** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Released
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Released
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1508329
Title:
CVE-2015-7799
Status in linux pa
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1510805
Title:
CVE-2015-7990
Status in linux pa
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1530403
Title:
CVE-2015-8550
Status in linux pa
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-lts-vivid (Ubuntu Trusty)
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Released
** Changed in: linux-lts-vivid (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1521273
Title:
CVE-2015-8374
Status in linux pa
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1517951
Title:
CVE-2013-7446
Status in linux pa
** Changed in: linux-lts-wily (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
tests ran: 87, failed: 42;
http://kernel.ubuntu.com/testing/3.19.0-50.56~14.04.1/kili__3.19.0-50.56~14.04.1__2016-02-06_01-23-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs
** Tags removed: verification-needed-wily
** Tags added: verification-done-wily
** Changed in: hwe-next
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kerne
** Tags removed: verification-needed-wily
** Tags added: verification-done-wily
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1526330
Title:
Fix mic-in mode for a few Dell laptops
Stat
** Tags removed: verification-needed-vivid verification-needed-wily
** Tags added: verification-done-vivid verification-done-wily
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1523517
Tit
** Tags removed: verification-needed-wily
** Tags added: verification-done-wily
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1519168
Title:
There is noise for headphone playback after
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1542564
Title:
Atheros AR9462 Bluetooth canno
** Changed in: bcmwl (Ubuntu Vivid)
Importance: Undecided => High
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bcmwl in Ubuntu.
https://bugs.launchpad.net/bugs/1424676
Title:
bcmwl-kernel-source 6.30.223.248+bdcom-0ubuntu2: bcmwl
Public bug reported:
Recently upgraded WiFi modules, on Dell Inspiron 15R and Dell Inspiron
660s, to Qualcomm Atheros AR9462 WiFi/Bluetooth combo. WiFi worked, OOB,
with no problems. OS detects Bluetooth device, shows the indicator icon,
and can be turned on and off.
lsusb: Bus 003 Device 003: ID
I'm unable to reproduce the problem on wily (I'm actually running wily,
not trusty with the wily kernel), so I changed the verification-needed-
wily tag to verification-done-wily.
** Tags removed: verification-needed-wily
** Tags added: verification-done-wily
--
You received this bug notificatio
Attached is the syslog from my Krillin device from a few minutes before
attempting the pairing until failure.
I hope this may help speed things up.
I'm willing to test new stuff to help fix this issue.
** Attachment added: "syslog (trimmed to the last few minutes before pairing)"
https://bugs
Would someone please provide a simple test case to verify that the
version in -proposed fixes the bug?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1533043
Title:
AUFS can hang up; Ple
fixed with last relase!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1525320
Title:
Aquaris E4.5 can't connect with car [Skoda Fabia] using bluetooth
Status in Canonical System Image:
** Bug watch added: Linux Kernel Bug Tracker #111901
http://bugzilla.kernel.org/show_bug.cgi?id=111901
** Also affects: linux via
http://bugzilla.kernel.org/show_bug.cgi?id=111901
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member o
** Description changed:
This bug is for tracking the 3.16.0-61.81~14.04.1 upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
tests ran: 170, failed: 1;
http://kernel.ubuntu.com/testing/3.19.0-50.56/onza__3.19.0-50.56__2016-02-05_13-06-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540576
tests ran: 153, failed: 1;
http://kernel.ubuntu.com/testing/3.19.0-50.56~14.04.1/dagmar__3.19.0-50.56~14.04.1__2016-02-05_20-44-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bug
@Jeff
I have an external sound card (Topping VX2). And also a CAD u37 usb
microphone. When they are plugged into my machine, it hangs forever at
the login screen and won't let me type into the password field. If I
remove the devices, it immediately resolves the issue and I'm able to
log in. Howeve
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1541076
Title:
linux-lts-utopic:
tests ran: 66, failed: 66;
http://kernel.ubuntu.com/testing/3.16.0-61.81~14.04.1/dwalin__3.16.0-61.81~14.04.1__2016-02-05_20-53-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://b
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
Talat - I can't use a BZR branch. Plus, it looks like you'e squashed all
of the patches together. What I really want is a pull request from a git
repository that shows each upstream commit that you've used to enable
SR-IOV. Be sure to use the '-x' option to 'git cherry-pick' when
constructing your
** Description changed:
-
- SRU Justification
-
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originat
@Larry Tate:
I don't observe any Compiz or Pulse issues
What are the specific devices triggering these issues for you?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1437492
Title:
b
I've tested and confirmed this bug on 4.5.0-040500rc2-generic
#201601312230.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1523917
Title:
Macbook Air 6.2 suspend immediately resumes
S
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Assignee: Taco Screen team (taco-screen-team)
Status: New
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Wily)
Status: New => In Progress
** Changed i
** Description changed:
This bug is for tracking the 3.2.0-1477.100 upload package. This bug
will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable
These 2 patches are already in Ubuntu-4.4.0-4.19
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Assignee: Taco Screen team (taco-screen-team)
Status: Triaged
** Changed in: linux (Ubuntu Xenial)
Status: Triaged => Fix Released
** Changed in: linux (Ubuntu Xenial)
** Description changed:
This bug is for tracking the 3.13.0-78.122~precise1 upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kerne
** Description changed:
This bug is for tracking the 3.19.0-50.56~14.04.1 upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-
Guessed so. Oleg did a marvellous job in figuring that out. That was not
easy-peasy by any means.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1536397
Title:
[nForce2] pata_amd pata_ac
** Package changed: ubuntu => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1542444
Title:
ib1: sendonly multicast join failed for
ff12:601b::::::00
You have been subscribed to a public bug:
---Problem Description---
ib1: sendonly multicast join failed for
ff12:601b::::::0016, status -22 (Multicast)
---uname output---
Linux ltcalpine-lp4 4.2.0-21-generic #25~14.04.1-Ubuntu SMP Thu Dec 3 13:55:42
UTC 2015 ppc64le ppc64l
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.launchpad.net/bugs/1540792
Title:
linux-lts-vivid: 3.
