Inc. Virtual USB Hub
 Bus 002 Device 002: ID 0e0f:0003 VMware, Inc. Virtual Mouse
 Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
MachineType: VMware, Inc. VMware Virtual Platform
Package: linux (not installed)
ProcFB: 0 svgadrmfb
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.2.0-30-generic 
root=UUID=a39ebdaf-d4fe-45b9-9b64-4f80499affe8 ro find_preseed=/preseed.cfg 
auto noprompt priority=critical locale=en_US quiet
ProcVersionSignature: Ubuntu 4.2.0-30.35-generic 4.2.8-ckt3
PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
RelatedPackageVersions:
 linux-restricted-modules-4.2.0-30-generic N/A
 linux-backports-modules-4.2.0-30-generic  N/A
 linux-firmware1.149.3
RfKill:
 
Tags:  wily
UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev'
Uname: Linux 4.2.0-30-generic x86_64
UpgradeStatus: No upgrade log present (probably fresh install)
UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
_MarkForUpload: True
dmi.bios.date: 07/02/2015
dmi.bios.vendor: Phoenix Technologies LTD
dmi.bios.version: 6.00
dmi.board.name: 440BX Desktop Reference Platform
dmi.board.vendor: Intel Corporation
dmi.board.version: None
dmi.chassis.asset.tag: No Asset Tag
dmi.chassis.type: 1
dmi.chassis.vendor: No Enclosure
dmi.chassis.version: N/A
dmi.modalias: 
dmi:bvnPhoenixTechnologiesLTD:bvr6.00:bd07/02/2015:svnVMware,Inc.:pnVMwareVirtualPlatform:pvrNone:rvnIntelCorporation:rn440BXDesktopReferencePlatform:rvrNone:cvnNoEnclosure:ct1:cvrN/A:
dmi.product.name: VMware Virtual Platform
dmi.product.version: None
dmi.sys.vendor: VMware, Inc.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] CRDA.txt

2016-02-22 Thread jone
apport information

** Attachment added: "CRDA.txt"
   https://bugs.launchpad.net/bugs/1548587/+attachment/4578623/+files/CRDA.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] ProcModules.txt

2016-02-22 Thread jone
apport information

** Attachment added: "ProcModules.txt"
   
https://bugs.launchpad.net/bugs/1548587/+attachment/4578630/+files/ProcModules.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] CurrentDmesg.txt

2016-02-22 Thread jone
apport information

** Attachment added: "CurrentDmesg.txt"
   
https://bugs.launchpad.net/bugs/1548587/+attachment/4578624/+files/CurrentDmesg.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] Lspci.txt

2016-02-22 Thread jone
apport information

** Attachment added: "Lspci.txt"
   https://bugs.launchpad.net/bugs/1548587/+attachment/4578626/+files/Lspci.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] JournalErrors.txt

2016-02-22 Thread jone
apport information

** Attachment added: "JournalErrors.txt"
   
https://bugs.launchpad.net/bugs/1548587/+attachment/4578625/+files/JournalErrors.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] Re: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

2016-02-22 Thread jone
I have exactly the same issue.

** Tags added: apport-collected wily

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] Re: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

2016-02-22 Thread maxxik
I'm experiencing the same issue with and without vmware-tools and also
with and without open-vm-tools.

Tried to enable/disable 3D accelaration - no success.

Kubuntu 15.10 with the latest kernel (4.2.0-30) shows just black screen
after reboot.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548506] Re: linux-armadaxp: 3.2.0-1663.87 -proposed tracker

2016-02-22 Thread Ike Panhc
** Summary changed:

- linux-armadaxp:  -proposed tracker
+ linux-armadaxp: 3.2.0-1663.87 -proposed tracker

** Description changed:

- This bug is for tracking the  upload package. This
- bug will contain status and testing results related to that upload.
+ This bug is for tracking the 3.2.0-1663.87 upload package. This bug will
+ contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:02 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Monday, 22. February 2016 21:02 UTC
  kernel-stable-master-bug:1548504

** Changed in: kernel-sru-workflow
 Assignee: (unassigned) => Ike Panhc (ikepanhc)

** Changed in: kernel-sru-workflow/regression-testing
 Assignee: Canonical Kernel Team (canonical-kernel-team) => Ike Panhc 
(ikepanhc)

** Changed in: kernel-sru-workflow/verification-testing
 Assignee: Canonical Hardware Enablement ARM Kernel 
(canonical-hwe-arm-kernel) => Ike Panhc (ikepanhc)

** Changed in: linux-armadaxp (Ubuntu)
   Status: New => Invalid

** Changed in: linux-armadaxp (Ubuntu Precise)
   Status: New => In Progress

** Changed in: linux-armadaxp (Ubuntu Precise)
 Assignee: (unassigned) => Ike Panhc (ikepanhc)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1548506

Title:
  linux-armadaxp: 3.2.0-1663.87 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-armadaxp source package in Precise:
  In Progress

Bug description:
  This bug is for tracking the 3.2.0-1663.87 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:02 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Monday, 22. February 2016 21:02 UTC
  kernel-stable-master-bug:1548504

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548506/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] Re: Ubuntu 15.10 VM won't show UI after upgrading to 4.2.0-30

2016-02-22 Thread Francis Chuang
After some testing, I noticed that it installs and updates to 4.2.0-30
and works correctly in VirtualBox 5.0.14 with the VirtualBox extensions
installed.

I am now suspecting that the issue is due to some conflict with the
VMWare tools.

** Summary changed:

- Ubuntu 15.10 VM won't show UI after upgrading to 4.2.0-30
+ Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1451277] Re: Extremely high IOWait and processes hungs after utopic->vivid upgrade with Iomega Zip drive (IDE)

2016-02-22 Thread Christopher M. Penalver
Sergio Callegari, please boot into a live environment via 
http://cdimage.ubuntu.com/daily-live/current/ and execute the following command 
only once, as it will automatically gather debugging information, in a terminal:
apport-collect 1451277

** Changed in: linux (Ubuntu)
   Status: Confirmed => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1451277

Title:
  Extremely high IOWait and processes hungs after utopic->vivid upgrade
  with Iomega Zip drive (IDE)

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  On Kubuntu, 64 bit AMD Phenom2 machine with 4 cores, and old (Geoforge 7025) 
Nvidia graphics.
  Using LVM. Machine also has a 2 disk software raid (mirroring).

  The machine was working fine before the upgrade, now it is almost
  impossible to use it... I see Wait in Top always above 60%; in dmesg
  after a few minutes that the machine is up even if the machine does
  nothing. I see hung processes (typically vgs, but occasionally also
  others).  LVM related commands (e.g. lvdisplay) almost always hung at
  the terminal. I also see in ps some kernel workers almost constantly
  stuck in D state. Also, the machine takes ages to shutdown.

  Issue remains there also if I disable X (switch off the X login
  manager, sddm) and check at the console.

  Sorry I cannot provide details with apport, but the machine has been
  switched off and I will not be able to take it up again before a few
  days from now.

  The symptom I am observing may also be a sign of failing hardware, so
  please leave the bug as unconfirmed until I make some more tests or
  someone provide details on similar issues. In the meantime I would
  like to see if others are experiencing a similar serious issue. Is
  there anything specific that has changed between utopic and vivid, I
  should look into?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1451277/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548504] Re: linux: 3.2.0-100.140 -proposed tracker

2016-02-22 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.2.0-100.140 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
- kernel-stable-Prepare-package-start:Monday, 22. February 2016 20:57 UTC
- kernel-stable-phase-changed:Monday, 22. February 2016 21:04 UTC
+ kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:49 UTC
+ kernel-stable-phase:Prepare
+ kernel-stable-phase-changed:Monday, 22. February 2016 21:49 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548504

Title:
  linux: 3.2.0-100.140 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-lbm series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.2.0-100.140 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:49 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Monday, 22. February 2016 21:49 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548504/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1058725] Re: XHCI (USB 3.0) kernel Module Prevents Hibernate

2016-02-22 Thread Christopher M. Penalver
Sergio Callegari, in order to allow additional upstream developers to examine 
the issue, at your earliest convenience, could you please test the latest 
upstream kernel available from 
http://kernel.ubuntu.com/~kernel-ppa/mainline/?C=N;O=D ? Please keep in mind 
the following:
1) The one to test is at the very top line at the top of the page (not the 
daily folder).
2) The release names are irrelevant.
3) The folder time stamps aren't indicative of when the kernel actually was 
released upstream.
4) Install instructions are available at 
https://wiki.ubuntu.com/Kernel/MainlineBuilds .

If testing on your main install would be inconvenient, one may:
1) Install Ubuntu to a different partition and then test this there.
2) Backup, or clone the primary install.

If the latest kernel did not allow you to test to the issue (ex. you couldn't 
boot into the OS) please make a comment in your report about this, and continue 
to test the next most recent kernel version until you can test to the issue. 
Once you've tested the upstream kernel, please comment on which kernel version 
specifically you tested. If this issue is fixed in the mainline kernel, please 
add the following tags by clicking on the yellow circle with a black pencil 
icon, next to the word Tags, located at the bottom of the report description:
kernel-fixed-upstream
kernel-fixed-upstream-X.Y-rcZ

Where X, and Y are the first two numbers of the kernel version, and Z is
the release candidate number if it exists.

If the mainline kernel does not fix the issue, please add the following tags:
kernel-bug-exists-upstream
kernel-bug-exists-upstream-X.Y-rcZ

Please note, an error to install the kernel does not fit the criteria of
kernel-bug-exists-upstream.

Once testing of the latest upstream kernel is complete, please mark this
report's Status as Confirmed. Please let us know your results.

Thank you for your understanding.

** Tags added: latest-bios-2.10

** Changed in: linux (Ubuntu)
   Status: Confirmed => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1058725

Title:
   XHCI (USB 3.0) kernel Module Prevents Hibernate

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  On a system with an ASROCK N68S motherboard and a VIA VL800/801 PCI
  USB3 adapter, the system, which is a 64 bit kubuntu precise with a 3.2
  kernel cannot hibernate.

  When you ask the system to hibernate, the OS does everything it should
  and also appears to shut down the system (the fans stop). However,
  after half a second the system restarts by itself, resuming from the
  hibernation.

  If you unbind the xhci_hcd driver from the usb card on the pci bus,
  before hibernation then the system hibernates and resumes in the
  correct way.

  So, the very same hack proposed in bug report 522998 at comment 61
  seem to (hackishly) fixes the issue.

  IMHO this looks like a bug in the xhci driver. Please report upstream.
  --- 
  AlsaVersion: Advanced Linux Sound Architecture Driver Version 1.0.24.
  AplayDevices:
    List of PLAYBACK Hardware Devices 
   card 0: NVidia [HDA NVidia], device 0: ALC662 rev1 Analog [ALC662 rev1 
Analog]
 Subdevices: 1/1
 Subdevice #0: subdevice #0
  ApportVersion: 2.0.1-0ubuntu13
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  callegar   7430 F pulseaudio
  Card0.Amixer.info:
   Card hw:0 'NVidia'/'HDA NVidia at 0xfbef8000 irq 22'
 Mixer name : 'Realtek ALC662 rev1'
 Components : 'HDA:10ec0662,18493662,00100101'
 Controls  : 31
 Simple ctrls  : 18
  DistroRelease: Ubuntu 12.04
  HibernationDevice: RESUME=UUID=c50b4249-43ed-49ef-a3d8-ec7aa9718265
  IwConfig:
   lono wireless extensions.
   
   usb0  no wireless extensions.
   
   eth0  no wireless extensions.
  MachineType: To Be Filled By O.E.M. To Be Filled By O.E.M.
  NonfreeKernelModules: nvidia
  Package: linux (not installed)
  ProcFB: 0 VESA VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.2.0-31-generic 
root=/dev/mapper/DISK00-root ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 3.2.0-31.50-generic 3.2.28
  RelatedPackageVersions:
   linux-restricted-modules-3.2.0-31-generic N/A
   linux-backports-modules-3.2.0-31-generic  N/A
   linux-firmware1.79.1
  RfKill:
   0: hci0: Bluetooth
Soft blocked: no
Hard blocked: no
  Tags:  precise
  Uname: Linux 3.2.0-31-generic x86_64
  UpgradeStatus: Upgraded to precise on 2012-05-09 (143 days ago)
  UserGroups: adm admin cdrom dialout fax floppy fuse lpadmin plugdev 
sambashare scanner staff sudo syslog vboxusers
  WpaSupplicantLog:
   
  dmi.bios.date: 04/21/2010
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: P2.10
  dmi.board.name: N68-S
  dmi.board.vendor: ASRock
  dmi.chassis.asset.tag: To Be Filled By O.E.M.
  dmi.chassis.type: 3
  dmi.chas

[Kernel-packages] [Bug 1445664] Re: kernel 3.16 breaks POSIX extended ACLs over NFS

2016-02-22 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1445664

Title:
  kernel 3.16 breaks POSIX extended ACLs over NFS

Status in linux package in Ubuntu:
  Expired

Bug description:
  I have a development environment that uses Vagrant with NFS shares to
  a Trusty development VM from OS X laptops.

  After the upgrade to the HWE kernel 3.16, installing Ruby gems into
  the NFS mount inside the VM failed because of install(1) failing with
  permission errors. Debugging revealed that it's trying to set POSIX
  extended ACLs using setxattr(); On 3.13 this operation failed with
  EOPNOTSUPP (the server does not support extended ACLs), but on 3.16 it
  fails with EPERM, even if the NFS mount is explicitly mounted with
  "noacl".

  Debugging with ftrace and source diving suggests that kernel 3.16
  refactored the POSIX extended ACL code so that before the call even
  hits the NFS layer, it passes through a generic permission-check
  layer. It appears that that layer is not aware of NFS UID remapping,
  and so fails the call regardless of what the server would have done.

  A simple test case is `install -c -m 0755  `, which will succeed on 3.13 and fail on 3.16.

  The broken system is:

  vagrant@packer-vmware-iso:~$ lsb_release -a; uname -a
  No LSB modules are available.
  Distributor ID: Ubuntu
  Description:Ubuntu 14.04.2 LTS
  Release:14.04
  Codename:   trusty
  Linux packer-vmware-iso 3.16.0-34-generic #47~14.04.1-Ubuntu SMP Fri Apr 10 
17:49:16 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux
  --- 
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 Dec 22 14:39 seq
   crw-rw 1 root audio 116, 33 Dec 22 14:39 timer
  AplayDevices: Error: [Errno 2] No such file or directory
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CRDA: Error: [Errno 2] No such file or directory
  DistroRelease: Ubuntu 14.04
  HibernationDevice: RESUME=/dev/mapper/packer--vmware--iso--vg-swap_1
  InstallationDate: Installed on 2015-09-02 (111 days ago)
  InstallationMedia: Ubuntu-Server 14.04.1 LTS "Trusty Tahr" - Release amd64 
(20140722.3)
  IwConfig: Error: [Errno 2] No such file or directory
  Lsusb: Error: command ['lsusb'] failed with exit code 1: unable to initialize 
libusb: -99
  MachineType: VMware, Inc. VMware Virtual Platform
  Package: linux (not installed)
  PciMultimedia:
   
  ProcFB: 0 svgadrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.16.0-57-generic 
root=/dev/mapper/packer--vmware--iso--vg-root ro quiet
  ProcVersionSignature: Ubuntu 3.16.0-57.77~14.04.1-generic 3.16.7-ckt20
  RelatedPackageVersions:
   linux-restricted-modules-3.16.0-57-generic N/A
   linux-backports-modules-3.16.0-57-generic  N/A
   linux-firmware 1.127.15
  RfKill: Error: [Errno 2] No such file or directory
  Tags:  trusty
  Uname: Linux 3.16.0-57-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip docker lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 05/20/2014
  dmi.bios.vendor: Phoenix Technologies LTD
  dmi.bios.version: 6.00
  dmi.board.name: 440BX Desktop Reference Platform
  dmi.board.vendor: Intel Corporation
  dmi.board.version: None
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 1
  dmi.chassis.vendor: No Enclosure
  dmi.chassis.version: N/A
  dmi.modalias: 
dmi:bvnPhoenixTechnologiesLTD:bvr6.00:bd05/20/2014:svnVMware,Inc.:pnVMwareVirtualPlatform:pvrNone:rvnIntelCorporation:rn440BXDesktopReferencePlatform:rvrNone:cvnNoEnclosure:ct1:cvrN/A:
  dmi.product.name: VMware Virtual Platform
  dmi.product.version: None
  dmi.sys.vendor: VMware, Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1445664/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1526692] Re: Ubuntu 15.10 - btrfs - Kernel Panic on btrfs balance

2016-02-22 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1526692

Title:
  Ubuntu 15.10 - btrfs - Kernel Panic on btrfs balance

Status in linux package in Ubuntu:
  Expired

Bug description:

