[Kernel-packages] [Bug 1474538] Re: nouveau driver fills syslog when running xscreensaver (molecule)
As per https://bugs.freedesktop.org/show_bug.cgi?id=91373#c10. ** No longer affects: linux (Ubuntu) ** Project changed: nouveau => linux (Ubuntu) ** Changed in: linux (Ubuntu) Importance: Medium => Undecided ** Changed in: linux (Ubuntu) Status: Confirmed => New ** Changed in: linux (Ubuntu) Remote watch: freedesktop.org Bugzilla #91373 => None ** Changed in: linux (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1474538 Title: nouveau driver fills syslog when running xscreensaver (molecule) Status in linux package in Ubuntu: Invalid Bug description: nouveau fills /var/log/kern.log and /var/log/syslog with _very_ frequent messages when the molecule xscreensaver is running. This is a big problem as it prevents me from letting my machine do anything overnight (with the screenlock on). I haven't tested other screensavers and don't appear to get messages otherwise. Here is an excerpt: 8< CUT HERE 8<= $ tail -n 3000 kern.log.1 | head -n 50 Jul 10 18:02:35 dioo-XPS kernel: [114893.357149] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.406261] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.406269] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.420442] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.420447] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.479210] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.479217] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.568349] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.568356] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.622806] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.622813] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.637217] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.637221] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.695836] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.695843] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.784309] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.784316] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.838180] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.838187] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.853754] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.853759] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.913521] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.913528] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.977242] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.977249] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114894.068780] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114894.068788] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114894.122599] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114894.122606] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114894.137025] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114894.
[Kernel-packages] [Bug 1474538] [NEW] nouveau driver fills syslog when running xscreensaver (molecule)
You have been subscribed to a public bug: nouveau fills /var/log/kern.log and /var/log/syslog with _very_ frequent messages when the molecule xscreensaver is running. This is a big problem as it prevents me from letting my machine do anything overnight (with the screenlock on). I haven't tested other screensavers and don't appear to get messages otherwise. Here is an excerpt: 8< CUT HERE 8<= $ tail -n 3000 kern.log.1 | head -n 50 Jul 10 18:02:35 dioo-XPS kernel: [114893.357149] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.406261] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.406269] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.420442] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.420447] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.479210] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.479217] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.568349] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.568356] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.622806] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.622813] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.637217] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.637221] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.695836] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.695843] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.784309] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.784316] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.838180] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.838187] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.853754] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.853759] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.913521] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.913528] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114893.977242] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114893.977249] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114894.068780] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114894.068788] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114894.122599] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114894.122606] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114894.137025] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114894.137030] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:35 dioo-XPS kernel: [114894.195675] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:35 dioo-XPS kernel: [114894.195682] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:36 dioo-XPS kernel: [114894.284069] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:36 dioo-XPS kernel: [114894.284078] nouveau E[ PFIFO][:01:00.0] PBDMA0: ch 2 [Xorg[16558]] subc 5 mthd 0x data 0x906e Jul 10 18:02:36 dioo-XPS kernel: [114894.339830] nouveau E[ PFIFO][:01:00.0] PBDMA0: LBREQ Jul 10 18:02:36 dioo-XPS kernel: [114894.339837] nouveau E[ PF
[Kernel-packages] [Bug 1543980] Re: Kernel 3.13.0-77 crashes (can be triggered by Samba)
https://forge.univention.org/bugzilla/show_bug.cgi?id=40558#c11 Indicates that commit 51cd3ed4c41b3895869925b99dd95a704bd2c91a unix: avoid use-after-free in ep_remove_wait_queue should be reverted in order to avoid this regression. Can we please get some progress on this? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1543980 Title: Kernel 3.13.0-77 crashes (can be triggered by Samba) Status in linux package in Ubuntu: Triaged Status in linux source package in Trusty: Triaged Bug description: Ubuntu 14.04.3 LTS After updating to kernel 3.13.0-77 system crashes. First, network dies, then the whole system. There are several kernel crashes in the logs. --- snip --- ProblemType: KernelOops Annotation: Your system might become unstable now and might need to be restarted. Date: Wed Feb 10 09:20:35 2016 Failure: oops OopsText: BUG: soft lockup - CPU#1 stuck for 23s! [smbd:5908] --- snap --- Followed by kernel stack traces. After some investigation, it turned out that the crash can be triggered by Samba. It's easily reproducible by running the following commands in the Samba master branch: ./configure.developer TDB_NO_FSYNC=1 make -j test FAIL_IMMEDIATELY=1 SOCKET_WRAPPER_KEEP_PCAP=1 TESTS="samba3.raw.composite" Downgrading to kernel 3.13.0-76 solves this problem. Please let me know if we can provide more information or help testing. Thanks! To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1543980/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548519] Re: linux: 3.13.0-80.124 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => Fix Released ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Brad Figg (brad-figg) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548519 Title: linux: 3.13.0-80.124 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: New Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: New Status in linux source package in Trusty: New Bug description: This bug is for tracking the 3.13.0-80.124 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:49 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 22. February 2016 21:49 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548519/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548548] Re: linux: 3.19.0-52.58 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => Fix Released ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Brad Figg (brad-figg) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548548 Title: linux: 3.19.0-52.58 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: New Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: New Status in linux source package in Vivid: New Bug description: This bug is for tracking the 3.19.0-52.58 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 23:08 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 22. February 2016 23:08 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548548/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548579] Re: linux: 4.2.0-31.36 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-signed Status: New => Fix Released ** Changed in: kernel-sru-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) => Brad Figg (brad-figg) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548579 Title: linux: 4.2.0-31.36 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: New Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: New Status in linux source package in Wily: New Bug description: This bug is for tracking the 4.2.0-31.36 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 23. February 2016 01:25 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Tuesday, 23. February 2016 01:25 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548579/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548506] Re: linux-armadaxp: 3.2.0-1663.87 -proposed tracker
** Description changed: This bug is for tracking the 3.2.0-1663.87 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:02 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 22. February 2016 21:02 UTC kernel-stable-master-bug:1548504 + kernel-stable-Certification-testing-end:Tuesday, 23. February 2016 06:01 UTC + kernel-stable-Security-signoff-end:Tuesday, 23. February 2016 06:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1548506 Title: linux-armadaxp: 3.2.0-1663.87 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: New Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-armadaxp source package in Precise: In Progress Bug description: This bug is for tracking the 3.2.0-1663.87 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:02 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 22. February 2016 21:02 UTC kernel-stable-master-bug:1548504 kernel-stable-Certification-testing-end:Tuesday, 23. February 2016 06:01 UTC kernel-stable-Security-signoff-end:Tuesday, 23. February 2016 06:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548506/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548504] Re: linux: 3.2.0-100.140 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package Status: New => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548504 Title: linux: 3.2.0-100.140 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: New Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: New Status in linux source package in Precise: New Bug description: This bug is for tracking the 3.2.0-100.140 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:49 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 22. February 2016 21:49 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548504/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] ProcInterrupts.txt
apport information ** Attachment added: "ProcInterrupts.txt" https://bugs.launchpad.net/bugs/1548587/+attachment/4578629/+files/ProcInterrupts.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Confirmed Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] WifiSyslog.txt
apport information ** Attachment added: "WifiSyslog.txt" https://bugs.launchpad.net/bugs/1548587/+attachment/4578632/+files/WifiSyslog.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Confirmed Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] ProcCpuinfo.txt
apport information ** Attachment added: "ProcCpuinfo.txt" https://bugs.launchpad.net/bugs/1548587/+attachment/4578627/+files/ProcCpuinfo.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Confirmed Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] ProcEnviron.txt
apport information ** Attachment added: "ProcEnviron.txt" https://bugs.launchpad.net/bugs/1548587/+attachment/4578628/+files/ProcEnviron.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Confirmed Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] UdevDb.txt
apport information ** Attachment added: "UdevDb.txt" https://bugs.launchpad.net/bugs/1548587/+attachment/4578631/+files/UdevDb.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Confirmed Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] AlsaInfo.txt
apport information ** Attachment added: "AlsaInfo.txt" https://bugs.launchpad.net/bugs/1548587/+attachment/4578622/+files/AlsaInfo.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Confirmed Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] apport information
ApportVersion: 2.19.1-0ubuntu5 Architecture: amd64 AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/by-path', '/dev/snd/midiC0D0', '/dev/snd/pcmC0D1p', '/dev/snd/pcmC0D0c', '/dev/snd/pcmC0D0p', '/dev/snd/controlC0', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1: DistroRelease: Ubuntu 15.10 HibernationDevice: RESUME=UUID=5743f1a7-f815-48de-b708-d0c8bf6b9254 InstallationDate: Installed on 2016-02-23 (0 days ago) InstallationMedia: Xubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021) IwConfig: eno1636 no wireless extensions. lono wireless extensions. Lsusb: Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 002 Device 003: ID 0e0f:0002 VMware, Inc. Virtual USB Hub Bus 002 Device 002: ID 0e0f:0003 VMware, Inc. Virtual Mouse Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub MachineType: VMware, Inc. VMware Virtual Platform Package: linux (not installed) ProcFB: 0 svgadrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.2.0-30-generic root=UUID=a39ebdaf-d4fe-45b9-9b64-4f80499affe8 ro find_preseed=/preseed.cfg auto noprompt priority=critical locale=en_US quiet ProcVersionSignature: Ubuntu 4.2.0-30.35-generic 4.2.8-ckt3 PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: linux-restricted-modules-4.2.0-30-generic N/A linux-backports-modules-4.2.0-30-generic N/A linux-firmware1.149.3 RfKill: Tags: wily UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev' Uname: Linux 4.2.0-30-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 07/02/2015 dmi.bios.vendor: Phoenix Technologies LTD dmi.bios.version: 6.00 dmi.board.name: 440BX Desktop Reference Platform dmi.board.vendor: Intel Corporation dmi.board.version: None dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 1 dmi.chassis.vendor: No Enclosure dmi.chassis.version: N/A dmi.modalias: dmi:bvnPhoenixTechnologiesLTD:bvr6.00:bd07/02/2015:svnVMware,Inc.:pnVMwareVirtualPlatform:pvrNone:rvnIntelCorporation:rn440BXDesktopReferencePlatform:rvrNone:cvnNoEnclosure:ct1:cvrN/A: dmi.product.name: VMware Virtual Platform dmi.product.version: None dmi.sys.vendor: VMware, Inc. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Confirmed Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] CRDA.txt
apport information ** Attachment added: "CRDA.txt" https://bugs.launchpad.net/bugs/1548587/+attachment/4578623/+files/CRDA.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Confirmed Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] ProcModules.txt
apport information ** Attachment added: "ProcModules.txt" https://bugs.launchpad.net/bugs/1548587/+attachment/4578630/+files/ProcModules.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Confirmed Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] CurrentDmesg.txt
apport information ** Attachment added: "CurrentDmesg.txt" https://bugs.launchpad.net/bugs/1548587/+attachment/4578624/+files/CurrentDmesg.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Confirmed Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] Lspci.txt
apport information ** Attachment added: "Lspci.txt" https://bugs.launchpad.net/bugs/1548587/+attachment/4578626/+files/Lspci.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Confirmed Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] JournalErrors.txt
apport information ** Attachment added: "JournalErrors.txt" https://bugs.launchpad.net/bugs/1548587/+attachment/4578625/+files/JournalErrors.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Confirmed Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] Re: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30
I have exactly the same issue. ** Tags added: apport-collected wily -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Confirmed Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] Re: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30
I'm experiencing the same issue with and without vmware-tools and also with and without open-vm-tools. Tried to enable/disable 3D accelaration - no success. Kubuntu 15.10 with the latest kernel (4.2.0-30) shows just black screen after reboot. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Confirmed Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548506] Re: linux-armadaxp: 3.2.0-1663.87 -proposed tracker
** Summary changed: - linux-armadaxp: -proposed tracker + linux-armadaxp: 3.2.0-1663.87 -proposed tracker ** Description changed: - This bug is for tracking the upload package. This - bug will contain status and testing results related to that upload. + This bug is for tracking the 3.2.0-1663.87 upload package. This bug will + contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:02 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 22. February 2016 21:02 UTC kernel-stable-master-bug:1548504 ** Changed in: kernel-sru-workflow Assignee: (unassigned) => Ike Panhc (ikepanhc) ** Changed in: kernel-sru-workflow/regression-testing Assignee: Canonical Kernel Team (canonical-kernel-team) => Ike Panhc (ikepanhc) ** Changed in: kernel-sru-workflow/verification-testing Assignee: Canonical Hardware Enablement ARM Kernel (canonical-hwe-arm-kernel) => Ike Panhc (ikepanhc) ** Changed in: linux-armadaxp (Ubuntu) Status: New => Invalid ** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => In Progress ** Changed in: linux-armadaxp (Ubuntu Precise) Assignee: (unassigned) => Ike Panhc (ikepanhc) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1548506 Title: linux-armadaxp: 3.2.0-1663.87 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: New Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-armadaxp source package in Precise: In Progress Bug description: This bug is for tracking the 3.2.0-1663.87 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:02 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 22. February 2016 21:02 UTC kernel-stable-master-bug:1548504 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548506/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] Re: Ubuntu 15.10 VM won't show UI after upgrading to 4.2.0-30
After some testing, I noticed that it installs and updates to 4.2.0-30 and works correctly in VirtualBox 5.0.14 with the VirtualBox extensions installed. I am now suspecting that the issue is due to some conflict with the VMWare tools. ** Summary changed: - Ubuntu 15.10 VM won't show UI after upgrading to 4.2.0-30 + Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VMWare guest won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Confirmed Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1451277] Re: Extremely high IOWait and processes hungs after utopic->vivid upgrade with Iomega Zip drive (IDE)
Sergio Callegari, please boot into a live environment via http://cdimage.ubuntu.com/daily-live/current/ and execute the following command only once, as it will automatically gather debugging information, in a terminal: apport-collect 1451277 ** Changed in: linux (Ubuntu) Status: Confirmed => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1451277 Title: Extremely high IOWait and processes hungs after utopic->vivid upgrade with Iomega Zip drive (IDE) Status in linux package in Ubuntu: Incomplete Bug description: On Kubuntu, 64 bit AMD Phenom2 machine with 4 cores, and old (Geoforge 7025) Nvidia graphics. Using LVM. Machine also has a 2 disk software raid (mirroring). The machine was working fine before the upgrade, now it is almost impossible to use it... I see Wait in Top always above 60%; in dmesg after a few minutes that the machine is up even if the machine does nothing. I see hung processes (typically vgs, but occasionally also others). LVM related commands (e.g. lvdisplay) almost always hung at the terminal. I also see in ps some kernel workers almost constantly stuck in D state. Also, the machine takes ages to shutdown. Issue remains there also if I disable X (switch off the X login manager, sddm) and check at the console. Sorry I cannot provide details with apport, but the machine has been switched off and I will not be able to take it up again before a few days from now. The symptom I am observing may also be a sign of failing hardware, so please leave the bug as unconfirmed until I make some more tests or someone provide details on similar issues. In the meantime I would like to see if others are experiencing a similar serious issue. Is there anything specific that has changed between utopic and vivid, I should look into? To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1451277/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548504] Re: linux: 3.2.0-100.140 -proposed tracker
