Nevermind, closing. I can't reproduce this anymore, so it was probably
not related to the kernel version.
** Changed in: linux (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Description changed:
[Impact]
- CONFIG_NUMA_BALANCING and CONFIG_NUMA_BALANCING_DEFAULT_ENABLED were both set
to =y in hwe-x/hwe-y. This changed to =n in hwe-z, unintentionally as far as I
can tell. This can lead to performance degradation on NUMA-based arm64 systems
when processes
** Changed in: linux (Ubuntu)
Status: Incomplete => Invalid
** Changed in: ubuntu-power-systems
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Also affects: ubuntu-power-systems
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1689360
Title:
TCMU: Fix possible overwrite of
Good to see that it was a BIOS tweakable setting that could fix this.
BTW, the FADT is an ACPI table "Fixed ACPI Description Table" that
contains setting mainly for power management as well as other hardware
resources. See: http://wiki.osdev.org/FADT
--
You received this bug notification
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Affects: kernel-sru-workflow
Hi Kai-Heng,
Unfortunately there was no change in the behavior. Thanks for the effort
though.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1683277
Title:
Mute key LED does not work
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1645056/+attachment/4877465/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
The above are logs of my system booting with 4.4.0-75-generic. And the
kern.log shows something related to drm on skylake:
1 May 16 08:26:41 mtlb kernel: [238539.431888] [ cut here
]
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1645056/+attachment/4877466/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Changed in: linux (Ubuntu Xenial)
Assignee: Canonical Kernel (canonical-kernel) => Kleber Sacilotto de Souza
(kleber-souza)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1682871
** Also affects: ubuntu-power-systems
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1689980
Title:
AACRAID for power9 platform
Status in
--- Comment From b...@us.ibm.com 2017-05-16 10:48 EDT---
Can a test kernel be built for the two fixes that did get merged upstream?
target: Fix VERIFY_16 handling in sbc_parse_cdb
https://patchwork.kernel.org/patch/9643687/
target: Add WRITE_VERIFY_16
** Changed in: linux (Ubuntu Zesty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1689661
Title:
No PMU support for ACPI-based arm64 systems
** Changed in: linux (Ubuntu Zesty)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1689856
Title:
perf: qcom: Add L3 cache PMU driver
Status
** Changed in: linux (Ubuntu Zesty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1688259
Title:
kernel-wedge fails in artful due to
** Changed in: linux (Ubuntu Zesty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1688132
Title:
Support IPMI system interface on Cavium
** Changed in: linux (Ubuntu Zesty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1664312
Title:
Update ENA driver to 1.1.2 from
** Changed in: linux-hwe-edge (Ubuntu Zesty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1674838
Title:
kernel BUG at /build/linux-
Public bug reported:
Not Provided
ProblemType: Package
DistroRelease: Ubuntu 16.10
Package: linux-signed-image-4.8.0-52-generic 4.8.0-52.55
ProcVersionSignature: Ubuntu 4.8.0-49.52-generic 4.8.17
Uname: Linux 4.8.0-49-generic x86_64
ApportVersion: 2.20.3-0ubuntu8.2
Architecture: amd64
Date: Tue
This bug was fixed in the package qemu - 1:2.5+dfsg-5ubuntu10.13
---
qemu (1:2.5+dfsg-5ubuntu10.13) xenial; urgency=medium
* debian/patches/ubuntu/vvfat-fix-volume-name-assertion.patch:
Fix the volume name assertion in vvfat rw mode (LP: #1684239)
qemu
The verification of the Stable Release Update for qemu has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
+
+ backports:
This bug was fixed in the package cloud-init -
0.7.9-113-g513e99e0-0ubuntu1~16.10.1
---
cloud-init (0.7.9-113-g513e99e0-0ubuntu1~16.10.1) yakkety; urgency=medium
* debian/update-grub-legacy-ec2: fix early exit failure no /etc/fstab
file. (LP: #1682160)
* New upstream
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1691318
Title:
package
This bug was fixed in the package cloud-init -
0.7.9-113-g513e99e0-0ubuntu1~16.04.1
---
cloud-init (0.7.9-113-g513e99e0-0ubuntu1~16.04.1) xenial-proposed;
urgency=medium
* debian/update-grub-legacy-ec2: fix early exit failure no /etc/fstab
file. (LP: #1682160)
* New upstream
The verification of the Stable Release Update for cloud-init has
completed successfully and the package has now been released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
This bug was fixed in the package cloud-init -
0.7.9-113-g513e99e0-0ubuntu1~17.04.1
---
cloud-init (0.7.9-113-g513e99e0-0ubuntu1~17.04.1) zesty; urgency=medium
* debian/update-grub-legacy-ec2: fix early exit failure no /etc/fstab
file. (LP: #1682160)
* New upstream snapshot.
