This bug is similar to bug 1362388 (its sister model),
could be fixed by adding a kernel parameter: acpi_osi=\"!Windows 2012\"
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1383589
Title
Public bug reported:
CID: 201404-14998 Dell Vostro 3546
The wireless key does not work on this system.
With wireless key press, keycode 240 could be captured by sudo showkey -k, but
the scancode can't be detected with sudo showkey -s
With xev:
KeyPress event, serial 34, synthetic NO, window 0x3
Updating sample code, test script for reproducer (included in
ubug_1382340.tar.gz), if this helps. Here are the steps to run /
reproduce the issue:
1. untar ubug_1382340.tar.gz and cd ./ubug_1382340
2. make
2. sudo ./test.sh===> run this heavy network load.
** Attachment added: "attached re
I have enabled the function call trace and attached the trace.bz2 file.
** Attachment added: "function call trace output captured and attached"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1382340/+attachment/4240950/+files/trace.bz2
--
You received this bug notification because you
Updating latest stack trace from dmesg:
[ 132.216761] BUG: scheduling while atomic: nc/2911/0x0101
[ 132.216766] Modules linked in: netfilter(POF) ipt_MASQUERADE iptable_nat
nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack
ipt_REJECT xt_CHECKSUM iptable_mangle x
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1383555
Title:
ieee80211 phy0: rt2x00queue_fl
I originally marked this as a bug in precise, but said that since it
seemed to fixed in later version of trusty, I wasn't going to follow up,
and it was closed. It is now an issue again, annoying because of the
logs filling up, critical because of the lockup of the entire PC.
--
You received thi
Public bug reported:
Doesn't happen immediately after kernel reboot. Will eventually cause
wireless connection to fail, and cause computer to lock up. Need to use
REISUB to reboot, as all other method frozen. Fills up logs
with above messages many times per minute. Originally happened with
pre
Hi,
Unblacklist i2c_hid, causing my laptop cannot resume after being suspended.
I'm using Dell XPS 12-9Q33.
Distributor ID: Ubuntu
Description:Ubuntu 14.04.1 LTS
Release:14.04
Codename: trusty
linux-firmware is 1.127.7.
Please help.
If not possible, I have to blacklist i2c_hi
Built with PPA toolchain and booted a 3.13 kernel.
[0.00] Linux version 3.13.11.9-ad0f2aa (ubuntu@dwalin) (gcc
version 4.8.3 (Ubuntu 4.8.3-12ubuntu0.2) ) #1 SMP Tue Oct 21 02:13:15
UTC 2014 (Ubuntu 3.13.0-38.65-generic 3.13.11.8)
Let me know what additional testing you'd like to see.
Tha
This patch was tested and seems to fix the issue. Waiting for the SRU
(already sent to kernel-team mailing list).
Thank you!
Rafael Tinoco
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1
Seth: I'm having issues installing the linux headers from this package
http://people.canonical.com/~sforshee/lp1275879/linux-3.13.0-38.65+lp1278579v201410160939
/linux-
headers-3.13.0-38-generic_3.13.0-38.65+lp1278579v201410160939_amd64.deb
I keep getting this error when I try to install it:
---
Attached script as an example on how to make kmem_alloc to fail (using
/var/lib/ceph as filesystem, it can be changed).
** Attachment added: "gf.sh"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1382333/+attachment/4240839/+files/gf.sh
--
You received this bug notification because you
Attached script as an example on how to make kmem_alloc to fail (using
/var/lib/ceph as filesystem, it can be changed).
** Description changed:
+ === SRU Justification ===
+
+ Impact: xfs can hang on lack of contiguous memory page to be allocated.
