** Tags removed: verification-needed-bionic verification-needed-focal
** Tags added: verification-done-bionic verification-done-focal
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1882039
Title:
** Tags removed: verification-needed-eoan
** Tags added: verification-done-eoan
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1882039
Title:
The thread level parallelism would be a bottleneck when
** Also affects: linux (Ubuntu Eoan)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Focal)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
--
You received this bug notification because
modification is only in replacing the write lock to a read one. And
there is no modification inside the loop. The regression probability is
low.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Gavin Guo (mimi0213kimo)
Status: New
** Tags: sts
--
You received this bug noti
Hi Joshua,
I just reviewed the commit Joseph provided in the launchpad. It's the
same as the two patches I backported.
eb4c2382272a srcu: Lock srcu_data structure in srcu_gp_start()
d633198088bd srcu: Prohibit call_srcu() use under raw spinlocks
The commit id eb4c2382272a is the latest
** Changed in: linux (Ubuntu Xenial)
Assignee: Guilherme G. Piccoli (gpiccoli) => Gavin Guo (mimi0213kimo)
** Changed in: linux (Ubuntu)
Assignee: Guilherme G. Piccoli (gpiccoli) => Gavin Guo (mimi0213kimo)
--
You received this bug notification because you are a member of Ubunt
** Tags removed: verification-needed-bionic verification-needed-cosmic
verification-needed-xenial
** Tags added: verification-done-bionic verification-done-cosmic
verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
** Description changed:
- [267265.140511] BUG: unable to handle kernel NULL pointer dereference at
0020
- [267265.144406] IP: xfrm_lookup+0x31/0x870
- [267265.146224] PGD 0 P4D 0
- [267265.147469] Oops: [#1] SMP PTI
- [267265.149141] Modules linked in: xt_iprange xt_nat
Assignee: Gavin Guo (mimi0213kimo)
Status: Incomplete
** Tags: bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1801878
Title:
NULL pointer dereference at 0020 when
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791286
Title:
The VM hang happens because of pending interrupts
** Description changed:
- VM hang because of pening interrups not reinjected.
+ [Impact]
+
+ After the VM(Guest OS is Windows Server 2012R2) has been live-migrated
+ several times, the screen is blacked out or freeze when the VM is
+ connected via VNC.
+
+ The Windows Guest OS Server has been
Public bug reported:
VM hang because of pening interrups not reinjected.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Gavin Guo (mimi0213kimo)
Status: Incomplete
** Tags: sts
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1775326
Title:
The kernel NULL pointer dereference happens when
** Summary changed:
- The kernel NULL pointer dereference happens when accessing the task by
task_cpu() in function cpuacct_charge()
+ The kernel NULL pointer dereference happens when accessing the task_struct by
task_cpu() in function cpuacct_charge()
--
You received this bug notification
by the Qemu and cannot be reproduced.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Gavin Guo (mimi0213kimo)
Status: Incomplete
** Tags: sts xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to U
** Attachment added: "kern.log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1771480/+attachment/5140100/+files/kern.log
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1771480
Title:
This occurred during the deployment of the DPDK compute. The DPDK was
not deployed. The bond0 and bond1 configuration appears to have failed.
---8<---
Preliminary analysis: the LRO appears to be off after the kernel traces,
despite the message. I am inquiring as to the nature of
Public bug reported:
I have multiple instances of this dev_disable_lro error in kern.log. Also
seeing this:
systemd-udevd[1452]: timeout: killing 'bridge-network-interface' [2765]
<4>May 1 22:56:42 xxx kernel: [ 404.520990] bonding: bond0: Warning: No 802.3ad
response from the link partner
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1747896
Title:
OOM and High CPU utilization in
ects: linux (Ubuntu)
Importance: Undecided
Assignee: Gavin Guo (mimi0213kimo)
Status: Incomplete
** Tags: sts
** Attachment added: "flamegraph of the high CPU utilization symptom"
https://bugs.launchpad.net/bugs/1747896/+attachment/5050575/+files/2018-01-31_07-
** Tags removed: verification-needed-artful verification-needed-zesty
** Tags added: verification-done-artful verification-done-zesty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1730852
Title:
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1730852
Title:
Device hotplugging with MPT SAS cannot work for
** Tags removed: verification-needed-xenial verification-needed-zesty
** Tags added: verification-done-xenial verification-done-zesty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1728489
Title:
** Tags removed: verification-needed-xenial verification-needed-zesty
** Tags added: verification-done-xenial verification-done-zesty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1729256
Title:
gnored, and
the guest failed to detect new drives from within a VMWare ESXi
environment.
