@timarmstrong
now i use kernel 3.16 ,it works well!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1239578
Title:
No wireless support for Realtek RTL8192EE [10ec:818b]
Status in HWE Ne
The bug exists in mainline too.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1339768
Title:
VMWare graphics driver regression
Status in “linux” package in Ubuntu:
Confirmed
Bug des
@timarmstrong
sorry,it just lasts 50 minutes
now...
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1239578
Title:
No wireless support for Realtek RTL8192EE [10ec:818b]
Status in HW
** Description changed:
- All versions of the Linux kernel (3x/2x) with LZO support (lib/lzo) that
- set the HAVE_EFFICIENT_UNALIGNED_ACCESS configuration option. Currently,
- this seems to include PowerPC and i386. Vulnerability Tested: -
- Via btrfs - Stand alone Functions Affected:
Promoted 3.2.0-1636.52 to proposed.
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/
** Description changed:
This bug is for tracking the 3.2.0-1636.52 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1337516
Title:
hpsa driver needs more Gen9 PCI ID's
Status in HP ISS project
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1337339
Title:
x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014
** Description changed:
- All versions of the LZ4 software:https://code.google.com/p/lz4 Functions
- Affected: lz4.c:LZ4_decompress_generic Criticality Reasoning
- - Due to the design of the algorithm, an attacker
- can specify any desired offset to a write pointer. The at
** Description changed:
- [sctp: sk_ack_backlog wrap-around problem] DOS
+ The sctp_association_free function in net/sctp/associola.c in the Linux
+ kernel before 3.15.2 does not properly manage a certain backlog value,
+ which allows remote attackers to cause a denial of service (socket
+ outage)
** Description changed:
- Don't allow ptrace to set RIP to a value that couldn't happen by
- ordinary control flow. There are CPU bugs^Wfeatures that can have
- interesting effects if RIP is non-canonical. I didn't make the
- corresponding x86_32 change, since x86_32 has no concept of canonical
-
The linux-lts-saucy kernel 3.11.0-26.44~precise1 is now available in
-proposed. It contains the following upstream commit, that fixes this
bug:
commit 1fd819ecb90cc9b822cd84d3056ddba315d3340f
Author: Michael S. Tsirkin
Date: Mon Mar 10 19:28:08 2014 +0200
skbuff: skb_segment: orphan frags
CVE-2014-2580
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affec
Public bug reported:
This bug is for tracking the 3.16.0-2.6 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-Prepare-package-start:T
*** This bug is a security vulnerability ***
Public security bug reported:
The netback driver in Xen, when using certain Linux versions that do not
allow sleeping in softirq context, allows local guest administrators to
cause a denial of service ("scheduling while atomic" error and host
crash) vi
If this is same bug as upstream:
https://bugzilla.kernel.org/show_bug.cgi?id=65191
Then please merge the related upstream commit:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=945b2b2d259d1a4364a2799e80e8ff32f8c6ee6f
Downstream related tracker on Docker project:
htt
I noticed on
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1314274 that a fix
is going to be released for Trusty, and if this is a duplicate that will
properly address the issue. Sorry for the noise.
--
You received this bug notification because you are a member of Kernel
Packages, which i
Public bug reported:
USB devices only work sometimes in Ubuntu. Seems since I started using
this Z87 mb USB devices have not reliably worked all of the time.
Expected behaviour is for USB keyboard, mouse and other devices such as
microphones and portable drives to be detected.
ProblemType: Bug
Di
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1340102
Title:
USB devices only sometimes wor
** Changed in: linux (Ubuntu)
Status: Confirmed => Fix Committed
** Changed in: hwe-next/trusty
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/13
** Changed in: kernel-sru-workflow/verification-testing
Status: New => In Progress
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Description changed:
This bug is for tracking the 3.2.0-1636.52 upload package. This bug will
contain status and
Public bug reported:
CID: 201402-14663 Dell Latitude XFR 12
According to Dell's website[1], this system comes with a multi-touch screen
But only two-finger pinch / expand zoom is supported on this system
Steps:
1. Install 14.04 + update (3.13.0-30), boot to desktop
2. Try to open Dash with 4 fin
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1340110
Title:
[Dell Latitude XFR 12] Touchsc
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Utopic)
Importance: Medium
Status: Confirmed
** Changed in: linux (Ubuntu Trusty)
Status: New => In Progress
** Changed in: linux (Ubuntu Trusty)
Assignee: (una
Public bug reported:
CID: 201402-14663 Dell Latitude XFR 12
The touchpad on this system was recognized as a Wheel mouse,
the vertical edge scrolling works, as well as the 2-finger vertical scrolling
However, horizontal edge scrolling and 2-finger horizontal scrolling does not
work.
