This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
utopic' to 'verification-done-utopic'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
precise' to 'verification-done-precise'.
If verification is not done by 5 working days from
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
mikelococo: this is a request for testing the Precise kernel that is
currently in -proposed (kernel version 3.2.0-87.125). This kernel
version should contain the fix for this bug, and I am asking the
original bug reporter (or anyone else affected by this bug) to verify
that it is indeed fixed.
If
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1427778
Title:
Utopic update to 3.16.7-ckt7 stable relea
** Also affects: linux (Ubuntu Precise)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1427736
Title:
linux: 3.2.0-78.113 -proposed tracker
S
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1427733
Title:
linux: 3.13.0-47.78 -proposed tracker
St
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1427767
Title:
Utopic update to 3.16.7-ckt6 stable relea
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1427808
Title:
linux: 3.16.0-32.42 -proposed tracker
St
*** This bug is a security vulnerability ***
Public security bug reported:
Placeholder
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-ec2 (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-fsl-imx51 (Ubuntu)
Importance:
CVE-2015-0274
** Also affects: linux (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects:
*** This bug is a duplicate of bug 1429821 ***
https://bugs.launchpad.net/bugs/1429821
duplicate 1429821
** This bug has been marked a duplicate of bug 1429821
CVE-2015-0274
** This bug has been marked a duplicate of bug 1429821
CVE-2015-0274
--
You received this bug notification b
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1429821
Title:
CVE-2015-0274
Status in linux package in
duplicate 1429821
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-backport-maverick in Ubuntu.
https://bugs.launchpad.net/bugs/1429824
Title:
CVE-2015-0274
Status in linux package in Ubuntu:
Incomplete
Status in linux-ec2 p
Public bug reported:
This bug is for tracking the 3.13.0-48.79 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-packag
seems to fix these issues.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Luis Henriques (henrix)
Status: Triaged
** Affects: linux (Ubuntu Precise)
Importance: Undecided
Status: Triaged
** Also affects: linux (Ubuntu Precise)
Importance: Undecided
** Summary changed:
- linux: 3.13.0-48.79 -proposed tracker
+ linux: 3.13.0-48.80 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1431263
Title:
linux: 3.13.0-48.80 -pr
** Summary changed:
- linux: 3.16.0-33.43 -proposed tracker
+ linux: 3.16.0-33.44 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1431304
Title:
linux: 3.16.0-33.44 -pr
*** This bug is a duplicate of bug 1431304 ***
https://bugs.launchpad.net/bugs/1431304
** This bug has been marked a duplicate of bug 1431304
linux: 3.16.0-33.44 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to lin
Public bug reported:
This bug is for tracking the 3.16.0-33.43 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-packag
*** This bug is a duplicate of bug 1431359 ***
https://bugs.launchpad.net/bugs/1431359
** This bug has been marked a duplicate of bug 1431359
linux: 3.2.0-79.115 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to lin
** Changed in: linux (Ubuntu Precise)
Status: Triaged => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1431280
Title:
x86: mm/fault: Fix semaphore imbalance
Status
Public bug reported:
This bug is for tracking the 3.2.0-79.115 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-packag
*** This bug is a duplicate of bug 1431491 ***
https://bugs.launchpad.net/bugs/1431491
** This bug has been marked a duplicate of bug 1431491
linux-lts-trusty: 3.13.0-48.80~precise1 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
** Changed in: linux (Ubuntu)
Status: New => Invalid
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1434639
** Changed in: linux (Ubuntu)
Status: Triaged => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1430184
Title:
trusty: fail to pass xfstests(generic/324)
Status in
** Changed in: linux-lts-trusty (Ubuntu)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1416940
Title:
[HP Pavilion dv6] Brightness c
** Changed in: linux (Ubuntu Precise)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1431473
Title:
kvm_intel (nested) module will not load [Inp
** Changed in: linux (Ubuntu)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1434528
Title:
[utopic] btrfs: label should not contain return ch
Public bug reported:
This bug is for tracking the 3.16.0-34.45 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-packag
** Changed in: linux (Ubuntu Utopic)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bug
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Utopic)
Status: New =
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Trusty)
Status: New =
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
** Changed in: linux (Ubuntu)
Status: Fix Committed => Invalid
--
You received this bug notification because you are a member of Ker
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.laun
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1434595
Title:
Utopic update to 3.16.7-ckt7 stable release
Status
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.laun
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1408697
Title:
Utopic update to 3.16.7-ckt3 stable release
Status
Paolo tested this kernel; adding "qa-testing-passed" tag and setting
"Regression-testing " task to 'fix-released'.