[Test]
The patch has been verified based on the Ubuntu kernel v4.4.0-97.120.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Gavin Guo (mimi0213kimo)
Status: New
** Tags: sts
-
** Description changed:
[Impact]
The frequent kernel errors can be see inside the XFS based OSD
processes and it causes to crash and restart.
BUG: unable to handle kernel NULL pointer dereference at 00a0
IP: [] xfs_da3_node_read+0x30/0xb0 [xfs]
CPU: 8 PID: 2855031 Comm:
allows the walk to proceed.
[Test]
The patch has been tested.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Gavin Guo (mimi0213kimo)
Status: New
** Tags: sts
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1680513
Title:
Migrating KSM page causes the VM lock up as the KSM
** Tags removed: verification-needed-zesty
** Tags added: verification-done-zesty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1680513
Title:
Migrating KSM page causes the VM lock up as the KSM
@Joseph Salisbury,
Yes, Jorge has identified the bug and will send out the SRU patches.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1683982
Title:
net/ipv4: original ingress device index set as
** Description changed:
[Impact]
After numad is enabled and there are several VMs running on the same
host machine(host kernel version: 4.4.0-72-generic #93), the
softlockup messages can be observed inside the VMs' dmesg.
First, the crashdump was captured when the symptom was
** Description changed:
[Impact]
After numad is enabled and there are several VMs running on the same
host machine(host kernel version: 4.4.0-72-generic #93), the
softlockup messages can be observed inside the VMs' dmesg.
First, the crashdump was captured when the symptom was
** Description changed:
+ [Impact]
After numad is enabled and there are several VMs running on the same
host machine(host kernel version: 4.4.0-72-generic #93), the
softlockup messages can be observed inside the VMs' dmesg.
First, the crashdump was captured when the symptom was
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Gavin Guo (mimi0213kimo)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1680513
Title:
Migrating KSM page causes the VM lock
** Description changed:
After numad is enabled and there are several VMs running on the same
- host machine, the softlockup messages can be observed inside the VMs'
- dmesg.
+ host machine(host kernel version: 4.4.0-72-generic #93), the
+ softlockup messages can be observed inside the VMs'
Public bug reported:
After numad is enabled and there are several VMs running on the same
host machine(host kernel version: 4.4.0-72-generic #93), the
softlockup messages can be observed inside the VMs' dmesg.
First, the crashdump was captured when the symptom was observed. At
the first glance,
Public bug reported:
The call trace can be observed by bt in the gdb with the coredump of libvirtd:
$ gdb /usr/sbin/libvirtd core.compute-0-1.domain.tld.1480020436.libvirtd.26138
(gdb) bt
#0 0x7f856dddec37 in __GI_raise (sig=sig@entry=6) at
../nptl/sysdeps/unix/sysv/linux/raise.c:56
#1
@Denis V.Lunev
Really sorry for the inconvenience. The patch has already been sent to the
mailing list.
http://comments.gmane.org/gmane.linux.ubuntu.devel.kernel.general/78486
The fix will be included in the Ubuntu-3.13.0-93.140.
--
You received this bug notification because you are a member
Public bug reported:
iscsi useful initiator information such as:
1). etc/iscsi/*
2). iscsiadm -m session -P3
These 2 are useful for debugging the iscsi initiator side bug. However,
it's not included by default in the sosreport.
** Affects: sosreport (Ubuntu)
Importance: Undecided
** Changed in: linux (Ubuntu Trusty)
Assignee: (unassigned) => Gavin Guo (mimi0213kimo)
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Gavin Guo (mimi0213kimo)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
stress test on the v3.13.0-89.136 with KASan backported.
** Attachment added: "kern.log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1572562/+attachment/4685474/+files/kern.log
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
I tried to reproduce the bug with the following commands:
"./parallel-73670.sh -r 2 -k 40" [1]
The error messages cannot be found in the dmesg with the proposed kernel
3.13.0-89.136 with KASan backported[2].