>From the "M
** Also affects: hwe-next
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1340110
Title:
[Dell Latitude XFR 12] Touchscreen 3-finger / 4-finger
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1340116
Title:
[Dell Latitude XFR 12] Touchpa
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you are a member
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: bluez (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1035431
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you are a member
There's a private bug related to horizontal / vertical scrolling issue:
bug 1258022
** Summary changed:
- [Dell Latitude XFR 12] Touchpad recognized as a wheel mouse, horizontal
scrolling does not work with 1 or 2 fingers
+ [Dell Latitude 12 Rugged Extreme] Touchpad recognized as a wheel mouse,
** Description changed:
- CID: 201402-14663 Dell Latitude XFR 12
+ CID: 201402-14663 Dell Latitude 12 Rugged Extreme
The wireless key does not work on this system.
Keypress event could be captured by showkey, but not the release event
- (Therefore the wireless LED won't change its color)
-
** Summary changed:
- [Dell Latitude XFR 12] Microphone mute key does not work
+ [Dell Latitude 12 Rugged Extreme] Microphone mute key does not work
** Description changed:
- CID: 201402-14663 Dell Latitude XFR 12
+ CID: 201402-14663 Dell Latitude 12 Rugged Extreme
The microphone mute key d
** Summary changed:
- [Dell Latitude XFR 12] Touchscreen 3-finger / 4-finger gestures does not work
+ [Dell Latitude 12 Rugged Extreme] Touchscreen 3-finger / 4-finger gestures
does not work
** Description changed:
- CID: 201402-14663 Dell Latitude XFR 12
+ CID: 201402-14663 Dell Latitude 12 R
Aaahh Ahh, could you please provide the missing information following
https://wiki.ubuntu.com/DebuggingKernelSuspend ?
** Tags added: needs-suspend-debug
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launch
Saurabh Rawat, the next step is to fully reverse commit bisect the
kernel in order to identify the offending commit. Could you please do
this following
https://wiki.ubuntu.com/Kernel/KernelBisection#How_do_I_reverse_bisect_the_upstream_kernel.3F
?
** Tags added: needs-reverse-bisect
--
You recei
John D Marsden, did this problem not occur in a release prior to Trusty?
** Changed in: linux (Ubuntu)
Status: Confirmed => Incomplete
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs
Tim, as per http://download.lenovo.com/ibmdl/pub/pc/pccbbs/mobiles/7uuj49uc.txt
an update to your BIOS is available (3.24). If you update to this following
https://help.ubuntu.com/community/BiosUpdate does it change anything? If it
doesn't, could you please both specify what happened, and provi
Frank Holgar Rothkamm, thank you for reporting this and helping make Ubuntu
better. Could you please test the latest upstream kernel available from the
very top line at the top of the page (not the daily folder) following
https://wiki.ubuntu.com/KernelMainlineBuilds ? It will allow additional
u
Po-Hsu Lin / Anthony Wong, could you please test the latest upstream kernel
available from the very top line at the top of the page (not the daily folder)
following https://wiki.ubuntu.com/KernelMainlineBuilds ? It will allow
additional upstream developers to examine the issue. Once you've teste
Po-Hsu Lin / Anthony Wong, could you please test the latest upstream kernel
available from the very top line at the top of the page (not the daily folder)
following https://wiki.ubuntu.com/KernelMainlineBuilds ? It will allow
additional upstream developers to examine the issue. Once you've teste
Po-Hsu Lin / Anthony Wong, could you please test the latest upstream kernel
available from the very top line at the top of the page (not the daily folder)
following https://wiki.ubuntu.com/KernelMainlineBuilds ? It will allow
additional upstream developers to examine the issue. Once you've teste
Po-Hsu Lin / Anthony Wong, could you please test the latest upstream kernel
available from the very top line at the top of the page (not the daily folder)
following https://wiki.ubuntu.com/KernelMainlineBuilds ? It will allow
additional upstream developers to examine the issue. Once you've teste
** Tags added: latest-bios-f10
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1340102
Title:
[Gigabyte GA-Z87M-D3H] USB devices only sometimes work in Ubuntu, but
work in bios/uefi/Win
Rob Whyte, could you please test the latest upstream kernel available from the
very top line at the top of the page (not the daily folder) following
https://wiki.ubuntu.com/KernelMainlineBuilds ? It will allow additional
upstream developers to examine the issue. Once you've tested the upstream
Luc Pionchon, could you please test the latest upstream kernel available from
the very top line at the top of the page (not the daily folder) following
https://wiki.ubuntu.com/KernelMainlineBuilds ? It will allow additional
upstream developers to examine the issue. Once you've tested the upstrea
Unfortunately upstream didn't deliver on their promise of backporting
the fix to 3.13. It's applied on 3.14 onwards
(http://article.gmane.org/gmane.linux.kernel/1611767), but Trusty is
still broken. Can we get either the patch version included here, or a
backport of the version included in 3.14 i
I really don't understand why this need of asking users to file
duplicate bugs. This is a bug with a specific piece of hardware. Any
user that has this piece of hardware is affected. Why do you want one
bug per user? This makes it much harder to track the progress on the
issue... For example, on
Adding more information from other sources.