** Description changed: This bug is for tracking the 3.2.0-100.140 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow - kernel-stable-Prepare-package-start:Monday, 22. February 2016 20:57 UTC - kernel-stable-phase-changed:Monday, 22. February 2016 21:04 UTC + kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:49 UTC + kernel-stable-phase:Prepare + kernel-stable-phase-changed:Monday, 22. February 2016 21:49 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548504 Title: linux: 3.2.0-100.140 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-lbm series: New Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: New Status in linux source package in Precise: New Bug description: This bug is for tracking the 3.2.0-100.140 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:49 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 22. February 2016 21:49 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548504/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1058725] Re: XHCI (USB 3.0) kernel Module Prevents Hibernate
Sergio Callegari, in order to allow additional upstream developers to examine the issue, at your earliest convenience, could you please test the latest upstream kernel available from http://kernel.ubuntu.com/~kernel-ppa/mainline/?C=N;O=D ? Please keep in mind the following: 1) The one to test is at the very top line at the top of the page (not the daily folder). 2) The release names are irrelevant. 3) The folder time stamps aren't indicative of when the kernel actually was released upstream. 4) Install instructions are available at https://wiki.ubuntu.com/Kernel/MainlineBuilds . If testing on your main install would be inconvenient, one may: 1) Install Ubuntu to a different partition and then test this there. 2) Backup, or clone the primary install. If the latest kernel did not allow you to test to the issue (ex. you couldn't boot into the OS) please make a comment in your report about this, and continue to test the next most recent kernel version until you can test to the issue. Once you've tested the upstream kernel, please comment on which kernel version specifically you tested. If this issue is fixed in the mainline kernel, please add the following tags by clicking on the yellow circle with a black pencil icon, next to the word Tags, located at the bottom of the report description: kernel-fixed-upstream kernel-fixed-upstream-X.Y-rcZ Where X, and Y are the first two numbers of the kernel version, and Z is the release candidate number if it exists. If the mainline kernel does not fix the issue, please add the following tags: kernel-bug-exists-upstream kernel-bug-exists-upstream-X.Y-rcZ Please note, an error to install the kernel does not fit the criteria of kernel-bug-exists-upstream. Once testing of the latest upstream kernel is complete, please mark this report's Status as Confirmed. Please let us know your results. Thank you for your understanding. ** Tags added: latest-bios-2.10 ** Changed in: linux (Ubuntu) Status: Confirmed => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1058725 Title: XHCI (USB 3.0) kernel Module Prevents Hibernate Status in linux package in Ubuntu: Incomplete Bug description: On a system with an ASROCK N68S motherboard and a VIA VL800/801 PCI USB3 adapter, the system, which is a 64 bit kubuntu precise with a 3.2 kernel cannot hibernate. When you ask the system to hibernate, the OS does everything it should and also appears to shut down the system (the fans stop). However, after half a second the system restarts by itself, resuming from the hibernation. If you unbind the xhci_hcd driver from the usb card on the pci bus, before hibernation then the system hibernates and resumes in the correct way. So, the very same hack proposed in bug report 522998 at comment 61 seem to (hackishly) fixes the issue. IMHO this looks like a bug in the xhci driver. Please report upstream. --- AlsaVersion: Advanced Linux Sound Architecture Driver Version 1.0.24. AplayDevices: List of PLAYBACK Hardware Devices card 0: NVidia [HDA NVidia], device 0: ALC662 rev1 Analog [ALC662 rev1 Analog] Subdevices: 1/1 Subdevice #0: subdevice #0 ApportVersion: 2.0.1-0ubuntu13 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: callegar 7430 F pulseaudio Card0.Amixer.info: Card hw:0 'NVidia'/'HDA NVidia at 0xfbef8000 irq 22' Mixer name : 'Realtek ALC662 rev1' Components : 'HDA:10ec0662,18493662,00100101' Controls : 31 Simple ctrls : 18 DistroRelease: Ubuntu 12.04 HibernationDevice: RESUME=UUID=c50b4249-43ed-49ef-a3d8-ec7aa9718265 IwConfig: lono wireless extensions. usb0 no wireless extensions. eth0 no wireless extensions. MachineType: To Be Filled By O.E.M. To Be Filled By O.E.M. NonfreeKernelModules: nvidia Package: linux (not installed) ProcFB: 0 VESA VGA ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.2.0-31-generic root=/dev/mapper/DISK00-root ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 3.2.0-31.50-generic 3.2.28 RelatedPackageVersions: linux-restricted-modules-3.2.0-31-generic N/A linux-backports-modules-3.2.0-31-generic N/A linux-firmware1.79.1 RfKill: 0: hci0: Bluetooth Soft blocked: no Hard blocked: no Tags: precise Uname: Linux 3.2.0-31-generic x86_64 UpgradeStatus: Upgraded to precise on 2012-05-09 (143 days ago) UserGroups: adm admin cdrom dialout fax floppy fuse lpadmin plugdev sambashare scanner staff sudo syslog vboxusers WpaSupplicantLog: dmi.bios.date: 04/21/2010 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: P2.10 dmi.board.name: N68-S dmi.board.vendor: ASRock dmi.chassis.asset.tag: To Be Filled By O.E.M. dmi.chassis.type: 3 dmi.chas
[Kernel-packages] [Bug 1445664] Re: kernel 3.16 breaks POSIX extended ACLs over NFS
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1445664 Title: kernel 3.16 breaks POSIX extended ACLs over NFS Status in linux package in Ubuntu: Expired Bug description: I have a development environment that uses Vagrant with NFS shares to a Trusty development VM from OS X laptops. After the upgrade to the HWE kernel 3.16, installing Ruby gems into the NFS mount inside the VM failed because of install(1) failing with permission errors. Debugging revealed that it's trying to set POSIX extended ACLs using setxattr(); On 3.13 this operation failed with EOPNOTSUPP (the server does not support extended ACLs), but on 3.16 it fails with EPERM, even if the NFS mount is explicitly mounted with "noacl". Debugging with ftrace and source diving suggests that kernel 3.16 refactored the POSIX extended ACL code so that before the call even hits the NFS layer, it passes through a generic permission-check layer. It appears that that layer is not aware of NFS UID remapping, and so fails the call regardless of what the server would have done. A simple test case is `install -c -m 0755 `, which will succeed on 3.13 and fail on 3.16. The broken system is: vagrant@packer-vmware-iso:~$ lsb_release -a; uname -a No LSB modules are available. Distributor ID: Ubuntu Description:Ubuntu 14.04.2 LTS Release:14.04 Codename: trusty Linux packer-vmware-iso 3.16.0-34-generic #47~14.04.1-Ubuntu SMP Fri Apr 10 17:49:16 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux --- AlsaDevices: total 0 crw-rw 1 root audio 116, 1 Dec 22 14:39 seq crw-rw 1 root audio 116, 33 Dec 22 14:39 timer AplayDevices: Error: [Errno 2] No such file or directory ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 ArecordDevices: Error: [Errno 2] No such file or directory AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1: CRDA: Error: [Errno 2] No such file or directory DistroRelease: Ubuntu 14.04 HibernationDevice: RESUME=/dev/mapper/packer--vmware--iso--vg-swap_1 InstallationDate: Installed on 2015-09-02 (111 days ago) InstallationMedia: Ubuntu-Server 14.04.1 LTS "Trusty Tahr" - Release amd64 (20140722.3) IwConfig: Error: [Errno 2] No such file or directory Lsusb: Error: command ['lsusb'] failed with exit code 1: unable to initialize libusb: -99 MachineType: VMware, Inc. VMware Virtual Platform Package: linux (not installed) PciMultimedia: ProcFB: 0 svgadrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.16.0-57-generic root=/dev/mapper/packer--vmware--iso--vg-root ro quiet ProcVersionSignature: Ubuntu 3.16.0-57.77~14.04.1-generic 3.16.7-ckt20 RelatedPackageVersions: linux-restricted-modules-3.16.0-57-generic N/A linux-backports-modules-3.16.0-57-generic N/A linux-firmware 1.127.15 RfKill: Error: [Errno 2] No such file or directory Tags: trusty Uname: Linux 3.16.0-57-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip docker lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 05/20/2014 dmi.bios.vendor: Phoenix Technologies LTD dmi.bios.version: 6.00 dmi.board.name: 440BX Desktop Reference Platform dmi.board.vendor: Intel Corporation dmi.board.version: None dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 1 dmi.chassis.vendor: No Enclosure dmi.chassis.version: N/A dmi.modalias: dmi:bvnPhoenixTechnologiesLTD:bvr6.00:bd05/20/2014:svnVMware,Inc.:pnVMwareVirtualPlatform:pvrNone:rvnIntelCorporation:rn440BXDesktopReferencePlatform:rvrNone:cvnNoEnclosure:ct1:cvrN/A: dmi.product.name: VMware Virtual Platform dmi.product.version: None dmi.sys.vendor: VMware, Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1445664/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1526692] Re: Ubuntu 15.10 - btrfs - Kernel Panic on btrfs balance
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1526692 Title: Ubuntu 15.10 - btrfs - Kernel Panic on btrfs balance Status in linux package in Ubuntu: Expired Bug description: [ 360.220144] INFO: task btrfs:2938 blocked for more than 120 seconds. [ 360.220152] Tainted: G OE 4.2.0-19-generic #23-Ubuntu [ 360.220153] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 360.220155] btrfs D 88087fc16640 0 2938 2937 0x [ 360.220161] 880833b87c78 0086 81c13500 880835525940 [ 360.220163] 0246 880833b88000 88085b9c0c70 88085b9c0cb0 [ 360.220165] 880855758980 8807f2c97300 880833b87c98 817ec197 [ 360.220167] Call Trace: [ 360.220179] [] schedule+0x37/0x80 [ 360.220221] [] btrfs_cancel_balance+0x127/0x180 [btrfs] [ 360.220225] [] ? wake_atomic_t_function+0x60/0x60 [ 360.220238] [] btrfs_ioctl+0xd55/0x2760 [btrfs] [ 360.220243] [] ? lru_cache_add_active_or_unevictable+0x2b/0xa0 [ 360.220247] [] ? handle_mm_fault+0xc77/0x17e0 [ 360.220249] [] ? __vma_link_rb+0xfd/0x110 [ 360.220251] [] ? vma_link+0xb9/0xc0 [ 360.220254] [] do_vfs_ioctl+0x295/0x480 [ 360.220256] [] SyS_ioctl+0x79/0x90 [ 360.220259] [] entry_SYSCALL_64_fastpath+0x16/0x75 [ 360.220264] INFO: task btrfs:3002 blocked for more than 120 seconds. [ 360.220266] Tainted: G OE 4.2.0-19-generic #23-Ubuntu [ 360.220266] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 360.220267] btrfs D 88087fd56640 0 3002 3001 0x [ 360.220270] 8807e340bc78 0086 88085bf1cc80 880857fa9980 [ 360.220272] 0246 8807e340c000 88085b9c0c70 88085b9c0cb0 [ 360.220274] 880855758980 88085a181700 8807e340bc98 817ec197 [ 360.220276] Call Trace: [ 360.220278] [] schedule+0x37/0x80 [ 360.220289] [] btrfs_pause_balance+0x92/0x120 [btrfs] [ 360.220291] [] ? wake_atomic_t_function+0x60/0x60 [ 360.220303] [] btrfs_ioctl+0x1a3e/0x2760 [btrfs] [ 360.220306] [] ? lru_cache_add_active_or_unevictable+0x2b/0xa0 [ 360.220308] [] ? handle_mm_fault+0xc77/0x17e0 [ 360.220310] [] ? __vma_link_rb+0xfd/0x110 [ 360.220311] [] ? vma_link+0xb9/0xc0 [ 360.220313] [] do_vfs_ioctl+0x295/0x480 [ 360.220315] [] SyS_ioctl+0x79/0x90 [ 360.220317] [] entry_SYSCALL_64_fastpath+0x16/0x75 [ 480.220139] INFO: task btrfs:2938 blocked for more than 120 seconds. [ 480.220148] Tainted: G OE 4.2.0-19-generic #23-Ubuntu [ 480.220149] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 480.220152] btrfs D 88087fc16640 0 2938 2937 0x [ 480.220159] 880833b87c78 0086 81c13500 880835525940 [ 480.220162] 0246 880833b88000 88085b9c0c70 88085b9c0cb0 [ 480.220166] 880855758980 8807f2c97300 880833b87c98 817ec197 [ 480.220169] Call Trace: [ 480.220180] [] schedule+0x37/0x80 [ 480.220217] [] btrfs_cancel_balance+0x127/0x180 [btrfs] [ 480.220222] [] ? wake_atomic_t_function+0x60/0x60 [ 480.220234] [] btrfs_ioctl+0xd55/0x2760 [btrfs] [ 480.220238] [] ? lru_cache_add_active_or_unevictable+0x2b/0xa0 [ 480.220241] [] ? handle_mm_fault+0xc77/0x17e0 [ 480.220243] [] ? __vma_link_rb+0xfd/0x110 [ 480.220245] [] ? vma_link+0xb9/0xc0 [ 480.220248] [] do_vfs_ioctl+0x295/0x480 [ 480.220250] [] SyS_ioctl+0x79/0x90 [ 480.220253] [] entry_SYSCALL_64_fastpath+0x16/0x75 [ 480.220257] INFO: task btrfs:3002 blocked for more than 120 seconds. [ 480.220258] Tainted: G OE 4.2.0-19-generic #23-Ubuntu [ 480.220259] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 480.220260] btrfs D 88087fd56640 0 3002 3001 0x [ 480.220263] 8807e340bc78 0086 88085bf1cc80 880857fa9980 [ 480.220265] 0246 8807e340c000 88085b9c0c70 88085b9c0cb0 [ 480.220266] 880855758980 88085a181700 8807e340bc98 817ec197 [ 480.220268] Call Trace: [ 480.220270] [] schedule+0x37/0x80 [ 480.220282] [] btrfs_pause_balance+0x92/0x120 [btrfs] [ 480.220283] [] ? wake_atomic_t_function+0x60/0x60 [ 480.220294] [] btrfs_ioctl+0x1a3e/0x2760 [btrfs] [ 480.220297] [] ? lru_cache_add_active_or_unevictable+0x2b/0xa0 [ 480.220299] [] ? handle_mm_fault+0xc77/0x17e0 [ 480.220301] [] ? __vma_link_rb+0xfd/0x110 [ 480.2
[Kernel-packages] [Bug 1548504] Re: linux: 3.2.0-100.140 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-meta Status: New => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548504 Title: linux: 3.2.0-100.140 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-lbm series: New Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: New Status in linux source package in Precise: New Bug description: This bug is for tracking the 3.2.0-100.140 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 20:57 UTC kernel-stable-phase-changed:Monday, 22. February 2016 21:04 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548504/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1543683] Re: Fails to detect (second) display
I built all the remaining test kernels but the last one. The test kernels are available from: http://kernel.ubuntu.com/~jsalisbury/lp1543683 The first kernel is in the d2e08c0f3 directory. There are also two sub- directories: bad.cfe01a5e good.7f4c628 Test the kernel in the sub-directory depending if the d2e08c0f3 one is good or bad. Each of those sub-directories also have two sub- directories. Again, a good one and bad one, so test the kernel in the sub-directory depending if the prior kernel was good or bad. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1543683 Title: Fails to detect (second) display Status in linux package in Ubuntu: Confirmed Status in linux source package in Xenial: Confirmed Bug description: With the upgrade to 4.4.0-2, only one of the two displays in the machine is detected. With 4.3.0-7 (and earlier) both are detected. In this case, both display connectors are on the MB. ProblemType: Bug DistroRelease: Ubuntu 16.04 Package: linux-image-extra-4.4.0-2-generic 4.4.0-2.16 ProcVersionSignature: Ubuntu 4.4.0-2.16-generic 4.4.0 Uname: Linux 4.4.0-2-generic x86_64 ApportVersion: 2.19.4-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: lamont 3923 F pulseaudio CurrentDesktop: Unity Date: Tue Feb 9 10:22:38 2016 HibernationDevice: RESUME=UUID=5d145c55-633f-4197-a4c9-0b165b6dbeb3 InstallationDate: Installed on 2014-09-22 (505 days ago) InstallationMedia: Ubuntu-Server 14.04 LTS "Trusty Tahr" - Release amd64 (20140416.2) MachineType: Shuttle Inc SG41 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-2-generic root=UUID=ba0ea95b-cde0-42ba-b06e-9fd6ca006881 ro nomdmonddf nomdmonisw RelatedPackageVersions: linux-restricted-modules-4.4.0-2-generic N/A linux-backports-modules-4.4.0-2-generic N/A linux-firmware 1.155 RfKill: 0: hci0: Bluetooth Soft blocked: no Hard blocked: no SourcePackage: linux UpgradeStatus: Upgraded to xenial on 2014-11-14 (452 days ago) dmi.bios.date: 02/10/2011 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 080015 dmi.board.asset.tag: To Be Filled By O.E.M. dmi.board.name: FG41 dmi.board.vendor: Shuttle Inc dmi.board.version: V20 dmi.chassis.asset.tag: To Be Filled By O.E.M. dmi.chassis.type: 3 dmi.chassis.vendor: Shuttle Inc dmi.chassis.version: To Be Filled By O.E.M. dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr080015:bd02/10/2011:svnShuttleInc:pnSG41:pvrV20:rvnShuttleInc:rnFG41:rvrV20:cvnShuttleInc:ct3:cvrToBeFilledByO.E.M.: dmi.product.name: SG41 dmi.product.version: V20 dmi.sys.vendor: Shuttle Inc To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1543683/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] Re: Ubuntu 15.10 VM won't show UI after upgrading to 4.2.0-30
I am unable to install the apport-collect package as it's impossible to get into tty1. In addition, booting to recovery mode and dropping into shell only gave me a read-only filesystem. ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VM won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Confirmed Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] Missing required logs.
This bug is missing log files that will aid in diagnosing the problem. >From a terminal window please run: apport-collect 1548587 and then change the status of the bug to 'Confirmed'. If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'. This change has been made by an automated script, maintained by the Ubuntu Kernel Team. ** Changed in: linux (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VM won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Incomplete Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548587] [NEW] Ubuntu 15.10 VM won't show UI after upgrading to 4.2.0-30
Public bug reported: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. ** Affects: linux (Ubuntu) Importance: Undecided Status: Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548587 Title: Ubuntu 15.10 VM won't show UI after upgrading to 4.2.0-30 Status in linux package in Ubuntu: Incomplete Bug description: I installed a fresh copy of Ubuntu 15.10 64-bit as a guest VM in VMWare Workstation 12.1.0. After installation, I am able to log into the system. I then ran the updater application to install the latest updates. After installing the updates and restarting, the system no longer shows any UI after booting. I am now faced with a black screen and a dash that does not blink. The system also does not respond to any inputs. I was able to get back into my system by holding shift to show the GRUB menu and boot using the 4.2.16 kernel. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548587/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1542188] Re: Adaptive keyboard breaks with sleep/resume
This one (510ae0c994cb38fcf5033ad69eb8103552e335e8) has the bug. Thanks. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1542188 Title: Adaptive keyboard breaks with sleep/resume Status in linux package in Ubuntu: In Progress Status in linux source package in Xenial: In Progress Bug description: I have a Lenovo X1 Carbon Gen2. It as the adaptive row of keys that change from function keys to volume, etc when you toggle the function key. It's always worked fine but with this kernel, after a few sleep/resumes, the entire row will go black. If I reboot it will return to normal. dmesg throws a bunch of these.. [29190.142959] thinkpad_acpi: EC reports that Thermal Table has changed [30910.489925] thinkpad_acpi: unknown possible thermal alarm or keyboard event received [30910.489931] thinkpad_acpi: unhandled HKEY event 0x60c0 [30910.489932] thinkpad_acpi: please report the conditions when this event happened to ibm-acpi-de...@lists.sourceforge.net [30911.439252] thinkpad_acpi: unknown possible thermal alarm or keyboard event received [30911.439258] thinkpad_acpi: unhandled HKEY event 0x60c0 though I'm not sure it's the cause of the failure. ProblemType: Bug DistroRelease: Ubuntu 16.04 Package: linux-image-4.4.0-2-generic 4.4.0-2.16 ProcVersionSignature: Ubuntu 4.4.0-2.16-generic 4.4.0 Uname: Linux 4.4.0-2-generic x86_64 NonfreeKernelModules: zfs zunicode zcommon znvpair zavl ApportVersion: 2.19.4-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: dean 3316 F pulseaudio /dev/snd/controlC0: dean 3316 F pulseaudio CurrentDesktop: Unity Date: Fri Feb 5 08:34:46 2016 HibernationDevice: RESUME=UUID=5ce0185d-e833-4337-9655-9be9fcac3654 InstallationDate: Installed on 2015-11-03 (93 days ago) InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021) MachineType: LENOVO 20A7002QUS ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-4.4.0-2-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-4.4.0-2-generic N/A linux-backports-modules-4.4.0-2-generic N/A linux-firmware 1.155 SourcePackage: linux UpgradeStatus: Upgraded to xenial on 2015-12-07 (59 days ago) dmi.bios.date: 11/04/2015 dmi.bios.vendor: LENOVO dmi.bios.version: GRET46WW (1.23 ) dmi.board.asset.tag: Not Available dmi.board.name: 20A7002QUS dmi.board.vendor: LENOVO dmi.board.version: SDK0E50510 Pro dmi.chassis.asset.tag: No Asset Information dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Not Available dmi.modalias: dmi:bvnLENOVO:bvrGRET46WW(1.23):bd11/04/2015:svnLENOVO:pn20A7002QUS:pvrThinkPadX1Carbon2nd:rvnLENOVO:rn20A7002QUS:rvrSDK0E50510Pro:cvnLENOVO:ct10:cvrNotAvailable: dmi.product.name: 20A7002QUS dmi.product.version: ThinkPad X1 Carbon 2nd dmi.sys.vendor: LENOVO To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1542188/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1546145] Re: Surelock-GA2:kernel panic @ cxl_configure_adapter+0x418/0x8b0