Reference:
[1]. http://kernel.ubuntu.com/git/gavinguo/stress-test.git/
[2].
** Description changed:
[Impact]
In the v3.13.0-76 kernel with KASan backported.
The following error message could be observed during the kernel
building stress test of the command[1]: "./parallel-73670.sh -r 2 -k 40"
That means building 40 kernels in the same time with 2 rounds.
** Description changed:
[Impact]
In the v3.13.0-76 kernel with KASan backported.
The following error message could be observed during the kernel
building stress test of the command[1]: "./parallel-73670.sh -r 2 -k 40"
That means building 40 kernels in the same time with 2 rounds.
** Description changed:
+ [Impact]
In the v3.13.0-76 kernel with KASan backported.
The following error message could be observed during the kernel
building stress test of the command[1]: "./parallel-73670.sh -r 2 -k 40"
That means building 40 kernels in the same time with 2 rounds.
11 {
312 return ((1UL << (nr & (BITS_PER_LONG-1))) &
313 (addr[nr >> _BITOPS_LONG_SHIFT])) != 0;
314 }
+
+ Reference:
+ [1]. http://kernel.ubuntu.com/git/gavinguo/stress-test.git/
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Gav
The following 2 patches are the solution to the bug:
4d88e6f7d5ff mm/balloon_compaction: fix deflation when compaction is disabled
d6d86c0a7f8d mm/balloon_compaction: redesign ballooned pages management
Related upstream mailing list discussion:
- mm: compaction: buffer overflow in
Public bug reported:
In the v3.13.0-76 kernel with KASan backported.
The following error message could be observed during the kernel
building stress test of the command: "./parallel-73670.sh -r 2 -k 40"
That means building 40 kernels in the same time with 2 rounds.
Bad access happens when we
** Tags removed: verification-needed-trusty verification-needed-vivid
verification-needed-wily
** Tags added: verification-done-trusty verification-done-vivid
verification-done-wily
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Description changed:
[Impact]
- The use-after-free invalid read bug, which happens in really tricky case,
- would use the numa_faults data already freed for the NUMA balance to make a
- decision to migrate the exiting process.
+ The use-after-free invalid read bug, which happens in really
** Description changed:
+ [Impact]
+
+ The use-after-free invalid read bug, which happens in really tricky case,
+ would use the numa_faults data already freed for the NUMA balance to make a
+ decision to migrate the exiting process.
+
+ The bug was found by the Ubuntu-3.13.0-65 with KASan
Reproducer for the bug.
** Attachment added: "kernel_panic_test.sh"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1527643/+attachment/4595998/+files/kernel_panic_test.sh
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
The error message can be observed in the dmesg when the guest VM booted
with v3.13.0-65 with KASAN enabled.
==
BUG: KASan: use after free in blk_mq_register_disk+0x193/0x260 at addr
8801ec247400
Read of
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Gavin Guo (mimi0213kimo)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1534054
Title:
use-after-free found by KA
** Description changed:
We are trying to debug the kernel using KASAN and we found that when a
VM is booting in our cloud, on the virtualised kernel, there is a use-
after-free access that should not be there.
The failing VM was running on a host with kernel 3.13.0-66-generic
** Description changed:
==
BUG: KASan: use after free in task_numa_find_cpu+0x64c/0x890 at addr
880dd393ecd8
Read of size 8 by task qemu-system-x86/3998900
** Attachment added: "numa_faults_use_after_free.kern.log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1527643/+attachment/4536904/+files/numa_faults_use_after_free.kern.log
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
==
BUG: KASan: use after free in task_numa_find_cpu+0x64c/0x890 at addr
880dd393ecd8
Read of size 8 by task qemu-system-x86/3998900
** Tags removed: cts
** Tags added: sts
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1403282
Title:
General protection fault on c->freelist broken with Trusty Tahr
To manage notifications about
** Description changed:
- kernel: [284190.877125]
==
- kernel: [284190.898773] BUG: KASan: use after free in
task_numa_find_cpu+0x64c/0x890 at addr 880dd393ecd8
- kernel: [284190.920765] Read of size 8 by task
** Description changed:
==
BUG: KASan: use after free in task_numa_find_cpu+0x64c/0x890 at addr
880dd393ecd8
Read of size 8 by task qemu-system-x86/3998900
Currently, the bug cannot be reproduced in the original platform. However,
there is another platform has similar symptom. And the bug can be captured
by Kasan(Kernel Address Sanitizer) backported on the v3.13.0-52.86.