** Bug watch added: Linux Kernel Bug Tracker #111991
http://bugzilla.kernel.org/show_bug.cgi?id=111991
** Also affects: linux via
http://bugzilla.kernel.org/show_bug.cgi?id=111991
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member o
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1540752
Title:
linux-lts-trusty:
My system can boot successfully with this workaround (kernel option
"pci=nocrs").
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1536397
Title:
[nForce2] pata_amd pata_acpi can't load
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1540720
Title:
linux-ti-omap4: 3.2.
tests ran: 180, failed: 0;
http://kernel.ubuntu.com/testing/3.19.0-50.56~14.04.1/dagmar__3.19.0-50.56~14.04.1__2016-02-05_18-21-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bug
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
tests ran: 2, failed: 0;
http://kernel.ubuntu.com/testing/3.16.0-61.81~14.04.1/dwalin__3.16.0-61.81~14.04.1__2016-02-05_19-27-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bu
** Tags added: kernel-fixed-upstream kernel-fixed-upstream-4.5-rc2
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1522472
Title:
Black screen on boot after updating Trusty
Status in lin
Sergey:
>"System can to boot."
Are you saying it can boot successfully, or it is not able to boot?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1536397
Title:
[nForce2] pata_amd pata_
** Tags removed: verification-needed-trusty verification-needed-vivid
verification-needed-wily
** Tags added: verification-done-trusty verification-done-vivid
verification-done-wily
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux i
Also not working in Ubuntu 16.04:
#
uname -a:
Linux msi 4.4.0-2-generic #16-Ubuntu SMP Thu Jan 28 15:44:21 UTC 2016 x86_64
x86_64 x86_64 GNU/Linux
##
hwinfo | grep bluetooth:
E: KEYBOARD_KEY_e2=bluetooth
bluetooth 520192 10 ath3k,bn
--- Comment From ukri...@us.ibm.com 2016-02-05 14:00 EDT---
The Accelerator Function Unit (AFU) for this new IBM CXL Flash Adapter retains
the same host interface as the previous generation. For early prototypes of the
new card, the driver
with this change behaves exactly as the driver pr
Verified ok in Trusty (3.13.0-78.122) and Precise
(3.13.0-78.122~precise1). The 'jdns' test (comment #20) passes for
3.13.0-78.122 kernels (but fails for the previous versions).
** Tags removed: performing-bisect verification-needed-trusty
** Tags added: verification-done-trusty
--
You received
I tested "pci=nocrs" kernel option on the 3.19.0-50-generic. System can
to boot.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1536397
Title:
[nForce2] pata_amd pata_acpi can't load
St
linux-image-4.2.0-28-generic in -proposed solves the problem.
** Tags removed: verification-needed-wily
** Tags added: verification-done-wily
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs
Didn't see the part where you said to mark it as "confirmed", did that
just now.
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1542412
Title:
[drm:intel_set_pch_fifo_underr
@brad-figg
The verification of this patch has been done in
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1522949/comments/18
** Tags removed: verification-needed-wily
** Tags added: verification-done-wily
--
You received this bug notification because you are a member of Kernel
Packages,
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from today
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from today
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from today
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from today
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from today
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from today
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from today
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from today
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from today
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from today
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from today
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from today
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from today
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from today
tests ran: 147, failed: 1;
http://kernel.ubuntu.com/testing/3.13.0-78.122~precise1/dagmar__3.13.0-78.122~precise1__2016-02-05_16-31-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https:
Elitebook 840 G1 here with HP 2013 UltraSlim-Docking Station.
I was able to connect and recognize the monitor via Docking Station,
however the graphics are flickering and mouse seems to freeze when
moving fast.
Also there are problems when dragging windows to the sides of the screen
for resizing
Public bug reported:
dmesg:
[ 128.007882] [drm:intel_set_pch_fifo_underrun_reporting [i915]] *ERROR*
uncleared pch fifo underrun on pch transcoder A
[ 128.007924] [drm:intel_pch_fifo_underrun_irq_handler [i915]] *ERROR* PCH
transcoder A FIFO underrun
[ 136.606407] [drm:intel_set_pch_fifo_unde
Closing that outdated report as EOL has been reached long time ago
** Changed in: fedora
Status: New => Invalid
** Changed in: linux (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to lin
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a member
** Changed in: linux (Ubuntu Precise)
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1486670
Title:
using ipsec, many connections result in no buffe
@iacobs: I tried your package on Arch Linux (kernel 4.4.1-2-ARCH), but
when I plug in an SD card, I get the following errors in dmesg:
[ 434.301513] au6601-pci :02:00.0: AU6601 controller found [1aea:6601]
(rev 0)
[ 434.301607] au6601-pci :02:00.0: enabling device (0004 -> 0006)
[ 434.
tests ran: 148, failed: 0;
http://kernel.ubuntu.com/testing/3.13.0-78.122~precise1/dagmar__3.13.0-78.122~precise1__2016-02-05_14-42-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https:
1 - 100 of 155 matches
Mail list logo