  
  [  360.220144] INFO: task btrfs:2938 blocked for more than 120 seconds.
  [  360.220152]   Tainted: G   OE   4.2.0-19-generic #23-Ubuntu
  [  360.220153] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables 
this message.
  [  360.220155] btrfs   D 88087fc16640 0  2938   2937 
0x
  [  360.220161]  880833b87c78 0086 81c13500 
880835525940
  [  360.220163]  0246 880833b88000 88085b9c0c70 
88085b9c0cb0
  [  360.220165]  880855758980 8807f2c97300 880833b87c98 
817ec197
  [  360.220167] Call Trace:
  [  360.220179]  [] schedule+0x37/0x80
  [  360.220221]  [] btrfs_cancel_balance+0x127/0x180 [btrfs]
  [  360.220225]  [] ? wake_atomic_t_function+0x60/0x60
  [  360.220238]  [] btrfs_ioctl+0xd55/0x2760 [btrfs]
  [  360.220243]  [] ? 
lru_cache_add_active_or_unevictable+0x2b/0xa0
  [  360.220247]  [] ? handle_mm_fault+0xc77/0x17e0
  [  360.220249]  [] ? __vma_link_rb+0xfd/0x110
  [  360.220251]  [] ? vma_link+0xb9/0xc0
  [  360.220254]  [] do_vfs_ioctl+0x295/0x480
  [  360.220256]  [] SyS_ioctl+0x79/0x90
  [  360.220259]  [] entry_SYSCALL_64_fastpath+0x16/0x75
  [  360.220264] INFO: task btrfs:3002 blocked for more than 120 seconds.
  [  360.220266]   Tainted: G   OE   4.2.0-19-generic #23-Ubuntu
  [  360.220266] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables 
this message.
  [  360.220267] btrfs   D 88087fd56640 0  3002   3001 
0x
  [  360.220270]  8807e340bc78 0086 88085bf1cc80 
880857fa9980
  [  360.220272]  0246 8807e340c000 88085b9c0c70 
88085b9c0cb0
  [  360.220274]  880855758980 88085a181700 8807e340bc98 
817ec197
  [  360.220276] Call Trace:
  [  360.220278]  [] schedule+0x37/0x80
  [  360.220289]  [] btrfs_pause_balance+0x92/0x120 [btrfs]
  [  360.220291]  [] ? wake_atomic_t_function+0x60/0x60
  [  360.220303]  [] btrfs_ioctl+0x1a3e/0x2760 [btrfs]
  [  360.220306]  [] ? 
lru_cache_add_active_or_unevictable+0x2b/0xa0
  [  360.220308]  [] ? handle_mm_fault+0xc77/0x17e0
  [  360.220310]  [] ? __vma_link_rb+0xfd/0x110
  [  360.220311]  [] ? vma_link+0xb9/0xc0
  [  360.220313]  [] do_vfs_ioctl+0x295/0x480
  [  360.220315]  [] SyS_ioctl+0x79/0x90
  [  360.220317]  [] entry_SYSCALL_64_fastpath+0x16/0x75
  [  480.220139] INFO: task btrfs:2938 blocked for more than 120 seconds.
  [  480.220148]   Tainted: G   OE   4.2.0-19-generic #23-Ubuntu
  [  480.220149] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables 
this message.
  [  480.220152] btrfs   D 88087fc16640 0  2938   2937 
0x
  [  480.220159]  880833b87c78 0086 81c13500 
880835525940
  [  480.220162]  0246 880833b88000 88085b9c0c70 
88085b9c0cb0
  [  480.220166]  880855758980 8807f2c97300 880833b87c98 
817ec197
  [  480.220169] Call Trace:
  [  480.220180]  [] schedule+0x37/0x80
  [  480.220217]  [] btrfs_cancel_balance+0x127/0x180 [btrfs]
  [  480.220222]  [] ? wake_atomic_t_function+0x60/0x60
  [  480.220234]  [] btrfs_ioctl+0xd55/0x2760 [btrfs]
  [  480.220238]  [] ? 
lru_cache_add_active_or_unevictable+0x2b/0xa0
  [  480.220241]  [] ? handle_mm_fault+0xc77/0x17e0
  [  480.220243]  [] ? __vma_link_rb+0xfd/0x110
  [  480.220245]  [] ? vma_link+0xb9/0xc0
  [  480.220248]  [] do_vfs_ioctl+0x295/0x480
  [  480.220250]  [] SyS_ioctl+0x79/0x90
  [  480.220253]  [] entry_SYSCALL_64_fastpath+0x16/0x75
  [  480.220257] INFO: task btrfs:3002 blocked for more than 120 seconds.
  [  480.220258]   Tainted: G   OE   4.2.0-19-generic #23-Ubuntu
  [  480.220259] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables 
this message.
  [  480.220260] btrfs   D 88087fd56640 0  3002   3001 
0x
  [  480.220263]  8807e340bc78 0086 88085bf1cc80 
880857fa9980
  [  480.220265]  0246 8807e340c000 88085b9c0c70 
88085b9c0cb0
  [  480.220266]  880855758980 88085a181700 8807e340bc98 
817ec197
  [  480.220268] Call Trace:
  [  480.220270]  [] schedule+0x37/0x80
  [  480.220282]  [] btrfs_pause_balance+0x92/0x120 [btrfs]
  [  480.220283]  [] ? wake_atomic_t_function+0x60/0x60
  [  480.220294]  [] btrfs_ioctl+0x1a3e/0x2760 [btrfs]
  [  480.220297]  [] ? 
lru_cache_add_active_or_unevictable+0x2b/0xa0
  [  480.220299]  [] ? handle_mm_fault+0xc77/0x17e0
  [  480.220301]  [] ? __vma_link_rb+0xfd/0x110
  [  480.2

[Kernel-packages] [Bug 1548504] Re: linux: 3.2.0-100.140 -proposed tracker

2016-02-22 Thread Brad Figg
** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548504

Title:
  linux: 3.2.0-100.140 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-lbm series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.2.0-100.140 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 22. February 2016 20:57 UTC
  kernel-stable-phase-changed:Monday, 22. February 2016 21:04 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548504/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1543683] Re: Fails to detect (second) display

2016-02-22 Thread Joseph Salisbury
I built all the remaining test kernels but the last one.  The test kernels are 
available from:
http://kernel.ubuntu.com/~jsalisbury/lp1543683

The first kernel is in the d2e08c0f3 directory.  There are also two sub-
directories:

bad.cfe01a5e
good.7f4c628

Test the kernel in the sub-directory depending if the d2e08c0f3 one is
good or bad.   Each of those sub-directories also have two sub-
directories.  Again, a good one and bad one, so test the kernel in the
sub-directory depending if the prior kernel was good or bad.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1543683

Title:
  Fails to detect (second) display

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  Confirmed

Bug description:
  With the upgrade to 4.4.0-2, only one of the two displays in the
  machine is detected.  With 4.3.0-7 (and earlier) both are detected.

  In this case, both display connectors are on the MB.

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-extra-4.4.0-2-generic 4.4.0-2.16
  ProcVersionSignature: Ubuntu 4.4.0-2.16-generic 4.4.0
  Uname: Linux 4.4.0-2-generic x86_64
  ApportVersion: 2.19.4-0ubuntu2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  lamont 3923 F pulseaudio
  CurrentDesktop: Unity
  Date: Tue Feb  9 10:22:38 2016
  HibernationDevice: RESUME=UUID=5d145c55-633f-4197-a4c9-0b165b6dbeb3
  InstallationDate: Installed on 2014-09-22 (505 days ago)
  InstallationMedia: Ubuntu-Server 14.04 LTS "Trusty Tahr" - Release amd64 
(20140416.2)
  MachineType: Shuttle Inc SG41
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-2-generic 
root=UUID=ba0ea95b-cde0-42ba-b06e-9fd6ca006881 ro nomdmonddf nomdmonisw
  RelatedPackageVersions:
   linux-restricted-modules-4.4.0-2-generic N/A
   linux-backports-modules-4.4.0-2-generic  N/A
   linux-firmware   1.155
  RfKill:
   0: hci0: Bluetooth
Soft blocked: no
Hard blocked: no
  SourcePackage: linux
  UpgradeStatus: Upgraded to xenial on 2014-11-14 (452 days ago)
  dmi.bios.date: 02/10/2011
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 080015
  dmi.board.asset.tag: To Be Filled By O.E.M.
  dmi.board.name: FG41
  dmi.board.vendor: Shuttle Inc
  dmi.board.version: V20
  dmi.chassis.asset.tag: To Be Filled By O.E.M.
  dmi.chassis.type: 3
  dmi.chassis.vendor: Shuttle Inc
  dmi.chassis.version: To Be Filled By O.E.M.
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr080015:bd02/10/2011:svnShuttleInc:pnSG41:pvrV20:rvnShuttleInc:rnFG41:rvrV20:cvnShuttleInc:ct3:cvrToBeFilledByO.E.M.:
  dmi.product.name: SG41
  dmi.product.version: V20
  dmi.sys.vendor: Shuttle Inc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1543683/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] Re: Ubuntu 15.10 VM won't show UI after upgrading to 4.2.0-30

2016-02-22 Thread Francis Chuang
I am unable to install the apport-collect package as it's impossible to
get into tty1. In addition, booting to recovery mode and dropping into
shell only gave me a read-only filesystem.

** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VM won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] Missing required logs.

2016-02-22 Thread Brad Figg
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:

apport-collect 1548587

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VM won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548587] [NEW] Ubuntu 15.10 VM won't show UI after upgrading to 4.2.0-30

2016-02-22 Thread Francis Chuang
Public bug reported:

I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare
Workstation 12.1.0.

After installation, I am able to log into the system. I then ran the
updater application to install the latest updates.

After installing the updates and restarting, the system no longer shows
any UI after booting. I am now faced with a black screen and a dash that
does not blink. The system also does not respond to any inputs.

I was able to get back into my system by holding shift to show the GRUB
menu and boot using the 4.2.16 kernel.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548587

Title:
  Ubuntu 15.10 VM won't show UI after upgrading to 4.2.0-30

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in
  VMWare Workstation 12.1.0.

  After installation, I am able to log into the system. I then ran the
  updater application to install the latest updates.

  After installing the updates and restarting, the system no longer
  shows any UI after booting. I am now faced with a black screen and a
  dash that does not blink. The system also does not respond to any
  inputs.

  I was able to get back into my system by holding shift to show the
  GRUB menu and boot using the 4.2.16 kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1542188] Re: Adaptive keyboard breaks with sleep/resume

2016-02-22 Thread Dean Henrichsmeyer
This one (510ae0c994cb38fcf5033ad69eb8103552e335e8) has the bug. Thanks.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1542188

Title:
  Adaptive keyboard breaks with sleep/resume

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Xenial:
  In Progress

Bug description:
  I have a Lenovo X1 Carbon Gen2. It as the adaptive row of keys that
  change from function keys to volume, etc when you toggle the function
  key. It's always worked fine but with this kernel, after a few
  sleep/resumes, the entire row will go black. If I reboot it will
  return to normal. dmesg throws a bunch of these..

  [29190.142959] thinkpad_acpi: EC reports that Thermal Table has changed
  [30910.489925] thinkpad_acpi: unknown possible thermal alarm or keyboard 
event received
  [30910.489931] thinkpad_acpi: unhandled HKEY event 0x60c0
  [30910.489932] thinkpad_acpi: please report the conditions when this event 
happened to ibm-acpi-de...@lists.sourceforge.net
  [30911.439252] thinkpad_acpi: unknown possible thermal alarm or keyboard 
event received
  [30911.439258] thinkpad_acpi: unhandled HKEY event 0x60c0

  though I'm not sure it's the cause of the failure.

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-2-generic 4.4.0-2.16
  ProcVersionSignature: Ubuntu 4.4.0-2.16-generic 4.4.0
  Uname: Linux 4.4.0-2-generic x86_64
  NonfreeKernelModules: zfs zunicode zcommon znvpair zavl
  ApportVersion: 2.19.4-0ubuntu2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  dean   3316 F pulseaudio
   /dev/snd/controlC0:  dean   3316 F pulseaudio
  CurrentDesktop: Unity
  Date: Fri Feb  5 08:34:46 2016
  HibernationDevice: RESUME=UUID=5ce0185d-e833-4337-9655-9be9fcac3654
  InstallationDate: Installed on 2015-11-03 (93 days ago)
  InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021)
  MachineType: LENOVO 20A7002QUS
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-4.4.0-2-generic 
root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-4.4.0-2-generic N/A
   linux-backports-modules-4.4.0-2-generic  N/A
   linux-firmware   1.155
  SourcePackage: linux
  UpgradeStatus: Upgraded to xenial on 2015-12-07 (59 days ago)
  dmi.bios.date: 11/04/2015
  dmi.bios.vendor: LENOVO
  dmi.bios.version: GRET46WW (1.23 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 20A7002QUS
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0E50510 Pro
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Not Available
  dmi.modalias: 
dmi:bvnLENOVO:bvrGRET46WW(1.23):bd11/04/2015:svnLENOVO:pn20A7002QUS:pvrThinkPadX1Carbon2nd:rvnLENOVO:rn20A7002QUS:rvrSDK0E50510Pro:cvnLENOVO:ct10:cvrNotAvailable:
  dmi.product.name: 20A7002QUS
  dmi.product.version: ThinkPad X1 Carbon 2nd
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1542188/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1546145] Re: Surelock-GA2:kernel panic @ cxl_configure_adapter+0x418/0x8b0

2016-02-22 Thread Brad Figg
** Changed in: linux (Ubuntu Wily)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1546145

Title:
  Surelock-GA2:kernel panic @ cxl_configure_adapter+0x418/0x8b0

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Wily:
  Fix Committed
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  == Comment: #18 - Andrew Donnellan - 2016-02-15 20:17:01 ==
  Canonical kernel team - please apply 1bc74f1ccd457832dc515fc1febe6655985fdcd2 
from the powerpc-fixes tree.

  
https://git.kernel.org/cgit/linux/kernel/git/powerpc/linux.git/commit/?h=fixes&id=1bc74f1ccd457832dc515fc1febe6655985fdcd2

  powerpc/powernv: Fix stale PE primary bus
  When PCI bus is unplugged during full hotplug for EEH recovery,
  the platform PE instance (struct pnv_ioda_pe) isn't released and
  it dereferences the stale PCI bus that has been released. It leads
  to kernel crash when referring to the stale PCI bus.

  This fixes the issue by correcting the PE's primary bus when it's
  oneline at plugging time, in pnv_pci_dma_bus_setup() which is to
  be called by pcibios_fixup_bus().

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1546145/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1529624] Re: Lenovo E50-80 inverted microphone not detected properly

2016-02-22 Thread Brad Figg
** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Vivid)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1529624

Title:
  Lenovo E50-80 inverted microphone not detected properly

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Vivid:
  Fix Committed
Status in linux source package in Wily:
  Fix Released

Bug description:
  System: Lenovo E50-80 with Ubuntu 15.10. Tested with both kernel
  4.2.0-22-generic from official repos and 4.4.0-040400rc6-generic from
  Mainline Kernel repo.

  Alsa information: http://www.alsa-
  project.org/db/?f=3088f82a0cf977855f92af9db8ad406c04f71efa

  Internal microphone does not pick up sound by default. When I mute one
  channel, it works (this is not a good workaround since some
  application, such as Facebook Messenger, unmute both channels and set
  them to the same level automatically).

  Adding model=inv-dmic to snd-hda-intel module options does not change
  a thing.

  Hope that helps, tell me if you need more info.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1529624/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-02-22 Thread Brad Figg
** Changed in: linux (Ubuntu Wily)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Wily:
  Fix Committed
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
  address 10.123.120.199
  gateway 10.123.119.1
  dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1533009] Re: arm64: "unsupported RELA relocation"

2016-02-22 Thread Brad Figg
** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: gcc-5 (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Also affects: gcc-5 (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Wily)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Vivid)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1533009

Title:
  arm64: "unsupported RELA relocation"

Status in Linaro GCC:
  Unknown
Status in Linux:
  Unknown
Status in gcc-5 package in Ubuntu:
  Invalid
Status in linux package in Ubuntu:
  Fix Released
Status in gcc-5 source package in Trusty:
  New
Status in linux source package in Trusty:
  Fix Committed
Status in gcc-5 source package in Vivid:
  New
Status in linux source package in Vivid:
  Fix Committed
Status in gcc-5 source package in Wily:
  New
Status in linux source package in Wily:
  Fix Committed
Status in gcc-5 source package in Xenial:
  Invalid
Status in linux source package in Xenial:
  Fix Released

Bug description:
  linux-image-4.3.0-5-generic 4.3.0-5.16 arm64 fails to load modules
  (and therefore boot). It emits messages like the following for each
  attempted module load:

  [2.156817] module libahci: unsupported RELA relocation: 275

  This is reminiscent of LP: #1502946 - except that fix appears to still
  be in-tact. What has changed, however, is the build environment. If I
  rebuild the same kernel source in a wily chroot, it boots fine.

  Marking "Confirmed" because Paulo Pisatti reported this to me, and I
  reproduced.

To manage notifications about this bug go to:
https://bugs.launchpad.net/gcc-linaro/+bug/1533009/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1505564] Re: Soft lockup with "block nbdX: Attempted send on closed socket" spam

2016-02-22 Thread Brad Figg
** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Vivid)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Wily)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1505564

Title:
  Soft lockup with "block nbdX: Attempted send on closed socket" spam

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Vivid:
  Fix Committed
Status in linux source package in Wily:
  Fix Committed

Bug description:
  Some of our nova compute hosts regularly freeze, sometimes for a few
  hours, with kern.log getting spammed with:

  block nbdX: Attempted send on closed socket

  and a few "CPU soft lockup" messages (see attached log). This clears
  up when the queue gets cleared, eg :

  block nbdX: queue cleared

  trusty hosts with kernel version 3.19.0-30-generic.
  --- 
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 Nov 24 12:23 seq
   crw-rw 1 root audio 116, 33 Nov 24 12:23 timer
  AplayDevices: Error: [Errno 2] No such file or directory
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  DistroRelease: Ubuntu 14.04
  IwConfig: Error: [Errno 2] No such file or directory
  MachineType: HP ProLiant DL385 G7
  Package: linux (not installed)
  PciMultimedia:
   
  ProcEnviron:
   TERM=screen-256color
   PATH=(custom, no user)
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 radeondrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-36-generic 
root=UUID=13289ac9-8dc9-4feb-b6bd-ca7db66b21d6 ro console=tty0 
console=ttyS1,38400 nosplash crashkernel=384M-:512M nox2apic intremap=off
  ProcVersionSignature: Ubuntu 
3.19.0-36.41~14.04.1hf00090138v20151122b1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-36-generic N/A
   linux-backports-modules-3.19.0-36-generic  N/A
   linux-firmware 1.127.18
  RfKill: Error: [Errno 2] No such file or directory
  Tags:  trusty uec-images
  Uname: Linux 3.19.0-36-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups:
   
  _MarkForUpload: True
  dmi.bios.date: 02/02/2014
  dmi.bios.vendor: HP
  dmi.bios.version: A18
  dmi.chassis.type: 23
  dmi.chassis.vendor: HP
  dmi.modalias: 
dmi:bvnHP:bvrA18:bd02/02/2014:svnHP:pnProLiantDL385G7:pvr:cvnHP:ct23:cvr:
  dmi.product.name: ProLiant DL385 G7
  dmi.sys.vendor: HP

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1505564/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1533461] Re: No headset microphone is detected in sound settings on a Dell laptop

2016-02-22 Thread Brad Figg
** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Vivid)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1533461

Title:
  No headset microphone is detected in sound settings on a Dell laptop

Status in HWE Next:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Vivid:
  Fix Committed
Status in linux source package in Wily:
  Fix Released

Bug description:
  Steps:

  1. Plug in a headset to the headset audio jack
  2. Go to Sound settings -> Input tab and check if the headset mic is listed

  This is bug is for tracking purposes only, please do not triage.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1533461/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1522949] Re: Bluetooth doesn't work on 0930:0225 Toshiba Corporation

2016-02-22 Thread Brad Figg
** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Vivid)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522949

Title:
  Bluetooth doesn't work on 0930:0225 Toshiba Corporation

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Vivid:
  Fix Committed
Status in linux source package in Wily:
  Fix Released

Bug description:
  I have not been able to get bluetooth running in Ubuntu 14.04, 14.10,
  or 15.10 on my Toshiba laptop. Bluetooth does work under Windows.
  There is no bluetooth icon. The bluetooth manager says "Bluetooth is
  disabled" whether I set it to On or Off.

  
  rfkill list:

  0: Toshiba Bluetooth: Bluetooth
Soft blocked: no
Hard blocked: no
  [...]

