** Tags removed: need-duplicate-check
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1603288
Title:
package linux-image-4.4.0-31-generic (not installed) failed to
install/upgrade: unab
*** This bug is a duplicate of bug 1603288 ***
https://bugs.launchpad.net/bugs/1603288
Thank you for taking the time to report this crash and helping to make
this software better. This particular crash has already been reported
and is a duplicate of bug #1603288, so is being marked as such.
--- Comment From naveed...@in.ibm.com 2016-07-15 01:39 EDT---
(In reply to comment #96)
> I was able to reproduce with the ones in the path pointed before, but it
> uses an old 4.4.0-21.37 kernel, is it possible to get netboot files with the
> updated kernel mentioned?
(In reply to comment
The attachment, kernels.txt, are notes I took while manually bisecting ubuntu
kernels listed here:
https://launchpad.net/ubuntu/xenial/+source/linux
and mainline kernels from here:
http://kernel.ubuntu.com/~kernel-ppa/mainline/
The attachment, bisect.txt, is an annotated "git bisect log" associat
** Attachment added: "kernels.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1603230/+attachment/4701218/+files/kernels.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/160
** Attachment added: "bisect.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1603230/+attachment/4701219/+files/bisect.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/16032
** Tags removed: acpi
** Tags added: kernel-acpi
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1603230
Title:
acpi regression first bad commit
02b771b64b73226052d6e731a0987db3b47281e9
** Description changed:
I found what I believe is a regression on my Gateway ne570 laptop. It was
running mythbuntu 14.04 LTS and ubuntu 15.04 releases quite well. But when I
installed ubuntu 16.04 LTS, I found dmesg and kern.log were filling with
messages like this:
Jul 10 17:01:10 buus-ne
** Description changed:
I found what I believe is a regression on my Gateway ne570 laptop. It was
running mythbuntu 14.04 LTS and ubuntu 15.04 releases quite well. But when I
installed ubuntu 16.04 LTS, I found dmesg and kern.log were filling with
messages like this:
Jul 10 17:01:10 buus-ne
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1603289
Title:
package linux-image-4.4.0-31-g
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1603288
Title:
package linux-image-4.4.0-31-g
Please advise how to proceed
snafu$ apport-collect 1603283
/usr/share/apport/apport-gtk:16: PyGIWarning: Wnck was imported without
specifying a version first. Use gi.require_version('Wnck', '3.0') before import
to ensure that the right version gets loaded.
from gi.repository import GLib,
Public bug reported:
Install attempted by Ubuntu Mate included Update Manager along with
Grub2 update. The Grub2 update failed and according to the pop-up
announcement by the Update Manager it also caused the linux-
image-4.4.0-31-generic installation failure.
ProblemType: Package
DistroRelease:
Public bug reported:
Install attempted by Ubuntu Mate included Update Manager along with
Grub2 update. The Grub2 update failed and according to the pop-up
announcement by the Update Manager it also caused the linux-
image-4.4.0-31-generic installation failure.
ProblemType: Package
DistroRelease:
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1603283
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a commen
Public bug reported:
Today (July 14), I updated Ubuntu 16.04 running 4.4.0-28 to -31. The
machine appears to suspend, and this is confirmed in syslog. However,
when attempting resume, the screen is black and there is no indication
of resumption. The machine automatically reboots within ~15 second
tests ran: 136, failed: 0;
http://kernel.ubuntu.com/testing/3.19.0-65.73~14.04.1/onza__3.19.0-65.73~14.04.1__2016-07-15_00-29-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.
4.4.0-32-generic-51~lp1573062.1 failed.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1573062
Title:
memory_stress_ng failing for IBM Power S812LC(TN71-BP012) for 16.04
Status in linux
** Description changed:
+ [SRU Justification]
the latest binutils update in xenial to 2.26.1-1ubuntu1~16.04 changed the
name of the libbfd library from: libbfd-2.26-system.so to
libbfd-2.26.1-system.so
This apparently happened without transitioning all dependencies.
For example it broke th
** Changed in: binutils (Ubuntu Xenial)
Status: New => In Progress
** Changed in: binutils (Ubuntu Xenial)
Assignee: (unassigned) => Steve Langasek (vorlon)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
http
The only change to the symbols in 2.26.1 is one dropped internal symbol
(_bfd_*) and the soname change itself. It's appropriate to restore
binary compatibility by providing both -2.26.1- and -2.26- names on
disk.