The source code:
** Attachment added: "awk.kern.log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1403282/+attachment/4508426/+files/awk.kern.log
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1403282
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1488035
Title:
OSDs Linked list corruption causes kernel BUG at
** Description changed:
[Impact]
The node which mounts a ceph rbd volume causes a panic when all OSD
daemons on the all ceph nodes are restarted.
- [642981.871592] [ cut here ]
+ [642981.871592] [ cut here ]
[642981.912255] kernel BUG
Public bug reported:
[Impact]
[Fix]
[Test Case]
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Incomplete
** Tags: sts trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ceph-all restart
+
+ And verify if there is panics.
** Changed in: linux (Ubuntu)
Assignee: (unassigned) = Gavin Guo (mimi0213kimo)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1488035
Title
** Tags removed: verification-needed-trusty verification-needed-vivid
** Tags added: verification-done-trusty verification-done-vivid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1475204
Title:
of kmalloc_caches.
[a...@linux-foundation.org: s/kmalloc_names/kmalloc_info/, tweak comment
text]
Signed-off-by: Gavin Guo gavin@canonical.com
Acked-by: Christoph Lameter c...@linux.com
Cc: Pekka Enberg penb...@kernel.org
Cc: David Rientjes rient...@google.com
Cc
** Changed in: linux (Ubuntu)
Assignee: (unassigned) = Gavin Guo (mimi0213kimo)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1475204
Title:
Fix kmalloc slab creation sequence
To manage
of kmalloc_caches.
[a...@linux-foundation.org: s/kmalloc_names/kmalloc_info/, tweak comment
text]
Signed-off-by: Gavin Guo gavin@canonical.com
Acked-by: Christoph Lameter c...@linux.com
Cc: Pekka Enberg penb...@kernel.org
Cc: David Rientjes rient...@google.com
Cc
-bit x86 if you have
CONFIG_SLAB enabled. When I switched to CONFIG_SLUB, the kernel
boots. So it appears this commit is breaking kernel configurations
with CONFIG_SLAB enabled.
It bisects down to:
commit 4066c33d0308f87e9a3b0c7fafb9141c0bfbfa77
Author: Gavin Guo gavin@canonical.com
Date
@Kamal,
Thanks for your verification. I'll modify the tag verification-needed-
vivid to verification-done-vivid.
** Tags removed: verification-needed-vivid
** Tags added: verification-done-vivid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
Hi Clsoto,
Tinoco is on vacation now, I'm his proxy. And I saw you have tested the
kernel to verify the ethtool. Really thanks for your effort to do that.
Except on thing that I saw the kernel version
Linux powerio-le13 3.19.0-15-generic #15-Ubuntu SMP Thu Apr 16 23:32:13
UTC 2015 ppc64le
** Tags removed: verification-needed-vivid
** Tags added: verification-done-vivid
** Tags removed: verification-needed-utopic
** Tags added: verification-done-utopic
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification
** Tags added: utopic vivid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1456952
Title:
support the slub_debug boot option on specific object size
To manage notifications about this bug go to:
** Description changed:
[Impact]
slub_debug cannot work for specific kmem_cache size.