  The modified kernel is because I installed btusb-lp1506615-dkms from
  https://launchpad.net/~hanipouspilot/+archive/ubuntu/bluetooth . No
  change in behavior.

  ProblemType: Bug
  DistroRelease: Ubuntu 15.10
  Package: linux-image-4.2.0-16-generic 4.2.0-16.19 [modified: 
boot/vmlinuz-4.2.0-16-generic]
  ProcVersionSignature: Ubuntu 4.2.0-16.19-generic 4.2.3
  Uname: Linux 4.2.0-16-generic x86_64
  NonfreeKernelModules: wl
  ApportVersion: 2.19.1-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  josiah 1874 F pulseaudio
   /dev/snd/controlC1:  josiah 1874 F pulseaudio
  CurrentDesktop: Unity
  Date: Fri Dec  4 14:45:28 2015
  HibernationDevice: RESUME=UUID=0bcbd4ab-9f94-44d7-857f-717f4e7c9481
  InstallationDate: Installed on 2015-12-03 (1 days ago)
  InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021)
  MachineType: TOSHIBA Satellite L75-B
  ProcEnviron:
   LANGUAGE=en_US
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: \boot\vmlinuz-4.2.0-16-generic.efi.signed 
root=UUID=edea9167-ead7-4da4-81ac-fa65520b3e91 ro quiet splash vt.handoff=7 
initrd=boot\initrd.img-4.2.0-16-generic
  RelatedPackageVersions:
   linux-restricted-modules-4.2.0-16-generic N/A
   linux-backports-modules-4.2.0-16-generic  N/A
   linux-firmware1.149
  SourcePackage: linux
  UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev'
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 11/03/2014
  dmi.bios.vendor: Insyde Corp.
  dmi.bios.version: 1.60
  dmi.board.name: Portable PC
  dmi.board.vendor: TOSHIBA
  dmi.board.version: MP
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: OEM Chassis Manufacturer
  dmi.chassis.version: OEM Chassis Version
  dmi.modalias: 
dmi:bvnInsydeCorp.:bvr1.60:bd11/03/2014:svnTOSHIBA:pnSatelliteL75-B:pvrPSKRLU-01400M:rvnTOSHIBA:rnPortablePC:rvrMP:cvnOEMChassisManufacturer:ct10:cvrOEMChassisVersion:
  dmi.product.name: Satellite L75-B
  dmi.product.version: PSKRLU-01400M
  dmi.sys.vendor: TOSHIBA

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522949/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1535513] Re: Enable suspend function for i2c-hid device in Vivid

2016-02-22 Thread Brad Figg
** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Vivid)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1535513

Title:
  Enable suspend function for i2c-hid device in Vivid

Status in HWE Next:
  Fix Committed
Status in HWE Next vivid series:
  Fix Committed
Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Vivid:
  Fix Committed

Bug description:
  [Impact]
  On some platforms the touchpad relies on pinctrl devices to provide GPIO 
interrupt, but in 3.19.0 pinctrl-cherryview doesn't support suspend well and 
will lose the config after suspend/resume, then touchpad can't be used.

  Also, there is a racing condition in i2c-hid module which makes
  touchpad unusable when waking up.

  [Fix]
  This fix has two parts. First part is to enable the suspend/resume function 
in pinctrl-cherryview:

  commit 9eb457b547cc731bc2fc251bd79891a60c64fc3e
  Refs: [HEAD]
  Author: Mika Westerberg 
  Date: Thu Dec 4 12:32:50 2014 +0200

  pinctrl: cherryview: Save and restore pin configs over system
  sleep

  The second part is to eliminate the racing condition in i2c-hid:

  commit 9a327405014f4ef4cdad67a0686db82b9f23c62c 
  Author: Mika Westerberg 
  Date:   Mon Dec 21 15:26:31 2015 +0200

  HID: i2c-hid: Prevent sending reports from racing with device
  reset

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1535513/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548579] [NEW] linux: 4.2.0-31.36 -proposed tracker

2016-02-22 Thread Brad Figg
Public bug reported:

This bug is for tracking the 4.2.0-31.36 upload package. This bug will
contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Tuesday, 23. February 2016 01:25 UTC
kernel-stable-phase:Prepare
kernel-stable-phase-changed:Tuesday, 23. February 2016 01:25 UTC

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux (Ubuntu)
 Importance: Medium
 Status: New

** Affects: linux (Ubuntu Wily)
 Importance: Medium
 Status: New


** Tags: block-proposed block-proposed-wily kernel-release-tracking-bug wily

** Tags added: kernel-release-tracking-bug

** Tags added: block-proposed

** Tags added: block-proposed-wily

** Also affects: linux (Ubuntu Wily)
   Importance: Undecided
   Status: New

** Tags added: wily

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow
   Status: New => In Progress

** Changed in: kernel-sru-workflow
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided => Medium

** Changed in: kernel-sr

[Kernel-packages] [Bug 1533043] Re: AUFS can hang up; Please update to v20160111

2016-02-22 Thread Akihiro Suda
Thank you for releasing the new kernel packages!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1533043

Title:
  AUFS can hang up; Please update to v20160111

Status in linux package in Ubuntu:
  In Progress
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Released
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux source package in Vivid:
  Fix Released
Status in linux-lts-utopic source package in Vivid:
  Invalid
Status in linux source package in Wily:
  Fix Released
Status in linux-lts-utopic source package in Wily:
  Invalid
Status in linux source package in Xenial:
  In Progress
Status in linux-lts-utopic source package in Xenial:
  Invalid

Bug description:
  AUFS  can hang up (more precisely, produces unkillable processes) with some 
kernels that contain the commit 296291cdd1629c308114504b850dc343eabc278.
  - 14.04LTS:  
http://kernel.ubuntu.com/git/ubuntu/ubuntu-trusty.git/commit/?id=b8702f3cf9c06914476fb3206039131c2c3d8450
  - 15.04: 
http://kernel.ubuntu.com/git/ubuntu/ubuntu-vivid.git/commit/?id=6b08592b8acc677d5b9bb7986343fdd6e0ad3303
  - 15.10: 
http://kernel.ubuntu.com/git/ubuntu/ubuntu-wily.git/commit/?id=4d291df30fb7a94d13c6d38addf8d85d38f0111b

  Many docker users have been experiencing this issue:
  https://github.com/docker/docker/issues/18180

  
  The issue has been fixed since AUFS v20160111: 
http://permalink.gmane.org/gmane.linux.file-systems.aufs.user/5345
  So I suggest updating AUFS to v20160111.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1533043/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1512884] Re: hv driver in -lbm package not used

2016-02-22 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/precise-security/linux-backports-
modules-3.2.0

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1512884

Title:
  hv driver in -lbm package not used

Status in linux package in Ubuntu:
  Invalid
Status in linux-backports-modules-3.2.0 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Committed
Status in linux-backports-modules-3.2.0 source package in Precise:
  Fix Released

Bug description:
  The driver in the linux-backports-modules-3.2.0 package is not being
  used and is currently unmaintained.  It should be disabled, as the in-
  kernel version seems to be preferred.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1512884/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548558] [NEW] Unable to install dracut and initramfs-tools together

2016-02-22 Thread Antony Messerli
Public bug reported:

In 15.10, dracut and initramfs-tools cannot coexist which makes it hard
to regenerate the initramfs.

root@builder:/# apt-get install dracut initramfs-tools
Reading package lists... Done
Building dependency tree
Reading state information... Done
initramfs-tools is already the newest version.
initramfs-tools set to manually installed.
Some packages could not be installed. This may mean that you have
requested an impossible situation or if you are using the unstable
distribution that some required packages have not yet been created
or been moved out of Incoming.
The following information may help to resolve the situation:

The following packages have unmet dependencies:
 dracut : Conflicts: initramfs-tools but 0.120ubuntu6 is to be installed
 initramfs-tools : Conflicts: linux-initramfs-tool
E: Unable to correct problems, you have held broken packages.

>From https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1109029:

"Just in case someone is interested: I've built an ppa that allows installing 
draucut next to initramfs:
https://launchpad.net/~morty/+archive/ubuntu/dracut-release

And yes, they do conflict as they both want to build the init.rd. And
initramfs-tools wins, because i comes after d. I fixed that using dpkg-
divert."

** Affects: dracut (Ubuntu)
 Importance: Undecided
 Status: New

** Package changed: linux (Ubuntu) => dracut (Ubuntu)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548558

Title:
  Unable to install dracut and initramfs-tools together

Status in dracut package in Ubuntu:
  New

Bug description:
  In 15.10, dracut and initramfs-tools cannot coexist which makes it
  hard to regenerate the initramfs.

  root@builder:/# apt-get install dracut initramfs-tools
  Reading package lists... Done
  Building dependency tree
  Reading state information... Done
  initramfs-tools is already the newest version.
  initramfs-tools set to manually installed.
  Some packages could not be installed. This may mean that you have
  requested an impossible situation or if you are using the unstable
  distribution that some required packages have not yet been created
  or been moved out of Incoming.
  The following information may help to resolve the situation:

  The following packages have unmet dependencies:
   dracut : Conflicts: initramfs-tools but 0.120ubuntu6 is to be installed
   initramfs-tools : Conflicts: linux-initramfs-tool
  E: Unable to correct problems, you have held broken packages.

  From https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1109029:

  "Just in case someone is interested: I've built an ppa that allows installing 
draucut next to initramfs:
  https://launchpad.net/~morty/+archive/ubuntu/dracut-release

  And yes, they do conflict as they both want to build the init.rd. And
  initramfs-tools wins, because i comes after d. I fixed that using
  dpkg-divert."

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dracut/+bug/1548558/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1436940] Re: Qualcomm Atheros QCA6164 802.11ac Wireless Network Adapter [168c:0041] is not supported

2016-02-22 Thread Jeremy
Bradford Bonanno
I didn't have a  4.2 kernel installed when I created that dkms deb package and 
that is why it doesn't build

You will likely have to use the backports, install firmware from
atondwal github site and set the skip_otp parameter

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1436940

Title:
  Qualcomm Atheros QCA6164 802.11ac Wireless Network Adapter [168c:0041]
  is not supported

Status in linux package in Ubuntu:
  Confirmed
Status in linux-firmware package in Ubuntu:
  Confirmed
Status in linux source package in Vivid:
  Confirmed
Status in linux source package in Wily:
  Confirmed

Bug description:
  This card remains unsupported out-of-the-box by the ath10k_pci kernel
  module.

  Currently in https://github.com/kvalo/ath10k-firmware/, there exists
  a folder for the QCA6174, but not for the QCA6164.

  It appears that this card uses the same "firmware-5.bin" file as the
  QCA6174 [168c:003c], but it requires a different "board.bin" file.

  ---

  HOW TO GET THIS CARD TO WORK:

  I'm not certain, but I believe you need to using at least kernel version
  4.2 for this to work.

  Get the latest firmware from https://github.com/kvalo/ath10k-
  firmware/archive/master.zip

  Unzip and copy the ath10k folder to /lib/firmware/ath10k.

  Download the two files at:
  https://github.com/atondwal/ath10k-firmware/tree/master/ath10k/QCA6164/hw2.1

  Put these files in /lib/firmware/ath10k/QCA6174/hw2.1.  Note that the
  numbers DO NOT MATCH (QCA6164 vs QCA6174).

  Create a file named /etc/modprobe.d/ath10k.conf with the following
  line:

  "options ath10k_core skip_otp=y"

  Reboot and modprobe ath10k_pci. Do "lshw -C network"; "ip link show" or 
"rfkill list" to see if you got your card working.
  ---

  The atheros wireless device (168c:0041) isn't supported by the
  ath10k_pci kernel driver.

  Found in several laptop models:

  Lenovo Z70
  Lenovo G50-45
  Lenovo G50-80
  Lenovo Edge 15
  Lenovo Yoga 3 11
  Lenovo Flex 3-1470
  Lenovo U31-70
  Samsung ATIV Book 9 NP930X2K

  ProblemType: BugDistroRelease: Ubuntu 15.04
  Package: linux-image-3.19.0-9-generic 3.19.0-9.9
  ProcVersionSignature: Ubuntu 3.19.0-9.9-generic 3.19.1
  Uname: Linux 3.19.0-9-generic x86_64
  ApportVersion: 2.16.2-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  nicholas   1695 F pulseaudio
   /dev/snd/controlC1:  nicholas   1695 F pulseaudio
  CurrentDesktop: Unity
  Date: Thu Mar 26 09:47:16 2015
  HibernationDevice: RESUME=UUID=5b068cd8-e60a-49b9-a88e-1581bb6b3dc1
  InstallationDate: Installed on 2015-03-25 (1 days ago)
  InstallationMedia: Ubuntu 14.10 "Utopic Unicorn" - Release amd64 (20141022.1)
  IwConfig:
   eth0  no wireless extensions.

   lono wireless extensions.
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 004: ID 0cf3:e300 Atheros Communications, Inc.
   Bus 001 Device 003: ID 5986:0652 Acer, Inc
   Bus 001 Device 002: ID 0bda:0129 Realtek Semiconductor Corp. RTS5129 Card 
Reader Controller
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: LENOVO 80E5
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-9-generic 
root=UUID=e52867c5-0b50-42fb-8288-f30765f926c5 ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-9-generic N/A
   linux-backports-modules-3.19.0-9-generic  N/A
   linux-firmware1.143SourcePackage: linux
  UpgradeStatus: Upgraded to vivid on 2015-03-26 (0 days ago)
  dmi.bios.date: 06/20/2014
  dmi.bios.vendor: LENOVO
  dmi.bios.version: B0CN69WW
  dmi.board.asset.tag: NO Asset Tag
  dmi.board.name: Lenovo G50-80
  dmi.board.vendor: LENOVO
  dmi.board.version: 31900058 WIN
  dmi.chassis.asset.tag: NO Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Lenovo G50-80
  dmi.modalias: 
dmi:bvnLENOVO:bvrB0CN69WW:bd06/20/2014:svnLENOVO:pn80E5:pvrLenovoG50-80:rvnLENOVO:rnLenovoG50-80:rvr31900058WIN:cvnLENOVO:ct10:cvrLenovoG50-80:
  dmi.product.name: 80E5
  dmi.product.version: Lenovo G50-80
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1436940/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1542188] Re: Adaptive keyboard breaks with sleep/resume

2016-02-22 Thread Joseph Salisbury
I built the next test kernel, up to the following commit:
510ae0c994cb38fcf5033ad69eb8103552e335e8

The test kernel can be downloaded from:
http://kernel.ubuntu.com/~jsalisbury/lp1542188

Can you test that kernel and report back if it has the bug or not? I
will build the next test kernel based on your test results.

Thanks in advance

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1542188

Title:
  Adaptive keyboard breaks with sleep/resume

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Xenial:
  In Progress

Bug description:
  I have a Lenovo X1 Carbon Gen2. It as the adaptive row of keys that
  change from function keys to volume, etc when you toggle the function
  key. It's always worked fine but with this kernel, after a few
  sleep/resumes, the entire row will go black. If I reboot it will
  return to normal. dmesg throws a bunch of these..

  [29190.142959] thinkpad_acpi: EC reports that Thermal Table has changed
  [30910.489925] thinkpad_acpi: unknown possible thermal alarm or keyboard 
event received
  [30910.489931] thinkpad_acpi: unhandled HKEY event 0x60c0
  [30910.489932] thinkpad_acpi: please report the conditions when this event 
happened to ibm-acpi-de...@lists.sourceforge.net
  [30911.439252] thinkpad_acpi: unknown possible thermal alarm or keyboard 
event received
  [30911.439258] thinkpad_acpi: unhandled HKEY event 0x60c0

  though I'm not sure it's the cause of the failure.

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-2-generic 4.4.0-2.16
  ProcVersionSignature: Ubuntu 4.4.0-2.16-generic 4.4.0
  Uname: Linux 4.4.0-2-generic x86_64
  NonfreeKernelModules: zfs zunicode zcommon znvpair zavl
  ApportVersion: 2.19.4-0ubuntu2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  dean   3316 F pulseaudio
   /dev/snd/controlC0:  dean   3316 F pulseaudio
  CurrentDesktop: Unity
  Date: Fri Feb  5 08:34:46 2016
  HibernationDevice: RESUME=UUID=5ce0185d-e833-4337-9655-9be9fcac3654
  InstallationDate: Installed on 2015-11-03 (93 days ago)
  InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021)
  MachineType: LENOVO 20A7002QUS
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-4.4.0-2-generic 
root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-4.4.0-2-generic N/A
   linux-backports-modules-4.4.0-2-generic  N/A
   linux-firmware   1.155
  SourcePackage: linux
  UpgradeStatus: Upgraded to xenial on 2015-12-07 (59 days ago)
  dmi.bios.date: 11/04/2015
  dmi.bios.vendor: LENOVO
  dmi.bios.version: GRET46WW (1.23 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 20A7002QUS
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0E50510 Pro
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Not Available
  dmi.modalias: 
dmi:bvnLENOVO:bvrGRET46WW(1.23):bd11/04/2015:svnLENOVO:pn20A7002QUS:pvrThinkPadX1Carbon2nd:rvnLENOVO:rn20A7002QUS:rvrSDK0E50510Pro:cvnLENOVO:ct10:cvrNotAvailable:
  dmi.product.name: 20A7002QUS
  dmi.product.version: ThinkPad X1 Carbon 2nd
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1542188/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1547619] Re: Intermittent screen blinking with 4k external mini display port with 4.4 kernels

2016-02-22 Thread Joseph Salisbury
I built a 4.4.0-0.3 kernel which was based off of upstream 4.4-rc4.
This kernel can be downloaded from:

http://kernel.ubuntu.com/~jsalisbury/lp1547619/

Can you see if this kernel has the bug or not?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1547619

Title:
  Intermittent screen blinking with 4k external mini display port with
  4.4 kernels

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Xenial:
  In Progress

Bug description:
  When using an external 4K monitor plugged into the mini display port on my 
Dell XPS 13 9343 using both the laptop screen and the external monitor 
(external monitor is left and laptop screen right), when using all of the 
following kernels:
  4.4.0-2.16-generic
  4.4.0-4.19-generic
  4.4.0-6.21-generic
  4.4.0-7.22-generic

  the external monitor will sometimes blink off for about a second or
  two, then back on. What is weird is this seems to only happen when
  typing into a gnome-terminal as opposed to firefox or evolution.
  Simply changing to a gnome-terminal and typing into it doesn't cause
  the blinking, but it might happen immediately or it might take several
  minutes.