I've uploaded this to yakkety as 2.26.1-1ubuntu2 and will do the same
for xenial-upd
tests ran: 136, failed: 0;
http://kernel.ubuntu.com/testing/3.19.0-65.73~14.04.1/onza__3.19.0-65.73~14.04.1__2016-07-14_23-14-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.
I have 16.04 installed on my laptop and my media center PC. The USB3.0
external hard drive works when plugged into the laptop but not the media
center PC. Any ideas?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://
tests ran: 20, failed: 1;
http://kernel.ubuntu.com/testing/3.19.0-65.73~14.04.1/onza__3.19.0-65.73~14.04.1__2016-07-14_21-26-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1603230
Title:
acpi regression first bad comm
Public bug reported:
I found what I believe is a regression on my Gateway ne570 laptop. It was
running mythbuntu 14.04 LTS and ubuntu 15.04 releases quite well. But when I
installed ubuntu 16.04 LTS, I found dmesg and kern.log were filling with
messages like this:
Jul 10 17:01:10 buus-ne570 ker
tests ran: 136, failed: 0;
http://kernel.ubuntu.com/testing/3.19.0-65.73~14.04.1/onibi__3.19.0-65.73~14.04.1__2016-07-14_21-07-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs
--- Comment From jhop...@us.ibm.com 2016-07-14 17:43 EDT---
I updated to: linux-image-4.4.0-31-generic 4.4.0-31.50
and remeasured performance, still looks good. Thanks! We can close this
bug now.
--
You received this bug notification because you are a member of Kernel
Packages, wh
Hi, are there any updates on when the Trusty fix will be released?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1476393
Title:
Installer initrd missing kernels for Intel X710 Adapter
tests ran: 20, failed: 0;
http://kernel.ubuntu.com/testing/3.19.0-65.73~14.04.1/onza__3.19.0-65.73~14.04.1__2016-07-14_19-36-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.
tests ran: 136, failed: 0;
http://kernel.ubuntu.com/testing/3.19.0-65.73~14.04.1/onibi__3.19.0-65.73~14.04.1__2016-07-14_20-08-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs
tests ran: 20, failed: 1;
http://kernel.ubuntu.com/testing/3.19.0-65.73~14.04.1/onibi__3.19.0-65.73~14.04.1__2016-07-14_18-23-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Changed in: kernel-sru-wo
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Changed in: kernel-sru-wo
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Changed in: kernel-sru-wo
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Changed in: kernel-sru-wo
Verified. Working fine. Thanks!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1592481
Title:
VMX kernel crypto module exhibits poor performance in Ubuntu 16.04
Status in linux package
Hi Talat-
The bug was filed against vivid which is no longer maintained. The
original submitter had requested certain patches be back-ported to vivid
because they supposedly fixed an issue.
The requested patches were back-ported and they didn't fix the issue the
submitter purported that they fix.
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1592481
Title:
VMX kernel crypto module exhibits poor p
** Changed in: linux (Ubuntu)
Importance: Undecided => High
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
htt
tests ran: 4, failed: 0;
http://kernel.ubuntu.com/testing/3.19.0-65.73~14.04.1/onza__3.19.0-65.73~14.04.1__2016-07-14_19-18-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.
tests ran: 4, failed: 0;
http://kernel.ubuntu.com/testing/3.19.0-65.73~14.04.1/onza__3.19.0-65.73~14.04.1__2016-07-14_19-01-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.
tests ran: 3, failed: 0;
http://kernel.ubuntu.com/testing/3.19.0-64.72~14.04.1/onza__3.19.0-64.72~14.04.1__2016-07-14_17-55-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.
Got the same problem with Ubuntu 16.04 with 4.4.0-28 kernel (64bit).
Tried to copy about 60GB, stuck after a few minutes:
Jul 14 18:47:41 patsy kernel: [ 6840.370388] INFO: task mount.exfat:19269
blocked for more than 120 seconds.
Jul 14 18:47:41 patsy kernel: [ 6840.370392] Tainted: P
Here you go
root@ContainerHost1:~# cat /proc/meminfo
MemTotal:8328584 kB
MemFree: 130152 kB
MemAvailable:3530108 kB
Buffers: 273056 kB
Cached: 3071076 kB
SwapCached: 598656 kB
Active: 3785684 kB
Inactive:3125476 kB
Active(anon):204
--- Comment From ru...@us.ibm.com 2016-07-14 14:12 EDT---
Closing this bug and working the updated patch via IBM bug 136437 (to be
mirrored to new LP bug to avoid confusion with this one).