** Changed in: linux (Ubuntu Wily) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1546145 Title: Surelock-GA2:kernel panic @ cxl_configure_adapter+0x418/0x8b0 Status in linux package in Ubuntu: Fix Committed Status in linux source package in Wily: Fix Committed Status in linux source package in Xenial: Fix Committed Bug description: == Comment: #18 - Andrew Donnellan - 2016-02-15 20:17:01 == Canonical kernel team - please apply 1bc74f1ccd457832dc515fc1febe6655985fdcd2 from the powerpc-fixes tree. https://git.kernel.org/cgit/linux/kernel/git/powerpc/linux.git/commit/?h=fixes&id=1bc74f1ccd457832dc515fc1febe6655985fdcd2 powerpc/powernv: Fix stale PE primary bus When PCI bus is unplugged during full hotplug for EEH recovery, the platform PE instance (struct pnv_ioda_pe) isn't released and it dereferences the stale PCI bus that has been released. It leads to kernel crash when referring to the stale PCI bus. This fixes the issue by correcting the PE's primary bus when it's oneline at plugging time, in pnv_pci_dma_bus_setup() which is to be called by pcibios_fixup_bus(). To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1546145/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1529624] Re: Lenovo E50-80 inverted microphone not detected properly
** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Vivid) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1529624 Title: Lenovo E50-80 inverted microphone not detected properly Status in linux package in Ubuntu: Fix Released Status in linux source package in Vivid: Fix Committed Status in linux source package in Wily: Fix Released Bug description: System: Lenovo E50-80 with Ubuntu 15.10. Tested with both kernel 4.2.0-22-generic from official repos and 4.4.0-040400rc6-generic from Mainline Kernel repo. Alsa information: http://www.alsa- project.org/db/?f=3088f82a0cf977855f92af9db8ad406c04f71efa Internal microphone does not pick up sound by default. When I mute one channel, it works (this is not a good workaround since some application, such as Facebook Messenger, unmute both channels and set them to the same level automatically). Adding model=inv-dmic to snd-hda-intel module options does not change a thing. Hope that helps, tell me if you need more info. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1529624/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection
** Changed in: linux (Ubuntu Wily) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1540586 Title: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection Status in linux package in Ubuntu: Fix Committed Status in linux source package in Trusty: Fix Committed Status in linux source package in Wily: Fix Committed Status in linux source package in Xenial: Fix Committed Bug description: This bug is a continuation to bug ID 1506521 - the refreshed hv_set_ifconfig script in Python3. On a Wily system with the new script, doing an IP injection does change the IP on the VM, however the netmask value is not parsed and gets ignored. It gets set to a default of 255.0.0.0. Kernel: 4.2.0-23-generic Attaching generated ifcfg-eth0 file that is used by this script. syslog doesn't record any related events to the netmask, and also manually executing hv_set_ifconfig against the generated ifcfg works with no errors. The interfaces files gets modified to this: iface eth0 inet static address 10.123.120.199 gateway 10.123.119.1 dns-nameservers anything_changed #End of hv_set_ifconfig stanzas To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1533009] Re: arm64: "unsupported RELA relocation"
** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: gcc-5 (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: gcc-5 (Ubuntu Wily) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Wily) Status: New => Fix Committed ** Changed in: linux (Ubuntu Vivid) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1533009 Title: arm64: "unsupported RELA relocation" Status in Linaro GCC: Unknown Status in Linux: Unknown Status in gcc-5 package in Ubuntu: Invalid Status in linux package in Ubuntu: Fix Released Status in gcc-5 source package in Trusty: New Status in linux source package in Trusty: Fix Committed Status in gcc-5 source package in Vivid: New Status in linux source package in Vivid: Fix Committed Status in gcc-5 source package in Wily: New Status in linux source package in Wily: Fix Committed Status in gcc-5 source package in Xenial: Invalid Status in linux source package in Xenial: Fix Released Bug description: linux-image-4.3.0-5-generic 4.3.0-5.16 arm64 fails to load modules (and therefore boot). It emits messages like the following for each attempted module load: [2.156817] module libahci: unsupported RELA relocation: 275 This is reminiscent of LP: #1502946 - except that fix appears to still be in-tact. What has changed, however, is the build environment. If I rebuild the same kernel source in a wily chroot, it boots fine. Marking "Confirmed" because Paulo Pisatti reported this to me, and I reproduced. To manage notifications about this bug go to: https://bugs.launchpad.net/gcc-linaro/+bug/1533009/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1505564] Re: Soft lockup with "block nbdX: Attempted send on closed socket" spam
** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Vivid) Status: New => Fix Committed ** Changed in: linux (Ubuntu Wily) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1505564 Title: Soft lockup with "block nbdX: Attempted send on closed socket" spam Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Committed Status in linux source package in Vivid: Fix Committed Status in linux source package in Wily: Fix Committed Bug description: Some of our nova compute hosts regularly freeze, sometimes for a few hours, with kern.log getting spammed with: block nbdX: Attempted send on closed socket and a few "CPU soft lockup" messages (see attached log). This clears up when the queue gets cleared, eg : block nbdX: queue cleared trusty hosts with kernel version 3.19.0-30-generic. --- AlsaDevices: total 0 crw-rw 1 root audio 116, 1 Nov 24 12:23 seq crw-rw 1 root audio 116, 33 Nov 24 12:23 timer AplayDevices: Error: [Errno 2] No such file or directory ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 ArecordDevices: Error: [Errno 2] No such file or directory AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1: DistroRelease: Ubuntu 14.04 IwConfig: Error: [Errno 2] No such file or directory MachineType: HP ProLiant DL385 G7 Package: linux (not installed) PciMultimedia: ProcEnviron: TERM=screen-256color PATH=(custom, no user) LANG=en_US.UTF-8 SHELL=/bin/bash ProcFB: 0 radeondrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-36-generic root=UUID=13289ac9-8dc9-4feb-b6bd-ca7db66b21d6 ro console=tty0 console=ttyS1,38400 nosplash crashkernel=384M-:512M nox2apic intremap=off ProcVersionSignature: Ubuntu 3.19.0-36.41~14.04.1hf00090138v20151122b1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-36-generic N/A linux-backports-modules-3.19.0-36-generic N/A linux-firmware 1.127.18 RfKill: Error: [Errno 2] No such file or directory Tags: trusty uec-images Uname: Linux 3.19.0-36-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: _MarkForUpload: True dmi.bios.date: 02/02/2014 dmi.bios.vendor: HP dmi.bios.version: A18 dmi.chassis.type: 23 dmi.chassis.vendor: HP dmi.modalias: dmi:bvnHP:bvrA18:bd02/02/2014:svnHP:pnProLiantDL385G7:pvr:cvnHP:ct23:cvr: dmi.product.name: ProLiant DL385 G7 dmi.sys.vendor: HP To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1505564/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1533461] Re: No headset microphone is detected in sound settings on a Dell laptop
** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Vivid) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1533461 Title: No headset microphone is detected in sound settings on a Dell laptop Status in HWE Next: Fix Released Status in linux package in Ubuntu: Fix Released Status in linux source package in Vivid: Fix Committed Status in linux source package in Wily: Fix Released Bug description: Steps: 1. Plug in a headset to the headset audio jack 2. Go to Sound settings -> Input tab and check if the headset mic is listed This is bug is for tracking purposes only, please do not triage. To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1533461/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1522949] Re: Bluetooth doesn't work on 0930:0225 Toshiba Corporation
** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Vivid) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1522949 Title: Bluetooth doesn't work on 0930:0225 Toshiba Corporation Status in linux package in Ubuntu: Fix Released Status in linux source package in Vivid: Fix Committed Status in linux source package in Wily: Fix Released Bug description: I have not been able to get bluetooth running in Ubuntu 14.04, 14.10, or 15.10 on my Toshiba laptop. Bluetooth does work under Windows. There is no bluetooth icon. The bluetooth manager says "Bluetooth is disabled" whether I set it to On or Off. rfkill list: 0: Toshiba Bluetooth: Bluetooth Soft blocked: no Hard blocked: no [...] The modified kernel is because I installed btusb-lp1506615-dkms from https://launchpad.net/~hanipouspilot/+archive/ubuntu/bluetooth . No change in behavior. ProblemType: Bug DistroRelease: Ubuntu 15.10 Package: linux-image-4.2.0-16-generic 4.2.0-16.19 [modified: boot/vmlinuz-4.2.0-16-generic] ProcVersionSignature: Ubuntu 4.2.0-16.19-generic 4.2.3 Uname: Linux 4.2.0-16-generic x86_64 NonfreeKernelModules: wl ApportVersion: 2.19.1-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: josiah 1874 F pulseaudio /dev/snd/controlC1: josiah 1874 F pulseaudio CurrentDesktop: Unity Date: Fri Dec 4 14:45:28 2015 HibernationDevice: RESUME=UUID=0bcbd4ab-9f94-44d7-857f-717f4e7c9481 InstallationDate: Installed on 2015-12-03 (1 days ago) InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021) MachineType: TOSHIBA Satellite L75-B ProcEnviron: LANGUAGE=en_US PATH=(custom, no user) XDG_RUNTIME_DIR= LANG=en_US.UTF-8 SHELL=/bin/bash ProcFB: 0 inteldrmfb ProcKernelCmdLine: \boot\vmlinuz-4.2.0-16-generic.efi.signed root=UUID=edea9167-ead7-4da4-81ac-fa65520b3e91 ro quiet splash vt.handoff=7 initrd=boot\initrd.img-4.2.0-16-generic RelatedPackageVersions: linux-restricted-modules-4.2.0-16-generic N/A linux-backports-modules-4.2.0-16-generic N/A linux-firmware1.149 SourcePackage: linux UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev' UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 11/03/2014 dmi.bios.vendor: Insyde Corp. dmi.bios.version: 1.60 dmi.board.name: Portable PC dmi.board.vendor: TOSHIBA dmi.board.version: MP dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 10 dmi.chassis.vendor: OEM Chassis Manufacturer dmi.chassis.version: OEM Chassis Version dmi.modalias: dmi:bvnInsydeCorp.:bvr1.60:bd11/03/2014:svnTOSHIBA:pnSatelliteL75-B:pvrPSKRLU-01400M:rvnTOSHIBA:rnPortablePC:rvrMP:cvnOEMChassisManufacturer:ct10:cvrOEMChassisVersion: dmi.product.name: Satellite L75-B dmi.product.version: PSKRLU-01400M dmi.sys.vendor: TOSHIBA To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522949/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1535513] Re: Enable suspend function for i2c-hid device in Vivid
** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Vivid) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1535513 Title: Enable suspend function for i2c-hid device in Vivid Status in HWE Next: Fix Committed Status in HWE Next vivid series: Fix Committed Status in linux package in Ubuntu: Triaged Status in linux source package in Vivid: Fix Committed Bug description: [Impact] On some platforms the touchpad relies on pinctrl devices to provide GPIO interrupt, but in 3.19.0 pinctrl-cherryview doesn't support suspend well and will lose the config after suspend/resume, then touchpad can't be used. Also, there is a racing condition in i2c-hid module which makes touchpad unusable when waking up. [Fix] This fix has two parts. First part is to enable the suspend/resume function in pinctrl-cherryview: commit 9eb457b547cc731bc2fc251bd79891a60c64fc3e Refs: [HEAD] Author: Mika Westerberg Date: Thu Dec 4 12:32:50 2014 +0200 pinctrl: cherryview: Save and restore pin configs over system sleep The second part is to eliminate the racing condition in i2c-hid: commit 9a327405014f4ef4cdad67a0686db82b9f23c62c Author: Mika Westerberg Date: Mon Dec 21 15:26:31 2015 +0200 HID: i2c-hid: Prevent sending reports from racing with device reset To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1535513/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548579] [NEW] linux: 4.2.0-31.36 -proposed tracker
Public bug reported: This bug is for tracking the 4.2.0-31.36 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 23. February 2016 01:25 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Tuesday, 23. February 2016 01:25 UTC ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Medium Status: New ** Affects: linux (Ubuntu Wily) Importance: Medium Status: New ** Tags: block-proposed block-proposed-wily kernel-release-tracking-bug wily ** Tags added: kernel-release-tracking-bug ** Tags added: block-proposed ** Tags added: block-proposed-wily ** Also affects: linux (Ubuntu Wily) Importance: Undecided Status: New ** Tags added: wily ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-signed Importance: Undecided => Medium ** Changed in: kernel-sr
[Kernel-packages] [Bug 1533043] Re: AUFS can hang up; Please update to v20160111
Thank you for releasing the new kernel packages! -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1533043 Title: AUFS can hang up; Please update to v20160111 Status in linux package in Ubuntu: In Progress Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux source package in Trusty: Fix Released Status in linux-lts-utopic source package in Trusty: Fix Released Status in linux source package in Vivid: Fix Released Status in linux-lts-utopic source package in Vivid: Invalid Status in linux source package in Wily: Fix Released Status in linux-lts-utopic source package in Wily: Invalid Status in linux source package in Xenial: In Progress Status in linux-lts-utopic source package in Xenial: Invalid Bug description: AUFS can hang up (more precisely, produces unkillable processes) with some kernels that contain the commit 296291cdd1629c308114504b850dc343eabc278. - 14.04LTS: http://kernel.ubuntu.com/git/ubuntu/ubuntu-trusty.git/commit/?id=b8702f3cf9c06914476fb3206039131c2c3d8450 - 15.04: http://kernel.ubuntu.com/git/ubuntu/ubuntu-vivid.git/commit/?id=6b08592b8acc677d5b9bb7986343fdd6e0ad3303 - 15.10: http://kernel.ubuntu.com/git/ubuntu/ubuntu-wily.git/commit/?id=4d291df30fb7a94d13c6d38addf8d85d38f0111b Many docker users have been experiencing this issue: https://github.com/docker/docker/issues/18180 The issue has been fixed since AUFS v20160111: http://permalink.gmane.org/gmane.linux.file-systems.aufs.user/5345 So I suggest updating AUFS to v20160111. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1533043/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1512884] Re: hv driver in -lbm package not used
** Branch linked: lp:ubuntu/precise-security/linux-backports- modules-3.2.0 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1512884 Title: hv driver in -lbm package not used Status in linux package in Ubuntu: Invalid Status in linux-backports-modules-3.2.0 package in Ubuntu: Invalid Status in linux source package in Precise: Fix Committed Status in linux-backports-modules-3.2.0 source package in Precise: Fix Released Bug description: The driver in the linux-backports-modules-3.2.0 package is not being used and is currently unmaintained. It should be disabled, as the in- kernel version seems to be preferred. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1512884/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548558] [NEW] Unable to install dracut and initramfs-tools together
Public bug reported: In 15.10, dracut and initramfs-tools cannot coexist which makes it hard to regenerate the initramfs. root@builder:/# apt-get install dracut initramfs-tools Reading package lists... Done Building dependency tree Reading state information... Done initramfs-tools is already the newest version. initramfs-tools set to manually installed. Some packages could not be installed. This may mean that you have requested an impossible situation or if you are using the unstable distribution that some required packages have not yet been created or been moved out of Incoming. The following information may help to resolve the situation: The following packages have unmet dependencies: dracut : Conflicts: initramfs-tools but 0.120ubuntu6 is to be installed initramfs-tools : Conflicts: linux-initramfs-tool E: Unable to correct problems, you have held broken packages. >From https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1109029: "Just in case someone is interested: I've built an ppa that allows installing draucut next to initramfs: https://launchpad.net/~morty/+archive/ubuntu/dracut-release And yes, they do conflict as they both want to build the init.rd. And initramfs-tools wins, because i comes after d. I fixed that using dpkg- divert." ** Affects: dracut (Ubuntu) Importance: Undecided Status: New ** Package changed: linux (Ubuntu) => dracut (Ubuntu) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548558 Title: Unable to install dracut and initramfs-tools together Status in dracut package in Ubuntu: New Bug description: In 15.10, dracut and initramfs-tools cannot coexist which makes it hard to regenerate the initramfs. root@builder:/# apt-get install dracut initramfs-tools Reading package lists... Done Building dependency tree Reading state information... Done initramfs-tools is already the newest version. initramfs-tools set to manually installed. Some packages could not be installed. This may mean that you have requested an impossible situation or if you are using the unstable distribution that some required packages have not yet been created or been moved out of Incoming. The following information may help to resolve the situation: The following packages have unmet dependencies: dracut : Conflicts: initramfs-tools but 0.120ubuntu6 is to be installed initramfs-tools : Conflicts: linux-initramfs-tool E: Unable to correct problems, you have held broken packages. From https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1109029: "Just in case someone is interested: I've built an ppa that allows installing draucut next to initramfs: https://launchpad.net/~morty/+archive/ubuntu/dracut-release And yes, they do conflict as they both want to build the init.rd. And initramfs-tools wins, because i comes after d. I fixed that using dpkg-divert." To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dracut/+bug/1548558/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1436940] Re: Qualcomm Atheros QCA6164 802.11ac Wireless Network Adapter [168c:0041] is not supported
Bradford Bonanno I didn't have a 4.2 kernel installed when I created that dkms deb package and that is why it doesn't build You will likely have to use the backports, install firmware from atondwal github site and set the skip_otp parameter -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1436940 Title: Qualcomm Atheros QCA6164 802.11ac Wireless Network Adapter [168c:0041] is not supported Status in linux package in Ubuntu: Confirmed Status in linux-firmware package in Ubuntu: Confirmed Status in linux source package in Vivid: Confirmed Status in linux source package in Wily: Confirmed Bug description: This card remains unsupported out-of-the-box by the ath10k_pci kernel module. Currently in https://github.com/kvalo/ath10k-firmware/, there exists a folder for the QCA6174, but not for the QCA6164. It appears that this card uses the same "firmware-5.bin" file as the QCA6174 [168c:003c], but it requires a different "board.bin" file. --- HOW TO GET THIS CARD TO WORK: I'm not certain, but I believe you need to using at least kernel version 4.2 for this to work. Get the latest firmware from https://github.com/kvalo/ath10k- firmware/archive/master.zip Unzip and copy the ath10k folder to /lib/firmware/ath10k. Download the two files at: https://github.com/atondwal/ath10k-firmware/tree/master/ath10k/QCA6164/hw2.1 Put these files in /lib/firmware/ath10k/QCA6174/hw2.1. Note that the numbers DO NOT MATCH (QCA6164 vs QCA6174). Create a file named /etc/modprobe.d/ath10k.conf with the following line: "options ath10k_core skip_otp=y" Reboot and modprobe ath10k_pci. Do "lshw -C network"; "ip link show" or "rfkill list" to see if you got your card working. --- The atheros wireless device (168c:0041) isn't supported by the ath10k_pci kernel driver. Found in several laptop models: Lenovo Z70 Lenovo G50-45 Lenovo G50-80 Lenovo Edge 15 Lenovo Yoga 3 11 Lenovo Flex 3-1470 Lenovo U31-70 Samsung ATIV Book 9 NP930X2K ProblemType: BugDistroRelease: Ubuntu 15.04 Package: linux-image-3.19.0-9-generic 3.19.0-9.9 ProcVersionSignature: Ubuntu 3.19.0-9.9-generic 3.19.1 Uname: Linux 3.19.0-9-generic x86_64 ApportVersion: 2.16.2-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: nicholas 1695 F pulseaudio /dev/snd/controlC1: nicholas 1695 F pulseaudio CurrentDesktop: Unity Date: Thu Mar 26 09:47:16 2015 HibernationDevice: RESUME=UUID=5b068cd8-e60a-49b9-a88e-1581bb6b3dc1 InstallationDate: Installed on 2015-03-25 (1 days ago) InstallationMedia: Ubuntu 14.10 "Utopic Unicorn" - Release amd64 (20141022.1) IwConfig: eth0 no wireless extensions. lono wireless extensions. Lsusb: Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 001 Device 004: ID 0cf3:e300 Atheros Communications, Inc. Bus 001 Device 003: ID 5986:0652 Acer, Inc Bus 001 Device 002: ID 0bda:0129 Realtek Semiconductor Corp. RTS5129 Card Reader Controller Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub MachineType: LENOVO 80E5 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-9-generic root=UUID=e52867c5-0b50-42fb-8288-f30765f926c5 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.19.0-9-generic N/A linux-backports-modules-3.19.0-9-generic N/A linux-firmware1.143SourcePackage: linux UpgradeStatus: Upgraded to vivid on 2015-03-26 (0 days ago) dmi.bios.date: 06/20/2014 dmi.bios.vendor: LENOVO dmi.bios.version: B0CN69WW dmi.board.asset.tag: NO Asset Tag dmi.board.name: Lenovo G50-80 dmi.board.vendor: LENOVO dmi.board.version: 31900058 WIN dmi.chassis.asset.tag: NO Asset Tag dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Lenovo G50-80 dmi.modalias: dmi:bvnLENOVO:bvrB0CN69WW:bd06/20/2014:svnLENOVO:pn80E5:pvrLenovoG50-80:rvnLENOVO:rnLenovoG50-80:rvr31900058WIN:cvnLENOVO:ct10:cvrLenovoG50-80: dmi.product.name: 80E5 dmi.product.version: Lenovo G50-80 dmi.sys.vendor: LENOVO To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1436940/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1542188] Re: Adaptive keyboard breaks with sleep/resume
I built the next test kernel, up to the following commit: 510ae0c994cb38fcf5033ad69eb8103552e335e8 The test kernel can be downloaded from: http://kernel.ubuntu.com/~jsalisbury/lp1542188 Can you test that kernel and report back if it has the bug or not? I will build the next test kernel based on your test results. Thanks in advance -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1542188 Title: Adaptive keyboard breaks with sleep/resume Status in linux package in Ubuntu: In Progress Status in linux source package in Xenial: In Progress Bug description: I have a Lenovo X1 Carbon Gen2. It as the adaptive row of keys that change from function keys to volume, etc when you toggle the function key. It's always worked fine but with this kernel, after a few sleep/resumes, the entire row will go black. If I reboot it will return to normal. dmesg throws a bunch of these.. [29190.142959] thinkpad_acpi: EC reports that Thermal Table has changed [30910.489925] thinkpad_acpi: unknown possible thermal alarm or keyboard event received [30910.489931] thinkpad_acpi: unhandled HKEY event 0x60c0 [30910.489932] thinkpad_acpi: please report the conditions when this event happened to ibm-acpi-de...@lists.sourceforge.net [30911.439252] thinkpad_acpi: unknown possible thermal alarm or keyboard event received [30911.439258] thinkpad_acpi: unhandled HKEY event 0x60c0 though I'm not sure it's the cause of the failure. ProblemType: Bug DistroRelease: Ubuntu 16.04 Package: linux-image-4.4.0-2-generic 4.4.0-2.16 ProcVersionSignature: Ubuntu 4.4.0-2.16-generic 4.4.0 Uname: Linux 4.4.0-2-generic x86_64 NonfreeKernelModules: zfs zunicode zcommon znvpair zavl ApportVersion: 2.19.4-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: dean 3316 F pulseaudio /dev/snd/controlC0: dean 3316 F pulseaudio CurrentDesktop: Unity Date: Fri Feb 5 08:34:46 2016 HibernationDevice: RESUME=UUID=5ce0185d-e833-4337-9655-9be9fcac3654 InstallationDate: Installed on 2015-11-03 (93 days ago) InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021) MachineType: LENOVO 20A7002QUS ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-4.4.0-2-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-4.4.0-2-generic N/A linux-backports-modules-4.4.0-2-generic N/A linux-firmware 1.155 SourcePackage: linux UpgradeStatus: Upgraded to xenial on 2015-12-07 (59 days ago) dmi.bios.date: 11/04/2015 dmi.bios.vendor: LENOVO dmi.bios.version: GRET46WW (1.23 ) dmi.board.asset.tag: Not Available dmi.board.name: 20A7002QUS dmi.board.vendor: LENOVO dmi.board.version: SDK0E50510 Pro dmi.chassis.asset.tag: No Asset Information dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Not Available dmi.modalias: dmi:bvnLENOVO:bvrGRET46WW(1.23):bd11/04/2015:svnLENOVO:pn20A7002QUS:pvrThinkPadX1Carbon2nd:rvnLENOVO:rn20A7002QUS:rvrSDK0E50510Pro:cvnLENOVO:ct10:cvrNotAvailable: dmi.product.name: 20A7002QUS dmi.product.version: ThinkPad X1 Carbon 2nd dmi.sys.vendor: LENOVO To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1542188/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1547619] Re: Intermittent screen blinking with 4k external mini display port with 4.4 kernels
