I can confirm that the patch from Seth works flawlessly on Ubuntu 14.04
applied on vanilla kernel 3.19.0 (low latency).
Thanks!
Jasper
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/141660
I have installed the firmware from Tobias Bora MT7630E_3.16 on kernel
3.19 (siduction) with success. I am not seeing any increased cpu load.
Unfortunately the Bluetooth doensn't seem to work but the wifi is
working well so far.
--
You received this bug notification because you are a member of Ke
Is there something more I should test to provide more information? If
there's a development version of the kernel, or some kernel compile time
flags that would be useful to test, let me know. It's been a while since
I've done it, but I have compiled my own kernels in the past.
--
You received thi
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1425417
Title:
package linux-image-3.13.0-43-
Public bug reported:
i can not update my system... says will not allow..
ProblemType: Package
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-43-generic 3.13.0-43.72
ProcVersionSignature: Ubuntu 3.13.0-44.73-generic 3.13.11-ckt12
Uname: Linux 3.13.0-44-generic i686
ApportVersion: 2.14.1-
@mario - does upgrading to the backports kernel fix this for you?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1047531
Title:
Ubuntu 12.04 (Precise) guests can't boot on Ubuntu 10.04 (
I can confirm that the audit message is gone from /var/log/syslog after
I got back to the original 3.13.0-46 Ubuntu 14.04.2 kernel.
** Summary changed:
- Apparmor uses rsyslogd profile for different processes
+ Apparmor uses rsyslogd profile for different processes - utopic HWE
** Also affects:
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1423631
Title:
tap interface drops many packe
** Changed in: linux (Ubuntu)
Status: Incomplete => New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1423631
Title:
tap interface drops many packets on highload systems
Status
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1425391
Title:
package linux-image-3.13.0-46-
Public bug reported:
I was just installing updates with the GUI application and got a crash
report. I have no idea whether anything is actually broken.
ProblemType: Package
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-46-generic (not installed)
ProcVersionSignature: Ubuntu 3.13.0-45.74
I'm also affected. WiFi works great but no bluetooth device shows up.
Linux mint 17.1 on HP Envy j052-tx.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1189721
Title:
Ralink RT3290 does
On Monday, February 23, 2015 06:42:06 PM you wrote:
> Did this issue start happening after an update/upgrade? Was there a
> prior kernel version where you were not having this particular problem?
>
> Would it be possible for you to test the latest upstream kernel? Refer
> to https://wiki.ubuntu.c
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Rafael David Tinoco (inaddy)
** Changed in: linux (Ubuntu)
Status: New => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launch
commit 9f82830d0b4f734e0bfb2ebf53b456eaa7f38728
Author: Bruce Allan
Date: Fri Dec 16 00:46:33 2011 +
e1000e: update workaround for 82579 intermittently disabled during S0->Sx
The workaround which toggles the LANPHYPC (LAN PHY Power Control) value bit
to force the MAC-Phy in
commit 46f82e6f8895dcdc44c806082b412f9de6211dd6
Author: Bruce Allan
Date: Thu Apr 12 06:27:03 2012 +
e1000e: issues in Sx on 82577/8/9
A workaround was previously put in the driver to reset the device when
transitioning to Sx in order to activate the changed settings of the
I believe this problem can be due to a HW problem already described in
an Intel errata:
DOCUMENT: http://goo.gl/fffMyi
23. Packet Loss on Intel® 82579 Gigabit Ethernet Controller
Problem: Systems with Intel 6 Series Chipset and Intel C200 Series Chipset
using the Intel 82579 Gigabit Ethernet Co
commit aa21a75313a52f18bbf3e86827133d7d73fe30ae
Author: Bruce Allan
Date: Fri Dec 16 00:46:06 2011 +
e1000e: 82579: workaround for link drop issue
When connected to certain switches, the 82579 PHY might drop link
unexpectedly. Work around the issue by setting the Mean Squa
I'm providing a hotfixed kernel backporting the following commits:
commit 4ddfadb6625675d2e105257b029621809eb61b62
Author: David Ertman
Date: Tue Apr 22 05:25:53 2014 +
e1000e: Workaround for dropped packets in Gig/100 speeds on 82579
This is a workaround for a HW erratum on 8
Public bug reported:
It was brought to my attention the following lockup (and error message):
Feb 1 21:17:54 hostname kernel: [10461681.674619] NETDEV WATCHDOG: eth0
(e1000e): transmit queue 0 timed out
"""
Feb 1 21:17:54 hostname kernel: [10461681.674613] WARNING: at
/build/buildd/linux-3.2.
commit e05871885af46af0e8e9e82c612ca3cdd501f5fc
Author: Bruce Allan
Date: Tue Mar 20 03:47:47 2012 +
e1000e: 82579 packet drop workaround
In K1 mode (a MAC/PHY interconnect power mode), the 82579 device shuts down
the Phase Lock Loop (PLL) of the interconnect to save power.