** Tags added: qa-testing-passed
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
amd64 kernel in -proposed tested using the POC and the iptables-test.py
test-suite (from git://git.netfilter.org/iptables)
** Attachment added: "iptables-test.py test suite log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1595874/+attachment/4690979/+files/4.4.0-28-generic-proposed.lo
amd64 kernel in -proposed tested using the POC and the iptables-test.py
test-suite (from git://git.netfilter.org/iptables)
** Attachment added: "iptables-test.py test suite log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1595914/+attachment/4690987/+files/4.2.0-41-generic-proposed.lo
amd64 kernel in -proposed tested using the POC and the iptables-test.py
test-suite (from git://git.netfilter.org/iptables)
** Attachment added: "iptables-test.py test suite log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1595976/+attachment/4690988/+files/3.19.0-64-generic-proposed.l
amd64 kernel in -proposed tested using the POC and the iptables-test.py
test-suite (from git://git.netfilter.org/iptables)
** Attachment added: "iptables-test.py test suite log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1595991/+attachment/4690989/+files/3.13.0-91-generic-proposed.l
Public bug reported:
This bug is for tracking the 4.4.0-28.47 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Affects: kernel-sru-workfl
*** This bug is a duplicate of bug 1595874 ***
https://bugs.launchpad.net/bugs/1595874
** This bug has been marked a duplicate of bug 1595874
linux: 4.4.0-28.47 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linu
*** This bug is a duplicate of bug 1595874 ***
https://bugs.launchpad.net/bugs/1595874
** This bug is no longer a duplicate of bug 1594906
linux: 4.4.0-27.46 -proposed tracker
** This bug has been marked a duplicate of bug 1595772
linux: 4.4.0-28.47 -proposed tracker
** This bug is no l
*** This bug is a duplicate of bug 1595874 ***
https://bugs.launchpad.net/bugs/1595874
** This bug is no longer a duplicate of bug 1594906
linux: 4.4.0-27.46 -proposed tracker
** This bug has been marked a duplicate of bug 1595772
linux: 4.4.0-28.47 -proposed tracker
** This bug is no l
*** This bug is a duplicate of bug 1595874 ***
https://bugs.launchpad.net/bugs/1595874
** This bug has been marked a duplicate of bug 1595772
linux: 4.4.0-28.47 -proposed tracker
** This bug is no longer a duplicate of bug 1595772
linux: 4.4.0-28.47 -proposed tracker
** This bug has bee
Public bug reported:
This bug is for tracking the 4.2.0-41.48 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Affects: kernel-sru-workfl
*** This bug is a duplicate of bug 1595914 ***
https://bugs.launchpad.net/bugs/1595914
** This bug is no longer a duplicate of bug 1595725
linux: 4.2.0-40.47 -proposed tracker
** This bug has been marked a duplicate of bug 1595914
linux: 4.2.0-41.48 -proposed tracker
--
You received th
*** This bug is a duplicate of bug 1595914 ***
https://bugs.launchpad.net/bugs/1595914
** This bug has been marked a duplicate of bug 1595914
linux: 4.2.0-41.48 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linu
*** This bug is a duplicate of bug 1595976 ***
https://bugs.launchpad.net/bugs/1595976
Public bug reported:
This bug is for tracking the 3.19.0-64.72 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated wo
*** This bug is a duplicate of bug 1595976 ***
https://bugs.launchpad.net/bugs/1595976
** This bug has been marked a duplicate of bug 1595974
linux: 3.19.0-64.72 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to lin
*** This bug is a duplicate of bug 1595976 ***
https://bugs.launchpad.net/bugs/1595976
** Changed in: kernel-sru-workflow/automated-testing
Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)
** Changed in: kernel-sru-workflow/certification-testing
Importance: Unde
*** This bug is a duplicate of bug 1595976 ***
https://bugs.launchpad.net/bugs/1595976
** This bug is no longer a duplicate of bug 1595723
linux: 3.19.0-63.71 -proposed tracker
** This bug has been marked a duplicate of bug 1595974
linux: 3.19.0-64.72 -proposed tracker
--
You received
Public bug reported:
This bug is for tracking the 3.19.0-64.72 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Affects: kernel-sru-workf
*** This bug is a duplicate of bug 1595976 ***
https://bugs.launchpad.net/bugs/1595976
** This bug has been marked a duplicate of bug 1595976
linux: 3.19.0-64.72 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to lin
*** This bug is a duplicate of bug 1595976 ***
https://bugs.launchpad.net/bugs/1595976
** This bug is no longer a duplicate of bug 1595974
linux: 3.19.0-64.72 -proposed tracker
** This bug has been marked a duplicate of bug 1595976
linux: 3.19.0-64.72 -proposed tracker
--
You received
*** This bug is a duplicate of bug 1595976 ***
https://bugs.launchpad.net/bugs/1595976
** This bug is no longer a duplicate of bug 1595974
linux: 3.19.0-64.72 -proposed tracker
** This bug has been marked a duplicate of bug 1595976
linux: 3.19.0-64.72 -proposed tracker
--
You received
*** This bug is a duplicate of bug 1595991 ***
https://bugs.launchpad.net/bugs/1595991
** This bug has been marked a duplicate of bug 1595991
linux: 3.13.0-91.138 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to li
Public bug reported:
This bug is for tracking the 3.13.0-91.138 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Affects: kernel-sru-work
*** This bug is a duplicate of bug 1595991 ***
https://bugs.launchpad.net/bugs/1595991
** This bug is no longer a duplicate of bug 1595693
linux: 3.13.0-90.137 -proposed tracker
** This bug has been marked a duplicate of bug 1595991
linux: 3.13.0-91.138 -proposed tracker
--
You receive
Public bug reported:
This bug is for tracking the 3.16.0-76.98~14.04.1 upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Affects: kernel-s
*** This bug is a duplicate of bug 1596019 ***
https://bugs.launchpad.net/bugs/1596019
** This bug is no longer a duplicate of bug 1595703
linux-lts-utopic: 3.16.0-75.97~14.04.1 -proposed tracker
** This bug has been marked a duplicate of bug 1596019
linux-lts-utopic: 3.16.0-76.98~14.04.
*** This bug is a duplicate of bug 1596019 ***
https://bugs.launchpad.net/bugs/1596019
** This bug has been marked a duplicate of bug 1596019
linux-lts-utopic: 3.16.0-76.98~14.04.1 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which i
Before uploading this kernel into the kernel team PPA, it has been
tested on amd64 using the POC and the iptables-test.py test-suite (from
git://git.netfilter.org/iptables). It was verified that the test
failures were exactly the same ones as in previous kernels.
** Attachment added: "iptables-tes
Before uploading this kernel into the kernel team PPA, it has been
tested on amd64 using the POC and the iptables-test.py test-suite (from
git://git.netfilter.org/iptables). It was verified that the test
failures were exactly the same ones as in previous kernels.
** Attachment added: "iptables-tes
Before uploading this kernel into the kernel team PPA, it has been
tested on amd64 using the POC and the iptables-test.py test-suite (from
git://git.netfilter.org/iptables). It was verified that the test
failures were exactly the same ones as in previous kernels.
** Attachment added: "iptables-te
** Attachment added: "iptables-test.py test results"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1595914/+attachment/4689857/+files/4.2.0-41-generic.log
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://
Before uploading this kernel into the kernel team PPA, it has been
tested on amd64 using the POC and the iptables-test.py test-suite (from
git://git.netfilter.org/iptables). It was verified that the test
failures were exactly the same ones as in previous kernels.
--
You received this bug notifica
Before uploading this kernel into the kernel team PPA, it has been
tested on amd64 using the POC and the iptables-test.py test-suite (from
git://git.netfilter.org/iptables). It was verified that the test
failures were exactly the same ones as in previous kernels.
** Attachment added: "iptables-tes
Public bug reported:
I usually run kvm with '-serial stdio' after adding
GRUB_CMDLINE_LINUX_DEFAULT="console=ttyS0" to /etc/default/grub. This
will give me a serial console where I can login and, more important, get
kernel logs.
After install 4.8.0-16.17 I'm unable to login in the serial console
Just for completeness, running a kernel compiled with CONFIG_GOLDFISH=n
fixed the issue.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1627052
Title:
4.8.0-16.17: genirq: Flags mismatch
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
yakkety' to 'verification-done-yakkety'.
If verification is not done by 5 working days from
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
yakkety' to 'verification-done-yakkety'.
If verification is not done by 5 working days from
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
xenial' to 'verification-done-xenial'.
If verification is not done by 5 working days from t
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.laun
ion
Linux 4.4.32
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux (Ubuntu Xenial)
Importance: Undecided
Assignee: Luis Henriques (henrix)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Tags added: kernel-stable-tracking-
value test in ubi_attach_fastmap()
HID: usbhid: add ATEN CS962 to list of quirky devices
Linux 4.4.31
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux (Ubuntu Xenial)
Importance: Undecided
Assignee: Luis Henriques (henrix)
Status: In
** Changed in: linux (Ubuntu Xenial)
Assignee: (unassigned) => Luis Henriques (henrix)
** Changed in: linux (Ubuntu Xenial)
Status: New => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Changed in: linux (Ubuntu Xenial)
Assignee: (unassigned) => Luis Henriques (henrix)
** Changed in: linux (Ubuntu Xenial)
Status: New => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1642573
Title:
Xenial update to 4.4.32 stable release
Sta
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1642572
Title:
Xenial update to 4.4.31 stable release
Sta
Undecided
Status: New
** Affects: linux (Ubuntu Yakkety)
Importance: Undecided
Assignee: Luis Henriques (henrix)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Tags added: kernel-stable-tracking-bug
** Also affects: linux (Ubuntu Yakkety)
Importance: Undecided
formance mode
HID: usbhid: add ATEN CS962 to list of quirky devices
Linux 4.8.7
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux (Ubuntu Yakkety)
Importance: Undecided
Assignee: Luis Henriques (henrix)
Status: In Progress
** Tags:
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
** Changed in: linux (Ubuntu Yakkety)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1642606
Title:
Yakkety update to 4.8.7 stable release
St
** Changed in: linux (Ubuntu Yakkety)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1642607
Title:
Yakkety update to 4.8.8 stable release
St
As per comment #5, I'm tagging this bug as verified -- I've done the
same check for the xenial kernel.
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to lin
As per comment #37 I'm tagging this bug as verified.
** Tags removed: verification-needed-xenial verification-needed-yakkety
** Tags added: verification-done-xenial verification-done-yakkety
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
Tagging as verified as per comment #16
** Tags removed: verification-needed-xenial verification-needed-yakkety
** Tags added: verification-done-xenial verification-done-yakkety
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubun
** Tags added: verification-done-yakkety verification-needed-xenial
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1630554
Title:
QEMU throws failure msg while booting guest with SRIOV V
801 - 900 of 1649 matches
Mail list logo