I built a 4.4.0-0.3 kernel which was based off of upstream 4.4-rc4. This kernel can be downloaded from: http://kernel.ubuntu.com/~jsalisbury/lp1547619/ Can you see if this kernel has the bug or not? -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1547619 Title: Intermittent screen blinking with 4k external mini display port with 4.4 kernels Status in linux package in Ubuntu: In Progress Status in linux source package in Xenial: In Progress Bug description: When using an external 4K monitor plugged into the mini display port on my Dell XPS 13 9343 using both the laptop screen and the external monitor (external monitor is left and laptop screen right), when using all of the following kernels: 4.4.0-2.16-generic 4.4.0-4.19-generic 4.4.0-6.21-generic 4.4.0-7.22-generic the external monitor will sometimes blink off for about a second or two, then back on. What is weird is this seems to only happen when typing into a gnome-terminal as opposed to firefox or evolution. Simply changing to a gnome-terminal and typing into it doesn't cause the blinking, but it might happen immediately or it might take several minutes. 4.3.0-7.18-generic worked fine and I can go hours and hours in a gnome-terminal with no issues. ProblemType: Bug DistroRelease: Ubuntu 16.04 Package: linux-image-4.4.0-6-generic 4.4.0-6.21 ProcVersionSignature: Ubuntu 4.4.0-6.21-generic 4.4.1 Uname: Linux 4.4.0-6-generic x86_64 ApportVersion: 2.20-0ubuntu3 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC2: jamie 5882 F pulseaudio /dev/snd/controlC1: jamie 5882 F pulseaudio /dev/snd/controlC0: jamie 5882 F pulseaudio CurrentDesktop: Unity Date: Fri Feb 19 12:09:28 2016 HibernationDevice: RESUME=UUID=27fa6713-c8c2-4eb8-9766-ba6918bc1cfb InstallationDate: Installed on 2015-06-13 (250 days ago) InstallationMedia: Ubuntu 15.04 "Vivid Vervet" - Release amd64 (20150422) MachineType: Dell Inc. XPS 13 9343 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-6-generic.efi.signed root=UUID=7bc4dcd2-0bd8-4e42-b8b7-9f1ed6b8a3e9 ro libata.force=noncq kaslr quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-4.4.0-6-generic N/A linux-backports-modules-4.4.0-6-generic N/A linux-firmware 1.156 SourcePackage: linux UpgradeStatus: Upgraded to xenial on 2016-01-12 (38 days ago) dmi.bios.date: 11/11/2015 dmi.bios.vendor: Dell Inc. dmi.bios.version: A07 dmi.board.name: 0310JH dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA07:bd11/11/2015:svnDellInc.:pnXPS139343:pvr:rvnDellInc.:rn0310JH:rvrA00:cvnDellInc.:ct9:cvr: dmi.product.name: XPS 13 9343 dmi.sys.vendor: Dell Inc. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1547619/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548548] [NEW] linux: 3.19.0-52.58 -proposed tracker
Public bug reported: This bug is for tracking the 3.19.0-52.58 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 23:08 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 22. February 2016 23:08 UTC ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Medium Status: New ** Affects: linux (Ubuntu Vivid) Importance: Medium Status: New ** Tags: block-proposed-vivid kernel-release-tracking-bug vivid ** Tags added: kernel-release-tracking-bug ** Tags added: block-proposed-vivid ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Tags added: vivid ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-signed Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-signed As
[Kernel-packages] [Bug 1540538] Re: linux: 3.2.0-99.139 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress => Fix Released ** Description changed: This bug is for tracking the 3.2.0-99.139 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 01. February 2016 19:16 UTC kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 04:03 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 04:03 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:01 UTC kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:00 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Security-signoff-end:Friday, 05. February 2016 10:01 UTC kernel-stable-Verification-testing-end:Thursday, 18. February 2016 15:00 UTC kernel-stable-Regression-testing-end:Thursday, 18. February 2016 15:00 UTC - kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:17 UTC - kernel-stable-phase-changed:Monday, 22. February 2016 19:17 UTC kernel-stable-Certification-testing-end:Monday, 22. February 2016 19:17 UTC kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Monday, 22. February 2016 23:00 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1540538 Title: linux: 3.2.0-99.139 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-99.139 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 01. February 2016 19:16 UTC kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 04:03 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 04:03 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:01 UTC kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:00 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Security-signoff-end:Friday, 05. February 2016 10:01 UTC kernel-stable-Verification-testing-end:Thursday, 18. February 2016 15:00 UTC kernel-stable-Regression-testing-end:Thursday, 18. February 2016 15:00 UTC kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:17 UTC kernel-stable-Certification-testing-end:Monday, 22. February 2016 19:17 UTC kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC kernel-stable-phase:Released kernel-stable-phase-changed:Monday, 22. February 2016 23:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540538/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1540721] Re: linux-armadaxp: 3.2.0-1662.86 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress => Fix Released ** Description changed: This bug is for tracking the 3.2.0-1662.86 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:02 UTC kernel-stable-master-bug:1540538 kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 08:03 UTC kernel-stable-Security-signoff-end:Tuesday, 02. February 2016 08:03 UTC kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 10:02 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 10:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC kernel-stable-Regression-testing-end:Monday, 08. February 2016 17:00 UTC - kernel-stable-phase:CopyToUpdates - kernel-stable-phase-changed:Monday, 22. February 2016 19:19 UTC kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:19 UTC kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Monday, 22. February 2016 23:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1540721 Title: linux-armadaxp: 3.2.0-1662.86 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-armadaxp source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1662.86 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:02 UTC kernel-stable-master-bug:1540538 kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 08:03 UTC kernel-stable-Security-signoff-end:Tuesday, 02. February 2016 08:03 UTC kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 10:02 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 10:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC kernel-stable-Regression-testing-end:Monday, 08. February 2016 17:00 UTC kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:19 UTC kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC kernel-stable-phase:Released kernel-stable-phase-changed:Monday, 22. February 2016 23:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540721/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1540720] Re: linux-ti-omap4: 3.2.0-1477.100 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress => Fix Released ** Description changed: This bug is for tracking the 3.2.0-1477.100 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:01 UTC kernel-stable-master-bug:1540538 kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 16:01 UTC kernel-stable-Prepare-package-end:Wednesday, 03. February 2016 00:01 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 03. February 2016 00:01 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:04 UTC kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC proposed-announcement-sent:True kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC kernel-stable-Security-signoff-end:Friday, 05. February 2016 21:00 UTC kernel-stable-Regression-testing-end:Thursday, 18. February 2016 16:01 UTC - kernel-stable-phase:CopyToUpdates - kernel-stable-phase-changed:Monday, 22. February 2016 19:24 UTC kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:24 UTC kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Monday, 22. February 2016 23:01 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1540720 Title: linux-ti-omap4: 3.2.0-1477.100 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1477.100 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:01 UTC kernel-stable-master-bug:1540538 kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 16:01 UTC kernel-stable-Prepare-package-end:Wednesday, 03. February 2016 00:01 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 03. February 2016 00:01 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:04 UTC kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC proposed-announcement-sent:True kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC kernel-stable-Security-signoff-end:Friday, 05. February 2016 21:00 UTC kernel-stable-Regression-testing-end:Thursday, 18. February 2016 16:01 UTC kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:24 UTC kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC kernel-stable-phase:Released kernel-stable-phase-changed:Monday, 22. February 2016 23:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540720/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1540586] Re: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection
** Changed in: linux (Ubuntu Trusty) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1540586 Title: [Hyper-V] Netmask value is not parsed by hv_set_ifconfig - IP injection Status in linux package in Ubuntu: Fix Committed Status in linux source package in Trusty: Fix Committed Status in linux source package in Wily: In Progress Status in linux source package in Xenial: Fix Committed Bug description: This bug is a continuation to bug ID 1506521 - the refreshed hv_set_ifconfig script in Python3. On a Wily system with the new script, doing an IP injection does change the IP on the VM, however the netmask value is not parsed and gets ignored. It gets set to a default of 255.0.0.0. Kernel: 4.2.0-23-generic Attaching generated ifcfg-eth0 file that is used by this script. syslog doesn't record any related events to the netmask, and also manually executing hv_set_ifconfig against the generated ifcfg works with no errors. The interfaces files gets modified to this: iface eth0 inet static address 10.123.120.199 gateway 10.123.119.1 dns-nameservers anything_changed #End of hv_set_ifconfig stanzas To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1540586/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1533009] Re: arm64: "unsupported RELA relocation"
** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: gcc-5 (Ubuntu Trusty) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1533009 Title: arm64: "unsupported RELA relocation" Status in Linaro GCC: Unknown Status in Linux: Unknown Status in gcc-5 package in Ubuntu: Invalid Status in linux package in Ubuntu: Fix Released Status in gcc-5 source package in Trusty: New Status in linux source package in Trusty: Fix Committed Status in gcc-5 source package in Xenial: Invalid Status in linux source package in Xenial: Fix Released Bug description: linux-image-4.3.0-5-generic 4.3.0-5.16 arm64 fails to load modules (and therefore boot). It emits messages like the following for each attempted module load: [2.156817] module libahci: unsupported RELA relocation: 275 This is reminiscent of LP: #1502946 - except that fix appears to still be in-tact. What has changed, however, is the build environment. If I rebuild the same kernel source in a wily chroot, it boots fine. Marking "Confirmed" because Paulo Pisatti reported this to me, and I reproduced. To manage notifications about this bug go to: https://bugs.launchpad.net/gcc-linaro/+bug/1533009/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1505564] Re: Soft lockup with "block nbdX: Attempted send on closed socket" spam
** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1505564 Title: Soft lockup with "block nbdX: Attempted send on closed socket" spam Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Committed Bug description: Some of our nova compute hosts regularly freeze, sometimes for a few hours, with kern.log getting spammed with: block nbdX: Attempted send on closed socket and a few "CPU soft lockup" messages (see attached log). This clears up when the queue gets cleared, eg : block nbdX: queue cleared trusty hosts with kernel version 3.19.0-30-generic. --- AlsaDevices: total 0 crw-rw 1 root audio 116, 1 Nov 24 12:23 seq crw-rw 1 root audio 116, 33 Nov 24 12:23 timer AplayDevices: Error: [Errno 2] No such file or directory ApportVersion: 2.14.1-0ubuntu3.19 Architecture: amd64 ArecordDevices: Error: [Errno 2] No such file or directory AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1: DistroRelease: Ubuntu 14.04 IwConfig: Error: [Errno 2] No such file or directory MachineType: HP ProLiant DL385 G7 Package: linux (not installed) PciMultimedia: ProcEnviron: TERM=screen-256color PATH=(custom, no user) LANG=en_US.UTF-8 SHELL=/bin/bash ProcFB: 0 radeondrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.19.0-36-generic root=UUID=13289ac9-8dc9-4feb-b6bd-ca7db66b21d6 ro console=tty0 console=ttyS1,38400 nosplash crashkernel=384M-:512M nox2apic intremap=off ProcVersionSignature: Ubuntu 3.19.0-36.41~14.04.1hf00090138v20151122b1-generic 3.19.8-ckt9 RelatedPackageVersions: linux-restricted-modules-3.19.0-36-generic N/A linux-backports-modules-3.19.0-36-generic N/A linux-firmware 1.127.18 RfKill: Error: [Errno 2] No such file or directory Tags: trusty uec-images Uname: Linux 3.19.0-36-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: _MarkForUpload: True dmi.bios.date: 02/02/2014 dmi.bios.vendor: HP dmi.bios.version: A18 dmi.chassis.type: 23 dmi.chassis.vendor: HP dmi.modalias: dmi:bvnHP:bvrA18:bd02/02/2014:svnHP:pnProLiantDL385G7:pvr:cvnHP:ct23:cvr: dmi.product.name: ProLiant DL385 G7 dmi.sys.vendor: HP To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1505564/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1526958] Re: CVE-2015-8569
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1526958 Title: CVE-2015-8569 Status in linux package in Ubuntu: Fix Committed Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-flo package in Ubuntu: New Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-goldfish package in Ubuntu: New Status in linux-lts-backport-maverick package in Ubuntu: New Status in linux-lts-backport-natty package in Ubuntu: New Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-wily package in Ubuntu: Invalid Status in linux-lts-xenial package in Ubuntu: Invalid Status in linux-mako package in Ubuntu: New Status in linux-manta package in Ubuntu: New Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-raspi2 package in Ubuntu: Fix Committed Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Precise: Fix Released Status in linux-armadaxp source package in Precise: Fix Released Status in linux-ec2 source package in Precise: Invalid Status in linux-flo source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-goldfish source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: New Status in linux-lts-backport-natty source package in Precise: New Status in linux-lts-quantal source package in Precise: Invalid Status in linux-lts-raring source package in Precise: Invalid Status in linux-lts-saucy source package in Precise: Invalid Status in linux-lts-trusty source package in Precise: Fix Released Status in linux-lts-utopic source package in Precise: Invalid Status in linux-lts-vivid source package in Precise: Invalid Status in linux-lts-wily source package in Precise: Invalid Status in linux-lts-xenial source package in Precise: Invalid Status in linux-mako source package in Precise: Invalid Status in linux-manta source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: Invalid Status in linux-raspi2 source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Status in linux source package in Trusty: Fix Released Status in linux-armadaxp source package in Trusty: Invalid Status in linux-ec2 source package in Trusty: Invalid Status in linux-flo source package in Trusty: Invalid Status in linux-fsl-imx51 source package in Trusty: Invalid Status in linux-goldfish source package in Trusty: Invalid Status in linux-lts-backport-maverick source package in Trusty: New Status in linux-lts-backport-natty source package in Trusty: New Status in linux-lts-quantal source package in Trusty: Invalid Status in linux-lts-raring source package in Trusty: Invalid Status in linux-lts-saucy source package in Trusty: Invalid Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Fix Released Status in linux-lts-vivid source package in Trusty: Fix Released Status in linux-lts-wily source package in Trusty: Fix Released Status in linux-lts-xenial source package in Trusty: Fix Committed Status in linux-mako source package in Trusty: Invalid Status in linux-manta source package in Trusty: Invalid Status in linux-mvl-dove source package in Trusty: Invalid Status in linux-raspi2 source package in Trusty: Invalid Status in linux-ti-omap4 source package in Trusty: Invalid Status in linux source package in Vivid: Fix Committed Status in linux-armadaxp source package in Vivid: Invalid Status in linux-ec2 source package in Vivid: Invalid Status in linux-flo source package in Vivid: New Status in linux-fsl-imx51 source package in Vivid: Invalid Status in linux-goldfish source package in Vivid: New Status in linux-lts-backport-maverick source package in Vivid: New Status in linux-lts-backport-natty source package in Vivid: New Status in linux-lts-quantal source package in Vivid: Invalid Status in linux-lts-raring source package in Vivid: Invalid Status in linux-lts-saucy source package in Vivid: Invalid Status in linux-lts-trusty source package in Vivid: Invalid Status in linux-lts-utopic source package in
[Kernel-packages] [Bug 1538429] Re: CVE-2016-2069
** Changed in: linux-lts-wily (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Wily) Status: Fix Committed => Fix Released ** Changed in: linux-raspi2 (Ubuntu Wily) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1538429 Title: CVE-2016-2069 Status in linux package in Ubuntu: Fix Committed Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: New Status in linux-flo package in Ubuntu: New Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-goldfish package in Ubuntu: New Status in linux-lts-backport-maverick package in Ubuntu: New Status in linux-lts-backport-natty package in Ubuntu: New Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-wily package in Ubuntu: Invalid Status in linux-lts-xenial package in Ubuntu: Invalid Status in linux-mako package in Ubuntu: New Status in linux-manta package in Ubuntu: New Status in linux-mvl-dove package in Ubuntu: New Status in linux-raspi2 package in Ubuntu: Fix Committed Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Precise: New Status in linux-armadaxp source package in Precise: New Status in linux-ec2 source package in Precise: New Status in linux-flo source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-goldfish source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: New Status in linux-lts-backport-natty source package in Precise: New Status in linux-lts-quantal source package in Precise: Invalid Status in linux-lts-raring source package in Precise: Invalid Status in linux-lts-saucy source package in Precise: Invalid Status in linux-lts-trusty source package in Precise: New Status in linux-lts-utopic source package in Precise: Invalid Status in linux-lts-vivid source package in Precise: Invalid Status in linux-lts-wily source package in Precise: Invalid Status in linux-lts-xenial source package in Precise: Invalid Status in linux-mako source package in Precise: Invalid Status in linux-manta source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: New Status in linux-raspi2 source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: New Status in linux source package in Trusty: New Status in linux-armadaxp source package in Trusty: Invalid Status in linux-ec2 source package in Trusty: New Status in linux-flo source package in Trusty: Invalid Status in linux-fsl-imx51 source package in Trusty: Invalid Status in linux-goldfish source package in Trusty: Invalid Status in linux-lts-backport-maverick source package in Trusty: New Status in linux-lts-backport-natty source package in Trusty: New Status in linux-lts-quantal source package in Trusty: Invalid Status in linux-lts-raring source package in Trusty: Invalid Status in linux-lts-saucy source package in Trusty: Invalid Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Fix Committed Status in linux-lts-vivid source package in Trusty: New Status in linux-lts-wily source package in Trusty: Fix Released Status in linux-lts-xenial source package in Trusty: Fix Committed Status in linux-mako source package in Trusty: Invalid Status in linux-manta source package in Trusty: Invalid Status in linux-mvl-dove source package in Trusty: New Status in linux-raspi2 source package in Trusty: Invalid Status in linux-ti-omap4 source package in Trusty: Invalid Status in linux source package in Vivid: New Status in linux-armadaxp source package in Vivid: Invalid Status in linux-ec2 source package in Vivid: New Status in linux-flo source package in Vivid: New Status in linux-fsl-imx51 source package in Vivid: Invalid Status in linux-goldfish source package in Vivid: New Status in linux-lts-backport-maverick source package in Vivid: New Status in linux-lts-backport-natty source package in Vivid: New Status in linux-lts-quantal source package in Vivid: Invalid Status in linux-lts-raring source package in Vivid: Invalid Status in linux-lts-saucy source package in Vivid: Invalid Status in linux-lts-trusty source package in Vivid: Invalid Status in linux-lts-utopic source package in Vivid: Invalid Status in linux-lts-vivid source package in Vivid: Invalid Status in linux-lts-wil
[Kernel-packages] [Bug 1530407] Re: CVE-2015-8575