> I don't like the idea of eCryptfs supporting the clone ioctl by default.
> It would allow an attacker to discover that the files (the original and
> the clone) are the same.
I agree with that reasoning.
In any case, I think that the btrfs clone operation should be disallowed
in ecryptfs as a ma
Bashar, the next step is to fully reverse commit bisect from kernel 3.13
to 4.0-rc1 in order to identify the last bad commit, followed
immediately by the first good one. Once this commit has been identified,
then it may be reviewed as a candidate for backporting into your
release. Could you please
+1 on Post #13. Works with Fresh 14.04.2 install.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bcmwl in Ubuntu.
https://bugs.launchpad.net/bugs/1307744
Title:
bcmwl-kernel-source 6.30.223.141+bdcom-0ubuntu2: bcmwl kernel module
fai
Erki Hallingu, the next step is to fully commit bisect from kernel 3.13
to 3.16 in order to identify the last good kernel commit, followed
immediately by the first bad one. This will allow for a more expedited
analysis of the root cause of your issue. Could you please do this
following https://wiki
Did this. Nothing changed. Fn+F2 still does not toggle wifi or LED.
Wifi can be deactivated with rfkill, although light for wifi still stays
on. I tired various tweaks (i.e. acpi_osi=Linux as boot paramater).
Output as you requested once this update was completed is:
$ sudo dmidecode -s bios-ve
*Hi Joseph,*
Please find the requested output attached.
Let me know if there is anything else I can help you with.
*Best Regards,*
Jukka
2015-02-25 0:19 GMT+02:00 Joseph Salisbury :
> Hi Jukka,
>
> Can you post the output from the following comman:
>
> sudo cat /sys/kernel/debug/usb/devices
>
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 3.13.0-46.75 upload package. This bug will
contain status and testing results related to
Public bug reported:
I was attempting to do a distribution upgrade, (sudo apt-get dist-
upgrade) as part of an update script I wrote. The process got hung up
saying that there was not enough memory in the /boot directory. It
prompted me to open up the disk usage analyzer. It tried to analyze the
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 3.16.0-31.41 upload package. This bug will
contain status and testing results related to
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1425288
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a commen
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1425295
Title:
package linux-image-extra-3.13
** Description changed:
With the following use of overlayfs, we get a disconnected path:
$ cat ./profile
#include
profile foo {
#include
capability sys_admin,
capability sys_chroot,
mount,
pivot_root,
}
$ cat ./overlay.c
#include
#include
#include
Public bug reported:
I noticed that my Nexus 4 crashed while doing a
grep "1" -r /
in an adb shell as user phablet. After narrowing it down, it looks like
I can reliably crash my device by just doing a
cat /sys/devices/system/cpaccess/cpaccess0/cp_rw
as a normal user. After doing it about thre
Public bug reported:
USB in docking station fails to work after resume from suspend.
ProblemType: Bug
DistroRelease: Ubuntu 14.10
Package: linux-image-extra-3.16.0-30-generic 3.16.0-30.40
ProcVersionSignature: Ubuntu 3.16.0-30.40-generic 3.16.7-ckt3
Uname: Linux 3.16.0-30-generic x86_64
ApportVer
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1425298
Title:
usb in docking station thinkpa
** Tags added: kernel-unable-to-test-upstream
** Description changed:
On my Lenovo B50-70 laptop there is a Elantech touchpad installed.
- It is working perfectly as a mouse but scrolling, multi-touch, 2 finger
gestures are not working.
+ It is working perfectly as a mouse but scrolling, mult
Public bug reported:
14.04 + HWE 3.16 kernel.
RAID-0 (3 spindles) + bcache on SSD - ext4 filesystem
I'm unable to access this system - this was taken from the iDRAC serial
console.