e. g. slub_debug=PU,kmalloc-1024
The slub_debug is used to enable the debugging of use-after-free, poison
overwritten, double free. And it also increases the up time of the server
when the
Public bug reported:
The slub_debug=PU,kmalloc-xx cannot work because in the
create_kmalloc_caches() the s-name is created after the
create_kmalloc_cache() is called. The name is NULL in the
create_kmalloc_cache() so the kmem_cache_flags() would not set the
slub_debug flags to the s-flags. The
]
** Changed in: linux (Ubuntu)
Assignee: (unassigned) = Gavin Guo (mimi0213kimo)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1456952
Title:
support the slub_debug boot option on specific object size
** Tags removed: verification-needed-utopic
** Tags added: verification-done-utopic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1439441
Title:
Kernel provides incomplete audit information when an
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1439441
Title:
Kernel provides incomplete audit information when an
Test of the following kernel fail:
linux-image-3.13.0-031300-generic_3.13.0-031300.201401192235_amd64.deb
linux-image-3.13.0-24-generic
linux-image-3.13.0-46-generic
linux-image-3.15.0-031500-generic_3.15.0-031500.201406131105_amd64.deb
another console: $ sudo tail -f /var/log/audit/audit.log
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Gavin Guo (mimi0213kimo)
Status: Incomplete
** Tags: cts precise trusty utopic
** Changed in: linux (Ubuntu)
Assignee: (unassigned) = Gavin Guo (mimi0213kimo
65 49 0f c7 08 0f 94 c0 84 c0 74 b9 49 63
[6650285.727070] RIP [811a1e10] kmem_cache_alloc_trace+0x80/0x1f0
[6650285.734726] RSP 8830372a7e80
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Gavin Guo (mimi0213kimo)
Status: In Progress
** Tags: cts
** Changed in: linux (Ubuntu)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1345895
Title:
[Dell Inspiron 3541] USB3 stick speed drop to 480M after first use
** Changed in: linux (Ubuntu)
Status: In Progress = Fix Released
** Changed in: hwe-next
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1322409
Title:
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
** Tags removed: verification-done-trusty
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux (Ubuntu)
Status: New = In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1322409
Title:
Usb 3.0 device is recognized as usb 2.0 device on usb 3.0 port if the
of check_sub_bridges())
Reported-and-tested-by: Gavin Guo gavin@canonical.com
Acked-by: Bjorn Helgaas bhelg...@google.com
Reviewed-by: Mika Westerberg mika.westerb...@linux.intel.com
Cc: 3.15+ sta...@vger.kernel.org # 3.15+
Signed-off-by: Rafael J. Wysocki rafael.j.wyso...@intel.com
I've
I've tested with Rafael's cleaner patch on the Lenovo CID 201107-8258.
It works fine. As it didn't work on the v3.13 generic.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1290189
Title:
Unable to
Rafael submitted a patch to the
https://bugzilla.kernel.org/show_bug.cgi?id=76901. I've tested and it
works fine. Now, I've provided the dmesg for him to check and am waiting
for Rafael to give a official commit.
--
You received this bug notification because you are a member of Ubuntu
Bugs,
The bug was reported to
https://bugzilla.kernel.org/show_bug.cgi?id=76901. Currently, Mika asked
for the support to apply his patch, which adds more debug messages to
the suspected function, and get the dmesg log. I've submitted the dmesg
for his diagnosis.
** Bug watch added: Linux Kernel Bug
I've completed the bisect and found
2d8b1d566a5f4874f4d92361f5cdbb50baa396f8 is the first bad commit. The
git bisect log is also attached.
commit 2d8b1d566a5f4874f4d92361f5cdbb50baa396f8
Author: Mika Westerberg mika.westerb...@linux.intel.com
Date: Sat Jul 13 20:09:59 2013 +0300
ACPI /
I've built the following commits and it can work so have no clue to do
the bisect within this commits.
Mon May 26 18:51:24 gavin@gavin-w530:~/os/linux$ git log --pretty=oneline
v3.11..v3.12-rc1 drivers/acpi/pci*
a9238741987386bb549d61572973c7e62b2a4145 Merge tag 'pci-v3.12-changes' of
I spent some times testing and found that the commits causing the
regression is between v3.11 and v3.12-rc1. It still needs more times to
do the bisect.
Mon May 26 19:02:09 gavin@gavin-w530:~/os/linux$ git log --pretty=oneline
v3.11..v3.12-rc1 | wc -l
10153
Since there're still 10153 commits
This bug can't be fixed in Raring. As the feature is also available in
the 12.04.4, users can upgrade their kernel to use the feature.
** Changed in: linux-lts-raring (Ubuntu)
Status: New = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Changed in: hwe-next
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1229576
Title:
Webcam preview have half image display and black screen in some
** Tags removed: verification-needed-quantal
** Tags added: verification-done-quantal
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1229576
Title:
Webcam preview have half image display and black
: Gavin Guo (mimi0213kimo)
Status: Confirmed
** Tags: blocks-hwcert-enablement
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1229576
Title:
Webcam preview have half image display and black
** Also affects: linux-lts-quantal (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1229576
Title:
Webcam preview have half image display and black
1 - 100 of 151 matches
Mail list logo