+ Fix: upstream patch (b3f03bac8132207a20286d560
*** This bug is a duplicate of bug 1353021 ***
https://bugs.launchpad.net/bugs/1353021
Fixed for me here. Thanks!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1326725
Title:
PS3 S
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1370421
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a commen
** Changed in: linux (Ubuntu Trusty)
Assignee: (unassigned) => Chris J Arges (arges)
** Changed in: linux (Ubuntu Trusty)
Status: Incomplete => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https
** Package changed: ubuntu => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1370421
Title:
BUG: soft lockup - CPU#15 stuck for 59737s! [genload:22734]
Status in “linux”
You have been subscribed to a public bug:
== Comment: #0 - ABDUL HALEEM - 2014-09-01 05:24:37 ==
---Problem Description---
CPU stalls and soft lockup on cpu while running ltpstresstest.sh test of LTP
suite, detailed syslog and the test logs are attached
Contact Information = abdha...@in.ibm.com
** Description changed:
To better support the new architectures arm64 and ppc64e, we are
planning to update the toolchain for 14.04 LTS. The toolchain is able to
build the kernels in 14.04 LTS, but please confirm that the kernels
built by this toolchain still work as expected.
please
I have the same Asus X550LC laptop with Ubuntu 14.04. Have you tried updating
the BIOS of your system
http://www.asus.com/Notebooks_Ultrabooks/X550LC/HelpDesk_Download/
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
http
do you guys have this problem in 14.04.1?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377878
Title:
PPC - GUI freezes except for mouse pointer
Status in “linux” package in Ubuntu:
** This bug is no longer a duplicate of bug 1325884
[Asus X550LD] Microphone not working Ubuntu 14.04
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1382642
Title:
Mic not working for
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1382335
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a commen
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1382642
Title:
Mic not working for ubuntu 14.
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1383474
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a commen
** Tags added: trusty
** Package changed: ubuntu => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1382335
Title:
mdadm+lvm+cryptsetup+big disks: "bio too big device"
St
Public bug reported:
To better support the new architectures arm64 and ppc64e, we are
planning to update the toolchain for 14.04 LTS. The toolchain is able to
build the kernels in 14.04 LTS, but please confirm that the kernels
built by this toolchain still work as expected.
please open tasks for
@wxl:
I sent this to "QA" . . . but, right, this is the bug . . . that my
iBook found earlier in the month, and then again a few days ago. What I
didn't mention was what Lars also mentioned, when the mouse cursor
"clenches" to drag the window . . . it doesn't "unclench." But, it is a
"deal break
You have been subscribed to a public bug:
I installed two new 6TB disks (WD Red) as RAID1 and pmove'd stuff over from old
5x3TB RAID10 array to it (actually the move is still in progress, going to take
some
17 hours or so) and I get lots of these (4971 so far) in dmesg:
[58693.807553] bio too bi
I am getting the same error. I have tried as well a Live USB of Ubuntu
14.10 Beta, which fails to detect the drive (I can't risk installing the
whole system as this is my "production" computer).
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed
I also have this problem. Picasa starts on 3.2.0-69 but not on
3.2.0-70. I also have not seen any error messages.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1382251
Title:
Kernel up
Also seeing the issue here (on occasion) w/ 3.13.0-37-generic:
fb: conflicting fb hw usage nouveaufb vs VESA VGA - removing generic driver
Console: switching to colour dummy device 80x25
BUG: unable to handle kernel NULL pointer dereference at 0138
IP: [] con_set_unimap+0x32/0x290
just tried with mesa 10.4 daily and this crash seems to be fixed, now
the unity-dash crashes but thats a different bug
(https://bugs.launchpad.net/ubuntu/+source/unity8/+bug/1354412)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in
This bug was fixed in the package openvswitch - 1.4.6-0ubuntu1.12.04.4
---
openvswitch (1.4.6-0ubuntu1.12.04.4) precise; urgency=medium
* Update: d/p/0010-datapath_ip_select_ident_fix.patch:
Fix stable kernel changes to ip_select_ident. (LP: #1379201)
-- Chris J ArgesFri, 1
The verification of the Stable Release Update for openvswitch has
completed successfully and the package has now been released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encount
** Branch linked: lp:ubuntu/trusty-proposed/linux-firmware
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1383138
Title:
New BT firmware for Intel 7265 D0 chipset ROM spin
Stat
This bug was fixed in the package kexec-tools - 1:2.0.6-0ubuntu2.1
---
kexec-tools (1:2.0.6-0ubuntu2.1) trusty; urgency=medium
* Add the following patches to enable kexec-tools on ppc64el (LP: #1364427):
- kexec-ppc64-Handle-reserved-memory-ranges-exported-b.patch
- kexec-pp
The verification of the Stable Release Update for kexec-tools has
completed successfully and the package has now been released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encount
This bug was fixed in the package makedumpfile - 1.5.5-2ubuntu1.1
---
makedumpfile (1.5.5-2ubuntu1.1) trusty; urgency=medium
* kdump-config: load kdump kernel from vmlinux too. (LP: #1324544)
-- Mauricio Faria de OliveiraFri, 03 Oct 2014
11:46:27 +0200
** Changed in: makedump
The verification of the Stable Release Update for makedumpfile has
completed successfully and the package has now been released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encoun
Hello Jesse, or anyone else affected,
Accepted linux-firmware into trusty-proposed. The package will build now
and be available at http://launchpad.net/ubuntu/+source/linux-
firmware/1.127.8 in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See
htt
Public bug reported:
kernel oops during boot. no crash. kubuntu still usable.