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1530407 Title: CVE-2015-8575 Status in linux package in Ubuntu: Fix Committed Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-flo package in Ubuntu: New Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-goldfish package in Ubuntu: New Status in linux-lts-backport-maverick package in Ubuntu: New Status in linux-lts-backport-natty package in Ubuntu: New Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-wily package in Ubuntu: Invalid Status in linux-lts-xenial package in Ubuntu: Invalid Status in linux-mako package in Ubuntu: New Status in linux-manta package in Ubuntu: New Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-raspi2 package in Ubuntu: Fix Committed Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Precise: Fix Released Status in linux-armadaxp source package in Precise: Fix Released Status in linux-ec2 source package in Precise: Invalid Status in linux-flo source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-goldfish source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: New Status in linux-lts-backport-natty source package in Precise: New Status in linux-lts-quantal source package in Precise: Invalid Status in linux-lts-raring source package in Precise: Invalid Status in linux-lts-saucy source package in Precise: Invalid Status in linux-lts-trusty source package in Precise: Fix Released Status in linux-lts-utopic source package in Precise: Invalid Status in linux-lts-vivid source package in Precise: Invalid Status in linux-lts-wily source package in Precise: Invalid Status in linux-lts-xenial source package in Precise: Invalid Status in linux-mako source package in Precise: Invalid Status in linux-manta source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: Invalid Status in linux-raspi2 source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Status in linux source package in Trusty: Fix Released Status in linux-armadaxp source package in Trusty: Invalid Status in linux-ec2 source package in Trusty: Invalid Status in linux-flo source package in Trusty: Invalid Status in linux-fsl-imx51 source package in Trusty: Invalid Status in linux-goldfish source package in Trusty: Invalid Status in linux-lts-backport-maverick source package in Trusty: New Status in linux-lts-backport-natty source package in Trusty: New Status in linux-lts-quantal source package in Trusty: Invalid Status in linux-lts-raring source package in Trusty: Invalid Status in linux-lts-saucy source package in Trusty: Invalid Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Fix Released Status in linux-lts-vivid source package in Trusty: Fix Released Status in linux-lts-wily source package in Trusty: Fix Released Status in linux-lts-xenial source package in Trusty: Fix Committed Status in linux-mako source package in Trusty: Invalid Status in linux-manta source package in Trusty: Invalid Status in linux-mvl-dove source package in Trusty: Invalid Status in linux-raspi2 source package in Trusty: Invalid Status in linux-ti-omap4 source package in Trusty: Invalid Status in linux source package in Vivid: Fix Committed Status in linux-armadaxp source package in Vivid: Invalid Status in linux-ec2 source package in Vivid: Invalid Status in linux-flo source package in Vivid: New Status in linux-fsl-imx51 source package in Vivid: Invalid Status in linux-goldfish source package in Vivid: New Status in linux-lts-backport-maverick source package in Vivid: New Status in linux-lts-backport-natty source package in Vivid: New Status in linux-lts-quantal source package in Vivid: Invalid Status in linux-lts-raring source package in Vivid: Invalid Status in linux-lts-saucy source package in Vivid: Invalid Status in linux-lts-trusty source package in Vivid: Invalid Status in linux-lts-utopic source package in
[Kernel-packages] [Bug 1538425] Re: CVE-2015-8785
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux-lts-wily (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Wily) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux-raspi2 (Ubuntu Wily) Status: Fix Committed => Fix Released ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1538425 Title: CVE-2015-8785 Status in linux package in Ubuntu: Fix Committed Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: New Status in linux-flo package in Ubuntu: New Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-goldfish package in Ubuntu: New Status in linux-lts-backport-maverick package in Ubuntu: New Status in linux-lts-backport-natty package in Ubuntu: New Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-wily package in Ubuntu: Invalid Status in linux-lts-xenial package in Ubuntu: Invalid Status in linux-mako package in Ubuntu: New Status in linux-manta package in Ubuntu: New Status in linux-mvl-dove package in Ubuntu: New Status in linux-raspi2 package in Ubuntu: Fix Committed Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Precise: Fix Released Status in linux-armadaxp source package in Precise: Fix Released Status in linux-ec2 source package in Precise: New Status in linux-flo source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-goldfish source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: New Status in linux-lts-backport-natty source package in Precise: New Status in linux-lts-quantal source package in Precise: Invalid Status in linux-lts-raring source package in Precise: Invalid Status in linux-lts-saucy source package in Precise: Invalid Status in linux-lts-trusty source package in Precise: Fix Released Status in linux-lts-utopic source package in Precise: Invalid Status in linux-lts-vivid source package in Precise: Invalid Status in linux-lts-wily source package in Precise: Invalid Status in linux-lts-xenial source package in Precise: Invalid Status in linux-mako source package in Precise: Invalid Status in linux-manta source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: New Status in linux-raspi2 source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Status in linux source package in Trusty: Fix Released Status in linux-armadaxp source package in Trusty: Invalid Status in linux-ec2 source package in Trusty: New Status in linux-flo source package in Trusty: Invalid Status in linux-fsl-imx51 source package in Trusty: Invalid Status in linux-goldfish source package in Trusty: Invalid Status in linux-lts-backport-maverick source package in Trusty: New Status in linux-lts-backport-natty source package in Trusty: New Status in linux-lts-quantal source package in Trusty: Invalid Status in linux-lts-raring source package in Trusty: Invalid Status in linux-lts-saucy source package in Trusty: Invalid Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Fix Released Status in linux-lts-vivid source package in Trusty: Fix Released Status in linux-lts-wily source package in Trusty: Fix Released Status in linux-lts-xenial source package in Trusty: Fix Committed Status in linux-mako source package in Trusty: Invalid Status in linux-manta source package in Trusty: Invalid Status in linux-mvl-dove source package in Trusty: New Status in linux-raspi2 source package in Trusty: Invalid Status in linux-ti-omap4 source package in Trusty: Invalid Status in linux source package in Vivid: Fix Committed Status in linux-armadaxp source package in Vivid: Invalid Status in linux-ec2 source package in Vivid: New Status in linux-flo source package in Vivid: New Status in linux-fsl-imx51 source package in Vivid: Invalid Status in linux-goldfish source package in Vivid: New Status in linux-lts-backport-maverick source package in Vivid: New Status in linux-lts-backport-nat
[Kernel-packages] [Bug 1525570] Re: CVE-2015-8543
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1525570 Title: CVE-2015-8543 Status in linux package in Ubuntu: Fix Committed Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: Invalid Status in linux-flo package in Ubuntu: New Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-goldfish package in Ubuntu: New Status in linux-lts-backport-maverick package in Ubuntu: New Status in linux-lts-backport-natty package in Ubuntu: New Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-wily package in Ubuntu: Invalid Status in linux-lts-xenial package in Ubuntu: Invalid Status in linux-mako package in Ubuntu: New Status in linux-manta package in Ubuntu: New Status in linux-mvl-dove package in Ubuntu: Invalid Status in linux-raspi2 package in Ubuntu: Fix Committed Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Precise: Fix Released Status in linux-armadaxp source package in Precise: Fix Released Status in linux-ec2 source package in Precise: Invalid Status in linux-flo source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-goldfish source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: New Status in linux-lts-backport-natty source package in Precise: New Status in linux-lts-quantal source package in Precise: Invalid Status in linux-lts-raring source package in Precise: Invalid Status in linux-lts-saucy source package in Precise: Invalid Status in linux-lts-trusty source package in Precise: Fix Released Status in linux-lts-utopic source package in Precise: Invalid Status in linux-lts-vivid source package in Precise: Invalid Status in linux-lts-wily source package in Precise: Invalid Status in linux-lts-xenial source package in Precise: Invalid Status in linux-mako source package in Precise: Invalid Status in linux-manta source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: Invalid Status in linux-raspi2 source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Status in linux source package in Trusty: Fix Released Status in linux-armadaxp source package in Trusty: Invalid Status in linux-ec2 source package in Trusty: Invalid Status in linux-flo source package in Trusty: Invalid Status in linux-fsl-imx51 source package in Trusty: Invalid Status in linux-goldfish source package in Trusty: Invalid Status in linux-lts-backport-maverick source package in Trusty: New Status in linux-lts-backport-natty source package in Trusty: New Status in linux-lts-quantal source package in Trusty: Invalid Status in linux-lts-raring source package in Trusty: Invalid Status in linux-lts-saucy source package in Trusty: Invalid Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Fix Released Status in linux-lts-vivid source package in Trusty: Fix Released Status in linux-lts-wily source package in Trusty: Fix Released Status in linux-lts-xenial source package in Trusty: Fix Committed Status in linux-mako source package in Trusty: Invalid Status in linux-manta source package in Trusty: Invalid Status in linux-mvl-dove source package in Trusty: Invalid Status in linux-raspi2 source package in Trusty: Invalid Status in linux-ti-omap4 source package in Trusty: Invalid Status in linux source package in Vivid: Fix Committed Status in linux-armadaxp source package in Vivid: Invalid Status in linux-ec2 source package in Vivid: Invalid Status in linux-flo source package in Vivid: New Status in linux-fsl-imx51 source package in Vivid: Invalid Status in linux-goldfish source package in Vivid: New Status in linux-lts-backport-maverick source package in Vivid: New Status in linux-lts-backport-natty source package in Vivid: New Status in linux-lts-quantal source package in Vivid: Invalid Status in linux-lts-raring source package in Vivid: Invalid Status in linux-lts-saucy source package in Vivid: Invalid Status in linux-lts-trusty source package in Vivid: Invalid Status in linux-lts-utopic source package in
[Kernel-packages] [Bug 1530400] Re: CVE-2015-7550
** Changed in: linux-lts-trusty (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: Fix Committed => Fix Released ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1530400 Title: CVE-2015-7550 Status in linux package in Ubuntu: Fix Committed Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: New Status in linux-flo package in Ubuntu: New Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-goldfish package in Ubuntu: New Status in linux-lts-backport-maverick package in Ubuntu: New Status in linux-lts-backport-natty package in Ubuntu: New Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-wily package in Ubuntu: Invalid Status in linux-lts-xenial package in Ubuntu: Invalid Status in linux-mako package in Ubuntu: New Status in linux-manta package in Ubuntu: New Status in linux-mvl-dove package in Ubuntu: New Status in linux-raspi2 package in Ubuntu: Fix Committed Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Precise: Fix Released Status in linux-armadaxp source package in Precise: New Status in linux-ec2 source package in Precise: New Status in linux-flo source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-goldfish source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: New Status in linux-lts-backport-natty source package in Precise: New Status in linux-lts-quantal source package in Precise: Invalid Status in linux-lts-raring source package in Precise: Invalid Status in linux-lts-saucy source package in Precise: Invalid Status in linux-lts-trusty source package in Precise: Fix Released Status in linux-lts-utopic source package in Precise: Invalid Status in linux-lts-vivid source package in Precise: Invalid Status in linux-lts-wily source package in Precise: Invalid Status in linux-lts-xenial source package in Precise: Invalid Status in linux-mako source package in Precise: Invalid Status in linux-manta source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: New Status in linux-raspi2 source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Status in linux source package in Trusty: Fix Released Status in linux-armadaxp source package in Trusty: Invalid Status in linux-ec2 source package in Trusty: New Status in linux-flo source package in Trusty: Invalid Status in linux-fsl-imx51 source package in Trusty: Invalid Status in linux-goldfish source package in Trusty: Invalid Status in linux-lts-backport-maverick source package in Trusty: New Status in linux-lts-backport-natty source package in Trusty: New Status in linux-lts-quantal source package in Trusty: Invalid Status in linux-lts-raring source package in Trusty: Invalid Status in linux-lts-saucy source package in Trusty: Invalid Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Fix Released Status in linux-lts-vivid source package in Trusty: Fix Released Status in linux-lts-wily source package in Trusty: Fix Released Status in linux-lts-xenial source package in Trusty: Fix Committed Status in linux-mako source package in Trusty: Invalid Status in linux-manta source package in Trusty: Invalid Status in linux-mvl-dove source package in Trusty: New Status in linux-raspi2 source package in Trusty: Invalid Status in linux-ti-omap4 source package in Trusty: Invalid Status in linux source package in Vivid: Fix Committed Status in linux-armadaxp source package in Vivid: Invalid Status in linux-ec2 source package in Vivid: New Status in linux-flo source package in Vivid: New Status in linux-fsl-imx51 source package in Vivid: Invalid Status in linux-goldfish source package in Vivid: New Status in linux-lts-backport-maverick source package in Vivid: New Status in linux-lts-backport-natty source package in Vivid: New Status in linux-lts-quantal source package in Vivid: Invalid Status in linux-lts-raring source package in Vivid: Invalid Status in linux-lts-saucy so
[Kernel-packages] [Bug 1537886] Re: CVE-2013-4312
** Changed in: linux-lts-wily (Ubuntu Trusty) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Wily) Status: Fix Committed => Fix Released ** Changed in: linux-raspi2 (Ubuntu Wily) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1537886 Title: CVE-2013-4312 Status in linux package in Ubuntu: Fix Committed Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: New Status in linux-flo package in Ubuntu: New Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-goldfish package in Ubuntu: New Status in linux-lts-backport-maverick package in Ubuntu: New Status in linux-lts-backport-natty package in Ubuntu: New Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-wily package in Ubuntu: Invalid Status in linux-lts-xenial package in Ubuntu: Invalid Status in linux-mako package in Ubuntu: New Status in linux-manta package in Ubuntu: New Status in linux-mvl-dove package in Ubuntu: New Status in linux-raspi2 package in Ubuntu: Fix Committed Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Precise: New Status in linux-armadaxp source package in Precise: New Status in linux-ec2 source package in Precise: New Status in linux-flo source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-goldfish source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: New Status in linux-lts-backport-natty source package in Precise: New Status in linux-lts-quantal source package in Precise: Invalid Status in linux-lts-raring source package in Precise: Invalid Status in linux-lts-saucy source package in Precise: Invalid Status in linux-lts-trusty source package in Precise: New Status in linux-lts-utopic source package in Precise: Invalid Status in linux-lts-vivid source package in Precise: Invalid Status in linux-lts-wily source package in Precise: Invalid Status in linux-lts-xenial source package in Precise: Invalid Status in linux-mako source package in Precise: Invalid Status in linux-manta source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: New Status in linux-raspi2 source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: New Status in linux source package in Trusty: Fix Committed Status in linux-armadaxp source package in Trusty: Invalid Status in linux-ec2 source package in Trusty: New Status in linux-flo source package in Trusty: Invalid Status in linux-fsl-imx51 source package in Trusty: Invalid Status in linux-goldfish source package in Trusty: Invalid Status in linux-lts-backport-maverick source package in Trusty: New Status in linux-lts-backport-natty source package in Trusty: New Status in linux-lts-quantal source package in Trusty: Invalid Status in linux-lts-raring source package in Trusty: Invalid Status in linux-lts-saucy source package in Trusty: Invalid Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Fix Committed Status in linux-lts-vivid source package in Trusty: New Status in linux-lts-wily source package in Trusty: Fix Released Status in linux-lts-xenial source package in Trusty: Fix Committed Status in linux-mako source package in Trusty: Invalid Status in linux-manta source package in Trusty: Invalid Status in linux-mvl-dove source package in Trusty: New Status in linux-raspi2 source package in Trusty: Invalid Status in linux-ti-omap4 source package in Trusty: Invalid Status in linux source package in Vivid: New Status in linux-armadaxp source package in Vivid: Invalid Status in linux-ec2 source package in Vivid: New Status in linux-flo source package in Vivid: New Status in linux-fsl-imx51 source package in Vivid: Invalid Status in linux-goldfish source package in Vivid: New Status in linux-lts-backport-maverick source package in Vivid: New Status in linux-lts-backport-natty source package in Vivid: New Status in linux-lts-quantal source package in Vivid: Invalid Status in linux-lts-raring source package in Vivid: Invalid Status in linux-lts-saucy source package in Vivid: Invalid Status in linux-lts-trusty source package in Vivid: Invalid Status in linux-lts-utopic source package in Vivid: Invalid Status in linux-lts-vivid source package in Vivid: Invalid Status in lin
[Kernel-packages] [Bug 1547934] Re: Multiple Issues with Ubuntu 16.04 on Lenovo Y700-17ISK notebook
This commit fixed the rfkill issue http://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/drivers/platform/x86/ideapad-laptop.c?id=edde316acb5f07c04abf09a92f59db5d2efd14e2 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1547934 Title: Multiple Issues with Ubuntu 16.04 on Lenovo Y700-17ISK notebook Status in linux package in Ubuntu: Confirmed Bug description: Hello, here is a list of problems I've noticed after installing the testing version of the upcoming Ubuntu 16.04 on my new Lenovo Y700-17ISK notebook: 1) Wireless/WiFi connection doesn't work (Wireless is disabled by hardware switch, so I can't enable my wifi connection) 2) Notebook subwoofer doesn't work 3) DMESG output: [0.303800] platform MSFT0101:00: failed to claim resource 1 [0.303803] acpi MSFT0101:00: platform device creation failed: -16 4) DMESG output: [1.008640] mmc0: Unknown controller version (3). You may experience problems. 5) DMESG output: [1.917551] iwlwifi :08:00.0: Direct firmware load for iwlwifi-8000C-19.ucode failed with error -2 [1.917562] iwlwifi :08:00.0: Direct firmware load for iwlwifi-8000C-18.ucode failed with error -2 [1.917569] iwlwifi :08:00.0: Direct firmware load for iwlwifi-8000C-17.ucode failed with error -2 [1.918204] iwlwifi :08:00.0: Unsupported splx structure 6) DMESG output: [3.878249] Bluetooth: hci0: Setting Intel event mask failed (-16) 7) DMESG output: [0.33] ACPI: Core revision 20150930 [0.026490] ACPI Error: [\_SB_.PCI0.XHC_.RHUB.HS11] Namespace lookup failure, AE_NOT_FOUND (20150930/dswload-210) [0.026495] ACPI Exception: AE_NOT_FOUND, During name lookup/catalog (20150930/psobject-227) [0.026533] ACPI Exception: AE_NOT_FOUND, (SSDT:CB-01 ) while loading table (20150930/tbxfload-193) [0.031959] ACPI Error: 1 table load failures, 9 successful (20150930/tbxfload-214) 8) DMESG output: [0.843979] [Firmware Bug]: No valid trip found [0.844491] [Firmware Bug]: No valid trip found 9) DMESG output: [0.239800] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug 10) DMESG output: [0.210582] [Firmware Bug]: ACPI: BIOS _OSI(Linux) query ignored 11) DMESG output: [1.082502] [Firmware Bug]: ACPI(PEGP) defines _DOD but not _DOS 12) DMESG output: [0.00] Linux version 4.4.0-6-generic (buildd@lgw01-21) (gcc version 5.3.1 20160211 (Ubuntu 5.3.1-8ubuntu3) ) #21-Ubuntu SMP Tue Feb 16 20:32:27 UTC 2016 (Ubuntu 4.4.0-6.21-generic 4.4.1) [0.00] Command line: BOOT_IMAGE=/boot/vmlinuz-4.4.0-6-generic.efi.signed root=UUID=64e94552-5d3c-4123-b492-a473889ee0f1 ro quiet splash vt.handoff=7 [0.00] efi: EFI v2.40 by LENOVO [0.00] efi: SMBIOS=0x75802000 ESRT=0x75800e18 ACPI 2.0=0x77ffd014 [0.00] esrt: Reserving ESRT space from 0x75800e18 to 0x75800e50. [0.00] SMBIOS 2.8 present. [0.00] DMI: LENOVO 80Q0/Allsparks 7A, BIOS CDCN26WW 10/12/2015 [0.00] e820: update [mem 0x-0x0fff] usable ==> reserved [0.00] e820: remove [mem 0x000a-0x000f] usable [0.00] e820: last_pfn = 0x482800 max_arch_pfn = 0x4 [0.00] MTRR default type: uncachable [0.00] MTRR fixed ranges enabled: [0.00] 0-9 write-back [0.00] A-B uncachable [0.00] C-F write-protect [0.00] MTRR variable ranges enabled: [0.00] 0 base 00 mask 78 write-back [0.00] 1 base 0077FFF000 mask 7FF000 uncachable [0.00] 2 base 007800 mask 7FF800 uncachable [0.00] 3 base 008000 mask 7F8000 uncachable [0.00] 4 disabled [0.00] 5 disabled [0.00] 6 disabled [0.00] 7 disabled [0.00] 8 disabled [0.00] 9 disabled [0.00] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WC UC- WT [0.00] original variable MTRRs [0.00] reg 0, base: 0GB, range: 32GB, type WB [0.00] reg 1, base: 1966076KB, range: 4KB, type UC [0.00] reg 2, base: 1920MB, range: 128MB, type UC [0.00] reg 3, base: 2GB, range: 2GB, type UC [0.00] total RAM covered: 30591M [0.00] gran_size: 64Kchunk_size: 64K num_reg: 10 lose cover RAM: 29361148K [0.00] gran_size: 64Kchunk_size: 128Knum_reg: 8 lose cover RAM: 60K [0.00] gran_size: 64Kchunk_size: 256Knum_reg: 8 lose cover RAM: 60K [0.00] gran_size: 64Kchunk_size: 512Knum_reg: 8 lose cover RAM: 60K [0.00] gran_size: 64Kchunk_s
[Kernel-packages] [Bug 1548521] [NEW] kernel BUG at /build/linux-tSJmM_/linux-4.4.0/drivers/gpu/drm/i915/intel_display.c:10243!