  4.3.0-7.18-generic worked fine and I can go hours and hours in a
  gnome-terminal with no issues.

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-6-generic 4.4.0-6.21
  ProcVersionSignature: Ubuntu 4.4.0-6.21-generic 4.4.1
  Uname: Linux 4.4.0-6-generic x86_64
  ApportVersion: 2.20-0ubuntu3
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC2:  jamie  5882 F pulseaudio
   /dev/snd/controlC1:  jamie  5882 F pulseaudio
   /dev/snd/controlC0:  jamie  5882 F pulseaudio
  CurrentDesktop: Unity
  Date: Fri Feb 19 12:09:28 2016
  HibernationDevice: RESUME=UUID=27fa6713-c8c2-4eb8-9766-ba6918bc1cfb
  InstallationDate: Installed on 2015-06-13 (250 days ago)
  InstallationMedia: Ubuntu 15.04 "Vivid Vervet" - Release amd64 (20150422)
  MachineType: Dell Inc. XPS 13 9343
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-6-generic.efi.signed 
root=UUID=7bc4dcd2-0bd8-4e42-b8b7-9f1ed6b8a3e9 ro libata.force=noncq kaslr 
quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-4.4.0-6-generic N/A
   linux-backports-modules-4.4.0-6-generic  N/A
   linux-firmware   1.156
  SourcePackage: linux
  UpgradeStatus: Upgraded to xenial on 2016-01-12 (38 days ago)
  dmi.bios.date: 11/11/2015
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A07
  dmi.board.name: 0310JH
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 9
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvrA07:bd11/11/2015:svnDellInc.:pnXPS139343:pvr:rvnDellInc.:rn0310JH:rvrA00:cvnDellInc.:ct9:cvr:
  dmi.product.name: XPS 13 9343
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1547619/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548548] [NEW] linux: 3.19.0-52.58 -proposed tracker

2016-02-22 Thread Brad Figg
Public bug reported:

This bug is for tracking the 3.19.0-52.58 upload package. This bug will
contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Monday, 22. February 2016 23:08 UTC
kernel-stable-phase:Prepare
kernel-stable-phase-changed:Monday, 22. February 2016 23:08 UTC

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux (Ubuntu)
 Importance: Medium
 Status: New

** Affects: linux (Ubuntu Vivid)
 Importance: Medium
 Status: New


** Tags: block-proposed-vivid kernel-release-tracking-bug vivid

** Tags added: kernel-release-tracking-bug

** Tags added: block-proposed-vivid

** Also affects: linux (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Tags added: vivid

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow
   Status: New => In Progress

** Changed in: kernel-sru-workflow
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-signed
 As

[Kernel-packages] [Bug 1540538] Re: linux: 3.2.0-99.139 -proposed tracker

2016-02-22 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 3.2.0-99.139 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 01. February 2016 19:16 UTC
  kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 04:03 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 04:03 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:01 UTC
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:00 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Security-signoff-end:Friday, 05. February 2016 10:01 UTC
  kernel-stable-Verification-testing-end:Thursday, 18. February 2016 15:00 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. February 2016 15:00 UTC
- kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:17 UTC
- kernel-stable-phase-changed:Monday, 22. February 2016 19:17 UTC
  kernel-stable-Certification-testing-end:Monday, 22. February 2016 19:17 UTC
  kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Monday, 22. February 2016 23:00 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540538

Title:
  linux: 3.2.0-99.139 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-99.139 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 01. February 2016 19:16 UTC
  kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 04:03 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 04:03 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:01 UTC
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:00 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Security-signoff-end:Friday, 05. February 2016 10:01 UTC
  kernel-stable-Verification-testing-end:Thursday, 18. February 2016 15:00 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. February 2016 15:00 UTC
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:17 UTC
  kernel-stable-Certification-testing-end:Monday, 22. February 2016 19:17 UTC
  kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC
  kernel-stable-phase:Released
  kernel-stable-phase-changed:Monday, 22. February 2016 23:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540538/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540721] Re: linux-armadaxp: 3.2.0-1662.86 -proposed tracker

2016-02-22 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 3.2.0-1662.86 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:02 UTC
  kernel-stable-master-bug:1540538
  kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 08:03 UTC
  kernel-stable-Security-signoff-end:Tuesday, 02. February 2016 08:03 UTC
  kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 10:02 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 10:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC
  kernel-stable-Regression-testing-end:Monday, 08. February 2016 17:00 UTC
- kernel-stable-phase:CopyToUpdates
- kernel-stable-phase-changed:Monday, 22. February 2016 19:19 UTC
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:19 UTC
  kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Monday, 22. February 2016 23:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1540721

Title:
  linux-armadaxp: 3.2.0-1662.86 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-armadaxp source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1662.86 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:02 UTC
  kernel-stable-master-bug:1540538
  kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 08:03 UTC
  kernel-stable-Security-signoff-end:Tuesday, 02. February 2016 08:03 UTC
  kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 10:02 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 10:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC
  kernel-stable-Regression-testing-end:Monday, 08. February 2016 17:00 UTC
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:19 UTC
  kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC
  kernel-stable-phase:Released
  kernel-stable-phase-changed:Monday, 22. February 2016 23:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540721/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540720] Re: linux-ti-omap4: 3.2.0-1477.100 -proposed tracker

2016-02-22 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

** Description changed:

  This bug is for tracking the 3.2.0-1477.100 upload package. This bug
  will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:01 UTC
  kernel-stable-master-bug:1540538
  kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 16:01 UTC
  kernel-stable-Prepare-package-end:Wednesday, 03. February 2016 00:01 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 03. February 2016 00:01 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC
  kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:04 UTC
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC
  proposed-announcement-sent:True
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC
  kernel-stable-Security-signoff-end:Friday, 05. February 2016 21:00 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. February 2016 16:01 UTC
- kernel-stable-phase:CopyToUpdates
- kernel-stable-phase-changed:Monday, 22. February 2016 19:24 UTC
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:24 UTC
  kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Monday, 22. February 2016 23:01 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1540720

Title:
  linux-ti-omap4: 3.2.0-1477.100 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1477.100 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:01 UTC
  kernel-stable-master-bug:1540538
  kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 16:01 UTC
  kernel-stable-Prepare-package-end:Wednesday, 03. February 2016 00:01 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 03. February 2016 00:01 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC
  kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:04 UTC
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC
  proposed-announcement-sent:True
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC
  kernel-stable-Security-signoff-end:Friday, 05. February 2016 21:00 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. February 2016 16:01 UTC
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:24 UTC
  kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC
  kernel-stable-phase:Released
  kernel-stable-phase-changed:Monday, 22. February 2016 23:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540720/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection

2016-02-22 Thread Brad Figg
** Changed in: linux (Ubuntu Trusty)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540586

Title:
  [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP
  injection

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Trusty:
  Fix Committed
Status in linux source package in Wily:
  In Progress
Status in linux source package in Xenial:
  Fix Committed

Bug description:
  This bug is a continuation to bug ID 1506521 - the refreshed
  hv_set_ifconfig script in Python3.

  On a Wily system with the new script, doing an IP injection does change the 
IP on the VM, however the netmask value is not parsed and gets ignored.
  It gets set to a default of 255.0.0.0.

  Kernel: 4.2.0-23-generic

  Attaching generated ifcfg-eth0 file that is used by this script.

  syslog doesn't record any related events to the netmask, and also
  manually executing hv_set_ifconfig against the generated ifcfg works
  with no errors.

  The interfaces files gets modified to this:
  iface eth0 inet static
  address 10.123.120.199
  gateway 10.123.119.1
  dns-nameservers anything_changed

  #End of hv_set_ifconfig stanzas

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1533009] Re: arm64: "unsupported RELA relocation"

2016-02-22 Thread Brad Figg
** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: gcc-5 (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Trusty)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1533009

Title:
  arm64: "unsupported RELA relocation"

Status in Linaro GCC:
  Unknown
Status in Linux:
  Unknown
Status in gcc-5 package in Ubuntu:
  Invalid
Status in linux package in Ubuntu:
  Fix Released
Status in gcc-5 source package in Trusty:
  New
Status in linux source package in Trusty:
  Fix Committed
Status in gcc-5 source package in Xenial:
  Invalid
Status in linux source package in Xenial:
  Fix Released

Bug description:
  linux-image-4.3.0-5-generic 4.3.0-5.16 arm64 fails to load modules
  (and therefore boot). It emits messages like the following for each
  attempted module load:

  [2.156817] module libahci: unsupported RELA relocation: 275

  This is reminiscent of LP: #1502946 - except that fix appears to still
  be in-tact. What has changed, however, is the build environment. If I
  rebuild the same kernel source in a wily chroot, it boots fine.

  Marking "Confirmed" because Paulo Pisatti reported this to me, and I
  reproduced.

To manage notifications about this bug go to:
https://bugs.launchpad.net/gcc-linaro/+bug/1533009/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1505564] Re: Soft lockup with "block nbdX: Attempted send on closed socket" spam

2016-02-22 Thread Brad Figg
** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Trusty)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1505564

Title:
  Soft lockup with "block nbdX: Attempted send on closed socket" spam

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Trusty:
  Fix Committed

Bug description:
  Some of our nova compute hosts regularly freeze, sometimes for a few
  hours, with kern.log getting spammed with:

  block nbdX: Attempted send on closed socket

  and a few "CPU soft lockup" messages (see attached log). This clears
  up when the queue gets cleared, eg :

  block nbdX: queue cleared

  trusty hosts with kernel version 3.19.0-30-generic.
  --- 
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 Nov 24 12:23 seq
   crw-rw 1 root audio 116, 33 Nov 24 12:23 timer
  AplayDevices: Error: [Errno 2] No such file or directory
  ApportVersion: 2.14.1-0ubuntu3.19
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  DistroRelease: Ubuntu 14.04
  IwConfig: Error: [Errno 2] No such file or directory
  MachineType: HP ProLiant DL385 G7
  Package: linux (not installed)
  PciMultimedia:
   
  ProcEnviron:
   TERM=screen-256color
   PATH=(custom, no user)
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 radeondrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-36-generic 
root=UUID=13289ac9-8dc9-4feb-b6bd-ca7db66b21d6 ro console=tty0 
console=ttyS1,38400 nosplash crashkernel=384M-:512M nox2apic intremap=off
  ProcVersionSignature: Ubuntu 
3.19.0-36.41~14.04.1hf00090138v20151122b1-generic 3.19.8-ckt9
  RelatedPackageVersions:
   linux-restricted-modules-3.19.0-36-generic N/A
   linux-backports-modules-3.19.0-36-generic  N/A
   linux-firmware 1.127.18
  RfKill: Error: [Errno 2] No such file or directory
  Tags:  trusty uec-images
  Uname: Linux 3.19.0-36-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups:
   
  _MarkForUpload: True
  dmi.bios.date: 02/02/2014
  dmi.bios.vendor: HP
  dmi.bios.version: A18
  dmi.chassis.type: 23
  dmi.chassis.vendor: HP
  dmi.modalias: 
dmi:bvnHP:bvrA18:bd02/02/2014:svnHP:pnProLiantDL385G7:pvr:cvnHP:ct23:cvr:
  dmi.product.name: ProLiant DL385 G7
  dmi.sys.vendor: HP

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1505564/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1526958] Re: CVE-2015-8569

2016-02-22 Thread Steve Beattie
** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1526958

Title:
  CVE-2015-8569

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-backport-maverick package in Ubuntu:
  New
Status in linux-lts-backport-natty package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  New
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Committed
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-flo source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  New
Status in linux-lts-backport-natty source package in Precise:
  New
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-ec2 source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-fsl-imx51 source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-backport-maverick source package in Trusty:
  New
Status in linux-lts-backport-natty source package in Trusty:
  New
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Committed
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-mvl-dove source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Committed
Status in linux-armadaxp source package in Vivid:
  Invalid
Status in linux-ec2 source package in Vivid:
  Invalid
Status in linux-flo source package in Vivid:
  New
Status in linux-fsl-imx51 source package in Vivid:
  Invalid
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-backport-maverick source package in Vivid:
  New
Status in linux-lts-backport-natty source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  Invalid
Status in linux-lts-raring source package in Vivid:
  Invalid
Status in linux-lts-saucy source package in Vivid:
  Invalid
Status in linux-lts-trusty source package in Vivid:
  Invalid
Status in linux-lts-utopic source package in 

[Kernel-packages] [Bug 1538429] Re: CVE-2016-2069

2016-02-22 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Wily)
   Status: Fix Committed => Fix Released

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1538429

Title:
  CVE-2016-2069

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  New
Status in linux-flo package in Ubuntu:
  New
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-backport-maverick package in Ubuntu:
  New
Status in linux-lts-backport-natty package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  New
Status in linux-mvl-dove package in Ubuntu:
  New
Status in linux-raspi2 package in Ubuntu:
  Fix Committed
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  New
Status in linux-armadaxp source package in Precise:
  New
Status in linux-ec2 source package in Precise:
  New
Status in linux-flo source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  New
Status in linux-lts-backport-natty source package in Precise:
  New
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  New
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New
Status in linux source package in Trusty:
  New
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-ec2 source package in Trusty:
  New
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-fsl-imx51 source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-backport-maverick source package in Trusty:
  New
Status in linux-lts-backport-natty source package in Trusty:
  New
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Committed
Status in linux-lts-vivid source package in Trusty:
  New
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Committed
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-mvl-dove source package in Trusty:
  New
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  New
Status in linux-armadaxp source package in Vivid:
  Invalid
Status in linux-ec2 source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-fsl-imx51 source package in Vivid:
  Invalid
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-backport-maverick source package in Vivid:
  New
Status in linux-lts-backport-natty source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  Invalid
Status in linux-lts-raring source package in Vivid:
  Invalid
Status in linux-lts-saucy source package in Vivid:
  Invalid
Status in linux-lts-trusty source package in Vivid:
  Invalid
Status in linux-lts-utopic source package in Vivid:
  Invalid
Status in linux-lts-vivid source package in Vivid:
  Invalid
Status in linux-lts-wil

[Kernel-packages] [Bug 1530407] Re: CVE-2015-8575

2016-02-22 Thread Steve Beattie
** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1530407

Title:
  CVE-2015-8575

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-backport-maverick package in Ubuntu:
  New
Status in linux-lts-backport-natty package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  New
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Committed
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-flo source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  New
Status in linux-lts-backport-natty source package in Precise:
  New
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-ec2 source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-fsl-imx51 source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-backport-maverick source package in Trusty:
  New
Status in linux-lts-backport-natty source package in Trusty:
  New
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Committed
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-mvl-dove source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Committed
Status in linux-armadaxp source package in Vivid:
  Invalid
Status in linux-ec2 source package in Vivid:
  Invalid
Status in linux-flo source package in Vivid:
  New
Status in linux-fsl-imx51 source package in Vivid:
  Invalid
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-backport-maverick source package in Vivid:
  New
Status in linux-lts-backport-natty source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  Invalid
Status in linux-lts-raring source package in Vivid:
  Invalid
Status in linux-lts-saucy source package in Vivid:
  Invalid
Status in linux-lts-trusty source package in Vivid:
  Invalid
Status in linux-lts-utopic source package in 

[Kernel-packages] [Bug 1538425] Re: CVE-2015-8785

2016-02-22 Thread Steve Beattie
** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Wily)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: Fix Committed => Fix Released

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1538425

Title:
  CVE-2015-8785

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  New
Status in linux-flo package in Ubuntu:
  New
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-backport-maverick package in Ubuntu:
  New
Status in linux-lts-backport-natty package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  New
Status in linux-mvl-dove package in Ubuntu:
  New
Status in linux-raspi2 package in Ubuntu:
  Fix Committed
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-ec2 source package in Precise:
  New
Status in linux-flo source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  New
Status in linux-lts-backport-natty source package in Precise:
  New
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  New
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-ec2 source package in Trusty:
  New
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-fsl-imx51 source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-backport-maverick source package in Trusty:
  New
Status in linux-lts-backport-natty source package in Trusty:
  New
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Committed
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-mvl-dove source package in Trusty:
  New
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Committed
Status in linux-armadaxp source package in Vivid:
  Invalid
Status in linux-ec2 source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-fsl-imx51 source package in Vivid:
  Invalid
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-backport-maverick source package in Vivid:
  New
Status in linux-lts-backport-nat

[Kernel-packages] [Bug 1525570] Re: CVE-2015-8543

2016-02-22 Thread Steve Beattie
** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1525570

Title:
  CVE-2015-8543

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  Invalid
Status in linux-flo package in Ubuntu:
  New
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-backport-maverick package in Ubuntu:
  New
Status in linux-lts-backport-natty package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  New
Status in linux-mvl-dove package in Ubuntu:
  Invalid
Status in linux-raspi2 package in Ubuntu:
  Fix Committed
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  Fix Released
Status in linux-ec2 source package in Precise:
  Invalid
Status in linux-flo source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  New
Status in linux-lts-backport-natty source package in Precise:
  New
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  Invalid
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-ec2 source package in Trusty:
  Invalid
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-fsl-imx51 source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-backport-maverick source package in Trusty:
  New
Status in linux-lts-backport-natty source package in Trusty:
  New
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Committed
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-mvl-dove source package in Trusty:
  Invalid
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Committed
Status in linux-armadaxp source package in Vivid:
  Invalid
Status in linux-ec2 source package in Vivid:
  Invalid
Status in linux-flo source package in Vivid:
  New
Status in linux-fsl-imx51 source package in Vivid:
  Invalid
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-backport-maverick source package in Vivid:
  New
Status in linux-lts-backport-natty source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  Invalid
Status in linux-lts-raring source package in Vivid:
  Invalid
Status in linux-lts-saucy source package in Vivid:
  Invalid
Status in linux-lts-trusty source package in Vivid:
  Invalid
Status in linux-lts-utopic source package in 

[Kernel-packages] [Bug 1530400] Re: CVE-2015-7550

2016-02-22 Thread Steve Beattie
** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** Changed in: linux-ti-omap4 (Ubuntu Precise)
   Status: Fix Committed => Fix Released