*** This bug has been marked as a duplicate of bug 136437 ***
--
You received this bug notificatio
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Changed in: kernel-sru-wo
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Changed in: kernel-sru-wo
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Changed in: kernel-sru-wo
tests ran: 20, failed: 0;
http://kernel.ubuntu.com/testing/3.19.0-65.73~14.04.1/onibi__3.19.0-65.73~14.04.1__2016-07-14_16-39-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs
--- Comment From thorsten.di...@de.ibm.com 2016-07-04 06:42 EDT---
Verified succesfully with kernel 4.4.0-30-generic from xenial-proposed. Please
promote to xenial now.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubun
I can confirm same behavior as James Ferguson on a Thinkpad W520 with
Intel Wireless Centrino 6205 Advanced-N. Network manager fails to
display any signal strength and visible networks, but I am actually
connected and internet works. This didn't happen on Ubuntu 14.04.
--
You received this bug no
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Changed in: kernel-sru-wo
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Changed in: kernel-sru-wo
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Changed in: kernel-sru-wo
tests ran: 136, failed: 0;
http://kernel.ubuntu.com/testing/3.19.0-65.73~14.04.1/dwalin__3.19.0-65.73~14.04.1__2016-07-14_17-09-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bug
** Changed in: ubuntu-z-systems
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1567602
Title:
FCP devices are not detected correctly nor dete
tests ran: 30, failed: 0;
http://kernel.ubuntu.com/testing/3.19.0-65.73~14.04.1/onza__3.19.0-65.73~14.04.1__2016-07-14_16-14-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.
--- Comment From gpicc...@br.ibm.com 2016-07-14 13:34 EDT---
(In reply to comment #8)
> https://lists.ubuntu.com/archives/kernel-team/2016-July/078752.html
Tim, I'm not really sure about in which release of Xenial's kernel those
patches will be available. I mean...in 4.4.0-28 they are not
This bug was fixed in the package linux-armadaxp - 3.2.0-1669.95
---
linux-armadaxp (3.2.0-1669.95) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1597128
* Rebase to Ubuntu-3.2.0-106.147
[ Ubuntu: 3.2.0-106.147 ]
* Release Tracking Bug
- LP: #15
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1484.111
---
linux-ti-omap4 (3.2.0-1484.111) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597127
[ Ubuntu: 3.2.0-106.147 ]
* HID: core: prevent out-of-bound readings
- LP: #1579190
-
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux-lts-trusty -
3.13.0-92.139~precise1
---
linux-lts-trusty (3.13.0-92.139~precise1) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597106
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter w
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux-lts-trusty -
3.13.0-92.139~precise1
---
linux-lts-trusty (3.13.0-92.139~precise1) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597106
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter w
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux - 3.2.0-106.147
---
linux (3.2.0-106.147) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597109
[ Upstream Kernel Changes ]
* HID: core: prevent out-of-bound readings
- LP: #1579190
-- Kamal Mostafa
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/160
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1484.111
---
linux-ti-omap4 (3.2.0-1484.111) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597127
[ Ubuntu: 3.2.0-106.147 ]
* HID: core: prevent out-of-bound readings
- LP: #1579190
-
This bug was fixed in the package linux-lts-trusty -
3.13.0-92.139~precise1
---
linux-lts-trusty (3.13.0-92.139~precise1) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597106
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter w
This bug was fixed in the package linux - 3.2.0-106.147
---
linux (3.2.0-106.147) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597109
[ Upstream Kernel Changes ]
* HID: core: prevent out-of-bound readings
- LP: #1579190
-- Kamal Mostafa
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux-armadaxp - 3.2.0-1669.95
---
linux-armadaxp (3.2.0-1669.95) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1597128
* Rebase to Ubuntu-3.2.0-106.147
[ Ubuntu: 3.2.0-106.147 ]
* Release Tracking Bug
- LP: #15
This bug was fixed in the package linux - 3.2.0-106.147
---
linux (3.2.0-106.147) precise; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597109
[ Upstream Kernel Changes ]
* HID: core: prevent out-of-bound readings
- LP: #1579190
-- Kamal Mostafa
This bug was fixed in the package linux-lts-utopic -
3.16.0-77.99~14.04.1
---
linux-lts-utopic (3.16.0-77.99~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597047
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when m
This bug was fixed in the package linux-lts-vivid - 3.19.0-65.73~14.04.1
---