Can you use latest mainline list and latest linux-firmware? If this
issue still happens, please attach output of `journalctl -b`.
** Changed in: linux (Ubuntu)
Status: Expired => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is
** Tags removed: need-duplicate-check
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1691169
Title:
package linux-image-4.10.0-21-generic (not installed) failed to
install/upgrade:
Public bug reported:
Crash
ProblemType: Package
DistroRelease: Ubuntu 17.04
Package: linux-image-4.10.0-21-generic (not installed)
ProcVersionSignature: Ubuntu 4.10.0-20.22-generic 4.10.8
Uname: Linux 4.10.0-20-generic x86_64
NonfreeKernelModules: wl
ApportVersion: 2.20.4-0ubuntu4
Architecture:
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: 1691181
derivatives:
Thanks for the update. It's probably best for us to perform a bisect to
identify the commit that introduced this.
It sounds like 4.4.0-72 did not exhibit the bug. To perform the bisect,
we need to identify the last good version and the first bad version.
Can you test 4.4.0-75? It can be
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1691174
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
+
+ backports: 1691181
+
This has been fixed upstream by the following commit:
commit 62a6cfddcc0a5313e7da3e8311ba16226fe0ac10
Author: Sachin Prabhu
Date: Sun Apr 16 20:37:24 2017 +0100
cifs: Do not send echoes before Negotiate is complete
It has been cc'd to upstream stable and has landed in
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1691174
Title:
Kernel 4.4.0-64 fails to provide /dev/dri/card0 for
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1691169
Title:
package
** Tags removed: need-duplicate-check
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1691161
Title:
package linux-signed-image-4.8.0-52-generic 4.8.0-52.55 failed to
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
Public bug reported:
After upgrading from 4.4.0-63 to 4.4.0-64, X.org will no longer load my
Radeon card and I am presented with a low-res fallback desktop.
Reverting to the 4.4.0-63 kernel restores ability of X.org to load the
Radeon driver.
I receive the following message in Xorg.0.log:
[
@Andrey Vertexx, the Xenial kernel is now at 4.4.0-78. Can you apply
the latest updates and see if the bug still exists? Since you are the
original bug reporter, if the latest updates resolves the bug for you,
it might be best to open new bugs for others.
--
You received this bug notification
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1691174/+attachment/4877693/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1691174/+attachment/4877687/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "ProcEnviron.txt"
https://bugs.launchpad.net/bugs/1691174/+attachment/4877692/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1691174/+attachment/4877689/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1691174
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1691174/+attachment/4877690/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1691174
apport information
** Attachment added: "JournalErrors.txt"
https://bugs.launchpad.net/bugs/1691174/+attachment/4877688/+files/JournalErrors.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Tags added: apport-collected xenial
** Description changed:
After upgrading from 4.4.0-63 to 4.4.0-64, X.org will no longer load my
Radeon card and I am presented with a low-res fallback desktop.
Reverting to the 4.4.0-63 kernel restores ability of X.org to load the
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1691174/+attachment/4877691/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1691174/+attachment/4877694/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Changed in: linux (Ubuntu)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Joseph Salisbury (jsalisbury)
** Also affects: linux (Ubuntu Zesty)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Artful)
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1691174/+attachment/4877697/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1691174/+attachment/4877696/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1691174/+attachment/4877695/+files/PulseList.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Hello,
The problem continue.