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1530400

Title:
  CVE-2015-7550

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  New
Status in linux-flo package in Ubuntu:
  New
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-backport-maverick package in Ubuntu:
  New
Status in linux-lts-backport-natty package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  New
Status in linux-mvl-dove package in Ubuntu:
  New
Status in linux-raspi2 package in Ubuntu:
  Fix Committed
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released
Status in linux-armadaxp source package in Precise:
  New
Status in linux-ec2 source package in Precise:
  New
Status in linux-flo source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  New
Status in linux-lts-backport-natty source package in Precise:
  New
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  New
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released
Status in linux source package in Trusty:
  Fix Released
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-ec2 source package in Trusty:
  New
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-fsl-imx51 source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-backport-maverick source package in Trusty:
  New
Status in linux-lts-backport-natty source package in Trusty:
  New
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released
Status in linux-lts-vivid source package in Trusty:
  Fix Released
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Committed
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-mvl-dove source package in Trusty:
  New
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Committed
Status in linux-armadaxp source package in Vivid:
  Invalid
Status in linux-ec2 source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-fsl-imx51 source package in Vivid:
  Invalid
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-backport-maverick source package in Vivid:
  New
Status in linux-lts-backport-natty source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  Invalid
Status in linux-lts-raring source package in Vivid:
  Invalid
Status in linux-lts-saucy so

[Kernel-packages] [Bug 1537886] Re: CVE-2013-4312

2016-02-22 Thread Steve Beattie
** Changed in: linux-lts-wily (Ubuntu Trusty)
   Status: Fix Committed => Fix Released

** Changed in: linux (Ubuntu Wily)
   Status: Fix Committed => Fix Released

** Changed in: linux-raspi2 (Ubuntu Wily)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1537886

Title:
  CVE-2013-4312

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  New
Status in linux-flo package in Ubuntu:
  New
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-backport-maverick package in Ubuntu:
  New
Status in linux-lts-backport-natty package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  New
Status in linux-mvl-dove package in Ubuntu:
  New
Status in linux-raspi2 package in Ubuntu:
  Fix Committed
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  New
Status in linux-armadaxp source package in Precise:
  New
Status in linux-ec2 source package in Precise:
  New
Status in linux-flo source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  New
Status in linux-lts-backport-natty source package in Precise:
  New
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  New
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New
Status in linux source package in Trusty:
  Fix Committed
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-ec2 source package in Trusty:
  New
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-fsl-imx51 source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-backport-maverick source package in Trusty:
  New
Status in linux-lts-backport-natty source package in Trusty:
  New
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Committed
Status in linux-lts-vivid source package in Trusty:
  New
Status in linux-lts-wily source package in Trusty:
  Fix Released
Status in linux-lts-xenial source package in Trusty:
  Fix Committed
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-mvl-dove source package in Trusty:
  New
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  New
Status in linux-armadaxp source package in Vivid:
  Invalid
Status in linux-ec2 source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-fsl-imx51 source package in Vivid:
  Invalid
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-backport-maverick source package in Vivid:
  New
Status in linux-lts-backport-natty source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  Invalid
Status in linux-lts-raring source package in Vivid:
  Invalid
Status in linux-lts-saucy source package in Vivid:
  Invalid
Status in linux-lts-trusty source package in Vivid:
  Invalid
Status in linux-lts-utopic source package in Vivid:
  Invalid
Status in linux-lts-vivid source package in Vivid:
  Invalid
Status in lin

[Kernel-packages] [Bug 1547934] Re: Multiple Issues with Ubuntu 16.04 on Lenovo Y700-17ISK notebook

2016-02-22 Thread Jeremy
This commit fixed the rfkill issue
http://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/drivers/platform/x86/ideapad-laptop.c?id=edde316acb5f07c04abf09a92f59db5d2efd14e2

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1547934

Title:
  Multiple Issues with Ubuntu 16.04 on Lenovo Y700-17ISK notebook

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Hello, here is a list of problems I've noticed after installing the
  testing version of the upcoming Ubuntu 16.04 on my new Lenovo
  Y700-17ISK notebook:

  1)
  Wireless/WiFi connection doesn't work
  (Wireless is disabled by hardware switch, so I can't enable my wifi 
connection)

  2)
  Notebook subwoofer doesn't work

  3)
  DMESG output:
  [0.303800] platform MSFT0101:00: failed to claim resource 1
  [0.303803] acpi MSFT0101:00: platform device creation failed: -16

  4)
  DMESG output:
  [1.008640] mmc0: Unknown controller version (3). You may experience 
problems.

  5)
  DMESG output:
  [1.917551] iwlwifi :08:00.0: Direct firmware load for 
iwlwifi-8000C-19.ucode failed with error -2
  [1.917562] iwlwifi :08:00.0: Direct firmware load for 
iwlwifi-8000C-18.ucode failed with error -2
  [1.917569] iwlwifi :08:00.0: Direct firmware load for 
iwlwifi-8000C-17.ucode failed with error -2
  [1.918204] iwlwifi :08:00.0: Unsupported splx structure

  6)
  DMESG output:
  [3.878249] Bluetooth: hci0: Setting Intel event mask failed (-16)

  7)
  DMESG output:
  [0.33] ACPI: Core revision 20150930
  [0.026490] ACPI Error: [\_SB_.PCI0.XHC_.RHUB.HS11] Namespace lookup 
failure, AE_NOT_FOUND (20150930/dswload-210)
  [0.026495] ACPI Exception: AE_NOT_FOUND, During name lookup/catalog 
(20150930/psobject-227)
  [0.026533] ACPI Exception: AE_NOT_FOUND, (SSDT:CB-01   ) while loading 
table (20150930/tbxfload-193)
  [0.031959] ACPI Error: 1 table load failures, 9 successful 
(20150930/tbxfload-214)

  8)
  DMESG output:
  [0.843979] [Firmware Bug]: No valid trip found
  [0.844491] [Firmware Bug]: No valid trip found

  9)
  DMESG output:
  [0.239800] PCI: Using host bridge windows from ACPI; if necessary, use 
"pci=nocrs" and report a bug

  10)
  DMESG output:
  [0.210582] [Firmware Bug]: ACPI: BIOS _OSI(Linux) query ignored

  11)
  DMESG output:
  [1.082502] [Firmware Bug]: ACPI(PEGP) defines _DOD but not _DOS

  12)
  DMESG output:
  [0.00] Linux version 4.4.0-6-generic (buildd@lgw01-21) (gcc version 
5.3.1 20160211 (Ubuntu 5.3.1-8ubuntu3) ) #21-Ubuntu SMP Tue Feb 16 20:32:27 UTC 
2016 (Ubuntu 4.4.0-6.21-generic 4.4.1)
  [0.00] Command line: 
BOOT_IMAGE=/boot/vmlinuz-4.4.0-6-generic.efi.signed 
root=UUID=64e94552-5d3c-4123-b492-a473889ee0f1 ro quiet splash vt.handoff=7
  [0.00] efi: EFI v2.40 by LENOVO
  [0.00] efi:  SMBIOS=0x75802000  ESRT=0x75800e18  ACPI 2.0=0x77ffd014 
  [0.00] esrt: Reserving ESRT space from 0x75800e18 to 
0x75800e50.
  [0.00] SMBIOS 2.8 present.
  [0.00] DMI: LENOVO 80Q0/Allsparks 7A, BIOS CDCN26WW 10/12/2015
  [0.00] e820: update [mem 0x-0x0fff] usable ==> reserved
  [0.00] e820: remove [mem 0x000a-0x000f] usable
  [0.00] e820: last_pfn = 0x482800 max_arch_pfn = 0x4
  [0.00] MTRR default type: uncachable
  [0.00] MTRR fixed ranges enabled:
  [0.00]   0-9 write-back
  [0.00]   A-B uncachable
  [0.00]   C-F write-protect
  [0.00] MTRR variable ranges enabled:
  [0.00]   0 base 00 mask 78 write-back
  [0.00]   1 base 0077FFF000 mask 7FF000 uncachable
  [0.00]   2 base 007800 mask 7FF800 uncachable
  [0.00]   3 base 008000 mask 7F8000 uncachable
  [0.00]   4 disabled
  [0.00]   5 disabled
  [0.00]   6 disabled
  [0.00]   7 disabled
  [0.00]   8 disabled
  [0.00]   9 disabled
  [0.00] x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WC  UC- WT  
  [0.00] original variable MTRRs
  [0.00] reg 0, base: 0GB, range: 32GB, type WB
  [0.00] reg 1, base: 1966076KB, range: 4KB, type UC
  [0.00] reg 2, base: 1920MB, range: 128MB, type UC
  [0.00] reg 3, base: 2GB, range: 2GB, type UC
  [0.00] total RAM covered: 30591M
  [0.00]  gran_size: 64Kchunk_size: 64K num_reg: 10 
lose cover RAM: 29361148K
  [0.00]  gran_size: 64Kchunk_size: 128Knum_reg: 8  
lose cover RAM: 60K
  [0.00]  gran_size: 64Kchunk_size: 256Knum_reg: 8  
lose cover RAM: 60K
  [0.00]  gran_size: 64Kchunk_size: 512Knum_reg: 8  
lose cover RAM: 60K
  [0.00]  gran_size: 64Kchunk_s

[Kernel-packages] [Bug 1548521] [NEW] kernel BUG at /build/linux-tSJmM_/linux-4.4.0/drivers/gpu/drm/i915/intel_display.c:10243!

2016-02-22 Thread Ergil Osin
Public bug reported:

lsb_release -rd
Description:Ubuntu Xenial Xerus (development branch)
Release:16.04

apt-cache policy linux-image-generic
linux-image-generic:
  Installed: 4.4.0.6.7
  Candidate: 4.4.0.6.7
  Version table:
 *** 4.4.0.6.7 500
500 http://ru.archive.ubuntu.com/ubuntu xenial/main i386 Packages
100 /var/lib/dpkg/status

ProblemType: KernelOops
DistroRelease: Ubuntu 16.04
Package: linux-image-4.4.0-6-generic 4.4.0-6.21
ProcVersionSignature: Ubuntu 4.4.0-6.21-generic 4.4.1
Uname: Linux 4.4.0-6-generic i686
Annotation: Your system might become unstable now and might need to be 
restarted.
ApportVersion: 2.20-0ubuntu3
Architecture: i386
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC0:  erelesse   1229 F pulseaudio
Date: Tue Feb 23 00:10:18 2016
Failure: oops
HibernationDevice: RESUME=UUID=63ef6815-2fd1-44e8-b1b3-09bcb51f585c
InstallationDate: Installed on 2016-02-22 (0 days ago)
InstallationMedia: Xubuntu 16.04 LTS "Xenial Xerus" - Alpha i386 (20160222)
MachineType: Sony Corporation VGN-FE770G
PccardctlIdent:
 Socket 0:
   no product info available
PccardctlStatus:
 Socket 0:
   no card
ProcFB: 0 inteldrmfb
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-6-generic 
root=UUID=c86d5044-62e5-4dd9-a13e-358d76afb64b ro quiet splash vt.handoff=7
PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
RelatedPackageVersions: kerneloops-daemon 0.12+git20090217-3ubuntu9
RfKill:
 0: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
SourcePackage: linux
Title: kernel BUG at 
/build/linux-tSJmM_/linux-4.4.0/drivers/gpu/drm/i915/intel_display.c:10243!
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 09/21/2006
dmi.bios.vendor: Phoenix Technologies LTD
dmi.bios.version: R0173J3
dmi.board.asset.tag: N/A
dmi.board.name: VAIO
dmi.board.vendor: Sony Corporation
dmi.board.version: N/A
dmi.chassis.asset.tag: 7R2L34eb42975aead93c
dmi.chassis.type: 10
dmi.chassis.vendor: Sony Corporation
dmi.chassis.version: C3LMWGAC
dmi.modalias: 
dmi:bvnPhoenixTechnologiesLTD:bvrR0173J3:bd09/21/2006:svnSonyCorporation:pnVGN-FE770G:pvrC3LMWGAC:rvnSonyCorporation:rnVAIO:rvrN/A:cvnSonyCorporation:ct10:cvrC3LMWGAC:
dmi.product.name: VGN-FE770G
dmi.product.version: C3LMWGAC
dmi.sys.vendor: Sony Corporation

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed


** Tags: apport-kerneloops i386 kernel-driver-i915 kernel-oops 
third-party-packages xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548521

Title:
  kernel BUG at /build/linux-
  tSJmM_/linux-4.4.0/drivers/gpu/drm/i915/intel_display.c:10243!

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  lsb_release -rd
  Description:  Ubuntu Xenial Xerus (development branch)
  Release:  16.04

  apt-cache policy linux-image-generic
  linux-image-generic:
Installed: 4.4.0.6.7
Candidate: 4.4.0.6.7
Version table:
   *** 4.4.0.6.7 500
  500 http://ru.archive.ubuntu.com/ubuntu xenial/main i386 Packages
  100 /var/lib/dpkg/status

  ProblemType: KernelOops
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-6-generic 4.4.0-6.21
  ProcVersionSignature: Ubuntu 4.4.0-6.21-generic 4.4.1
  Uname: Linux 4.4.0-6-generic i686
  Annotation: Your system might become unstable now and might need to be 
restarted.
  ApportVersion: 2.20-0ubuntu3
  Architecture: i386
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  erelesse   1229 F pulseaudio
  Date: Tue Feb 23 00:10:18 2016
  Failure: oops
  HibernationDevice: RESUME=UUID=63ef6815-2fd1-44e8-b1b3-09bcb51f585c
  InstallationDate: Installed on 2016-02-22 (0 days ago)
  InstallationMedia: Xubuntu 16.04 LTS "Xenial Xerus" - Alpha i386 (20160222)
  MachineType: Sony Corporation VGN-FE770G
  PccardctlIdent:
   Socket 0:
 no product info available
  PccardctlStatus:
   Socket 0:
 no card
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-6-generic 
root=UUID=c86d5044-62e5-4dd9-a13e-358d76afb64b ro quiet splash vt.handoff=7
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions: kerneloops-daemon 0.12+git20090217-3ubuntu9
  RfKill:
   0: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
  SourcePackage: linux
  Title: kernel BUG at 
/build/linux-tSJmM_/linux-4.4.0/drivers/gpu/drm/i915/intel_display.c:10243!
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 09/21/2006
  dmi.bios.vendor: Phoenix Technologies LTD
  dmi.bios.version: R0173J3
  dmi.board.asset.tag: N/A
  dmi.board.name: VAIO
 

[Kernel-packages] [Bug 1548521] Status changed to Confirmed

2016-02-22 Thread Brad Figg
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548521

Title:
  kernel BUG at /build/linux-
  tSJmM_/linux-4.4.0/drivers/gpu/drm/i915/intel_display.c:10243!

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  lsb_release -rd
  Description:  Ubuntu Xenial Xerus (development branch)
  Release:  16.04

  apt-cache policy linux-image-generic
  linux-image-generic:
Installed: 4.4.0.6.7
Candidate: 4.4.0.6.7
Version table:
   *** 4.4.0.6.7 500
  500 http://ru.archive.ubuntu.com/ubuntu xenial/main i386 Packages
  100 /var/lib/dpkg/status

  ProblemType: KernelOops
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-6-generic 4.4.0-6.21
  ProcVersionSignature: Ubuntu 4.4.0-6.21-generic 4.4.1
  Uname: Linux 4.4.0-6-generic i686
  Annotation: Your system might become unstable now and might need to be 
restarted.
  ApportVersion: 2.20-0ubuntu3
  Architecture: i386
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  erelesse   1229 F pulseaudio
  Date: Tue Feb 23 00:10:18 2016
  Failure: oops
  HibernationDevice: RESUME=UUID=63ef6815-2fd1-44e8-b1b3-09bcb51f585c
  InstallationDate: Installed on 2016-02-22 (0 days ago)
  InstallationMedia: Xubuntu 16.04 LTS "Xenial Xerus" - Alpha i386 (20160222)
  MachineType: Sony Corporation VGN-FE770G
  PccardctlIdent:
   Socket 0:
 no product info available
  PccardctlStatus:
   Socket 0:
 no card
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-6-generic 
root=UUID=c86d5044-62e5-4dd9-a13e-358d76afb64b ro quiet splash vt.handoff=7
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions: kerneloops-daemon 0.12+git20090217-3ubuntu9
  RfKill:
   0: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
  SourcePackage: linux
  Title: kernel BUG at 
/build/linux-tSJmM_/linux-4.4.0/drivers/gpu/drm/i915/intel_display.c:10243!
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 09/21/2006
  dmi.bios.vendor: Phoenix Technologies LTD
  dmi.bios.version: R0173J3
  dmi.board.asset.tag: N/A
  dmi.board.name: VAIO
  dmi.board.vendor: Sony Corporation
  dmi.board.version: N/A
  dmi.chassis.asset.tag: 7R2L34eb42975aead93c
  dmi.chassis.type: 10
  dmi.chassis.vendor: Sony Corporation
  dmi.chassis.version: C3LMWGAC
  dmi.modalias: 
dmi:bvnPhoenixTechnologiesLTD:bvrR0173J3:bd09/21/2006:svnSonyCorporation:pnVGN-FE770G:pvrC3LMWGAC:rvnSonyCorporation:rnVAIO:rvrN/A:cvnSonyCorporation:ct10:cvrC3LMWGAC:
  dmi.product.name: VGN-FE770G
  dmi.product.version: C3LMWGAC
  dmi.sys.vendor: Sony Corporation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548521/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1546694] Re: Bluetooth cannot detect other devices (Lite-on 3014 + Atheros AR9565)

2016-02-22 Thread Jeremy
Kernel source is kernel specific and the source you downloaded was for
the 3.19 kernel.