linux-lts-vivid (3.19.0-65.73~14.04.1) trusty; urgency=low
[ Ben Romer ]
* Release Tracking Bug
- LP: #1596643
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
--- Comment From thorsten.di...@de.ibm.com 2016-07-04 06:42 EDT---
Verified succesfully with kernel 4.4.0-30-generic from xenial-proposed. Please
promote to xenial now.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubun
This bug was fixed in the package linux-lts-wily - 4.2.0-42.49~14.04.1
---
linux-lts-wily (4.2.0-42.49~14.04.1) trusty; urgency=low
[ Ben Romer ]
* Release Tracking Bug
- LP: #1597108
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
This bug was fixed in the package linux-lts-vivid - 3.19.0-65.73~14.04.1
---
linux-lts-vivid (3.19.0-65.73~14.04.1) trusty; urgency=low
[ Ben Romer ]
* Release Tracking Bug
- LP: #1596643
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
This bug was fixed in the package linux-lts-wily - 4.2.0-42.49~14.04.1
---
linux-lts-wily (4.2.0-42.49~14.04.1) trusty; urgency=low
[ Ben Romer ]
* Release Tracking Bug
- LP: #1597108
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
This bug was fixed in the package linux-lts-utopic -
3.16.0-77.99~14.04.1
---
linux-lts-utopic (3.16.0-77.99~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597047
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when m
This bug was fixed in the package linux - 3.13.0-92.139
---
linux (3.13.0-92.139) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597060
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
loading is restricted
This bug was fixed in the package linux-lts-utopic -
3.16.0-77.99~14.04.1
---
linux-lts-utopic (3.16.0-77.99~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597047
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when m
This bug was fixed in the package linux-lts-vivid - 3.19.0-65.73~14.04.1
---
linux-lts-vivid (3.19.0-65.73~14.04.1) trusty; urgency=low
[ Ben Romer ]
* Release Tracking Bug
- LP: #1596643
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
This bug was fixed in the package linux-lts-utopic -
3.16.0-77.99~14.04.1
---
linux-lts-utopic (3.16.0-77.99~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597047
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when m
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux - 3.13.0-92.139
---
linux (3.13.0-92.139) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597060
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
loading is restricted
This bug was fixed in the package linux - 3.13.0-92.139
---
linux (3.13.0-92.139) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597060
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
loading is restricted
This bug was fixed in the package linux - 3.13.0-92.139
---
linux (3.13.0-92.139) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597060
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
loading is restricted
This bug was fixed in the package linux - 3.13.0-92.139
---
linux (3.13.0-92.139) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597060
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
loading is restricted
This bug was fixed in the package linux - 3.13.0-92.139
---
linux (3.13.0-92.139) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597060
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
loading is restricted
This bug was fixed in the package linux - 3.13.0-92.139
---
linux (3.13.0-92.139) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597060
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
loading is restricted
This bug was fixed in the package linux - 3.13.0-92.139
---
linux (3.13.0-92.139) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597060
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
loading is restricted
This bug was fixed in the package linux - 3.13.0-92.139
---
linux (3.13.0-92.139) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597060
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
loading is restricted
This bug was fixed in the package linux-raspi2 - 4.2.0-1034.44
---
linux-raspi2 (4.2.0-1034.44) wily; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597107
[ Ubuntu: 4.2.0-42.49 ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
loadi
This bug was fixed in the package linux - 3.13.0-92.139
---
linux (3.13.0-92.139) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1597060
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
loading is restricted
This bug was fixed in the package linux - 4.2.0-42.49
---
linux (4.2.0-42.49) wily; urgency=low
[ Ben Romer ]
* Release Tracking Bug
- LP: #1597053
[ Josh Boyer ]
* SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
loading is restricted
- LP: #156
This bug was fixed in the package linux - 4.4.0-31.50
---
linux (4.4.0-31.50) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1602449
* nouveau: boot hangs at blank screen with unsupported graphics cards
(LP: #1602340)
- SAUCE: drm: check for su
1 - 100 of 206 matches
Mail list logo