[4.559402] md: raid1 personality registered for level 1
[4.568578] scsi 4:0:0:0: Direct-Access ATA
Hi Jukka,
Can you post the output from the following comman:
sudo cat /sys/kernel/debug/usb/devices
That will give use the required information when the patch to fix this
is sent upstream.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
** Changed in: linux (Ubuntu)
Status: Triaged => In Progress
** Changed in: linux (Ubuntu Trusty)
Status: Triaged => In Progress
** Changed in: linux (Ubuntu Utopic)
Status: Triaged => In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Joseph Salisbury
** Changed in: linux (Ubuntu)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Joseph Salisbury (jsalisbury)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs
** Changed in: linux (Ubuntu)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Joseph Salisbury (jsalisbury)
--
You received this bug notification because you are a member of Ker
> Joseph Salisbury
Tried to built kernel 3.19. Only with with errors.
However it was efi registered and showed up in Grub. But it is was not bootable.
'kernel panic -not syncing: No working init found'
--
You received this bug notification because you are a member of Kernel
Packages, which is su
On 2015-02-24 04:32:21, Rocko wrote:
> I think it is still useful for ecryptfs to support the btrfs clone ioctl
> for the case where both source and target higher files are in the same
> ecryptfs mount, since this saves disk space.
I don't like the idea of eCryptfs supporting the clone ioctl by de
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 3.16.0-31.41~14.04.1 upload package. This
bug will contain status and testing results re
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 3.13.0-46.75~precise1 upload package. This
bug will contain status and testing results r
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 2.6.32-73.140 upload package. This bug will
contain status and testing results related t
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 3.2.0-1645.64 upload package. This bug will
contain status and testing results related t
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 3.2.0-77.112 upload package. This bug will
contain status and testing results related to
CVE-2015-2042
** Also affects: linux (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects:
*** This bug is a security vulnerability ***
Public security bug reported:
[incorrect data type in rds_sysctl_rds_table]
Break-Fix: - db27ebb111e9f69efece08e4cb6a34ff980f8896
** Affects: linux (Ubuntu)
Importance: Low
Status: New
** Affects: linux-armadaxp (Ubuntu)
Importanc
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => ADK (akeder)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1277959
Title:
[Asus 1015E] Fn+F2 is not working for activating/d
CVE-2015-2041
** Also affects: linux (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects:
*** This bug is a security vulnerability ***
Public security bug reported:
[incorrect data type in llc2_timeout_table]
Break-Fix: - 6b8d9117ccb4f81b1244aafa7bc70ef8fa45fc49
** Affects: linux (Ubuntu)
Importance: Low
Status: New
** Affects: linux-armadaxp (Ubuntu)
Importance:
** Changed in: linux (Ubuntu Trusty)
Status: In Progress => Fix Released
** Changed in: linux (Ubuntu Trusty)
Status: Fix Released => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bug
CVE-2015-0275
** Also affects: linux (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects:
*** This bug is a security vulnerability ***
Public security bug reported:
[ext4: fallocate zero range page size > block size BUG()]
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu)
Importance: Medium
Status: Invalid
** A
This bug was fixed in the package linux - 3.16.0-31.41
---
linux (3.16.0-31.41) utopic; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419961
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux - 3.16.0-31.41
---
linux (3.16.0-31.41) utopic; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419961
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux - 3.16.0-31.41
---
linux (3.16.0-31.41) utopic; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419961
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux - 3.16.0-31.41
---
linux (3.16.0-31.41) utopic; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419961
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux - 3.16.0-31.41
---
linux (3.16.0-31.41) utopic; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419961
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux - 3.16.0-31.41
---
linux (3.16.0-31.41) utopic; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419961
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux - 3.16.0-31.41
---
linux (3.16.0-31.41) utopic; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419961
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux - 3.16.0-31.41
---
linux (3.16.0-31.41) utopic; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419961
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux - 3.13.0-46.75
---
linux (3.13.0-46.75) trusty; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419963
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux - 3.13.0-46.75