If we can assign this bug to Pilot6, he can get the patches submitted
upstream

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1546694

Title:
  Bluetooth cannot detect other devices (Lite-on 3014 + Atheros AR9565)

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  I bought an Acer Cloudbook 11 but the bluetooth doesn't seem to work.
  The system shows the indicator icon but he doesn't detect any devices.
  The wifi works correctly.

  lsb_release -rb:
  Description:  Ubuntu 15.10
  Release:  15.10
  --- 
  ApportVersion: 2.19.1-0ubuntu5
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  thenawaker   1387 F pulseaudio
  CurrentDesktop: Unity
  DistroRelease: Ubuntu 15.10
  HibernationDevice: RESUME=UUID=8e395c05-c5e5-482d-ac5e-bbfeffcc37a6
  InstallationDate: Installed on 2016-02-17 (0 days ago)
  InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 004: ID 04ca:3014 Lite-On Technology Corp. 
   Bus 001 Device 003: ID 064e:9404 Suyin Corp. 
   Bus 001 Device 002: ID 0bda:0129 Realtek Semiconductor Corp. RTS5129 Card 
Reader Controller
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: Acer Aspire one 1-131
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.2.0-27-generic.efi.signed 
root=/dev/mmcblk0p2 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 4.2.0-27.32-generic 4.2.8-ckt1
  RelatedPackageVersions:
   linux-restricted-modules-4.2.0-27-generic N/A
   linux-backports-modules-4.2.0-27-generic  N/A
   linux-firmware1.144+ar3012
  Tags:  wily
  UdevLog: Error: [Errno 2] Aucun fichier ou dossier de ce type: '/var/log/udev'
  Uname: Linux 4.2.0-27-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 07/30/2015
  dmi.bios.vendor: Insyde Corp.
  dmi.bios.version: V1.06
  dmi.board.asset.tag: Type2 - Board Asset Tag
  dmi.board.name: Caltech
  dmi.board.vendor: Acer
  dmi.board.version: V1.06
  dmi.chassis.type: 10
  dmi.chassis.vendor: Acer
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnInsydeCorp.:bvrV1.06:bd07/30/2015:svnAcer:pnAspireone1-131:pvrV1.06:rvnAcer:rnCaltech:rvrV1.06:cvnAcer:ct10:cvrChassisVersion:
  dmi.product.name: Aspire one 1-131
  dmi.product.version: V1.06
  dmi.sys.vendor: Acer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1546694/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1546694] Re: Bluetooth cannot detect other devices (Lite-on 3014 + Atheros AR9565)

2016-02-22 Thread Jeremy
That kernel source is specific to 3.19 and the bluetooth source code
changes a lot.  If we can get Pilot6 assigned to this bug he can fix and
get the patch submitted upstream

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1546694

Title:
  Bluetooth cannot detect other devices (Lite-on 3014 + Atheros AR9565)

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  I bought an Acer Cloudbook 11 but the bluetooth doesn't seem to work.
  The system shows the indicator icon but he doesn't detect any devices.
  The wifi works correctly.

  lsb_release -rb:
  Description:  Ubuntu 15.10
  Release:  15.10
  --- 
  ApportVersion: 2.19.1-0ubuntu5
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  thenawaker   1387 F pulseaudio
  CurrentDesktop: Unity
  DistroRelease: Ubuntu 15.10
  HibernationDevice: RESUME=UUID=8e395c05-c5e5-482d-ac5e-bbfeffcc37a6
  InstallationDate: Installed on 2016-02-17 (0 days ago)
  InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 004: ID 04ca:3014 Lite-On Technology Corp. 
   Bus 001 Device 003: ID 064e:9404 Suyin Corp. 
   Bus 001 Device 002: ID 0bda:0129 Realtek Semiconductor Corp. RTS5129 Card 
Reader Controller
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: Acer Aspire one 1-131
  Package: linux (not installed)
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.2.0-27-generic.efi.signed 
root=/dev/mmcblk0p2 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 4.2.0-27.32-generic 4.2.8-ckt1
  RelatedPackageVersions:
   linux-restricted-modules-4.2.0-27-generic N/A
   linux-backports-modules-4.2.0-27-generic  N/A
   linux-firmware1.144+ar3012
  Tags:  wily
  UdevLog: Error: [Errno 2] Aucun fichier ou dossier de ce type: '/var/log/udev'
  Uname: Linux 4.2.0-27-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo
  _MarkForUpload: True
  dmi.bios.date: 07/30/2015
  dmi.bios.vendor: Insyde Corp.
  dmi.bios.version: V1.06
  dmi.board.asset.tag: Type2 - Board Asset Tag
  dmi.board.name: Caltech
  dmi.board.vendor: Acer
  dmi.board.version: V1.06
  dmi.chassis.type: 10
  dmi.chassis.vendor: Acer
  dmi.chassis.version: Chassis Version
  dmi.modalias: 
dmi:bvnInsydeCorp.:bvrV1.06:bd07/30/2015:svnAcer:pnAspireone1-131:pvrV1.06:rvnAcer:rnCaltech:rvrV1.06:cvnAcer:ct10:cvrChassisVersion:
  dmi.product.name: Aspire one 1-131
  dmi.product.version: V1.06
  dmi.sys.vendor: Acer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1546694/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548414] Re: Floating-point exception handler receives empty Data-Exception Code in Floating Point Control register

2016-02-22 Thread Gary Gaydos
** Package changed: ubuntu => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548414

Title:
  Floating-point exception handler receives empty Data-Exception Code in
  Floating Point Control register

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  == Comment: #0 - Alexander Efremkin  - 2016-02-17 
12:18:14 ==
  With a C program sets FPE handler and triggers an FPE exception, it expects 
that machine-dependent context data, which is passed to the handler, will 
contain sensible values.

  In this scenario, however, FPC register was zero and contained no DXC
  (Data-Exception Code) indication:

  #include 
  #include 
  #include 

  void trapFunction() {
 asm volatile ("lhi %r1,0\n\t"
   "cit %r1,0,8\n\t");
  }

  static void sigFPE_handler(int signal, siginfo_t *info, void *context) {
 ucontext_t *uc = context;
 mcontext_t mc = uc->uc_mcontext;
 fpregset_t fpregs = mc.fpregs;
 unsigned int fpc = fpregs.fpc;

 printf("received signal!\n");
 printf("fpc: %08x\n", fpc );
  }

  int main() {
 struct sigaction action;
 memset(&action, '\0', sizeof(action));

 printf("registering signal handler\n");

 action.sa_flags |= SA_SIGINFO;
 action.sa_sigaction = sigFPE_handler;
 if (sigaction(SIGFPE, &action, NULL))
printf("error calling sigaction\n");

 printf("firing trap\n");
 trapFunction();
 return 0;
  }

  This program prints "fpc: ", but the expected output is "fpc:
  ff00"..

  The IBM Java team has encountered test failures around the use of trap
  instructions; Linux on z Distribution Test reproduced the issue on the
  following system:

  z13 LPAR
  Ubuntu 16.04
  Kernel 4.4.0-4-generic
  gcc (Ubuntu 5.3.1-8ubuntu2) 5.3.1 20160205
  libc6 2.21-0ubuntu5

  Also, similar issue has been found during test of SIMD (vector)
  instructions, FPC contents was also zero, whereas it expected at least
  an exception mask and vector-defined DXC.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548414/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548519] [NEW] linux: 3.13.0-80.124 -proposed tracker

2016-02-22 Thread Brad Figg
Public bug reported:

This bug is for tracking the 3.13.0-80.124 upload package. This bug will
contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:49 UTC
kernel-stable-phase:Prepare
kernel-stable-phase-changed:Monday, 22. February 2016 21:49 UTC

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-signed
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux (Ubuntu)
 Importance: Medium
 Status: New

** Affects: linux (Ubuntu Trusty)
 Importance: Medium
 Status: New


** Tags: block-proposed-trusty kernel-release-tracking-bug trusty

** Tags added: kernel-release-tracking-bug

** Tags added: block-proposed-trusty

** Also affects: linux (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Tags added: trusty

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow
   Status: New => In Progress

** Changed in: kernel-sru-workflow
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-signed
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-signed

[Kernel-packages] [Bug 1540720] Re: linux-ti-omap4: 3.2.0-1477.100 -proposed tracker

2016-02-22 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.2.0-1477.100 upload package. This bug
  will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:01 UTC
  kernel-stable-master-bug:1540538
  kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 16:01 UTC
  kernel-stable-Prepare-package-end:Wednesday, 03. February 2016 00:01 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 03. February 2016 00:01 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC
  kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:04 UTC
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC
  proposed-announcement-sent:True
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC
  kernel-stable-Security-signoff-end:Friday, 05. February 2016 21:00 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. February 2016 16:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Monday, 22. February 2016 19:24 UTC
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:24 UTC
+ kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1540720

Title:
  linux-ti-omap4: 3.2.0-1477.100 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1477.100 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:01 UTC
  kernel-stable-master-bug:1540538
  kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 16:01 UTC
  kernel-stable-Prepare-package-end:Wednesday, 03. February 2016 00:01 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 03. February 2016 00:01 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC
  kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:04 UTC
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC
  proposed-announcement-sent:True
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC
  kernel-stable-Security-signoff-end:Friday, 05. February 2016 21:00 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. February 2016 16:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Monday, 22. February 2016 19:24 UTC
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:24 UTC
  kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540720/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540721] Re: linux-armadaxp: 3.2.0-1662.86 -proposed tracker

2016-02-22 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.2.0-1662.86 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:02 UTC
  kernel-stable-master-bug:1540538
  kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 08:03 UTC
  kernel-stable-Security-signoff-end:Tuesday, 02. February 2016 08:03 UTC
  kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 10:02 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 10:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC
  kernel-stable-Regression-testing-end:Monday, 08. February 2016 17:00 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Monday, 22. February 2016 19:19 UTC
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:19 UTC
+ kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1540721

Title:
  linux-armadaxp: 3.2.0-1662.86 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-armadaxp source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1662.86 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:02 UTC
  kernel-stable-master-bug:1540538
  kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 08:03 UTC
  kernel-stable-Security-signoff-end:Tuesday, 02. February 2016 08:03 UTC
  kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 10:02 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 10:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC
  kernel-stable-Regression-testing-end:Monday, 08. February 2016 17:00 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Monday, 22. February 2016 19:19 UTC
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:19 UTC
  kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540721/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548414] [NEW] Floating-point exception handler receives empty Data-Exception Code in Floating Point Control register

2016-02-22 Thread Launchpad Bug Tracker
You have been subscribed to a public bug:

== Comment: #0 - Alexander Efremkin  - 2016-02-17 
12:18:14 ==
With a C program sets FPE handler and triggers an FPE exception, it expects 
that machine-dependent context data, which is passed to the handler, will 
contain sensible values.

In this scenario, however, FPC register was zero and contained no DXC
(Data-Exception Code) indication:

#include 
#include 
#include 

void trapFunction() {
   asm volatile ("lhi %r1,0\n\t"
 "cit %r1,0,8\n\t");
}

static void sigFPE_handler(int signal, siginfo_t *info, void *context) {
   ucontext_t *uc = context;
   mcontext_t mc = uc->uc_mcontext;
   fpregset_t fpregs = mc.fpregs;
   unsigned int fpc = fpregs.fpc;

   printf("received signal!\n");
   printf("fpc: %08x\n", fpc );
}

int main() {
   struct sigaction action;
   memset(&action, '\0', sizeof(action));

   printf("registering signal handler\n");

   action.sa_flags |= SA_SIGINFO;
   action.sa_sigaction = sigFPE_handler;
   if (sigaction(SIGFPE, &action, NULL))
  printf("error calling sigaction\n");

   printf("firing trap\n");
   trapFunction();
   return 0;
}

This program prints "fpc: ", but the expected output is "fpc:
ff00"..

The IBM Java team has encountered test failures around the use of trap
instructions; Linux on z Distribution Test reproduced the issue on the
following system:

z13 LPAR
Ubuntu 16.04
Kernel 4.4.0-4-generic
gcc (Ubuntu 5.3.1-8ubuntu2) 5.3.1 20160205
libc6 2.21-0ubuntu5

Also, similar issue has been found during test of SIMD (vector)
instructions, FPC contents was also zero, whereas it expected at least
an exception mask and vector-defined DXC.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Assignee: Skipper Bug Screeners (skipper-screen-team)
 Status: Incomplete


** Tags: architecture-s39064 bugnameltc-137317 severity-critical 
targetmilestone-inin1604
-- 
Floating-point exception handler receives empty Data-Exception Code in Floating 
Point Control register
https://bugs.launchpad.net/bugs/1548414
You received this bug notification because you are a member of Kernel Packages, 
which is subscribed to linux in Ubuntu.

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540538] Re: linux: 3.2.0-99.139 -proposed tracker

2016-02-22 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.2.0-99.139 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 01. February 2016 19:16 UTC
  kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 04:03 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 04:03 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:01 UTC
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:00 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Security-signoff-end:Friday, 05. February 2016 10:01 UTC
  kernel-stable-Verification-testing-end:Thursday, 18. February 2016 15:00 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. February 2016 15:00 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:17 UTC
  kernel-stable-phase-changed:Monday, 22. February 2016 19:17 UTC
  kernel-stable-Certification-testing-end:Monday, 22. February 2016 19:17 UTC
+ kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540538

Title:
  linux: 3.2.0-99.139 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-99.139 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 01. February 2016 19:16 UTC
  kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 04:03 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 04:03 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:01 UTC
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:00 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Security-signoff-end:Friday, 05. February 2016 10:01 UTC
  kernel-stable-Verification-testing-end:Thursday, 18. February 2016 15:00 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. February 2016 15:00 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:17 UTC
  kernel-stable-phase-changed:Monday, 22. February 2016 19:17 UTC
  kernel-stable-Certification-testing-end:Monday, 22. February 2016 19:17 UTC
  kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540538/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540538] Re: linux: 3.2.0-99.139 -proposed tracker

2016-02-22 Thread Chris J Arges
linux | 3.2.0-99.139  | precise-updates  | source
 linux-meta| 3.2.0.99.115  | precise-updates  | source
 linux-backports-modules-3.2.0 | 3.2.0-99.91   | precise-updates  | source

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540538

Title:
  linux: 3.2.0-99.139 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-99.139 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 01. February 2016 19:16 UTC
  kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 04:03 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 04:03 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:01 UTC
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:00 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Security-signoff-end:Friday, 05. February 2016 10:01 UTC
  kernel-stable-Verification-testing-end:Thursday, 18. February 2016 15:00 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. February 2016 15:00 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:17 UTC
  kernel-stable-phase-changed:Monday, 22. February 2016 19:17 UTC
  kernel-stable-Certification-testing-end:Monday, 22. February 2016 19:17 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540538/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540721] Re: linux-armadaxp: 3.2.0-1662.86 -proposed tracker

2016-02-22 Thread Chris J Arges
linux-armadaxp  | 3.2.0-1662.86 | precise-updates  | source
 linux-meta-armadaxp | 3.2.0.1662.70 | precise-updates  | source

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1540721

Title:
  linux-armadaxp: 3.2.0-1662.86 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-armadaxp source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1662.86 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:02 UTC
  kernel-stable-master-bug:1540538
  kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 08:03 UTC
  kernel-stable-Security-signoff-end:Tuesday, 02. February 2016 08:03 UTC
  kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 10:02 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 10:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC
  kernel-stable-Regression-testing-end:Monday, 08. February 2016 17:00 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Monday, 22. February 2016 19:19 UTC
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:19 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540721/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540720] Re: linux-ti-omap4: 3.2.0-1477.100 -proposed tracker

2016-02-22 Thread Chris J Arges
linux-ti-omap4  | 3.2.0-1477.100 | precise-updates  | source
 linux-meta-ti-omap4 | 3.2.0.1477.72  | precise-updates  | source

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1540720

Title:
  linux-ti-omap4: 3.2.0-1477.100 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1477.100 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:01 UTC
  kernel-stable-master-bug:1540538
  kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 16:01 UTC
  kernel-stable-Prepare-package-end:Wednesday, 03. February 2016 00:01 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 03. February 2016 00:01 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC
  kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:04 UTC
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC
  proposed-announcement-sent:True
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC
  kernel-stable-Security-signoff-end:Friday, 05. February 2016 21:00 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. February 2016 16:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Monday, 22. February 2016 19:24 UTC
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:24 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540720/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548504] Re: linux: 3.2.0-100.140 -proposed tracker

2016-02-22 Thread Brad Figg
** Summary changed:

- linux: 3.2.0-99.139 -proposed tracker
+ linux: 3.2.0-100.140 -proposed tracker

** Description changed:

- This bug is for tracking the 3.2.0-99.139 upload package. This bug will
+ This bug is for tracking the 3.2.0-100.140 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 22. February 2016 20:57 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Monday, 22. February 2016 21:04 UTC
  kernel-stable-Promote-to-proposed-start:Monday, 22. February 2016 21:04 UTC
  kernel-stable-phase-changed:Monday, 22. February 2016 21:04 UTC

** Description changed:

  This bug is for tracking the 3.2.0-100.140 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 22. February 2016 20:57 UTC
- kernel-stable-phase:CopyToProposed
- kernel-stable-Prepare-package-end:Monday, 22. February 2016 21:04 UTC
- kernel-stable-Promote-to-proposed-start:Monday, 22. February 2016 21:04 UTC
  kernel-stable-phase-changed:Monday, 22. February 2016 21:04 UTC

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Confirmed => New

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: Fix Released => New

** Changed in: kernel-sru-workflow/prepare-package-lbm
   Status: Fix Released => New

** Changed in: kernel-sru-workflow/prepare-package
   Status: Fix Released => New

** Changed in: kernel-sru-workflow/automated-testing
   Status: Fix Released => New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548504

Title:
  linux: 3.2.0-100.140 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-lbm series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.2.0-100.140 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 22. February 2016 20:57 UTC
  kernel-stable-phase-changed:Monday, 22. February 2016 21:04 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548504/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548505] Derivative package tracking bug

2016-02-22 Thread Brad Figg
This tracking bug was opened to be worked from linux-3.2.0-99.139 update
(bug 1548504)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1548505

Title:
  linux-ti-omap4:  -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow upload-to-ppa series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-ti-omap4 package in Ubuntu:
  New
Status in linux-ti-omap4 source package in Precise:
  New

Bug description:
  This bug is for tracking the  upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:01 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Monday, 22. February 2016 21:01 UTC
  kernel-stable-master-bug:1548504

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548505/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548505] [NEW] linux-ti-omap4: -proposed tracker

2016-02-22 Thread Brad Figg
Public bug reported:

This bug is for tracking the  upload package. This
bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:01 UTC
kernel-stable-phase:Prepare
kernel-stable-phase-changed:Monday, 22. February 2016 21:01 UTC
kernel-stable-master-bug:1548504

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Status: Invalid

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Status: Invalid

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: ubuntu-armel-kernel (ubuntu-armel-kernel)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/upload-to-ppa
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: ubuntu-armel-kernel (ubuntu-armel-kernel)
 Status: New

** Affects: linux-ti-omap4 (Ubuntu)
 Importance: Medium
 Status: New

** Affects: linux-ti-omap4 (Ubuntu Precise)
 Importance: Medium
 Status: New


** Tags: armel block-proposed-precise kernel-release-tracking-bug precise

** Tags added: kernel-release-tracking-bug

** Tags added: armel

** Tags added: block-proposed-precise

** Also affects: linux-ti-omap4 (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Tags added: precise

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/upload-to-ppa
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow
   Status: New => In Progress

** Changed in: kernel-sru-workflow
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
   Status: New => Invalid

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Invalid

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => ubuntu-armel-kernel (ubuntu-armel-kernel)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/promote-to-proposed
 Assignee: (unassigned) => Ubuntu Stable Release Updates Team (ubuntu-sru)

** Changed in: kernel-sru-workflow/promote-to-security
   Importance: Undecided => Medium

** Chan

[Kernel-packages] [Bug 1548506] [NEW] linux-armadaxp: -proposed tracker

2016-02-22 Thread Brad Figg
Public bug reported:

This bug is for tracking the  upload package. This
bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:02 UTC
kernel-stable-phase:Prepare
kernel-stable-phase-changed:Monday, 22. February 2016 21:02 UTC
kernel-stable-master-bug:1548504

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Status: Invalid

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Status: Invalid

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Canonical Hardware Enablement ARM Kernel 
(canonical-hwe-arm-kernel)
 Status: New

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Canonical Hardware Enablement ARM Kernel 
(canonical-hwe-arm-kernel)
 Status: New

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Status: Invalid

** Affects: kernel-sru-workflow/upload-to-ppa
 Importance: Medium
 Status: Invalid

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Hardware Enablement ARM Kernel 
(canonical-hwe-arm-kernel)
 Status: New

** Affects: linux-armadaxp (Ubuntu)
 Importance: Medium
 Status: New

** Affects: linux-armadaxp (Ubuntu Precise)
 Importance: Medium
 Status: New


** Tags: armhf block-proposed-precise kernel-release-tracking-bug precise

** Tags added: kernel-release-tracking-bug

** Tags added: armhf

** Tags added: block-proposed-precise

** Also affects: linux-armadaxp (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Tags added: precise

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/upload-to-ppa
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow
   Status: New => In Progress

** Changed in: kernel-sru-workflow
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
   Status: New => Invalid

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Invalid

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Hardware Enablement ARM Kernel 
(canonical-hwe-arm-kernel)

** Changed in: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-meta
 Assignee: (unassigned) => Canonical Hardware Enablement ARM Kernel 
(canonical-hwe-arm-kernel)

** Changed in: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/promote-to-proposed
 Assignee: (unassigned) => Ubuntu Stable Release Updates Team (ubuntu-sru)

** Changed in: kernel-sru-workflow/promote-to-security
   Importance: Undecided => M

[Kernel-packages] [Bug 1546320] Re: crash starting at kernel v3.13.0-72 in timer code

2016-02-22 Thread Eric Desrochers
It also been brought to my attention the following about the hotfix
kernel:

--
Hi Eric,

We have applied the update from your PPA to the controller nodes and
they have been stable over the weekend. We will see if they remain
stable under load over the rest of the week.