[ cut here ]
[ 44.392154] WARNING: CPU: 0 PID: 6 at
/build/buildd/linux-3.13.0/fs/proc/generic.c:522 remove_proc_entry+0x19f/0x1b0()
[ 44.392157] remove_proc_entry: removing non-empty direct
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1383446
Title:
WARNING: CPU: 0 PID: 6 at
/b
The problem still persists in 14.04 with updates (haven't checked
14.10). I have managed to solve(?) it by adding a "noautogroup"
parameter to the kernel command line.
More details:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1219548
** Changed in: linux (Ubuntu)
Status: Expired
Interesting.. keyutils doesn't seem to help in my case.I'm running
ls on the ~27000 user accounts home directory..
I don't understand why this would help... all nfsidmap would do is clear
it once, and then it can fill up again/expire again.
--
You received this bug notification because you a
** Summary changed:
- i915 driver/i945 hardware: Mir GL clients are rendered as black or
transparent windows when using i945 graphics
+ i915 driver/i945 hardware: Mir GL clients are rendered as black (or
transparent or crash) windows when using i945 graphics
--
You received this bug notificati
I cannot run apport-collect as that would need to open browser, which
means going into Desktop GUI, which automatically leads to freeze.
I face the same issue with even the latest daily images, I can see on
cdimages.ubuntu.com , namely:
- Ubuntu Desktop Utopic 20141017 amd64 image
- Ubuntu GNOME
Hello.
I installed the latest x64 upstream kernel as well as the headers for it
from the link you provided.
I got to the login screen, and after I entered my password it just hanged there
and I never got to the desktop.
I tried one more time, and this time I did not enter my password. I used the
** Description changed:
This bug is for tracking the 3.13.0-38.65 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v3.18 kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel does not fix t
Looks good
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1379244
Title:
linux: 3.13.0-38.
One more confirm. Cifs mounting with 3.13.0-38-generic/trusty-proposed
works for me as well. Thank you!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1372482
Title:
mount.cifs does not
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v3.18 kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel does not fix t
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v3.18 kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel does not fix t
Can you see if this issue still occurs with the latest daily image? It can be
downloaded from:
http://cdimage.ubuntu.com/daily-live/current/
** Changed in: linux (Ubuntu)
Importance: Undecided => High
--
You received this bug notification because you are a member of Kernel
Packages, which i
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Tags added: kernel-da-key
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377878
Title:
PPC - GUI freezes except for
Looks fixed with 3.16.0-17.23, change status to Fix Released? It wasn't
mentioned in the changelog.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1371379
Title:
rtsx_usb module for Real
This bug is present in kubuntu 14.04.1 LTS too.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1327741
Title:
Kernel panic on driver rtl8821ae
Status in “linux” package in Ubuntu:
Inc
@adam does this affect all ppc radeon cards? if so, that kills a lot of
computers we wanted to support! can you link me to archives of your
upstream inquiries?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.l
the kernel fixes the touchpad button issue, but also don't have any network
with it.