How can add the tag?
kernel-bug-exists-upstream
Thanks,
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Hi,
This is what I get now when I try the dev package from:
https://launchpad.net/ubuntu/zesty/amd64/gnome-settings-
daemon/3.24.2-0ubuntu0.1
sudo dpkg -i gnome-settings-daemon_3.24.2-0ubuntu0.1_amd64.deb
[sudo] password for ubuntu:
(Reading database ... 354908 files and directories
We need to backport the patch for the kernels with older versions of the
driver. Can you please describe the steps to reproduce and test the
issue?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Here is a 4 steps procedures that worked on AB350 Gaming 3 Ryzen 1600
(F4 bios) to get 17.04 with all cores and threads
1)Ubuntu 17.04 install from usb bootable drive with acpi=off (press F6
when display menu)
2)log in and install sudo dpk -i *deb the kernel compiled by nextized worked:
Patches are in linux-next:
5d3a0880787b scsi: aacraid: Remove __GFP_DMA for raw srb memory
96a580fcd745 scsi: aacraid: Fix DMAR issues with iommu=pt
7ad76ab57203 scsi: aacraid: Added 32 and 64 queue depth for arc natives
db62b8248626 scsi: aacraid: Set correct Queue Depth for HBA1000 RAW disks
** Also affects: linux-azure (Ubuntu)
Importance: Undecided
Status: New
** No longer affects: linux-azure (Ubuntu Yakkety)
** No longer affects: linux-azure (Ubuntu Zesty)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
Hi,
Running 64-bit Ubuntu 16.04 on a new quietpc "sentinel" fanless pc with
a 256GB Samsung PM961 Polaris NVMe M.2 SSD.
Came back to my set-up this lunchtime and found that the screen had
frozen - first ever crash in 7 years of using ubuntu!
Did Ctrl+Alt+F4 to get to a terminal and got this
** Changed in: linux (Ubuntu Zesty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1688114
Title:
arm64/ACPI support for SBSA watchdog
Hey Kai-Heng,
Sorry for the late reply - we moved house and it was chaotic. Still is
:)
To try to answer your question: I've got Zesty installed, and the issue is
still happening. I need to sudo service network-manager restart every so
often to get the data flowing.
Be sure to let me know if
Did this issue start happening after an update/upgrade? Was there a
prior kernel version where you were not having this particular problem?
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.12
** Tags removed: need-duplicate-check
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1691292
Title:
package linux-image-4.10.0-21-generic (not installed) failed to
install/upgrade:
Public bug reported:
Freezing of Ubuntu (Zesty) Software Center while installing Kdenlive
video program.
ProblemType: Package
DistroRelease: Ubuntu 17.04
Package: linux-image-4.10.0-21-generic (not installed)
ProcVersionSignature: Ubuntu 4.10.0-20.22-generic 4.10.8
Uname: Linux 4.10.0-20-generic
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation
(LP: #1687107)
- rose: limit sk_filter
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation
(LP: #1687107)
- rose: limit sk_filter
*** This bug is a duplicate of bug 1687718 ***
https://bugs.launchpad.net/bugs/1687718
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux
This bug was fixed in the package linux-hwe - 4.8.0-52.55~16.04.1
---
linux-hwe (4.8.0-52.55~16.04.1) xenial; urgency=low
* linux-hwe: 4.8.0-52.55~16.04.1 -proposed tracker (LP: #1686978)
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid
This bug was fixed in the package linux-hwe - 4.8.0-52.55~16.04.1
---
linux-hwe (4.8.0-52.55~16.04.1) xenial; urgency=low
* linux-hwe: 4.8.0-52.55~16.04.1 -proposed tracker (LP: #1686978)
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation
(LP: #1687107)
- rose: limit sk_filter
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1686414
Title:
linux: 4.10.0-21.23
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation
(LP: #1687107)
- rose: limit sk_filter
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation
(LP: #1687107)
- rose: limit sk_filter
--- Comment From vipar...@in.ibm.com 2017-05-16 07:07 EDT---
Commit c950fd6f20 ("pstore: Split pstore fragile flags") is
available in kernel 4.9 and above, while commit
041939c1ec ("pstore: Fix flags to enable dumps on powerpc")
would get into 4.12, so need to be pulled into kernel version
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1686651
Title:
linux-aws:
I suspect that wouldn't work, for one reason or another. The upstream
one has more features, probably.
I'd rather just keep this Debian-specific. The initramfs script is
likely to have distro specific code. I don't see the idea of one unified
script working out well.
--
You received this bug
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on
--- Comment on attachment From thiag...@br.ibm.com 2017-04-06 14:11
EDT---
I'm not sure I understood the question. All of the patches are backports.
These are the files that had conflicts:
block/blk-cgroup.c
block/blk-core.c
block/blk-settings.c
block/blk-sysfs.c
block/blk-wbt.c
1 - 100 of 240 matches
Mail list logo