Thanks
--

Eric

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1546320

Title:
  crash starting at kernel v3.13.0-72  in timer code

Status in linux package in Ubuntu:
  Triaged
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Committed
Status in linux-lts-utopic source package in Trusty:
  Fix Committed
Status in linux source package in Vivid:
  Fix Committed

Bug description:
  Register %RAX is LIST_POISON2.

  [239837.578526] general protection fault:  [#1] SMP
  ...
  [239837.664031] CPU: 4 PID: 0 Comm: swapper/4 Not tainted 3.13.0-74-generic 
#118-Ubuntu
  [239837.672997] Hardware name: XX
  [239837.685506] task: 881028dc6000 ti: 881028dce000 task.ti: 
881028dce000
  [239837.694280] RIP: 0010:[] [] 
detach_if_pending+0x34/0xb0
  [239837.704179] RSP: 0018:88103fa03d10 EFLAGS: 00010002
  [239837.710425] RAX: dead00200200 RBX: a01be040 RCX: 
303e
  [239837.718778] RDX: 8810288906b8 RSI: 881028f6 RDI: 
a01be040
  [239837.727137] RBP: 88103fa03d30 R08: 0086 R09: 
881028f88000
  [239837.735505] R10: 0002 R11: 0005 R12: 
a01be040
  [239837.760360] R13: 881028f6 R14: 0001 R15: 
0001
  [239837.785862] FS: () GS:88103fa0() 
knlGS:
  [239837.812540] CS: 0010 DS:  ES:  CR0: 80050033
  [239837.827508] CR2: 033d4048 CR3: 01c0e000 CR4: 
001407e0
  [239837.852880] Stack:
  [239837.863639] a01be040  881028f6 
882025639a00
  [239837.889101] 88103fa03d60 81075766 0086 
a01be020
  [239837.914247] 88103fa03d98 0100 88103fa03d88 
81082369
  [239837.939532] Call Trace:
  [239837.950648] 
  [239837.952982]
  [239837.963021] [] del_timer+0x46/0x70
  [239837.974969] [] try_to_grab_pending+0xa9/0x160
  [239837.989674] [] mod_delayed_work_on+0x33/0x70
  [239838.003709] [] set_timeout+0x3a/0x40 [ib_addr]
  [239838.018469] [] netevent_callback+0x29/0x30 [ib_addr]
  [239838.033727] [] notifier_call_chain+0x4c/0x70
  [239838.047561] [] ? neigh_table_clear+0x120/0x120
  [239838.062010] [] atomic_notifier_call_chain+0x1a/0x20
  [239838.076485] [] call_netevent_notifiers+0x1b/0x20
  [239838.090371] [] neigh_timer_handler+0xc1/0x2c0
  [239838.104354] [] call_timer_fn+0x36/0x100
  [239838.117021] [] ? neigh_table_clear+0x120/0x120
  [239838.131002] [] run_timer_softirq+0x1ef/0x2f0
  [239838.143985] [] __do_softirq+0xec/0x2c0
  [239838.156386] [] irq_exit+0x105/0x110
  [239838.168325] [] smp_apic_timer_interrupt+0x45/0x60
  [239838.181501] [] apic_timer_interrupt+0x6d/0x80
  [239838.193978] 
  [239838.196317]
  [239838.203483] [] ? cpuidle_enter_state+0x52/0xc0
  [239838.214553] [] cpuidle_idle_call+0xb9/0x1f0
  [239838.226799] [] arch_cpu_idle+0xe/0x30
  [239838.238745] [] cpu_startup_entry+0xc5/0x290
  [239838.250792] [] start_secondary+0x21d/0x2d0
  [239838.263165] Code: 89 e5 41 56 41 89 d6 41 55 41 54 49 89 fc 53 48 8b 17 
48 85 d2 74 55 49 89 f5 0f 1f 44 00 00 49 8b 44 24 08 45 84 f6 48 89 42 08 <48> 
89 10 74 08 49 c7 04 24 00 00 00 00 41 f6 44 24 18 01 48 b8
  [239838.301935] RIP [] detach_if_pending+0x34/0xb0
  [239838.314036] RSP 

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1546320/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548504] [NEW] linux: 3.2.0-99.139 -proposed tracker

2016-02-22 Thread Brad Figg
Public bug reported:

This bug is for tracking the 3.2.0-99.139 upload package. This bug will
contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Monday, 22. February 2016 20:57 UTC
kernel-stable-phase:CopyToProposed
kernel-stable-Prepare-package-end:Monday, 22. February 2016 21:04 UTC
kernel-stable-Promote-to-proposed-start:Monday, 22. February 2016 21:04 UTC
kernel-stable-phase-changed:Monday, 22. February 2016 21:04 UTC

** Affects: kernel-sru-workflow
 Importance: Medium
 Status: In Progress

** Affects: kernel-sru-workflow/automated-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: Fix Released

** Affects: kernel-sru-workflow/certification-testing
 Importance: Medium
 Assignee: Canonical Hardware Certification (canonical-hw-cert)
 Status: New

** Affects: kernel-sru-workflow/prepare-package
 Importance: Medium
 Assignee: Brad Figg (brad-figg)
 Status: Fix Released

** Affects: kernel-sru-workflow/prepare-package-lbm
 Importance: Medium
 Assignee: Brad Figg (brad-figg)
 Status: Fix Released

** Affects: kernel-sru-workflow/prepare-package-meta
 Importance: Medium
 Assignee: Brad Figg (brad-figg)
 Status: Fix Released

** Affects: kernel-sru-workflow/promote-to-proposed
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: Confirmed

** Affects: kernel-sru-workflow/promote-to-security
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/promote-to-updates
 Importance: Medium
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru)
 Status: New

** Affects: kernel-sru-workflow/regression-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: kernel-sru-workflow/security-signoff
 Importance: Medium
 Assignee: Canonical Security Team (canonical-security)
 Status: New

** Affects: kernel-sru-workflow/verification-testing
 Importance: Medium
 Assignee: Canonical Kernel Team (canonical-kernel-team)
 Status: New

** Affects: linux (Ubuntu)
 Importance: Medium
 Status: New

** Affects: linux (Ubuntu Precise)
 Importance: Medium
 Status: New


** Tags: block-proposed-precise kernel-release-tracking-bug precise

** Tags added: kernel-release-tracking-bug

** Tags added: block-proposed-precise

** Also affects: linux (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Tags added: precise

** Also affects: kernel-sru-workflow/automated-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/certification-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-lbm
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/prepare-package-meta
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-proposed
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-security
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/promote-to-updates
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/regression-testing
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/security-signoff
   Importance: Undecided
   Status: New

** Also affects: kernel-sru-workflow/verification-testing
   Importance: Undecided
   Status: New

** Changed in: kernel-sru-workflow
   Status: New => In Progress

** Changed in: kernel-sru-workflow
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/automated-testing
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/certification-testing
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/certification-testing
 Assignee: (unassigned) => Canonical Hardware Certification 
(canonical-hw-cert)

** Changed in: kernel-sru-workflow/prepare-package
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workflow/prepare-package-lbm
   Importance: Undecided => Medium

** Changed in: kernel-sru-workflow/prepare-package-lbm
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

** Changed in: kernel-sru-workfl

[Kernel-packages] [Bug 1540390] Re: Backport more recent driver for Kabylake and Broxton graphics

2016-02-22 Thread Timo Aaltonen
Added initramfs-tools because i915_bpo needs to be added to the list of
modules to include.

** Also affects: initramfs-tools (Ubuntu)
   Importance: Undecided
   Status: New

** Summary changed:

- Backport more recent driver for Kabylake and Broxton graphics
+ Backport more recent driver for SKL, KBL and BXT graphics

** Description changed:

- We need to support Kabylake (KBL) and Broxton (BXT) graphics in xenial,
- but the kernel driver is not fresh enough for proper support.
+ We need to support Skylake (SKL), Kabylake (KBL) and Broxton (BXT)
+ graphics in xenial, but the kernel driver is not fresh enough for proper
+ support.
  
  For the kernel the plan is to provide a separate driver module
- (i915_bpo) like for Skylake in vivid. The drm/i915 driver in 4.4 is not
- recent enough for KBL/BXT, so pulling the driver from current drm-intel-
- next branch would provide what'll end up in 4.6. The i915 drivers will
- be modified so that only i915_bpo loads on KBL/BXT machines, and only
- there. The driver will get further updates along the way, and possibly
- also rebased to a later kernel release.
+ (i915_bpo) like for Skylake/Broadwell/Braswell in vivid. The drm/i915
+ driver in 4.4 is not recent enough for SKL/KBL/BXT, so pulling the
+ driver from current drm-intel-next branch would provide what'll end up
+ in 4.6. The i915 drivers will be modified so that only i915_bpo loads on
+ SKL/KBL/BXT machines, and only there. The driver will get further
+ updates along the way, and possibly also rebased to a later kernel
+ release.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540390

Title:
  Backport more recent driver for SKL, KBL and BXT graphics

Status in initramfs-tools package in Ubuntu:
  New
Status in linux package in Ubuntu:
  In Progress

Bug description:
  We need to support Skylake (SKL), Kabylake (KBL) and Broxton (BXT)
  graphics in xenial, but the kernel driver is not fresh enough for
  proper support.

  For the kernel the plan is to provide a separate driver module
  (i915_bpo) like for Skylake/Broadwell/Braswell in vivid. The drm/i915
  driver in 4.4 is not recent enough for SKL/KBL/BXT, so pulling the
  driver from current drm-intel-next branch would provide what'll end up
  in 4.6. The i915 drivers will be modified so that only i915_bpo loads
  on SKL/KBL/BXT machines, and only there. The driver will get further
  updates along the way, and possibly also rebased to a later kernel
  release.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1540390/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548504] Packages available

2016-02-22 Thread Brad Figg
All builds are complete, packages in this bug can be copied to
-proposed.

Derivative packages from packages here can be worked on, the following tracking 
bugs were opened for them:
linux-ti-omap4 - bug 1548505
linux-armadaxp - bug 1548506

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: New => Confirmed

** Description changed:

  This bug is for tracking the 3.2.0-99.139 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 22. February 2016 20:57 UTC
- kernel-stable-phase:Prepare
- kernel-stable-phase-changed:Monday, 22. February 2016 20:57 UTC
+ kernel-stable-phase:CopyToProposed
+ kernel-stable-Prepare-package-end:Monday, 22. February 2016 21:04 UTC
+ kernel-stable-Promote-to-proposed-start:Monday, 22. February 2016 21:04 UTC
+ kernel-stable-phase-changed:Monday, 22. February 2016 21:04 UTC

** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1548504

Title:
  linux: 3.2.0-99.139 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Confirmed
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Precise:
  New

Bug description:
  This bug is for tracking the 3.2.0-99.139 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 22. February 2016 20:57 UTC
  kernel-stable-phase:CopyToProposed
  kernel-stable-Prepare-package-end:Monday, 22. February 2016 21:04 UTC
  kernel-stable-Promote-to-proposed-start:Monday, 22. February 2016 21:04 UTC
  kernel-stable-phase-changed:Monday, 22. February 2016 21:04 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548504/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1548506] Derivative package tracking bug

2016-02-22 Thread Brad Figg
This tracking bug was opened to be worked from linux-3.2.0-99.139 update
(bug 1548504)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1548506

Title:
  linux-armadaxp:  -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  New
Status in Kernel SRU Workflow prepare-package-meta series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow upload-to-ppa series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-armadaxp package in Ubuntu:
  New
Status in linux-armadaxp source package in Precise:
  New

Bug description:
  This bug is for tracking the  upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:02 UTC
  kernel-stable-phase:Prepare
  kernel-stable-phase-changed:Monday, 22. February 2016 21:02 UTC
  kernel-stable-master-bug:1548504

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548506/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1546320] Re: crash starting at kernel v3.13.0-72 in timer code

2016-02-22 Thread Brad Figg
** Changed in: linux (Ubuntu Trusty)
   Status: In Progress => Fix Committed

** Changed in: linux (Ubuntu Vivid)
   Status: In Progress => Fix Committed

** Also affects: linux-lts-utopic (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux-lts-utopic (Ubuntu Vivid)

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux-lts-utopic (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1546320

Title:
  crash starting at kernel v3.13.0-72  in timer code

Status in linux package in Ubuntu:
  Triaged
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Committed
Status in linux-lts-utopic source package in Trusty:
  Fix Committed
Status in linux source package in Vivid:
  Fix Committed

Bug description:
  Register %RAX is LIST_POISON2.

  [239837.578526] general protection fault:  [#1] SMP
  ...
  [239837.664031] CPU: 4 PID: 0 Comm: swapper/4 Not tainted 3.13.0-74-generic 
#118-Ubuntu
  [239837.672997] Hardware name: XX
  [239837.685506] task: 881028dc6000 ti: 881028dce000 task.ti: 
881028dce000
  [239837.694280] RIP: 0010:[] [] 
detach_if_pending+0x34/0xb0
  [239837.704179] RSP: 0018:88103fa03d10 EFLAGS: 00010002
  [239837.710425] RAX: dead00200200 RBX: a01be040 RCX: 
303e
  [239837.718778] RDX: 8810288906b8 RSI: 881028f6 RDI: 
a01be040
  [239837.727137] RBP: 88103fa03d30 R08: 0086 R09: 
881028f88000
  [239837.735505] R10: 0002 R11: 0005 R12: 
a01be040
  [239837.760360] R13: 881028f6 R14: 0001 R15: 
0001
  [239837.785862] FS: () GS:88103fa0() 
knlGS:
  [239837.812540] CS: 0010 DS:  ES:  CR0: 80050033
  [239837.827508] CR2: 033d4048 CR3: 01c0e000 CR4: 
001407e0
  [239837.852880] Stack:
  [239837.863639] a01be040  881028f6 
882025639a00
  [239837.889101] 88103fa03d60 81075766 0086 
a01be020
  [239837.914247] 88103fa03d98 0100 88103fa03d88 
81082369
  [239837.939532] Call Trace:
  [239837.950648] 
  [239837.952982]
  [239837.963021] [] del_timer+0x46/0x70
  [239837.974969] [] try_to_grab_pending+0xa9/0x160
  [239837.989674] [] mod_delayed_work_on+0x33/0x70
  [239838.003709] [] set_timeout+0x3a/0x40 [ib_addr]
  [239838.018469] [] netevent_callback+0x29/0x30 [ib_addr]
  [239838.033727] [] notifier_call_chain+0x4c/0x70
  [239838.047561] [] ? neigh_table_clear+0x120/0x120
  [239838.062010] [] atomic_notifier_call_chain+0x1a/0x20
  [239838.076485] [] call_netevent_notifiers+0x1b/0x20
  [239838.090371] [] neigh_timer_handler+0xc1/0x2c0
  [239838.104354] [] call_timer_fn+0x36/0x100
  [239838.117021] [] ? neigh_table_clear+0x120/0x120
  [239838.131002] [] run_timer_softirq+0x1ef/0x2f0
  [239838.143985] [] __do_softirq+0xec/0x2c0
  [239838.156386] [] irq_exit+0x105/0x110
  [239838.168325] [] smp_apic_timer_interrupt+0x45/0x60
  [239838.181501] [] apic_timer_interrupt+0x6d/0x80
  [239838.193978] 
  [239838.196317]
  [239838.203483] [] ? cpuidle_enter_state+0x52/0xc0
  [239838.214553] [] cpuidle_idle_call+0xb9/0x1f0
  [239838.226799] [] arch_cpu_idle+0xe/0x30
  [239838.238745] [] cpu_startup_entry+0xc5/0x290
  [239838.250792] [] start_secondary+0x21d/0x2d0
  [239838.263165] Code: 89 e5 41 56 41 89 d6 41 55 41 54 49 89 fc 53 48 8b 17 
48 85 d2 74 55 49 89 f5 0f 1f 44 00 00 49 8b 44 24 08 45 84 f6 48 89 42 08 <48> 
89 10 74 08 49 c7 04 24 00 00 00 00 41 f6 44 24 18 01 48 b8
  [239838.301935] RIP [] detach_if_pending+0x34/0xb0
  [239838.314036] RSP 

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1546320/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1536837] Re: Severe performance regression in Infiniband or IPoIB

2016-02-22 Thread Joseph Salisbury
** Changed in: linux (Ubuntu)
   Status: Incomplete => Triaged

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1536837

Title:
  Severe performance regression in Infiniband or IPoIB

Status in linux package in Ubuntu:
  Triaged

Bug description:
  When upgrading to the latest 4.4 test kernel from mainline
  development, all IPoIB links showed a severe performance regression as
  compared with kernel 4.2.  The bandwidth of each link dropped from
  around 3Gbps to around 3Mbps (3 orders of magnitude worse!); reverting
  to the 4.2 kernel immediately fixed this problem.