Public bug reported: lsb_release -rd Description:Ubuntu Xenial Xerus (development branch) Release:16.04 apt-cache policy linux-image-generic linux-image-generic: Installed: 4.4.0.6.7 Candidate: 4.4.0.6.7 Version table: *** 4.4.0.6.7 500 500 http://ru.archive.ubuntu.com/ubuntu xenial/main i386 Packages 100 /var/lib/dpkg/status ProblemType: KernelOops DistroRelease: Ubuntu 16.04 Package: linux-image-4.4.0-6-generic 4.4.0-6.21 ProcVersionSignature: Ubuntu 4.4.0-6.21-generic 4.4.1 Uname: Linux 4.4.0-6-generic i686 Annotation: Your system might become unstable now and might need to be restarted. ApportVersion: 2.20-0ubuntu3 Architecture: i386 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: erelesse 1229 F pulseaudio Date: Tue Feb 23 00:10:18 2016 Failure: oops HibernationDevice: RESUME=UUID=63ef6815-2fd1-44e8-b1b3-09bcb51f585c InstallationDate: Installed on 2016-02-22 (0 days ago) InstallationMedia: Xubuntu 16.04 LTS "Xenial Xerus" - Alpha i386 (20160222) MachineType: Sony Corporation VGN-FE770G PccardctlIdent: Socket 0: no product info available PccardctlStatus: Socket 0: no card ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-6-generic root=UUID=c86d5044-62e5-4dd9-a13e-358d76afb64b ro quiet splash vt.handoff=7 PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: kerneloops-daemon 0.12+git20090217-3ubuntu9 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no SourcePackage: linux Title: kernel BUG at /build/linux-tSJmM_/linux-4.4.0/drivers/gpu/drm/i915/intel_display.c:10243! UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 09/21/2006 dmi.bios.vendor: Phoenix Technologies LTD dmi.bios.version: R0173J3 dmi.board.asset.tag: N/A dmi.board.name: VAIO dmi.board.vendor: Sony Corporation dmi.board.version: N/A dmi.chassis.asset.tag: 7R2L34eb42975aead93c dmi.chassis.type: 10 dmi.chassis.vendor: Sony Corporation dmi.chassis.version: C3LMWGAC dmi.modalias: dmi:bvnPhoenixTechnologiesLTD:bvrR0173J3:bd09/21/2006:svnSonyCorporation:pnVGN-FE770G:pvrC3LMWGAC:rvnSonyCorporation:rnVAIO:rvrN/A:cvnSonyCorporation:ct10:cvrC3LMWGAC: dmi.product.name: VGN-FE770G dmi.product.version: C3LMWGAC dmi.sys.vendor: Sony Corporation ** Affects: linux (Ubuntu) Importance: Undecided Status: Confirmed ** Tags: apport-kerneloops i386 kernel-driver-i915 kernel-oops third-party-packages xenial -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548521 Title: kernel BUG at /build/linux- tSJmM_/linux-4.4.0/drivers/gpu/drm/i915/intel_display.c:10243! Status in linux package in Ubuntu: Confirmed Bug description: lsb_release -rd Description: Ubuntu Xenial Xerus (development branch) Release: 16.04 apt-cache policy linux-image-generic linux-image-generic: Installed: 4.4.0.6.7 Candidate: 4.4.0.6.7 Version table: *** 4.4.0.6.7 500 500 http://ru.archive.ubuntu.com/ubuntu xenial/main i386 Packages 100 /var/lib/dpkg/status ProblemType: KernelOops DistroRelease: Ubuntu 16.04 Package: linux-image-4.4.0-6-generic 4.4.0-6.21 ProcVersionSignature: Ubuntu 4.4.0-6.21-generic 4.4.1 Uname: Linux 4.4.0-6-generic i686 Annotation: Your system might become unstable now and might need to be restarted. ApportVersion: 2.20-0ubuntu3 Architecture: i386 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: erelesse 1229 F pulseaudio Date: Tue Feb 23 00:10:18 2016 Failure: oops HibernationDevice: RESUME=UUID=63ef6815-2fd1-44e8-b1b3-09bcb51f585c InstallationDate: Installed on 2016-02-22 (0 days ago) InstallationMedia: Xubuntu 16.04 LTS "Xenial Xerus" - Alpha i386 (20160222) MachineType: Sony Corporation VGN-FE770G PccardctlIdent: Socket 0: no product info available PccardctlStatus: Socket 0: no card ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-6-generic root=UUID=c86d5044-62e5-4dd9-a13e-358d76afb64b ro quiet splash vt.handoff=7 PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: kerneloops-daemon 0.12+git20090217-3ubuntu9 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no SourcePackage: linux Title: kernel BUG at /build/linux-tSJmM_/linux-4.4.0/drivers/gpu/drm/i915/intel_display.c:10243! UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 09/21/2006 dmi.bios.vendor: Phoenix Technologies LTD dmi.bios.version: R0173J3 dmi.board.asset.tag: N/A dmi.board.name: VAIO
[Kernel-packages] [Bug 1548521] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548521 Title: kernel BUG at /build/linux- tSJmM_/linux-4.4.0/drivers/gpu/drm/i915/intel_display.c:10243! Status in linux package in Ubuntu: Confirmed Bug description: lsb_release -rd Description: Ubuntu Xenial Xerus (development branch) Release: 16.04 apt-cache policy linux-image-generic linux-image-generic: Installed: 4.4.0.6.7 Candidate: 4.4.0.6.7 Version table: *** 4.4.0.6.7 500 500 http://ru.archive.ubuntu.com/ubuntu xenial/main i386 Packages 100 /var/lib/dpkg/status ProblemType: KernelOops DistroRelease: Ubuntu 16.04 Package: linux-image-4.4.0-6-generic 4.4.0-6.21 ProcVersionSignature: Ubuntu 4.4.0-6.21-generic 4.4.1 Uname: Linux 4.4.0-6-generic i686 Annotation: Your system might become unstable now and might need to be restarted. ApportVersion: 2.20-0ubuntu3 Architecture: i386 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: erelesse 1229 F pulseaudio Date: Tue Feb 23 00:10:18 2016 Failure: oops HibernationDevice: RESUME=UUID=63ef6815-2fd1-44e8-b1b3-09bcb51f585c InstallationDate: Installed on 2016-02-22 (0 days ago) InstallationMedia: Xubuntu 16.04 LTS "Xenial Xerus" - Alpha i386 (20160222) MachineType: Sony Corporation VGN-FE770G PccardctlIdent: Socket 0: no product info available PccardctlStatus: Socket 0: no card ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-6-generic root=UUID=c86d5044-62e5-4dd9-a13e-358d76afb64b ro quiet splash vt.handoff=7 PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: kerneloops-daemon 0.12+git20090217-3ubuntu9 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no SourcePackage: linux Title: kernel BUG at /build/linux-tSJmM_/linux-4.4.0/drivers/gpu/drm/i915/intel_display.c:10243! UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 09/21/2006 dmi.bios.vendor: Phoenix Technologies LTD dmi.bios.version: R0173J3 dmi.board.asset.tag: N/A dmi.board.name: VAIO dmi.board.vendor: Sony Corporation dmi.board.version: N/A dmi.chassis.asset.tag: 7R2L34eb42975aead93c dmi.chassis.type: 10 dmi.chassis.vendor: Sony Corporation dmi.chassis.version: C3LMWGAC dmi.modalias: dmi:bvnPhoenixTechnologiesLTD:bvrR0173J3:bd09/21/2006:svnSonyCorporation:pnVGN-FE770G:pvrC3LMWGAC:rvnSonyCorporation:rnVAIO:rvrN/A:cvnSonyCorporation:ct10:cvrC3LMWGAC: dmi.product.name: VGN-FE770G dmi.product.version: C3LMWGAC dmi.sys.vendor: Sony Corporation To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548521/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1546694] Re: Bluetooth cannot detect other devices (Lite-on 3014 + Atheros AR9565)
Kernel source is kernel specific and the source you downloaded was for the 3.19 kernel. If we can assign this bug to Pilot6, he can get the patches submitted upstream -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1546694 Title: Bluetooth cannot detect other devices (Lite-on 3014 + Atheros AR9565) Status in linux package in Ubuntu: Incomplete Bug description: I bought an Acer Cloudbook 11 but the bluetooth doesn't seem to work. The system shows the indicator icon but he doesn't detect any devices. The wifi works correctly. lsb_release -rb: Description: Ubuntu 15.10 Release: 15.10 --- ApportVersion: 2.19.1-0ubuntu5 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: thenawaker 1387 F pulseaudio CurrentDesktop: Unity DistroRelease: Ubuntu 15.10 HibernationDevice: RESUME=UUID=8e395c05-c5e5-482d-ac5e-bbfeffcc37a6 InstallationDate: Installed on 2016-02-17 (0 days ago) InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021) Lsusb: Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 001 Device 004: ID 04ca:3014 Lite-On Technology Corp. Bus 001 Device 003: ID 064e:9404 Suyin Corp. Bus 001 Device 002: ID 0bda:0129 Realtek Semiconductor Corp. RTS5129 Card Reader Controller Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub MachineType: Acer Aspire one 1-131 Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.2.0-27-generic.efi.signed root=/dev/mmcblk0p2 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 4.2.0-27.32-generic 4.2.8-ckt1 RelatedPackageVersions: linux-restricted-modules-4.2.0-27-generic N/A linux-backports-modules-4.2.0-27-generic N/A linux-firmware1.144+ar3012 Tags: wily UdevLog: Error: [Errno 2] Aucun fichier ou dossier de ce type: '/var/log/udev' Uname: Linux 4.2.0-27-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 07/30/2015 dmi.bios.vendor: Insyde Corp. dmi.bios.version: V1.06 dmi.board.asset.tag: Type2 - Board Asset Tag dmi.board.name: Caltech dmi.board.vendor: Acer dmi.board.version: V1.06 dmi.chassis.type: 10 dmi.chassis.vendor: Acer dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnInsydeCorp.:bvrV1.06:bd07/30/2015:svnAcer:pnAspireone1-131:pvrV1.06:rvnAcer:rnCaltech:rvrV1.06:cvnAcer:ct10:cvrChassisVersion: dmi.product.name: Aspire one 1-131 dmi.product.version: V1.06 dmi.sys.vendor: Acer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1546694/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1546694] Re: Bluetooth cannot detect other devices (Lite-on 3014 + Atheros AR9565)
That kernel source is specific to 3.19 and the bluetooth source code changes a lot. If we can get Pilot6 assigned to this bug he can fix and get the patch submitted upstream -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1546694 Title: Bluetooth cannot detect other devices (Lite-on 3014 + Atheros AR9565) Status in linux package in Ubuntu: Incomplete Bug description: I bought an Acer Cloudbook 11 but the bluetooth doesn't seem to work. The system shows the indicator icon but he doesn't detect any devices. The wifi works correctly. lsb_release -rb: Description: Ubuntu 15.10 Release: 15.10 --- ApportVersion: 2.19.1-0ubuntu5 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: thenawaker 1387 F pulseaudio CurrentDesktop: Unity DistroRelease: Ubuntu 15.10 HibernationDevice: RESUME=UUID=8e395c05-c5e5-482d-ac5e-bbfeffcc37a6 InstallationDate: Installed on 2016-02-17 (0 days ago) InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021) Lsusb: Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub Bus 001 Device 004: ID 04ca:3014 Lite-On Technology Corp. Bus 001 Device 003: ID 064e:9404 Suyin Corp. Bus 001 Device 002: ID 0bda:0129 Realtek Semiconductor Corp. RTS5129 Card Reader Controller Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub MachineType: Acer Aspire one 1-131 Package: linux (not installed) ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.2.0-27-generic.efi.signed root=/dev/mmcblk0p2 ro quiet splash vt.handoff=7 ProcVersionSignature: Ubuntu 4.2.0-27.32-generic 4.2.8-ckt1 RelatedPackageVersions: linux-restricted-modules-4.2.0-27-generic N/A linux-backports-modules-4.2.0-27-generic N/A linux-firmware1.144+ar3012 Tags: wily UdevLog: Error: [Errno 2] Aucun fichier ou dossier de ce type: '/var/log/udev' Uname: Linux 4.2.0-27-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 07/30/2015 dmi.bios.vendor: Insyde Corp. dmi.bios.version: V1.06 dmi.board.asset.tag: Type2 - Board Asset Tag dmi.board.name: Caltech dmi.board.vendor: Acer dmi.board.version: V1.06 dmi.chassis.type: 10 dmi.chassis.vendor: Acer dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnInsydeCorp.:bvrV1.06:bd07/30/2015:svnAcer:pnAspireone1-131:pvrV1.06:rvnAcer:rnCaltech:rvrV1.06:cvnAcer:ct10:cvrChassisVersion: dmi.product.name: Aspire one 1-131 dmi.product.version: V1.06 dmi.sys.vendor: Acer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1546694/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548414] Re: Floating-point exception handler receives empty Data-Exception Code in Floating Point Control register
** Package changed: ubuntu => linux (Ubuntu) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548414 Title: Floating-point exception handler receives empty Data-Exception Code in Floating Point Control register Status in linux package in Ubuntu: Incomplete Bug description: == Comment: #0 - Alexander Efremkin - 2016-02-17 12:18:14 == With a C program sets FPE handler and triggers an FPE exception, it expects that machine-dependent context data, which is passed to the handler, will contain sensible values. In this scenario, however, FPC register was zero and contained no DXC (Data-Exception Code) indication: #include #include #include void trapFunction() { asm volatile ("lhi %r1,0\n\t" "cit %r1,0,8\n\t"); } static void sigFPE_handler(int signal, siginfo_t *info, void *context) { ucontext_t *uc = context; mcontext_t mc = uc->uc_mcontext; fpregset_t fpregs = mc.fpregs; unsigned int fpc = fpregs.fpc; printf("received signal!\n"); printf("fpc: %08x\n", fpc ); } int main() { struct sigaction action; memset(&action, '\0', sizeof(action)); printf("registering signal handler\n"); action.sa_flags |= SA_SIGINFO; action.sa_sigaction = sigFPE_handler; if (sigaction(SIGFPE, &action, NULL)) printf("error calling sigaction\n"); printf("firing trap\n"); trapFunction(); return 0; } This program prints "fpc: ", but the expected output is "fpc: ff00".. The IBM Java team has encountered test failures around the use of trap instructions; Linux on z Distribution Test reproduced the issue on the following system: z13 LPAR Ubuntu 16.04 Kernel 4.4.0-4-generic gcc (Ubuntu 5.3.1-8ubuntu2) 5.3.1 20160205 libc6 2.21-0ubuntu5 Also, similar issue has been found during test of SIMD (vector) instructions, FPC contents was also zero, whereas it expected at least an exception mask and vector-defined DXC. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1548414/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548519] [NEW] linux: 3.13.0-80.124 -proposed tracker
Public bug reported: This bug is for tracking the 3.13.0-80.124 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:49 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 22. February 2016 21:49 UTC ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Medium Status: New ** Affects: linux (Ubuntu Trusty) Importance: Medium Status: New ** Tags: block-proposed-trusty kernel-release-tracking-bug trusty ** Tags added: kernel-release-tracking-bug ** Tags added: block-proposed-trusty ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Tags added: trusty ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-signed Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-signed
[Kernel-packages] [Bug 1540720] Re: linux-ti-omap4: 3.2.0-1477.100 -proposed tracker
** Description changed: This bug is for tracking the 3.2.0-1477.100 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:01 UTC kernel-stable-master-bug:1540538 kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 16:01 UTC kernel-stable-Prepare-package-end:Wednesday, 03. February 2016 00:01 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 03. February 2016 00:01 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:04 UTC kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC proposed-announcement-sent:True kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC kernel-stable-Security-signoff-end:Friday, 05. February 2016 21:00 UTC kernel-stable-Regression-testing-end:Thursday, 18. February 2016 16:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Monday, 22. February 2016 19:24 UTC kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:24 UTC + kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1540720 Title: linux-ti-omap4: 3.2.0-1477.100 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1477.100 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:01 UTC kernel-stable-master-bug:1540538 kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 16:01 UTC kernel-stable-Prepare-package-end:Wednesday, 03. February 2016 00:01 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 03. February 2016 00:01 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:04 UTC kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC proposed-announcement-sent:True kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC kernel-stable-Security-signoff-end:Friday, 05. February 2016 21:00 UTC kernel-stable-Regression-testing-end:Thursday, 18. February 2016 16:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Monday, 22. February 2016 19:24 UTC kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:24 UTC kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540720/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1540721] Re: linux-armadaxp: 3.2.0-1662.86 -proposed tracker
** Description changed: This bug is for tracking the 3.2.0-1662.86 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:02 UTC kernel-stable-master-bug:1540538 kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 08:03 UTC kernel-stable-Security-signoff-end:Tuesday, 02. February 2016 08:03 UTC kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 10:02 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 10:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC kernel-stable-Regression-testing-end:Monday, 08. February 2016 17:00 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Monday, 22. February 2016 19:19 UTC kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:19 UTC + kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1540721 Title: linux-armadaxp: 3.2.0-1662.86 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-armadaxp source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1662.86 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:02 UTC kernel-stable-master-bug:1540538 kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 08:03 UTC kernel-stable-Security-signoff-end:Tuesday, 02. February 2016 08:03 UTC kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 10:02 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 10:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC kernel-stable-Regression-testing-end:Monday, 08. February 2016 17:00 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Monday, 22. February 2016 19:19 UTC kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:19 UTC kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540721/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548414] [NEW] Floating-point exception handler receives empty Data-Exception Code in Floating Point Control register
You have been subscribed to a public bug: == Comment: #0 - Alexander Efremkin - 2016-02-17 12:18:14 == With a C program sets FPE handler and triggers an FPE exception, it expects that machine-dependent context data, which is passed to the handler, will contain sensible values. In this scenario, however, FPC register was zero and contained no DXC (Data-Exception Code) indication: #include #include #include void trapFunction() { asm volatile ("lhi %r1,0\n\t" "cit %r1,0,8\n\t"); } static void sigFPE_handler(int signal, siginfo_t *info, void *context) { ucontext_t *uc = context; mcontext_t mc = uc->uc_mcontext; fpregset_t fpregs = mc.fpregs; unsigned int fpc = fpregs.fpc; printf("received signal!\n"); printf("fpc: %08x\n", fpc ); } int main() { struct sigaction action; memset(&action, '\0', sizeof(action)); printf("registering signal handler\n"); action.sa_flags |= SA_SIGINFO; action.sa_sigaction = sigFPE_handler; if (sigaction(SIGFPE, &action, NULL)) printf("error calling sigaction\n"); printf("firing trap\n"); trapFunction(); return 0; } This program prints "fpc: ", but the expected output is "fpc: ff00".. The IBM Java team has encountered test failures around the use of trap instructions; Linux on z Distribution Test reproduced the issue on the following system: z13 LPAR Ubuntu 16.04 Kernel 4.4.0-4-generic gcc (Ubuntu 5.3.1-8ubuntu2) 5.3.1 20160205 libc6 2.21-0ubuntu5 Also, similar issue has been found during test of SIMD (vector) instructions, FPC contents was also zero, whereas it expected at least an exception mask and vector-defined DXC. ** Affects: linux (Ubuntu) Importance: Undecided Assignee: Skipper Bug Screeners (skipper-screen-team) Status: Incomplete ** Tags: architecture-s39064 bugnameltc-137317 severity-critical targetmilestone-inin1604 -- Floating-point exception handler receives empty Data-Exception Code in Floating Point Control register https://bugs.launchpad.net/bugs/1548414 You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1540538] Re: linux: 3.2.0-99.139 -proposed tracker
** Description changed: This bug is for tracking the 3.2.0-99.139 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 01. February 2016 19:16 UTC kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 04:03 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 04:03 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:01 UTC kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:00 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Security-signoff-end:Friday, 05. February 2016 10:01 UTC kernel-stable-Verification-testing-end:Thursday, 18. February 2016 15:00 UTC kernel-stable-Regression-testing-end:Thursday, 18. February 2016 15:00 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:17 UTC kernel-stable-phase-changed:Monday, 22. February 2016 19:17 UTC kernel-stable-Certification-testing-end:Monday, 22. February 2016 19:17 UTC + kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1540538 Title: linux: 3.2.0-99.139 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-99.139 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 01. February 2016 19:16 UTC kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 04:03 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 04:03 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:01 UTC kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:00 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Security-signoff-end:Friday, 05. February 2016 10:01 UTC kernel-stable-Verification-testing-end:Thursday, 18. February 2016 15:00 UTC kernel-stable-Regression-testing-end:Thursday, 18. February 2016 15:00 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:17 UTC kernel-stable-phase-changed:Monday, 22. February 2016 19:17 UTC kernel-stable-Certification-testing-end:Monday, 22. February 2016 19:17 UTC kernel-stable-Promote-to-updates-end:Monday, 22. February 2016 21:45 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540538/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1540538] Re: linux: 3.2.0-99.139 -proposed tracker
linux | 3.2.0-99.139 | precise-updates | source linux-meta| 3.2.0.99.115 | precise-updates | source linux-backports-modules-3.2.0 | 3.2.0-99.91 | precise-updates | source ** Changed in: kernel-sru-workflow/promote-to-updates Status: In Progress => Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Status: In Progress => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1540538 Title: linux: 3.2.0-99.139 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-99.139 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 01. February 2016 19:16 UTC kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 04:03 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 04:03 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:01 UTC kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:00 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Security-signoff-end:Friday, 05. February 2016 10:01 UTC kernel-stable-Verification-testing-end:Thursday, 18. February 2016 15:00 UTC kernel-stable-Regression-testing-end:Thursday, 18. February 2016 15:00 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:17 UTC kernel-stable-phase-changed:Monday, 22. February 2016 19:17 UTC kernel-stable-Certification-testing-end:Monday, 22. February 2016 19:17 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540538/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1540721] Re: linux-armadaxp: 3.2.0-1662.86 -proposed tracker