network works fine in the current utopic kernel -22.29
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1
ups, didn't install the extras package. With it installed everything
seems to work alright.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1381815
Title:
left touchpad button stopped wor
*** This bug is a security vulnerability ***
Public security bug reported:
Race condition in the ext4_file_write_iter function in fs/ext4/file.c in
the Linux kernel through 3.17 allows local users to cause a denial of
service (file unavailability) via a combination of a write action and an
F_SETF
CVE-2014-8086
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affec
*** This bug is a security vulnerability ***
Public security bug reported:
The do_umount function in fs/namespace.c in the Linux kernel through
3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb
calls that change the root filesystem to read-only, which allows local
users to caus
CVE-2014-7975
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affec
CVE-2014-7970
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affec
*** This bug is a security vulnerability ***
Public security bug reported:
The pivot_root implementation in fs/namespace.c in the Linux kernel
through 3.17 does not properly interact with certain locations of a
chroot directory, which allows local users to cause a denial of service
(mount-tree lo
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Precise)
Status: New => Invalid
** Description changed:
- [linux kernel net_get_random_once bug]
+ The net_get_random_once implementation in net/core/utils.c in the Linux
+ kernel 3.13.x and 3.14.x before 3.14.5 on certain Intel processors does
+ not perform the intended slow-path operation to initialize random seeds,
+ which ma
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ub
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https:/
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ub
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ub
This is actually an issue with a missing driver.
I have run the command to list inputs and returns following.
xinput --list
⎡ Virtual core pointer id=2[master pointer (3)]
⎜ ↳ Virtual core XTEST pointerid=4[slave pointer (2)]
⎜ ↳ PS/2 Logit
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ub
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1333612
Title:
CVE-2014-4027
Status in “l
** No longer affects: linux-armadaxp (Ubuntu Saucy)
** No longer affects: linux-ec2 (Ubuntu Saucy)
** No longer affects: linux-lts-saucy (Ubuntu Saucy)
** No longer affects: linux-lts-quantal (Ubuntu Saucy)
** No longer affects: linux-mvl-dove (Ubuntu Saucy)
** No longer affects: linux (Ubuntu
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Preci
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Preci
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Preci
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1334985
Title:
CVE-2014-0206
Status in “l
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-saucy (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Preci
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you are a member
I've tried verifying a build with this patch on top of our current 3.16
Utopic tree and the above sysfs directory was still not found. Are there
additional steps required to enable the hv_24x7 device? I have been
testing on a POWER8 machine.
--
You received this bug notification because you are a
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1382863
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a commen
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1351519
Title:
/sys/class/dmi/id/product_uuid is not world readable
S
There are multiple kernel warnings seen in the log file, and then there
is this:
BUG: unable to handle kernel NULL pointer dereference at
0048
** Package changed: syslinux (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages,
You have been subscribed to a public bug:
I'm testing an Ubuntu GNOME Utopic 20141016 amd64 image. When booting
the ISO (using grubentry method), the screen freezes and becomes
unresponsive after 3 secs of showing up the Gnome desktop screen. Not
able to continue beyond that or even to the install
Verified in my trusty VM.
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
** Changed in: linux (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linu
Although it should come sooner or later via stable, if people want to
test ahead of that I put kernel images with the anticipated fix at
http://people.canonical.com/~smb/lp1376245/
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in U
** Description changed:
+ SRU Justification:
+
+ [Impact]
+
Under some conditions, after fallocate() the file is observed not to be
completely initilized to 0s: some 4KB pages have left-over data from
previous files that occupied those pages. Note that in addition to
causing functional p
For kernel Ver 3.16 and later, i found some workin solution only to install the
kernel module. All you have to do is just download the GIT repo
https://github.com/lwfinger/mt7630
and do
$ cd into the extracted dir
$ sudo make
$ sudo make install
Eventhough it installs the kernel module, it sti
Based on the syslog vomit, this is almost certainly a kernel bug (or
possibly an X bug). Reassigning in that direction for now.
** Package changed: ubiquity (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
FWIW, when I've complained in the past about endian issues with the
radeon drivers on PPC, the upstream response has often been "we know
it's broken on big-endian arches, patches welcome, or go buy an nvidia
card". So, this may prove to be a lost cause without someone with the
time and expertise t
1 - 100 of 132 matches
Mail list logo