  The 4.3 kernel from Debian does not appear to suffer from this
  regression.  The regression shows up on both IB ports of the Mellanox
  MT25208 controller.  Other hardware has not been tested.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1536837/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1546177] Re: CVE-2016-2384

2016-02-22 Thread Brad Figg
** Changed in: linux (Ubuntu Precise)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Trusty)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Vivid)
   Status: New => Fix Committed

** Changed in: linux (Ubuntu Wily)
   Status: New => Fix Committed

** Changed in: linux-lts-utopic (Ubuntu Trusty)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1546177

Title:
  CVE-2016-2384

Status in linux package in Ubuntu:
  New
Status in linux-armadaxp package in Ubuntu:
  Invalid
Status in linux-ec2 package in Ubuntu:
  New
Status in linux-flo package in Ubuntu:
  New
Status in linux-fsl-imx51 package in Ubuntu:
  Invalid
Status in linux-goldfish package in Ubuntu:
  New
Status in linux-lts-backport-maverick package in Ubuntu:
  New
Status in linux-lts-backport-natty package in Ubuntu:
  New
Status in linux-lts-quantal package in Ubuntu:
  Invalid
Status in linux-lts-raring package in Ubuntu:
  Invalid
Status in linux-lts-saucy package in Ubuntu:
  Invalid
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-wily package in Ubuntu:
  Invalid
Status in linux-lts-xenial package in Ubuntu:
  Invalid
Status in linux-mako package in Ubuntu:
  New
Status in linux-manta package in Ubuntu:
  New
Status in linux-mvl-dove package in Ubuntu:
  New
Status in linux-raspi2 package in Ubuntu:
  New
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Committed
Status in linux-armadaxp source package in Precise:
  New
Status in linux-ec2 source package in Precise:
  New
Status in linux-flo source package in Precise:
  Invalid
Status in linux-fsl-imx51 source package in Precise:
  Invalid
Status in linux-goldfish source package in Precise:
  Invalid
Status in linux-lts-backport-maverick source package in Precise:
  New
Status in linux-lts-backport-natty source package in Precise:
  New
Status in linux-lts-quantal source package in Precise:
  Invalid
Status in linux-lts-raring source package in Precise:
  Invalid
Status in linux-lts-saucy source package in Precise:
  Invalid
Status in linux-lts-trusty source package in Precise:
  New
Status in linux-lts-utopic source package in Precise:
  Invalid
Status in linux-lts-vivid source package in Precise:
  Invalid
Status in linux-lts-wily source package in Precise:
  Invalid
Status in linux-lts-xenial source package in Precise:
  Invalid
Status in linux-mako source package in Precise:
  Invalid
Status in linux-manta source package in Precise:
  Invalid
Status in linux-mvl-dove source package in Precise:
  New
Status in linux-raspi2 source package in Precise:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  New
Status in linux source package in Trusty:
  Fix Committed
Status in linux-armadaxp source package in Trusty:
  Invalid
Status in linux-ec2 source package in Trusty:
  New
Status in linux-flo source package in Trusty:
  Invalid
Status in linux-fsl-imx51 source package in Trusty:
  Invalid
Status in linux-goldfish source package in Trusty:
  Invalid
Status in linux-lts-backport-maverick source package in Trusty:
  New
Status in linux-lts-backport-natty source package in Trusty:
  New
Status in linux-lts-quantal source package in Trusty:
  Invalid
Status in linux-lts-raring source package in Trusty:
  Invalid
Status in linux-lts-saucy source package in Trusty:
  Invalid
Status in linux-lts-trusty source package in Trusty:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Committed
Status in linux-lts-vivid source package in Trusty:
  New
Status in linux-lts-wily source package in Trusty:
  New
Status in linux-lts-xenial source package in Trusty:
  New
Status in linux-mako source package in Trusty:
  Invalid
Status in linux-manta source package in Trusty:
  Invalid
Status in linux-mvl-dove source package in Trusty:
  New
Status in linux-raspi2 source package in Trusty:
  Invalid
Status in linux-ti-omap4 source package in Trusty:
  Invalid
Status in linux source package in Vivid:
  Fix Committed
Status in linux-armadaxp source package in Vivid:
  New
Status in linux-ec2 source package in Vivid:
  New
Status in linux-flo source package in Vivid:
  New
Status in linux-fsl-imx51 source package in Vivid:
  New
Status in linux-goldfish source package in Vivid:
  New
Status in linux-lts-backport-maverick source package in Vivid:
  New
Status in linux-lts-backport-natty source package in Vivid:
  New
Status in linux-lts-quantal source package in Vivid:
  New
Status in linux-lts-raring source package in Vivid:
  New
Status in linux-lts-saucy source package in Vivid:
  New
Status in linux-lts-trusty source package in Vivid:
  New
Status in linux-lts-utopic source package in Vivid:
  New
Sta

[Kernel-packages] [Bug 1535150] Re: overlayfs over fuse should refuse copy_up of files if uid/gid not mapped

2016-02-22 Thread Ubuntu Foundations Team Bug Bot
** Tags added: patch

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1535150

Title:
  overlayfs over fuse should refuse copy_up of files if uid/gid not
  mapped

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Trusty:
  Fix Released
Status in linux source package in Vivid:
  Fix Released
Status in linux source package in Wily:
  Fix Released
Status in linux source package in Xenial:
  Confirmed

Bug description:
  On Ubuntu Wily it is possible to place an USERNS overlayfs mount over
  a fuse mount. The fuse filesystem may contain SUID binaries, but those
  cannot be executed due to nosuid mount options. But when touching such
  an SUID binary via overlayfs mount, this will trigger copy_up
  including all file attributes, thus creating a real SUID binary on the
  disk.

  Sequence:
  * Mount fuse filesystem exposing one world writable SUID binary
  * Create USERNS
  * Mount overlayfs on top of fuse
  * open the SUID binary RDWR in overlayfs, thus triggering copy_up

  Afterwards the SUID binary can be invoked to gain root privileges.

  For additional information, test tool see
  http://www.halfdog.net/Security/2016/OverlayfsOverFusePrivilegeEscalation/
  (InvitedOnly/3YD9ufze) and attached sharing policy.

  
  $ lsb_release -rd
  Description:Ubuntu 15.10
  Release:15.10

  $ apt-cache policy linux-image-4.2.0-23-generic
  linux-image-4.2.0-23-generic:
    Installed: 4.2.0-23.28
    Candidate: 4.2.0-23.28
    Version table:
   *** 4.2.0-23.28 0
  500 http://archive.ubuntu.com/ubuntu/ wily-updates/main amd64 Packages
  500 http://archive.ubuntu.com/ubuntu/ wily-security/main amd64 
Packages
  100 /var/lib/dpkg/status

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1535150/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540538] Re: linux: 3.2.0-99.139 -proposed tracker

2016-02-22 Thread Adam Conrad
** Changed in: linux (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540538

Title:
  linux: 3.2.0-99.139 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-lbm series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  In Progress
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-99.139 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 01. February 2016 19:16 UTC
  kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 04:03 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 04:03 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:01 UTC
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:00 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:00 UTC
  kernel-stable-Security-signoff-end:Friday, 05. February 2016 10:01 UTC
  kernel-stable-Verification-testing-end:Thursday, 18. February 2016 15:00 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. February 2016 15:00 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:17 UTC
  kernel-stable-phase-changed:Monday, 22. February 2016 19:17 UTC
  kernel-stable-Certification-testing-end:Monday, 22. February 2016 19:17 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540538/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540720] Re: linux-ti-omap4: 3.2.0-1477.100 -proposed tracker

2016-02-22 Thread Adam Conrad
** Changed in: kernel-sru-workflow/upload-to-ppa
   Status: New => Fix Released

** Changed in: linux-ti-omap4 (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1540720

Title:
  linux-ti-omap4: 3.2.0-1477.100 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  In Progress
Status in Kernel SRU Workflow promote-to-updates series:
  In Progress
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow upload-to-ppa series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-ti-omap4 package in Ubuntu:
  Invalid
Status in linux-ti-omap4 source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.2.0-1477.100 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:01 UTC
  kernel-stable-master-bug:1540538
  kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 16:01 UTC
  kernel-stable-Prepare-package-end:Wednesday, 03. February 2016 00:01 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 03. February 2016 00:01 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC
  kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:04 UTC
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC
  proposed-announcement-sent:True
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC
  kernel-stable-Security-signoff-end:Friday, 05. February 2016 21:00 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. February 2016 16:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Monday, 22. February 2016 19:24 UTC
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:24 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540720/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540792] Re: linux-lts-vivid: 3.19.0-50.56~14.04.1 -proposed tracker

2016-02-22 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad 
(adconrad)

** Changed in: linux-lts-vivid (Ubuntu Trusty)
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/verification-testing
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.launchpad.net/bugs/1540792

Title:
  linux-lts-vivid: 3.19.0-50.56~14.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-lts-vivid package in Ubuntu:
  Invalid
Status in linux-lts-vivid source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.19.0-50.56~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 08:00 UTC
  kernel-stable-master-bug:1540576
  kernel-stable-Prepare-package-end:Thursday, 04. February 2016 21:02 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 04. February 2016 21:02 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 05. February 2016 05:02 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Friday, 05. February 2016 07:01 UTC
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 07:01 UTC
  kernel-stable-Certification-testing-start:Friday, 05. February 2016 07:01 UTC
  kernel-stable-Security-signoff-start:Friday, 05. February 2016 07:01 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 07:01 UTC
  kernel-stable-Security-signoff-end:Friday, 05. February 2016 21:01 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. February 2016 01:01 UTC
  kernel-stable-Certification-testing-end:Thursday, 18. February 2016 03:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540792/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540752] Re: linux-lts-trusty: 3.13.0-78.122~precise1 -proposed tracker

2016-02-22 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad 
(adconrad)

** Changed in: linux-lts-trusty (Ubuntu Precise)
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/verification-testing
   Status: In Progress => Fix Released

** Changed in: linux-lts-trusty (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1540752

Title:
  linux-lts-trusty: 3.13.0-78.122~precise1 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-lts-trusty package in Ubuntu:
  Invalid
Status in linux-lts-trusty source package in Precise:
  Fix Released

Bug description:
  This bug is for tracking the 3.13.0-78.122~precise1 upload package.
  This bug will contain status and testing results related to that
  upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 06:02 UTC
  kernel-stable-master-bug:1540559
  kernel-stable-Prepare-package-end:Wednesday, 03. February 2016 04:02 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 03. February 2016 04:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:04 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Friday, 05. February 2016 00:05 UTC
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:05 UTC
  kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:05 UTC
  kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:05 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:05 UTC
  kernel-stable-Security-signoff-end:Friday, 05. February 2016 21:01 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. February 2016 16:02 UTC
  kernel-stable-Certification-testing-end:Monday, 22. February 2016 04:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540752/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540576] Re: linux: 3.19.0-50.56 -proposed tracker

2016-02-22 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad 
(adconrad)

** Changed in: linux (Ubuntu)
   Status: New => Invalid

** Changed in: kernel-sru-workflow/automated-testing
   Status: Incomplete => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540576

Title:
  linux: 3.19.0-50.56 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Vivid:
  Fix Released

Bug description:
  This bug is for tracking the 3.19.0-50.56 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 01. February 2016 20:42 UTC
  kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 08:02 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 08:02 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:02 UTC
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:03 UTC
  kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:03 UTC
  kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:03 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:03 UTC
  kernel-stable-Security-signoff-end:Friday, 05. February 2016 11:00 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. February 2016 01:00 UTC
  kernel-stable-phase:Testing
  kernel-stable-phase-changed:Thursday, 18. February 2016 16:01 UTC
  kernel-stable-Verification-testing-end:Thursday, 18. February 2016 16:01 UTC
  kernel-stable-Certification-testing-end:Friday, 19. February 2016 10:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540576/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1541076] Re: linux-lts-utopic: 3.16.0-61.81~14.04.1 -proposed tracker

2016-02-22 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/automated-testing
   Status: Incomplete => Fix Released

** Changed in: kernel-sru-workflow/verification-testing
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1541076

Title:
  linux-lts-utopic: 3.16.0-61.81~14.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-lts-utopic package in Ubuntu:
  Invalid
Status in linux-lts-utopic source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.16.0-61.81~14.04.1 upload package. This
  bug will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 19:14 UTC
  kernel-stable-Prepare-package-end:Thursday, 04. February 2016 23:03 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 04. February 2016 23:03 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 05. February 2016 13:25 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Friday, 05. February 2016 15:03 UTC
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 15:03 UTC
  kernel-stable-Certification-testing-start:Friday, 05. February 2016 15:03 UTC
  kernel-stable-Security-signoff-start:Friday, 05. February 2016 15:03 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 15:03 UTC
  kernel-stable-Security-signoff-end:Friday, 05. February 2016 23:02 UTC
  kernel-stable-Certification-testing-end:Tuesday, 16. February 2016 10:02 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1541076/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1542188] Re: Adaptive keyboard breaks with sleep/resume

2016-02-22 Thread Dean Henrichsmeyer
This kernel (88867e3d0b7eea256c1cd432b0a3c7a21e8edf07) exhibits the bug.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1542188

Title:
  Adaptive keyboard breaks with sleep/resume

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Xenial:
  In Progress

Bug description:
  I have a Lenovo X1 Carbon Gen2. It as the adaptive row of keys that
  change from function keys to volume, etc when you toggle the function
  key. It's always worked fine but with this kernel, after a few
  sleep/resumes, the entire row will go black. If I reboot it will
  return to normal. dmesg throws a bunch of these..

  [29190.142959] thinkpad_acpi: EC reports that Thermal Table has changed
  [30910.489925] thinkpad_acpi: unknown possible thermal alarm or keyboard 
event received
  [30910.489931] thinkpad_acpi: unhandled HKEY event 0x60c0
  [30910.489932] thinkpad_acpi: please report the conditions when this event 
happened to ibm-acpi-de...@lists.sourceforge.net
  [30911.439252] thinkpad_acpi: unknown possible thermal alarm or keyboard 
event received
  [30911.439258] thinkpad_acpi: unhandled HKEY event 0x60c0

  though I'm not sure it's the cause of the failure.

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-2-generic 4.4.0-2.16
  ProcVersionSignature: Ubuntu 4.4.0-2.16-generic 4.4.0
  Uname: Linux 4.4.0-2-generic x86_64
  NonfreeKernelModules: zfs zunicode zcommon znvpair zavl
  ApportVersion: 2.19.4-0ubuntu2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  dean   3316 F pulseaudio
   /dev/snd/controlC0:  dean   3316 F pulseaudio
  CurrentDesktop: Unity
  Date: Fri Feb  5 08:34:46 2016
  HibernationDevice: RESUME=UUID=5ce0185d-e833-4337-9655-9be9fcac3654
  InstallationDate: Installed on 2015-11-03 (93 days ago)
  InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021)
  MachineType: LENOVO 20A7002QUS
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-4.4.0-2-generic 
root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-4.4.0-2-generic N/A
   linux-backports-modules-4.4.0-2-generic  N/A
   linux-firmware   1.155
  SourcePackage: linux
  UpgradeStatus: Upgraded to xenial on 2015-12-07 (59 days ago)
  dmi.bios.date: 11/04/2015
  dmi.bios.vendor: LENOVO
  dmi.bios.version: GRET46WW (1.23 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 20A7002QUS
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0E50510 Pro
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Not Available
  dmi.modalias: 
dmi:bvnLENOVO:bvrGRET46WW(1.23):bd11/04/2015:svnLENOVO:pn20A7002QUS:pvrThinkPadX1Carbon2nd:rvnLENOVO:rn20A7002QUS:rvrSDK0E50510Pro:cvnLENOVO:ct10:cvrNotAvailable:
  dmi.product.name: 20A7002QUS
  dmi.product.version: ThinkPad X1 Carbon 2nd
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1542188/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1543167] Re: linux: 4.2.0-29.34 -proposed tracker

2016-02-22 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-security
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1543167

Title:
  linux: 4.2.0-29.34 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Wily:
  Fix Released

Bug description:
  This bug is for tracking the 4.2.0-29.34 upload package. This bug will
  contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 08. February 2016 15:19 UTC
  kernel-stable-Prepare-package-end:Tuesday, 09. February 2016 10:45 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 09. February 2016 10:45 UTC
  kernel-stable-Promote-to-proposed-end:Tuesday, 09. February 2016 18:34 UTC
  kernel-stable-Verification-testing-start:Tuesday, 09. February 2016 20:01 UTC
  kernel-stable-Certification-testing-start:Tuesday, 09. February 2016 20:01 UTC
  kernel-stable-Security-signoff-start:Tuesday, 09. February 2016 20:02 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Tuesday, 09. February 2016 20:01 UTC
  kernel-stable-Security-signoff-end:Wednesday, 10. February 2016 16:01 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. February 2016 01:01 UTC
  kernel-stable-Verification-testing-end:Thursday, 18. February 2016 16:02 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 10:01 UTC
  kernel-stable-phase-changed:Monday, 22. February 2016 10:01 UTC
  kernel-stable-Certification-testing-end:Monday, 22. February 2016 10:01 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1543167/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1540559] Re: linux: 3.13.0-78.122 -proposed tracker

2016-02-22 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: New => Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad 
(adconrad)

** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

** Changed in: kernel-sru-workflow/verification-testing
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540559

Title:
  linux: 3.13.0-78.122 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Released

Bug description:
  This bug is for tracking the 3.13.0-78.122 upload package. This bug
  will contain status and testing results related to that upload.

  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Monday, 01. February 2016 20:01 UTC
  kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 06:03 UTC
  kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 06:03 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:02 UTC
  kernel-stable-phase:Verification & Testing
  kernel-stable-phase-changed:Friday, 05. February 2016 00:02 UTC
  kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:02 UTC
  kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:02 UTC
  kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:02 UTC
  proposed-announcement-sent:True
  kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:02 UTC
  kernel-stable-Security-signoff-end:Friday, 05. February 2016 11:00 UTC
  kernel-stable-Certification-testing-end:Wednesday, 17. February 2016 10:00 UTC
  kernel-stable-Regression-testing-end:Thursday, 18. February 2016 01:00 UTC

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540559/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


  1   2   3   4   5   6   >