linux-armadaxp | 3.2.0-1662.86 | precise-updates | source linux-meta-armadaxp | 3.2.0.1662.70 | precise-updates | source ** Changed in: kernel-sru-workflow/promote-to-updates Status: In Progress => Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Status: In Progress => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1540721 Title: linux-armadaxp: 3.2.0-1662.86 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-armadaxp source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1662.86 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:02 UTC kernel-stable-master-bug:1540538 kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 08:03 UTC kernel-stable-Security-signoff-end:Tuesday, 02. February 2016 08:03 UTC kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 10:02 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 10:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC kernel-stable-Regression-testing-end:Monday, 08. February 2016 17:00 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Monday, 22. February 2016 19:19 UTC kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:19 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540721/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1540720] Re: linux-ti-omap4: 3.2.0-1477.100 -proposed tracker
linux-ti-omap4 | 3.2.0-1477.100 | precise-updates | source linux-meta-ti-omap4 | 3.2.0.1477.72 | precise-updates | source ** Changed in: kernel-sru-workflow/promote-to-updates Status: In Progress => Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Status: In Progress => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1540720 Title: linux-ti-omap4: 3.2.0-1477.100 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1477.100 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:01 UTC kernel-stable-master-bug:1540538 kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 16:01 UTC kernel-stable-Prepare-package-end:Wednesday, 03. February 2016 00:01 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 03. February 2016 00:01 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:04 UTC kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC proposed-announcement-sent:True kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC kernel-stable-Security-signoff-end:Friday, 05. February 2016 21:00 UTC kernel-stable-Regression-testing-end:Thursday, 18. February 2016 16:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Monday, 22. February 2016 19:24 UTC kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:24 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540720/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548504] Re: linux: 3.2.0-100.140 -proposed tracker
** Summary changed: - linux: 3.2.0-99.139 -proposed tracker + linux: 3.2.0-100.140 -proposed tracker ** Description changed: - This bug is for tracking the 3.2.0-99.139 upload package. This bug will + This bug is for tracking the 3.2.0-100.140 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 20:57 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Monday, 22. February 2016 21:04 UTC kernel-stable-Promote-to-proposed-start:Monday, 22. February 2016 21:04 UTC kernel-stable-phase-changed:Monday, 22. February 2016 21:04 UTC ** Description changed: This bug is for tracking the 3.2.0-100.140 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 20:57 UTC - kernel-stable-phase:CopyToProposed - kernel-stable-Prepare-package-end:Monday, 22. February 2016 21:04 UTC - kernel-stable-Promote-to-proposed-start:Monday, 22. February 2016 21:04 UTC kernel-stable-phase-changed:Monday, 22. February 2016 21:04 UTC ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Confirmed => New ** Changed in: kernel-sru-workflow/prepare-package-meta Status: Fix Released => New ** Changed in: kernel-sru-workflow/prepare-package-lbm Status: Fix Released => New ** Changed in: kernel-sru-workflow/prepare-package Status: Fix Released => New ** Changed in: kernel-sru-workflow/automated-testing Status: Fix Released => New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548504 Title: linux: 3.2.0-100.140 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-lbm series: New Status in Kernel SRU Workflow prepare-package-meta series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: New Status in linux source package in Precise: New Bug description: This bug is for tracking the 3.2.0-100.140 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 20:57 UTC kernel-stable-phase-changed:Monday, 22. February 2016 21:04 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548504/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548505] Derivative package tracking bug
This tracking bug was opened to be worked from linux-3.2.0-99.139 update (bug 1548504) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1548505 Title: linux-ti-omap4: -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow upload-to-ppa series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-ti-omap4 package in Ubuntu: New Status in linux-ti-omap4 source package in Precise: New Bug description: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:01 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 22. February 2016 21:01 UTC kernel-stable-master-bug:1548504 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548505/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548505] [NEW] linux-ti-omap4: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:01 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 22. February 2016 21:01 UTC kernel-stable-master-bug:1548504 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: ubuntu-armel-kernel (ubuntu-armel-kernel) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: ubuntu-armel-kernel (ubuntu-armel-kernel) Status: New ** Affects: linux-ti-omap4 (Ubuntu) Importance: Medium Status: New ** Affects: linux-ti-omap4 (Ubuntu Precise) Importance: Medium Status: New ** Tags: armel block-proposed-precise kernel-release-tracking-bug precise ** Tags added: kernel-release-tracking-bug ** Tags added: armel ** Tags added: block-proposed-precise ** Also affects: linux-ti-omap4 (Ubuntu Precise) Importance: Undecided Status: New ** Tags added: precise ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Status: New => Invalid ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Status: New => Invalid ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => ubuntu-armel-kernel (ubuntu-armel-kernel) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/promote-to-proposed Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/promote-to-proposed Assignee: (unassigned) => Ubuntu Stable Release Updates Team (ubuntu-sru) ** Changed in: kernel-sru-workflow/promote-to-security Importance: Undecided => Medium ** Chan
[Kernel-packages] [Bug 1548506] [NEW] linux-armadaxp: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:02 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 22. February 2016 21:02 UTC kernel-stable-master-bug:1548504 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Hardware Enablement ARM Kernel (canonical-hwe-arm-kernel) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Hardware Enablement ARM Kernel (canonical-hwe-arm-kernel) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Hardware Enablement ARM Kernel (canonical-hwe-arm-kernel) Status: New ** Affects: linux-armadaxp (Ubuntu) Importance: Medium Status: New ** Affects: linux-armadaxp (Ubuntu Precise) Importance: Medium Status: New ** Tags: armhf block-proposed-precise kernel-release-tracking-bug precise ** Tags added: kernel-release-tracking-bug ** Tags added: armhf ** Tags added: block-proposed-precise ** Also affects: linux-armadaxp (Ubuntu Precise) Importance: Undecided Status: New ** Tags added: precise ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Status: New => Invalid ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Status: New => Invalid ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Hardware Enablement ARM Kernel (canonical-hwe-arm-kernel) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Hardware Enablement ARM Kernel (canonical-hwe-arm-kernel) ** Changed in: kernel-sru-workflow/promote-to-proposed Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/promote-to-proposed Assignee: (unassigned) => Ubuntu Stable Release Updates Team (ubuntu-sru) ** Changed in: kernel-sru-workflow/promote-to-security Importance: Undecided => M
[Kernel-packages] [Bug 1546320] Re: crash starting at kernel v3.13.0-72 in timer code
It also been brought to my attention the following about the hotfix kernel: -- Hi Eric, We have applied the update from your PPA to the controller nodes and they have been stable over the weekend. We will see if they remain stable under load over the rest of the week. Thanks -- Eric -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1546320 Title: crash starting at kernel v3.13.0-72 in timer code Status in linux package in Ubuntu: Triaged Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux source package in Trusty: Fix Committed Status in linux-lts-utopic source package in Trusty: Fix Committed Status in linux source package in Vivid: Fix Committed Bug description: Register %RAX is LIST_POISON2. [239837.578526] general protection fault: [#1] SMP ... [239837.664031] CPU: 4 PID: 0 Comm: swapper/4 Not tainted 3.13.0-74-generic #118-Ubuntu [239837.672997] Hardware name: XX [239837.685506] task: 881028dc6000 ti: 881028dce000 task.ti: 881028dce000 [239837.694280] RIP: 0010:[] [] detach_if_pending+0x34/0xb0 [239837.704179] RSP: 0018:88103fa03d10 EFLAGS: 00010002 [239837.710425] RAX: dead00200200 RBX: a01be040 RCX: 303e [239837.718778] RDX: 8810288906b8 RSI: 881028f6 RDI: a01be040 [239837.727137] RBP: 88103fa03d30 R08: 0086 R09: 881028f88000 [239837.735505] R10: 0002 R11: 0005 R12: a01be040 [239837.760360] R13: 881028f6 R14: 0001 R15: 0001 [239837.785862] FS: () GS:88103fa0() knlGS: [239837.812540] CS: 0010 DS: ES: CR0: 80050033 [239837.827508] CR2: 033d4048 CR3: 01c0e000 CR4: 001407e0 [239837.852880] Stack: [239837.863639] a01be040 881028f6 882025639a00 [239837.889101] 88103fa03d60 81075766 0086 a01be020 [239837.914247] 88103fa03d98 0100 88103fa03d88 81082369 [239837.939532] Call Trace: [239837.950648] [239837.952982] [239837.963021] [] del_timer+0x46/0x70 [239837.974969] [] try_to_grab_pending+0xa9/0x160 [239837.989674] [] mod_delayed_work_on+0x33/0x70 [239838.003709] [] set_timeout+0x3a/0x40 [ib_addr] [239838.018469] [] netevent_callback+0x29/0x30 [ib_addr] [239838.033727] [] notifier_call_chain+0x4c/0x70 [239838.047561] [] ? neigh_table_clear+0x120/0x120 [239838.062010] [] atomic_notifier_call_chain+0x1a/0x20 [239838.076485] [] call_netevent_notifiers+0x1b/0x20 [239838.090371] [] neigh_timer_handler+0xc1/0x2c0 [239838.104354] [] call_timer_fn+0x36/0x100 [239838.117021] [] ? neigh_table_clear+0x120/0x120 [239838.131002] [] run_timer_softirq+0x1ef/0x2f0 [239838.143985] [] __do_softirq+0xec/0x2c0 [239838.156386] [] irq_exit+0x105/0x110 [239838.168325] [] smp_apic_timer_interrupt+0x45/0x60 [239838.181501] [] apic_timer_interrupt+0x6d/0x80 [239838.193978] [239838.196317] [239838.203483] [] ? cpuidle_enter_state+0x52/0xc0 [239838.214553] [] cpuidle_idle_call+0xb9/0x1f0 [239838.226799] [] arch_cpu_idle+0xe/0x30 [239838.238745] [] cpu_startup_entry+0xc5/0x290 [239838.250792] [] start_secondary+0x21d/0x2d0 [239838.263165] Code: 89 e5 41 56 41 89 d6 41 55 41 54 49 89 fc 53 48 8b 17 48 85 d2 74 55 49 89 f5 0f 1f 44 00 00 49 8b 44 24 08 45 84 f6 48 89 42 08 <48> 89 10 74 08 49 c7 04 24 00 00 00 00 41 f6 44 24 18 01 48 b8 [239838.301935] RIP [] detach_if_pending+0x34/0xb0 [239838.314036] RSP To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1546320/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548504] [NEW] linux: 3.2.0-99.139 -proposed tracker
Public bug reported: This bug is for tracking the 3.2.0-99.139 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 20:57 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Monday, 22. February 2016 21:04 UTC kernel-stable-Promote-to-proposed-start:Monday, 22. February 2016 21:04 UTC kernel-stable-phase-changed:Monday, 22. February 2016 21:04 UTC ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Fix Released ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Brad Figg (brad-figg) Status: Fix Released ** Affects: kernel-sru-workflow/prepare-package-lbm Importance: Medium Assignee: Brad Figg (brad-figg) Status: Fix Released ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Brad Figg (brad-figg) Status: Fix Released ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: Confirmed ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Medium Status: New ** Affects: linux (Ubuntu Precise) Importance: Medium Status: New ** Tags: block-proposed-precise kernel-release-tracking-bug precise ** Tags added: kernel-release-tracking-bug ** Tags added: block-proposed-precise ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Tags added: precise ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-lbm Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow Status: New => In Progress ** Changed in: kernel-sru-workflow Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-lbm Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-lbm Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workfl
[Kernel-packages] [Bug 1540390] Re: Backport more recent driver for Kabylake and Broxton graphics
Added initramfs-tools because i915_bpo needs to be added to the list of modules to include. ** Also affects: initramfs-tools (Ubuntu) Importance: Undecided Status: New ** Summary changed: - Backport more recent driver for Kabylake and Broxton graphics + Backport more recent driver for SKL, KBL and BXT graphics ** Description changed: - We need to support Kabylake (KBL) and Broxton (BXT) graphics in xenial, - but the kernel driver is not fresh enough for proper support. + We need to support Skylake (SKL), Kabylake (KBL) and Broxton (BXT) + graphics in xenial, but the kernel driver is not fresh enough for proper + support. For the kernel the plan is to provide a separate driver module - (i915_bpo) like for Skylake in vivid. The drm/i915 driver in 4.4 is not - recent enough for KBL/BXT, so pulling the driver from current drm-intel- - next branch would provide what'll end up in 4.6. The i915 drivers will - be modified so that only i915_bpo loads on KBL/BXT machines, and only - there. The driver will get further updates along the way, and possibly - also rebased to a later kernel release. + (i915_bpo) like for Skylake/Broadwell/Braswell in vivid. The drm/i915 + driver in 4.4 is not recent enough for SKL/KBL/BXT, so pulling the + driver from current drm-intel-next branch would provide what'll end up + in 4.6. The i915 drivers will be modified so that only i915_bpo loads on + SKL/KBL/BXT machines, and only there. The driver will get further + updates along the way, and possibly also rebased to a later kernel + release. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1540390 Title: Backport more recent driver for SKL, KBL and BXT graphics Status in initramfs-tools package in Ubuntu: New Status in linux package in Ubuntu: In Progress Bug description: We need to support Skylake (SKL), Kabylake (KBL) and Broxton (BXT) graphics in xenial, but the kernel driver is not fresh enough for proper support. For the kernel the plan is to provide a separate driver module (i915_bpo) like for Skylake/Broadwell/Braswell in vivid. The drm/i915 driver in 4.4 is not recent enough for SKL/KBL/BXT, so pulling the driver from current drm-intel-next branch would provide what'll end up in 4.6. The i915 drivers will be modified so that only i915_bpo loads on SKL/KBL/BXT machines, and only there. The driver will get further updates along the way, and possibly also rebased to a later kernel release. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1540390/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548504] Packages available
All builds are complete, packages in this bug can be copied to -proposed. Derivative packages from packages here can be worked on, the following tracking bugs were opened for them: linux-ti-omap4 - bug 1548505 linux-armadaxp - bug 1548506 ** Changed in: kernel-sru-workflow/promote-to-proposed Status: New => Confirmed ** Description changed: This bug is for tracking the 3.2.0-99.139 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 20:57 UTC - kernel-stable-phase:Prepare - kernel-stable-phase-changed:Monday, 22. February 2016 20:57 UTC + kernel-stable-phase:CopyToProposed + kernel-stable-Prepare-package-end:Monday, 22. February 2016 21:04 UTC + kernel-stable-Promote-to-proposed-start:Monday, 22. February 2016 21:04 UTC + kernel-stable-phase-changed:Monday, 22. February 2016 21:04 UTC ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1548504 Title: linux: 3.2.0-99.139 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Confirmed Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux package in Ubuntu: New Status in linux source package in Precise: New Bug description: This bug is for tracking the 3.2.0-99.139 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 20:57 UTC kernel-stable-phase:CopyToProposed kernel-stable-Prepare-package-end:Monday, 22. February 2016 21:04 UTC kernel-stable-Promote-to-proposed-start:Monday, 22. February 2016 21:04 UTC kernel-stable-phase-changed:Monday, 22. February 2016 21:04 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548504/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1548506] Derivative package tracking bug
This tracking bug was opened to be worked from linux-3.2.0-99.139 update (bug 1548504) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1548506 Title: linux-armadaxp: -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: New Status in Kernel SRU Workflow prepare-package-meta series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow upload-to-ppa series: Invalid Status in Kernel SRU Workflow verification-testing series: New Status in linux-armadaxp package in Ubuntu: New Status in linux-armadaxp source package in Precise: New Bug description: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. February 2016 21:02 UTC kernel-stable-phase:Prepare kernel-stable-phase-changed:Monday, 22. February 2016 21:02 UTC kernel-stable-master-bug:1548504 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1548506/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1546320] Re: crash starting at kernel v3.13.0-72 in timer code