The bugzilla bug (https://bugzilla.kernel.org/show_bug.cgi?id=60824)
says that it's working since 3.14.1
This is the commit where it's fixed:
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/include/net/bluetooth/hci.h?id=f9f4
Repeating information from the original bug:
The bugzilla bug (https://bugzilla.kernel.org/show_bug.cgi?id=60824)
says that it's working since 3.14.1
This is the commit where it's fixed:
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/include/net/bluetooth/hci.h?id=f9f
My link was to specific file in the commit, but from it you can get to the
whole patch. Link to the full patch:
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/patch/?id=f9f462faa02777f497eb25255683a94e0c054de6
--
You received this bug notification because you are a member
In answer to "did this problem not occur in a release prior to Trusty?":
I'm sorry, I don't know for sure. I only noticed the problem the day I
first reported it, however my behaviour regarding shutdowns rather than
suspends has recently changed so that may well be why I noticed it. My
wife hadn
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
precise' to 'verification-done-precise'.
If verification is not done by 5 working days from
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
You have been subscribed to a public bug:
Canonical,
We would like to have the following patch as part of 14.04. Is it
possible to have it before 14.04.02?
powerpc/powernv: Fix endianness problems in EEH
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ddf0322a3ffe2d
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
I have the same issue on Ubuntu 12.04 LTS using Trusty kernel:
Linux version 3.13.0-29-generic (buildd@roseapple) (gcc version 4.6.3
(Ubuntu/Linaro 4.6.3-1ubuntu5) ) #53~precise1-Ubuntu SMP Wed Jun 4
22:06:25 UTC 2014
Distributor ID: Ubuntu
Description:Ubuntu 12.04.4 LTS
Release:12.04
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
To clarify: the kernel in -proposed contains the changes which should
fix the problems with the -8 firmware. So please test that kernel with
the -8 firmware and verify that the problems previously seen with the -8
firmware are fixed. Thanks!
--
You received this bug notification because you are a
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
** Package changed: ubuntu => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1340200
Title:
Backport EEH patches to 14.04
Status in “linux” package in Ubuntu:
New
Bug
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1340200
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a commen
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
I'm no expert. If someone can give me exact instructions on how to
update just the appropriate package on 14.04, and nothing else, I'll
test it.
The documentation is a bit too generic for me to be 100% sure I know
what I'm doing - I am not even sure of the exact package name and
whether there are
I can boot from disk, so yeah, it's good :)
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1335645
Titl
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1328295
Title:
[serial] use hw flow control if supporte
dannf@mustang:~$ lsmod | grep gpio
gpio_dwapb 4990 0
gpio_generic4247 1 gpio_dwapb
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscrib
Verified on 2 platforms with different phy tunings.
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/13356
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1332220
Title:
Backport hdmi_portclock_limit regression
Hi Brad,
In fact this is not a bug, so, it doesn't make sense to have apport log
colletion. This is a request to see if it is still feasible to have
cannonical backporting the EEH code to 14.04.
Thank you,
Breno
** Changed in: linux (Ubuntu)
Status: Incomplete => New
--
You received thi
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1340200
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a commen
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu)
Importance: Medium => High
** Changed in: linux (Ubuntu)
Status: Incomplete => Triaged
** Tags added: bot-stop-nagging kernel-da-key
** Tags added: ppc64el
--
You received this bug notific
Public bug reported:
I am using Dell xps-l501x and i recently upgraded my ubuntu to 14.04.
when i press f5, the brightness increases and when i press f5 to decrease, it
reaches maximum.
In the touch panel which has 3 buttons, the middle button performs the action
which was supposed to be the fu
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1340257
Title:
brightness keys are not workin
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1296591
Title:
RTL8188EE [10ec:8179] and RTL8723BE [10e
Dear all,
thanks for fixing the issue. After installing the latest kernel
(3.13.0-32.56) from -proposed, I have verified that the issue is now
fixed.
As confirmed by the tcpdump:
root@ubuntu1404:~# tcpdump -n -i eth0 '(ip6)&&((udp port 546)||(udp port 547))'
tcpdump: verbose output suppressed, us
1 - 100 of 171 matches
Mail list logo