---
linux (3.13.0-46.75) trusty; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419963
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux - 3.16.0-31.41
---
linux (3.16.0-31.41) utopic; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419961
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux - 3.16.0-31.41
---
linux (3.16.0-31.41) utopic; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419961
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux-lts-utopic -
3.16.0-31.41~14.04.1
---
linux-lts-utopic (3.16.0-31.41~14.04.1) trusty; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1420883
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #141128
This bug was fixed in the package linux - 3.16.0-31.41
---
linux (3.16.0-31.41) utopic; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419961
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux-lts-utopic -
3.16.0-31.41~14.04.1
---
linux-lts-utopic (3.16.0-31.41~14.04.1) trusty; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1420883
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #141128
This bug was fixed in the package linux - 3.13.0-46.75
---
linux (3.13.0-46.75) trusty; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419963
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux - 3.16.0-31.41
---
linux (3.16.0-31.41) utopic; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419961
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux - 3.16.0-31.41
---
linux (3.16.0-31.41) utopic; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419961
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux - 3.13.0-46.75
---
linux (3.13.0-46.75) trusty; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419963
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux - 3.16.0-31.41
---
linux (3.16.0-31.41) utopic; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419961
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux - 3.16.0-31.41
---
linux (3.16.0-31.41) utopic; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419961
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux - 3.16.0-31.41
---
linux (3.16.0-31.41) utopic; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419961
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
** Description changed:
This bug is for tracking the 3.16.0-31.41 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
** Description changed:
This bug is for tracking the 3.2.0-77.112 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
** Description changed:
This bug is for tracking the 3.13.0-46.75 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
** Description changed:
This bug is for tracking the 2.6.32-73.140 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
** Description changed:
This bug is for tracking the 3.13.0-46.75~precise1 upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel
** Description changed:
This bug is for tracking the 3.2.0-1645.64 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-packa
** Description changed:
This bug is for tracking the 3.16.0-31.41~14.04.1 upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux - 3.13.0-46.75
---
linux (3.13.0-46.75) trusty; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419963
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #1411284
* hyper-v -- fix comment handing i
This bug was fixed in the package linux-lts-trusty -
3.13.0-46.75~precise1
---
linux-lts-trusty (3.13.0-46.75~precise1) precise; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1420661
[ Andy Whitcroft ]
* [Debian] arm64 -- build ubuntu drivers
- LP: #141
This bug was fixed in the package linux-armadaxp - 3.2.0-1645.64
---
linux-armadaxp (3.2.0-1645.64) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1420561
* Rebase to Ubuntu-3.2.0-77.112
* [Config] Disable HOTPLUG_CPU and SUSPEND
- LP: #1412331
[
This bug was fixed in the package linux-ec2 - 2.6.32-376.93
---
linux-ec2 (2.6.32-376.93) lucid; urgency=low
[ Stefan Bader ]
* Rebase to Ubuntu-2.6.32-73.140
* Release Tracking Bug
- LP: #1420580
[ Ubuntu: 2.6.32-73.140 ]
* [Packaging] force "dpkg-source -I -i" behav
This bug was fixed in the package linux-armadaxp - 3.2.0-1645.64
---
linux-armadaxp (3.2.0-1645.64) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1420561
* Rebase to Ubuntu-3.2.0-77.112
* [Config] Disable HOTPLUG_CPU and SUSPEND
- LP: #1412331
[
This bug was fixed in the package linux-armadaxp - 3.2.0-1645.64
---
linux-armadaxp (3.2.0-1645.64) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1420561
* Rebase to Ubuntu-3.2.0-77.112
* [Config] Disable HOTPLUG_CPU and SUSPEND
- LP: #1412331
[
This bug was fixed in the package linux-ec2 - 2.6.32-376.93
---
linux-ec2 (2.6.32-376.93) lucid; urgency=low
[ Stefan Bader ]
* Rebase to Ubuntu-2.6.32-73.140
* Release Tracking Bug
- LP: #1420580
[ Ubuntu: 2.6.32-73.140 ]
* [Packaging] force "dpkg-source -I -i" behav
This bug was fixed in the package linux - 2.6.32-73.140
---
linux (2.6.32-73.140) lucid; urgency=low
[ Seth Forshee ]
* Release Tracking Bug
- LP: #1419974
[ Kamal Mostafa ]
* [Packaging] force "dpkg-source -I -i" behavior
[ Upstream Kernel Changes ]
* isofs: Fix
1 - 100 of 217 matches
Mail list logo