** Changed in: linux (Ubuntu Trusty) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Vivid) Status: In Progress => Fix Committed ** Also affects: linux-lts-utopic (Ubuntu) Importance: Undecided Status: New ** No longer affects: linux-lts-utopic (Ubuntu Vivid) ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux-lts-utopic (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1546320 Title: crash starting at kernel v3.13.0-72 in timer code Status in linux package in Ubuntu: Triaged Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux source package in Trusty: Fix Committed Status in linux-lts-utopic source package in Trusty: Fix Committed Status in linux source package in Vivid: Fix Committed Bug description: Register %RAX is LIST_POISON2. [239837.578526] general protection fault: [#1] SMP ... [239837.664031] CPU: 4 PID: 0 Comm: swapper/4 Not tainted 3.13.0-74-generic #118-Ubuntu [239837.672997] Hardware name: XX [239837.685506] task: 881028dc6000 ti: 881028dce000 task.ti: 881028dce000 [239837.694280] RIP: 0010:[] [] detach_if_pending+0x34/0xb0 [239837.704179] RSP: 0018:88103fa03d10 EFLAGS: 00010002 [239837.710425] RAX: dead00200200 RBX: a01be040 RCX: 303e [239837.718778] RDX: 8810288906b8 RSI: 881028f6 RDI: a01be040 [239837.727137] RBP: 88103fa03d30 R08: 0086 R09: 881028f88000 [239837.735505] R10: 0002 R11: 0005 R12: a01be040 [239837.760360] R13: 881028f6 R14: 0001 R15: 0001 [239837.785862] FS: () GS:88103fa0() knlGS: [239837.812540] CS: 0010 DS: ES: CR0: 80050033 [239837.827508] CR2: 033d4048 CR3: 01c0e000 CR4: 001407e0 [239837.852880] Stack: [239837.863639] a01be040 881028f6 882025639a00 [239837.889101] 88103fa03d60 81075766 0086 a01be020 [239837.914247] 88103fa03d98 0100 88103fa03d88 81082369 [239837.939532] Call Trace: [239837.950648] [239837.952982] [239837.963021] [] del_timer+0x46/0x70 [239837.974969] [] try_to_grab_pending+0xa9/0x160 [239837.989674] [] mod_delayed_work_on+0x33/0x70 [239838.003709] [] set_timeout+0x3a/0x40 [ib_addr] [239838.018469] [] netevent_callback+0x29/0x30 [ib_addr] [239838.033727] [] notifier_call_chain+0x4c/0x70 [239838.047561] [] ? neigh_table_clear+0x120/0x120 [239838.062010] [] atomic_notifier_call_chain+0x1a/0x20 [239838.076485] [] call_netevent_notifiers+0x1b/0x20 [239838.090371] [] neigh_timer_handler+0xc1/0x2c0 [239838.104354] [] call_timer_fn+0x36/0x100 [239838.117021] [] ? neigh_table_clear+0x120/0x120 [239838.131002] [] run_timer_softirq+0x1ef/0x2f0 [239838.143985] [] __do_softirq+0xec/0x2c0 [239838.156386] [] irq_exit+0x105/0x110 [239838.168325] [] smp_apic_timer_interrupt+0x45/0x60 [239838.181501] [] apic_timer_interrupt+0x6d/0x80 [239838.193978] [239838.196317] [239838.203483] [] ? cpuidle_enter_state+0x52/0xc0 [239838.214553] [] cpuidle_idle_call+0xb9/0x1f0 [239838.226799] [] arch_cpu_idle+0xe/0x30 [239838.238745] [] cpu_startup_entry+0xc5/0x290 [239838.250792] [] start_secondary+0x21d/0x2d0 [239838.263165] Code: 89 e5 41 56 41 89 d6 41 55 41 54 49 89 fc 53 48 8b 17 48 85 d2 74 55 49 89 f5 0f 1f 44 00 00 49 8b 44 24 08 45 84 f6 48 89 42 08 <48> 89 10 74 08 49 c7 04 24 00 00 00 00 41 f6 44 24 18 01 48 b8 [239838.301935] RIP [] detach_if_pending+0x34/0xb0 [239838.314036] RSP To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1546320/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1536837] Re: Severe performance regression in Infiniband or IPoIB
** Changed in: linux (Ubuntu) Status: Incomplete => Triaged -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1536837 Title: Severe performance regression in Infiniband or IPoIB Status in linux package in Ubuntu: Triaged Bug description: When upgrading to the latest 4.4 test kernel from mainline development, all IPoIB links showed a severe performance regression as compared with kernel 4.2. The bandwidth of each link dropped from around 3Gbps to around 3Mbps (3 orders of magnitude worse!); reverting to the 4.2 kernel immediately fixed this problem. The 4.3 kernel from Debian does not appear to suffer from this regression. The regression shows up on both IB ports of the Mellanox MT25208 controller. Other hardware has not been tested. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1536837/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1546177] Re: CVE-2016-2384
** Changed in: linux (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed ** Changed in: linux (Ubuntu Vivid) Status: New => Fix Committed ** Changed in: linux (Ubuntu Wily) Status: New => Fix Committed ** Changed in: linux-lts-utopic (Ubuntu Trusty) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1546177 Title: CVE-2016-2384 Status in linux package in Ubuntu: New Status in linux-armadaxp package in Ubuntu: Invalid Status in linux-ec2 package in Ubuntu: New Status in linux-flo package in Ubuntu: New Status in linux-fsl-imx51 package in Ubuntu: Invalid Status in linux-goldfish package in Ubuntu: New Status in linux-lts-backport-maverick package in Ubuntu: New Status in linux-lts-backport-natty package in Ubuntu: New Status in linux-lts-quantal package in Ubuntu: Invalid Status in linux-lts-raring package in Ubuntu: Invalid Status in linux-lts-saucy package in Ubuntu: Invalid Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-wily package in Ubuntu: Invalid Status in linux-lts-xenial package in Ubuntu: Invalid Status in linux-mako package in Ubuntu: New Status in linux-manta package in Ubuntu: New Status in linux-mvl-dove package in Ubuntu: New Status in linux-raspi2 package in Ubuntu: New Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux source package in Precise: Fix Committed Status in linux-armadaxp source package in Precise: New Status in linux-ec2 source package in Precise: New Status in linux-flo source package in Precise: Invalid Status in linux-fsl-imx51 source package in Precise: Invalid Status in linux-goldfish source package in Precise: Invalid Status in linux-lts-backport-maverick source package in Precise: New Status in linux-lts-backport-natty source package in Precise: New Status in linux-lts-quantal source package in Precise: Invalid Status in linux-lts-raring source package in Precise: Invalid Status in linux-lts-saucy source package in Precise: Invalid Status in linux-lts-trusty source package in Precise: New Status in linux-lts-utopic source package in Precise: Invalid Status in linux-lts-vivid source package in Precise: Invalid Status in linux-lts-wily source package in Precise: Invalid Status in linux-lts-xenial source package in Precise: Invalid Status in linux-mako source package in Precise: Invalid Status in linux-manta source package in Precise: Invalid Status in linux-mvl-dove source package in Precise: New Status in linux-raspi2 source package in Precise: Invalid Status in linux-ti-omap4 source package in Precise: New Status in linux source package in Trusty: Fix Committed Status in linux-armadaxp source package in Trusty: Invalid Status in linux-ec2 source package in Trusty: New Status in linux-flo source package in Trusty: Invalid Status in linux-fsl-imx51 source package in Trusty: Invalid Status in linux-goldfish source package in Trusty: Invalid Status in linux-lts-backport-maverick source package in Trusty: New Status in linux-lts-backport-natty source package in Trusty: New Status in linux-lts-quantal source package in Trusty: Invalid Status in linux-lts-raring source package in Trusty: Invalid Status in linux-lts-saucy source package in Trusty: Invalid Status in linux-lts-trusty source package in Trusty: Invalid Status in linux-lts-utopic source package in Trusty: Fix Committed Status in linux-lts-vivid source package in Trusty: New Status in linux-lts-wily source package in Trusty: New Status in linux-lts-xenial source package in Trusty: New Status in linux-mako source package in Trusty: Invalid Status in linux-manta source package in Trusty: Invalid Status in linux-mvl-dove source package in Trusty: New Status in linux-raspi2 source package in Trusty: Invalid Status in linux-ti-omap4 source package in Trusty: Invalid Status in linux source package in Vivid: Fix Committed Status in linux-armadaxp source package in Vivid: New Status in linux-ec2 source package in Vivid: New Status in linux-flo source package in Vivid: New Status in linux-fsl-imx51 source package in Vivid: New Status in linux-goldfish source package in Vivid: New Status in linux-lts-backport-maverick source package in Vivid: New Status in linux-lts-backport-natty source package in Vivid: New Status in linux-lts-quantal source package in Vivid: New Status in linux-lts-raring source package in Vivid: New Status in linux-lts-saucy source package in Vivid: New Status in linux-lts-trusty source package in Vivid: New Status in linux-lts-utopic source package in Vivid: New Sta
[Kernel-packages] [Bug 1535150] Re: overlayfs over fuse should refuse copy_up of files if uid/gid not mapped
** Tags added: patch -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1535150 Title: overlayfs over fuse should refuse copy_up of files if uid/gid not mapped Status in linux package in Ubuntu: Confirmed Status in linux source package in Trusty: Fix Released Status in linux source package in Vivid: Fix Released Status in linux source package in Wily: Fix Released Status in linux source package in Xenial: Confirmed Bug description: On Ubuntu Wily it is possible to place an USERNS overlayfs mount over a fuse mount. The fuse filesystem may contain SUID binaries, but those cannot be executed due to nosuid mount options. But when touching such an SUID binary via overlayfs mount, this will trigger copy_up including all file attributes, thus creating a real SUID binary on the disk. Sequence: * Mount fuse filesystem exposing one world writable SUID binary * Create USERNS * Mount overlayfs on top of fuse * open the SUID binary RDWR in overlayfs, thus triggering copy_up Afterwards the SUID binary can be invoked to gain root privileges. For additional information, test tool see http://www.halfdog.net/Security/2016/OverlayfsOverFusePrivilegeEscalation/ (InvitedOnly/3YD9ufze) and attached sharing policy. $ lsb_release -rd Description:Ubuntu 15.10 Release:15.10 $ apt-cache policy linux-image-4.2.0-23-generic linux-image-4.2.0-23-generic: Installed: 4.2.0-23.28 Candidate: 4.2.0-23.28 Version table: *** 4.2.0-23.28 0 500 http://archive.ubuntu.com/ubuntu/ wily-updates/main amd64 Packages 500 http://archive.ubuntu.com/ubuntu/ wily-security/main amd64 Packages 100 /var/lib/dpkg/status To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1535150/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1540538] Re: linux: 3.2.0-99.139 -proposed tracker
** Changed in: linux (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1540538 Title: linux: 3.2.0-99.139 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-lbm series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: In Progress Status in Kernel SRU Workflow promote-to-updates series: In Progress Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-99.139 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 01. February 2016 19:16 UTC kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 04:03 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 04:03 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:01 UTC kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:00 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:00 UTC kernel-stable-Security-signoff-end:Friday, 05. February 2016 10:01 UTC kernel-stable-Verification-testing-end:Thursday, 18. February 2016 15:00 UTC kernel-stable-Regression-testing-end:Thursday, 18. February 2016 15:00 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:17 UTC kernel-stable-phase-changed:Monday, 22. February 2016 19:17 UTC kernel-stable-Certification-testing-end:Monday, 22. February 2016 19:17 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540538/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1540720] Re: linux-ti-omap4: 3.2.0-1477.100 -proposed tracker
** Changed in: kernel-sru-workflow/upload-to-ppa Status: New => Fix Released ** Changed in: linux-ti-omap4 (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4 in Ubuntu. https://bugs.launchpad.net/bugs/1540720 Title: linux-ti-omap4: 3.2.0-1477.100 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: In Progress Status in Kernel SRU Workflow promote-to-updates series: In Progress Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow upload-to-ppa series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-ti-omap4 package in Ubuntu: Invalid Status in linux-ti-omap4 source package in Precise: Fix Released Bug description: This bug is for tracking the 3.2.0-1477.100 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 04:01 UTC kernel-stable-master-bug:1540538 kernel-stable-Certification-testing-end:Tuesday, 02. February 2016 16:01 UTC kernel-stable-Prepare-package-end:Wednesday, 03. February 2016 00:01 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 03. February 2016 00:01 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:04 UTC kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC proposed-announcement-sent:True kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:04 UTC kernel-stable-Security-signoff-end:Friday, 05. February 2016 21:00 UTC kernel-stable-Regression-testing-end:Thursday, 18. February 2016 16:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Monday, 22. February 2016 19:24 UTC kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 19:24 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540720/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1540792] Re: linux-lts-vivid: 3.19.0-50.56~14.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad (adconrad) ** Changed in: linux-lts-vivid (Ubuntu Trusty) Status: New => Fix Released ** Changed in: kernel-sru-workflow/verification-testing Status: In Progress => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-vivid in Ubuntu. https://bugs.launchpad.net/bugs/1540792 Title: linux-lts-vivid: 3.19.0-50.56~14.04.1 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-lts-vivid package in Ubuntu: Invalid Status in linux-lts-vivid source package in Trusty: Fix Released Bug description: This bug is for tracking the 3.19.0-50.56~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 08:00 UTC kernel-stable-master-bug:1540576 kernel-stable-Prepare-package-end:Thursday, 04. February 2016 21:02 UTC kernel-stable-Promote-to-proposed-start:Thursday, 04. February 2016 21:02 UTC kernel-stable-Promote-to-proposed-end:Friday, 05. February 2016 05:02 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Friday, 05. February 2016 07:01 UTC kernel-stable-Verification-testing-start:Friday, 05. February 2016 07:01 UTC kernel-stable-Certification-testing-start:Friday, 05. February 2016 07:01 UTC kernel-stable-Security-signoff-start:Friday, 05. February 2016 07:01 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 05. February 2016 07:01 UTC kernel-stable-Security-signoff-end:Friday, 05. February 2016 21:01 UTC kernel-stable-Regression-testing-end:Thursday, 18. February 2016 01:01 UTC kernel-stable-Certification-testing-end:Thursday, 18. February 2016 03:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540792/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1540752] Re: linux-lts-trusty: 3.13.0-78.122~precise1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad (adconrad) ** Changed in: linux-lts-trusty (Ubuntu Precise) Status: New => Fix Released ** Changed in: kernel-sru-workflow/verification-testing Status: In Progress => Fix Released ** Changed in: linux-lts-trusty (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-trusty in Ubuntu. https://bugs.launchpad.net/bugs/1540752 Title: linux-lts-trusty: 3.13.0-78.122~precise1 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-lts-trusty package in Ubuntu: Invalid Status in linux-lts-trusty source package in Precise: Fix Released Bug description: This bug is for tracking the 3.13.0-78.122~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 06:02 UTC kernel-stable-master-bug:1540559 kernel-stable-Prepare-package-end:Wednesday, 03. February 2016 04:02 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 03. February 2016 04:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:04 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Friday, 05. February 2016 00:05 UTC kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:05 UTC kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:05 UTC kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:05 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:05 UTC kernel-stable-Security-signoff-end:Friday, 05. February 2016 21:01 UTC kernel-stable-Regression-testing-end:Thursday, 18. February 2016 16:02 UTC kernel-stable-Certification-testing-end:Monday, 22. February 2016 04:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540752/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1540576] Re: linux: 3.19.0-50.56 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad (adconrad) ** Changed in: linux (Ubuntu) Status: New => Invalid ** Changed in: kernel-sru-workflow/automated-testing Status: Incomplete => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1540576 Title: linux: 3.19.0-50.56 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Vivid: Fix Released Bug description: This bug is for tracking the 3.19.0-50.56 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 01. February 2016 20:42 UTC kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 08:02 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 08:02 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:02 UTC kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:03 UTC kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:03 UTC kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:03 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:03 UTC kernel-stable-Security-signoff-end:Friday, 05. February 2016 11:00 UTC kernel-stable-Regression-testing-end:Thursday, 18. February 2016 01:00 UTC kernel-stable-phase:Testing kernel-stable-phase-changed:Thursday, 18. February 2016 16:01 UTC kernel-stable-Verification-testing-end:Thursday, 18. February 2016 16:01 UTC kernel-stable-Certification-testing-end:Friday, 19. February 2016 10:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540576/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1541076] Re: linux-lts-utopic: 3.16.0-61.81~14.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => Fix Released ** Changed in: kernel-sru-workflow/automated-testing Status: Incomplete => Fix Released ** Changed in: kernel-sru-workflow/verification-testing Status: In Progress => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-lts-utopic in Ubuntu. https://bugs.launchpad.net/bugs/1541076 Title: linux-lts-utopic: 3.16.0-61.81~14.04.1 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-lts-utopic package in Ubuntu: Invalid Status in linux-lts-utopic source package in Trusty: Fix Released Bug description: This bug is for tracking the 3.16.0-61.81~14.04.1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Tuesday, 02. February 2016 19:14 UTC kernel-stable-Prepare-package-end:Thursday, 04. February 2016 23:03 UTC kernel-stable-Promote-to-proposed-start:Thursday, 04. February 2016 23:03 UTC kernel-stable-Promote-to-proposed-end:Friday, 05. February 2016 13:25 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Friday, 05. February 2016 15:03 UTC kernel-stable-Verification-testing-start:Friday, 05. February 2016 15:03 UTC kernel-stable-Certification-testing-start:Friday, 05. February 2016 15:03 UTC kernel-stable-Security-signoff-start:Friday, 05. February 2016 15:03 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 05. February 2016 15:03 UTC kernel-stable-Security-signoff-end:Friday, 05. February 2016 23:02 UTC kernel-stable-Certification-testing-end:Tuesday, 16. February 2016 10:02 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1541076/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1542188] Re: Adaptive keyboard breaks with sleep/resume
This kernel (88867e3d0b7eea256c1cd432b0a3c7a21e8edf07) exhibits the bug. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1542188 Title: Adaptive keyboard breaks with sleep/resume Status in linux package in Ubuntu: In Progress Status in linux source package in Xenial: In Progress Bug description: I have a Lenovo X1 Carbon Gen2. It as the adaptive row of keys that change from function keys to volume, etc when you toggle the function key. It's always worked fine but with this kernel, after a few sleep/resumes, the entire row will go black. If I reboot it will return to normal. dmesg throws a bunch of these.. [29190.142959] thinkpad_acpi: EC reports that Thermal Table has changed [30910.489925] thinkpad_acpi: unknown possible thermal alarm or keyboard event received [30910.489931] thinkpad_acpi: unhandled HKEY event 0x60c0 [30910.489932] thinkpad_acpi: please report the conditions when this event happened to ibm-acpi-de...@lists.sourceforge.net [30911.439252] thinkpad_acpi: unknown possible thermal alarm or keyboard event received [30911.439258] thinkpad_acpi: unhandled HKEY event 0x60c0 though I'm not sure it's the cause of the failure. ProblemType: Bug DistroRelease: Ubuntu 16.04 Package: linux-image-4.4.0-2-generic 4.4.0-2.16 ProcVersionSignature: Ubuntu 4.4.0-2.16-generic 4.4.0 Uname: Linux 4.4.0-2-generic x86_64 NonfreeKernelModules: zfs zunicode zcommon znvpair zavl ApportVersion: 2.19.4-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: dean 3316 F pulseaudio /dev/snd/controlC0: dean 3316 F pulseaudio CurrentDesktop: Unity Date: Fri Feb 5 08:34:46 2016 HibernationDevice: RESUME=UUID=5ce0185d-e833-4337-9655-9be9fcac3654 InstallationDate: Installed on 2015-11-03 (93 days ago) InstallationMedia: Ubuntu 15.10 "Wily Werewolf" - Release amd64 (20151021) MachineType: LENOVO 20A7002QUS ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-4.4.0-2-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-4.4.0-2-generic N/A linux-backports-modules-4.4.0-2-generic N/A linux-firmware 1.155 SourcePackage: linux UpgradeStatus: Upgraded to xenial on 2015-12-07 (59 days ago) dmi.bios.date: 11/04/2015 dmi.bios.vendor: LENOVO dmi.bios.version: GRET46WW (1.23 ) dmi.board.asset.tag: Not Available dmi.board.name: 20A7002QUS dmi.board.vendor: LENOVO dmi.board.version: SDK0E50510 Pro dmi.chassis.asset.tag: No Asset Information dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Not Available dmi.modalias: dmi:bvnLENOVO:bvrGRET46WW(1.23):bd11/04/2015:svnLENOVO:pn20A7002QUS:pvrThinkPadX1Carbon2nd:rvnLENOVO:rn20A7002QUS:rvrSDK0E50510Pro:cvnLENOVO:ct10:cvrNotAvailable: dmi.product.name: 20A7002QUS dmi.product.version: ThinkPad X1 Carbon 2nd dmi.sys.vendor: LENOVO To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1542188/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1543167] Re: linux: 4.2.0-29.34 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed => Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-updates Status: Confirmed => Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad (adconrad) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1543167 Title: linux: 4.2.0-29.34 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Wily: Fix Released Bug description: This bug is for tracking the 4.2.0-29.34 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 08. February 2016 15:19 UTC kernel-stable-Prepare-package-end:Tuesday, 09. February 2016 10:45 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 09. February 2016 10:45 UTC kernel-stable-Promote-to-proposed-end:Tuesday, 09. February 2016 18:34 UTC kernel-stable-Verification-testing-start:Tuesday, 09. February 2016 20:01 UTC kernel-stable-Certification-testing-start:Tuesday, 09. February 2016 20:01 UTC kernel-stable-Security-signoff-start:Tuesday, 09. February 2016 20:02 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Tuesday, 09. February 2016 20:01 UTC kernel-stable-Security-signoff-end:Wednesday, 10. February 2016 16:01 UTC kernel-stable-Regression-testing-end:Thursday, 18. February 2016 01:01 UTC kernel-stable-Verification-testing-end:Thursday, 18. February 2016 16:02 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Monday, 22. February 2016 10:01 UTC kernel-stable-phase-changed:Monday, 22. February 2016 10:01 UTC kernel-stable-Certification-testing-end:Monday, 22. February 2016 10:01 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1543167/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1540559] Re: linux: 3.13.0-78.122 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad (adconrad) ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid ** Changed in: kernel-sru-workflow/verification-testing Status: In Progress => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1540559 Title: linux: 3.13.0-78.122 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux package in Ubuntu: Invalid Status in linux source package in Trusty: Fix Released Bug description: This bug is for tracking the 3.13.0-78.122 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 01. February 2016 20:01 UTC kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 06:03 UTC kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 06:03 UTC kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:02 UTC kernel-stable-phase:Verification & Testing kernel-stable-phase-changed:Friday, 05. February 2016 00:02 UTC kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:02 UTC kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:02 UTC kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:02 UTC proposed-announcement-sent:True kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:02 UTC kernel-stable-Security-signoff-end:Friday, 05. February 2016 11:00 UTC kernel-stable-Certification-testing-end:Wednesday, 17. February 2016 10:00 UTC kernel-stable-Regression-testing-end:Thursday, 18. February 2016 01:00 UTC To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1540559/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp