** Tags removed: verification-needed-bionic verification-needed-focal
** Tags added: verification-done-bionic verification-done-focal
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1882039
Title:
The
** Tags removed: verification-needed-eoan
** Tags added: verification-done-eoan
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1882039
Title:
The thread level parallelism would be a bottleneck when s
** Also affects: linux (Ubuntu Eoan)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Focal)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
--
You received this bug notification because you
ification is only in replacing the write lock to a read one. And
there is no modification inside the loop. The regression probability is
low.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Gavin Guo (mimi0213kimo)
Status: New
** Tags: sts
--
You received this bug noti
Hi Joshua,
I just reviewed the commit Joseph provided in the launchpad. It's the
same as the two patches I backported.
eb4c2382272a srcu: Lock srcu_data structure in srcu_gp_start()
d633198088bd srcu: Prohibit call_srcu() use under raw spinlocks
The commit id eb4c2382272a is the latest linux-nex
** Changed in: linux (Ubuntu Xenial)
Assignee: Guilherme G. Piccoli (gpiccoli) => Gavin Guo (mimi0213kimo)
** Changed in: linux (Ubuntu)
Assignee: Guilherme G. Piccoli (gpiccoli) => Gavin Guo (mimi0213kimo)
--
You received this bug notification because you are a member of Ubunt
** Tags removed: verification-needed-bionic verification-needed-cosmic
verification-needed-xenial
** Tags added: verification-done-bionic verification-done-cosmic
verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubunt
** Description changed:
- [267265.140511] BUG: unable to handle kernel NULL pointer dereference at
0020
- [267265.144406] IP: xfrm_lookup+0x31/0x870
- [267265.146224] PGD 0 P4D 0
- [267265.147469] Oops: [#1] SMP PTI
- [267265.149141] Modules linked in: xt_iprange xt_nat ipt_M
Assignee: Gavin Guo (mimi0213kimo)
Status: Incomplete
** Tags: bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1801878
Title:
NULL pointer dereference at 0020 when
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791286
Title:
The VM hang happens because of pending interrupts not
** Description changed:
- VM hang because of pening interrups not reinjected.
+ [Impact]
+
+ After the VM(Guest OS is Windows Server 2012R2) has been live-migrated
+ several times, the screen is blacked out or freeze when the VM is
+ connected via VNC.
+
+ The Windows Guest OS Server has been in
Public bug reported:
VM hang because of pening interrups not reinjected.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Gavin Guo (mimi0213kimo)
Status: Incomplete
** Tags: sts
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1775326
Title:
The kernel NULL pointer dereference happens when acce
** Summary changed:
- The kernel NULL pointer dereference happens when accessing the task by
task_cpu() in function cpuacct_charge()
+ The kernel NULL pointer dereference happens when accessing the task_struct by
task_cpu() in function cpuacct_charge()
--
You received this bug notification bec
d by the Qemu and cannot be reproduced.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Gavin Guo (mimi0213kimo)
Status: Incomplete
** Tags: sts xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
** Attachment added: "kern.log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1771480/+attachment/5140100/+files/kern.log
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1771480
Title:
WARN
This occurred during the deployment of the DPDK compute. The DPDK was
not deployed. The bond0 and bond1 configuration appears to have failed.
---8<---
Preliminary analysis: the LRO appears to be off after the kernel traces,
despite the message. I am inquiring as to the nature of t
Public bug reported:
I have multiple instances of this dev_disable_lro error in kern.log. Also
seeing this:
systemd-udevd[1452]: timeout: killing 'bridge-network-interface' [2765]
<4>May 1 22:56:42 xxx kernel: [ 404.520990] bonding: bond0: Warning: No 802.3ad
response from the link partner for
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1747896
Title:
OOM and High CPU utilization in update_blocked_averag
Importance: Undecided
Assignee: Gavin Guo (mimi0213kimo)
Status: Incomplete
** Tags: sts
** Attachment added: "flamegraph of the high CPU utilization symptom"
https://bugs.launchpad.net/bugs/1747896/+attachment/5050575/+files/2018-01-31_07-38-45.perf.data.svg
--
Y
** Tags removed: verification-needed-artful verification-needed-zesty
** Tags added: verification-done-artful verification-done-zesty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1730852
Title:
Dev
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1730852
Title:
Device hotplugging with MPT SAS cannot work for VMWar
** Tags removed: verification-needed-xenial verification-needed-zesty
** Tags added: verification-done-xenial verification-done-zesty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1728489
Title:
tar
** Tags removed: verification-needed-xenial verification-needed-zesty
** Tags added: verification-done-xenial verification-done-zesty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1729256
Title:
Inv
failed to detect new drives from within a VMWare ESXi
environment.
[Test]
The patch has been verified based on the Ubuntu kernel v4.4.0-97.120.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Gavin Guo (mimi0213kimo)
Status: New
** Tags: sts
--
You received this
** Description changed:
[Impact]
The frequent kernel errors can be see inside the XFS based OSD
processes and it causes to crash and restart.
BUG: unable to handle kernel NULL pointer dereference at 00a0
IP: [] xfs_da3_node_read+0x30/0xb0 [xfs]
CPU: 8 PID: 2855031 Comm:
to proceed.
[Test]
The patch has been tested.
** Affects: linux (Ubuntu)
Importance: Undecided
Assignee: Gavin Guo (mimi0213kimo)
Status: New
** Tags: sts
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubu
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1680513
Title:
Migrating KSM page causes the VM lock up as the KSM p
** Tags removed: verification-needed-zesty
** Tags added: verification-done-zesty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1680513
Title:
Migrating KSM page causes the VM lock up as the KSM pag
@Joseph Salisbury,
Yes, Jorge has identified the bug and will send out the SRU patches.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1683982
Title:
net/ipv4: original ingress device index set as t
** Description changed:
[Impact]
After numad is enabled and there are several VMs running on the same
host machine(host kernel version: 4.4.0-72-generic #93), the
softlockup messages can be observed inside the VMs' dmesg.
First, the crashdump was captured when the symptom was observed
** Description changed:
[Impact]
After numad is enabled and there are several VMs running on the same
host machine(host kernel version: 4.4.0-72-generic #93), the
softlockup messages can be observed inside the VMs' dmesg.
First, the crashdump was captured when the symptom was observed
** Description changed:
+ [Impact]
After numad is enabled and there are several VMs running on the same
host machine(host kernel version: 4.4.0-72-generic #93), the
softlockup messages can be observed inside the VMs' dmesg.
First, the crashdump was captured when the symptom was observed
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Gavin Guo (mimi0213kimo)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1680513
Title:
Migrating KSM page causes the VM lock up as
** Description changed:
After numad is enabled and there are several VMs running on the same
- host machine, the softlockup messages can be observed inside the VMs'
- dmesg.
+ host machine(host kernel version: 4.4.0-72-generic #93), the
+ softlockup messages can be observed inside the VMs' dmesg
Public bug reported:
After numad is enabled and there are several VMs running on the same
host machine(host kernel version: 4.4.0-72-generic #93), the
softlockup messages can be observed inside the VMs' dmesg.
First, the crashdump was captured when the symptom was observed. At
the first glance, i
Public bug reported:
The call trace can be observed by bt in the gdb with the coredump of libvirtd:
$ gdb /usr/sbin/libvirtd core.compute-0-1.domain.tld.1480020436.libvirtd.26138
(gdb) bt
#0 0x7f856dddec37 in __GI_raise (sig=sig@entry=6) at
../nptl/sysdeps/unix/sysv/linux/raise.c:56
#1 0x00
@Denis V.Lunev
Really sorry for the inconvenience. The patch has already been sent to the
mailing list.
http://comments.gmane.org/gmane.linux.ubuntu.devel.kernel.general/78486
The fix will be included in the Ubuntu-3.13.0-93.140.
--
You received this bug notification because you are a member o
Public bug reported:
iscsi useful initiator information such as:
1). etc/iscsi/*
2). iscsiadm -m session -P3
These 2 are useful for debugging the iscsi initiator side bug. However,
it's not included by default in the sosreport.
** Affects: sosreport (Ubuntu)
Importance: Undecided
S
** Changed in: linux (Ubuntu Trusty)
Assignee: (unassigned) => Gavin Guo (mimi0213kimo)
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Gavin Guo (mimi0213kimo)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
stress test on the v3.13.0-89.136 with KASan backported.
** Attachment added: "kern.log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1572562/+attachment/4685474/+files/kern.log
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubun
I tried to reproduce the bug with the following commands:
"./parallel-73670.sh -r 2 -k 40" [1]
The error messages cannot be found in the dmesg with the proposed kernel
3.13.0-89.136 with KASan backported[2].
Reference:
[1]. http://kernel.ubuntu.com/git/gavinguo/stress-test.git/
[2].
http://ke
** Description changed:
[Impact]
In the v3.13.0-76 kernel with KASan backported.
The following error message could be observed during the kernel
building stress test of the command[1]: "./parallel-73670.sh -r 2 -k 40"
That means building 40 kernels in the same time with 2 rounds.
Ba
** Description changed:
[Impact]
In the v3.13.0-76 kernel with KASan backported.
The following error message could be observed during the kernel
building stress test of the command[1]: "./parallel-73670.sh -r 2 -k 40"
That means building 40 kernels in the same time with 2 rounds.
Ba
** Description changed:
+ [Impact]
In the v3.13.0-76 kernel with KASan backported.
The following error message could be observed during the kernel
building stress test of the command[1]: "./parallel-73670.sh -r 2 -k 40"
That means building 40 kernels in the same time with 2 rounds.
Ba
11 {
312 return ((1UL << (nr & (BITS_PER_LONG-1))) &
313 (addr[nr >> _BITOPS_LONG_SHIFT])) != 0;
314 }
+
+ Reference:
+ [1]. http://kernel.ubuntu.com/git/gavinguo/stress-test.git/
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Gav
The following 2 patches are the solution to the bug:
4d88e6f7d5ff mm/balloon_compaction: fix deflation when compaction is disabled
d6d86c0a7f8d mm/balloon_compaction: redesign ballooned pages management
Related upstream mailing list discussion:
- mm: compaction: buffer overflow in isolate_migrate
Public bug reported:
In the v3.13.0-76 kernel with KASan backported.
The following error message could be observed during the kernel
building stress test of the command: "./parallel-73670.sh -r 2 -k 40"
That means building 40 kernels in the same time with 2 rounds.
Bad access happens when we read
** Tags removed: verification-needed-trusty verification-needed-vivid
verification-needed-wily
** Tags added: verification-done-trusty verification-done-vivid
verification-done-wily
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
htt
** Description changed:
[Impact]
- The use-after-free invalid read bug, which happens in really tricky case,
- would use the numa_faults data already freed for the NUMA balance to make a
- decision to migrate the exiting process.
+ The use-after-free invalid read bug, which happens in really
** Description changed:
+ [Impact]
+
+ The use-after-free invalid read bug, which happens in really tricky case,
+ would use the numa_faults data already freed for the NUMA balance to make a
+ decision to migrate the exiting process.
+
+ The bug was found by the Ubuntu-3.13.0-65 with KASan backp
Reproducer for the bug.
** Attachment added: "kernel_panic_test.sh"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1527643/+attachment/4595998/+files/kernel_panic_test.sh
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https
** Description changed:
We are trying to debug the kernel using KASAN and we found that when a
VM is booting in our cloud, on the virtualised kernel, there is a use-
after-free access that should not be there.
The failing VM was running on a host with kernel 3.13.0-66-generic
(trusty)
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Gavin Guo (mimi0213kimo)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1534054
Title:
use-after-free found by KASAN
Public bug reported:
The error message can be observed in the dmesg when the guest VM booted
with v3.13.0-65 with KASAN enabled.
==
BUG: KASan: use after free in blk_mq_register_disk+0x193/0x260 at addr
8801ec247400
Read of size
** Tags removed: cts
** Tags added: sts
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1403282
Title:
General protection fault on c->freelist broken with Trusty Tahr
To manage notifications about th
** Description changed:
==
BUG: KASan: use after free in task_numa_find_cpu+0x64c/0x890 at addr
880dd393ecd8
Read of size 8 by task qemu-system-x86/3998900
=
** Description changed:
==
BUG: KASan: use after free in task_numa_find_cpu+0x64c/0x890 at addr
880dd393ecd8
Read of size 8 by task qemu-system-x86/3998900
=
** Description changed:
- kernel: [284190.877125]
==
- kernel: [284190.898773] BUG: KASan: use after free in
task_numa_find_cpu+0x64c/0x890 at addr 880dd393ecd8
- kernel: [284190.920765] Read of size 8 by task qemu-system-x86/39
** Attachment added: "numa_faults_use_after_free.kern.log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1527643/+attachment/4536904/+files/numa_faults_use_after_free.kern.log
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
==
BUG: KASan: use after free in task_numa_find_cpu+0x64c/0x890 at addr
880dd393ecd8
Read of size 8 by task qemu-system-x86/3998900
Currently, the bug cannot be reproduced in the original platform. However,
there is another platform has similar symptom. And the bug can be captured
by Kasan(Kernel Address Sanitizer) backported on the v3.13.0-52.86.
The source code:
http://kernel.ubuntu.com/git/gavinguo/ubuntu-trusty-amd64.git/l
** Attachment added: "awk.kern.log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1403282/+attachment/4508426/+files/awk.kern.log
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1403282
Title
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1488035
Title:
OSDs Linked list corruption causes kernel BUG at
/b
** Description changed:
[Impact]
The node which mounts a ceph rbd volume causes a panic when all OSD
daemons on the all ceph nodes are restarted.
- [642981.871592] [ cut here ]
+ [642981.871592] [ cut here ]
[642981.912255] kernel BUG
if there is panics.
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Gavin Guo (mimi0213kimo)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1488035
Title:
OSDs Linked list corrupt
Public bug reported:
[Impact]
[Fix]
[Test Case]
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Incomplete
** Tags: sts trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1
** Tags removed: verification-needed-trusty verification-needed-vivid
** Tags added: verification-done-trusty verification-done-vivid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1475204
Title:
Fix
[a...@linux-foundation.org: s/kmalloc_names/kmalloc_info/, tweak comment
text]
Signed-off-by: Gavin Guo
Acked-by: Christoph Lameter
Cc: Pekka Enberg
Cc: David Rientjes
Cc: Joonsoo Kim
Signed-off-by: Andrew Morton
Signed-off-by: Linus Torvalds
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Gavin Guo (mimi0213kimo)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1475204
Title:
Fix kmalloc slab creation sequence
To man
[a...@linux-foundation.org: s/kmalloc_names/kmalloc_info/, tweak comment
text]
Signed-off-by: Gavin Guo
Acked-by: Christoph Lameter
Cc: Pekka Enberg
Cc: David Rientjes
Cc: Joonsoo Kim
Signed-off-by: Andrew Morton
Signed-off-by: Linus Torvalds
nd 64-bit x86 if you have
CONFIG_SLAB enabled. When I switched to CONFIG_SLUB, the kernel
boots. So it appears this commit is breaking kernel configurations
with CONFIG_SLAB enabled.
It bisects down to:
commit 4066c33d0308f87e9a3b0c7fafb9141c0bfbfa77
Author: Gavin Guo
Date: Wed Jun 24 16:55:54
@Kamal,
Thanks for your verification. I'll modify the tag verification-needed-
vivid to verification-done-vivid.
** Tags removed: verification-needed-vivid
** Tags added: verification-done-vivid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed t
Hi Clsoto,
Tinoco is on vacation now, I'm his proxy. And I saw you have tested the
kernel to verify the ethtool. Really thanks for your effort to do that.
Except on thing that I saw the kernel version
Linux powerio-le13 3.19.0-15-generic #15-Ubuntu SMP Thu Apr 16 23:32:13
UTC 2015 ppc64le ppc64le
** Tags removed: verification-needed-vivid
** Tags added: verification-done-vivid
** Tags removed: verification-needed-utopic
** Tags added: verification-done-utopic
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because
** Tags added: utopic vivid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1456952
Title:
support the slub_debug boot option on specific object size
To manage notifications about this bug go to:
htt
** Description changed:
[Impact]
slub_debug cannot work for specific kmem_cache size.
e. g. slub_debug=PU,kmalloc-1024
The slub_debug is used to enable the debugging of use-after-free, poison
overwritten, double free. And it also increases the up time of the server
when the ab
[Test case]
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Gavin Guo (mimi0213kimo)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1456952
Title:
support the slub_debug boot option on s
Public bug reported:
The slub_debug=PU,kmalloc-xx cannot work because in the
create_kmalloc_caches() the s->name is created after the
create_kmalloc_cache() is called. The name is NULL in the
create_kmalloc_cache() so the kmem_cache_flags() would not set the
slub_debug flags to the s->flags. The
** Tags removed: verification-needed-utopic
** Tags added: verification-done-utopic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1439441
Title:
Kernel provides incomplete audit information when an
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1439441
Title:
Kernel provides incomplete audit information when an
Test of the following kernel fail:
linux-image-3.13.0-031300-generic_3.13.0-031300.201401192235_amd64.deb
linux-image-3.13.0-24-generic
linux-image-3.13.0-46-generic
linux-image-3.15.0-031500-generic_3.15.0-031500.201406131105_amd64.deb
linux-image-3.17.0-031700-generic_3.17.0-031700.201410060605_a
priority_boost = 3
disp_qos = lossless
dispatcher = /sbin/audispd
name_format = hostname
space_left = 75
space_left_action = SYSLOG
action_mail_acct = root
admin_space_left = 50
admin_space_left_action = SYSLOG
disk_full_action = SYSLOG
disk_error_action = SYSLOG
- sudo su
- # echo "lalal
ffects: linux (Ubuntu)
Importance: Undecided
Assignee: Gavin Guo (mimi0213kimo)
Status: In Progress
** Tags: cts trusty
** Attachment added: "dmesg.log"
https://bugs.launchpad.net/bugs/1403282/+attachment/4282400/+files/dmesg.log
** Changed in: linux (Ubuntu)
Assig
** Changed in: linux (Ubuntu)
Status: In Progress => Fix Released
** Changed in: hwe-next
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1322409
Title
** Changed in: linux (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1345895
Title:
[Dell Inspiron 3541] USB3 stick speed drop to 480M after first use
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
** Tags removed: verification-done-trusty
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/
** Changed in: linux (Ubuntu)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1322409
Title:
Usb 3.0 device is recognized as usb 2.0 device on usb 3.0 port if the
p
orted-and-tested-by: Gavin Guo
Acked-by: Bjorn Helgaas
Reviewed-by: Mika Westerberg
Cc: 3.15+ # 3.15+
Signed-off-by: Rafael J. Wysocki
I've tried to cherry-picked the commit. But it caused a lot of conflicts. And I
tried to show the difference between v3.13 to v3.16-rc1:
Wed
I've tested with Rafael's cleaner patch on the Lenovo CID 201107-8258.
It works fine. As it didn't work on the v3.13 generic.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1290189
Title:
Unable to h
Rafael submitted a patch to the
https://bugzilla.kernel.org/show_bug.cgi?id=76901. I've tested and it
works fine. Now, I've provided the dmesg for him to check and am waiting
for Rafael to give a official commit.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
The bug was reported to
https://bugzilla.kernel.org/show_bug.cgi?id=76901. Currently, Mika asked
for the support to apply his patch, which adds more debug messages to
the suspected function, and get the dmesg log. I've submitted the dmesg
for his diagnosis.
** Bug watch added: Linux Kernel Bug Tra
I've completed the bisect and found
2d8b1d566a5f4874f4d92361f5cdbb50baa396f8 is the first bad commit. The
"git bisect log" is also attached.
commit 2d8b1d566a5f4874f4d92361f5cdbb50baa396f8
Author: Mika Westerberg
Date: Sat Jul 13 20:09:59 2013 +0300
ACPI / hotplug / PCI: Get rid of check_s
I've built the following commits and it can work so have no clue to do
the bisect within this commits.
Mon May 26 18:51:24 gavin@gavin-w530:~/os/linux$ git log --pretty=oneline
v3.11..v3.12-rc1 drivers/acpi/pci*
a9238741987386bb549d61572973c7e62b2a4145 Merge tag 'pci-v3.12-changes' of
git://git.
I spent some times testing and found that the commits causing the
regression is between v3.11 and v3.12-rc1. It still needs more times to
do the bisect.
Mon May 26 19:02:09 gavin@gavin-w530:~/os/linux$ git log --pretty=oneline
v3.11..v3.12-rc1 | wc -l
10153
Since there're still 10153 commits lef
This bug can't be fixed in Raring. As the feature is also available in
the 12.04.4, users can upgrade their kernel to use the feature.
** Changed in: linux-lts-raring (Ubuntu)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Changed in: hwe-next
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1229576
Title:
Webcam preview have half image display and black screen in some
resolu
** Tags removed: verification-needed-quantal
** Tags added: verification-done-quantal
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1229576
Title:
Webcam preview have half image display and black sc
** No longer affects: linux-lts-quantal (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1229576
Title:
Webcam preview have half image display and black screen in some
resolutions
To manage
** Also affects: linux-lts-quantal (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1229576
Title:
Webcam preview have half image display and black
1 - 100 of 151 matches
Mail list logo